CN107277804A - Operate execution method, device and terminal - Google Patents

Operate execution method, device and terminal Download PDF

Info

Publication number
CN107277804A
CN107277804A CN201710591694.4A CN201710591694A CN107277804A CN 107277804 A CN107277804 A CN 107277804A CN 201710591694 A CN201710591694 A CN 201710591694A CN 107277804 A CN107277804 A CN 107277804A
Authority
CN
China
Prior art keywords
instruction
remote control
terminal
user
control operation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710591694.4A
Other languages
Chinese (zh)
Other versions
CN107277804B (en
Inventor
朱忠磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710591694.4A priority Critical patent/CN107277804B/en
Publication of CN107277804A publication Critical patent/CN107277804A/en
Application granted granted Critical
Publication of CN107277804B publication Critical patent/CN107277804B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • H04W8/245Transfer of terminal data from a network towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Human Computer Interaction (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

This application discloses one kind operation execution method, device and terminal, belong to field of mobile terminals.Methods described includes:The remote control commands that terminal the reception server is sent, the remote control commands are used to indicate to perform the remote control operation relevant with searching the terminal;The terminal performs the remote control operation according to the remote control commands;The terminal receives the control operation of user, and the control operation is used for terminal triggering user's control instruction, if the terminal does not complete the execution of the remote control operation, the terminal forbids responding the user's control instruction.The application causes the user's control triggered by malicious persons is instructed to be prohibited response, the normal implementation procedure of remote control operation is not influenceed, so as to solve the problem of correlation technique medium-long range control process is easily disturbed by malicious persons, the rate that runs succeeded of remote control operation is improved.

Description

Operate execution method, device and terminal
Technical field
The present embodiments relate to field of mobile terminals, more particularly to a kind of operation execution method, device and terminal.
Background technology
Smart mobile phone is used by increasing user.Smart mobile phone can be by inserting user identity identification mould Block (Subscriber Identity Module, SIM) comes accessing mobile communication network, and transmitting-receiving short message (Short Message, SMS).
User is during using smart mobile phone, it is easy to go out active or stolen event.In correlation technique, user User account number can be used to open the remote control function in smart mobile phone (also known as searching handset program).When smart mobile phone lose or When stolen, user can use computer to send remote control commands, the remote control commands to the vendor server of smart mobile phone Carry user account number, terminal iidentification and control routine;When smart mobile phone receives the remote control commands, checking user account number is It is no to be matched with being stored in local user account number, and verify whether terminal iidentification matches with being stored in local terminal iidentification; If both of which is matched, the corresponding control instruction of control routine is performed.Wherein, control instruction can include:For locked mobile phone Instruction, the instruction for data of erasing or the instruction for jingle bell.
But under some scenes, above-mentioned remote control process can be disturbed by malicious persons.Such as, smart mobile phone is being received Default audio signal is played after to the instruction for jingle bell, but now thief is by the turning down sound volume of smart mobile phone to zero or closes Machine, leads to not normal jingle bell.
The content of the invention
In order to solve the problem of remote control process is easily disturbed by malicious persons, the embodiments of the invention provide one kind Operate execution method, apparatus and system.The technical scheme is as follows:
First aspect operates execution method there is provided one kind, and methods described includes:
The remote control commands that terminal the reception server is sent, the remote control commands are used to indicate to perform with searching institute State the relevant remote control operation of terminal;
The terminal performs the remote control operation according to the remote control commands;
The terminal receives the control operation of user, and the control operation is used to refer to terminal triggering user's control Order;
If the terminal does not complete the execution of the remote control operation, the terminal forbids responding the user's control Instruction.
In a kind of optional embodiment, if the terminal does not complete the execution of the remote control operation, the end End forbids responding the user's control instruction, including:
According to the remote control commands, the target identification position in CONFIG.SYS is set to the first value;
After the user's control instruction is triggered, whether the value for detecting the target identification position is first value;
When the value of target identification position is first value, forbid performing the user's control instruction corresponding The target control operation.
In a kind of optional embodiment, the terminal performs the remote control operation according to the remote control commands Afterwards, in addition to:
When the execution remote control operation is finished, the target identification position in the CONFIG.SYS is set to Second value.
In a kind of optional embodiment, the remote control commands include:Instruction for positioning;
The user's control instruction includes:For closing the instruction of global position system GPS, for forbidding accessing wireless guarantor The instruction of true network, instruction, the instruction for carrying out general-purpose serial bus USB debugging, use for forbidding accessing mobile data In at least one of instruction of shutdown.
In a kind of optional embodiment, the remote control commands include:Instruction for locking the terminal;
The user's control instruction includes:For forbidding accessing the instruction of wireless fidelity network, being moved for forbidding accessing The instruction of data, the instruction for carrying out general-purpose serial bus USB debugging, at least one of instruction of shutdown.
In a kind of optional embodiment, the remote control commands include:Instruction for data of erasing;
The user's control instruction includes:Instruction for Backup Data, for reading internal memory or external storage The instruction of device, the instruction for being set to offline mode, for forbid access wireless fidelity network instruction, for forbid access The instruction of mobile data, the instruction for carrying out general-purpose serial bus USB debugging, at least one of instruction of shutdown.
In an optional embodiment, the remote control commands include:Instruction for jingle bell;
The user's control instruction includes:For turning down the instruction of volume, the instruction for being set to silent mode, being used for It is set to the instruction of offline mode, for forbidding accessing the instruction of wireless fidelity network, the finger for forbidding accessing mobile data Make, the instruction for carrying out general-purpose serial bus USB debugging, at least one of instruction of shutdown.
Second aspect operates execution method there is provided one kind, and methods described includes:
Terminal receives remote control commands at server, and the remote control commands are used to indicate that the terminal is switched to Lost condition;
The terminal is switched to the lost condition according to the remote control commands;
The terminal receives the control operation of user, and parses the control operation and obtain user's control instruction;
If the terminal is in lost condition, user's control described in the terminal refusal respond is instructed.
In an optional embodiment, the terminal is switched to the lost condition according to the remote control commands Including:
The terminal is set to first according to the remote control commands, by the target identification position in CONFIG.SYS and taken Value, first value is used to represent that the terminal is in lost condition;
If the terminal is in lost condition, user's control described in the terminal refusal respond is instructed, including:
The terminal obtains the value of the target identification position after the user's control instruction is triggered;
If the value of the target identification position is first value, user's control described in the terminal refusal respond refers to Order.
In an optional embodiment, it is described according to the remote control commands perform the remote control operation it Afterwards, in addition to:
After preset time, target identification position is set to the second value, second value is used to represent described Terminal is in non-lost condition.
In an optional embodiment, the remote control commands are additionally operable to indicate the locking terminal;
Methods described also includes:The terminal locks the terminal according to the remote control commands;
And/or,
The remote control commands are additionally operable to the data for indicating to erase in the terminal;
Methods described also includes:The data that the terminal is erased in the terminal according to the remote control commands.
And/or,
The remote control commands are additionally operable to indicate the terminal jingle bell;
Methods described also includes:The terminal is according to the instruction jingle bells of the remote control commands.
In an optional embodiment, the terminal receives the control operation of user, and parses the control operation and obtain Include to user's control instruction:
The touch-screen of the terminal receives touch operation, and parses the touch operation and obtain touching instruction;
And/or, the button of the terminal receives pressing operation, and parses the pressing operation and obtain touching instruction;
And/or, the terminal receives the phonetic entry of user, and parses the phonetic entry and obtain phonetic order.
In an optional embodiment, the user's control, which is instructed, to be used for:
Indicate that the terminal closes global position system GPS;
And/or, indicate that the terminal closes wireless fidelity network;
And/or, indicate that the terminal closes the access of mobile data;
And/or, indicate that the terminal carries out general-purpose serial bus USB debugging;
And/or, indicate the terminal closedown.
The third aspect operates performs device there is provided one kind, and described device includes:
Receiving module, the remote control commands sent for the reception server, the remote control commands are held for instruction The row remote control operation relevant with searching the terminal;
Performing module, for performing the remote control operation according to the remote control commands;
The receiving module, is additionally operable to receive the control operation of user, and the control operation is used to trigger to the terminal User's control is instructed;
The performing module, is additionally operable to, when not completing the execution of the remote control operation, forbid responding the user Control instruction.
In an optional embodiment, the performing module includes setting submodule, detection sub-module and performs submodule Block, the setting submodule is used for according to the remote control commands, and the target identification position in CONFIG.SYS is set into the One value;The detection sub-module is used for after the user's control instruction is triggered, and detects the value of the target identification position and is No is first value;When the value of target identification position is first value, forbid responding the user's control Instruction.
In an optional embodiment, the performing module, for when the execution remote control operation is finished, inciting somebody to action Target identification position in the CONFIG.SYS is set to the second value.
In a kind of optional embodiment, the remote control commands include:Instruction for positioning;
The user's control instruction includes:For closing the instruction of global position system GPS, for forbidding accessing wireless guarantor The instruction of true network, instruction, the instruction for carrying out general-purpose serial bus USB debugging, use for forbidding accessing mobile data In at least one of instruction of shutdown.
In a kind of optional embodiment, the remote control commands include:Instruction for locking the terminal;
The user's control instruction includes:For forbidding accessing the instruction of wireless fidelity network, being moved for forbidding accessing The instruction of data, the instruction for carrying out general-purpose serial bus USB debugging, at least one of instruction of shutdown.
In a kind of optional embodiment, the remote control commands include:Instruction for data of erasing;
The user's control instruction includes:Instruction for Backup Data, for reading internal memory or external storage The instruction of device, the instruction for being set to offline mode, for forbid access wireless fidelity network instruction, for forbid access The instruction of mobile data, the instruction for carrying out general-purpose serial bus USB debugging, at least one of instruction of shutdown.
In an optional embodiment, the remote control commands include:Instruction for jingle bell;
The user's control instruction includes:For turning down the instruction of volume, the instruction for being set to silent mode, being used for It is set to the instruction of offline mode, for forbidding accessing the instruction of wireless fidelity network, the finger for forbidding accessing mobile data Make, the instruction for carrying out general-purpose serial bus USB debugging, at least one of instruction of shutdown.
Fourth aspect operates performs device there is provided one kind, and described device includes:
Receiving module, for receiving remote control commands at server, the remote control commands are described for indicating Device is switched to lost condition;
Handover module, for according to the remote control commands, being switched to the lost condition;
The receiving module, for receiving the control operation of user, and parses the control operation and obtains user's control and refer to Order;
Performing module, for when in lost condition, user's control described in refusal respond to be instructed.
In an optional embodiment, the performing module, including:Submodule, acquisition submodule are set and son is performed Module, the setting submodule is used for according to the remote control commands, and the target identification position in CONFIG.SYS is set to First value, first value is used to represent that described device is in lost condition;The acquisition submodule, in triggering institute State after user's control instruction, obtain the value of the target identification position;The implementation sub-module, for when target identification position Value be first value when, described in refusal respond user's control instruct.
In an optional embodiment, the setting submodule is additionally operable to after preset time, by the target mark Know position and be set to the second value, second value is used to represent that described device is in non-lost condition.
In an optional embodiment, the remote control commands are additionally operable to indicate locking described device;
The performing module is additionally operable to, according to the remote control commands, lock described device;
And/or,
The remote control commands are additionally operable to the data for indicating to erase in described device;
The performing module is additionally operable to the data erased according to the remote control commands in described device.
And/or,
The remote control commands are additionally operable to indicate described device jingle bell;
The performing module is additionally operable to the instruction jingle bell according to the remote control commands.
In an optional embodiment, the receiving module is used to receive touch behaviour in the touch-screen of described device Make, and parse the touch operation and obtain touching instruction;
And/or, the receiving module is used to receive pressing operation in the button of described device, and parses the pressing behaviour Obtain touching instruction;
And/or, the receiving module is used to receive the phonetic entry of user in described device, and parses the phonetic entry Obtain phonetic order.
In an optional embodiment, the user's control, which is instructed, to be used for:
Indicate that described device closes global position system GPS;
And/or, indicate that described device closes wireless fidelity network;
And/or, indicate that described device closes the access of mobile data;
And/or, indicate that described device carries out general-purpose serial bus USB debugging;
And/or, indicate described device shutdown.
5th aspect there is provided a kind of terminal, the terminal include processor and memory, the memory storage have to A few instruction, at least one instruction is loaded by the processor and performed to realize such as first aspect and first aspect Operation described in any optional implementation performs method, or, any optional realization side of second aspect and second aspect Operation described in formula performs method.
6th aspect is there is provided a kind of computer-readable recording medium, and be stored with least one finger in the storage medium Order, at least one instruction is loaded by processor and performed to realize any optional realization such as first aspect and first aspect Operation described in mode performs method, or, the behaviour described in any optional implementation of second aspect and second aspect Make execution method.
The beneficial effect that technical scheme provided in an embodiment of the present invention is brought is:
By terminal during remote control operation is performed, forbid response user's control instruction so that malicious persons The user's control instruction triggered in terminal will not be responded, and the normal implementation procedure of remote control operation is not influenceed, so that The problem of correlation technique medium-long range control process is easily disturbed by malicious persons is solved, holding for remote control operation is improved Row success rate.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, makes required in being described below to embodiment Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for For those of ordinary skill in the art, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings Accompanying drawing.
Fig. 1 is the structural representation for the lookup terminal system that one exemplary embodiment of the application is provided;
Fig. 2 is the flow chart for the operation execution method that one exemplary embodiment of the application is provided;
Fig. 3 is the flow chart of the operation execution method of the application another exemplary embodiment offer;
Fig. 4 is the internal structure schematic diagram for the terminal that one exemplary embodiment of the application is provided;
Fig. 5 is the block diagram for the operation performs device that one exemplary embodiment of the application is provided;
Fig. 6 is the block diagram for the terminal that one exemplary embodiment of the application is provided.
Embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to embodiment party of the present invention Formula is described in further detail.
It is the used remote control service when can not find terminal to search terminal service.When user can not find end at home Behind end or lost terminal, terminal is positioned by searching terminal service, at least one in jingle bell, locked or data of erasing Item remote control operation.When terminal is mobile phone, it can be described as searching cellular service;When terminal is tablet personal computer, it can be described as looking into Levelling plate service.Different according to the type of terminal, different titles may be had by searching terminal service, and the present embodiment is not added with to this To limit.
Fig. 1 is the structural representation of the lookup terminal system shown in the exemplary embodiment of the application.The system bag Include:Terminal 120 and server 140.
Terminal 120 can be mobile phone, tablet personal computer, wearable electronic, E-book reader, MP3 (Moving Picture Experts Group Audio Layer III, dynamic image expert's compression standard audio aspect 3) player, MP4 (Moving Picture Experts Group Audio Layer IV, dynamic image expert's compression standard audio aspect 4) terminal such as player and pocket computer on knee.
Alternatively, be provided with locating module in terminal 120, the locating module can be must agree (iBeacon) locating module, GPS (Global Positioning System, global positioning system) locating module, WIFI (Wireless Fidelity, nothing Line fidelity) at least one of network location module and architecture module.Terminal 120, which has, positions itself residing geographical position Ability, check and accept positioning function in terminal service to realize.Terminal 120 also has loudspeaker, and terminal 120 has according to long-range Control instruction carries out the ability of jingle bell, to realize the alarm functionality checked and accepted in terminal service.Alternatively, it is provided with terminal 120 The application program of terminal service is searched for realizing.
Alternatively, terminal 120 is connected and communicated with server 140 by cable network or wireless network.On the one hand, take It can be communicated between business device 140 and terminal 120 by short message channel, short message channel is by phone number in terminal 120 SMS (Short Message Service) carry out data transmit-receive passage, generally by the circuit commutative field (Circuit in mobile communications network Switching Domain, CS) realize;On the other hand, it can be carried out between server 140 and terminal 120 by data channel Communication, data channel is packet-switched domain (Packet Switching Domain, PS) in mobile communications network or wireless protected The true passage of (Wireless Fidelity, WiFi) real-time performance.
Server 140 is to look for the background server of terminal service, and server 140 can be a server, many clothes The server cluster or cloud computing center of business device composition.Alternatively, server 140 is sent far by data channel to terminal 120 Process control is instructed, or, server 140 sends remote control commands by short message channel to terminal 120.Now, server 140 With directly transmit short message and/or receive short message function, or server 140 have by mobile operator offer SMS platform is come the function that sends and/or receive short message.
Alternatively, remote control commands be voluntarily generated by server 140 or user given birth to by control device Into it is rear to server 140 send.Such as, user is by the webpage login service device 140 on control device, by the webpage to Server 140 sends remote control commands, and remote control commands are transmitted to terminal 120 by server 140 again.
Fig. 2 is the flow chart of the operation execution method of the exemplary embodiment offer of the application.The present embodiment is with this Operation execution method is applied to illustrate in terminal 120.This method includes:
Step 201, the remote control commands that the reception server is sent, remote control commands are used to indicate to perform with searching eventually The relevant remote control operation of end service;
Alternatively, remote control commands are that server is generated, or, remote control commands are given birth to by user by control device Server is sent to after, then terminal is transmitted to by server.Control device can run application client or Webpage client.
Alternatively, the remote control operation relevant with searching terminal service includes but is not limited to:Positioning action, jingle bell behaviour At least one of in work, locked terminal operation and data manipulation of erasing." data " in the present embodiment can be user data, At least one of produced account number, password, recording, photo, film, program usage record data are used by user.
Step 202, remote control operation is performed according to remote control commands;
When remote control commands include the instruction for positioning, terminal performs positioning action;
When remote control commands include the instruction for jingle bell, terminal performs jingle bell operation;
When remote control commands include the instruction for locked terminal, terminal performs locked terminal operation;
When remote control commands include the instruction for data of erasing, terminal performs user data operation of erasing.
Step 203, the control operation of user is received, the control operation is used for terminal triggering user's control instruction;
During remote control operation is performed, other users may manually operated terminal.Terminal can receive use The control operation at family, and user's control instruction is triggered according to control operation.
Alternatively, remote control commands are the control instructions that the first user is issued by server to terminal.User's control Instruction is the control instruction that second user is triggered by the body of terminal, and the body of the terminal is provided with least one I/O group Part.That is, user's control instruction is the control instruction of I/O components triggering built-in in the body that second user passes through terminal.It is logical Often, user's control instruction internal trigger with a distance from nearer from terminal by second user, not second user pass through other and control Equipment is in the control instruction remotely triggered.
The control operation of second user triggering includes but is not limited to:Touch operation to touch-screen, physical button is pressed Press operation, the clicking operation to virtual push button, the operation that phonetic order is said to microphone, prearranged gesture is made to camera At least one of operation operate, passed through hardware interface input control instruction.
First user and second user are probably same user, namely are the owner of terminal;First user and Two users may not also be same user, namely the first user is the holder of terminal, and second user is malicious persons.
Alternatively, the I/O components of terminal built-in include but is not limited to:Touch-screen, physical button, virtual push button, microphone, At least one of camera, hardware interface.Hardware interface can be USB interface.In the present embodiment, I/O components do not include Network interface.
Step 204, if terminal does not complete the execution of remote control operation, terminal forbids response user's control instruction.
Because when the first user can not find terminal, user's control instruction is by second user (being likely to malicious persons) The control instruction triggered in terminal.Therefore, when terminal does not complete the execution of remote control operation, forbidding responding user's control Instruction.
In summary, the operation that the present embodiment is provided performs method, and the process of remote control operation is being performed by terminal In, forbid response user's control instruction so that the user's control instruction that malicious persons are triggered in terminal will not be performed, no The normal implementation procedure of remote control operation is influenceed, so as to solve correlation technique medium-long range control process easily by malicious persons The problem of disturbed, the rate that runs succeeded of remote control operation is improved.
Fig. 3 is the flow chart of the operation execution method of another exemplary embodiment offer of the application.The present embodiment with The operation performs method and is applied to illustrate in terminal 120.This method includes:
Step 301, the remote control commands that the reception server is sent, remote control commands are used to indicate to perform with searching eventually The relevant remote control operation in end;
Alternatively, remote control commands are that server is generated, or, remote control commands are set by the first user by control Server is sent to after standby generation, then terminal is transmitted to by server.Control device can run application client Or webpage client.First user can be the owner of terminal.
Alternatively, the remote control operation relevant with searching terminal service includes but is not limited to:Positioning, jingle bell, locked end Hold and erase in data at least one of.
Step 302, according to remote control commands, the target identification position in CONFIG.SYS is set to the first value;
Operation has several CONFIG.SYSs that are stored with operating system, operating system in terminal.Alternatively, several CONFIG.SYS includes:The CONFIG.SYS relevant with searching terminal service.
Such as:Terminal operating has Android (Android) operating system, and android system is stored with system safety CONFIG.SYS, the CONFIG.SYS on application program authority, developer can also increase by one with searching terminal The relevant CONFIG.SYS of service.Or, developer increases existing CONFIG.SYS behind target identification position, multiplexing For the CONFIG.SYS relevant with searching terminal service.
In the CONFIG.SYS relevant with searching terminal service, there is target identification position.Target identification position is present Two values:First value and the second value.When the value of target identification position is the first value, execution user's control is forbidden to refer to Order;When the value of target identification position is the second value, it is allowed to perform user's control instruction.The initial value of target identification position (or acquiescence value) is the second value.
Such as, there is target identification position findmyphone=x, x=0 or 1 in CONFIG.SYS.Work as findmyphone When=1, forbid performing user's control instruction;As findmyphone=0, it is allowed to perform user's control instruction.
Also operation has operation at least one application program, exemplary reference Fig. 4, terminal to have lookup terminal journey in terminal Sequence 421, finder 422, volume adjusting program 423, WiFi management programs 424, data administrator 425, schema management journey Sequence 426 and switching on and shutting down program 427.Wherein, finder 422 is used to realize positioning function;Volume adjusting program 423 is used to realize Heighten volume or turn down the function of volume;WiFi management programs 424 are used to realize the function of being turned on and off Wifi networks;Data Management program 425 is used to realize the function of being turned on and off mobile data network;Schema management program 426, which is used for realization, makes terminal It is operated in the function of at least one preset mode such as silent mode, offline mode, vibration mode, conference model;Switching on and shutting down program 427 are used to realize the function of starting shooting or shut down.
When lookup terminal program 421 receives remote control commands, terminal program 421 is searched by CONFIG.SYS Target identification position findmyphone in 410 is set to the first value 1.
Step 303, the control operation of user is received, the control operation is used for terminal triggering user's control instruction;
During execution remote control operation (and/or in a period of time after execution remote control operation), its Its user may manually operated terminal.Terminal can receive the control operation of user, and trigger user's control according to control operation System instruction.
The control operation of user includes but is not limited to:It is touch operation to touch-screen, the pressing operation to physical button, right The clicking operation of virtual push button, the operation that phonetic order is said to microphone, the operation that prearranged gesture is made to camera, pass through Hardware interface inputs the operation of control instruction.
Step 304, when triggering user's control instruction, whether the value of detection target identification position is the first value;
When other application program in terminal in addition to terminal program 421 is searched receives user's control instruction, detection system Whether the value of the target identification position findmyphone in system configuration file 410 is the first value 1.
When the value of target identification position is the first value, into step 305;When the value of target identification position takes for second During value, into step 306.
Step 305, response user's control instruction is forbidden;
When the value of target identification position is the first value 1, forbid response user's control instruction.
Such as, remote control commands are the instructions for jingle bell, and user's control instruction is the instruction for turning down volume, sound Regulation program is measured when detecting findmyphone=1, forbids turning down volume.
Step 306, it is allowed to respond user's control instruction;
When the value of target identification position is the second value 0, it is allowed to respond user's control instruction;
Such as, remote control commands are the instructions for jingle bell, and user's control instruction is the instruction for turning down volume, sound Regulation program is measured when detecting findmyphone=0, volume is turned down according to user's control instruction.
Step 307, when execution remote control operation is finished, the target identification position in CONFIG.SYS is set to second Value.
When lookup terminal program 421, which performs remote control operation, to be finished, or lookup terminal program 421 calls other journeys When sequence execution remote control operation is finished, terminal program 421 is searched by the target identification position in CONFIG.SYS 410 Findmyphone is set to the second value 0.
It is random or unpredictable, so step 303 because the trigger process of user's control instruction is for terminal Implementation procedure to step 306 also has randomness.The present embodiment does not limit step 303 between step 306 and other steps Priority perform relation, the first implementation procedure instructed to user's control in step 303 to step 306, can with step 302 with And it is separate to the second implementation procedure of remote control commands in step 307.
In summary, the operation that the present embodiment is provided performs method, and the process of remote control operation is being performed by terminal In, forbid response user's control instruction so that the user's control instruction that malicious persons are triggered in terminal will not be performed, no The normal implementation procedure of remote control operation is influenceed, so as to solve correlation technique medium-long range control process easily by malicious persons The problem of disturbed, the rate that runs succeeded of remote control operation is improved.
The operation that the present embodiment is provided performs method, is realized by using the target identification position in CONFIG.SYS Forbid response user's control instruction during performing remote control operation, realize lookup terminal program and other application program Between interprogram communication, and search the decoupling between terminal program and other application program;And due to operating system pair CONFIG.SYS itself provides certain security mechanisms, also cause malicious persons to be difficult to change CONFIG.SYS, from And also assures that the security of the operation execution method of the present embodiment.
Alternatively, with user's control instruction there is corresponding relation in remote control commands.Refer in the presence of at least two remote controls The corresponding user's control instruction of order is entirely different or incomplete same.Schematically, the corresponding relation such as following table one It is shown:
Table one
Therefore in the alternative embodiment based on Fig. 3, the target identification position in CONFIG.SYS is multiple, target identification There is one-to-one relationship between position and the type of remote control commands, such as:Findmyphone1 is to the finger applied to jingle bell Make, findmyphone2 to the instruction applied to locked terminal, findmyphone3 to the instruction applied to data of erasing, Findmyphone4 is to the instruction applied to jingle bell.
So that the first kind is any one type of remote control commands as an example, searches terminal program and receiving the first kind During the remote control commands of type, the value of first object flag corresponding with the remote control commands of the first kind is set to First value.Assuming that user's control instruction corresponding with the remote control commands of the first kind is the instruction of first kind user's control, Then it is used for the application program for performing the instruction of first kind user's control when receiving user's control instruction, detection first object mark Whether the value of position is the first value, subsequently into step 304 or step 305.
In summary, the operation that the present embodiment is provided performs method, can realize using the type of remote control commands as grain The Precise control of degree, so as on the premise of the normal operating to terminal is not influenceed, forbid response to be deposited with remote control commands In the user's control instruction of conflict possibility, the rationalization and hommization of control logic are realized.
Fig. 5 is the block diagram of the operation performs device of the exemplary embodiment offer of the application.The operation performs device Can by software, hardware or both be implemented in combination with as terminal all or part of.The operation performs device can be with Including:
Receiving module 520, the remote control commands sent for the reception server, the remote control commands are used to indicate Perform the remote control operation relevant with searching the terminal;
Performing module 540, for performing the remote control operation according to the remote control commands;
The receiving module 520, is additionally operable to receive the control operation of user, and the control operation is used to touch to the terminal Hair family control instruction.
The performing module 540, is additionally operable to, when not completing the execution of the remote control operation, forbid responding the use Family control instruction.
In an optional embodiment, the performing module includes:Submodule 542, detection sub-module 544 are set and held Row submodule 546;
The setting submodule 542, for according to the remote control commands, by the target identification in CONFIG.SYS Position is set to the first value;
The detection sub-module 544, for when receiving the user's control instruction, detecting the target identification position Whether value is first value;
The implementation sub-module 546, for when the value of target identification position is first value, forbidding response The user's control instruction.
In an optional embodiment, the setting submodule 542 is additionally operable to complete in the execution remote control operation Bi Shi, the second value is set to by the target identification position in the CONFIG.SYS.
The remote control commands include:Instruction for positioning;
The user's control instruction includes:For closing the instruction of global position system GPS, for forbidding accessing wireless guarantor The instruction of true network, instruction, the instruction for carrying out general-purpose serial bus USB debugging, use for forbidding accessing mobile data In at least one of instruction of shutdown.
In an optional embodiment, the remote control commands include:Instruction for locking the terminal;
The user's control instruction includes:For forbidding accessing the instruction of wireless fidelity network, being moved for forbidding accessing The instruction of data, the instruction for carrying out general-purpose serial bus USB debugging, at least one of instruction of shutdown.
In an optional embodiment, the remote control commands include:Instruction for data of erasing;
The user's control instruction includes:Instruction for Backup Data, for reading internal memory or external storage The instruction of device, the instruction for being set to offline mode, for forbid access wireless fidelity network instruction, for forbid access The instruction of mobile data, the instruction for carrying out general-purpose serial bus USB debugging, at least one of instruction of shutdown.
In an optional embodiment, the remote control commands include:Instruction for jingle bell;
The user's control instruction includes:For turning down the instruction of volume, the instruction for being set to silent mode, being used for It is set to the instruction of offline mode, for forbidding accessing the instruction of wireless fidelity network, the finger for forbidding accessing mobile data Make, the instruction for carrying out general-purpose serial bus USB debugging, at least one of instruction of shutdown.
In summary, the operation performs device that the present embodiment is provided, the process of remote control operation is being performed by terminal In, forbid response user's control instruction so that the user's control instruction that malicious persons are triggered in terminal will not be performed, no The normal implementation procedure of remote control operation is influenceed, so as to solve correlation technique medium-long range control process easily by malicious persons The problem of disturbed, the rate that runs succeeded of remote control operation is improved.
It should be noted that:The operation performs device that above-described embodiment is provided is when forbidding response user's control instruction, only With the division progress of above-mentioned each functional module for example, in practical application, can as needed and by above-mentioned functions distribution by Different functional modules is completed, i.e., the internal structure of equipment is divided into different functional modules, described above complete to complete Portion or partial function.In addition, the operation performs device that above-described embodiment is provided performs embodiment of the method with operation and belongs to same Design, it implements process and refers to embodiment of the method, repeats no more here.
Fig. 6 shows the structural representation of the terminal involved by an illustrative embodiment of the invention.The terminal includes:Should Terminal includes:Processor 611, receiver 612, transmitter 613, memory 614 and bus 615.
Processor 611 includes one or more than one processing core, and memory 614 passes through bus 615 and processor 611 Be connected, memory 614 be used for store at least one instruct, processor 611 perform memory 614 in instruction when realize Fig. 2 and The step of execution method being operated in any one of Fig. 3 embodiments.
Receiver 612 and transmitter 613 can be implemented as a communication component, and the communication component can be one piece of communication core Piece, for being modulated and/or demodulating to information, and by reception of wireless signals or sends the information.
In addition, memory 614 can be by any kind of volatibility or non-volatile memory device or combinations thereof Realize, such as static access memory (SRAM), Electrically Erasable Read Only Memory (EEPROM), erasable programmable at any time Read-only storage (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash memory, Disk or CD.
Said structure signal is only that terminal is schematically illustrated, and terminal can include more or less parts, such as Terminal can not include receiver, or, terminal also includes other parts such as sensor, display screen, power supply, and the present embodiment is no longer Repeat.
The embodiment of the present invention also provides a kind of computer-readable medium, is stored thereon with least one instruction, the instruction quilt Processor 611 realizes the step of operating execution method in any one of Fig. 2 and Fig. 3 embodiment when performing.
The embodiments of the present invention are for illustration only, and the quality of embodiment is not represented.
One of ordinary skill in the art will appreciate that realizing that all or part of step of above-described embodiment can be by hardware To complete, the hardware of correlation can also be instructed to complete by program, described program can be stored in a kind of computer-readable In storage medium, storage medium mentioned above can be read-only storage, disk or CD etc..
The foregoing is only presently preferred embodiments of the present invention, be not intended to limit the invention, it is all the present invention spirit and Within principle, any modification, equivalent substitution and improvements made etc. should be included in the scope of the protection.

Claims (10)

1. one kind operation execution method, it is characterised in that methods described includes:
The remote control commands that terminal the reception server is sent, the remote control commands are used to indicate to perform with searching the end The relevant remote control operation in end;
The terminal performs the remote control operation according to the remote control commands;
The terminal receives the control operation of user, and the control operation is used for terminal triggering user's control instruction;
If the terminal does not complete the execution of the remote control operation, the terminal, which forbids responding the user's control, to be referred to Order.
2. according to the method described in claim 1, it is characterised in that if the terminal does not complete holding for the remote control operation OK, then the terminal forbids responding the user's control instruction, including:
According to the remote control commands, the target identification position in CONFIG.SYS is set to the first value;
After the user's control instruction is triggered, whether the value for detecting the target identification position is first value;
When the value of target identification position is first value, forbid responding the user's control instruction.
3. method according to claim 2, it is characterised in that the terminal is according to being performed the remote control commands After remote control operation, in addition to:
When the execution remote control operation is finished, the target identification position in the CONFIG.SYS is set to second Value.
4. according to any described method of claims 1 to 3, it is characterised in that the remote control commands include:For positioning Instruction;
The user's control instruction includes:For closing the instruction of global position system GPS, for forbidding accessing Wireless Fidelity net The instruction of network, for forbidding accessing the instruction of mobile data, the instruction for carrying out general-purpose serial bus USB debugging, for closing At least one of instruction of machine.
5. according to any described method of claims 1 to 3, it is characterised in that the remote control commands include:For locking The instruction of the terminal;
The user's control instruction includes:For forbidding the instruction of access wireless fidelity network, for forbidding accessing mobile data Instruction, the instruction for carrying out general-purpose serial bus USB debugging, at least one of instruction of shutdown.
6. according to any described method of claims 1 to 3, it is characterised in that the remote control commands include:For erasing The instruction of data;
The user's control instruction includes:Instruction for Backup Data, for reading internal memory or external memory storage Instruction, the instruction for being set to offline mode, for forbid access wireless fidelity network instruction, for forbid access move The instruction of data, the instruction for carrying out general-purpose serial bus USB debugging, at least one of instruction of shutdown.
7. according to any described method of claims 1 to 3, it is characterised in that the remote control commands include:For jingle bell Instruction;
The user's control instruction includes:For turning down the instruction of volume, the instruction for being set to silent mode, for setting For the instruction of offline mode, for forbidding accessing the instruction of wireless fidelity network, instruction, use for forbidding accessing mobile data In carry out general-purpose serial bus USB debugging instruction, at least one of instruction of shutdown.
8. one kind operation performs device, it is characterised in that described device includes:
Receiving module, for the reception server send remote control commands, the remote control commands be used for indicate perform with Search the relevant remote control operation of the terminal;
Performing module, for performing the remote control operation according to the remote control commands;
The receiving module, is additionally operable to receive the control operation of user, and the control operation is used to trigger user to the terminal Control instruction;
The performing module, is additionally operable to, when not completing the execution of the remote control operation, forbid responding the user's control Instruction.
9. a kind of computer equipment, it is characterised in that the equipment includes processor and memory, the memory storage have to A few instruction, at least one instruction loaded as the processor and performed with realize such as claim 1 to 7 it is any as described in Operation perform method.
10. a kind of computer-readable recording medium, it is characterised in that be stored with least one instruction in the storage medium, institute State at least one instruction loaded as processor and performed with realize as claim 1 to 7 it is any as described in operation execution method.
CN201710591694.4A 2017-07-19 2017-07-19 Operation execution method and device and terminal Active CN107277804B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710591694.4A CN107277804B (en) 2017-07-19 2017-07-19 Operation execution method and device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710591694.4A CN107277804B (en) 2017-07-19 2017-07-19 Operation execution method and device and terminal

Publications (2)

Publication Number Publication Date
CN107277804A true CN107277804A (en) 2017-10-20
CN107277804B CN107277804B (en) 2020-02-18

Family

ID=60078873

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710591694.4A Active CN107277804B (en) 2017-07-19 2017-07-19 Operation execution method and device and terminal

Country Status (1)

Country Link
CN (1) CN107277804B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150222623A1 (en) * 2005-04-05 2015-08-06 Assa Abloy Ab System and method for remotely assigning and revoking access credentials using a near field communication equipped mobile phone
CN104869243A (en) * 2015-05-08 2015-08-26 上海斐讯数据通信技术有限公司 Mobile phone anti-theft tracking system and method
CN105933317A (en) * 2016-04-08 2016-09-07 上海海漾软件技术有限公司 Mobile terminal remote control method and device
WO2016192511A1 (en) * 2015-06-05 2016-12-08 腾讯科技(深圳)有限公司 Method and apparatus for remotely deleting information
CN106878548A (en) * 2017-01-13 2017-06-20 北京奇虎科技有限公司 Mobile terminal remote control method, device and mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150222623A1 (en) * 2005-04-05 2015-08-06 Assa Abloy Ab System and method for remotely assigning and revoking access credentials using a near field communication equipped mobile phone
CN104869243A (en) * 2015-05-08 2015-08-26 上海斐讯数据通信技术有限公司 Mobile phone anti-theft tracking system and method
WO2016192511A1 (en) * 2015-06-05 2016-12-08 腾讯科技(深圳)有限公司 Method and apparatus for remotely deleting information
CN105933317A (en) * 2016-04-08 2016-09-07 上海海漾软件技术有限公司 Mobile terminal remote control method and device
CN106878548A (en) * 2017-01-13 2017-06-20 北京奇虎科技有限公司 Mobile terminal remote control method, device and mobile terminal

Also Published As

Publication number Publication date
CN107277804B (en) 2020-02-18

Similar Documents

Publication Publication Date Title
CN104933351B (en) The treating method and apparatus of information security
US10129756B2 (en) Proactive security for mobile devices
CN106778175B (en) Interface locking method and device and terminal equipment
CN104915582B (en) unlocking method and device
CN112600977A (en) Method and terminal for quickly opening application or application function
CN113158198B (en) Access control method, device, terminal equipment and storage medium
JP7204680B2 (en) METHOD, APPARATUS, PROGRAM, AND STORAGE MEDIUM FOR CONTROLLING DOOR GUARD
CN109145560A (en) The method and device of accessing monitoring equipment
CN106254467A (en) Sharing files method and device
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN108475304B (en) Method and device for associating application program and biological characteristics and mobile terminal
CN105847243A (en) Method and device for accessing smart camera
CN104967593A (en) Identity verification method, apparatus and system
WO2016011739A1 (en) Method, device, and system for anti-counterfeiting verification
EP3447666A1 (en) Processing fingerprint information
CN106102061A (en) Method for connecting network and device
CN106446653A (en) Application authority management method and device and electronic equipment
CN105430639B (en) Information processing method and device
CN114756849B (en) Method and device for verifying personal identification number PIN code
CN105069344B (en) mobile terminal locking method and device
CN106789070A (en) The decryption method of data, device and terminal
CN106529236A (en) Unlocking method, apparatus and system
CN107071008B (en) Terminal equipment positioning method, device and equipment
CN108280375A (en) A kind of mobile terminal that can prevent illegal brush machine
CN106375997A (en) Terminal control device, method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: Guangdong Opel Mobile Communications Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant