CN107277804A - Operate execution method, device and terminal - Google Patents
Operate execution method, device and terminal Download PDFInfo
- Publication number
- CN107277804A CN107277804A CN201710591694.4A CN201710591694A CN107277804A CN 107277804 A CN107277804 A CN 107277804A CN 201710591694 A CN201710591694 A CN 201710591694A CN 107277804 A CN107277804 A CN 107277804A
- Authority
- CN
- China
- Prior art keywords
- instruction
- remote control
- terminal
- user
- control operation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
- H04W8/245—Transfer of terminal data from a network towards a terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Human Computer Interaction (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
This application discloses one kind operation execution method, device and terminal, belong to field of mobile terminals.Methods described includes:The remote control commands that terminal the reception server is sent, the remote control commands are used to indicate to perform the remote control operation relevant with searching the terminal;The terminal performs the remote control operation according to the remote control commands;The terminal receives the control operation of user, and the control operation is used for terminal triggering user's control instruction, if the terminal does not complete the execution of the remote control operation, the terminal forbids responding the user's control instruction.The application causes the user's control triggered by malicious persons is instructed to be prohibited response, the normal implementation procedure of remote control operation is not influenceed, so as to solve the problem of correlation technique medium-long range control process is easily disturbed by malicious persons, the rate that runs succeeded of remote control operation is improved.
Description
Technical field
The present embodiments relate to field of mobile terminals, more particularly to a kind of operation execution method, device and terminal.
Background technology
Smart mobile phone is used by increasing user.Smart mobile phone can be by inserting user identity identification mould
Block (Subscriber Identity Module, SIM) comes accessing mobile communication network, and transmitting-receiving short message (Short
Message, SMS).
User is during using smart mobile phone, it is easy to go out active or stolen event.In correlation technique, user
User account number can be used to open the remote control function in smart mobile phone (also known as searching handset program).When smart mobile phone lose or
When stolen, user can use computer to send remote control commands, the remote control commands to the vendor server of smart mobile phone
Carry user account number, terminal iidentification and control routine;When smart mobile phone receives the remote control commands, checking user account number is
It is no to be matched with being stored in local user account number, and verify whether terminal iidentification matches with being stored in local terminal iidentification;
If both of which is matched, the corresponding control instruction of control routine is performed.Wherein, control instruction can include:For locked mobile phone
Instruction, the instruction for data of erasing or the instruction for jingle bell.
But under some scenes, above-mentioned remote control process can be disturbed by malicious persons.Such as, smart mobile phone is being received
Default audio signal is played after to the instruction for jingle bell, but now thief is by the turning down sound volume of smart mobile phone to zero or closes
Machine, leads to not normal jingle bell.
The content of the invention
In order to solve the problem of remote control process is easily disturbed by malicious persons, the embodiments of the invention provide one kind
Operate execution method, apparatus and system.The technical scheme is as follows:
First aspect operates execution method there is provided one kind, and methods described includes:
The remote control commands that terminal the reception server is sent, the remote control commands are used to indicate to perform with searching institute
State the relevant remote control operation of terminal;
The terminal performs the remote control operation according to the remote control commands;
The terminal receives the control operation of user, and the control operation is used to refer to terminal triggering user's control
Order;
If the terminal does not complete the execution of the remote control operation, the terminal forbids responding the user's control
Instruction.
In a kind of optional embodiment, if the terminal does not complete the execution of the remote control operation, the end
End forbids responding the user's control instruction, including:
According to the remote control commands, the target identification position in CONFIG.SYS is set to the first value;
After the user's control instruction is triggered, whether the value for detecting the target identification position is first value;
When the value of target identification position is first value, forbid performing the user's control instruction corresponding
The target control operation.
In a kind of optional embodiment, the terminal performs the remote control operation according to the remote control commands
Afterwards, in addition to:
When the execution remote control operation is finished, the target identification position in the CONFIG.SYS is set to
Second value.
In a kind of optional embodiment, the remote control commands include:Instruction for positioning;
The user's control instruction includes:For closing the instruction of global position system GPS, for forbidding accessing wireless guarantor
The instruction of true network, instruction, the instruction for carrying out general-purpose serial bus USB debugging, use for forbidding accessing mobile data
In at least one of instruction of shutdown.
In a kind of optional embodiment, the remote control commands include:Instruction for locking the terminal;
The user's control instruction includes:For forbidding accessing the instruction of wireless fidelity network, being moved for forbidding accessing
The instruction of data, the instruction for carrying out general-purpose serial bus USB debugging, at least one of instruction of shutdown.
In a kind of optional embodiment, the remote control commands include:Instruction for data of erasing;
The user's control instruction includes:Instruction for Backup Data, for reading internal memory or external storage
The instruction of device, the instruction for being set to offline mode, for forbid access wireless fidelity network instruction, for forbid access
The instruction of mobile data, the instruction for carrying out general-purpose serial bus USB debugging, at least one of instruction of shutdown.
In an optional embodiment, the remote control commands include:Instruction for jingle bell;
The user's control instruction includes:For turning down the instruction of volume, the instruction for being set to silent mode, being used for
It is set to the instruction of offline mode, for forbidding accessing the instruction of wireless fidelity network, the finger for forbidding accessing mobile data
Make, the instruction for carrying out general-purpose serial bus USB debugging, at least one of instruction of shutdown.
Second aspect operates execution method there is provided one kind, and methods described includes:
Terminal receives remote control commands at server, and the remote control commands are used to indicate that the terminal is switched to
Lost condition;
The terminal is switched to the lost condition according to the remote control commands;
The terminal receives the control operation of user, and parses the control operation and obtain user's control instruction;
If the terminal is in lost condition, user's control described in the terminal refusal respond is instructed.
In an optional embodiment, the terminal is switched to the lost condition according to the remote control commands
Including:
The terminal is set to first according to the remote control commands, by the target identification position in CONFIG.SYS and taken
Value, first value is used to represent that the terminal is in lost condition;
If the terminal is in lost condition, user's control described in the terminal refusal respond is instructed, including:
The terminal obtains the value of the target identification position after the user's control instruction is triggered;
If the value of the target identification position is first value, user's control described in the terminal refusal respond refers to
Order.
In an optional embodiment, it is described according to the remote control commands perform the remote control operation it
Afterwards, in addition to:
After preset time, target identification position is set to the second value, second value is used to represent described
Terminal is in non-lost condition.
In an optional embodiment, the remote control commands are additionally operable to indicate the locking terminal;
Methods described also includes:The terminal locks the terminal according to the remote control commands;
And/or,
The remote control commands are additionally operable to the data for indicating to erase in the terminal;
Methods described also includes:The data that the terminal is erased in the terminal according to the remote control commands.
And/or,
The remote control commands are additionally operable to indicate the terminal jingle bell;
Methods described also includes:The terminal is according to the instruction jingle bells of the remote control commands.
In an optional embodiment, the terminal receives the control operation of user, and parses the control operation and obtain
Include to user's control instruction:
The touch-screen of the terminal receives touch operation, and parses the touch operation and obtain touching instruction;
And/or, the button of the terminal receives pressing operation, and parses the pressing operation and obtain touching instruction;
And/or, the terminal receives the phonetic entry of user, and parses the phonetic entry and obtain phonetic order.
In an optional embodiment, the user's control, which is instructed, to be used for:
Indicate that the terminal closes global position system GPS;
And/or, indicate that the terminal closes wireless fidelity network;
And/or, indicate that the terminal closes the access of mobile data;
And/or, indicate that the terminal carries out general-purpose serial bus USB debugging;
And/or, indicate the terminal closedown.
The third aspect operates performs device there is provided one kind, and described device includes:
Receiving module, the remote control commands sent for the reception server, the remote control commands are held for instruction
The row remote control operation relevant with searching the terminal;
Performing module, for performing the remote control operation according to the remote control commands;
The receiving module, is additionally operable to receive the control operation of user, and the control operation is used to trigger to the terminal
User's control is instructed;
The performing module, is additionally operable to, when not completing the execution of the remote control operation, forbid responding the user
Control instruction.
In an optional embodiment, the performing module includes setting submodule, detection sub-module and performs submodule
Block, the setting submodule is used for according to the remote control commands, and the target identification position in CONFIG.SYS is set into the
One value;The detection sub-module is used for after the user's control instruction is triggered, and detects the value of the target identification position and is
No is first value;When the value of target identification position is first value, forbid responding the user's control
Instruction.
In an optional embodiment, the performing module, for when the execution remote control operation is finished, inciting somebody to action
Target identification position in the CONFIG.SYS is set to the second value.
In a kind of optional embodiment, the remote control commands include:Instruction for positioning;
The user's control instruction includes:For closing the instruction of global position system GPS, for forbidding accessing wireless guarantor
The instruction of true network, instruction, the instruction for carrying out general-purpose serial bus USB debugging, use for forbidding accessing mobile data
In at least one of instruction of shutdown.
In a kind of optional embodiment, the remote control commands include:Instruction for locking the terminal;
The user's control instruction includes:For forbidding accessing the instruction of wireless fidelity network, being moved for forbidding accessing
The instruction of data, the instruction for carrying out general-purpose serial bus USB debugging, at least one of instruction of shutdown.
In a kind of optional embodiment, the remote control commands include:Instruction for data of erasing;
The user's control instruction includes:Instruction for Backup Data, for reading internal memory or external storage
The instruction of device, the instruction for being set to offline mode, for forbid access wireless fidelity network instruction, for forbid access
The instruction of mobile data, the instruction for carrying out general-purpose serial bus USB debugging, at least one of instruction of shutdown.
In an optional embodiment, the remote control commands include:Instruction for jingle bell;
The user's control instruction includes:For turning down the instruction of volume, the instruction for being set to silent mode, being used for
It is set to the instruction of offline mode, for forbidding accessing the instruction of wireless fidelity network, the finger for forbidding accessing mobile data
Make, the instruction for carrying out general-purpose serial bus USB debugging, at least one of instruction of shutdown.
Fourth aspect operates performs device there is provided one kind, and described device includes:
Receiving module, for receiving remote control commands at server, the remote control commands are described for indicating
Device is switched to lost condition;
Handover module, for according to the remote control commands, being switched to the lost condition;
The receiving module, for receiving the control operation of user, and parses the control operation and obtains user's control and refer to
Order;
Performing module, for when in lost condition, user's control described in refusal respond to be instructed.
In an optional embodiment, the performing module, including:Submodule, acquisition submodule are set and son is performed
Module, the setting submodule is used for according to the remote control commands, and the target identification position in CONFIG.SYS is set to
First value, first value is used to represent that described device is in lost condition;The acquisition submodule, in triggering institute
State after user's control instruction, obtain the value of the target identification position;The implementation sub-module, for when target identification position
Value be first value when, described in refusal respond user's control instruct.
In an optional embodiment, the setting submodule is additionally operable to after preset time, by the target mark
Know position and be set to the second value, second value is used to represent that described device is in non-lost condition.
In an optional embodiment, the remote control commands are additionally operable to indicate locking described device;
The performing module is additionally operable to, according to the remote control commands, lock described device;
And/or,
The remote control commands are additionally operable to the data for indicating to erase in described device;
The performing module is additionally operable to the data erased according to the remote control commands in described device.
And/or,
The remote control commands are additionally operable to indicate described device jingle bell;
The performing module is additionally operable to the instruction jingle bell according to the remote control commands.
In an optional embodiment, the receiving module is used to receive touch behaviour in the touch-screen of described device
Make, and parse the touch operation and obtain touching instruction;
And/or, the receiving module is used to receive pressing operation in the button of described device, and parses the pressing behaviour
Obtain touching instruction;
And/or, the receiving module is used to receive the phonetic entry of user in described device, and parses the phonetic entry
Obtain phonetic order.
In an optional embodiment, the user's control, which is instructed, to be used for:
Indicate that described device closes global position system GPS;
And/or, indicate that described device closes wireless fidelity network;
And/or, indicate that described device closes the access of mobile data;
And/or, indicate that described device carries out general-purpose serial bus USB debugging;
And/or, indicate described device shutdown.
5th aspect there is provided a kind of terminal, the terminal include processor and memory, the memory storage have to
A few instruction, at least one instruction is loaded by the processor and performed to realize such as first aspect and first aspect
Operation described in any optional implementation performs method, or, any optional realization side of second aspect and second aspect
Operation described in formula performs method.
6th aspect is there is provided a kind of computer-readable recording medium, and be stored with least one finger in the storage medium
Order, at least one instruction is loaded by processor and performed to realize any optional realization such as first aspect and first aspect
Operation described in mode performs method, or, the behaviour described in any optional implementation of second aspect and second aspect
Make execution method.
The beneficial effect that technical scheme provided in an embodiment of the present invention is brought is:
By terminal during remote control operation is performed, forbid response user's control instruction so that malicious persons
The user's control instruction triggered in terminal will not be responded, and the normal implementation procedure of remote control operation is not influenceed, so that
The problem of correlation technique medium-long range control process is easily disturbed by malicious persons is solved, holding for remote control operation is improved
Row success rate.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, makes required in being described below to embodiment
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for
For those of ordinary skill in the art, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings
Accompanying drawing.
Fig. 1 is the structural representation for the lookup terminal system that one exemplary embodiment of the application is provided;
Fig. 2 is the flow chart for the operation execution method that one exemplary embodiment of the application is provided;
Fig. 3 is the flow chart of the operation execution method of the application another exemplary embodiment offer;
Fig. 4 is the internal structure schematic diagram for the terminal that one exemplary embodiment of the application is provided;
Fig. 5 is the block diagram for the operation performs device that one exemplary embodiment of the application is provided;
Fig. 6 is the block diagram for the terminal that one exemplary embodiment of the application is provided.
Embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to embodiment party of the present invention
Formula is described in further detail.
It is the used remote control service when can not find terminal to search terminal service.When user can not find end at home
Behind end or lost terminal, terminal is positioned by searching terminal service, at least one in jingle bell, locked or data of erasing
Item remote control operation.When terminal is mobile phone, it can be described as searching cellular service;When terminal is tablet personal computer, it can be described as looking into
Levelling plate service.Different according to the type of terminal, different titles may be had by searching terminal service, and the present embodiment is not added with to this
To limit.
Fig. 1 is the structural representation of the lookup terminal system shown in the exemplary embodiment of the application.The system bag
Include:Terminal 120 and server 140.
Terminal 120 can be mobile phone, tablet personal computer, wearable electronic, E-book reader, MP3 (Moving
Picture Experts Group Audio Layer III, dynamic image expert's compression standard audio aspect 3) player,
MP4 (Moving Picture Experts Group Audio Layer IV, dynamic image expert's compression standard audio aspect
4) terminal such as player and pocket computer on knee.
Alternatively, be provided with locating module in terminal 120, the locating module can be must agree (iBeacon) locating module,
GPS (Global Positioning System, global positioning system) locating module, WIFI (Wireless Fidelity, nothing
Line fidelity) at least one of network location module and architecture module.Terminal 120, which has, positions itself residing geographical position
Ability, check and accept positioning function in terminal service to realize.Terminal 120 also has loudspeaker, and terminal 120 has according to long-range
Control instruction carries out the ability of jingle bell, to realize the alarm functionality checked and accepted in terminal service.Alternatively, it is provided with terminal 120
The application program of terminal service is searched for realizing.
Alternatively, terminal 120 is connected and communicated with server 140 by cable network or wireless network.On the one hand, take
It can be communicated between business device 140 and terminal 120 by short message channel, short message channel is by phone number in terminal 120
SMS (Short Message Service) carry out data transmit-receive passage, generally by the circuit commutative field (Circuit in mobile communications network
Switching Domain, CS) realize;On the other hand, it can be carried out between server 140 and terminal 120 by data channel
Communication, data channel is packet-switched domain (Packet Switching Domain, PS) in mobile communications network or wireless protected
The true passage of (Wireless Fidelity, WiFi) real-time performance.
Server 140 is to look for the background server of terminal service, and server 140 can be a server, many clothes
The server cluster or cloud computing center of business device composition.Alternatively, server 140 is sent far by data channel to terminal 120
Process control is instructed, or, server 140 sends remote control commands by short message channel to terminal 120.Now, server 140
With directly transmit short message and/or receive short message function, or server 140 have by mobile operator offer
SMS platform is come the function that sends and/or receive short message.
Alternatively, remote control commands be voluntarily generated by server 140 or user given birth to by control device
Into it is rear to server 140 send.Such as, user is by the webpage login service device 140 on control device, by the webpage to
Server 140 sends remote control commands, and remote control commands are transmitted to terminal 120 by server 140 again.
Fig. 2 is the flow chart of the operation execution method of the exemplary embodiment offer of the application.The present embodiment is with this
Operation execution method is applied to illustrate in terminal 120.This method includes:
Step 201, the remote control commands that the reception server is sent, remote control commands are used to indicate to perform with searching eventually
The relevant remote control operation of end service;
Alternatively, remote control commands are that server is generated, or, remote control commands are given birth to by user by control device
Server is sent to after, then terminal is transmitted to by server.Control device can run application client or
Webpage client.
Alternatively, the remote control operation relevant with searching terminal service includes but is not limited to:Positioning action, jingle bell behaviour
At least one of in work, locked terminal operation and data manipulation of erasing." data " in the present embodiment can be user data,
At least one of produced account number, password, recording, photo, film, program usage record data are used by user.
Step 202, remote control operation is performed according to remote control commands;
When remote control commands include the instruction for positioning, terminal performs positioning action;
When remote control commands include the instruction for jingle bell, terminal performs jingle bell operation;
When remote control commands include the instruction for locked terminal, terminal performs locked terminal operation;
When remote control commands include the instruction for data of erasing, terminal performs user data operation of erasing.
Step 203, the control operation of user is received, the control operation is used for terminal triggering user's control instruction;
During remote control operation is performed, other users may manually operated terminal.Terminal can receive use
The control operation at family, and user's control instruction is triggered according to control operation.
Alternatively, remote control commands are the control instructions that the first user is issued by server to terminal.User's control
Instruction is the control instruction that second user is triggered by the body of terminal, and the body of the terminal is provided with least one I/O group
Part.That is, user's control instruction is the control instruction of I/O components triggering built-in in the body that second user passes through terminal.It is logical
Often, user's control instruction internal trigger with a distance from nearer from terminal by second user, not second user pass through other and control
Equipment is in the control instruction remotely triggered.
The control operation of second user triggering includes but is not limited to:Touch operation to touch-screen, physical button is pressed
Press operation, the clicking operation to virtual push button, the operation that phonetic order is said to microphone, prearranged gesture is made to camera
At least one of operation operate, passed through hardware interface input control instruction.
First user and second user are probably same user, namely are the owner of terminal;First user and
Two users may not also be same user, namely the first user is the holder of terminal, and second user is malicious persons.
Alternatively, the I/O components of terminal built-in include but is not limited to:Touch-screen, physical button, virtual push button, microphone,
At least one of camera, hardware interface.Hardware interface can be USB interface.In the present embodiment, I/O components do not include
Network interface.
Step 204, if terminal does not complete the execution of remote control operation, terminal forbids response user's control instruction.
Because when the first user can not find terminal, user's control instruction is by second user (being likely to malicious persons)
The control instruction triggered in terminal.Therefore, when terminal does not complete the execution of remote control operation, forbidding responding user's control
Instruction.
In summary, the operation that the present embodiment is provided performs method, and the process of remote control operation is being performed by terminal
In, forbid response user's control instruction so that the user's control instruction that malicious persons are triggered in terminal will not be performed, no
The normal implementation procedure of remote control operation is influenceed, so as to solve correlation technique medium-long range control process easily by malicious persons
The problem of disturbed, the rate that runs succeeded of remote control operation is improved.
Fig. 3 is the flow chart of the operation execution method of another exemplary embodiment offer of the application.The present embodiment with
The operation performs method and is applied to illustrate in terminal 120.This method includes:
Step 301, the remote control commands that the reception server is sent, remote control commands are used to indicate to perform with searching eventually
The relevant remote control operation in end;
Alternatively, remote control commands are that server is generated, or, remote control commands are set by the first user by control
Server is sent to after standby generation, then terminal is transmitted to by server.Control device can run application client
Or webpage client.First user can be the owner of terminal.
Alternatively, the remote control operation relevant with searching terminal service includes but is not limited to:Positioning, jingle bell, locked end
Hold and erase in data at least one of.
Step 302, according to remote control commands, the target identification position in CONFIG.SYS is set to the first value;
Operation has several CONFIG.SYSs that are stored with operating system, operating system in terminal.Alternatively, several
CONFIG.SYS includes:The CONFIG.SYS relevant with searching terminal service.
Such as:Terminal operating has Android (Android) operating system, and android system is stored with system safety
CONFIG.SYS, the CONFIG.SYS on application program authority, developer can also increase by one with searching terminal
The relevant CONFIG.SYS of service.Or, developer increases existing CONFIG.SYS behind target identification position, multiplexing
For the CONFIG.SYS relevant with searching terminal service.
In the CONFIG.SYS relevant with searching terminal service, there is target identification position.Target identification position is present
Two values:First value and the second value.When the value of target identification position is the first value, execution user's control is forbidden to refer to
Order;When the value of target identification position is the second value, it is allowed to perform user's control instruction.The initial value of target identification position
(or acquiescence value) is the second value.
Such as, there is target identification position findmyphone=x, x=0 or 1 in CONFIG.SYS.Work as findmyphone
When=1, forbid performing user's control instruction;As findmyphone=0, it is allowed to perform user's control instruction.
Also operation has operation at least one application program, exemplary reference Fig. 4, terminal to have lookup terminal journey in terminal
Sequence 421, finder 422, volume adjusting program 423, WiFi management programs 424, data administrator 425, schema management journey
Sequence 426 and switching on and shutting down program 427.Wherein, finder 422 is used to realize positioning function;Volume adjusting program 423 is used to realize
Heighten volume or turn down the function of volume;WiFi management programs 424 are used to realize the function of being turned on and off Wifi networks;Data
Management program 425 is used to realize the function of being turned on and off mobile data network;Schema management program 426, which is used for realization, makes terminal
It is operated in the function of at least one preset mode such as silent mode, offline mode, vibration mode, conference model;Switching on and shutting down program
427 are used to realize the function of starting shooting or shut down.
When lookup terminal program 421 receives remote control commands, terminal program 421 is searched by CONFIG.SYS
Target identification position findmyphone in 410 is set to the first value 1.
Step 303, the control operation of user is received, the control operation is used for terminal triggering user's control instruction;
During execution remote control operation (and/or in a period of time after execution remote control operation), its
Its user may manually operated terminal.Terminal can receive the control operation of user, and trigger user's control according to control operation
System instruction.
The control operation of user includes but is not limited to:It is touch operation to touch-screen, the pressing operation to physical button, right
The clicking operation of virtual push button, the operation that phonetic order is said to microphone, the operation that prearranged gesture is made to camera, pass through
Hardware interface inputs the operation of control instruction.
Step 304, when triggering user's control instruction, whether the value of detection target identification position is the first value;
When other application program in terminal in addition to terminal program 421 is searched receives user's control instruction, detection system
Whether the value of the target identification position findmyphone in system configuration file 410 is the first value 1.
When the value of target identification position is the first value, into step 305;When the value of target identification position takes for second
During value, into step 306.
Step 305, response user's control instruction is forbidden;
When the value of target identification position is the first value 1, forbid response user's control instruction.
Such as, remote control commands are the instructions for jingle bell, and user's control instruction is the instruction for turning down volume, sound
Regulation program is measured when detecting findmyphone=1, forbids turning down volume.
Step 306, it is allowed to respond user's control instruction;
When the value of target identification position is the second value 0, it is allowed to respond user's control instruction;
Such as, remote control commands are the instructions for jingle bell, and user's control instruction is the instruction for turning down volume, sound
Regulation program is measured when detecting findmyphone=0, volume is turned down according to user's control instruction.
Step 307, when execution remote control operation is finished, the target identification position in CONFIG.SYS is set to second
Value.
When lookup terminal program 421, which performs remote control operation, to be finished, or lookup terminal program 421 calls other journeys
When sequence execution remote control operation is finished, terminal program 421 is searched by the target identification position in CONFIG.SYS 410
Findmyphone is set to the second value 0.
It is random or unpredictable, so step 303 because the trigger process of user's control instruction is for terminal
Implementation procedure to step 306 also has randomness.The present embodiment does not limit step 303 between step 306 and other steps
Priority perform relation, the first implementation procedure instructed to user's control in step 303 to step 306, can with step 302 with
And it is separate to the second implementation procedure of remote control commands in step 307.
In summary, the operation that the present embodiment is provided performs method, and the process of remote control operation is being performed by terminal
In, forbid response user's control instruction so that the user's control instruction that malicious persons are triggered in terminal will not be performed, no
The normal implementation procedure of remote control operation is influenceed, so as to solve correlation technique medium-long range control process easily by malicious persons
The problem of disturbed, the rate that runs succeeded of remote control operation is improved.
The operation that the present embodiment is provided performs method, is realized by using the target identification position in CONFIG.SYS
Forbid response user's control instruction during performing remote control operation, realize lookup terminal program and other application program
Between interprogram communication, and search the decoupling between terminal program and other application program;And due to operating system pair
CONFIG.SYS itself provides certain security mechanisms, also cause malicious persons to be difficult to change CONFIG.SYS, from
And also assures that the security of the operation execution method of the present embodiment.
Alternatively, with user's control instruction there is corresponding relation in remote control commands.Refer in the presence of at least two remote controls
The corresponding user's control instruction of order is entirely different or incomplete same.Schematically, the corresponding relation such as following table one
It is shown:
Table one
Therefore in the alternative embodiment based on Fig. 3, the target identification position in CONFIG.SYS is multiple, target identification
There is one-to-one relationship between position and the type of remote control commands, such as:Findmyphone1 is to the finger applied to jingle bell
Make, findmyphone2 to the instruction applied to locked terminal, findmyphone3 to the instruction applied to data of erasing,
Findmyphone4 is to the instruction applied to jingle bell.
So that the first kind is any one type of remote control commands as an example, searches terminal program and receiving the first kind
During the remote control commands of type, the value of first object flag corresponding with the remote control commands of the first kind is set to
First value.Assuming that user's control instruction corresponding with the remote control commands of the first kind is the instruction of first kind user's control,
Then it is used for the application program for performing the instruction of first kind user's control when receiving user's control instruction, detection first object mark
Whether the value of position is the first value, subsequently into step 304 or step 305.
In summary, the operation that the present embodiment is provided performs method, can realize using the type of remote control commands as grain
The Precise control of degree, so as on the premise of the normal operating to terminal is not influenceed, forbid response to be deposited with remote control commands
In the user's control instruction of conflict possibility, the rationalization and hommization of control logic are realized.
Fig. 5 is the block diagram of the operation performs device of the exemplary embodiment offer of the application.The operation performs device
Can by software, hardware or both be implemented in combination with as terminal all or part of.The operation performs device can be with
Including:
Receiving module 520, the remote control commands sent for the reception server, the remote control commands are used to indicate
Perform the remote control operation relevant with searching the terminal;
Performing module 540, for performing the remote control operation according to the remote control commands;
The receiving module 520, is additionally operable to receive the control operation of user, and the control operation is used to touch to the terminal
Hair family control instruction.
The performing module 540, is additionally operable to, when not completing the execution of the remote control operation, forbid responding the use
Family control instruction.
In an optional embodiment, the performing module includes:Submodule 542, detection sub-module 544 are set and held
Row submodule 546;
The setting submodule 542, for according to the remote control commands, by the target identification in CONFIG.SYS
Position is set to the first value;
The detection sub-module 544, for when receiving the user's control instruction, detecting the target identification position
Whether value is first value;
The implementation sub-module 546, for when the value of target identification position is first value, forbidding response
The user's control instruction.
In an optional embodiment, the setting submodule 542 is additionally operable to complete in the execution remote control operation
Bi Shi, the second value is set to by the target identification position in the CONFIG.SYS.
The remote control commands include:Instruction for positioning;
The user's control instruction includes:For closing the instruction of global position system GPS, for forbidding accessing wireless guarantor
The instruction of true network, instruction, the instruction for carrying out general-purpose serial bus USB debugging, use for forbidding accessing mobile data
In at least one of instruction of shutdown.
In an optional embodiment, the remote control commands include:Instruction for locking the terminal;
The user's control instruction includes:For forbidding accessing the instruction of wireless fidelity network, being moved for forbidding accessing
The instruction of data, the instruction for carrying out general-purpose serial bus USB debugging, at least one of instruction of shutdown.
In an optional embodiment, the remote control commands include:Instruction for data of erasing;
The user's control instruction includes:Instruction for Backup Data, for reading internal memory or external storage
The instruction of device, the instruction for being set to offline mode, for forbid access wireless fidelity network instruction, for forbid access
The instruction of mobile data, the instruction for carrying out general-purpose serial bus USB debugging, at least one of instruction of shutdown.
In an optional embodiment, the remote control commands include:Instruction for jingle bell;
The user's control instruction includes:For turning down the instruction of volume, the instruction for being set to silent mode, being used for
It is set to the instruction of offline mode, for forbidding accessing the instruction of wireless fidelity network, the finger for forbidding accessing mobile data
Make, the instruction for carrying out general-purpose serial bus USB debugging, at least one of instruction of shutdown.
In summary, the operation performs device that the present embodiment is provided, the process of remote control operation is being performed by terminal
In, forbid response user's control instruction so that the user's control instruction that malicious persons are triggered in terminal will not be performed, no
The normal implementation procedure of remote control operation is influenceed, so as to solve correlation technique medium-long range control process easily by malicious persons
The problem of disturbed, the rate that runs succeeded of remote control operation is improved.
It should be noted that:The operation performs device that above-described embodiment is provided is when forbidding response user's control instruction, only
With the division progress of above-mentioned each functional module for example, in practical application, can as needed and by above-mentioned functions distribution by
Different functional modules is completed, i.e., the internal structure of equipment is divided into different functional modules, described above complete to complete
Portion or partial function.In addition, the operation performs device that above-described embodiment is provided performs embodiment of the method with operation and belongs to same
Design, it implements process and refers to embodiment of the method, repeats no more here.
Fig. 6 shows the structural representation of the terminal involved by an illustrative embodiment of the invention.The terminal includes:Should
Terminal includes:Processor 611, receiver 612, transmitter 613, memory 614 and bus 615.
Processor 611 includes one or more than one processing core, and memory 614 passes through bus 615 and processor 611
Be connected, memory 614 be used for store at least one instruct, processor 611 perform memory 614 in instruction when realize Fig. 2 and
The step of execution method being operated in any one of Fig. 3 embodiments.
Receiver 612 and transmitter 613 can be implemented as a communication component, and the communication component can be one piece of communication core
Piece, for being modulated and/or demodulating to information, and by reception of wireless signals or sends the information.
In addition, memory 614 can be by any kind of volatibility or non-volatile memory device or combinations thereof
Realize, such as static access memory (SRAM), Electrically Erasable Read Only Memory (EEPROM), erasable programmable at any time
Read-only storage (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash memory,
Disk or CD.
Said structure signal is only that terminal is schematically illustrated, and terminal can include more or less parts, such as
Terminal can not include receiver, or, terminal also includes other parts such as sensor, display screen, power supply, and the present embodiment is no longer
Repeat.
The embodiment of the present invention also provides a kind of computer-readable medium, is stored thereon with least one instruction, the instruction quilt
Processor 611 realizes the step of operating execution method in any one of Fig. 2 and Fig. 3 embodiment when performing.
The embodiments of the present invention are for illustration only, and the quality of embodiment is not represented.
One of ordinary skill in the art will appreciate that realizing that all or part of step of above-described embodiment can be by hardware
To complete, the hardware of correlation can also be instructed to complete by program, described program can be stored in a kind of computer-readable
In storage medium, storage medium mentioned above can be read-only storage, disk or CD etc..
The foregoing is only presently preferred embodiments of the present invention, be not intended to limit the invention, it is all the present invention spirit and
Within principle, any modification, equivalent substitution and improvements made etc. should be included in the scope of the protection.
Claims (10)
1. one kind operation execution method, it is characterised in that methods described includes:
The remote control commands that terminal the reception server is sent, the remote control commands are used to indicate to perform with searching the end
The relevant remote control operation in end;
The terminal performs the remote control operation according to the remote control commands;
The terminal receives the control operation of user, and the control operation is used for terminal triggering user's control instruction;
If the terminal does not complete the execution of the remote control operation, the terminal, which forbids responding the user's control, to be referred to
Order.
2. according to the method described in claim 1, it is characterised in that if the terminal does not complete holding for the remote control operation
OK, then the terminal forbids responding the user's control instruction, including:
According to the remote control commands, the target identification position in CONFIG.SYS is set to the first value;
After the user's control instruction is triggered, whether the value for detecting the target identification position is first value;
When the value of target identification position is first value, forbid responding the user's control instruction.
3. method according to claim 2, it is characterised in that the terminal is according to being performed the remote control commands
After remote control operation, in addition to:
When the execution remote control operation is finished, the target identification position in the CONFIG.SYS is set to second
Value.
4. according to any described method of claims 1 to 3, it is characterised in that the remote control commands include:For positioning
Instruction;
The user's control instruction includes:For closing the instruction of global position system GPS, for forbidding accessing Wireless Fidelity net
The instruction of network, for forbidding accessing the instruction of mobile data, the instruction for carrying out general-purpose serial bus USB debugging, for closing
At least one of instruction of machine.
5. according to any described method of claims 1 to 3, it is characterised in that the remote control commands include:For locking
The instruction of the terminal;
The user's control instruction includes:For forbidding the instruction of access wireless fidelity network, for forbidding accessing mobile data
Instruction, the instruction for carrying out general-purpose serial bus USB debugging, at least one of instruction of shutdown.
6. according to any described method of claims 1 to 3, it is characterised in that the remote control commands include:For erasing
The instruction of data;
The user's control instruction includes:Instruction for Backup Data, for reading internal memory or external memory storage
Instruction, the instruction for being set to offline mode, for forbid access wireless fidelity network instruction, for forbid access move
The instruction of data, the instruction for carrying out general-purpose serial bus USB debugging, at least one of instruction of shutdown.
7. according to any described method of claims 1 to 3, it is characterised in that the remote control commands include:For jingle bell
Instruction;
The user's control instruction includes:For turning down the instruction of volume, the instruction for being set to silent mode, for setting
For the instruction of offline mode, for forbidding accessing the instruction of wireless fidelity network, instruction, use for forbidding accessing mobile data
In carry out general-purpose serial bus USB debugging instruction, at least one of instruction of shutdown.
8. one kind operation performs device, it is characterised in that described device includes:
Receiving module, for the reception server send remote control commands, the remote control commands be used for indicate perform with
Search the relevant remote control operation of the terminal;
Performing module, for performing the remote control operation according to the remote control commands;
The receiving module, is additionally operable to receive the control operation of user, and the control operation is used to trigger user to the terminal
Control instruction;
The performing module, is additionally operable to, when not completing the execution of the remote control operation, forbid responding the user's control
Instruction.
9. a kind of computer equipment, it is characterised in that the equipment includes processor and memory, the memory storage have to
A few instruction, at least one instruction loaded as the processor and performed with realize such as claim 1 to 7 it is any as described in
Operation perform method.
10. a kind of computer-readable recording medium, it is characterised in that be stored with least one instruction in the storage medium, institute
State at least one instruction loaded as processor and performed with realize as claim 1 to 7 it is any as described in operation execution method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710591694.4A CN107277804B (en) | 2017-07-19 | 2017-07-19 | Operation execution method and device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710591694.4A CN107277804B (en) | 2017-07-19 | 2017-07-19 | Operation execution method and device and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107277804A true CN107277804A (en) | 2017-10-20 |
CN107277804B CN107277804B (en) | 2020-02-18 |
Family
ID=60078873
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710591694.4A Active CN107277804B (en) | 2017-07-19 | 2017-07-19 | Operation execution method and device and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107277804B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150222623A1 (en) * | 2005-04-05 | 2015-08-06 | Assa Abloy Ab | System and method for remotely assigning and revoking access credentials using a near field communication equipped mobile phone |
CN104869243A (en) * | 2015-05-08 | 2015-08-26 | 上海斐讯数据通信技术有限公司 | Mobile phone anti-theft tracking system and method |
CN105933317A (en) * | 2016-04-08 | 2016-09-07 | 上海海漾软件技术有限公司 | Mobile terminal remote control method and device |
WO2016192511A1 (en) * | 2015-06-05 | 2016-12-08 | 腾讯科技(深圳)有限公司 | Method and apparatus for remotely deleting information |
CN106878548A (en) * | 2017-01-13 | 2017-06-20 | 北京奇虎科技有限公司 | Mobile terminal remote control method, device and mobile terminal |
-
2017
- 2017-07-19 CN CN201710591694.4A patent/CN107277804B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150222623A1 (en) * | 2005-04-05 | 2015-08-06 | Assa Abloy Ab | System and method for remotely assigning and revoking access credentials using a near field communication equipped mobile phone |
CN104869243A (en) * | 2015-05-08 | 2015-08-26 | 上海斐讯数据通信技术有限公司 | Mobile phone anti-theft tracking system and method |
WO2016192511A1 (en) * | 2015-06-05 | 2016-12-08 | 腾讯科技(深圳)有限公司 | Method and apparatus for remotely deleting information |
CN105933317A (en) * | 2016-04-08 | 2016-09-07 | 上海海漾软件技术有限公司 | Mobile terminal remote control method and device |
CN106878548A (en) * | 2017-01-13 | 2017-06-20 | 北京奇虎科技有限公司 | Mobile terminal remote control method, device and mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN107277804B (en) | 2020-02-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104933351B (en) | The treating method and apparatus of information security | |
US10129756B2 (en) | Proactive security for mobile devices | |
CN106778175B (en) | Interface locking method and device and terminal equipment | |
CN104915582B (en) | unlocking method and device | |
CN112600977A (en) | Method and terminal for quickly opening application or application function | |
CN113158198B (en) | Access control method, device, terminal equipment and storage medium | |
JP7204680B2 (en) | METHOD, APPARATUS, PROGRAM, AND STORAGE MEDIUM FOR CONTROLLING DOOR GUARD | |
CN109145560A (en) | The method and device of accessing monitoring equipment | |
CN106254467A (en) | Sharing files method and device | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN108475304B (en) | Method and device for associating application program and biological characteristics and mobile terminal | |
CN105847243A (en) | Method and device for accessing smart camera | |
CN104967593A (en) | Identity verification method, apparatus and system | |
WO2016011739A1 (en) | Method, device, and system for anti-counterfeiting verification | |
EP3447666A1 (en) | Processing fingerprint information | |
CN106102061A (en) | Method for connecting network and device | |
CN106446653A (en) | Application authority management method and device and electronic equipment | |
CN105430639B (en) | Information processing method and device | |
CN114756849B (en) | Method and device for verifying personal identification number PIN code | |
CN105069344B (en) | mobile terminal locking method and device | |
CN106789070A (en) | The decryption method of data, device and terminal | |
CN106529236A (en) | Unlocking method, apparatus and system | |
CN107071008B (en) | Terminal equipment positioning method, device and equipment | |
CN108280375A (en) | A kind of mobile terminal that can prevent illegal brush machine | |
CN106375997A (en) | Terminal control device, method and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant after: OPPO Guangdong Mobile Communications Co., Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant before: Guangdong Opel Mobile Communications Co., Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |