CN105592146A - Equipment control method, device and terminal - Google Patents
Equipment control method, device and terminal Download PDFInfo
- Publication number
- CN105592146A CN105592146A CN201510946094.6A CN201510946094A CN105592146A CN 105592146 A CN105592146 A CN 105592146A CN 201510946094 A CN201510946094 A CN 201510946094A CN 105592146 A CN105592146 A CN 105592146A
- Authority
- CN
- China
- Prior art keywords
- terminal
- target
- control instruction
- account
- control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 83
- 238000000605 extraction Methods 0.000 claims description 23
- 238000001514 detection method Methods 0.000 claims description 10
- 230000004913 activation Effects 0.000 claims description 3
- 230000000875 corresponding effect Effects 0.000 description 94
- 230000001276 controlling effect Effects 0.000 description 33
- 238000010586 diagram Methods 0.000 description 24
- 238000004891 communication Methods 0.000 description 14
- 238000012545 processing Methods 0.000 description 13
- 238000005516 engineering process Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 230000009471 action Effects 0.000 description 4
- 230000002596 correlated effect Effects 0.000 description 4
- 230000037430 deletion Effects 0.000 description 4
- 239000000284 extract Substances 0.000 description 4
- 238000007726 management method Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 3
- 238000012217 deletion Methods 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 201000001098 delayed sleep phase syndrome Diseases 0.000 description 1
- 208000033921 delayed sleep phase type circadian rhythm sleep disease Diseases 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses an equipment control method, a device and a terminal. The equipment control method comprises the steps of receiving a control request sent from a first terminal to a second terminal; detecting whether the first terminal is associated with the second terminal or not; when the first terminal and the second terminal are associated with each other, sending a control instruction to the second terminal. Based on the method, the condition that a user sends the control instruction to a control target by means of any terminal so as to remotely control the second terminal can be avoided. Therefore, the remote control reliability of the second terminal is effectively protected. Meanwhile, the control security of the second terminal is improved.
Description
Technical Field
The present disclosure relates to the technical field of device control, and in particular, to a device control method, apparatus and terminal.
Background
With the rapid development of mobile communication technology, information processing technology and integrated circuit technology, the existing mobile terminal has a strong function date, and besides the most basic functions of voice call and short message, more and more applications are migrated to the mobile terminal, so that the mobile terminal has more and more strong functions, and the mobile terminal plays an increasingly important role in the daily life of people.
However, with the wide application of mobile terminals, the information security in the mobile terminal is widely concerned by users, for example, bank information, network payment platform, and other important information such as address book, photo, or short message stored in the mobile terminal of the user are concerned by people in the current social environment focusing on privacy and information security. In the related art, a mobile terminal generally achieves the purpose of starting up or entering a terminal interface by inputting a password, and because the mobile terminal generally has a corresponding automatic protection function, if the mobile terminal cannot be unlocked even after the password is input for many times, the mobile terminal is automatically locked by the automatic protection function, so that a user or other people cannot acquire any information in the mobile terminal.
Because important information such as an address book, important pictures, important short messages, bank card information and the like can be stored in the mobile terminal, once the mobile terminal is lost or stolen, the mobile terminal can be obtained by partial terminal picking-up persons or thieves through unlocking or other operations of the mobile terminal, privacy and other information safety of a user can be revealed, and therefore economic loss, reputation loss or other serious influences and injuries and the like can be caused to the user.
Invention content information
In order to overcome the problems in the related art, the present disclosure provides a device control method, apparatus and terminal.
According to a first aspect of embodiments of the present disclosure, there is provided an apparatus control method including:
receiving a control request for a second terminal sent by a first terminal;
detecting whether the first terminal is associated with the second terminal;
and when the first terminal is associated with the second terminal, sending a control instruction to the second terminal.
By applying the device control method of the first aspect, the situation that a user can send a control instruction to a control target through any terminal and carry out remote control on the second terminal is effectively avoided, so that the reliability of the remote control second terminal is effectively protected, and the safety of the control on the second terminal is improved.
With reference to the first aspect, in a first possible implementation manner of the first aspect, the detecting whether the first terminal and the second terminal are associated with each other includes:
when the control request is received, extracting an account of the first terminal;
judging whether the account of the first terminal is a target account, wherein the target account is the same as the login account of the second terminal, or the target account is the same as the associated account of the login account of the second terminal;
and when the account of the first terminal is a target account, determining the association between the first terminal and the second terminal.
With reference to the first aspect, in a second possible implementation manner of the first aspect, the sending a control instruction to the second terminal includes:
searching a preset loss control type corresponding to the second terminal;
generating a loss control instruction corresponding to the preset loss control type;
and sending the generated loss control instruction to the second terminal.
With reference to the first aspect, in a third possible implementation manner of the first aspect, the sending a control instruction to the second terminal includes:
extracting a lost control type in the control request;
generating a loss control instruction corresponding to the extracted loss control type;
and sending the generated loss control instruction to the second terminal.
With reference to the first aspect, in a fourth possible implementation manner of the first aspect, the loss control type includes: and one or any combination of information clearing, machine refreshing authority closing and machine refreshing authority opening.
According to a second aspect of the present disclosure, there is provided a terminal control method, the method including:
the target terminal detects whether a control instruction of the associated terminal is received;
and when the associated terminal is determined to be associated with the target terminal, the target terminal starts a loss protection program according to the control instruction.
By applying the terminal control method provided by the second aspect, important information leakage and property loss in the target terminal or the target terminal is effectively avoided, so that the information safety and property safety of a user are effectively protected, and the safety of the user terminal is improved.
With reference to the second aspect, in a first possible implementation manner of the second aspect, the determining that the associated terminal is associated with the target terminal includes:
when a control instruction of the associated terminal is received, extracting a login account in the control instruction;
judging whether the login account is a target account, wherein the target account is the same as a local login account, or the target account is the same as an account associated with the target terminal login account;
and when the login account is a target account, determining that the associated terminal is associated with the target terminal.
With reference to the second aspect, in a second possible implementation manner of the second aspect, the determining that the associated terminal is associated with the target terminal includes:
when a control instruction of the associated terminal is received, extracting a terminal identifier of the associated terminal;
judging whether the terminal identification is matched with a preset retrieved terminal identification or not;
and when the terminal identification is matched with a preset recovered terminal identification, determining that the associated terminal is associated with the target terminal.
With reference to the second aspect, in a third possible implementation manner of the second aspect, the starting, by the target terminal, a loss protection program according to the control instruction includes:
when the control instruction is an information clearing instruction, searching information stored in a preset position;
deleting the searched information, wherein the information comprises: one or any combination of short messages, call records and address lists.
With reference to the second aspect, in a fourth possible implementation manner of the second aspect, the starting, by the target terminal, a loss protection program according to the control instruction includes:
when the control instruction is a power-on permission closing instruction, searching a permission identifier corresponding to the power-on permission of the system;
and when the authority identifier is the power-on permission opening identifier, changing the authority identifier into a power-on permission closing identifier.
According to a third aspect of the present disclosure, there is provided an apparatus for controlling a device, applied to a server, the apparatus including:
the receiving module is used for receiving a control request for the second terminal, which is sent by the first terminal;
a detection module, configured to detect whether the first terminal and the second terminal are associated with each other when the receiving module receives a control request;
and the sending module is used for sending a control instruction to the second terminal when the detection module detects that the first terminal is associated with the second terminal.
With reference to the third aspect, in a first possible implementation manner of the third aspect, the detecting module includes:
the first extraction submodule is used for extracting the account of the first terminal when the control request is received;
a first judgment sub-module, configured to judge whether the account of the first terminal is a target account when the account of the first terminal is extracted by the first extraction sub-module, where the target account is the same as a login account of the second terminal, or the target account is the same as an associated account of the login account of the second terminal;
and the first determining submodule is used for determining the association between the first terminal and the second terminal when the first judging submodule judges that the account of the first terminal is the target account.
With reference to the third aspect, in a second possible implementation manner of the third aspect, the sending module includes:
the type searching submodule is used for searching a preset loss control type corresponding to the second terminal;
the first generation submodule is used for generating a loss control instruction corresponding to the preset loss control type when the type searching submodule searches the preset loss control type;
and the first sending submodule is used for sending the generated loss control instruction to the second terminal when the first generating submodule generates the loss control instruction.
With reference to the third aspect, in a third possible implementation manner of the third aspect, the sending module includes:
the type extraction submodule is used for extracting the lost control type in the control request;
a second generation submodule, configured to generate, when the loss control type is extracted by the type extraction submodule, a loss control instruction corresponding to the extracted loss control type;
and the second sending submodule is used for sending the generated loss control instruction to the second terminal when the second generating submodule generates the loss control instruction.
With reference to the third aspect, in a fourth possible implementation manner of the third aspect, the loss control type includes: and one or any combination of information clearing, machine refreshing authority closing and machine refreshing authority opening.
According to a fourth aspect of the present disclosure, there is provided an apparatus for controlling a device, applied to a terminal, the apparatus including:
the instruction detection module is used for detecting whether a control instruction of the associated terminal is received by the target terminal;
a determining module, configured to determine whether the associated terminal is associated with the target terminal;
and the starting module is used for starting the loss protection program by the target terminal according to the control instruction when the associated terminal is determined to be associated with the target terminal.
With reference to the fourth aspect, in a first possible implementation manner of the fourth aspect, the starting module includes:
the second extraction submodule is used for extracting the login account in the control instruction when the control instruction of the associated terminal is received;
the second judgment sub-module is used for judging whether the login account is a target account when the login account is extracted by the second extraction sub-module, wherein the target account is the same as the login account of the local computer, or the target account is the same as the account associated with the login account of the target terminal;
and the second determining submodule is used for determining that the associated terminal is associated with the target terminal when the second judging submodule judges that the login account is the target account.
With reference to the fourth aspect, in a second possible implementation manner of the fourth aspect, the starting module includes:
the third extraction submodule is used for extracting the terminal identification of the associated terminal when the control instruction of the associated terminal is received;
the third judgment submodule is used for judging whether the terminal identification is matched with a preset retrieval terminal identification or not when the terminal identification is extracted by the third extraction submodule;
and the third determining submodule is used for determining that the associated terminal is associated with the target terminal when the third judging submodule judges that the terminal identification is matched with the preset retrieved terminal identification.
With reference to the fourth aspect, in a third possible implementation manner of the fourth aspect, the starting module includes:
the information searching submodule is used for searching the information stored in the preset position when the control instruction is an information clearing instruction;
an information deleting submodule, configured to delete the found information when the information searching submodule finds the information stored in the preset location, where the information includes: one or any combination of short messages, call records and address lists.
With reference to the fourth aspect, in a fourth possible implementation manner of the fourth aspect, the starting module includes:
the authority searching submodule is used for searching the authority identification corresponding to the system flashing authority when the control instruction is a flashing authority closing instruction;
and the permission changing sub-module is used for changing the permission identifier into a machine-refreshing permission closing identifier when the permission searching sub-module finds the permission identifier and the permission identifier is a machine-refreshing permission opening identifier.
According to a fifth aspect of the present disclosure, there is provided a terminal comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
the target terminal detects whether a control instruction of the associated terminal is received;
and when the associated terminal is determined to be associated with the target terminal, the target terminal starts a loss protection program according to the control instruction.
According to a fifth aspect of the present disclosure, there is provided a server comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
receiving a control request for a second terminal sent by a first terminal;
detecting whether the first terminal is associated with the second terminal;
and when the first terminal is associated with the second terminal, sending a control instruction to the second terminal.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
according to the device control method applied to the server, when the server receives a control request sent by a first terminal and sent to a second terminal, whether the first terminal is associated with the second terminal is detected, so that a control instruction is sent to the second terminal, and the second terminal executes corresponding operation according to the control instruction.
By applying the method, the situation that a user can send the control instruction to the control target through any terminal and carry out remote control on the second terminal is effectively avoided by judging whether the first terminal sending the control instruction is associated with the second terminal or not and sending the control instruction to the second terminal of the control target, so that the reliability of the remote control of the second terminal is effectively protected, and the safety of the control of the second terminal is improved.
In addition, according to the device control method applied to the terminal provided by the embodiment of the disclosure, after the target terminal detects whether the control instruction of the associated terminal is received, if the control instruction is received, and when it is determined that the associated terminal is associated with the target terminal, the target terminal starts a corresponding loss protection program according to the control instruction to protect the target terminal.
By applying the method, the target terminal can start the loss protection program according to the control instruction and execute corresponding loss protection operations such as information request, system flashing authority closing and the like according to the loss protection program, so that important information leakage and property loss in the target terminal or the target terminal is effectively avoided, the information safety and property safety of a user are effectively protected, and the safety of the user terminal is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
FIG. 1 is a schematic diagram of a scenario provided in accordance with an exemplary embodiment;
FIG. 2 is a flow chart illustrating a method for controlling a device according to an exemplary embodiment;
FIG. 3 is a schematic diagram of a scenario provided in accordance with an exemplary embodiment;
FIG. 4 is a schematic diagram of another scenario provided in accordance with an exemplary embodiment;
FIG. 5 is a flow chart illustrating a method for controlling a device according to another exemplary embodiment;
FIG. 6 is a flow chart illustrating a method for controlling a device according to yet another exemplary embodiment;
FIG. 7 is a flow chart illustrating a method for controlling a device according to yet another exemplary embodiment;
FIG. 8 is a flow chart illustrating a method for controlling a device according to an exemplary embodiment;
FIG. 9 is a flow chart illustrating a method for controlling a device according to another exemplary embodiment;
FIG. 10 is a flow chart illustrating a method for controlling a device according to yet another exemplary embodiment;
FIG. 11 is a flow chart illustrating a method for controlling a device according to yet another exemplary embodiment;
FIG. 12 is a flow chart illustrating a method for controlling a device according to another exemplary embodiment;
FIG. 13 is a flow chart illustrating a method for controlling a device according to yet another exemplary embodiment;
FIG. 14 is a schematic diagram of a device control apparatus provided in accordance with an exemplary embodiment;
fig. 15 is a schematic structural diagram of an apparatus control device according to another exemplary embodiment;
fig. 16 is a schematic structural diagram of an apparatus control device according to still another exemplary embodiment;
fig. 17 is a schematic structural diagram of an apparatus control device according to still another exemplary embodiment;
fig. 18 is a schematic structural diagram of an apparatus control device according to another exemplary embodiment;
FIG. 19 is a schematic diagram of a device control apparatus provided in accordance with an exemplary embodiment;
fig. 20 is a schematic structural diagram of an apparatus control device according to another exemplary embodiment;
fig. 21 is a schematic structural diagram of an apparatus control device according to still another exemplary embodiment;
fig. 22 is a schematic structural diagram of an apparatus control device according to another exemplary embodiment;
fig. 23 is a schematic structural diagram of an apparatus control device according to another exemplary embodiment;
fig. 24 is a schematic structural diagram of a terminal provided in accordance with an exemplary embodiment;
fig. 25 is a schematic structural diagram of a server according to an exemplary embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
The existing terminal generally needs to enter an application interface of the equipment by inputting an interface unlocking password, and then a series of operations are carried out, such as making a call, sending a short message, checking a photo and an address book, and the like. If the password is input incorrectly for a plurality of times continuously, the terminal device is locked for a long time and cannot enter the application interface. If the terminal device is lost, the user who picks up the terminal device generally adopts a machine-swiping mode to unlock the terminal device under the condition that the unlocking password of the terminal device is unknown and the terminal device tends to be used maliciously or used profitably (the terminal is stolen), so that important information such as an address book, a photo and bank card information in the terminal device can be obtained, and the problems of privacy disclosure or property safety and the like are caused to the user to which the terminal device belongs. In order to ensure the security of the terminal device, the present disclosure provides the following embodiments, which ensure that the important information of the terminal device is prevented from being invaded by a malicious user, and improve the overall security of the terminal device. Reference may be made in particular to the following description of embodiments.
Fig. 1 is a schematic view of a scenario shown in an exemplary embodiment of the present disclosure. The figure includes a first terminal, a server 30 and a second terminal.
The first terminal may be a mobile phone 10 and a tablet computer 20, or a personal computer, the second terminal may be a mobile phone 40 or other terminal devices, the mobile phone 10 and the mobile phone 40 are two mobile phones of different users, and a communication module for establishing a communication connection with the server 30, a GPS module for locating a current position of a target terminal, a storage module for storing a control request or a control instruction, and the like are disposed in the first terminal and the second terminal, the communication module may be a bluetooth module, a near field communication module, a wireless data transmission module, and the like, and in the present disclosure, the first terminal and the second terminal may both be a sender or a receiver of the control instruction. In the embodiment of the present disclosure, the mobile phone 40 is taken as a receiving party, and the mobile phone 10 is taken as a sending party.
FIG. 2 is a flow chart illustrating a method of device control according to an exemplary embodiment. The method can be applied to a server, and the method can comprise the following steps:
in step S101, a control request for the second terminal sent by the first terminal is received.
The first terminal and the second terminal can be the same type of terminal, such as a mobile phone, a tablet computer or a personal computer, and the like, and can also be different types of terminals, such as a tablet computer as the first terminal and a mobile phone as the second terminal; the control request is a request of the first terminal to request the server to control the second terminal. In the embodiment of the disclosure, the first terminal serves as a request sender, the second terminal serves as a request receiver, and the first terminal can enter the server by logging in a network platform and the like and send a control request to the server.
In step S102, it is detected whether the first terminal is associated with the second terminal.
The second terminal may pre-associate one or more terminal devices as an association device of the second terminal, in this embodiment of the disclosure, the association manner may be that the second terminal and other terminal devices are bound by a hardware identifier of the terminal or account information of logging in the network platform, so as to form a mutual association relationship, and thus, whether the hardware identifier of the second terminal or the account information of logging in the network platform are associated is determined by determining whether the hardware identifier of the second terminal or the account information of logging in the network platform is associated.
And when the first terminal and the second terminal are associated, executing the step S103, otherwise, ending the process.
In step S103, a control command is sent to the second terminal.
In the embodiment of the disclosure, the server may pre-store a control instruction corresponding to the control request, so that when the first terminal is associated with the second terminal, the control instruction corresponding to the first terminal is searched for according to the type of the control request, and the control instruction is sent out; the control instruction can also be a corresponding control instruction generated according to the relevant information of the control request and sent out.
In addition, the second terminal may receive a control instruction sent by another terminal or device through a wireless signal, and the control instruction sent by the server may carry an identification identifier of the second terminal, so that the control instruction is directly sent to the second terminal, and after receiving the control instruction, the second terminal may directly execute a corresponding operation according to the control instruction, for example: for the mobile phone of the android system, the control instruction may be an instruction conforming to a protocol in the android system, and may also be controlled to execute a corresponding operation by analyzing the control instruction, for example: the control instruction is a protocol instruction in the non-android system. In this way, after the second terminal receives the control instruction, the device in the second terminal can be controlled to delete the information corresponding to the control instruction or close the system power-on permission, and the like.
As shown in fig. 3, the diagram includes: a first terminal 1, a server 2 and a second terminal 3, wherein:
the first terminal 1 and the second terminal 3 are both mobile phones as an example in the embodiment of the present disclosure, the first terminal 1 and the second terminal 3 are associated with each other, the first terminal 1 is communicatively connected to the server 2 through the network platform 4, and the second terminal 3 is communicatively connected to the server 2.
In the embodiment of the present disclosure, the first terminal 1 serves as a sender and the second terminal 3 serves as a receiver, whereas in other embodiments, the first terminal 1 may also serve as a receiver and the second terminal 3 serves as a sender. In the embodiment of the present disclosure, taking the first terminal 1 as a sender and the second terminal 3 as a receiver as an example, the first terminal 1 may log in the server 2 through the network platform, so as to send a control request for controlling the second terminal 3 to the server 2.
After the server 2 receives the control request sent by the first terminal 1 through the network platform 4, a corresponding pop-up prompt may pop up on a display screen interface of the first terminal 1 to prompt a name of a terminal to be controlled by the first terminal 1, for example, as shown in fig. 4, the pop-up prompt includes: as can be seen from the figure, the mobile phone 11, the screen 12, and the pop frame 13 are displayed in the pop frame as "a certain mobile phone of king" and "a certain mobile phone of li", where "a certain mobile phone of king" and "a certain mobile phone of li" shown in the figure are both commands of mobile phone users, are used to distinguish the mobile phones, and can be used to identify an identity of an IMEI (international mobile equipment identity) or an MAC address (media access control address) of the mobile phone. And the server judges whether the first terminal is associated with the second terminal, and if so, sends a control instruction to the second terminal according to the control request.
In addition, in the embodiment of the present disclosure, when the control instruction sent to the corresponding second terminal has been confirmed, a corresponding prompt box may be popped up according to the control type of the control instruction, for example, the prompt box may be an information clearing, a shutdown flashing authority, or an open flashing authority, respectively, an application scenario is not shown in the attached drawing, and the implementation described above with reference to fig. 4 may be referred to.
According to the method provided by the embodiment of the disclosure, the server receives the corresponding control request, and judges whether the first terminal sending the control request is the associated device for receiving the second terminal, so as to send the control instruction to the second terminal, and the second terminal executes the corresponding operation according to the control instruction. The target terminal can be remotely controlled through the associated terminal to perform corresponding control operation, so that the safety of the target terminal is improved, and the safety of the target terminal control is ensured by setting the associated terminal.
Fig. 5 is a flowchart of a device control method provided according to an exemplary embodiment, and when the control request is received, as shown in fig. 5, the method may include the following steps:
in step S1021, the account number of the first terminal is extracted.
The account can be a network account when logging in a network platform of the server, the first terminal sends a control request to the server, and when the server receives the control request from the network platform, the first terminal can extract the network account according to an identity identification mark carried in the control request.
In step S1022, it is determined whether the account of the first terminal is a target account.
The target account number can be stored in the server in advance, so that whether the target account number exists in the account numbers stored in the server in advance is searched according to the extracted account number of the first terminal. The target account may be the same as a login account of the second terminal for logging in the network platform, and in addition, the target account may also be the same as an associated account of the login account of the second terminal for logging in the network platform.
In the embodiment of the disclosure, each terminal has its own unique login account on the network platform, and the login account between the associated terminals may be referred to as an associated account, or the login account of the associated program in the same device may also be referred to as an associated account. For example: in the network management platform a, the login account of the first terminal is 121212, and the login account of the second terminal is 132121, where the first terminal and the second terminal are associated with each other, the login accounts 121212 and 132121 may also be referred to as associated accounts.
And when the account number of the first terminal is the target account number, executing step S1023, otherwise, ending the process.
In step S1023, an association between the first terminal and the second terminal is determined.
And if the account number of the first terminal is the target account number, the first terminal controlled by the second terminal is represented as the associated equipment of the second terminal.
By applying the method, whether the first terminal is the associated equipment of the second terminal or not can be determined according to the logged account, so that whether the two terminals are associated or not can be rapidly determined, the terminals are remotely controlled only through the associated equipment, the possibility that any equipment controls the terminals is avoided, and the safety of the terminals is improved.
An embodiment of the present disclosure provides a flowchart of another apparatus control method, and as shown in fig. 6, the method may include the following steps:
in step S1031, a preset loss control type corresponding to the second terminal is searched.
The preset loss control type is a type stored in advance in the server and used for controlling different terminals, for example: and controlling the second terminal to delete the short message, controlling the second terminal to delete the address book, controlling the second terminal to close the system flashing authority and the like. The terminals which can be controlled according to the needs respectively and correspondingly store the corresponding types. Therefore, the preset loss control type corresponding to the second terminal can be found through the second terminal.
In addition, the loss control type is not limited to the type provided in the foregoing embodiment, and may also be program uninstallation, where when the target terminal receives a control instruction related to the program uninstallation type sent by the server, the target terminal automatically starts a corresponding protection program to uninstall the system program itself or other software (such as address book software, wechat software, and the like).
In step S1032, a loss control instruction corresponding to the preset loss control type is generated.
Different preset loss control types need to respectively apply different control instructions to control the second terminal to carry out corresponding operations, corresponding control instructions are generated through the types, and the loss control instructions corresponding to the preset loss control types can also be stored in the server in advance, so that the loss control instructions corresponding to the preset loss control types are searched according to the preset loss control types.
The loss control type may include one of information clearing, power-on-reset and power-on-reset, or may be a combination of any two of information clearing, power-on-reset and power-on-reset, such as: the combination of information clearing and the type of shutdown of the flashing authority.
In step S1033, the generated loss control instruction is transmitted to the second terminal.
In this embodiment of the disclosure, as shown in fig. 4, for example, when the server receives a mobile phone used for controlling "wangtao" or "lie" and sent by the first terminal, the server may store a preset loss control type corresponding to the mobile phone of "wangtao" or "lie" respectively, for example, the stored preset loss control type corresponding to "wangtao" is a short message in the mobile phone that controls to delete "wangtao", and the stored preset loss control type corresponding to "lie" is a system flashing right that controls to close the mobile phone of "lie".
By applying the method, the loss control instruction can be correspondingly generated according to the terminal to be controlled, and the corresponding loss control instruction can be quickly generated as long as the type to be controlled of each terminal is correspondingly stored in the server, so that the control speed of the terminal is improved.
According to the above description, in another flowchart of the device control method for sending a control instruction to a second terminal, as shown in fig. 7, step S103 may include the following steps:
in step S1034, the lost control type in the control request is extracted.
When a control request for controlling the second terminal sent by the first terminal is received, the control request may carry a type that the second terminal needs to be controlled, that is, a loss control type for controlling the second terminal, where the loss control type may be a type for controlling the second terminal to delete information or close a system flashing authority, and the like.
In addition, when the first terminal and the second terminal are determined to be correlated, the server can determine that a control request of the first terminal for controlling the second terminal is received, and can search for a preset loss control type corresponding to the control of the second terminal according to the control request.
In step S1035, a loss control instruction corresponding to the extracted loss control type is generated.
In this embodiment of the present disclosure, all the loss control instructions corresponding to the loss control types may be stored in the server in advance, for example, when the loss control type is to delete information in the terminal, close a system power-on permission of the terminal, or open a system power-on permission of the terminal, where the control loss control instructions corresponding to the three types may be an information clearing instruction, a power-on permission closing instruction, or a power-on permission opening instruction, and the information clearing instruction, the power-on permission closing instruction, or the power-on permission opening instruction all belong to the loss control instruction. Therefore, the corresponding loss control instruction can be found through the extracted loss control type. The loss control instruction may also generate a corresponding loss control instruction through a series of programs according to the loss control type.
In step S1036, the generated loss control instruction is sent to the second terminal.
In the embodiment of the present disclosure, the loss control type is a type for controlling the target terminal to perform corresponding security protection, such as controlling to clear important information (for example, one or more combinations of a picture, a short message, and an address book) of the target terminal, closing a flashing authority of the target terminal, or opening a flashing authority of the target terminal. In the embodiment of the present disclosure, the control request may be provided with a request type identifier, the request type identifier may be a four-bit binary string, and the type of the user request control is determined according to the request type identifier, so as to search for a corresponding preset loss control type. For example: when the request type mark is 0000, the important information of the target terminal is requested for the request control; when the request type identifier is 0100, controlling to close the flashing authority of the target terminal; when the request type identifier is 1000, starting the flashing authority of the target terminal for control; and when the request type identifier is 1100, requesting important information of the target terminal for request control, and simultaneously controlling to close the flashing authority of the target terminal. The above is only a specific embodiment, and is not limited to the above embodiment. Therefore, the loss control type of the loss request can be extracted according to the request type identification of the loss request.
By applying the method, the loss control type which needs to control the target terminal in the control request can be obtained according to the received control request, the corresponding loss control instruction is generated, the loss control instruction is sent to the second terminal, and the second terminal executes corresponding operation according to the loss control instruction, so that the purpose of remotely controlling the second terminal is achieved.
Fig. 8 is a flowchart of a device control method according to an exemplary embodiment, where the method may be applied to a terminal, and the terminal may be a mobile phone, a tablet computer, a personal computer, or the like. As shown in fig. 8, the method may include the following steps.
In step S201, the target terminal detects whether a control instruction of the associated terminal is received.
The target terminal is a terminal for receiving the control instruction and executing the corresponding control operation, and the control instruction can be directly sent to the target terminal by the associated terminal. The associated terminal may send a control request to the server and a control instruction to the target terminal from the server. The related terminal is used as a sender of the control instruction, and the target terminal is used as a receiver of the control instruction.
In addition, when the target terminal receives the control instruction, whether the associated terminal is associated with the target terminal needs to be judged, if so, the target terminal determines to receive the control instruction, and executes corresponding operation according to the control instruction, otherwise, the target terminal does not receive the control instruction and cannot perform any operation.
When it is determined that the associated terminal is associated with the target terminal, performing step S202; otherwise, the flow ends.
In step S202, the target terminal starts a loss protection program according to the control instruction.
The control instruction is an instruction for controlling the target terminal to perform one or any combination of information clearing, machine-refreshing authority closing and machine-refreshing authority opening on the target terminal, a control program (namely a loss protection program) corresponding to the control instruction is stored in the target terminal in advance, when the target terminal determines that the associated terminal is associated with the target terminal, the control instruction is determined to be received, and the target terminal opens the corresponding control program according to the content of the control instruction, so that the information clearing, machine-refreshing authority closing or machine-refreshing authority opening processing is performed according to the control program correspondingly.
In addition, in the embodiment of the present disclosure, determining whether the associated terminal is associated with the target terminal may be confirmed by the server, and of course, the target terminal of the embodiment of the present disclosure may also confirm whether the associated terminal is associated with the target terminal. And are not further limited herein.
By applying the method, the target terminal can open the corresponding loss protection program according to the control instruction after receiving the control instruction, and execute corresponding operations such as information clearing, flashing authority closing, flashing authority opening and the like through the loss protection program, so that information leakage in the target terminal can be effectively protected, flashing and other operations can be prohibited, privacy safety and property safety of a user can be effectively protected, and safety of terminal equipment can be improved.
With the above description, on the basis of the above fig. 8, as shown in fig. 9, step S202 of the method may further include the following steps.
In step S2021, the login account in the control instruction is extracted.
The associated terminal logs in the server through the network platform, sends a control request for controlling the target terminal to the server, and then the server generates a corresponding control instruction according to the control request or the second terminal and sends the control instruction to the target terminal. In the embodiment of the present disclosure, the control instruction carries identification information of the target terminal, and the identification information of the target terminal may be an MAC address, an IMEI identification code, and other information that can uniquely determine the target terminal.
In addition, when the associated terminal logs in the network platform, the associated terminal needs to enter a network platform page through a uniquely determined login account to achieve the purpose of logging in the server, so that the login account in the control instruction can be extracted according to the control instruction.
In step S2022, it is determined whether the login account is a target account.
The target account may be a login account for the local computer (i.e., the target terminal) to log in the network platform, or the target account may be an account associated with the login account for the local computer to log in the network platform, so as to determine whether the login account in the control instruction is the target account.
The account associated with the login account of the target terminal is not limited to the login account for logging in to the network platform described in this embodiment, and may be a login account of an installer in the target terminal, for example, a login account of certain video software in the target terminal. And (4) correlating the login account of certain video software with the login account in the control instruction. And will not be elaborated upon in the embodiments of the present disclosure.
When the login account is the target account, executing step S023; otherwise, the flow ends.
In step S2023, it is determined that the associated terminal is associated with the target terminal.
In the embodiment of the present disclosure, the target account may be stored in the target terminal in advance, so that the target account is compared according to the login account of the control instruction, and if the login account is identical to the target account, it indicates that the associated terminal and the target terminal are associated with each other. The target terminal is controlled through the correlated terminals, so that the safety of the target terminal is effectively improved, and the condition that a thief can operate the terminal when learning a login account of a local machine is avoided.
On the basis of fig. 8, as shown in fig. 10, step S202 of the method may further include the following steps.
In step S2024, the terminal identifier of the associated terminal is extracted.
The terminal identifier of the associated terminal may be an identity identifier for identifying the identity of the associated terminal, and the terminal identifier may be a character string, where the identity of the associated terminal is represented by the character string, such as one or more combinations of an MAC address, an IMEI identifier, a CPU code, and a factory number of the terminal of the associated terminal. When the target terminal receives the control instruction, the terminal identification of the sending associated terminal can be obtained according to the control instruction, and therefore the associated terminal is determined through the terminal identification.
In step S2025, it is determined whether the terminal identifier matches a preset retrieval terminal identifier.
The preset retrieving terminal identification is a terminal identification of a terminal device which is stored in the target terminal and is associated with the target terminal, the preset retrieving terminal identification can be stored in the target terminal in advance, and after the terminal identification is received, the preset retrieving terminal identification is searched, so that whether the preset retrieving terminal identification is matched with the preset retrieving terminal identification is judged. In the embodiment of the present disclosure, only one preset retrieving terminal identifier of the associated terminal may be stored in the target terminal, and also a plurality of preset retrieving terminal identifiers of associated terminals associated with the target terminal may be stored.
When the terminal identifier is judged to be matched with the preset retrieval terminal identifier, executing the step S2026; otherwise, the flow ends.
In step S2026, it is determined that the associated terminal is associated with the target terminal.
In this disclosure, the device control methods shown in fig. 9 and fig. 10 both control the target terminal to determine whether the terminal sending the control instruction is the related terminal, so as to determine whether the control instruction needs to be executed, thereby avoiding the situation that other users can execute corresponding operations on the target terminal through any account, and cause leakage or theft of information in the terminal. Thereby effectively improving the security of the terminal.
In addition, for the implementation mode that the target terminal starts the corresponding protection program according to the control instruction and performs the corresponding operation, the above embodiment is not described in detail.
Therefore, according to the flowchart shown in fig. 11, another apparatus control method provided for the embodiment of the present disclosure may include the following steps, as shown in fig. 11.
In step S203, when the control command is a message clearing command, the message stored in the preset location is searched.
The information clearing instruction is an instruction for deleting corresponding content information in the target terminal, and before deleting corresponding content information in the secure terminal, it is first required to determine what content information (such as pictures, short messages or address lists, etc.) a user needs to delete, so that an information identifier for deleting content information is carried in the information clearing instruction in advance, and the information identifier is used for identifying the type of the information, for example: the information identifier is a string of characters, different character strings correspond to different information types, for example, the character string 001 represents a picture, the character string 010 represents a short message, the character string 011 represents an address book, and the like, the character strings 001, 010, and 011 are exemplary representations, the character strings are not limited to be three-bit binary character strings, and may also be represented by other character strings, which is not described herein again.
In the embodiment of the present disclosure, when the target terminal receives the control instruction, the type of the control instruction needs to be determined according to the control content of the control instruction, and the corresponding program is opened according to the type of the control instruction, so as to protect the target terminal mainly by deleting information of the target terminal or closing a system flashing right of the target terminal. If the control instruction is an information clearing instruction, information corresponding to the information clearing instruction needs to be searched.
In addition, the information comprises one or any combination of a short message, a call record and an address list, and the corresponding short message, call record or address list is provided with a preset storage position in the target terminal, so that the preset position where the information is stored can be correspondingly found according to the content of the information corresponding to the information clearing instruction, and the information stored in the preset position is inquired in the preset position.
When the information stored in the preset location is found, in step S204, the found information is deleted.
After the information stored in the preset position is found, the corresponding content information is deleted by executing a deletion program, for example: if the short messages need to be deleted, all the short messages in the mobile terminal are deleted through the short message deleting program, and the short messages in the mobile terminal are prevented from being maliciously checked by other users. In the embodiment of the present disclosure, a keyword identification bit may also be set in the information identifier, and short messages with preset keywords in all short messages are deleted, so that the specific implementation is not elaborated herein.
When the method is applied, a short message deleting program, a call record deleting program, a picture deleting program, an address book deleting program and the like can be prestored in the target terminal, the short message deleting program, the picture deleting program and the address book deleting program are started according to the information identifier of the content information needing to be deleted by the acquired information clearing instruction, and the short message, the picture or the address book and the like stored in the mobile terminal are thoroughly cleared. Therefore, the safety of the information in the target terminal is effectively ensured.
Fig. 12 is a flowchart of an apparatus control method provided according to another exemplary embodiment, which may include the following steps, as shown in fig. 12.
In step S205, when the control instruction is a power-on permission closing instruction, a permission identifier corresponding to the power-on permission of the system is searched.
Generally, the target terminals are all provided with the power-on passwords, so that when a user cannot enter an interface of the target terminal, the target terminal generally needs to be refreshed, and the power-on permission of the target terminal is obtained to unlock the target terminal, so that the system is reinstalled on the target terminal, and the functions of the target terminal are more complete or the target terminal is restored to an original state. Therefore, in the embodiment of the present disclosure, after the received power-on-demand permission closing instruction is received, the target terminal needs to correspondingly search the permission identifier of the system power-on-demand permission in the local computer according to the power-on-demand permission closing instruction.
The authority identification can be an identification for identifying whether the system is closed or opened by the power-on authority, the authority identification can be a character string, and the authority identification can be provided with an authority state bit, wherein the authority state bit is an identification bit for identifying whether the power-on authority is closed or opened, the power-on authority is executed by the characters of the authority state bit, and whether the power-on authority is closed or not is judged. For example: the permission identification is an eight-bit binary string: 10001001, the last bit of the character string is the authority state bit of the flashing authority, if the character of the authority state bit is 0, the flashing authority is in the closed state, the user can not obtain the flashing authority; if the character of the authority status bit is 1, the user indicates that the flashing authority is in an open state, and the user can acquire the flashing authority of the target terminal, so that the flashing of the target terminal is performed, and the like.
In addition, in the disclosed embodiment, the authority status bit is not limited to a specific position, and the status of the flush authority represented by the character of the authority status bit being 0 or 1 is only an exemplary embodiment when the flush authority is turned off or turned on, and in the specific implementation process, the representative status may be preset.
In step S206, when the authority identifier is the power-on permission opening identifier, the authority identifier is changed to the power-on permission closing identifier.
In the embodiment of the disclosure, when the authority identifier is the power-on authority opening identifier, it indicates that the target terminal can be powered on, and otherwise, it indicates that the target terminal cannot be powered on. Therefore, the authority identifier corresponding to the system updating authority is changed into the updating authority closing identifier. Therefore, other users are prevented from flashing the target, and the safety of the target terminal is effectively improved.
In addition, the power-on-demand permission closing instruction may also be a character string, where the character of the permission state bit in the character string is a numerical value, as described in step S205, as described in 0 or 1, after the character is obtained, the character on the permission state bit of the existing permission identifier in the target terminal is replaced by the character of the power-on-demand permission closing instruction, so as to close the power-on-demand permission. For example: in this embodiment, the authority identifier of the target terminal is an eight-bit binary string: 10001001, if the last bit of the character string is the authority state bit and the character of the authority state bit is 1, it means that the system is in the open state, and the user can perform the flashing operation; if the character of the authority status bit is 0, the machine-refreshing authority is in a closed state, and machine-refreshing operation cannot be carried out. That is, in the implementation of the present disclosure, the power-on permission of the target terminal is in an open state, and the received power-on permission closing instruction is: 10001000, i.e. replacing 0 of the privilege status bit with the privilege status bit of the privilege identifier, so that the updated privilege identifier is 10001000. Therefore, the target terminal executes the corresponding flashing authority program according to the authority identifier of 10001000, so that the flashing authority program cannot be executed, and the flashing authority is closed.
By applying the method, the system flashing authority is closed by changing the flashing authority of the terminal, so that other people cannot use the flashing equipment after the terminal equipment is lost, and the terminal cannot be used after being stolen, thereby not only effectively improving the safety of the terminal equipment, but also reducing the occurrence of the stealing phenomenon.
On the basis of the embodiment of the present disclosure, after the power-on-demand permission of the target terminal is closed through the associated terminal, if the target terminal is retrieved, the associated terminal may send a corresponding permission opening command to the target terminal again, so that the target terminal reopens the power-on-demand permission of the system.
To this end, as shown in fig. 13, the method may include the steps of:
in step S301, when the lost control instruction is a power-on permission opening instruction, a permission identifier corresponding to the power-on permission of the system is searched.
The system power-on-demand permission starting instruction is used for starting the system power-on-demand permission, the power-on-demand permission starting instruction can be a character string or a character, the permission identification corresponding to the system power-on-demand permission can be found through the identification of the power-on-demand permission starting instruction, the permission identification can be a character string, and the system power-on-demand permission can be changed by changing the character string for identifying the system power-on-demand permission starting or closing.
In step S302, when the authority identifier is the power-on authority close identifier, the authority identifier is changed to the power-on authority open identifier.
When the terminal is lost, the method of the embodiment of the disclosure can control the terminal system to close the power-on permission, namely, the power-on permission closing identifier is refreshed at the power-on permission identifier position, so that the power-on permission identifier is changed into the power-on permission opening identifier.
In addition, the embodiment related to changing the authority identifier of the system flashing authority into the flashing authority closing identifier and the above-mentioned embodiment shown in fig. 12 can be referred to each other. And the related embodiments can be referred to for the control instruction of the associated terminal sending the flashing authority opening, and the like, and will not be described in detail here.
In the embodiment of the disclosure, the associated terminal may log in the network platform through the target terminal at an account of the network platform, so as to send the control request to the server, and after receiving the control request, the server may generate a corresponding loss control request according to a loss control type carried by the control request or a loss control type to be controlled by the target terminal, and send the loss control request to the corresponding target terminal. And the associated terminal is associated with the target terminal.
After the target terminal receives the loss control instruction, the corresponding loss protection program, such as an information clearing program, a flashing permission closing program, a flashing permission opening program or a system program unloading program, can be started by analyzing the loss control type in the loss control instruction, so that the target terminal executes corresponding operation according to the loss protection program, the purposes of protecting information safety and property safety in the target terminal and avoiding the use of others are achieved, and the safety and the reliability of the terminal are effectively improved.
Fig. 14 is a schematic structural diagram of a device control apparatus according to an exemplary embodiment, where the apparatus may be installed in a server, and the server is connected to a first terminal and a second terminal respectively, where the first terminal is a sender of a control instruction, and the second terminal is a receiver of the control instruction. As shown in fig. 14, the apparatus may include a receiving module 101, a detecting module 102, and a transmitting module 103. Wherein,
the receiving module 101 may be configured to receive a control request for a second terminal sent by a first terminal;
the detecting module 102 may be configured to detect whether the first terminal and the second terminal are associated when the receiving module 101 receives a control request;
the sending module 103 may be configured to send a control instruction to the second terminal when the detecting module 102 detects the association between the first terminal and the second terminal.
By applying the device, the first terminal sends the control instruction to the second terminal through the server, so that the server sends the control instruction to the corresponding second terminal, and the second terminal can execute corresponding operation according to the control instruction, thereby protecting information in the second terminal and improving the safety of the second terminal.
On the basis of fig. 14, as shown in fig. 15, the detection module 102 of the apparatus may include a first extraction sub-module 1021, a first judgment sub-module 1022 and a first determination sub-module 1023. Wherein,
the first extracting sub-module 1021 may be configured to extract an account number of the first terminal when receiving the control request;
the first determining submodule 1022 may be configured to determine, when the first extracting submodule 1021 extracts the account of the first terminal, whether the account of the first terminal is a target account, where the target account is the same as a login account of the second terminal, or the target account is the same as an associated account of the login account of the second terminal;
the first determining sub-module 1023 may be configured to determine the association between the first terminal and the second terminal when the first determining sub-module 1022 determines that the account of the first terminal is the target account.
By applying the device, whether the first terminal is correlated with the second terminal or not is determined by determining the account number of the first terminal corresponding to the control request, the second terminal is remotely controlled by the correlated first terminal to start a corresponding protection program, the second terminal is protected to protect corresponding information, the information in the second terminal is prevented from being leaked after the second terminal is lost or stolen, and the information safety and property safety of a second terminal user are effectively protected.
On the basis of fig. 14, as shown in fig. 16, the sending module 103 may include a type finding sub-module 1031, a first generating sub-module 1032, and a first sending module 1033. Wherein,
the type finding sub-module 1031 may be configured to find a preset loss control type corresponding to the second terminal;
the first generating sub-module 1032 may be configured to generate a loss control instruction corresponding to the preset loss control type when the type finding sub-module 1031 finds the preset loss control type;
the first transmitting sub-module 1033 may be configured to transmit the generated loss control instruction to the second terminal when the first generating sub-module 1032 generates the loss control instruction.
In the embodiment of the present disclosure, the loss control type may include any one of information clearing, power-on-reset permission closing, and power-on-reset permission opening, and may also include two or three combinations of information clearing, power-on-reset permission closing, and power-on-reset permission opening.
By applying the device, the corresponding loss control type is obtained according to the second terminal of the control target, and the corresponding second terminal of the loss control instruction sending value is generated, so that the second terminal can conveniently execute corresponding operation according to the loss control instruction, and the safety of the second terminal is effectively improved.
In the above embodiment, the loss control instruction matched with the target terminal may be generated according to the target terminal of the control target, and sent to the target terminal. However, in the embodiment of the present disclosure, the lost control type may also be determined by the control request, and a corresponding control instruction is generated and sent to the corresponding target terminal.
To this end, on the basis of fig. 14, as shown in fig. 17, the transmission module 103 may further include a type extraction sub-module 1034, a second generation sub-module 1035, and a second transmission sub-module 1036. Wherein,
the type extraction submodule 1034 may be configured to extract a lost control type in the control request;
the second generation submodule 1035 may be configured to, when the type extraction submodule 1034 extracts the loss control type, generate a loss control instruction corresponding to the extracted loss control type;
the second transmitting sub-module 1036 may be configured to transmit the generated loss control instruction to the second terminal when the second generating sub-module 1035 generates the loss control instruction.
In the embodiment of the present disclosure, the loss control type may be one or any combination of information clearing, flashing right closing, and flashing right opening, which can be referred to the above embodiments and will not be described in detail herein.
By applying the device, the loss control instruction corresponding to the second terminal is generated and sent according to the loss control type carried by the control request, so that the second terminal executes corresponding operation according to the loss control instruction, and controls to clear information, close the flashing authority or open the flashing authority, thereby avoiding terminal information leakage.
Fig. 18 is a schematic structural diagram of a device control apparatus according to an exemplary embodiment, where the apparatus may be applied to a terminal, where the terminal may be a mobile terminal such as a mobile phone, a tablet computer, or the like, and the terminal may also be a personal computer, or the like. As shown in fig. 18, the apparatus may include an instruction detection module 201, a determination module 202, and an activation module 203. Wherein,
the instruction detection module 201 may be configured to detect whether a target terminal receives a control instruction of an associated terminal;
the determination module 202 may be configured to determine whether the associated terminal is associated with the target terminal;
the starting module 203 may be configured to, when it is determined that the associated terminal is associated with the target terminal, start the loss protection program according to the control instruction by the target terminal.
By using the device, after the target terminal receives the control instruction, the corresponding loss protection program is started according to the control type of the control instruction, and corresponding operation is executed according to the loss protection program, so that the related information of the target terminal is protected, and the information of the target terminal is ensured to be leaked or refreshed, and the like.
On the basis of fig. 18, as shown in fig. 19, another structural schematic diagram of the device control apparatus disclosed in fig. 19 may include a second extraction sub-module 2021, a second judgment sub-module 2022, and a second determination sub-module 2023, as shown in fig. 19. Wherein,
the second extraction sub-module 2021 may be configured to, when receiving a control instruction of the associated terminal, extract a login account in the control instruction;
the second determining sub-module 2022 may be configured to determine whether the login account is a target account when the login account is extracted by the second extracting sub-module 2021, where the target account is the same as a local login account, or the target account is the same as an account associated with the target terminal login account;
the second determining sub-module 2023 may be configured to determine that the associated terminal is associated with the target terminal when the login account is determined to be the target account by the second determining sub-module 2022.
By applying the device, whether the first terminal sending the control instruction through the server is associated with the second terminal can be determined through the target terminal to be controlled, so that the control instruction sent to the second terminal is ensured to be sent as a request of associated equipment, the possibility that any terminal can control the target terminal is avoided, and the safety of the terminal is improved.
On the basis of fig. 18, as shown in fig. 20, another structure diagram of the device control apparatus disclosed in fig. 20 may include a third extraction sub-module 2024, a third judgment sub-module 2025, and a third determination sub-module 2026. Wherein,
the third extracting sub-module 2024 may be configured to extract the terminal identifier of the associated terminal when receiving the control instruction of the associated terminal;
the third determining submodule 2025 may be configured to determine whether the terminal identifier matches a preset retrieved terminal identifier when the terminal identifier is extracted by the third extracting submodule 2024;
the third determining sub-module 2026 may be configured to determine that the associated terminal is associated with the target terminal when the third determining sub-module 2025 determines that the terminal identifier matches a preset retrieved terminal identifier.
By applying the device, the terminal identification of the associated terminal carried by the control instruction is extracted, and whether the associated terminal is associated with the target terminal is determined, so that the control instruction sent to the second terminal is ensured to be sent as the request of the associated equipment, the possibility that any terminal can control the target terminal is avoided, and the safety of the terminal is improved.
Fig. 21 is a schematic structural diagram of another apparatus control device provided according to an exemplary embodiment, and as shown in fig. 21, the start module 203 of the device may include an information search sub-module 2027 and an information deletion sub-module 2028. Wherein,
the information searching sub-module 2027 may be configured to search the information stored in the preset location when the control instruction is an information clearing instruction; the information corresponding to the information clearing instruction is stored in a preset storage position of the target terminal in advance, for example, the picture information is stored in a picture folder, the address book information is stored in an address book folder, and the like;
the information deletion sub-module 2028 may be configured to delete the information searched by the information search sub-module 2027.
In the embodiment of the present disclosure, the information may include one of a short message, a call record and an address list, or may include a combination of two or more of a short message, a call record and an address list terminal.
In addition, the information may further include, for example, a picture or a software program, an uninstaller, and the like, so that the information deletion sub-module may uninstall the system program of the target terminal according to the uninstaller and the like, delete all information stored in the target terminal, and may achieve a situation that the information cannot be recovered, thereby effectively protecting information leakage of a target terminal user, and improving security of the target terminal.
On the basis of fig. 14, the present disclosure further provides a schematic structural diagram of a device control apparatus, as shown in fig. 22, the start module 203 of the apparatus may further include a permission search sub-module 2029 and a permission modification sub-module 2030. Wherein,
the permission searching sub-module 2029 may be configured to search, when the control instruction is a power-on permission closing instruction, a permission identifier corresponding to the power-on permission of the system;
the permission modification sub-module 2030 may be configured to modify the permission identifier to a flash permission close identifier when the permission identifier is found by the permission finding sub-module 2029 and the permission identifier is a flash permission open identifier.
By using the device, the target terminal changes the authority identification of the system flashing authority into the flashing authority closing identification by changing the system flashing authority, thereby closing the system flashing authority, effectively controlling the target terminal to be incapable of flashing, controlling the target terminal to be incapable of being controlled by any user, even if the terminal is stolen, controlling the system flashing authority to close by the device, enabling the terminal to become an unusable device, and when the terminal becomes unprofitable, the occurrence of the phenomenon of stealing can be reduced, and the safety of the terminal and the stealing rate of the terminal are improved.
In addition, after the terminal in the above embodiment is lost or stolen and the device controls the terminal system to close the flashing authority, if the user finds the terminal and is unable to use the terminal, the user may suffer huge loss, especially when the user mistakenly thinks that the terminal is lost or stolen, and once the terminal is found back, the user may suffer huge loss.
For this reason, the embodiment of the present disclosure further provides another device capable of controlling the system flashing permission to be opened, as shown in fig. 23, the device may include a permission search sub-module 301 and a permission modification sub-module 302. Wherein,
the authority searching sub-module 301 may be configured to search an authority identifier corresponding to the system flashing authority when the lost control instruction is a flashing authority opening instruction;
the permission changing sub-module 302 may be configured to change the permission identifier to a flashing permission opening identifier when the permission identifier is found by the permission finding sub-module 301 and the permission identifier is a flashing permission closing identifier.
By applying the device, the system refresh permission which is closed is restarted, so that the situation that the terminal restarts the refresh permission after being retrieved is avoided, the terminal can be reused, and the loss of a user is reduced.
Fig. 24 is a block diagram illustrating a terminal 2400 according to an example embodiment. For example, the terminal 2400 can be a mobile phone, a computer, a digital broadcast terminal, a messaging terminal, a game console, a tablet terminal, a medical terminal, a fitness terminal, a personal digital assistant, and so forth.
Referring to fig. 24, terminal 2400 can include one or more of the following components: a processing component 2402, a memory 2404, a power component 2406, a multimedia component 2408, an audio component 2410, an interface for input/output (I/O) 2412, a sensor component 2414, and a communication component 2416.
The processing component 2402 generally controls overall operation of the terminal 2400, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 2402 may include one or more processors 2420 to execute instructions to perform all or part of the steps of the methods described above. Further, processing component 2402 may include one or more modules that facilitate interaction between processing component 2402 and other components. For example, the processing component 2402 may include a multimedia module to facilitate interaction between the multimedia component 2408 and the processing component 2402.
The memory 2404 is configured to store various types of data to support operation at the terminal 2400. Examples of such data include instructions for any application or method operating on terminal 2400, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 2404 may be implemented by any type of volatile or non-volatile storage terminal or combination thereof, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
Power supply component 2406 provides power to the various components of terminal 2400. The power components 2406 can include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the terminal 2400.
The multimedia component 2408 includes a screen providing an output interface between the terminal 2400 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 2408 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the terminal 2400 is in an operating mode, such as a photographing mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 2410 is configured to output and/or input audio signals. For example, the audio component 2410 can include a Microphone (MIC) configured to receive external audio signals when the terminal 2400 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 2404 or transmitted via the communication component 2416. In some embodiments, the audio component 2410 further comprises a speaker for outputting audio signals.
I/O interface 2412 provides an interface between processing component 2402 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor component 2414 includes one or more sensors for providing various aspects of state assessment to the terminal 2400. For example, sensor component 2414 can detect an open/closed state of terminal 2400, the relative positioning of components such as a display and a keypad of terminal 2400, sensor component 2414 can also detect a change in position of terminal 2400 or a component of terminal 2400, the presence or absence of user contact with terminal 2400, an orientation or acceleration/deceleration of terminal 2400, and a change in temperature of terminal 2400. The sensor component 2414 may include a proximity sensor configured to detect the presence of a nearby object in the absence of any physical contact. The sensor assembly 2414 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 2414 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 2416 is configured to facilitate communication between the terminal 2400 and other terminals in a wired or wireless manner. The terminal 2400 can access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an example embodiment, the communication component 2416 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 2416 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the terminal 2400 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), digital signal processing terminals (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer readable storage medium is also provided that includes instructions, such as the memory 2404 including instructions, which are executable by the processor 2420 of the terminal 2400 to perform the above-described methods. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage terminal, and the like.
A non-transitory computer-readable storage medium in which instructions, when executed by a processor of a terminal, enable the terminal to perform a device control method, the method comprising:
the target terminal detects whether a control instruction of the associated terminal is received;
and when the associated terminal is determined to be associated with the target terminal, the target terminal starts a loss protection program according to the control instruction.
Fig. 25 is a block diagram illustrating an apparatus 2500 for a device control method in accordance with an example embodiment. For example, the apparatus 2500 may be provided as a server. Referring to fig. 25, the apparatus 2500 includes a processing component 2522 that further includes one or more processors and memory resources, represented by memory 2532, for storing instructions, e.g., applications, that are executable by the processing component 2522. The application programs stored in memory 2532 may include one or more modules that each correspond to a set of instructions. Further, the processing component 2522 is configured to execute instructions to perform the above-described methods.
The device 2500 may also include a power component 2526 configured to perform power management of the device 2500, a wired or wireless network interface 2550 configured to connect the device 2500 to a network, and an input/output (I/O) interface 2558. The device 2500 may operate based on an operating system stored in memory 2532, such as Windows Server, MacOSXTM, UnixTM, LinuxTM, FreeBSDTM, or the like.
A non-transitory computer readable storage medium in which instructions, when executed by a processor of a server, enable the server to perform a device control method, the method comprising:
receiving a control request for a second terminal sent by a first terminal;
detecting whether the first terminal is associated with the second terminal;
and when the first terminal is associated with the second terminal, sending a control instruction to the second terminal.
It is noted that, in the present disclosure, relational terms such as "first" and "second", and the like, are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, apparatus, or device that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, apparatus, or device. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, apparatus or device that comprises the element.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.
Claims (22)
1. An apparatus control method characterized by comprising:
receiving a control request for a second terminal sent by a first terminal;
detecting whether the first terminal is associated with the second terminal;
and when the first terminal is associated with the second terminal, sending a control instruction to the second terminal.
2. The method of claim 1, wherein the detecting whether the first terminal is associated with the second terminal comprises:
when the control request is received, extracting an account of the first terminal;
judging whether the account of the first terminal is a target account, wherein the target account is the same as the login account of the second terminal, or the target account is the same as the associated account of the login account of the second terminal;
and when the account of the first terminal is a target account, determining the association between the first terminal and the second terminal.
3. The method of claim 1, wherein the sending the control instruction to the second terminal comprises:
searching a preset loss control type corresponding to the second terminal;
generating a loss control instruction corresponding to the preset loss control type;
and sending the generated loss control instruction to the second terminal.
4. The method of claim 1, wherein the sending the control instruction to the second terminal comprises:
extracting a lost control type in the control request;
generating a loss control instruction corresponding to the extracted loss control type;
and sending the generated loss control instruction to the second terminal.
5. The method of claim 1, wherein the loss control type comprises: and one or any combination of information clearing, machine refreshing authority closing and machine refreshing authority opening.
6. A terminal control method, comprising:
the target terminal detects whether a control instruction of the associated terminal is received;
and when the associated terminal is determined to be associated with the target terminal, the target terminal starts a loss protection program according to the control instruction.
7. The method of claim 6, wherein the determining that the associated terminal is associated with the target terminal comprises:
when a control instruction of the associated terminal is received, extracting a login account in the control instruction;
judging whether the login account is a target account, wherein the target account is the same as a local login account, or the target account is the same as an account associated with the target terminal login account;
and when the login account is a target account, determining that the associated terminal is associated with the target terminal.
8. The method of claim 6, wherein the determining that the associated terminal is associated with the target terminal comprises:
when a control instruction of the associated terminal is received, extracting a terminal identifier of the associated terminal;
judging whether the terminal identification is matched with a preset retrieved terminal identification or not;
and when the terminal identification is matched with a preset recovered terminal identification, determining that the associated terminal is associated with the target terminal.
9. The method of claim 6, wherein the target terminal starts a loss protection procedure according to the control instruction, comprising:
when the control instruction is an information clearing instruction, searching information stored in a preset position;
deleting the searched information, wherein the information comprises: one or any combination of short messages, call records and address lists.
10. The method of claim 6, wherein the target terminal starts a loss protection procedure according to the control instruction, comprising:
when the control instruction is a power-on permission closing instruction, searching a permission identifier corresponding to the power-on permission of the system;
and when the authority identifier is the power-on permission opening identifier, changing the authority identifier into a power-on permission closing identifier.
11. An apparatus control device, characterized by comprising:
the receiving module is used for receiving a control request for the second terminal, which is sent by the first terminal;
a detection module, configured to detect whether the first terminal and the second terminal are associated with each other when the receiving module receives a control request;
and the sending module is used for sending a control instruction to the second terminal when the detection module detects that the first terminal is associated with the second terminal.
12. The apparatus of claim 11, wherein the detection module comprises:
the first extraction submodule is used for extracting the account of the first terminal when the control request is received;
a first judgment sub-module, configured to judge whether the account of the first terminal is a target account when the account of the first terminal is extracted by the first extraction sub-module, where the target account is the same as a login account of the second terminal, or the target account is the same as an associated account of the login account of the second terminal;
and the first determining submodule is used for determining the association between the first terminal and the second terminal when the first judging submodule judges that the account of the first terminal is the target account.
13. The apparatus of claim 11, wherein the sending module comprises:
the type searching submodule is used for searching a preset loss control type corresponding to the second terminal;
the first generation submodule is used for generating a loss control instruction corresponding to the preset loss control type when the type searching submodule searches the preset loss control type;
and the first sending submodule is used for sending the generated loss control instruction to the second terminal when the first generating submodule generates the loss control instruction.
14. The apparatus of claim 11, wherein the sending module comprises:
the type extraction submodule is used for extracting the lost control type in the control request;
a second generation submodule, configured to generate, when the loss control type is extracted by the type extraction submodule, a loss control instruction corresponding to the extracted loss control type;
and the second sending submodule is used for sending the generated loss control instruction to the second terminal when the second generating submodule generates the loss control instruction.
15. The apparatus of claim 11, wherein the loss control type comprises: and one or any combination of information clearing, machine refreshing authority closing and machine refreshing authority opening.
16. An apparatus control device, characterized by comprising:
the instruction detection module is used for detecting whether a control instruction of the associated terminal is received by the target terminal;
a determining module, configured to determine whether the associated terminal is associated with the target terminal;
and the starting module is used for starting the loss protection program by the target terminal according to the control instruction when the associated terminal is determined to be associated with the target terminal.
17. The apparatus of claim 16, wherein the determining module comprises:
the second extraction submodule is used for extracting the login account in the control instruction when the control instruction of the associated terminal is received;
the second judgment sub-module is used for judging whether the login account is a target account when the login account is extracted by the second extraction sub-module, wherein the target account is the same as the login account of the local computer, or the target account is the same as the account associated with the login account of the target terminal;
and the second determining submodule is used for determining that the associated terminal is associated with the target terminal when the second judging submodule judges that the login account is the target account.
18. The apparatus of claim 16, wherein the determining module comprises:
the third extraction submodule is used for extracting the terminal identification of the associated terminal when the control instruction of the associated terminal is received;
the third judgment submodule is used for judging whether the terminal identification is matched with a preset retrieval terminal identification or not when the terminal identification is extracted by the third extraction submodule;
and the third determining submodule is used for determining that the associated terminal is associated with the target terminal when the third judging submodule judges that the terminal identification is matched with the preset retrieved terminal identification.
19. The apparatus of claim 16, wherein the activation module comprises:
the information searching submodule is used for searching the information stored in the preset position when the control instruction is an information clearing instruction;
an information deleting submodule, configured to delete the found information when the information searching submodule finds the information stored in the preset location, where the information includes: one or any combination of short messages, call records and address lists.
20. The apparatus of claim 16, wherein the activation module comprises:
the authority searching submodule is used for searching the authority identification corresponding to the system flashing authority when the control instruction is a flashing authority closing instruction;
and the permission changing sub-module is used for changing the permission identifier into a machine-refreshing permission closing identifier when the permission searching sub-module finds the permission identifier and the permission identifier is a machine-refreshing permission opening identifier.
21. A terminal, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
the target terminal detects whether a control instruction of the associated terminal is received;
and when the associated terminal is determined to be associated with the target terminal, the target terminal starts a loss protection program according to the control instruction.
22. A server, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
receiving a control request for a second terminal sent by a first terminal;
detecting whether the first terminal is associated with the second terminal;
and when the first terminal is associated with the second terminal, sending a control instruction to the second terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510946094.6A CN105592146A (en) | 2015-12-16 | 2015-12-16 | Equipment control method, device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510946094.6A CN105592146A (en) | 2015-12-16 | 2015-12-16 | Equipment control method, device and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105592146A true CN105592146A (en) | 2016-05-18 |
Family
ID=55931350
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510946094.6A Pending CN105592146A (en) | 2015-12-16 | 2015-12-16 | Equipment control method, device and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105592146A (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106066968A (en) * | 2016-05-30 | 2016-11-02 | 北京小米移动软件有限公司 | Data guard method and device |
CN107205094A (en) * | 2017-06-29 | 2017-09-26 | 珠海格力电器股份有限公司 | Device control method and device, electronic device and terminal |
CN107426186A (en) * | 2017-06-23 | 2017-12-01 | 广东欧珀移动通信有限公司 | The method and apparatus of management terminal, server, storage device |
CN107483547A (en) * | 2017-07-20 | 2017-12-15 | 北京珠穆朗玛移动通信有限公司 | Anti-loss method, server, mobile terminal and the storage medium of user terminal |
CN107707598A (en) * | 2017-05-25 | 2018-02-16 | 语祯物联科技(上海)有限公司 | The method and Internet of Things communication equipment of a kind of remote control Internet of Things communication equipment |
CN107831986A (en) * | 2017-11-21 | 2018-03-23 | 掌阅科技股份有限公司 | Unlocking method, electronic equipment and the computer-readable storage medium of electronic reader |
CN108108972A (en) * | 2017-11-06 | 2018-06-01 | 捷开通讯(深圳)有限公司 | A kind of mobile terminal and its receipts/mode of payment and the device with storage function |
WO2018113215A1 (en) * | 2016-12-22 | 2018-06-28 | 深圳市中兴微电子技术有限公司 | Terminal control method, first terminal, second terminal, server, and system |
CN108632391A (en) * | 2018-05-21 | 2018-10-09 | 北京小米移动软件有限公司 | information sharing method and device |
CN108769394A (en) * | 2018-05-15 | 2018-11-06 | 中国联合网络通信集团有限公司 | The control method and device of terminal traffic |
CN108989879A (en) * | 2018-08-28 | 2018-12-11 | 广州视源电子科技股份有限公司 | Screen projection control method, device and system |
CN109120551A (en) * | 2017-06-23 | 2019-01-01 | 中兴通讯股份有限公司 | Control method, apparatus, the computer equipment, storage medium of mobile terminal Internet access |
WO2019011187A1 (en) * | 2017-07-11 | 2019-01-17 | 阿里巴巴集团控股有限公司 | Method, device, and apparatus for loss reporting, removing loss report, and service management of electronic account |
CN110232272A (en) * | 2019-05-14 | 2019-09-13 | 上海家可科技有限公司 | Mobile device control method and device, server |
CN110348200A (en) * | 2018-04-02 | 2019-10-18 | 南宁富桂精密工业有限公司 | Application program installation method, system, server and terminal |
CN112866986A (en) * | 2021-03-16 | 2021-05-28 | 北京小米移动软件有限公司 | Data protection method, device, server and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6976253B1 (en) * | 2003-07-30 | 2005-12-13 | Microsoft Corporation | Method and apparatus for configuring a mobile device |
CN101068383A (en) * | 2007-06-18 | 2007-11-07 | 中兴通讯股份有限公司 | Student terminal configuration method and system based on terminal management business |
CN102427472A (en) * | 2011-11-24 | 2012-04-25 | 捷开通讯科技(上海)有限公司 | Device and method for remote control of mobile communication equipment |
CN103347131A (en) * | 2013-07-05 | 2013-10-09 | 张�林 | Intelligent mobile phone anti-theft method and system |
CN104125278A (en) * | 2014-07-25 | 2014-10-29 | 陆威力 | Method and device for controlling mobile phone use |
CN104320479A (en) * | 2014-10-31 | 2015-01-28 | 东莞宇龙通信科技有限公司 | Method and system for controlling controlled device |
-
2015
- 2015-12-16 CN CN201510946094.6A patent/CN105592146A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6976253B1 (en) * | 2003-07-30 | 2005-12-13 | Microsoft Corporation | Method and apparatus for configuring a mobile device |
CN101068383A (en) * | 2007-06-18 | 2007-11-07 | 中兴通讯股份有限公司 | Student terminal configuration method and system based on terminal management business |
CN102427472A (en) * | 2011-11-24 | 2012-04-25 | 捷开通讯科技(上海)有限公司 | Device and method for remote control of mobile communication equipment |
CN103347131A (en) * | 2013-07-05 | 2013-10-09 | 张�林 | Intelligent mobile phone anti-theft method and system |
CN104125278A (en) * | 2014-07-25 | 2014-10-29 | 陆威力 | Method and device for controlling mobile phone use |
CN104320479A (en) * | 2014-10-31 | 2015-01-28 | 东莞宇龙通信科技有限公司 | Method and system for controlling controlled device |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106066968A (en) * | 2016-05-30 | 2016-11-02 | 北京小米移动软件有限公司 | Data guard method and device |
WO2018113215A1 (en) * | 2016-12-22 | 2018-06-28 | 深圳市中兴微电子技术有限公司 | Terminal control method, first terminal, second terminal, server, and system |
CN108234586A (en) * | 2016-12-22 | 2018-06-29 | 深圳市中兴微电子技术有限公司 | Control method, first terminal, second terminal, server and the system of terminal |
CN107707598A (en) * | 2017-05-25 | 2018-02-16 | 语祯物联科技(上海)有限公司 | The method and Internet of Things communication equipment of a kind of remote control Internet of Things communication equipment |
CN109120551A (en) * | 2017-06-23 | 2019-01-01 | 中兴通讯股份有限公司 | Control method, apparatus, the computer equipment, storage medium of mobile terminal Internet access |
CN107426186A (en) * | 2017-06-23 | 2017-12-01 | 广东欧珀移动通信有限公司 | The method and apparatus of management terminal, server, storage device |
CN107205094A (en) * | 2017-06-29 | 2017-09-26 | 珠海格力电器股份有限公司 | Device control method and device, electronic device and terminal |
CN107205094B (en) * | 2017-06-29 | 2019-05-07 | 珠海格力电器股份有限公司 | Device control method and device, electronic device and terminal |
WO2019011187A1 (en) * | 2017-07-11 | 2019-01-17 | 阿里巴巴集团控股有限公司 | Method, device, and apparatus for loss reporting, removing loss report, and service management of electronic account |
CN107483547A (en) * | 2017-07-20 | 2017-12-15 | 北京珠穆朗玛移动通信有限公司 | Anti-loss method, server, mobile terminal and the storage medium of user terminal |
CN107483547B (en) * | 2017-07-20 | 2020-10-30 | 北京珠穆朗玛移动通信有限公司 | Loss prevention method for user terminal, server, mobile terminal and storage medium |
CN108108972A (en) * | 2017-11-06 | 2018-06-01 | 捷开通讯(深圳)有限公司 | A kind of mobile terminal and its receipts/mode of payment and the device with storage function |
CN107831986A (en) * | 2017-11-21 | 2018-03-23 | 掌阅科技股份有限公司 | Unlocking method, electronic equipment and the computer-readable storage medium of electronic reader |
CN107831986B (en) * | 2017-11-21 | 2018-12-21 | 掌阅科技股份有限公司 | Unlocking method, electronic equipment and the computer storage medium of electronic reader |
CN110348200A (en) * | 2018-04-02 | 2019-10-18 | 南宁富桂精密工业有限公司 | Application program installation method, system, server and terminal |
CN108769394A (en) * | 2018-05-15 | 2018-11-06 | 中国联合网络通信集团有限公司 | The control method and device of terminal traffic |
CN108769394B (en) * | 2018-05-15 | 2021-02-09 | 中国联合网络通信集团有限公司 | Terminal service control method and related product |
CN108632391A (en) * | 2018-05-21 | 2018-10-09 | 北京小米移动软件有限公司 | information sharing method and device |
CN108632391B (en) * | 2018-05-21 | 2022-03-11 | 北京小米移动软件有限公司 | Information sharing method and device |
CN108989879A (en) * | 2018-08-28 | 2018-12-11 | 广州视源电子科技股份有限公司 | Screen projection control method, device and system |
CN108989879B (en) * | 2018-08-28 | 2021-06-15 | 广州视源电子科技股份有限公司 | Screen projection control method, device and system |
CN110232272A (en) * | 2019-05-14 | 2019-09-13 | 上海家可科技有限公司 | Mobile device control method and device, server |
CN112866986A (en) * | 2021-03-16 | 2021-05-28 | 北京小米移动软件有限公司 | Data protection method, device, server and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105592146A (en) | Equipment control method, device and terminal | |
EP2960823B1 (en) | Method, device and system for managing authority | |
EP3113131B1 (en) | Method and device for providing object finding information | |
CN102739868B (en) | The loss processing method of mobile terminal and system | |
CN106170004B (en) | Method and device for processing verification code | |
US20190171805A9 (en) | Unlocking method and apparatus, and storage medium | |
CN109214187B (en) | Method and device for controlling computer to start and electronic equipment | |
CN106681717B (en) | Terminal application program management method and device and electronic equipment | |
EP3176719B1 (en) | Methods and devices for acquiring certification document | |
CN106454392A (en) | Live broadcast processing method, device and terminal | |
US10706307B2 (en) | Methods and devices for processing fingerprint information | |
CN108052822B (en) | Terminal control method, device and system | |
US10515224B2 (en) | Method, device and storage medium for printing information | |
CN105100074A (en) | Data operation processing method, device and terminal equipment | |
CN106603815B (en) | Message processing method and device | |
CN105677513A (en) | Method and device for restoring backup data | |
CN107612888B (en) | Enterprise user space creation method and device | |
CN104951703A (en) | Terminal control method and device | |
CN106611112A (en) | Application program safe processing method, device and equipment | |
CN107580142B (en) | Method and device for executing processing | |
CN110213062B (en) | Method and device for processing message | |
CN106168967B (en) | Webpage information collection method, webpage information protection device and mobile terminal | |
CN109785469A (en) | Access control equipment control method and system | |
WO2017181550A1 (en) | Account-theft protection method, device, and system | |
CN105912926A (en) | Legal installation package acquisition method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160518 |
|
RJ01 | Rejection of invention patent application after publication |