WO2007041916A1 - Procede de gestion d'equipement terminal - Google Patents

Procede de gestion d'equipement terminal Download PDF

Info

Publication number
WO2007041916A1
WO2007041916A1 PCT/CN2006/001869 CN2006001869W WO2007041916A1 WO 2007041916 A1 WO2007041916 A1 WO 2007041916A1 CN 2006001869 W CN2006001869 W CN 2006001869W WO 2007041916 A1 WO2007041916 A1 WO 2007041916A1
Authority
WO
WIPO (PCT)
Prior art keywords
management
terminal device
command
managed
management command
Prior art date
Application number
PCT/CN2006/001869
Other languages
English (en)
French (fr)
Inventor
Xiaoqian Chai
Xiaoyi Dong
Hai Shen
Jie Tang
Qi Shu
Kepeng Li
Jiangshui He
Hongtao Gao
Jianzhang Cheng
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Priority to CNA2006800122572A priority Critical patent/CN101161007A/zh
Priority to US11/626,477 priority patent/US7889684B2/en
Publication of WO2007041916A1 publication Critical patent/WO2007041916A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies

Definitions

  • the present invention relates to the field of DM (Device Management) technology of the Open Mobile Alliance (OMA), and in particular, to a method for managing a terminal device.
  • DM Device Management
  • OMA Open Mobile Alliance
  • Mobile terminal equipment is an important part of the entire mobile operation service system. As the function of the terminal equipment becomes more and more complex, the probability of software problems in the terminal equipment increases significantly. At the same time, the competition between operators in the future is becoming more and more fierce. Therefore, how to effectively guarantee the user experience, improve user loyalty, maintain efficient service quality and lower equipment maintenance cost has become an important concern for operators and terminal manufacturers. problem.
  • the OMA DM (Open Mobile Alliance Device Management) specification is a technology for managing, diagnosing, and maintaining mobile terminal devices. It manages terminal devices by means of over-the-air (OTA, Over The Air). The management operations on the terminal devices include: terminal device parameter settings, firmware updates, software installation and upgrades, device errors, event information collection and processing, etc. .
  • the OMADM specification also provides a Network Service Interface (WSI) mechanism that allows third-party software/service providers to provide users with various monthly services, such as software downloads, through the Device Management Server (DM Server). Updates, firmware upgrades, parameter configuration and device diagnostics.
  • the mobile terminal devices managed by the 01VIADM specification include mobile terminals, palmtop computers, notebook computers, embedded devices, and in-vehicle systems, and do not exclude any other mobile terminal devices.
  • the technical problem to be solved by the present invention is to propose a management method of the terminal device, which effectively controls the attack of the terminal device on the enterprise security information, and improves the security and confidentiality of the enterprise information.
  • the present invention provides a method for managing a terminal device, including the steps of: A, the management side sets the management command; and
  • the configured management command is sent to the managed terminal device through the device management server.
  • the managed terminal device executes the management command.
  • the step A further includes the step of: the management side setting a trigger condition for triggering execution of the management command.
  • steps between the steps A and B further include the following steps:
  • step 8 is performed.
  • step B further includes the following steps: the management side delivers the set trigger condition to the managed terminal device through the device management server;
  • the steps B and C further include steps:
  • the managed terminal device manages the management command and the triggering condition issued by the device management server through the device management server;
  • the managed terminal device monitors whether the trigger condition is satisfied
  • step C is performed.
  • the managed terminal device stores the management command and the trigger condition in the form of a device management tree, respectively.
  • step B and the C further include the following steps:
  • the managed terminal device manages the management command issued by the device management server through the device management server.
  • steps between the steps A and B further include the following steps:
  • the device management server delivers the execution instruction to the managed terminal device;
  • step C When the managed terminal device in step C receives the execution instruction, it executes a management command stored by itself.
  • the managed terminal device stores the management command in the form of a device management tree.
  • the device management server obtains the obtained terminal device to execute the management command. Execution result information;
  • the management side acquires execution result information acquired by the device management server.
  • the manner in which the device management server obtains the execution result information obtained by the managed terminal device from executing the management command is:
  • the managed terminal device reports the execution result information obtained by executing the management command to the device management server;
  • the device management server extracts execution result information obtained by executing the management command from the managed terminal device.
  • the manner in which the management side obtains the execution result information acquired by the device management server is:
  • the device management server reports the obtained execution result information to the management side;
  • the management side extracts the obtained execution result information from the device management server.
  • step B specifically includes the steps of:
  • the device management server authenticates the management command, and after the authentication is passed, executes B2, and the device management server determines whether the management command complies with the device management protocol; if yes, executes B4, otherwise
  • the device management server converts the management command into a management command format that conforms to a device management protocol.
  • the device management server delivers the management command to the managed terminal device.
  • Camera function of a terminal device with a camera and / or
  • Short-range wireless communication function of a terminal device with an infrared interface a terminal device with an infrared interface
  • Short-range wireless communication function of a terminal device with a Bluetooth interface Short-range wireless communication function of a terminal device with a Bluetooth interface.
  • the present invention further provides a method for managing a terminal device, including the steps of:
  • the managed terminal device executes its own set management command.
  • the management side in the step 2) implements setting the set management command to the managed by writing the set management command to the smart card that can be installed and recognized in the managed terminal device. On the terminal device.
  • the step 1) further includes the step of: the management side setting a trigger condition for executing the management command execution.
  • the step 2) further includes the following steps: the management side sets the set trigger condition to the managed terminal device;
  • the steps 2) and 3) further include steps:
  • the managed terminal device monitors whether the trigger condition is satisfied
  • step 3 is performed.
  • the management side in the step 2) writes the set management command and the trigger condition to a smart card that can be installed and recognized in the managed terminal device, and implements the set management command and The trigger conditions are set to the managed terminal devices respectively.
  • the device management server delivers the execution instruction to the managed terminal device;
  • the terminal device managed in the step 3 When the terminal device managed in the step 3) receives the execution instruction, it executes a management command set by itself.
  • the above method wherein the method further comprises the steps of:
  • the device management server acquires execution result information obtained by the managed terminal device executing the management command
  • the management side acquires execution result information acquired by the device management server.
  • the manner in which the device management server obtains the execution result information obtained by the managed terminal device from executing the management command is:
  • the managed terminal device reports the execution result information obtained by executing the management command to the device management server;
  • the device management server extracts execution result information obtained by executing the management command from the managed terminal device.
  • the manner in which the management side obtains the execution result information acquired by the device management server is:
  • the device management server reports the obtained execution result information to the management side;
  • the management side extracts the obtained execution result information from the device management server.
  • the above method further includes the step of the management side performing an update maintenance process on the management command that has been set to the managed terminal device by the device management server.
  • Camera function of a terminal device with a camera and / or
  • Short-range wireless communication function of a terminal device with an infrared interface a terminal device with an infrared interface
  • Short-range wireless communication function of a terminal device with a Bluetooth interface Short-range wireless communication function of a terminal device with a Bluetooth interface.
  • the location triggering condition of the execution of the management command is triggered according to the location information currently being managed by the managed terminal device.
  • the solution of the present invention sets a management command on the management side and passes the set management command to the DMS. Is delivered to the managed terminal device, or directly to the managed terminal device; the managed terminal device executes the management command, so that the management side can manage the terminal device to be managed.
  • the terminal device that is further managed can also report the execution result information obtained by executing the management command to the management side through the DMS, so that the management personnel can monitor the usage status of the managed terminal device on the management side, and the Better management of the purpose of controlling the use status of the terminal device.
  • the management side of the enterprise can control and control the use of the employee communication terminal device, thereby effectively controlling
  • the attacks caused by employee communication terminal equipment on enterprise security information have improved the security and confidentiality of enterprise information.
  • FIG. 1 is a schematic flowchart of a method for managing a first terminal device according to the present invention
  • FIG. 2 is a schematic flowchart of a method for managing a terminal device according to the present invention
  • FIG. 3 is a schematic diagram of a method for managing a terminal device according to the present invention
  • FIG. 4 is a schematic diagram of a processing procedure for registering an enterprise user to a management server on the enterprise side to determine user information of a target operation group based on the system shown in FIG. 3;
  • FIG. 5 is a schematic diagram of a specific processing procedure for registering an enterprise user to the management server on the enterprise side to determine the final target operation group user information based on the system shown in FIG. 4;
  • Figure 6 is a schematic diagram of a specific maintenance process of the target operation group user information
  • FIG. 7 is a schematic diagram of a first manner of processing a method for implementing an enterprise to manage an enterprise user terminal device by applying the method of the present invention
  • FIG. 8 is a schematic diagram of a second manner of processing a method for implementing an enterprise to manage an enterprise user terminal device by applying the method of the present invention
  • Figure 9 is a schematic diagram of the process of maintaining and updating the management information on the smart card installed on the enterprise user terminal device on the enterprise side.
  • the solution of the present invention is based on the OMA DM specification, and provides a mechanism by using the terminal device management capability and the network service interface (such as the WSI interface) possessed by the device management server (DMS) itself.
  • the enterprise or organization can manage the use ability of the communication terminal equipment of its employees, thereby ensuring the security of the enterprise information within the controllable range.
  • FIG. 1 the figure is a flow chart of the main implementation principle of the first terminal device management method proposed by the present invention.
  • the main implementation process is as follows:
  • Step S10 the management side sets a management command, wherein the management command set by the management side may be a management command for recording the usage of the additional communication function on the managed terminal device; or may be used to disable or start the management Management commands for additional communication functions on the terminal device, etc.
  • the additional communication functions on the terminal device mainly include, but are not limited to, the camera function of the terminal device with the camera, and/or the short-range wireless communication function of the terminal device with the infrared interface. , and / or short-range wireless communication capabilities of terminal devices with Bluetooth interfaces.
  • the management side delivers the above-mentioned management command to the managed terminal device through the DMS, where the management side can communicate with the DMS through the external interface (such as the WSI interface) provided by the DMS itself, that is, management.
  • the side sends the management command set to the DMS to the DMS, and sends the terminal device information to be managed to the DMS.
  • the DMS sends the management command to the corresponding terminal device according to the terminal device information to be managed by the management side.
  • the DMS authenticates the management command and determines whether the management command complies with the DMS protocol after the authentication is passed; if the DMS sends the management command to the managed terminal device; otherwise, the DMS converts the management command into the DM protocol.
  • the management command form is delivered to the managed terminal device.
  • Step S30 the managed terminal device performs an operation of executing the received management command.
  • the main implementation principle of the method of the present invention is applied.
  • the management command needs to be triggered at a suitable time, and does not need to be executed at any time, such as for the enterprise management to control the communication terminal of its internal staff.
  • it is only necessary to manage the use of the communication terminal device during the employee's working hours or during the office, and there is no need to manage the use of the communication terminal device at other times or during other locations.
  • the management side separately sets a management command and a trigger condition for triggering execution of the management command; and whether the trigger condition set by the management side monitoring is satisfied;
  • the set management command is sent to the managed terminal device through the DMS;
  • the managed terminal device After the managed terminal device receives the management command, it immediately executes the management command.
  • the management side respectively sets a management command and a triggering condition for triggering the execution of the management command; the management side respectively delivers the determined management command and the triggering condition for triggering the execution of the management command to the managed terminal device through the DMS. ;
  • the managed terminal device stores a management command issued by the DMS and a trigger condition for triggering execution of the management command, wherein the managed terminal device preferably stores the management command in the form of a device management tree (DM management tree) and is used to trigger the management.
  • the trigger condition of the command execution that is, in the managed terminal device, the management command and the trigger condition may be stored in the form of an OMA DM device management tree; thus the trigger condition management tree node may be identified by the OMADM Scheduling scheduled task enabling component
  • the managed terminal device selects a different management command subtree or node in the device management tree to perform execution when the monitored trigger condition is met.
  • the managed terminal device monitors whether the received trigger condition is satisfied
  • the management side respectively sets a management command and a trigger condition for triggering the execution of the management command; the management side delivers the set management command to the managed terminal device through the DMS; the managed terminal device stores the management side through the DMS a management command issued; wherein the managed terminal device preferably stores the management command in the form of a DM management tree;
  • the execution command is sent to the managed terminal device through the DMS;
  • the managed terminal device When the managed terminal device receives the execution instruction, it executes its own stored management command, that is, When the managed terminal device receives the execution instruction, it selects a different management command subtree or node in the device management tree for execution.
  • the trigger condition set by the management side for triggering the execution of the set management command may be, but is not limited to,:
  • the time triggering condition of the execution of the management command is triggered according to the time period information, that is, a rule is set, and the management command is required to be executed only within a specified time period, and other time periods may not be executed; according to the current terminal device being managed
  • the location information triggers the location triggering condition of the execution of the management command, that is, when the managed terminal device is in the specified location area, triggering execution of the management command, when the managed terminal device is not in the specified location area, it is not required Execute administrative commands.
  • the location information in which the managed terminal device is currently located can be detected by the system positioning function.
  • the managed terminal device In order to further obtain the usage information of the managed terminal device in a timely manner, the managed terminal device also needs to feed back the execution result information obtained by executing the management command to the management side, where the managed terminal device will execute the result.
  • the process of feeding back information to the management side can be done in the following four ways:
  • the first type the managed terminal device reports the execution result information obtained by executing the management command to the DMS, and the DMS periodically reports the obtained execution result information to the management side.
  • the second type the managed terminal device periodically reports the execution result information obtained by executing the management command to the DMS; the management side periodically extracts the obtained execution result information from the DMS.
  • the third type the DMS periodically extracts the execution result information obtained by executing the management command from the managed terminal device; the DMS reports the obtained execution result information to the management side periodically.
  • the fourth type the DMS periodically extracts the execution result information obtained by executing the management command from the managed terminal device; the management side periodically extracts the obtained execution result information from the DMS.
  • the terminal device managed by the management side can be updated at any time (such as newly adding the managed terminal device, deleting the managed terminal device, etc.), and when the managed terminal device information changes, the management side database is updated synchronously. Corresponding information of managed terminal devices to make management more targeted and accurate.
  • FIG. 2 is a flow chart of the main implementation principle of the second terminal device management method proposed by the present invention.
  • the main implementation process is as follows:
  • Step S100 the management side sets a management command; wherein the specific explanation of the management command and the foregoing description The same, no more details here;
  • Step S200 the management side sets the above-mentioned set management command to the managed terminal device; wherein the management side can write the set management command to the smart card that can be installed and recognized in the managed terminal device,
  • the purpose of setting the set management command to the managed terminal device is achieved, wherein the management side preferably writes the set management command to the smart card that can be installed and recognized by the managed terminal device using the DM management tree form.
  • the subsequent management side can also perform maintenance and update processing on the management commands that have been set to the managed terminal device through the DMS.
  • Step S300 the managed terminal device performs an operation of executing a management command set by itself, that is, the managed terminal device may select a different management command subtree or node for execution in the device management tree stored by the smart card installed by itself.
  • the management side separately sets a management command and a trigger condition for triggering execution of the management command; the management side sets the set management command and the trigger condition for triggering the execution of the management command to the managed terminal device respectively;
  • the side can respectively set the set management command and the trigger condition to the smart card that can be installed and recognized in the managed terminal device, so as to set the set management command and the trigger condition to the managed terminal device respectively.
  • the management side preferably uses the DM management tree form to write the set management commands and trigger conditions to the smart cards that can be installed and recognized by the managed terminal device.
  • the managed terminal device monitors whether the trigger condition set by itself is satisfied; and when the trigger condition is satisfied, immediately executes the management command set by itself, that is, the trigger condition management node can be identified by the OMADM Scheduling scheduled task enabling component. In operation, when the monitored terminal device satisfies the trigger condition, the terminal device selects a different management command subtree or node for execution in the device management tree stored by the smart card installed by itself.
  • the management side separately sets a management command and a trigger condition for triggering execution of the management command; the management side sets the set management command to the managed terminal device through the smart card, that is, the management side The management side writes the set management command to the smart card that can be installed and recognized on the managed terminal device by using the DM management tree form;
  • the DMS sends an execution instruction to the managed terminal device
  • the managed terminal device When the managed terminal device receives the execution instruction, it executes the management command set by itself, that is, the managed terminal device selects a corresponding management command subtree or node for execution in the device management tree stored in the smart card installed by itself.
  • the managed terminal device also needs to feed back the execution result information obtained by executing the management command to the management side, wherein the managed terminal device will The specific implementation process of the execution result information feedback to the management side is the four methods described above, and will not be repeated here.
  • FIG. 3 is a schematic structural diagram of an embodiment of a system for managing and controlling a terminal device of an internal user of an enterprise after applying the method of the present invention.
  • the WSI interface shown in the figure is provided by the device management server DMS itself.
  • the external system connected to the DMS where the external system connected to the DMS can be a secondary device management server DM Server, a service provider (SP) server, a customer service support system, a diagnostic support system, or a portal.
  • SP service provider
  • This embodiment can be based on this interface so that the management server on the enterprise side is connected to the DMS on the carrier side.
  • the bearer network between the DMS and the enterprise user terminal device may be, but is not limited to, a mobile communication network.
  • the main working process of the embodiment is: the enterprise administrator submits a corresponding management command to the DMS of the communication network operator (hereinafter referred to as the operator) side through the management server on the enterprise side, and triggers the execution of the management command.
  • the triggering condition and the target user group to be managed; the DMS on the carrier side sends the management command to the corresponding enterprise user terminal device according to the target user group identifier and triggers the management command after authenticating the management server on the enterprise side.
  • the triggering condition of the execution, the management command issued by the enterprise user terminal device according to the DMS and the execution of the management command triggered by the DMS The trigger condition triggers execution of the management command when the trigger condition is met at the appropriate time, and!
  • the execution result information obtained by executing the management command is reported to the management server of the enterprise side through the DMS through the DMS.
  • the figure is based on the system shown in FIG. 3, and the enterprise user goes to the management server of the enterprise side to register to determine the target operation group user information, and if the enterprise wants to internal staff
  • the DMS of the operator side needs to be registered first, and the employee is required to register with the management server on the enterprise side.
  • the enterprise administrator maintains its own management server.
  • the enterprise user registers on the management server on the enterprise side.
  • the registered content mainly includes information such as user ID, password, user name, and user terminal number. It will include some authentication processes for both parties.
  • the management server on the enterprise side registers with the DMS on the carrier side. Before the registration process takes place, both parties need to perform the authentication process. After both parties agree, the management server on the enterprise side will go again. Registration is performed on the DMS on the carrier side.
  • the registration content includes the user name and password, the target operation group, the management authority, and the level.
  • the DMS is managed by the target operation group registered by the enterprise.
  • the license needs to be notified to the enterprise user for confirmation. This confirmation process can be confirmed by short message, telephone or other means.
  • FIG. 5 the figure is a schematic diagram of a specific processing procedure for the enterprise user to register in the management server on the enterprise side to determine the final target operation group user information based on the system shown in FIG. 4, and the specific registration process is as follows:
  • the internal employees of the enterprise register with the enterprise administrator (or the enterprise user terminal device through the network to the management server on the enterprise side), and the registered content mainly includes the user ID, password, user name, user terminal number, and the like;
  • the enterprise administrator collects the registration information of the employee; a3.
  • the management server on the enterprise side sends an identity authentication request to the DMS on the carrier side; a4.
  • the DMS of the operator authenticates the identity of the enterprise. ;
  • the DMS After the enterprise identity authentication is passed, the DMS returns an authentication pass message to the enterprise side management server; a6, the enterprise side management server sends the registration target operation group and its operation authority request to the DMS; a7, the DMS returns an initial registration success message, the so-called initial registration Success means confirmation of the user who has not passed the target operation group; A8.
  • the DMS sends a notification message for the operation authority of the enterprise to the corresponding enterprise user terminal device according to the information of each target operation group user, and waits for the confirmation of the enterprise user terminal device;
  • the enterprise user terminal device returns a confirmation message for confirmation, and the DMS performs a confirmation message processing; if the enterprise user terminal device returns a rejection message, the DMS feeds the enterprise user from the target operation group with the aOL and the DMS to the management server of the enterprise side, and finally Target operating group user situation.
  • the enterprise administrator also needs to maintain the information about the target operation group user on the management server on the enterprise side. After the information about the target operation group user changes, the management server on the enterprise side can log in to the DMS Portal or through the WSI interface. The maintenance and update of the information related to the target operation group of the DMS side is performed in other manners.
  • FIG. 6 is a schematic diagram of the specific maintenance process of the target operation group user information.
  • the specific maintenance process is as follows:
  • the enterprise user to the enterprise administrator submits a change request message, wherein the change includes adding the target operation user, deleting the target operation user, and modifying the target operation user information, etc. ;
  • the management server on the enterprise side sends an identity authentication request to the DMS on the operator side; b3.
  • the DMS authenticates the enterprise;
  • the DMS After the enterprise identity authentication is passed, the DMS returns the authentication pass information to the enterprise side management server; b5.
  • the management server on the enterprise side sends the target operation group user change request to the DMS; b6, the DMS returns an initial change success message;
  • the DMS sends a notification message of the operation authority of the enterprise to the newly added target operation user terminal device, and waits for confirmation of the newly added target operation user;
  • the DMS performs confirmation message processing; if the newly added target operation user returns a rejection message, the newly added target operation user is not added to the target operation group;
  • the bl0 and the DMS feed back the final target operation group user status to the management server on the enterprise side. If the enterprise user terminal device does not return a result, it is processed according to the default policy.
  • the DMS only needs to notify the corresponding deletion target operation user by the DMS in step b7, and the subsequent steps b8, b9 and blO need not be performed.
  • the DMS also needs to send a confirmation message to the newly added target operation user terminal device, and send a notification message to the target operation user terminal device deleted by the enterprise.
  • the management of the communication terminal equipment used by the enterprise user includes, but is not limited to, recording the use of the additional functions of the enterprise user terminal equipment and requesting the report result information or some additional attachment to the enterprise user terminal equipment. Controlling the use of functions (for example, working hours may prohibit corporate users from using the camera on their own communication terminal equipment to take pictures, and using infrared or Bluetooth interfaces for communication, etc.), in addition to parameter settings for enterprise user terminal equipment, etc. Wait.
  • Method 1 The management control is completed by the DMS issuing the management command:
  • the management server on the enterprise side accesses the DMS, so that the management command is sent to the enterprise user terminal device to be managed through the DMS, thereby realizing the enterprise user.
  • the issued management command ⁇ is considered to record items, disable/enable certain additional functions, query the current status of the terminal device, and set some parameters (such as ringtone information). '
  • the enterprise can also install and configure some management function software to the enterprise user terminal equipment through the DMS on the operator side, so as to realize the management control of the enterprise user terminal equipment, such management function software such as recording software or function control software, etc.
  • management function software such as recording software or function control software, etc.
  • the management function software can be run on the enterprise user terminal device side to implement control and management of the terminal device usage.
  • the management content and management means of the enterprise user terminal equipment need to apply for permission on the DMS, and then the DMS confirms to the managed terminal device, and the entire management command is issued or the management function software is installed and configured. , DMS needs to verify the identity of the enterprise.
  • FIG. 7 is a schematic diagram of a process for processing the first mode of the enterprise to use the enterprise user terminal device by applying the method of the present invention.
  • the specific processing procedure is as follows - cl, the enterprise logs in to the operator side through the management server. DMS system; ' c2, the DMS system on the operator side authenticates the identity of the enterprise;
  • the DMS After the enterprise identity authentication is passed, the DMS returns the management server login success information; c4, the enterprise side management server submits the management command and the target operation group to the operator side DMS. User Info;
  • the DMS system on the operator side verifies the management command authority and the target operation group sent by the enterprise side;
  • the DMS on the operator side sends a management command or installs a management function software to the corresponding target user terminal device according to the target operation group user information.
  • the DMS on the operator side collects the execution result information of the management command executed by the target user terminal device side;
  • the DMS on the operator side returns the execution result information to the management server on the enterprise side; the management function software on the side of the target user terminal device, when the condition is satisfied, starts the management function to manage the use of the related additional function of the terminal device;
  • the target user terminal device reports the execution result data obtained by the execution management to the DMS;
  • the DMS on the carrier side reports the execution result data to the management server on the enterprise side.
  • the foregoing execution result data may be obtained by the DMS from the terminal device or reported to the DMS by the terminal device, and the DMS performs unified management on the collected execution result data.
  • the execution result data collected by the DMS may be sent to the management server on the enterprise side according to a certain policy (for example, at a certain interval), or may be obtained from the DMS through the WSI interface periodically by the management server at the enterprise side.
  • Method 2 Complete management control through smart card and DMS mode:
  • the enterprise side separately customizes a smart card that its terminal can recognize for its internal employees, and then sets the management function software (such as recording software or function use control software). And so on, the enterprise authentication information and the triggering conditions for triggering the management function software are written into the smart card respectively, wherein the enterprise side can write each management function software and the corresponding trigger condition into the smart card in the form of a DM management tree, and then Smart cards are distributed to employees within the company.
  • the management function software such as recording software or function use control software
  • the management server on the enterprise side can also perform maintenance and data update processing on the smart card installed on the enterprise user terminal device through the DMS on the carrier side.
  • the enterprise side Before the enterprise side maintains the smart card installed on the employee terminal device through the DMS, First use the storage on the smart card
  • the processing of updating and maintaining the smart card installed on the terminal device mainly includes updating the management function software, downloading the new management function software, removing the old management function software, and issuing new trigger conditions.
  • the DM agent on the terminal device identifies and runs the relevant management commands written on the smart card.
  • the management command in the smart card may be the original in the card, or the group user may re-enter through the DMS. Made. For example, when the terminal device installs or runs the related recording function, if the trigger condition is met (such as the discovery time is in the working hours of 08: 00 ⁇ 18: 00), the related recording function in the smart card is automatically triggered, and the recording in the smart card is automatically executed.
  • the corresponding recording function on the relevant subtree or node in the DM management tree to record the usage of the enterprise user terminal device at the above time; if the terminal device determines that the reporting condition is met (if the camera is found to be illegally applied), it will automatically pass The DMS on the carrier side reports to the management server on the enterprise side.
  • the execution result data tube obtained by the enterprise user terminal device executing the management command may be obtained by the DMS actively from the terminal device or actively reported by the terminal device to the DMS, and the DMS uniformly manages the collected execution result data.
  • the execution result data collected by the DMS may be sent to the management server on the enterprise side according to a certain policy (for example, at a certain interval), or may be obtained from the DMS through the WSI interface of the management server on the enterprise side.
  • FIG. 8 is a schematic diagram of a second process for managing the use of enterprise user terminal equipment by the method of the present invention.
  • the specific processing procedure is as follows - dl, the enterprise administrator operates the management server on the enterprise side. Generate a corporate smart card;
  • the enterprise side management server copies the generated enterprise management application to the smart card;
  • the enterprise administrator distributes the smart card to the enterprise user;
  • the enterprise user inserts the smart card into its own terminal device
  • the enterprise terminal device automatically executes the enterprise management application in the smart card according to the trigger condition
  • the related execution result data is automatically reported to the DMS of the operator side according to the preset reporting policy
  • the DMS reports the execution result data to the management server on the enterprise side.
  • the figure is on the smart card that has been installed on the enterprise user terminal device on the enterprise side.
  • the specific processing procedure is as follows - el, the enterprise administrator submits the update control command to the device management server on the enterprise side; wherein the update control command can delete the existing enterprise management application, Update existing enterprise management applications, issue other enterprise management commands to smart cards, or update trigger conditions on smart cards, etc. e2.
  • the management server on the enterprise side generates corresponding operation commands according to the update control commands submitted by the enterprise administrator. And operating target groups;
  • the management server on the enterprise side submits a corresponding operation command request and operation target group user information to the DMS on the operator side;
  • the DMS on the operator side performs operation authentication and target operation group user information check on the operation command request submitted by the management server on the enterprise side;
  • the DMS sends an operation command to the smart card installed on the corresponding enterprise user terminal device according to the target operation group user information, to update the enterprise management application in the smart card;
  • the terminal authenticates the identity of the enterprise according to the authentication information stored on the smart card.
  • the DM proxy of the enterprise user terminal device triggers an operation command issued by the enterprise side to update the enterprise management application in the terminal device smart card. program.
  • the implementation manner of the interface provided by the DMS itself includes but is not limited to a message communication interface (including a TCP/IP message interface, an HTTP message interface, an XML message interface, and a network protocol message interface). Etc.), file interface, API interface (API is not limited to general local method calls, but can also be used for remote method calls such as CORBA, Web Service (SOAP), RMI/IIOP, DCOM).
  • Management control is pre-requisite, rather than unconditionally enjoying full control, for example: A company's control of the camera function of the employee's mobile phone may only need to be carried out during the employee's working hours, and during non-working hours, There is no control over it.
  • the trigger conditions for triggering the execution of the management command include, but are not limited to, a location trigger condition, a time trigger condition, and the like.
  • the position triggering condition can be implemented by the positioning function of the network. For example, the disabling of the camera on the control terminal device should be triggered in the office work time.
  • the trigger condition of this example implies two trigger conditions: Time trigger condition (work Time) and regional touch Condition (office area).
  • the triggering condition can be configured to be installed in the management function software of the terminal device, or can be delivered to the terminal device through the DMS as a record item.
  • the terminal device requests a management command from the management server on the enterprise side, or automatically starts the corresponding management function, and reports its current usage status information to the management server on the enterprise side.
  • the enterprise side When the enterprise side wants to change the trigger condition, it can update the trigger condition already configured on the terminal axe or re-issue the record item through the DMS.
  • an enterprise In order to prevent the leakage of new product information, an enterprise (group user) has restrictions on the camera function used by its employees (terminal users), but it can only be restricted during working hours.
  • RegisterUser (id, name, passwd, phone_number, phone_type);
  • the enterprise After the registration is completed, the enterprise registers with the DMS on the communication network operator side and requests management rights for its employee terminal equipment.
  • the request command is as follows -
  • the DMS on the operator side sends a text message to the corresponding mobile phone user to explain the situation, and asks the mobile phone user to reply to the short message for confirmation.
  • the user replies to the short message 88 to accept, and the reply message 00 indicates the rejection, if the user is in the regulation If you do not reply to the message within the time, the default is accepted.
  • the DMS on the carrier side collects the mobile phone user information indicating acceptance and rejection, and based on this, corrects the target operation group user information registered by the enterprise, and returns the information fed back by the user to the management server on the enterprise side.
  • the enterprise side creates a smart card for each employee, and generates an enterprise management application by taking the photo function recording software, the enterprise authentication information, and the trigger condition for triggering the execution of the recording software, and writes the enterprise management application in the form of a DM management tree.
  • the employee inserts the smart card into his mobile phone and powers on.
  • the DM agent in the mobile phone and the mobile device will automatically recognize the smart card and start the enterprise management application in the card.
  • the report order is as follows:
  • the DMS on the carrier side reports the received result information to the management server on the enterprise side.
  • the report command is as follows:

Description

终端设备的管理方、法 技术领域
本发明涉及开放移动联盟(OMA, Open Mobile Alliance)设备管理(DM, Device Management)技术领域, 尤其是涉及一种终端设备的管理方法。
背景技术
移动终端设备是整个移动运营服务体系中的重要组成部分, 伴随着终端 设备功能的日趋复杂, 终端设备中的软件出现问题的机率显著增加。 同时未 来运营商之间的竞争日趋激烈, 因此如何有效的保证用户的体验、 提高用户 的忠诚度, 保持高效的服务质量以及较低的设备维护成本已经成为运营商、 终端厂商比较关注的一个重要问题。
OMA DM ( Open Mobile Alliance Device Management)规范是一种管理、 诊断及维护移动终端设备的技术。 它通过空中下载(OTA, Over The Air)方 式对终端设备进行管理, 其中对终端设备的管理操作包括: 终端设备参数设 置、 固件更新、 软件安装和升级、 设备错误和事件信息的收集和处理等。 同 时, OMADM规范还提供了一种网络服务接口(WSI, Web Services Interface) 机制, 允许第三方软件 /服务提供商通过设备管理服务器(DM Server) 向用 户提供各种月艮务, 如软件下载及更新, 固件升级, 参数配置和设备诊断等。 其中 01VIADM规范所管理的移动终端设备包括手机终端、掌上电脑、笔记本 电脑、 嵌入式设备和车载系统等, 同时不排除任何其它移动终端设备。
伴随着移动通信技术的不断发展, 移动终端设备的功能越来越强大, 例 如目前的部分移动终端设备都具有高分辨率的摄像头、'大存储容量的能力、 红外传输接口及其蓝牙传输接口等, 这类终端设备的使用对于一些技术敏感 型的企业或机构而言, 使得信息安全性越来越不可控, 例如一些新的设计被 拍照窃走,'或者一些技术机密资料被通过红外传入手机窃走等。
发明内容
本发明要解决的技术问题在于提出一种终端设备的管理方法, 以有效的 控制终端设备对企业安全信息所造成的攻击, 提高企业信息的安全保密性。
为了实现上述目的,本发明提供了一种终端设备的管理方法,包括步骤: A、 管理侧设定管理命令; 并
B、 将设定的管理命令通过设备管理服务器下发到被管理的终端设备上;
C、 被管理的终端设备执行所述管理命令。
上述的方法, 其中, 所述步骤 A中还包括步骤: 管理侧设定用于触发所 述管理命令执行的触发条件。 '
上述的方法, 其中, 所述步骤 A和 B之间还包括步骤:
管理侧监测所设定的触发条件是否得到满足; 并
在所设定的触发条件得到满足时, 执行步骤8。
上述的方法, 其中, 所述步骤 B中还包括步骤: 管理侧将设定的触发条 件通过设备管理服务器下发到被管理的终端设备上;
所述步骤 B和 C之间还包括步骤:
被管理的终端设备存储管理侧通过设备管理服务器下发的管理命令和触 发条件; 并
被管理的终端设备监测所述触发条件是否得到满足; 并
在所述触发条件得到满足时, 执行步骤 C。
上述的方法, 其中, 被管理的终端设备分别以设备管理树形式存储所述 管理命令和触发条件。
上述的方法, 其中, 所述步骤 B和 C之间还包括步骤: 被管理的终端设 备存储管理侧通过设备管理服务器下发的管理命令。
上述的方法, 其中, 所述步骤 A和 B之间还包括步骤:
管理侧监测所设定的触发条件是否得到满足; 并
在所设定的触发条件得到满足时, 通过设备管理服务器下发执行指令到 被管理的终端设备; '
所述步骤 C中被管理的终端设备接收到所述执行指令时, 执行自身存储 的管理命令。
上述的方法, 其中, 被管理的终端设备以设备管理树形式存储所述管理 命令。
上述的方法, 其中, 还包括步骤-
D、 所述设备管理服务器获取被管理的终端设备执行所述管理命令所得 到的执行结果信息;
E、 所述管理侧获取设备管理服务器获取到的执行结果信息。
上述的方法, 其中, 所述设备管理服务器获取被管理的终端设备执行所 述管理命令所得到的执行结果信息的方式为:
被管理的终端设备将执行所述管理命令所得到的执行结果信息上报给设 备管理服务器; 或
设备管理服务器到被管理的终端设备中提取执行所述管理命令所得到的 执行结果信息。
上述的方法, 其中, 所述管理侧获取设备管理服务器获取到的执行结果 信息的方式为:
设备管理服务器将获取到的执行结果信息上报给管理侧; 或
管理侧到设备管理服务器中提取获取到的执行结果信息。
上述的方法, 其中, 所述步骤 B具体包括步骤:
Bl、 设备管理服务器对所述管理命令进行鉴权, 并在鉴权通过后, 执行 B2、设备管理服务器判断所述管理命令是否符合设备管理协议;如果是, 执行 B4, 否则
B3、 设备管理服务器将所述管理命令转换成为符合设备管理协议的管理 命令形式;
B4、 设备管理服务器将所述管理命令下发到被管理的终端设备上。
上述的方法, 其中, 所述管理命令为:
记录被管理的终端设备上的附加功能的使用情况; 或
禁用 /启动被管理的终端设备上的附加功能。
上述的方法, 其中, 所述终端设备上的附加功能包括:
带有摄像头的终端设备的摄像功能; 和 /或
带有红外接口的终端设备的短距离无线通信功能; 和 /或
带有蓝牙接口的终端设备的短距离无线通信功能。
上述的方法, 其中, 所述触发条件为:
根据时间段信息触发所述管理命令执行的时间触发条件; 或
根据被管理的终端设备当前所处的位置信息触发所述管理命令执行的位 置触发条件。
为了更好的实现上述目的, 本发明还提供了一种终端设备的管理方法, 包括步骤:
1 ) 管理侧设定管理命令; 并
2)将设定的管理命令设置到被管理的终端设备上;
3 )被管理的终端设备执行自身设置的管理命令。
上述的方法, 其中, 所述步骤 2) 中管理侧通过将设定的管理命令写入 到能够在被管理的终端设备安装并识别的智能卡中, 实现将设定的管理命令 设置到被管理的终端设备上。
上述的方法, 其中, 所述管理侧将管理命令以设备管理树形式写入到智 能卡中。
上述的方法, 其中, 所述步骤 1 ) 中还包括步骤: 管理侧设定用于^ Ϊ发 所述管理命令执行的触发条件。
上述的方法, 其中, 所述步骤 2) 中还包括步骤: 管理侧将设定的触发 条件设置到被管理的终端设备上;
所述步骤 2)和 3 )之间还包括步骤:
被管理的终端设备监测所述触发条件是否得到满足; 并
在所述触发条件得到满足时, 执行步骤 3)。
上述的方法, 其中, 所述步骤 2) 中管理侧通过将设定的管理命令和触 发条件分别写入到能够在被管理的终端设备安装并识别的智能卡中, 实现将 设定的管理命令和触发条件分别设置到被管理的终端设备上。
上述的方法, 其中, 所述管理侧将管理命令和触发条件分别以设备管理 树形式写入到智能卡中。
上述的方法, 其中, 所述步骤 2)和 3)之间还包括步骤:
管理侧监测所设定的触发条件是否得到满足; 并
在所设定的触发条件得到满足时, 通过设备管理服务器下发执行指令到 被管理的终端设备;
所述步骤 3 ) 中被管理的终端设备接收到所述执行指令时, 执行自身设 置的管理命令。 上述的方法, 其中, 还包括步骤:
4)设备管理服务器获取被管理的终端设备执行所述管理命令所得到的执 行结果信息;
5)所述管理侧获取设备管理服务器获取到的执行结果信息。
上述的方法, 其中, 所述设备管理服务器获取被管理的终端设备执行所 述管理命令所得到的执行结果信息的方式为:
被管理的终端设备将执行所述管理命令所得到的执行结果信息上报给设 备管理服务器; 或
设备管理服务器到被管理的终端设备中提取执行所述管理命令所得到的 执行结果信息。
上述的方法, 其中, 所述管理侧获取设备管理服务器获取到的执行结果 信息的方式为:
设备管理服务器将获取到的执行结果信息上报给管理侧; 或
管理侧到设备管理服务器中提取获取到的执行结果信息。
上述的方法, 其中, 还包括管理侧通过设备管理服务器对已经设置到被 管理的终端设备上的管理命令进行更新维护处理的步骤。
上述的方法, 其中, 所述管理命令为:
记录被管理的终端设备上的附加功能的使用情况; 或
禁用 /启动被管理的终端设备上的附加功能。
上述的方法, 其中, 所述终端设备上的附加功能包括:
带有摄像头的终端设备的摄像功能; 和 /或
带有红外接口的终端设备的短距离无线通信功能; 和 /或
带有蓝牙接口的终端设备的短距离无线通信功能。
上述的方法, 其中, 所述触发条件为:
根据时间段信息触发所述管理命令执行的时间触 条件; 或
根据被管理的终端设备当前所处的位置信息触发所述管理命令执行的位 置触发条件。
本发明能够达到的有益效果如下:
本发明方案通过在管理侧设定管理命令,并将设定的管理命令通过 DMS 下发到被管理的终端设备上, 或直接设置到被管理的终端设备上; 被管理的 终端设备执行所述的管理命令, 从而就可以实现管理侧对欲管理的终端设备 进行管理的目的, 更进一步被管理的终端设备还可以将执行所述管理命令后 所得到的执行结果信息通过 DMS上报给管理侧,从而使得管理人员能够在管 理侧监测到被管理的终端设备的使用状态, 达到了较好的管理控制终端设备 的使用状态的目的。
基于本发明方案, 若应用到企业管理侧对企业内部用户的终端设备的使 用情况进行管理的应用中, 可以达到企业管理侧对员工通信终端设备的使用 进行管理控制的目的, 从而可以有效的控制员工通信终端设备对企业安全信 息所造成的攻击, 提高了企业信息的安全保密性。
附图说明
图 1为本发明提出的第一种终端设备的管理方法的流程示意图; 图 2为本发明提出的第二种终端设备的管理方法的流程示意图; 图 3为应用本发明方法后, 企业对企业内部用户的终端设备进行管理控 制的实施例系统组成结构示意图;
图 4为基于图 3所示的系统, 企业用户到企业侧的管理服务器中进行注 册以确定目标操作群用户信息的处理过程示意图;
图 5为基于图 4所示的系统, 企业用户到企业侧的管理服务器中进行注 册以确定最终目标操作群用户信息的具体处理过程示意图;
图 6为目标操作群用户信息的具体维护过程示意图;
图 7为应用本发明方法实现企业对企业用户终端设备的使用情况进行管 理的第一种方式处理过程示意图;
图 8为应用本发明方法实现企业对企业用户终端设备的使用情况进行管 理的第二种方式处理过程示意图;
图 9为企业侧对企业用户终端设备上已经安装的智能卡上的管理信息进 行维护更新的处理过程示意图。
具体实施方式
本发明方案基于 OMA DM规范, 利用设备管理服务器(DMS)本身所 具有的终端设备管理能力和网络服务接口 (如 WSI接口)提供一种机制使得 企业或机构能够对、其员工的通信终端设备的使用能力进行管理, 从而实现在 可控范围之内保证企业信息的安全。
下面将结合各个附图对本发明方案的主要工作原理及其具体实施方式进 行详细的阐述。
请参照图 1, 该图是本发明提出的第一种终端设备的管理方法的主要实 现原理流程图, 其主要实现过程如下:
步骤 S10, 管理侧设定管理命令, 其中管理侧设定的管理命令可以是用 于记录被管理的终端设备上的附加通信功能的使用情况的管理命令; 还可以 是用于禁用或启动被管理的终端设备上的附加通信功能的管理命令等。 根据 目前的移动通信终端的发展状态, 终端设备上具有的附加通信功能主要包括 但不限于: 带有摄像头的终端设备的摄像功能, 和 /或带有红外接口的终端设 备的短距离无线通信功能, 和 /或带有蓝牙接口的终端设备的短距离无线通信 功能。
步骤 S20,管理侧将上述设定的管理命令通过 DMS下发到被管理的终端 设备上, 其中管理侧可以通过 DMS本身提供的对外接口 (如 WSI接口) 实 现和 DMS之间进行通信, 即管理侧将上述设定的管理命令发送到 DMS, 并 将欲管理的终端设备信息发送到 DMS, DMS根据管理侧欲管理的终端设备 信息, 将管理命令分别发送给对应的终端设备。
其中 DMS要对管理命令进行鉴权,并在鉴权通过后,判断管理命令是否 符合 DMS协议; 若是 DMS将管理命令下发到被管理的终端设备上; 否则 DMS将管理命令转换成为符合 DM协议的管理命令形式,并将转换处理后的 管理命令下发到被管理的终端设备上。
步骤 S30, 被管理的终端设备进行执行所接收到的管理命令的操作。 其中应用上述本发明方法的主要实现原理, 在某些场景下管理命令是需 要在合适时机被触发执行的, 而不需要在任何时候都执行, 如对于企业管理 控制其内部员工的通信终端设备的使用情况时, 就只需要在员工上班时间或 在办公室期间对其的通信终端设备的使用情况进行管理控制, 而在其他时间 或在其他位置期间无需对其通信终端设备的使用情况进行管理控制。
基于上述情况管理侧还需要设定用于触发所设定的管理命令执行的触发 条件, 这样执行本发明上述方法可以衍生出三种实施方式, 分别如下: 第一种实施方式:
管理侧分别设定管理命令和用于触发该管理命令执行的触发条件; 管理侧监测所设定的触发条件是否得到满足;
并在监测到所设定的触发条件得到满足时,将设定的管理命令通过 DMS 下发到被管理的终端设备上;
被管理的终端设备接收到管理命令后, 立即执行该管理命令。
第二种实施方式:
管理侧分别设定管理命令和用于触发该管理命令执行的触发条件; 管理侧分别将垛定的管理命令和用于触发该管理命令执行的触发条件通 过 DMS下发到被管理的终端设备上;
被管理的终端设备存储 DMS 下发的管理命令和用于触发该管理命令执 行的触发条件, 其中被管理的终端设备优选使用设备管理树(DM管理树) 形式存储管理命令和用于触发该管理命令执行的触发条件; 即在被管理的终 端设备中, 管理命令和触发条件可以以 OMA DM设备管理树的形式进行存 储;这样触发条件管理树节点可以由 OMADM的 Scheduling预定任务使能部 件来识别并操作, 被管理的终端设备在监控到触发条件满足时, 选择设备管 理树中不同的管理命令子树或节点进行执行。
被管理的终端设备监测所接收的触发条件是否得到满足;
并在触发条件得到满足时, 立即执行接收到的管理命令。
第三种实施方式:
管理侧分别设定管理命令和用于触发该管理命令执行的触发条件; 管理侧将设定的管理命令通过 DMS下发到被管理的终端设备上; 被管理的终端设备存储管理侧通过 DMS下发的管理命令;其中被管理的 终端设备优选使用 DM管理树形式存储管理命令;
管理侧监测所设定的触发条件是否得到满足; 并
在所设定的触发条件得到满足时,通过 DMS下发执行指令到被管理的终 端设备;
被管理的终端设备接收到执行指令时, 执行自身存储的管理命令, 即被 管理的终端设备在接收到执行指令时, 选择设备管理树中不同的管理命令子 树或节点进行执行。
其中管理侧设定的用于触发所设定的管理命令执行的触发条件可以但不 限于为:
根据时间段信息触发所述管理命令执行的时间触发条件, 即设置一个规 则, 要求管理命令只需在规定的时间段内进行执行, 其他时间段可以不执行; 根据被管理的终端设备当前所处的位置信息触发所述管理命令执行的位 置触发条件, 即当被管理的终端设备处于规定的位置区时, 触发执行管理命 令, 在被管理的终端设备不处于规定的位置区时, 就不需要执行管理命令。 其中被管理的终端设备当前所处的位置信息可以通过系统定位功能来检测。
为了管理侧更进一步能够及时获得所管理的终端设备的使用情况信息, 被管理的终端设备还需要将自身执行管理命令所得到的执行结果信息反馈给 管理侧, 其中被管理的终端设备将执行结果信息反馈给管理侧的过程可以通 过以下四种方式来完成:
第一种: 被管理的终端设备将执行管理命令所得到的执行结果信息定时 上报给 DMS; DMS将获取到的执行结果信息再次定时上报给管理侧。
第二种: 被管理的终端设备将执行管理命令所得到的执行结果信息定时 上报给 DMS; 管理侧定时到 DMS中提取其获取到的执行结果信息。
第三种: DMS定时到被管理的终端设备中提取其执行管理命令所得到的 执行结果信息; DMS将获取到的执行结果信息再次定时上报给管理侧。
第四种: DMS定时到被管理的终端设备中提取其执行管理命令所得到的 执行结果信息; 管理侧定时到 DMS中提取其获取到的执行结果信息。
其中管理侧所管理的终端设备可以随时进行更新 (如新增加所管理的终 端设备、删除所管理的终端设备等等),在其管理的终端设备信息发生变化时, 要同步更新管理侧数据库中被管理终端设备的相应信息, 以使管理的针对性 和准确性更高些。
请参照图 2, 该图是本发明提出的第二种终端设备的管理方法的主要实 现原理流程图, 其主要实现过程如下:
步骤 S100, 管理侧设定管理命令; 其中管理命令的具体解释与前述描述 相同, 这里不再过多赘述;
步骤 S200, 管理侧将上述设定的管理命令设置到被管理的终端设备上; 其中管理侧可以通过将设定的管理命令写入到能够在被管理的终端设备安装 并识别的智能卡中, 以实现将设定的管理命令设置到被管理的终端设备上的 目的, 其中管理侧优选使用 DM管理树形式将设定的管理命令写入到能够在 被管理的终端设备安装并识别的智能卡中。后续管理侧还可以通过 DMS实现 对已经设置到被管理的终端设备上的管理命令进行维护更新的处理;
步骤 S300, 被管理的终端设备进行执行自身设置的管理命令的操作, 即 被管理的终端设备可以在自身安装的智能卡所存储的设备管理树中选择不同 的管理命令子树或节点进行执行。
同理基于上述方案, 可能同样需要管理^设定用于触发所设定的管理命 令执行的触发条件, 这样执行本发明上述方法可以衍生出两种实施方式, 分 别如下- 第一种实施方式:
管理侧分别设定管理命令和用于触发该管理命令执行的触发条件; 管理侧将设定的管理命令和用于触发该管理命令执行的触发条件分别设 置到被管理的终端设备上; 其中管理侧可以通过将设定的管理命令和触发条 件分别写入到能够在被管理的终端设备安装并识别的智能卡中, 以实现将设 定的管理命令和触发条件分别设置到被管理的终端设备上; 其中管理侧优选 使用 DM管理树形式分别将设定的管理命令和触发条件写入到能够在被管理 的终端设备安装并识别的智能卡中。
被管理的终端设备监测自身所设置的触发条件是否得到满足; 并在触发 条件得到满足时, 立即执行自身设置的管理命令, 即触发条件管理 节点可 以由 OMADM的 Scheduling预定任务使能部件来识别并操作,被管理的终端 设备在监控到触发条件满足时, 在自身安装的智能卡所存储的设备管理树中 选择不同的管理命令子树或节点进行执行。
第二种实施方式:
管理侧分别设定管理命令和用于触发该管理命令执行的触发条件; 管理侧通过智能卡将设定的管理命令设置到被管理的终端设备上, 即管 理侧使用 DM管理树形式将设定的管理命令写入到能够在被管理的终端设备 上安装并识别的智能卡中;
管理侧监测所设定的触发条件是否得到满足;
并在所设定的触发条件得到满足时,通过 DMS下发执行指令到被管理的 终端设备;
被管理的终端设备接收到执行指令时, 执行自身设置的管理命令, 即被 管理的终端设备在自身安装的智能卡所存储的设备管理树中选择相应的管理 命令子树或节点进行执行。
其中有关触发条件的描述请参照上述, 这里不再过多赘述。
同理为了管理侧更进一步能够及时获得所管理的终端设备的使用情况信 息, 被管理的终端设备也需要将自身执行管理命令所得到的执行结果信息反 馈给管理侧, 其中被管理的终端设备将执行结果信息反馈给管理侧的具体实 现过程如上面已述的四种方式, 这里不再过多赘述。
下面以将本发明提出的两种终端设备管理方法应用在企业对内部员工通 信终端设备的使用情况进行管理控制的实例中为例, 对本发明上述两种方案 的具体实施过程进行详细的阐述。
请参照图 3, 该图是应用本发明方法后, 企业对企业内部用户的终端设 备进行管理控制的实施例系统组成结构示意图, 图中所示 WSI接口是设备管 理服务器 DMS本身所提供的用于连接外部系统的接口, 其中 DMS连接的外 部系统可以是二级设备管理服务器 DM Server, 也可以是各业务提供商(SP) 服务器, 还可以是客户服务支持系统、 诊断支持系统或 Portal等。 本实施例 就可基于这个接口, 使得企业侧的管理服务器连接到运营商侧的 DMS。 而 DMS和企业用户终端设备之间的承载网络可以但不限于是移动通信网络。
基于上述图 3, 本实施例的主体工作过程为: 企业管理员通过企业侧的 管理服务器向通信网络运营商(以下简称运营商)侧的 DMS提交相应的管理 命令、 及触发该管理命令执行的触发条件和准备管理的目标用户群; 运营商 侧的 DMS在对企业侧的管理服务器进行鉴权通过后,根据目标用户群标识向 相应的企业用户终端设备下发管理命令及其触发该管理命令执行的触发条 件,企业用户终端设备根据 DMS下发的管理命令及其触发该管理命令执行的 触发条件, 在该触发条件得到满足的适当时机会触发执行该管理命令, 并!每 执行该管理命令所得到的执行结果信息按照预,先制定的上报策略通过 DMS 上报给企业侧的管理服务器。
请参照图 4, 该图是基于图 3所示的系统, 企业用户到企业侧的管理月艮 务器中进行注册以确定目标操作群用户信息的、处理过程示意图, 如果企业想 对内部员工的通信终端设备的某些功能在上班期间进行控制管理时, 就需先 向运营商侧的 DMS进行注册, 并要求员工到企业侧的管理服务器进行注册。
如图 4中: ①企业管理员维护自身的管理服务器, 企业用户在企业侧的 管理服务器上进行注册,其中注册的内容主要包括用户 ID、密码、用户姓名、 用户终端号码等信息, 注册过程中会包含一些双方的身份认证过程; ②企业 侧的管理服务器到运营商侧的 DMS上进行注册,这个注册过程发生之前需要 进行双方认证处理, 在双方都认 通过后, 企业侧的管理服务器再到运营商 侧的 DMS上进行注册,注册内容包括用户名和密码、 目标操作群、管理权限, 级别等; ③ DMS在接受企业侧管理服务器的注册后, 为了得到企业所注册的 目标操作群用户的管理许可, 需要通知企业用户进行确认, 其中这个确认过 程可以通过短消息、 电话或者其它方式进行确认。
请参照图 5, 该图是基于图 4所示的系统, 企业用户到企业侧的管理服 务器中进行注册以确定最终目标操作群用户信息的具体处理过程示意图, 其 具体的注册过程如下:
al、 企业内部员工向企业管理员处(或企业用户终端设备通过网络到企 业侧的管理服务器处)进行注册, 其中注册的内容主要包括用户 ID、 密码、 用户姓名、 用户终端号码等等;
a2、 企业管理员 (或企业恻的管理服务器)对员工的注册信息进行收集; a3、 企业侧的管理服务器向运营商侧的 DMS发送身份认证请求; a4、 运营商的 DMS对企业身份进行认证;
a5、企业身份认证通过后, DMS向企业侧管理服务器返回认证通过消息; a6、 企业侧管理服务器向 DMS发送注册目标操作群及其操作权限请求; a7、 DMS返回初始注册成功消息, 所谓初始注册成功是指还没有经过目 标操作群用户的确认; a8、 DMS根据各目标操作群用户的信息向对应的各个企业用户终端设备 发送企业对其操作权限的通知消息, 并等待企业用户终端设备的确认;
a9、企业用户终端设备返回确认消息进行确认, DMS进行确认消息处理; 如果企业用户终端设备返回拒绝消息,则 DMS将该企业用户从目标操作群用 alO、 DMS向企业侧的管理服务器反馈最终的目标操作群用户情况。 企业管理员还要在企业侧的管理服务器上维护目标操作群用户的相关信 息, 这样当目标操作群用户的相关信息发生变化后, 企业侧的管理服务器可 以通过 WSI接口、或登录 DMS的 Portal或采取其它方式进行 DMS侧的目标 操作群用户相关信息的维护更新。
请参照图 6, 该图是目标操作群用户信息的具体维护过程示意图, 其具 体的维护过程如下:
bl、 企业用户到企业管理员处(或企业用户终端设备通过网络到企业侧 的管理服务器处)提交变更请求消息, 其中变更包括增加目标操作用户、 删 除目标操作用户以及目标操作用户信息的修改等;
b2、 企业侧的管理服务器向运营商侧的 DMS发送身份认证请求; b3、 DMS对企业进行身份认证;
b4、企业身份认证通过后, DMS向企业侧管理服务器返回认证通过信息; b5、 企业侧的管理服务器向 DMS发送目标操作群用户变更请求; b6、 DMS返回初始变更成功消息;
b7、 DMS向新增加的目标操作用户终端设备发送企业对其操作权限的通 知消息, 并等待该新增加的目标操作用户的确认;
b8、 该新增加的目标操作用户返回确认消息进行确认;
b9、 DMS进行确认消息处理; 如果该新增加的目标操作用户返回拒绝消 息, 则不将该新增加的目标操作用户加入到目标操作群中;
bl0、 DMS向企业侧的管理服务器反馈最终的目标操作群用户情况。 如果企业用户终端设备不返回结果则按默认策略进行处理。
其中上述对于删除目标操作用户而言, 只需在步骤 b7中由 DMS将变更 结果通知给对应的删除目标操作用户即可,后续步骤 b8、 b9和 blO无需执行。 此外 DMS还需向新增加的目标操作用户终端设备发送确认消息,并向被 企业删除的目标操作用户终端设备发送通知消息。
其中企业对企业用户所使用的通信终端设备进行管理包括但不限于对企 业用户终端设备所具有的附加功能的使用情况进行记录并要求其上报记录结 果信息、 或对企业用户终端设备的某些附加功能的使用进行控制 (例如上班 时间可能会禁止企业用户使用自身通信终端设备上的摄像头进行拍照、 及使 用红外接口或蓝牙接口进行通信等等)、此外还可以对企业用户终端设备进行 参数设置等等。
下面将分别描述本发明上述提出的两种方法应用在企业对内部员工的终 端设备的使用情况进行管理控制的场景下的具体实现过程:
方法一、 通过 DMS下发管理命令的方式完成管理控制:
即利用 DMS本身所具有的终端管理能力和其对外提供的 WSI接口, 企 业侧的管理服务器通过访问 DMS, 以实现通过 DMS将管理命令下发给欲管 理的企业用户终端设备, 从而实现对企业用户终端设备的管理控制。 下发的 管理命令^以为记录项、 禁用 /启用某些附加功能、 查询终端设备的当前状态 及设置一些参数(如铃声信息)等。 '
此外,企业也可以通过运营商侧的 DMS向企业用户终端设备安装和配置 一些管理功能软件, 以实现对企业用户终端设备的管理控制, 这类管理功能 软件如记录软件或功能控制软件等, 这些管理功能软件可以在企业用户终端 设备侧运行来实现对终端设备的使用情况进行控制管理。
其中企业对企业用户终端设备的管理内容及管理手段都需在 DMS上申 请权限,然后由 DMS向被管理的终端设备进行确认,且在整个管理命令的下 发或管理功能软件的安装配置过程中, DMS都需对企业身份进行鉴权验证。
请参照图 7, 该图是应用本发明方法实现企业对企业用户终端设备的使 用情况进行管理的第一种方式处理过程示意图, 其具体处理过程如下- cl、 企业通过管理服务器登录运营商侧的 DMS系统; ' c2、 运营商侧的 DMS系统对企业身份进行鉴权;
c3、 企业身份鉴权通过后, DMS返回管理服务器登陆成功信息; c4、企业侧的管理服务器向运营商侧的 DMS提交管理命令和目标操作群 用户信息;
c5、运营商侧的 DMS系统对企业侧发来的管理命令权限和目标操作群进 行验证;
c6、运营商侧的 DMS根据目标操作群用户信息, 向对应的目标用户终端 设备下发管理命令或安装管理功能软件;
c7、 目标用户终端设备侧的管理功能软件安装配置成功, 就返回安装配 置成功信息给 DMS;
c8、运营商侧的 DMS对目标用户终端设备侧执行管理命令的执行结果信 息进行收集;
c9、 运营商侧的 DMS向企业侧的管理服务器返回执行结果信息; clO、 目标用户终端设备侧的管理功能软件在条件满足时启动管理功能对 终端设备的相关附加功能的使用进行管理;
cll、 并在上报条件满足时, 目标用户终端设备向 DMS上报执行管理所 得到的执行结果数据;
cll、 运营商侧的 DMS向企业侧的管理服务器上报执行结果数据。
其中上述执行结果数据可以由 DMS主动从终端设备上获取或由终端设 备主动上报到 DMS, 并由 DMS对收集到的执行结果数据进行统一的管理。 对于 DMS收集到的执行结果数据, 可以由 DMS按照一定的策略(如间隔一 定时间)推送给企业侧的管理服务器, 也可以由企业侧的管理服务器定时通 过 WSI接口从 DMS上获取。
方法二、 通过智能卡 (Smart Card)和 DMS方式完成管理控制: 企业侧为其内部员工分别定制一种其终端可以识别的智能卡, 然后将设 定的管理功能软件(如记录软件或功能使用控制软件等)、企业身份验证信息 以及触发管理功能软件执行的触发条件等分别写入智能卡, 其中企业侧可以 将各个管理功能软件和对应的触发条件以 DM管理树的形式写入到智能卡 中, 然后将智能卡分发给企业内部的员工。
此外企业侧的管理服务器还可以通过运营商侧的 DMS对企业用户终端 设备上已经安装的智能卡进行维护及其数据更新处理,其中企业侧通过 DMS 对员工终端设备上已经安装的智能卡进行维护之前, 首先利用存储在智能卡 中的鉴权信息对企业身份进行鉴权验证。 其中对终端设备上安装的智能卡进 行更新维护的处理主要包括管理功能软件的更新、新的管理功能软件的下载、 旧的管理功能软件的移除及其下发新的触发条件等。
智能卡插入到企业用户终端设备后, 终端设备上的 DM代理会识别并运 行智能卡上写入的相关管理命令, 其中智能卡中的管理命令可能是卡中原有 的,也可能是集团用户通过 DMS重新下发的。如当终端设备安装或运行了相 关记录功能后, 如果满足触发条件(如发现时间在 08: 00〜18: 00上班时间 内), 则会自动触发智能卡中的相关记录功能, 自动执行智能卡中记录的 DM 管理树中相关子树或节点上的对应记录功能, 以记录企业用户终端设备在上 述时间的使用情况; 如果终端设备判断出满足上报条件 (如发现非法适用摄 像头时), 则会自动通过运营商侧的 DMS向企业侧的管理服务器进行上报。
其中企业用户终端设备执行管理命令所得到的执行结果数据管可以由 DMS主动从终端设备上获取或由终端设备主动上报到 DMS, DMS对收集到 的执行结果数据进行统一的管理。对于 DMS收集到的执行结果数据,可以由 DMS按照一定的策略(如间隔一定时间)推送给企业侧的管理服务器, 也可 以由企业侧的管理服务器通过 WSI接口从 DMS上获取。
请参照图 8, 该图是应用本发明方法实现企业对 企业用户终端设备的 使用情况进行管理的第二种方式处理过程示意图, 其具体处理过程如下- dl、 企业管理员操作企业侧的管理服务器生成企业智能卡;
d2、 通过企业侧的管理服务器生成企业管理应用程序;
d3、 企业侧的管理服务器将生成的企业管理应用程序拷贝到智能卡; d4、 企业管理员向企业用户分发智能卡; '
d5、 企业用户将智能卡插入到自身的终端设备中;
d6、 企业用卢终端设备根据触发条件自动执行智能卡中的企业管理应用 程序;
d7、 企业用户终端设备在满足上报条件时, 按预设的上报策略自动上报 相关执行结果数据到运营商侧的 DMS;
d8、 DMS上报执行结果数据到企业侧的管理服务器。
如图 9所示, 该图是企业侧对企业用户终端设备上已经安装的智能卡上 的管理信息进行维护更新的处理过程示意图, 其具体的处理过程如下- el、 企业管理员提交更新控制命令到企业侧的设备管理服务器; 其中更 新控制命令可以为删除已有的企业管理应用程序、 更新已有的企业管理应用 程序、下发其它的企业管理命令到智能卡, 或更新智能卡上的触发条件等等; e2、 企业侧的管理服务器根据企业管理员提交的更新控制命令生成对应 的操作命令和操作目标群;
e3、企业侧的管理服务器向运营商侧的 DMS提交对应的操作命令请求和 操作目标群用户信息;
e4、运营商侧的 DMS对企业侧的管理服务器提交的操作命令请求进行操 作鉴权和目标操作群用户信息检查; '
e5、 DMS根据目标操作群用户信息, 向对应的企业用户终端设备上安装 的智能卡下发操作命令, 以更新智能卡中的企业管理应用程序;
e6、 终端根据存储在智能卡上的鉴权信息对企业身份进行鉴权验证; e7、 企业用户终端设备土的 DM代理触发执行企业侧下发的操作命令, 以更新终端设备智能卡中的企业管理应用程序。
对于本实施例的上述方法一和方法二中, DMS本身所提供的接口的实现 方式包括但不限于为消息通信接口(包括 TCP/IP消息接口, HTTP消息接口、 XML消息接口、 网络协议消息接口等)、文件接口、 API接口(API并不限定 于一般的本地方法调用, 也可以使用于 CORBA、 Web Service ( SOAP)、 RMI/IIOP、 DCOM等远程方法调用)。
对于管理命令的执行需要设定一定的触发条件, 因为不同企业侧的管理 权限不同, 其对终端设备的管理也是不完全的。 所谓不完全是指: 管理控制 是有前提条件的, 而不是无条件享有完全控制权的, 例如: 一个企业对员工 手机的拍照功能的控制可能只需要在员工上班时间进行, 而在非上班时间, 则没有对其控制权限。
其中用于触发管理命令执行的触发条件包括但不限于为位置触发条件、 时间触发条件等等。 其中位置触发条件可以通过网络的定位功能来实现, 例 如对于控制终端设备上的摄像头的禁用应该在办公区上班时间触发, 这个例 子的触发条件中隐含着两个触发条件: 时间触发条件 (上班时间)和地域触 发条件 (办公区)。
其中触发条件可以配置到安装 j£终端设备的管理功能软件中, 也可以作 为记录项通过 DMS下发到终端设备中。终端设备在触发条件得到满足时向企 业侧的管理服务器请求管理命令, 或自动启动相应管理功能, 并上报自身当 前的使用状态信息给企业侧的管理服务器。
当企业侧希望更改触发条件时, 可以通过对终端设斧上已经配置的触发 条件进行更新或通过 DMS重新下发记录项。
下面将列举一个具体的实施例':
某企业 (集团用户) 为了防止新产品信息的泄漏, 对其员工 (终端设备 用户)使用的手机拍照功能进行了限制, 但只能在上班时间限制使用。
为此, 该企业通知所有员工通过企业 Portal向企业侧的管理服务器进行 注册, ^¾册命令如下:
RegisterUser (id, name, passwd, phone_number,phone_type);
注册完成后,企业向通信网络运营商侧的 DMS进行注册,请求对其员工 终端设备的管理权限, 请求命令如下-
ApplyService ( op— type, tagetset[], op一 right );
运营商侧的 DMS为了确保企业用户终端设备的合法权益,向对应手机用 户发送短信说明情况, 并要求手机用户回复短信进行确认, 用户回复短信 88 表示接受, 回复短信 00表示拒绝,如果用户在规定时间内没有回复短信则默 认表示接受。运营商侧的 DMS收集表示接受和拒绝的手机用户信息, 以此为 依据对企业注册的目标操作群用户信息进行修正, 同时将用户反馈的信息返 回给企业侧的管理服务器。
企业侧为每个员工制作智能卡, 并将拍照功能记录软件、 企业身份验证 信息以及触发记录软件执行的触发条件等生成企业管理应用程序, 并以 DM 管理树的形式写入到该智能卡中。
员工将智能卡插入到自身的手机中并开机, 此时手、机中的 DM代理将自 动识别智能卡并启动卡中的企业管理应用程序。
当员工手机插入的智能卡中的拍照功能记录软件根据触发条件记录到员 工手机正在非法使用拍照功能后,会自动向运营商侧的 DMS上报记录结果信 息, 上报命令如下:
<Alert>
<CmdID>2</CmdID>
<Data 1226< Data < -- Generic Alert— >
<Item>
<Source><LocURI>./Root/ViolationInfo</LocURI></Source>
<Meta>
<Type>org.openmobilealliance.dm.violationinfo.userrequest</Type>
<Format>chr< Format>
</Meta>
<Data>
<CDATA>...</CDATA> < -- Upload data— >
</Data
</Item>
</Alert>
运营商侧的 DMS将接收到的记录结果信息上报给企业侧的管理服务器, 上报命令如下:
SendViolationlnfo (phone一 IMSI, time, info);
显然, 本领域的技术人员可以对本发明进行各种改动和变型而不脱离本 发明的精神和范围。 这样, 倘若本发明的这些修改和变型属于本发明权利要 求及其等同技术的范围之内, 则本发明也意图包含这些改动和变型在内。

Claims

权利 要 求 书
1.一种终端设备的管理方法, 其特征在于, 包括步骤-
A、 管理侧设定管理命令; 并
B、 将设定的管理命令通过设备管理服务器下发到被管理的终端设备上;
C、 被管理的终端设备执行所述管理命令。
2.如权利要求 1所述的方法, 其特征在于, 所述步骤 A中还包括步骤: 管理侧设定用于触发所述管理命令执行的触发条件。
3. 如权利要求 2所述的方法,其特征在于,所述步骤 A和 B之间还包括 步骤:
管理侧监测所设定的触发条件是否得到满足; 并
在所设定的触发条件得到满足时, 执行步骤8。
4. 如权利要求 2所述的方法, 其特征在于, 所述步骤 B中还包括步骤: 管理侧将设定的触发条件通过设备管理服务器下发到被管理的终端设备上; 所述步骤 B和 C之间还包括步骤:
被管理的终端设备存储管理侧通过设备管理服务器下发的管理命令和触 发条件; 并
被管理的终端设备监测所述触发条件是否得到满足; 并
在所述触发条件得到满足时, 执行步骤0。
5.如权利要求 4所述的方法, 其特征在于, 被管理的终端设备分别以设 备管理树形式存储所述管理命令和触发条件。
6.如权利要求 2所述的方法,其特征在于,所述步骤 B和 C之间还包括 步骤: 被管理的终端设备存储管理侧通过设备管理服务器下发的管理命令。
7.如权利要求 6所述的方法,其特征在于,所述步骤 A和 B之间还包括 步骤- 管理侧监测所设定的触发条件是否得到满足; 并
在所设定的触发条件得到满足时, 通过设备管理服务器下发执行指令到 被管理的终端设备;
所述步骤 C中被管理的终端设备接收到所述执行指令时, 执行自身存储 的管理命令。
8. 如权利要求 7所述的方法, 其特征在于, 被管理的终端设备以设备管 理树形式存储所述管理命令。
9. 如 1〜8任一权利要求所述的方法, 其特征在于, 还包括步骤:
D、 所述设备管理服务器获取被管理的终端设备执行所述管理命令所得 到的执行结果信息;
E、 所述管理侧获取设备管理服务器获取到的执行结果信息。
10. 如权利要求 9所述的方法, 其特征在于, 所述设备管理服务器获取 被管理的终端设备执行所述管理命令所得到的执行结果信息的方式为- 被管理的终端设备将执行所述管理命令所得到的执行结果信息上报给设 备管理服务器; 或
设备管理服务器到被管理的终端设备中提取执行所述管理命令所得到的 执行结果信息。
11. 如权利要求 9 所述的方法, 其特征在于, 所述管理侧获取设备管理 服务器获取到的执行结果信息的方式为:
设备管理服务器将获取到的执行结果信息上报给管理侧; 或
管理侧到设备管理服务器中提取获取到的执行结果信息。
12. 如权利要求 1〜8任一权利要求所述的方法, 其特征在于, 所述步骤 B具体包括步骤:
Bl、 设备管理服务器对所述管理命令进行鉴权, 并在鉴权通过后, 执行 B2、设备管理服务器判断所述管理命令是否符合设备管理协议;如果是, 执行 B4, 否则
B3、 设备管理服务器将所述管理命令转换成为符合设备管理协议的管理 命令形式;
B4、 设备管理服务器将所述管理命令下发到被管理的终端设备上。
13. 如 1〜8任一权利要求所述的方法, 其特征在于, 所述管理命令为: 记录被管理的终端设备上的附加功能的使用情况; 或
禁用 /启动被管理的终端设备上的附加功能。
14. 如权利要求 13所述的方法, 其特征在于, 所述终端设备上的附加功 能包括- 带有摄像头的终端设备的摄像功能; 和 /或
带有红外接口的终端设备的短距离无线通信功能; 和 /或
带有蓝牙接口的终端设备的短距离无线通信功能。
15. 如 1〜8任一权利要求所述的方法, 其特征在于, 所述触发条件为: 根据时间段信息触发所述管理命令执行的时间触发条件; 或
根据被管理的终端设备当前所处的位置信息触发所述管理命令执行的位 置触发条件。
16. 一种终端设备的管理方法, 其特征在于, 包括步骤-
1 ) 管理侧设定管理命令; 并
2)将设定的管理命令设置到被管理的终端设备上;
3)被管理的终端设备执行自身设置的管理命令。
17.如权利要求 16所述的方法, 其特征在于, 所述步骤 2) 中管理侧通 过将设定的管理命令写入到能够在被管理的终端设备安装并识别的智能卡 中, 实现将设定的管理命令设置到被管理的终端设备上。
18.如权利要求 17所述的方法, 其特征在于, 所述管理侧将管理命令以 设备管理树形式写入到智能卡中。
19.如权利要求 16所述的方法, 其特征在于, 所述步骤 1 ) 中还包括步
M: 管理侧设定用于触发所述管理命令执行的触发条件。
20.如权利要求 19所述的方法, 其特征在于, 所述步骤 2) 中还包括步 骤- 管理侧将设定的触发条件设置到被管理的终端设备上;
所述步骤 2)和 3 )之间还包括步骤:
被管理的终端设备监测所述触发条件是否得到满足; 并
在所述触发条件得到满足时, 执行步骤 3)。
21.如权利要求 20所述的方法, 其特征在于, 所述步骤 2) 中管理侧通 过将设定的管理命令和触发条件分别写入到能够在被管理的终端设备安装并 识别的智能卡中, 实现将设定的管理命令和触发条件分别设置到被管理的终 端设备上。
22.如权利要求 21所述的方法, 其特征在于, 所述管理侧将管理命令和 触发条件分别以设备管理树形式写入到智能卡中。
23. 如权利要求 19所述的方法, 其特征在于, 所述步骤 2)和 3 )之间 还包括步骤:
管理侧监测所设定的触发条件是否得到满足; 并
在所设定的触发条件得到满足时, 通过设备管理服务器下发执行指令到 被管理的终端设备;
所述步骤 3 ) 中被管理的终端设备接收到所述执行指令时, 执行自身设 置的管理命令。
24.如 16〜23 fe—权利要求所述的方法, 其特征在于, 还包括步骤:
4)设备管理服务器获取被管理的终端设备执行所述管理命令所得到的执 行结果信息;
5)所述管理侧获取设备管理服务器获取到的执行结果信息。
25.如权利要求 24所述的方法, 其特征在于, 所述设备管理服务器获取 被管理的终端设备执行所述管理命令所得到的执行结果信息的方式为:
被管理的终端设备将执行所述管理命令所得到的执行结果信息上报给设 备管理服务器; 或
设备管理服务器到被管理的终端设备中提取执行所述管理命令所得到的 执行结果信息。
26.如权利要求 24所述的方法, 其特征在于, 所述管理侧获取设备管理 服务器获取到的执行结果信息的方式为:'
设备管理服务器将获取到的执行结果信息上报给管理侧; 或
管理侧到设备管理服务器中提取获取到的执行结果信息。
27.如 16〜23任一权利要求所述的方法, 其特征在于, 还包括管理侧通 过设备管理服务器对已经设置到被管理 β 终端设备上的管理命令进行更新维 护处理的步骤。
28.如 16〜23任一权利要求所述的方法,其特征在于,所述管理命令为: 记录被管理的终端设备上的附加功能的使用情况; 或
禁用 /启动被管理的终端设备上的附加功能。
29.如权利要求 28所述的方法, 其特征在于, 所述终端设备上的附加功 能包括:
带有摄像头的终端设备的摄像功能; 和 /或
带有红外接口的终端设备的短距离无线通信功能; 和 /或
带有蓝牙接口的终端设备的短距离无线通信功能。
30. 如 16〜23任一权利要求所述的方法,其特征在于,所述触发条件为: 根据时间段信息触发所述管理命令执行的时间触发条件; 或
根据被管理的终端设备当前所处的位置信息触发所述管理命令执行的位 置触发条件。
PCT/CN2006/001869 2005-10-13 2006-07-27 Procede de gestion d'equipement terminal WO2007041916A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CNA2006800122572A CN101161007A (zh) 2005-10-13 2006-07-27 终端设备的管理方法
US11/626,477 US7889684B2 (en) 2005-10-13 2007-01-24 Method for managing a terminal device

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN200510112683.0 2005-10-13
CN200510112683 2005-10-13
CNB200510135008XA CN100361456C (zh) 2005-10-13 2005-12-23 终端设备的管理方法及其终端设备
CN200510135008.X 2005-12-23

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US11/626,477 Continuation US7889684B2 (en) 2005-10-13 2007-01-24 Method for managing a terminal device

Publications (1)

Publication Number Publication Date
WO2007041916A1 true WO2007041916A1 (fr) 2007-04-19

Family

ID=36811520

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2006/001869 WO2007041916A1 (fr) 2005-10-13 2006-07-27 Procede de gestion d'equipement terminal

Country Status (4)

Country Link
US (1) US7889684B2 (zh)
KR (1) KR101030185B1 (zh)
CN (1) CN100361456C (zh)
WO (1) WO2007041916A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111381825A (zh) * 2020-03-06 2020-07-07 北京五八信息技术有限公司 一种小程序的生成方法和装置

Families Citing this family (91)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100479575C (zh) 2005-06-30 2009-04-15 华为技术有限公司 在设备管理中实现预定操作的方法及装置
US8159960B2 (en) * 2006-12-18 2012-04-17 Verizon Patent And Licensing Inc. Content processing device monitoring
WO2009021200A1 (en) * 2007-08-08 2009-02-12 Innopath Software, Inc. Managing and enforcing policies on mobile devices
WO2009021212A1 (en) * 2007-08-08 2009-02-12 Innopath Software, Inc. Push and clone configuration management for mobile devices
KR101441506B1 (ko) 2007-11-20 2014-09-18 삼성전자주식회사 휴대 단말기 진단 및 감시 방법과 시스템
EP2063681A1 (en) * 2007-11-21 2009-05-27 Nokia Siemens Networks Oy Device management system
US9170870B1 (en) 2013-08-27 2015-10-27 Sprint Communications Company L.P. Development and testing of payload receipt by a portable electronic device
CN101686458B (zh) * 2008-09-28 2013-06-12 华为技术有限公司 一种终端配置和管理方法及终端装置
WO2010038650A1 (ja) * 2008-09-30 2010-04-08 日本電気株式会社 モバイル端末の実行機能管理システム、方法、およびプログラム
US8612582B2 (en) 2008-12-19 2013-12-17 Openpeak Inc. Managed services portals and method of operation of same
US8856322B2 (en) 2008-12-19 2014-10-07 Openpeak Inc. Supervisory portal systems and methods of operation of same
US8615581B2 (en) 2008-12-19 2013-12-24 Openpeak Inc. System for managing devices and method of operation of same
US8745213B2 (en) 2008-12-19 2014-06-03 Openpeak Inc. Managed services platform and method of operation of same
US8199507B2 (en) * 2008-12-19 2012-06-12 Openpeak Inc. Telephony and digital media services device
US8650290B2 (en) 2008-12-19 2014-02-11 Openpeak Inc. Portable computing device and method of operation of same
US8788655B2 (en) 2008-12-19 2014-07-22 Openpeak Inc. Systems for accepting and approving applications and methods of operation of same
US8713173B2 (en) 2008-12-19 2014-04-29 Openpeak Inc. System and method for ensuring compliance with organizational policies
CN101867911B (zh) * 2009-04-14 2013-12-18 联芯科技有限公司 移动终端设备动态远程管理系统及其方法
US20110093541A1 (en) * 2009-10-16 2011-04-21 Samsung Electronics Co. Ltd. Apparatus and method for suppressing a device management (dm) message in a communication system
US9026582B2 (en) * 2010-03-23 2015-05-05 Htc Corporation Device management methods and related apparatus for enhancing applicability of status messages in response to commands
US20110295690A1 (en) * 2010-06-01 2011-12-01 Benjamin J. Steinmetz Providing information to potential purchasers electronically
KR101705279B1 (ko) * 2010-06-01 2017-02-09 삼성전자 주식회사 단말 관리 서비스를 제공하는 서버 및 방법 그리고 상기 단말 관리 서비스를 제공받는 단말
CN102347939B (zh) 2010-08-05 2015-09-09 华为终端有限公司 软件管理的方法、装置及系统
KR101732186B1 (ko) * 2010-08-19 2017-05-02 삼성전자주식회사 단말 관리 패키지를 제공하는 장치, 방법 및 상기 단말 관리 패키지를 제공받는 방법
US20120072280A1 (en) * 2010-09-20 2012-03-22 Lin Jennifer W Tracking Conversions
CN102082829B (zh) * 2011-01-17 2014-10-22 芦毅 实验室远程访问控制方法
US8612967B1 (en) 2011-05-31 2013-12-17 Sprint Communications Company L.P. Loading branded media outside system partition
US8695060B2 (en) 2011-10-10 2014-04-08 Openpeak Inc. System and method for creating secure applications
CN103067422A (zh) * 2011-10-19 2013-04-24 华为终端有限公司 一种业务发放的方法、设备及系统
KR101822940B1 (ko) * 2011-12-12 2018-01-29 엘지전자 주식회사 수행 시간에 기초하여 장치 관리 명령을 수행하는 방법 및 장치
US8666383B1 (en) 2011-12-23 2014-03-04 Sprint Communications Company L.P. Automated branding of generic applications
WO2013116402A1 (en) * 2012-01-30 2013-08-08 Allied Telesis Holdings Kabushiki Kaisha Safe state for networked devices
US10455071B2 (en) 2012-05-09 2019-10-22 Sprint Communications Company L.P. Self-identification of brand and branded firmware installation in a generic electronic device
JP5543997B2 (ja) * 2012-08-28 2014-07-09 住友電気工業株式会社 被遠隔管理装置、被遠隔管理方法および被遠隔管理プログラム
US9198027B2 (en) 2012-09-18 2015-11-24 Sprint Communications Company L.P. Generic mobile devices customization framework
CN103392328B (zh) * 2012-12-21 2016-05-25 华为技术有限公司 远程控制通讯终端工作的服务器和方法及通讯终端
US9413596B2 (en) * 2013-01-10 2016-08-09 Webroot Inc. Managed execution and expiration of agent commands
US9451446B2 (en) 2013-01-18 2016-09-20 Sprint Communications Company L.P. SIM profile brokering system
US8909291B1 (en) 2013-01-18 2014-12-09 Sprint Communications Company L.P. Dynamic remotely managed SIM profile
US9100819B2 (en) 2013-02-08 2015-08-04 Sprint-Communications Company L.P. System and method of provisioning and reprovisioning a mobile device based on self-locating
US9549009B1 (en) 2013-02-08 2017-01-17 Sprint Communications Company L.P. Electronic fixed brand labeling
US9100769B2 (en) 2013-02-08 2015-08-04 Sprint Communications Company L.P. System and method of storing service brand packages on a mobile device
US9026105B2 (en) 2013-03-14 2015-05-05 Sprint Communications Company L.P. System for activating and customizing a mobile device via near field communication
US9204286B1 (en) 2013-03-15 2015-12-01 Sprint Communications Company L.P. System and method of branding and labeling a mobile device
US9042877B1 (en) 2013-05-21 2015-05-26 Sprint Communications Company L.P. System and method for retrofitting a branding framework into a mobile communication device
US9280483B1 (en) 2013-05-22 2016-03-08 Sprint Communications Company L.P. Rebranding a portable electronic device while maintaining user data
KR101566494B1 (ko) 2013-06-10 2015-11-05 재단법인대구경북과학기술원 디바이스 관리 서버 및 그 방법
CN104239819A (zh) * 2013-06-24 2014-12-24 章玺 使笔记本电脑摄像头禁用的方法
US9532211B1 (en) 2013-08-15 2016-12-27 Sprint Communications Company L.P. Directing server connection based on location identifier
US9161209B1 (en) 2013-08-21 2015-10-13 Sprint Communications Company L.P. Multi-step mobile device initiation with intermediate partial reset
US9125037B2 (en) 2013-08-27 2015-09-01 Sprint Communications Company L.P. System and methods for deferred and remote device branding
US9143924B1 (en) 2013-08-27 2015-09-22 Sprint Communications Company L.P. Segmented customization payload delivery
US9204239B1 (en) 2013-08-27 2015-12-01 Sprint Communications Company L.P. Segmented customization package within distributed server architecture
US9743271B2 (en) 2013-10-23 2017-08-22 Sprint Communications Company L.P. Delivery of branding content and customizations to a mobile communication device
US10506398B2 (en) 2013-10-23 2019-12-10 Sprint Communications Company Lp. Implementation of remotely hosted branding content and customizations
US9301081B1 (en) 2013-11-06 2016-03-29 Sprint Communications Company L.P. Delivery of oversized branding elements for customization
US9363622B1 (en) 2013-11-08 2016-06-07 Sprint Communications Company L.P. Separation of client identification composition from customization payload to original equipment manufacturer layer
US9161325B1 (en) 2013-11-20 2015-10-13 Sprint Communications Company L.P. Subscriber identity module virtualization
CN104684015B (zh) * 2013-11-29 2018-07-20 华为技术有限公司 设备维护方法及设备
US9392395B1 (en) 2014-01-16 2016-07-12 Sprint Communications Company L.P. Background delivery of device configuration and branding
US9603009B1 (en) 2014-01-24 2017-03-21 Sprint Communications Company L.P. System and method of branding a device independent of device activation
US9420496B1 (en) 2014-01-24 2016-08-16 Sprint Communications Company L.P. Activation sequence using permission based connection to network
US10284425B2 (en) * 2014-01-29 2019-05-07 Cellco Partnership Device registration awareness for over-the-air updates
US9681251B1 (en) 2014-03-31 2017-06-13 Sprint Communications Company L.P. Customization for preloaded applications
CN105100173B (zh) * 2014-05-23 2018-12-25 中国电信股份有限公司 锁屏和屏幕解锁方法、屏幕管理系统和设备
US9426641B1 (en) 2014-06-05 2016-08-23 Sprint Communications Company L.P. Multiple carrier partition dynamic access on a mobile device
US9307400B1 (en) 2014-09-02 2016-04-05 Sprint Communications Company L.P. System and method of efficient mobile device network brand customization
US20160071040A1 (en) 2014-09-05 2016-03-10 Openpeak Inc. Method and system for enabling data usage accounting through a relay
US9100390B1 (en) 2014-09-05 2015-08-04 Openpeak Inc. Method and system for enrolling and authenticating computing devices for data usage accounting
US8938547B1 (en) 2014-09-05 2015-01-20 Openpeak Inc. Method and system for data usage accounting in a computing device
US9350818B2 (en) 2014-09-05 2016-05-24 Openpeak Inc. Method and system for enabling data usage accounting for unreliable transport communication
US9232013B1 (en) 2014-09-05 2016-01-05 Openpeak Inc. Method and system for enabling data usage accounting
US9992326B1 (en) 2014-10-31 2018-06-05 Sprint Communications Company L.P. Out of the box experience (OOBE) country choice using Wi-Fi layer transmission
CN105721389B (zh) * 2014-12-01 2019-09-06 腾讯科技(深圳)有限公司 多终端设备互通数据处理和服务响应方法、装置
US9602346B1 (en) * 2014-12-11 2017-03-21 Sprint Communications Company L.P. Configuration data handling in wireless communication devices
CN104602192A (zh) * 2015-02-03 2015-05-06 巫立斌 一种移动终端的远程控制方法
US9398462B1 (en) 2015-03-04 2016-07-19 Sprint Communications Company L.P. Network access tiered based on application launcher installation
US9357378B1 (en) 2015-03-04 2016-05-31 Sprint Communications Company L.P. Subscriber identity module (SIM) card initiation of custom application launcher installation on a mobile communication device
US9913132B1 (en) 2016-09-14 2018-03-06 Sprint Communications Company L.P. System and method of mobile phone customization based on universal manifest
US10021240B1 (en) 2016-09-16 2018-07-10 Sprint Communications Company L.P. System and method of mobile phone customization based on universal manifest with feature override
CN106658185B (zh) * 2016-10-14 2019-11-12 尚云(广州)信息科技有限公司 一种基于终端直播的信号屏蔽方法
CN106385602A (zh) * 2016-10-14 2017-02-08 韩斌 一种针对无直播权限用户的终端直播智能控制方法
CN106454092A (zh) * 2016-10-14 2017-02-22 韩斌 一种针对无影像摄取权限用户的终端拍照智能控制方法
CN108512804A (zh) * 2017-02-24 2018-09-07 美的智慧家居科技有限公司 安全摄录方法和装置
US10306433B1 (en) 2017-05-01 2019-05-28 Sprint Communications Company L.P. Mobile phone differentiated user set-up
CN107094184A (zh) * 2017-06-07 2017-08-25 江苏北弓智能科技有限公司 一种基于时间策略的移动终端管控系统
KR102039228B1 (ko) * 2017-11-27 2019-10-31 동국대학교 경주캠퍼스 산학협력단 데이터 전송 방법
CN110119322B (zh) * 2019-05-08 2022-05-10 北京三快在线科技有限公司 数据获取方法、装置、计算机设备及可读存储介质
CN110428246A (zh) * 2019-06-21 2019-11-08 口碑(上海)信息技术有限公司 远程控制终端的方法及装置、存储介质、电子装置
CN112114840B (zh) * 2019-06-21 2023-01-06 华为技术有限公司 软件升级方法、装置及系统
CN111966381A (zh) * 2020-08-24 2020-11-20 宝牧科技(天津)有限公司 一种轻量的业务终端健康检测系统及方法

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003088699A1 (en) * 2002-04-11 2003-10-23 Mformation Technologies Inc. System and method for wireless data terminal management using general packet radio service network
CN1543251A (zh) * 2003-05-02 2004-11-03 ��˹��ŵ�� 设备管理
WO2005050478A1 (en) * 2003-11-24 2005-06-02 Nokia Corporation Configuration of a terminal

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5315057A (en) * 1991-11-25 1994-05-24 Lucasarts Entertainment Company Method and apparatus for dynamically composing music and sound effects using a computer entertainment system
US5404528A (en) 1993-01-19 1995-04-04 Canon Information Systems, Inc. Scripting system
US6402614B1 (en) * 1995-06-30 2002-06-11 Walker Digital, Llc Off-line remote system for lotteries and games of skill
US6389464B1 (en) * 1997-06-27 2002-05-14 Cornet Technology, Inc. Device management system for managing standards-compliant and non-compliant network elements using standard management protocols and a universal site server which is configurable from remote locations via internet browser technology
US7447712B2 (en) * 1997-09-28 2008-11-04 Global 360, Inc. Structured workfolder
US6650902B1 (en) * 1999-11-15 2003-11-18 Lucent Technologies Inc. Method and apparatus for wireless telecommunications system that provides location-based information delivery to a wireless mobile unit
US6564055B1 (en) * 2000-01-21 2003-05-13 Telecommunication Systems, Inc. Intelligent roaming database (IRDB) updating
US6671757B1 (en) * 2000-01-26 2003-12-30 Fusionone, Inc. Data transfer and synchronization system
US7058356B2 (en) * 2000-06-15 2006-06-06 Benjamin Slotznick Telephone device with enhanced audio-visual features for interacting with nearby displays and display screens
JP2002189801A (ja) * 2000-12-21 2002-07-05 Sony Corp サービス提供システム、管理サーバ、サービスプロバイダ、端末装置、記録媒体発行装置、サービス提供方法、記録媒体
US20030028592A1 (en) * 2001-08-03 2003-02-06 Masahiro Ooho Backup-restoration system and right management server
DE10151115A1 (de) * 2001-10-15 2003-05-08 Siemens Ag Verfahren zum Bedienen und zum Beobachten von Feldgeräten
US8116889B2 (en) * 2002-06-27 2012-02-14 Openpeak Inc. Method, system, and computer program product for managing controlled residential or non-residential environments
US6676022B1 (en) * 2002-10-04 2004-01-13 Mobile-Mind, Inc. Smart card system with command queuing
EP1639488B1 (en) * 2003-06-30 2013-11-06 JDS Uniphase Corporation Propagation of signals between devices for triggering capture of network data
US7321929B2 (en) * 2003-08-01 2008-01-22 Network Appliance, Inc. Programmable remote device management system for locally or remotely controlling and/or configuring a communication network switch
US8694620B2 (en) * 2003-09-08 2014-04-08 Microsoft Corporation System and method for an OMA DM extension to manage mobile device configuration settings
US20050079869A1 (en) * 2003-10-13 2005-04-14 Nortel Networks Limited Mobile node authentication
WO2005079334A2 (en) * 2004-02-12 2005-09-01 Bitfone Corporation Device management network that facilitates selective billing
KR101254209B1 (ko) * 2004-03-22 2013-04-23 삼성전자주식회사 디바이스와 휴대용 저장장치간에 권리 객체를 이동,복사하는 방법 및 장치
WO2005096145A2 (en) * 2004-03-22 2005-10-13 Motorola Inc., A Corporation Of The State Of Delaware Method and apparatus for dynamic extension of device management tree data model on a mobile device
KR101043336B1 (ko) * 2004-03-29 2011-06-22 삼성전자주식회사 디바이스와 휴대형 저장장치간의 디지털 권리객체에 관한정보의 획득 및 제거를 위한 방법 및 장치
US20060031449A1 (en) * 2004-07-01 2006-02-09 Mika Hallamaa Selection of management method
KR100641238B1 (ko) * 2004-07-09 2006-11-02 엘지전자 주식회사 장치 관리 시스템 및 그 시스템에서의 장치관리 명령스케줄링 방법
US8005831B2 (en) * 2005-08-23 2011-08-23 Ricoh Co., Ltd. System and methods for creation and use of a mixed media environment with geographic location information
US20070093243A1 (en) * 2005-10-25 2007-04-26 Vivek Kapadekar Device management system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003088699A1 (en) * 2002-04-11 2003-10-23 Mformation Technologies Inc. System and method for wireless data terminal management using general packet radio service network
CN1543251A (zh) * 2003-05-02 2004-11-03 ��˹��ŵ�� 设备管理
WO2005050478A1 (en) * 2003-11-24 2005-06-02 Nokia Corporation Configuration of a terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111381825A (zh) * 2020-03-06 2020-07-07 北京五八信息技术有限公司 一种小程序的生成方法和装置
CN111381825B (zh) * 2020-03-06 2021-04-09 北京五八信息技术有限公司 一种小程序的生成方法和装置

Also Published As

Publication number Publication date
CN1801743A (zh) 2006-07-12
US20070165654A1 (en) 2007-07-19
KR101030185B1 (ko) 2011-04-18
CN100361456C (zh) 2008-01-09
US7889684B2 (en) 2011-02-15
KR20080054437A (ko) 2008-06-17

Similar Documents

Publication Publication Date Title
WO2007041916A1 (fr) Procede de gestion d&#39;equipement terminal
US9179434B2 (en) Systems and methods for locking and disabling a device in response to a request
US9917698B2 (en) Management of certificates for mobile devices
US8635109B2 (en) System and method for providing offers for mobile devices
WO2007065326A1 (fr) Procede de gestion de dispositif terminal
US20120188064A1 (en) System and method for remotely initiating playing of sound on a mobile device
EP2051440B1 (en) A method for executing management operation by communication terminal and a terminal and system thereof
US20080289044A1 (en) Apparatus, system, and method for storing DRM licenses
JP7422849B2 (ja) 5gネットワークにおけるアプリケーション機能に対する分析開示用のデバイスおよび方法
JP2008546288A (ja) 無線デバイス上のデータを保護する装置及び方法
US7925715B2 (en) Apparatus and methods for service programming of a wireless device on a wireless communications network
JP2008527475A (ja) 複数のコンフィギュレーションを有する装置内におけるコンフィギュレーションの使用法
US20100217852A1 (en) Wireless Terminal Device and Server Therefor
EP2590354B1 (en) Method, apparatus and system for software management
WO2010012157A1 (zh) 设备描述框架信息上报以及更新方法、设备和系统
KR20090046055A (ko) 유선 인터넷망에 연결되는 사용자 단말에 대한 서비스 개통및 관리를 위한 장치 및 방법
CN101161007A (zh) 终端设备的管理方法
KR100913976B1 (ko) 다중 구성들을 구비한 장치에서 구성들의 사용
CN113660283A (zh) 一种合法性认证方法以及装置
WO2017032021A1 (zh) 垃圾短信监控策略管理方法、中央管理平台及监控系统
JP2012053912A (ja) 複数のコンフィギュレーションを有する装置内におけるコンフィギュレーションの使用法

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 11626477

Country of ref document: US

WWP Wipo information: published in national office

Ref document number: 11626477

Country of ref document: US

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 200680012257.2

Country of ref document: CN

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 1020087010799

Country of ref document: KR

122 Ep: pct application non-entry in european phase

Ref document number: 06761587

Country of ref document: EP

Kind code of ref document: A1