CN107277804B - Operation execution method and device and terminal - Google Patents

Operation execution method and device and terminal Download PDF

Info

Publication number
CN107277804B
CN107277804B CN201710591694.4A CN201710591694A CN107277804B CN 107277804 B CN107277804 B CN 107277804B CN 201710591694 A CN201710591694 A CN 201710591694A CN 107277804 B CN107277804 B CN 107277804B
Authority
CN
China
Prior art keywords
instruction
remote control
terminal
control instruction
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710591694.4A
Other languages
Chinese (zh)
Other versions
CN107277804A (en
Inventor
朱忠磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710591694.4A priority Critical patent/CN107277804B/en
Publication of CN107277804A publication Critical patent/CN107277804A/en
Application granted granted Critical
Publication of CN107277804B publication Critical patent/CN107277804B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • H04W8/245Transfer of terminal data from a network towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Abstract

The application discloses an operation execution method, an operation execution device and a terminal, and belongs to the field of mobile terminals. The method comprises the following steps: the method comprises the steps that a terminal receives a remote control instruction sent by a server, wherein the remote control instruction is used for instructing to execute remote control operation related to searching the terminal; the terminal executes the remote control operation according to the remote control instruction; the terminal receives a control operation of a user, the control operation is used for triggering a user control instruction to the terminal, and if the terminal does not finish the execution of the remote control operation, the terminal prohibits responding to the user control instruction. According to the method and the device, the response of the user control command triggered by the malicious person is forbidden, and the normal execution process of the remote control operation is not influenced, so that the problem that the remote control process is easily interfered by the malicious person in the related technology is solved, and the execution success rate of the remote control operation is improved.

Description

Operation execution method and device and terminal
Technical Field
The embodiment of the invention relates to the field of mobile terminals, in particular to an operation execution method, an operation execution device and a terminal.
Background
Smartphones have been used by an increasing number of users. The smart phone may access a mobile communication network by inserting a Subscriber Identity Module (SIM) and transmit and receive a Short Message Service (SMS).
When a user uses the smart phone, the smart phone is easy to lose or be stolen. In the related art, a user may activate a remote control function (also referred to as a search mobile phone program) in a smart phone by using a user account. When the smart phone is lost or stolen, a user can use a computer to send a remote control instruction to a manufacturer server of the smart phone, wherein the remote control instruction carries a user account, a terminal identifier and a control code; when the smart phone receives the remote control instruction, verifying whether the user account is matched with a locally stored user account and whether the terminal identification is matched with a locally stored terminal identification; and if the two are matched, executing the control instruction corresponding to the control code. Wherein, the control instruction may include: an instruction to lock the handset, an instruction to erase data, or an instruction to ring.
In some scenarios, however, the remote control process may be interrupted by malicious personnel. For example, after receiving an instruction for ringing, the smart phone plays a preset audio signal, but at this time, the thief turns the volume of the smart phone down to zero or shuts down the smart phone, which results in abnormal ringing.
Disclosure of Invention
In order to solve the problem that a remote control process is easily interfered by malicious persons, the embodiment of the invention provides an operation execution method, device and system. The technical scheme is as follows:
in a first aspect, an operation execution method is provided, and the method includes:
the method comprises the steps that a terminal receives a remote control instruction sent by a server, wherein the remote control instruction is used for instructing to execute remote control operation related to searching the terminal;
the terminal executes the remote control operation according to the remote control instruction;
the terminal receives a control operation of a user, wherein the control operation is used for triggering a user control instruction to the terminal;
and if the terminal does not finish the execution of the remote control operation, the terminal forbids to respond to the user control instruction.
In an optional embodiment, if the terminal does not complete the execution of the remote control operation, the prohibiting, by the terminal, the response to the user control instruction includes:
setting a target identification bit in a system configuration file as a first value according to the remote control instruction;
after the user control instruction is triggered, detecting whether the value of the target identification bit is the first value or not;
and when the value of the target identification bit is the first value, forbidding to execute the target control operation corresponding to the user control instruction.
In an optional embodiment, after the terminal performs the remote control operation according to the remote control instruction, the method further includes:
and when the remote control operation is executed, setting the target identification bit in the system configuration file as a second value.
In an alternative embodiment, the remote control instruction comprises: instructions for locating;
the user control instructions include: at least one of an instruction to turn off a Global Positioning System (GPS), an instruction to disable access to a wireless fidelity network, an instruction to disable access to mobile data, an instruction to perform Universal Serial Bus (USB) debugging, and an instruction to shut down.
In an alternative embodiment, the remote control instruction comprises: instructions for locking the terminal;
the user control instructions include: at least one of an instruction for prohibiting access to the wireless fidelity network, an instruction for prohibiting access to the mobile data, an instruction for performing Universal Serial Bus (USB) debugging, and an instruction for shutting down.
In an alternative embodiment, the remote control instruction comprises: instructions for erasing data;
the user control instructions include: at least one of an instruction to backup data, an instruction to read an internal memory or an external memory, an instruction to set to an airplane mode, an instruction to disable access to a wireless fidelity network, an instruction to disable access to mobile data, an instruction to perform Universal Serial Bus (USB) debugging, and an instruction to shut down.
In an alternative embodiment, the remote control instruction comprises: instructions for ringing;
the user control instructions include: at least one of an instruction to turn down the volume, an instruction to set to a mute mode, an instruction to set to an airplane mode, an instruction to disable access to the wireless fidelity network, an instruction to disable access to movement data, an instruction to perform a Universal Serial Bus (USB) debug, and an instruction to shut down.
In a second aspect, an operation execution method is provided, the method comprising:
the terminal receives a remote control instruction from a server, wherein the remote control instruction is used for indicating the terminal to be switched to a loss state;
the terminal is switched to the lost state according to the remote control instruction;
the terminal receives control operation of a user and analyzes the control operation to obtain a user control instruction;
and if the terminal is in the lost state, the terminal refuses to respond to the user control instruction.
In an optional embodiment, the switching, by the terminal, to the lost state according to the remote control instruction includes:
the terminal sets a target identification bit in a system configuration file as a first value according to the remote control instruction, wherein the first value is used for indicating that the terminal is in a lost state;
if the terminal is in a lost state, the terminal refuses to respond to the user control instruction, and the method comprises the following steps:
the terminal acquires the value of the target identification bit after triggering the user control instruction;
and if the value of the target identification bit is the first value, the terminal refuses to respond to the user control instruction.
In an optional embodiment, after the performing the remote control operation according to the remote control instruction, the method further includes:
and after a preset time, setting the target identification bit as a second value, wherein the second value is used for indicating that the terminal is in a non-lost state.
In an alternative embodiment, the remote control instruction is further used to instruct locking of the terminal;
the method further comprises the following steps: the terminal locks the terminal according to the remote control instruction;
and/or the presence of a gas in the gas,
the remote control instruction is also used for indicating to erase data on the terminal;
the method further comprises the following steps: and the terminal erases the data on the terminal according to the remote control instruction.
And/or the presence of a gas in the gas,
the remote control instruction is also used for indicating the terminal to ring;
the method further comprises the following steps: and the terminal rings according to the indication of the remote control instruction.
In an optional embodiment, the receiving, by the terminal, a control operation of a user, and analyzing the control operation to obtain a user control instruction includes:
the touch operation is received by a touch screen of the terminal, and the touch operation is analyzed to obtain a touch instruction;
and/or receiving a pressing operation by a key of the terminal, and analyzing the pressing operation to obtain a touch instruction;
and/or the terminal receives the voice input of the user and analyzes the voice input to obtain a voice command.
In an alternative embodiment, the user control instructions are for:
instructing the terminal to turn off a Global Positioning System (GPS);
and/or, instructing the terminal to close the wireless fidelity network;
and/or, instructing the terminal to close the access of the mobile data;
and/or, indicating the terminal to carry out Universal Serial Bus (USB) debugging;
and/or indicating the terminal to be powered off.
In a third aspect, an operation execution apparatus is provided, the apparatus including:
the receiving module is used for receiving a remote control instruction sent by a server, and the remote control instruction is used for instructing to execute remote control operation related to searching the terminal;
the execution module is used for executing the remote control operation according to the remote control instruction;
the receiving module is further configured to receive a control operation of a user, where the control operation is used to trigger a user control instruction to the terminal;
the execution module is further configured to prohibit a response to the user control instruction when the execution of the remote control operation is not completed.
In an optional embodiment, the execution module includes a setting submodule, a detection submodule, and an execution submodule, where the setting submodule is configured to set a target identification bit in a system configuration file to a first value according to the remote control instruction; the detection submodule is used for detecting whether the value of the target identification bit is the first value or not after the user control instruction is triggered; and when the value of the target identification bit is the first value, forbidding to respond to the user control instruction.
In an optional embodiment, the execution module is configured to set the target identifier in the system configuration file to a second value when the execution of the remote control operation is completed.
In an alternative embodiment, the remote control instruction comprises: instructions for locating;
the user control instructions include: at least one of an instruction to turn off a Global Positioning System (GPS), an instruction to disable access to a wireless fidelity network, an instruction to disable access to mobile data, an instruction to perform Universal Serial Bus (USB) debugging, and an instruction to shut down.
In an alternative embodiment, the remote control instruction comprises: instructions for locking the terminal;
the user control instructions include: at least one of an instruction for prohibiting access to the wireless fidelity network, an instruction for prohibiting access to the mobile data, an instruction for performing Universal Serial Bus (USB) debugging, and an instruction for shutting down.
In an alternative embodiment, the remote control instruction comprises: instructions for erasing data;
the user control instructions include: at least one of an instruction to backup data, an instruction to read an internal memory or an external memory, an instruction to set to an airplane mode, an instruction to disable access to a wireless fidelity network, an instruction to disable access to mobile data, an instruction to perform Universal Serial Bus (USB) debugging, and an instruction to shut down.
In an alternative embodiment, the remote control instruction comprises: instructions for ringing;
the user control instructions include: at least one of an instruction to turn down the volume, an instruction to set to a mute mode, an instruction to set to an airplane mode, an instruction to disable access to the wireless fidelity network, an instruction to disable access to movement data, an instruction to perform a Universal Serial Bus (USB) debug, and an instruction to shut down.
In a fourth aspect, there is provided an operation execution apparatus, the apparatus including:
a receiving module, configured to receive a remote control instruction from a server, where the remote control instruction is used to instruct the apparatus to switch to a lost state;
the switching module is used for switching to the lost state according to the remote control instruction;
the receiving module is used for receiving the control operation of the user and analyzing the control operation to obtain a user control instruction;
and the execution module is used for refusing to respond to the user control instruction when the mobile terminal is in the lost state.
In an optional embodiment, the execution module includes: the device comprises a setting submodule, an obtaining submodule and an executing submodule, wherein the setting submodule is used for setting a target identification bit in a system configuration file as a first value according to the remote control instruction, and the first value is used for indicating that the device is in a lost state; the obtaining submodule is used for obtaining the value of the target identification bit after the user control instruction is triggered; and the execution submodule is used for refusing to respond to the user control instruction when the value of the target identification bit is the first value.
In an optional embodiment, the setting sub-module is further configured to set the target identification bit to a second value after a preset time elapses, where the second value is used to indicate that the apparatus is in a non-loss state.
In an alternative embodiment, the remote control instruction is further for instructing locking of the device;
the execution module is further configured to lock the device according to the remote control instruction;
and/or the presence of a gas in the gas,
the remote control instructions are also used for indicating to erase data on the device;
the execution module is further used for erasing data on the device according to the remote control instruction.
And/or the presence of a gas in the gas,
the remote control instruction is further to instruct the device to ring;
the execution module is further used for ringing according to the indication of the remote control instruction.
In an optional embodiment, the receiving module is configured to receive a touch operation on a touch screen of the apparatus, and analyze the touch operation to obtain a touch instruction;
and/or the receiving module is used for receiving a pressing operation at a key of the device and analyzing the pressing operation to obtain a touch instruction;
and/or the receiving module is used for receiving the voice input of the user at the device and analyzing the voice input to obtain a voice instruction.
In an alternative embodiment, the user control instructions are for:
instructing the device to turn off a Global Positioning System (GPS);
and/or, instructing the device to shut down a wireless fidelity network;
and/or, instructing the device to close access to the mobile data;
and/or, instructing the device to perform Universal Serial Bus (USB) debugging;
and/or, instructing the apparatus to shut down.
In a fifth aspect, a terminal is provided, where the terminal includes a processor and a memory, and the memory stores at least one instruction, where the at least one instruction is loaded and executed by the processor to implement the operation execution method according to the first aspect and any one of the optional implementations of the first aspect, or the operation execution method according to the second aspect and any one of the optional implementations of the second aspect.
A sixth aspect provides a computer-readable storage medium having stored therein at least one instruction which is loaded and executed by a processor to implement the operation execution method as described in the first aspect and any one of the optional implementations of the first aspect, or the operation execution method as described in the second aspect and any one of the optional implementations of the second aspect.
The technical scheme provided by the embodiment of the invention has the following beneficial effects:
the response of the user control instruction is forbidden in the process of executing the remote control operation by the terminal, so that the user control instruction triggered by malicious personnel on the terminal cannot be responded, the normal execution process of the remote control operation is not influenced, the problem that the remote control process is easily interfered by the malicious personnel in the related technology is solved, and the execution success rate of the remote control operation is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a search terminal system according to an exemplary embodiment of the present application;
FIG. 2 is a flowchart of an operation execution method provided by an exemplary embodiment of the present application;
FIG. 3 is a flowchart of an operation execution method provided by another exemplary embodiment of the present application;
fig. 4 is a schematic diagram of an internal structure of a terminal according to an exemplary embodiment of the present application;
FIG. 5 is a block diagram of an operation execution apparatus provided in an exemplary embodiment of the present application;
fig. 6 is a block diagram of a terminal provided in an exemplary embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
The find terminal service is a remote control service used when the terminal cannot be found. When the user cannot find the terminal at home or the terminal is lost, the terminal is remotely controlled by at least one of positioning, ringing, locking or erasing data through the terminal searching service. When the terminal is a mobile phone, the method can be called to search mobile phone service; when the terminal is a tablet, it may be referred to as a screeding screed service. The search terminal service may have different names according to different types of terminals, which is not limited in this embodiment.
Fig. 1 is a schematic structural diagram of a search terminal system according to an exemplary embodiment of the present application. The system comprises: a terminal 120 and a server 140.
The terminal 120 may be a mobile phone, a tablet computer, a wearable electronic device, an e-book reader, an MP3(Moving Picture Experts Group Audio Layer III) player, an MP4(Moving Picture Experts Group Audio Layer IV) player, a laptop computer, or the like.
Optionally, a Positioning module is disposed in the terminal 120, and the Positioning module may be at least one of an iBeacon (iBeacon) Positioning module, a GPS (Global Positioning System) Positioning module, a WIFI (Wireless Fidelity) network Positioning module, and a base station Positioning module. The terminal 120 has the capability of locating its own geographical location, so as to implement the locating function in checking and receiving the terminal service. The terminal 120 further has a speaker, and the terminal 120 has a ringing capability according to the remote control instruction, so as to realize a ringing function in checking the terminal service. Optionally, an application for implementing the search for terminal services is installed in the terminal 120.
Alternatively, the terminal 120 is connected to and communicates with the server 140 through a wired network or a wireless network. On one hand, the server 140 and the terminal 120 may communicate with each other through a short message channel, where the short message channel is a channel for receiving and sending data through a short message service of a mobile phone number on the terminal 120, and is usually implemented by a circuit switching Domain (CS) in a mobile communication network; on the other hand, the server 140 and the terminal 120 may communicate with each other through a data channel, where the data channel is implemented by a Packet Switching Domain (PS) or a Wireless Fidelity (WiFi) network in the mobile communication network.
The server 140 is a background server for searching for a terminal service, and the server 140 may be a server, a server cluster formed by a plurality of servers, or a cloud computing center. Optionally, the server 140 sends the remote control instruction to the terminal 120 through a data channel, or the server 140 sends the remote control instruction to the terminal 120 through a short message channel. At this time, the server 140 has a function of directly transmitting and/or receiving a short message, or the server 140 has a function of transmitting and/or receiving a short message through a short message platform provided by a mobile operator.
Alternatively, the remote control command is generated by the server 140 itself, or the remote control command may be generated by the user through the control device and sent to the server 140. For example, the user logs in to the server 140 through a web page on the control device, and sends a remote control command to the server 140 through the web page, and the server 140 forwards the remote control command to the terminal 120.
Fig. 2 is a flowchart of an operation execution method provided by an exemplary embodiment of the present application. The present embodiment is exemplified by applying the operation execution method to the terminal 120. The method comprises the following steps:
step 201, receiving a remote control instruction sent by a server, wherein the remote control instruction is used for instructing to execute remote control operation related to searching for terminal service;
optionally, the remote control instruction is generated by the server, or the remote control instruction is generated by the user through the control device, sent to the server, and then forwarded to the terminal by the server. The control device may be run with an application client or a web client.
Optionally, remote control operations related to the lookup terminal service include, but are not limited to: at least one of a positioning operation, a ringing operation, a dead-end operation, and an erase data operation. The "data" in this embodiment may be user data, that is, at least one of account number, password, recording, photograph, movie, and program usage record generated by the user.
Step 202, executing remote control operation according to the remote control instruction;
when the remote control instruction comprises an instruction for positioning, the terminal executes positioning operation;
when the remote control instruction comprises an instruction for ringing, the terminal executes ringing operation;
when the remote control instruction comprises an instruction for locking the terminal, the terminal executes terminal locking operation;
when the remote control command includes a command for erasing data, the terminal performs an operation of erasing user data.
Step 203, receiving a control operation of a user, wherein the control operation is used for triggering a user control instruction to a terminal;
in the course of performing the remote control operation, other users may manually operate the terminal. The terminal receives the control operation of the user and triggers a user control instruction according to the control operation.
Optionally, the remote control instruction is a control instruction issued by the first user to the terminal through the server. The user control instruction is a control instruction triggered by a second user through a terminal body, and the terminal body is provided with at least one I/O component. That is, the user control instruction is a control instruction triggered by the second user through an I/O component built in the body of the terminal. Typically, the user control command is triggered by the second user within a close distance from the terminal, not a control command triggered remotely by the second user via another control device.
The second user-triggered control operation includes, but is not limited to: the touch operation of the touch screen, the pressing operation of the physical button, the clicking operation of the virtual button, the operation of speaking a voice command to the microphone, the operation of making a preset gesture to the camera and the operation of inputting a control command through the hardware interface.
The first user and the second user may be the same user, that is, both the owner of the terminal; the first user and the second user may not be the same user, that is, the first user is the holder of the terminal, and the second user is a malicious person.
Optionally, the I/O components built in the terminal include but are not limited to: at least one of a touch screen, a physical button, a virtual button, a microphone, a camera, and a hardware interface. The hardware interface may be a USB interface. In this embodiment, the I/O component does not include a network interface.
And step 204, if the terminal does not finish the execution of the remote control operation, the terminal forbids to respond the user control instruction.
Since the user control command is a control command triggered on the terminal by the second user (most likely a malicious person) when the first user cannot find the terminal. For this reason, when the terminal does not complete execution of the remote control operation, response to the user control instruction is prohibited.
In summary, in the operation execution method provided in this embodiment, the terminal prohibits response of the user control instruction during execution of the remote control operation, so that the user control instruction triggered by a malicious person on the terminal is not executed, and a normal execution process of the remote control operation is not affected, thereby solving a problem that the remote control process is easily interfered by the malicious person in the related art, and improving an execution success rate of the remote control operation.
Fig. 3 is a flowchart of an operation execution method provided by another exemplary embodiment of the present application. The present embodiment is exemplified by applying the operation execution method to the terminal 120. The method comprises the following steps:
step 301, receiving a remote control instruction sent by a server, wherein the remote control instruction is used for instructing to execute remote control operation related to a search terminal;
optionally, the remote control instruction is generated by the server, or the remote control instruction is generated by the first user through the control device, sent to the server, and forwarded to the terminal by the server. The control device may be run with an application client or a web client. The first user may be the owner of the terminal.
Optionally, remote control operations related to the lookup terminal service include, but are not limited to: at least one of locating, ringing, locking the terminal, and erasing the data.
Step 302, setting a target identification bit in a system configuration file as a first value according to a remote control instruction;
an operating system runs in the terminal, and a plurality of system configuration files are stored in the operating system. Optionally, the system configuration files include: system profiles related to finding terminal services.
Such as: the terminal runs an Android operating system, the Android system stores a system configuration file related to system safety and a system configuration file related to application program permission, and a developer can also add a system configuration file related to terminal service searching. Or, after adding a target identification bit to the existing system configuration file, the developer multiplexes the system configuration file into a system configuration file related to the search terminal service.
In the system configuration file associated with the lookup terminal service, there is a target identification bit. The target identification bit has two values: a first value and a second value. When the value of the target identification bit is a first value, forbidding execution of a user control instruction; and when the value of the target identification bit is the second value, allowing the user control instruction to be executed. The initial value (or default value) of the target identification bit is the second value.
For example, the target identification bit findmyphone ═ x, x ═ 0, or 1 exists in the system configuration file. When findmyphone is 1, forbidding executing the user control instruction; when findmyphone is 0, execution of the user control instruction is allowed.
At least one application program is also running in the terminal, illustratively referring to fig. 4, a look-up terminal program 421, a positioning program 422, a volume adjustment program 423, a WiFi management program 424, a data management program 425, a mode management program 426, and a power on/off program 427 are running in the terminal. Wherein, the positioning program 422 is used for implementing the positioning function; the volume adjustment program 423 is used to implement a volume up or volume down function; the WiFi management program 424 is used to implement the function of turning on or off the WiFi network; the data manager 425 is used to implement the function of turning on or off the mobile data network; the mode management program 426 is configured to implement a function of operating the terminal in at least one preset mode, such as a silent mode, an airplane mode, a vibration mode, and a conference mode; the power-on/off program 427 is used to implement power-on or power-off functions.
When the terminal program 421 receives the remote control command, the terminal program 421 sets the target identification bit findmyphone in the system configuration file 410 to the first value 1.
Step 303, receiving a control operation of a user, wherein the control operation is used for triggering a user control instruction to a terminal;
other users may manually operate the terminal during (and/or for a period of time after) the remote control operation is performed. The terminal receives the control operation of the user and triggers a user control instruction according to the control operation.
User control operations include, but are not limited to: the method comprises the following steps of touch operation on a touch screen, pressing operation on a physical button, clicking operation on a virtual button, speaking a voice command into a microphone, making a preset gesture on a camera, and inputting a control command through a hardware interface.
Step 304, detecting whether the value of the target identification bit is a first value or not when a user control instruction is triggered;
when other application programs except the terminal program 421 in the terminal receive the user control command, it is detected whether the value of the target identification bit findmyphone in the system configuration file 410 is the first value 1.
When the value of the target identification bit is the first value, the step 305 is entered; and when the value of the target identification bit is the second value, entering step 306.
Step 305, forbidding responding to the user control instruction;
and when the value of the target identification bit is the first value 1, forbidding to respond to the user control instruction.
For example, the remote control command is a command for ringing, the user control command is a command for turning down the volume, and the volume adjustment program prohibits turning down the volume when findmyphone ═ 1 is detected.
Step 306, allowing to respond to the user control instruction;
when the value of the target identification bit is a second value 0, allowing to respond to a user control instruction;
for example, the remote control command is a command for ringing, the user control command is a command for turning down the volume, and the volume adjustment program turns down the volume according to the user control command when findmyphone is detected to be 0.
And 307, setting the target identification bit in the system configuration file as a second value when the remote control operation is finished.
When the remote control operation performed by the terminal program 421 is completed, or when the remote control operation performed by another program is completed by calling the terminal program 421, the terminal program 421 sets the target identification bit findmyphone in the system configuration file 410 to the second value 0.
Since the triggering process of the user control command is random or unpredictable for the terminal, the execution process of steps 303 to 306 is also random. In this embodiment, the sequential execution relationship between steps 303 to 306 and other steps is not limited, and the first execution process of the user control instruction in steps 303 to 306 may be independent from the second execution process of the remote control instruction in steps 302 and 307.
In summary, in the operation execution method provided in this embodiment, the terminal prohibits response of the user control instruction during execution of the remote control operation, so that the user control instruction triggered by a malicious person on the terminal is not executed, and a normal execution process of the remote control operation is not affected, thereby solving a problem that the remote control process is easily interfered by the malicious person in the related art, and improving an execution success rate of the remote control operation.
In the operation execution method provided by this embodiment, the target identification bits in the system configuration file are used to prohibit response to the user control instruction in the process of executing the remote control operation, so that inter-program communication between the search terminal program and other application programs and decoupling between the search terminal program and other application programs are realized; moreover, because the operating system provides a certain security mechanism for the system configuration file, malicious personnel can hardly modify the system configuration file, and thus the security of the operation execution method of the embodiment is also ensured.
Optionally, the remote control instruction and the user control instruction have a corresponding relationship. There are at least two remote control commands for which the corresponding user control commands are completely different or not completely identical. Illustratively, the correspondence is shown in the following table one:
watch 1
Figure BDA0001354898890000131
Therefore, in an alternative embodiment based on fig. 3, there are a plurality of target identification bits in the system configuration file, and there is a one-to-one correspondence between the target identification bits and the types of the remote control commands, such as: findmyphone1 corresponds to an instruction for ringing, findmyphone2 corresponds to an instruction for locking the terminal, findmyphone3 corresponds to an instruction for erasing data, and findmyphone4 corresponds to an instruction for ringing.
Taking the first type as any one type of the remote control instruction as an example, when the search terminal program receives the remote control instruction of the first type, the value of the first target identification bit corresponding to the remote control instruction of the first type is set as the first value. Assuming that the user control instruction corresponding to the first type of remote control instruction is a first type of user control instruction, when receiving the user control instruction, the application program for executing the first type of user control instruction detects whether the value of the first target identification bit is the first value, and then proceeds to step 304 or step 305.
In summary, the operation execution method provided in this embodiment can implement fine control using the type of the remote control instruction as the granularity, so as to prohibit a response to a user control instruction having a possibility of collision with the remote control instruction on the premise of not affecting the normal operation of the terminal, thereby implementing rationalization and humanization of the control logic.
Fig. 5 is a block diagram of an operation execution apparatus provided in an exemplary embodiment of the present application. The operation execution means may be implemented as all or a part of the terminal by software, hardware, or a combination of both. The operation performing means may include:
a receiving module 520, configured to receive a remote control instruction sent by a server, where the remote control instruction is used to instruct to perform a remote control operation related to searching for the terminal;
an executing module 540, configured to execute the remote control operation according to the remote control instruction;
the receiving module 520 is further configured to receive a control operation of a user, where the control operation is used to trigger a user control instruction to the terminal.
The executing module 540 is further configured to prohibit a response to the user control instruction when the execution of the remote control operation is not completed.
In an alternative embodiment, the execution module includes: a setting submodule 542, a detection submodule 544 and an execution submodule 546;
the setting submodule 542 is configured to set a target identification bit in a system configuration file to a first value according to the remote control instruction;
the detection submodule 544 is configured to detect whether a value of the target identifier is the first value when the user control instruction is received;
the execution sub-module 546, configured to prohibit a response to the user control instruction when the value of the target identification bit is the first value.
In an optional embodiment, the setting sub-module 542 is further configured to set the target identification bit in the system configuration file to a second value when the remote control operation is completed.
The remote control instruction comprises: instructions for locating;
the user control instructions include: at least one of an instruction to turn off a Global Positioning System (GPS), an instruction to disable access to a wireless fidelity network, an instruction to disable access to mobile data, an instruction to perform Universal Serial Bus (USB) debugging, and an instruction to shut down.
In an alternative embodiment, the remote control instruction comprises: instructions for locking the terminal;
the user control instructions include: at least one of an instruction for prohibiting access to the wireless fidelity network, an instruction for prohibiting access to the mobile data, an instruction for performing Universal Serial Bus (USB) debugging, and an instruction for shutting down.
In an alternative embodiment, the remote control instruction comprises: instructions for erasing data;
the user control instructions include: at least one of an instruction to backup data, an instruction to read an internal memory or an external memory, an instruction to set to an airplane mode, an instruction to disable access to a wireless fidelity network, an instruction to disable access to mobile data, an instruction to perform Universal Serial Bus (USB) debugging, and an instruction to shut down.
In an alternative embodiment, the remote control instruction comprises: instructions for ringing;
the user control instructions include: at least one of an instruction to turn down the volume, an instruction to set to a mute mode, an instruction to set to an airplane mode, an instruction to disable access to the wireless fidelity network, an instruction to disable access to movement data, an instruction to perform a Universal Serial Bus (USB) debug, and an instruction to shut down.
In summary, in the operation execution device provided in this embodiment, the terminal prohibits the response of the user control instruction during the execution of the remote control operation, so that the user control instruction triggered by a malicious person on the terminal is not executed, and the normal execution process of the remote control operation is not affected, thereby solving the problem that the remote control process is easily interfered by the malicious person in the related art, and improving the execution success rate of the remote control operation.
It should be noted that: the operation executing apparatus provided in the above embodiment is only illustrated by dividing the functional modules when the operation executing apparatus is prohibited from responding to the user control instruction, and in practical applications, the function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to complete all or part of the functions described above. In addition, the operation execution device and the operation execution method provided by the above embodiments belong to the same concept, and specific implementation processes thereof are detailed in the method embodiments and are not described herein again.
Fig. 6 is a diagram illustrating a structure of a terminal according to an exemplary embodiment of the present invention. The terminal includes: the terminal includes: a processor 611, a receiver 612, a transmitter 613, a memory 614, and a bus 615.
The processor 611 includes one or more processing cores, the memory 614 is connected to the processor 611 through the bus 615, the memory 614 is used for storing at least one instruction, and the processor 611 executes the instruction in the memory 614 to realize the steps of the operation execution method in any one of the method embodiments in fig. 2 and fig. 3.
The receiver 612 and the transmitter 613 may be implemented as one communication component, which may be a communication chip for modulating and/or demodulating information and receiving or transmitting the information via a wireless signal.
Further, the memory 614 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The above structural illustration is only an illustrative illustration of the terminal, and the terminal may include more or fewer components, for example, the terminal may not include a receiver, or the terminal further includes other components such as a sensor, a display screen, and a power supply, and details are not described in this embodiment.
Embodiments of the present invention also provide a computer-readable medium having at least one instruction stored thereon, where the instruction, when executed by the processor 611, implements the steps of the operation-performing method in any of the method embodiments of fig. 2 and 3.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (8)

1. An operation execution method, characterized in that the method comprises:
the method comprises the steps that a terminal receives a remote control instruction sent by a server, wherein the remote control instruction is used for instructing to execute remote control operation related to searching the terminal;
the terminal executes the remote control operation according to the remote control instruction;
the terminal receives a control operation executed by a user through an I/O assembly built in a machine body of the terminal, wherein the control operation is used for triggering a user control instruction to the terminal; the I/O component comprises at least one of a touch screen, a physical button, a virtual button, a microphone, a camera and a hardware interface; the user control instruction is an instruction which has a corresponding relation with the remote control instruction;
if the terminal does not finish the execution of the remote control operation, the terminal forbids to respond to the user control instruction;
wherein, if the terminal does not finish the execution of the remote control operation, the terminal forbids to respond to the user control instruction, including:
setting a target identification bit in a system configuration file as a first value according to the remote control instruction;
after the user control instruction is triggered, detecting whether the value of the target identification bit is the first value or not;
when the value of the target identification bit is the first value, forbidding to respond to the user control instruction;
and when the remote control operation is executed, setting the target identification bit in the system configuration file as a second value.
2. The method of claim 1, wherein the remote control instruction comprises: instructions for locating;
the user control instructions include: at least one of an instruction to turn off a Global Positioning System (GPS), an instruction to disable access to a wireless fidelity network, an instruction to disable access to mobile data, an instruction to perform Universal Serial Bus (USB) debugging, and an instruction to shut down.
3. The method of claim 1, wherein the remote control instruction comprises: instructions for locking the terminal;
the user control instructions include: at least one of an instruction for prohibiting access to the wireless fidelity network, an instruction for prohibiting access to the mobile data, an instruction for performing Universal Serial Bus (USB) debugging, and an instruction for shutting down.
4. The method of claim 1, wherein the remote control instruction comprises: instructions for erasing data;
the user control instructions include: at least one of an instruction to backup data, an instruction to read an internal memory or an external memory, an instruction to set to an airplane mode, an instruction to disable access to a wireless fidelity network, an instruction to disable access to mobile data, an instruction to perform Universal Serial Bus (USB) debugging, and an instruction to shut down.
5. The method of claim 1, wherein the remote control instruction comprises: instructions for ringing;
the user control instructions include: at least one of an instruction to turn down the volume, an instruction to set to a mute mode, an instruction to set to an airplane mode, an instruction to disable access to the wireless fidelity network, an instruction to disable access to movement data, an instruction to perform a Universal Serial Bus (USB) debug, and an instruction to shut down.
6. An operation execution apparatus, characterized in that the apparatus comprises:
the receiving module is used for receiving a remote control instruction sent by a server, and the remote control instruction is used for instructing to execute remote control operation related to searching the terminal;
the execution module is used for executing the remote control operation according to the remote control instruction;
the receiving module is further configured to receive a control operation executed by a user through an I/O component built in a body of the terminal, where the control operation is used to trigger a user control instruction to the terminal; the I/O component comprises at least one of a touch screen, a physical button, a virtual button, a microphone, a camera and a hardware interface; the user control instruction is an instruction which has a corresponding relation with the remote control instruction;
the execution module is further configured to prohibit a response to the user control instruction when the execution of the remote control operation is not completed;
the execution module comprises: setting a submodule, a detection submodule and an execution submodule;
the setting submodule is used for setting a target identification bit in a system configuration file as a first value according to the remote control instruction;
the detection submodule is used for detecting whether the value of the target identification bit is the first value or not when the user control instruction is received;
the execution submodule is used for forbidding to respond to the user control instruction when the value of the target identification bit is the first value;
the setting submodule is further configured to set the target identification bit in the system configuration file to a second value when the execution of the remote control operation is completed.
7. A computer device comprising a processor and a memory, the memory storing at least one instruction that is loaded and executed by the processor to perform an operation execution method according to any one of claims 1 to 5.
8. A computer-readable storage medium having stored therein at least one instruction, which is loaded and executed by a processor to perform an operation execution method according to any one of claims 1 to 5.
CN201710591694.4A 2017-07-19 2017-07-19 Operation execution method and device and terminal Active CN107277804B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710591694.4A CN107277804B (en) 2017-07-19 2017-07-19 Operation execution method and device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710591694.4A CN107277804B (en) 2017-07-19 2017-07-19 Operation execution method and device and terminal

Publications (2)

Publication Number Publication Date
CN107277804A CN107277804A (en) 2017-10-20
CN107277804B true CN107277804B (en) 2020-02-18

Family

ID=60078873

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710591694.4A Active CN107277804B (en) 2017-07-19 2017-07-19 Operation execution method and device and terminal

Country Status (1)

Country Link
CN (1) CN107277804B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104869243A (en) * 2015-05-08 2015-08-26 上海斐讯数据通信技术有限公司 Mobile phone anti-theft tracking system and method
CN105933317A (en) * 2016-04-08 2016-09-07 上海海漾软件技术有限公司 Mobile terminal remote control method and device
WO2016192511A1 (en) * 2015-06-05 2016-12-08 腾讯科技(深圳)有限公司 Method and apparatus for remotely deleting information
CN106878548A (en) * 2017-01-13 2017-06-20 北京奇虎科技有限公司 Mobile terminal remote control method, device and mobile terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7706778B2 (en) * 2005-04-05 2010-04-27 Assa Abloy Ab System and method for remotely assigning and revoking access credentials using a near field communication equipped mobile phone

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104869243A (en) * 2015-05-08 2015-08-26 上海斐讯数据通信技术有限公司 Mobile phone anti-theft tracking system and method
WO2016192511A1 (en) * 2015-06-05 2016-12-08 腾讯科技(深圳)有限公司 Method and apparatus for remotely deleting information
CN105933317A (en) * 2016-04-08 2016-09-07 上海海漾软件技术有限公司 Mobile terminal remote control method and device
CN106878548A (en) * 2017-01-13 2017-06-20 北京奇虎科技有限公司 Mobile terminal remote control method, device and mobile terminal

Also Published As

Publication number Publication date
CN107277804A (en) 2017-10-20

Similar Documents

Publication Publication Date Title
US11704134B2 (en) Device locator disable authentication
US10194266B2 (en) Enforcement of proximity based policies
CN112492589B (en) Method and device for accessing equipment identifier
US20190007840A1 (en) SIM Level Mobile Security
US8750828B2 (en) Enabling remote and anonymous control of mobile and portable multimedia devices for security, tracking and recovery
US8626125B2 (en) Apparatus and method for securing mobile terminal
US20190268155A1 (en) Method for Ensuring Terminal Security and Device
CN107622203B (en) Sensitive information protection method and device, storage medium and electronic equipment
CN106330958B (en) Secure access method and device
CN104376263B (en) The method and apparatus that application behavior intercepts
EP3610404B1 (en) Methods and apparatus to monitor permission-controlled hidden sensitive application behavior at run-time
CN107784221B (en) Authority control method, service providing method, device and system and electronic equipment
CN104239140A (en) Mobile terminal as well as method and device for controlling switching of operation systems of mobile terminal
CN104636645A (en) Method and device for controlling data accessing
CN103067911A (en) Method and equipment used for controlling hardware module
CN103246834A (en) Control method and electronic device
CN102215285A (en) Method and apparatus for protecting information in user terminal
Yu et al. Remotely wiping sensitive data on stolen smartphones
CN102810139A (en) Secure data operation method and communication terminal
CN107071008B (en) Terminal equipment positioning method, device and equipment
KR102131596B1 (en) Location based user terminal control method and system therefor
US9854444B2 (en) Apparatus and methods for preventing information disclosure
CN107277804B (en) Operation execution method and device and terminal
KR101467228B1 (en) Method for preventing outflow file and device thereof
EP3193539B1 (en) Control of an operating mode of a mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: Guangdong Opel Mobile Communications Co., Ltd.

GR01 Patent grant
GR01 Patent grant