WO2018018816A1 - Procédé de commande à distance, dispositif de commande à distance et terminal - Google Patents
Procédé de commande à distance, dispositif de commande à distance et terminal Download PDFInfo
- Publication number
- WO2018018816A1 WO2018018816A1 PCT/CN2016/107911 CN2016107911W WO2018018816A1 WO 2018018816 A1 WO2018018816 A1 WO 2018018816A1 CN 2016107911 W CN2016107911 W CN 2016107911W WO 2018018816 A1 WO2018018816 A1 WO 2018018816A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- remote control
- control instruction
- detecting
- application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/08—Protocols specially adapted for terminal emulation, e.g. Telnet
Definitions
- the present invention relates to the field of communications technologies, and in particular, to a remote control method, a remote control device, and a terminal.
- the screen sharing function can be used to map the interface information of the terminal such as the mobile phone to the remote control terminal, and the remote control terminal can remotely control the sharing terminal through the remote assistance mode, for example, when the user A does not operate the certain
- a remote control connection can be initiated to the user B, and after the remote control connection is established, the application is operated by the user B.
- the remote control terminal Since more and more users store the private information on the terminal, after connecting with the remote control terminal, the remote control terminal has the editing authority for any application on the sharing terminal, and there is a risk of leakage of privacy information, although it is possible to pass
- the user manually sets some applications with private information to be disabled, but if there are many such applications, it is not convenient for the user to manage, which affects the user experience.
- the present invention is based on at least one of the above technical problems, and proposes a new remote control scheme, which detects whether the remote control terminal belongs to a preset authority terminal when receiving a control command sent by the remote control terminal, and detects the When the remote control terminal belongs to the preset authority terminal, it is determined whether to execute the control command according to the mapping type of the preset authority terminal, and the management of the authority of the remote control terminal is realized, and different remote control terminals can have different operation rights, which is convenient for the user.
- the security of the remote control process is improved, the risk of leakage of user privacy information is reduced, and the management of the application is simplified on the other hand, and the user experience is improved.
- the present invention provides a remote control method, including: detecting, when receiving a control command sent by a remote control terminal, whether the remote control terminal belongs to a preset authority terminal; detecting that the remote control terminal belongs to a preset authority terminal When determining the execution of the control instruction according to the mapping type of the preset authority terminal.
- the mapping type determines whether to execute the control instruction, and realizes the management of the remote control terminal authority.
- Different remote control terminals can have different operation rights, which facilitates the user operation and improves the security of the remote control process and reduces the security.
- the risk of leakage of user privacy information simplifies user management of the application and enhances the user experience.
- the sharing terminal shares the local display interface to the remote control terminal in real time through the screen recording mode, and the remote control terminal receives the user's display screen.
- the remote control terminal packages the position information of the captured touch command as a control command, and sends the position information to the sharing terminal, and the sharing terminal analyzes the position information and maps to the display screen of the sharing terminal, and controls the application corresponding to the execution position information. Touch operation to execute control commands.
- the remote control terminal that the user thinks is safer is first set as the preset authority terminal, and when the control command sent by the remote control terminal is received, the remote control of the connection is detected. After the terminal is a preset permission terminal, determining whether the control instruction has the execution permission according to the mapping type of the preset preset authorization terminal, wherein the mapping type includes:
- the remote control terminal can also be given different control rights.
- determining whether to execute the control instruction according to the mapping type of the preset authority terminal specifically comprising the following steps: according to the preset authority terminal and the authorized application Corresponding relationship of the program, determining the authorization application; detecting whether the control instruction is for the authorized application; detecting the control instruction according to the correspondence between the authorized application and the authorization control instruction when detecting the control instruction for the authorized application, detecting whether the control instruction belongs to the authorization control instruction
- the control command is executed.
- the correspondence between the remote control terminal and the authorized application and the correspondence between the authorized application and the authorization control instruction are preset, and according to the correspondence between the remote control terminal and the authorized application, which applications on the sharing terminal interface are determined.
- To authorize the application and then detecting whether the control instruction is an operation for the authorized application, after determining that the control instruction is for the operation of authorizing the application, determining whether to execute the control instruction according to the correspondence between the authorized application and the authorization control instruction,
- the execution permission of the operation instruction is refined in the application having the operation authority, and the operation authority of the remote control terminal is refined, and on the other hand, by setting different remote control terminals, the operation authority for different applications is simplified. The user's management process for the application.
- the remote control terminal acquires a touch instruction for specifying a picture on the main interface of the “Gallery” application of the sharing terminal, and sends it as a viewing command to the sharing terminal, first detecting the “Gallery” application.
- the remote control terminal when detecting that the "gallery" application belongs to the permission group of the remote control terminal, the remote control terminal has certain control authority for the "gallery" application, that is, the "gallery” application belongs to Authorizing the application, according to the correspondence between the authorized application and the authorization control instruction, determining whether the viewing instruction is an authorization control instruction, and when determining that the viewing instruction is an authorization control instruction, is capable of viewing the specified picture through the remote control terminal, and determining that the viewing instruction is not authorized When the command is controlled, it is prohibited to view the specified picture through the remote control terminal.
- the control instructions include: a view instruction, an edit instruction, a delete instruction, a login instruction, a send instruction, and the like.
- determining whether to execute the control instruction according to the mapping type of the preset authority terminal specifically comprising the following steps: Corresponding relationship with the authorization control instruction, detecting whether the control instruction belongs to the authorization control instruction; and executing the control instruction when detecting that the control instruction belongs to the authorization control instruction.
- the corresponding relationship between the remote control terminal and the authorization control instruction is preset, that is, different remote control terminals have different execution authority of the control instruction, and when it is detected that the control instruction belongs to the authorization control instruction, that is, when the execution authority is available, The control instruction is executed, and when it is detected that the control instruction is not the authorization control instruction, the control instruction is not executed.
- different remote control terminals have different control command execution rights.
- the remote control terminal B only has the view permission
- the remote control terminal C has the right to view and edit.
- determining whether to execute the control instruction according to the mapping type of the preset authority terminal further comprising: according to the preset authority terminal and the application Corresponding relationship of the program, determining the authorized application; detecting whether the control instruction is for the authorized application; and executing the control instruction when detecting that the control instruction is for the authorized application.
- the corresponding relationship between the remote control terminal and the authorized application is preset.
- the control instruction judges, as long as the authorization application executes the control instruction, thereby dividing the application into an authorized application and an unauthorized application, and the authorized application, the remote control terminal has the right to execute the control instruction, and the unauthorized application
- the program rejects the remote control terminal access, realizes the different management modes of the sharing terminal to the application, and improves the security of the screen sharing.
- the authorization application can also be set to be visible to the remote control terminal user, and the unauthorized application can be hidden on the interface shared to the remote control terminal, which further facilitates remote control of the operation of the terminal user.
- the method further includes: determining, when the remote control terminal does not belong to the preset authorized terminal, the IP information of the remote control terminal; detecting whether the IP information belongs to the pre-stored IP information; detecting the IP When the information belongs to pre-stored IP information, the remote control terminal is added to the list of preset authorized terminals, and the mapping relationship in the mapping type is updated.
- the remote control terminal when detecting that the remote control terminal does not belong to the preset authorized terminal, determining the IP information of the remote control terminal, detecting whether the IP information of the remote control terminal is pre-set in the sharing terminal, and detecting the sharing terminal
- the IP information of the remote control terminal is pre-configured, it indicates that the remote control terminal has certain security for the sharing terminal.
- the remote control terminal can be set as a preset authorized terminal, and the remote control terminal is allowed to perform certain operations.
- it is detected that the IP information of the remote control terminal is not preset in the sharing terminal it indicates that the remote control terminal is a strange terminal for the sharing terminal, and at this time, the remote control terminal is realized on the one hand by cutting off the connection with the strange terminal.
- the security control of the sharing terminal also prevents the sharing terminal from being attacked by the strange terminal, thereby further improving the user experience.
- connection between the sharing terminal and the remote control terminal may be implemented by an IP (Internet Protocol) protocol, or by Socket communication.
- IP Internet Protocol
- Socket communication may be implemented by an IP (Internet Protocol) protocol, or by Socket communication.
- a remote control apparatus comprising: a detecting unit configured to: when receiving a control command sent by the remote control terminal, detecting whether the remote control terminal belongs to a preset authority terminal; determining a unit, setting To detect whether the remote control terminal belongs to the preset authority terminal, determine whether to execute the control instruction according to the mapping type of the preset authority terminal.
- the mapping type determines whether to execute the control instruction, and realizes the management of the remote control terminal authority.
- Different remote control terminals can have different operation rights, which facilitates the user operation and improves the security of the remote control process and reduces the security.
- the risk of leakage of user privacy information simplifies user management of the application and enhances the user experience.
- the sharing terminal shares the local display interface to the remote control terminal in real time through the screen recording mode, and the remote control terminal receives the user's display screen.
- the remote control terminal packages the position information of the captured touch command as a control command, and sends the position information to the sharing terminal, and the sharing terminal analyzes the position information and maps to the display screen of the sharing terminal, and controls the application corresponding to the execution position information. Touch operation to execute control commands.
- the remote control terminal that the user thinks is safer is first set as the preset authority terminal, and when the control command sent by the remote control terminal is received, the remote control of the connection is detected. After the terminal is a preset permission terminal, determining whether the control instruction has the execution permission according to the mapping type of the preset preset authorization terminal, wherein the mapping type includes:
- the remote control terminal can also be given different control rights.
- the determining unit is further configured to: determine, according to the correspondence between the preset authority terminal and the authorized application, the authorization application; the detecting unit is further configured to: detect whether the control instruction is for the authorized application; and the detecting unit And being further configured to: when detecting that the control instruction is for the authorized application, detecting whether the control instruction belongs to the authorization control instruction according to the correspondence between the authorized application and the authorization control instruction; the remote control device further includes: an execution unit, configured to detect When the control instruction belongs to the authorization control instruction, the control instruction is executed.
- the correspondence between the remote control terminal and the authorized application and the correspondence between the authorized application and the authorization control instruction are preset, and according to the correspondence between the remote control terminal and the authorized application, which applications on the sharing terminal interface are determined.
- To authorize the application and then detecting whether the control instruction is an operation for the authorized application, after determining that the control instruction is for the operation of authorizing the application, determining whether to execute the control instruction according to the correspondence between the authorized application and the authorization control instruction,
- the execution permission of the operation instruction is refined in the application having the operation authority, and the operation authority of the remote control terminal is refined, and on the other hand, by setting different remote control terminals, the operation authority for different applications is simplified. The user's management process for the application.
- the remote control terminal acquires a touch instruction for specifying a picture on the main interface of the “Gallery” application of the sharing terminal, and sends it as a viewing command to the sharing terminal, first detecting the “Gallery” application.
- the remote control terminal when detecting that the "gallery" application belongs to the permission group of the remote control terminal, the remote control terminal has certain control authority for the "gallery" application, that is, the "gallery” application belongs to Authorizing the application, according to the correspondence between the authorized application and the authorization control instruction, determining whether the viewing instruction is an authorization control instruction, and when determining that the viewing instruction is an authorization control instruction, is capable of viewing the specified picture through the remote control terminal, and determining that the viewing instruction is not authorized When the command is controlled, it is prohibited to view the specified picture through the remote control terminal.
- the control instructions include: a view instruction, an edit instruction, a delete instruction, a login instruction, a send instruction, and the like.
- the detecting unit is further configured to: detect, according to a correspondence between the preset authority terminal and the authorization control instruction, whether the control instruction belongs to the authorization control instruction; and the execution unit is further configured to: when the control is detected When the instruction belongs to the authorization control instruction, the control instruction is executed.
- the corresponding relationship between the remote control terminal and the authorization control instruction is preset, that is, different remote control terminals have different execution authority of the control instruction, and when it is detected that the control instruction belongs to the authorization control instruction, that is, when the execution authority is available, The control instruction is executed, and when it is detected that the control instruction is not the authorization control instruction, the control instruction is not executed.
- different remote control terminals have different control command execution rights.
- the remote control terminal B only has the view permission
- the remote control terminal C has the right to view and edit.
- the determining unit is further configured to: determine, according to the correspondence between the preset authority terminal and the application, the authorization application; and the detecting unit is further configured to: detect whether the control instruction is for the authorized application; The execution unit is further configured to execute the control instruction upon detecting that the control instruction is for the authorized application.
- the corresponding relationship between the remote control terminal and the authorized application is preset.
- the control instruction judges, as long as the authorization application executes the control instruction, thereby dividing the application into an authorized application and an unauthorized application, and the authorized application, the remote control terminal has the right to execute the control instruction, and the unauthorized application
- the program rejects the remote control terminal access, realizes the different management modes of the sharing terminal to the application, and improves the security of the screen sharing.
- the authorization application can also be set to be visible to the remote control terminal user, and the unauthorized application can be hidden on the interface shared to the remote control terminal, which further facilitates remote control of the operation of the terminal user.
- the determining unit is further configured to: when detecting that the remote control terminal does not belong to the preset authorized terminal, determine IP information of the remote control terminal; and the detecting unit is further configured to: detect whether the IP information is
- the remote control device further includes: an updating unit configured to: when detecting that the IP information belongs to the pre-stored IP information, add the remote control terminal to the list of the preset authorized terminals, and update the mapping relationship in the mapping type.
- the remote control terminal when detecting that the remote control terminal does not belong to the preset authorized terminal, determining the IP information of the remote control terminal, detecting whether the IP information of the remote control terminal is pre-set in the sharing terminal, and detecting the sharing terminal
- the IP information of the remote control terminal is pre-configured, it indicates that the remote control terminal has certain security for the sharing terminal.
- the remote control terminal can be set as a preset authorized terminal, and the remote control terminal is allowed to perform certain operations.
- it is detected that the IP information of the remote control terminal is not preset in the sharing terminal it indicates that the remote control terminal is a strange terminal for the sharing terminal, and at this time, the remote control terminal is realized on the one hand by cutting off the connection with the strange terminal.
- the security control of the sharing terminal also prevents the sharing terminal from being attacked by the strange terminal, thereby further improving the user experience.
- connection between the sharing terminal and the remote control terminal may be implemented by an IP (Internet Protocol) protocol, or by Socket communication.
- IP Internet Protocol
- Socket communication may be implemented by an IP (Internet Protocol) protocol, or by Socket communication.
- a terminal comprising the remote control device according to any one of the above aspects, wherein the terminal includes the technical effect of the remote control device according to any one of the above technical solutions, This will not be repeated here.
- the type determines whether to execute the control instruction, and realizes the management of the authority of the remote control terminal.
- Different remote control terminals can have different operation rights, which facilitates the operation of the user, and improves the security of the remote control process on the one hand, and reduces the security.
- the risk of leaking user privacy information simplifies user management of applications and enhances the user experience.
- FIG. 1 shows a schematic flow chart of a remote control method according to an embodiment of the present invention
- FIG. 2 shows a schematic block diagram of a remote control device in accordance with an embodiment of the present invention
- Figure 3 shows a schematic block diagram of a terminal in accordance with an embodiment of the present invention
- FIG. 4 shows a schematic diagram of a remote control scheme in accordance with an embodiment of the present invention
- Figure 5 shows a schematic flow diagram of a remote control scheme in accordance with an embodiment of the present invention
- FIG. 6 shows a schematic structural diagram of another terminal according to an embodiment of the present invention.
- FIG. 1 shows a schematic flow chart of a remote control method in accordance with an embodiment of the present invention.
- a remote control method includes: Step 102: When receiving a control instruction sent by a remote control terminal, detecting whether the remote control terminal belongs to a preset authority terminal; Step 104, detecting When the remote control terminal belongs to the preset authority terminal, it is determined whether to execute the control instruction according to the mapping type of the preset authority terminal.
- the mapping type determines whether to execute the control instruction, and realizes the management of the remote control terminal authority.
- Different remote control terminals can have different operation rights, which facilitates the user operation and improves the security of the remote control process and reduces the security.
- the risk of leakage of user privacy information simplifies user management of the application and enhances the user experience.
- the sharing terminal shares the local display interface to the remote control terminal in real time through the screen recording mode, and the remote control terminal receives the user's display screen.
- the remote control terminal packages the position information of the captured touch command as a control command, and sends the position information to the sharing terminal, and the sharing terminal analyzes the position information and maps to the display screen of the sharing terminal, and controls the application corresponding to the execution position information. Touch operation to execute control commands.
- the remote control terminal that the user thinks is safer is first set as the preset authority terminal, and when the control command sent by the remote control terminal is received, the remote control of the connection is detected. After the terminal is a preset permission terminal, determining whether the control instruction has the execution permission according to the mapping type of the preset preset authorization terminal, wherein the mapping type includes:
- the remote control terminal can also be given different control rights.
- mapping including but not limited to the following implementations:
- Embodiment 1 is a diagrammatic representation of Embodiment 1:
- determining whether to execute the control instruction according to the mapping type of the preset authority terminal specifically comprising the following steps: according to the preset authority terminal and the authorized application Corresponding relationship of the program, determining the authorization application; detecting whether the control instruction is for the authorized application; detecting the control instruction according to the correspondence between the authorized application and the authorization control instruction when detecting the control instruction for the authorized application, detecting whether the control instruction belongs to the authorization control instruction
- the control command is executed.
- the correspondence between the remote control terminal and the authorized application and the correspondence between the authorized application and the authorization control instruction are preset, and according to the correspondence between the remote control terminal and the authorized application, which applications on the sharing terminal interface are determined.
- To authorize the application and then detecting whether the control instruction is an operation for the authorized application, after determining that the control instruction is for the operation of authorizing the application, determining whether to execute the control instruction according to the correspondence between the authorized application and the authorization control instruction,
- the execution permission of the operation instruction is refined in the application having the operation authority, and the operation authority of the remote control terminal is refined, and on the other hand, by setting different remote control terminals, the operation authority for different applications is simplified. The user's management process for the application.
- the remote control terminal acquires a touch instruction for specifying a picture on the main interface of the “Gallery” application of the sharing terminal, and sends it as a viewing command to the sharing terminal, first detecting the “Gallery” application.
- the remote control terminal when detecting that the "gallery" application belongs to the permission group of the remote control terminal, the remote control terminal has certain control authority for the "gallery" application, that is, the "gallery” application belongs to Authorizing the application, according to the correspondence between the authorized application and the authorization control instruction, determining whether the viewing instruction is an authorization control instruction, and when determining that the viewing instruction is an authorization control instruction, is capable of viewing the specified picture through the remote control terminal, and determining that the viewing instruction is not authorized When the command is controlled, it is prohibited to view the specified picture through the remote control terminal.
- the control instructions include: a view instruction, an edit instruction, a delete instruction, a login instruction, a send instruction, and the like.
- Embodiment 2 is a diagrammatic representation of Embodiment 1:
- determining whether to execute the control instruction according to the mapping type of the preset authority terminal specifically comprising the following steps: Corresponding relationship with the authorization control instruction, detecting whether the control instruction belongs to the authorization control instruction; and executing the control instruction when detecting that the control instruction belongs to the authorization control instruction.
- the corresponding relationship between the remote control terminal and the authorization control instruction is preset, that is, different remote control terminals have different execution authority of the control instruction, and when it is detected that the control instruction belongs to the authorization control instruction, that is, when the execution authority is available, The control instruction is executed, and when it is detected that the control instruction is not the authorization control instruction, the control instruction is not executed.
- different remote control terminals have different control command execution rights.
- the remote control terminal B only has the view permission
- the remote control terminal C has the right to view and edit.
- Embodiment 3 is a diagrammatic representation of Embodiment 3
- determining whether to execute the control instruction according to the mapping type of the preset authority terminal further comprising: according to the preset authority terminal and the application Corresponding relationship of the program, determining the authorized application; detecting whether the control instruction is for the authorized application; and executing the control instruction when detecting that the control instruction is for the authorized application.
- the corresponding relationship between the remote control terminal and the authorized application is preset.
- the control instruction judges, as long as the authorization application executes the control instruction, thereby dividing the application into an authorized application and an unauthorized application, and the authorized application, the remote control terminal has the right to execute the control instruction, and the unauthorized application
- the program rejects the remote control terminal access, realizes the different management modes of the sharing terminal to the application, and improves the security of the screen sharing.
- the authorization application can also be set to be visible to the remote control terminal user, and the unauthorized application can be hidden on the interface shared to the remote control terminal, which further facilitates remote control of the operation of the terminal user.
- the method further includes: determining, when the remote control terminal does not belong to the preset authorized terminal, the IP information of the remote control terminal; detecting whether the IP information belongs to the pre-stored IP information; detecting the IP When the information belongs to pre-stored IP information, the remote control terminal is added to the list of preset authorized terminals, and the mapping relationship in the mapping type is updated.
- the remote control terminal when detecting that the remote control terminal does not belong to the preset authorized terminal, determining the IP information of the remote control terminal, detecting whether the IP information of the remote control terminal is pre-set in the sharing terminal, and detecting the sharing terminal
- the IP information of the remote control terminal is pre-configured, it indicates that the remote control terminal has certain security for the sharing terminal.
- the remote control terminal can be set as a preset authorized terminal, and the remote control terminal is allowed to perform certain operations.
- it is detected that the IP information of the remote control terminal is not preset in the sharing terminal it indicates that the remote control terminal is a strange terminal for the sharing terminal, and at this time, the remote control terminal is realized on the one hand by cutting off the connection with the strange terminal.
- the security control of the sharing terminal also prevents the sharing terminal from being attacked by the strange terminal, thereby further improving the user experience.
- connection between the sharing terminal and the remote control terminal may be implemented by an IP (Internet Protocol) protocol, or by Socket communication.
- IP Internet Protocol
- Socket communication may be implemented by an IP (Internet Protocol) protocol, or by Socket communication.
- FIG. 2 shows a schematic block diagram of a remote control device in accordance with an embodiment of the present invention.
- the remote control apparatus 200 includes: a detecting unit 202 configured to detect, when receiving a control command sent by the remote control terminal, whether the remote control terminal belongs to a preset authority terminal;
- the unit 204 is configured to determine whether to execute the control instruction according to the mapping type of the preset authority terminal when detecting that the remote control terminal belongs to the preset authority terminal.
- the mapping type determines whether to execute the control instruction, and realizes the management of the remote control terminal authority.
- Different remote control terminals can have different operation rights, which facilitates the user operation and improves the security of the remote control process and reduces the security.
- the risk of leakage of user privacy information simplifies user management of the application and enhances the user experience.
- the sharing terminal shares the local display interface to the remote control terminal in real time through the screen recording mode, and the remote control terminal receives the user's display screen.
- the remote control terminal packages the position information of the captured touch command as a control command, and sends the position information to the sharing terminal, and the sharing terminal analyzes the position information and maps to the display screen of the sharing terminal, and controls the application corresponding to the execution position information. Touch operation to execute control commands.
- the remote control terminal that the user thinks is safer is first set as the preset authority terminal, and when the control command sent by the remote control terminal is received, the remote control of the connection is detected. After the terminal is a preset permission terminal, determining whether the control instruction has the execution permission according to the mapping type of the preset preset authorization terminal, wherein the mapping type includes:
- the remote control terminal can also be given different control rights.
- the determining unit 204 is further configured to: determine an authorized application according to a correspondence between the preset authority terminal and the authorized application; and the detecting unit 202 is further configured to: detect whether the control instruction is directed to the authorized application; The detecting unit 202 is further configured to: when detecting that the control instruction is for the authorized application, according to the correspondence between the authorized application and the authorization control instruction, detecting whether the control instruction belongs to the authorization control instruction; the remote control device 200 further includes: an execution unit 206, It is set to execute the control instruction when it is detected that the control instruction belongs to the authorization control instruction.
- the correspondence between the remote control terminal and the authorized application and the correspondence between the authorized application and the authorization control instruction are preset, and according to the correspondence between the remote control terminal and the authorized application, which applications on the sharing terminal interface are determined.
- To authorize the application and then detecting whether the control instruction is an operation for the authorized application, after determining that the control instruction is for the operation of authorizing the application, determining whether to execute the control instruction according to the correspondence between the authorized application and the authorization control instruction,
- the execution permission of the operation instruction is refined in the application having the operation authority, and the operation authority of the remote control terminal is refined, and on the other hand, by setting different remote control terminals, the operation authority for different applications is simplified. The user's management process for the application.
- the remote control terminal acquires a touch instruction for specifying a picture on the main interface of the “Gallery” application of the sharing terminal, and sends it as a viewing command to the sharing terminal, first detecting the “Gallery” application.
- the remote control terminal when detecting that the "gallery" application belongs to the permission group of the remote control terminal, the remote control terminal has certain control authority for the "gallery" application, that is, the "gallery” application belongs to Authorizing the application, according to the correspondence between the authorized application and the authorization control instruction, determining whether the viewing instruction is an authorization control instruction, and when determining that the viewing instruction is an authorization control instruction, is capable of viewing the specified picture through the remote control terminal, and determining that the viewing instruction is not authorized When the command is controlled, it is prohibited to view the specified picture through the remote control terminal.
- the control instructions include: a view instruction, an edit instruction, a delete instruction, a login instruction, a send instruction, and the like.
- the detecting unit 202 is further configured to: detect, according to the correspondence between the preset authority terminal and the authorization control instruction, whether the control instruction belongs to the authorization control instruction; and the executing unit 206 is further configured to: When the control instruction belongs to the authorization control instruction, the control instruction is executed.
- the corresponding relationship between the remote control terminal and the authorization control instruction is preset, that is, different remote control terminals have different execution authority of the control instruction, and when it is detected that the control instruction belongs to the authorization control instruction, that is, when the execution authority is available, The control instruction is executed, and when it is detected that the control instruction is not the authorization control instruction, the control instruction is not executed.
- different remote control terminals have different control command execution rights.
- the remote control terminal B only has the view permission
- the remote control terminal C has the right to view and edit.
- the determining unit 204 is further configured to: determine the authorized application according to the correspondence between the preset authority terminal and the application program; and the detecting unit 202 is further configured to: detect whether the control instruction is for the authorized application.
- the program; the execution unit 206 is further configured to execute the control instruction upon detecting that the control instruction is for the authorized application.
- the corresponding relationship between the remote control terminal and the authorized application is preset.
- the control instruction judges, as long as the authorization application executes the control instruction, thereby dividing the application into an authorized application and an unauthorized application, and the authorized application, the remote control terminal has the right to execute the control instruction, and the unauthorized application
- the program rejects the remote control terminal access, realizes the different management modes of the sharing terminal to the application, and improves the security of the screen sharing.
- the authorization application can also be set to be visible to the remote control terminal user, and the unauthorized application can be hidden on the interface shared to the remote control terminal, which further facilitates remote control of the operation of the terminal user.
- the determining unit 204 is further configured to: determine that the remote control terminal does not belong to the preset authorized terminal, determine the IP information of the remote control terminal; and the detecting unit 202 is further configured to: detect the IP address. Whether the information belongs to the pre-stored IP information; the remote control apparatus 200 further includes: an updating unit 208, configured to: when detecting that the IP information belongs to the pre-stored IP information, add the remote control terminal to the list of the preset authorized terminals, and update the mapping type Mapping relations.
- the remote control terminal when detecting that the remote control terminal does not belong to the preset authorized terminal, determining the IP information of the remote control terminal, detecting whether the IP information of the remote control terminal is pre-set in the sharing terminal, and detecting the sharing terminal
- the IP information of the remote control terminal is pre-configured, it indicates that the remote control terminal has certain security for the sharing terminal.
- the remote control terminal can be set as a preset authorized terminal, and the remote control terminal is allowed to perform certain operations.
- it is detected that the IP information of the remote control terminal is not preset in the sharing terminal it indicates that the remote control terminal is a strange terminal for the sharing terminal, and at this time, the remote control terminal is realized on the one hand by cutting off the connection with the strange terminal.
- the security control of the sharing terminal also prevents the sharing terminal from being attacked by the strange terminal, thereby further improving the user experience.
- connection between the sharing terminal and the remote control terminal may be implemented by an IP (Internet Protocol) protocol, or by Socket communication.
- IP Internet Protocol
- Socket communication may be implemented by an IP (Internet Protocol) protocol, or by Socket communication.
- FIG. 3 shows a schematic block diagram of a terminal in accordance with an embodiment of the present invention.
- the terminal 300 includes the remote control device 200 according to any one of the above aspects. Therefore, the terminal includes the remote control device 200 according to any one of the above technical solutions. Technical effects will not be described here.
- FIG. 4 shows a schematic diagram of a remote control scheme in accordance with an embodiment of the present invention.
- the screen sharer A serves as a sharing terminal, and before the screen is shared, the corresponding relationship between the application and the shared user, that is, the remote control terminal, for example, for the permission group 1, including: APP combination 1 and Sharer combination 1, for permission group 2, including: APP combination 2 and shared person combination 2, for rights group 3, including: APP combination 3 and shared person combination 3, by presetting a plurality of corresponding relationships, different permissions
- the group includes different users and different applications, and gives different operation rights. While facilitating user operations, it enhances the security of the remote control process and reduces the risk of leakage of user privacy information. The aspect simplifies the management of the application by the user and improves the user experience.
- Figure 5 shows a schematic flow diagram of a remote control scheme in accordance with an embodiment of the present invention.
- a remote control scheme includes:
- Step 502 after the start of the screen sharing, detecting whether the remote control terminal belongs to the preset authority terminal, when the determination result is "Yes”, step 510 is performed, and if the determination result is "No", step 504 is performed;
- Step 504 Determine IP information of the remote control terminal.
- Step 506 Determine whether the IP information belongs to the pre-stored IP information. When the determination result is “Yes”, step 508 is performed, and when the determination result is “No”, the process ends.
- Step 508 Add the remote control terminal to the list of preset authorized terminals, and update the mapping relationship in the mapping type.
- Step 510 Determine an application having an operation right according to a correspondence between the preset authority terminal and the application.
- the application program having the operation authority is determined according to the correspondence between the preset authority terminal and the application program, and detecting that the remote control terminal does not belong to the preset authorization terminal
- the security control terminal can be set as a preset authorized terminal, and the remote control terminal is allowed to perform certain operations, and when it is detected that the IP information of the remote control terminal is not preset in the sharing terminal, it indicates The remote control terminal is a strange terminal for the sharing terminal. At this time, by cutting off the connection with the strange terminal, on the one hand, the remote control terminal controls the security of the sharing terminal, and on the other hand, the sharing terminal is prevented from being unfamiliar to the terminal. Attacks further enhance the user experience
- FIG. 6 shows a schematic structural diagram of another terminal according to an embodiment of the present invention.
- FIG. 6 is a schematic structural diagram of another terminal according to an embodiment of the present invention.
- the terminal 300 includes a processor 301, a memory 302, and a transceiver 303.
- the transceiver 303 is configured to transmit and receive data with and from an external device.
- the number of processors 301 in the terminal 300 may be one or more.
- the processor 301, the memory 302, and the transceiver 303 may be connected by a bus system or other means.
- the terminal 300 can be used to perform the methods shown in FIGS. 1 and 5.
- the program code is stored in the memory 302, and the processor 301 can call the program code stored in the memory 302 to perform related functions through a bus system.
- the various units described in FIG. 2 eg, the detection unit 202, the determination unit 204, the execution unit 206, the update unit 208, etc.
- the processor 301 executes program codes stored in the memory 302 to implement the functions of the respective units to implement a remote control method.
- the processor 301 when receiving the control instruction sent by the remote control terminal, detecting whether the remote control terminal belongs to the preset authority terminal; detecting that the remote control terminal belongs to the preset authority terminal And determining, according to the mapping type of the preset authority terminal, whether to execute the control instruction.
- the processor 301 determining, according to the correspondence between the preset authority terminal and the authorized application, the authorized application; detecting whether the control instruction is for the authorized application; And when the control instruction is for the authorized application, detecting, according to the correspondence between the authorized application and the authorization control instruction, whether the control instruction belongs to an authorization control instruction; and detecting that the control instruction belongs to the authorization control When the instruction is executed, the control instruction is executed.
- the processor 301 detecting, according to the correspondence between the preset authority terminal and the authorization control instruction, whether the control instruction belongs to the authorization control instruction; detecting that the control instruction belongs to the The control command is executed when the control command is authorized.
- the processor 301 determining, according to the correspondence between the preset authority terminal and the application, the authorization application; detecting whether the control instruction is for the authorized application; The control instruction is executed when the control instruction is directed to the authorized application.
- the processor 301 when detecting that the remote control terminal does not belong to the preset authorized terminal, determine IP information of the remote control terminal; and detect whether the IP information belongs to a pre-stored IP address.
- Information when detecting that the IP information belongs to the pre-stored IP information, adding the remote control terminal to the list of the preset authorized terminals, and updating the mapping relationship in the mapping type.
- the present invention proposes a new solution by receiving When the remote control terminal sends the control command, it detects whether the remote control terminal belongs to the preset authority terminal. When detecting that the remote control terminal belongs to the preset authority terminal, determining whether to execute the control instruction according to the mapping type of the preset authority terminal, For the management of remote control terminal rights, different remote control terminals can have different operation rights, which facilitates the user's operation while improving the security of the remote control process and reducing the risk of leakage of user privacy information. The aspect simplifies the management of the application by the user and improves the user experience.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Computing Systems (AREA)
- Telephonic Communication Services (AREA)
- Storage Device Security (AREA)
- Selective Calling Equipment (AREA)
Abstract
La présente invention concerne un procédé de commande à distance, un dispositif de commande à distance et un terminal. Le procédé de commande à distance consiste : à détecter, lorsqu'une instruction de commande transmise par un terminal de commande à distance est reçue, si le terminal de commande à distance est un terminal autorisé prédéfini ; et lorsque le terminal de commande à distance est détecté comme étant le terminal autorisé prédéfini, à déterminer, selon un type de mappage du terminal autorisé prédéfini, s'il convient d'exécuter l'instruction de commande.
La solution technique de la présente invention réalise une gestion d'autorité d'un terminal de commande à distance.
Différents terminaux de commande à distance peuvent avoir une autorité de fonctionnement différente.
La solution technique offre non seulement une commodité pour les opérations d'un utilisateur, mais elle améliore également la sécurité d'un processus de commande à distance, elle réduit le risque de divulgation des information confidentielles de l'utilisateur, elle simplifie la gestion du programme d'application par l'utilisateur, et elle améliore l'expérience d'utilisation de l'utilisateur.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201610614178.4A CN106230937A (zh) | 2016-07-29 | 2016-07-29 | 远程控制方法、远程控制装置和终端 |
| CN201610614178.4 | 2016-07-29 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2018018816A1 true WO2018018816A1 (fr) | 2018-02-01 |
Family
ID=57535308
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2016/107911 Ceased WO2018018816A1 (fr) | 2016-07-29 | 2016-11-30 | Procédé de commande à distance, dispositif de commande à distance et terminal |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN106230937A (fr) |
| WO (1) | WO2018018816A1 (fr) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115391768A (zh) * | 2022-08-08 | 2022-11-25 | 中国银行股份有限公司 | 一种业务数据处理方法、装置、设备及存储介质 |
Families Citing this family (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106776071A (zh) * | 2016-12-16 | 2017-05-31 | 宇龙计算机通信科技(深圳)有限公司 | 一种远程控制应用程序的方法、装置及终端 |
| CN108347402A (zh) * | 2017-01-23 | 2018-07-31 | 中国移动通信有限公司研究院 | 一种应用访问方法、装置、处理终端和云端服务器 |
| CN107302593A (zh) * | 2017-08-03 | 2017-10-27 | 成都弈览科技有限公司 | 基于智能手机的远程设备操控方法及系统 |
| JP7065294B2 (ja) * | 2017-10-10 | 2022-05-12 | パナソニックIpマネジメント株式会社 | 製造システムおよび製造方法 |
| CN107979648A (zh) * | 2017-12-12 | 2018-05-01 | 苏州蜗牛数字科技股份有限公司 | 一种服务器远程控制系统及方法 |
| CN108769175B (zh) * | 2018-05-22 | 2020-07-31 | 京东数字科技控股有限公司 | 远程真机访问控制方法、装置、存储介质及电子设备 |
| CN110149405A (zh) * | 2019-05-24 | 2019-08-20 | 北京指掌易科技有限公司 | 一种云端控制移动端应用的方法 |
| CN111107222B (zh) * | 2019-12-18 | 2021-08-24 | 维沃移动通信有限公司 | 一种界面共享方法及电子设备 |
| CN114625686B (zh) * | 2020-12-10 | 2023-11-14 | 明基智能科技(上海)有限公司 | 资料控制方法及资料控制系统 |
| CN113542862A (zh) * | 2021-07-22 | 2021-10-22 | 广州朗国电子科技股份有限公司 | 一种无线传屏中信息共享的方法 |
| CN113282923B (zh) * | 2021-07-22 | 2021-11-09 | 统信软件技术有限公司 | 一种远程控制方法、计算设备及存储介质 |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20120090023A1 (en) * | 2010-10-07 | 2012-04-12 | Chow Edmond K | Secure area for apps |
| CN105122267A (zh) * | 2013-03-15 | 2015-12-02 | 苹果公司 | 具有多种访问模式的移动计算设备 |
| CN105357214A (zh) * | 2015-11-26 | 2016-02-24 | 东莞酷派软件技术有限公司 | 远程控制方法、远程控制装置、终端和远程控制系统 |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103237047B (zh) * | 2013-03-11 | 2016-09-28 | 广东欧珀移动通信有限公司 | 一种远程受控、控制方法 |
| CN104253845A (zh) * | 2013-06-28 | 2014-12-31 | 腾讯科技(北京)有限公司 | 一种远程控制应用的方法和终端 |
| CN104660626A (zh) * | 2013-11-18 | 2015-05-27 | 中兴通讯股份有限公司 | 智能终端的控制方法及装置 |
-
2016
- 2016-07-29 CN CN201610614178.4A patent/CN106230937A/zh active Pending
- 2016-11-30 WO PCT/CN2016/107911 patent/WO2018018816A1/fr not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20120090023A1 (en) * | 2010-10-07 | 2012-04-12 | Chow Edmond K | Secure area for apps |
| CN105122267A (zh) * | 2013-03-15 | 2015-12-02 | 苹果公司 | 具有多种访问模式的移动计算设备 |
| CN105357214A (zh) * | 2015-11-26 | 2016-02-24 | 东莞酷派软件技术有限公司 | 远程控制方法、远程控制装置、终端和远程控制系统 |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115391768A (zh) * | 2022-08-08 | 2022-11-25 | 中国银行股份有限公司 | 一种业务数据处理方法、装置、设备及存储介质 |
Also Published As
| Publication number | Publication date |
|---|---|
| CN106230937A (zh) | 2016-12-14 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2018018816A1 (fr) | Procédé de commande à distance, dispositif de commande à distance et terminal | |
| WO2017107611A1 (fr) | Procédé, dispositif et système de commande de dispositif ménager intelligent | |
| WO2014017858A1 (fr) | Appareil de terminal utilisateur et procédé de commande associé | |
| WO2016169390A1 (fr) | Procédé de protection d'écran de sécurité d'application, terminal et support de stockage | |
| WO2014175602A1 (fr) | Dispositif électronique et son procédé d'enregistrement d'un appareil de nuage personnel sur un serveur de portail utilisateur | |
| WO2014081076A1 (fr) | Visiocasque et son procédé de commande | |
| WO2016141667A1 (fr) | Procédé et système de commande de connexion à un réseau pour un terminal mobile | |
| WO2016036115A1 (fr) | Dispositif électronique et procédé de gestion de réenregistrement | |
| WO2018076841A1 (fr) | Procédé de partage de données, appareil, support de stockage, et serveur | |
| WO2012096546A2 (fr) | Procédé et appareil de transmission d'entrée d'utilisateur de dispositif collecteur à dispositif source dans système de communication direct wi-fi | |
| WO2021071032A1 (fr) | Procédé et appareil de contrôle d'accès au dispositif pour l'internet des objets | |
| WO2013170653A1 (fr) | Système et procédé de déverrouillage pour verrouillage d'écran | |
| WO2015170797A1 (fr) | Dispositif d'affichage et son procédé de commande | |
| WO2021107177A1 (fr) | Procédé et système de blocage d'attaques de logiciels rançonneurs ou d'hameçonnage | |
| WO2017161832A1 (fr) | Procédé de commande d'ascenseur, dispositif de commande d'ascenseur, et terminal | |
| WO2011129635A2 (fr) | Procédé et appareil pour la fourniture d'un service applicatif dans un système de communication mobile | |
| WO2018090465A1 (fr) | Procédé et système de surveillance vidéo, et dispositif de surveillance | |
| WO2012099330A2 (fr) | Système et procédé de délivrance d'une clé d'authentification pour authentifier un utilisateur dans un environnement cpns | |
| WO2016064128A1 (fr) | Dispositif de commande, procédé de commande correspondant, et système de commande intégré | |
| WO2018076879A1 (fr) | Procédé et appareil de sauvegarde de données, support d'informations et terminal | |
| WO2015030512A1 (fr) | Équipement terminal, procédé de protection pour celui-ci et serveur de gestion du terminal | |
| WO2018098886A1 (fr) | Procédé d'ouverture de portière de véhicule, terminal mobile, terminal monté sur véhicule et système | |
| WO2016168972A1 (fr) | Système et procédé permettant de prendre en charge le développement d'une application d'objet mobile | |
| WO2016167462A1 (fr) | Dispositif et procédé de demande de dispositif externe pour exécuter une tâche | |
| WO2018053904A1 (fr) | Procédé et terminal de traitement d'informations |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16910394 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 16910394 Country of ref document: EP Kind code of ref document: A1 |