CN112637195B - Method and device for controlling electronic equipment and electronic equipment - Google Patents

Method and device for controlling electronic equipment and electronic equipment Download PDF

Info

Publication number
CN112637195B
CN112637195B CN202011519330.3A CN202011519330A CN112637195B CN 112637195 B CN112637195 B CN 112637195B CN 202011519330 A CN202011519330 A CN 202011519330A CN 112637195 B CN112637195 B CN 112637195B
Authority
CN
China
Prior art keywords
account
electronic device
information
electronic equipment
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011519330.3A
Other languages
Chinese (zh)
Other versions
CN112637195A (en
Inventor
刘绪森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Hangzhou Co Ltd
Original Assignee
Vivo Mobile Communication Hangzhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Hangzhou Co Ltd filed Critical Vivo Mobile Communication Hangzhou Co Ltd
Priority to CN202011519330.3A priority Critical patent/CN112637195B/en
Publication of CN112637195A publication Critical patent/CN112637195A/en
Application granted granted Critical
Publication of CN112637195B publication Critical patent/CN112637195B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Abstract

The application discloses a method and a device for controlling electronic equipment and the electronic equipment, belongs to the technical field of communication, and can solve the problem of low account security in a scene of logging in the same account in a plurality of electronic equipment. The method comprises the following steps: under the condition that the first electronic equipment and the second electronic equipment simultaneously log in a first account, if a preset condition is met, intercepting target information and forwarding the target information to the first electronic equipment under the condition that the second electronic equipment is detected to send the target information to a target object through the first account; wherein the predetermined condition is satisfied and includes at least one of: and detecting that the target application logged in the first account is in a safe mode, or detecting that the distance between the target user and the second electronic equipment exceeds a preset threshold value.

Description

Method and device for controlling electronic equipment and electronic equipment
Technical Field
The application belongs to the technical field of communication, and particularly relates to a method and a device for controlling electronic equipment, and the electronic equipment.
Background
With the development of the mobile internet, people can log in the same account number in a plurality of electronic devices (such as smart phones or computers) at the same time to realize communication among the electronic devices.
In the prior art, after a user logs in the same account a in a plurality of electronic devices, if the account a receives information sent by the contact 1, the information is synchronized to the plurality of electronic devices.
Therefore, under the scene that the same account number is logged in a plurality of electronic devices, because the plurality of electronic devices synchronously display the information received by the account number, the account number can be falsely used or the information can be leaked, and the safety is low.
Disclosure of Invention
The embodiment of the application aims to provide a method and a device for controlling electronic equipment and the electronic equipment, and the method and the device can solve the problem of low account security in a scene that the same account is logged in a plurality of pieces of electronic equipment.
In order to solve the technical problem, the present application is implemented as follows:
in a first aspect, an embodiment of the present application provides a method for controlling an electronic device, which is applied to a server, and the method includes: under the condition that a first electronic device and a second electronic device simultaneously log in a first account, if a preset condition is met, intercepting target information under the condition that the second electronic device is detected to send the target information to a target object through the first account, and forwarding the target information to the first electronic device; wherein the predetermined condition is satisfied and includes at least one of: and detecting that the target application logging in the first account is in a safe mode, or detecting that the distance between the target user and the second electronic equipment exceeds a preset threshold value.
In a second aspect, an embodiment of the present application provides a method for controlling an electronic device, where the method is applied to a first electronic device, and the method includes: under the condition that the first electronic equipment and the second electronic equipment log in a first account at the same time, receiving target information sent to the first electronic equipment by a server; wherein, the target information is: and the second electronic equipment transmits information to a second account through the first account.
In a third aspect, an embodiment of the present application provides an apparatus for controlling an electronic device, where the apparatus includes: the processing module is used for intercepting target information when the second electronic equipment is detected to send the target information to a target object through the first account if a preset condition is met under the condition that the first electronic equipment and the second electronic equipment log in the first account at the same time; a sending module, configured to forward the target information intercepted by the processing module to the first electronic device; wherein the predetermined condition is satisfied by at least one of: and detecting that the target application logging in the first account is in a safe mode, or detecting that the distance between the target user and the second electronic equipment exceeds a preset threshold value.
In a fourth aspect, an embodiment of the present application provides an apparatus for controlling an electronic device, where the apparatus includes: the receiving module is used for receiving target information sent to the first electronic equipment by the server under the condition that the first electronic equipment and the second electronic equipment log in a first account at the same time; wherein, the target information is: and the second electronic equipment transmits information to a second account through the first account.
In a fifth aspect, an embodiment of the present application provides a server, where the electronic device includes a processor, a memory, and a program or instructions stored in the memory and executable on the processor, and when executed by the processor, the program or instructions implement the steps of the method according to the first aspect.
In a sixth aspect, the present application provides an electronic device, which includes a processor, a memory, and a program or instructions stored on the memory and executable on the processor, and when executed by the processor, the program or instructions implement the steps of the method according to the second aspect.
In a seventh aspect, embodiments of the present application provide a readable storage medium, on which a program or instructions are stored, and when executed by a processor, the program or instructions implement the steps of the method according to the first aspect or the second aspect.
In an eighth aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the method according to the first aspect or the second aspect.
In a ninth aspect, the present application provides a computer program product, which is stored in a non-volatile storage medium and is executed by at least one processor to implement the method according to the first or second aspect.
In this embodiment of the application, when a first electronic device and a second electronic device simultaneously log in a first account, and when the first electronic device and the second electronic device simultaneously log in the first account, if a predetermined condition is satisfied (that is, it is detected that a target application that logs in the first account is in a security mode, and/or it is detected that a distance between a target user and the second electronic device exceeds a predetermined threshold), a server may determine that a potential safety hazard exists in a current first account logged in the second electronic device when it is detected that the second electronic device sends target information to a target object through the first account, so as to intercept the target information, and stop transmission of the target information. Meanwhile, in order to remind a user using the first electronic device that potential safety hazards exist in the first account logged in the current second electronic device, the server forwards target information which is originally required to be sent to the second account to the first electronic device, so that the account is prevented from being falsely used by lawbreakers, and the information safety is improved.
Drawings
Fig. 1 is a diagram of a communication system architecture applied to a method for controlling an electronic device according to an embodiment of the present application;
fig. 2 is a flowchart of a method for controlling an electronic device according to an embodiment of the present application;
fig. 3 is a second flowchart of a method for controlling an electronic device according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of an apparatus for controlling an electronic device according to an embodiment of the present application;
fig. 5 is a second schematic structural diagram of an apparatus for controlling an electronic device according to an embodiment of the present application;
fig. 6 is a third schematic structural diagram of an apparatus for controlling an electronic device according to an embodiment of the present disclosure;
fig. 7 is a fourth schematic structural diagram of an apparatus for controlling an electronic device according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
fig. 9 is a hardware schematic diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application without making any creative effort belong to the protection scope of the present application.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application are capable of operation in sequences other than those illustrated or described herein. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
The method for controlling an electronic device according to the embodiments of the present application is described in detail with reference to the accompanying drawings through specific embodiments and application scenarios thereof.
The method for controlling an electronic device provided in the embodiment of the present application may be applied to a communication system, as shown in fig. 1, where the communication system includes: server 11, first electronic equipment 12 and second electronic equipment 13, wherein:
under the condition that the first electronic device 12 and the second electronic device 13 log in the first account at the same time, if a predetermined condition is met, the server 11 intercepts target information and forwards the target information to the first electronic device 12 under the condition that the second electronic device 13 is detected to send the target information to a target object through the first account. Accordingly, when the first electronic device 12 and the second electronic device 13 log in the first account at the same time, the target information sent to the first electronic device 12 by the server 11 is received.
Wherein the predetermined condition is satisfied by at least one of: and detecting that the target application logged in the first account is in a safe mode, or detecting that the distance between the target user and the second electronic equipment exceeds a preset threshold value.
The server 11 may be one server, a server cluster composed of a plurality of servers, or one cloud computing service center.
In this embodiment of the application, when a first electronic device and a second electronic device simultaneously log in a first account, and when the first electronic device and the second electronic device simultaneously log in the first account, if a predetermined condition is satisfied (that is, it is detected that a target application that logs in the first account is in a security mode, and/or it is detected that a distance between a target user and the second electronic device exceeds a predetermined threshold), a server may determine that a potential security hazard exists in a first account logged in a current second electronic device when it is detected that the second electronic device sends target information to a target object through the first account, so as to intercept the target information, and stop transmission of the target information. Meanwhile, in order to remind a user using the first electronic device that the potential safety hazard exists in the first account logged in the current second electronic device, the server forwards target information which is originally required to be sent to the second account to the first electronic device, so that the account is prevented from being falsely used by lawless persons, and the information safety is improved.
Optionally, in this embodiment of the application, when detecting that the second electronic device 13 sends the target information to the target object through the first account, the process of intercepting the target information by the server 11 includes: intercepting target information when receiving that the second electronic equipment 13 sends the target information to a target object through the first account; or, in case of receiving that the second electronic device 13 inputs information in a dialog box with the target object by changing the first account, intercepting the target information.
Optionally, in this embodiment, when detecting that the second electronic device 13 sends target information to a target object through the first account, the server 11 sends target prompt information to the first electronic device 12, where the target prompt information is used to prompt a user, and the second electronic device 13 sends the target information through the first account. After receiving the target prompt message, the first electronic device 12 may obtain the source of the target message based on the prompt.
Therefore, when other users use the first account in the second electronic device to send information to other electronic devices, the server sends prompt information to the first electronic device after receiving the information, so as to prompt that the user has other users to use the first account currently, improve the safety of the information, and avoid the account being falsely used or causing information leakage.
Optionally, in this embodiment of the application, when receiving that the second account sends the first information to the first account, the server 11 encrypts the first information to obtain second information, and then sends the second information to the first account in the second electronic device 13. Further, after sending the second information to the first account in the second electronic device 13, the server may also send the first information to the first account of the first electronic device.
Therefore, when the second account number sends the first information to the first account number, the server encrypts the first information, the safety of information transmission is improved, and the leakage of privacy information is avoided.
Optionally, in this embodiment of the present application, after receiving the target information sent by the server, the first electronic device 12 receives a first input of a user, and in response to the first input, controls the second electronic device to start a camera for image acquisition. Or receiving a second input of the user, sending a first instruction to the server 11 in response to the second input, where the first instruction is used to instruct the server 11 to send the target information to a second account, that is, to cancel the interception operation, and continue sending the target information to the second account.
Therefore, the first electronic equipment can control other electronic equipment logging in the same account.
An embodiment of the present application provides a method for controlling an electronic device, and as shown in fig. 2, the method for controlling an electronic device may include the following steps:
step 201: under the condition that the first electronic equipment and the second electronic equipment log in the first account at the same time, if the preset condition is met, the server intercepts target information under the condition that the second electronic equipment is detected to send the target information to the target object through the first account.
Step 202: the server forwards the target information to the first electronic device.
In an embodiment of the present application, the meeting of the predetermined condition includes at least one of: and detecting that the target application logged in the first account is in a safe mode, or detecting that the distance between the target user and the second electronic equipment exceeds a preset threshold value.
It is to be understood that the target object may include at least one of: other accounts and other corresponding users of the electronic equipment.
In this embodiment of the application, the target application logging in the first account being in the security mode means: and the current use environment of the target application logged in the first account is safe. It is understood that when an application is in the security mode, the user logging in or using the first account can be considered as the holder of the electronic device, or authorized by the holder to allow the use. The distance between the target user and the second electronic device exceeding the predetermined threshold value is: the target user leaves the range of use of the second electronic device, for example, in the case where the second electronic device is a computer, the user leaves a longer distance from the front of the computer.
Optionally, in this embodiment of the application, in a scenario where multiple electronic devices log in to the same account at the same time, a user may select one or multiple electronic devices from the electronic devices to start a security mode, or directly set a target application corresponding to the account to be the security mode, where a device corresponding to the security mode may be selected by the user. The electronic equipment in the security mode can normally check, receive and send messages through the account, and the information sent by other electronic equipment through the account can be intercepted by the server.
For example, when a target application that logs in a first account in a first electronic device is in a secure mode, other electronic devices that log in the same account as the first electronic device are only in an account login state, cannot contact with other accounts through the account, and cannot receive new information sent by other accounts. That is, when a target application, which logs in a first account in first electronic equipment, is in a secure mode, if a user sends information to other accounts by using the first account in second electronic equipment, a server directly intercepts the information after receiving the information, and transfers all the information to the first electronic equipment.
Optionally, in this embodiment, the server may default that the target application in the electronic device of the specific device type is always in the security mode, for example, after the smartphone logs in the target application with the first account, the smartphone is always in the security mode. Or, when the first electronic device starts the security mode, the first electronic device sends information to the server to inform the server that the security mode is started.
Optionally, in this embodiment of the application, when detecting that the second electronic device sends the target information to the target object through the first account, the process of intercepting the target information by the server includes: intercepting target information when receiving that the second electronic equipment sends the target information to a target object through the first account; or intercepting the target information under the condition that the second electronic equipment inputs information in a dialog box with the target object through the first account number is received.
Specifically, in the embodiment of the present application, some related privacy keywords (which may be set by the user autonomously according to the actual scenario) may be set up on the server, for example: and transferring money, remitting money and the like, and if the server detects that the target information sent to the target object by the first account in the second electronic equipment contains the privacy key words, intercepting the target information and forwarding the target information to the first electronic equipment. When detecting that the input information (namely the target message after being sent) in the dialog box contains the privacy keywords, intercepting the target message after sending the target message.
Optionally, in this embodiment, after the step 201, the method for controlling an electronic device provided in this embodiment may further include the following steps:
step A: under the condition that the first electronic equipment and the second electronic equipment log in the first account at the same time, if a preset condition is met, and under the condition that the second electronic equipment is detected to send target information to a target object through the first account, target prompt information is sent to the first electronic equipment.
The target prompt message is used for prompting a user that the second electronic device sends the target message to a target object through the first account.
It can be understood that in a communication session scenario, the target object may refer to any friend or stranger in the first account, as long as a session can be performed with a user corresponding to the first account.
Further, the target prompting message is also used for prompting the user whether to close the security mode of the target application in the first electronic device, and is also used for prompting that the target message is intercepted by the server. For example, the user 1 logs in the account 1 on the mobile phone and the computer at the same time, and after the user 1 leaves from the computer, the security mode of the mobile phone is turned on, at this time, if other users send information to other accounts by using the account 1 on the computer, the information is directly intercepted by the server when passing through the server, and a prompt message is sent to the mobile phone, for example, "do you just send a message to" XXX "at the computer side, the server has intercepted for you, ask whether to cancel the mobile phone mode? ".
In addition, for the second electronic device, after the second electronic device sends the target information to the target object through the first account, the server sends first prompt information to the second electronic device, where the first prompt information is used to prompt a user of the second electronic device for at least one of the following information: and if the message is failed to be sent, the first electronic equipment exits the safety mode, and inputs decryption information for unlocking.
For example, the user 1 logs in the account 1 on the mobile phone and the computer at the same time, and after the user 1 leaves from the computer, the security mode of the mobile phone is started, at this time, if other users use the account 1 to send information to a target object (other accounts) on the computer, the information is directly intercepted by the server when passing through the server, and "message sending failure, please quit the mobile phone mode on the mobile phone, or input a privacy password for unlocking" is prompted to the computer.
In this embodiment of the application, when a first electronic device and a second electronic device simultaneously log in a first account, if a predetermined condition is satisfied (that is, it is detected that a target application that logs in the first account is in a secure mode, and/or it is detected that a distance between a target user and the second electronic device exceeds a predetermined threshold), a server may determine that a potential safety hazard exists in a current first account logged in the second electronic device when it is detected that the second electronic device sends target information to a target object through the first account, so as to intercept the target information, and stop transmission of the target information. Meanwhile, in order to remind a user using the first electronic device that the potential safety hazard exists in the first account logged in the current second electronic device, the server forwards target information which is originally required to be sent to the second account to the first electronic device, so that the account is prevented from being falsely used by lawless persons, and the information safety is improved.
Optionally, in this embodiment of the present application, the server may perform encryption processing on information sent by an account in the target application, so as to increase security of information transmission.
For example, in a case that the first electronic device and the second electronic device log in the first account at the same time, the method for controlling the electronic device according to the embodiment of the present application may further include the following steps:
step B1: and the server encrypts the first information to obtain second information when receiving the condition that the second account sends the first information to the first account.
And step B2: and the server sends the second information to the first account in the second electronic equipment.
For example, the server may encrypt the first information to obtain second information, send the second information to the first account, and display the second information in the second electronic device. Therefore, the second electronic device serves as an opposite terminal, and the user of the second electronic device needs to decrypt the second information to obtain the first information.
It can be understood that the second information may be information obtained by performing fuzzy processing on keywords (such as numbers, identification numbers, names, and the like), mosaic processing, and the like, and the information received by the second electronic device cannot really acquire information content without decryption, so as to prevent a stranger from peeping at the message.
Further optionally, after the step B2, the technical solution provided in the embodiment of the present application may further include: and sending the first information to a first account of the first electronic equipment.
Further optionally, when receiving that the second account corresponding to the target object sends the first information to the first account, the server may encrypt the first information to obtain the second information when the target application, which logs in the first account in the first electronic device, is in the secure mode.
For example, in a scenario where multiple electronic devices log in to the same account at the same time, a user may select one or more electronic devices to start a security mode, the accounts logged in a target application in the electronic devices in the security mode may all view, receive, and send messages normally, and the accounts logged in the target applications in other electronic devices may need to perform corresponding security operations to view messages through the accounts.
Therefore, the server carries out security assessment on all electronic equipment logging in the first account, and sends information in different information transmission modes according to different security levels, so that the electronic equipment with high security can directly check the information under the condition of avoiding the privacy information from being leaked.
An embodiment of the present application provides a method for controlling an electronic device, which is applied to a first electronic device, and as shown in fig. 3, the method for controlling the electronic device may include the following steps:
step 301: under the condition that the first electronic device and the second electronic device log in the first account at the same time, the first electronic device receives target information sent to the first electronic device by the server.
Wherein, the target information is: and the second electronic equipment transmits the information to the target object through the first account. Further, the target information may be: and the server forwards the target information to the first electronic equipment when receiving the target information sent by the second electronic equipment.
Optionally, in this embodiment of the application, in a case that the first electronic device and the second electronic device log in to the first account at the same time, the method for controlling the electronic device provided in this embodiment of the application may further include the following steps:
step 302: the first electronic equipment receives target prompt information sent to the first electronic equipment by the server.
The target prompting information is used for prompting a user that second electronic equipment sends target information to a target object through a first account.
Optionally, in this embodiment of the present application, the method for controlling an electronic device provided in this embodiment of the present application may further include the following step C1 or step C2:
step C1: the first electronic device receives a first input of a user.
And step C2: and the first electronic equipment responds to the first input and controls the second electronic equipment to start the camera for image acquisition.
It can be understood that, after receiving the first input, the first electronic device sends a control instruction to the second electronic device to instruct the second electronic device to start the camera for image acquisition, so as to acquire the person using the second electronic device at the moment, thereby ensuring privacy and safety.
Optionally, in this embodiment of the present application, the method for controlling an electronic device provided in this embodiment of the present application may further include the following step D21 or step D22:
step D1: the first electronic device receives a second input from the user.
Step D2: and the first electronic equipment responds to the second input and sends a first instruction to the server, wherein the first instruction is used for instructing the server to send the target information to the second account.
It can be understood that the first instruction is further configured to instruct the server to cancel the interception operation, and continue to send the target information to the second account. That is, when the target message does not contain some private content, or the current user is known as a safe user (acquaintance), the authority can be turned on, and the user who currently uses the second electronic device is allowed to perform a series of operations through the first account.
Further, after receiving the target prompt information, the first electronic device may first control the second electronic device to start the camera to acquire a current specific environment of the second electronic device, that is, to acquire a currently used person image, and if it is determined that a user of the second electronic device is a safe user, send a first instruction to the server to instruct the server not to intercept the target information; if the user of the second electronic device is determined to be an illegal user, recording the appearance of the illegal user, and keeping interception (operation through the first account is prohibited), so that the hidden danger that the privacy of the user is not stolen is greatly reduced.
In one example, when the first electronic device is in the security mode, the first electronic device automatically sends a first instruction to the server to instruct the server not to intercept the target information.
In addition, under the condition that the first electronic device is in a security mode, the first electronic device may set a part of privacy account number, and when the first electronic device contacts with the privacy account number through the first account number, information between the first account number and the privacy account number is not displayed on the second electronic device. If the information between the first account and the private account needs to be checked in the second electronic device, the user can perform corresponding security operation to check the message. For example, a security password set by the user on the mobile phone is output.
It should be noted that, in the method for controlling an electronic device provided in the embodiment of the present application, the execution main body may be an apparatus for controlling an electronic device (the apparatus may be an electronic device or a server), or a control module in the apparatus for controlling an electronic device, which is used for executing the method for loading a control electronic device. In the embodiment of the present application, a method for controlling an electronic device, which is provided in the embodiment of the present application, is described by taking a server or an electronic device as an example to execute the method for controlling the electronic device.
An embodiment of the present application provides an apparatus for controlling an electronic device, as shown in fig. 4, the apparatus includes: a processing module 401 and a sending module 402, wherein:
a processing module 401, configured to, when a first electronic device and a second electronic device log in a first account at the same time, if a predetermined condition is satisfied, intercept target information when it is detected that the second electronic device sends the target information to a target object through the first account; a sending module 402, configured to forward the target information intercepted by the processing module 401 to the first electronic device; wherein the predetermined condition is satisfied by at least one of: and detecting that the target application logged in the first account is in a safe mode, or detecting that the distance between the target user and the second electronic equipment exceeds a preset threshold value.
Optionally, the processing module 401 is further configured to, when receiving that a second account sends first information to the first account, encrypt the first information to obtain second information; the sending module 402 is further configured to send the second information obtained by the processing module 401 to the first account in the second electronic device.
Optionally, the sending module 402 is further configured to send the first information to the first account of the first electronic device.
In the apparatus for controlling an electronic device provided in this embodiment of the present application, when a first electronic device and a second electronic device simultaneously log in a first account, if a predetermined condition is satisfied (that is, it is detected that a target application that logs in the first account is in a secure mode, and/or it is detected that a distance between a target user and the second electronic device exceeds a predetermined threshold), the apparatus for controlling an electronic device confirms that a potential safety hazard exists in the first account that is logged in the second electronic device currently when it is detected that the second electronic device sends target information to a target object through the first account, so as to intercept the target information, and stop transmission of the target information. Meanwhile, in order to remind a user using the first electronic device that the potential safety hazard exists in the first account logged in the second electronic device currently, the device for controlling the electronic device can forward target information which is originally required to be sent to the second account to the first electronic device, so that the account is prevented from being falsely used by lawless persons, and the information safety is improved.
An embodiment of the present application provides an apparatus for controlling an electronic device, as shown in fig. 5, the apparatus includes: a receiving module 501, wherein:
a receiving module 501, configured to receive target information sent by a server to a first electronic device when the first electronic device and a second electronic device log in a first account at the same time; wherein, the target information is: and the second electronic equipment transmits information to the second account through the first account.
Optionally, as shown in fig. 6, the apparatus further includes: a processing module 502, wherein: the receiving module 501 is further configured to receive a first input of a user; the processing module 502 is further configured to, in response to the first input received by the receiving module 501, control the second electronic device to start the camera for image acquisition.
Optionally, as shown in fig. 7, the apparatus further includes: a sending module 503, wherein: the receiving module 501 is further configured to receive a second input of the user; a sending module 503, configured to send a first instruction to the server in response to the second input received by the receiving module 501, where the first instruction is used to instruct the server to send the target information to the second account.
In the apparatus for controlling an electronic device provided in the embodiment of the present application, when a first electronic device and a second electronic device log in to a first account at the same time, a server forwards target information that is originally required to be sent to the second account to the first electronic device. Therefore, after the device for controlling the electronic equipment receives the target information, the device can remind a user using the first electronic equipment that potential safety hazards exist in the first account logged in the current second electronic equipment, so that the account is prevented from being falsely used by lawbreakers, and the safety of the information is improved.
The apparatus for controlling the electronic device may be an apparatus, or may be a component, an integrated circuit, or a chip in the electronic device. The device can be mobile electronic equipment or non-mobile electronic equipment. By way of example, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine, a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
The apparatus for controlling an electronic device in the embodiment of the present application may be an apparatus having an operating system. The operating system may be an Android operating system (Android), an iOS operating system, or other possible operating systems, which is not specifically limited in the embodiments of the present application.
The apparatus for controlling an electronic device provided in the embodiment of the present application can implement each process implemented by the apparatus for controlling an electronic device in the method embodiment of fig. 2 or fig. 3, and is not described herein again to avoid repetition.
The beneficial effects of the various implementation manners in this embodiment may specifically refer to the beneficial effects of the corresponding implementation manners in the above method embodiments, and are not described herein again to avoid repetition.
Optionally, an electronic device is further provided in this embodiment of the present application, as shown in fig. 8, and includes a processor 801, a memory 802, and a program or an instruction stored in the memory 802 and executable on the processor 801, for example, when the electronic device is a server, the program or the instruction is executed by the processor 801 to implement the processes of the corresponding method embodiment in fig. 2, and can achieve the same technical effect. When the electronic device is the first electronic device, the program or the instructions are executed by the processor 801 to implement the processes of the embodiment of the method corresponding to fig. 3, and the same technical effects can be achieved.
It should be noted that the electronic devices in the embodiments of the present application include the mobile electronic devices and the non-mobile electronic devices described above.
Fig. 9 is a schematic diagram of a hardware structure of an electronic device implementing an embodiment of the present application. The electronic device is a first electronic device, and the electronic device 100 includes but is not limited to: radio frequency unit 101, network module 102, audio output unit 103, input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, memory 109, and processor 110.
Those skilled in the art will appreciate that the electronic device 100 may further comprise a power source (e.g., a battery) for supplying power to various components, and the power source may be logically connected to the processor 110 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system. The electronic device structure shown in fig. 9 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description is not repeated here.
The radio frequency unit 101 is configured to receive target information sent by a server to a first electronic device when the first electronic device and a second electronic device log in a first account at the same time; wherein, the target information is: and the second electronic equipment transmits information to the second account through the first account.
Optionally, the radio frequency unit 101 is further configured to receive a first input of a user; the processor 110 is further configured to control the second electronic device to start the camera for image acquisition in response to the first input received by the radio frequency unit 101.
Optionally, the radio frequency unit 101 is further configured to receive a second input of the user; the processor 110 is configured to send a first instruction to the server in response to a second input received by the radio frequency unit 101, where the first instruction is used to instruct the server to send the target information to the second account.
In the first electronic device provided in the embodiment of the present application, when the first electronic device and the second electronic device log in to the first account at the same time, the server forwards target information, which is originally required to be sent to the second account, to the first account in the first electronic device. Therefore, after the first electronic device receives the target information, the first electronic device can remind a user using the first electronic device that potential safety hazards exist in the first account logged in the current second electronic device, so that the account is prevented from being falsely used by lawbreakers, and the safety of the information is improved.
It should be understood that, in the embodiment of the present application, the input Unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, and the Graphics Processing Unit 1041 processes image data of a still picture or a video obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The display unit 106 may include a display panel 1061, and the display panel 1061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 107 includes a touch panel 1071 and other input devices 1072. The touch panel 1071 is also referred to as a touch screen. The touch panel 1071 may include two parts of a touch detection device and a touch controller. Other input devices 1072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein. The memory 109 may be used to store software programs as well as various data including, but not limited to, application programs and an operating system. The processor 110 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
An embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the method embodiment of the method for controlling an electronic device, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and so on.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to execute a program or an instruction to implement each process of the method embodiment of the method for controlling an electronic device, and the same technical effect can be achieved, and in order to avoid repetition, details are not repeated here.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
Embodiments of the present application provide a computer program product, where the program product is stored in a non-volatile storage medium, and the program product is executed by at least one processor to implement the processes of the method embodiment of the above method for controlling an electronic device, and can achieve the same technical effects, and in order to avoid repetition, details are not repeated here.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a component of' 8230; \8230;" does not exclude the presence of another like element in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the description of the foregoing embodiments, it is clear to those skilled in the art that the method of the foregoing embodiments may be implemented by software plus a necessary general hardware platform, and certainly may also be implemented by hardware, but in many cases, the former is a better implementation. Based on such understanding, the technical solutions of the present application or portions thereof that contribute to the prior art may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the present embodiments are not limited to those precise embodiments, which are intended to be illustrative rather than restrictive, and that various changes and modifications may be effected therein by one skilled in the art without departing from the scope of the appended claims.

Claims (13)

1. A method for controlling an electronic device, applied to a server, the method comprising:
under the condition that a first electronic device and a second electronic device log in a first account at the same time, if a preset condition is met, intercepting target information under the condition that the second electronic device is detected to send the target information to a target object through the first account, and forwarding the target information to the first electronic device;
wherein the satisfaction of the predetermined condition comprises at least one of: and detecting that the target application logged in the first account is in a safe mode, or detecting that the distance between the target user and the second electronic equipment exceeds a preset threshold value.
2. The method of claim 1, further comprising:
when first information is sent to the first account by receiving a second account corresponding to the target object, encrypting the first information to obtain second information;
and sending the second information to the first account in the second electronic equipment.
3. The method of claim 2, wherein after sending the second information to the first account in the second electronic device, the method further comprises:
and sending the first information to the first account of the first electronic equipment.
4. A method for controlling an electronic device, applied to a first electronic device, the method comprising:
under the condition that the first electronic equipment and the second electronic equipment log in a first account at the same time, if a preset condition is met, target information sent to the first electronic equipment by a server is received;
wherein the target information is: the second electronic equipment sends information to a target object through the first account;
wherein the satisfaction of the predetermined condition comprises at least one of: and detecting that the target application logged in the first account is in a safe mode, or detecting that the distance between the target user and the second electronic equipment exceeds a preset threshold value.
5. The method of claim 4, wherein after receiving the target information sent by the server to the first electronic device, the method further comprises:
receiving a first input of a user;
and responding to the first input, and controlling the second electronic equipment to start a camera for image acquisition.
6. The method of claim 4, wherein after receiving the target information sent by the server to the first electronic device, the method further comprises:
receiving a second input of the user;
and responding to the second input, and sending a first instruction to the server, wherein the first instruction is used for instructing the server to send the target information to a second account.
7. An apparatus for controlling an electronic device, the apparatus comprising:
the processing module is used for intercepting target information when the second electronic equipment is detected to send the target information to a target object through the first account if a preset condition is met under the condition that the first electronic equipment and the second electronic equipment log in the first account at the same time;
the sending module is used for forwarding the target information intercepted by the processing module to the first electronic equipment;
wherein the satisfaction of the predetermined condition comprises at least one of: and detecting that the target application logged in the first account is in a safe mode, or detecting that the distance between the target user and the second electronic equipment exceeds a preset threshold value.
8. The device according to claim 7, wherein the processing module is further configured to, in a case that a second account is received to send first information to the first account, encrypt the first information to obtain second information;
the sending module is further configured to send the second information obtained by the processing module to the first account in the second electronic device.
9. The apparatus of claim 8, wherein the sending module is further configured to send the first information to the first account of the first electronic device.
10. An apparatus for controlling an electronic device, the apparatus comprising:
the receiving module is used for receiving target information sent to the first electronic equipment by the server if a preset condition is met under the condition that the first electronic equipment and the second electronic equipment log in a first account at the same time;
wherein the target information is: the second electronic equipment sends information to a target object through the first account;
wherein the satisfaction of the predetermined condition comprises at least one of: and detecting that a target application logged in the first account is in a safety mode, or detecting that the distance between a target user and the second electronic equipment exceeds a preset threshold value.
11. The apparatus of claim 10, further comprising: a processing module, wherein:
the receiving module is further used for receiving a first input of a user;
the processing module is further configured to control the second electronic device to start a camera for image acquisition in response to the first input received by the receiving module.
12. The apparatus of claim 10, further comprising: a sending module, wherein:
the receiving module is further used for receiving a second input of the user;
the sending module is further configured to send a first instruction to the server in response to the second input received by the receiving module, where the first instruction is used to instruct the server to send the target information to a second account.
13. An electronic device, comprising a processor, a memory and a program or instructions stored on the memory and executable on the processor, which program or instructions, when executed by the processor, carry out the steps of the method of controlling an electronic device according to any one of claims 1 to 3 or claims 4 to 6.
CN202011519330.3A 2020-12-21 2020-12-21 Method and device for controlling electronic equipment and electronic equipment Active CN112637195B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011519330.3A CN112637195B (en) 2020-12-21 2020-12-21 Method and device for controlling electronic equipment and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011519330.3A CN112637195B (en) 2020-12-21 2020-12-21 Method and device for controlling electronic equipment and electronic equipment

Publications (2)

Publication Number Publication Date
CN112637195A CN112637195A (en) 2021-04-09
CN112637195B true CN112637195B (en) 2022-11-11

Family

ID=75320724

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011519330.3A Active CN112637195B (en) 2020-12-21 2020-12-21 Method and device for controlling electronic equipment and electronic equipment

Country Status (1)

Country Link
CN (1) CN112637195B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114785838B (en) * 2022-03-30 2024-01-26 青岛海尔科技有限公司 Control method and device of equipment, storage medium and electronic device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102025648A (en) * 2009-09-16 2011-04-20 腾讯科技(深圳)有限公司 Instant messaging method and server
CN103118032A (en) * 2013-03-01 2013-05-22 北京奇艺世纪科技有限公司 Method, terminals and server for synchronization of terminal login accounts
CN105306407A (en) * 2014-05-29 2016-02-03 中国移动通信集团云南有限公司 User account number login method and device
CN109413006A (en) * 2017-08-17 2019-03-01 阿里巴巴集团控股有限公司 Processing method, device, equipment and the machine readable media of account
CN109981747A (en) * 2019-03-04 2019-07-05 深圳绿米联创科技有限公司 Apparatus control method, device, electronic equipment and storage medium
CN110336720A (en) * 2019-06-29 2019-10-15 华为技术有限公司 Apparatus control method and equipment
CN110738499A (en) * 2019-09-03 2020-01-31 平安科技(深圳)有限公司 User identity authentication method and device, computer equipment and storage medium

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7003571B1 (en) * 2000-01-31 2006-02-21 Telecommunication Systems Corporation Of Maryland System and method for re-directing requests from browsers for communication over non-IP based networks
US7689696B2 (en) * 2000-01-31 2010-03-30 Telecommunication Systems, Inc. System and method for re-directing requests from browsers for communications over non-IP based networks
CN104853030B (en) * 2015-03-17 2017-06-30 广东欧珀移动通信有限公司 The method and mobile terminal of a kind of information processing
KR102341162B1 (en) * 2015-08-12 2021-12-21 삼성전자주식회사 Apparatus and method for using commonly thereof
CN106302130B (en) * 2016-09-14 2019-07-05 广东欧珀移动通信有限公司 A kind of method and device that chat message difference is synchronous
CN106385415B (en) * 2016-09-14 2019-12-31 Oppo广东移动通信有限公司 Information security control method and device and terminal
CN108132812A (en) * 2017-12-21 2018-06-08 维沃移动通信有限公司 A kind of method of data synchronization, mobile terminal and server
CN108134789B (en) * 2017-12-21 2020-03-17 北京深思数盾科技股份有限公司 Method for synchronizing data between devices through cloud and cloud server
CN111694970A (en) * 2019-03-13 2020-09-22 阿里巴巴集团控股有限公司 Data processing method, device and system
CN111523095B (en) * 2020-03-31 2024-03-15 华为技术有限公司 Cross-equipment interaction method and terminal equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102025648A (en) * 2009-09-16 2011-04-20 腾讯科技(深圳)有限公司 Instant messaging method and server
CN103118032A (en) * 2013-03-01 2013-05-22 北京奇艺世纪科技有限公司 Method, terminals and server for synchronization of terminal login accounts
CN105306407A (en) * 2014-05-29 2016-02-03 中国移动通信集团云南有限公司 User account number login method and device
CN109413006A (en) * 2017-08-17 2019-03-01 阿里巴巴集团控股有限公司 Processing method, device, equipment and the machine readable media of account
CN109981747A (en) * 2019-03-04 2019-07-05 深圳绿米联创科技有限公司 Apparatus control method, device, electronic equipment and storage medium
CN110336720A (en) * 2019-06-29 2019-10-15 华为技术有限公司 Apparatus control method and equipment
CN110738499A (en) * 2019-09-03 2020-01-31 平安科技(深圳)有限公司 User identity authentication method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN112637195A (en) 2021-04-09

Similar Documents

Publication Publication Date Title
US10643000B2 (en) Access control method and terminal device
US10375116B2 (en) System and method to provide server control for access to mobile client data
US11934505B2 (en) Information content viewing method and terminal
CN111193695B (en) Encryption method and device for third party account login and storage medium
US11488234B2 (en) Method, apparatus, and system for processing order information
US9635018B2 (en) User identity verification method and system, password protection apparatus and storage medium
CN103095457A (en) Login and verification method for application program
CN104954126B (en) Sensitive operation verification method, device and system
CN111563251B (en) Encryption method and related device for private information in terminal equipment
CN108881103B (en) Network access method and device
CN104270353B (en) information security transmission method and system, receiving terminal and sending terminal
CN108475304B (en) Method and device for associating application program and biological characteristics and mobile terminal
CN112769856B (en) Application account sharing method and device and electronic equipment
CN104933343A (en) Secrecy method and apparatus of application program, and electronic device
CN112217890B (en) Remote assistance method, device, computer equipment and storage medium
WO2015078274A1 (en) Devices and methods for password storage
CN112887922B (en) Message sending method and electronic equipment
CN112637195B (en) Method and device for controlling electronic equipment and electronic equipment
US20240094868A1 (en) Display Control Method and Apparatus, Electronic Device, and Medium
CN114697007B (en) Key management method, corresponding device and system
CN111565382B (en) Transmission method and electronic equipment
CN112987942B (en) Method, device and system for inputting information by keyboard, electronic equipment and storage medium
CN113193956B (en) Account information processing method and device
CN113360863A (en) Operation execution method and device, electronic equipment and medium
CN112785312A (en) Information sharing method and device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant