CN105956489B - Long-range control method and device - Google Patents

Long-range control method and device Download PDF

Info

Publication number
CN105956489B
CN105956489B CN201610285277.2A CN201610285277A CN105956489B CN 105956489 B CN105956489 B CN 105956489B CN 201610285277 A CN201610285277 A CN 201610285277A CN 105956489 B CN105956489 B CN 105956489B
Authority
CN
China
Prior art keywords
application
terminal
privacy
remote
long
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610285277.2A
Other languages
Chinese (zh)
Other versions
CN105956489A (en
Inventor
林形省
毛良瑾
葛旭东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610285277.2A priority Critical patent/CN105956489B/en
Publication of CN105956489A publication Critical patent/CN105956489A/en
Application granted granted Critical
Publication of CN105956489B publication Critical patent/CN105956489B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2125Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The disclosure is directed to a kind of long-range control method and devices, belong to Internet technical field.The method is applied to first terminal, which comprises receives the remote control notification that second terminal is sent;When detecting confirmation instruction based on the remote control notification, from the application of the first terminal, at least one privacy application is determined;At least one described privacy application is hidden;It is remotely connect with second terminal foundation.The disclosure can know the application message of the application of the privacy in first terminal to avoid second user, and can be to avoid the privacy in first terminal using being opened by second user due to maloperation, to effectively prevent the privacy leakage of first terminal.

Description

Long-range control method and device
Technical field
This disclosure relates to Internet technical field more particularly to a kind of long-range control method and device.
Background technique
It with the development of internet technology, often can be by long-range in order to meet the needs of user is for terminal management Control technology realizes the Screen sharing and control between two or more terminals, wherein the terminal being remotely controlled can claim For first terminal, the terminal remotely controlled first terminal is properly termed as second terminal.Since remote control technology has High priority control characteristic, the high priority control characteristic be embodied in second terminal possess first terminal is controlled it is all Permission, thus second terminal to first terminal carry out remotely control during, using second terminal user easily due to Maloperation and open in first terminal and therefore, needed comprising the application of privacy information so as to cause the privacy leakage of first terminal It is a kind of can be to avoid the long-range control method of the privacy leakage of first terminal.
Summary of the invention
To overcome the problems in correlation technique, the disclosure provides a kind of long-range control method and device.
According to the first aspect of the embodiments of the present disclosure, a kind of long-range control method is provided, first terminal, the side are applied to Method includes:
Receive the remote control notification that second terminal is sent;
When detecting confirmation instruction based on the remote control notification, from the application of the first terminal, determine extremely A few privacy application;
At least one described privacy application is hidden;
It is remotely connect with second terminal foundation.
With reference to first aspect, described whole from described first in the first possible implementation of above-mentioned first aspect In the application at end, at least one privacy application is determined, comprising:
The remote community of the application in the first terminal is obtained, the remote community includes display state or hiding shape State, the remote community are used to indicate described in remote control process using state in which;
When the remote community of the application is hidden state, determine that the application is privacy application.
With reference to first aspect or the first possible implementation of first aspect, second in above-mentioned first aspect can In the implementation of energy, the method also includes:
It will include at least in the long-range control list when carrying long-range control list in the remote control notification The corresponding application of one application identities is shown;
Determine that specified application is privacy application, the specified application is in the first terminal except at least one described application Application except the corresponding application of mark.
The possible implementation of second with reference to first aspect, in the third possible realization side of above-mentioned first aspect In formula, the method also includes:
It, will be described when detecting the preset instructions for the application for each application in the first terminal It is added in the long-range control list using corresponding application identities;
For include in the long-range control list at least one application identities in each application identities, when detecting For the application identities deletion instruction when, delete the application identities from the long-range control list.
The possible implementation of with reference to first aspect the first, in the 4th kind of possible realization side of above-mentioned first aspect In formula, the method also includes:
For each application in the first terminal, instructed when detecting that the first attribute for the application is arranged When, display state is set by the remote community of the application;
When detecting the second attribute setting instruction for the application, set hidden for the remote community of the application Hiding state.
With reference to first aspect to the first possible implementation of first aspect, the third possible reality of first aspect Existing mode any possible implementation into the 4th kind of possible implementation of first aspect, the of above-mentioned first aspect In five kinds of possible implementations, it is described at least one privacy application described in showing on current desktop is hidden after, The method also includes:
At least one application not hiding on the desktop of the first terminal is arranged according to specified rule.
According to the second aspect of an embodiment of the present disclosure, a kind of remote control apparatus is provided, described device includes:
Receiving module, for receiving the remote control notification of second terminal transmission;
First determining module, for when based on the remote control notification detect confirmation instruction when, from first terminal In, at least one privacy application is determined;
Hidden module, for being hidden at least one described privacy application;
Link block, for remotely being connect with second terminal foundation.
In conjunction with second aspect, in the first possible implementation of above-mentioned second aspect, first determining module Include:
Acquiring unit, for obtaining the first terminal when detecting confirmation instruction based on the remote control notification In application remote community, the remote community includes display state or hidden state, and the remote community is used to indicate State in which is applied described in remote control process;
Determination unit, for when the remote community of the application is hidden state, determining that the application is privacy application.
In conjunction with the possible implementation of the first of second aspect or second aspect, second in above-mentioned second aspect can In the implementation of energy, described device further include:
Display module, for when carrying long-range control list in the remote control notification, the long-range control to be arranged The corresponding application of at least one application identities for including in table is shown;
Second determining module, for determining that specified application is privacy application, the specified application is in the first terminal Application in addition to being applied corresponding at least one described application identities.
In conjunction with second of possible implementation of second aspect, in the third possible realization side of above-mentioned second aspect In formula, described device further include:
Adding module, for being directed to the default of the application when detecting for each application in the first terminal When instruction, the corresponding application identities of the application are added in the long-range control list;
Removing module, for each application at least one application identities for including in the long-range control list Mark deletes the application mark from the long-range control list when detecting the deletion instruction for the application identities Know.
In conjunction with the first possible implementation of second aspect, in the 4th kind of possible realization side of above-mentioned second aspect In formula, described device further include:
First setup module, for being directed to the application when detecting for each application in the first terminal When the setting instruction of the first attribute, display state is set by the remote community of the application;
Second setup module, for when detect for the application the second attribute setting instruction when, by the application Remote community be set as hidden state.
In conjunction with the first possible implementation of second aspect to second aspect, the third possible reality of second aspect Existing mode any possible implementation into the 4th kind of possible implementation of second aspect, the of above-mentioned second aspect In five kinds of possible implementations, described device further include:
Module is arranged, for arranging at least one application not hiding on the desktop of the first terminal according to specified rule Column.
According to the third aspect of an embodiment of the present disclosure, a kind of remote control apparatus is provided, described device includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
Receive the remote control notification that second terminal is sent;
When detecting confirmation instruction based on the remote control notification, from the application of first terminal, at least one is determined A privacy application;
At least one described privacy application is hidden;
It is remotely connect with second terminal foundation.
The technical scheme provided by this disclosed embodiment can include the following benefits: in the embodiments of the present disclosure, the One terminal can receive the remote control notification of second terminal transmission, and confirm instruction when detecting based on the remote control notification When, at least one privacy application can be determined from the application of first terminal, and carry out at least one privacy application hidden Hiding, later, first terminal can be established with second terminal and remotely be connect.Due to remotely being controlled in second terminal to first terminal During system, privacy application is not shown on first terminal, it can thus be avoided second user knows the privacy in first terminal The application message of application, and can apply to avoid the privacy in first terminal and be opened by second user due to maloperation, thus Effectively prevent the privacy leakage of first terminal.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is a kind of flow chart of long-range control method shown according to an exemplary embodiment.
Fig. 2 is the flow chart of another long-range control method shown according to an exemplary embodiment.
Fig. 3 is a kind of schematic diagram of remote control notification shown according to an exemplary embodiment.
Fig. 4 (a) is a kind of schematic diagram of long-range control list shown according to an exemplary embodiment.
Fig. 4 (b) is the schematic diagram of another long-range control list shown according to an exemplary embodiment.
Fig. 4 (c) is the schematic diagram of another long-range control list shown according to an exemplary embodiment.
Fig. 5 (a) is the schematic diagram of the application shown on a kind of first terminal shown according to an exemplary embodiment.
Fig. 5 (b) is the schematic diagram of the application shown on another first terminal shown according to an exemplary embodiment.
Fig. 6 (a) is the schematic diagram of the application shown on a kind of desktop shown according to an exemplary embodiment.
Fig. 6 (b) is the schematic diagram of the application shown on another desktop shown according to an exemplary embodiment.
Fig. 7 is the block diagram of the first remote control apparatus shown according to an exemplary embodiment.
Fig. 8 is a kind of block diagram of first determining module shown according to an exemplary embodiment.
Fig. 9 is the block diagram of second of remote control apparatus shown according to an exemplary embodiment.
Figure 10 is the block diagram of the third remote control apparatus shown according to an exemplary embodiment.
Figure 11 is the block diagram of the 4th kind of remote control apparatus shown according to an exemplary embodiment.
Figure 12 is the block diagram of the 5th kind of remote control apparatus shown according to an exemplary embodiment.
Figure 13 is the block diagram of the 6th kind of remote control apparatus shown according to an exemplary embodiment.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended The example of device and method being described in detail in claims, some aspects of the invention are consistent.
Before to the embodiment of the present disclosure carrying out that explanation is explained in detail, first the application scenarios of the embodiment of the present disclosure are given Explanation.In order to meet the needs of user is for terminal management, often two or more can be realized by remote control technology Screen sharing and control between terminal.And due to second terminal to first terminal carry out remotely control during, second Terminal possesses all permissions controlled first terminal, so the user using second terminal is easily beaten due to maloperation The application in first terminal comprising privacy information is opened, so as to cause the privacy leakage of first terminal, therefore, the embodiment of the present disclosure is mentioned A kind of long-range control method is supplied, to avoid the privacy leakage of first terminal.
Fig. 1 is a kind of flow chart of long-range control method shown according to an exemplary embodiment, and this method is used for first In terminal.As shown in Figure 1, this approach includes the following steps.
In a step 101, the remote control notification that second terminal is sent is received.
In a step 102, when detecting confirmation instruction based on remote control notification, from the application of first terminal, really At least one fixed privacy application.
In step 103, at least one privacy application is hidden.
At step 104, it is remotely connect with second terminal foundation.
In the embodiments of the present disclosure, first terminal can receive the remote control notification of second terminal transmission, and works as and be based on When the remote control notification detects confirmation instruction, at least one privacy application can be determined from the application of first terminal, and At least one privacy application is hidden, later, first terminal can be established with second terminal and remotely be connect.Due to Two terminals carry out during remotely controlling first terminal, do not show privacy application on first terminal, it can thus be avoided the Two users know the application message of the application of the privacy in first terminal, and can apply to avoid the privacy in first terminal by second User is opened due to maloperation, to effectively prevent the privacy leakage of first terminal.
In another embodiment of the present disclosure, from the application of first terminal, at least one privacy application is determined, comprising:
The remote community of the application in first terminal is obtained, remote community includes display state or hidden state, remotely Attribute is used to indicate in remote control process using state in which;
When the remote community of application is hidden state, determine that application is privacy application.
In another embodiment of the present disclosure, this method further include:
When carrying long-range control list in remote control notification, at least one application for including in list long-range will be controlled The corresponding application of mark is shown;
It determines and specifies using being privacy application, specified application is answered corresponding at least one application identities to remove in first terminal Application except.
In another embodiment of the present disclosure, this method further include:
For each application in first terminal, when detecting the preset instructions for application, will be answered using corresponding It is added in long-range control list with mark;
For remotely controlling each application identities at least one application identities for including in list, it is directed to when detecting When the deletion instruction of application identities, application identities are deleted from long-range control list.
In another embodiment of the present disclosure, this method further include:
Each application in first terminal will be applied when detecting the first attribute setting instruction for application Remote community be set as display state;
When detecting the second attribute setting instruction for application, hidden state is set by the remote community of application.
In another embodiment of the present disclosure, this method further include:
At least one application not hiding on the desktop of first terminal is arranged according to specified rule.
All the above alternatives, can form the alternative embodiment of the disclosure according to any combination, and the disclosure is real It applies example and this is no longer repeated one by one.
Fig. 2 is a kind of flow chart of long-range control method shown according to an exemplary embodiment, and this method is used for first In terminal.As shown in Fig. 2, this approach includes the following steps.
In step 201, the remote control notification that second terminal is sent is received.
It should be noted that first terminal can receive the remote control notification by cable network or wireless network, The embodiment of the present disclosure is not specifically limited in this embodiment.
In addition, remote control notification remotely controls first terminal for requesting, and can in the remote control notification To carry second terminal mark etc., the embodiment of the present disclosure is not specifically limited in this embodiment.
Wherein, second terminal mark be used for unique identification second terminal, and the second terminal mark can for this second eventually Title, MAC (Media Access Control, the medium access control) address of the second terminal at end etc., the disclosure are implemented Example is not specifically limited in this embodiment.
For example, the second terminal is identified as the title of the second terminal, and the entitled fruit fruit of the second terminal, then this is remote Process control request can show as form as shown in Figure 3, and certainly, in practical application, which can also be showed For other forms, the embodiment of the present disclosure is not specifically limited in this embodiment.
In step 202, when detecting confirmation instruction based on the remote control notification, from the application of first terminal, Determine at least one privacy application.
It should be noted that after first terminal receives the remote control notification of second terminal transmission, the first terminal The remote control notification can be shown, so that the first user can be handled the remote control notification.Wherein, One user is the user using the first terminal, and when first terminal shows the remote control notification, can pass through bullet The form of window is shown, can also be shown by other forms, the embodiment of the present disclosure is not specifically limited in this embodiment.
It should be noted that confirmation instruction, which is used to indicate first terminal, receives the remote control notification, and the confirmation instructs It can be triggered by the first user, which can be by specifying operation triggering, and it can be single-click operation that this, which specifies operation, double Operation, voice operating etc. are hit, the embodiment of the present disclosure is not specifically limited in this embodiment.For example, in remote control notification as shown in Figure 3 In, when first terminal detects the clicking operations such as the single-click operation for "Yes" button, double click operation, it can determine and be based on being somebody's turn to do Remote control notification detects confirmation instruction, alternatively, when first terminal detects that voice content is the voice of " receiving ", "Yes" etc. When information, it can determine and confirmation instruction is detected based on the remote control notification.
In addition, privacy application can be the application comprising privacy information, it can also be to be answered by what the first user freely set With the embodiment of the present disclosure is not specifically limited in this embodiment.In one embodiment, privacy application can for example answer for instant messaging With, shopping platform application etc..In another embodiment, privacy application can also be set as having access for example for the first user The application of limitation, for example, camera shooting application, note application, dialing application etc..Wherein, privacy information may include ID card No., Phone number, Bank Account Number, customer name, account balance, birthdate etc., the embodiment of the present disclosure do not do specific limit to this It is fixed.
Wherein, from the application of first terminal, at least one privacy is determined in application, answering in available first terminal Remote community, the remote community include display state or hidden state, which, which is used to indicate, is remotely controlling This applies state in which in the process;When the remote community of the application is hidden state, determine that the application is privacy application;When When the remote community of the application is display state, determining the application not is privacy application.Due to can be directly according to first terminal In the remote community of application judge whether the application is privacy application, the deterministic process is simple and convenient, and therefore, the disclosure is real At least one privacy application can quickly be determined, answer to improve at least one privacy from the application of first terminal by applying example Determination efficiency.
For example, the application of first terminal for using 1, using 2, using 3 and apply 4, then can obtain using 1, answer respectively With 2, using 3 and the remote community of application 4, it is assumed that the remote community using 1 is display state, using 2 remote community is hidden Hiding state, be display state using 3 remote community, using 4 remote community be display state, then can determine and be using 2 Privacy application is not privacy application using 1, using 3 and application 4.
It further, can also be by the long-range control list when carrying long-range control list in the remote control notification In include the corresponding application of at least one application identities shown that and determine that specified application is privacy application, this is specified to answer With for the application in first terminal in addition to being applied corresponding at least one application identities.Due to can directly according to this it is long-range Control list is applied quickly and easily determining the privacy in first terminal and the application that can be shown, without carrying out Other complex operations, it is thus possible to improve determining efficiency.
For example, the application of first terminal for using 1, using 2, using 3 and apply 4, this, which is remotely controlled in list, includes The corresponding application of at least one application identities is using 1, using 3 and apply 4, then can will carry out using 1, using 3 and application 4 Display will be determined as specified application except application 1, using the application 2 in addition to 3 and application 4 in the application of first terminal, and determining should Specifying using 2 is privacy application.
It should be noted that remotely control list is used to indicate at least one application that will be carried in the long-range control list The corresponding application of mark is shown.For example, when at least one application identities are application identities 1, application identities 3, using mark When knowing 4, this, which remotely controls list, can show as the form as shown in Fig. 4 (a), certainly, in practical application, the long-range control column Table can also show as other forms, and the embodiment of the present disclosure is not specifically limited in this embodiment.
In addition, application identities are used for unique identification application, if the application identities can be Apply Names, the application of the application Icon etc., the embodiment of the present disclosure is not specifically limited in this embodiment,
It further, can also be for each application in first terminal, when detecting the default finger for the application When enabling, this is added in the long-range control list using corresponding application identities;For including in the long-range control list Each application identities at least one application identities, it is long-range from this when detecting the deletion instruction for the application identities The application identities are deleted in control list.
Since preset instructions and deletion instruction can be triggered by the first user, the embodiment of the present disclosure is actually First user is added operation or delete operation to the long-range control list.And due to remotely controlling list for determining the The application that privacy in one terminal is applied and can be shown, therefore, the first user is added the long-range control list The process of operation or delete operation actually namely determines that the privacy in first terminal is applied and what can be shown answers Process, the determination process simple and flexible, can not only save the determining time, can also meet the privacy need of the first user It asks, to ensure that the personal secrets of first terminal, and improves the operating experience of the first user.
Application is added in long-range control list it should be noted that preset instructions are used to indicate, and the preset instructions It can be triggered by the first user, which can not do specific limit to this by specified operation triggering, the embodiment of the present disclosure It is fixed.Application identities are deleted from long-range control list in addition, deleting instruction and being used to indicate, and deletion instruction can be by first User's triggering, first user can be not specifically limited in this embodiment by specified operation triggering, the embodiment of the present disclosure.
For example, at least one application identities for including in the long-range control list are application identities 1, application identities 3, application Mark 4, and the long-range control list shows as the form as shown in Fig. 4 (a), the application of first terminal for using 1, using 2, answer With 3 and using 4, it is assumed that it detects for the preset instructions using 2, and this is application identities 2 using 2 corresponding application identities, The application identities 2 can be then added in the long-range control list, the long-range control list after adding the application identities 2 can be with Show as the form as shown in Fig. 4 (b).
For another example at least one application identities for including in the long-range control list are application identities 1, application identities 3, answer With mark 4, and the long-range control list shows as the form as shown in Fig. 4 (a), it is assumed that detects deleting for application identities 1 Except instruction, then the application identities 1 can be deleted from the long-range control list, the long-range control column after deleting the application identities 1 Table can show as the form as shown in Fig. 4 (c).
It further, can also be for each application in first terminal, when detecting the first attribute for the application When setting instruction, display state is set by the remote community of the application;When detect for the application the second attribute be arranged When instruction, hidden state is set by the remote community of the application.Since the first attribute setting instruction and the second property control refer to Order can trigger by the first user, therefore, the embodiment of the present disclosure be actually according to the attribute of the first user setting operate come Determine the remote community of the application in first terminal, which meets the privacy requirements of the first user, protects The personal secrets of first terminal are demonstrate,proved.
It should be noted that the setting instruction of the first attribute is used to indicate and sets display state for the remote community of application, And first attribute setting instruction can be triggered by the first user, which can pass through specified operation triggering, the disclosure Embodiment is not specifically limited in this embodiment.In addition, the setting instruction of the second attribute is used to indicate and sets hidden for the remote community of application Hiding state, and second attribute setting instruction can be triggered by the first user, which can be triggered by specified operation, The embodiment of the present disclosure is not specifically limited in this embodiment.
For example, the application of first terminal for using 1, using 2, using 3 and apply 4, it is assumed that detect for using 4 the The setting instruction of one attribute then can set display state for the remote community of application 4.
For example, the application of first terminal for using 1, using 2, using 3 and apply 4, it is assumed that detect for using 2 the The setting instruction of two attributes then can set hidden state for the remote community of application 2.
In step 203, which is hidden.
It should be noted that the operation being hidden at least one privacy application can be with reference in the related technology to certain The operation that a little applications are hidden, the embodiment of the present disclosure is to this without elaborating.
In addition, after at least one privacy application is hidden, at least one privacy application will in can not triggering state, This can not triggering state refer to that at least one privacy application cannot be opened.
For example, as the application that shown in Fig. 5 (a), is shown on first terminal for using 1, using 2, using 3 and using 4, this is extremely A few privacy is applied as that using 2, then can be hidden to application 2, and the application shown on first terminal after hiden application 2 can Shown in such as Fig. 5 (b).
Further, at least one application not hiding on the desktop of first terminal can also be arranged according to specified rule Column, in order to which the first user at least one application not hiding to this operates, so as to improve the operation of the first user Experience, and the visual effect of the desktop can be improved.
It should be noted that specified rule can be preset, when can be for according to the update of application such as the specified rule Between arranged by the early sequence to evening, arranged according to the sequence of the initial of the Apply Names of application etc., the embodiment of the present disclosure is to this It is not specifically limited.
For example, specified rule is to be arranged according to the renewal time of application by the early sequence to evening, and as shown in Fig. 6 (a), first At least one not hiding application is using 1, using 3 and applies 4 on the desktop of terminal, and the renewal time of application 1 is 2016- 4-13 10:12, the renewal time using 3 are 2016-4-12 15:12, and the renewal time using 4 is 2016-4-13 13:12, Then can by application 1, using 3 and application 4 according to application 1, using 3 and application 4 renewal time by early to late sequence application 3, using 1, using 4 arrangements, the application shown on the desktop after the arrangement can be as shown in Fig. 6 (b).
In step 204, it is remotely connect with second terminal foundation.
It should be noted that establishing the process remotely connecting with second terminal can implement with reference to the relevant technologies, the disclosure Example is to this without elaborating.In addition, first terminal is established with second terminal after remotely connecting, second terminal can be to first Terminal is remotely controlled, and the embodiment of the present disclosure is not specifically limited in this embodiment.
It should be noted that in the embodiment of the present disclosure, during second terminal remotely control to first terminal, Privacy application is not shown on the desktop of first terminal, to can not only know that the privacy in first terminal is answered to avoid second user Application message can also avoid the privacy in first terminal from applying and be opened by second user due to maloperation, so as to To effectively prevent the privacy leakage of first terminal.Wherein, second user is the user using second terminal.
Further, it after establishing long-range connect with second terminal, is connect when detecting with the long-range of second terminal When through disconnecting, current first terminal state can also be restored to the first terminal established before remotely connecting with second terminal State, so that the first user can operate the privacy application in first terminal when first terminal is not remotely controlled, Improve the operating experience of the first user.
It should be noted that first terminal state may include the application message and of the application shown on first terminal The arrangement mode etc. of the application shown on the desktop of one terminal, the embodiment of the present disclosure is not specifically limited in this embodiment.
In the embodiments of the present disclosure, first terminal can receive the remote control notification of second terminal transmission, and works as and be based on When the remote control notification detects confirmation instruction, at least one privacy application can be determined from the application of first terminal, and At least one privacy application is hidden, later, first terminal can be established with second terminal and remotely be connect.Due to Two terminals carry out during remotely controlling first terminal, do not show privacy application on first terminal, it can thus be avoided the Two users know the application message of the application of the privacy in first terminal, and can apply to avoid the privacy in first terminal by second User is opened due to maloperation, to effectively prevent the privacy leakage of first terminal.
Fig. 7 is a kind of block diagram of remote control apparatus shown according to an exemplary embodiment.Referring to Fig. 7, the device packet Include receiving module 701, determining module 702, hidden module 703 and link block 704.
Receiving module 701, for receiving the remote control notification of second terminal transmission;
First determining module 702, for when based on remote control notification detect confirmation instruction when, from answering for first terminal In, at least one privacy application is determined;
Hidden module 703, for being hidden at least one privacy application;
Link block 704 is remotely connect with second terminal foundation.
In another embodiment of the present disclosure, referring to Fig. 8, first determining module 702 is including acquiring unit 7021 and really Order member 7022.
Acquiring unit 7021, for obtaining in first terminal when detecting confirmation instruction based on remote control notification The remote community of application, remote community include display state or hidden state, and remote community is used to indicate to be controlled remotely State in which is applied in journey;
Determination unit 7022, for when the remote community of application is hidden state, determining that application is privacy application.
In another embodiment of the present disclosure, referring to Fig. 9, which further includes display module 705 and the second determining module 706。
Display module 705, for will remotely control in list and wrap when carrying long-range control list in remote control notification The corresponding application of at least one application identities included is shown;
Second determining module 706, for determining that specified application is privacy application, specified application is to show on current desktop Application in addition to being applied corresponding at least one application identities.
In another embodiment of the present disclosure, referring to Fig.1 0, which further includes adding module 707 and removing module 708.
Adding module 707, for for each application in first terminal, when detecting the preset instructions for application When, it will be added in long-range control list using corresponding application identities;
Removing module 708, for for remotely controlling each application at least one application identities for including in list Mark deletes application identities from long-range control list when detecting the deletion instruction for application identities.
In another embodiment of the present disclosure, referring to Fig.1 1, which further includes the first setup module 709 and the second setting Module 710.
First setup module 709, for belonging to for the first of application when detecting for each application in first terminal Property setting instruction when, set display state for the remote community of application;
Second setup module 710, for when detect for application the second attribute setting instruction when, by the long-range of application Attribute is set as hidden state.
In another embodiment of the present disclosure, referring to Fig.1 2, which further includes arrangement module 711.
Module 711 is arranged, at least one not hiding application is arranged according to specified rule on the desktop by first terminal Column.
In the embodiments of the present disclosure, first terminal can receive the remote control notification of second terminal transmission, and works as and be based on When the remote control notification detects confirmation instruction, at least one privacy application can be determined from the application of first terminal, and At least one privacy application is hidden, later, first terminal can be established with second terminal and remotely be connect.Due to Two terminals carry out during remotely controlling first terminal, do not show privacy application on first terminal, it can thus be avoided the Two users know the application message of the application of the privacy in first terminal, and can apply to avoid the privacy in first terminal by second User is opened due to maloperation, to effectively prevent the privacy leakage of first terminal.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
Figure 13 is a kind of block diagram of device 1300 for remotely controlling shown according to an exemplary embodiment.For example, Device 1300 can be mobile phone, computer, digital broadcasting terminal, messaging device, game console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc..
Referring to Fig.1 3, device 1300 may include following one or more components: processing component 1302, memory 1304, Power supply module 1306, multimedia component 1308, audio component 1310, the interface 1312 of input/output (I/O), sensor module 1314 and communication component 1316.
The integrated operation of the usual control device 1300 of processing component 1302, such as with display, telephone call, data communication, Camera operation and record operate associated operation.Processing component 1302 may include one or more processors 1320 to execute Instruction, to perform all or part of the steps of the methods described above.In addition, processing component 1302 may include one or more moulds Block, convenient for the interaction between processing component 1302 and other assemblies.For example, processing component 1302 may include multi-media module, To facilitate the interaction between multimedia component 1308 and processing component 1302.
Memory 1304 is configured as storing various types of data to support the operation in device 1300.These data Example includes the instruction of any application or method for operating on device 1300, contact data, telephone book data, Message, picture, video etc..Memory 1304 can by any kind of volatibility or non-volatile memory device or they Combination is realized, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), it is erasable can Program read-only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory Reservoir, disk or CD.
Power supply module 1306 provides power supply for the various assemblies of device 1300.Power supply module 1306 may include power management System, one or more power supplys and other with for device 1300 generate, manage, and distribute the associated component of power supply.
Multimedia component 1308 includes the screen of one output interface of offer between described device 1300 and user.? In some embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, Screen may be implemented as touch screen, to receive input signal from the user.Touch panel includes that one or more touch passes Sensor is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or sliding is dynamic The boundary of work, but also detect duration and pressure associated with the touch or slide operation.In some embodiments, more Media component 1308 includes a front camera and/or rear camera.When device 1300 is in operation mode, as shot mould When formula or video mode, front camera and/or rear camera can receive external multi-medium data.Each preposition camera shooting Head and rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 1310 is configured as output and/or input audio signal.For example, audio component 1310 includes a wheat Gram wind (MIC), when device 1300 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone quilt It is configured to receive external audio signal.The received audio signal can be further stored in memory 1304 or via communication Component 1316 is sent.In some embodiments, audio component 1310 further includes a loudspeaker, is used for output audio signal.
I/O interface 1312 provides interface, above-mentioned peripheral interface module between processing component 1302 and peripheral interface module It can be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and Locking press button.
Sensor module 1314 includes one or more sensors, for providing the assessment of various aspects for device 1300. For example, sensor module 1314 can detecte opening/closing for device 1300, the relative positioning of component, such as the component For the display and keypad of device 1300, sensor module 1314 can be with 1,300 1 components of detection device 1300 or device Position change, the existence or non-existence that user contacts with device 1300,1300 orientation of device or acceleration/deceleration and device 1300 Temperature change.Sensor module 1314 may include proximity sensor, be configured to without any physical contact It detects the presence of nearby objects.Sensor module 1314 can also include that optical sensor is used such as CMOS or ccd image sensor In being used in imaging applications.In some embodiments, which can also include acceleration transducer, gyro Instrument sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 1316 is configured to facilitate the communication of wired or wireless way between device 1300 and other equipment.Dress The wireless network based on communication standard, such as WiFi can be accessed by setting 1300,2G or 3G or their combination.It is exemplary at one In embodiment, communication component 1316 receives broadcast singal or broadcast correlation from external broadcasting management system via broadcast channel Information.In one exemplary embodiment, the communication component 1316 further includes near-field communication (NFC) module, to promote short distance Communication.For example, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band can be based in NFC module (UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 1300 can be by one or more application specific integrated circuit (ASIC), number Signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided It such as include the memory 1304 of instruction, above-metioned instruction can be executed by the processor 1320 of device 1300 to complete the above method.Example Such as, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, soft Disk and optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of mobile terminal When device executes, so that mobile terminal is able to carry out a kind of long-range control method, which comprises
Receive the remote control notification that second terminal is sent;
When detecting confirmation instruction based on remote control notification, from the application of first terminal, determine that at least one is hidden Private application;
At least one privacy application is hidden;
It is remotely connect with second terminal foundation.
In another embodiment of the present disclosure, from the application of first terminal, at least one privacy application is determined, comprising:
The remote community of the application in first terminal is obtained, remote community includes display state or hidden state, remotely Attribute is used to indicate in remote control process using state in which;
When the remote community of application is hidden state, determine that application is privacy application.
In another embodiment of the present disclosure, this method further include:
When carrying long-range control list in remote control notification, at least one application for including in list long-range will be controlled The corresponding application of mark is shown;
It determines and specifies using being privacy application, specified application is answered corresponding at least one application identities to remove in first terminal Application except.
In another embodiment of the present disclosure, this method further include:
For each application in first terminal, when detecting the preset instructions for application, will be answered using corresponding It is added in long-range control list with mark;
For remotely controlling each application identities at least one application identities for including in list, it is directed to when detecting When the deletion instruction of application identities, application identities are deleted from long-range control list.
In another embodiment of the present disclosure, this method further include:
Each application in first terminal will be applied when detecting the first attribute setting instruction for application Remote community be set as display state;
When detecting the second attribute setting instruction for application, hidden state is set by the remote community of application.
In another embodiment of the present disclosure, this method further include:
At least one application not hiding on the desktop of first terminal is arranged according to specified rule.
In the embodiments of the present disclosure, first terminal can receive the remote control notification of second terminal transmission, and works as and be based on When the remote control notification detects confirmation instruction, at least one privacy application can be determined from the application of first terminal, and At least one privacy application is hidden, later, first terminal can be established with second terminal and remotely be connect.Due to Two terminals carry out during remotely controlling first terminal, do not show privacy application on first terminal, it can thus be avoided the Two users know the application message of the application of the privacy in first terminal, and can apply to avoid the privacy in first terminal by second User is opened due to maloperation, to effectively prevent the privacy leakage of first terminal.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to of the invention its Its embodiment.This application is intended to cover any variations, uses, or adaptations of the invention, these modifications, purposes or Person's adaptive change follows general principle of the invention and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and true scope and spirit of the invention are by following Claim is pointed out.
It should be understood that the present invention is not limited to the precise structure already described above and shown in the accompanying drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present invention is limited only by the attached claims.

Claims (10)

1. a kind of long-range control method, which is characterized in that be applied to first terminal, which comprises
Receive the remote control notification that second terminal is sent;
When detecting confirmation instruction based on the remote control notification, from the application of the first terminal, at least one is determined A privacy application;
At least one described privacy application is hidden;
It is remotely connect with second terminal foundation;
The method also includes:
When carrying long-range control list in the remote control notification, by least one for including in the long-range control list The corresponding application of application identities is shown;
Determine that specified application is privacy application, the specified application is in the first terminal except at least one described application identities Application except corresponding application.
2. the method as described in claim 1, which is characterized in that in the application from the first terminal, determine at least one A privacy application, comprising:
Obtaining the remote community of the application in the first terminal, the remote community includes display state or hidden state, The remote community is used to indicate described in remote control process using state in which;
When the remote community of the application is hidden state, determine that the application is privacy application.
3. the method as described in claim 1, which is characterized in that the method also includes:
For each application in the first terminal, when detecting the preset instructions for the application, by the application Corresponding application identities are added in the long-range control list;
For include in the long-range control list at least one application identities in each application identities, be directed to when detecting When the deletion instruction of the application identities, the application identities are deleted from the long-range control list.
4. method according to claim 2, which is characterized in that the method also includes:
It will when detecting the first attribute setting instruction for the application for each application in the first terminal The remote community of the application is set as display state;
When detecting the second attribute setting instruction for the application, set the remote community of the application to hide shape State.
5. the method as described in claim 1-2,3-4 any claim, which is characterized in that the method also includes:
At least one application not hiding on the desktop of the first terminal is arranged according to specified rule.
6. a kind of remote control apparatus, which is characterized in that described device includes:
Receiving module, for receiving the remote control notification of second terminal transmission;
First determining module, for when based on the remote control notification detect confirmation instruction when, from the application of first terminal In, determine at least one privacy application;
Hidden module, for being hidden at least one described privacy application;
Link block, for remotely being connect with second terminal foundation;
Described device further include:
Display module is used for when carrying long-range control list in the remote control notification, will be in the long-range control list Including at least one application identities corresponding to using being shown;
Second determining module, for determining that specified application is privacy application, the specified application is in the first terminal except institute State the application except the corresponding application of at least one application identities.
7. device as claimed in claim 6, which is characterized in that first determining module includes:
Acquiring unit, for obtaining in the first terminal when detecting confirmation instruction based on the remote control notification The remote community of application, the remote community include display state or hidden state, and the remote community is used to indicate remote It is described during process control to apply state in which;
Determination unit, for when the remote community of the application is hidden state, determining that the application is privacy application.
8. device as claimed in claim 6, which is characterized in that described device further include:
Adding module, for for each application in the first terminal, when detecting the preset instructions for the application When, the corresponding application identities of the application are added in the long-range control list;
Removing module, for each application mark at least one application identities for including in the long-range control list Know, when detecting the deletion instruction for the application identities, deletes the application identities from the long-range control list.
9. device as claimed in claim 7, which is characterized in that described device further include:
First setup module, for being directed to the first of the application when detecting for each application in the first terminal When attribute setting instruction, display state is set by the remote community of the application;
Second setup module, for when detect for the application the second attribute setting instruction when, by the remote of the application Journey attribute is set as hidden state.
10. the device as described in claim 6-7,8-9 any claim, which is characterized in that described device further include:
Module is arranged, for arranging at least one application not hiding on the desktop of the first terminal according to specified rule.
CN201610285277.2A 2016-04-29 2016-04-29 Long-range control method and device Active CN105956489B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610285277.2A CN105956489B (en) 2016-04-29 2016-04-29 Long-range control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610285277.2A CN105956489B (en) 2016-04-29 2016-04-29 Long-range control method and device

Publications (2)

Publication Number Publication Date
CN105956489A CN105956489A (en) 2016-09-21
CN105956489B true CN105956489B (en) 2019-02-22

Family

ID=56913255

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610285277.2A Active CN105956489B (en) 2016-04-29 2016-04-29 Long-range control method and device

Country Status (1)

Country Link
CN (1) CN105956489B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106878548A (en) * 2017-01-13 2017-06-20 北京奇虎科技有限公司 Mobile terminal remote control method, device and mobile terminal
CN117478665A (en) * 2023-12-27 2024-01-30 珠海格力电器股份有限公司 Terminal remote management method and device, electronic equipment and readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103237047A (en) * 2013-03-11 2013-08-07 广东欧珀移动通信有限公司 Remote controlled and control method
CN104298484A (en) * 2014-10-17 2015-01-21 深圳市中兴移动通信有限公司 Multi-screen interaction method and device
CN104318145A (en) * 2014-09-26 2015-01-28 来安县新元机电设备设计有限公司 Method and system for privacy protection
CN104680090A (en) * 2015-02-06 2015-06-03 西安酷派软件科技有限公司 Application hiding control method, device and mobile terminal
CN105069374A (en) * 2015-08-06 2015-11-18 上海斐讯数据通信技术有限公司 Private data intercepting protection method and system
CN105407131A (en) * 2015-10-12 2016-03-16 惠州Tcl移动通信有限公司 Remote control method between mobile devices and mobile devices

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103237047A (en) * 2013-03-11 2013-08-07 广东欧珀移动通信有限公司 Remote controlled and control method
CN104318145A (en) * 2014-09-26 2015-01-28 来安县新元机电设备设计有限公司 Method and system for privacy protection
CN104298484A (en) * 2014-10-17 2015-01-21 深圳市中兴移动通信有限公司 Multi-screen interaction method and device
CN104680090A (en) * 2015-02-06 2015-06-03 西安酷派软件科技有限公司 Application hiding control method, device and mobile terminal
CN105069374A (en) * 2015-08-06 2015-11-18 上海斐讯数据通信技术有限公司 Private data intercepting protection method and system
CN105407131A (en) * 2015-10-12 2016-03-16 惠州Tcl移动通信有限公司 Remote control method between mobile devices and mobile devices

Also Published As

Publication number Publication date
CN105956489A (en) 2016-09-21

Similar Documents

Publication Publication Date Title
EP3070905A1 (en) Method and apparatus for binding device
CN106126685B (en) Page loading method and device
CN106547663B (en) Key management method and device
CN105956486B (en) Long-range control method and device
CN105162982A (en) Answering extension function display method and device
JP2017530493A (en) External device connection method and apparatus, program, and recording medium
CN105204350A (en) Method and apparatus for displaying household electrical appliance information
CN105426060B (en) application control method and device
CN107204883A (en) Network failure processing method and device
CN107820006A (en) Control the method and device of camera shooting
CN107168543A (en) Control method of keyboard and device
CN105245705A (en) Telephone prompting method and device
CN105956489B (en) Long-range control method and device
CN105450861A (en) Information prompt method and information prompt device
CN104780256A (en) Address book management method and device and intelligent terminal
CN106412481B (en) Reminding method, device and terminal based on VoLTE video calling
CN106101372B (en) Using prompting setting method and device
CN105119984B (en) Send the method and device of file
CN107958038A (en) Speaker control method and device
CN107295167A (en) Method for information display and device
CN105227891A (en) A kind of video call method and device
CN104836882A (en) Method and device for processing contact information
CN105100410A (en) Method and device for aggregating third-party telephone application
CN109120793A (en) Method of speech processing and device
CN105430260B (en) Obtain the method and device of video image

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant