CN105956489A - Remote control method and device - Google Patents

Remote control method and device Download PDF

Info

Publication number
CN105956489A
CN105956489A CN201610285277.2A CN201610285277A CN105956489A CN 105956489 A CN105956489 A CN 105956489A CN 201610285277 A CN201610285277 A CN 201610285277A CN 105956489 A CN105956489 A CN 105956489A
Authority
CN
China
Prior art keywords
application
terminal
privacy
remote
remote control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610285277.2A
Other languages
Chinese (zh)
Other versions
CN105956489B (en
Inventor
林形省
毛良瑾
葛旭东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610285277.2A priority Critical patent/CN105956489B/en
Publication of CN105956489A publication Critical patent/CN105956489A/en
Application granted granted Critical
Publication of CN105956489B publication Critical patent/CN105956489B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2125Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation

Abstract

The invention discloses a remote control method and device, and belongs to the technical field of the Internet. The method is applied to a first terminal. The method comprises the steps of receiving a remote control request sent by a second terminal; determining at least one private application from the applications in the first terminal when an acknowledgement instruction is detected based on the remote control request; hiding the at least one private application; and establishing remote connection with the second terminal. According to the method and the device, the second user is avoided from knowing the application information of the private application in the first terminal, the private application in the first terminal is avoided from being started by the second user due to misoperation, and the privacy of the first terminal can be prevented from being leaked.

Description

Long-range control method and device
Technical field
It relates to Internet technical field, particularly relate to a kind of long-range control method and device.
Background technology
Along with the development of Internet technology, in order to meet user's demand for terminal management, often can lead to Cross remote control technology and realize the Screen sharing between two or many station terminals and control, wherein, by remotely The terminal controlled is properly termed as first terminal, and the terminal remotely controlled first terminal is properly termed as second Terminal.Owing to remote control technology has high priority control characteristic, this high priority control characteristic is embodied in Second terminal has all permissions being controlled first terminal, so entering first terminal in the second terminal During row remotely controls, the user of the second terminal is used easily to open in first terminal due to maloperation Comprise the application of privacy information, thus cause the privacy leakage of first terminal, therefore, need one badly and can keep away Exempt from the long-range control method of the privacy leakage of first terminal.
Summary of the invention
For overcoming problem present in correlation technique, the disclosure provides a kind of long-range control method and device.
First aspect according to disclosure embodiment, it is provided that a kind of long-range control method, is applied to first terminal, Described method includes:
Receive the remote control notification that the second terminal sends;
When confirmation instruction being detected based on described remote control notification, from the application of described first terminal, Determine that at least one privacy is applied;
At least one privacy described application is hidden;
Set up with described second terminal and be remotely connected.
In conjunction with first aspect, in the first possible implementation of above-mentioned first aspect, described from described In the application of first terminal, determine that at least one privacy is applied, including:
Obtain the remote community of application in described first terminal, described remote community include display state or Hidden state, described remote community applies state in which for instruction described in remote control process;
When the remote community of described application is hidden state, determine that described application is privacy application.
In conjunction with the first possible implementation of first aspect or first aspect, in the of above-mentioned first aspect In two kinds of possible implementations, described method also includes:
When described remote control notification carries remotely control list, described long-range control list is included The corresponding application of at least one application identities show;
Determining that appointment is applied to apply for privacy, described appointment is applied as removing described at least one in described first terminal Application outside the corresponding application of individual application identities.
In conjunction with the implementation that the second of first aspect is possible, possible at the third of above-mentioned first aspect In implementation, described method also includes:
For each application in described first terminal, when the preset instructions for described application being detected, Application identities corresponding for described application is added in described long-range control list;
For each application identities at least one application identities that described long-range control list includes, when Detect when the deletion for described application identities instructs, from described long-range control list, delete described application Mark.
In conjunction with the first possible implementation of first aspect, possible the 4th kind of above-mentioned first aspect In implementation, described method also includes:
For each application in described first terminal, when detecting that the first attribute for described application is arranged During instruction, the remote community of described application is set to display state;
When detecting that the second attribute for described application arranges instruction, the remote community of described application is set It is set to hidden state.
In conjunction with the first possible implementation of first aspect to first aspect, first aspect the third can Can implementation to arbitrary possible implementation in the 4th kind of possible implementation of first aspect, In 5th kind of possible implementation of above-mentioned first aspect, described on current desktop display described at least After one privacy application is hidden, described method also includes:
At least one application do not hidden on the desktop of described first terminal is arranged according to specified rule.
Second aspect according to disclosure embodiment, it is provided that a kind of remote control, described device includes:
Receiver module, for receiving the remote control notification that the second terminal sends;
First determines module, for when confirmation instruction being detected based on described remote control notification, from first In the application of terminal, determine that at least one privacy is applied;
Hide module, at least one privacy described application is hidden;
Link block, is remotely connected for setting up with described second terminal.
In conjunction with second aspect, in the first possible implementation of above-mentioned second aspect, described first true Cover half block includes:
Acquiring unit, for when confirmation instruction being detected based on described remote control notification, obtaining described the The remote community of the application in one terminal, described remote community includes display state or hidden state, described Remote community applies state in which for instruction described in remote control process;
Determine unit, for when the remote community of described application is hidden state, determine that described application is hidden Private application.
In conjunction with the first possible implementation of second aspect or second aspect, in the of above-mentioned second aspect In two kinds of possible implementations, described device also includes:
Display module, for when described remote control notification carries remotely control list time, by described remotely Control application corresponding at least one application identities that list includes to show;
Second determines module, is used for determining that appointment application is applied for privacy, and described appointment is applied as described first Application in addition to the corresponding application of at least one application identities described in terminal.
In conjunction with the implementation that the second of second aspect is possible, possible at the third of above-mentioned second aspect In implementation, described device also includes:
Add module, for for each application in described first terminal, when detecting for described application Preset instructions time, application identities corresponding for described application is added in described long-range control list;
Removing module, every at least one application identities that described long-range control list is included Individual application identities, when detecting that the deletion for described application identities instructs, from described long-range control list The described application identities of middle deletion.
In conjunction with the first possible implementation of second aspect, possible the 4th kind of above-mentioned second aspect In implementation, described device also includes:
First arranges module, for for each application in described first terminal, when detecting for described When first attribute of application arranges instruction, the remote community of described application is set to display state;
Second arranges module, for when detecting that the second attribute for described application arranges instruction, by institute The remote community stating application is set to hidden state.
In conjunction with the first possible implementation of second aspect to second aspect, second aspect the third can Can implementation to arbitrary possible implementation in the 4th kind of possible implementation of second aspect, In 5th kind of possible implementation of above-mentioned second aspect, described device also includes:
Arrangement module, applies according to appointment at least one will do not hidden on the desktop of described first terminal Regularly arranged.
The third aspect according to disclosure embodiment, it is provided that a kind of remote control, described device includes:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Receive the remote control notification that the second terminal sends;
When confirmation instruction being detected based on described remote control notification, from the application of first terminal, determine At least one privacy is applied;
At least one privacy described application is hidden;
Set up with described second terminal and be remotely connected.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect: in disclosure embodiment In, first terminal can receive the remote control notification that the second terminal sends, and when based on this, remotely control please Ask and detect when confirmation instructs, can determine that at least one privacy is applied from the application of first terminal, and Being hidden the application of this at least one privacy, afterwards, first terminal can be set up with the second terminal and remotely connect Connect.During first terminal remotely being controlled in the second terminal, first terminal does not show hidden Private application, it can thus be avoided the second user knows the application message of the privacy application in first terminal, and The application of the privacy in first terminal can be avoided to be opened due to maloperation by the second user, thus effectively prevent The privacy leakage of first terminal.
It should be appreciated that it is only exemplary and explanatory that above general description and details hereinafter describe, The disclosure can not be limited.
Accompanying drawing explanation
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet the present invention Embodiment, and for explaining the principle of the present invention together with description.
Fig. 1 is the flow chart according to a kind of long-range control method shown in an exemplary embodiment.
Fig. 2 is the flow chart according to the another kind of long-range control method shown in an exemplary embodiment.
Fig. 3 is the schematic diagram according to a kind of remote control notification shown in an exemplary embodiment.
Fig. 4 (a) is the schematic diagram according to a kind of long-range control list shown in an exemplary embodiment.
Fig. 4 (b) is according to the another kind of schematic diagram remotely controlling list shown in an exemplary embodiment.
Fig. 4 (c) is the schematic diagram remotely controlling list according to another shown in an exemplary embodiment.
Fig. 5 (a) is according to the signal of the application of display on a kind of first terminal shown in an exemplary embodiment Figure.
Fig. 5 (b) is showing according to the application shown on the another kind of first terminal shown in an exemplary embodiment It is intended to.
Fig. 6 (a) is according to the schematic diagram of the application of display on a kind of desktop shown in an exemplary embodiment.
Fig. 6 (b) is according to the schematic diagram of the application of display on the another kind of desktop shown in an exemplary embodiment.
Fig. 7 is the block diagram according to the first remote control shown in an exemplary embodiment.
Fig. 8 is the block diagram determining module according to a kind of first shown in an exemplary embodiment.
Fig. 9 is the block diagram according to the second remote control shown in an exemplary embodiment.
Figure 10 is the block diagram according to the third remote control shown in an exemplary embodiment.
Figure 11 is the block diagram according to the 4th shown in an exemplary embodiment kind remote control.
Figure 12 is the block diagram according to the 5th shown in an exemplary embodiment kind remote control.
Figure 13 is the block diagram according to the 6th shown in an exemplary embodiment kind remote control.
Detailed description of the invention
Here will illustrate exemplary embodiment in detail, its example represents in the accompanying drawings.Following retouches Stating when relating to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous key element. Embodiment described in following exemplary embodiment does not represent all embodiment party consistent with the present invention Formula.On the contrary, they only with describe in detail in appended claims, the present invention some in terms of mutually one The example of the apparatus and method caused.
Before disclosure embodiment is carried out explanation explained in detail, the first applied field to disclosure embodiment Scape is explained.In order to meet user's demand for terminal management, remote control technology often can be passed through Realize the Screen sharing between two or many station terminals and control.And due in the second terminal to first terminal During remotely controlling, the second terminal has all permissions being controlled first terminal, so The user using the second terminal easily opens in first terminal the application comprising privacy information due to maloperation, Thus cause the privacy leakage of first terminal, therefore, disclosure embodiment provides a kind of long-range control method, Avoid the privacy leakage of first terminal.
Fig. 1 is the flow chart according to a kind of long-range control method shown in an exemplary embodiment, and the method is used In first terminal.As it is shown in figure 1, the method comprises the following steps.
In a step 101, the remote control notification that the second terminal sends is received.
In a step 102, when confirmation instruction being detected based on remote control notification, answering from first terminal In with, determine that at least one privacy is applied.
In step 103, the application of at least one privacy is hidden.
At step 104, remotely it is connected with the second terminal foundation.
In the disclosed embodiments, first terminal can receive the remote control notification that the second terminal sends, and When based on this remote control notification detect confirmation instruction time, can from the application of first terminal, determine to Few privacy application, and be hidden the application of this at least one privacy, afterwards, first terminal can be with Second terminal is set up and is remotely connected.During first terminal remotely being controlled in the second terminal, Do not show on first terminal that privacy is applied, it can thus be avoided the second user knows the privacy in first terminal The application message of application, and the privacy application in first terminal can be avoided due to maloperation by the second user Open, thus effectively prevent the privacy leakage of first terminal.
In another embodiment of the disclosure, from the application of first terminal, determine that at least one privacy is applied, Including:
The remote community of the application in acquisition first terminal, remote community includes display state or hidden state, Remote community applies state in which for instruction in remote control process;
When the remote community of application is hidden state, determine that application is applied for privacy.
In another embodiment of the disclosure, the method also includes:
When remote control notification carries remotely control list, will remotely control list includes at least one The corresponding application of individual application identities shows;
Determine that appointment application is applied for privacy, it is intended that apply as first terminal removes at least one application identities institute Application outside corresponding application.
In another embodiment of the disclosure, the method also includes:
For each application in first terminal, when the preset instructions for application being detected, application is right The application identities answered is added in remotely control list;
For remotely controlling each application identities at least one application identities that list includes, work as detection When arriving the deletion instruction for application identities, from remotely controlling list is deleted application identities.
In another embodiment of the disclosure, the method also includes:
For each application in first terminal, when detecting that the first attribute for application arranges instruction, The remote community of application is set to display state;
When detecting that the second attribute for application arranges instruction, it is set to hide by the remote community of application State.
In another embodiment of the disclosure, the method also includes:
At least one application do not hidden on the desktop of first terminal is arranged according to specified rule.
Above-mentioned all optional technical schemes, all can be according to arbitrarily combining the alternative embodiment forming the disclosure, this This is repeated by open embodiment the most one by one.
Fig. 2 is the flow chart according to a kind of long-range control method shown in an exemplary embodiment, and the method is used In first terminal.As in figure 2 it is shown, the method comprises the following steps.
In step 201, the remote control notification that the second terminal sends is received.
Remotely control it should be noted that first terminal can receive this by cable network or wireless network Request, this is not specifically limited by disclosure embodiment.
It addition, first terminal is remotely controlled by remote control notification for request, and this remotely controls to ask Can carry the second terminal iidentification etc. in asking, this is not specifically limited by disclosure embodiment.
Wherein, the second terminal iidentification is for unique mark the second terminal, and this second terminal iidentification can be this The title of the second terminal, the MAC (Media Access Control, medium access control) of this second terminal Addresses etc., this is not specifically limited by disclosure embodiment.
Such as, this second terminal iidentification is the title of this second terminal, and the entitled fruit fruit of this second terminal, Then this remote control notification can be to show as form as shown in Figure 3, and certainly, in actual application, this is long-range Control request can be to show as other form, and this is not specifically limited by disclosure embodiment.
In step 202., when confirmation instruction being detected based on this remote control notification, from first terminal In application, determine that at least one privacy is applied.
It should be noted that after first terminal receives the remote control notification that the second terminal sends, this is the years old This remote control notification can be shown by one terminal, in order to first user can be to this remote control notification Process.Wherein, first user is the user using this first terminal, and first terminal is to this long-range control When request processed shows, can be shown by the form of pop-up, it is also possible to carried out by other forms Display, this is not specifically limited by disclosure embodiment.
It should be noted that confirm that instruction is used for indicating first terminal to accept this remote control notification, and this is true Recognizing instruction to be triggered by first user, this first user can be triggered by assigned operation, this assigned operation Can be single-click operation, double click operation, voice operating etc., this be not specifically limited by disclosure embodiment. Such as, in remote control notification as shown in Figure 3, when first terminal detects for "Yes" button During the clicking operation such as single-click operation, double click operation, it may be determined that confirmation detected based on this remote control notification Instruction, or, when first terminal detects the voice messaging that voice content is " acceptance ", "Yes" etc., May determine that and confirmation instruction detected based on this remote control notification.
It addition, privacy application can be the application comprising privacy information, it is also possible to for freely being set by first user Fixed application, this is not specifically limited by disclosure embodiment.In one embodiment, this privacy is applied such as Can be instant messaging application, shopping platform application etc..In another embodiment, the application of this privacy is such as also Can be that first user is set as having the application accessing restriction, such as, shooting application, note be applied, are dialled Number application etc..Wherein, privacy information can include ID (identity number) card No., phone number, Bank Account Number, client Title, account balance, birthdate etc., this is not specifically limited by disclosure embodiment.
Wherein, from the application of first terminal, determine when at least one privacy is applied, first can be obtained eventually The remote community of the application in end, this remote community includes display state or hidden state, this remote community For instruction this application state in which in remote control process;When the remote community of this application is for hiding shape During state, determine that this application is privacy application;When the remote community of this application is display state, determine that this should With not applying for privacy.Owing to directly can judge that this should according to the remote community of the application in first terminal Whether with being privacy application, this judge process is simple and convenient, and therefore, disclosure embodiment can from first eventually In the application of end, quickly determine that at least one privacy is applied, thus improve this at least one privacy and apply really Determine efficiency.
Such as, the application of first terminal is application 1, application 2, application 3 and application 4, then can obtain respectively Take application 1, application 2, application 3 and the remote community of application 4, it is assumed that the remote community of application 1 is display State, the remote community of application 2 are hidden state, apply the remote community of 3 to be display state, apply 4 Remote community be display state, then may determine that application 2 for privacy apply, application 1, application 3 and apply 4 do not apply for privacy.
Further, when this remote control notification carries remotely control list, it is also possible to this is remotely controlled The corresponding application of at least one application identities that list processed includes shows, and determines that appointment application is for hidden Private is applied, and this appointment application is answering in addition to applying corresponding to this at least one application identities in first terminal With.Determine that the privacy in first terminal should quickly and easily owing to directly can remotely control list according to this With with can carry out the application that shows, without carrying out other complex operations, it is thus possible to improve really Determine efficiency.
Such as, the application of first terminal is application 1, application 2, application 3 and application 4, and this remotely controls row The corresponding application of at least one application identities that table includes is application 1, application 3 and application 4, then can be by Apply 1, application 3 and application 4 to show, the application of first terminal will remove application 1, application 3 and answer It is defined as specifying application with the application 2 outside 4, and determines that this appointment application 2 is applied for privacy.
It should be noted that remotely control list for instruction will this remotely control list is carried at least one The corresponding application of individual application identities shows.Such as, when this at least one application identities be application identities 1, When application identities 3, application identities 4, this remotely controls list can show as the shape as shown in Fig. 4 (a) Formula, certainly, in actual application, this remotely controls list can be to show as other form, and the disclosure is implemented This is not specifically limited by example.
It addition, application identities is for uniquely identifying application, if this application identities can be the application name of this application Title, application icon etc., this is not specifically limited by disclosure embodiment,
Further, it is also possible to for each application in first terminal, when detecting for this application During preset instructions, application identities corresponding for this application is added to this and remotely controls in list;Long-range for this Control each application identities at least one application identities that list includes, when detecting for this application When the deletion of mark instructs, remotely control from this this application identities is deleted in list.
Owing to preset instructions and deletion instruction all can be triggered by first user, therefore, disclosure embodiment is real It is that first user is added operation or deletion action to this long-range control list on border.And due to remotely control List processed is for determining the privacy application in first terminal and can carry out the application shown, therefore, first uses Family is added the process of operation or deletion action and the most namely determines first this long-range control list Privacy in terminal is applied and can carry out the process of the application shown, this determines process simple and flexible, not only The time of determination can be saved, it is also possible to meet the privacy requirements of first user, thus ensure that first terminal Personal secrets, and improve the operating experience of first user.
It should be noted that application is added in remotely control list by preset instructions for instruction, and this is pre- If instruction can be triggered by first user, this first user can be triggered by assigned operation, and the disclosure is implemented This is not specifically limited by example.Application identities is controlled list from long-range it addition, delete instruction for instruction Deleting, and this deletion instruction can be triggered by first user, this first user can be triggered by assigned operation, This is not specifically limited by disclosure embodiment.
Such as, this remotely controls at least one application identities that list includes is application identities 1, application identities 3, application identities 4, and this remotely controls list and shows as the form as shown in Fig. 4 (a), first terminal Application is application 1, application 2, application 3 and application 4, it is assumed that the preset instructions for application 2 detected, And the application identities of this application 2 correspondence is application identities 2, then can add this application identities 2 to this long-range Control in list, add the remotely control list after this application identities 2 and can show as shown in Fig. 4 (b) Form.
The most such as, this remotely controls at least one application identities that list includes is application identities 1, application mark Know 3, application identities 4, and this remotely controls list and shows as the form as shown in Fig. 4 (a), it is assumed that detection Instruct to the deletion for application identities 1, then can remotely control from this this application identities 1 is deleted in list, Delete the remotely control list after this application identities 1 and can show as the form as shown in Fig. 4 (c).
Further, it is also possible to for each application in first terminal, when detecting for this application When one attribute arranges instruction, the remote community of this application is set to display state;Should for this when detecting The second attribute time instruction is set, the remote community of this application is set to hidden state.Owing to first belongs to Property arrange instruction and second property control instruction all can be triggered by first user, therefore, disclosure embodiment Actually operation is set according to the attribute of first user and determines the remote community of the application in first terminal, This determines process simple and flexible, meets the privacy requirements of first user, it is ensured that the privacy peace of first terminal Entirely.
It is set to show by the remote community of application it should be noted that the first attribute arranges instruction for instruction State, and this first attribute arranges instruction and can be triggered by first user, this first user can be by specifying Operation triggers, and this is not specifically limited by disclosure embodiment.It addition, the second attribute arranges instruction for referring to Show and the remote community of application be set to hidden state, and this second attribute instruction is set can be by first user Triggering, this first user can be triggered by assigned operation, and this is not specifically limited by disclosure embodiment.
Such as, the application of first terminal is application 1, application 2, application 3 and application 4, it is assumed that pin detected First attribute of application 4 is arranged instruction, then the remote community of application 4 can be set to display state.
Such as, the application of first terminal is application 1, application 2, application 3 and application 4, it is assumed that pin detected Second attribute of application 2 is arranged instruction, then the remote community of application 2 can be set to hidden state.
In step 203, the application of this at least one privacy is hidden.
It should be noted that the operation being hidden the application of this at least one privacy is referred to correlation technique In some is applied the operation that is hidden, this is not described in detail by disclosure embodiment.
It addition, after the application of this at least one privacy is hidden, the application of this at least one privacy will be in and can not touch Hair-like state, this can not trigger state and refer to that the application of this at least one privacy can not be opened.
Such as, as shown in Fig. 5 (a), on first terminal, the application of display is application 1, application 2, application 3 With application 4, the application of this at least one privacy is application 2, then can be hidden application 2, hiden application After 2, on first terminal, the application of display can be as shown in Fig. 5 (b).
Further, it is also possible at least one application do not hidden on the desktop of first terminal is advised according to appointment Then arrange, in order to this at least one application do not hidden is operated by first user, such that it is able to improve The operating experience of first user, and the visual effect of this desktop can be improved.
It should be noted that specified rule can pre-set, if this specified rule can be according to application The renewal time is arranged by the order of morning to evening, according to the order arrangement etc. of the initial of the Apply Names applied, This is not specifically limited by disclosure embodiment.
Such as, it is intended that rule is the order arrangement by morning to evening of the time that updates according to application, such as Fig. 6 (a) Shown in, at least one application that the desktop of first terminal is not hidden is application 1, application 3 and application 4, and The renewal time of application 1 is 2016-4-13 10:12, and the renewal time of application 3 is 2016-4-12 15:12, should Be 2016-4-13 13:12 with the renewal time of 4, then can be by application 1, application 3 and application 4 according to application 1, the time that updates of application 3 and application 4 is arranged by the order application 3 of morning to evening, application 1, application 4, On desktop after this arrangement, the application of display can be as shown in Fig. 6 (b).
In step 204, remotely it is connected with the second terminal foundation.
It should be noted that set up, with the second terminal, the process being remotely connected to be referred to correlation technique, these public affairs Open embodiment this is not described in detail.It addition, first terminal and the second terminal are set up after remotely connecting, First terminal can remotely be controlled by the second terminal, and this is not specifically limited by disclosure embodiment.
It should be noted that in disclosure embodiment, first terminal is remotely controlled in the second terminal During, the desktop of first terminal does not show privacy is applied, thus be possible not only to avoid the second user to know The application message of the privacy application in first terminal, it is also possible to avoid the privacy in first terminal to apply by second User opens due to maloperation, such that it is able to effectively prevent the privacy leakage of first terminal.Wherein, second User is for using the user of the second terminal.
Further, after setting up with the second terminal and being remotely connected, long-range when detect with the second terminal When connecting already off, it is also possible to current first terminal recovering state is remotely connected to the second terminal foundation First terminal state before connecing, in order to first user can be when first terminal be remotely controlled, to Privacy application in one terminal operates, and improves the operating experience of first user.
It should be noted that first terminal state can include the application message of the application of display on first terminal And the arrangement mode etc. of the application of display on the desktop of first terminal, this is not done specifically by disclosure embodiment Limit.
In the disclosed embodiments, first terminal can receive the remote control notification that the second terminal sends, and When based on this remote control notification detect confirmation instruction time, can from the application of first terminal, determine to Few privacy application, and be hidden the application of this at least one privacy, afterwards, first terminal can be with Second terminal is set up and is remotely connected.During first terminal remotely being controlled in the second terminal, Do not show on first terminal that privacy is applied, it can thus be avoided the second user knows the privacy in first terminal The application message of application, and the privacy application in first terminal can be avoided due to maloperation by the second user Open, thus effectively prevent the privacy leakage of first terminal.
Fig. 7 is the block diagram according to a kind of remote control shown in an exemplary embodiment.With reference to Fig. 7, should Device includes receiver module 701, determines module 702, hides module 703 and link block 704.
Receiver module 701, for receiving the remote control notification that the second terminal sends;
First determines module 702, for when confirmation instruction being detected based on remote control notification, whole from first In the application of end, determine that at least one privacy is applied;
Hide module 703, for the application of at least one privacy is hidden;
Link block 704, sets up with the second terminal and is remotely connected.
In another embodiment of the disclosure, with reference to Fig. 8, this first determines that module 702 includes acquiring unit 7021 and determine unit 7022.
Acquiring unit 7021, for when confirmation instruction being detected based on remote control notification, obtains first eventually The remote community of the application in end, remote community includes display state or hidden state, and remote community is used for State in which is applied in instruction in remote control process;
Determine unit 7022, for when the remote community of application is hidden state, determine that application should for privacy With.
In another embodiment of the disclosure, with reference to Fig. 9, this device also includes that display module 705 and second is true Cover half block 706.
Display module 705, for when carrying remotely control list in remote control notification, will remotely control row The corresponding application of at least one application identities that table includes shows;
Second determines module 706, is used for determining that appointment application is applied for privacy, it is intended that apply as on current desktop In the application of display except at least one application identities is corresponding apply in addition to application.
In another embodiment of the disclosure, with reference to Figure 10, this device also includes adding module 707 and deleting Module 708.
Add module 707, for for each application in first terminal, when presetting for application being detected During instruction, the application identities that application is corresponding is added to and remotely controls in list;
Removing module 708, for each for remotely control at least one application identities that list includes Application identities, when detecting that the deletion for application identities instructs, from remotely controlling to delete list application Mark.
In another embodiment of the disclosure, with reference to Figure 11, this device also includes that first arranges module 709 He Second arranges module 710.
First arranges module 709, for for each application in first terminal, when detecting for application When first attribute arranges instruction, the remote community of application is set to display state;
Second arranges module 710, for when detecting that the second attribute for application arranges instruction, will apply Remote community be set to hidden state.
In another embodiment of the disclosure, with reference to Figure 12, this device also includes arranging module 711.
Arrangement module 711, applies according to specifying rule at least one will do not hidden on the desktop of first terminal Then arrange.
In the disclosed embodiments, first terminal can receive the remote control notification that the second terminal sends, and When based on this remote control notification detect confirmation instruction time, can from the application of first terminal, determine to Few privacy application, and be hidden the application of this at least one privacy, afterwards, first terminal can be with Second terminal is set up and is remotely connected.During first terminal remotely being controlled in the second terminal, Do not show on first terminal that privacy is applied, it can thus be avoided the second user knows the privacy in first terminal The application message of application, and the privacy application in first terminal can be avoided due to maloperation by the second user Open, thus effectively prevent the privacy leakage of first terminal.
About the device in above-described embodiment, wherein modules performs the concrete mode of operation relevant The embodiment of the method is described in detail, explanation will be not set forth in detail herein.
Figure 13 is the block diagram according to a kind of device 1300 for remotely controlling shown in an exemplary embodiment. Such as, device 1300 can be mobile phone, computer, digital broadcast terminal, messaging devices, trip Play control station, tablet device, armarium, body-building equipment, personal digital assistant etc..
With reference to Figure 13, device 1300 can include following one or more assembly: processes assembly 1302, deposits Reservoir 1304, power supply module 1306, multimedia groupware 1308, audio-frequency assembly 1310, input/output (I/O) Interface 1312, sensor cluster 1314, and communications component 1316.
Process assembly 1302 and generally control the integrated operation of device 1300, such as with display, call, The operation that data communication, camera operation and record operation are associated.Process assembly 1302 can include one or Multiple processors 1320 perform instruction, to complete all or part of step of above-mentioned method.Additionally, place Reason assembly 1302 can include one or more module, it is simple to processes between assembly 1302 and other assemblies Alternately.Such as, process assembly 1302 and can include multi-media module, to facilitate multimedia groupware 1308 He Process between assembly 1302 is mutual.
Memorizer 1304 is configured to store various types of data to support the operation at device 1300.This The example of a little data includes any application program for operation on device 1300 or the instruction of method, contact Personal data, telephone book data, message, picture, video etc..Memorizer 1304 can by any kind of easily The property lost or non-volatile memory device or combinations thereof realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory, Flash memory, disk or CD.
The various assemblies that power supply module 1306 is device 1300 provide power supply.Power supply module 1306 can include Power-supply management system, one or more power supplys, and other with generate for device 1300, manage and distribute power supply The assembly being associated.
One output interface of offer that multimedia groupware 1308 is included between described device 1300 and user Screen.In certain embodiments, screen can include liquid crystal display (LCD) and touch panel (TP). If screen includes that touch panel, screen may be implemented as touch screen, to receive the input letter from user Number.Touch panel includes that one or more touch sensor is with the hands on sensing touch, slip and touch panel Gesture.Described touch sensor can not only sense touch or the border of sliding action, but also detection is with described Touch or persistent period that slide is relevant and pressure.In certain embodiments, multimedia groupware 1308 wraps Include a front-facing camera and/or post-positioned pick-up head.When device 1300 is in operator scheme, such as screening-mode or During video mode, front-facing camera and/or post-positioned pick-up head can receive the multi-medium data of outside.Before each Put photographic head and post-positioned pick-up head can be a fixing optical lens system or have focal length and optical zoom Ability.
Audio-frequency assembly 1310 is configured to output and/or input audio signal.Such as, audio-frequency assembly 1310 wraps Include a mike (MIC), when device 1300 is in operator scheme, such as call model, logging mode and language During sound recognition mode, mike is configured to receive external audio signal.The audio signal received can be by It is further stored in memorizer 1304 or sends via communications component 1316.In certain embodiments, audio frequency Assembly 1310 also includes a speaker, is used for exporting audio signal.
I/O interface 1312 provides interface for processing between assembly 1302 and peripheral interface module, above-mentioned periphery connects Mouth die block can be keyboard, puts striking wheel, button etc..These buttons may include but be not limited to: home button, Volume button, start button and locking press button.
Sensor cluster 1314 includes one or more sensor, for providing various aspects for device 1300 Assessment.Such as, sensor cluster 1314 can detect the opening/closing of beating of device 1300, the phase of assembly To location, the most described assembly is display and the keypad of device 1300, and sensor cluster 1314 also may be used With detection device 1300 or the position change of 1,300 1 assemblies of device, user and depositing that device 1300 contacts Or do not exist, device 1300 orientation or acceleration/deceleration and the variations in temperature of device 1300.Sensor cluster 1314 can include proximity transducer, are configured to when not having any physical contact object near detection Existence.Sensor cluster 1314 can also include optical sensor, such as CMOS or ccd image sensor, For using in imaging applications.In certain embodiments, this sensor cluster 1314 can also include accelerating Degree sensor, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 1316 is configured to facilitate wired or wireless mode between device 1300 and other equipment Communication.Device 1300 can access wireless network based on communication standard, such as WiFi, 2G or 3G, or it Combination.In one exemplary embodiment, communication component 1316 receives from outside via broadcast channel The broadcast singal of broadcasting management systems or broadcast related information.In one exemplary embodiment, described communication Assembly 1316 also includes near-field communication (NFC) module, to promote junction service.Such as, in NFC module Can be based on RF identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra broadband (UWB) Technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 1300 can be by one or more application specific integrated circuits (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), FPGA Device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or its He realizes by electronic component, is used for performing said method.
In the exemplary embodiment, a kind of non-transitory computer-readable storage medium including instruction is additionally provided Matter, such as, include the memorizer 1304 of instruction, and above-mentioned instruction can be performed by the processor 1320 of device 1300 To complete said method.Such as, described non-transitory computer-readable recording medium can be ROM, random Access memorizer (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc..
A kind of non-transitory computer-readable recording medium, when the instruction in described storage medium is by mobile terminal Processor when performing so that mobile terminal is able to carry out a kind of long-range control method, and described method includes:
Receive the remote control notification that the second terminal sends;
When confirmation instruction being detected based on remote control notification, from the application of first terminal, determine at least One privacy application;
The application of at least one privacy is hidden;
Set up with the second terminal and be remotely connected.
In another embodiment of the disclosure, from the application of first terminal, determine that at least one privacy is applied, Including:
The remote community of the application in acquisition first terminal, remote community includes display state or hidden state, Remote community applies state in which for instruction in remote control process;
When the remote community of application is hidden state, determine that application is applied for privacy.
In another embodiment of the disclosure, the method also includes:
When remote control notification carries remotely control list, will remotely control list includes at least one The corresponding application of individual application identities shows;
Determine that appointment application is applied for privacy, it is intended that apply as first terminal removes at least one application identities institute Application outside corresponding application.
In another embodiment of the disclosure, the method also includes:
For each application in first terminal, when the preset instructions for application being detected, application is right The application identities answered is added in remotely control list;
For remotely controlling each application identities at least one application identities that list includes, work as detection When arriving the deletion instruction for application identities, from remotely controlling list is deleted application identities.
In another embodiment of the disclosure, the method also includes:
For each application in first terminal, when detecting that the first attribute for application arranges instruction, The remote community of application is set to display state;
When detecting that the second attribute for application arranges instruction, it is set to hide by the remote community of application State.
In another embodiment of the disclosure, the method also includes:
At least one application do not hidden on the desktop of first terminal is arranged according to specified rule.
In the disclosed embodiments, first terminal can receive the remote control notification that the second terminal sends, and When based on this remote control notification detect confirmation instruction time, can from the application of first terminal, determine to Few privacy application, and be hidden the application of this at least one privacy, afterwards, first terminal can be with Second terminal is set up and is remotely connected.During first terminal remotely being controlled in the second terminal, Do not show on first terminal that privacy is applied, it can thus be avoided the second user knows the privacy in first terminal The application message of application, and the privacy application in first terminal can be avoided due to maloperation by the second user Open, thus effectively prevent the privacy leakage of first terminal.
Those skilled in the art, after considering description and putting into practice invention disclosed herein, will readily occur to this Other bright embodiment.The application is intended to any modification, purposes or the adaptations of the present invention, These modification, purposes or adaptations are followed the general principle of the present invention and include that the disclosure is not disclosed Common knowledge in the art or conventional techniques means.Description and embodiments is considered only as exemplary , true scope and spirit of the invention are pointed out by claim below.
It should be appreciated that the invention is not limited in accurate knot described above and illustrated in the accompanying drawings Structure, and various modifications and changes can carried out without departing from the scope.The scope of the present invention is only by appended Claim limits.

Claims (13)

1. a long-range control method, it is characterised in that be applied to first terminal, described method includes:
Receive the remote control notification that the second terminal sends;
When confirmation instruction being detected based on described remote control notification, from the application of described first terminal, Determine that at least one privacy is applied;
At least one privacy described application is hidden;
Set up with described second terminal and be remotely connected.
2. the method for claim 1, it is characterised in that described from the application of described first terminal, Determine that at least one privacy is applied, including:
Obtain the remote community of application in described first terminal, described remote community include display state or Hidden state, described remote community applies state in which for instruction described in remote control process;
When the remote community of described application is hidden state, determine that described application is privacy application.
3. method as claimed in claim 1 or 2, it is characterised in that described method also includes:
When described remote control notification carries remotely control list, described long-range control list is included The corresponding application of at least one application identities show;
Determining that appointment is applied to apply for privacy, described appointment is applied as removing described at least one in described first terminal Application outside the corresponding application of individual application identities.
4. method as claimed in claim 3, it is characterised in that described method also includes:
For each application in described first terminal, when the preset instructions for described application being detected, Application identities corresponding for described application is added in described long-range control list;
For each application identities at least one application identities that described long-range control list includes, when Detect when the deletion for described application identities instructs, from described long-range control list, delete described application Mark.
5. method as claimed in claim 2, it is characterised in that described method also includes:
For each application in described first terminal, when detecting that the first attribute for described application is arranged During instruction, the remote community of described application is set to display state;
When detecting that the second attribute for described application arranges instruction, the remote community of described application is set It is set to hidden state.
6. the method as described in claim 1-2,4-5 any claim, it is characterised in that described method Also include:
At least one application do not hidden on the desktop of described first terminal is arranged according to specified rule.
7. a remote control, it is characterised in that described device includes:
Receiver module, for receiving the remote control notification that the second terminal sends;
First determines module, for when confirmation instruction being detected based on described remote control notification, from first In the application of terminal, determine that at least one privacy is applied;
Hide module, at least one privacy described application is hidden;
Link block, is remotely connected for setting up with described second terminal.
8. device as claimed in claim 7, it is characterised in that described first determines that module includes:
Acquiring unit, for when confirmation instruction being detected based on described remote control notification, obtaining described the The remote community of the application in one terminal, described remote community includes display state or hidden state, described Remote community applies state in which for instruction described in remote control process;
Determine unit, for when the remote community of described application is hidden state, determine that described application is hidden Private application.
9. device as claimed in claim 7 or 8, it is characterised in that described device also includes:
Display module, for when described remote control notification carries remotely control list time, by described remotely Control application corresponding at least one application identities that list includes to show;
Second determines module, is used for determining that appointment application is applied for privacy, and described appointment is applied as described first Application in addition to the corresponding application of at least one application identities described in terminal.
10. device as claimed in claim 9, it is characterised in that described device also includes:
Add module, for for each application in described first terminal, when detecting for described application Preset instructions time, application identities corresponding for described application is added in described long-range control list;
Removing module, every at least one application identities that described long-range control list is included Individual application identities, when detecting that the deletion for described application identities instructs, from described long-range control list The described application identities of middle deletion.
11. devices as claimed in claim 8, it is characterised in that described device also includes:
First arranges module, for for each application in described first terminal, when detecting for described When first attribute of application arranges instruction, the remote community of described application is set to display state;
Second arranges module, for when detecting that the second attribute for described application arranges instruction, by institute The remote community stating application is set to hidden state.
12. devices as described in claim 7-8,10-11 any claim, it is characterised in that described Device also includes:
Arrangement module, applies according to appointment at least one will do not hidden on the desktop of described first terminal Regularly arranged.
13. 1 kinds of remote controls, it is characterised in that described device includes:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Receive the remote control notification that the second terminal sends;
When confirmation instruction being detected based on described remote control notification, from the application of first terminal, determine At least one privacy is applied;
At least one privacy described application is hidden;
Set up with described second terminal and be remotely connected.
CN201610285277.2A 2016-04-29 2016-04-29 Long-range control method and device Active CN105956489B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610285277.2A CN105956489B (en) 2016-04-29 2016-04-29 Long-range control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610285277.2A CN105956489B (en) 2016-04-29 2016-04-29 Long-range control method and device

Publications (2)

Publication Number Publication Date
CN105956489A true CN105956489A (en) 2016-09-21
CN105956489B CN105956489B (en) 2019-02-22

Family

ID=56913255

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610285277.2A Active CN105956489B (en) 2016-04-29 2016-04-29 Long-range control method and device

Country Status (1)

Country Link
CN (1) CN105956489B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106878548A (en) * 2017-01-13 2017-06-20 北京奇虎科技有限公司 Mobile terminal remote control method, device and mobile terminal
CN117478665A (en) * 2023-12-27 2024-01-30 珠海格力电器股份有限公司 Terminal remote management method and device, electronic equipment and readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103237047A (en) * 2013-03-11 2013-08-07 广东欧珀移动通信有限公司 Remote controlled and control method
CN104298484A (en) * 2014-10-17 2015-01-21 深圳市中兴移动通信有限公司 Multi-screen interaction method and device
CN104318145A (en) * 2014-09-26 2015-01-28 来安县新元机电设备设计有限公司 Method and system for privacy protection
CN104680090A (en) * 2015-02-06 2015-06-03 西安酷派软件科技有限公司 Application hiding control method, device and mobile terminal
CN105069374A (en) * 2015-08-06 2015-11-18 上海斐讯数据通信技术有限公司 Private data intercepting protection method and system
CN105407131A (en) * 2015-10-12 2016-03-16 惠州Tcl移动通信有限公司 Remote control method between mobile devices and mobile devices

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103237047A (en) * 2013-03-11 2013-08-07 广东欧珀移动通信有限公司 Remote controlled and control method
CN104318145A (en) * 2014-09-26 2015-01-28 来安县新元机电设备设计有限公司 Method and system for privacy protection
CN104298484A (en) * 2014-10-17 2015-01-21 深圳市中兴移动通信有限公司 Multi-screen interaction method and device
CN104680090A (en) * 2015-02-06 2015-06-03 西安酷派软件科技有限公司 Application hiding control method, device and mobile terminal
CN105069374A (en) * 2015-08-06 2015-11-18 上海斐讯数据通信技术有限公司 Private data intercepting protection method and system
CN105407131A (en) * 2015-10-12 2016-03-16 惠州Tcl移动通信有限公司 Remote control method between mobile devices and mobile devices

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106878548A (en) * 2017-01-13 2017-06-20 北京奇虎科技有限公司 Mobile terminal remote control method, device and mobile terminal
CN117478665A (en) * 2023-12-27 2024-01-30 珠海格力电器股份有限公司 Terminal remote management method and device, electronic equipment and readable storage medium

Also Published As

Publication number Publication date
CN105956489B (en) 2019-02-22

Similar Documents

Publication Publication Date Title
CN104159230B (en) Call recognition methods and device
CN105338157A (en) Nuisance call processing method, and device and telephone
CN104378501A (en) Phone number naming method and device
CN105162982A (en) Answering extension function display method and device
CN105956486A (en) Remote control method and apparatus
CN104464238A (en) Method and device for controlling operation between mobile terminals
CN106101456A (en) A kind of method and device of call contact
CN106096009A (en) Method for generating message and device
CN105549300A (en) Automatic focusing method and device
CN105554215A (en) Automatic selection dialing method and device, and mobile terminal
CN105100348A (en) Telephone calling method and device
CN105245705A (en) Telephone prompting method and device
CN104703157A (en) Call processing method and device
CN105282295A (en) Candidate contact recommendation method and device
CN105117006A (en) Information input method and apparatus
CN104184888A (en) Call transfer method, device and terminal
CN105704286A (en) Communication information display method and device
CN104780256A (en) Address book management method and device and intelligent terminal
CN105450861A (en) Information prompt method and information prompt device
CN106412481B (en) Reminding method, device and terminal based on VoLTE video calling
CN105956489A (en) Remote control method and device
CN105338482A (en) Method and device for emergency call
CN105611025A (en) Method and device for displaying related telephone number
CN105744082A (en) Method and device for processing call record and mobile terminal
CN105100410A (en) Method and device for aggregating third-party telephone application

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant