Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, system and device for implementing information locking

A technology of information locking and attribute information, which is used in security devices, transmission systems, wireless communications, etc.

Active Publication Date: 2012-07-04
HUAWEI TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example: after the first DMS prohibits the USB hardware capability of the mobile terminal, it is desired to keep the mobile terminal prohibiting the USB hardware capability, that is, the second DMS cannot activate the USB hardware capability of the mobile terminal
However, in the prior art, as long as the server with device management capability can manage the mobile terminal, the prior art cannot meet the above requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and device for implementing information locking
  • Method, system and device for implementing information locking
  • Method, system and device for implementing information locking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0100] figure 2 It is a schematic diagram of the device management tree of the mobile terminal. Such as figure 2 As shown, the device management tree includes node A, node X, node Y, node X1 to node X7, and the lock node Lock, unlock node Unlock, server identification node ServerID, lock mode node Mode, and lock granularity node Granularity are set in the management. For simplicity of description, this embodiment abstracts the nodes in the device management tree into node A, node X, node X1 to node X7, and node Y. In practical applications, what is the structure of the device management tree, and which nodes can be represented by The user decides by himself, as long as the DMS and the mobile terminal agree in advance. Such as image 3 As shown, that is: node A is the root node (Interior Node), and X1~X7 are ID nodes, name (Name) nodes, description (Description), data (Data), operations (Operations), status (Status) nodes, etc. , the definition of its nodes is the same as...

Embodiment 2

[0187] This embodiment adopts the indicator node mode; the device management tree of this embodiment is similar to the device management tree in Embodiment 1, the only difference is that the Lock node and the Unlock node are indicator nodes, and the description of the Lock node and the Unlock node is shown in Table 8 Show:

[0188] Node: X / X5 / LockOr Unlock

[0189] Tree Occurrence format Minimum Access Types (Min.Access Types) 1 (one) Boolean get

[0190] table eight

[0191] In addition, in this embodiment, the mobile terminal will monitor the Lock node in real time.

[0192] Figure 5 is a flowchart of this embodiment. Such as Figure 5 As shown, the method for realizing locking in this embodiment includes the following steps:

[0193] Step 501: DMS sends a locking message to the mobile terminal, the locking message carries DMS identification, locking mode, indication information and locking object information, and ...

Embodiment 3

[0222] In this embodiment, the locking is implemented by means of tags. Image 6 is the flow chart of this embodiment, such as Image 6 As shown, this embodiment includes the following steps:

[0223] Step 601: The DMS sends a locking message carrying locking mode and locking object information to the mobile terminal, and the locking object information includes destination node path information and locking granularity.

[0224] In this embodiment, the locking message can be extended on the basis of the DM protocol, and its format is as follows:

[0225]

[0226] 1

[0227]

[0228]

[0229] . / A / X / X5

[0230]

[0231]

[0232] Read-Lock

[0233] Component

[0234]

[0235] Step 602: The mobile terminal modifies the attribute information of the locked object according to the locking mode and locking granularity in the locking message.

[0236] Similar to Embodiment 1 and Embodiment 2, the attribute ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method, a system and a device to realize the information locking, which comprises the steps as follows: a device management server (DMS) sends the locking information with the locking target information to a mobile terminal; a mobile end locks a locking target according to the locking information; the locking target is the locking target corresponding to the locking target information. A proposal of the invention is applied to ensure that DMS can lock the information of the mobile terminal, which avoids operations towards the terminal by other DMS.

Description

technical field [0001] The present invention relates to a technology for a server to manage a mobile terminal, in particular to a method, system and device for realizing information locking. Background technique [0002] The mobile terminal is an important part of the mobile operation service system, including a large amount of information, which is generally divided into capability information, appearance information and user personal data information. Among them, the capability information refers to the service capabilities of the mobile terminal, such as network capabilities, hardware capabilities, and software capabilities; the appearance information refers to the appearance that the mobile terminal can present to users, such as screen savers, desktops, wallpapers, menus, home pages, etc.; The data information is the personal privacy information saved by the user in the mobile terminal, such as address book, short message, schedule, task list, etc. [0003] In order to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04W8/20H04W8/24
CPCH04L29/08567H04W8/205H04L67/125H04W8/245H04W12/12H04W12/082H04W4/16H04W4/12H04B1/40
Inventor 李克鹏柴晓前董晓艺何江水康娇
Owner HUAWEI TECH CO LTD