CN116743496A - Device remote operation method, device, computer device and storage medium - Google Patents

Device remote operation method, device, computer device and storage medium Download PDF

Info

Publication number
CN116743496A
CN116743496A CN202310960899.0A CN202310960899A CN116743496A CN 116743496 A CN116743496 A CN 116743496A CN 202310960899 A CN202310960899 A CN 202310960899A CN 116743496 A CN116743496 A CN 116743496A
Authority
CN
China
Prior art keywords
target
page
information
equipment
remote
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310960899.0A
Other languages
Chinese (zh)
Inventor
程博
杨传辉
王通
罗谷才
李萧逸
马宁
王建武
董梁
廖家运
唐文南
朱诗兰
刘国平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202310960899.0A priority Critical patent/CN116743496A/en
Publication of CN116743496A publication Critical patent/CN116743496A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Abstract

The present application relates to a device remote operation method, apparatus, computer device, storage medium and computer program product. The method comprises the following steps: in the case of logging in a target application based on a target account, displaying device identifiers of candidate devices associated with the target account in a device management page of the target application; responding to the triggering operation of the device identification of the target device in the candidate devices, and displaying a management list of the target device, wherein the management list comprises remote operation items; responding to a selection operation for a target remote operation item triggered on the management list, and initiating a first control request to the target equipment; and when response information returned by the target equipment in response to the first control request is received, displaying an operation page aiming at the target remote operation item. By adopting the method, the remote operation efficiency of the equipment can be improved.

Description

Device remote operation method, device, computer device and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and apparatus for remotely operating a device, a computer device, and a storage medium.
Background
With the rapid development of the internet and information technology, the remote control technology of the equipment based on the same operating system is widely applied to various enterprises and organizations, including industries such as IT, education, medical treatment, manufacturing and the like.
However, although the remote operation of the device brings many convenience, the current process of implementing the remote operation of the device is complicated, for example, when a certain device needs to be remotely operated, the device identification code and the corresponding verification code of the device need to be input and verified, the remote operation of the device can be implemented only after the verification is passed, when a plurality of devices needing to be remotely operated are available, the conditions of confusion of different device identification codes or confusion of verification codes and the like easily occur, the input of the device identification code and the verification code needs to be performed for many times and the verification is attempted, and finally, the remote operation efficiency of the device is low.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a device remote operation method, apparatus, computer device, and storage medium capable of improving the device remote operation efficiency.
In a first aspect, the present application provides a method of remotely operating a device. The method comprises the following steps:
In the case of logging in a target application based on a target account, displaying device identifiers of candidate devices associated with the target account in a device management page of the target application;
responding to the triggering operation of the device identification of the target device in the candidate devices, and displaying a management list of the target device, wherein the management list comprises remote operation items;
responding to a selection operation for a target remote operation item triggered on the management list, and initiating a first control request to the target equipment;
and when response information returned by the target equipment in response to the first control request is received, displaying an operation page aiming at the target remote operation item.
In a second aspect, the application also provides a remote operation device of the equipment. The device comprises:
the device management page display module is used for displaying device identifiers of candidate devices associated with a target account in a device management page of a target application under the condition that the target application is logged in based on the target account;
a management list display module, configured to display a management list including remote operation items of a target device in the candidate devices in response to a trigger operation of a device identifier of the target device;
A control request sending module, configured to initiate a first control request to the target device in response to a selection operation for a target remote operation item triggered on the management list;
and the operation page display module is used for displaying an operation page aiming at the target remote operation item when receiving response information returned by the target equipment in response to the first control request.
In a third aspect, the present application also provides a computer device. The computer device comprises a memory and a processor, wherein the memory stores a computer program, and the processor realizes the steps of the remote operation method of the device when executing the computer program.
In a fourth aspect, the present application also provides a computer-readable storage medium. The computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements the steps of the device remote operation method described above.
In a fifth aspect, the present application also provides a computer program product. The computer program product comprises a computer program which, when executed by a processor, implements the steps of the device remote operation method described above.
According to the remote operation method, the device, the computer equipment, the storage medium and the computer program product of the equipment, the equipment is bound to the target account number, the requirement that a user memorizes each equipment identification code can be eliminated, equipment management is more centralized and convenient, no matter how many pieces of equipment are required to be managed by the user, the target application can be logged in only by memorizing own target account number information, equipment identifications of candidate equipment associated with the target account number are listed in an equipment management page of the target application in a clear and readable mode, equipment which can be remotely operated can be carried out, the candidate equipment comprises terminal equipment of different operation systems, the user can easily find and select equipment which needs to be remotely operated, a management list of the target equipment which comprises remote operation items is displayed in response to the triggering operation of the equipment identifications of the target equipment in the candidate equipment, the user can select the operation which needs to be carried out on the target equipment, a control request is initiated to the target equipment in response to the selection operation which is triggered on the management list, and when response information which is returned by the target equipment in response to the control request is received, the operation page which aims at the target equipment is displayed, and the remote operation efficiency and convenience of the equipment are improved.
Drawings
FIG. 1 is an application environment diagram of a method of remote operation of a device in one embodiment;
FIG. 2 is a flow diagram of a method of remotely operating a device in one embodiment;
FIG. 3 is a schematic diagram of target account login in a target application in one embodiment;
FIG. 4 is a schematic diagram of a device management page of a target application in one embodiment;
FIG. 5 is a schematic diagram of a management list of target devices in one embodiment;
FIG. 6 is a schematic diagram of remote operation items of a target device in one embodiment;
FIG. 7 is a schematic diagram of a system desktop remote in one embodiment;
FIG. 8 is a schematic diagram of a remote system login page in one embodiment;
FIG. 9 is a schematic diagram of a lock screen hint page of a remote lock screen in one embodiment;
FIG. 10 is a schematic diagram of a shutdown hint page for remote shutdown in one embodiment;
FIG. 11 is a schematic diagram of a remote shutdown hint page in another embodiment;
FIG. 12 is a schematic diagram of an information verification page in one embodiment;
FIG. 13 is a schematic diagram of an information verification page in another embodiment;
FIG. 14 is a schematic diagram of a system desktop in another embodiment;
FIG. 15 is a diagram of a lock screen validation page in one embodiment;
FIG. 16 is a diagram of a shutdown validation page in one embodiment;
FIG. 17 is a flow diagram of a remote configuration step in one embodiment;
FIG. 18 is a diagram of a lock screen password authorization page in one embodiment;
FIG. 19 is a diagram of a fixed password entry page in one embodiment;
FIG. 20 is a schematic diagram of a path configuration page in one embodiment;
FIG. 21 is a schematic diagram of a device management page in another embodiment;
FIG. 22 is a schematic diagram of a risk information list in one embodiment;
FIG. 23 is a schematic diagram of a risk handling page in one embodiment;
FIG. 24 is a diagram of resource processing controls in one embodiment;
FIG. 25 is a schematic diagram of a device management page in another embodiment;
FIG. 26 is an application environment diagram of a method of remote operation of a device in another embodiment;
FIG. 27 is a system block diagram of a method of remote operation of a device in one embodiment;
FIG. 28 is a timing diagram of a method of remote operation of a device in one embodiment;
FIG. 29 is a block diagram of a remote operation device of the apparatus in one embodiment;
FIG. 30 is a block diagram showing the construction of a remote operation device of the apparatus in another embodiment;
fig. 31 is an internal structural view of the computer device in one embodiment.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
The remote operation method of the equipment provided by the embodiment of the application can be applied to an application environment shown in figure 1. The terminal device 102, the terminal device 104, the terminal device 106, and the terminal device 108 respectively communicate with the server 110 through a network, each device may be associated with the same target account, the foregoing device remote operation method may be executed by the terminal device, the terminal device performing the device remote operation method may also be referred to as a local device, and the corresponding target device remotely controlled through the device remote operation method may also be referred to as a remote device; taking the terminal device 102 as an example, the above device remote operation method is described, where the device 102 displays, in a device management page of a target application, device identifiers of candidate devices associated with the target account when logging in the target application based on the target account; in response to a trigger operation of a device identification of a target device (e.g., terminal device 104) in the candidate devices, displaying a management list of the target device including remote operation items; responding to a selection operation for a target remote operation item triggered on the management list, and initiating a control request to target equipment; and when response information returned by the target equipment in response to the control request is received, displaying an operation page aiming at the target remote operation item.
The terminal device may be, but not limited to, various desktop computers, notebook computers, smart phones, tablet computers, internet of things devices and portable wearable devices, and the internet of things devices may be smart speakers, smart televisions, smart air conditioners, smart vehicle devices and the like. The portable wearable device may be a smart watch, smart bracelet, headset, or the like. The server 110 may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDNs, basic cloud computing services such as big data and artificial intelligence platforms, and the like. The terminal device and the server 110 may be directly or indirectly connected through wired or wireless communication, and the present application is not limited herein.
In one embodiment, as shown in fig. 2, a method for remotely operating a device is provided, and the method is applied to the terminal device in fig. 1 for illustration, and includes the following steps:
s202, when a target application is logged in based on a target account, displaying the device identification of the candidate device associated with the target account in a device management page of the target application.
The target account number is an account number for managing associated candidate devices, and specifically may be an account number of a target application or a social account number, where the social account number refers to an account registered and used by a user on a social network or a social media platform, and is used for identifying and managing various activities of the user on the platforms.
The target application is an application for remote operation of the device, such application enabling a user to manipulate other devices from a remote location.
The device management page is used for managing viewing, controlling, configuring and the like of candidate devices associated with the target account, and can also add new devices associated with the target account or delete the associated devices and the like.
The candidate device is a device associated with the target account and capable of managing the target account, and specifically comprises terminal devices of different operating systems, wherein the operating systems are system software for managing computer hardware and software resources and providing various system services for software applications, and specifically comprise operating systems of personal computers such as Microsoft Windows, apple MacOS, linux and the like, and operating systems of mobile devices such as Android, iOS and the like. It is understood that the terminal device belongs to one of the candidate devices.
The device identifier is a character string or a number for identifying a specific device, can be automatically generated based on the brand and model of the device when being associated, can be customized by a user according to requirements, and can quickly distinguish different candidate devices by customizing the device identifier, so that when more candidate devices are available, a target device needing remote operation can be quickly determined, for example, when three mobile phone devices are available, the device identifiers of the three mobile phone devices can be respectively set as a mobile phone, a mobile phone of a parent and a mobile phone of a child, and thus, when the mobile phone of the parent is needed remotely, the mobile phone device can be quickly selected.
Specifically, after the target account successfully logs in the target application, when the terminal device detects the device management operation on the target account in the main interface of the target application, a device management page of the target application is displayed, the device identification of each candidate device associated with the target account is displayed in the device management page, and in addition, a device adding control can be displayed in the device management page, and when the device adding control is triggered, the terminal device can enter the device adding page to add new devices so as to be associated with the target account.
Fig. 3 (a) shows a main interface of a target application in one embodiment, where the target application is a security management application "XX computer manager", and when the application has not logged in an account, the device responds to a triggering operation of the account login control 302, and displays a target account login page 304 shown in fig. 3 (B), through which the login information of the target account can be obtained through the graphic code displayed in the target account login page, and after the login information of the target account is verified, the target account can successfully log in the target application, as shown in fig. 3 (C), after the target account successfully logs in the target application, a login state control 306 of the target account can be displayed in the main interface of the target application, and in the figure, the account name of the target account is "CB manager". When the device detects that the login state control 306 of the target account in fig. 3 (C) triggers an operation, a device management page of the target application shown in fig. 4 is displayed, the device management page displays device identifications of candidate devices associated with the target account, for example, a computer 1 (Windows system), a mobile phone 1 (iOS system) and a computer 2 (Windows system) in fig. 4 are all device identifications of candidate devices associated with the target account of a social name "CB", wherein the computer 1 is a terminal device, in addition, the device management page of the target application may also display a terminal device management page capable of managing the terminal device, the terminal device management page displays device information 402 of the terminal device, a remote configuration list 404 and an image migration list 406, the local management list displays therein device identifications of controlled switch controls 408, wherein the device information of the terminal device such as time when the terminal device is associated with the target account, device hardware information and the like, the controlled switch controls 408 are used for allowing remote setting or not, the image migration list displays a path configuration control 410, and the path configuration control 410 is used for configuring a path of a migration file; in addition, the device management page can also display a remote operation guide so that a user can consult and learn to use the target application to remotely operate the device; in addition, device adding controls such as adding mobile phones and adding computers can be displayed in the device management page, and new devices can be associated with the target account by triggering the device adding controls.
S204, in response to the triggering operation of the device identification of the target device in the candidate devices, a management list of the target device including remote operation items is displayed.
Wherein the management list is used for listing items that can be managed or operated by the target device, the items that can be managed or operated can be referred to as remote operation items, including desktop control items, file transfer items, remote lock screen items, remote shutdown items, remote restart items, remote location items, remote network setting items, remote desktop setting items, and the like,
desktop control items and file transfer items belong to the type of remote operation control, which refers to operations that require active execution by a user and involve direct operations or control of a target device, which are often complex and involve deeper device controls, wherein the desktop control items allow the user to view and manipulate the system desktop of the target device as if operating in front of the target device, and the file transfer items allow the user to transfer files between the terminal device and the remote device, thereby copying or backing up data.
The remote shutdown item, the remote restart item, the remote positioning item, the remote network setting item and the remote desktop setting item belong to a remote shortcut control type, and the remote shortcut control is an operation of performing some simple commands or settings on the target device, such as a system command, device settings and the like, wherein the system command allows a user to rapidly perform some system-level operations on the target device, such as remote screen locking, remote shutdown, remote restart, remote positioning and the like; the device settings allow the user to quickly change some of the settings of the target device, such as network settings, screen settings, etc.
Specifically, the terminal device may obtain, in the device management page of the target application, the login state of the target account number in the target application of each candidate device from the server of the target application while displaying the device identifier of the candidate device associated with the target account number, and display the obtained login state of each candidate device in the device management page, where the login state of the candidate device in which the target account number is logged in the target application may be displayed as an online state, the login state of the candidate device in which the target account number is not logged in the target application may not be displayed or may be displayed as an offline state, the user may select the target device in the social application in which the displayed login state is the online state, and the terminal device may display a management list of the target device in response to a triggering operation of the user on the device identifier of the target device, where at least one remote operation item executable on the target device is displayed.
For example, in the device management page shown in fig. 4, the login state of the target account of the candidate device mobile phone 1 is not displayed, the login states of the target account of the computer 1 (terminal device) and the target account of the computer 2 are online, the terminal device responds to the triggering operation of the computer 2, and a management list of the computer 2 is displayed in the device management page shown in fig. 5, and remote operation items in the management list include a remote control item 502, a remote screen locking item 504 and a remote shutdown item 506, where the remote control item 502 is used for implementing a remote desktop session with the computer 2, the remote Cheng Suobing item 504 is used for implementing remote screen locking with the computer 2, and the remote shutdown item 504 is used for implementing remote shutdown with the computer 2.
Fig. 6 shows a management list displayed after the mobile phone 1 in fig. 4 is triggered, where the remote operation items displayed in the management list include a remote location item 602, and the remote location item is used to obtain location information of the mobile phone 1.
S206, responding to the selection operation for the target remote operation item triggered on the management list, and initiating a first control request to the target equipment.
It is understood that the target remote operation item corresponds to the first control request, for example, when the target remote operation item is a desktop control item, the first control request is a desktop control request; when the target remote operation item is a remote screen locking item, the first control request is a screen locking control request; when the target remote operation is a remote shutdown item, the first control request is a shutdown control request.
Specifically, the user may select a target remote operation item matched with the remote operation to be performed in the presented management list, the terminal device generates a first control request in response to the selection operation of the target remote operation item, and sends the first control request to the target device through the server of the target application.
For example, the terminal device responds to the triggering operation of the desktop control item 502 in fig. 5, generates a desktop control request, and sends the desktop control request to the computer 2 through the server of the target application; the terminal equipment responds to the triggering operation of the remote screen locking item 504, generates a screen locking control request, and sends the screen locking control request to the computer 2 through a server of the target application; the terminal equipment responds to the triggering operation of the remote shutdown item 506, generates a shutdown control request, and sends the shutdown control request to the computer 2 through a server of the target application; the terminal device generates a positioning control request in response to the triggering operation of the remote positioning item 602 in fig. 6, and transmits the positioning control request to the mobile phone 1 through the server of the target application.
S208, when response information returned by the target device in response to the first control request is received, an operation page aiming at the target remote operation item is displayed.
The response information is information including a processing result generated after the target device processes the control request, and the processing process specifically may include request frequency verification, authority verification, parameter validity verification, and the like for the control request, where the processing result specifically may be that the request is successful or that the request is unsuccessful.
Specifically, when receiving response information returned by the target device in response to the first control request, if the response information characterizes that the request is successful, the terminal device displays an operation page aiming at the target remote operation item, for example, if the target remote operation item is a desktop control item, and if the target device has accepted the request, that is, the request is successful, the terminal device opens a new window and displays a system desktop of the target device in the new window. If the target remote operation item is a remote screen locking item, the target device has received the request and executed the screen locking operation, that is, the request is successful, the terminal device receives a confirmation message, which indicates that the screen locking operation has been executed successfully, and the terminal device can display the confirmation message in the prompt page.
For example, after receiving the response information returned by the computer 2 in response to the remote control request, the terminal device displays an operation page as shown in fig. 7, where the operation page is a desktop of the remote computer 2, through which the target device can remotely operate the computer 2, and on the operation page (i.e., the desktop of the remote computer 2), the user can perform various operations, as if directly operating before the computer 2, such as opening and using an application program of the computer 2, modifying a system setting of the computer 2, browsing and editing files in the computer 2, and all operations performed on the terminal device are reflected on the remote computer 2 in real time.
In addition, if the computer 2 is provided with a screen locking password and enables the system screen locking, the terminal device displays an operation page as shown in fig. 8 after receiving response information returned by the computer 2 in response to the remote control request, and displays an operation page as shown in fig. 7 after inputting the screen locking password of the computer 2 in the operation page.
For example, after receiving response information returned by the computer 2 in response to the screen locking control request, the terminal device displays an operation page shown in fig. 9, where a prompt message that the screen locking of the computer 2 is successful is displayed in the operation page; for example, the terminal device sends a shutdown control request to the computer 2, the computer 2 enters a shutdown countdown after the shutdown request is checked, and displays a shutdown countdown prompt message and a corresponding shutdown canceling control, if the computer 2 detects a triggering operation on the shutdown canceling control in the countdown process, the shutdown operation is refused, response information of shutdown failure is returned to the terminal device, after receiving the response information returned by the computer 2 in response to the shutdown control request, the terminal device displays an operation page shown in fig. 10, and the operation page displays a prompt message related to the shutdown failure of the computer 2; if the computer 2 does not detect the triggering operation of canceling the shutdown control until the countdown is finished, the computer 2 executes the shutdown operation and returns response information of successful shutdown to the terminal equipment computer 1 when the countdown is finished, and the terminal equipment displays an operation page shown in fig. 11 after receiving the response information returned by the computer 2 in response to the shutdown control request, wherein the operation page displays a prompt message of successful shutdown of the computer 2.
In the above embodiment, the terminal device may eliminate the need for the user to remember each device identification code by binding the device to the target account number, so that the device management is more centralized and convenient, no matter how many devices the user needs to manage, only needs to remember the target account number information of the user, and can log in the target application, in the device management page of the target application, list the device identifications of the candidate devices associated with the target account number in a clear readable manner, and the candidate devices include terminal devices of different operating systems, the user can easily find and select the device that wants to remotely operate, in response to the triggering operation of the device identifications of the target devices in the candidate devices, display the management list of the target devices including the remote operation item, so that the user can select the operation that wants to operate the target device, in response to the selection operation triggered on the management list for the target remote operation item, initiate a control request to the target device, and when receiving the response information returned by the target device in response to the control request, display the operation page for the target remote operation item, thereby improving the efficiency and convenience of the remote operation of the device.
In one embodiment, the target remote operation item is a desktop control item, the first control request includes a desktop control request, and the process of the terminal device initiating the first control request to the target device in response to a selection operation for the target remote operation item triggered on the management list includes the following steps: responding to desktop control item selection operation triggered on the management list, and displaying an information verification page; displaying the input verification information aiming at the target equipment in an information verification page; and responding to the remote control operation triggered on the information verification page, and sending a desktop control request carrying verification information to the target equipment.
The information verification page is used for obtaining verification information, the verification information can be specifically a fixed password, a screen locking password and the like, the fixed password is a password set by target equipment when the remote control function is started, the screen locking password is a function of starting the target equipment with the remote control function and simultaneously using the screen locking password, it is understood that the fixed password and the screen locking password can be character strings or biological characteristic information, the biological characteristic information can be specifically fingerprint information, iris information or face information and the like, for example, when a certain mobile phone equipment uses face information to unlock a screen, the face information is required to be input into the information verification page when the mobile phone equipment is remote.
When the user inputs the check information in the information input box in the information check page, the user may select to display the input check information in the information check page in a plaintext form, or may select to display the input check information in the information check page in a ciphertext form.
Specifically, after the terminal device displays each remote operation item capable of being performed on the target device in the management list, the user can select the target remote operation to be performed on the target device, if the target remote operation is a desktop control item and the target device starts a fixed password or a screen locking password for remote control security verification, the terminal device responds to the selection operation on the desktop control item triggered on the management list, displays an information verification page, the user can input verification information for the target device in the information verification page, and displays the verification information input by the user in the information verification page, after the verification information input is completed, the user can trigger a remote control button in the verification information input page, and the terminal device responds to the triggering operation of the remote control button, namely the remote control operation, generates a desktop control request carrying the verification information input by the user and sends the desktop control request to the target device through a server of the target application.
In addition, in the verification information input page, input prompt information can be displayed for prompting a user and inputting verification information, for example, the prompt information is "please input a security password of a remote computer", the prompt information is used for indicating that the target device starts a fixed password to perform security verification, so that the fixed password configured by the target device needs to be input in the information verification page to realize desktop control of the target device; for example, the prompt information is "please input the screen locking login password of the remote computer", and the prompt information is used for indicating that the target device starts the screen locking password to perform security check, so that the screen locking password of the target device for system login needs to be input in the information check page to realize desktop control of the target device.
As shown in fig. 12, an information verification page in an embodiment is shown, in which an input prompt "please input a security password of a remote computer" of verification information is displayed, when a user inputs a fixed password in an information input box in the information verification page shown in fig. 12, the input fixed password is displayed in the information input box, after completing the input of the fixed password, the user may click an initiate remote control button 1202, and the terminal device generates a desktop control request carrying the fixed password input in the information verification page in response to a trigger operation of the initiate remote control button 1202, and sends the desktop control request to the computer 2 through a server of a target application.
Fig. 13 is an information verification page in another embodiment, in which an input prompt "please input a screen locking login password of a remote computer" of verification information is displayed, when a user inputs a screen locking password in an information input box in the information verification page shown in fig. 12, the input screen locking password is displayed in the information input box, after the input of the screen locking password is completed, the user may click an initiate remote control button 1302, and the terminal device generates a desktop control request carrying the screen locking password input in the information verification page in response to a trigger operation of the initiate remote control button 1302, and sends the desktop control request to the computer 2 through a server of a target application.
In the above embodiment, the terminal device displays the information verification page by responding to the desktop control item selection operation triggered on the management list; displaying the input verification information aiming at the target equipment in an information verification page; and responding to the remote control operation triggered on the information verification page, and sending a desktop control request carrying verification information to the target equipment so that the target equipment can verify the desktop control request, thereby ensuring that only users with correct verification information can carry out remote operation on the target equipment, effectively preventing unauthorized remote operation, protecting the safety of the target equipment, and simultaneously, providing clear information verification flow, the users can carry out remote operation more easily, and improving the remote operation efficiency.
In one embodiment, the terminal device may further obtain device information of the target device and a login state of the target account, and the process of sending, by the terminal device, a desktop control request carrying verification information to the target device includes the following steps: generating a desktop control request based on the verification information, the device information and the login state; and sending the desktop control request to a server of the target application, so that the server base performs authority verification on the desktop control request, and forwarding the desktop control request to the target device after the verification is passed.
The device information includes device information of a terminal device and device information of a target device associated with the target account number, the device information may specifically be a device identifier, and the login state refers to a login state of the target account number on the terminal device and the target device.
Specifically, the terminal device responds to the remote control operation triggered on the information verification page, acquires the device information of the target device and the login state of the target account, generates a desktop control request based on the verification information, the device information and the login state, the desktop control request carries verification information input by a user and the acquired device information and login state, the terminal device sends the desktop control request to a server of the target application, the server can perform validity verification on the desktop control request after receiving the desktop control request, for example, whether all necessary information is included, whether the format is correct or not, and the like, performs permission verification on the desktop control request after the validity verification is passed, for example, compares the verification information, checks the login state of the user, checks whether the user has permission to operate the target device, and the like, and forwards the desktop control request to the target device after the permission verification is passed, so that the target device verifies the desktop control request.
In the above embodiment, the terminal device generates the desktop control request based on the verification information, the device information and the login state by acquiring the device information of the target device and the login state of the target account; the desktop control request is sent to the server of the target application, so that the server base performs authority verification on the desktop control request, and forwards the desktop control request to the target device after verification is passed, thereby ensuring the validity of the request, avoiding sending an unauthorized remote control request to the target device, protecting the safety of the target device, ensuring that the device information of the target device and the login state of the target account are actively acquired by the terminal device, avoiding the user to memorize the complex information, and improving the remote operation efficiency.
In one embodiment, when receiving response information returned by the target device in response to the first control request, the terminal device displays an operation page for the target remote operation item, where the process specifically includes the following steps: when response information returned by the target equipment in response to the desktop control request is received, establishing a data channel with the target equipment based on the response information; and after the establishment of the data channel is completed, displaying a system desktop of the target device.
In the embodiment of the application, the data channel can be a data channel established based on a Web RTC (Web Real-Time Communication) technology, which is a technology allowing Real-time audio-video call and data sharing between Web browsers, and can enable two devices to directly perform point-to-point connection, that is, data can be directly sent from one device to the other device without any server. The direct data transmission mode can greatly reduce delay and improve transmission efficiency.
Specifically, after receiving the desktop control request forwarded by the server of the target application, the target device may check the desktop control request, where the check may specifically include validity check, frequency check, password check, and the like, and when all the three checks pass, the server of the target application returns response information for passing the check to the terminal device, where the server of the target application forwards the response information for characterizing the passing check to the terminal device, and sends other information for establishing a data channel to the terminal device, where the terminal device, after receiving the response information and the other information for establishing a data channel, establishes a data channel with the target device based on the response information and the other information for establishing a data channel, and after completing the establishment of the data channel, the target device may transmit the picture data of its system desktop to the terminal device through the data channel, and the terminal device displays the system desktop of the target device based on the received picture data.
In the above embodiment, when receiving the response information returned by the target device in response to the desktop control request, the terminal device establishes a data channel with the target device based on the response information, and after the establishment of the data channel is completed, displays the system desktop of the target device, on one hand, the establishment of the data channel ensures the stability of data transmission, so that the data transmission cannot be lost or delayed due to factors such as network fluctuation in the process of performing remote desktop operation; on the other hand, the establishment of the data channel is subjected to strict authority verification, so that only authenticated users can establish the data channel and perform remote desktop operation, and the operation safety is ensured; and through the system desktop of the real-time display target equipment, the user can intuitively know the state and the operation result of the target equipment without waiting for operation feedback, and the remote operation efficiency is improved.
In one embodiment, the process of establishing the data channel between the terminal device and the target device based on the response information specifically includes the following steps: if the response information represents that the desktop control request passes the verification, starting a remote main control process; performing signaling interaction with target equipment through a remote main control process; after the signaling interaction is successful, the establishment of the data channel between the target equipment and the target equipment is completed.
Specifically, if the response information characterizes that the verification of the desktop control request passes, the terminal device starts a remote master control process, and sends a process start request to the target device through a server of the target application, so that the target device starts a remote controlled process based on the process start request, after the target device starts the remote controlled process, the terminal device sends a connection request signaling, such as an invite signaling, to the target device through the remote master control process, the target device receives the connection request signaling through the remote controlled process, and returns a target device information signaling, such as an offer signaling, to the terminal device through the remote controlled process, the terminal device receives the target device information signaling through the remote control process, and sends a response signaling, such as an answer signaling, to the target device through the remote control process, and after receiving the signaling, both sides can establish a data channel according to information carried by the signaling.
The target device information signaling, such as "offer" signaling, carries media capability description information of the target device, such as supported codec type, resolution, etc., and the response signaling, such as "answer" signaling, carries media capability description information of the terminal device, such as supported codec type, resolution, etc.
It can be understood that after the data channel is established, the remote control process of the terminal device and the remote controlled process of the target device are also used for data transceiving in the desktop control process based on the data channel.
The remote control process for the terminal device may send remote control commands, such as mouse movements, clicks, keyboard inputs, etc., which are sent to the target device via the data channel; responses of the target device, such as screen images, file transfer data, etc., may also be received, which are returned from the target device via the data channel; the data channels may also be managed, such as maintaining the stability of the channels, adjusting the transmission rate or retry mechanisms, etc.
The remote controlled process of the target device can receive a remote control command, such as a control command from the terminal device through a data channel, and convert the control command into an actual operation, such as a mobile mouse, a keyboard input and the like; responses such as screen images, file data, etc. can also be sent back to the terminal device via the data channel, and the data channel can also be managed, such as handling connection problems that may occur, adapting to changes in network conditions, etc.
In the embodiment, when the response information characterizes that the verification of the desktop control request is passed, the computer equipment starts the remote main control process, so that only authenticated users can be ensured to start the remote control, and the computer equipment is helpful to prevent unauthorized access and potential malicious attacks; through the signaling interaction between the remote main control process and the target equipment, a data channel can be established in a short time, the real-time operation and interaction of the target equipment are realized, the efficiency of remote operation is improved, after the signaling interaction is successful, the establishment of the data channel between the remote main control process and the target equipment is completed, the data transmission is more efficient, and particularly under the condition of good network conditions, a user can remotely operate the target equipment almost without delay, and the efficiency of remote operation of the equipment is further improved.
In one embodiment, the system desktop is a remote system desktop, and the device remote operation method further includes the following steps: responding to file copying operation triggered on a remote system desktop or a first file page entered through the remote system desktop, and acquiring a target file; switching from the remote system desktop to the local system desktop; receiving a target file transmitted through a data channel in response to a file pasting operation triggered on a local system desktop or a second file page entered through the local system desktop; and displaying the target file on a local system desktop or a second file page.
The remote system desktop refers to a graphical interface of an operating system of the target device, which is displayed on the terminal device and is transmitted through a data channel, that is, a desktop environment of the remote device. The first file page refers to a file manager or resource manager window on the target device through which the file system of the target device can be browsed, and files selected and operated. The second file page refers to a file manager or resource manager window of the terminal device through which the file system of the terminal device can be browsed, and files can be selected and operated.
Specifically, after displaying the remote system desktop of the target device, the terminal device may trigger a file copying operation on the target file in the system desktop, or input a related instruction for the remote system desktop through a mouse and a keyboard, enter a first file page of the target device, trigger a file copying operation on the target file in the first file page, the remote controlled process of the target device obtains the target file in response to the file copying operation, the terminal device responds to the desktop switching operation, displays the local system desktop of the terminal device, the user may trigger a file pasting operation on the local system desktop, or input a related instruction for the local system desktop through a mouse and a keyboard, enter a second file page, trigger a file pasting operation in the second file page, the remote control process of the terminal device responds to the file pasting operation, receive the target file transmitted through a data channel, and display the target file in the local system desktop or the second file page after receiving the target file.
It should be noted that, the terminal device may also switch from the remote system desktop to the local system desktop; responding to file copying operation triggered on a local system desktop or a third file page entered through the local system desktop, and acquiring other files; switching from the local system desktop to the remote system desktop; and transmitting other files to the target device through the data transmission channel in response to a file copying operation triggered on the remote system desktop or a fourth file page entered through the remote system desktop, and displaying the other files on the remote system desktop or the fourth file page.
In the embodiment, the terminal equipment can quickly copy the file from the remote system desktop to the local system desktop, so that the time for data transmission is saved, and meanwhile, the file transmission between different system desktops is facilitated; the terminal equipment can directly perform file copying operation on a remote system desktop or a file page entering through the remote system desktop, other complicated steps or tools are not needed, so that the file transmission operation is simple, and the data transmission efficiency is improved; and the data is transmitted through the encrypted data channel, so that the safety of the data is ensured to be improved.
In one embodiment, the device remote operation method further includes the steps of: responding to display adjustment operation triggered on a system desktop, and acquiring a network state and equipment display configuration parameters; the resolution of the system desktop is adjusted based on the network status and the device display configuration parameters.
The network state includes a network state of the device and a network state of the data channel, the network state of the device includes a network state of the terminal device and a network state of the target device, and the network state may specifically be a network bandwidth, a network delay, and the like.
The device display configuration parameters include a display configuration parameter of the terminal device and a display configuration parameter of the target device, where the display configuration parameters may specifically be screen resolution, color depth, and the like.
Specifically, the system desktop displayed by the terminal device can also display an image quality adjustment control, the terminal device responds to the triggering operation of the image quality adjustment control to acquire the network state of the device and the network state of the data channel, and the device display configuration parameters of the terminal device and the target device, and the resolution of the system desktop is adjusted based on the network state and the device display configuration parameters, and the system desktop after the resolution adjustment is displayed.
For example, fig. 7 shows an image quality control, where a user may click on the image quality control, and the terminal device displays a system desktop after adjusting the resolution in response to the click operation on the image quality control.
In addition, in remote work, the user can adjust the display resolution according to actual needs by oneself, makes the remote desktop more accord with own use habit, promotes remote work efficiency.
In the above embodiment, the terminal device acquires the network state and the device display configuration parameter in response to the display adjustment operation triggered on the system desktop, adjusts the resolution of the system desktop based on the network state and the device display configuration parameter, and provides the best desktop display scheme according to the current network state and the device display configuration parameter by dynamically adjusting the resolution of the system desktop, for example, in the case of poor network environment, the resolution of the system desktop is reduced to reduce the transmission amount of data, thereby saving network resources, reducing delay and blocking, and enabling the remote desktop to be smoother; under the condition that the display configuration parameters of the equipment are lower, the resolution of the desktop of the system is reduced, the burden of the equipment can be reduced, the normal operation of the equipment is ensured, and the influence on the operation efficiency due to slow response of the equipment caused by overhigh resolution is avoided.
In one embodiment, the target application is a security management application, the operation page displayed by the terminal device is a system desktop of the target device, and the device remote operation method further includes the following steps: responding to equipment repairing operation triggered on a system desktop, and displaying a repairing list; and responding to the selection operation of the target repair items in the repair list, and performing target repair processing on the target equipment.
The security management application is a software tool for protecting a computer or mobile device from threats such as network attack, viruses, malicious software and the like, and the functions of the security management application can comprise antivirus protection, firewall management, privacy protection, system optimization, security warning and the like.
Specifically, a repair control can be displayed on a system desktop, if a user wants to perform repair processing on a target device, the repair control can be triggered, a terminal device responds to the triggering operation of the repair control, a repair list can be displayed on the system desktop, a repair item can be displayed in the repair list, the user can select the target repair item from the displayed repair items, the terminal device responds to the selection operation of the target repair item, a repair processing request is generated, and the repair processing request is sent to a server of a security management application, so that the server of the security management application performs target repair processing on the target device based on the repair processing request.
For example, as can be seen from the operation page shown in fig. 7, the operation page further displays a computer repair control, a shortcut key control, a picture adaptation control, a picture quality control and a full screen mode control, wherein the computer repair control can be used for quickly repairing a computer problem of a target device such as a computer 2, for example, repairing a network setting of the computer 2, cleaning a disk, optimizing a system, and the like; the shortcut key control is used for setting a shortcut key, so that a user can quickly access certain functions, such as a shortcut key for switching a full screen mode, a shortcut key for sending Ctrl+Alt+Del commands, and the like; the screen adaptation control is used for adjusting the display mode of the remote desktop, for example, selecting to enable the remote desktop to fill the whole window or display according to the original size; the image quality control is used for adjusting the image quality of the remote desktop, and according to the network condition and the requirement of a user, the high-definition image quality or lower image quality can be selected to save the bandwidth; the full screen mode control is used for switching the full screen mode, and in the full screen mode, the remote desktop occupies the whole screen of the user, so that better visual experience is provided.
For example, in response to the triggering operation of the computer repair control in fig. 7, as shown in fig. 14, a repair tool list 1402 is displayed in an operation page, where a plurality of repair items, such as a network exception repair item, a computer hardware exception repair item, a software usage exception repair item, a rogue software governance item, and garbage cleaning, are displayed in the repair tool list, where the network exception repair item is used to repair a network connection problem of the target device computer 2, and if the network speed of the computer 2 is very slow, a user can trigger the repair item, the system automatically checks and repairs a network problem, specifically includes resetting a network setting, refreshing a DNS cache, checking network hardware, and so on, thereby implementing quick repair of the network problem of the computer 2; the computer hardware exception repairing item is used for processing the problem related to the computer hardware of the target device computer 2, when a user triggers the repairing item, the repairing tool can check the driving program of the hardware device of the computer 2 and the system setting related to the hardware, and repair the problem when the problem exists, so that the quick repairing of the hardware problem of the computer 2 is realized; the software uses an abnormal repair item for processing problems related to the software application of the target device computer 2, and when a user triggers the repair item, the repair tool checks the configuration file of the software and related system resources and repairs the problems, so that the quick repair of the software problems of the computer 2 is realized; the abnormal software management item is used for processing abnormal risk software or unnecessary software on the target equipment computer 2, and when a user triggers the repair item, the repair tool scans the computer 2, finds the abnormal risk software or the unnecessary software, and helps the user to uninstall or disable the software, so that the problem of the abnormal software of the computer 2 is rapidly processed; the garbage collection item is used to deal with the problem related to the storage space of the target device computer 2, when the hard disk space of the computer 2 is insufficient, the user can trigger the repair item, and the repair tool can search for and delete unwanted files, such as temporary files, log files, cache files, and the like.
In the above embodiment, the terminal device displays the repair list by responding to the device repair operation triggered on the system desktop; in response to the selection operation of the target repair items in the repair list, target repair processing is performed on the target equipment, so that the repair operation can be conveniently performed on the target equipment directly on a remote system desktop, and the efficiency of safety management on the target equipment is improved.
In one embodiment, the target remote operation items are a remote lock screen item and a remote shutdown item; the process of the terminal equipment responding to the selection operation for the target remote operation item triggered on the management list and initiating the first control request to the target equipment comprises the following steps: responding to screen locking item selection operation or shutdown item operation triggered on the management list, and acquiring equipment information of target equipment and login state of a target account; generating a screen locking control request or a shutdown control request according to the equipment information and the login state; and sending the screen locking control request or the shutdown control request to a server of the target application, so that the server performs authority verification on the screen locking control request or the shutdown control request, and forwarding the screen locking control request or the shutdown control request to the target device after the verification is passed.
Specifically, the terminal equipment responds to the triggering operation of a remote screen locking item in the management list, acquires equipment information of the target equipment and a login state of a target account, generates a screen locking control request according to the equipment information and the login state, sends the screen locking control request to a server of a target application, performs authority verification based on the equipment information and the login state in the received screen locking control request, forwards the screen locking control request to the target equipment after the authority verification, and checks the screen locking control request after receiving the screen locking control request, such as frequency check, and executes the screen locking operation after the verification passes; the terminal equipment responds to the triggering operation of the remote shutdown item in the management list, acquires the equipment information of the target equipment and the login state of the target account, generates a shutdown control request according to the equipment information and the login state, and sends the shutdown control request to a server of the target application.
In one embodiment, the process of obtaining the device information of the target device and the login state of the target account by the terminal device in response to the screen locking item selection operation or the shutdown item operation triggered on the management list specifically includes the following steps: responding to a screen locking item selection operation or a shutdown item operation triggered on the management list, and displaying a screen locking confirmation page or a shutdown confirmation page; and responding to the confirmation operation of the screen locking confirmation page or the shutdown confirmation page, and acquiring the equipment information of the target equipment and the login state of the target account.
For example, in response to a triggering operation of the remote screen locking control 504 in fig. 5, the terminal device displays a screen locking confirmation page shown in fig. 15, where a confirmation control 1502 and a cancellation control 1504 are displayed in the screen locking confirmation page, when a user determines that screen locking is required to be performed on the computer 2, the terminal device may click on the confirmation control 1502, and in response to a clicking operation on the confirmation control 1502, obtain device information of the target device and a login state of the target account number to generate and send a screen locking control request; when the user does not need to lock the screen of computer 2, if the triggering operation to remote screen locking control 504 of fig. 5 is a false operation, the user may click cancel control 1504 and return to the page shown in fig. 5.
The terminal equipment responds to the triggering operation of the remote shutdown control 504 in fig. 5, displays a shutdown confirmation page shown in fig. 16, wherein the shutdown confirmation page is provided with a confirmation control 1602 and a cancellation control 1604, when a user determines that the computer 2 is required to be shutdown, the confirmation control 1602 can be clicked, and the terminal equipment responds to the clicking operation of the confirmation control 1602, acquires the equipment information of the target equipment and the login state of the target account number so as to generate and send a shutdown control request; when the user does not need to power down the computer 2, if the triggering operation of the control 504 of fig. 5 far Cheng Guanji is a false operation, the user can click the cancel control 1604 and return to the page shown in fig. 5.
In the above embodiment, the terminal device sends the screen locking control request or the shutdown control request to the target device in response to the screen locking item selection operation or the shutdown item operation triggered on the management list, so that the screen locking operation of the target device can be realized, and the efficiency of managing the target device is improved; obtaining equipment information of target equipment and login state of a target account; and generating a screen locking control request or a shutdown control request according to the equipment information and the login state, and sending the screen locking control request or the shutdown control request to a server of the target application, so that the server can verify the authority of the screen locking control request or the shutdown control request, and after the verification is passed, the screen locking control request or the shutdown control request is forwarded to the target equipment, thereby ensuring that only users with the authority can perform screen locking or shutdown operation, and the abnormal screen locking behavior causes adverse effects on the target equipment for shutdown behavior.
In one embodiment, the operation page is a prompt page, and when receiving response information returned by the target device in response to the first control request, the process of displaying the operation page for the target remote operation item by the terminal device includes the following steps: when response information returned by the target equipment in response to the screen locking control request or the shutdown control request is received, screen locking prompt information or shutdown prompt information is generated based on the response information; and displaying a prompt page comprising the screen locking prompt information or the shutdown prompt information.
The screen locking prompt information comprises screen locking success prompt information and screen locking failure prompt information, and the shutdown prompt information comprises shutdown success prompt information and shutdown failure prompt information.
Specifically, after receiving response information returned by the target device in response to the screen locking control request, if the response information represents that the target device is successfully locked, the terminal device generates screen locking success prompt information, and displays a page comprising the screen locking success prompt information, such as a prompt page shown in fig. 9; if the response information represents that the target equipment fails to lock the screen, generating screen locking failure prompt information based on the screen locking failure reason in the response information, and displaying a page comprising the screen locking failure prompt information; after receiving response information returned by the target device in response to the shutdown control request, if the response information represents that the target device is shutdown successful, the terminal device generates shutdown success prompt information, and displays a page comprising the shutdown success prompt information, such as a prompt page shown in fig. 11; if the response information indicates that the target device fails to shutdown, generating shutdown failure prompt information based on the shutdown failure reason in the response information, and displaying a page including the shutdown failure prompt information, as shown in fig. 10.
In the above embodiment, when receiving the response information returned by the target device in response to the screen locking control request or the shutdown control request, the terminal device generates the screen locking prompt information or the shutdown prompt information based on the response information; the prompt page comprising the screen locking prompt information or the shutdown prompt information is displayed, so that a user can quickly acquire feedback, know whether the operation is successful or not, and if the remote screen locking or shutdown fails, the prompt page can provide the failure reason to help the user to know the problem so as to solve the problem; and the feedback information of the operation can also be used for the later problem investigation and solution, and the operation can also be recorded conveniently.
In one embodiment, the terminal device belongs to a device in the candidate devices, as shown in fig. 17, and the above device remote operation method further includes the following steps:
s1702, in response to a trigger operation for a device identification of the terminal device, displaying a remote configuration list.
The remote configuration list is used for listing whether the terminal equipment is allowed to be remotely controlled by other equipment, and the other equipment belongs to equipment in the candidate equipment.
Specifically, the terminal device displays the device identifier of the candidate device associated with the target account in the device management page of the target application, wherein the device identifier comprises the device identifier of the terminal device, the terminal device responds to the triggering operation of the device identifier of the terminal device, a remote configuration list of the terminal device is displayed, a controlled switch control is displayed in the remote configuration list, and whether the terminal device is allowed to be remotely controlled by other devices or not can be set based on the controlled switch control.
For example, the remote configuration list 404 shown in the device management page of the target application in fig. 4, in which the controlled switch control 408 is shown in the remote configuration list 404, the current display state of the controlled switch control 408 in fig. 4 indicates that no other device is allowed to remotely control the terminal device computer 1.
S1704, responding to the controlled item configuration operation triggered on the remote configuration list, and displaying a check configuration page.
The verification configuration page is used for configuring verification information of the terminal equipment when the terminal equipment is remotely controlled, and when the terminal equipment starts the screen locking password, the verification configuration page can be a screen locking password authorization page; when the terminal device does not enable the screen locking password, the verification configuration page can be a fixed password input page.
Specifically, a remote configuration list of the terminal device is provided with a controlled switch control, if the current display state of the controlled switch control indicates that the terminal device does not allow other devices to remotely control the controlled switch control, a user can trigger the controlled switch control if the user wants to modify the display state of the controlled switch control to the state that the terminal device does not allow other devices to remotely control the controlled switch control, and the terminal device responds to the triggering operation of the controlled switch control to display a verification configuration page.
In one embodiment, the terminal device responds to the triggering operation of the controlled switch control to determine whether the terminal device enables the screen locking password, and if the terminal device enables the screen locking password, a screen locking password authorization page is displayed; and if the terminal equipment does not start the screen locking password, displaying a fixed password input page.
S1706, in response to the confirmation operation triggered on the check configuration page, storing check information corresponding to the check configuration page.
In one embodiment, the verification information includes a lock screen password, and the verification configuration page is an unlock screen password authorization page, and S1706 specifically includes the following steps: responding to the authorization operation triggered on the screen locking password authorization page, and acquiring a screen locking password according to the equipment account displayed on the screen locking password authorization page; and storing the screen locking password.
The device account number may specifically be a system account number.
Specifically, the screen locking password authorization page displays a device account number, authorization prompt information and an authorization confirmation control of the terminal device, when a user agrees to authorize, the authorization confirmation control can be triggered, the terminal device responds to the triggering operation of the authorization confirmation control, acquires a corresponding screen locking password based on the displayed device account number and stores the screen locking password, and simultaneously adjusts the display state of the controlled switch control displayed on the remote configuration list to a state representing that the terminal device allows other devices to remotely control the controlled switch control.
Fig. 18 is a schematic diagram of a screen locking password authorization page in an embodiment, in which a device account "Administrator" of a terminal device and an authorization confirmation control 1802 are displayed, when a user agrees to authorization, the authorization confirmation control 1802 may be triggered, and the terminal device stores a screen locking password corresponding to the device account "Administrator" in response to a triggering operation on the authorization confirmation control 1802.
In the embodiment, the screen locking password is used as verification information, so that the safety of the equipment can be improved, and unauthorized access is prevented; the user can clearly know which equipment is being operated by displaying the equipment account number on the screen locking password authorization page, so that misoperation is avoided; the user can change the screen locking password at any time, so that the flexibility of safety management is improved.
In one embodiment, the verification information includes a fixed password, the verification configuration page includes a fixed password input page, and S1706 specifically includes the following steps: displaying the input fixed password on a fixed password input page; the fixed password is stored in response to a confirmation operation triggered at the fixed password input page.
Specifically, the terminal device displays a password input box, input prompt information and input confirmation control on the fixed password input page, a user can input the fixed password in the password input box based on the input prompt information, the input fixed password can be displayed in the password input box in a plaintext or ciphertext mode when the fixed password is input, the user can trigger the input confirmation control after finishing inputting the fixed password, the terminal responds to the triggering operation of the input confirmation control, the fixed password input by the user is stored, and meanwhile, the display state of the controlled switch control displayed on the remote configuration list is adjusted to be a state representing that the terminal device allows other devices to remotely control the controlled switch control.
Fig. 19 is a schematic diagram of a fixed password input page in an embodiment, where a user may input a set fixed password in a set password input box, and repeatedly input the fixed password in a confirmation password input box, after the input is completed, the input confirmation control 1902 is triggered, and the terminal device stores the fixed password input by the user in response to the triggering operation of the input confirmation control 1902.
In this embodiment, the user may preset a fixed password, and only the person who knows the password can access and control the device. This increases the security of the device, preventing unauthorized access; the user only needs to memorize a fixed password, so that the equipment can be remotely controlled at any time and any place, and the device is very convenient; if the user has a plurality of devices, the same fixed password can be used for simplifying the memorization and management, and the user does not need to memorize the password of each device and only needs to memorize one fixed password; flexibility: the fixed password can be changed at any time according to the needs, so that certain flexibility is provided, and if a user suspects that the password is known by other people, the password can be immediately changed, and the safety of equipment is ensured.
S1708, when a second control request for controlling the terminal device sent by the other device is received, the second control request is checked based on the check information.
Specifically, after the verification information is stored, the terminal device may receive a second control request from the other device, after receiving the second control request, the terminal device may verify the second control request and the second control request based on the stored verification information, establish a data channel between the terminal device and the other device after the verification is passed, and transmit the picture data of the system desktop of the terminal device to the other device through the data channel.
In one embodiment, S1708 specifically includes the following steps: performing control frequency verification on the second control request to obtain a frequency verification result; and when the frequency verification result represents that the frequency verification passes, carrying out password validity verification on the second control request based on the verification information.
And the frequency verification is to verify whether the initiating frequency of the second control request meets the frequency condition, if so, the frequency verification result is that the frequency verification passes, and if not, the frequency verification result is that the frequency verification does not pass. For example, the frequency condition is that a preset number of second control requests are allowed to be initiated in each minute, and if the second control requests received currently reach the preset number, the second control requests are determined to meet the frequency condition.
It will be appreciated that abnormal control requests, such as frequent second control requests, may be prevented by the frequency check, which may cause the terminal device to fail to operate properly.
The password validity check is used for confirming whether the equipment initiating the second control request is authorized to perform control operation on the terminal equipment.
Specifically, after the password validity of the second control request is checked, the terminal device establishes a data channel with other devices, and transmits the picture data of the system desktop of the terminal device to the other devices through the data channel.
In one embodiment, when the password validity verification result indicates that the password validity verification is passed, the terminal device may further perform parameter validity verification on the second control request, establish a data channel with other devices after the parameter validity verification is passed, and transmit the picture data of the system desktop of the terminal device to the other devices through the data channel.
The parameter validity check is to check parameters included in the second control request, where the parameters may specifically be a command type, a target device identifier, a requested operation, etc., and by the parameter validity check, it may be ensured that the parameters are legal and conform to an expected format or range, for example, if a second control request attempts to perform an unsupported operation, the request may be rejected in the parameter validity check.
In the above embodiment, the terminal device displays the remote configuration list by responding to a trigger operation of the device identifier of the terminal device; responding to the configuration operation of the controlled item triggered on the remote configuration list, and displaying a verification configuration page; responding to a confirmation operation triggered on the verification configuration page, and storing verification information corresponding to the verification configuration page; when a second control request for controlling the terminal equipment, which is sent by other equipment, is received, the second control request is checked based on the check information, so that the remote operation of unauthorized equipment can be effectively prevented, and the safety of remote control is improved; and the user can perform various configurations on the verification configuration page, such as setting control authority, changing passwords and the like, so that certain flexibility is provided, and the user can adjust according to actual requirements.
In one embodiment, the device remote operation method further includes the steps of: responding to the triggering operation of the equipment identification of the terminal equipment, and displaying an image migration list; responding to the path configuration operation in the image migration list, and displaying a path configuration page; selecting an image storage path in a path configuration page; the image storage path is used for storing the image file according to the image storage path when the terminal equipment receives the image file.
The image migration list is used for listing storage paths of terminal equipment on migrated image files from other equipment.
Specifically, the terminal device displays the device identifier of the candidate device associated with the target account in the device management page of the target application, wherein the device identifier comprises the device identifier of the terminal device, the terminal device responds to the triggering operation of the device identifier of the terminal device, an image migration list of the terminal device is displayed, a path configuration control is displayed in the image migration list, when a user needs to configure a storage path, the path configuration control can be triggered, the terminal device responds to the triggering operation of the path configuration control, a path configuration page is displayed, the user can select an image storage path in the path configuration page, after the image storage path is selected, a determination control in the path configuration page is triggered, the terminal device responds to the triggering operation of the determination control, and the image storage path configured in the path configuration page is saved, so that the received image file is stored according to the image storage path when the image file from other devices is received later.
For example, the image migration list 406 shown in the device management page of the target application in fig. 4, the path configuration control 410 is shown in the image migration list 406, the user may trigger the path configuration control 410, the terminal device displays the path configuration page shown in fig. 20 in response to the triggering operation on the path configuration control 410, after the image storage path is selected, the determining control 2002 is triggered in the path configuration page, and the terminal device saves the image storage path configured in the path configuration page in response to the triggering operation on the determining control 2002. In addition, the image migration list 406 in fig. 4 also shows a path view control 412, when the user wants to view the configured image storage path, the path view control 412 may be triggered, and the terminal device responds to the triggering operation of the path view control 412 to enter a file directory under the configured image storage path, where the user can see the migrated image file.
In the above embodiment, the terminal device allows the user to customize the position where the user wants to store the image file by providing the path configuration page, which provides higher flexibility and convenience for the user; the user can set the storage path according to the file management habit, for example, the user can store all the image files in a special folder, so that the files can be more conveniently found and managed, and the file management efficiency can be improved.
In one embodiment, the target application is a security management application, and the device remote operation method further includes the steps of: responding to the triggering operation of the equipment identification of the target equipment, and displaying risk prompt information of the target equipment on an equipment management page; responding to the risk processing operation, and initiating a risk processing request to target equipment based on the risk prompt information; and displaying a risk processing page including the risk item when response information of the target device in response to the risk processing request is received.
The security management application is a software tool for protecting a computer or mobile device from threats such as network attack, viruses, malicious software and the like, and the functions of the security management application can comprise antivirus protection, firewall management, privacy protection, system optimization, security warning and the like.
The risk prompt information is generated by the security management application according to the security check result of the target device and is used for prompting the potential problem of the target device, and specifically, the risk in aspects of abnormal software or virus, system setting, network security, privacy disclosure and the like can be realized.
Specifically, the terminal device displays the device identifier of the candidate device associated with the target account in a device management page of the target application, wherein the device identifier comprises the device identifier of the terminal device, the terminal device responds to the triggering operation of the device identifier of the terminal device, the risk prompt information of the target device is displayed, a risk information list is displayed in response to the triggering operation of the risk prompt information, each risk item is displayed in the risk information list, and risk processing controls corresponding to the risk items respectively are displayed in the risk information list, if a user wants to process one or more risk prompt items, the corresponding wind direction processing control can be triggered, the terminal device corresponds to the triggering operation of the risk processing control, initiates a risk processing request to the security management application, the security management application processes the corresponding risk item of the target device based on the received risk processing request to obtain a risk processing result, returns response information to the terminal device based on the risk processing result, and the terminal device displays the risk processing page based on the risk processing result obtained after the risk processing request is processed.
For example, fig. 21 is a device management page of a mobile phone terminal after a target application logs in a target account, in which risk prompt information 2102 of a target device computer 2 is displayed, if a user wants to view a specific risk item, the risk prompt information 2102 may be triggered, a terminal device responds to a triggering operation of the risk prompt information 2102, a risk information list shown in fig. 22 is displayed, the terminal device responds to a triggering operation of a risk processing control 2202 in the risk information list, a risk processing request is initiated to the target device based on the risk prompt information, and when response information of the target device responding to the risk processing request is received, a risk processing page including the risk item shown in fig. 23 is displayed.
In the above embodiment, the terminal device displays the risk prompt information of the target device on the device management page, so that the user can learn about the potential risk of the device, which is helpful for improving the security of the device, and at the same time, the user can process specific risk items according to the risk prompt information, so as to reduce or eliminate the risks; the user can directly process the risk on the equipment management page without jumping to other pages or applications, so that the risk processing efficiency is improved; the risk prompt information of the target equipment is displayed on the equipment management page in real time, so that a user can know the safety condition of the equipment in time and perform necessary risk treatment in time, and real-time management of the target equipment is effectively realized.
In one embodiment, the device remote operation method further includes the steps of: responding to the triggering operation of the equipment identification of the target equipment, and displaying the resource occupation information of the target equipment; responding to the triggering operation of the resource occupation information, and displaying a resource management control; responding to the triggering operation of the resource management control, and initiating request information for cleaning the application process or the cache data occupying the device resource to the target device; and when receiving the information fed back by the target equipment in response to the request information, displaying the result information for cleaning the application process or the cache data.
The resource occupation information refers to the usage information of the hardware resource and the software resource of the target device, and the hardware resource can be specifically a CPU, a memory, a hard disk, etc., and the software resource can be specifically an operating system, an application program, etc. The resource management control can be specifically a memory cleaning control, a CPU usage optimizing control, a disk cleaning control, a network optimizing control, a startup management control and the like.
Specifically, the terminal device displays the device identifier of the candidate device associated with the target account in the device management page of the target application, wherein the device identifier comprises the device identifier of the terminal device, the terminal device responds to the triggering operation of the device identifier of the terminal device, the resource occupation information of different resources of the target device can be triggered if a user wants to manage a certain resource, the resource occupation information corresponding to the resource can be triggered, the terminal device responds to the triggering operation of the resource occupation information, the resource management control of the resource is displayed, the user can trigger the resource management control, the terminal device responds to the triggering operation of the resource management control, a resource management request is generated, the resource management request can be the request information for cleaning the application process or the cache data of the occupied device resource, the server of the safety management application processes the corresponding resource of the target device based on the received resource management request, a processing result is obtained, response information is returned to the terminal device based on the processing result, and the terminal device displays the result information for cleaning the application process or the cache data based on the received response information.
For example, the mobile phone terminal shown in fig. 21 logs in the device management page of the target account number in the target application, the device management page also displays the resource occupation information of the target device computer 2, such as the CPU occupation rate 2104, etc., the user can directly check the occupation condition of each resource on the page, if a certain resource needs to be managed, the resource occupation information corresponding to the resource can be triggered, such as the CPU occupation rate 2104 triggering, the terminal device responds to the triggering operation of the CPU occupation rate 2104, displays the CPU usage optimization control shown in fig. 24, the terminal device responds to the triggering operation of the CPU usage optimization control determining control 2402, initiates the request information for cleaning the application process occupying the CPU resource to the target device, and when the information fed back by the target device responds to the request information is received, the optimized resource occupation information is realized, and the optimized CPU occupation rate is 20% as shown in fig. 25.
In the above embodiment, the terminal device displays the resource management control by responding to the triggering operation of the resource occupation information; responding to the triggering operation of the resource management control, and initiating request information for cleaning the application process or the cache data occupying the device resource to the target device; when information fed back by the target equipment in response to the request information is received, result information for cleaning the application process or the cache data is displayed, so that unnecessary application processes or cache data occupying equipment resources can be cleaned remotely, the equipment resources can be effectively released, and the running performance of the equipment is improved; and the user can view the resource occupation condition of the target equipment in real time and manage the resource occupation condition, so that the target equipment can be better managed.
In one embodiment, as shown in fig. 26, a remote device operation method is provided, and the method is applied to the terminal device in fig. 1 for illustration, and includes the following steps:
s2602, when the target application is logged in based on the target account, displaying the device identification of the candidate device associated with the target account in the device management page of the target application.
Specifically, after the target account successfully logs in the target application, when the terminal device detects the device management operation on the target account in the main interface of the target application, a device management page of the target application is displayed, the device identification of each candidate device associated with the target account is displayed in the device management page, and in addition, a device adding control can be displayed in the device management page, and when the device adding control is triggered, the terminal device can enter the device adding page to add new devices so as to be associated with the target account.
S2604, in response to a trigger operation of the device identification of the target device among the candidate devices, displaying a management list including remote operation items of the target device.
Specifically, the terminal device may obtain, in the device management page of the target application, the login state of the target account number in the target application of each candidate device from the server of the target application while displaying the device identifier of the candidate device associated with the target account number, and display the obtained login state of each candidate device in the device management page, where the login state of the candidate device in which the target account number is logged in the target application may be displayed as an online state, the login state of the candidate device in which the target account number is not logged in the target application may not be displayed or may be displayed as an offline state, the user may select the target device in the social application in which the displayed login state is the online state, and the terminal device may display a management list of the target device in response to a triggering operation of the user on the device identifier of the target device, where at least one remote operation item executable on the target device is displayed.
S2606, responding to the selection operation for the desktop control item triggered on the management list, and displaying an information verification page; displaying the input verification information aiming at the target equipment in an information verification page; and responding to the remote control operation triggered on the information verification page, and sending a desktop control request carrying verification information to the target equipment.
Specifically, after the terminal device displays each remote operation item capable of being performed on the target device in the management list, the user can select the target remote operation to be performed on the target device, if the target remote operation is a desktop control item and the target device starts a fixed password or a screen locking password for remote control security verification, the terminal device responds to the selection operation on the desktop control item triggered on the management list, displays an information verification page, the user can input verification information for the target device in the information verification page, and displays the verification information input by the user in the information verification page, after the verification information input is completed, the user can trigger a remote control button in the verification information input page, and the terminal device responds to the triggering operation of the remote control button, namely the remote control operation, generates a desktop control request carrying the verification information input by the user and sends the desktop control request to the target device through a server of the target application.
S2608, when response information returned by the target device in response to the desktop control request is received, displaying a system desktop of the target device.
Specifically, when response information returned by the target device in response to the desktop control request is received, if the response information characterizes that the desktop control request passes verification, starting a remote main control process; performing signaling interaction with target equipment through a remote main control process; after the signaling interaction is successful, the establishment of the data channel between the target device and the target device is completed, and after the establishment of the data channel is completed, the system desktop of the target device is displayed.
S2610, a screen locking control request or a shutdown control request is sent to the target device in response to a screen locking item selection operation or a shutdown item operation triggered on the management list.
Specifically, the terminal equipment responds to triggering operation of a remote screen locking item in a management list, acquires equipment information of target equipment and a login state of a target account, generates a screen locking control request according to the equipment information and the login state, sends the screen locking control request to a server of a target application, performs authority verification based on the equipment information and the login state in the received screen locking control request, forwards the screen locking control request to the target equipment after the authority verification, and checks the screen locking control request after receiving the screen locking control request, if the frequency check is passed, and executes the screen locking operation after the check is passed; the terminal equipment responds to the triggering operation of the remote shutdown item in the management list, acquires the equipment information of the target equipment and the login state of the target account, generates a shutdown control request according to the equipment information and the login state, and sends the shutdown control request to a server of the target application.
S2612, when response information returned by the target device in response to the screen locking control request or the shutdown control request is received, a prompt page comprising screen locking prompt information or shutdown prompt information is displayed.
Specifically, after receiving response information returned by the target device in response to the screen locking control request, if the response information represents that the target device is successfully locked, the terminal device generates screen locking success prompt information, and displays a page comprising the screen locking success prompt information, such as a prompt page shown in fig. 9; if the response information represents that the target equipment fails to lock the screen, generating screen locking failure prompt information based on the screen locking failure reason in the response information, and displaying a page comprising the screen locking failure prompt information; after receiving response information returned by the target device in response to the shutdown control request, if the response information represents that the target device is shutdown successful, the terminal device generates shutdown success prompt information, and displays a page comprising the shutdown success prompt information, such as a prompt page shown in fig. 11; if the response information indicates that the target device fails to shutdown, generating shutdown failure prompt information based on the shutdown failure reason in the response information, and displaying a page including the shutdown failure prompt information, as shown in fig. 10.
S2614, in response to a trigger operation of the device identification of the terminal device, displaying a remote configuration list.
Specifically, the terminal device displays the device identifier of the candidate device associated with the target account in the device management page of the target application, wherein the device identifier comprises the device identifier of the terminal device, the terminal device responds to the triggering operation of the device identifier of the terminal device, a remote configuration list of the terminal device is displayed, a controlled switch control is displayed in the remote configuration list, and whether the terminal device is allowed to be remotely controlled by other devices or not can be set based on the controlled switch control.
S2618, a check configuration page is displayed in response to a controlled item configuration operation triggered on the remote configuration list; and responding to the confirmation operation triggered on the verification configuration page, and storing the verification information corresponding to the verification configuration page.
Specifically, a remote configuration list of the terminal device is provided with a controlled switch control, if the current display state of the controlled switch control indicates that the terminal device does not allow other devices to remotely control the controlled switch control, a user can trigger the controlled switch control if he wants to modify the display state of the controlled switch control to the state that the terminal device does not allow other devices to remotely control the controlled switch control, the terminal device responds to the triggering operation of the controlled switch control, displays a verification configuration page, responds to the confirmation operation triggered on the verification configuration page, stores verification information corresponding to the verification configuration page, and verifies a second control request based on the verification information when the second control request sent by other devices for controlling the terminal device is received.
The application also provides an application scene, which can be a remote desktop control scene of equipment, wherein the application scene applies the remote operation method of the equipment, and referring to fig. 27, the method specifically comprises the following steps:
1. remote control is started.
After the security management application logs in the social account, the main control terminal equipment displays equipment identifiers of candidate equipment associated with the social account on a multi-equipment management page (which can be a web page); the user can click on the equipment identifier of the target equipment (which can be called as the controlled end equipment), remote operation items which can be executed on the target equipment, such as a desktop control item, a remote screen locking item and a remote shutdown item, are displayed on the multi-equipment management page, the user can click on the desktop control item to start operation and initiate remote operation, and if the verification mode set by the controlled end equipment is fixed password verification, the fixed password input page can be displayed so that the user can input a fixed password, and the remote operation can be initiated later; if the controlled terminal equipment is a computer terminal and the set verification mode is screen locking password verification, the screen locking password is not required to be input at present, and screen locking password login is performed on a controlled terminal system login page after the controlled terminal equipment is subsequently connected; if the controlled terminal equipment is a mobile phone terminal and the set verification mode is screen locking password verification, a screen locking password input page is displayed so that a user can input the screen locking password, and remote initiation can be performed subsequently;
2. And initiating a remote.
The active end device can also acquire account login state and related information (including guide) of the controlled end device, generate basic information such as Traceid, and then initiate a desktop control request, such as https:// jprx.m.qq.com/data/2924/forward, to the background of the target application, wherein the desktop control request carries the account login state, the related information of the controlled end device, the generated basic information such as Traceid, and a fixed password or a screen locking password input by a user.
3. And (5) performing parameter verification on the manager background and the controlled terminal equipment.
After receiving the desktop control request, the manager background checks the desktop control request, specifically can check whether the state of the controlled terminal equipment can be remotely controlled, then checks the login state and the validity of the check parameter, if the check is correct, the desktop control request is pushed to the controlled terminal equipment so that the controlled terminal equipment can check the desktop control request, specifically can perform frequency check and password validity check and parameter validity check, the frequency check can also be called active frequency limiting, namely the controlled terminal equipment can limit the frequency of checking, on one hand, in order to avoid the risk of password blasting, and on the other hand, too many attempts aiming at the system screen locking password result in Windows password check api return failure; the password validity check is carried out aiming at the password, so that the explosion risk is avoided; the parameter validity check is to check the validity of other parameters of the desktop control request, and if the parameters are null, the failure is returned directly.
4. And returning a verification result.
The controlled terminal equipment returns response information containing the request verification result to the manager background, and the response information contains some basic information of the main controlled equipment, so that the manager background can conveniently carry out subsequent operation.
5. Push back to the master.
After the manager receives the request checking result, whether the request checking result is successful or not, the manager pushes the response information containing the request checking result to the main control terminal equipment, and brings the related information needed by the subsequent WebRTC.
6. And pulling up a remote control process or prompt of the main control terminal equipment.
If the verification of the request of the controlled terminal equipment is successful, the main control terminal equipment can pull up the remote control process to carry out subsequent operation, otherwise, the flow is terminated, and the error is prompted. The remote process is also used for data transmission after the subsequent data channel is established successfully.
7. And pulling up the controlled end process.
After the remote control process of the remote main control end equipment is pulled up, the short-chain communication established with the manager background is utilized to request the manager background Push to the controlled end equipment to pull up the remote controlled process, and the main control end equipment and the controlled end equipment are sequentially added into a room by utilizing room information from the manager background Push.
8. And (5) signaling interaction.
After the master control end device and the controlled end device enter a room successfully, the master control end device and the controlled end device begin to perform Web RTC (real time clock) bottom layer signaling interaction, firstly, the master control end device takes a user signaling broadcasted by a remote signaling background, after determining that the master control end device and the controlled end device are both joined in the room, the master control end device initiates an invite signaling to the controlled end device, the controlled end device initiates a refer signaling to the master control end device after receiving the validity of the invite signaling, then the master control end device takes the refer signaling to confirm the validity of the signaling, finally, the master control end device initiates an answer signaling to the controlled end device, the controlled end successfully establishes connection after taking the call, and the connection signaling is broadcasted.
9. And establishing a data channel.
Finally, the signaling interaction is successful, a data channel can be started, at the moment, the main control terminal equipment can see the picture of the system desktop of the controlled terminal equipment, and the system desktop can be operated.
The application also provides an application scene, which can be specifically a device remote operation scene, wherein the application scene applies the device remote operation method, and the method can be specifically realized through a system shown in fig. 28: the remote operation scene of the equipment specifically utilizes the open source technology of the Web RTC to realize the remote control capability of low delay and high definition; the Web RTC technology provides a reliable framework for real-time communication, supports transmission of video, audio and general data, and enables remote operation among different devices to achieve higher efficiency and better user experience; meanwhile, the system utilizes the C++ SDK to realize remote signaling interaction, and combines a security management application background and a remote control background to realize remote control interaction logic. The design of the structure enables the system to adapt to various remote operation requirements, such as multi-equipment remote, weak connection remote (for example, remote screen locking and remote shutdown), file transmission, photo moving and other services; in terms of data security, the system takes a series of safeguards. The system comprises local verification, frequency limitation, login verification, an updating mechanism, complex room numbers and the like, wherein the security mechanisms are used for ensuring that the security and privacy property of user data are fully protected in a remote operation process; in summary, the above device remote operation scenario provides a safe, efficient, and flexible operation environment, so that a user can conveniently perform remote operation in various environments.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the application also provides a device remote operation device for realizing the above related device remote operation method. The implementation of the solution provided by the device is similar to the implementation described in the above method, so the specific limitation in the embodiments of the remote operation device for one or more devices provided below may be referred to the limitation of the remote operation method for the device hereinabove, and will not be described herein.
In one embodiment, as shown in fig. 29, there is provided a device remote operation apparatus including: a device management page display module 2902, a management list display module 2904, a control request transmission module 2906, and an operation page display module 2908, in which:
the device management page display module 2902 is configured to display, in a device management page of a target application, device identifiers of candidate devices associated with the target account, in a case where the target application is logged in based on the target account.
A management list display module 2904 for displaying a management list of the target devices including remote operation items in response to a trigger operation for a device identification of the target device among the candidate devices.
A control request sending module 2906 is configured to initiate a first control request to the target device in response to a selection operation for the target remote operation item triggered on the management list.
An operation page display module 2908 is configured to display an operation page for a target remote operation item when response information returned by the target device in response to the first control request is received.
In the above embodiment, by binding the device to the target account, the need of the user to memorize each device identification code can be eliminated, so that the device management is more centralized and convenient, no matter how many devices the user needs to manage, the user only needs to memorize the own target account information, and can log in the target application, in the device management page of the target application, the device identifications of the candidate devices associated with the target account are listed in a clear readable manner, and the candidate devices comprise terminal devices of different operating systems, the user can easily find and select the device needing to be remotely operated, in response to the triggering operation of the device identifications of the target devices in the candidate devices, the management list of the target devices comprising the remote operation items is displayed, so that the user can select the operation needing to be performed on the target devices, in response to the selecting operation of the target remote operation items triggered on the management list, a control request is initiated to the target devices, and when the response information returned by the target devices in response to the control request is received, the operation page aiming at the target remote operation items is displayed, thereby improving the efficiency and convenience of the remote operation of the device.
In one embodiment, the target remote operation item is a desktop control item; control request transmission module 2906, further for: responding to desktop control item selection operation triggered on the management list, and displaying an information verification page; displaying the input verification information aiming at the target equipment in an information verification page; and responding to the remote control operation triggered on the information verification page, and sending a desktop control request carrying verification information to the target equipment.
In one embodiment, control request transmission module 2906 is further configured to: acquiring equipment information of target equipment and a login state of a target account; sending a desktop control request carrying verification information to target equipment, wherein the desktop control request comprises: generating a desktop control request based on the verification information, the device information and the login state; and sending the desktop control request to a server of the target application, so that the server base performs authority verification on the desktop control request, and forwarding the desktop control request to the target device after the verification is passed.
In one embodiment, control request transmission module 2906 is further configured to: when response information returned by the target equipment in response to the desktop control request is received, establishing a data channel with the target equipment based on the response information; and after the establishment of the data channel is completed, displaying a system desktop of the target device.
In one embodiment, control request transmission module 2906 is further configured to: if the response information represents that the desktop control request passes the verification, starting a remote main control process; performing signaling interaction with target equipment through a remote main control process; after the signaling interaction is successful, the establishment of the data channel between the target equipment and the target equipment is completed.
In one embodiment, the system desktop is a remote system desktop; control request transmission module 2906, further for: responding to file copying operation triggered on a remote system desktop or a first file page entered through the remote system desktop, and acquiring a target file; switching from the remote system desktop to the local system desktop; receiving a target file transmitted through a data channel in response to a file pasting operation triggered on a local system desktop or a second file page entered through the local system desktop; and displaying the target file on a local system desktop or a second file page.
In one embodiment, the apparatus is applied to a terminal device; control request transmission module 2906, further for: responding to display adjustment operation triggered on a system desktop, and acquiring a network state and equipment display configuration parameters; the resolution of the system desktop is adjusted based on the network status and the device display configuration parameters.
In one embodiment, the target remote operation items are a remote lock screen item and a remote shutdown item; control request transmission module 2906, further for: responding to screen locking item selection operation or shutdown item operation triggered on the management list, and acquiring equipment information of target equipment and login state of a target account; generating a screen locking control request or a shutdown control request according to the equipment information and the login state; and sending the screen locking control request or the shutdown control request to a server of the target application, so that the server performs authority verification on the screen locking control request or the shutdown control request, and forwarding the screen locking control request or the shutdown control request to the target device after the verification is passed.
In one embodiment, the operation page is a hint page; control request transmission module 2906, further for: when response information returned by the target equipment in response to the screen locking control request or the shutdown control request is received, screen locking prompt information or shutdown prompt information is generated based on the response information; and displaying a prompt page comprising the screen locking prompt information or the shutdown prompt information.
In one embodiment, the apparatus is applied to a terminal device belonging to one of the candidate devices; as shown in fig. 30, the apparatus further includes a remote configuration module 2910 and a request receiving module 2912, wherein: the remote configuration module 2910 is configured to: responding to the triggering operation of the equipment identification of the terminal equipment, and displaying a remote configuration list; responding to the configuration operation of the controlled item triggered on the remote configuration list, and displaying a verification configuration page; responding to a confirmation operation triggered on the verification configuration page, and storing verification information corresponding to the verification configuration page; a request receiving module 2912, configured to, when receiving a second control request sent by another device and used for controlling a terminal device, verify the second control request based on verification information; the other devices belong to ones of the candidate devices.
In one embodiment, the verification information includes a lock screen password, and the verification configuration page includes a lock screen password authorization page; the remote configuration module 2910 is further configured to: responding to the authorization operation triggered on the screen locking password authorization page, and acquiring a screen locking password according to the equipment account displayed on the screen locking password authorization page; and storing the screen locking password.
In one embodiment, the verification information comprises a fixed password and the verification configuration page comprises a fixed password entry page; the remote configuration module 2910 is further configured to: displaying the input fixed password on a fixed password input page; the fixed password is stored in response to a confirmation operation triggered at the fixed password input page.
In one embodiment, the request receiving module 2912 is further configured to: performing control frequency verification on the second control request to obtain a frequency verification result; and when the frequency verification result represents that the frequency verification passes, carrying out password validity verification on the second control request based on the verification information.
In one embodiment, the remote configuration module 2910 is further to: responding to the triggering operation of the equipment identification of the terminal equipment, and displaying an image migration list; responding to the path configuration operation in the image migration list, and displaying a path configuration page; selecting an image storage path in a path configuration page; the image storage path is used for storing the image file according to the image storage path when the terminal equipment receives the image file.
In one embodiment, the target application is a security management application, as shown in fig. 30, the apparatus further includes a risk prompting module 2914 and a risk processing module 2916, where: the risk prompt module 2914 is configured to respond to a triggering operation of the device identifier of the target device, and display risk prompt information of the target device on the device management page; a risk processing module 2916, configured to initiate a risk processing request to the target device based on the risk prompt information in response to the risk processing operation; and displaying a risk processing page including the risk item when response information of the target device in response to the risk processing request is received.
In one embodiment, as shown in fig. 30, the apparatus further includes a resource occupancy hint module 2918 and a resource management module 2920, wherein: the resource occupation prompting module 2918 is configured to respond to a triggering operation of the device identifier of the target device, and display resource occupation information of the target device; the resource management module 2920 is used for responding to the triggering operation of the resource occupation information and displaying a resource management control; responding to the triggering operation of the resource management control, and initiating request information for cleaning the application process or the cache data occupying the device resource to the target device; and when receiving the information fed back by the target equipment in response to the request information, displaying the result information for cleaning the application process or the cache data.
The respective modules in the above-described device remote operation apparatus may be implemented in whole or in part by software, hardware, and a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a terminal device, and an internal structure diagram thereof may be as shown in fig. 31. The computer device includes a processor, a memory, an input/output interface, a communication interface, a display unit, and an input means. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface, the display unit and the input device are connected to the system bus through the input/output interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The input/output interface of the computer device is used to exchange information between the processor and the external device. The communication interface of the computer device is used for carrying out wired or wireless communication with external terminal equipment, and the wireless mode can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement a method of device remote operation. The display unit of the computer equipment is used for forming a visual picture, and can be a display screen, a projection device or a virtual reality imaging device, wherein the display screen can be a liquid crystal display screen or an electronic ink display screen, the input device of the computer equipment can be a touch layer covered on the display screen, can also be a key, a track ball or a touch pad arranged on a shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the structure shown in FIG. 31 is merely a block diagram of some of the structures associated with the present inventive arrangements and is not limiting of the computer device to which the present inventive arrangements may be applied, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In an embodiment, there is also provided a computer device comprising a memory and a processor, the memory having stored therein a computer program, the processor implementing the steps of the method embodiments described above when the computer program is executed.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored which, when executed by a processor, carries out the steps of the method embodiments described above.
In an embodiment, a computer program product is provided, comprising a computer program which, when executed by a processor, implements the steps of the method embodiments described above.
It should be noted that, the user information (including but not limited to user equipment information, user personal information, etc.) and the data (including but not limited to data for analysis, stored data, presented data, etc.) related to the present application are information and data authorized by the user or sufficiently authorized by each party, and the collection, use and processing of the related data need to comply with the related laws and regulations and standards of the related country and region.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the embodiments provided herein may include at least one of a relational database and a non-relational database. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processor referred to in the embodiments provided in the present application may be a general-purpose processor, a central processing unit, a graphics processor, a digital signal processor, a programmable logic unit, a data processing logic unit based on quantum computing, or the like, but is not limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the application and are described in detail herein without thereby limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of the application should be assessed as that of the appended claims.

Claims (20)

1. A method of remotely operating a device, the method comprising:
in the case of logging in a target application based on a target account, displaying device identifiers of candidate devices associated with the target account in a device management page of the target application;
responding to the triggering operation of the device identification of the target device in the candidate devices, and displaying a management list of the target device, wherein the management list comprises remote operation items;
Responding to a selection operation for a target remote operation item triggered on the management list, and initiating a first control request to the target equipment;
and when response information returned by the target equipment in response to the first control request is received, displaying an operation page aiming at the target remote operation item.
2. The method of claim 1, wherein the target remote operation item is a desktop control item; the responding to the selection operation for the target remote operation item triggered on the management list, initiating a first control request to the target equipment, comprising:
responding to desktop control item selection operation triggered on the management list, and displaying an information verification page;
displaying the input verification information aiming at the target equipment in the information verification page;
and responding to remote control operation triggered on the information verification page, and sending a desktop control request carrying the verification information to the target equipment.
3. The method according to claim 2, wherein the method further comprises:
acquiring equipment information of the target equipment and a login state of the target account;
The sending the desktop control request carrying the verification information to the target device comprises the following steps:
generating a desktop control request based on the verification information, the device information and the login state;
and sending the desktop control request to a server of the target application, so that the server base performs authority verification on the desktop control request, and forwarding the desktop control request to the target device after verification is passed.
4. The method according to claim 2, wherein displaying an operation page for the target remote operation item when response information returned by the target device in response to the first control request is received, comprises:
when response information returned by the target equipment in response to the desktop control request is received, establishing a data channel with the target equipment based on the response information;
and after the data channel is established, displaying a system desktop of the target equipment.
5. The method of claim 4, wherein the establishing a data channel with the target device based on the response information comprises:
if the response information characterizes that the desktop control request passes the verification, starting a remote main control process;
Performing signaling interaction with the target equipment through the remote main control process;
and after the signaling interaction is successful, completing the establishment of a data channel between the target equipment and the signaling interaction.
6. The method of claim 4, wherein the system desktop is a remote system desktop; the method further comprises the steps of:
responding to file copying operation triggered on the remote system desktop or a first file page entered through the remote system desktop, and acquiring a target file;
switching from the remote system desktop to a local system desktop;
receiving the target file transmitted through the data channel in response to a file paste operation triggered on the local system desktop or a second file page entered through the local system desktop;
and displaying the target file on the local system desktop or the second file page.
7. The method according to claim 4, wherein the method is applied to a terminal device; the method further comprises the steps of:
responding to display adjustment operation triggered on the system desktop, and acquiring a network state and equipment display configuration parameters;
and adjusting the resolution of the system desktop based on the network state and the device display configuration parameters.
8. The method of claim 1, wherein the target remote operation items are a remote lock screen item and a remote shutdown item; the responding to the selection operation for the target remote operation item triggered on the management list, initiating a first control request to the target equipment, comprising:
responding to a screen locking item selection operation or a shutdown item operation triggered on the management list, and acquiring equipment information of the target equipment and a login state of the target account;
generating a screen locking control request or a shutdown control request according to the equipment information and the login state;
and sending the screen locking control request or the shutdown control request to a server of the target application, so that the server performs authority verification on the screen locking control request or the shutdown control request, and forwarding the screen locking control request or the shutdown control request to the target equipment after the verification is passed.
9. The method of claim 8, wherein the operation page is a hint page; when receiving response information returned by the target device in response to the first control request, displaying an operation page aiming at the target remote operation item, wherein the operation page comprises the following steps:
When response information returned by the target equipment in response to the screen locking control request or the shutdown control request is received, screen locking prompt information or shutdown prompt information is generated based on the response information;
and displaying a prompt page comprising the screen locking prompt information or the shutdown prompt information.
10. The method according to claim 1, characterized in that it is applied to terminal devices belonging to one of the candidate devices; the method further comprises the steps of:
responding to the triggering operation of the equipment identification of the terminal equipment, and displaying a remote configuration list;
responding to the configuration operation of the controlled item triggered on the remote configuration list, and displaying a verification configuration page;
responding to a confirmation operation triggered on the verification configuration page, and storing verification information corresponding to the verification configuration page;
when a second control request for controlling the terminal equipment, which is sent by other equipment, is received, checking the second control request based on the checking information; the other device belongs to one of the candidate devices.
11. The method of claim 10, wherein the verification information comprises a lock screen password and the verification configuration page comprises a lock screen password authorization page;
The response to the confirmation operation triggered on the check configuration page stores check information corresponding to the check configuration page, including:
responding to the authorization operation triggered by the screen locking password authorization page, and acquiring the screen locking password according to the equipment account displayed on the screen locking password authorization page;
and storing the screen locking password.
12. The method of claim 10, wherein the verification information comprises a fixed password, and the verification configuration page comprises a fixed password entry page;
the response to the confirmation operation triggered on the check configuration page stores check information corresponding to the check configuration page, including:
displaying the input fixed password on the fixed password input page;
and responding to a confirmation operation triggered on the fixed password input page, and storing the fixed password.
13. The method of claim 10, wherein the verifying the second control request based on the verification information comprises:
performing control frequency verification on the second control request to obtain a frequency verification result;
and when the frequency verification result represents that the frequency verification is passed, carrying out password validity verification on the second control request based on the verification information.
14. The method according to claim 10, wherein the method further comprises:
responding to the triggering operation of the equipment identification of the terminal equipment, and displaying an image migration list;
responding to the path configuration operation in the image migration list, and displaying a path configuration page;
selecting an image storage path in the path configuration page; the image storage path is used for storing the image file according to the image storage path when the terminal equipment receives the image file.
15. The method of any one of claims 1 to 14, wherein the target application is a security management application, the method further comprising:
responding to the triggering operation of the equipment identification of the target equipment, and displaying risk prompt information of the target equipment on the equipment management page;
responding to risk processing operation, and initiating a risk processing request to the target equipment based on the risk prompt information;
and displaying a risk processing page comprising a risk item when response information of the target device responding to the risk processing request is received.
16. The method of claim 15, wherein the method further comprises:
Responding to the triggering operation of the equipment identification of the target equipment, and displaying the resource occupation information of the target equipment;
responding to the triggering operation of the resource occupation information, and displaying a resource management control;
responding to the triggering operation of the resource management control, and initiating request information for cleaning the application process or the cache data occupying the equipment resource to the target equipment;
and when the information fed back by the target equipment in response to the request information is received, displaying the result information for cleaning the application process or the cache data.
17. A device for remotely operating an apparatus, the device comprising:
the device management page display module is used for displaying device identifiers of candidate devices associated with a target account in a device management page of a target application under the condition that the target application is logged in based on the target account;
a management list display module, configured to display a management list including remote operation items of a target device in the candidate devices in response to a trigger operation of a device identifier of the target device;
a control request sending module, configured to initiate a first control request to the target device in response to a selection operation for a target remote operation item triggered on the management list;
And the operation page display module is used for displaying an operation page aiming at the target remote operation item when receiving response information returned by the target equipment in response to the first control request.
18. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any one of claims 1 to 16 when the computer program is executed.
19. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 16.
20. A computer program product comprising a computer program, characterized in that the computer program, when executed by a processor, implements the steps of the method of any one of claims 1 to 16.
CN202310960899.0A 2023-07-31 2023-07-31 Device remote operation method, device, computer device and storage medium Pending CN116743496A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310960899.0A CN116743496A (en) 2023-07-31 2023-07-31 Device remote operation method, device, computer device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310960899.0A CN116743496A (en) 2023-07-31 2023-07-31 Device remote operation method, device, computer device and storage medium

Publications (1)

Publication Number Publication Date
CN116743496A true CN116743496A (en) 2023-09-12

Family

ID=87908270

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310960899.0A Pending CN116743496A (en) 2023-07-31 2023-07-31 Device remote operation method, device, computer device and storage medium

Country Status (1)

Country Link
CN (1) CN116743496A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117675805A (en) * 2024-01-30 2024-03-08 荣耀终端有限公司 Remote control method and electronic equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117675805A (en) * 2024-01-30 2024-03-08 荣耀终端有限公司 Remote control method and electronic equipment

Similar Documents

Publication Publication Date Title
US11838324B2 (en) Secure web container for a secure online user environment
US20240106865A1 (en) Secure Web Container for a Secure Online User Environment
US11716315B2 (en) Disposable browsers and authentication techniques for a secure online user environment
US11848936B2 (en) Method, apparatus, and computer program product for selectively granting permissions to group-based objects in a group-based communication system
US10616210B2 (en) Protection feature for data stored at storage service
US9292323B2 (en) Context aware virtual desktop
JP6859512B2 (en) Methods and devices for authenticated login
US10742649B1 (en) Secure authentication and virtual environment setup
JP2018533141A (en) Access server authenticity check initiated by end user
US11677696B2 (en) Architecture for performing action in a third-party service by an email client
US20210182440A1 (en) System for preventing access to sensitive information and related techniques
US20220100874A1 (en) Data loss protection on secondary displays
CN116743496A (en) Device remote operation method, device, computer device and storage medium
US11544415B2 (en) Context-aware obfuscation and unobfuscation of sensitive content
CN103036852A (en) Method and device for achieving network login
US11768692B2 (en) Systems and methods for automated application launching
EP3827362A1 (en) Web browser incorporating social and community features
US20230419067A1 (en) ENHANCED QUICK RESPONSE (qr) CODE SCAN SECURITY
JP2017219918A (en) Service provision system, service provision method, and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40092371

Country of ref document: HK