CN105956489A - Remote control method and device - Google Patents
Remote control method and device Download PDFInfo
- Publication number
- CN105956489A CN105956489A CN201610285277.2A CN201610285277A CN105956489A CN 105956489 A CN105956489 A CN 105956489A CN 201610285277 A CN201610285277 A CN 201610285277A CN 105956489 A CN105956489 A CN 105956489A
- Authority
- CN
- China
- Prior art keywords
- application
- terminal
- privacy
- remote
- remote control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2125—Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation
Abstract
The invention discloses a remote control method and device, and belongs to the technical field of the Internet. The method is applied to a first terminal. The method comprises the steps of receiving a remote control request sent by a second terminal; determining at least one private application from the applications in the first terminal when an acknowledgement instruction is detected based on the remote control request; hiding the at least one private application; and establishing remote connection with the second terminal. According to the method and the device, the second user is avoided from knowing the application information of the private application in the first terminal, the private application in the first terminal is avoided from being started by the second user due to misoperation, and the privacy of the first terminal can be prevented from being leaked.
Description
Technical field
It relates to Internet technical field, particularly relate to a kind of long-range control method and device.
Background technology
Along with the development of Internet technology, in order to meet user's demand for terminal management, often can lead to
Cross remote control technology and realize the Screen sharing between two or many station terminals and control, wherein, by remotely
The terminal controlled is properly termed as first terminal, and the terminal remotely controlled first terminal is properly termed as second
Terminal.Owing to remote control technology has high priority control characteristic, this high priority control characteristic is embodied in
Second terminal has all permissions being controlled first terminal, so entering first terminal in the second terminal
During row remotely controls, the user of the second terminal is used easily to open in first terminal due to maloperation
Comprise the application of privacy information, thus cause the privacy leakage of first terminal, therefore, need one badly and can keep away
Exempt from the long-range control method of the privacy leakage of first terminal.
Summary of the invention
For overcoming problem present in correlation technique, the disclosure provides a kind of long-range control method and device.
First aspect according to disclosure embodiment, it is provided that a kind of long-range control method, is applied to first terminal,
Described method includes:
Receive the remote control notification that the second terminal sends;
When confirmation instruction being detected based on described remote control notification, from the application of described first terminal,
Determine that at least one privacy is applied;
At least one privacy described application is hidden;
Set up with described second terminal and be remotely connected.
In conjunction with first aspect, in the first possible implementation of above-mentioned first aspect, described from described
In the application of first terminal, determine that at least one privacy is applied, including:
Obtain the remote community of application in described first terminal, described remote community include display state or
Hidden state, described remote community applies state in which for instruction described in remote control process;
When the remote community of described application is hidden state, determine that described application is privacy application.
In conjunction with the first possible implementation of first aspect or first aspect, in the of above-mentioned first aspect
In two kinds of possible implementations, described method also includes:
When described remote control notification carries remotely control list, described long-range control list is included
The corresponding application of at least one application identities show;
Determining that appointment is applied to apply for privacy, described appointment is applied as removing described at least one in described first terminal
Application outside the corresponding application of individual application identities.
In conjunction with the implementation that the second of first aspect is possible, possible at the third of above-mentioned first aspect
In implementation, described method also includes:
For each application in described first terminal, when the preset instructions for described application being detected,
Application identities corresponding for described application is added in described long-range control list;
For each application identities at least one application identities that described long-range control list includes, when
Detect when the deletion for described application identities instructs, from described long-range control list, delete described application
Mark.
In conjunction with the first possible implementation of first aspect, possible the 4th kind of above-mentioned first aspect
In implementation, described method also includes:
For each application in described first terminal, when detecting that the first attribute for described application is arranged
During instruction, the remote community of described application is set to display state;
When detecting that the second attribute for described application arranges instruction, the remote community of described application is set
It is set to hidden state.
In conjunction with the first possible implementation of first aspect to first aspect, first aspect the third can
Can implementation to arbitrary possible implementation in the 4th kind of possible implementation of first aspect,
In 5th kind of possible implementation of above-mentioned first aspect, described on current desktop display described at least
After one privacy application is hidden, described method also includes:
At least one application do not hidden on the desktop of described first terminal is arranged according to specified rule.
Second aspect according to disclosure embodiment, it is provided that a kind of remote control, described device includes:
Receiver module, for receiving the remote control notification that the second terminal sends;
First determines module, for when confirmation instruction being detected based on described remote control notification, from first
In the application of terminal, determine that at least one privacy is applied;
Hide module, at least one privacy described application is hidden;
Link block, is remotely connected for setting up with described second terminal.
In conjunction with second aspect, in the first possible implementation of above-mentioned second aspect, described first true
Cover half block includes:
Acquiring unit, for when confirmation instruction being detected based on described remote control notification, obtaining described the
The remote community of the application in one terminal, described remote community includes display state or hidden state, described
Remote community applies state in which for instruction described in remote control process;
Determine unit, for when the remote community of described application is hidden state, determine that described application is hidden
Private application.
In conjunction with the first possible implementation of second aspect or second aspect, in the of above-mentioned second aspect
In two kinds of possible implementations, described device also includes:
Display module, for when described remote control notification carries remotely control list time, by described remotely
Control application corresponding at least one application identities that list includes to show;
Second determines module, is used for determining that appointment application is applied for privacy, and described appointment is applied as described first
Application in addition to the corresponding application of at least one application identities described in terminal.
In conjunction with the implementation that the second of second aspect is possible, possible at the third of above-mentioned second aspect
In implementation, described device also includes:
Add module, for for each application in described first terminal, when detecting for described application
Preset instructions time, application identities corresponding for described application is added in described long-range control list;
Removing module, every at least one application identities that described long-range control list is included
Individual application identities, when detecting that the deletion for described application identities instructs, from described long-range control list
The described application identities of middle deletion.
In conjunction with the first possible implementation of second aspect, possible the 4th kind of above-mentioned second aspect
In implementation, described device also includes:
First arranges module, for for each application in described first terminal, when detecting for described
When first attribute of application arranges instruction, the remote community of described application is set to display state;
Second arranges module, for when detecting that the second attribute for described application arranges instruction, by institute
The remote community stating application is set to hidden state.
In conjunction with the first possible implementation of second aspect to second aspect, second aspect the third can
Can implementation to arbitrary possible implementation in the 4th kind of possible implementation of second aspect,
In 5th kind of possible implementation of above-mentioned second aspect, described device also includes:
Arrangement module, applies according to appointment at least one will do not hidden on the desktop of described first terminal
Regularly arranged.
The third aspect according to disclosure embodiment, it is provided that a kind of remote control, described device includes:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Receive the remote control notification that the second terminal sends;
When confirmation instruction being detected based on described remote control notification, from the application of first terminal, determine
At least one privacy is applied;
At least one privacy described application is hidden;
Set up with described second terminal and be remotely connected.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect: in disclosure embodiment
In, first terminal can receive the remote control notification that the second terminal sends, and when based on this, remotely control please
Ask and detect when confirmation instructs, can determine that at least one privacy is applied from the application of first terminal, and
Being hidden the application of this at least one privacy, afterwards, first terminal can be set up with the second terminal and remotely connect
Connect.During first terminal remotely being controlled in the second terminal, first terminal does not show hidden
Private application, it can thus be avoided the second user knows the application message of the privacy application in first terminal, and
The application of the privacy in first terminal can be avoided to be opened due to maloperation by the second user, thus effectively prevent
The privacy leakage of first terminal.
It should be appreciated that it is only exemplary and explanatory that above general description and details hereinafter describe,
The disclosure can not be limited.
Accompanying drawing explanation
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet the present invention
Embodiment, and for explaining the principle of the present invention together with description.
Fig. 1 is the flow chart according to a kind of long-range control method shown in an exemplary embodiment.
Fig. 2 is the flow chart according to the another kind of long-range control method shown in an exemplary embodiment.
Fig. 3 is the schematic diagram according to a kind of remote control notification shown in an exemplary embodiment.
Fig. 4 (a) is the schematic diagram according to a kind of long-range control list shown in an exemplary embodiment.
Fig. 4 (b) is according to the another kind of schematic diagram remotely controlling list shown in an exemplary embodiment.
Fig. 4 (c) is the schematic diagram remotely controlling list according to another shown in an exemplary embodiment.
Fig. 5 (a) is according to the signal of the application of display on a kind of first terminal shown in an exemplary embodiment
Figure.
Fig. 5 (b) is showing according to the application shown on the another kind of first terminal shown in an exemplary embodiment
It is intended to.
Fig. 6 (a) is according to the schematic diagram of the application of display on a kind of desktop shown in an exemplary embodiment.
Fig. 6 (b) is according to the schematic diagram of the application of display on the another kind of desktop shown in an exemplary embodiment.
Fig. 7 is the block diagram according to the first remote control shown in an exemplary embodiment.
Fig. 8 is the block diagram determining module according to a kind of first shown in an exemplary embodiment.
Fig. 9 is the block diagram according to the second remote control shown in an exemplary embodiment.
Figure 10 is the block diagram according to the third remote control shown in an exemplary embodiment.
Figure 11 is the block diagram according to the 4th shown in an exemplary embodiment kind remote control.
Figure 12 is the block diagram according to the 5th shown in an exemplary embodiment kind remote control.
Figure 13 is the block diagram according to the 6th shown in an exemplary embodiment kind remote control.
Detailed description of the invention
Here will illustrate exemplary embodiment in detail, its example represents in the accompanying drawings.Following retouches
Stating when relating to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous key element.
Embodiment described in following exemplary embodiment does not represent all embodiment party consistent with the present invention
Formula.On the contrary, they only with describe in detail in appended claims, the present invention some in terms of mutually one
The example of the apparatus and method caused.
Before disclosure embodiment is carried out explanation explained in detail, the first applied field to disclosure embodiment
Scape is explained.In order to meet user's demand for terminal management, remote control technology often can be passed through
Realize the Screen sharing between two or many station terminals and control.And due in the second terminal to first terminal
During remotely controlling, the second terminal has all permissions being controlled first terminal, so
The user using the second terminal easily opens in first terminal the application comprising privacy information due to maloperation,
Thus cause the privacy leakage of first terminal, therefore, disclosure embodiment provides a kind of long-range control method,
Avoid the privacy leakage of first terminal.
Fig. 1 is the flow chart according to a kind of long-range control method shown in an exemplary embodiment, and the method is used
In first terminal.As it is shown in figure 1, the method comprises the following steps.
In a step 101, the remote control notification that the second terminal sends is received.
In a step 102, when confirmation instruction being detected based on remote control notification, answering from first terminal
In with, determine that at least one privacy is applied.
In step 103, the application of at least one privacy is hidden.
At step 104, remotely it is connected with the second terminal foundation.
In the disclosed embodiments, first terminal can receive the remote control notification that the second terminal sends, and
When based on this remote control notification detect confirmation instruction time, can from the application of first terminal, determine to
Few privacy application, and be hidden the application of this at least one privacy, afterwards, first terminal can be with
Second terminal is set up and is remotely connected.During first terminal remotely being controlled in the second terminal,
Do not show on first terminal that privacy is applied, it can thus be avoided the second user knows the privacy in first terminal
The application message of application, and the privacy application in first terminal can be avoided due to maloperation by the second user
Open, thus effectively prevent the privacy leakage of first terminal.
In another embodiment of the disclosure, from the application of first terminal, determine that at least one privacy is applied,
Including:
The remote community of the application in acquisition first terminal, remote community includes display state or hidden state,
Remote community applies state in which for instruction in remote control process;
When the remote community of application is hidden state, determine that application is applied for privacy.
In another embodiment of the disclosure, the method also includes:
When remote control notification carries remotely control list, will remotely control list includes at least one
The corresponding application of individual application identities shows;
Determine that appointment application is applied for privacy, it is intended that apply as first terminal removes at least one application identities institute
Application outside corresponding application.
In another embodiment of the disclosure, the method also includes:
For each application in first terminal, when the preset instructions for application being detected, application is right
The application identities answered is added in remotely control list;
For remotely controlling each application identities at least one application identities that list includes, work as detection
When arriving the deletion instruction for application identities, from remotely controlling list is deleted application identities.
In another embodiment of the disclosure, the method also includes:
For each application in first terminal, when detecting that the first attribute for application arranges instruction,
The remote community of application is set to display state;
When detecting that the second attribute for application arranges instruction, it is set to hide by the remote community of application
State.
In another embodiment of the disclosure, the method also includes:
At least one application do not hidden on the desktop of first terminal is arranged according to specified rule.
Above-mentioned all optional technical schemes, all can be according to arbitrarily combining the alternative embodiment forming the disclosure, this
This is repeated by open embodiment the most one by one.
Fig. 2 is the flow chart according to a kind of long-range control method shown in an exemplary embodiment, and the method is used
In first terminal.As in figure 2 it is shown, the method comprises the following steps.
In step 201, the remote control notification that the second terminal sends is received.
Remotely control it should be noted that first terminal can receive this by cable network or wireless network
Request, this is not specifically limited by disclosure embodiment.
It addition, first terminal is remotely controlled by remote control notification for request, and this remotely controls to ask
Can carry the second terminal iidentification etc. in asking, this is not specifically limited by disclosure embodiment.
Wherein, the second terminal iidentification is for unique mark the second terminal, and this second terminal iidentification can be this
The title of the second terminal, the MAC (Media Access Control, medium access control) of this second terminal
Addresses etc., this is not specifically limited by disclosure embodiment.
Such as, this second terminal iidentification is the title of this second terminal, and the entitled fruit fruit of this second terminal,
Then this remote control notification can be to show as form as shown in Figure 3, and certainly, in actual application, this is long-range
Control request can be to show as other form, and this is not specifically limited by disclosure embodiment.
In step 202., when confirmation instruction being detected based on this remote control notification, from first terminal
In application, determine that at least one privacy is applied.
It should be noted that after first terminal receives the remote control notification that the second terminal sends, this is the years old
This remote control notification can be shown by one terminal, in order to first user can be to this remote control notification
Process.Wherein, first user is the user using this first terminal, and first terminal is to this long-range control
When request processed shows, can be shown by the form of pop-up, it is also possible to carried out by other forms
Display, this is not specifically limited by disclosure embodiment.
It should be noted that confirm that instruction is used for indicating first terminal to accept this remote control notification, and this is true
Recognizing instruction to be triggered by first user, this first user can be triggered by assigned operation, this assigned operation
Can be single-click operation, double click operation, voice operating etc., this be not specifically limited by disclosure embodiment.
Such as, in remote control notification as shown in Figure 3, when first terminal detects for "Yes" button
During the clicking operation such as single-click operation, double click operation, it may be determined that confirmation detected based on this remote control notification
Instruction, or, when first terminal detects the voice messaging that voice content is " acceptance ", "Yes" etc.,
May determine that and confirmation instruction detected based on this remote control notification.
It addition, privacy application can be the application comprising privacy information, it is also possible to for freely being set by first user
Fixed application, this is not specifically limited by disclosure embodiment.In one embodiment, this privacy is applied such as
Can be instant messaging application, shopping platform application etc..In another embodiment, the application of this privacy is such as also
Can be that first user is set as having the application accessing restriction, such as, shooting application, note be applied, are dialled
Number application etc..Wherein, privacy information can include ID (identity number) card No., phone number, Bank Account Number, client
Title, account balance, birthdate etc., this is not specifically limited by disclosure embodiment.
Wherein, from the application of first terminal, determine when at least one privacy is applied, first can be obtained eventually
The remote community of the application in end, this remote community includes display state or hidden state, this remote community
For instruction this application state in which in remote control process;When the remote community of this application is for hiding shape
During state, determine that this application is privacy application;When the remote community of this application is display state, determine that this should
With not applying for privacy.Owing to directly can judge that this should according to the remote community of the application in first terminal
Whether with being privacy application, this judge process is simple and convenient, and therefore, disclosure embodiment can from first eventually
In the application of end, quickly determine that at least one privacy is applied, thus improve this at least one privacy and apply really
Determine efficiency.
Such as, the application of first terminal is application 1, application 2, application 3 and application 4, then can obtain respectively
Take application 1, application 2, application 3 and the remote community of application 4, it is assumed that the remote community of application 1 is display
State, the remote community of application 2 are hidden state, apply the remote community of 3 to be display state, apply 4
Remote community be display state, then may determine that application 2 for privacy apply, application 1, application 3 and apply
4 do not apply for privacy.
Further, when this remote control notification carries remotely control list, it is also possible to this is remotely controlled
The corresponding application of at least one application identities that list processed includes shows, and determines that appointment application is for hidden
Private is applied, and this appointment application is answering in addition to applying corresponding to this at least one application identities in first terminal
With.Determine that the privacy in first terminal should quickly and easily owing to directly can remotely control list according to this
With with can carry out the application that shows, without carrying out other complex operations, it is thus possible to improve really
Determine efficiency.
Such as, the application of first terminal is application 1, application 2, application 3 and application 4, and this remotely controls row
The corresponding application of at least one application identities that table includes is application 1, application 3 and application 4, then can be by
Apply 1, application 3 and application 4 to show, the application of first terminal will remove application 1, application 3 and answer
It is defined as specifying application with the application 2 outside 4, and determines that this appointment application 2 is applied for privacy.
It should be noted that remotely control list for instruction will this remotely control list is carried at least one
The corresponding application of individual application identities shows.Such as, when this at least one application identities be application identities 1,
When application identities 3, application identities 4, this remotely controls list can show as the shape as shown in Fig. 4 (a)
Formula, certainly, in actual application, this remotely controls list can be to show as other form, and the disclosure is implemented
This is not specifically limited by example.
It addition, application identities is for uniquely identifying application, if this application identities can be the application name of this application
Title, application icon etc., this is not specifically limited by disclosure embodiment,
Further, it is also possible to for each application in first terminal, when detecting for this application
During preset instructions, application identities corresponding for this application is added to this and remotely controls in list;Long-range for this
Control each application identities at least one application identities that list includes, when detecting for this application
When the deletion of mark instructs, remotely control from this this application identities is deleted in list.
Owing to preset instructions and deletion instruction all can be triggered by first user, therefore, disclosure embodiment is real
It is that first user is added operation or deletion action to this long-range control list on border.And due to remotely control
List processed is for determining the privacy application in first terminal and can carry out the application shown, therefore, first uses
Family is added the process of operation or deletion action and the most namely determines first this long-range control list
Privacy in terminal is applied and can carry out the process of the application shown, this determines process simple and flexible, not only
The time of determination can be saved, it is also possible to meet the privacy requirements of first user, thus ensure that first terminal
Personal secrets, and improve the operating experience of first user.
It should be noted that application is added in remotely control list by preset instructions for instruction, and this is pre-
If instruction can be triggered by first user, this first user can be triggered by assigned operation, and the disclosure is implemented
This is not specifically limited by example.Application identities is controlled list from long-range it addition, delete instruction for instruction
Deleting, and this deletion instruction can be triggered by first user, this first user can be triggered by assigned operation,
This is not specifically limited by disclosure embodiment.
Such as, this remotely controls at least one application identities that list includes is application identities 1, application identities
3, application identities 4, and this remotely controls list and shows as the form as shown in Fig. 4 (a), first terminal
Application is application 1, application 2, application 3 and application 4, it is assumed that the preset instructions for application 2 detected,
And the application identities of this application 2 correspondence is application identities 2, then can add this application identities 2 to this long-range
Control in list, add the remotely control list after this application identities 2 and can show as shown in Fig. 4 (b)
Form.
The most such as, this remotely controls at least one application identities that list includes is application identities 1, application mark
Know 3, application identities 4, and this remotely controls list and shows as the form as shown in Fig. 4 (a), it is assumed that detection
Instruct to the deletion for application identities 1, then can remotely control from this this application identities 1 is deleted in list,
Delete the remotely control list after this application identities 1 and can show as the form as shown in Fig. 4 (c).
Further, it is also possible to for each application in first terminal, when detecting for this application
When one attribute arranges instruction, the remote community of this application is set to display state;Should for this when detecting
The second attribute time instruction is set, the remote community of this application is set to hidden state.Owing to first belongs to
Property arrange instruction and second property control instruction all can be triggered by first user, therefore, disclosure embodiment
Actually operation is set according to the attribute of first user and determines the remote community of the application in first terminal,
This determines process simple and flexible, meets the privacy requirements of first user, it is ensured that the privacy peace of first terminal
Entirely.
It is set to show by the remote community of application it should be noted that the first attribute arranges instruction for instruction
State, and this first attribute arranges instruction and can be triggered by first user, this first user can be by specifying
Operation triggers, and this is not specifically limited by disclosure embodiment.It addition, the second attribute arranges instruction for referring to
Show and the remote community of application be set to hidden state, and this second attribute instruction is set can be by first user
Triggering, this first user can be triggered by assigned operation, and this is not specifically limited by disclosure embodiment.
Such as, the application of first terminal is application 1, application 2, application 3 and application 4, it is assumed that pin detected
First attribute of application 4 is arranged instruction, then the remote community of application 4 can be set to display state.
Such as, the application of first terminal is application 1, application 2, application 3 and application 4, it is assumed that pin detected
Second attribute of application 2 is arranged instruction, then the remote community of application 2 can be set to hidden state.
In step 203, the application of this at least one privacy is hidden.
It should be noted that the operation being hidden the application of this at least one privacy is referred to correlation technique
In some is applied the operation that is hidden, this is not described in detail by disclosure embodiment.
It addition, after the application of this at least one privacy is hidden, the application of this at least one privacy will be in and can not touch
Hair-like state, this can not trigger state and refer to that the application of this at least one privacy can not be opened.
Such as, as shown in Fig. 5 (a), on first terminal, the application of display is application 1, application 2, application 3
With application 4, the application of this at least one privacy is application 2, then can be hidden application 2, hiden application
After 2, on first terminal, the application of display can be as shown in Fig. 5 (b).
Further, it is also possible at least one application do not hidden on the desktop of first terminal is advised according to appointment
Then arrange, in order to this at least one application do not hidden is operated by first user, such that it is able to improve
The operating experience of first user, and the visual effect of this desktop can be improved.
It should be noted that specified rule can pre-set, if this specified rule can be according to application
The renewal time is arranged by the order of morning to evening, according to the order arrangement etc. of the initial of the Apply Names applied,
This is not specifically limited by disclosure embodiment.
Such as, it is intended that rule is the order arrangement by morning to evening of the time that updates according to application, such as Fig. 6 (a)
Shown in, at least one application that the desktop of first terminal is not hidden is application 1, application 3 and application 4, and
The renewal time of application 1 is 2016-4-13 10:12, and the renewal time of application 3 is 2016-4-12 15:12, should
Be 2016-4-13 13:12 with the renewal time of 4, then can be by application 1, application 3 and application 4 according to application
1, the time that updates of application 3 and application 4 is arranged by the order application 3 of morning to evening, application 1, application 4,
On desktop after this arrangement, the application of display can be as shown in Fig. 6 (b).
In step 204, remotely it is connected with the second terminal foundation.
It should be noted that set up, with the second terminal, the process being remotely connected to be referred to correlation technique, these public affairs
Open embodiment this is not described in detail.It addition, first terminal and the second terminal are set up after remotely connecting,
First terminal can remotely be controlled by the second terminal, and this is not specifically limited by disclosure embodiment.
It should be noted that in disclosure embodiment, first terminal is remotely controlled in the second terminal
During, the desktop of first terminal does not show privacy is applied, thus be possible not only to avoid the second user to know
The application message of the privacy application in first terminal, it is also possible to avoid the privacy in first terminal to apply by second
User opens due to maloperation, such that it is able to effectively prevent the privacy leakage of first terminal.Wherein, second
User is for using the user of the second terminal.
Further, after setting up with the second terminal and being remotely connected, long-range when detect with the second terminal
When connecting already off, it is also possible to current first terminal recovering state is remotely connected to the second terminal foundation
First terminal state before connecing, in order to first user can be when first terminal be remotely controlled, to
Privacy application in one terminal operates, and improves the operating experience of first user.
It should be noted that first terminal state can include the application message of the application of display on first terminal
And the arrangement mode etc. of the application of display on the desktop of first terminal, this is not done specifically by disclosure embodiment
Limit.
In the disclosed embodiments, first terminal can receive the remote control notification that the second terminal sends, and
When based on this remote control notification detect confirmation instruction time, can from the application of first terminal, determine to
Few privacy application, and be hidden the application of this at least one privacy, afterwards, first terminal can be with
Second terminal is set up and is remotely connected.During first terminal remotely being controlled in the second terminal,
Do not show on first terminal that privacy is applied, it can thus be avoided the second user knows the privacy in first terminal
The application message of application, and the privacy application in first terminal can be avoided due to maloperation by the second user
Open, thus effectively prevent the privacy leakage of first terminal.
Fig. 7 is the block diagram according to a kind of remote control shown in an exemplary embodiment.With reference to Fig. 7, should
Device includes receiver module 701, determines module 702, hides module 703 and link block 704.
Receiver module 701, for receiving the remote control notification that the second terminal sends;
First determines module 702, for when confirmation instruction being detected based on remote control notification, whole from first
In the application of end, determine that at least one privacy is applied;
Hide module 703, for the application of at least one privacy is hidden;
Link block 704, sets up with the second terminal and is remotely connected.
In another embodiment of the disclosure, with reference to Fig. 8, this first determines that module 702 includes acquiring unit
7021 and determine unit 7022.
Acquiring unit 7021, for when confirmation instruction being detected based on remote control notification, obtains first eventually
The remote community of the application in end, remote community includes display state or hidden state, and remote community is used for
State in which is applied in instruction in remote control process;
Determine unit 7022, for when the remote community of application is hidden state, determine that application should for privacy
With.
In another embodiment of the disclosure, with reference to Fig. 9, this device also includes that display module 705 and second is true
Cover half block 706.
Display module 705, for when carrying remotely control list in remote control notification, will remotely control row
The corresponding application of at least one application identities that table includes shows;
Second determines module 706, is used for determining that appointment application is applied for privacy, it is intended that apply as on current desktop
In the application of display except at least one application identities is corresponding apply in addition to application.
In another embodiment of the disclosure, with reference to Figure 10, this device also includes adding module 707 and deleting
Module 708.
Add module 707, for for each application in first terminal, when presetting for application being detected
During instruction, the application identities that application is corresponding is added to and remotely controls in list;
Removing module 708, for each for remotely control at least one application identities that list includes
Application identities, when detecting that the deletion for application identities instructs, from remotely controlling to delete list application
Mark.
In another embodiment of the disclosure, with reference to Figure 11, this device also includes that first arranges module 709 He
Second arranges module 710.
First arranges module 709, for for each application in first terminal, when detecting for application
When first attribute arranges instruction, the remote community of application is set to display state;
Second arranges module 710, for when detecting that the second attribute for application arranges instruction, will apply
Remote community be set to hidden state.
In another embodiment of the disclosure, with reference to Figure 12, this device also includes arranging module 711.
Arrangement module 711, applies according to specifying rule at least one will do not hidden on the desktop of first terminal
Then arrange.
In the disclosed embodiments, first terminal can receive the remote control notification that the second terminal sends, and
When based on this remote control notification detect confirmation instruction time, can from the application of first terminal, determine to
Few privacy application, and be hidden the application of this at least one privacy, afterwards, first terminal can be with
Second terminal is set up and is remotely connected.During first terminal remotely being controlled in the second terminal,
Do not show on first terminal that privacy is applied, it can thus be avoided the second user knows the privacy in first terminal
The application message of application, and the privacy application in first terminal can be avoided due to maloperation by the second user
Open, thus effectively prevent the privacy leakage of first terminal.
About the device in above-described embodiment, wherein modules performs the concrete mode of operation relevant
The embodiment of the method is described in detail, explanation will be not set forth in detail herein.
Figure 13 is the block diagram according to a kind of device 1300 for remotely controlling shown in an exemplary embodiment.
Such as, device 1300 can be mobile phone, computer, digital broadcast terminal, messaging devices, trip
Play control station, tablet device, armarium, body-building equipment, personal digital assistant etc..
With reference to Figure 13, device 1300 can include following one or more assembly: processes assembly 1302, deposits
Reservoir 1304, power supply module 1306, multimedia groupware 1308, audio-frequency assembly 1310, input/output (I/O)
Interface 1312, sensor cluster 1314, and communications component 1316.
Process assembly 1302 and generally control the integrated operation of device 1300, such as with display, call,
The operation that data communication, camera operation and record operation are associated.Process assembly 1302 can include one or
Multiple processors 1320 perform instruction, to complete all or part of step of above-mentioned method.Additionally, place
Reason assembly 1302 can include one or more module, it is simple to processes between assembly 1302 and other assemblies
Alternately.Such as, process assembly 1302 and can include multi-media module, to facilitate multimedia groupware 1308 He
Process between assembly 1302 is mutual.
Memorizer 1304 is configured to store various types of data to support the operation at device 1300.This
The example of a little data includes any application program for operation on device 1300 or the instruction of method, contact
Personal data, telephone book data, message, picture, video etc..Memorizer 1304 can by any kind of easily
The property lost or non-volatile memory device or combinations thereof realize, such as static RAM
(SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM
(EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory,
Flash memory, disk or CD.
The various assemblies that power supply module 1306 is device 1300 provide power supply.Power supply module 1306 can include
Power-supply management system, one or more power supplys, and other with generate for device 1300, manage and distribute power supply
The assembly being associated.
One output interface of offer that multimedia groupware 1308 is included between described device 1300 and user
Screen.In certain embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).
If screen includes that touch panel, screen may be implemented as touch screen, to receive the input letter from user
Number.Touch panel includes that one or more touch sensor is with the hands on sensing touch, slip and touch panel
Gesture.Described touch sensor can not only sense touch or the border of sliding action, but also detection is with described
Touch or persistent period that slide is relevant and pressure.In certain embodiments, multimedia groupware 1308 wraps
Include a front-facing camera and/or post-positioned pick-up head.When device 1300 is in operator scheme, such as screening-mode or
During video mode, front-facing camera and/or post-positioned pick-up head can receive the multi-medium data of outside.Before each
Put photographic head and post-positioned pick-up head can be a fixing optical lens system or have focal length and optical zoom
Ability.
Audio-frequency assembly 1310 is configured to output and/or input audio signal.Such as, audio-frequency assembly 1310 wraps
Include a mike (MIC), when device 1300 is in operator scheme, such as call model, logging mode and language
During sound recognition mode, mike is configured to receive external audio signal.The audio signal received can be by
It is further stored in memorizer 1304 or sends via communications component 1316.In certain embodiments, audio frequency
Assembly 1310 also includes a speaker, is used for exporting audio signal.
I/O interface 1312 provides interface for processing between assembly 1302 and peripheral interface module, above-mentioned periphery connects
Mouth die block can be keyboard, puts striking wheel, button etc..These buttons may include but be not limited to: home button,
Volume button, start button and locking press button.
Sensor cluster 1314 includes one or more sensor, for providing various aspects for device 1300
Assessment.Such as, sensor cluster 1314 can detect the opening/closing of beating of device 1300, the phase of assembly
To location, the most described assembly is display and the keypad of device 1300, and sensor cluster 1314 also may be used
With detection device 1300 or the position change of 1,300 1 assemblies of device, user and depositing that device 1300 contacts
Or do not exist, device 1300 orientation or acceleration/deceleration and the variations in temperature of device 1300.Sensor cluster
1314 can include proximity transducer, are configured to when not having any physical contact object near detection
Existence.Sensor cluster 1314 can also include optical sensor, such as CMOS or ccd image sensor,
For using in imaging applications.In certain embodiments, this sensor cluster 1314 can also include accelerating
Degree sensor, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 1316 is configured to facilitate wired or wireless mode between device 1300 and other equipment
Communication.Device 1300 can access wireless network based on communication standard, such as WiFi, 2G or 3G, or it
Combination.In one exemplary embodiment, communication component 1316 receives from outside via broadcast channel
The broadcast singal of broadcasting management systems or broadcast related information.In one exemplary embodiment, described communication
Assembly 1316 also includes near-field communication (NFC) module, to promote junction service.Such as, in NFC module
Can be based on RF identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra broadband (UWB)
Technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 1300 can be by one or more application specific integrated circuits
(ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), FPGA
Device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or its
He realizes by electronic component, is used for performing said method.
In the exemplary embodiment, a kind of non-transitory computer-readable storage medium including instruction is additionally provided
Matter, such as, include the memorizer 1304 of instruction, and above-mentioned instruction can be performed by the processor 1320 of device 1300
To complete said method.Such as, described non-transitory computer-readable recording medium can be ROM, random
Access memorizer (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc..
A kind of non-transitory computer-readable recording medium, when the instruction in described storage medium is by mobile terminal
Processor when performing so that mobile terminal is able to carry out a kind of long-range control method, and described method includes:
Receive the remote control notification that the second terminal sends;
When confirmation instruction being detected based on remote control notification, from the application of first terminal, determine at least
One privacy application;
The application of at least one privacy is hidden;
Set up with the second terminal and be remotely connected.
In another embodiment of the disclosure, from the application of first terminal, determine that at least one privacy is applied,
Including:
The remote community of the application in acquisition first terminal, remote community includes display state or hidden state,
Remote community applies state in which for instruction in remote control process;
When the remote community of application is hidden state, determine that application is applied for privacy.
In another embodiment of the disclosure, the method also includes:
When remote control notification carries remotely control list, will remotely control list includes at least one
The corresponding application of individual application identities shows;
Determine that appointment application is applied for privacy, it is intended that apply as first terminal removes at least one application identities institute
Application outside corresponding application.
In another embodiment of the disclosure, the method also includes:
For each application in first terminal, when the preset instructions for application being detected, application is right
The application identities answered is added in remotely control list;
For remotely controlling each application identities at least one application identities that list includes, work as detection
When arriving the deletion instruction for application identities, from remotely controlling list is deleted application identities.
In another embodiment of the disclosure, the method also includes:
For each application in first terminal, when detecting that the first attribute for application arranges instruction,
The remote community of application is set to display state;
When detecting that the second attribute for application arranges instruction, it is set to hide by the remote community of application
State.
In another embodiment of the disclosure, the method also includes:
At least one application do not hidden on the desktop of first terminal is arranged according to specified rule.
In the disclosed embodiments, first terminal can receive the remote control notification that the second terminal sends, and
When based on this remote control notification detect confirmation instruction time, can from the application of first terminal, determine to
Few privacy application, and be hidden the application of this at least one privacy, afterwards, first terminal can be with
Second terminal is set up and is remotely connected.During first terminal remotely being controlled in the second terminal,
Do not show on first terminal that privacy is applied, it can thus be avoided the second user knows the privacy in first terminal
The application message of application, and the privacy application in first terminal can be avoided due to maloperation by the second user
Open, thus effectively prevent the privacy leakage of first terminal.
Those skilled in the art, after considering description and putting into practice invention disclosed herein, will readily occur to this
Other bright embodiment.The application is intended to any modification, purposes or the adaptations of the present invention,
These modification, purposes or adaptations are followed the general principle of the present invention and include that the disclosure is not disclosed
Common knowledge in the art or conventional techniques means.Description and embodiments is considered only as exemplary
, true scope and spirit of the invention are pointed out by claim below.
It should be appreciated that the invention is not limited in accurate knot described above and illustrated in the accompanying drawings
Structure, and various modifications and changes can carried out without departing from the scope.The scope of the present invention is only by appended
Claim limits.
Claims (13)
1. a long-range control method, it is characterised in that be applied to first terminal, described method includes:
Receive the remote control notification that the second terminal sends;
When confirmation instruction being detected based on described remote control notification, from the application of described first terminal,
Determine that at least one privacy is applied;
At least one privacy described application is hidden;
Set up with described second terminal and be remotely connected.
2. the method for claim 1, it is characterised in that described from the application of described first terminal,
Determine that at least one privacy is applied, including:
Obtain the remote community of application in described first terminal, described remote community include display state or
Hidden state, described remote community applies state in which for instruction described in remote control process;
When the remote community of described application is hidden state, determine that described application is privacy application.
3. method as claimed in claim 1 or 2, it is characterised in that described method also includes:
When described remote control notification carries remotely control list, described long-range control list is included
The corresponding application of at least one application identities show;
Determining that appointment is applied to apply for privacy, described appointment is applied as removing described at least one in described first terminal
Application outside the corresponding application of individual application identities.
4. method as claimed in claim 3, it is characterised in that described method also includes:
For each application in described first terminal, when the preset instructions for described application being detected,
Application identities corresponding for described application is added in described long-range control list;
For each application identities at least one application identities that described long-range control list includes, when
Detect when the deletion for described application identities instructs, from described long-range control list, delete described application
Mark.
5. method as claimed in claim 2, it is characterised in that described method also includes:
For each application in described first terminal, when detecting that the first attribute for described application is arranged
During instruction, the remote community of described application is set to display state;
When detecting that the second attribute for described application arranges instruction, the remote community of described application is set
It is set to hidden state.
6. the method as described in claim 1-2,4-5 any claim, it is characterised in that described method
Also include:
At least one application do not hidden on the desktop of described first terminal is arranged according to specified rule.
7. a remote control, it is characterised in that described device includes:
Receiver module, for receiving the remote control notification that the second terminal sends;
First determines module, for when confirmation instruction being detected based on described remote control notification, from first
In the application of terminal, determine that at least one privacy is applied;
Hide module, at least one privacy described application is hidden;
Link block, is remotely connected for setting up with described second terminal.
8. device as claimed in claim 7, it is characterised in that described first determines that module includes:
Acquiring unit, for when confirmation instruction being detected based on described remote control notification, obtaining described the
The remote community of the application in one terminal, described remote community includes display state or hidden state, described
Remote community applies state in which for instruction described in remote control process;
Determine unit, for when the remote community of described application is hidden state, determine that described application is hidden
Private application.
9. device as claimed in claim 7 or 8, it is characterised in that described device also includes:
Display module, for when described remote control notification carries remotely control list time, by described remotely
Control application corresponding at least one application identities that list includes to show;
Second determines module, is used for determining that appointment application is applied for privacy, and described appointment is applied as described first
Application in addition to the corresponding application of at least one application identities described in terminal.
10. device as claimed in claim 9, it is characterised in that described device also includes:
Add module, for for each application in described first terminal, when detecting for described application
Preset instructions time, application identities corresponding for described application is added in described long-range control list;
Removing module, every at least one application identities that described long-range control list is included
Individual application identities, when detecting that the deletion for described application identities instructs, from described long-range control list
The described application identities of middle deletion.
11. devices as claimed in claim 8, it is characterised in that described device also includes:
First arranges module, for for each application in described first terminal, when detecting for described
When first attribute of application arranges instruction, the remote community of described application is set to display state;
Second arranges module, for when detecting that the second attribute for described application arranges instruction, by institute
The remote community stating application is set to hidden state.
12. devices as described in claim 7-8,10-11 any claim, it is characterised in that described
Device also includes:
Arrangement module, applies according to appointment at least one will do not hidden on the desktop of described first terminal
Regularly arranged.
13. 1 kinds of remote controls, it is characterised in that described device includes:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Receive the remote control notification that the second terminal sends;
When confirmation instruction being detected based on described remote control notification, from the application of first terminal, determine
At least one privacy is applied;
At least one privacy described application is hidden;
Set up with described second terminal and be remotely connected.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610285277.2A CN105956489B (en) | 2016-04-29 | 2016-04-29 | Long-range control method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610285277.2A CN105956489B (en) | 2016-04-29 | 2016-04-29 | Long-range control method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105956489A true CN105956489A (en) | 2016-09-21 |
CN105956489B CN105956489B (en) | 2019-02-22 |
Family
ID=56913255
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610285277.2A Active CN105956489B (en) | 2016-04-29 | 2016-04-29 | Long-range control method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105956489B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106878548A (en) * | 2017-01-13 | 2017-06-20 | 北京奇虎科技有限公司 | Mobile terminal remote control method, device and mobile terminal |
CN117478665A (en) * | 2023-12-27 | 2024-01-30 | 珠海格力电器股份有限公司 | Terminal remote management method and device, electronic equipment and readable storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103237047A (en) * | 2013-03-11 | 2013-08-07 | 广东欧珀移动通信有限公司 | Remote controlled and control method |
CN104298484A (en) * | 2014-10-17 | 2015-01-21 | 深圳市中兴移动通信有限公司 | Multi-screen interaction method and device |
CN104318145A (en) * | 2014-09-26 | 2015-01-28 | 来安县新元机电设备设计有限公司 | Method and system for privacy protection |
CN104680090A (en) * | 2015-02-06 | 2015-06-03 | 西安酷派软件科技有限公司 | Application hiding control method, device and mobile terminal |
CN105069374A (en) * | 2015-08-06 | 2015-11-18 | 上海斐讯数据通信技术有限公司 | Private data intercepting protection method and system |
CN105407131A (en) * | 2015-10-12 | 2016-03-16 | 惠州Tcl移动通信有限公司 | Remote control method between mobile devices and mobile devices |
-
2016
- 2016-04-29 CN CN201610285277.2A patent/CN105956489B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103237047A (en) * | 2013-03-11 | 2013-08-07 | 广东欧珀移动通信有限公司 | Remote controlled and control method |
CN104318145A (en) * | 2014-09-26 | 2015-01-28 | 来安县新元机电设备设计有限公司 | Method and system for privacy protection |
CN104298484A (en) * | 2014-10-17 | 2015-01-21 | 深圳市中兴移动通信有限公司 | Multi-screen interaction method and device |
CN104680090A (en) * | 2015-02-06 | 2015-06-03 | 西安酷派软件科技有限公司 | Application hiding control method, device and mobile terminal |
CN105069374A (en) * | 2015-08-06 | 2015-11-18 | 上海斐讯数据通信技术有限公司 | Private data intercepting protection method and system |
CN105407131A (en) * | 2015-10-12 | 2016-03-16 | 惠州Tcl移动通信有限公司 | Remote control method between mobile devices and mobile devices |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106878548A (en) * | 2017-01-13 | 2017-06-20 | 北京奇虎科技有限公司 | Mobile terminal remote control method, device and mobile terminal |
CN117478665A (en) * | 2023-12-27 | 2024-01-30 | 珠海格力电器股份有限公司 | Terminal remote management method and device, electronic equipment and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN105956489B (en) | 2019-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104159230B (en) | Call recognition methods and device | |
CN105338157A (en) | Nuisance call processing method, and device and telephone | |
CN104378501A (en) | Phone number naming method and device | |
CN105162982A (en) | Answering extension function display method and device | |
CN105956486A (en) | Remote control method and apparatus | |
CN104464238A (en) | Method and device for controlling operation between mobile terminals | |
CN106101456A (en) | A kind of method and device of call contact | |
CN106096009A (en) | Method for generating message and device | |
CN105549300A (en) | Automatic focusing method and device | |
CN105554215A (en) | Automatic selection dialing method and device, and mobile terminal | |
CN105100348A (en) | Telephone calling method and device | |
CN105245705A (en) | Telephone prompting method and device | |
CN104703157A (en) | Call processing method and device | |
CN105282295A (en) | Candidate contact recommendation method and device | |
CN105117006A (en) | Information input method and apparatus | |
CN104184888A (en) | Call transfer method, device and terminal | |
CN105704286A (en) | Communication information display method and device | |
CN104780256A (en) | Address book management method and device and intelligent terminal | |
CN105450861A (en) | Information prompt method and information prompt device | |
CN106412481B (en) | Reminding method, device and terminal based on VoLTE video calling | |
CN105956489A (en) | Remote control method and device | |
CN105338482A (en) | Method and device for emergency call | |
CN105611025A (en) | Method and device for displaying related telephone number | |
CN105744082A (en) | Method and device for processing call record and mobile terminal | |
CN105100410A (en) | Method and device for aggregating third-party telephone application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |