CN107147656A - Method for building up, system and the readable storage medium storing program for executing of remote control - Google Patents

Method for building up, system and the readable storage medium storing program for executing of remote control Download PDF

Info

Publication number
CN107147656A
CN107147656A CN201710385990.9A CN201710385990A CN107147656A CN 107147656 A CN107147656 A CN 107147656A CN 201710385990 A CN201710385990 A CN 201710385990A CN 107147656 A CN107147656 A CN 107147656A
Authority
CN
China
Prior art keywords
information
controlled machine
main control
control computer
remote control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710385990.9A
Other languages
Chinese (zh)
Other versions
CN107147656B (en
Inventor
吴启军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201710385990.9A priority Critical patent/CN107147656B/en
Publication of CN107147656A publication Critical patent/CN107147656A/en
Application granted granted Critical
Publication of CN107147656B publication Critical patent/CN107147656B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions

Abstract

The invention discloses a kind of method for building up of remote control, the method for building up of remote control comprises the following steps:When main control computer starts distance control mode, main control computer generates authentication information, main control computer sends authentication information to controlled machine by least two channels, so that controlled machine forms feedback information according to the authentication information of reception, the feedback information of transmission of the main control computer based on controlled machine, judges whether to set up the remote control with controlled machine.The present invention also correspond to propose remote control set up system and a kind of readable storage medium storing program for executing.The present invention sends authentication information to controlled machine by least two different channel main control computers, identity information is confirmed by multiple interaction, it ensure that the security that remote control is set up, without the main control computer and controlled machine of artificially processing automatic interaction, having automatically set up remote control realizes the long-range convenience controlled.

Description

Method for building up, system and the readable storage medium storing program for executing of remote control
Technical field
The present invention relates to method for building up, system and the readable storage of network communication technology field, more particularly to remote control Medium.
Background technology
With mobile terminal, the development of Internet technology, in order to meet different remote control requirements, video or music are common Demand is enjoyed, manufacturer terminal is proposed the function of remote control, and mobile terminal can realize one or many by remote control technology The Screen sharing of station terminal and control.
However, being primarily present two following problems in existing remote control technology:First, remote control is all main control computer Control data is sent, controlled machine needs manual confirmation identity to set up remote control, and this way is not intelligent enough, many situations Lower use is very inconvenient, such as:Under the scene of remote automation test, when controlled machine nobody operates, it can not just complete remote Process control;2nd, other modes are used, it is necessary to using server as connection in the middle of main control computer and controlled machine without personage's operation, Authentication (server has the identity information of main control computer and controlled machine) is done by this server, and by server controls Main control computer and controlled machine are attached, in addition require it is controlled it is confidential be connected to by USB line on PC, pass through to instruct and complete control behaviour Make, such remote control needs to increase cost, while also add potential safety hazard, the security of server also increases terminal Potential safety hazard, and computer binds together with terminal and could use, and operates also very inconvenient, limits the use of the function Scene.
The above is only used for auxiliary and understands technical scheme, does not represent and recognizes that the above is existing skill Art.
The content of the invention
It is a primary object of the present invention to provide a kind of method for building up of remote control, system and readable storage medium storing program for executing, purport Intelligently easily setting up long-range control method.
To achieve the above object, the present invention provides a kind of method for building up of remote control, the method for building up bag of remote control Include following steps:
When main control computer starts distance control mode, main control computer generation authentication information;
Main control computer sends authentication information to controlled machine by least two channels, so that controlled machine is according to reception Authentication information formation feedback information;
The feedback information of transmission of the main control computer based on controlled machine, judges whether to set up the remote control with controlled machine.
Alternatively, when main control computer starts distance control mode, the step of main control computer generates authentication information includes:
When main control computer starts distance control mode, main control computer obtains the identification information of controlled machine;
Self information and the identification information obtained are generated authentication information by main control computer, and the authentication of generation is believed Breath is sent to controlled machine.
Alternatively, at least two channels include direct channel and indirect channel, and the main control computer leads to authentication information Cross at least two channels to send to controlled machine, so that the step of controlled machine forms feedback information according to the authentication information of reception Including:
Authentication information is selected at least two encryption policys to be encrypted by main control computer, and at least two encryption policys are added Close authentication information is respectively as the first authentication information and the second authentication information;
Main control computer sends the first authentication information to controlled machine by direct channel, and main control computer is by the second authentication Information is sent to controlled machine by indirect channel, so that controlled machine forms feedback information according to the authentication information of reception.
Alternatively, feedback information, which is divided into, is verified information and authentication failed information;
The feedback information of transmission of the main control computer based on controlled machine, judges whether to set up and the remote control of controlled machine Step includes:
The feedback information of transmission of the main control computer based on controlled machine, if feedback information is set up and quilt to be verified information The remote control of control machine;If feedback information is authentication failed information, the remote control with controlled machine is not set up.
Alternatively, the feedback information of transmission of the main control computer based on controlled machine, judges whether to set up the long-range control with controlled machine Include after processed the step of:
If main control computer sets up the remote control with being controlled machine, main control computer sends remote control commands to controlled machine;If main Control machine does not set up the remote control with controlled machine, then main control computer does not send remote control commands to controlled machine.
In addition, to achieve the above object, the present invention also provides a kind of method for building up of remote control, the foundation of remote control Method comprises the following steps:
Controlled machine receives the authentication information sent at least two channels, and at least two channel includes direct canal Road and indirect channel;
The first authentication information that controlled machine sends direct channel is decrypted, and obtains the first identity information;
The second authentication information that controlled machine sends indirect channel is decrypted, and obtains the second identity information;
First identity information and the second identity information are compared controlled machine;
Controlled machine is based on comparison result formation feedback information and sent to main control computer, so that main control computer judges whether to set up long-range Control.
Alternatively, feedback information, which is divided into, is verified information and authentication failed information;
The controlled machine is based on comparison result formation feedback information and sent to main control computer, so that main control computer judges whether to set up The step of remote control, includes:
If controlled machine compares the first identity information and the second identity information is identical, to main control computer authentication by being formed It is verified information;
If controlled machine compares the first identity information and the second identity information is different, main control computer authentication is unsuccessfully formed Authentication failed information.
In addition, to achieve the above object, the present invention also provides a kind of system of setting up of remote control, the remote control Setting up system includes the main control computer and controlled machine of communication connection;Wherein,
When main control computer starts distance control mode, main control computer generation authentication information;
Main control computer sends authentication information to controlled machine by least two channels;
Controlled machine obtains the authentication information of at least two channels, and the authentication that at least two channels are obtained is believed Breath is compared generation feedback information and sent to main control computer;
The feedback information of transmission of the main control computer based on controlled machine, judges whether to set up the remote control with controlled machine.
Alternatively, feedback information includes being verified information and authentication failed information;
Controlled machine receives the authentication information sent at least two channels, and at least two channel includes direct canal Road and indirect channel;
The first authentication information that controlled machine sends direct channel is decrypted, and obtains the first identity information;
The second authentication information that controlled machine sends indirect channel is decrypted, and obtains the second identity information;
First identity information and the second identity information are compared controlled machine, and the machine that is controlled is based on comparison result formation feedback Information is sent to main control computer;
Main control computer receives feedback information and determines whether to set up the remote control with controlled machine.
In addition, to achieve the above object, the present invention also provides a kind of computer-readable recording medium, computer-readable storage The remote control that is stored with medium sets up program, and setting up for the remote control realize as described above when program is executed by processor Remote control method for building up the step of.
The present invention provides a kind of method for building up of remote control, and the method for building up of remote control comprises the following steps:Work as master When control machine starts distance control mode, authentication information is passed through at least two by main control computer generation authentication information, main control computer Plant channel to send to controlled machine, so that controlled machine forms feedback information according to the authentication information of reception, main control computer is based on quilt The feedback information of the transmission of control machine, judges whether to set up the remote control with controlled machine.The present invention by main control computer by oneself The identification information generation authentication information of identity information and controlled machine, and authentication information is encrypted, by least Two kinds of different channels are sent to controlled machine, and controlled machine is solved the authentication information obtained at least two different channels It is close, identity information is confirmed with repeatedly interacting for controlled machine by main control computer, it is ensured that the security that remote control is set up, and compare Form correspondence feedback information to send to main control computer, main control computer determines whether to set up remote control based on feedback information, without artificial The main control computer and controlled machine of automatic interaction are handled, having automatically set up remote control realizes the long-range convenience controlled.
Brief description of the drawings
Fig. 1 is the terminal structure schematic diagram for the hardware running environment that scheme of the embodiment of the present invention is related to;
Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention;
Fig. 3 is the schematic flow sheet of an embodiment of the method for building up of remote control of the present invention;
Fig. 4 is the step S10 for the method for building up that Fig. 3 medium-long ranges are controlled refinement schematic flow sheet;
Fig. 5 is the step S20 for the method for building up that Fig. 3 medium-long ranges are controlled refinement schematic flow sheet;
Fig. 6 is the schematic flow sheet of another embodiment of the method for building up of remote control of the present invention;
Fig. 7 is the step S60 for the method for building up that Fig. 6 medium-long ranges are controlled refinement schematic flow sheet;
Fig. 8 is the interaction flow schematic diagram for setting up system of remote control of the present invention;
Fig. 9 is the method for building up of remote control of the present invention and the identity information handling process schematic diagram of system;
Figure 10 is the method for building up of remote control of the present invention and a concrete scene schematic diagram of system;
Figure 11 is the method for building up of remote control of the present invention and another concrete scene schematic diagram of system.
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In follow-up description, the suffix using such as " module ", " part " or " unit " for representing element is only Be conducive to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " part " or " unit " can be mixed Ground is used.
The method for building up of remote control of the present invention is applied sets up in system with remote control, and remote control sets up system In include a main control end and more than one controlled terminal, the main control end and controlled terminal can correspond to respectively different terminal (or The part of person's terminal, for example, controlled terminal can be the control chip of memory and controller composition, the finger for corresponding main control end Make), i.e. terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as mobile phone, flat board Computer, notebook computer, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable Media player (Portable Media Player, PMP), guider, wearable device, Intelligent bracelet, pedometer etc. are moved Move the fixed terminals such as terminal, and numeral TV, desktop computer.
It will be illustrated in subsequent descriptions by taking mobile terminal as an example, it will be appreciated by those skilled in the art that except special Outside element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, its hardware architecture diagram for a kind of mobile terminal of realization each embodiment of the invention, the shifting Dynamic terminal 100 can include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit 103rd, A/V (audio/video) input block 104, sensor 105, display unit 106, user input unit 107, interface unit 108th, the part such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1 Mobile terminal structure does not constitute the restriction to mobile terminal, and mobile terminal can be included than illustrating more or less parts, Either combine some parts or different parts arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, the reception and transmission of signal, specifically, by base station Downlink information receive after, handled to processor 110;In addition, up data are sent into base station.Generally, radio frequency unit 101 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrating Frequency unit 101 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division Multiple Access, WCDMA), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, FDD Long Term Evolution) and TDD-LTE (Time Division Duplexing-Long Term Evolution, time division duplex Long Term Evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user's transmitting-receiving electricity by WiFi module 102 Sub- mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 1 shows Go out WiFi module 102, but it is understood that, it is simultaneously not belonging to must be configured into for mobile terminal, completely can be according to need To be omitted in the essential scope for do not change invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 1 00 When under the isotypes such as formula, speech recognition mode, broadcast reception mode, it is that radio frequency unit 101 or WiFi module 102 are received or The voice data stored in memory 109 is converted into audio signal and is output as sound.Moreover, audio output unit 103 The audio output related to the specific function that mobile terminal 1 00 is performed can also be provided (for example, call signal receives sound, disappeared Breath receives sound etc.).Audio output unit 103 can include loudspeaker, buzzer etc..
A/V input blocks 104 are used to receive audio or video signal.A/V input blocks 104 can include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042,1041 pairs of graphics processor is in video acquisition mode Or the view data progress of the static images or video obtained in image capture mode by image capture apparatus (such as camera) Reason.Picture frame after processing may be displayed on display unit 106.Picture frame after being handled through graphics processor 1041 can be deposited Storage is transmitted in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042 Quiet down sound (voice data), and can be voice data by such acoustic processing.Audio (voice) data after processing can To be converted to the form output that mobile communication base station can be sent to via radio frequency unit 101 in the case of telephone calling model. Microphone 1042 can implement various types of noises and eliminate (or suppression) algorithm to eliminate (or suppression) in reception and send sound The noise produced during frequency signal or interference.
Mobile terminal 1 00 also includes at least one sensor 105, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 1061, and proximity transducer can close when mobile terminal 1 00 is moved in one's ear Display panel 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general For three axles) size of acceleration, size and the direction of gravity are can detect that when static, the application available for identification mobile phone posture (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.; The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, The other sensors such as hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Display unit 106 is used for the information for showing the information inputted by user or being supplied to user.Display unit 106 can be wrapped Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 1061.
User input unit 107 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal The key signals input that family is set and function control is relevant.Specifically, user input unit 107 may include contact panel 1071 with And other input equipments 1072.Contact panel 1071, also referred to as touch-screen, collect touch operation of the user on or near it (such as user is using any suitable objects such as finger, stylus or annex on contact panel 1071 or in contact panel 1071 Neighbouring operation), and corresponding attachment means are driven according to formula set in advance.Contact panel 1071 may include touch detection Two parts of device and touch controller.Wherein, touch detecting apparatus detects the touch orientation of user, and detects touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it It is converted into contact coordinate, then gives processor 110, and the order sent of reception processing device 110 and can be performed.In addition, can To realize contact panel 1071 using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can be wrapped Include but be not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. One or more, do not limit herein specifically.
Further, contact panel 1071 can cover display panel 1061, detect thereon when contact panel 1071 or After neighbouring touch operation, processor 110 is sent to determine the type of touch event, with preprocessor 110 according to touch thing The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, contact panel 1071 and display panel 1061 be input and the output function that mobile terminal is realized as two independent parts, but in certain embodiments, can By contact panel 1071 and the input that is integrated and realizing mobile terminal of display panel 1061 and output function, not do specifically herein Limit.
Interface unit 108 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 1 00.For example, External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 1 00 or can be with For transmitting data between mobile terminal 1 00 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area And storage data field, wherein, application program (the such as sound that storing program area can be needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data field can be stored uses created data (such as according to mobile phone Voice data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, it can also include non-easy The property lost memory, for example, at least one disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection Individual part, by operation or performs and is stored in software program and/or module in memory 109, and calls and be stored in storage Data in device 109, perform the various functions and processing data of mobile terminal, so as to carry out integral monitoring to mobile terminal.Place Reason device 110 may include one or more processing units;It is preferred that, processor 110 can integrated application processor and modulatedemodulate mediate Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 1 00 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111 Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put The function such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 1 00 can also will not be repeated here including bluetooth module etc..
For the ease of understanding the embodiment of the present invention, the communications network system that the mobile terminal of the present invention is based on is entered below Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system Unite as the LTE system of universal mobile communications technology, UE (User Equipment, use of the LTE system including communicating connection successively Family equipment) 201, E-UTRAN (Evolved UMTS Terrestrial Radio Access Network, evolved UMTS lands Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation 204。
Specifically, UE201 can be above-mentioned terminal 100, and here is omitted.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning Journey (backhaul) (such as X2 interface) is connected with other eNodeB2022, and eNodeB2021 is connected to EPC203, ENodeB2021 can provide UE201 to EPC203 access.
EPC203 can include MME (Mobility Management Entity, mobility management entity) 2031, HSS (Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way, Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and There is provided carrying and connection management for the control node of signaling between EPC203.HSS2032 is all to manage for providing some registers Such as function of attaching position register (not shown) etc, and some are preserved about the use such as service features, data rate The special information in family.All customer data can be transmitted by SGW2034, and PGW2035 can provide UE 201 IP Address is distributed and other functions, and PCRF2036 is strategy and the charging control strategic decision-making of business data flow and IP bearing resources Point, it selects and provided available strategy and charging control decision-making with charge execution function unit (not shown) for strategy.
IP operation 204 can include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with And following new network system etc., do not limit herein.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the inventive method is proposed.
Remote control in the present invention must could be carried out by network.The computer being located locally is sending for control command End, referred to as main control end or client (i.e. main control computer), controlled computer non-indigenous is called controlled terminal or server end is (controlled Machine)." long-range " is not equal at a distance, and main control end and controlled terminal can in the same room of same LAN, also may be used Be connected into Internet be in any position two or multiple stage computers (remote control of early stage largely refers to electricity Brain desktop is controlled, actual remote control Android, apple, notebook, the lamp that computer can be on horse-controlling road, can control what is networked Curtain, can control television set, can control DVD, can control video camera, can control the projector in classroom.Command centre, large conference room etc. is universal Using).
In the present invention manual operation need to be all corresponded to for setting up remote control in the prior art just in main control end and controlled terminal Can set up connection, such method for setting up remote control not intelligence, and potential safety hazard it is larger the problem of, the present invention proposes one Plant the method for building up of remote control.This method requires that main control computer and controlled machine set up connection by interaction several times.
Specifically, with reference to Fig. 8, main control computer directly sends an authentication information, with this simultaneously, main control computer to controlled machine Same safe email is logged in controlled machine, main control computer sends the request of remote control by this safe email to controlled machine, The request carries the authentication information of main control terminal, and wherein the information is that have certain ageing authentication information, quilt The authentication information that control machine is directly sent to controlled machine by safe email acquisition authentication information and main control computer is compared It is right, if unanimously, authentication passes through.
Controlled machine sends authentication and feeds back to main control computer, if feedback information authentication passes through, sets up master control The remote control of machine and controlled machine, main control computer sends control instruction to controlled machine, and control controlled terminal is operated accordingly.Master control The behavior of the controlled machine of machine control is to receive corresponding instruction, and this method can be built automatically without requiring controlled machine by artificially confirming Vertical connection, adds the intelligent of terminal, this method need not increase hardware cost, not be limited by geographic, at any time with Ground completes control, adds Consumer's Experience.In addition, this technique improves the security of remote control.
Reference picture 3 a, embodiment of the method for building up of remote control of the present invention provides a kind of method for building up of remote control, This method includes:
Step S10, when main control computer starts distance control mode, main control computer generation authentication information.
When user opens distance control mode by main control computer to controlled machine, (main control computer, which needs accordingly to send identity, to be tested Information is demonstrate,proved to controlled machine, the identity information of main control computer is verified by controlled machine, when controlled identity is verified Set up the remote control of main control computer and controlled machine), main control computer gathers the end message and corresponding controlled client information of itself and remote Process control is asked, the authentication information that generation main control end is set up needed for remote control with controlled terminal.
Step S20, main control computer sends authentication information to controlled machine by least two channels, so that controlled machine root According to the authentication information formation feedback information of reception.
Main control computer sends the authentication information of generation to controlled terminal using different channels (to be mainly in the present invention The authentication information of at least two channels is automatically obtained by controlled terminal, the comparison of authentication information is carried out, so as to set up The remote control of main control end and controlled terminal), controlled machine is got the authentication information of main control computer by direct channel, in quilt Control machine is got after the authentication information of direct channel transmission, and the controlled machine of triggering obtains indirect channel authentication information, quilt Receive two authentication informations are compared control machine to form feedback information and sends to main control computer.
Specifically, with reference to Figure 11, using main control computer as server terminal, the machine that is controlled is test machine terminal A and test machine terminal B Exemplified by, self-identity information, test machine terminal A identification information and remote control commands are generated authentication information by main control computer Self-identity information, test machine terminal B identification information and remote control commands are generated authentication information B, main control computer by A Authentication information A is obtained into authentication information A1, A2 by the encryption of at least two encryption policys;By authentication information B Authentication information B1, B2 is obtained by the encryption of at least two encryption policys, and authentication information A1 is passed through into direct channel Send to controlled machine A, authentication information A2 is sent to controlled machine A by indirect channel, receiving identity in controlled machine tests Demonstrate,prove after information A1, the controlled machine of triggering obtains the authentication information A2 that main control computer is sent from indirect channel, and to deserved by identity Checking information A1, A2 is compared to form feedback information, if authentication information A1, A2 is identical, authentication passes through, instead It, if authentication information A1, A2 is different, authentication fails, similarly alignment processing authentication information B1, B2;Need Supplementary notes, due to there is a situation where that the identity information of main control computer is consistent in practical application, but are due to send to difference The corresponding encryption policy of controlled machine it is different, in order to prevent situations such as identity information is chaotic thus in authentication information correspondence Add controlled machine identification information.
Specifically, with reference to Fig. 8, main control end sends a kind of checking request of the authentication information 1 of encryption policy encryption extremely Controlled terminal (that is, direct channel sends authentication information), main control computer is in the authentication letter for encrypting another encryption policy Breath 2 is sent to main control end and the halfpace safe email of controlled terminal, and controlled terminal is receiving the authentication information 1 of encryption Afterwards, pair the authentication information 2 of the encryption in halfpace safe email and is further obtained, by the authentication information of encryption 1 authentication information 2 with encrypting is decrypted, and compares the authentication information after decryption, if identity information 1 is believed with identity Cease 2 identical, be then verified, controlled terminal sends feedback information that authentication passes through to main control end, makes terminal continue to send remote Process control is instructed to controlled terminal, if conversely, identity information 1 is different from identity information 2, authentication failed, controlled terminal sends identity The feedback information of authentication failed makes terminal stop sending remote control commands to controlled terminal to main control end.
Step S30, the feedback information of transmission of the main control computer based on controlled machine judges whether to set up the long-range control with controlled machine System.
The feedback information of transmission of the main control computer based on controlled machine, if feedback information be authentication by information, set up With the remote control of controlled machine, main control computer sends remote control commands to controlled machine, if feedback information is authentication failed information, The remote control with controlled machine is not set up, and main control computer does not send remote control commands to controlled machine, prevents remote control commands quilt Intercept and capture.
In the present embodiment when main control computer starts distance control mode, main control computer generation authentication information, main control computer Authentication information is sent to controlled machine by least two channels, so that authentication information shape of the controlled machine according to reception Into feedback information, the feedback information of transmission of the main control computer based on controlled machine judges whether to set up the remote control with controlled machine.Quilt The authentication information obtained at least two different channels is decrypted control machine, passes through the multiple friendship of main control computer and controlled machine Mutually confirm identity information, it is ensured that remote control set up security, and compare to be formed correspondence feedback information send to main control computer, Main control computer determines whether to set up remote control based on feedback information, without the main control computer and controlled machine of artificial processing automatic interaction, Having automatically set up remote control realizes the long-range convenience controlled, and sets up remotely connect in the prior art compared with prior art The two ways connect:1st, main control computer sends control information to controlled machine, when controlled machine receives the long-range link order of main control computer, The user of controlled machine needs artificial click on to confirm;Carried out in this programme by the identity information being controlled on machine at least two channels of acquisition The comparison of identity information, without artificial operation, in the concrete scene of software test etc., not employment makes controlled machine in controlled generator terminal Software test it is more convenient.2nd, it is attached between main control computer and controlled machine by intermediate server, i.e., main control computer will be long-range Control instruction is sent to intermediate server, and the remote control of main control computer and controlled machine is set up by intermediate server, such long-range Control mode, which adds main control computer in the hardware cost of intermediate server, the present invention and repeatedly interacted with controlled machine, has reached long-range control The purpose of system, multiple interaction ensure that the security of remote control, ensure that remotely without the need for by intermediate server The relatively low cost of control.
The method for building up of reference picture 4, in the present embodiment invention remote control, step S10 includes:
Step S11, when main control computer starts distance control mode, main control computer obtains the identification information of controlled machine.
When main control computer starts distance control mode, a main control computer and many are there may be in actual remote control Controlled machine sets up remote control connection, or the main control computer of many is connected from setting up remote control with different controlled machines respectively, In order to prevent authentication information from sending chaotic situation, main control computer needs to obtain the identification information of controlled machine.
Self information and the identification information obtained are generated authentication information by step S12, main control computer, by the body of generation Part checking information is sent to controlled machine.
Main control computer is by self information (self information:For example, the facility information or the identity letter of master control end subscriber of main control end Breath, specifying information type is not limited, as long as the identity of main control end can be recognized) and obtain controlled terminal identification information (be controlled Hold identification information:Can be the identification information of controlled end equipment, or the corresponding network address information of controlled terminal) synthesized, Generate authentication information, main control computer by the authentication information of generation send to correspondence controlled terminal, it is necessary to supplementary notes, Main control end generation authentication information can by the generation corresponding with controlled terminal identification information of main control end self information identifying code, And the effective property of identifying code of generation.
In the present embodiment when main control computer starts distance control mode, main control computer obtains the identification information of controlled machine, main Self information and the identification information obtained are generated authentication information by control machine, and the authentication information of generation is sent to quilt Control machine.By by main control end self information generation authentication information corresponding with controlled terminal, further utilizing the identity of generation Checking information sets up main control end and the remote control of controlled terminal, improves the security of remote control.
The method for building up of reference picture 5, in the present embodiment invention remote control, step S20 includes:
At least two channel includes direct channel and indirect channel;
Authentication information is selected at least two encryption policys to be encrypted by step S21, main control computer, and at least two are added The authentication information of close strategy encryption is respectively as the first authentication information and the second authentication information.
Authentication information is selected at least two encryption policy (encryption policys by main control computer:It can be regarded as different encryptions Mode, the cipher mode of existing generation authentication information has MD5 values to encrypt, the different cipher mode such as asymmetric encryption) It is encrypted, the encryption identity card information that at least two cipher modes are obtained is as the first authentication information and second Authentication information is, it is necessary to add, the first authentication information and the second authentication information here, and be not present Time or priority problem, it is in order to which identity is tested below that the first authentication information and the second authentication information are distinguished here Demonstrate,prove information and send the explanation of channel conveniently.
Specifically, reference picture 9, the identification information generation authentication letter of main control computer combination self-identity information and controlled machine Breath (that is, the STOCHASTIC CONTROL code shown in Fig. 9), using using a kind of obtained authentication information of encryption policy as ciphertext 1, is incited somebody to action Using the obtained authentication information of another encryption policy as ciphertext 2, ciphertext 1 passes through with reference to remote control notification Mobile network, is sent to controlled terminal using direct channel, and ciphertext 2 is sent to main control computer and controlled machine using indirect channel Halfpace safe email in, controlled machine is received after ciphertext 1, ciphertext 1 is decrypted using relative strategy, and trigger quilt Control machine logs in halfpace (safe email) and obtains ciphertext 2, and ciphertext 2 is decrypted controlled machine using corresponding decryption policy To corresponding plaintext 2, and by plain text 1 with 2 being compared in plain text, and sent comparison result as feedback information to main control computer, So that main control computer according to feedback information carry out remote control commands transmission (it should be added that:Ciphertext 1, ciphertext 2 are i.e. not Authentication information 1, the authentication information 2 obtained with encryption policy;In plain text 1, in plain text 2, that is, decrypt obtained identity information 1 With identity information 2).
Step S22, main control computer sends the first authentication information to controlled machine by direct channel, and main control computer is by second Authentication information is sent to controlled machine by indirect channel, so that controlled machine feeds back according to the formation of the authentication information of reception Information.
First authentication information is passed through direct channel (direct channel by main control computer:Direct channel can be regarded as controlled machine Directly receive, if controlled machine is mobile phone, direct channel can be regarded as the short breath of mobile phone, the mode such as phone) send to quilt Second authentication information is passed through indirect channel (indirect channel by control machine, main control computer:Indirect channel can be regarded as an information and be total to The platform enjoyed, for example, controlled machine is mobile phone, then indirect channel can be regarded as the corresponding channel of the modes such as the mailbox of mobile phone, supplement Illustrate in this embodiment by the use of safe email as indirect channel, main control computer can log in safe email and send out authentication information Safe email is delivered to, controlled machine also logs in safe email correspondence and obtains the authentication information that main control computer is sent, and passes through main control computer Log in safe email with controlled machine and secondary authentication carried out to main control computer and controlled machine, with prior art main control computer and by Server is set up in the middle of control machine compared to cost has been saved, risk factor is reduced) send to controlled machine, can by different channels To ensure the security of controlled machine information, controlled machine is according to the authentication information formation feedback information received.
Authentication information is selected at least two encryption policys to be encrypted by main control computer in the present embodiment, will at least two The authentication information of encryption policy encryption is planted respectively as the first authentication information and the second authentication information, main control computer First authentication information is sent to controlled machine by direct channel, the second authentication information is passed through indirect canal by main control computer Road is sent to controlled machine, so that controlled machine forms feedback information according to the authentication information of reception.Main control computer selection at least two Plant different encryption policys authentication information is encrypted, it is ensured that the security of identity information, with this simultaneously, be controlled machine Authentication information, which is obtained, by least two encryption channels ensure that the security that remote control is set up.
In the present embodiment in the method for building up of remote control of the present invention, the method for building up of remote control also includes:
If main control computer sets up the remote control with being controlled machine, main control computer sends remote control commands to controlled machine;If main Control machine does not set up the remote control with controlled machine, then main control computer does not send remote control commands to controlled machine.
Feedback information that authentication passes through is sent to main control computer in controlled machine, and main control computer sets up the long-range control with being controlled machine Remote control commands occur for system, then main control computer continuation to controlled machine, controlled machine is carried out according to the remote control commands of main control computer Operation, sends the feedback information of authentication failure to main control computer, main control computer does not set up main control computer and controlled machine in controlled machine During remote control, main control computer stops sending remote control commands to controlled machine, prevents remote control is disturbed from (requiring supplementation with explanation Be:When main control computer exits distance control mode, the remote control of main control computer and controlled machine will stop, and main control computer exits long-range control The embodiment of system can be that main control computer exits remote control interface).
If main control computer sets up the remote control with being controlled machine in the present embodiment, main control computer sends remote control commands extremely Controlled machine;If main control computer does not set up the remote control with controlled machine, main control computer does not send remote control commands to controlled machine.It is main Whether control machine finally determines whether to send monitoring instruction to controlled machine according to the foundation of remote control, it is ensured that remote control Effectiveness and reliability.
Reference picture 6, another embodiment of the method for building up of remote control of the present invention provides a kind of foundation side of remote control Method, this method includes:
Step S40, controlled machine receives the authentication information sent at least two channels, at least two channels bag Include direct channel and indirect channel.
Controlled machine receives the authentication information that main control computer is sent from least two channels, and with reference to Fig. 8, main control computer passes through Direct channel sends the request of remote control and corresponding authentication information to controlled machine, and controlled machine is receiving direct canal After the authentication information sent on road, correspondence obtains the authentication information on indirect channel, i.e. controlled machine receives master control In the direct channel that machine is sent after authentication information, indirect authentication is obtained using authentication information as the controlled machine of triggering The trigger condition of information, controlled machine is manipulated without people, and controlled machine carries out authentication automatically.
Step S50, the first authentication information that controlled machine sends direct channel is decrypted, and obtains the first identity information, The second authentication information that controlled machine sends indirect channel is decrypted, and obtains the second identity information.
The first authentication information sent in direct channel is decrypted controlled machine using corresponding decryption policy, The first identity information of main control computer is got, machine is controlled after the first authentication information is got, further obtains main control computer The second authentication information sent from indirect channel, and the second authentication information is solved using correspondence decryption policy It is close to obtain the second identity information.
First identity information and the second identity information are compared step S60, controlled machine, are controlled machine and are based on comparison result Form feedback information to send to main control computer, so that main control computer judges whether to set up remote control.
Controlled machine will decrypt the first obtained identity information and the second identity information is compared, and according to identity information ratio To result formation feedback information, controlled machine sends the feedback information of formation to main control computer, main control computer is sentenced according to feedback information It is disconnected whether to set up corresponding remote control information.
Machine is controlled in the present embodiment receives the authentication information sent at least two channels, at least two canal Road includes direct channel and indirect channel, and the first authentication information that controlled machine sends direct channel is decrypted, and obtains first Identity information, the second authentication information that controlled machine sends indirect channel is decrypted, and obtains the second identity information, and being controlled machine will First identity information and the second identity information are compared, and controlled machine is based on comparison result formation feedback information and sent to master control Machine, so that main control computer judges whether to set up remote control.Machine is controlled in the present embodiment to receive after the first authentication information, is touched The controlled machine of hair obtains the second authentication information, and the main control computer authentication information obtained from different channels is decrypted After compare, determine the identity of main control computer, further form corresponding feedback information, it is ensured that set up main control computer and controlled machine is long-range The security of control.
Reference picture 7, in the method for building up of remote control of the present invention, step S60 includes:
The feedback information, which is divided into, is verified information and authentication failed information;
Step S61, if controlled machine compares the first identity information and the second identity information is identical, to main control computer authentication Information is verified by being formed.
Controlled machine comparison receives decryption from direct channel and obtains the first identity information with obtaining solution from indirect channel It is close to obtain the second identity information, if the first authentication information is identical with the second identity information, it is controlled machine and determines to main control computer Authentication passes through, and formation is verified information.
Step S62, if controlled machine compares the first identity information and the second identity information is different, to main control computer authentication Unsuccessfully form authentication failed information.
If controlled machine compares the first identity information and the second identity information different (the first identity information and the second identity informations There is mistake in decryption, and decryption time is long, authentication information ageing it cannot be guaranteed that, identity information mistake or other faults Type), then it is controlled machine and authentication failed information is unsuccessfully formed to main control computer authentication.
If being controlled in the present embodiment, machine compares the first identity information and the second identity information is identical, to master control identity It is verified to be formed and is verified information, if controlled machine compares the first identity information and the second identity information is different, to master control Identity authentication failed formation authentication failed information.Confirmation identity letter is compared in the authentication information of main control computer by controlled machine Breath, ensure that the security of remote control, while ensure that identity by the acquisition of the authentication information of at least two approach That verifies is ageing.
Reference picture 8, in a kind of system of setting up of remote control of the invention, the system of setting up of the remote control includes communication The main control computer of connection and controlled machine;Wherein,
When main control computer starts distance control mode, main control computer generation authentication information.
When user opens distance control mode by main control computer to controlled machine, (main control computer, which needs accordingly to send identity, to be tested Information is demonstrate,proved to controlled machine, the identity information of main control computer is verified by controlled machine, when controlled identity is verified Set up the remote control of main control computer and controlled machine), main control computer gathers the end message and corresponding controlled client information of itself and remote Process control is asked, the authentication information that generation main control end is set up needed for remote control with controlled terminal.
Main control computer sends authentication information to controlled machine by least two channels.
Main control computer sends the authentication information of generation to controlled terminal (with reference to Figure 10, in this hair using different channels The authentication information of at least two channels is mainly automatically obtained in bright by controlled terminal, the ratio of authentication information is carried out It is right, so as to set up main control end and the remote control of controlled terminal).
Controlled machine obtains the authentication information of at least two channels, and the authentication that at least two channels are obtained is believed Breath is compared generation feedback information and sent to main control computer.
Controlled machine gets the authentication information of main control computer by direct channel, and direct channel hair is got in controlled machine After the authentication information sent, the controlled machine of triggering obtains indirect channel authentication information, is controlled machine by receive two bodies Part checking information, which is compared, to be formed feedback information and sends to main control computer.
Specifically, with reference to Figure 11, using main control computer as server terminal, the machine that is controlled is test machine terminal A and test machine terminal B Exemplified by, self-identity information, test machine terminal A identification information and remote control commands are generated authentication information by main control computer Self-identity information, test machine terminal B identification information and remote control commands are generated authentication information B, with reference to figure by A 9, authentication information A is obtained authentication information A1, A2 by main control computer by the encryption of at least two encryption policys;Identity is tested Card information B obtains authentication information B1, B2 by the encryption of at least two encryption policys, and authentication information A1 is passed through straight Connect channel to send to controlled machine A, authentication information A2 is sent to controlled machine A by indirect channel, received in controlled machine After authentication information A1, the controlled machine of triggering obtains the authentication information A2 that main control computer is sent from indirect channel, and to deserved Authentication information A1, A2 is compared to form feedback information, if authentication information A1, A2 is identical, authentication is led to Cross, if conversely, authentication information A1, A2 is different, authentication fails, similarly alignment processing authentication information B1, B2; It should be added that, due to there is a situation where that the identity information of main control computer is consistent in practical application, but it is due to send extremely The corresponding encryption policy of different controlled machines is different, in order to prevent situations such as identity information is chaotic thus in authentication information Correspondence adds controlled machine identification information.
The feedback information of transmission of the main control computer based on controlled machine, judges whether to set up the remote control with controlled machine.
The feedback information of transmission of the main control computer based on controlled machine, if feedback information be authentication by information, set up With the remote control of controlled machine, main control computer sends remote control commands to controlled machine, if feedback information is authentication failed information, The remote control with controlled machine is not set up, and main control computer does not send remote control commands to controlled machine, prevents remote control commands quilt Intercept and capture.
Main control computer sends authentication information to controlled machine by least two channels in the present embodiment, is controlled machine near The authentication information obtained on few two kinds of different channels is decrypted, and body is confirmed with repeatedly interacting for controlled machine by main control computer Part information, it is ensured that the security that remote control is set up, and compare to form correspondence feedback information and send to main control computer, main control computer base Determine whether to set up remote control in feedback information, without the main control computer and controlled machine of artificial processing automatic interaction, automatically build Having found remote control realizes the long-range convenience controlled.
Reference picture 9, in the present embodiment in the system of setting up of remote control of the present invention, feedback information includes being verified letter Breath and authentication failed information;The system of setting up of remote control also corresponds to execution:
Controlled machine receives the authentication information sent at least two channels, and at least two channel includes direct canal Road and indirect channel.
Controlled machine receives the authentication information that main control computer is sent from least two channels, and with reference to Fig. 8, main control computer passes through Direct channel sends the request of remote control and corresponding authentication information to controlled machine, and controlled machine is receiving direct canal After the authentication information sent on road, correspondence obtains the authentication information on indirect channel, i.e. controlled machine receives master control In the direct channel that machine is sent after authentication information, indirect authentication is obtained using authentication information as the controlled machine of triggering The trigger condition of information, controlled machine is manipulated without people, and controlled machine carries out authentication automatically.
The first authentication information that controlled machine sends direct channel is decrypted, and obtains the first identity information, and being controlled machine will The second authentication information decryption that indirect channel is sent, obtains the second identity information.
The first authentication information sent in direct channel is decrypted controlled machine using corresponding decryption policy, The first identity information of main control computer is got, machine is controlled after the first authentication information is got, further obtains main control computer The second authentication information sent from indirect channel, and the second authentication information is solved using correspondence decryption policy It is close to obtain the second identity information.
First identity information and the second identity information are compared controlled machine, and the machine that is controlled is based on comparison result formation feedback Information is sent to main control computer.
Controlled machine will decrypt the first obtained identity information and (the identity letter that decryption is obtained is compared in the second identity information Breath prevents other-end from getting authentication information and producing interference to remote control with ageing), and according to identity information Comparison result formation feedback information, controlled machine sends the feedback information of formation to main control computer.
Main control computer receives feedback information and determines whether to set up the remote control with controlled machine.
If main control computer, if feedback information passes through, sets up main control computer and quilt according to the feedback information feedback information received Remote control between control machine, main control computer sends the controlled machine of remote control commands control, on the contrary.
The main control computer authentication information that controlled machine is obtained from different channels in the present embodiment is compared after being decrypted, The identity of main control computer is determined, corresponding feedback information is further formed, it is ensured that main control computer and controlled machine remote control is set up Confirmation identity information is compared in the authentication information of main control computer by security, controlled machine, while ensure that authentication It is ageing.
In addition, the present invention also provides a kind of computer-readable recording medium.
The remote control that is stored with computer-readable recording medium of the present invention sets up program, the foundation of the remote control The step of as above method for building up of remote control being realized when program is executed by processor.
Wherein, remote control sets up the foundation that the method realized when program is performed can refer to remote control of the present invention Each embodiment of method, here is omitted.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property is included, so that process, method, article or device including a series of key elements not only include those key elements, and And also including other key elements being not expressly set out, or also include for this process, method, article or device institute inherently Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Also there is other identical element in process, method, article or the device of key element.
The embodiments of the present invention are for illustration only, and the quality of embodiment is not represented.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Understood based on such, technical scheme is substantially done to prior art in other words Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are to cause a station terminal (can be mobile phone, computer, service Device, air conditioner, or network equipment etc.) perform method described in each of the invention embodiment.
Embodiments of the invention are described above in conjunction with accompanying drawing, but the invention is not limited in above-mentioned specific Embodiment, above-mentioned embodiment is only schematical, rather than restricted, one of ordinary skill in the art Under the enlightenment of the present invention, in the case of present inventive concept and scope of the claimed protection is not departed from, it can also make a lot Form, these are belonged within the protection of the present invention.

Claims (10)

1. a kind of method for building up of remote control, it is characterised in that the method for building up of the remote control comprises the following steps:
When main control computer starts distance control mode, main control computer generation authentication information;
Main control computer sends authentication information to controlled machine by least two channels, so that identity of the controlled machine according to reception Checking information formation feedback information;
The feedback information of transmission of the main control computer based on controlled machine, judges whether to set up the remote control with controlled machine.
2. the method for building up of remote control as claimed in claim 1, it is characterised in that described when main control computer starts remote control During pattern, the step of main control computer generates authentication information includes:
When main control computer starts distance control mode, main control computer obtains the identification information of controlled machine;
Self information and the identification information obtained are generated authentication information by main control computer, and the authentication information of generation is sent out Deliver to controlled machine.
3. the method for building up of remote control as claimed in claim 1, it is characterised in that at least two channel includes direct Channel and indirect channel, the main control computer send authentication information to controlled machine by least two channels, so that controlled The step of machine forms feedback information according to the authentication information of reception includes:
Authentication information is selected at least two encryption policys to be encrypted by main control computer, and at least two encryption policys are encrypted Authentication information is respectively as the first authentication information and the second authentication information;
Main control computer sends the first authentication information to controlled machine by direct channel, and main control computer is by the second authentication information Sent by indirect channel to controlled machine, so that controlled machine forms feedback information according to the authentication information of reception.
4. the method for building up of remote control as claimed in claim 3, it is characterised in that the feedback information, which is divided into, to be verified Information and authentication failed information;
The feedback information of transmission of the main control computer based on controlled machine, the step of judging whether to set up the remote control with controlled machine Including:
The feedback information of transmission of the main control computer based on controlled machine, if feedback information is set up and controlled machine to be verified information Remote control;If feedback information is authentication failed information, the remote control with controlled machine is not set up.
5. the method for building up of the remote control as described in Claims 1-4 any one, it is characterised in that the main control computer base Include after the feedback information of the transmission of controlled machine, the step of judging whether to set up the remote control with controlled machine:
If main control computer sets up the remote control with being controlled machine, main control computer sends remote control commands to controlled machine;If main control computer The remote control with controlled machine is not set up, then main control computer does not send remote control commands to controlled machine.
6. a kind of method for building up of remote control, it is characterised in that the method for building up of the remote control comprises the following steps:
Controlled machine receives the authentication information sent at least two channels, at least two channel include direct channel and Indirect channel;
The first authentication information that controlled machine sends direct channel is decrypted, and obtains the first identity information;
The second authentication information that controlled machine sends indirect channel is decrypted, and obtains the second identity information;
First identity information and the second identity information are compared controlled machine;
Controlled machine is based on comparison result formation feedback information and sent to main control computer, so that main control computer judges whether to set up long-range control System.
7. the method for building up of remote control as claimed in claim 6, it is characterised in that the feedback information, which is divided into, is verified information With authentication failed information;
The controlled machine is based on comparison result formation feedback information and sent to main control computer, so that main control computer judges whether to set up long-range The step of control, includes:
If controlled machine compares the first identity information and the second identity information is identical, main control computer authentication is verified by being formed Pass through information;
If controlled machine compares the first identity information and the second identity information is different, checking is unsuccessfully formed to main control computer authentication Failure information.
8. a kind of remote control sets up system, it is characterised in that the system of setting up of the remote control includes communication connection Main control computer and controlled machine;Wherein,
When main control computer starts distance control mode, main control computer generation authentication information;
Main control computer sends authentication information to controlled machine by least two channels;
Controlled machine obtains the authentication information of at least two channels, and the authentication information that at least two channels are obtained is entered Row compares generation feedback information and sent to main control computer;
The feedback information of transmission of the main control computer based on controlled machine, judges whether to set up the remote control with controlled machine.
9. remote control as claimed in claim 8 sets up system, it is characterised in that the feedback information includes being verified information With authentication failed information;
Controlled machine receives the authentication information sent at least two channels, at least two channel include direct channel and Indirect channel;
The first authentication information that controlled machine sends direct channel is decrypted, and obtains the first identity information;
The second authentication information that controlled machine sends indirect channel is decrypted, and obtains the second identity information;
First identity information and the second identity information are compared controlled machine, and the machine that is controlled is based on comparison result formation feedback information Send to main control computer;
Main control computer receives feedback information and determines whether to set up the remote control with controlled machine.
10. a kind of computer-readable recording medium, it is characterised in that be stored with long-range control on the computer-readable recording medium That makes sets up program, and setting up for the remote control realizes that such as claim 1 to 5 or right will when program is executed by processor The step of seeking the method for building up of remote control any one of 6 to 7.
CN201710385990.9A 2017-05-26 2017-05-26 Method and system for establishing remote control and readable storage medium Active CN107147656B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710385990.9A CN107147656B (en) 2017-05-26 2017-05-26 Method and system for establishing remote control and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710385990.9A CN107147656B (en) 2017-05-26 2017-05-26 Method and system for establishing remote control and readable storage medium

Publications (2)

Publication Number Publication Date
CN107147656A true CN107147656A (en) 2017-09-08
CN107147656B CN107147656B (en) 2021-08-03

Family

ID=59779207

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710385990.9A Active CN107147656B (en) 2017-05-26 2017-05-26 Method and system for establishing remote control and readable storage medium

Country Status (1)

Country Link
CN (1) CN107147656B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107685653A (en) * 2017-09-26 2018-02-13 北京普莱德新能源电池科技有限公司 Movable charging equipment
CN108833963A (en) * 2018-05-31 2018-11-16 腾讯科技(上海)有限公司 Method, computer equipment, readable storage medium storing program for executing and the system of display interface picture
CN110187685A (en) * 2019-05-30 2019-08-30 深圳创龙智新科技有限公司 A kind of data transmission method, device, electronic equipment and storage medium
CN110381127A (en) * 2019-07-04 2019-10-25 陈羽 A kind of method for remote controlling computer and system
CN111526192A (en) * 2020-04-15 2020-08-11 Oppo广东移动通信有限公司 Remote control method and device of terminal, terminal and computer readable storage medium
CN113660253A (en) * 2021-08-12 2021-11-16 上海酷栈科技有限公司 Terminal controller, method and system based on remote desktop protocol
CN114945021A (en) * 2018-12-18 2022-08-26 北京百度网讯科技有限公司 Unmanned vehicle remote debugging method, device and system and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7129853B2 (en) * 2003-11-18 2006-10-31 Kyocera Wireless Corp. System and method for remote control of a wireless handset
DE102008006751A1 (en) * 2008-01-30 2009-08-27 Siemens Aktiengesellschaft Remote control e.g. remote control key for car, operating method, involves signaling feedbacks by remote control to user, where feedbacks indicate commands that are not transmitted and/or executed
CN104113552A (en) * 2014-07-28 2014-10-22 百度在线网络技术(北京)有限公司 Platform authorization method, platform server side, application client side and system
CN104113551A (en) * 2014-07-28 2014-10-22 百度在线网络技术(北京)有限公司 Platform authorization method, platform server side, application client side and system
CN104158802A (en) * 2014-07-28 2014-11-19 百度在线网络技术(北京)有限公司 Platform authorization method, platform service side, application client side and system
CN104202370A (en) * 2014-08-19 2014-12-10 广州金山网络科技有限公司 Mobile terminal, remote control method, remote control system, server and remote control end thereof
CN105516964A (en) * 2014-09-25 2016-04-20 中兴通讯股份有限公司 Method and terminal for realizing remote control

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7129853B2 (en) * 2003-11-18 2006-10-31 Kyocera Wireless Corp. System and method for remote control of a wireless handset
DE102008006751A1 (en) * 2008-01-30 2009-08-27 Siemens Aktiengesellschaft Remote control e.g. remote control key for car, operating method, involves signaling feedbacks by remote control to user, where feedbacks indicate commands that are not transmitted and/or executed
CN104113552A (en) * 2014-07-28 2014-10-22 百度在线网络技术(北京)有限公司 Platform authorization method, platform server side, application client side and system
CN104113551A (en) * 2014-07-28 2014-10-22 百度在线网络技术(北京)有限公司 Platform authorization method, platform server side, application client side and system
CN104158802A (en) * 2014-07-28 2014-11-19 百度在线网络技术(北京)有限公司 Platform authorization method, platform service side, application client side and system
CN104202370A (en) * 2014-08-19 2014-12-10 广州金山网络科技有限公司 Mobile terminal, remote control method, remote control system, server and remote control end thereof
CN105516964A (en) * 2014-09-25 2016-04-20 中兴通讯股份有限公司 Method and terminal for realizing remote control

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107685653A (en) * 2017-09-26 2018-02-13 北京普莱德新能源电池科技有限公司 Movable charging equipment
CN108833963A (en) * 2018-05-31 2018-11-16 腾讯科技(上海)有限公司 Method, computer equipment, readable storage medium storing program for executing and the system of display interface picture
CN114945021A (en) * 2018-12-18 2022-08-26 北京百度网讯科技有限公司 Unmanned vehicle remote debugging method, device and system and storage medium
CN114945021B (en) * 2018-12-18 2024-04-09 北京百度网讯科技有限公司 Unmanned vehicle remote debugging method, device, system and storage medium
CN110187685A (en) * 2019-05-30 2019-08-30 深圳创龙智新科技有限公司 A kind of data transmission method, device, electronic equipment and storage medium
CN110381127A (en) * 2019-07-04 2019-10-25 陈羽 A kind of method for remote controlling computer and system
CN111526192A (en) * 2020-04-15 2020-08-11 Oppo广东移动通信有限公司 Remote control method and device of terminal, terminal and computer readable storage medium
CN113660253A (en) * 2021-08-12 2021-11-16 上海酷栈科技有限公司 Terminal controller, method and system based on remote desktop protocol

Also Published As

Publication number Publication date
CN107147656B (en) 2021-08-03

Similar Documents

Publication Publication Date Title
CN107147656A (en) Method for building up, system and the readable storage medium storing program for executing of remote control
CN107613489A (en) A kind of wireless charging method, hotspot equipment, terminal and storage medium
CN107395850A (en) A kind of social communication information guard method, device and computer-readable recording medium
CN107547142A (en) Communication means, device and computer-readable recording medium based on ultrasonic wave
CN107040543A (en) Single-point logging method, terminal and storage medium
CN107517208A (en) Apparatus control method, device and computer-readable recording medium
CN107295501A (en) Information updating method, terminal, server and computer-readable recording medium
CN107395560A (en) Safety check and its initiation, management method, equipment, server and storage medium
CN107728973A (en) Screen sharing method, system, initiating terminal and computer-readable recording medium
CN107122817A (en) Processing method and Quick Response Code terminal based on Quick Response Code
CN107580336A (en) A kind of method for connecting network, terminal and computer-readable recording medium
CN107635234A (en) Wi Fi control methods, mobile terminal and computer-readable recording medium
CN107341067A (en) A kind of keys deactivation processing method, equipment and computer-readable recording medium
CN107343272A (en) A kind of data traffic sharing method and mobile terminal
CN107317680A (en) Labeling method, system and the computer-readable recording medium of secured account numbers
CN107846675A (en) Register method, terminal, registrar and computer-readable recording medium
CN107360139A (en) A kind of mobile terminal, data ciphering method and computer-readable recording medium
CN107635232A (en) A kind of network share method, terminal and computer-readable recording medium
CN107273738A (en) A kind of method of controlling security, terminal and computer-readable recording medium
CN107483556A (en) A kind of remote configuring method, equipment and computer-readable recording medium
CN108012270A (en) A kind of method of information processing, equipment and computer-readable recording medium
CN107682541A (en) Audio control method, mobile terminal and the storage medium of screen prjection
CN108063873A (en) A kind of application program authority configuring method, mobile terminal and storage medium
CN107302526A (en) System interface call method, equipment and computer-readable recording medium
CN107708224A (en) Wi Fi control methods, mobile terminal and computer-readable recording medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant