[go: up one dir, main page]

CN116702102A - Mobile terminal management method and device, storage medium and electronic equipment - Google Patents

Mobile terminal management method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN116702102A
CN116702102A CN202310815595.5A CN202310815595A CN116702102A CN 116702102 A CN116702102 A CN 116702102A CN 202310815595 A CN202310815595 A CN 202310815595A CN 116702102 A CN116702102 A CN 116702102A
Authority
CN
China
Prior art keywords
application
instruction
mobile terminal
execution instruction
execution
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310815595.5A
Other languages
Chinese (zh)
Inventor
赵丽娟
段古纳
齐洪东
刘丹
马瑞繁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING KEXIN HUATAI INFORMATION TECHNOLOGY CO LTD
Original Assignee
BEIJING KEXIN HUATAI INFORMATION TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING KEXIN HUATAI INFORMATION TECHNOLOGY CO LTD filed Critical BEIJING KEXIN HUATAI INFORMATION TECHNOLOGY CO LTD
Priority to CN202310815595.5A priority Critical patent/CN116702102A/en
Publication of CN116702102A publication Critical patent/CN116702102A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/30Arrangements for executing machine instructions, e.g. instruction decode
    • G06F9/30181Instruction operation extension or modification
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44594Unloading
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5011Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals
    • G06F9/5016Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resources being hardware resources other than CPUs, Servers and Terminals the resource being the memory
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72406User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a management method and device of a mobile terminal, a storage medium and electronic equipment. The method comprises the following steps: analyzing instruction information received by the mobile terminal to obtain instruction content; generating a first execution instruction according to a preset strategy and instruction content; acquiring a target strategy associated with a first execution instruction from a database, and identifying data in instruction content according to the target strategy to obtain an identification result; and modifying the first execution instruction according to the identification result to obtain a second execution instruction, and sending the second execution instruction to the management middleware. The application solves the problem that the safety mechanism of the mobile terminal cannot be flexibly adjusted according to the operation instruction in the related technology.

Description

Mobile terminal management method and device, storage medium and electronic equipment
Technical Field
The present application relates to the field of mobile terminal control, and in particular, to a method and apparatus for managing a mobile terminal, a storage medium, and an electronic device.
Background
With the continuous development of information technology, mobile terminals are widely used by more and more companies and individuals as information processing tools, and are applied to various complex use environments to store and process important working data, including privacy data related to information security, so that the security of company services can be ensured when the mobile terminals are used for company services.
Meanwhile, with the wide use of mobile terminals, malicious codes for the mobile terminals are layered endlessly, and although the mobile terminals themselves provide corresponding security mechanisms, a plurality of defects and vulnerabilities exist, and the security mechanisms provided by the mobile terminals themselves are usually set by mobile terminal manufacturers, cannot be generated conveniently and rapidly for companies using the mobile terminals, cannot be flexibly adjusted, and further cause the security to be greatly reduced when the mobile terminals are operated.
Aiming at the problem that the safety mechanism of the mobile terminal cannot be flexibly adjusted according to the operation instruction in the related technology, no effective solution is proposed at present.
Disclosure of Invention
The application provides a management method and device of a mobile terminal, a storage medium and electronic equipment, and aims to solve the problem that a safety mechanism of the mobile terminal cannot be flexibly adjusted according to an operation instruction in the related art.
According to one aspect of the present application, there is provided a management method of a mobile terminal. The method comprises the following steps: analyzing instruction information received by the mobile terminal to obtain instruction content, wherein the instruction content at least comprises one of the following components: modifying, deleting, dormancy and updating the application in the mobile terminal; generating a first execution instruction according to a preset strategy and instruction content, wherein the first execution instruction is used for indicating the management middleware to operate the application in the mobile terminal; acquiring a target strategy associated with a first execution instruction from a database, and identifying data in instruction content according to the target strategy to obtain an identification result; and modifying the first execution instruction according to the identification result to obtain a second execution instruction, and sending the second execution instruction to the management middleware.
Optionally, generating the first execution instruction according to the preset policy and the instruction content includes: acquiring the weight of each application in the mobile terminal to obtain a plurality of preset weights; determining the residual memory capacity of the mobile terminal, and judging whether the residual memory capacity is larger than a preset capacity or not; and closing the application in the mobile terminal according to the sequence from small weight to large weight under the condition that the residual memory capacity is smaller than or equal to the preset capacity, and updating the residual memory capacity of the mobile terminal in the process of closing the application until the updated residual memory capacity is larger than the preset capacity.
Optionally, the mobile terminal includes a first application, and modifying the first execution instruction according to the identification result to obtain a second execution instruction includes: and under the condition that the identification result indicates that the level of the first application is larger than the preset level, prohibiting the first application from being closed in the process of closing the application, and reselecting the application to be closed according to the weight.
Optionally, when the instruction content is unloading the second application, modifying the first execution instruction according to the identification result, to obtain the second execution instruction includes: determining the first execution instruction as a second execution instruction under the condition that the first execution instruction indicates that unloading of the second application is forbidden, wherein the mobile terminal comprises the second application; under the condition that the first execution instruction indicates to uninstall the second application, acquiring an identification result, wherein the identification result is generated by a target strategy and user information, and the user information is information of a user sending instruction information; setting the second execution instruction to be empty under the condition that the identification result indicates that the user does not have the authority to uninstall the second application; and setting the second execution instruction to uninstall the second application in the case that the user has the authority to uninstall the second application.
Optionally, the mobile terminal includes a third application, and generating the first execution instruction according to the preset policy and the instruction content when the instruction content is that the third application is operated includes: acquiring the grade of a user sending instruction information, obtaining a first grade, determining the grade of a third application, and obtaining a second grade; judging whether the first level is greater than or equal to the second level, and setting the first execution instruction to allow the third application to operate under the condition that the first level is greater than or equal to the second level; in the case that the first level is less than the second level, the first execution instruction is set to disallow operation of the third application.
Optionally, modifying the first execution instruction according to the identification result, and obtaining the second execution instruction includes: under the condition that the identification result represents that the grade of the third application changes, acquiring the changed grade of the third application to obtain a third grade, and judging whether the first grade is larger than or equal to the third grade; under the condition that the first level is greater than or equal to the third level, changing the first execution instruction into a first execution instruction allowing operation on the third application to obtain a second execution instruction; and under the condition that the first level is smaller than the third level, changing the first execution instruction to the condition that the operation on the third application is not allowed, and obtaining the second execution instruction.
Optionally, the mobile terminal includes a fourth application, and when the instruction content is that the fourth application is updated, modifying the first execution instruction according to the identification result, and obtaining the second execution instruction includes: under the condition that the instruction information is issued by the server, modifying the first execution instruction to allow updating of the fourth application; under the condition that the instruction information is issued by a user, determining the first execution instruction as a second execution instruction under the condition that the level of the fourth application is smaller than a preset level; and under the condition that the instruction information is issued by the user, sending the instruction content to the server side under the condition that the grade of the fourth application is greater than or equal to a preset grade, receiving feedback information sent by the server side, and determining a second execution instruction according to the feedback information.
Optionally, after sending the second execution instruction to the management middleware, the method further comprises: receiving an instruction execution result fed back by the management middleware, sending the instruction execution result to the server, and displaying the instruction execution result on the server; monitoring device information of the mobile terminal, wherein the device information at least comprises one of the following: device data, user data, application data; and under the condition that the equipment information of the mobile terminal is changed, acquiring the changed equipment information, sending the changed equipment information to the server, and displaying the changed equipment information on the server.
Optionally, the method further comprises: receiving a policy change instruction issued by a server, wherein the policy change instruction comprises an update policy, and the policy change instruction is used for changing a target policy; encrypting the updating strategy to obtain an encryption strategy, and replacing the encryption strategy with the target strategy in the database to obtain the updated target strategy.
According to another aspect of the present application, there is provided a management apparatus of a mobile terminal. The device comprises: the analyzing unit is used for analyzing the instruction information received by the mobile terminal to obtain instruction content, wherein the instruction content at least comprises one of the following components: modifying, deleting, dormancy and updating the application in the mobile terminal; the generation unit is used for generating a first execution instruction according to a preset strategy and instruction content, wherein the first execution instruction is used for indicating the management middleware to operate the application in the mobile terminal; the first acquisition unit is used for acquiring a target strategy associated with the first execution instruction from the database, and identifying data in the instruction content according to the target strategy to obtain an identification result; and the modification unit is used for modifying the first execution instruction according to the identification result to obtain a second execution instruction and sending the second execution instruction to the management middleware.
According to another aspect of the present application, there is also provided a computer storage medium for storing a program, wherein the program is executed to control a device in which the computer storage medium is located to perform a method for managing a mobile terminal.
According to another aspect of the present application, there is also provided an electronic device comprising one or more processors and a memory; the memory stores computer readable instructions, and the processor is configured to execute the computer readable instructions, where the computer readable instructions execute a method for managing a mobile terminal.
According to the application, the following steps are adopted: analyzing instruction information received by the mobile terminal to obtain instruction content, wherein the instruction content at least comprises one of the following components: modifying, deleting, dormancy and updating the application in the mobile terminal; generating a first execution instruction according to a preset strategy and instruction content, wherein the first execution instruction is used for indicating the management middleware to operate the application in the mobile terminal; acquiring a target strategy associated with a first execution instruction from a database, and identifying data in instruction content according to the target strategy to obtain an identification result; and modifying the first execution instruction according to the identification result to obtain a second execution instruction, and sending the second execution instruction to the management middleware. The method and the device solve the problem that the safety mechanism of the mobile terminal cannot be flexibly adjusted according to the operation instruction in the related art. After the instruction content is analyzed through the preset strategy and the execution instruction is generated, the instruction content is further analyzed through the target strategy, namely the instruction content is analyzed through the preset strategy and the target strategy at the same time, and the execution instruction obtained through the analysis of the preset strategy is modified through the identification result obtained through the analysis of the target strategy after the analysis, so that the effect of managing the application in the mobile terminal conveniently through the setting of the target strategy under the condition that the setting of the original manufacturer of the mobile terminal is not changed is achieved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application. In the drawings:
fig. 1 is a schematic diagram of a management system of a mobile terminal according to an embodiment of the present application;
fig. 2 is a flowchart of a management method of a mobile terminal according to an embodiment of the present application;
FIG. 3 is a flow chart of an application keep-alive procedure provided in accordance with an embodiment of the application;
FIG. 4 is a flow chart of an application anti-uninstall process provided in accordance with an embodiment of the present application;
FIG. 5 is a flow chart of an application rights configuration flow provided in accordance with an embodiment of the present application;
FIG. 6 is a flow chart of an application update flow provided in accordance with an embodiment of the present application;
fig. 7 is a schematic diagram of a management apparatus of a mobile terminal according to an embodiment of the present application;
fig. 8 is a schematic diagram of an electronic device according to an embodiment of the present application.
Detailed Description
It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be combined with each other. The application will be described in detail below with reference to the drawings in connection with embodiments.
In order that those skilled in the art will better understand the present application, a technical solution in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, shall fall within the scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate in order to describe the embodiments of the application herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that, related information (including, but not limited to, user equipment information, user personal information, etc.) and data (including, but not limited to, data for presentation, analyzed data, etc.) related to the present disclosure are information and data authorized by a user or sufficiently authorized by each party. For example, an interface is provided between the system and the relevant user or institution, before acquiring the relevant information, the system needs to send an acquisition request to the user or institution through the interface, and acquire the relevant information after receiving the consent information fed back by the user or institution.
It should be noted that the management method, apparatus, storage medium and electronic device of the mobile terminal determined in the present disclosure may be used in the field of mobile terminal control, and may also be used in any field other than the field of mobile terminal control, where the management method, apparatus, storage medium and application field of the mobile terminal determined in the present disclosure are not limited.
In this embodiment, as shown in fig. 1, the foregoing method for managing the mobile terminal 102 is performed by using an optional management system of the mobile terminal 102 as an execution body, where the management system of the mobile terminal 102 at least includes: the system comprises a server 101 and a mobile terminal 102, wherein the mobile terminal 102 comprises a proxy application 103, a management middleware 104 and an execution module 105.
The server 101 is connected to the proxy application 103 in the mobile terminal 102, and is configured to generate a target policy and send the target policy to the proxy application 103, and also configured to display information and operation conditions of the mobile terminal 102. The server 101 may be connected to one mobile terminal 102, and may also be connected to a plurality of mobile terminals 102, where the plurality of mobile terminals 102 may be grouped and the mobile terminals 102 may be collectively managed according to the grouping.
The proxy application 103 is connected with the server 101 and the associated middleware, and is configured to receive the target policy sent by the server 101, store the target policy, and identify the instruction information according to the target policy after receiving the instruction information for operating the mobile terminal 102, so as to determine how to operate the mobile terminal 102.
The management middleware 104 is connected with the proxy application 103 and the execution module 105, and is used for sending the execution instruction issued by the proxy application 103 to the execution module 105, and executing the execution instruction issued by the proxy application 103 through the execution module 105. Thus, by deploying the proxy application 103 of the authority configuration service in the mobile terminal 102, the authority configuration instruction is generated by the proxy application 103 according to the target policy, and meanwhile, the instruction is transmitted to the execution module at the bottom layer for realizing the instruction. Because the software developed under the standard mobile operating system can acquire special rights only by signing by a terminal manufacturer, and the functions of outputting exclusively, stopping other applications and the like are realized, a user-controllable rights management system is established through the content, and system rights and unified management can be conveniently granted to the applications.
Because of the specificity of the authority configuration of the mobile terminal 102, the proxy application 103 needs to obtain the control right of the terminal bottom layer module part to realize the related function of the authority configuration, so the method is realized on the premise that the control right of the related bottom layer system is obtained through the modes of authorization or open interfaces and the like.
According to an embodiment of the application, a management method of a mobile terminal is provided.
Fig. 2 is a flowchart of a management method of a mobile terminal according to an embodiment of the present application. As shown in fig. 2, the method comprises the steps of:
step S202, analyzing instruction information received by the mobile terminal to obtain instruction content, wherein the instruction content at least comprises one of the following steps: and modifying, deleting, dormancy and updating the application in the mobile terminal.
Specifically, when the user using the mobile terminal issues instruction information to the mobile terminal, the proxy application receives the instruction information at the same time and analyzes the instruction information to obtain instruction content, so as to determine service content indicated by the instruction content, for example, the user indicates to uninstall the application software a on the mobile terminal, and at this time, the proxy application also receives an instruction for uninstalling the application software a.
Step S204, a first execution instruction is generated according to a preset strategy and instruction content, wherein the first execution instruction is used for indicating the management middleware to operate the application in the mobile terminal.
Specifically, after the instruction is received, a first execution instruction is generated according to the instruction content by a preset policy carried by the mobile terminal, for example, a user instructs to uninstall the application software a on the mobile terminal, the preset policy can judge whether the application software a can be uninstalled, and under the condition that the application software a can be uninstalled, the first execution instruction is to carry out the operation of uninstalling the application software a.
Step S206, obtaining a target strategy associated with the first execution instruction from the database, and identifying data in the instruction content according to the target strategy to obtain an identification result.
Specifically, while a first execution instruction is generated according to instruction content through a preset policy carried by the mobile terminal, a target policy related to the first execution instruction is obtained from a database, wherein the database is a database of a proxy application, the target policy is related to the first execution instruction and includes related to an object indicated by the first execution instruction and related to an operation indicated by the first execution instruction, for example, in the case that the first execution instruction indicates to uninstall application software a, the target policy is a policy related to uninstall application software a, that is, whether to delete application software a.
Further, after the target policy is obtained, the instruction content may be analyzed by the target policy, so that a recognition result of the instruction content is determined according to the target policy, for example, in a case that the instruction content is the deletion of the application software a, the recognition result of the instruction content may be a level, authority, function, whether a deletion prohibition flag is set, and the like of the application software a.
Step S208, the first execution instruction is modified according to the identification result to obtain a second execution instruction, and the second execution instruction is sent to the management middleware.
Specifically, after the target policy obtains the identification result, the first execution instruction may be modified according to the identification result, so as to obtain the second execution instruction, for example, when the identification result represents that modification to the application software a is prohibited, and when the first execution instruction indicates that modification to the application software a is performed, the content indicated by the first execution instruction is modified, so as to ensure that the application software a is not modified.
According to the management method of the mobile terminal, provided by the embodiment of the application, the instruction content is obtained by analyzing the instruction information received by the mobile terminal, wherein the instruction content at least comprises one of the following steps: modifying, deleting, dormancy and updating the application in the mobile terminal; generating a first execution instruction according to a preset strategy and instruction content, wherein the first execution instruction is used for indicating the management middleware to operate the application in the mobile terminal; acquiring a target strategy associated with a first execution instruction from a database, and identifying data in instruction content according to the target strategy to obtain an identification result; and modifying the first execution instruction according to the identification result to obtain a second execution instruction, and sending the second execution instruction to the management middleware. The method and the device solve the problem that the safety mechanism of the mobile terminal cannot be flexibly adjusted according to the operation instruction in the related art. After the instruction content is analyzed through the preset strategy and the execution instruction is generated, the instruction content is further analyzed through the target strategy, namely the instruction content is analyzed through the preset strategy and the target strategy at the same time, and the execution instruction obtained through the analysis of the preset strategy is modified through the identification result obtained through the analysis of the target strategy after the analysis, so that the effect of managing the application in the mobile terminal conveniently through the setting of the target strategy under the condition that the setting of the original manufacturer of the mobile terminal is not changed is achieved.
In order to ensure the activity of the application software, optionally, in the method for managing a mobile terminal provided by the embodiment of the present application, when the instruction content is to close the mobile terminal, generating the first execution instruction according to the preset policy and the instruction content includes: acquiring the weight of each application in the mobile terminal to obtain a plurality of preset weights; determining the residual memory capacity of the mobile terminal, and judging whether the residual memory capacity is larger than a preset capacity or not; and closing the application in the mobile terminal according to the sequence from small weight to large weight under the condition that the residual memory capacity is smaller than or equal to the preset capacity, and updating the residual memory capacity of the mobile terminal in the process of closing the application until the updated residual memory capacity is larger than the preset capacity.
When the configuration of the application keep-alive strategy (target strategy) is performed, the integrity of the application source is ensured, and the system performs strict verification on the application basic information by combining the running state and the standard. The application of keep-alive strategies can be divided into: designating terminal designation application keep-alive: issuing the application keep-alive strategy to the appointed terminal according to the application name; part of the terminals specify application keep-alive: and issuing the application keep-alive strategy to the grouped partial terminals according to the application name, wherein each group of terminals can comprise a plurality of mobile terminals. The keep-alive policy configuration effectively reduces the situation that core application development must rely on terminal operating system adaptation, reduces the working difficulty of application customization, and effectively improves the configuration application and deployment capability of terminal application products.
In general, the starting of an application in a mobile terminal is divided into cold starting and hot starting, and when a user exits a certain application, the user does not truly exit an application process, but places the application in the background so that the application can be started immediately when the application is started next time. This mechanism presents a problem in that each process has its own independent memory address space, and as the number of applications opened increases, the memory used by the system is larger and larger, which is likely to result in insufficient system memory. The system of the mobile terminal can keep the application process for a long time as possible, but in order to newly build the process or run a more important process, the mobile terminal system finally removes the old process to recover the memory.
And the application processes in all the mobile terminals are uniformly managed by the mobile terminal operating system, and when the application processes are managed, the weight corresponding to the application is updated according to the running and using states of the application in the system. At this time, when the remaining content capacity of the mobile terminal is low, the system will firstly eliminate the process with the lowest importance, then the process with a slightly lower importance, and so on, starting to close by the application with the lowest weight, and closing the application according to the sequence from the low weight to the high weight until the remaining memory capacity is greater than the preset capacity, thereby recovering the system resources.
In order to keep alive a part of applications in the mobile terminal in a targeted manner, optionally, the mobile terminal includes a first application, and modifying the first execution instruction according to the identification result to obtain a second execution instruction includes: and under the condition that the identification result indicates that the level of the first application is larger than the preset level, prohibiting the first application from being closed in the process of closing the application, and reselecting the application to be closed according to the weight.
Specifically, after the instruction content is identified through the target policy, under the condition that the identification result indicates that the level of the first application is greater than the preset level, at this time, when the first application is closed, a protection mechanism of the target policy is triggered, so that the operation of closing the first application is skipped, the first application is ensured not to be closed, and further the activity of the application is ensured.
Fig. 3 is a flowchart of an application keep-alive procedure provided according to an embodiment of the present application, as shown in fig. 3, a memory checker is first set in a mobile terminal to monitor a remaining memory capacity of the mobile terminal in real time, and determine weights of each application according to an operation state and an application configuration of a plurality of applications in the mobile terminal, and rank the applications according to the weights to obtain a target sequence, and when the remaining memory capacity is less than or equal to a preset capacity, applications in the mobile terminal are closed according to a sequence from small to large of the weights in the current target sequence, and when determining that the applications are to be closed, whether the applications are to be closed need to be determined according to a target policy. And under the condition that closing is forbidden, skipping the application to be closed, and selecting the next application in the target sequence as a new application to be closed. The weight of the application to be closed can be changed, and the target sequence is redetermined through the changed weight, so that the effect of keeping the application alive is achieved.
In order to ensure the unloading prevention of the application software, optionally, in the management method of the mobile terminal provided by the embodiment of the present application, when the instruction content is unloading the second application, modifying the first execution instruction according to the identification result, to obtain the second execution instruction includes: determining the first execution instruction as a second execution instruction under the condition that the first execution instruction indicates that unloading of the second application is forbidden, wherein the mobile terminal comprises the second application; under the condition that the first execution instruction indicates to uninstall the second application, acquiring an identification result, wherein the identification result is generated by a target strategy and user information, and the user information is information of a user sending instruction information; setting the second execution instruction to be empty under the condition that the identification result indicates that the user does not have the authority to uninstall the second application; and setting the second execution instruction to uninstall the second application in the case that the user has the authority to uninstall the second application.
When the configuration of the application anti-load policy (target policy) is performed, the configuration may be performed independently according to the terminal SN, the application name, and the version number, or may be performed in batch according to the grouping. Application of anti-load policies can be divided into: the appointed terminal appoints the application to prevent uninstallation: issuing the application anti-unloading strategy to the appointed terminal according to the application name; part of the terminal appointed application anti-unloading: and issuing the application anti-unloading strategy to part of the terminals of the group according to the application name. When the configuration is carried out, the system combines the running state of the terminal and basic information of the reference application to carry out strict check, so as to ensure the integrity of the application source, the strategy is released through a special safety configuration channel established by deep customization, and the configuration release has a strict mechanism to carry out safety assurance and prevent configuration tampering and counterfeiting.
Specifically, after the configuration of the target policy is completed, whether the second application can be unloaded is determined according to a preset policy set in the mobile terminal, and under the condition that the second application cannot be unloaded according to the preset policy, the first execution instruction is not required to be modified, the second application is directly kept in a non-unloading state, under the condition that the second application can be unloaded according to the preset policy, whether the second application can be deleted is determined according to the target policy, and under the condition that the second application cannot be deleted, the first execution instruction is required to be modified, and the second application is required to be modified into an instruction for prohibiting the deletion of the second application, so that the second execution instruction is obtained.
Fig. 4 is a flowchart of an application anti-uninstallation process provided according to an embodiment of the present application, and as shown in fig. 4, it can be seen that an uninstallation requirement of a mobile terminal generally comes from two approaches:
1) The method is generally realized by calling an uninstall application interface exposed by a target application, sending a request message to a program setting of an operating system to set an uninstall command after an uninstall action is started, triggering an uninstall program in an application management service through a bottom uninstall command, and finally executing the uninstall action.
2) And the other unloading path is used for sending out a target application unloading instruction through an operating system application tool. The uninstall instruction uninstalls through a command line, and the command line uninstalls the target application by triggering an uninstaller in the application management service.
When an unloading instruction is received, whether the second application can be unloaded is determined according to a preset strategy set in the mobile terminal, the second application is directly kept in a non-unloading state without modifying the first execution instruction under the condition that the second application cannot be unloaded is determined by the preset strategy, whether the second application can be deleted or not is determined according to a target strategy under the condition that the second application can be unloaded is determined by the preset strategy, an identification result is generated, the first execution instruction is required to be modified into an instruction for prohibiting the deletion of the second application under the condition that the second application cannot be deleted, and therefore the second execution instruction is obtained, the second instruction is generated in the management middleware, and the anti-unloading performance of the application is further guaranteed.
Optionally, the mobile terminal includes a third application, and generating the first execution instruction according to the preset policy and the instruction content when the instruction content is that the third application is operated includes: acquiring the grade of a user sending instruction information, obtaining a first grade, determining the grade of a third application, and obtaining a second grade; judging whether the first level is greater than or equal to the second level, and setting the first execution instruction to allow the third application to operate under the condition that the first level is greater than or equal to the second level; in the case that the first level is less than the second level, the first execution instruction is set to disallow operation of the third application.
Specifically, when any application in the mobile terminal, such as the third application, is operated, the level of the third application needs to be determined, the level of the user performing the operation is determined, and under the condition that the user level is lower than the application level, the preset policy can prohibit the user from performing the operation on the third application, so that the safety of the third application is ensured.
Further, in order to modify the authority of the application conveniently, optionally, in the method for managing a mobile terminal provided by the embodiment of the present application, modifying the first execution instruction according to the identification result, to obtain the second execution instruction includes: under the condition that the identification result represents that the grade of the third application changes, acquiring the changed grade of the third application to obtain a third grade, and judging whether the first grade is larger than or equal to the third grade; under the condition that the first level is greater than or equal to the third level, changing the first execution instruction into a first execution instruction allowing operation on the third application to obtain a second execution instruction; and under the condition that the first level is smaller than the third level, changing the first execution instruction to the condition that the operation on the third application is not allowed, and obtaining the second execution instruction.
Specifically, when the identification result determines that the level of the third application changes, that is, in order to enable the user to process the third application, the server adds a new level of the third application into the target policy, generates the identification result according to the target policy when the first execution instruction is obtained and the policy for modifying the level of the third application exists in the target policy, and prohibits the operation of the third application when the identification result indicates that the modified level of the third application is greater than or equal to the user level, and allows the operation of the third application when the identification result indicates that the modified level of the third application is less than the user level, so that the operation result obtained by the preset policy is modified according to the target policy, and then different authorities are granted according to different application functions, and the user can access the sensitive data of the user after the user has to apply the authorities, thereby achieving the effect of protecting the privacy of the mobile terminal user.
Fig. 5 is a flowchart of an application permission configuration flow provided according to an embodiment of the present application, as shown in fig. 5, permission configuration firstly generates a target policy at a server, then sends the target policy to an agent application in a mobile terminal system, analyzes and decomposes the target policy to obtain an identification result, and implements policy execution and information feedback through a management middleware, thereby completing permission modification, and further, when a user operates the target application, the operation result can be modified according to the identification result.
The general application can generate initial authority when the system is started or the application is installed, and if the initial authority cannot meet the existing application requirement of the target application, the use authority of the target application is increased or reduced. When the permission of the application needs to be modified, a target policy can be issued, so that the permission of the target application is temporarily modified according to the target policy, and the effect of modifying the permission of the application is achieved.
It should be noted that, in the case that the recognition result is not obtained by the target policy, the target application is still operated according to the instruction content of the first execution instruction.
Optionally, in the method for managing a mobile terminal provided by the embodiment of the present application, the mobile terminal includes a fourth application, and when the instruction content is to update the fourth application, modifying the first execution instruction according to the identification result, to obtain the second execution instruction includes: under the condition that the instruction information is issued by the server, modifying the first execution instruction to allow updating of the fourth application; under the condition that the instruction information is issued by a user, determining the first execution instruction as a second execution instruction under the condition that the level of the fourth application is smaller than a preset level; and under the condition that the instruction information is issued by the user, sending the instruction content to the server side under the condition that the grade of the fourth application is greater than or equal to a preset grade, receiving feedback information sent by the server side, and determining a second execution instruction according to the feedback information.
Specifically, since the application in the mobile terminal may need to be updated, however, due to different functions and rights of the application, the update flow when the update is performed is also different.
After receiving the application update instruction, the mobile terminal needs to determine whether the application update instruction is an update instruction issued by a user or an update instruction issued by a server, and under the condition of the update instruction issued by the server, the content of the first execution instruction is not required to be considered, so that the first execution instruction is directly modified into the fourth application.
Under the condition that an updating instruction is issued by a user, the level of a fourth application needs to be determined, under the condition that the level of the fourth application is smaller than a preset level, the fourth application is characterized as an application capable of being updated freely, and whether the fourth application can be updated at the current moment or not can be determined according to a preset strategy without being controlled by a server, so that a first executing instruction is obtained, and the first executing instruction does not need to be modified.
And under the condition that the level of the fourth application is greater than or equal to the preset level, the fourth application is characterized in that the fourth application needs to receive the control of the server, at the moment, an update instruction needs to be sent to the server, feedback information fed back by the server is received, whether the fourth application is updated or not is determined according to the feedback information, and the effect of controlling the update of the application is achieved.
Fig. 6 is a flowchart of an application update flow provided according to an embodiment of the present application, as shown in fig. 6, when an application update instruction is received, it needs to be determined whether the update instruction is sent by a user or sent by a server, and in the case of the user sending, an application level is determined, and whether intervention by the server is required is determined according to the application level, and in the case that the application level is less than a preset level, the mobile terminal can update an application freely without being limited by authorization of the server; under the condition that the application level is greater than or equal to a preset level, the mobile terminal requests to update the application to the server, the server judges whether to allow the update of the application according to a set strategy, if so, an update command is issued, and the application in the mobile terminal is updated; under the condition that the server side issues the update instruction, the application update is directly performed according to the instruction issued by the server side, and the intervention of the mobile terminal is not needed. By the method, the updating of the key application can be controlled, so that the safety of the application in the mobile terminal is improved.
After the server obtains the updated information of the component, the information is pushed to a server security component management module, and whether the component needs to be updated is determined after strategy judgment. If the updating is judged, the information of the updating component is issued to the authority configuration service terminal agent in the mobile terminal system through a special security configuration channel, the corresponding component is analyzed and decomposed, the updating information of the security component is returned to the server for unified management.
Optionally, in the method for managing a mobile terminal according to the embodiment of the present application, after sending the second execution instruction to the management middleware, the method further includes: receiving an instruction execution result fed back by the management middleware, sending the instruction execution result to the server, and displaying the instruction execution result on the server; monitoring device information of the mobile terminal, wherein the device information at least comprises one of the following: device data, user data, application data; and under the condition that the equipment information of the mobile terminal is changed, acquiring the changed equipment information, sending the changed equipment information to the server, and displaying the changed equipment information on the server.
Specifically, after the management middleware issues the execution instruction to the mobile terminal, the execution result can be obtained through the management middleware and fed back to the server, so that an administrator managing the server can determine the running condition of the mobile terminal and the instruction execution condition, further, when the mobile terminal runs, the equipment information of the mobile terminal, the target strategy stored in the agent application in the mobile terminal, the user information of the user using the mobile terminal and the like can be sent to the server, and therefore the information of each mobile terminal connected with the server can be intuitively and conveniently obtained at the server, each server can be connected with a plurality of mobile terminals, the target strategy in the plurality of mobile terminals can be controlled, the plurality of mobile terminals can be further grouped, and the mobile terminals can be issued according to groups when the target strategy is issued.
For example, the mobile terminal device can be managed by the management method, configuration management of the terminal is supported, and unified management of terminal information (including terminal name, device identifier, manufacturer information, affiliated units, policy configuration condition, creation time and the like) can be performed through operations such as adding, deleting, modifying, searching, counting, refreshing and the like.
Furthermore, the management method can be used for managing units or users using the mobile terminal equipment, and supports configuration management of the units and personnel institutions. Supporting the management of units by adding, deleting, modifying, searching, counting, refreshing and other operations on unit information (comprising unit names, unit identifications, creation time and the like); meanwhile, the personnel mechanism can be configured and managed.
Furthermore, the execution of the target strategy and the operation of the mobile terminal can be managed, namely audit management is performed, audit content comprises the configuration behavior of the authority strategy of the mobile terminal, and audit information is supported to be reported to the server. And recording information aiming at the issuing condition of a target strategy of the mobile terminal, the running condition of the mobile terminal, the operation condition and the like, reserving the running state and the operation history of the mobile terminal, and supporting searching and statistics. The target strategy in the mobile terminal can be displayed on the server side.
Optionally, in the method for managing a mobile terminal provided by the embodiment of the present application, the method further includes: receiving a policy change instruction issued by a server, wherein the policy change instruction comprises an update policy, and the policy change instruction is used for changing a target policy; encrypting the updating strategy to obtain an encryption strategy, and replacing the encryption strategy with the target strategy in the database to obtain the updated target strategy.
Specifically, after the proxy application in the mobile terminal receives the policy change instruction issued by the server, the target policy in the proxy application is indicated to be changed by the characterization server, at this time, in order to ensure the security and confidentiality of policy information, a secure transmission channel is required to transmit the update policy, and under the condition that the proxy application receives the update policy, the received update policy is encrypted and then replaced with the target policy in the database, so that the update of the target policy is completed, and the security of the target policy in the proxy application is ensured.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowcharts, in some cases the steps illustrated or described may be performed in an order other than that illustrated herein.
The embodiment of the application also provides a management device of the mobile terminal, and the management device of the mobile terminal can be used for executing the management method for the mobile terminal. The following describes a management device of a mobile terminal provided by an embodiment of the present application.
Fig. 7 is a schematic diagram of a management apparatus of a mobile terminal according to an embodiment of the present application. As shown in fig. 7, the apparatus includes: the device comprises an analysis unit 71, a generation unit 72, a first acquisition unit 73 and a modification unit 74.
The parsing unit 71 is configured to parse the instruction information received by the mobile terminal to obtain instruction content, where the instruction content at least includes one of the following: and modifying, deleting, dormancy and updating the application in the mobile terminal.
The generating unit 72 is configured to generate a first execution instruction according to a preset policy and instruction content, where the first execution instruction is used to instruct the management middleware to operate an application in the mobile terminal.
The first obtaining unit 73 is configured to obtain a target policy associated with the first execution instruction from the database, and identify data in the instruction content according to the target policy, so as to obtain an identification result.
And the modifying unit 74 is configured to modify the first execution instruction according to the identification result, obtain a second execution instruction, and send the second execution instruction to the management middleware.
The management device of the mobile terminal provided by the embodiment of the application is used for analyzing the instruction information received by the mobile terminal through the analysis unit 71 to obtain the instruction content, wherein the instruction content at least comprises one of the following components: modifying, deleting, dormancy and updating the application in the mobile terminal; a generating unit 72, configured to generate a first execution instruction according to a preset policy and instruction content, where the first execution instruction is configured to instruct the management middleware to operate an application in the mobile terminal; a first obtaining unit 73, configured to obtain a target policy associated with the first execution instruction from the database, and identify data in the instruction content according to the target policy, so as to obtain an identification result; and the modifying unit 74 is configured to modify the first execution instruction according to the identification result, obtain a second execution instruction, and send the second execution instruction to the management middleware. The method and the device solve the problem that the safety mechanism of the mobile terminal cannot be flexibly adjusted according to the operation instruction in the related art. After the instruction content is analyzed through the preset strategy and the execution instruction is generated, the instruction content is further analyzed through the target strategy, namely the instruction content is analyzed through the preset strategy and the target strategy at the same time, and the execution instruction obtained through the analysis of the preset strategy is modified through the identification result obtained through the analysis of the target strategy after the analysis, so that the effect of managing the application in the mobile terminal conveniently through the setting of the target strategy under the condition that the setting of the original manufacturer of the mobile terminal is not changed is achieved.
Optionally, in the management apparatus for a mobile terminal provided in the embodiment of the present application, in a case where the instruction content is to turn off the mobile terminal, the generating unit 72 includes: the first acquisition module is used for acquiring the weight of each application in the mobile terminal to obtain a plurality of preset weights; the first judging module is used for determining the residual memory capacity of the mobile terminal and judging whether the residual memory capacity is larger than a preset capacity or not; the first closing module is used for closing the application in the mobile terminal according to the sequence from small weight to large weight under the condition that the residual memory capacity is smaller than or equal to the preset capacity, and updating the residual memory capacity of the mobile terminal in the process of closing the application until the updated residual memory capacity is larger than the preset capacity.
Optionally, in the management apparatus for a mobile terminal provided in the embodiment of the present application, the mobile terminal includes a first application, and the modification unit 74 includes: and the second closing module is used for prohibiting closing of the first application in the process of closing the application and reselecting the application to be closed according to the weight under the condition that the identification result indicates that the level of the first application is larger than the preset level.
Optionally, in the management apparatus for a mobile terminal provided in the embodiment of the present application, in a case where the instruction content is to uninstall the second application, the generating unit 72 includes: the first determining module is used for determining the first execution instruction as a second execution instruction when the first execution instruction indicates that unloading of the second application is forbidden, and the mobile terminal comprises the second application; the second acquisition module is used for acquiring an identification result under the condition that the first execution instruction indicates to uninstall the second application, wherein the identification result is generated by a target strategy and user information, and the user information is information of a user who sends instruction information; the first setting module is used for setting the second execution instruction to be empty under the condition that the identification result indicates that the user does not have the authority to uninstall the second application; and the second setting module is used for setting the second execution instruction to uninstall the second application under the condition that the user has the authority to uninstall the second application.
Optionally, in the management apparatus for a mobile terminal provided in the embodiment of the present application, the mobile terminal includes a third application, and the generating unit 72 includes: the third acquisition module is used for acquiring the grade of the user sending the instruction information to obtain a first grade, determining the grade of a third application and obtaining a second grade; the second judging module is used for judging whether the first level is greater than or equal to the second level or not, and setting the first execution instruction to allow the third application to operate under the condition that the first level is greater than or equal to the second level; and the third setting module is used for setting the first execution instruction to not allow the third application to be operated under the condition that the first level is smaller than the second level.
Optionally, in the management apparatus for a mobile terminal provided in the embodiment of the present application, the modification unit 74 includes: the fourth acquisition module is used for acquiring the changed grade of the third application under the condition that the identification result represents that the grade of the third application is changed, obtaining a third grade, and judging whether the first grade is larger than or equal to the third grade; the first changing module is used for changing the first execution instruction into a first execution instruction allowing the third application to be operated under the condition that the first level is greater than or equal to the third level, so as to obtain a second execution instruction; and the second changing module is used for changing the first execution instruction into a state that the third application is not allowed to be operated under the condition that the first level is smaller than the third level, so as to obtain a second execution instruction.
Optionally, in the management apparatus for a mobile terminal provided in the embodiment of the present application, the mobile terminal includes a fourth application, and the modification unit 74 includes: the third changing module is used for modifying the first execution instruction to allow updating of the fourth application under the condition that the instruction information is issued by the server side; the second determining module is used for determining the first executing instruction as a second executing instruction under the condition that the level of the fourth application is smaller than a preset level under the condition that the instruction information is issued by a user; and the sending module is used for sending the instruction content to the server side under the condition that the instruction information is issued by the user and the level of the fourth application is greater than or equal to the preset level, receiving feedback information sent by the server side and determining a second execution instruction according to the feedback information.
Optionally, in the management device for a mobile terminal provided by the embodiment of the present application, the device further includes: the sending unit is used for receiving the instruction execution result fed back by the management middleware, sending the instruction execution result to the server, and displaying the instruction execution result on the server; the monitoring unit is used for monitoring equipment information of the mobile terminal, wherein the equipment information at least comprises one of the following components: device data, user data, application data; the second obtaining unit is used for obtaining changed equipment information under the condition that the equipment information of the mobile terminal is changed, sending the changed equipment information to the server, and displaying the changed equipment information on the server.
Optionally, in the management device for a mobile terminal provided by the embodiment of the present application, the device further includes: the receiving unit is used for receiving a strategy changing instruction issued by the server, wherein the strategy changing instruction comprises an updating strategy, and the strategy changing instruction is used for changing a target strategy; the encryption unit is used for encrypting the updating strategy to obtain an encryption strategy, and replacing the encryption strategy with the target strategy in the database to obtain the updated target strategy.
The management device of the mobile terminal includes a processor and a memory, and the analyzing unit 71, the generating unit 72, the first acquiring unit 73, the modifying unit 74, and the like are stored in the memory as program units, and the processor executes the program units stored in the memory to realize corresponding functions.
The processor includes a kernel, and the kernel fetches the corresponding program unit from the memory. The kernel can be provided with one or more than one, and the problem that the safety mechanism of the mobile terminal cannot be flexibly adjusted according to the operation instruction in the related technology is solved by adjusting the kernel parameters.
The memory may include volatile memory, random Access Memory (RAM), and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM), among other forms in computer readable media, the memory including at least one memory chip.
An embodiment of the present invention provides a computer-readable storage medium having stored thereon a program that, when executed by a processor, implements a method of managing the mobile terminal.
The embodiment of the invention provides a processor which is used for running a program, wherein the program runs to execute a management method of a mobile terminal.
As shown in fig. 8, an embodiment of the present invention provides an electronic device, where the electronic device 80 includes a processor, a memory, and a program stored on the memory and executable on the processor, and the processor implements the following steps when executing the program: analyzing instruction information received by the mobile terminal to obtain instruction content, wherein the instruction content at least comprises one of the following components: modifying, deleting, dormancy and updating the application in the mobile terminal; generating a first execution instruction according to a preset strategy and instruction content, wherein the first execution instruction is used for indicating the management middleware to operate the application in the mobile terminal; acquiring a target strategy associated with a first execution instruction from a database, and identifying data in instruction content according to the target strategy to obtain an identification result; and modifying the first execution instruction according to the identification result to obtain a second execution instruction, and sending the second execution instruction to the management middleware. The device herein may be a server, PC, PAD, cell phone, etc.
The application also provides a computer program product adapted to perform, when executed on a data processing device, a program initialized with the method steps of: analyzing instruction information received by the mobile terminal to obtain instruction content, wherein the instruction content at least comprises one of the following components: modifying, deleting, dormancy and updating the application in the mobile terminal; generating a first execution instruction according to a preset strategy and instruction content, wherein the first execution instruction is used for indicating the management middleware to operate the application in the mobile terminal; acquiring a target strategy associated with a first execution instruction from a database, and identifying data in instruction content according to the target strategy to obtain an identification result; and modifying the first execution instruction according to the identification result to obtain a second execution instruction, and sending the second execution instruction to the management middleware.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, etc., such as Read Only Memory (ROM) or flash RAM. Memory is an example of a computer-readable medium.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises an element.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and variations of the present application will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. which come within the spirit and principles of the application are to be included in the scope of the claims of the present application.

Claims (12)

1. A method for managing a mobile terminal, comprising:
analyzing instruction information received by the mobile terminal to obtain instruction content, wherein the instruction content at least comprises one of the following steps: modifying, deleting, dormancy and updating the application in the mobile terminal;
Generating a first execution instruction according to a preset strategy and the instruction content, wherein the first execution instruction is used for indicating a management middleware to operate an application in the mobile terminal;
acquiring a target strategy associated with the first execution instruction from a database, and identifying data in the instruction content according to the target strategy to obtain an identification result;
and modifying the first execution instruction according to the identification result to obtain a second execution instruction, and sending the second execution instruction to the management middleware.
2. The method of claim 1, wherein generating the first execution instruction according to the preset policy and the instruction content in the case that the instruction content is to turn off the mobile terminal comprises:
acquiring the weight of each application in the mobile terminal to obtain a plurality of preset weights;
determining the residual memory capacity of the mobile terminal, and judging whether the residual memory capacity is larger than a preset capacity or not;
and closing the application in the mobile terminal according to the sequence from the small weight to the large weight under the condition that the residual memory capacity is smaller than or equal to the preset capacity, and updating the residual memory capacity of the mobile terminal in the process of closing the application until the updated residual memory capacity is larger than the preset capacity.
3. The method of claim 2, wherein the mobile terminal includes a first application, wherein modifying the first execution instruction according to the identification result to obtain a second execution instruction includes:
and under the condition that the identification result indicates that the level of the first application is larger than a preset level, prohibiting closing the first application in the process of closing the application, and reselecting the application to be closed according to the weight.
4. The method of claim 1, wherein modifying the first execution instruction according to the identification result in the case that the instruction content is to uninstall a second application, to obtain a second execution instruction comprises:
determining the first execution instruction as the second execution instruction in the case that the first execution instruction indicates that unloading of the second application is forbidden, wherein the second application is included in the mobile terminal;
acquiring the identification result under the condition that the first execution instruction indicates to uninstall the second application, wherein the identification result is generated by the target strategy and user information, and the user information is information of a user who sends the instruction information;
Setting the second execution instruction to be empty if the identification result indicates that the user does not have the right to uninstall the second application;
and setting the second execution instruction to uninstall the second application under the condition that the user has the authority to uninstall the second application.
5. The method according to claim 1, wherein the mobile terminal includes a third application, and wherein generating the first execution instruction according to the preset policy and the instruction content when the instruction content is to operate the third application includes:
acquiring the grade of a user sending the instruction information, obtaining a first grade, determining the grade of the third application, and obtaining a second grade;
judging whether the first level is greater than or equal to the second level, and setting the first execution instruction to allow operation of the third application if the first level is greater than or equal to the second level;
the first execution instruction is set to disallow operation of the third application if the first level is less than the second level.
6. The method of claim 5, wherein modifying the first execution instruction based on the recognition result to obtain a second execution instruction comprises:
Under the condition that the identification result represents that the grade of the third application changes, acquiring the changed grade of the third application to obtain a third grade, and judging whether the first grade is larger than or equal to the third grade;
when the first level is greater than or equal to the third level, changing the first execution instruction to allow the third application to be operated to obtain a second execution instruction;
and under the condition that the first level is smaller than the third level, changing the first execution instruction into a second execution instruction which does not allow the third application to be operated.
7. The method according to claim 1, wherein the mobile terminal includes a fourth application, and modifying the first execution instruction according to the identification result when the instruction content is that the fourth application is updated, so as to obtain a second execution instruction includes:
modifying the first execution instruction to allow updating of the fourth application under the condition that the instruction information is issued by a server side;
under the condition that the instruction information is issued by a user, determining the first execution instruction as the second execution instruction under the condition that the level of the fourth application is smaller than a preset level;
And under the condition that the instruction information is issued by a user, sending the instruction content to the server side under the condition that the grade of the fourth application is greater than or equal to a preset grade, receiving feedback information sent by the server side, and determining the second execution instruction according to the feedback information.
8. The method of claim 1, wherein after sending the second execution instruction to the management middleware, the method further comprises:
receiving an instruction execution result fed back by the management middleware, sending the instruction execution result to a server, and displaying the instruction execution result on the server;
monitoring equipment information of the mobile terminal, wherein the equipment information at least comprises one of the following: device data, user data, application data;
and under the condition that the equipment information of the mobile terminal is changed, acquiring changed equipment information, sending the changed equipment information to a server, and displaying the changed equipment information on the server.
9. The method of claim 7, wherein the method further comprises:
Receiving a policy change instruction issued by the server, wherein the policy change instruction comprises an update policy, and the policy change instruction is used for changing the target policy;
encrypting the updating strategy to obtain an encryption strategy, and replacing the encryption strategy with the target strategy in the database to obtain an updated target strategy.
10. A management apparatus for a mobile terminal, comprising:
the analyzing unit is used for analyzing the instruction information received by the mobile terminal to obtain instruction content, wherein the instruction content at least comprises one of the following components: modifying, deleting, dormancy and updating the application in the mobile terminal;
the generation unit is used for generating a first execution instruction according to a preset strategy and the instruction content, wherein the first execution instruction is used for indicating a management middleware to operate an application in the mobile terminal;
the first acquisition unit is used for acquiring a target strategy associated with the first execution instruction from a database, and identifying data in the instruction content according to the target strategy to obtain an identification result;
and the modification unit is used for modifying the first execution instruction according to the identification result to obtain a second execution instruction, and sending the second execution instruction to the management middleware.
11. A computer storage medium for storing a program, wherein the program when run controls a device in which the computer storage medium is located to perform the method of managing a mobile terminal according to any one of claims 1 to 9.
12. An electronic device comprising one or more processors and a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of managing a mobile terminal of any of claims 1-9.
CN202310815595.5A 2023-07-04 2023-07-04 Mobile terminal management method and device, storage medium and electronic equipment Pending CN116702102A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310815595.5A CN116702102A (en) 2023-07-04 2023-07-04 Mobile terminal management method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310815595.5A CN116702102A (en) 2023-07-04 2023-07-04 Mobile terminal management method and device, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN116702102A true CN116702102A (en) 2023-09-05

Family

ID=87833941

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310815595.5A Pending CN116702102A (en) 2023-07-04 2023-07-04 Mobile terminal management method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN116702102A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2025130700A1 (en) * 2023-12-22 2025-06-26 华为技术有限公司 Management method and apparatus

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2025130700A1 (en) * 2023-12-22 2025-06-26 华为技术有限公司 Management method and apparatus

Similar Documents

Publication Publication Date Title
CN109873803A (en) Application rights control method and device, storage medium, and computer equipment
US8769296B2 (en) Software signature tracking
WO2015124018A1 (en) Method and apparatus for application access based on intelligent terminal device
US20080244685A1 (en) Method and Apparatus for Providing Dynamic Security Management
US20020174369A1 (en) Trusted computer system
EP3590065A1 (en) Delegating security policy management authority to managed accounts
US20230195884A1 (en) Method for securing a system call, method for implementing an associated security policy and devices for carrying out such methods
US20130198872A1 (en) Method for component access control and electronic device
US20150302220A1 (en) Secure data containers
CN106339629A (en) Application management method and device
CN103546436A (en) Security control method, terminal, and cloud server
US12192182B2 (en) Container with encrypted software packages
JP2005531831A (en) Mobile wireless device having a protected file system
CN104978543A (en) Mobile terminal information safety protection system and method
EP3779747B1 (en) Methods and systems to identify a compromised device through active testing
CN115396140A (en) Application access control method and device, storage medium and computer equipment
CN116702102A (en) Mobile terminal management method and device, storage medium and electronic equipment
CN119670130A (en) A method, device, equipment and storage medium for accessing encrypted files
CN111488601B (en) Method and device for processing secret divulgence
CN117436079B (en) Integrity protection method and system for Linux system
CN106485104B (en) Automatic restoration method, device and system for terminal security policy
CN104955043A (en) Intelligent terminal safety protection system
KR101862382B1 (en) Method and device for managing application data in Android
CN117614734A (en) Cloud primary container boundary authority identification method and device
CN104866761B (en) A kind of high security Android intelligent terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination