System and method for controlling application
An application control and application manager technology, applied in the field of network television, can solve the problem that the control strategy of the main service provider of IPTV cannot be dynamically executed.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0069] figure 2 This is a system architecture diagram for implementing control of applications in the present invention, in which,
[0070] The policy description information transmission device is located at the IPTV server, and uses unicast or multicast to transmit the application control policy description information, which is hereinafter referred to as the policy description information for short. The policy description information includes at least the uniform resource locator (URL) from which the policy file can be obtained, and the version number of the policy file. The policy description information is included in the application description information, and its structure is shown in Table 2:
[0071] name
description
Application unique identifier
Unique identifier to identify the application
Application organization unique identifier
The unique identifier of the organization to which the application belongs
Application Name
The name of the app
App version...
Embodiment 2
[0117] The system architecture based on this embodiment is the same as the first embodiment. Set the policy file as follows:
[0118]
[0119] 1.0
[0120]
[0121] 0x2C:0x10
[0122] 0
[0123]
[0124]
[0125]
[0126] 0x01-0x1F:0x1E-0xFF
[0127] 0
[0128] 19:00-21:00
[0129]
[0130]
[0131] 0x21:0x3C
[0132] 0
[0133] 18:00-22:00
[0134]
[0135]
[0136] The format of the application identification is: organization ID: application ID, the organization ID is a globally unified 32-bit manufacturer ID, and the application ID is 16 bits; action 0 indicates that the application is prohibited from running.
[0137] Strategy 1 means that applications identified as 0x2C:0x10 are prohibited from running; Strategy 2 means that all applications whose organization ID ranges from 0x01-0x1F and application ID ranges from 0x1E-0xFF are prohibited from running between 19:00-21:00; Strategy 3 means Applications marked as 0x21:0x3C are prohibited from running between 18:00-22:...
Embodiment 3
[0150] Set the policy file as:
[0151]
[0152] 1.0
[0153]
[0154] 0x20, U
[0155] 0
[0156]
[0157]
[0158]
[0159] 0x20, B
[0160] 0
[0161] 19:00-21:00
[0162]
[0163]
[0164] Where U represents an unbound application, and B represents a bound application. Policy 1 indicates that the unbound application of the service provider whose ID is 0x20 is prohibited from running. Policy 2 means that the bound application of the service provider with ID 0x20 is prohibited from running from 19:00-21:00.
[0165] Then the steps to update the application strategy are:
[0166] 1. The policy file is downloaded to the terminal device;
[0167] 2. The strategy engine writes the strategy information in the strategy file into the strategy database;
[0168] 3. The application control module receives application description information or user input events;
[0169] 4. The policy engine filters the received information according to the policies in the policy database. For example,...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 