[go: up one dir, main page]

WO2018018816A1 - 远程控制方法、远程控制装置和终端 - Google Patents

远程控制方法、远程控制装置和终端 Download PDF

Info

Publication number
WO2018018816A1
WO2018018816A1 PCT/CN2016/107911 CN2016107911W WO2018018816A1 WO 2018018816 A1 WO2018018816 A1 WO 2018018816A1 CN 2016107911 W CN2016107911 W CN 2016107911W WO 2018018816 A1 WO2018018816 A1 WO 2018018816A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
remote control
control instruction
detecting
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2016/107911
Other languages
English (en)
French (fr)
Inventor
黄堃
张冬冬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Publication of WO2018018816A1 publication Critical patent/WO2018018816A1/zh
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/08Protocols specially adapted for terminal emulation, e.g. Telnet

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a remote control method, a remote control device, and a terminal.
  • the screen sharing function can be used to map the interface information of the terminal such as the mobile phone to the remote control terminal, and the remote control terminal can remotely control the sharing terminal through the remote assistance mode, for example, when the user A does not operate the certain
  • a remote control connection can be initiated to the user B, and after the remote control connection is established, the application is operated by the user B.
  • the remote control terminal Since more and more users store the private information on the terminal, after connecting with the remote control terminal, the remote control terminal has the editing authority for any application on the sharing terminal, and there is a risk of leakage of privacy information, although it is possible to pass
  • the user manually sets some applications with private information to be disabled, but if there are many such applications, it is not convenient for the user to manage, which affects the user experience.
  • the present invention is based on at least one of the above technical problems, and proposes a new remote control scheme, which detects whether the remote control terminal belongs to a preset authority terminal when receiving a control command sent by the remote control terminal, and detects the When the remote control terminal belongs to the preset authority terminal, it is determined whether to execute the control command according to the mapping type of the preset authority terminal, and the management of the authority of the remote control terminal is realized, and different remote control terminals can have different operation rights, which is convenient for the user.
  • the security of the remote control process is improved, the risk of leakage of user privacy information is reduced, and the management of the application is simplified on the other hand, and the user experience is improved.
  • the present invention provides a remote control method, including: detecting, when receiving a control command sent by a remote control terminal, whether the remote control terminal belongs to a preset authority terminal; detecting that the remote control terminal belongs to a preset authority terminal When determining the execution of the control instruction according to the mapping type of the preset authority terminal.
  • the mapping type determines whether to execute the control instruction, and realizes the management of the remote control terminal authority.
  • Different remote control terminals can have different operation rights, which facilitates the user operation and improves the security of the remote control process and reduces the security.
  • the risk of leakage of user privacy information simplifies user management of the application and enhances the user experience.
  • the sharing terminal shares the local display interface to the remote control terminal in real time through the screen recording mode, and the remote control terminal receives the user's display screen.
  • the remote control terminal packages the position information of the captured touch command as a control command, and sends the position information to the sharing terminal, and the sharing terminal analyzes the position information and maps to the display screen of the sharing terminal, and controls the application corresponding to the execution position information. Touch operation to execute control commands.
  • the remote control terminal that the user thinks is safer is first set as the preset authority terminal, and when the control command sent by the remote control terminal is received, the remote control of the connection is detected. After the terminal is a preset permission terminal, determining whether the control instruction has the execution permission according to the mapping type of the preset preset authorization terminal, wherein the mapping type includes:
  • the remote control terminal can also be given different control rights.
  • determining whether to execute the control instruction according to the mapping type of the preset authority terminal specifically comprising the following steps: according to the preset authority terminal and the authorized application Corresponding relationship of the program, determining the authorization application; detecting whether the control instruction is for the authorized application; detecting the control instruction according to the correspondence between the authorized application and the authorization control instruction when detecting the control instruction for the authorized application, detecting whether the control instruction belongs to the authorization control instruction
  • the control command is executed.
  • the correspondence between the remote control terminal and the authorized application and the correspondence between the authorized application and the authorization control instruction are preset, and according to the correspondence between the remote control terminal and the authorized application, which applications on the sharing terminal interface are determined.
  • To authorize the application and then detecting whether the control instruction is an operation for the authorized application, after determining that the control instruction is for the operation of authorizing the application, determining whether to execute the control instruction according to the correspondence between the authorized application and the authorization control instruction,
  • the execution permission of the operation instruction is refined in the application having the operation authority, and the operation authority of the remote control terminal is refined, and on the other hand, by setting different remote control terminals, the operation authority for different applications is simplified. The user's management process for the application.
  • the remote control terminal acquires a touch instruction for specifying a picture on the main interface of the “Gallery” application of the sharing terminal, and sends it as a viewing command to the sharing terminal, first detecting the “Gallery” application.
  • the remote control terminal when detecting that the "gallery" application belongs to the permission group of the remote control terminal, the remote control terminal has certain control authority for the "gallery" application, that is, the "gallery” application belongs to Authorizing the application, according to the correspondence between the authorized application and the authorization control instruction, determining whether the viewing instruction is an authorization control instruction, and when determining that the viewing instruction is an authorization control instruction, is capable of viewing the specified picture through the remote control terminal, and determining that the viewing instruction is not authorized When the command is controlled, it is prohibited to view the specified picture through the remote control terminal.
  • the control instructions include: a view instruction, an edit instruction, a delete instruction, a login instruction, a send instruction, and the like.
  • determining whether to execute the control instruction according to the mapping type of the preset authority terminal specifically comprising the following steps: Corresponding relationship with the authorization control instruction, detecting whether the control instruction belongs to the authorization control instruction; and executing the control instruction when detecting that the control instruction belongs to the authorization control instruction.
  • the corresponding relationship between the remote control terminal and the authorization control instruction is preset, that is, different remote control terminals have different execution authority of the control instruction, and when it is detected that the control instruction belongs to the authorization control instruction, that is, when the execution authority is available, The control instruction is executed, and when it is detected that the control instruction is not the authorization control instruction, the control instruction is not executed.
  • different remote control terminals have different control command execution rights.
  • the remote control terminal B only has the view permission
  • the remote control terminal C has the right to view and edit.
  • determining whether to execute the control instruction according to the mapping type of the preset authority terminal further comprising: according to the preset authority terminal and the application Corresponding relationship of the program, determining the authorized application; detecting whether the control instruction is for the authorized application; and executing the control instruction when detecting that the control instruction is for the authorized application.
  • the corresponding relationship between the remote control terminal and the authorized application is preset.
  • the control instruction judges, as long as the authorization application executes the control instruction, thereby dividing the application into an authorized application and an unauthorized application, and the authorized application, the remote control terminal has the right to execute the control instruction, and the unauthorized application
  • the program rejects the remote control terminal access, realizes the different management modes of the sharing terminal to the application, and improves the security of the screen sharing.
  • the authorization application can also be set to be visible to the remote control terminal user, and the unauthorized application can be hidden on the interface shared to the remote control terminal, which further facilitates remote control of the operation of the terminal user.
  • the method further includes: determining, when the remote control terminal does not belong to the preset authorized terminal, the IP information of the remote control terminal; detecting whether the IP information belongs to the pre-stored IP information; detecting the IP When the information belongs to pre-stored IP information, the remote control terminal is added to the list of preset authorized terminals, and the mapping relationship in the mapping type is updated.
  • the remote control terminal when detecting that the remote control terminal does not belong to the preset authorized terminal, determining the IP information of the remote control terminal, detecting whether the IP information of the remote control terminal is pre-set in the sharing terminal, and detecting the sharing terminal
  • the IP information of the remote control terminal is pre-configured, it indicates that the remote control terminal has certain security for the sharing terminal.
  • the remote control terminal can be set as a preset authorized terminal, and the remote control terminal is allowed to perform certain operations.
  • it is detected that the IP information of the remote control terminal is not preset in the sharing terminal it indicates that the remote control terminal is a strange terminal for the sharing terminal, and at this time, the remote control terminal is realized on the one hand by cutting off the connection with the strange terminal.
  • the security control of the sharing terminal also prevents the sharing terminal from being attacked by the strange terminal, thereby further improving the user experience.
  • connection between the sharing terminal and the remote control terminal may be implemented by an IP (Internet Protocol) protocol, or by Socket communication.
  • IP Internet Protocol
  • Socket communication may be implemented by an IP (Internet Protocol) protocol, or by Socket communication.
  • a remote control apparatus comprising: a detecting unit configured to: when receiving a control command sent by the remote control terminal, detecting whether the remote control terminal belongs to a preset authority terminal; determining a unit, setting To detect whether the remote control terminal belongs to the preset authority terminal, determine whether to execute the control instruction according to the mapping type of the preset authority terminal.
  • the mapping type determines whether to execute the control instruction, and realizes the management of the remote control terminal authority.
  • Different remote control terminals can have different operation rights, which facilitates the user operation and improves the security of the remote control process and reduces the security.
  • the risk of leakage of user privacy information simplifies user management of the application and enhances the user experience.
  • the sharing terminal shares the local display interface to the remote control terminal in real time through the screen recording mode, and the remote control terminal receives the user's display screen.
  • the remote control terminal packages the position information of the captured touch command as a control command, and sends the position information to the sharing terminal, and the sharing terminal analyzes the position information and maps to the display screen of the sharing terminal, and controls the application corresponding to the execution position information. Touch operation to execute control commands.
  • the remote control terminal that the user thinks is safer is first set as the preset authority terminal, and when the control command sent by the remote control terminal is received, the remote control of the connection is detected. After the terminal is a preset permission terminal, determining whether the control instruction has the execution permission according to the mapping type of the preset preset authorization terminal, wherein the mapping type includes:
  • the remote control terminal can also be given different control rights.
  • the determining unit is further configured to: determine, according to the correspondence between the preset authority terminal and the authorized application, the authorization application; the detecting unit is further configured to: detect whether the control instruction is for the authorized application; and the detecting unit And being further configured to: when detecting that the control instruction is for the authorized application, detecting whether the control instruction belongs to the authorization control instruction according to the correspondence between the authorized application and the authorization control instruction; the remote control device further includes: an execution unit, configured to detect When the control instruction belongs to the authorization control instruction, the control instruction is executed.
  • the correspondence between the remote control terminal and the authorized application and the correspondence between the authorized application and the authorization control instruction are preset, and according to the correspondence between the remote control terminal and the authorized application, which applications on the sharing terminal interface are determined.
  • To authorize the application and then detecting whether the control instruction is an operation for the authorized application, after determining that the control instruction is for the operation of authorizing the application, determining whether to execute the control instruction according to the correspondence between the authorized application and the authorization control instruction,
  • the execution permission of the operation instruction is refined in the application having the operation authority, and the operation authority of the remote control terminal is refined, and on the other hand, by setting different remote control terminals, the operation authority for different applications is simplified. The user's management process for the application.
  • the remote control terminal acquires a touch instruction for specifying a picture on the main interface of the “Gallery” application of the sharing terminal, and sends it as a viewing command to the sharing terminal, first detecting the “Gallery” application.
  • the remote control terminal when detecting that the "gallery" application belongs to the permission group of the remote control terminal, the remote control terminal has certain control authority for the "gallery" application, that is, the "gallery” application belongs to Authorizing the application, according to the correspondence between the authorized application and the authorization control instruction, determining whether the viewing instruction is an authorization control instruction, and when determining that the viewing instruction is an authorization control instruction, is capable of viewing the specified picture through the remote control terminal, and determining that the viewing instruction is not authorized When the command is controlled, it is prohibited to view the specified picture through the remote control terminal.
  • the control instructions include: a view instruction, an edit instruction, a delete instruction, a login instruction, a send instruction, and the like.
  • the detecting unit is further configured to: detect, according to a correspondence between the preset authority terminal and the authorization control instruction, whether the control instruction belongs to the authorization control instruction; and the execution unit is further configured to: when the control is detected When the instruction belongs to the authorization control instruction, the control instruction is executed.
  • the corresponding relationship between the remote control terminal and the authorization control instruction is preset, that is, different remote control terminals have different execution authority of the control instruction, and when it is detected that the control instruction belongs to the authorization control instruction, that is, when the execution authority is available, The control instruction is executed, and when it is detected that the control instruction is not the authorization control instruction, the control instruction is not executed.
  • different remote control terminals have different control command execution rights.
  • the remote control terminal B only has the view permission
  • the remote control terminal C has the right to view and edit.
  • the determining unit is further configured to: determine, according to the correspondence between the preset authority terminal and the application, the authorization application; and the detecting unit is further configured to: detect whether the control instruction is for the authorized application; The execution unit is further configured to execute the control instruction upon detecting that the control instruction is for the authorized application.
  • the corresponding relationship between the remote control terminal and the authorized application is preset.
  • the control instruction judges, as long as the authorization application executes the control instruction, thereby dividing the application into an authorized application and an unauthorized application, and the authorized application, the remote control terminal has the right to execute the control instruction, and the unauthorized application
  • the program rejects the remote control terminal access, realizes the different management modes of the sharing terminal to the application, and improves the security of the screen sharing.
  • the authorization application can also be set to be visible to the remote control terminal user, and the unauthorized application can be hidden on the interface shared to the remote control terminal, which further facilitates remote control of the operation of the terminal user.
  • the determining unit is further configured to: when detecting that the remote control terminal does not belong to the preset authorized terminal, determine IP information of the remote control terminal; and the detecting unit is further configured to: detect whether the IP information is
  • the remote control device further includes: an updating unit configured to: when detecting that the IP information belongs to the pre-stored IP information, add the remote control terminal to the list of the preset authorized terminals, and update the mapping relationship in the mapping type.
  • the remote control terminal when detecting that the remote control terminal does not belong to the preset authorized terminal, determining the IP information of the remote control terminal, detecting whether the IP information of the remote control terminal is pre-set in the sharing terminal, and detecting the sharing terminal
  • the IP information of the remote control terminal is pre-configured, it indicates that the remote control terminal has certain security for the sharing terminal.
  • the remote control terminal can be set as a preset authorized terminal, and the remote control terminal is allowed to perform certain operations.
  • it is detected that the IP information of the remote control terminal is not preset in the sharing terminal it indicates that the remote control terminal is a strange terminal for the sharing terminal, and at this time, the remote control terminal is realized on the one hand by cutting off the connection with the strange terminal.
  • the security control of the sharing terminal also prevents the sharing terminal from being attacked by the strange terminal, thereby further improving the user experience.
  • connection between the sharing terminal and the remote control terminal may be implemented by an IP (Internet Protocol) protocol, or by Socket communication.
  • IP Internet Protocol
  • Socket communication may be implemented by an IP (Internet Protocol) protocol, or by Socket communication.
  • a terminal comprising the remote control device according to any one of the above aspects, wherein the terminal includes the technical effect of the remote control device according to any one of the above technical solutions, This will not be repeated here.
  • the type determines whether to execute the control instruction, and realizes the management of the authority of the remote control terminal.
  • Different remote control terminals can have different operation rights, which facilitates the operation of the user, and improves the security of the remote control process on the one hand, and reduces the security.
  • the risk of leaking user privacy information simplifies user management of applications and enhances the user experience.
  • FIG. 1 shows a schematic flow chart of a remote control method according to an embodiment of the present invention
  • FIG. 2 shows a schematic block diagram of a remote control device in accordance with an embodiment of the present invention
  • Figure 3 shows a schematic block diagram of a terminal in accordance with an embodiment of the present invention
  • FIG. 4 shows a schematic diagram of a remote control scheme in accordance with an embodiment of the present invention
  • Figure 5 shows a schematic flow diagram of a remote control scheme in accordance with an embodiment of the present invention
  • FIG. 6 shows a schematic structural diagram of another terminal according to an embodiment of the present invention.
  • FIG. 1 shows a schematic flow chart of a remote control method in accordance with an embodiment of the present invention.
  • a remote control method includes: Step 102: When receiving a control instruction sent by a remote control terminal, detecting whether the remote control terminal belongs to a preset authority terminal; Step 104, detecting When the remote control terminal belongs to the preset authority terminal, it is determined whether to execute the control instruction according to the mapping type of the preset authority terminal.
  • the mapping type determines whether to execute the control instruction, and realizes the management of the remote control terminal authority.
  • Different remote control terminals can have different operation rights, which facilitates the user operation and improves the security of the remote control process and reduces the security.
  • the risk of leakage of user privacy information simplifies user management of the application and enhances the user experience.
  • the sharing terminal shares the local display interface to the remote control terminal in real time through the screen recording mode, and the remote control terminal receives the user's display screen.
  • the remote control terminal packages the position information of the captured touch command as a control command, and sends the position information to the sharing terminal, and the sharing terminal analyzes the position information and maps to the display screen of the sharing terminal, and controls the application corresponding to the execution position information. Touch operation to execute control commands.
  • the remote control terminal that the user thinks is safer is first set as the preset authority terminal, and when the control command sent by the remote control terminal is received, the remote control of the connection is detected. After the terminal is a preset permission terminal, determining whether the control instruction has the execution permission according to the mapping type of the preset preset authorization terminal, wherein the mapping type includes:
  • the remote control terminal can also be given different control rights.
  • mapping including but not limited to the following implementations:
  • Embodiment 1 is a diagrammatic representation of Embodiment 1:
  • determining whether to execute the control instruction according to the mapping type of the preset authority terminal specifically comprising the following steps: according to the preset authority terminal and the authorized application Corresponding relationship of the program, determining the authorization application; detecting whether the control instruction is for the authorized application; detecting the control instruction according to the correspondence between the authorized application and the authorization control instruction when detecting the control instruction for the authorized application, detecting whether the control instruction belongs to the authorization control instruction
  • the control command is executed.
  • the correspondence between the remote control terminal and the authorized application and the correspondence between the authorized application and the authorization control instruction are preset, and according to the correspondence between the remote control terminal and the authorized application, which applications on the sharing terminal interface are determined.
  • To authorize the application and then detecting whether the control instruction is an operation for the authorized application, after determining that the control instruction is for the operation of authorizing the application, determining whether to execute the control instruction according to the correspondence between the authorized application and the authorization control instruction,
  • the execution permission of the operation instruction is refined in the application having the operation authority, and the operation authority of the remote control terminal is refined, and on the other hand, by setting different remote control terminals, the operation authority for different applications is simplified. The user's management process for the application.
  • the remote control terminal acquires a touch instruction for specifying a picture on the main interface of the “Gallery” application of the sharing terminal, and sends it as a viewing command to the sharing terminal, first detecting the “Gallery” application.
  • the remote control terminal when detecting that the "gallery" application belongs to the permission group of the remote control terminal, the remote control terminal has certain control authority for the "gallery" application, that is, the "gallery” application belongs to Authorizing the application, according to the correspondence between the authorized application and the authorization control instruction, determining whether the viewing instruction is an authorization control instruction, and when determining that the viewing instruction is an authorization control instruction, is capable of viewing the specified picture through the remote control terminal, and determining that the viewing instruction is not authorized When the command is controlled, it is prohibited to view the specified picture through the remote control terminal.
  • the control instructions include: a view instruction, an edit instruction, a delete instruction, a login instruction, a send instruction, and the like.
  • Embodiment 2 is a diagrammatic representation of Embodiment 1:
  • determining whether to execute the control instruction according to the mapping type of the preset authority terminal specifically comprising the following steps: Corresponding relationship with the authorization control instruction, detecting whether the control instruction belongs to the authorization control instruction; and executing the control instruction when detecting that the control instruction belongs to the authorization control instruction.
  • the corresponding relationship between the remote control terminal and the authorization control instruction is preset, that is, different remote control terminals have different execution authority of the control instruction, and when it is detected that the control instruction belongs to the authorization control instruction, that is, when the execution authority is available, The control instruction is executed, and when it is detected that the control instruction is not the authorization control instruction, the control instruction is not executed.
  • different remote control terminals have different control command execution rights.
  • the remote control terminal B only has the view permission
  • the remote control terminal C has the right to view and edit.
  • Embodiment 3 is a diagrammatic representation of Embodiment 3
  • determining whether to execute the control instruction according to the mapping type of the preset authority terminal further comprising: according to the preset authority terminal and the application Corresponding relationship of the program, determining the authorized application; detecting whether the control instruction is for the authorized application; and executing the control instruction when detecting that the control instruction is for the authorized application.
  • the corresponding relationship between the remote control terminal and the authorized application is preset.
  • the control instruction judges, as long as the authorization application executes the control instruction, thereby dividing the application into an authorized application and an unauthorized application, and the authorized application, the remote control terminal has the right to execute the control instruction, and the unauthorized application
  • the program rejects the remote control terminal access, realizes the different management modes of the sharing terminal to the application, and improves the security of the screen sharing.
  • the authorization application can also be set to be visible to the remote control terminal user, and the unauthorized application can be hidden on the interface shared to the remote control terminal, which further facilitates remote control of the operation of the terminal user.
  • the method further includes: determining, when the remote control terminal does not belong to the preset authorized terminal, the IP information of the remote control terminal; detecting whether the IP information belongs to the pre-stored IP information; detecting the IP When the information belongs to pre-stored IP information, the remote control terminal is added to the list of preset authorized terminals, and the mapping relationship in the mapping type is updated.
  • the remote control terminal when detecting that the remote control terminal does not belong to the preset authorized terminal, determining the IP information of the remote control terminal, detecting whether the IP information of the remote control terminal is pre-set in the sharing terminal, and detecting the sharing terminal
  • the IP information of the remote control terminal is pre-configured, it indicates that the remote control terminal has certain security for the sharing terminal.
  • the remote control terminal can be set as a preset authorized terminal, and the remote control terminal is allowed to perform certain operations.
  • it is detected that the IP information of the remote control terminal is not preset in the sharing terminal it indicates that the remote control terminal is a strange terminal for the sharing terminal, and at this time, the remote control terminal is realized on the one hand by cutting off the connection with the strange terminal.
  • the security control of the sharing terminal also prevents the sharing terminal from being attacked by the strange terminal, thereby further improving the user experience.
  • connection between the sharing terminal and the remote control terminal may be implemented by an IP (Internet Protocol) protocol, or by Socket communication.
  • IP Internet Protocol
  • Socket communication may be implemented by an IP (Internet Protocol) protocol, or by Socket communication.
  • FIG. 2 shows a schematic block diagram of a remote control device in accordance with an embodiment of the present invention.
  • the remote control apparatus 200 includes: a detecting unit 202 configured to detect, when receiving a control command sent by the remote control terminal, whether the remote control terminal belongs to a preset authority terminal;
  • the unit 204 is configured to determine whether to execute the control instruction according to the mapping type of the preset authority terminal when detecting that the remote control terminal belongs to the preset authority terminal.
  • the mapping type determines whether to execute the control instruction, and realizes the management of the remote control terminal authority.
  • Different remote control terminals can have different operation rights, which facilitates the user operation and improves the security of the remote control process and reduces the security.
  • the risk of leakage of user privacy information simplifies user management of the application and enhances the user experience.
  • the sharing terminal shares the local display interface to the remote control terminal in real time through the screen recording mode, and the remote control terminal receives the user's display screen.
  • the remote control terminal packages the position information of the captured touch command as a control command, and sends the position information to the sharing terminal, and the sharing terminal analyzes the position information and maps to the display screen of the sharing terminal, and controls the application corresponding to the execution position information. Touch operation to execute control commands.
  • the remote control terminal that the user thinks is safer is first set as the preset authority terminal, and when the control command sent by the remote control terminal is received, the remote control of the connection is detected. After the terminal is a preset permission terminal, determining whether the control instruction has the execution permission according to the mapping type of the preset preset authorization terminal, wherein the mapping type includes:
  • the remote control terminal can also be given different control rights.
  • the determining unit 204 is further configured to: determine an authorized application according to a correspondence between the preset authority terminal and the authorized application; and the detecting unit 202 is further configured to: detect whether the control instruction is directed to the authorized application; The detecting unit 202 is further configured to: when detecting that the control instruction is for the authorized application, according to the correspondence between the authorized application and the authorization control instruction, detecting whether the control instruction belongs to the authorization control instruction; the remote control device 200 further includes: an execution unit 206, It is set to execute the control instruction when it is detected that the control instruction belongs to the authorization control instruction.
  • the correspondence between the remote control terminal and the authorized application and the correspondence between the authorized application and the authorization control instruction are preset, and according to the correspondence between the remote control terminal and the authorized application, which applications on the sharing terminal interface are determined.
  • To authorize the application and then detecting whether the control instruction is an operation for the authorized application, after determining that the control instruction is for the operation of authorizing the application, determining whether to execute the control instruction according to the correspondence between the authorized application and the authorization control instruction,
  • the execution permission of the operation instruction is refined in the application having the operation authority, and the operation authority of the remote control terminal is refined, and on the other hand, by setting different remote control terminals, the operation authority for different applications is simplified. The user's management process for the application.
  • the remote control terminal acquires a touch instruction for specifying a picture on the main interface of the “Gallery” application of the sharing terminal, and sends it as a viewing command to the sharing terminal, first detecting the “Gallery” application.
  • the remote control terminal when detecting that the "gallery" application belongs to the permission group of the remote control terminal, the remote control terminal has certain control authority for the "gallery" application, that is, the "gallery” application belongs to Authorizing the application, according to the correspondence between the authorized application and the authorization control instruction, determining whether the viewing instruction is an authorization control instruction, and when determining that the viewing instruction is an authorization control instruction, is capable of viewing the specified picture through the remote control terminal, and determining that the viewing instruction is not authorized When the command is controlled, it is prohibited to view the specified picture through the remote control terminal.
  • the control instructions include: a view instruction, an edit instruction, a delete instruction, a login instruction, a send instruction, and the like.
  • the detecting unit 202 is further configured to: detect, according to the correspondence between the preset authority terminal and the authorization control instruction, whether the control instruction belongs to the authorization control instruction; and the executing unit 206 is further configured to: When the control instruction belongs to the authorization control instruction, the control instruction is executed.
  • the corresponding relationship between the remote control terminal and the authorization control instruction is preset, that is, different remote control terminals have different execution authority of the control instruction, and when it is detected that the control instruction belongs to the authorization control instruction, that is, when the execution authority is available, The control instruction is executed, and when it is detected that the control instruction is not the authorization control instruction, the control instruction is not executed.
  • different remote control terminals have different control command execution rights.
  • the remote control terminal B only has the view permission
  • the remote control terminal C has the right to view and edit.
  • the determining unit 204 is further configured to: determine the authorized application according to the correspondence between the preset authority terminal and the application program; and the detecting unit 202 is further configured to: detect whether the control instruction is for the authorized application.
  • the program; the execution unit 206 is further configured to execute the control instruction upon detecting that the control instruction is for the authorized application.
  • the corresponding relationship between the remote control terminal and the authorized application is preset.
  • the control instruction judges, as long as the authorization application executes the control instruction, thereby dividing the application into an authorized application and an unauthorized application, and the authorized application, the remote control terminal has the right to execute the control instruction, and the unauthorized application
  • the program rejects the remote control terminal access, realizes the different management modes of the sharing terminal to the application, and improves the security of the screen sharing.
  • the authorization application can also be set to be visible to the remote control terminal user, and the unauthorized application can be hidden on the interface shared to the remote control terminal, which further facilitates remote control of the operation of the terminal user.
  • the determining unit 204 is further configured to: determine that the remote control terminal does not belong to the preset authorized terminal, determine the IP information of the remote control terminal; and the detecting unit 202 is further configured to: detect the IP address. Whether the information belongs to the pre-stored IP information; the remote control apparatus 200 further includes: an updating unit 208, configured to: when detecting that the IP information belongs to the pre-stored IP information, add the remote control terminal to the list of the preset authorized terminals, and update the mapping type Mapping relations.
  • the remote control terminal when detecting that the remote control terminal does not belong to the preset authorized terminal, determining the IP information of the remote control terminal, detecting whether the IP information of the remote control terminal is pre-set in the sharing terminal, and detecting the sharing terminal
  • the IP information of the remote control terminal is pre-configured, it indicates that the remote control terminal has certain security for the sharing terminal.
  • the remote control terminal can be set as a preset authorized terminal, and the remote control terminal is allowed to perform certain operations.
  • it is detected that the IP information of the remote control terminal is not preset in the sharing terminal it indicates that the remote control terminal is a strange terminal for the sharing terminal, and at this time, the remote control terminal is realized on the one hand by cutting off the connection with the strange terminal.
  • the security control of the sharing terminal also prevents the sharing terminal from being attacked by the strange terminal, thereby further improving the user experience.
  • connection between the sharing terminal and the remote control terminal may be implemented by an IP (Internet Protocol) protocol, or by Socket communication.
  • IP Internet Protocol
  • Socket communication may be implemented by an IP (Internet Protocol) protocol, or by Socket communication.
  • FIG. 3 shows a schematic block diagram of a terminal in accordance with an embodiment of the present invention.
  • the terminal 300 includes the remote control device 200 according to any one of the above aspects. Therefore, the terminal includes the remote control device 200 according to any one of the above technical solutions. Technical effects will not be described here.
  • FIG. 4 shows a schematic diagram of a remote control scheme in accordance with an embodiment of the present invention.
  • the screen sharer A serves as a sharing terminal, and before the screen is shared, the corresponding relationship between the application and the shared user, that is, the remote control terminal, for example, for the permission group 1, including: APP combination 1 and Sharer combination 1, for permission group 2, including: APP combination 2 and shared person combination 2, for rights group 3, including: APP combination 3 and shared person combination 3, by presetting a plurality of corresponding relationships, different permissions
  • the group includes different users and different applications, and gives different operation rights. While facilitating user operations, it enhances the security of the remote control process and reduces the risk of leakage of user privacy information. The aspect simplifies the management of the application by the user and improves the user experience.
  • Figure 5 shows a schematic flow diagram of a remote control scheme in accordance with an embodiment of the present invention.
  • a remote control scheme includes:
  • Step 502 after the start of the screen sharing, detecting whether the remote control terminal belongs to the preset authority terminal, when the determination result is "Yes”, step 510 is performed, and if the determination result is "No", step 504 is performed;
  • Step 504 Determine IP information of the remote control terminal.
  • Step 506 Determine whether the IP information belongs to the pre-stored IP information. When the determination result is “Yes”, step 508 is performed, and when the determination result is “No”, the process ends.
  • Step 508 Add the remote control terminal to the list of preset authorized terminals, and update the mapping relationship in the mapping type.
  • Step 510 Determine an application having an operation right according to a correspondence between the preset authority terminal and the application.
  • the application program having the operation authority is determined according to the correspondence between the preset authority terminal and the application program, and detecting that the remote control terminal does not belong to the preset authorization terminal
  • the security control terminal can be set as a preset authorized terminal, and the remote control terminal is allowed to perform certain operations, and when it is detected that the IP information of the remote control terminal is not preset in the sharing terminal, it indicates The remote control terminal is a strange terminal for the sharing terminal. At this time, by cutting off the connection with the strange terminal, on the one hand, the remote control terminal controls the security of the sharing terminal, and on the other hand, the sharing terminal is prevented from being unfamiliar to the terminal. Attacks further enhance the user experience
  • FIG. 6 shows a schematic structural diagram of another terminal according to an embodiment of the present invention.
  • FIG. 6 is a schematic structural diagram of another terminal according to an embodiment of the present invention.
  • the terminal 300 includes a processor 301, a memory 302, and a transceiver 303.
  • the transceiver 303 is configured to transmit and receive data with and from an external device.
  • the number of processors 301 in the terminal 300 may be one or more.
  • the processor 301, the memory 302, and the transceiver 303 may be connected by a bus system or other means.
  • the terminal 300 can be used to perform the methods shown in FIGS. 1 and 5.
  • the program code is stored in the memory 302, and the processor 301 can call the program code stored in the memory 302 to perform related functions through a bus system.
  • the various units described in FIG. 2 eg, the detection unit 202, the determination unit 204, the execution unit 206, the update unit 208, etc.
  • the processor 301 executes program codes stored in the memory 302 to implement the functions of the respective units to implement a remote control method.
  • the processor 301 when receiving the control instruction sent by the remote control terminal, detecting whether the remote control terminal belongs to the preset authority terminal; detecting that the remote control terminal belongs to the preset authority terminal And determining, according to the mapping type of the preset authority terminal, whether to execute the control instruction.
  • the processor 301 determining, according to the correspondence between the preset authority terminal and the authorized application, the authorized application; detecting whether the control instruction is for the authorized application; And when the control instruction is for the authorized application, detecting, according to the correspondence between the authorized application and the authorization control instruction, whether the control instruction belongs to an authorization control instruction; and detecting that the control instruction belongs to the authorization control When the instruction is executed, the control instruction is executed.
  • the processor 301 detecting, according to the correspondence between the preset authority terminal and the authorization control instruction, whether the control instruction belongs to the authorization control instruction; detecting that the control instruction belongs to the The control command is executed when the control command is authorized.
  • the processor 301 determining, according to the correspondence between the preset authority terminal and the application, the authorization application; detecting whether the control instruction is for the authorized application; The control instruction is executed when the control instruction is directed to the authorized application.
  • the processor 301 when detecting that the remote control terminal does not belong to the preset authorized terminal, determine IP information of the remote control terminal; and detect whether the IP information belongs to a pre-stored IP address.
  • Information when detecting that the IP information belongs to the pre-stored IP information, adding the remote control terminal to the list of the preset authorized terminals, and updating the mapping relationship in the mapping type.
  • the present invention proposes a new solution by receiving When the remote control terminal sends the control command, it detects whether the remote control terminal belongs to the preset authority terminal. When detecting that the remote control terminal belongs to the preset authority terminal, determining whether to execute the control instruction according to the mapping type of the preset authority terminal, For the management of remote control terminal rights, different remote control terminals can have different operation rights, which facilitates the user's operation while improving the security of the remote control process and reducing the risk of leakage of user privacy information. The aspect simplifies the management of the application by the user and improves the user experience.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Computing Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Selective Calling Equipment (AREA)
  • Storage Device Security (AREA)

Abstract

本发明提供了一种远程控制方法、远程控制装置和终端,其中,远程控制方法包括:在接收到远程控制终端发送的控制指令时,检测远程控制终端是否属于预设权限终端;在检测到远程控制终端属于预设权限终端时,根据预设权限终端的映射类型,确定是否执行控制指令。通过本发明技术方案,实现了对远程控制终端权限的管理,不同的远程控制终端能够具备不同的操作权限,在方便了用户操作的同时,一方面提升了远程控制过程的安全性,降低了用户隐私信息泄露的风险,另一方面简化了用户对应用程序的管理,提升了用户的使用体验。

Description

远程控制方法、远程控制装置和终端
本申请要求于2016年7月29日提交中国专利局,申请号为201610614178.4、发明名称为“远程控制方法、远程控制装置和终端”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及通信技术领域,具体而言,涉及一种远程控制方法、一种远程控制装置和一种终端。
背景技术
随着移动终端技术的发展,使用屏幕分享功能可以将手机等终端的界面信息映射至远程控制终端,通过远程协助的方式实现远程控制终端对分享终端的远程控制,比如当用户A不会操作某应用程序时,可以向用户B发起远程控制连接,在建立远程控制连接后,由用户B操作该应用程序。
由于越来越多的用户将隐私信息存储在终端上,在与远程控制终端连接后,远程控制终端对分享终端上的任一应用程序均存在编辑权限,存在隐私信息泄露的风险,虽然可以通过用户手动设置将一些具有隐私信息的应用程序设置为禁止访问,但如果此类应用程序较多时,也不方便用户的管理,影响了用户的使用体验。
因此,如何设计一种新的远程控制方案,在提升远程控制的安全性的同时方便用户的管理成为亟待解决的技术问题。
发明内容
本发明正是基于上述技术问题至少之一,提出了一种新的远程控制方案,通过在接收到远程控制终端发送的控制指令时,检测远程控制终端是否属于预设权限终端,在检测到该远程控制终端属于预设权限终端时,根据预设权限终端的映射类型确定是否执行控制指令,实现了对远程控制终端权限的管理,不同的远程控制终端能够具备不同的操作权限,在方便了用户操作的同时,一方面提升了远程控制过程的安全性,降低了用户隐私信息泄露的风险,另一方面简化了用户对应用程序的管理,提升了用户的使用体验。
有鉴于此,本发明提出了一种远程控制方法,包括:在接收到远程控制终端发送的控制指令时,检测远程控制终端是否属于预设权限终端;在检测到远程控制终端属于预设权限终端时,根据预设权限终端的映射类型,确定是否执行控制指令。
在该技术方案中,通过在接收到远程控制终端发送的控制指令时,检测远程控制终端是否属于预设权限终端,在检测到该远程控制终端属于预设权限终端时,根据预设权限终端的映射类型确定是否执行控制指令,实现了对远程控制终端权限的管理,不同的远程控制终端能够具备不同的操作权限,在方便了用户操作的同时,一方面提升了远程控制过程的安全性,降低了用户隐私信息泄露的风险,另一方面简化了用户对应用程序的管理,提升了用户的使用体验。
在现有技术下,在分享终端与远程控制终端安装了同一款远程控制应用程序后,分享终端通过录屏的方式将本地显示界面实时分享给远程控制终端,远程控制终端接收用户对显示屏的触控指令,远程控制终端将捕捉到的触控指令的位置信息作为控制指令打包发送至分享终端,分享终端解析该位置信息并映射到分享终端的显示屏上,控制执行位置信息对应的应用程序的触控操作,以执行控制指令。
具体地,为了提高屏幕分享与远程控制的安全性,首先将用户认为较安全的远程控制终端设置为预设权限终端,在接收到远程控制终端发送的控制指令时,在检测到连接的远程控制终端为预设权限终端后,根据预设的预设授权终端的映射类型,确定控制指令是否具备执行权限,其中,映射类型包括:
(1)预设授权终端与授权应用程序的对应关系、授权应用程序与授权控制指令的对应关系;
(2)预设授权终端与授权控制指令的对应关系;
(3)预设授权终端与授权应用程序的对应关系。
根据不同的映射类型,在显示了对应用程序批量管理的同时,也能够给远程控制终端赋予不同的控制权限。
在上述技术方案中,优选地,在检测到远程控制终端属于预设权限终端时,根据预设权限终端的映射类型,确定是否执行控制指令,具体包括以下步骤:根据预设权限终端与授权应用程序的对应关系,确定授权应用程序;检测控制指令是否针对授权应用程序;在检测到控制指令针对授权应用程序时,根据授权应用程序与授权控制指令的对应关系,检测控制指令是否属于授权控制指令;在检测到控制指令属于授权控制指令时,执行控制指令。
在该技术方案中,预设远程控制终端与授权应用程序的对应关系以及授权应用程序与授权控制指令的对应关系,根据远程控制终端与授权应用程序的对应关系,确定分享终端界面上哪些应用程序为授权应用程序,然后检测控制指令是否是针对授权应用程序的操作,在确定控制指令是针对授权应用程序的操作后,根据授权应用程序与授权控制指令的对应关系,确定是否执行该控制指令,一方面,在具有操作权限的应用程序中细化操作指令的执行权限,细化了远程控制终端的操作权限,另一方面,通过设置不同的远程控制终端具有对不同应用程序的操作权限,简化了用户对应用程序的管理过程。
具体地,以查看“图库”中的图片为例,远程控制终端获取对分享终端“图库”应用程序主界面上指定图片的触控指令,作为查看指令发送至分享终端,首先检测“图库”应用程序是否属于远程控制终端的权限组,在检测到“图库”应用程序属于远程控制终端的权限组时,说明远程控制终端具有对“图库”应用程序一定的控制权限,即“图库”应用程序属于授权应用程序,根据授权应用程序与授权控制指令的对应关系,确定查看指令是否为授权控制指令,在确定查看指令为授权控制指令时,能够通过远程控制终端查看指定图片,在确定查看指令不是授权控制指令时,则禁止通过远程控制终端查看指定图片。
其中,控制指令包括:查看指令、编辑指令、删除指令、登陆指令、发送指令等。
对于不属于授权应用程序的应用程序,可以根据实际情况设置为可以自由访问或禁止访问。
在上述任一项技术方案中,优选地,在检测到远程控制终端属于预设权限终端时,根据预设权限终端的映射类型,确定是否执行控制指令,具体包括以下步骤:根据预设权限终端与授权控制指令的对应关系,检测控制指令是否属于授权控制指令;在检测到控制指令属于授权控制指令时,执行控制指令。
在该技术方案中,预设远程控制终端与授权控制指令的对应关系,即不同的远程控制终端具备不同的控制指令执行权限,在检测到控制指令属于授权控制指令,即具备执行权限时,则执行控制指令,而在检测到控制指令不属于授权控制指令时,则不执行控制指令,通过设置控制指令的执行权限,不需要对应用程序进行管理,进一步简化了对应用程序的管理,满足不同用户对操作权限设置的需求,同时提升了屏幕分享的安全性。
具体地,不同的远程控制终端具备不同的控制指令执行权限,比如远程控制终端B只具备查看权限,而远程控制终端C具备查看、编辑的权限等。
在上述任一项技术方案中,优选地,在检测到远程控制终端属于预设权限终端时,根据预设权限终端的映射类型,确定是否执行控制指令,还包括:根据预设权限终端与应用程序的对应关系,确定授权应用程序;检测控制指令是否针对授权应用程序;在检测到控制指令针对授权应用程序时,执行控制指令。
在该技术方案中,预设远程控制终端与授权应用程序的对应关系,在接收到远程控制终端发送的控制指令时,只需要判断待触控的应用程序是否为授权应用程序,不需要对具体的控制指令进行判断,只要是授权应用程序即执行控制指令,从而将应用程序分为授权应用程序与非授权应用程序,对授权应用程序,远程控制终端具有执行控制指令的权利,对非授权应用程序则拒绝远程控制终端访问,实现了分享终端对应用程序不同的管理方式,同时提升了屏幕分享的安全性。
进一步地,还可以将授权应用程序设置为对远程控制终端用户可见,而在分享至远程控制终端的界面上隐藏非授权应用程序,进一步方便了远程控制终端用户的操作。
在上述任一项技术方案中,优选地,还包括:在检测到远程控制终端不属于预设授权终端时,确定远程控制终端的IP信息;检测IP信息是否属于预存IP信息;在检测到IP信息属于预存IP信息时,将远程控制终端添加至预设授权终端的列表,并更新映射类型中的映射关系。
在该技术方案中,通过在检测到远程控制终端不属于预设授权终端时,确定远程控制终端的IP信息,检测分享终端中是否预设有远程控制终端的IP信息,在检测到分享终端中预设有远程控制终端的IP信息时,表明远程控制终端对分享终端来说具有一定的安全性,此时可以将远程控制终端设置为预设授权终端,允许该远程控制终端执行一定的操作,而在检测到分享终端中未预设远程控制终端的IP信息时,表明远程控制终端对于分享终端来说是陌生终端,此时通过切断与陌生终端之间的连接,一方面实现了远程控制终端对分享终端的安全控制,另一方面也防止了分享终端被陌生终端的攻击,进一步提升了用户的使用体验。
具体地,分享终端与远程控制终端之间的连接可以通过IP(Internet Protocol,网络之间互联的协议)协议实现,也可以通过Socket通信实现。
根据本发明第二方面,还提出了一种远程控制装置,包括:检测单元,设置为在接收到远程控制终端发送的控制指令时,检测远程控制终端是否属于预设权限终端;确定单元,设置为在检测到远程控制终端属于预设权限终端时,根据预设权限终端的映射类型,确定是否执行控制指令。
在该技术方案中,通过在接收到远程控制终端发送的控制指令时,检测远程控制终端是否属于预设权限终端,在检测到该远程控制终端属于预设权限终端时,根据预设权限终端的映射类型确定是否执行控制指令,实现了对远程控制终端权限的管理,不同的远程控制终端能够具备不同的操作权限,在方便了用户操作的同时,一方面提升了远程控制过程的安全性,降低了用户隐私信息泄露的风险,另一方面简化了用户对应用程序的管理,提升了用户的使用体验。
在现有技术下,在分享终端与远程控制终端安装了同一款远程控制应用程序后,分享终端通过录屏的方式将本地显示界面实时分享给远程控制终端,远程控制终端接收用户对显示屏的触控指令,远程控制终端将捕捉到的触控指令的位置信息作为控制指令打包发送至分享终端,分享终端解析该位置信息并映射到分享终端的显示屏上,控制执行位置信息对应的应用程序的触控操作,以执行控制指令。
具体地,为了提高屏幕分享与远程控制的安全性,首先将用户认为较安全的远程控制终端设置为预设权限终端,在接收到远程控制终端发送的控制指令时,在检测到连接的远程控制终端为预设权限终端后,根据预设的预设授权终端的映射类型,确定控制指令是否具备执行权限,其中,映射类型包括:
(1)预设授权终端与授权应用程序的对应关系、授权应用程序与授权控制指令的对应关系;
(2)预设授权终端与授权控制指令的对应关系;
(3)预设授权终端与授权应用程序的对应关系。
根据不同的映射类型,在显示了对应用程序批量管理的同时,也能够给远程控制终端赋予不同的控制权限。
在上述技术方案中,优选地,确定单元还设置为:根据预设权限终端与授权应用程序的对应关系,确定授权应用程序;检测单元还设置为:检测控制指令是否针对授权应用程序;检测单元还设置为:在检测到控制指令针对授权应用程序时,根据授权应用程序与授权控制指令的对应关系,检测控制指令是否属于授权控制指令;远程控制装置还包括:执行单元,设置为在检测到控制指令属于授权控制指令时,执行控制指令。
在该技术方案中,预设远程控制终端与授权应用程序的对应关系以及授权应用程序与授权控制指令的对应关系,根据远程控制终端与授权应用程序的对应关系,确定分享终端界面上哪些应用程序为授权应用程序,然后检测控制指令是否是针对授权应用程序的操作,在确定控制指令是针对授权应用程序的操作后,根据授权应用程序与授权控制指令的对应关系,确定是否执行该控制指令,一方面,在具有操作权限的应用程序中细化操作指令的执行权限,细化了远程控制终端的操作权限,另一方面,通过设置不同的远程控制终端具有对不同应用程序的操作权限,简化了用户对应用程序的管理过程。
具体地,以查看“图库”中的图片为例,远程控制终端获取对分享终端“图库”应用程序主界面上指定图片的触控指令,作为查看指令发送至分享终端,首先检测“图库”应用程序是否属于远程控制终端的权限组,在检测到“图库”应用程序属于远程控制终端的权限组时,说明远程控制终端具有对“图库”应用程序一定的控制权限,即“图库”应用程序属于授权应用程序,根据授权应用程序与授权控制指令的对应关系,确定查看指令是否为授权控制指令,在确定查看指令为授权控制指令时,能够通过远程控制终端查看指定图片,在确定查看指令不是授权控制指令时,则禁止通过远程控制终端查看指定图片。
其中,控制指令包括:查看指令、编辑指令、删除指令、登陆指令、发送指令等。
对于不属于授权应用程序的应用程序,可以根据实际情况设置为可以自由访问或禁止访问。
在上述任一项技术方案中,优选地,检测单元还设置为:根据预设权限终端与授权控制指令的对应关系,检测控制指令是否属于授权控制指令;执行单元还设置为:在检测到控制指令属于授权控制指令时,执行控制指令。
在该技术方案中,预设远程控制终端与授权控制指令的对应关系,即不同的远程控制终端具备不同的控制指令执行权限,在检测到控制指令属于授权控制指令,即具备执行权限时,则执行控制指令,而在检测到控制指令不属于授权控制指令时,则不执行控制指令,通过设置控制指令的执行权限,不需要对应用程序进行管理,进一步简化了对应用程序的管理,满足不同用户对操作权限设置的需求,同时提升了屏幕分享的安全性。
具体地,不同的远程控制终端具备不同的控制指令执行权限,比如远程控制终端B只具备查看权限,而远程控制终端C具备查看、编辑的权限等。
在上述任一项技术方案中,优选地,确定单元还设置为:根据预设权限终端与应用程序的对应关系,确定授权应用程序;检测单元还设置为:检测控制指令是否针对授权应用程序;执行单元还设置为:在检测到控制指令针对授权应用程序时,执行控制指令。
在该技术方案中,预设远程控制终端与授权应用程序的对应关系,在接收到远程控制终端发送的控制指令时,只需要判断待触控的应用程序是否为授权应用程序,不需要对具体的控制指令进行判断,只要是授权应用程序即执行控制指令,从而将应用程序分为授权应用程序与非授权应用程序,对授权应用程序,远程控制终端具有执行控制指令的权利,对非授权应用程序则拒绝远程控制终端访问,实现了分享终端对应用程序不同的管理方式,同时提升了屏幕分享的安全性。
进一步地,还可以将授权应用程序设置为对远程控制终端用户可见,而在分享至远程控制终端的界面上隐藏非授权应用程序,进一步方便了远程控制终端用户的操作。
在上述任一项技术方案中,优选地,确定单元还设置为:在检测到远程控制终端不属于预设授权终端时,确定远程控制终端的IP信息;检测单元还设置为:检测IP信息是否属于预存IP信息;远程控制装置还包括:更新单元,设置为在检测到IP信息属于预存IP信息时,将远程控制终端添加至预设授权终端的列表,并更新映射类型中的映射关系。
在该技术方案中,通过在检测到远程控制终端不属于预设授权终端时,确定远程控制终端的IP信息,检测分享终端中是否预设有远程控制终端的IP信息,在检测到分享终端中预设有远程控制终端的IP信息时,表明远程控制终端对分享终端来说具有一定的安全性,此时可以将远程控制终端设置为预设授权终端,允许该远程控制终端执行一定的操作,而在检测到分享终端中未预设远程控制终端的IP信息时,表明远程控制终端对于分享终端来说是陌生终端,此时通过切断与陌生终端之间的连接,一方面实现了远程控制终端对分享终端的安全控制,另一方面也防止了分享终端被陌生终端的攻击,进一步提升了用户的使用体验。
具体地,分享终端与远程控制终端之间的连接可以通过IP(Internet Protocol,网络之间互联的协议)协议实现,也可以通过Socket通信实现。
根据本发明第三方面,还提出了一种终端,包括上述任一项技术方案所述的远程控制装置,因此,该终端包括上述任一项技术方案所述的远程控制装置的技术效果,在此不再赘述。
通过以上技术方案,通过在接收到远程控制终端发送的控制指令时,检测远程控制终端是否属于预设权限终端,在检测到该远程控制终端属于预设权限终端时,根据预设权限终端的映射类型确定是否执行控制指令,实现了对远程控制终端权限的管理,不同的远程控制终端能够具备不同的操作权限,在方便了用户操作的同时,一方面提升了远程控制过程的安全性,降低了用户隐私信息泄露的风险,另一方面简化了用户对应用程序的管理,提升了用户的使用体验。
附图说明
图1示出了根据本发明的实施例的远程控制方法的示意流程图;
图2示出了根据本发明的实施例的远程控制装置的示意框图;
图3示出了根据本发明的实施例的终端的示意框图;
图4示出了根据本发明的实施例的远程控制方案的示意图;
图5示出了根据本发明的实施例的远程控制方案的示意流程图;
图6示出了根据本发明的实施例的另一终端的结构示意图。
具体实施方式
为了能够更清楚地理解本发明的上述目的、特征和优点,下面结合附图和具体实施方式对本发明进行进一步的详细描述。需要说明的是,在不冲突的情况下,本申请的实施例及实施例中的特征可以相互组合。
在下面的描述中阐述了很多具体细节以便于充分理解本发明,但是,本发明还可以采用第三方不同于在此描述的第三方方式来实施,因此,本发明的保护范围并不受下面公开的具体实施例的限制。
图1示出了根据本发明的实施例的远程控制方法的示意流程图。
如图1所示,根据本发明的实施例的远程控制方法,包括:步骤102,在接收到远程控制终端发送的控制指令时,检测远程控制终端是否属于预设权限终端;步骤104,在检测到远程控制终端属于预设权限终端时,根据预设权限终端的映射类型,确定是否执行控制指令。
在该技术方案中,通过在接收到远程控制终端发送的控制指令时,检测远程控制终端是否属于预设权限终端,在检测到该远程控制终端属于预设权限终端时,根据预设权限终端的映射类型确定是否执行控制指令,实现了对远程控制终端权限的管理,不同的远程控制终端能够具备不同的操作权限,在方便了用户操作的同时,一方面提升了远程控制过程的安全性,降低了用户隐私信息泄露的风险,另一方面简化了用户对应用程序的管理,提升了用户的使用体验。
在现有技术下,在分享终端与远程控制终端安装了同一款远程控制应用程序后,分享终端通过录屏的方式将本地显示界面实时分享给远程控制终端,远程控制终端接收用户对显示屏的触控指令,远程控制终端将捕捉到的触控指令的位置信息作为控制指令打包发送至分享终端,分享终端解析该位置信息并映射到分享终端的显示屏上,控制执行位置信息对应的应用程序的触控操作,以执行控制指令。
具体地,为了提高屏幕分享与远程控制的安全性,首先将用户认为较安全的远程控制终端设置为预设权限终端,在接收到远程控制终端发送的控制指令时,在检测到连接的远程控制终端为预设权限终端后,根据预设的预设授权终端的映射类型,确定控制指令是否具备执行权限,其中,映射类型包括:
(1)预设授权终端与授权应用程序的对应关系、授权应用程序与授权控制指令的对应关系;
(2)预设授权终端与授权控制指令的对应关系;
(3)预设授权终端与授权应用程序的对应关系。
根据不同的映射类型,在显示了对应用程序批量管理的同时,也能够给远程控制终端赋予不同的控制权限。
根据映射类型的不同,包括但不限于以下实施方式:
实施例一:
在上述技术方案中,优选地,在检测到远程控制终端属于预设权限终端时,根据预设权限终端的映射类型,确定是否执行控制指令,具体包括以下步骤:根据预设权限终端与授权应用程序的对应关系,确定授权应用程序;检测控制指令是否针对授权应用程序;在检测到控制指令针对授权应用程序时,根据授权应用程序与授权控制指令的对应关系,检测控制指令是否属于授权控制指令;在检测到控制指令属于授权控制指令时,执行控制指令。
在该技术方案中,预设远程控制终端与授权应用程序的对应关系以及授权应用程序与授权控制指令的对应关系,根据远程控制终端与授权应用程序的对应关系,确定分享终端界面上哪些应用程序为授权应用程序,然后检测控制指令是否是针对授权应用程序的操作,在确定控制指令是针对授权应用程序的操作后,根据授权应用程序与授权控制指令的对应关系,确定是否执行该控制指令,一方面,在具有操作权限的应用程序中细化操作指令的执行权限,细化了远程控制终端的操作权限,另一方面,通过设置不同的远程控制终端具有对不同应用程序的操作权限,简化了用户对应用程序的管理过程。
具体地,以查看“图库”中的图片为例,远程控制终端获取对分享终端“图库”应用程序主界面上指定图片的触控指令,作为查看指令发送至分享终端,首先检测“图库”应用程序是否属于远程控制终端的权限组,在检测到“图库”应用程序属于远程控制终端的权限组时,说明远程控制终端具有对“图库”应用程序一定的控制权限,即“图库”应用程序属于授权应用程序,根据授权应用程序与授权控制指令的对应关系,确定查看指令是否为授权控制指令,在确定查看指令为授权控制指令时,能够通过远程控制终端查看指定图片,在确定查看指令不是授权控制指令时,则禁止通过远程控制终端查看指定图片。
其中,控制指令包括:查看指令、编辑指令、删除指令、登陆指令、发送指令等。
对于不属于授权应用程序的应用程序,可以根据实际情况设置为可以自由访问或禁止访问。
实施例二:
在上述任一项技术方案中,优选地,在检测到远程控制终端属于预设权限终端时,根据预设权限终端的映射类型,确定是否执行控制指令,具体包括以下步骤:根据预设权限终端与授权控制指令的对应关系,检测控制指令是否属于授权控制指令;在检测到控制指令属于授权控制指令时,执行控制指令。
在该技术方案中,预设远程控制终端与授权控制指令的对应关系,即不同的远程控制终端具备不同的控制指令执行权限,在检测到控制指令属于授权控制指令,即具备执行权限时,则执行控制指令,而在检测到控制指令不属于授权控制指令时,则不执行控制指令,通过设置控制指令的执行权限,不需要对应用程序进行管理,进一步简化了对应用程序的管理,满足不同用户对操作权限设置的需求,同时提升了屏幕分享的安全性。
具体地,不同的远程控制终端具备不同的控制指令执行权限,比如远程控制终端B只具备查看权限,而远程控制终端C具备查看、编辑的权限等。
实施例三:
在上述任一项技术方案中,优选地,在检测到远程控制终端属于预设权限终端时,根据预设权限终端的映射类型,确定是否执行控制指令,还包括:根据预设权限终端与应用程序的对应关系,确定授权应用程序;检测控制指令是否针对授权应用程序;在检测到控制指令针对授权应用程序时,执行控制指令。
在该技术方案中,预设远程控制终端与授权应用程序的对应关系,在接收到远程控制终端发送的控制指令时,只需要判断待触控的应用程序是否为授权应用程序,不需要对具体的控制指令进行判断,只要是授权应用程序即执行控制指令,从而将应用程序分为授权应用程序与非授权应用程序,对授权应用程序,远程控制终端具有执行控制指令的权利,对非授权应用程序则拒绝远程控制终端访问,实现了分享终端对应用程序不同的管理方式,同时提升了屏幕分享的安全性。
进一步地,还可以将授权应用程序设置为对远程控制终端用户可见,而在分享至远程控制终端的界面上隐藏非授权应用程序,进一步方便了远程控制终端用户的操作。
在上述任一项技术方案中,优选地,还包括:在检测到远程控制终端不属于预设授权终端时,确定远程控制终端的IP信息;检测IP信息是否属于预存IP信息;在检测到IP信息属于预存IP信息时,将远程控制终端添加至预设授权终端的列表,并更新映射类型中的映射关系。
在该技术方案中,通过在检测到远程控制终端不属于预设授权终端时,确定远程控制终端的IP信息,检测分享终端中是否预设有远程控制终端的IP信息,在检测到分享终端中预设有远程控制终端的IP信息时,表明远程控制终端对分享终端来说具有一定的安全性,此时可以将远程控制终端设置为预设授权终端,允许该远程控制终端执行一定的操作,而在检测到分享终端中未预设远程控制终端的IP信息时,表明远程控制终端对于分享终端来说是陌生终端,此时通过切断与陌生终端之间的连接,一方面实现了远程控制终端对分享终端的安全控制,另一方面也防止了分享终端被陌生终端的攻击,进一步提升了用户的使用体验。
具体地,分享终端与远程控制终端之间的连接可以通过IP(Internet Protocol,网络之间互联的协议)协议实现,也可以通过Socket通信实现。
图2示出了根据本发明的实施例的远程控制装置的示意框图。
如图2所示,根据本发明的实施例的远程控制装置200,包括:检测单元202,设置为在接收到远程控制终端发送的控制指令时,检测远程控制终端是否属于预设权限终端;确定单元204,设置为在检测到远程控制终端属于预设权限终端时,根据预设权限终端的映射类型,确定是否执行控制指令。
在该技术方案中,通过在接收到远程控制终端发送的控制指令时,检测远程控制终端是否属于预设权限终端,在检测到该远程控制终端属于预设权限终端时,根据预设权限终端的映射类型确定是否执行控制指令,实现了对远程控制终端权限的管理,不同的远程控制终端能够具备不同的操作权限,在方便了用户操作的同时,一方面提升了远程控制过程的安全性,降低了用户隐私信息泄露的风险,另一方面简化了用户对应用程序的管理,提升了用户的使用体验。
在现有技术下,在分享终端与远程控制终端安装了同一款远程控制应用程序后,分享终端通过录屏的方式将本地显示界面实时分享给远程控制终端,远程控制终端接收用户对显示屏的触控指令,远程控制终端将捕捉到的触控指令的位置信息作为控制指令打包发送至分享终端,分享终端解析该位置信息并映射到分享终端的显示屏上,控制执行位置信息对应的应用程序的触控操作,以执行控制指令。
具体地,为了提高屏幕分享与远程控制的安全性,首先将用户认为较安全的远程控制终端设置为预设权限终端,在接收到远程控制终端发送的控制指令时,在检测到连接的远程控制终端为预设权限终端后,根据预设的预设授权终端的映射类型,确定控制指令是否具备执行权限,其中,映射类型包括:
(1)预设授权终端与授权应用程序的对应关系、授权应用程序与授权控制指令的对应关系;
(2)预设授权终端与授权控制指令的对应关系;
(3)预设授权终端与授权应用程序的对应关系。
根据不同的映射类型,在显示了对应用程序批量管理的同时,也能够给远程控制终端赋予不同的控制权限。
在上述技术方案中,优选地,确定单元204还设置为:根据预设权限终端与授权应用程序的对应关系,确定授权应用程序;检测单元202还设置为:检测控制指令是否针对授权应用程序;检测单元202还设置为:在检测到控制指令针对授权应用程序时,根据授权应用程序与授权控制指令的对应关系,检测控制指令是否属于授权控制指令;远程控制装置200还包括:执行单元206,设置为在检测到控制指令属于授权控制指令时,执行控制指令。
在该技术方案中,预设远程控制终端与授权应用程序的对应关系以及授权应用程序与授权控制指令的对应关系,根据远程控制终端与授权应用程序的对应关系,确定分享终端界面上哪些应用程序为授权应用程序,然后检测控制指令是否是针对授权应用程序的操作,在确定控制指令是针对授权应用程序的操作后,根据授权应用程序与授权控制指令的对应关系,确定是否执行该控制指令,一方面,在具有操作权限的应用程序中细化操作指令的执行权限,细化了远程控制终端的操作权限,另一方面,通过设置不同的远程控制终端具有对不同应用程序的操作权限,简化了用户对应用程序的管理过程。
具体地,以查看“图库”中的图片为例,远程控制终端获取对分享终端“图库”应用程序主界面上指定图片的触控指令,作为查看指令发送至分享终端,首先检测“图库”应用程序是否属于远程控制终端的权限组,在检测到“图库”应用程序属于远程控制终端的权限组时,说明远程控制终端具有对“图库”应用程序一定的控制权限,即“图库”应用程序属于授权应用程序,根据授权应用程序与授权控制指令的对应关系,确定查看指令是否为授权控制指令,在确定查看指令为授权控制指令时,能够通过远程控制终端查看指定图片,在确定查看指令不是授权控制指令时,则禁止通过远程控制终端查看指定图片。
其中,控制指令包括:查看指令、编辑指令、删除指令、登陆指令、发送指令等。
对于不属于授权应用程序的应用程序,可以根据实际情况设置为可以自由访问或禁止访问。
在上述任一项技术方案中,优选地,检测单元202还设置为:根据预设权限终端与授权控制指令的对应关系,检测控制指令是否属于授权控制指令;执行单元206还设置为:在检测到控制指令属于授权控制指令时,执行控制指令。
在该技术方案中,预设远程控制终端与授权控制指令的对应关系,即不同的远程控制终端具备不同的控制指令执行权限,在检测到控制指令属于授权控制指令,即具备执行权限时,则执行控制指令,而在检测到控制指令不属于授权控制指令时,则不执行控制指令,通过设置控制指令的执行权限,不需要对应用程序进行管理,进一步简化了对应用程序的管理,满足不同用户对操作权限设置的需求,同时提升了屏幕分享的安全性。
具体地,不同的远程控制终端具备不同的控制指令执行权限,比如远程控制终端B只具备查看权限,而远程控制终端C具备查看、编辑的权限等。
在上述任一项技术方案中,优选地,确定单元204还设置为:根据预设权限终端与应用程序的对应关系,确定授权应用程序;检测单元202还设置为:检测控制指令是否针对授权应用程序;执行单元206还设置为:在检测到控制指令针对授权应用程序时,执行控制指令。
在该技术方案中,预设远程控制终端与授权应用程序的对应关系,在接收到远程控制终端发送的控制指令时,只需要判断待触控的应用程序是否为授权应用程序,不需要对具体的控制指令进行判断,只要是授权应用程序即执行控制指令,从而将应用程序分为授权应用程序与非授权应用程序,对授权应用程序,远程控制终端具有执行控制指令的权利,对非授权应用程序则拒绝远程控制终端访问,实现了分享终端对应用程序不同的管理方式,同时提升了屏幕分享的安全性。
进一步地,还可以将授权应用程序设置为对远程控制终端用户可见,而在分享至远程控制终端的界面上隐藏非授权应用程序,进一步方便了远程控制终端用户的操作。
在上述任一项技术方案中,优选地,确定单元204还设置为:在检测到远程控制终端不属于预设授权终端时,确定远程控制终端的IP信息;检测单元202还设置为:检测IP信息是否属于预存IP信息;远程控制装置200还包括:更新单元208,设置为在检测到IP信息属于预存IP信息时,将远程控制终端添加至预设授权终端的列表,并更新映射类型中的映射关系。
在该技术方案中,通过在检测到远程控制终端不属于预设授权终端时,确定远程控制终端的IP信息,检测分享终端中是否预设有远程控制终端的IP信息,在检测到分享终端中预设有远程控制终端的IP信息时,表明远程控制终端对分享终端来说具有一定的安全性,此时可以将远程控制终端设置为预设授权终端,允许该远程控制终端执行一定的操作,而在检测到分享终端中未预设远程控制终端的IP信息时,表明远程控制终端对于分享终端来说是陌生终端,此时通过切断与陌生终端之间的连接,一方面实现了远程控制终端对分享终端的安全控制,另一方面也防止了分享终端被陌生终端的攻击,进一步提升了用户的使用体验。
具体地,分享终端与远程控制终端之间的连接可以通过IP(Internet Protocol,网络之间互联的协议)协议实现,也可以通过Socket通信实现。
图3示出了根据本发明的实施例的终端的示意框图。
如图3所示,根据本发明的实施例的终端300,包括上述任一项技术方案所述的远程控制装置200,因此,该终端包括上述任一项技术方案所述的远程控制装置200的技术效果,在此不再赘述。
图4示出了根据本发明的实施例的远程控制方案的示意图。
如图4所示,屏幕分享者A作为分享终端,在屏幕分享之前,预设应用程序与被分享者,即远程控制终端的对应关系,比如,对于权限组1,包括:APP组合1与被分享者组合1,对于权限组2,包括:APP组合2与被分享者组合2,对于权限组3,包括:APP组合3与被分享者组合3,通过预设多种对应关系,不同的权限组包括不同的被分享者与不同的应用程序,并且赋予不同的操作权限,在方便了用户操作的同时,一方面提升了远程控制过程的安全性,降低了用户隐私信息泄露的风险,另一方面简化了用户对应用程序的管理,提升了用户的使用体验。
图5示出了根据本发明的实施例的远程控制方案的示意流程图。
如图5所示,根据本发明的实施例的远程控制方案,包括:
步骤502,屏幕分享开始后,检测远程控制终端是否属于预设权限终端,在判断结果为“是”时,执行步骤510,在判断结果为“否”时,执行步骤504;
步骤504,确定远程控制终端的IP信息;
步骤506,判断IP信息是否属于预存IP信息,在判断结果为“是”时,执行步骤508,在判断结果为“否”时,结束进程;
步骤508,将远程控制终端添加至预设授权终端的列表,并更新映射类型中的映射关系;
步骤510,按照预设权限终端与应用程序的对应关系确定具有操作权限的应用程序。
在该技术方案中,在检测到远程控制终端属于预设授权终端时,根据预设权限终端与应用程序的对应关系确定具有操作权限的应用程序,在检测到远程控制终端不属于预设授权终端时,确定远程控制终端的IP信息,检测分享终端中是否预设有远程控制终端的IP信息,在检测到分享终端中预设有远程控制终端的IP信息时,表明远程控制终端对分享终端来说具有一定的安全性,此时可以将远程控制终端设置为预设授权终端,允许该远程控制终端执行一定的操作,而在检测到分享终端中未预设远程控制终端的IP信息时,表明远程控制终端对于分享终端来说是陌生终端,此时通过切断与陌生终端之间的连接,一方面实现了远程控制终端对分享终端的安全控制,另一方面也防止了分享终端被陌生终端的攻击,进一步提升了用户的使用体验。
图6示出了根据本发明的实施例的另一终端的结构示意图。
如图6所示,为本发明实施例提供的另一种终端的结构示意图,在本发明实施例中,所述终端300包括处理器301、存储器302和收发器303。收发器303用于与外部设备之间收发数据。所述终端300中的处理器301的数量可以是一个或多个。本发明的一些实施例中,所述处理器301、存储器302和收发器303可通过总线系统或其他方式连接。所述终端300可以用于执行图1、图5所示的方法。
其中,存储器302中存储程序代码,且所述处理器301可通过总线系统,调用所述存储器302中存储的程序代码以执行相关的功能。例如,图2中所述的各个单元(例如,所述检测单元202、所述确定单元204、所述执行单元206、所述更新单元208等)是存储在所述存储器302中的程序代码,并由所述处理器301所执行,从而实现所述各个单元的功能以实现远程控制方法。
具体而言,所述处理器301:在接收到远程控制终端发送的控制指令时,检测所述远程控制终端是否属于预设权限终端;在检测到所述远程控制终端属于所述预设权限终端时,根据所述预设权限终端的映射类型,确定是否执行所述控制指令。
在进一步的实施例中,所述处理器301:根据所述预设权限终端与授权应用程序的对应关系,确定所述授权应用程序;检测所述控制指令是否针对所述授权应用程序;在检测到所述控制指令针对所述授权应用程序时,根据所述授权应用程序与授权控制指令的对应关系,检测所述控制指令是否属于授权控制指令;在检测到所述控制指令属于所述授权控制指令时,执行所述控制指令。
在进一步的实施例中,所述处理器301:根据所述预设权限终端与授权控制指令的对应关系,检测所述控制指令是否属于所述授权控制指令;在检测到所述控制指令属于所述授权控制指令时,执行所述控制指令。
在进一步的实施例中,所述处理器301:根据所述预设权限终端与应用程序的对应关系,确定授权应用程序;检测所述控制指令是否针对所述授权应用程序;在检测到所述控制指令针对所述授权应用程序时,执行所述控制指令。
在进一步的实施例中,所述处理器301:在检测到所述远程控制终端不属于所述预设授权终端时,确定所述远程控制终端的IP信息;检测所述IP信息是否属于预存IP信息;在检测到所述IP信息属于所述预存IP信息时,将所述远程控制终端添加至所述预设授权终端的列表,并更新所述映射类型中的映射关系。
以上结合附图详细说明了本发明的技术方案,考虑到相关技术中如何在提升远程控制的安全性的同时方便用户的管理的技术问题,本发明提出了一种新的方案,通过在接收到远程控制终端发送的控制指令时,检测远程控制终端是否属于预设权限终端,在检测到该远程控制终端属于预设权限终端时,根据预设权限终端的映射类型确定是否执行控制指令,实现了对远程控制终端权限的管理,不同的远程控制终端能够具备不同的操作权限,在方便了用户操作的同时,一方面提升了远程控制过程的安全性,降低了用户隐私信息泄露的风险,另一方面简化了用户对应用程序的管理,提升了用户的使用体验。
以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。

Claims (11)

  1. 一种远程控制方法,其特征在于,包括:
    在接收到远程控制终端发送的控制指令时,检测所述远程控制终端是否属于预设权限终端;
    在检测到所述远程控制终端属于所述预设权限终端时,根据所述预设权限终端的映射类型,确定是否执行所述控制指令。
  2. 根据权利要求1所述的远程控制方法,其特征在于,所述在检测到所述远程控制终端属于所述预设权限终端时,根据所述预设权限终端的映射类型,确定是否执行所述控制指令,具体包括以下步骤:
    根据所述预设权限终端与授权应用程序的对应关系,确定所述授权应用程序;
    检测所述控制指令是否针对所述授权应用程序;
    在检测到所述控制指令针对所述授权应用程序时,根据所述授权应用程序与授权控制指令的对应关系,检测所述控制指令是否属于授权控制指令;
    在检测到所述控制指令属于所述授权控制指令时,执行所述控制指令。
  3. 根据权利要求1所述的远程控制方法,其特征在于,所述在检测到所述远程控制终端属于所述预设权限终端时,根据所述预设权限终端的映射类型,确定是否执行所述控制指令,具体包括以下步骤:
    根据所述预设权限终端与授权控制指令的对应关系,检测所述控制指令是否属于所述授权控制指令;
    在检测到所述控制指令属于所述授权控制指令时,执行所述控制指令。
  4. 根据权利要求1所述的远程控制方法,其特征在于,所述在检测到所述远程控制终端属于所述预设权限终端时,根据所述预设权限终端的映射类型,确定是否执行所述控制指令,还包括:
    根据所述预设权限终端与应用程序的对应关系,确定授权应用程序;
    检测所述控制指令是否针对所述授权应用程序;
    在检测到所述控制指令针对所述授权应用程序时,执行所述控制指令。
  5. 根据权利要求1至4中任一项所述的远程控制方法,其特征在于,还包括:
    在检测到所述远程控制终端不属于所述预设授权终端时,确定所述远程控制终端的IP信息;
    检测所述IP信息是否属于预存IP信息;
    在检测到所述IP信息属于所述预存IP信息时,将所述远程控制终端添加至所述预设授权终端的列表,并更新所述映射类型中的映射关系。
  6. 一种远程控制装置,其特征在于,包括:
    检测单元,设置为在接收到远程控制终端发送的控制指令时,检测所述远程控制终端是否属于预设权限终端;
    确定单元,设置为在检测到所述远程控制终端属于所述预设权限终端时,根据所述预设权限终端的映射类型,确定是否执行所述控制指令。
  7. 根据权利要求6所述的远程控制装置,其特征在于,
    所述确定单元还设置为:根据所述预设权限终端与授权应用程序的对应关系,确定所述授权应用程序;
    所述检测单元还设置为:检测所述控制指令是否针对所述授权应用程序;
    所述检测单元还设置为:在检测到所述控制指令针对所述授权应用程序时,根据所述授权应用程序与授权控制指令的对应关系,检测所述控制指令是否属于授权控制指令;
    所述远程控制装置还包括:
    执行单元,设置为在检测到所述控制指令属于所述授权控制指令时,执行所述控制指令。
  8. 根据权利要求6所述的远程控制装置,其特征在于,
    所述检测单元还设置为:根据所述预设权限终端与授权控制指令的对应关系,检测所述控制指令是否属于所述授权控制指令;
    所述执行单元还设置为:在检测到所述控制指令属于所述授权控制指令时,执行所述控制指令。
  9. 根据权利要求6所述的远程控制装置,其特征在于,
    所述确定单元还设置为:根据所述预设权限终端与应用程序的对应关系,确定授权应用程序;
    所述检测单元还设置为:检测所述控制指令是否针对所述授权应用程序;
    所述执行单元还设置为:在检测到所述控制指令针对所述授权应用程序时,执行所述控制指令。
  10. 根据权利要求6至9中任一项所述的远程控制装置,其特征在于,
    所述确定单元还设置为:在检测到所述远程控制终端不属于所述预设授权终端时,确定所述远程控制终端的IP信息;
    所述检测单元还设置为:检测所述IP信息是否属于预存IP信息;
    所述远程控制装置还包括:
    更新单元,设置为在检测到所述IP信息属于所述预存IP信息时,将所述远程控制终端添加至所述预设授权终端的列表,并更新所述映射类型中的映射关系。
  11. 一种终端,其特征在于,包括:如权利要求6至10中任一项所述的远程控制装置。
PCT/CN2016/107911 2016-07-29 2016-11-30 远程控制方法、远程控制装置和终端 Ceased WO2018018816A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610614178.4A CN106230937A (zh) 2016-07-29 2016-07-29 远程控制方法、远程控制装置和终端
CN201610614178.4 2016-07-29

Publications (1)

Publication Number Publication Date
WO2018018816A1 true WO2018018816A1 (zh) 2018-02-01

Family

ID=57535308

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/107911 Ceased WO2018018816A1 (zh) 2016-07-29 2016-11-30 远程控制方法、远程控制装置和终端

Country Status (2)

Country Link
CN (1) CN106230937A (zh)
WO (1) WO2018018816A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115391768A (zh) * 2022-08-08 2022-11-25 中国银行股份有限公司 一种业务数据处理方法、装置、设备及存储介质

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106776071A (zh) * 2016-12-16 2017-05-31 宇龙计算机通信科技(深圳)有限公司 一种远程控制应用程序的方法、装置及终端
CN108347402A (zh) * 2017-01-23 2018-07-31 中国移动通信有限公司研究院 一种应用访问方法、装置、处理终端和云端服务器
CN107302593A (zh) * 2017-08-03 2017-10-27 成都弈览科技有限公司 基于智能手机的远程设备操控方法及系统
JP7065294B2 (ja) * 2017-10-10 2022-05-12 パナソニックIpマネジメント株式会社 製造システムおよび製造方法
CN107979648A (zh) * 2017-12-12 2018-05-01 苏州蜗牛数字科技股份有限公司 一种服务器远程控制系统及方法
CN108769175B (zh) * 2018-05-22 2020-07-31 京东数字科技控股有限公司 远程真机访问控制方法、装置、存储介质及电子设备
CN110149405A (zh) * 2019-05-24 2019-08-20 北京指掌易科技有限公司 一种云端控制移动端应用的方法
CN111107222B (zh) * 2019-12-18 2021-08-24 维沃移动通信有限公司 一种界面共享方法及电子设备
CN114625686B (zh) * 2020-12-10 2023-11-14 明基智能科技(上海)有限公司 资料控制方法及资料控制系统
CN113542862A (zh) * 2021-07-22 2021-10-22 广州朗国电子科技股份有限公司 一种无线传屏中信息共享的方法
CN113282923B (zh) * 2021-07-22 2021-11-09 统信软件技术有限公司 一种远程控制方法、计算设备及存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120090023A1 (en) * 2010-10-07 2012-04-12 Chow Edmond K Secure area for apps
CN105122267A (zh) * 2013-03-15 2015-12-02 苹果公司 具有多种访问模式的移动计算设备
CN105357214A (zh) * 2015-11-26 2016-02-24 东莞酷派软件技术有限公司 远程控制方法、远程控制装置、终端和远程控制系统

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103237047B (zh) * 2013-03-11 2016-09-28 广东欧珀移动通信有限公司 一种远程受控、控制方法
CN104253845A (zh) * 2013-06-28 2014-12-31 腾讯科技(北京)有限公司 一种远程控制应用的方法和终端
CN104660626A (zh) * 2013-11-18 2015-05-27 中兴通讯股份有限公司 智能终端的控制方法及装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120090023A1 (en) * 2010-10-07 2012-04-12 Chow Edmond K Secure area for apps
CN105122267A (zh) * 2013-03-15 2015-12-02 苹果公司 具有多种访问模式的移动计算设备
CN105357214A (zh) * 2015-11-26 2016-02-24 东莞酷派软件技术有限公司 远程控制方法、远程控制装置、终端和远程控制系统

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115391768A (zh) * 2022-08-08 2022-11-25 中国银行股份有限公司 一种业务数据处理方法、装置、设备及存储介质

Also Published As

Publication number Publication date
CN106230937A (zh) 2016-12-14

Similar Documents

Publication Publication Date Title
WO2018018816A1 (zh) 远程控制方法、远程控制装置和终端
WO2017107611A1 (zh) 一种智能家居控制方法以及装置、系统
WO2014017858A1 (en) User terminal apparatus and control method thereof
WO2016169390A1 (zh) 应用安全防护方法、终端、存储介质
WO2014175602A1 (en) Electronic device and method of registering personal cloud apparatus in user portal server thereof
WO2014081076A1 (en) Head mount display and method for controlling the same
WO2016036115A1 (ko) 재등록을 관리하는 전자 장치 및 방법
WO2018076841A1 (zh) 数据分享方法、装置、存储介质及服务器
WO2012096546A2 (ko) 와이파이 다이렉트 통신 방식에서의 싱크 디바이스에서 소스 디바이스로 사용자의 입력을 송신하기 위한 방법 및 장치
WO2021071032A1 (en) Device access control method and apparatus for internet of things
WO2013170653A1 (zh) 一种屏幕锁解锁系统及方法
WO2015170797A1 (en) Display device and method for controlling the same
WO2021107177A1 (ko) 랜섬웨어 또는 피싱 공격 차단 방법 및 시스템
WO2017161832A1 (zh) 电梯控制方法、电梯控制装置和终端
WO2018090465A1 (zh) 视频监控方法、系统以及监控装置
WO2012099330A2 (ko) Cpns 환경에서 사용자 인증을 위한 인증키 발급 시스템 및 방법
WO2016064128A1 (en) Control device, method of controlling the same, and integrated control system
WO2018076879A1 (zh) 数据备份方法、装置、存储介质及终端
WO2015030512A1 (ko) 단말 장치와 그 단말 보호 방법 및 단말 관리 서버 장치
WO2018098886A1 (zh) 一种开启车门的方法、移动终端、车载终端及系统
WO2013094881A1 (ko) 어플리케이션 실행 제어 방법 및 장치
WO2016123898A1 (zh) 一种短信管理方法及其移动终端
WO2017138708A1 (en) Electronic apparatus and sensor arrangement method thereof
WO2016168972A1 (en) System and method for supporting movable object application development
WO2019139421A1 (en) User terminal device, electronic device, system comprising the same and control method thereof

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16910394

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16910394

Country of ref document: EP

Kind code of ref document: A1