WO2015102186A1 - Procédé pour limiter l'utilisation d'un terminal et son système - Google Patents

Procédé pour limiter l'utilisation d'un terminal et son système Download PDF

Info

Publication number
WO2015102186A1
WO2015102186A1 PCT/KR2014/006058 KR2014006058W WO2015102186A1 WO 2015102186 A1 WO2015102186 A1 WO 2015102186A1 KR 2014006058 W KR2014006058 W KR 2014006058W WO 2015102186 A1 WO2015102186 A1 WO 2015102186A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
lock
information
member terminal
student
Prior art date
Application number
PCT/KR2014/006058
Other languages
English (en)
Korean (ko)
Inventor
이윤석
이용규
김하얀
Original Assignee
플러스기술 주식회사
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 플러스기술 주식회사 filed Critical 플러스기술 주식회사
Publication of WO2015102186A1 publication Critical patent/WO2015102186A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Definitions

  • the present invention relates to a method for limiting the use of a terminal and a system therefor, and more particularly, to a method and a system for limiting the use of an information communication terminal for a predetermined time for a plurality of members belonging to a specific group.
  • the school has a problem that the concentration of the class is greatly reduced while using a smartphone or a tablet computer indiscriminately during class as well as during breaks. Accordingly, each school prohibits indiscriminate use by collecting smartphones every hour from students, but it is not only cumbersome to collect and redistribute smartphones every time, but the terminal is lost or damaged in this process. There was a problem.
  • the company needs to limit some functions of the personal information communication terminal in the company in order to improve technology efficiency or improve work efficiency in the company.
  • various measures have been taken, such as attaching a security sticker to the camera portion of a smartphone or forcing the installation of a program that blocks a specific function such as a network function so that technical documents are not leaked through e-mail.
  • the security sticker has a problem that it is very cumbersome because it must be re-attached every time the entrance and exit, and when installing a program to block a specific function, there was a problem that the use of the function of the terminal is restricted from the outside.
  • the background art described above is technical information that the inventors possess for the derivation of the present invention or acquired in the derivation process of the present invention, and is not necessarily a publicly known technique disclosed to the general public before the application of the present invention. .
  • One embodiment of the present invention is to provide a method and a system for limiting the use of the terminal that can effectively limit the use of the information communication terminal of the members belonging to a specific group, such as school or company for a certain time.
  • an embodiment of the present invention is to provide a method for limiting the use of a terminal and a system therefor that can check attendance or attendance while limiting the use of the information communication terminal.
  • an embodiment of the present invention has an object to provide a method and a system for limiting the use of the terminal that can facilitate member management.
  • Another object of the present invention is to provide a method for limiting the use of a terminal and a system for preventing the deletion of a program installed to limit the use of the terminal.
  • the terminal usage restriction method performed by a member terminal of a member belonging to a specific group, receiving a lock command from the server; Querying whether to accept the switch to the locked state before switching the member terminal to the locked state based on the lock setting information included in the lock command; Switching the member terminal to a locked state when an intent of acceptance of the query is input to the member terminal; And releasing the locked state of the member terminal based on the lock setting information.
  • Terminal usage restriction method a plurality of member terminals for each of a plurality of members belonging to a specific group, and a server that communicates via the network with the administrator terminal of a specific group to which the plurality of member terminals belong; Performing lock and input lock setting information from the administrator terminal; Transmitting a lock command including the lock setting information to each member terminal to be locked; If a lock acceptance notification corresponding to the lock command is received from any member terminal among the lock target member terminals within a predetermined time from the lock start time included in the lock setting information, the member corresponding to the arbitrary member terminal is present.
  • any member terminal in a locked state Or going to work or defining any member terminal in a locked state; And providing the manager terminal with status information including information on attendance or attendance for each member corresponding to the member terminal to be locked, or information on a lock or release state defined for each member terminal to be locked. It may include the step.
  • the terminal usage restriction method which is performed in the server, the URL address of the server to which the member terminal requested access, the application information requested on the member terminal or on the member terminal Extracting requested video information; Determining whether the extracted URL address, application information, or video information is harmful content by referring to a harmful database; And if it is determined that the extracted URL address, application information, or video information is harmful content, the member terminal blocks access to the extracted URL address, or the requested application or video is executed on the member terminal. And sending a message to the member terminal to prevent it from becoming a member.
  • the terminal usage restriction method further comprises the step of extracting information on the URL address and the number of times blocked access to the member terminal in the server, and providing the information to the administrator terminal.
  • the terminal usage restriction method which is performed in the server, extracting the video information stored in the member terminal; Providing the extracted video information to the manager terminal in response to receiving a search request for the video information stored in the member terminal from the manager terminal; Receiving deletion request information on the deleted video from the provided video information from the manager terminal; And providing a deletion message to the member terminal, wherein the deletion message includes the deletion request information and is not provided with a push notification on the member terminal.
  • any one of the above problem solving means of the present invention it is possible to provide a terminal usage restriction method and a system for limiting the use of the information communication terminal of the members belonging to a specific group, such as school or company for a certain period of time. have.
  • any one of the problem solving means of the present invention it is possible to provide a terminal usage restriction method and a system for limiting the use of the information communication terminal and at the same time check the attendance or attendance.
  • any one of the problem solving means of the present invention it is possible to provide a terminal usage restriction method and a system therefor that can facilitate member management.
  • any one of the problem solving means of the present invention it is possible to provide a terminal use restriction method and a system for preventing the deletion of a program installed to limit the use of the terminal.
  • FIG. 1 is a block diagram of a terminal usage restriction system according to an embodiment of the present invention.
  • FIG. 2 is a block diagram showing the configuration of a group terminal included in a terminal usage restriction system according to an embodiment of the present invention.
  • FIG. 3 is a block diagram illustrating a configuration of a server included in a terminal usage restriction system according to an embodiment of the present invention.
  • FIG. 4 is a flowchart illustrating a method of restricting terminal usage according to an embodiment of the present invention.
  • FIG. 5 is an exemplary diagram illustrating an example of a screen provided to a group manager terminal according to a terminal usage restriction method according to an embodiment of the present invention.
  • FIG. 6 is a block diagram illustrating a configuration of a member terminal and a server included in a terminal usage restriction system according to another embodiment of the present invention.
  • FIG. 7 is a block diagram illustrating a configuration of a member terminal, a server, and an administrator terminal included in a terminal usage restriction system according to another embodiment of the present invention.
  • FIGS. 1 to 3 is a block diagram of a terminal usage restriction system according to an embodiment of the present invention
  • Figure 2 is a block diagram showing the configuration of a group of terminals included in the terminal usage restriction system according to an embodiment of the present invention
  • 3 is a block diagram illustrating a configuration of a server included in a terminal usage restriction system according to an embodiment of the present invention.
  • a terminal usage restriction system includes a member terminal 10 and an administrator terminal 20 and 25 for exchanging data with each other via a network N, and a terminal usage restriction service. It may be configured to include a server 40 to provide.
  • the network N may include a local area network (LAN), a wide area network (WAN), a value added network (VAN), a personal local area network (PAN), and a mobile communication network (PAN). It can be implemented in all kinds of wired / wireless networks such as mobile radio communication network (Wibro), wireless broadband Internet (Wibro), mobile WiMAX, high speed downlink packet access (HSDPA), or satellite communication network.
  • LAN local area network
  • WAN wide area network
  • VAN value added network
  • PAN personal local area network
  • PAN personal local area network
  • PAN personal local area network
  • PAN mobile communication network
  • Wibro mobile radio communication network
  • WiMAX wireless broadband Internet
  • HSDPA high speed downlink packet access
  • the member terminal 10 may be implemented as a portable terminal capable of connecting to a remote server through a network N or connecting to other terminals and servers.
  • the portable terminal is, for example, a wireless communication device that guarantees portability and mobility, and includes a personal communication system (PCS), a personal digital cellular (PDC), a personal handyphone system (PHS), a personal digital assistant (PDA), and a GSM (GSM).
  • GSM Global System for Mobile communications, International Mobile Telecommunication (IMT) -2000, Code Division Multiple Access (CDMA) -2000, W-Code Division Multiple Access (W-CDMA), Wireless Broadband Internet (WBRO), Smart Phones ), And all kinds of handheld based wireless communication devices such as mobile WiMAX (Mobile Worldwide Interoperability for Microwave Access).
  • IMT International Mobile Telecommunication
  • CDMA Code Division Multiple Access
  • W-CDMA W-Code Division Multiple Access
  • WBRO Wireless Broadband Internet
  • Smart Phones And all kinds of handheld based wireless communication devices such as mobile WiMAX (Mobile Worldwide
  • the "member” is a group member belonging to a specific "group” and is a user registered in the server 40 as a member of a specific group through the administrator terminals 20 and 25 to be described later.
  • the member terminal 10 is installed in accordance with the command of the server 40 'restricted application' to limit the execution of a specific function of the member terminal 10 or the use of the entire terminal is installed, the member terminal 10 is
  • the restricted application may be downloaded and installed in a general application market (for example, an app store or a play store), or may be provided in an embedded form in the member terminal 10.
  • the manager terminal 20, 25 may be implemented as a computer, a portable terminal, a television that can be connected to a remote server through the network (N) or connectable to other terminals and servers.
  • the computer includes, for example, a laptop, desktop, laptop, etc., which is equipped with a web browser
  • the portable terminal is, for example, a wireless communication device that ensures portability and mobility.
  • the television may include an Internet Protocol Television (IPTV), an Internet Television (Internet Television), a terrestrial TV, a cable TV, or the like.
  • IPTV Internet Protocol Television
  • Internet Television Internet Television
  • the manager terminal 20, 25 accesses the server 40 as an administrator of the group registered in the server 40, and restricts the use of the terminal collectively or individually for each member terminal 10 registered as a member. You can do that.
  • manager terminals 20 and 25 may be divided into two different terminals according to embodiments.
  • the administrator terminals 20 and 25 are not separated from each other, but a plurality of members subordinate to one group account form a small group again.
  • the manager terminal (20, 25) in charge of the management of each small group, an operator terminal (25) to manage the entire member of one group account, and manages the contact person dependent on the group account together (25) ) Can be separated.
  • each account used to access the server 40 is a person in charge of a group account, or the same one
  • the person in charge of the terminal 20 and the operator terminal 25 may be divided according to whether or not a single account having the highest level of authority for the group account.
  • a single school account may be granted to a school, and an administrator account that manages these school accounts with the highest level of authority may be assigned to a school account subordinately.
  • a teacher account can be assigned to manage students.
  • a student account may be assigned to each student.
  • the portable terminal accessing the server 40 with the student account is the member terminal 10 through the above-described usage restriction application
  • the terminal accessing the server 40 through the operator account is the operator terminal 25, and each of them.
  • a terminal accessing the server 40 through the teacher's account may be a representative terminal 20 in FIG. 1.
  • the server 40 is a computer that can communicate with a remote terminal or another server, and transmits and receives data to and from each of the member terminal 10 and the administrator terminal (20, 25) through the network (N), the member terminal 10 It provides a lock function for limiting the use of the terminal, and the administrator terminal (20, 25) provides information about whether the lock of the terminal of each member.
  • the server 40 may communicate with a restricted application installed in the member terminal 10, and may communicate with an administrator application installed in the administrator terminal 20, 25 or an administrator web page provided to the administrator terminal 20, 25. .
  • the member terminal 10 is described as the student terminal 10
  • the representative terminal 20 is represented by the teacher terminal 20 and the specific group is limited to each 'school'
  • the structure will be described in more detail, of course, the present invention is not limited to this embodiment.
  • the student terminal 10 includes a command receiving unit 11.
  • the command receiving unit 11 receives a lock command from the server 40.
  • the server 40 may simultaneously transmit the same lock command to students belonging to a specific school or a specific class of a specific school, or some of the students belonging to a specific class according to the setting of the teacher terminal 20 or the operator terminal 25. You can also send a lock command only to.
  • the lock command may include information about a lock start time and a lock release time.
  • the lock command may include only information on one lock and release or may include schedule information for multiple locks and releases.
  • the lock command may not include information about the lock start time or the unlock time, and may include only a command for simply switching the student terminal 10 to the locked state. In this case, the student terminal 10 may immediately switch the state of the terminal to the locked state when the lock command is received.
  • the command receiving unit 11 may store information about the lock time and the lock release time included in the received lock command in the student terminal 10.
  • the lock command may be received by the student terminal 10 together with or as a push notification at the lock start time.
  • the above-described restricted application may be executed during the confirmation of the push notification. That is, the server 40 can send a push notification to each student terminal 10 at the lock start time set by the teacher terminal 20 or the operator terminal 25 to allow the student to run the application to limit their own use, run The application may access the server 40 and receive a lock command.
  • the lock command may be delivered to the student terminal 10 by a short message service (SMS) or a multimedia message service (MMS) through a general mobile communication network.
  • SMS or MMS message may include a lock command in a form that can be recognized by the above-described restricted application.
  • Restriction application installed in the student terminal 10 when the SMS or MMS message is received, can check whether the lock command is included in the data contained in the message, if the lock command includes a lock guide 12 described below ) And the lock performing unit 13.
  • the student terminal 10 may be provided with a locking guide portion (12).
  • the lock guide 12 may inform the student of the lock start time or the lock release time included in the received lock command before the arrival of the lock start time.
  • the lock guide part 12 informs that the lock start time arrives, and before the lock performer 14, which will be described later, restricts the use of the student terminal 10, You can query whether to accept the lock.
  • the lock guide unit 12 may inform the student of the arrival of the lock start time by displaying a message included in the push notification.
  • the lock acceptor 13 provided in the student terminal 10 receives a response from the student as a response to the question of whether to accept the lock. You can receive the intent of accept. That is, the lock accepting unit 13 provides the user with a message for guiding the arrival of the lock start time to the user interface that can receive a selection input whether the student who is a user of the student terminal 10 agrees to the function lock of the terminal. If the student selects the 'OK' button as the intention of 'accept', the server 40 notifies that the student has accepted the lock.
  • the lock performing unit 14 limits the function of the terminal.
  • the lock performing unit 14 limits the available functions of the student terminal 10 when the student accepts the lock after the lock start time arrives.
  • the lock start time may not be set separately, and the lock may be performed immediately after the lock command is received.
  • the lock performing unit 14 may change the student terminal 10 to the locked state by using, for example, a terminal locking function provided through an operating system API (Application Programming Interface) of the terminal.
  • an operating system API Application Programming Interface
  • the 'locked state' refers to a state in which the user can use the general function of the student terminal 10 only by inputting a password such as a password or a preset pattern, and can perform only a limited function such as an emergency call before releasing it.
  • the server 40 may set a lock pattern such as a password for each student terminal 10, and include the same in the above-described lock command and transmit the same to the student terminal 10.
  • FIG. The command receiver 11 receives and stores the lock pattern from the server 40, and then locks the lock pattern received from the server 40 when the lock performer 14 switches the student terminal 10 to the locked state. You can only set the lock state beforehand by using.
  • the lock performing unit 14 may generate a lock pattern by itself and perform the lock using the lock pattern.
  • the server 40 when the server 40 generates the lock pattern for the specific student terminal 10, the information about the generated lock pattern is sent to the teacher terminal 20, which is the person in charge of the group or small group corresponding to the corresponding student terminal 10.
  • the teacher can release the lock state of the corresponding student terminal 10 by allowing the teacher to inform the student after checking the lock pattern if necessary.
  • the lock pattern is a different pattern from the lock pattern set by the student who is the user of the student terminal 10, and may be a string randomly selected by the server 40 or the lock performing unit 14.
  • the lock performing unit 14 may switch the student terminal 10 from the locked state to the released state when the unlocking time arrives. At this time, the lock performing unit 14 may use the above-described locking pattern for unlocking.
  • the lock performing unit 14 may switch the student terminal 10 from the locked state to the released state when receiving the lock release command from the server 40. That is, when the unlocking time 14 is received and stored in advance in the student terminal 10, the lock performing unit 14 may switch the student terminal 10 to the unlocked state at the unlocking time according to the passage of time. have.
  • the lock release command transmitted from the server 40 to the student terminal 10 may also be delivered as a push notification like the lock command, or may be delivered as a message using SMS or MMS.
  • the unlocking command is included in the message using SMS or MMS and delivered to the student terminal 10
  • the restricted application installed in the student terminal 10 checks the data included in the message and includes an unlocking command. It can be confirmed, and accordingly the lock performing unit 14 can switch the student terminal 10 from the locked state to the released state.
  • the unlocking command may be transmitted to each student terminal 10 when the teacher terminal 20 requests the unlocking of the server 40.
  • the unlock command may include information on the above-described lock pattern set in advance on the server 40 for each student, the limited application installed in the student terminal 10 is included in the lock command or unlock command to the student
  • the student terminal 10 may be switched to the unlocked state by using the lock pattern received by the terminal 10, or the lock pattern may be displayed to the user so that the user directly releases the lock state.
  • the lock performing unit 14 is a student terminal 10 when the network connection of the restricted application installed in the student terminal 10 is difficult or prohibited, or a temporary error occurred in the student terminal 10 or the server 40 or the like. If the lock has not been released, i.e., the lock release time has elapsed, or if the student terminal 10 is still locked despite the fact that the server 40 has sent an unlock command to the student terminal 10, the server The unlock request may be sent to 40. Alternatively, even before the unlock time arrives, the lock performing unit 14 may send the unlock request to the server 40 so that the lock can be exceptionally released at the request of the student.
  • the lock performing unit 14 may provide a user interface for inputting a lock release request to one side of the lock screen when the student terminal 10 is in the locked state. Accordingly, when the student requests the unlocking, the server 40 delivers it to the teacher terminal 20 corresponding to the student, and if the teacher terminal 20 again accepts the unlocking, the server 40 responds to the corresponding student terminal. By resending the unlock command to (10), it is possible to release the locked state of the student terminal (10).
  • the locker 14 may release the lock request in a message such as SMS or MMS so that the student terminal 10 can release the lock state in a state in which the student terminal 10 cannot directly communicate with the server 40.
  • a message such as SMS or MMS
  • the restriction application may be applied to the unlock request and the server 40.
  • a message including a URL having information as a parameter may be transmitted to the mobile communication number of the teacher terminal 20 through SMS or MMS.
  • an SMS or MMS message is delivered to the teacher terminal 20, and the teacher may agree to unlock the corresponding student terminal 10 by clicking or touching the URL included in the message.
  • the server 40 when the server 40 receives an access request from the teacher terminal 20 corresponding to the student terminal 10 that has requested the unlock, the URL including the student information of the corresponding student as a parameter, the corresponding teacher is connected to the student terminal 10. It is determined that the user agrees to unlock, and the student terminal 10 may transmit the unlock command as an SMS or MMS message.
  • the student terminal 10 may perform the unlock or display the lock pattern information according to the unlock command included in the message.
  • the lock release command may include lock pattern information as described above.
  • the present invention may further include an attendance check unit 15 for confirming the attendance of the student corresponding to the student terminal 10 according to the embodiment.
  • the attendance check unit 15 may check whether the student is present or absent, and may notify the lock performing unit 14 of the confirmed matter. In this case, the lock performing unit 14 may perform the lock only when it is confirmed that the student has attended school.
  • the confirmation of attendance or absence can be performed in various ways. If a student who is a user of the student terminal 10 selects his / her own status as 'absent', the student is absent. can do.
  • the attendance check unit 15 may use the position information collecting means included in the student terminal 10, for example, the position of the student terminal 10 corresponding to the student terminal 10 by using a Global Positioning System (GPS) module. If a student is found to be within a certain distance of the school's offline address location, the student may be treated as attendance. At this time, the attendance check unit 15 may check whether the attendance at the lock start time or a predetermined time therefrom.
  • GPS Global Positioning System
  • the attendance check unit 15 receives the absence confirmation request from the student terminal 10, and transfers it to the teacher terminal 20 corresponding to the student terminal 10, when the absence confirmation process in the teacher terminal 20 The student may be considered absent.
  • the lock acceptor 13 accepts the lock. If the student is found to have accepted the lock again, the student may be treated as present.
  • the lock performing unit 14 may transmit the information about the student's attendance or absence to the server 40 so that the teacher terminal 20 may check whether each student is present.
  • the student terminal 10 may include a pest blocking unit 16.
  • the pest blocking unit 16 checks whether the student attempts to access the pest using the network access means installed in the student terminal 10 while the lock performing unit 14 unlocks the student terminal 10. This can block access to pests.
  • the pest blocking unit 16 may protect the student from pests by blocking the transmission of the search request or blocking the reception of the search result when the search word input by the student includes a preset 'harmful word'.
  • the pest blocking unit 16 determines that the Uniform Resource Identifier (URI) of the information to be accessed by the student is preset harmful information
  • the pest blocking unit 16 blocks the transmission of the request for access to the URI, or the response to the access request. You can block reception.
  • URI Uniform Resource Identifier
  • the pest blocking unit 16 determines whether the input search word belongs to the 'harmful word' or whether the selected URI corresponds to the 'harmful information'.
  • the harmfulness policy data stored in 10) may be used, or the information contained in the input search word or URI may be transmitted to the server 40, and compared with the harmful policy data stored in the server 40 so that the harmfulness may be reviewed. .
  • the pest blocking unit 16 includes harmful words or harmful information by comparing the data contained in the message transmitted to the student terminal 10 by SMS or MMS with the harmful words or harmful information included in the harmful policy data. After determining whether there is a harmful word or harmful information, the sender information of the message and the harmful message data included in the message may be registered and stored in the server 40. Accordingly, a list of harmful message data registered in the server 40 may be provided to the teacher terminal 20 or may be checked by a parent through a web page.
  • the student terminal 10 may include a deletion prevention unit 17.
  • Deletion prevention unit 17 as a means to prevent the above-described application to use the application is not deleted from the student terminal 10, by using an API supported by the operating system of the student terminal 10 can be prevented from deleting the application. .
  • the student terminal 10 may include an API supported by the operating system of the student terminal 10 can be prevented from deleting the application.
  • the student terminal 10 may include a deletion prevention unit 17.
  • Deletion prevention unit 17 as a means to prevent the above-described application to use the application is not deleted from the student terminal 10, by using an API supported by the operating system of the student terminal 10 can be prevented from deleting the application. .
  • the student agrees to set the administrator rights
  • You can make it impossible to delete.
  • this is just one example and can be prevented from deleting the restricted application using a method supported by the operating system of the student terminal 10 in which the restricted application is installed. You can query whether you agree.
  • the deletion prevention unit 17 in response to the request of the server 40, or according to a predetermined schedule, by continuously sending a response to the server 40, the server 40 to the corresponding student terminal 10 You can make sure that the installed restricted application has not been deleted.
  • the server 40 may determine that the restricted application is deleted, the teacher terminal 20 Can be notified.
  • the student terminal 10 detects an emergency occurrence, and if an emergency occurrence is detected, transmits the current location information of the student terminal 10 to the server 40 or via the teacher terminal 20 or SMS.
  • Other emergency notification unit (not shown) to be delivered to the guardian side may be further included.
  • the method of detecting the occurrence of an emergency in the student terminal 10 may be performed by detecting whether an input of a preset pattern (input using a button, a touch panel, an inertial sensor, etc.) occurs, but various methods may be used. .
  • the emergency notification unit allows the location information of the student terminal 10 to be transmitted to the teacher or guardian when an emergency occurs, and to be connected to the mobile communication number of the preset teacher terminal 20 or the mobile communication number of the guardian. It may be.
  • the student terminal 10 may further include a bulletin board providing unit (not shown).
  • the server 40 may register and store posts from each student terminal 10 and the teacher terminal 20 by dividing each small group into small groups so that a separate bulletin board service may be provided for each class. .
  • the stored posts are collected in small groups and provided to the teacher terminal 20 or the student terminal 10 so that the bulletin board provider can provide the posts such as announcements related to the class.
  • the server 40 includes an information manager 41.
  • the information management unit 41 receives a request for creating a school account from the administrator terminals 20 and 25, that is, to join a service of a specific school, and generates school identification information, password, school-related information, and school account generation necessary for creating a school account. You can receive the information of the requested administrator.
  • a school account can be created using the input information.
  • authentication of an administrator individual for example, mobile phone authentication, may be performed by using information of an administrator individual who has requested a school account creation.
  • At least one administrator account corresponding to the school account may be created.
  • the school account and at least one administrator account may be managed by the same one account.
  • the information manager 41 may receive a plurality of manager information, for example, teacher personal information and other operator personal information, which are dependent on the generated school account, and store the corresponding school account.
  • the personal information of the teacher or the operator may include a mobile communication number (phone number) or an email address of each individual.
  • the identification information of the class in which the teacher is in charge may be stored in association with information such as 'third grade'.
  • the teacher's timetable information for example, the identification information of the class in which the teacher is in charge of the class and the corresponding class time, such as 1st class 2nd class on Monday 1st class and 3rd grade 8th class on 2nd Monday, etc.
  • the schedule may be stored together.
  • the information management unit 41 stores the personal information of each teacher, using the teacher's mobile number or email address of each teacher terminal 20 to install the administrator application invitation message or invitation message to the administrator web page Can be sent.
  • the invitation message may include link information accessible to the installation page of the administrator application or link information accessible to the administrator web page.
  • the teacher terminal 20 can access the server 40 through the administrator application or the administrator web page by selecting the link information.
  • the teacher terminal 20 may request creation of a teacher account in order to use a service provided by the server 40.
  • the information manager 41 receives a name and a mobile communication number (or email address) from the teacher terminal 20 requesting the creation of the teacher account.
  • a teacher account is generated through a personal authentication process such as mobile phone authentication, and the name and mobile communication number (or email address) received from the teacher terminal 20 are searched from the teacher personal information of the pre-registered school account for a specific school account.
  • the teacher account can be created as an account that is dependent on the school account only when it matches the teacher's personal information registered in.
  • the information management unit 41 may receive and store each student's personal information from the teacher terminal 20 or the operator terminal 25 to create a student account dependent on the school account. In addition to the student's name in the student information, you can receive a mobile communication number or email address. At this time, each student information may be grouped into small groups, for example, each class, according to the input of the teacher terminal 20 or the operator terminal 25.
  • the information management unit 41 uses the mobile communication number (or email address) of each student, etc. Restriction application installation invitation message via text message or email can be sent to each student terminal (10).
  • the invitation message may include link information for accessing the installation page of the restricted application.
  • the information management unit 41 of the server 40 accesses the student's name and mobile communication number from the student terminal 10 accessing the server 40 through the use limit application. Enter your email address.
  • the information management unit 41 performs a self-identification procedure for the student corresponding to the input information, and the student of the school account registered with the name and mobile communication number (or email address) received from the student terminal 10 in advance.
  • a student account may be created as an account dependent on the school account only when searching from personal information and matching the student personal information registered in a specific school account. At this time, if necessary, not only the student's personal verification procedure but also the signer's identity verification procedure may be performed.
  • the information management unit 41, the information associated with each of the operator, the teacher, and the student operating the terminal use restriction service provided by the server 40 in relation to the school, school account, the account and the relationship between the account Manage and store and update information.
  • the server 40 may include the lock setting unit 42.
  • the lock setting unit 42 receives locks for each class or the entire class subordinate to the school from the teacher terminal 20 or the operator terminal 25.
  • the lock setting may be performed by transmitting information about the lock target, the lock start time, and the lock release time to the server 40.
  • the lock target may be an individual, a class, or an entire school, and the lock start time and the unlock time may be set each time or a schedule (or timetable) including a plurality of times.
  • the timetable itself which the school observes, may be entered as information for locking.
  • the start and end of the class time may be set as the lock start time and the unlock time, respectively, and the lock target may be the student terminals 10 included in the class.
  • the lock release time may be set later, or the lock release time may be determined by a time range in which the lock is to be performed, such as 10 minutes after the lock start time. .
  • the server 40 may receive information necessary for performing the lock from the teacher terminal 20 or the operator terminal 25.
  • the lock command unit 43 provided in the server 40 generates a lock command based on the lock setting information set by the lock setting unit 42 from the teacher terminal 20 or the operator terminal 25. This may be delivered to the student terminal 10 to be locked.
  • the lock command unit 43 The student terminals 10 of the class may be instructed to lock the start time at 10 o'clock and 10:50 as the unlock time. That is, the lock setting information based on the timetable may be transmitted to each student terminal 10.
  • the lock command unit 43 may transmit a lock command including lock setting information related to the lock time to each student terminal 10, and the lock command 43 may be transmitted before the lock start time or with the arrival of the lock start time. Can be delivered.
  • the lock command unit 43 may transmit a push notification together with the lock command including the above lock setting information to the student terminal 10.
  • the lock command unit 43 generates a push notification at the same time as the arrival of the lock start time or before the predetermined time, so that the application for restriction is executed in the student terminal 10 according to the push notification, and accordingly the application for restriction.
  • the lock command generated for the student account of the corresponding student terminal 10 may be transmitted.
  • the lock command unit 43 is locked in real time
  • the command may be transmitted to the student terminal 10.
  • the student terminal 10 may perform a lock by inquiring a student whether the lock is accepted immediately after receiving the lock command.
  • the student terminal 10 may control the student terminal 10 so that the lock is performed at a predetermined time.
  • the lock command unit 43 transmits information on a randomly determined locking pattern for each student terminal 10 that is the target of sending the lock command, so that the lock performing unit 14 of the student terminal 10 is locked.
  • the lock pattern included in the command may be used to perform locking and unlocking.
  • the server 40 may include a lock checker 44.
  • the lock confirming unit 44 receives a notification confirming that the lock has been accepted within the predetermined time from the lock start time in the student terminal 10. If the student terminal 10 does not receive the lock acceptance notification within a certain time or the student terminal 10 does not accept the lock within a certain time and transmits a lock rejection notification, the corresponding student terminal 10 is in the unlocked state. When the lock acceptance notification is received, the corresponding student terminal 10 may be confirmed to be in the locked state.
  • the lock checker 44 may confirm that the student corresponding to the student terminal 10 is present or absent as the acceptance signal for the lock.
  • the server 40 may include a status guide 45.
  • the status guide unit 45 may provide status information on at least one of the locked state, whether attendance, and the installation state of the use limit application of the student terminal 10 corresponding to the teacher to the teacher terminal 20.
  • the subject receiving the status information for the students of a particular class, the teacher in charge of the current class time based on the teacher terminal 20 or the timetable of the class connected to the server 40 using the teacher account set as the homeroom teacher of the class. It may be at least one of the teacher terminal 20 to access the server 40 using the teacher account set to.
  • the lock of the student terminal 10 is set to be performed at the beginning of each class time, and during the class time, the current state information about the class students to the teacher in charge of each class Can be provided.
  • the lock of the student terminal (10) is set to be performed at the beginning of each school time, and the current state information for the class students on the day can be provided to the classroom teacher of the class. have.
  • the status information may include at least one of a locked state of the student terminal 10, whether or not the attendance is present, and an installed state of a restricted application.
  • the locked state may include a lock acceptance notification received by the lock checker 44. May be determined by one of whether or not a notification has been received, or which notification has been received among the lock acceptance notification and the lock rejection notification.
  • whether or not attendance is also determined according to whether or not the lock acceptance notification received by the lock confirming unit 44, or whether any of the lock acceptance notification and the lock rejection notification has been received, or the location information of each student terminal 10. It may be determined based on, or may be determined by combining the lock acceptance and location information.
  • the status guide unit 45 may obtain at least one of the location information of the student terminal 10 from the student terminal 10 or information on whether the student terminal 10 is located within a predetermined distance from the offline address location of the school. It can be received together to generate status information.
  • the status guide unit 45 may check whether the restriction application is installed in the student terminal 10, and the response is received from the erasure prevention unit 17 of the student terminal 10 or the lock acceptance unit 13 When the lock acceptance notification is received in the confirmation that the application is installed and the installation state is maintained, it can be guided to the teacher terminal (20).
  • the server 40 may include a pest management unit 46.
  • the pest management unit 46 stores the harmful policy data necessary to determine whether the information included in the search word or URI transmitted from the above-mentioned pest blocking unit 16 is a word or harmful information, and transmits it from the student terminal 10. The harmfulness of the information included in the search word or URI may be determined and notified to the student terminal 10 again.
  • FIG. 4 is a flowchart illustrating a method of restricting terminal usage according to an embodiment of the present invention
  • FIG. 5 is an example of a screen provided to a group manager terminal according to a terminal usage restriction method according to an embodiment of the present invention. It is an exemplary diagram showing the.
  • the method of limiting use of a terminal starts from a step S401 in which a lock command is transmitted from a server 40 to a specific student terminal 10.
  • the lock command may include information about a lock start time and a release time, may include information for locking immediately for a predetermined time, or may include information for locking for a predetermined time from the lock start time.
  • lock schedule information may be included to perform a plurality of locks.
  • the student terminal 10 immediately waits until the lock command is received or until the lock start time arrives (S101), and then waits (S102), a lock confirmation message asking whether to accept the lock to limit the use of the terminal. To output (S106).
  • the student terminal 10 may determine whether the student terminal 10 is to be absent before outputting the lock confirmation message. For example, by checking the current location (S103), if it is determined that the distance within the predetermined distance range from the offline address location of the school (S104) it may output a lock confirmation message (S106). In this case, if it is determined in step S104 that the position of the student terminal 10 is out of a predetermined distance from the school, the student terminal 10 may send the absence notification to the server 40 (S105).
  • the absence treatment may be a case where the student terminal 10 has requested the absence confirmation and received the absence confirmation from the teacher terminal 20 or the teacher terminal 20 has previously handled the corresponding student terminal 10.
  • the lock confirmation message may include a message indicating the arrival of the lock start time and a user interface inquiring whether to accept the lock.
  • the student terminal 10 if the student inputs the intention to accept the lock, the lock is performed (S109). However, if the intention to reject the lock is input or if the intention to accept is not input until a certain time elapses after the lock confirmation message is displayed, the student terminal 10 notifies the server 40 of the lock rejection notification (S108). ) Can be sent optionally. That is, the lock rejection notification may or may not be sent.
  • the locking step (S109) may be made by the student terminal 10 to switch the student terminal 10 to the locked state.
  • the switch to the locked state may be performed by using the lock pattern included in the lock command.
  • the student terminal 10 may send a lock acceptance notice to the server 40 when it is confirmed in step S107 that the intention to accept the lock is input (S110).
  • the student terminal 10 waits until the unlock time (S111) (S112), and then performs the unlock (S113).
  • the lock pattern received from the server 40 may be used in the lock command.
  • the server 40 collects whether each group receives the lock acceptance notification from the student terminal 10.
  • the status information on whether the student is present or locked the terminal can be updated (S402), and this can be delivered to the teacher in charge of the class or the homeroom teacher of the class (S403). That is, only the student corresponding to the student terminal 10 having received the lock acceptance notification may attend or process the terminal to confirm that the terminal is in a locked state and create status information. A student corresponding to the student terminal 10 in which the lock acceptance notification is not received or the lock rejection notification is received may confirm that the terminal is in a released state or process absences to create status information.
  • the absence notification that can be transmitted in step S105 may be collected together.
  • the student may confirm that the student attends and locks the terminal at the same time as the student accepts the lock and receives the lock acceptance notification to the server 40, or may separately determine the lock and the attendance of the terminal. .
  • the teacher terminal 20 or the operator terminal 25 is provided with a list of specific class students.
  • the installation of the restriction application for each student may be indicated as not installed / installed / deleted.
  • the uninstalled state may mean a state in which the personal information of the student is input through the administrator terminals 20 and 25 and stored in the server 40, but the student account corresponding to the student is not created.
  • the installation state is a state in which the personal information of the student is registered, a corresponding student account is created, and furthermore, the continuous response is validly received from the student terminal 10.
  • the deleted state may mean a state in which the student account of the corresponding student is validly generated but the valid application is not deleted for a predetermined time or more, and thus the application for which the restriction of use has been deleted is suspected.
  • whether or not each student is present in the teacher terminal 20 or the operator terminal 25 may be displayed together. Whether or not attendance may be selectively input by the teacher terminal 20, may be determined according to whether the student terminal 10 transmits the 'notice of absence' step S105 of FIG. 4, or the student terminal 10. It may be determined according to whether or not the lock acceptance notification of S110 of the four.
  • the lock column may display a locked or released state of the student terminal 10 of each student. This may be determined according to whether the lock acceptance notification of S110 of FIG. 4 is received from the student terminal 10 to the server 40.
  • the teacher terminal 20 may optionally check the information on the lock pattern given to each student.
  • a lock pattern may be provided to the teacher terminal 20 so as to check the student terminal 10 of the specific student in a released state.
  • the server 40 changes the lock pattern for the corresponding student terminal 10 to the teacher terminal 20 and the student terminal 10. Can be provided again and the locks performed again.
  • the terminal usage restriction method according to the embodiment shown in FIG. 4 includes steps that are processed in time series in the terminal usage restriction system shown in FIGS. 1 to 3. Therefore, even if omitted below, the above description of the terminal usage restriction system shown in FIGS. 1 to 3 may be applied to the terminal usage restriction method according to the embodiment shown in FIG. 4.
  • a further embodiment of the present invention is one of the method for restricting the use of a terminal, and may include a configuration for preventing access to harmful content of a student in advance.
  • the configuration for preventing access to harmful content is as shown in FIGS. 6 and 7.
  • the member terminal 10 may be a student terminal
  • the administrator terminals 20 and 25 may be parent terminals or teacher terminals.
  • the member terminal 10 further includes a harmful site blocking unit 18a, a harmful app blocking unit 18b, and a harmful video blocking unit 18c
  • the server 40 includes a harmful content determining unit ( 47) may be further included.
  • the harmful site blocking unit 18a, the harmful app blocking unit 18b, and the harmful video blocking unit 18c are implemented to be included in the server 40, or the harmful content determining unit 47 is connected to the member terminal 10. It may be implemented to be included.
  • the harmful site blocking unit 18a serves to block the member terminal 10 from accessing the harmful site. Specifically, when an event of accessing an arbitrary server from the member terminal 10 occurs, the harmful site blocking unit 18a extracts a URL address for accessing the server 40 to the member terminal 10. Subsequently, the harmful site blocking unit 18a queries the harmful content determination unit 47 whether the extracted URL address is a URL address of the harmful site. The harmful content determination unit 47 compares the harmful URL address stored in the harmful database (not shown; may be included in the server 40 or may be configured as a separate server) with the URL address that was queried. Determine if the address is harmful.
  • the harmful content determination unit 47 transmits a message that the harmful site to the harmful site blocking unit 18a
  • the harmful site blocking unit 18a is a site on the member terminal (10) You can provide a blocking window indicating that access is blocked.
  • the blocking window may be provided by receiving a separate blocking packet generated by the harmful content determining unit 47 or the harmful site blocking unit 18a.
  • the harmful site blocking unit 18a may provide pre-stored blocking window information to the display module of the member terminal 10.
  • the harmful app blocking unit 18b serves to block execution of harmful apps (ie, applications) installed on the member terminal 10. Specifically, the harmful app blocking unit 18b obtains a package name for the app on which the execution request is input on the member terminal 10. For example, when a touch input for an icon of a specific app occurs on the member terminal 10, the harmful app blocking unit 18b obtains a package name of the specific app. The harmful app blocking unit 18b may query the name or package name of the specific app identified through the package name to the harmful content determination unit 47 to query whether the harmful app is harmful. The harmful content determination unit 47 determines whether the package name or the name of the app indicates a harmful app by referring to the harmful database.
  • harmful apps ie, applications
  • the harmful content determination unit 47 may provide a message indicating that the app requested by the harmful app blocking unit 18b is a harmful app, and the harmful app blocking unit 18b may send the message.
  • the harmful app blocking unit 18b may provide the above-described blocking window on the member terminal 10.
  • the harmful video blocking unit 18c blocks the playback of the harmful video stored in the member terminal 10. Specifically, the harmful video blocking unit 18c acquires all video information downloaded to the member terminal 10 (eg, video name, video download address, video acquisition path, video thumbnail information, etc.). In the future, when a play request for one of the videos occurs, the video information generated by the play request is transmitted to the harmful content determination unit 47 to query whether the video is harmful.
  • the harmful content determination unit 47 may determine whether the received video is a harmful video by referring to the harmful database. For example, if the name of the video includes adult or gambling-related content, or if the video download address is classified as a harmful site, the video thumbnail information may be determined as a harmful video.
  • the harmful video blocking unit 18c receives the determination result message from the harmful content determination unit 47, and when the determination result message indicates that the harmful video is harmful video, blocks the execution of the video requested to be played. In addition, a blocking window may be provided separately after blocking.
  • the harmful site blocking unit 18a and the harmful app blocking unit 18b count the number of times of blocking each time the member terminal 10 is blocked from accessing the harmful site and the harmful application execution is blocked. And save. In addition, by providing the number of blocked blocks, the blocked URL address, and the blocked app name to the administrator terminals 20 and 25, the parent or teacher can grasp the blocking information of the harmful site / app.
  • the harmful content determination unit 47 determines whether or not harmful content is harmful by responding to a question regarding whether the harmful site, harmful app, or harmful video are harmful.
  • the harmful content determination unit 47 may include a harmful database or communicate with a harmful database implemented in a separate server to determine whether harmful content is present.
  • another embodiment of the present invention provides a configuration in which a parent or a teacher directly checks a video stored by a student in his terminal, and selects and deletes remotely a video that is estimated to be problematic.
  • the member terminal 10 may further include a video deleting unit 19, and the server 40 may further include a protected video managing unit 48, and the administrator terminal 20, 25 may further include a guardian video providing unit 21a and a guardian video deleting request unit 22a.
  • the video deleting unit 19 of the member terminal 10 transmits the information of the videos downloaded to the member terminal 10 to the server 40.
  • information of videos downloaded from time to time may be transmitted to the server 40.
  • the transmitted video information may be a video name, a video download address, a video acquisition path, video thumbnail information, a download date, and the like.
  • the guardian video manager 48 receives and stores video information of the member terminal 10. Subsequently, when a video information request of the member terminal 10 is generated from the manager terminals 20 and 25, the stored video information may be provided to the manager terminals 20 and 25.
  • the guardian video providing unit 21a of the manager terminal 20 or 25 requests the video information of the member terminal 10 to the server 40 according to an input of a parent or a teacher, and receives and receives the video information of the member terminal 10.
  • the list may include information about a name of the video, a download date, a download address, and the like.
  • the guardian video deletion request unit 22a of the manager terminal 20 or 25 generates the deletion request information for the video selected by the parent or the teacher from the provided list, and transmits the deletion request information to the server 40.
  • the deletion request information includes identification information about a name of a video requested to be deleted.
  • the protected video management unit 48 After receiving the deletion request information, the protected video management unit 48 includes the deletion request information in the deletion message and transmits the deletion request information to the member terminal 10.
  • the deletion message may be implemented in the form of a Google Cloud Messaging for Android (GCM) message.
  • GCM Google Cloud Messaging for Android
  • the GCM message is a message type that is transmitted from the terminal that receives the message so that the reception of the message is not push notification on the terminal.
  • the video deleting unit 19 receives the deletion message, identifies the video through the video name included in the deletion message, and deletes the identified video.
  • the server 40 collects the student's location information in real time through a location tracking module (eg, GPS) of the member terminal 10, and within the last few hours Time zone location information for the list of places the student has moved can be provided to the administrator terminal (20, 25) with real-time location information.
  • the administrator terminal 20, 25 can collect the real-time location information of the student, it is possible to use the location information collected in case of emergency or dangerous situation to the student.
  • the terminal usage restriction method according to the above embodiments may also be implemented in the form of a recording medium including instructions executable by a computer, such as a program module executed by a computer.
  • Computer readable media can be any available media that can be accessed by a computer and includes both volatile and nonvolatile media, removable and non-removable media.
  • Computer readable media may include both computer storage media and communication media.
  • Computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data.
  • Communication media typically includes computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave, or other transmission mechanism, and includes any information delivery media.
  • the terminal usage restriction method may be implemented as a computer program (or computer program product) including instructions executable by a computer.
  • the computer program includes programmable machine instructions processed by the processor and may be implemented in a high-level programming language, an object-oriented programming language, an assembly language, or a machine language.
  • the computer program may also be recorded on tangible computer readable media (eg, memory, hard disks, magnetic / optical media or solid-state drives, etc.).
  • the terminal usage restriction method can be implemented by executing the computer program as described above by the computing device.
  • the computing device may include at least a portion of a processor, a memory, a storage device, a high speed interface connected to the memory and a high speed expansion port, and a low speed interface connected to the low speed bus and the storage device.
  • a processor may include at least a portion of a processor, a memory, a storage device, a high speed interface connected to the memory and a high speed expansion port, and a low speed interface connected to the low speed bus and the storage device.
  • Each of these components are connected to each other using a variety of buses and may be mounted on a common motherboard or otherwise mounted in a suitable manner.
  • One embodiment of the present invention has industrial applicability in providing a method for limiting the use of a terminal and a system therefor that can effectively limit the use of information and communication terminals by members belonging to a specific group such as a school or a company for a predetermined time. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

La présente invention concerne un procédé et un système pour limiter l'utilisation d'un terminal. La présente invention peut comprendre les étapes qui sont exécutées par un terminal d'un membre appartenant à un groupe particulier et qui consistent : à recevoir une commande de verrouillage provenant d'un serveur ; à s'enquérir s'il faut accepter ou non une commutation dans un état de verrouillage, avant la commutation du terminal membre dans l'état de verrouillage, sur la base d'informations de configuration de verrouillage comprises dans la commande de verrouillage ; à commuter le terminal membre dans l'état de verrouillage si une indication d'acceptation, en réponse à la demande de renseignement, est saisie dans le terminal membre ; à libérer l'état de verrouillage du terminal membre sur la base des informations de configuration de verrouillage. Selon la présente invention, l'utilisation de terminaux de communication d'information de membres appartenant à un groupe particulier, tel qu'une école ou une entreprise, peut être limitée efficacement pendant une durée prédéterminée.
PCT/KR2014/006058 2014-01-03 2014-07-07 Procédé pour limiter l'utilisation d'un terminal et son système WO2015102186A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR10-2014-0000909 2014-01-03
KR1020140000909A KR101592385B1 (ko) 2014-01-03 2014-01-03 단말 사용 제한 방법 및 이를 위한 시스템

Publications (1)

Publication Number Publication Date
WO2015102186A1 true WO2015102186A1 (fr) 2015-07-09

Family

ID=53493513

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2014/006058 WO2015102186A1 (fr) 2014-01-03 2014-07-07 Procédé pour limiter l'utilisation d'un terminal et son système

Country Status (2)

Country Link
KR (1) KR101592385B1 (fr)
WO (1) WO2015102186A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3337149A1 (fr) * 2016-12-16 2018-06-20 BlackBerry Limited Restrictions de dispositif durant des événements
WO2017155342A3 (fr) * 2016-03-09 2018-08-02 (주)컴엑스아이 Appareil de verrouillage pour terminal portable et système de sécurité l'utilisant

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101599720B1 (ko) 2015-09-21 2016-03-04 국방과학연구소 가중치 기반 기능 제어를 수행하는 군용 이동 단말기 및 그 제어 방법
KR20180077713A (ko) * 2016-12-29 2018-07-09 김현우 모바일 장치의 자동 화면 잠금 및 해제 시스템
KR102540366B1 (ko) * 2023-03-23 2023-06-05 주식회사 디오랩스 자녀 스마트폰 관리 시스템

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050057884A (ko) * 2003-12-11 2005-06-16 주식회사 팬택앤큐리텔 이동 통신 단말기의 기능 사용 제한 방법
JP2009134442A (ja) * 2007-11-29 2009-06-18 Kyocera Corp サーバ、電子機器および許諾管理システム
KR20110129224A (ko) * 2010-05-25 2011-12-01 (주)뮤레카 유해물 차단을 위해 통합제어모듈을 가지는 컴퓨터 단말기 및 이를 이용한 유해물 차단시스템
KR20120100024A (ko) * 2011-03-02 2012-09-12 (주)위니웍스 휴대용 단말을 이용한 근태 확인 시스템 및 방법
KR20130026331A (ko) * 2011-09-05 2013-03-13 성신여자대학교 산학협력단 모바일 단말의 어플리케이션 잠금 장치 및 잠금 방법

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050057884A (ko) * 2003-12-11 2005-06-16 주식회사 팬택앤큐리텔 이동 통신 단말기의 기능 사용 제한 방법
JP2009134442A (ja) * 2007-11-29 2009-06-18 Kyocera Corp サーバ、電子機器および許諾管理システム
KR20110129224A (ko) * 2010-05-25 2011-12-01 (주)뮤레카 유해물 차단을 위해 통합제어모듈을 가지는 컴퓨터 단말기 및 이를 이용한 유해물 차단시스템
KR20120100024A (ko) * 2011-03-02 2012-09-12 (주)위니웍스 휴대용 단말을 이용한 근태 확인 시스템 및 방법
KR20130026331A (ko) * 2011-09-05 2013-03-13 성신여자대학교 산학협력단 모바일 단말의 어플리케이션 잠금 장치 및 잠금 방법

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017155342A3 (fr) * 2016-03-09 2018-08-02 (주)컴엑스아이 Appareil de verrouillage pour terminal portable et système de sécurité l'utilisant
EP3337149A1 (fr) * 2016-12-16 2018-06-20 BlackBerry Limited Restrictions de dispositif durant des événements
US10402558B2 (en) 2016-12-16 2019-09-03 Blackberry Limited Device restrictions during events

Also Published As

Publication number Publication date
KR20150081187A (ko) 2015-07-13
KR101592385B1 (ko) 2016-02-05

Similar Documents

Publication Publication Date Title
US20200304999A1 (en) Integrated physical and logical security management via a portable device
US11387978B2 (en) Systems and methods for securing access rights to resources using cryptography and the blockchain
US11176766B2 (en) Consensus based authentication and authorization process
US11522865B2 (en) Automated IoT device configuration using user profile
US8789156B2 (en) Data management with a networked mobile device
US9305160B2 (en) Method and system for automatic updating of randomly generated user passwords
US8799365B2 (en) Broker-based management of mobile devices
WO2015102186A1 (fr) Procédé pour limiter l'utilisation d'un terminal et son système
KR102287949B1 (ko) 디바이스를 관리하는 방법 및 장치
US20190147674A1 (en) Digital door lock system and control method thereof
US20160260314A1 (en) Security system access detection
CN104954383A (zh) 一种应用程序登录方法及系统
US11336599B2 (en) Architecture for performing action in a third-party service by an email client
CN103988169A (zh) 基于策略符合性的安全数据访问
US20170118647A1 (en) Transmitting Management Commands to a Client Device
CN103797760A (zh) 控制移动装置上的文本消息
CN105357027A (zh) 基于大数据的轻量级数据服务总线系统
EP2672689B1 (fr) Système de télécommande, dispositif de relais, dispositif de communication mobile, procédé de commande de serveur in-terminal et procédé de traitement de relais
CN110930561A (zh) 智能锁的控制方法及装置
KR101087698B1 (ko) 스마트폰의 보안 인증 방법
US20180115896A1 (en) Seamless unique user identification and management
US20200028960A1 (en) Providing on-demand access to a restricted resource of a user device
US10530771B2 (en) System and method of inter-account resource access management
KR101909177B1 (ko) 마스터 웹 사이트에서 패스워드를 노출시키지 않고 웹 서버에 로그인 하는 방법 및 이를 위한 컴퓨터로 읽을 수 있는 기록 매체
KR101408276B1 (ko) 관리 정책 기반의 단말제어 보안 시스템 및 그 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14876173

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14876173

Country of ref document: EP

Kind code of ref document: A1