WO2016023269A1 - Terminal application locking method, system, terminal and computer storage medium - Google Patents

Terminal application locking method, system, terminal and computer storage medium Download PDF

Info

Publication number
WO2016023269A1
WO2016023269A1 PCT/CN2014/089078 CN2014089078W WO2016023269A1 WO 2016023269 A1 WO2016023269 A1 WO 2016023269A1 CN 2014089078 W CN2014089078 W CN 2014089078W WO 2016023269 A1 WO2016023269 A1 WO 2016023269A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
instruction
application
matching
corresponding application
Prior art date
Application number
PCT/CN2014/089078
Other languages
French (fr)
Chinese (zh)
Inventor
党松
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016023269A1 publication Critical patent/WO2016023269A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications

Definitions

  • the present invention relates to terminal technologies, and in particular, to a method, system, terminal, and computer storage medium for locking a terminal application.
  • embodiments of the present invention provide a method, system, terminal, and computer storage medium for locking a terminal application.
  • the embodiment of the invention provides a method for locking a terminal application, including:
  • the first terminal acquires related information of the application on the second terminal
  • the first terminal determines that the corresponding application currently running on the second terminal needs to be locked according to the obtained related information, the first terminal sends an instruction for locking the corresponding application to the second terminal; The instructions of the corresponding application are used by the second terminal to lock the corresponding application.
  • the first terminal acquires related information of the application on the second terminal, including:
  • the first terminal sends a monitoring instruction to the second terminal
  • the first terminal receives related information of an application on the second terminal that is fed back by the second terminal.
  • the method before the first terminal acquires related information of the application on the second terminal, the method further includes:
  • the first terminal sets monitoring of the second terminal.
  • the first terminal sets monitoring of the second terminal, including:
  • the first terminal determines that the received matching instruction is legal according to the second terminal identification information and the instruction matching password saved by the first terminal, and sets a monitoring binding identifier.
  • the method further includes:
  • the first terminal sends an unlocking instruction to the second terminal; and the unlocking instruction is used by the second terminal to unlock the corresponding application.
  • the method further includes:
  • the first terminal When it is determined that the corresponding application currently running on the second terminal needs to be alerted, the first terminal sends an alarm instruction to the second terminal; the alarm instruction is used by the second terminal to the corresponding application. Alert.
  • the embodiment of the invention further provides a method for locking a terminal application, comprising:
  • the first terminal acquires related information of the application on the second terminal
  • the first terminal determines that the corresponding application currently running on the second terminal needs to be locked, and sends an instruction to lock the corresponding application to the second terminal;
  • the second terminal locks the corresponding application according to the received instruction to lock the corresponding application.
  • the first terminal acquires related information of the application on the second terminal, including:
  • the first terminal sends a monitoring instruction to the second terminal
  • the second terminal determines that the received monitoring instruction is legal, the second terminal feeds back information about the application of the application to the first terminal.
  • the method before the first terminal acquires related information of the application on the second terminal, the method further includes:
  • the first terminal sets monitoring of the second terminal.
  • the first terminal sets monitoring of the second terminal, including:
  • the second terminal determines that the received matching instruction is legal according to the first terminal identification information and the instruction matching password saved by itself, the second terminal feeds back a matching instruction including the own identification information and the matching instruction password to the first terminal, and sets the monitoring Binding identifier
  • the first terminal determines that the received matching instruction is legal according to the second terminal identification information and the instruction matching password saved by the first terminal, and sets a monitoring binding identifier.
  • the method further includes:
  • the first terminal sends an unlocking instruction to the second terminal;
  • the second terminal unlocks the corresponding application according to the received unlocking instruction.
  • the method further includes:
  • the first terminal sends an alarm instruction to the second terminal;
  • the second terminal alerts the corresponding application according to the received alarm instruction.
  • the embodiment of the present invention further provides a terminal, including: an acquiring unit and a sending unit;
  • the obtaining unit is configured to acquire related information of an application on the monitored terminal;
  • the sending unit is configured to, according to the obtained related information, determine, when the corresponding application currently running on the monitored terminal needs to be locked, send an instruction to lock the corresponding application to the monitored terminal; An instruction to lock the corresponding application is used by the monitored terminal to lock the corresponding application.
  • the acquiring unit includes: a first sending module and a first receiving module; wherein
  • the first sending module is configured to send a monitoring instruction to the monitored terminal
  • the first receiving module is configured to receive related information of an application on the monitored terminal fed back by the monitored terminal.
  • the terminal further includes a setting unit configured to set monitoring of the monitored terminal.
  • the setting unit includes: a second sending module, a second receiving module, and a determining module;
  • the second sending module is configured to send, to the monitored terminal, a matching command including the terminal identification information of the terminal and the matching instruction password;
  • the second receiving module is configured to receive, after the monitored terminal determines that the received matching command is legal, the matching instruction that includes the monitored terminal identification information and the command matching password;
  • the determining module is configured to determine, according to the monitored terminal identification information and the instruction matching password saved by itself, that the received matching instruction is legal, and set the monitoring binding identifier.
  • the sending unit is further configured to: when it is determined that the application locked on the monitored terminal needs to be unlocked, send an unlocking instruction to the monitored terminal; and the unlocking instruction is used by the monitored terminal. Unlock the corresponding app.
  • the sending unit is further configured to: when it is determined that an alarm is required to be performed on a corresponding application currently running on the monitored terminal, send an alarm instruction to the monitored terminal; The monitoring terminal alerts the corresponding application.
  • the embodiment of the invention further provides a system for locking a terminal application, comprising: a first terminal and a second terminal; wherein
  • the first terminal is configured to acquire related information of the application on the second terminal, and determine, according to the obtained related information, that the corresponding application currently running on the second terminal needs to be locked, to the The second terminal sends an instruction to lock the corresponding application;
  • the second terminal is configured to lock the corresponding application according to the received instruction to lock the corresponding application.
  • the first terminal is configured to send a monitoring instruction to the second terminal, and receive the related information that is fed back by the second terminal;
  • the second terminal is configured to: when it is determined that the received monitoring instruction is legal, feed back the related information of the application to the first terminal.
  • the first terminal is further configured to set monitoring of the second terminal.
  • the first terminal is configured to: send a matching instruction including the self identification information and the matching instruction password to the second terminal; and determine, according to the second terminal identification information and the instruction matching password saved by the second terminal, the received terminal The matching instruction is legal, and the monitoring binding identifier is set;
  • the second terminal is configured to: when the first terminal identifier information and the command matching password saved by the first terminal are configured to determine that the received matching command is legal, feed the matching command including the self identification information and the matching instruction password to the first terminal, And set the monitoring binding ID.
  • the first terminal is further configured to determine that the second terminal needs to be locked When the predetermined application is unlocked, sending an unlocking instruction to the second terminal;
  • the second terminal is further configured to unlock the corresponding application according to the received unlocking instruction.
  • the first terminal is further configured to: when it is determined that an alarm is required to be performed on a corresponding application currently running on the second terminal, send an alarm instruction to the second terminal;
  • the second terminal is further configured to perform an alarm on the corresponding application according to the received alarm instruction.
  • the number of the second terminals is one or more.
  • the embodiment of the present invention further provides a computer storage medium, the computer storage medium comprising a set of instructions, when executed, causing at least one processor to execute the method of locking the terminal application described above.
  • the first terminal acquires related information of the application on the second terminal, and the first terminal determines that the information needs to be locked according to the obtained related information. And when the corresponding application currently running on the second terminal sends an instruction to lock the corresponding application to the second terminal; the second terminal locks the instruction according to the received instruction to lock the corresponding application.
  • the corresponding application in this way, can monitor the application running on the second terminal in real time, and can control the application being used at any time.
  • FIG. 1 is a schematic flowchart of a method for locking a terminal application according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of a method for locking a terminal application according to Embodiment 2 of the present invention
  • FIG. 3 is a schematic flowchart of a method for setting monitoring according to Embodiment 3 of the present invention.
  • FIG. 4 is a schematic flowchart of a method for monitoring, locking, and unlocking a terminal application according to Embodiment 4 of the present invention
  • FIG. 5 is a schematic structural diagram of a terminal according to Embodiment 4 of the present invention.
  • FIG. 6 is a schematic structural diagram of a terminal according to Embodiment 5 of the present invention.
  • FIG. 7 is a schematic structural diagram of a system for locking a terminal application according to Embodiment 6 of the present invention.
  • the first terminal acquires related information of the application on the second terminal, and the first terminal determines, according to the obtained related information, that the corresponding operation on the second terminal needs to be locked. And an instruction to lock the corresponding application to the second terminal; the second terminal locks the corresponding application according to the received instruction to lock the corresponding application.
  • the method for locking a terminal application in this embodiment includes the following steps:
  • Step 101 The first terminal acquires related information of the application on the second terminal.
  • this step may include:
  • the first terminal sends a monitoring instruction to the second terminal
  • the first terminal receives related information of an application on the second terminal that is fed back by the second terminal.
  • the related information may include: an application list installed by the second terminal, an application state, an application currently running, and running time information of the running application, and the like.
  • the related information may be related information of all currently used applications on the second terminal, or related information of the current part of the application on the second terminal; in actual application, it may be determined according to needs. Application or related application interest.
  • the method may further include:
  • the first terminal sets monitoring of the second terminal
  • the first terminal sends a matching instruction including the self identification information and the matching instruction password to the second terminal;
  • the first terminal determines that the received matching instruction is legal according to the second terminal identification information and the instruction matching password saved by the first terminal, and sets a monitoring binding identifier.
  • the identification information may be a mobile subscriber ISDN/PSTN code (MSISDN, Mobile Subscriber International ISDN/PSTN Number); the setting monitoring binding identifier indicates that the first terminal monitors the second terminal, actually When applying, you can set the monitoring binding ID to True.
  • MSISDN Mobile Subscriber International ISDN/PSTN Number
  • Step 102 The first terminal, according to the obtained related information, determines that the corresponding application currently running on the second terminal needs to be locked, and sends an instruction to lock the corresponding application to the second terminal. An instruction to lock the corresponding application is used by the second terminal to lock the corresponding application.
  • the determining that the corresponding application currently running on the second terminal needs to be locked refers to: receiving an instruction that the user of the first terminal locks the corresponding application.
  • the method can also include:
  • the first terminal sends an unlocking instruction to the second terminal; and the unlocking instruction is used by the second terminal to unlock the corresponding application.
  • the determining that the application locked on the second terminal needs to be unlocked means: receiving an unlocking instruction of the user of the first terminal.
  • the method can also include:
  • the first terminal When it is determined that the corresponding application currently running on the second terminal needs to be alerted, the first terminal sends an alarm instruction to the second terminal; the alarm instruction is used by the second terminal to the corresponding application. Alert.
  • the determining that the alarm needs to be performed on the corresponding application currently running on the second terminal refers to: receiving an alarm instruction of the user of the first terminal.
  • the number of the second terminals may be one or more.
  • the first terminal may control multiple second terminals; when the number of the second terminals is two More than one time, the first terminal performs the above operations on each of the second terminals.
  • the first terminal acquires related information of the application program on the second terminal, and the first terminal determines, according to the obtained related information, that the current operation on the second terminal needs to be locked. Transmitting, to the second terminal, an instruction to lock the corresponding application, so that the second terminal locks the corresponding application according to the received instruction to lock the corresponding application, such that The application running on the second terminal can be monitored in real time, and the application being used can be controlled at any time.
  • the first terminal When it is determined that the application locked on the second terminal needs to be unlocked, the first terminal sends an unlocking instruction to the second terminal, so that the second terminal unlocks the corresponding application according to the received unlocking instruction.
  • the first terminal sends an alarm instruction to the second terminal, so that the second terminal is configured according to the received alarm instruction. The corresponding application is alerted, and thus, the application on the second terminal can be further effectively controlled.
  • the method for locking a terminal application in this embodiment includes the following steps:
  • Step 201 The first terminal acquires related information of the application on the second terminal.
  • this step may include:
  • the first terminal sends a monitoring instruction to the second terminal
  • the second terminal determines that the received monitoring instruction is legal, the second terminal feeds back information about the application of the application to the first terminal.
  • the related information may include: an application list installed by the second terminal, an application state, an application currently running, and running time information of the running application, and the like.
  • the related information may be related information of all currently used applications on the second terminal, or related information of the current part of the application on the second terminal; in actual application, it may be determined according to needs.
  • the application is also information about some applications.
  • the method may further include:
  • the first terminal sets monitoring of the second terminal
  • the first terminal sends a matching instruction including the self identification information and the matching instruction password to the second terminal;
  • the second terminal determines that the received matching instruction is legal according to the first terminal identification information and the instruction matching password saved by itself, the second terminal feeds back a matching instruction including the own identification information and the matching instruction password to the first terminal, and sets the monitoring Binding identifier
  • the first terminal determines that the received matching instruction is legal according to the second terminal identification information and the instruction matching password saved by the first terminal, and sets a monitoring binding identifier.
  • the identification information may be an MSISDN;
  • the setting monitoring binding identifier indicates that the first terminal monitors the second terminal, and when the actual application is used, the monitoring binding identifier may be set to True.
  • Step 202 The first terminal, according to the obtained related information, determines that the corresponding application currently running on the second terminal needs to be locked, and sends an instruction to lock the corresponding application to the second terminal.
  • the determining that the corresponding application currently running on the second terminal needs to be locked refers to: receiving an instruction that the user of the first terminal locks the corresponding application.
  • Step 203 The second terminal locks the corresponding application according to the received instruction of locking the corresponding application.
  • the method may further include: when the second terminal determines that the received instruction to lock the corresponding application is legal, and locks the corresponding according to the received instruction of locking the corresponding application application.
  • the specific implementation of the second terminal determining that the received instruction to lock the corresponding application is legal is the same as the specific implementation of determining the legality of the matching instruction, and details are not described herein.
  • the method can also include:
  • the first terminal sends an unlocking instruction to the second terminal;
  • the second terminal unlocks the corresponding application according to the received unlocking instruction.
  • the determining that the application locked on the second terminal needs to be unlocked refers to: receiving an unlocking instruction of the user of the first terminal.
  • the method may further include: when the second terminal determines that the received unlocking instruction is legal, the corresponding information is unlocked according to the received unlocking instruction. application.
  • the specific implementation of the second terminal determining that the received unlocking instruction is legal is exactly the same as the specific implementation of determining the legality of the matching instruction, and details are not described herein.
  • the method can also include:
  • the first terminal sends an alarm instruction to the second terminal;
  • the second terminal alerts the corresponding application according to the received alarm instruction.
  • the second terminal performs an alarm on the corresponding application according to the received alarm instruction.
  • the method could also include:
  • the second terminal determines that the received alarm instruction is legal, the second terminal performs an alarm according to the received alarm instruction to the corresponding application program;
  • the number of the second terminals may be one or more.
  • the first terminal may control multiple second terminals; when the number of the second terminals is two More than one time, the first terminal performs the above operations on each of the second terminals.
  • the method for locking the terminal application provided by the embodiment of the present invention, the first terminal acquires related information of the application program on the second terminal, and the first terminal determines, according to the obtained related information, that the current operation on the second terminal needs to be locked.
  • the corresponding application sends an instruction to lock the corresponding application to the second terminal; the second terminal locks the corresponding application according to the received instruction to lock the corresponding application, so that it can be real-time
  • the application running on the second terminal is monitored, and the application being used can be controlled at any time.
  • the first terminal When it is determined that the application locked on the second terminal needs to be unlocked, the first terminal sends an unlocking instruction to the second terminal; the second terminal unlocks the corresponding application according to the received unlocking instruction; When it is determined that the corresponding application currently running on the second terminal needs to be alerted, the first terminal sends an alarm instruction to the second terminal; and the second terminal applies the corresponding application according to the received alarm instruction.
  • the program performs an alarm, and thus, the application on the second terminal can be further effectively controlled.
  • the second terminal judges the legitimacy of the advanced instructions received, so that the received command can be guaranteed to be an effective command to avoid errors.
  • terminal A monitors terminal B. Before monitoring, terminal A needs to be set to monitor terminal B. In this implementation, terminal A is configured to monitor terminal B.
  • the method as shown in Figure 3, includes the following steps:
  • Step 301 The monitoring program on the terminal A receives the user name and password input by the user;
  • the user name and password are input.
  • Step 302 The monitoring program performs user name and password verification, after the verification is successful, the program main interface is displayed to the user, and then step 303 is performed;
  • step 301 the user is prompted to re-enter the username and password.
  • Step 303 The locking program on the terminal B receives the username and password input by the user.
  • the user name and password are input to log in.
  • the user name and password entered by the user on the terminal B may be the same as or different from the user name and password entered by the user on the terminal A. Both are set and maintained by the user.
  • Step 304 The lock program performs user name and password verification. After successful, the program main interface is displayed to the user, and then step 305 is performed;
  • step 303 if the username and password verification fails, return to step 303 to prompt the user to re-enter the username and password.
  • steps 301-302 and steps 303-304 has no sequence.
  • Step 305 setting the identification information of the terminal A in the lock program, and setting the command matching password from the terminal A, and then performing step 306;
  • the identification information of the terminal A may be: MSISDN information, etc.;
  • Step 306 Set the identification information of the terminal B in the monitoring program, and set an instruction matching password that matches the instruction matching password in step 305;
  • the identification information of the terminal B may be: MSISDN information or the like.
  • steps 305, 306 has no order.
  • Step 307 The terminal A sends a matching command to the terminal B through the monitoring program
  • the matching instruction carries the identification information of the terminal A and the instruction matching password.
  • Step 308 After receiving the matching command of the terminal A, the locking program of the terminal B parses the matching command and determines the legality. If it is legal, the monitoring binding identifier is set to True, and a success message is sent to the terminal A;
  • the matching instruction legally indicates that the monitoring setting has been successful; if it is illegal, it is directly discarded.
  • Step 309 After receiving the success message of the terminal B, the monitoring program of the terminal A parses the success message and performs legality judgment. If the message is legal, the successful binding result is displayed to the user, and the monitoring of the terminal B is bound. The flag is set to True;
  • This embodiment describes how the terminal A monitors, locks, and unlocks the application of the terminal B based on the monitoring settings of the terminal B of the third embodiment.
  • the method for monitoring, locking, and unlocking the terminal application in this embodiment, as shown in FIG. 4, includes the following steps:
  • Step 401 The user logs in the monitoring program installed in the terminal A through the terminal A, selects the monitoring terminal B that has been set, and sends a monitoring instruction to the terminal B through the monitoring program;
  • Step 402 After receiving the monitoring instruction of the terminal A, the locking program of the terminal B controls the monitoring instruction. Parsing and legitimacy judgment, if the instruction is legal, send a message containing the list of applications installed by the machine, the application state, the currently running application, and the running time information of the running application to the terminal A;
  • Step 403 After receiving the feedback of the terminal B, the monitoring program of the terminal A parses the received message and performs legality judgment. If it is legal, the result is displayed to the user; when the user determines that the terminal B is currently executing. When the application does not meet the requirements, the terminal A's monitoring program sends an alarm message to the terminal B or forcibly ends and locks the current application's instruction;
  • the user can know the running status of the application on the terminal B by checking the feedback result of the terminal B; when the application currently executed by the terminal B is found to be out of compliance, for example, an application currently running a game, and running For more than one hour, the user can send an alert message to terminal B or directly send an instruction to force the end and lock the current application.
  • Step 404 After receiving the instruction of the terminal A, the terminal B parses the received command and performs legality verification. If it is legal, it executes according to the instruction information, and then step 405 is performed;
  • the pop-up message is forcibly displayed to the user of the terminal B. If the command of forced termination and locking of terminal A is received, the currently running application is forcibly terminated and locked; after the currently running application is locked, it cannot be run until it is unlocked.
  • Step 405 The monitoring program of the terminal A sends an instruction to release the lock to the terminal B.
  • the user of the terminal A can log in to the monitoring program of the terminal A.
  • the instruction to unlock is transmitted to the terminal B through the monitoring program of the terminal A.
  • Step 406 After receiving the unlocking instruction of the terminal A, the locking program of the terminal B parses the received command and determines the legality. If it is legal, the program will request the solution. The locked application is unlocked and the current processing flow ends.
  • the terminal A includes a monitoring program unit, and the monitoring program unit includes:
  • Authentication module configured as the identity verification of the terminal A user
  • Communication module configured to communicate with terminal B;
  • Information processing module configured to control generation and encapsulation of instructions, generation and encapsulation of warning messages, analysis of feedback information of terminal B, etc.;
  • Judging module configured to judge the legality of the feedback information from the terminal B;
  • Display module a human-computer interaction display configured as a monitor program
  • Setting module configured as the setting of user information, setting of the monitored terminal, etc.
  • Storage module configured to store user-set information, store query results, save various states and data during program operation, and so on.
  • Terminal B includes a lock program unit, and the lock program unit includes:
  • Authentication module configured as the identity verification of the terminal A user
  • Communication module configured to communicate with terminal A
  • the information processing module is configured to parse the received control command of the terminal A, parse the warning message, generate and encapsulate the feedback information of the terminal B, and the like;
  • Judging module configured to judge the legality of the control command from the terminal A;
  • Display module a human-computer interaction display configured to lock the program
  • Setting module configured as user information setting, monitoring terminal information setting, command matching password setting, etc.
  • Storage module configured to store user-set information, monitor binding state storage, save various states and data during program operation, and so on.
  • the solution provided in this embodiment enables the terminal A to know the application on the terminal B at any time.
  • terminal A can warn and terminate the application being executed by terminal B at any time, so that the monitoring of the child is guaranteed to reduce the parent's use for the child.
  • the present embodiment provides a terminal, as shown in FIG. 6, the terminal includes: an obtaining unit 61 and a sending unit 62;
  • the obtaining unit 61 is configured to acquire related information of an application on the monitored terminal;
  • the sending unit 62 is configured to, according to the obtained related information, determine, when the corresponding application currently running on the monitored terminal needs to be locked, send an instruction to lock the corresponding application to the monitored terminal;
  • the instruction to lock the corresponding application is used by the monitored terminal to lock the corresponding application.
  • the obtaining unit 61 may further include: a first sending module and a first receiving module; wherein
  • the first sending module is configured to send a monitoring instruction to the monitored terminal
  • the first receiving module is configured to receive related information of an application on the monitored terminal fed back by the monitored terminal.
  • the related information may include: an application list installed by the monitored terminal, an application state, an application currently running, and running time information of the running application, and the like.
  • the related information may be related information of all currently used applications on the monitored terminal, or may be related information of a current part of the application on the monitored terminal; in actual application, it may be determined according to needs.
  • the application is also information about some applications.
  • the terminal may further include: a setting unit configured to set monitoring of the monitored terminal;
  • the setting unit may further include: a second sending module, a second receiving module, and Fixed module; among them,
  • the second sending module is configured to send, to the monitored terminal, a matching command including the terminal identification information of the terminal and the matching instruction password;
  • the second receiving module is configured to receive, after the monitored terminal determines that the received matching command is legal, the matching instruction that includes the monitored terminal identification information and the command matching password;
  • the determining module is configured to determine, according to the monitored terminal identification information and the instruction matching password saved by itself, that the received matching instruction is legal, and set the monitoring binding identifier.
  • the identification information may be an MSISDN; the setting monitoring binding identifier indicates that the monitored terminal is monitored, and in actual application, the monitoring binding identifier may be set to True.
  • the determining that the corresponding application currently running on the monitored terminal needs to be locked refers to: the sending unit 62 receives an instruction that the user locks the corresponding application.
  • the sending unit 62 is further configured to: when it is determined that the application locked on the monitored terminal needs to be unlocked, send an unlocking instruction to the monitored terminal; and the unlocking instruction is used to unlock the corresponding monitored terminal. application.
  • the determining that the application locked on the monitored terminal needs to be unlocked means that the sending unit 62 receives the unlocking instruction of the user.
  • the sending unit 62 is further configured to: when it is determined that the corresponding application currently running on the monitored terminal needs to be alerted, send an alarm instruction to the monitored terminal; the alarm instruction is used by the monitored terminal.
  • the corresponding application performs an alarm.
  • the determining that the alarm needs to be performed on the corresponding application currently running on the monitored terminal means that the sending unit 62 receives the alarm instruction of the user.
  • the number of the monitored terminals may be one or more.
  • the plurality of the monitored terminals may be controlled; when the number of the monitored terminals is two or more, respectively The above operations are performed for each of the monitored terminals.
  • the obtaining unit 61 and the setting unit may be processed by a central unit in the terminal.
  • CPU Central Processing Unit
  • DSP Digital Signal Processor
  • FPGA Field-Programmable Gate Array
  • the transmitting unit 62 can be implemented by a CPU in the terminal
  • the DSP or the FPGA is implemented in combination with the receiver
  • the first sending module and the second sending module may be implemented by a transmitter in the terminal
  • the first receiving module and the second receiving module may be implemented by a receiver in the terminal
  • the determining module can be implemented by a CPU, a DSP or an FPGA in the terminal.
  • the acquiring unit 61 acquires related information of the application program on the monitored terminal, and the sending unit 62 determines, according to the obtained related information, that the corresponding operation on the monitored terminal needs to be locked. And an instruction to lock the corresponding application to the monitored terminal, so that the monitored terminal locks the corresponding application according to the received instruction for locking the corresponding application, so that the real-time application can be
  • the application running on the monitored terminal is monitored, and the application being used can be controlled at any time.
  • the sending unit 62 sends an unlocking instruction to the monitored terminal, so that the monitored terminal unlocks the corresponding application according to the received unlocking instruction.
  • the sending unit 62 sends an alarm instruction to the monitored terminal, so that the monitored terminal according to the received alarm instruction The corresponding application is alerted, and thus, the application on the monitored terminal can be further effectively controlled.
  • the embodiment provides a system for locking a terminal application.
  • the system includes: a first terminal 71 and a second terminal 72;
  • the first terminal 71 is configured to acquire related information of the application on the second terminal 72, and determine, according to the obtained related information, that the corresponding application currently running on the second terminal 72 needs to be locked, Sending an instruction to the second terminal 72 to lock the corresponding application;
  • the second terminal 72 is configured to lock according to the received instruction lock for the corresponding application The corresponding application is determined.
  • the acquiring unit of the first terminal 71 obtains related information of the application on the second terminal 72; and the sending unit of the first terminal 71 further obtains the related information according to the acquired information.
  • an instruction to lock the corresponding application is sent to the second terminal 72.
  • the first terminal 71 is specifically configured to send a monitoring instruction to the second terminal 72, and receive the related information that is fed back by the second terminal 72.
  • the second terminal 72 is configured to: when it is determined that the received monitoring instruction is legal, feed back information about the application of the application to the first terminal 71.
  • the related information may include: an application list installed by the second terminal 72, an application state, an application currently running, and running time information of the running application, and the like.
  • the related information may be related information of all currently used applications on the second terminal 72, or may be related information of the current part of the application on the second terminal 72. In actual application, it may be determined according to needs. All current applications are also information about some applications.
  • the first transmitting module of the acquiring unit may send a monitoring instruction to the second terminal 72; and the first receiving module of the acquiring unit may receive the related information fed back by the second terminal 72.
  • the first terminal 71 is further configured to set monitoring of the second terminal 72;
  • the first terminal 71 is specifically configured to: send a matching command including the self identification information and the matching instruction password to the second terminal 72; and determine, according to the second terminal 72 identification information and the instruction matching password saved by the second terminal 72.
  • the received matching instruction is legal, and the monitoring binding identifier is set;
  • the second terminal 72 is configured to determine, according to the first terminal identifier information and the command matching password saved by itself, that the received matching command is legal, and feed back to the first terminal 71
  • the identification information and the matching instruction matching the instruction password are set, and the monitoring binding identifier is set.
  • the identification information may be an MSISDN;
  • the setting monitoring binding identifier indicates that the first terminal monitors the second terminal, and when the actual application is used, the monitoring binding identifier may be set to True.
  • the monitoring of the second terminal 72 may be set by the setting unit of the first terminal 71; specifically, the second sending module of the setting unit first sends the second terminal 72 to the second terminal 72. a matching instruction including the self-identification information and the matching instruction password; and then receiving, by the second receiving module of the setting unit, the second terminal 72 determines that the received matching instruction is legal and the feedback includes the identifier information of the second terminal 72 and The instruction matches the matching instruction of the password; and the determining module of the setting unit determines that the received matching instruction is legal according to the second terminal 72 identification information and the instruction matching password saved by the setting unit, and sets the monitoring binding identifier.
  • the determining that the corresponding application currently running on the second terminal needs to be locked refers to: receiving an instruction that the user of the first terminal 71 locks the corresponding application.
  • the second terminal 72 is further configured to: before determining that the received instruction to lock the corresponding application is legal, before receiving the corresponding application according to the received instruction to lock the corresponding application, according to the received An instruction to lock the respective application locks the corresponding application.
  • the specific implementation of the second terminal 72 determining that the received instruction to lock the corresponding application is legal is the same as the specific implementation of determining the legality of the matching instruction, and details are not described herein.
  • the first terminal 71 is further configured to: when it is determined that the application locked on the second terminal 72 needs to be unlocked, send an unlocking instruction to the second terminal 72;
  • the second terminal 72 is further configured to unlock the corresponding application according to the received unlocking instruction.
  • the determining that the application locked on the second terminal needs to be unlocked refers to: receiving an unlocking instruction of the user of the first terminal 71.
  • the sending unit determines that the application locked on the second terminal 72 needs to be unlocked, the unlocking instruction is sent to the second terminal 72.
  • the second terminal 72 is further configured to: before unlocking the corresponding application according to the received unlocking instruction, determine that the received unlocking instruction is legal, and unlock the corresponding application according to the received unlocking instruction.
  • the specific implementation of the second terminal determining that the received unlocking instruction is legal is exactly the same as the specific implementation of determining the legality of the matching instruction, and details are not described herein.
  • the first terminal 71 is further configured to: when it is determined that an alarm is required to be sent to the corresponding application currently running on the second terminal 72, send an alarm instruction to the second terminal 72;
  • the second terminal 72 is further configured to perform an alarm on the corresponding application according to the received alarm instruction.
  • the second terminal 72 is further configured to: before the alarm is sent to the corresponding application according to the received alarm instruction, determine that the received alarm instruction is legal, and then alarm the corresponding application according to the received alarm instruction.
  • the specific implementation of the second terminal 72 determining that the received alarm instruction is legal is exactly the same as the specific implementation of determining the legality of the matching instruction, and details are not described herein.
  • the sending unit determines that the corresponding application currently running on the second terminal 72 needs to be alerted, the alarm instruction is sent to the second terminal 72.
  • the number of the second terminals 72 may be one or more.
  • the first terminal 71 may control multiple second terminals 72; when the second terminal 72 When the number is two or more, the first terminal 71 performs the above-described operations for each of the second terminals 72, respectively.
  • the system for locking a terminal application provided by the embodiment of the present invention, the first terminal 71 acquires related information of an application on the second terminal 72; the first terminal 71 determines, according to the acquired related information, that the device needs to be locked.
  • an instruction to lock the corresponding application is sent to the second terminal 72; the second terminal 72 is locked according to the received instruction to lock the corresponding application.
  • the corresponding application can The application running on the second terminal 72 is monitored in real time, and the application being used can be controlled at any time.
  • the first terminal 71 sends an unlocking instruction to the second terminal 72; the second terminal 72 unlocks the corresponding according to the received unlocking instruction.
  • the first terminal 71 sends an alarm instruction to the second terminal 72; the second terminal 72 receives the alarm when the corresponding application currently running on the second terminal 72 needs to be alerted.
  • the obtained alarm command alerts the corresponding application, and thus, the application on the second terminal 72 can be further effectively controlled.
  • the second terminal 72 determines the legitimacy of the advanced instructions received, so that the received command can be guaranteed to be an effective command to avoid errors.
  • embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention can take the form of a hardware embodiment, a software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the computer is readable and stored
  • the instructions in the reservoir produce an article of manufacture comprising an instruction device that implements the functions specified in one or more blocks of the flow or in a flow or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.

Abstract

A terminal application locking method, the method comprising: a first terminal obtaining related information of applications on a second terminal (201); when determining, on the basis of the obtained related information, that a currently running corresponding application on the second terminal needs to be locked, the first terminal sending an instruction for locking the corresponding application to the second terminal (202); and the second terminal locking the corresponding application on the basis of the received instruction for locking the corresponding application (203). Also disclosed are a terminal, a terminal application locking system and a computer storage medium.

Description

锁定终端应用的方法、系统、终端及计算机存储介质Method, system, terminal and computer storage medium for locking terminal application 技术领域Technical field
本发明涉及终端技术,尤其涉及一种锁定终端应用的方法、系统、终端及计算机存储介质。The present invention relates to terminal technologies, and in particular, to a method, system, terminal, and computer storage medium for locking a terminal application.
背景技术Background technique
随着智能手机的不断普及,很多家长都给自己的孩子购买了智能手机。但由于智能手机功能越来越强大,可以安装和运行的应用程序繁多,而孩子的自控力又很差,这会让家长非常担忧,怕孩子由于贪玩影响学习,甚至误入歧途。如果可以让家长很方便地监控到孩子手机的使用情况,并可以随时远程终止小孩正在使用的应用程序,将会有效地降低家长对孩子使用智能终端的担忧。With the increasing popularity of smartphones, many parents have purchased smartphones for their children. However, due to the increasingly powerful functions of smart phones, there are many applications that can be installed and run, and the children's self-control is very poor, which will make parents very worried, afraid that children will learn from their playfulness and even go astray. If parents can easily monitor the use of their children's mobile phones, and can remotely terminate the application that the child is using at any time, it will effectively reduce parents' concerns about the child's use of smart terminals.
目前,还未有监控手机使用情况并随时控制正在使用的应用程序方面的解决方案。Currently, there are no solutions for monitoring mobile phone usage and controlling the applications being used.
发明内容Summary of the invention
为解决现有存在的技术问题,本发明实施例提供一种锁定终端应用的方法、系统、终端及计算机存储介质。In order to solve the existing technical problems, embodiments of the present invention provide a method, system, terminal, and computer storage medium for locking a terminal application.
本发明实施例提供了一种锁定终端应用的方法,包括:The embodiment of the invention provides a method for locking a terminal application, including:
第一终端获取第二终端上应用程序的相关信息;The first terminal acquires related information of the application on the second terminal;
所述第一终端根据获取的所述相关信息,确定需要锁定所述第二终端上当前运行的相应应用程序时,向所述第二终端发送锁定所述相应应用程序的指令;所述锁定所述相应应用程序的指令用于所述第二终端锁定所述相应应用程序。 When the first terminal determines that the corresponding application currently running on the second terminal needs to be locked according to the obtained related information, the first terminal sends an instruction for locking the corresponding application to the second terminal; The instructions of the corresponding application are used by the second terminal to lock the corresponding application.
上述方案中,所述第一终端获取第二终端上应用程序的相关信息,包括:In the above solution, the first terminal acquires related information of the application on the second terminal, including:
所述第一终端向所述第二终端发送监控指令;The first terminal sends a monitoring instruction to the second terminal;
所述第一终端接收所述第二终端反馈的所述第二终端上应用程序的相关信息。The first terminal receives related information of an application on the second terminal that is fed back by the second terminal.
上述方案中,所述第一终端获取第二终端上应用程序的相关信息之前,所述方法还包括:In the above solution, before the first terminal acquires related information of the application on the second terminal, the method further includes:
所述第一终端设定对所述第二终端的监控。The first terminal sets monitoring of the second terminal.
上述方案中,所述第一终端设定对所述第二终端的监控,包括:In the above solution, the first terminal sets monitoring of the second terminal, including:
所述第一终端向所述第二终端发送包含自身标识信息及匹配指令密码的匹配指令;Transmitting, by the first terminal, a matching instruction including the self identification information and the matching instruction password to the second terminal;
所述第一终端接收所述第二终端确定接收的匹配指令合法后反馈的包含所述第二终端标识信息及指令匹配密码的匹配指令;Receiving, by the first terminal, a matching instruction that includes the second terminal identification information and an instruction matching password that is fed back after the second terminal determines that the received matching instruction is legal;
所述第一终端根据自身保存的所述第二终端标识信息及指令匹配密码确定接收的匹配指令合法,并设置监控绑定标识。The first terminal determines that the received matching instruction is legal according to the second terminal identification information and the instruction matching password saved by the first terminal, and sets a monitoring binding identifier.
上述方案中,所述方法还包括:In the above solution, the method further includes:
确定需要对所述第二终端上锁定的应用程序进行解锁时,所述第一终端向所述第二终端发送解锁指令;所述解锁指令用于所述第二终端解锁对应的应用程序。When it is determined that the application locked on the second terminal needs to be unlocked, the first terminal sends an unlocking instruction to the second terminal; and the unlocking instruction is used by the second terminal to unlock the corresponding application.
上述方案中,所述方法还包括:In the above solution, the method further includes:
确定需要对所述第二终端上当前运行的相应应用程序进行告警时,所述第一终端向所述第二终端发送告警指令;所述告警指令用于所述第二终端对对应的应用程序进行告警。When it is determined that the corresponding application currently running on the second terminal needs to be alerted, the first terminal sends an alarm instruction to the second terminal; the alarm instruction is used by the second terminal to the corresponding application. Alert.
本发明实施例还提供了一种锁定终端应用的方法,包括:The embodiment of the invention further provides a method for locking a terminal application, comprising:
第一终端获取第二终端上应用程序的相关信息; The first terminal acquires related information of the application on the second terminal;
所述第一终端根据获取的所述相关信息,确定需要锁定所述第二终端上当前运行的相应应用程序时,向所述第二终端发送锁定所述相应应用程序的指令;The first terminal, according to the obtained related information, determines that the corresponding application currently running on the second terminal needs to be locked, and sends an instruction to lock the corresponding application to the second terminal;
所述第二终端根据收到的锁定所述相应应用程序的指令锁定所述相应应用程序。The second terminal locks the corresponding application according to the received instruction to lock the corresponding application.
上述方案中,所述第一终端获取第二终端上应用程序的相关信息,包括:In the above solution, the first terminal acquires related information of the application on the second terminal, including:
所述第一终端向所述第二终端发送监控指令;The first terminal sends a monitoring instruction to the second terminal;
所述第二终端确定收到的监控指令合法时,向所述第一终端反馈自身应用程序的相关信息。When the second terminal determines that the received monitoring instruction is legal, the second terminal feeds back information about the application of the application to the first terminal.
上述方案中,所述第一终端获取第二终端上应用程序的相关信息之前,所述方法还包括:In the above solution, before the first terminal acquires related information of the application on the second terminal, the method further includes:
所述第一终端设定对所述第二终端的监控。The first terminal sets monitoring of the second terminal.
上述方案中,所述第一终端设定对所述第二终端的监控,包括:In the above solution, the first terminal sets monitoring of the second terminal, including:
所述第一终端向所述第二终端发送包含自身标识信息及匹配指令密码的匹配指令;Transmitting, by the first terminal, a matching instruction including the self identification information and the matching instruction password to the second terminal;
所述第二终端根据自身保存的所述第一终端标识信息及指令匹配密码确定接收的匹配指令合法时,向所述第一终端反馈包含自身标识信息及匹配指令密码的匹配指令,并设置监控绑定标识;When the second terminal determines that the received matching instruction is legal according to the first terminal identification information and the instruction matching password saved by itself, the second terminal feeds back a matching instruction including the own identification information and the matching instruction password to the first terminal, and sets the monitoring Binding identifier
所述第一终端根据自身保存的所述第二终端标识信息及指令匹配密码确定接收的匹配指令合法,并设置监控绑定标识。The first terminal determines that the received matching instruction is legal according to the second terminal identification information and the instruction matching password saved by the first terminal, and sets a monitoring binding identifier.
上述方案中,所述方法还包括:In the above solution, the method further includes:
确定需要对所述第二终端上锁定的应用程序进行解锁时,所述第一终端向所述第二终端发送解锁指令;When it is determined that the application locked on the second terminal needs to be unlocked, the first terminal sends an unlocking instruction to the second terminal;
所述第二终端根据收到的解锁指令解锁对应的应用程序。 The second terminal unlocks the corresponding application according to the received unlocking instruction.
上述方案中,所述方法还包括:In the above solution, the method further includes:
确定需要对所述第二终端上当前运行的相应应用程序进行告警时,所述第一终端向所述第二终端发送告警指令;When it is determined that the corresponding application currently running on the second terminal needs to be alerted, the first terminal sends an alarm instruction to the second terminal;
所述第二终端根据收到的告警指令对对应的应用程序进行告警。The second terminal alerts the corresponding application according to the received alarm instruction.
本发明实施例又提供了一种终端,包括:获取单元及发送单元;其中,The embodiment of the present invention further provides a terminal, including: an acquiring unit and a sending unit;
所述获取单元,配置为获取被监控终端上应用程序的相关信息;The obtaining unit is configured to acquire related information of an application on the monitored terminal;
所述发送单元,配置为根据获取的所述相关信息,确定需要锁定所述被监控终端上当前运行的相应应用程序时,向所述被监控终端发送锁定所述相应应用程序的指令;所述锁定所述相应应用程序的指令用于所述被监控终端锁定所述相应应用程序。The sending unit is configured to, according to the obtained related information, determine, when the corresponding application currently running on the monitored terminal needs to be locked, send an instruction to lock the corresponding application to the monitored terminal; An instruction to lock the corresponding application is used by the monitored terminal to lock the corresponding application.
上述方案中,所述获取单元包括:第一发送模块及第一接收模块;其中,In the above solution, the acquiring unit includes: a first sending module and a first receiving module; wherein
所述第一发送模块,配置为向所述被监控终端发送监控指令;The first sending module is configured to send a monitoring instruction to the monitored terminal;
所述第一接收模块,配置为接收所述被监控终端反馈的所述被监控终端上应用程序的相关信息。The first receiving module is configured to receive related information of an application on the monitored terminal fed back by the monitored terminal.
上述方案中,所述终端还包括设定单元,配置为设定对所述被监控终端的监控。In the above solution, the terminal further includes a setting unit configured to set monitoring of the monitored terminal.
上述方案中,所述设定单元包括:第二发送模块、第二接收模块及确定模块;其中,In the above solution, the setting unit includes: a second sending module, a second receiving module, and a determining module; wherein
所述第二发送模块,配置为向所述被监控终端发送包含自身所在终端标识信息及匹配指令密码的匹配指令;The second sending module is configured to send, to the monitored terminal, a matching command including the terminal identification information of the terminal and the matching instruction password;
所述第二接收模块,配置为接收所述被监控终端确定接收的匹配指令合法后反馈的包含所述被监控终端标识信息及指令匹配密码的匹配指令;The second receiving module is configured to receive, after the monitored terminal determines that the received matching command is legal, the matching instruction that includes the monitored terminal identification information and the command matching password;
所述确定模块,配置为根据自身保存的所述被监控终端标识信息及指令匹配密码确定接收的匹配指令合法,并设置监控绑定标识。 The determining module is configured to determine, according to the monitored terminal identification information and the instruction matching password saved by itself, that the received matching instruction is legal, and set the monitoring binding identifier.
上述方案中,所述发送单元,还配置为确定需要对所述被监控终端上锁定的应用程序进行解锁时,向所述被监控终端发送解锁指令;所述解锁指令用于所述被监控终端解锁对应的应用程序。In the above solution, the sending unit is further configured to: when it is determined that the application locked on the monitored terminal needs to be unlocked, send an unlocking instruction to the monitored terminal; and the unlocking instruction is used by the monitored terminal. Unlock the corresponding app.
上述方案中,所述发送单元,还配置为确定需要对所述被监控终端上当前运行的相应应用程序进行告警时,向所述被监控终端发送告警指令;所述告警指令用于所述被监控终端对对应的应用程序进行告警。In the foregoing solution, the sending unit is further configured to: when it is determined that an alarm is required to be performed on a corresponding application currently running on the monitored terminal, send an alarm instruction to the monitored terminal; The monitoring terminal alerts the corresponding application.
本发明实施例还提供了一种锁定终端应用的系统,包括:第一终端及第二终端;其中,The embodiment of the invention further provides a system for locking a terminal application, comprising: a first terminal and a second terminal; wherein
所述第一终端,配置为获取所述第二终端上应用程序的相关信息;并根据获取的所述相关信息,确定需要锁定所述第二终端上当前运行的相应应用程序时,向所述第二终端发送锁定所述相应应用程序的指令;The first terminal is configured to acquire related information of the application on the second terminal, and determine, according to the obtained related information, that the corresponding application currently running on the second terminal needs to be locked, to the The second terminal sends an instruction to lock the corresponding application;
所述第二终端,配置为根据收到的锁定所述相应应用程序的指令锁定所述相应应用程序。The second terminal is configured to lock the corresponding application according to the received instruction to lock the corresponding application.
上述方案中,所述第一终端,配置为向所述第二终端发送监控指令;并接收所述第二终端反馈的所述相关信息;In the foregoing solution, the first terminal is configured to send a monitoring instruction to the second terminal, and receive the related information that is fed back by the second terminal;
所述第二终端,配置为确定收到的监控指令合法时,向所述第一终端反馈自身当应用程序的相关信息。The second terminal is configured to: when it is determined that the received monitoring instruction is legal, feed back the related information of the application to the first terminal.
上述方案中,所述第一终端,还配置为设定对所述第二终端的监控。In the above solution, the first terminal is further configured to set monitoring of the second terminal.
上述方案中,所述第一终端,配置为:向所述第二终端发送包含自身标识信息及匹配指令密码的匹配指令;根据自身保存的所述第二终端标识信息及指令匹配密码确定接收的匹配指令合法,并设置监控绑定标识;In the above solution, the first terminal is configured to: send a matching instruction including the self identification information and the matching instruction password to the second terminal; and determine, according to the second terminal identification information and the instruction matching password saved by the second terminal, the received terminal The matching instruction is legal, and the monitoring binding identifier is set;
所述第二终端,配置为根据自身保存的所述第一终端标识信息及指令匹配密码确定接收的匹配指令合法时,向所述第一终端反馈包含自身标识信息及匹配指令密码的匹配指令,并设置监控绑定标识。The second terminal is configured to: when the first terminal identifier information and the command matching password saved by the first terminal are configured to determine that the received matching command is legal, feed the matching command including the self identification information and the matching instruction password to the first terminal, And set the monitoring binding ID.
上述方案中,所述第一终端,还配置为确定需要对所述第二终端上锁 定的应用程序进行解锁时,向所述第二终端发送解锁指令;In the foregoing solution, the first terminal is further configured to determine that the second terminal needs to be locked When the predetermined application is unlocked, sending an unlocking instruction to the second terminal;
所述第二终端,还配置为根据收到的解锁指令解锁对应的应用程序。The second terminal is further configured to unlock the corresponding application according to the received unlocking instruction.
上述方案中,所述第一终端,还配置为确定需要对所述第二终端上当前运行的相应应用程序进行告警时,向所述第二终端发送告警指令;In the foregoing solution, the first terminal is further configured to: when it is determined that an alarm is required to be performed on a corresponding application currently running on the second terminal, send an alarm instruction to the second terminal;
所述第二终端,还配置为根据收到的告警指令对对应的应用程序进行告警。The second terminal is further configured to perform an alarm on the corresponding application according to the received alarm instruction.
上述方案中,所述第二终端的个数为一个以上。In the above solution, the number of the second terminals is one or more.
本发明实施例又提供了一种计算机存储介质,所述计算机存储介质包括一组指令,当执行所述指令时,引起至少一个处理器执行上述的锁定终端应用的方法。The embodiment of the present invention further provides a computer storage medium, the computer storage medium comprising a set of instructions, when executed, causing at least one processor to execute the method of locking the terminal application described above.
本发明实施例提供的锁定终端应用的方法、系统、终端及计算机存储介质,第一终端获取第二终端上应用程序的相关信息;所述第一终端根据获取的所述相关信息,确定需要锁定所述第二终端上当前运行的相应应用程序时,向所述第二终端发送锁定所述相应应用程序的指令;所述第二终端根据收到的锁定所述相应应用程序的指令锁定所述相应应用程序,如此,能实时对所述第二终端上运行的应用程序进行监控,并能随时控制正在使用的应用程序。The method, the system, the terminal, and the computer storage medium for locking the terminal application provided by the embodiment of the present invention, the first terminal acquires related information of the application on the second terminal, and the first terminal determines that the information needs to be locked according to the obtained related information. And when the corresponding application currently running on the second terminal sends an instruction to lock the corresponding application to the second terminal; the second terminal locks the instruction according to the received instruction to lock the corresponding application The corresponding application, in this way, can monitor the application running on the second terminal in real time, and can control the application being used at any time.
附图说明DRAWINGS
在附图(其不一定是按比例绘制的)中,相似的附图标记可在不同的视图中描述相似的部件。具有不同字母后缀的相似附图标记可表示相似部件的不同示例。附图以示例而非限制的方式大体示出了本文中所讨论的各个实施例。In the drawings, which are not necessarily to scale, the Like reference numerals with different letter suffixes may indicate different examples of similar components. The drawings generally illustrate the various embodiments discussed herein by way of example and not limitation.
图1为本发明实施例一锁定终端应用的方法流程示意图;1 is a schematic flowchart of a method for locking a terminal application according to an embodiment of the present invention;
图2为本发明实施例二锁定终端应用的方法流程示意图;2 is a schematic flowchart of a method for locking a terminal application according to Embodiment 2 of the present invention;
图3为本发明实施例三设定监控的方法流程示意图; 3 is a schematic flowchart of a method for setting monitoring according to Embodiment 3 of the present invention;
图4为本发明实施例四对终端应用程序进行监控、锁定/解锁的方法流程示意图;4 is a schematic flowchart of a method for monitoring, locking, and unlocking a terminal application according to Embodiment 4 of the present invention;
图5为本发明实施例四终端结构示意图;FIG. 5 is a schematic structural diagram of a terminal according to Embodiment 4 of the present invention; FIG.
图6为本发明实施例五终端结构示意图;6 is a schematic structural diagram of a terminal according to Embodiment 5 of the present invention;
图7为本发明实施例六锁定终端应用的系统结构示意图。FIG. 7 is a schematic structural diagram of a system for locking a terminal application according to Embodiment 6 of the present invention.
具体实施方式detailed description
下面结合附图及实施例对本发明再作进一步详细地描述。The present invention will be further described in detail below with reference to the accompanying drawings and embodiments.
在本发明的各种实施例中:第一终端获取第二终端上应用程序的相关信息;所述第一终端根据获取的所述相关信息,确定需要锁定所述第二终端上当前运行的相应应用程序时,向所述第二终端发送锁定所述相应应用程序的指令;所述第二终端根据收到的锁定所述相应应用程序的指令锁定所述相应应用程序。In various embodiments of the present invention, the first terminal acquires related information of the application on the second terminal, and the first terminal determines, according to the obtained related information, that the corresponding operation on the second terminal needs to be locked. And an instruction to lock the corresponding application to the second terminal; the second terminal locks the corresponding application according to the received instruction to lock the corresponding application.
实施例一Embodiment 1
本实施例锁定终端应用的方法,如图1所示,包括以下步骤:The method for locking a terminal application in this embodiment, as shown in FIG. 1, includes the following steps:
步骤101:第一终端获取第二终端上应用程序的相关信息;Step 101: The first terminal acquires related information of the application on the second terminal.
这里,本步骤的具体实现可以包括:Here, the specific implementation of this step may include:
所述第一终端向所述第二终端发送监控指令;The first terminal sends a monitoring instruction to the second terminal;
所述第一终端接收所述第二终端反馈的所述第二终端上应用程序的相关信息。The first terminal receives related information of an application on the second terminal that is fed back by the second terminal.
其中,所述相关信息可以包括:所述第二终端安装的应用程序列表、应用状态、当前正在运行的应用程序、以及正在运行的应用程序的运行时长信息等。The related information may include: an application list installed by the second terminal, an application state, an application currently running, and running time information of the running application, and the like.
所述相关信息可以是所述第二终端上当前所有的应用程序的相关信息,也可以是所述第二终端上当前部分应用程序的相关信息;实际应用时,可以根据需要来确定是当前所有的应用程序还是部分应用程序的相关信 息。The related information may be related information of all currently used applications on the second terminal, or related information of the current part of the application on the second terminal; in actual application, it may be determined according to needs. Application or related application interest.
在执行本步骤之前,该方法还可以包括:Before performing this step, the method may further include:
所述第一终端设定对所述第二终端的监控;The first terminal sets monitoring of the second terminal;
具体地,所述第一终端向所述第二终端发送包含自身标识信息及匹配指令密码的匹配指令;Specifically, the first terminal sends a matching instruction including the self identification information and the matching instruction password to the second terminal;
所述第一终端接收所述第二终端确定接收的匹配指令合法后反馈的包含所述第二终端标识信息及指令匹配密码的匹配指令;Receiving, by the first terminal, a matching instruction that includes the second terminal identification information and an instruction matching password that is fed back after the second terminal determines that the received matching instruction is legal;
所述第一终端根据自身保存的所述第二终端标识信息及指令匹配密码确定接收的匹配指令合法,并设置监控绑定标识。The first terminal determines that the received matching instruction is legal according to the second terminal identification information and the instruction matching password saved by the first terminal, and sets a monitoring binding identifier.
这里,所述标识信息可以为移动用户ISDN/PSTN码(MSISDN,Mobile Subscriber International ISDN/PSTN Number);所述设置监控绑定标识表示所述第一终端对所述第二终端进行了监控,实际应用时,可以设置监控绑定标识为True。Here, the identification information may be a mobile subscriber ISDN/PSTN code (MSISDN, Mobile Subscriber International ISDN/PSTN Number); the setting monitoring binding identifier indicates that the first terminal monitors the second terminal, actually When applying, you can set the monitoring binding ID to True.
步骤102:所述第一终端根据获取的所述相关信息,确定需要锁定所述第二终端上当前运行的相应应用程序时,向所述第二终端发送锁定所述相应应用程序的指令;所述锁定所述相应应用程序的指令用于所述第二终端锁定所述相应应用程序。Step 102: The first terminal, according to the obtained related information, determines that the corresponding application currently running on the second terminal needs to be locked, and sends an instruction to lock the corresponding application to the second terminal. An instruction to lock the corresponding application is used by the second terminal to lock the corresponding application.
这里,所述确定需要锁定所述第二终端上当前运行的相应应用程序是指:收到所述第一终端的用户锁定所述相应应用程序的指令。Here, the determining that the corresponding application currently running on the second terminal needs to be locked refers to: receiving an instruction that the user of the first terminal locks the corresponding application.
该方法还可以包括:The method can also include:
确定需要对所述第二终端上锁定的应用程序进行解锁时,所述第一终端向所述第二终端发送解锁指令;所述解锁指令用于所述第二终端解锁对应的应用程序。When it is determined that the application locked on the second terminal needs to be unlocked, the first terminal sends an unlocking instruction to the second terminal; and the unlocking instruction is used by the second terminal to unlock the corresponding application.
这里,所述确定需要对所述第二终端上锁定的应用程序进行解锁是指:收到所述第一终端的用户的解锁指令。 Here, the determining that the application locked on the second terminal needs to be unlocked means: receiving an unlocking instruction of the user of the first terminal.
该方法还可以包括:The method can also include:
确定需要对所述第二终端上当前运行的相应应用程序进行告警时,所述第一终端向所述第二终端发送告警指令;所述告警指令用于所述第二终端对对应的应用程序进行告警。When it is determined that the corresponding application currently running on the second terminal needs to be alerted, the first terminal sends an alarm instruction to the second terminal; the alarm instruction is used by the second terminal to the corresponding application. Alert.
其中,所述确定需要对所述第二终端上当前运行的相应应用程序进行告警是指:收到所述第一终端的用户的告警指令。The determining that the alarm needs to be performed on the corresponding application currently running on the second terminal refers to: receiving an alarm instruction of the user of the first terminal.
实际应用时,所述第二终端的个数可以为一个以上,换句话说,所述第一终端可以对多个所述第二终端上进行控制;当所述第二终端的个数为两个以上时,所述第一终端分别对每个所述第二终端执行上述的操作。In actual application, the number of the second terminals may be one or more. In other words, the first terminal may control multiple second terminals; when the number of the second terminals is two More than one time, the first terminal performs the above operations on each of the second terminals.
本发明实施例提供的锁定终端应用的方法,第一终端获取第二终端上应用程序的相关信息;所述第一终端根据获取的所述相关信息,确定需要锁定所述第二终端上当前运行的相应应用程序时,向所述第二终端发送锁定所述相应应用程序的指令,以使所述第二终端根据收到的锁定所述相应应用程序的指令锁定所述相应应用程序,如此,能实时对所述第二终端上运行的应用程序进行监控,并能随时控制正在使用的应用程序。The method for locking the terminal application provided by the embodiment of the present invention, the first terminal acquires related information of the application program on the second terminal, and the first terminal determines, according to the obtained related information, that the current operation on the second terminal needs to be locked. Transmitting, to the second terminal, an instruction to lock the corresponding application, so that the second terminal locks the corresponding application according to the received instruction to lock the corresponding application, such that The application running on the second terminal can be monitored in real time, and the application being used can be controlled at any time.
确定需要对所述第二终端上锁定的应用程序进行解锁时,所述第一终端相所述第二终端发送解锁指令,以使所述第二终端根据收到的解锁指令解锁对应的应用程序;另外,确定需要对所述第二终端上当前运行的相应应用程序进行告警时,所述第一终端向所述第二终端发送告警指令,以使所述第二终端根据收到的告警指令对对应的应用程序进行告警,如此,能进一步有效地对所述第二终端上的应用程序进行控制。When it is determined that the application locked on the second terminal needs to be unlocked, the first terminal sends an unlocking instruction to the second terminal, so that the second terminal unlocks the corresponding application according to the received unlocking instruction. In addition, when it is determined that the corresponding application currently running on the second terminal needs to be alerted, the first terminal sends an alarm instruction to the second terminal, so that the second terminal is configured according to the received alarm instruction. The corresponding application is alerted, and thus, the application on the second terminal can be further effectively controlled.
实施例二Embodiment 2
本实施例锁定终端应用的方法,如图2所示,包括以下步骤:The method for locking a terminal application in this embodiment, as shown in FIG. 2, includes the following steps:
步骤201:第一终端获取第二终端上应用程序的相关信息;Step 201: The first terminal acquires related information of the application on the second terminal.
这里,本步骤的具体实现可以包括: Here, the specific implementation of this step may include:
所述第一终端向所述第二终端发送监控指令;The first terminal sends a monitoring instruction to the second terminal;
所述第二终端确定收到的监控指令合法时,向所述第一终端反馈自身应用程序的相关信息。When the second terminal determines that the received monitoring instruction is legal, the second terminal feeds back information about the application of the application to the first terminal.
其中,所述相关信息可以包括:所述第二终端安装的应用程序列表、应用状态、当前正在运行的应用程序、以及正在运行的应用程序的运行时长信息等。The related information may include: an application list installed by the second terminal, an application state, an application currently running, and running time information of the running application, and the like.
所述相关信息可以是所述第二终端上当前所有的应用程序的相关信息,也可以是所述第二终端上当前部分应用程序的相关信息;实际应用时,可以根据需要来确定是当前所有的应用程序还是部分应用程序的相关信息。The related information may be related information of all currently used applications on the second terminal, or related information of the current part of the application on the second terminal; in actual application, it may be determined according to needs. The application is also information about some applications.
在执行本步骤之前,该方法还可以包括:Before performing this step, the method may further include:
所述第一终端设定对所述第二终端的监控;The first terminal sets monitoring of the second terminal;
具体地,所述第一终端向所述第二终端发送包含自身标识信息及匹配指令密码的匹配指令;Specifically, the first terminal sends a matching instruction including the self identification information and the matching instruction password to the second terminal;
所述第二终端根据自身保存的所述第一终端标识信息及指令匹配密码确定接收的匹配指令合法时,向所述第一终端反馈包含自身标识信息及匹配指令密码的匹配指令,并设置监控绑定标识;When the second terminal determines that the received matching instruction is legal according to the first terminal identification information and the instruction matching password saved by itself, the second terminal feeds back a matching instruction including the own identification information and the matching instruction password to the first terminal, and sets the monitoring Binding identifier
所述第一终端根据自身保存的所述第二终端标识信息及指令匹配密码确定接收的匹配指令合法,并设置监控绑定标识。The first terminal determines that the received matching instruction is legal according to the second terminal identification information and the instruction matching password saved by the first terminal, and sets a monitoring binding identifier.
这里,所述标识信息可以为MSISDN;所述设置监控绑定标识表示所述第一终端对所述第二终端进行了监控,实际应用时,可以设置监控绑定标识为True。Here, the identification information may be an MSISDN; the setting monitoring binding identifier indicates that the first terminal monitors the second terminal, and when the actual application is used, the monitoring binding identifier may be set to True.
步骤202:所述第一终端根据获取的所述相关信息,确定需要锁定所述第二终端上当前运行的相应应用程序时,向所述第二终端发送锁定所述相应应用程序的指令; Step 202: The first terminal, according to the obtained related information, determines that the corresponding application currently running on the second terminal needs to be locked, and sends an instruction to lock the corresponding application to the second terminal.
这里,所述确定需要锁定所述第二终端上当前运行的相应应用程序是指:收到所述第一终端的用户锁定所述相应应用程序的指令。Here, the determining that the corresponding application currently running on the second terminal needs to be locked refers to: receiving an instruction that the user of the first terminal locks the corresponding application.
步骤203:所述第二终端根据收到的锁定所述相应应用程序的指令锁定所述相应应用程序。Step 203: The second terminal locks the corresponding application according to the received instruction of locking the corresponding application.
这里,在执行本步骤之前,该方法还可以包括:所述第二终端确定收到的锁定所述相应应用程序的指令合法时,根据收到的锁定所述相应应用程序的指令锁定所述相应应用程序。Here, before performing the step, the method may further include: when the second terminal determines that the received instruction to lock the corresponding application is legal, and locks the corresponding according to the received instruction of locking the corresponding application application.
其中,所述第二终端确定收到的锁定所述相应应用程序的指令合法的具体实现与确定匹配指令合法的具体实现完全相同,不再赘述。The specific implementation of the second terminal determining that the received instruction to lock the corresponding application is legal is the same as the specific implementation of determining the legality of the matching instruction, and details are not described herein.
该方法还可以包括:The method can also include:
确定需要对所述第二终端上锁定的应用程序进行解锁时,所述第一终端向所述第二终端发送解锁指令;When it is determined that the application locked on the second terminal needs to be unlocked, the first terminal sends an unlocking instruction to the second terminal;
所述第二终端根据收到的解锁指令解锁对应的应用程序。The second terminal unlocks the corresponding application according to the received unlocking instruction.
其中,确定需要对所述第二终端上锁定的应用程序进行解锁是指:收到所述第一终端的用户的解锁指令。The determining that the application locked on the second terminal needs to be unlocked refers to: receiving an unlocking instruction of the user of the first terminal.
相应地,所述第二终端根据收到的解锁指令解锁对应的应用程序之前,该方法还可以包括:所述第二终端确定收到的解锁指令合法时,根据收到的解锁指令解锁对应的应用程序。Correspondingly, before the second terminal unlocks the corresponding application according to the received unlocking instruction, the method may further include: when the second terminal determines that the received unlocking instruction is legal, the corresponding information is unlocked according to the received unlocking instruction. application.
这里,所述第二终端确定收到的解锁指令合法的具体实现与确定匹配指令合法的具体实现完全相同,不再赘述。Here, the specific implementation of the second terminal determining that the received unlocking instruction is legal is exactly the same as the specific implementation of determining the legality of the matching instruction, and details are not described herein.
该方法还可以包括:The method can also include:
确定需要对所述第二终端上当前运行的相应应用程序进行告警时,所述第一终端向所述第二终端发送告警指令;When it is determined that the corresponding application currently running on the second terminal needs to be alerted, the first terminal sends an alarm instruction to the second terminal;
所述第二终端根据收到的告警指令对对应的应用程序进行告警。The second terminal alerts the corresponding application according to the received alarm instruction.
其中,所述第二终端根据收到的告警指令对对应的应用程序进行告警 之前,该方法还可以包括:The second terminal performs an alarm on the corresponding application according to the received alarm instruction. Previously, the method could also include:
所述第二终端确定收到的告警指令合法时,根据收到的告警指令对对应的应用程序进行告警;When the second terminal determines that the received alarm instruction is legal, the second terminal performs an alarm according to the received alarm instruction to the corresponding application program;
这里,所述第二终端确定收到的告警指令合法的具体实现与确定匹配指令合法的具体实现完全相同,不再赘述。Here, the specific implementation of determining that the received alarm instruction is legal by the second terminal is completely the same as the specific implementation of determining that the matching instruction is legal, and details are not described herein.
实际应用时,所述第二终端的个数可以为一个以上,换句话说,所述第一终端可以对多个所述第二终端上进行控制;当所述第二终端的个数为两个以上时,所述第一终端分别对每个所述第二终端执行上述的操作。In actual application, the number of the second terminals may be one or more. In other words, the first terminal may control multiple second terminals; when the number of the second terminals is two More than one time, the first terminal performs the above operations on each of the second terminals.
本发明实施例提供的锁定终端应用的方法,第一终端获取第二终端上应用程序的相关信息;所述第一终端根据获取的所述相关信息,确定需要锁定所述第二终端上当前运行的相应应用程序时,向所述第二终端发送锁定所述相应应用程序的指令;所述第二终端根据收到的锁定所述相应应用程序的指令锁定所述相应应用程序,如此,能实时对所述第二终端上运行的应用程序进行监控,并能随时控制正在使用的应用程序。The method for locking the terminal application provided by the embodiment of the present invention, the first terminal acquires related information of the application program on the second terminal, and the first terminal determines, according to the obtained related information, that the current operation on the second terminal needs to be locked. The corresponding application sends an instruction to lock the corresponding application to the second terminal; the second terminal locks the corresponding application according to the received instruction to lock the corresponding application, so that it can be real-time The application running on the second terminal is monitored, and the application being used can be controlled at any time.
确定需要对所述第二终端上锁定的应用程序进行解锁时,所述第一终端向所述第二终端发送解锁指令;所述第二终端根据收到的解锁指令解锁对应的应用程序;另外,确定需要对所述第二终端上当前运行的相应应用程序进行告警时,所述第一终端向所述第二终端发送告警指令;所述第二终端根据收到的告警指令对对应的应用程序进行告警,如此,能进一步有效地对所述第二终端上的应用程序进行控制。When it is determined that the application locked on the second terminal needs to be unlocked, the first terminal sends an unlocking instruction to the second terminal; the second terminal unlocks the corresponding application according to the received unlocking instruction; When it is determined that the corresponding application currently running on the second terminal needs to be alerted, the first terminal sends an alarm instruction to the second terminal; and the second terminal applies the corresponding application according to the received alarm instruction. The program performs an alarm, and thus, the application on the second terminal can be further effectively controlled.
所述第二终端对收到的各种指令先进性合法性的判断,如此,能保证收到的指令为有效指令,避免出现错误。The second terminal judges the legitimacy of the advanced instructions received, so that the received command can be guaranteed to be an effective command to avoid errors.
实施例三Embodiment 3
本实施例的应用场景为:终端A对终端B进行监控;在监控前,首先需要设定终端A对终端B进行监控,本实施设定终端A对终端B设定监控 的方法,如图3所示,包括以下步骤:The application scenario of this embodiment is: terminal A monitors terminal B. Before monitoring, terminal A needs to be set to monitor terminal B. In this implementation, terminal A is configured to monitor terminal B. The method, as shown in Figure 3, includes the following steps:
步骤301:终端A上的监控程序接收到用户输入的用户名和密码;Step 301: The monitoring program on the terminal A receives the user name and password input by the user;
这里,所述用户打开终端A上的监控程序后,输入用户名和密码。Here, after the user opens the monitoring program on the terminal A, the user name and password are input.
步骤302:所述监控程序进行用户名和密码校验,在校验成功后显示程序主界面给用户,之后执行步骤303;Step 302: The monitoring program performs user name and password verification, after the verification is successful, the program main interface is displayed to the user, and then step 303 is performed;
这里,如果用户名和密码校验失败,则返回步骤301,提示所述用户重新输入用户名和密码。Here, if the username and password verification fails, returning to step 301, the user is prompted to re-enter the username and password.
步骤303:终端B上的锁定程序接收所述用户输入的用户名和密码;Step 303: The locking program on the terminal B receives the username and password input by the user.
这里,所述用户打开终端B上的锁定程序后,输入用户名和密码进行登录。Here, after the user opens the lock program on the terminal B, the user name and password are input to log in.
所述用户在终端B上输入的用户名和密码可以和所述用户在终端A上输入的用户名和密码相同,也可以不同。二者均由所述用户进行设定和维护。The user name and password entered by the user on the terminal B may be the same as or different from the user name and password entered by the user on the terminal A. Both are set and maintained by the user.
步骤304:所述锁定程序进行用户名和密码校验,成功后显示程序主界面给所述用户,之后执行步骤305;Step 304: The lock program performs user name and password verification. After successful, the program main interface is displayed to the user, and then step 305 is performed;
这里,如果用户名和密码校验失败,则返回步骤303,提示所述用户重新输入用户名和密码。Here, if the username and password verification fails, return to step 303 to prompt the user to re-enter the username and password.
实际应用时,步骤301~302与步骤303~304的执行没有先后顺序。In actual application, the execution of steps 301-302 and steps 303-304 has no sequence.
步骤305:在所述锁定程序中设定终端A的标识信息,并设定来自终端A的指令匹配密码,之后执行步骤306;Step 305: setting the identification information of the terminal A in the lock program, and setting the command matching password from the terminal A, and then performing step 306;
这里,所述终端A的标识信息可以是:MSISDN信息等;Here, the identification information of the terminal A may be: MSISDN information, etc.;
设定来自终端A的指令匹配密码后,只有来自终端A且携带正确的指令匹配密码的指令才会被终端B的锁定程序识别,这样做的目的是防止终端B被非法用户进行监控。After setting the command matching password from terminal A, only the command from terminal A carrying the correct command matching password will be recognized by the locking program of terminal B. The purpose of this is to prevent terminal B from being monitored by an illegal user.
设定完成后退出终端B的设定。 Exit the settings of terminal B after the setting is completed.
步骤306:在所述监控程序中设定终端B的标识信息,并设置与步骤305中的指令匹配密码相匹配的指令匹配密码;Step 306: Set the identification information of the terminal B in the monitoring program, and set an instruction matching password that matches the instruction matching password in step 305;
这里,所述终端B的标识信息可以是:MSISDN信息等。Here, the identification information of the terminal B may be: MSISDN information or the like.
设定完成后退出终端A的设定。Exit the settings of terminal A after the setting is completed.
实际应用时,步骤305、306的执行没有先后顺序。In actual application, the execution of steps 305, 306 has no order.
步骤307:终端A通过所述监控程序发送匹配指令至终端B;Step 307: The terminal A sends a matching command to the terminal B through the monitoring program;
这里,所述匹配指令携带有终端A的标识信息以及指令匹配密码。Here, the matching instruction carries the identification information of the terminal A and the instruction matching password.
步骤308:终端B的锁定程序接收到终端A的匹配指令后,对匹配指令进行解析和合法性判断,如果合法,则将监控绑定标识置为True,并发送成功消息给终端A;Step 308: After receiving the matching command of the terminal A, the locking program of the terminal B parses the matching command and determines the legality. If it is legal, the monitoring binding identifier is set to True, and a success message is sent to the terminal A;
这里,匹配指令合法表明监控设定已经成功;如果非法,则直接丢弃。Here, the matching instruction legally indicates that the monitoring setting has been successful; if it is illegal, it is directly discarded.
步骤309:终端A的监控程序收到终端B的成功消息后,解析成功消息并进行合法性判断,如果消息合法,则向所述用户显示成功绑定结果,并将对终端B的监控绑定标识置为True;Step 309: After receiving the success message of the terminal B, the monitoring program of the terminal A parses the success message and performs legality judgment. If the message is legal, the successful binding result is displayed to the user, and the monitoring of the terminal B is bound. The flag is set to True;
这里,如果非法,则直接丢弃。Here, if it is illegal, it is directly discarded.
至此,完成终端A对终端B的监控设定。So far, the terminal A's monitoring setting for the terminal B is completed.
实施例四Embodiment 4
本实施例基于实施例三的终端A对终端B的监控设定,来描述终端A如何对终端B的应用程序进行监控、锁定/解锁。本实施例对终端应用程序进行监控、锁定/解锁的方法,如图4所示,包括以下步骤:This embodiment describes how the terminal A monitors, locks, and unlocks the application of the terminal B based on the monitoring settings of the terminal B of the third embodiment. The method for monitoring, locking, and unlocking the terminal application in this embodiment, as shown in FIG. 4, includes the following steps:
步骤401:用户通过终端A登录安装在终端A的监控程序,选择已设定好的监控终端B,并通过所述监控程序发送监控指令给终端B;Step 401: The user logs in the monitoring program installed in the terminal A through the terminal A, selects the monitoring terminal B that has been set, and sends a monitoring instruction to the terminal B through the monitoring program;
这里,登录过程的具体实现与实施例三中的步骤301~302完全相同,这里不再赘述。Here, the specific implementation of the login process is exactly the same as the steps 301-302 in the third embodiment, and details are not described herein again.
步骤402:终端B的锁定程序收到终端A的监控指令后,对监控指令 进行解析并进行合法性判断,如果指令合法,则将包含本机安装的应用程序列表、应用状态、当前正在运行的应用程序、以及正在运行的应用程序的运行时长信息的消息发送给终端A;Step 402: After receiving the monitoring instruction of the terminal A, the locking program of the terminal B controls the monitoring instruction. Parsing and legitimacy judgment, if the instruction is legal, send a message containing the list of applications installed by the machine, the application state, the currently running application, and the running time information of the running application to the terminal A;
步骤403:终端A的监控程序收到终端B的反馈后,对收到的消息进行解析并进行合法性判断,如果合法,将结果显示给所述用户;当所述用户确定终端B当前执行的应用程序不符合规定时,通过终端A的监控程序向终端B发送告警消息或强制结束并锁定当前应用程序的指令;Step 403: After receiving the feedback of the terminal B, the monitoring program of the terminal A parses the received message and performs legality judgment. If it is legal, the result is displayed to the user; when the user determines that the terminal B is currently executing. When the application does not meet the requirements, the terminal A's monitoring program sends an alarm message to the terminal B or forcibly ends and locks the current application's instruction;
这里,所述用户通过查看终端B的反馈结果,可以了解终端B上的应用程序的运行情况;当发现终端B当前执行的应用不符合规定,例如当前正在运行一款游戏的应用程序,且运行超过1小时,则所述用户可以向终端B发送一个告警消息或者直接发送强制结束并锁定当前应用程序的指令。Here, the user can know the running status of the application on the terminal B by checking the feedback result of the terminal B; when the application currently executed by the terminal B is found to be out of compliance, for example, an application currently running a game, and running For more than one hour, the user can send an alert message to terminal B or directly send an instruction to force the end and lock the current application.
步骤404:终端B收到终端A的指令后,对收到的指令进行解析并进行合法性验证,如果合法,则按照指令信息执行,之后执行步骤405;Step 404: After receiving the instruction of the terminal A, the terminal B parses the received command and performs legality verification. If it is legal, it executes according to the instruction information, and then step 405 is performed;
这里,如果收到终端A的告警消息,则强制弹出消息显示给终端B的用户。如果收到终端A的强制结束并锁定的指令,则强制结束并锁定当前正在运行的应用程序;当前正在运行的应用程序被锁定后,在未解锁之前不能再被运行。Here, if the alarm message of the terminal A is received, the pop-up message is forcibly displayed to the user of the terminal B. If the command of forced termination and locking of terminal A is received, the currently running application is forcibly terminated and locked; after the currently running application is locked, it cannot be run until it is unlocked.
步骤405:终端A的监控程序向终端B发送解除锁定的指令;Step 405: The monitoring program of the terminal A sends an instruction to release the lock to the terminal B.
这里,当应用程序被锁定后,且终端A的用户和终端B的用户经过充分沟通,终端A的用户认为可以解锁终端B锁定的应用程序时,终端A的用户可以登录终端A的监控程序,通过终端A的监控程序向终端B发送解除锁定的指令。Here, when the application is locked, and the user of the terminal A and the user of the terminal B are fully communicated, and the user of the terminal A thinks that the application locked by the terminal B can be unlocked, the user of the terminal A can log in to the monitoring program of the terminal A. The instruction to unlock is transmitted to the terminal B through the monitoring program of the terminal A.
步骤406:终端B的锁定程序收到终端A的解除锁定指令后,对收到的指令进行解析并进行合法性判定,如果合法,则将收到的指令中要求解 除锁定的应用程序进行解除锁定处理,并结束当前处理流程。Step 406: After receiving the unlocking instruction of the terminal A, the locking program of the terminal B parses the received command and determines the legality. If it is legal, the program will request the solution. The locked application is unlocked and the current processing flow ends.
这里,被锁定的应用程序解除锁定后,可以正常运行。Here, after the locked application is unlocked, it can run normally.
实际应用时,如图5所示,终端A包含一个监控程序单元,所述监控程序单元包括:In practical application, as shown in FIG. 5, the terminal A includes a monitoring program unit, and the monitoring program unit includes:
鉴权模块:配置为终端A用户的身份校验;Authentication module: configured as the identity verification of the terminal A user;
通信模块:配置为与终端B进行通信;Communication module: configured to communicate with terminal B;
信息处理模块:配置为控制指令的生成和封装,警告消息的生成和封装,终端B反馈信息的解析等;Information processing module: configured to control generation and encapsulation of instructions, generation and encapsulation of warning messages, analysis of feedback information of terminal B, etc.;
判断模块:配置为对来自终端B的反馈信息的合法性判断;Judging module: configured to judge the legality of the feedback information from the terminal B;
显示模块:配置为监控程序的人机交互显示;Display module: a human-computer interaction display configured as a monitor program;
设置模块:配置为用户信息的设定,被监控终端的设定等;Setting module: configured as the setting of user information, setting of the monitored terminal, etc.;
存储模块:配置为用户设定信息的存储,查询结果的存储,程序运行中各种状态和数据的保存等。Storage module: configured to store user-set information, store query results, save various states and data during program operation, and so on.
终端B包含一个锁定程序单元,所述锁定程序单元包括:Terminal B includes a lock program unit, and the lock program unit includes:
鉴权模块:配置为终端A用户的身份校验;Authentication module: configured as the identity verification of the terminal A user;
通信模块:配置为与终端A进行通信;Communication module: configured to communicate with terminal A;
信息处理模块:配置为对收到的终端A的控制指令的解析,警告消息的解析,终端B反馈信息的生成和封装等;The information processing module is configured to parse the received control command of the terminal A, parse the warning message, generate and encapsulate the feedback information of the terminal B, and the like;
判断模块:配置为对来自终端A的控制指令的合法性判断;Judging module: configured to judge the legality of the control command from the terminal A;
显示模块:配置为锁定程序的人机交互显示;Display module: a human-computer interaction display configured to lock the program;
设置模块:配置为用户信息的设定,监控终端的信息设定、指令匹配密码的设定等;Setting module: configured as user information setting, monitoring terminal information setting, command matching password setting, etc.;
存储模块:配置为用户设定信息的存储,监控绑定状态存储,程序运行中各种状态和数据的保存等。Storage module: configured to store user-set information, monitor binding state storage, save various states and data during program operation, and so on.
本实施例提供的方案,使得终端A可以随时了解终端B上应用程序的 使用情况,当终端B当前执行的应用程序不符合终端A的要求时,终端A可以随时警告并终止终端B正在执行的应用程序,从而使得家长对小孩的监控得到保证,以降低家长对于小孩使用智能终端的担忧。The solution provided in this embodiment enables the terminal A to know the application on the terminal B at any time. In use, when the application currently executed by terminal B does not meet the requirements of terminal A, terminal A can warn and terminate the application being executed by terminal B at any time, so that the monitoring of the child is guaranteed to reduce the parent's use for the child. Concerns about smart terminals.
实施例五Embodiment 5
基于实施例一提供的方法,本实施例提供一种终端,如图6所示,该终端包括:获取单元61及发送单元62;其中,The present embodiment provides a terminal, as shown in FIG. 6, the terminal includes: an obtaining unit 61 and a sending unit 62;
所述获取单元61,配置为获取被监控终端上应用程序的相关信息;The obtaining unit 61 is configured to acquire related information of an application on the monitored terminal;
所述发送单元62,配置为根据获取的所述相关信息,确定需要锁定所述被监控终端上当前运行的相应应用程序时,向所述被监控终端发送锁定所述相应应用程序的指令;所述锁定所述相应应用程序的指令用于所述被监控终端锁定所述相应应用程序。The sending unit 62 is configured to, according to the obtained related information, determine, when the corresponding application currently running on the monitored terminal needs to be locked, send an instruction to lock the corresponding application to the monitored terminal; The instruction to lock the corresponding application is used by the monitored terminal to lock the corresponding application.
其中,所述获取单元61还可以包括:第一发送模块及第一接收模块;其中,The obtaining unit 61 may further include: a first sending module and a first receiving module; wherein
所述第一发送模块,配置为向所述被监控终端发送监控指令;The first sending module is configured to send a monitoring instruction to the monitored terminal;
所述第一接收模块,配置为接收所述被监控终端反馈的所述被监控终端上应用程序的相关信息。The first receiving module is configured to receive related information of an application on the monitored terminal fed back by the monitored terminal.
这里,所述相关信息可以包括:所述被监控终端安装的应用程序列表、应用状态、当前正在运行的应用程序、以及正在运行的应用程序的运行时长信息等。Here, the related information may include: an application list installed by the monitored terminal, an application state, an application currently running, and running time information of the running application, and the like.
所述相关信息可以是所述被监控终端上当前所有的应用程序的相关信息,也可以是所述被监控终端上当前部分应用程序的相关信息;实际应用时,可以根据需要来确定是当前所有的应用程序还是部分应用程序的相关信息。The related information may be related information of all currently used applications on the monitored terminal, or may be related information of a current part of the application on the monitored terminal; in actual application, it may be determined according to needs. The application is also information about some applications.
该终端还可以包括:设定单元,配置为设定对所述被监控终端的监控;The terminal may further include: a setting unit configured to set monitoring of the monitored terminal;
其中,所述设定单元还可以包括:第二发送模块、第二接收模块及确 定模块;其中,The setting unit may further include: a second sending module, a second receiving module, and Fixed module; among them,
所述第二发送模块,配置为向所述被监控终端发送包含自身所在终端标识信息及匹配指令密码的匹配指令;The second sending module is configured to send, to the monitored terminal, a matching command including the terminal identification information of the terminal and the matching instruction password;
所述第二接收模块,配置为接收所述被监控终端确定接收的匹配指令合法后反馈的包含所述被监控终端标识信息及指令匹配密码的匹配指令;The second receiving module is configured to receive, after the monitored terminal determines that the received matching command is legal, the matching instruction that includes the monitored terminal identification information and the command matching password;
所述确定模块,配置为根据自身保存的所述被监控终端标识信息及指令匹配密码确定接收的匹配指令合法,并设置监控绑定标识。The determining module is configured to determine, according to the monitored terminal identification information and the instruction matching password saved by itself, that the received matching instruction is legal, and set the monitoring binding identifier.
这里,所述标识信息可以为MSISDN;所述设置监控绑定标识表示对所述被监控终端进行了监控,实际应用时,可以设置监控绑定标识为True。Here, the identification information may be an MSISDN; the setting monitoring binding identifier indicates that the monitored terminal is monitored, and in actual application, the monitoring binding identifier may be set to True.
所述确定需要锁定所述被监控终端上当前运行的相应应用程序是指:所述发送单元62收到用户锁定所述相应应用程序的指令。The determining that the corresponding application currently running on the monitored terminal needs to be locked refers to: the sending unit 62 receives an instruction that the user locks the corresponding application.
所述发送单元62,还配置为确定需要对所述被监控终端上锁定的应用程序进行解锁时,向所述被监控终端发送解锁指令;所述解锁指令用于所述被监控终端解锁对应的应用程序。The sending unit 62 is further configured to: when it is determined that the application locked on the monitored terminal needs to be unlocked, send an unlocking instruction to the monitored terminal; and the unlocking instruction is used to unlock the corresponding monitored terminal. application.
这里,所述确定需要对所述被监控终端上锁定的应用程序进行解锁是指:所述发送单元62收到所述用户的解锁指令。Here, the determining that the application locked on the monitored terminal needs to be unlocked means that the sending unit 62 receives the unlocking instruction of the user.
所述发送单元62,还配置为确定需要对所述被监控终端上当前运行的相应应用程序进行告警时,向所述被监控终端发送告警指令;所述告警指令用于所述被监控终端对对应的应用程序进行告警。The sending unit 62 is further configured to: when it is determined that the corresponding application currently running on the monitored terminal needs to be alerted, send an alarm instruction to the monitored terminal; the alarm instruction is used by the monitored terminal. The corresponding application performs an alarm.
其中,所述确定需要对所述被监控终端上当前运行的相应应用程序进行告警是指:所述发送单元62收到所述用户的告警指令。The determining that the alarm needs to be performed on the corresponding application currently running on the monitored terminal means that the sending unit 62 receives the alarm instruction of the user.
实际应用时,所述被监控终端的个数可以为一个以上,换句话说,可以对多个所述被监控终端上进行控制;当所述被监控终端的个数为两个以上时,分别对每个所述被监控终端执行上述的操作。In actual application, the number of the monitored terminals may be one or more. In other words, the plurality of the monitored terminals may be controlled; when the number of the monitored terminals is two or more, respectively The above operations are performed for each of the monitored terminals.
实际应用时,所述获取单元61及所述设定单元可由终端中的中央处理 器(CPU,Central Processing Unit)、数字信号处理器(DSP,Digital Signal Processor)或可编程逻辑阵列(FPGA,Field-Programmable Gate Array)结合收发机实现;所述发送单元62可由终端中的CPU、DSP或FPGA结合接收机实现;所述第一发送模块及所述第二发送模块可由终端中的发射机实现,所述第一接收模块及所述第二接收模块可由终端中的接收机实现;所述确定模块可由终端中的CPU、DSP或FPGA实现。In actual application, the obtaining unit 61 and the setting unit may be processed by a central unit in the terminal. (CPU, Central Processing Unit), Digital Signal Processor (DSP), or Field-Programmable Gate Array (FPGA) is implemented in conjunction with a transceiver; the transmitting unit 62 can be implemented by a CPU in the terminal, The DSP or the FPGA is implemented in combination with the receiver; the first sending module and the second sending module may be implemented by a transmitter in the terminal, and the first receiving module and the second receiving module may be implemented by a receiver in the terminal; The determining module can be implemented by a CPU, a DSP or an FPGA in the terminal.
本发明实施例提供的终端,所述获取单元61获取被监控终端上应用程序的相关信息;所述发送单元62根据获取的所述相关信息,确定需要锁定所述被监控终端上当前运行的相应应用程序时,向所述被监控终端发送锁定所述相应应用程序的指令,以使所述被监控终端根据收到的锁定所述相应应用程序的指令锁定所述相应应用程序,如此,能实时对所述被监控终端上运行的应用程序进行监控,并能随时控制正在使用的应用程序。According to the terminal provided by the embodiment of the present invention, the acquiring unit 61 acquires related information of the application program on the monitored terminal, and the sending unit 62 determines, according to the obtained related information, that the corresponding operation on the monitored terminal needs to be locked. And an instruction to lock the corresponding application to the monitored terminal, so that the monitored terminal locks the corresponding application according to the received instruction for locking the corresponding application, so that the real-time application can be The application running on the monitored terminal is monitored, and the application being used can be controlled at any time.
确定需要对所述被监控终端上锁定的应用程序进行解锁时,所述发送单元62向所述被监控终端发送解锁指令,以使所述被监控终端根据收到的解锁指令解锁对应的应用程序;另外,确定需要对所述被监控终端上当前运行的相应应用程序进行告警时,所述发送单元62向所述被监控终端发送告警指令,以使所述被监控终端根据收到的告警指令对对应的应用程序进行告警,如此,能进一步有效地对所述被监控终端上的应用程序进行控制。When it is determined that the application locked on the monitored terminal needs to be unlocked, the sending unit 62 sends an unlocking instruction to the monitored terminal, so that the monitored terminal unlocks the corresponding application according to the received unlocking instruction. In addition, when it is determined that the corresponding application currently running on the monitored terminal needs to be alerted, the sending unit 62 sends an alarm instruction to the monitored terminal, so that the monitored terminal according to the received alarm instruction The corresponding application is alerted, and thus, the application on the monitored terminal can be further effectively controlled.
实施例六Embodiment 6
为实现实施例二的方法,本实施例提供一种锁定终端应用的系统,如图7所示,该系统包括:第一终端71及第二终端72;其中,To implement the method of the second embodiment, the embodiment provides a system for locking a terminal application. As shown in FIG. 7, the system includes: a first terminal 71 and a second terminal 72;
所述第一终端71,配置为获取所述第二终端72上应用程序的相关信息;并根据获取的所述相关信息,确定需要锁定所述第二终端72上当前运行的相应应用程序时,向所述第二终端72发送锁定所述相应应用程序的指令;The first terminal 71 is configured to acquire related information of the application on the second terminal 72, and determine, according to the obtained related information, that the corresponding application currently running on the second terminal 72 needs to be locked, Sending an instruction to the second terminal 72 to lock the corresponding application;
所述第二终端72,配置为根据收到的锁定所述相应应用程序的指令锁 定所述相应应用程序。The second terminal 72 is configured to lock according to the received instruction lock for the corresponding application The corresponding application is determined.
这里,实际应用时,现有所述第一终端71的获取单元获取所述第二终端72上应用程序的相关信息;再由所述第一终端71的发送单元根据获取的所述相关信息,确定需要锁定所述第二终端72上当前运行的相应应用程序时,向所述第二终端72发送锁定所述相应应用程序的指令。Here, in an actual application, the acquiring unit of the first terminal 71 obtains related information of the application on the second terminal 72; and the sending unit of the first terminal 71 further obtains the related information according to the acquired information. When it is determined that the corresponding application currently running on the second terminal 72 needs to be locked, an instruction to lock the corresponding application is sent to the second terminal 72.
其中,所述第一终端71,具体配置为向所述第二终端72发送监控指令;并接收所述第二终端72反馈的所述相关信息;The first terminal 71 is specifically configured to send a monitoring instruction to the second terminal 72, and receive the related information that is fed back by the second terminal 72.
所述第二终端72,配置为确定收到的监控指令合法时,向所述第一终端71反馈自身应用程序的相关信息。The second terminal 72 is configured to: when it is determined that the received monitoring instruction is legal, feed back information about the application of the application to the first terminal 71.
这里,所述相关信息可以包括:所述第二终端72安装的应用程序列表、应用状态、当前正在运行的应用程序、以及正在运行的应用程序的运行时长信息等。Here, the related information may include: an application list installed by the second terminal 72, an application state, an application currently running, and running time information of the running application, and the like.
所述相关信息可以是所述第二终端72上当前所有的应用程序的相关信息,也可以是所述第二终端72上当前部分应用程序的相关信息;实际应用时,可以根据需要来确定是当前所有的应用程序还是部分应用程序的相关信息。The related information may be related information of all currently used applications on the second terminal 72, or may be related information of the current part of the application on the second terminal 72. In actual application, it may be determined according to needs. All current applications are also information about some applications.
实际应用时,可由所述获取单元的第一发送模块向所述第二终端72发送监控指令;并由所述获取单元的第一接收模块接收所述第二终端72反馈的所述相关信息。In a practical application, the first transmitting module of the acquiring unit may send a monitoring instruction to the second terminal 72; and the first receiving module of the acquiring unit may receive the related information fed back by the second terminal 72.
所述第一终端71,还配置为设定对所述第二终端72的监控;The first terminal 71 is further configured to set monitoring of the second terminal 72;
其中,所述第一终端71,具体配置为:向所述第二终端72发送包含自身标识信息及匹配指令密码的匹配指令;根据自身保存的所述第二终端72标识信息及指令匹配密码确定接收的匹配指令合法,并设置监控绑定标识;The first terminal 71 is specifically configured to: send a matching command including the self identification information and the matching instruction password to the second terminal 72; and determine, according to the second terminal 72 identification information and the instruction matching password saved by the second terminal 72. The received matching instruction is legal, and the monitoring binding identifier is set;
所述第二终端72,配置为根据自身保存的所述第一终端标识信息及指令匹配密码确定接收的匹配指令合法时,向所述第一终端71反馈包含自身 标识信息及匹配指令密码的匹配指令,并设置监控绑定标识。The second terminal 72 is configured to determine, according to the first terminal identifier information and the command matching password saved by itself, that the received matching command is legal, and feed back to the first terminal 71 The identification information and the matching instruction matching the instruction password are set, and the monitoring binding identifier is set.
这里,所述标识信息可以为MSISDN;所述设置监控绑定标识表示所述第一终端对所述第二终端进行了监控,实际应用时,可以设置监控绑定标识为True。Here, the identification information may be an MSISDN; the setting monitoring binding identifier indicates that the first terminal monitors the second terminal, and when the actual application is used, the monitoring binding identifier may be set to True.
实际应用时,可由所述第一终端71的设定单元设定对所述第二终端72的监控;具体地,先由所述设定单元的第二发送模块向所述第二终端72发送包含自身标识信息及匹配指令密码的匹配指令;接着由所述设定单元的第二接收模块接收所述第二终端72确定接收的匹配指令合法后反馈的包含所述第二终端72标识信息及指令匹配密码的匹配指令;再由所述设定单元的确定模块根据自身保存的所述第二终端72标识信息及指令匹配密码确定接收的匹配指令合法,并设置监控绑定标识。In actual application, the monitoring of the second terminal 72 may be set by the setting unit of the first terminal 71; specifically, the second sending module of the setting unit first sends the second terminal 72 to the second terminal 72. a matching instruction including the self-identification information and the matching instruction password; and then receiving, by the second receiving module of the setting unit, the second terminal 72 determines that the received matching instruction is legal and the feedback includes the identifier information of the second terminal 72 and The instruction matches the matching instruction of the password; and the determining module of the setting unit determines that the received matching instruction is legal according to the second terminal 72 identification information and the instruction matching password saved by the setting unit, and sets the monitoring binding identifier.
所述确定需要锁定所述第二终端上当前运行的相应应用程序是指:收到所述第一终端71的用户锁定所述相应应用程序的指令。The determining that the corresponding application currently running on the second terminal needs to be locked refers to: receiving an instruction that the user of the first terminal 71 locks the corresponding application.
所述第二终端72,还配置为在根据收到的锁定所述相应应用程序的指令锁定所述相应应用程序之前,确定收到的锁定所述相应应用程序的指令合法时,根据收到的锁定所述相应应用程序的指令锁定所述相应应用程序。The second terminal 72 is further configured to: before determining that the received instruction to lock the corresponding application is legal, before receiving the corresponding application according to the received instruction to lock the corresponding application, according to the received An instruction to lock the respective application locks the corresponding application.
其中,所述第二终端72确定收到的锁定所述相应应用程序的指令合法的具体实现与确定匹配指令合法的具体实现完全相同,不再赘述。The specific implementation of the second terminal 72 determining that the received instruction to lock the corresponding application is legal is the same as the specific implementation of determining the legality of the matching instruction, and details are not described herein.
所述第一终端71,还配置为确定需要对所述第二终端72上锁定的应用程序进行解锁时,向所述第二终端72发送解锁指令;The first terminal 71 is further configured to: when it is determined that the application locked on the second terminal 72 needs to be unlocked, send an unlocking instruction to the second terminal 72;
所述第二终端72,还配置为根据收到的解锁指令解锁对应的应用程序。The second terminal 72 is further configured to unlock the corresponding application according to the received unlocking instruction.
其中,确定需要对所述第二终端上锁定的应用程序进行解锁是指:收到所述第一终端71的用户的解锁指令。The determining that the application locked on the second terminal needs to be unlocked refers to: receiving an unlocking instruction of the user of the first terminal 71.
实际应用时,可由所述发送单元确定需要对所述第二终端72上锁定的应用程序进行解锁时,向所述第二终端72发送解锁指令。 In an actual application, when the sending unit determines that the application locked on the second terminal 72 needs to be unlocked, the unlocking instruction is sent to the second terminal 72.
相应地,所述第二终端72,还配置为根据收到的解锁指令解锁对应的应用程序之前,确定收到的解锁指令合法时,根据收到的解锁指令解锁对应的应用程序。Correspondingly, the second terminal 72 is further configured to: before unlocking the corresponding application according to the received unlocking instruction, determine that the received unlocking instruction is legal, and unlock the corresponding application according to the received unlocking instruction.
这里,所述第二终端确定收到的解锁指令合法的具体实现与确定匹配指令合法的具体实现完全相同,不再赘述。Here, the specific implementation of the second terminal determining that the received unlocking instruction is legal is exactly the same as the specific implementation of determining the legality of the matching instruction, and details are not described herein.
所述第一终端71,还配置为确定需要对所述第二终端72上当前运行的相应应用程序进行告警时,向所述第二终端72发送告警指令;The first terminal 71 is further configured to: when it is determined that an alarm is required to be sent to the corresponding application currently running on the second terminal 72, send an alarm instruction to the second terminal 72;
所述第二终端72,还配置为根据收到的告警指令对对应的应用程序进行告警。The second terminal 72 is further configured to perform an alarm on the corresponding application according to the received alarm instruction.
其中,所述第二终端72,还配置为根据收到的告警指令对对应的应用程序进行告警之前,确定收到的告警指令合法时,根据收到的告警指令对对应的应用程序进行告警。The second terminal 72 is further configured to: before the alarm is sent to the corresponding application according to the received alarm instruction, determine that the received alarm instruction is legal, and then alarm the corresponding application according to the received alarm instruction.
这里,所述第二终端72确定收到的告警指令合法的具体实现与确定匹配指令合法的具体实现完全相同,不再赘述。Here, the specific implementation of the second terminal 72 determining that the received alarm instruction is legal is exactly the same as the specific implementation of determining the legality of the matching instruction, and details are not described herein.
实际应用时,可由所述发送单元确定需要对所述第二终端72上当前运行的相应应用程序进行告警时,向所述第二终端72发送告警指令。In an actual application, when the sending unit determines that the corresponding application currently running on the second terminal 72 needs to be alerted, the alarm instruction is sent to the second terminal 72.
实际应用时,所述第二终端72的个数可以为一个以上,换句话说,所述第一终端71可以对多个所述第二终端72上进行控制;当所述第二终端72的个数为两个以上时,所述第一终端71分别对每个所述第二终端72执行上述的操作。In actual application, the number of the second terminals 72 may be one or more. In other words, the first terminal 71 may control multiple second terminals 72; when the second terminal 72 When the number is two or more, the first terminal 71 performs the above-described operations for each of the second terminals 72, respectively.
本发明实施例提供的锁定终端应用的系统,所述第一终端71获取所述第二终端72上应用程序的相关信息;所述第一终端71根据获取的所述相关信息,确定需要锁定所述第二终端72上当前运行的相应应用程序时,向所述第二终端72发送锁定所述相应应用程序的指令;所述第二终端72根据收到的锁定所述相应应用程序的指令锁定所述相应应用程序,如此,能 实时对所述第二终端72上运行的应用程序进行监控,并能随时控制正在使用的应用程序。The system for locking a terminal application provided by the embodiment of the present invention, the first terminal 71 acquires related information of an application on the second terminal 72; the first terminal 71 determines, according to the acquired related information, that the device needs to be locked. When the corresponding application currently running on the second terminal 72 is described, an instruction to lock the corresponding application is sent to the second terminal 72; the second terminal 72 is locked according to the received instruction to lock the corresponding application. The corresponding application, as such, can The application running on the second terminal 72 is monitored in real time, and the application being used can be controlled at any time.
确定需要对所述第二终端72上锁定的应用程序进行解锁时,所述第一终端71向所述第二终端72发送解锁指令;所述第二终端72根据收到的解锁指令解锁对应的应用程序;另外,确定需要对所述第二终端72上当前运行的相应应用程序进行告警时,所述第一终端71向所述第二终端72发送告警指令;所述第二终端72根据收到的告警指令对对应的应用程序进行告警,如此,能进一步有效地对所述第二终端72上的应用程序进行控制。When it is determined that the application locked on the second terminal 72 needs to be unlocked, the first terminal 71 sends an unlocking instruction to the second terminal 72; the second terminal 72 unlocks the corresponding according to the received unlocking instruction. The first terminal 71 sends an alarm instruction to the second terminal 72; the second terminal 72 receives the alarm when the corresponding application currently running on the second terminal 72 needs to be alerted. The obtained alarm command alerts the corresponding application, and thus, the application on the second terminal 72 can be further effectively controlled.
所述第二终端72对收到的各种指令先进性合法性的判断,如此,能保证收到的指令为有效指令,避免出现错误。The second terminal 72 determines the legitimacy of the advanced instructions received, so that the received command can be guaranteed to be an effective command to avoid errors.
本领域内的技术人员应明白,本发明的实施例可提供为方法、系统、或计算机程序产品。因此,本发明可采用硬件实施例、软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器和光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art will appreciate that embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention can take the form of a hardware embodiment, a software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) including computer usable program code.
本发明是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (system), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or FIG. These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing device to produce a machine for the execution of instructions for execution by a processor of a computer or other programmable data processing device. Means for implementing the functions specified in one or more of the flow or in a block or blocks of the flow chart.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存 储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。The computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the computer is readable and stored The instructions in the reservoir produce an article of manufacture comprising an instruction device that implements the functions specified in one or more blocks of the flow or in a flow or block diagram of the flowchart.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device. The instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
以上所述,仅为本发明的较佳实施例而已,并非用于限定本发明的保护范围。 The above is only the preferred embodiment of the present invention and is not intended to limit the scope of the present invention.

Claims (26)

  1. 一种锁定终端应用的方法,所述方法包括:A method of locking a terminal application, the method comprising:
    第一终端获取第二终端上应用程序的相关信息;The first terminal acquires related information of the application on the second terminal;
    所述第一终端根据获取的所述相关信息,确定需要锁定所述第二终端上当前运行的相应应用程序时,向所述第二终端发送锁定所述相应应用程序的指令;所述锁定所述相应应用程序的指令用于所述第二终端锁定所述相应应用程序。When the first terminal determines that the corresponding application currently running on the second terminal needs to be locked according to the obtained related information, the first terminal sends an instruction for locking the corresponding application to the second terminal; The instructions of the corresponding application are used by the second terminal to lock the corresponding application.
  2. 根据权利要求1所述的方法,其中,所述第一终端获取第二终端上应用程序的相关信息,包括:The method of claim 1, wherein the acquiring, by the first terminal, related information of an application on the second terminal comprises:
    所述第一终端向所述第二终端发送监控指令;The first terminal sends a monitoring instruction to the second terminal;
    所述第一终端接收所述第二终端反馈的所述第二终端上应用程序的相关信息。The first terminal receives related information of an application on the second terminal that is fed back by the second terminal.
  3. 根据权利要求1所述的方法,其中,所述第一终端获取第二终端上应用程序的相关信息之前,所述方法还包括:The method according to claim 1, wherein before the first terminal acquires related information of the application on the second terminal, the method further includes:
    所述第一终端设定对所述第二终端的监控。The first terminal sets monitoring of the second terminal.
  4. 根据权利要求3所述的方法,其中,所述第一终端设定对所述第二终端的监控,包括:The method according to claim 3, wherein the first terminal sets monitoring of the second terminal, including:
    所述第一终端向所述第二终端发送包含自身标识信息及匹配指令密码的匹配指令;Transmitting, by the first terminal, a matching instruction including the self identification information and the matching instruction password to the second terminal;
    所述第一终端接收所述第二终端确定接收的匹配指令合法后反馈的包含所述第二终端标识信息及指令匹配密码的匹配指令;Receiving, by the first terminal, a matching instruction that includes the second terminal identification information and an instruction matching password that is fed back after the second terminal determines that the received matching instruction is legal;
    所述第一终端根据自身保存的所述第二终端标识信息及指令匹配密码确定接收的匹配指令合法,并设置监控绑定标识。The first terminal determines that the received matching instruction is legal according to the second terminal identification information and the instruction matching password saved by the first terminal, and sets a monitoring binding identifier.
  5. 根据权利要求1所述的方法,其中,所述方法还包括:The method of claim 1 wherein the method further comprises:
    确定需要对所述第二终端上锁定的应用程序进行解锁时,所述第一终 端向所述第二终端发送解锁指令;所述解锁指令用于所述第二终端解锁对应的应用程序。Determining that when the application locked on the second terminal needs to be unlocked, the first end Sending an unlocking instruction to the second terminal; the unlocking instruction is used by the second terminal to unlock the corresponding application.
  6. 根据权利要求1所述的方法,其中,所述方法还包括:The method of claim 1 wherein the method further comprises:
    确定需要对所述第二终端上当前运行的相应应用程序进行告警时,所述第一终端向所述第二终端发送告警指令;所述告警指令用于所述第二终端对对应的应用程序进行告警。When it is determined that the corresponding application currently running on the second terminal needs to be alerted, the first terminal sends an alarm instruction to the second terminal; the alarm instruction is used by the second terminal to the corresponding application. Alert.
  7. 一种锁定终端应用的方法,所述方法包括:A method of locking a terminal application, the method comprising:
    第一终端获取第二终端上应用程序的相关信息;The first terminal acquires related information of the application on the second terminal;
    所述第一终端根据获取的所述相关信息,确定需要锁定所述第二终端上当前运行的相应应用程序时,向所述第二终端发送锁定所述相应应用程序的指令;The first terminal, according to the obtained related information, determines that the corresponding application currently running on the second terminal needs to be locked, and sends an instruction to lock the corresponding application to the second terminal;
    所述第二终端根据收到的锁定所述相应应用程序的指令锁定所述相应应用程序。The second terminal locks the corresponding application according to the received instruction to lock the corresponding application.
  8. 根据权利要求7所述的方法,其中,所述第一终端获取第二终端上应用程序的相关信息,包括:The method of claim 7, wherein the first terminal acquires related information of the application on the second terminal, including:
    所述第一终端向所述第二终端发送监控指令;The first terminal sends a monitoring instruction to the second terminal;
    所述第二终端确定收到的监控指令合法时,向所述第一终端反馈自身应用程序的相关信息。When the second terminal determines that the received monitoring instruction is legal, the second terminal feeds back information about the application of the application to the first terminal.
  9. 根据权利要求7所述的方法,其中,所述第一终端获取第二终端上应用程序的相关信息之前,所述方法还包括:The method according to claim 7, wherein before the first terminal acquires related information of the application on the second terminal, the method further includes:
    所述第一终端设定对所述第二终端的监控。The first terminal sets monitoring of the second terminal.
  10. 根据权利要求9所述的方法,其中,所述第一终端设定对所述第二终端的监控,包括:The method according to claim 9, wherein the first terminal sets monitoring of the second terminal, including:
    所述第一终端向所述第二终端发送包含自身标识信息及匹配指令密码的匹配指令; Transmitting, by the first terminal, a matching instruction including the self identification information and the matching instruction password to the second terminal;
    所述第二终端根据自身保存的所述第一终端标识信息及指令匹配密码确定接收的匹配指令合法时,向所述第一终端反馈包含自身标识信息及匹配指令密码的匹配指令,并设置监控绑定标识;When the second terminal determines that the received matching instruction is legal according to the first terminal identification information and the instruction matching password saved by itself, the second terminal feeds back a matching instruction including the own identification information and the matching instruction password to the first terminal, and sets the monitoring Binding identifier
    所述第一终端根据自身保存的所述第二终端标识信息及指令匹配密码确定接收的匹配指令合法,并设置监控绑定标识。The first terminal determines that the received matching instruction is legal according to the second terminal identification information and the instruction matching password saved by the first terminal, and sets a monitoring binding identifier.
  11. 根据权利要求7所述的方法,其中,所述方法还包括:The method of claim 7 wherein the method further comprises:
    确定需要对所述第二终端上锁定的应用程序进行解锁时,所述第一终端向所述第二终端发送解锁指令;When it is determined that the application locked on the second terminal needs to be unlocked, the first terminal sends an unlocking instruction to the second terminal;
    所述第二终端根据收到的解锁指令解锁对应的应用程序。The second terminal unlocks the corresponding application according to the received unlocking instruction.
  12. 根据权利要求7所述的方法,其中,所述方法还包括:The method of claim 7 wherein the method further comprises:
    确定需要对所述第二终端上当前运行的相应应用程序进行告警时,所述第一终端向所述第二终端发送告警指令;When it is determined that the corresponding application currently running on the second terminal needs to be alerted, the first terminal sends an alarm instruction to the second terminal;
    所述第二终端根据收到的告警指令对对应的应用程序进行告警。The second terminal alerts the corresponding application according to the received alarm instruction.
  13. 一种终端,所述终端包括:获取单元及发送单元;其中,A terminal, the terminal includes: an acquiring unit and a sending unit; wherein
    所述获取单元,配置为获取被监控终端上应用程序的相关信息;The obtaining unit is configured to acquire related information of an application on the monitored terminal;
    所述发送单元,配置为根据获取的所述相关信息,确定需要锁定所述被监控终端上当前运行的相应应用程序时,向所述被监控终端发送锁定所述相应应用程序的指令;所述锁定所述相应应用程序的指令用于所述被监控终端锁定所述相应应用程序。The sending unit is configured to, according to the obtained related information, determine, when the corresponding application currently running on the monitored terminal needs to be locked, send an instruction to lock the corresponding application to the monitored terminal; An instruction to lock the corresponding application is used by the monitored terminal to lock the corresponding application.
  14. 根据权利要求13所述的终端,其中,所述获取单元包括:第一发送模块及第一接收模块;其中,The terminal according to claim 13, wherein the obtaining unit comprises: a first sending module and a first receiving module; wherein
    所述第一发送模块,配置为向所述被监控终端发送监控指令;The first sending module is configured to send a monitoring instruction to the monitored terminal;
    所述第一接收模块,配置为接收所述被监控终端反馈的所述被监控终端上应用程序的相关信息。The first receiving module is configured to receive related information of an application on the monitored terminal fed back by the monitored terminal.
  15. 根据权利要求13所述的终端,其中,所述终端还包括设定单元, 配置为设定对所述被监控终端的监控。The terminal according to claim 13, wherein the terminal further comprises a setting unit, It is configured to set monitoring of the monitored terminal.
  16. 根据权利要求15所述的终端,其中,所述设定单元包括:第二发送模块、第二接收模块及确定模块;其中,The terminal according to claim 15, wherein the setting unit comprises: a second sending module, a second receiving module, and a determining module; wherein
    所述第二发送模块,配置为向所述被监控终端发送包含自身所在终端标识信息及匹配指令密码的匹配指令;The second sending module is configured to send, to the monitored terminal, a matching command including the terminal identification information of the terminal and the matching instruction password;
    所述第二接收模块,配置为接收所述被监控终端确定接收的匹配指令合法后反馈的包含所述被监控终端标识信息及指令匹配密码的匹配指令;The second receiving module is configured to receive, after the monitored terminal determines that the received matching command is legal, the matching instruction that includes the monitored terminal identification information and the command matching password;
    所述确定模块,配置为根据自身保存的所述被监控终端标识信息及指令匹配密码确定接收的匹配指令合法,并设置监控绑定标识。The determining module is configured to determine, according to the monitored terminal identification information and the instruction matching password saved by itself, that the received matching instruction is legal, and set the monitoring binding identifier.
  17. 根据权利要求13所述的终端,其中,所述发送单元,还配置为确定需要对所述被监控终端上锁定的应用程序进行解锁时,向所述被监控终端发送解锁指令;所述解锁指令配置为所述被监控终端解锁对应的应用程序。The terminal according to claim 13, wherein the sending unit is further configured to: when it is determined that an application locked on the monitored terminal needs to be unlocked, send an unlocking instruction to the monitored terminal; The configuration is to unlock the corresponding application for the monitored terminal.
  18. 根据权利要求13所述的终端,其中,所述发送单元,还配置为确定需要对所述被监控终端上当前运行的相应应用程序进行告警时,向所述被监控终端发送告警指令;所述告警指令用于所述被监控终端对对应的应用程序进行告警。The terminal according to claim 13, wherein the sending unit is further configured to: when it is determined that an alarm is required to be performed on a corresponding application currently running on the monitored terminal, send an alarm instruction to the monitored terminal; The alarm instruction is used by the monitored terminal to alert the corresponding application.
  19. 一种锁定终端应用的系统,所述系统包括:第一终端及第二终端;其中,A system for locking a terminal application, the system comprising: a first terminal and a second terminal; wherein
    所述第一终端,配置为获取所述第二终端上应用程序的相关信息;并根据获取的所述相关信息,确定需要锁定所述第二终端上当前运行的相应应用程序时,向所述第二终端发送锁定所述相应应用程序的指令;The first terminal is configured to acquire related information of the application on the second terminal, and determine, according to the obtained related information, that the corresponding application currently running on the second terminal needs to be locked, to the The second terminal sends an instruction to lock the corresponding application;
    所述第二终端,配置为根据收到的锁定所述相应应用程序的指令锁定所述相应应用程序。The second terminal is configured to lock the corresponding application according to the received instruction to lock the corresponding application.
  20. 根据权利要求19所述的系统,其中,所述第一终端,配置为向所 述第二终端发送监控指令;并接收所述第二终端反馈的所述相关信息;The system of claim 19, wherein the first terminal is configured to be located The second terminal sends a monitoring instruction; and receives the related information fed back by the second terminal;
    所述第二终端,配置为确定收到的监控指令合法时,向所述第一终端反馈自身当应用程序的相关信息。The second terminal is configured to: when it is determined that the received monitoring instruction is legal, feed back the related information of the application to the first terminal.
  21. 根据权利要求19所述的系统,其中,所述第一终端,还配置为设定对所述第二终端的监控。The system of claim 19, wherein the first terminal is further configured to set monitoring of the second terminal.
  22. 根据权利要求21所述的系统,其中,所述第一终端,配置为:向所述第二终端发送包含自身标识信息及匹配指令密码的匹配指令;根据自身保存的所述第二终端标识信息及指令匹配密码确定接收的匹配指令合法,并设置监控绑定标识;The system according to claim 21, wherein the first terminal is configured to: send a matching instruction including the self identification information and the matching instruction password to the second terminal; and the second terminal identification information saved according to the second terminal And the instruction matching password determines that the received matching instruction is legal, and sets a monitoring binding identifier;
    所述第二终端,配置为根据自身保存的所述第一终端标识信息及指令匹配密码确定接收的匹配指令合法时,向所述第一终端反馈包含自身标识信息及匹配指令密码的匹配指令,并设置监控绑定标识。The second terminal is configured to: when the first terminal identifier information and the command matching password saved by the first terminal are configured to determine that the received matching command is legal, feed the matching command including the self identification information and the matching instruction password to the first terminal, And set the monitoring binding ID.
  23. 根据权利要求19所述的系统,其中,所述第一终端,还配置为确定需要对所述第二终端上锁定的应用程序进行解锁时,向所述第二终端发送解锁指令;The system of claim 19, wherein the first terminal is further configured to: when it is determined that the application locked on the second terminal needs to be unlocked, send an unlocking instruction to the second terminal;
    所述第二终端,还配置为根据收到的解锁指令解锁对应的应用程序。The second terminal is further configured to unlock the corresponding application according to the received unlocking instruction.
  24. 根据权利要求19所述的系统,其中,所述第一终端,还配置为确定需要对所述第二终端上当前运行的相应应用程序进行告警时,向所述第二终端发送告警指令;The system according to claim 19, wherein the first terminal is further configured to: when it is determined that an alarm is required to be performed on a corresponding application currently running on the second terminal, send an alarm instruction to the second terminal;
    所述第二终端,还配置为根据收到的告警指令对对应的应用程序进行告警。The second terminal is further configured to perform an alarm on the corresponding application according to the received alarm instruction.
  25. 根据权利要求19所述的系统,其中,所述第二终端的个数为一个以上。The system of claim 19, wherein the number of the second terminals is one or more.
  26. 一种计算机存储介质,所述计算机存储介质包括一组指令,当执行所述指令时,引起至少一个处理器执行如权利要求1至6任一项所述的 锁定终端应用的方法。 A computer storage medium comprising a set of instructions that, when executed, cause at least one processor to perform the method of any one of claims 1 to The method of locking the terminal application.
PCT/CN2014/089078 2014-08-13 2014-10-21 Terminal application locking method, system, terminal and computer storage medium WO2016023269A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410397810.5A CN105334970A (en) 2014-08-13 2014-08-13 Terminal application locking method and system as well as terminal
CN201410397810.5 2014-08-13

Publications (1)

Publication Number Publication Date
WO2016023269A1 true WO2016023269A1 (en) 2016-02-18

Family

ID=55285569

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/089078 WO2016023269A1 (en) 2014-08-13 2014-10-21 Terminal application locking method, system, terminal and computer storage medium

Country Status (2)

Country Link
CN (1) CN105334970A (en)
WO (1) WO2016023269A1 (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108234586A (en) * 2016-12-22 2018-06-29 深圳市中兴微电子技术有限公司 Control method, first terminal, second terminal, server and the system of terminal
CN107197091A (en) * 2017-05-19 2017-09-22 广东小天才科技有限公司 Terminal control method, device, terminal device and computer-readable recording medium
CN107729741A (en) * 2017-09-07 2018-02-23 努比亚技术有限公司 A kind of control method of application program, terminal and computer-readable recording medium
CN109788460A (en) * 2017-11-14 2019-05-21 中兴通讯股份有限公司 Terminal cooperation operation method and device
CN108491700A (en) * 2018-03-20 2018-09-04 北京小米移动软件有限公司 Intelligent terminal control method, device and computer readable storage medium
CN109147276A (en) * 2018-10-29 2019-01-04 麒麟合盛网络技术股份有限公司 monitoring method and device
CN111597090A (en) * 2020-05-18 2020-08-28 闻泰通讯股份有限公司 Behavior monitoring method and device, electronic equipment and storage medium
CN114070659B (en) * 2021-10-29 2023-11-17 深圳市优必选科技股份有限公司 Equipment locking method and device and terminal equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103078954A (en) * 2013-01-28 2013-05-01 广东欧珀移动通信有限公司 Remote monitoring method of mobile terminal, mobile terminal and control terminal
CN103237064A (en) * 2013-04-11 2013-08-07 百度在线网络技术(北京)有限公司 Terminals, and method, system and cloud server for remote locking of terminals
CN103905492A (en) * 2012-12-27 2014-07-02 鸿富锦精密工业(深圳)有限公司 Electronic-device remote-control system and method
US20140188256A1 (en) * 2012-12-28 2014-07-03 Hon Hai Precision Industry Co., Ltd. Communication device and method for controlling electronic devices

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103905492A (en) * 2012-12-27 2014-07-02 鸿富锦精密工业(深圳)有限公司 Electronic-device remote-control system and method
US20140188256A1 (en) * 2012-12-28 2014-07-03 Hon Hai Precision Industry Co., Ltd. Communication device and method for controlling electronic devices
CN103078954A (en) * 2013-01-28 2013-05-01 广东欧珀移动通信有限公司 Remote monitoring method of mobile terminal, mobile terminal and control terminal
CN103237064A (en) * 2013-04-11 2013-08-07 百度在线网络技术(北京)有限公司 Terminals, and method, system and cloud server for remote locking of terminals

Also Published As

Publication number Publication date
CN105334970A (en) 2016-02-17

Similar Documents

Publication Publication Date Title
WO2016023269A1 (en) Terminal application locking method, system, terminal and computer storage medium
CN103577237B (en) The control method and device of application program launching
US11128750B1 (en) Methods and devices for secure authentication to a compute device
US10034316B2 (en) Multi-device pairing and provisioning
CN109905312B (en) Message pushing method, device and system
US8683226B2 (en) Automatic provisioning in mobile to mobile platforms
US9503903B2 (en) Server and method for remotely controlling working of communications terminal, and communications terminal
US9078135B2 (en) Mobile device password reset
CN106341834A (en) Internet-of-things device configuration method, Internet-of-things device configuration apparatus, Internet-of-things device configuration system and Internet-of-things device
US20170223539A1 (en) Authentication method, wireless router and computer storage medium
CN110175448B (en) Trusted device login authentication method and application system with authentication function
CN110727938B (en) Configuration method and device of intelligent equipment, electronic equipment and storage medium
MX2015014587A (en) Method and system for activating credentials.
CN105704178A (en) Task platform access method and task platform access device
WO2014086222A1 (en) Method and apparatus for setting video call parameters and sending capability parameters
KR20230110613A (en) Virtual key sharing system and method
WO2015127773A1 (en) Method and system for sending information by terminal
CN109495344B (en) Debugging method, device and equipment of test equipment and storage medium
CN104994115A (en) Login authentication method and system
WO2015154591A1 (en) Method and device for acquiring after-sale fault information about mobile terminal
CN102685090A (en) System login method
CN105530358A (en) Bluetooth watch encryption method based on mobile terminal and Bluetooth watch
CN109960536B (en) Electronic equipment safety starting method and device and electronic equipment
CN110069922B (en) System interface hijacking detection method and device and terminal
JP2008108084A (en) Logon authentication system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14899630

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14899630

Country of ref document: EP

Kind code of ref document: A1