CN107580043A - Long-range control method and remote control - Google Patents

Long-range control method and remote control Download PDF

Info

Publication number
CN107580043A
CN107580043A CN201710764934.6A CN201710764934A CN107580043A CN 107580043 A CN107580043 A CN 107580043A CN 201710764934 A CN201710764934 A CN 201710764934A CN 107580043 A CN107580043 A CN 107580043A
Authority
CN
China
Prior art keywords
terminal
communication
information
content
swindle
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201710764934.6A
Other languages
Chinese (zh)
Inventor
叶振华
张亚枫
陈文峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Meizu Technology Co Ltd
Original Assignee
Meizu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Meizu Technology Co Ltd filed Critical Meizu Technology Co Ltd
Priority to CN201710764934.6A priority Critical patent/CN107580043A/en
Publication of CN107580043A publication Critical patent/CN107580043A/en
Withdrawn legal-status Critical Current

Links

Abstract

The present invention provides a kind of long-range control method, and methods described comprises the following steps:Second terminal obtains the control authority of first terminal;Monitor the information that swindle or doubtful swindle whether are included in the Content of Communication of the first terminal;When the Content of Communication of the first terminal includes the information of swindle or doubtful swindle, the second terminal receives the announcement information generated according to the Content of Communication;The second terminal controls according to the announcement information and the Content of Communication of the first terminal is handled accordingly.The present invention also provides the remote control for performing above-mentioned long-range control method.Utilize the remote protecting of another terminal of the achievable terminal-pair of the present invention.

Description

Long-range control method and remote control
Technical field
The present invention relates to electronic technology field, more particularly to a kind of long-range control method and remote control.
Background technology
This part is it is intended that the embodiments of the present invention stated in claims and embodiment provide background Or context.Description herein recognizes it is prior art not because not being included in this part.
Terminal includes mobile terminal, such as mobile phone is each respectively provided with and received and sent messages, such as short message, wechat, and call function etc., But be the machine of a people one, the safe old man or child compared with unmanageable, such as someone's worry family of communication is to present electricity Letter swindle or the people of doubtful swindle or event recognition ability are weaker, and present mobile phone does not have remote protecting or interactive function, nothing Method meets to monitor above or the needs of protection.
The content of the invention
In consideration of it, it is necessary to provide a kind of long-range control method and remote control, to realize a terminal-pair another end The remote protecting at end, lift the safe to use of user.
An aspect of of the present present invention provides a kind of long-range control method, and it includes:
Second terminal obtains the control authority of first terminal;
Monitor the information that swindle or doubtful swindle whether are included in the Content of Communication of the first terminal;
When the Content of Communication of the first terminal includes the information of swindle or doubtful swindle, the second terminal receives basis The announcement information of the Content of Communication generation;
The second terminal controls according to the announcement information to be located accordingly to the Content of Communication of the first terminal Reason.
Further, methods described also includes working as in the Content of Communication for monitoring the first terminal comprising swindle or doubtful During the information of swindle, monitor whether the first terminal is replied the Content of Communication;If the first terminal is to institute State Content of Communication to be replied, then temporarily detain the return information that the first terminal is sent and the second terminal is received and is directed to The current confirmation of the return information of the first terminal, after the second terminal receives the current confirmation, selection Clearance or the return information of the refusal clearance first terminal.
In the above method, if the return information of the second terminal refusal clearance first terminal, described in deletion Return information and the Content of Communication.
The Content of Communication includes short message, wechat, mail or QQ;If in the Content of Communication comprising website links, in Information or account number cipher are encouraged, then is identified as the information comprising swindle or doubtful swindle.
Further, methods described also includes monitoring fraudulent call is answered or dialed to the first terminal whether, if prison Measuring the first terminal and answer or dial fraudulent call, the second terminal sends prompting message to the first terminal, and First terminal described in the second terminal remote control deletes the message registration.
Another aspect of the present invention provides another long-range control method, and it includes:
First terminal matches in advance with second terminal;
Monitor the information that swindle or doubtful swindle whether are included in the Content of Communication of the first terminal;
When including the information of swindle or doubtful swindle in the Content of Communication for monitoring first terminal, according in the communication Hold and generate corresponding announcement information and send second terminal;
First terminal is handled Content of Communication accordingly by the remote control of the second terminal.
The third aspect of the present invention provides a kind of remote control, and the master control of terminal is guarded applied to energy remote control Terminal, it includes:Authentication module, for obtaining the authorization information for being guarded terminal;The main control terminal obtains institute Possesses the authority that terminal is guarded described in remote control after stating the authorization information for being guarded terminal;
Monitoring modular, the letter of swindle or doubtful swindle whether is included in the Content of Communication for being guarded terminal for monitoring Breath;
Receiving module, for receiving the terminal of being guarded when its Content of Communication includes the information of swindle or doubtful swindle The announcement information accordingly generated;And
Processing module, the Content of Communication for being guarded terminal is located accordingly according to announcement information control Reason.
Further, the remote control also includes information temporary storage module, and the monitoring modular is additionally operable to when monitoring During information into the Content of Communication for being guarded terminal comprising swindle or doubtful swindle, whether monitoring described is guarded terminal The Content of Communication is replied, Content of Communication described in terminal-pair is guarded if described and is replied, it is temporary by described information Storing module temporarily detains the return information guarded terminal and sent, the announcement information include to it is described temporarily detain return The current confirmation of complex information.
The processing module, which is used to be let pass according to the current confirmation selection, or refusal clearance is described is guarded end The return information at end, if the refusal clearance return information for being guarded terminal, described in the main control terminal remote control Guarded return information described in terminal deletion and the Content of Communication.
The remote control also includes sending module, is guarded described in the monitoring module monitors in the communication of terminal In appearance whether comprising swindle or doubtful swindle information include monitor it is described guarded fraudulent call is answered or dialed to terminal whether, If monitoring that fraudulent call is answered or dialed to the terminal of being guarded, the sending module sends prompting message and kept to described Terminal is protected, and Content of Communication described in terminal deletion is guarded described in the main control terminal remote control.
The present invention can be applicable to a kind of terminal, and the terminal includes processor, and the processor is used to perform in memory The step of long-range control method described above being realized during the computer program of storage;And a kind of computer-readable recording medium, Computer program is stored thereon with, whole long-range control method described above is realized when the computer program is executed by processor Step.
Compared to prior art, long-range control method and remote control provided by the invention, which are worked as, monitors first terminal Content of Communication include swindle or during doubtful swindle, generating corresponding announcement information according to the Content of Communication sends to second eventually End;The second terminal controls according to the announcement information and the Content of Communication of the first terminal is handled accordingly, example Such as deleting communication provides current confirmation, to cause second terminal to have defencive function to first terminal.
Brief description of the drawings
It is required in being described below to embodiment in order to illustrate more clearly of the technical scheme of embodiment of the present invention The accompanying drawing used is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, for this For the those of ordinary skill of field, on the premise of not paying creative work, it can also be obtained according to these accompanying drawings other Accompanying drawing.
Fig. 1 is the flow chart for the long-range control method that first embodiment of the invention provides.
Fig. 2 is the flow chart for the long-range control method that second embodiment of the invention provides.
Fig. 3 is the exemplary functional block diagram for the remote control that third embodiment of the invention provides.
Fig. 4 is the exemplary functional block diagram for the terminal that four embodiment of the invention provides.
Main element symbol description
Terminal 1
Processor 2
Memory 3
Remote control 100
Authentication module 10
Monitoring modular 20
Information temporary storage module 30
Receiving module 40
Sending module 60
Processing module 50
Following embodiment will combine above-mentioned accompanying drawing and further illustrate the present invention.
Embodiment
It is below in conjunction with the accompanying drawings and specific real in order to be more clearly understood that the above objects, features and advantages of the present invention Applying mode, the present invention will be described in detail.It should be noted that in the case where not conflicting, presently filed embodiment and reality Applying the feature in mode can be mutually combined.
Many details are elaborated in the following description to facilitate a thorough understanding of the present invention, described embodiment Only a part of embodiment of the invention, rather than whole embodiments.Based on the embodiment in the present invention, this area The every other embodiment that those of ordinary skill is obtained under the premise of creative work is not made, belongs to guarantor of the present invention The scope of shield.
Unless otherwise defined, all of technologies and scientific terms used here by the article is with belonging to technical field of the invention The implication that technical staff is generally understood that is identical.Term used in the description of the invention herein is intended merely to description tool The purpose of the embodiment of body, it is not intended that in the limitation present invention.
Terminal defined in the present invention, including mobile terminal, such as can be desktop PC, notebook, palm electricity The computing device such as brain and cloud server, or mobile phone.The user of terminal can be between kinsfolk or other needs Between protected or monitoring a side and its manager.Content of Communication can include short message, wechat, mail or QQ.Generally, if Website links, prize information or account number cipher are included in the Content of Communication, then can be identified as comprising swindle or doubtful swindle Information.
Fig. 1 is the long-range control method flow chart of first embodiment of the invention, as shown in figure 1, the remote control method Method comprises the following steps:
Step 101:Second terminal obtains the control authority of first terminal;
Step 102:Monitor the information that swindle or doubtful swindle whether are included in the Content of Communication of the first terminal;
Step 103:When the Content of Communication of the first terminal includes the information of swindle or doubtful swindle, the second terminal Receive the announcement information generated according to the Content of Communication;
Step 104:The second terminal controls according to the announcement information and the Content of Communication of the first terminal is carried out Corresponding processing.
In above-mentioned steps 101, the control authority that second terminal obtains first terminal can be whole with first by second terminal End matching in advance, second terminal is as manager and master control person.
In above-mentioned steps 102, the letter that swindle or doubtful swindle whether are included in the Content of Communication of the first terminal is monitored Breath can for example, by the monitoring modular of an anti-swindle, when receiving the communication of a strange contact person, first by this contact person with Database in its anti-swindle system or device carries out swindle number and compared, if so, then can determine that the danger letter for the swindle Breath;If, can be close according to the particular content of communication, such as comprising website links, prize information, account without this number in database The sensitive wording such as code or fund, or call are often abnormal, then can regard as doubtful swindle.The monitoring modular of the anti-swindle can So that in first terminal or second terminal, it can monitor the Content of Communication of at one's disposal or control first terminal automatically In whether include above-mentioned abnormal information.
In a further specific embodiment, swindle or doubt when being included in the Content of Communication for monitoring the first terminal Like swindle information when, further monitor whether the first terminal is replied the Content of Communication.
It is described when information of the Content of Communication comprising swindle or doubtful swindle of the first terminal in above-mentioned steps 103 Second terminal receives the announcement information generated according to the Content of Communication, and the announcement information can be from first terminal to second eventually End is automatic to be sent.
In one embodiment, when first terminal receives the dangerous informations such as swindle, fishing, second terminal can receive Corresponding indicating risk, i.e., above-mentioned announcement information can include the original text for the information for being judged as swindle or doubtful swindle, can also Add the prompting message for judging this degree of risk.
In another specific embodiment, when first terminal receives the danger incoming call such as fraudulent call, second terminal can be received To corresponding indicating risk, and further second terminal can send prompting message to first terminal.The fraudulent call Judgement can be the monitoring modular of above-mentioned anti-swindle according to the fraudulent call database to prestore or monitor the duration of call Exception is long to be judged.
In with above-mentioned further specific embodiment, cheated when being included in the Content of Communication for monitoring the first terminal Deceive or during the information of doubtful swindle, further monitor whether the first terminal is replied the Content of Communication;If institute State first terminal to reply the Content of Communication, then temporarily detain the return information that the first terminal is sent and described Two terminals receive the current confirmation of the return information for the first terminal.I.e. in this particular embodiment, it is above-mentioned Announcement information can add this current confirmation.
In above-mentioned steps 104, the second terminal controls the communication to the first terminal according to the announcement information Content is handled accordingly, and this is handled when including second terminal confirmation risk to the related communication content of first terminal accordingly Deleted, and confirm to refuse return information of the clearance first terminal to this Content of Communication during risk.It is not swindleness when judgement Deceive or during doubtful swindle, return information of the first terminal to this Content of Communication of letting pass can be selected.
Above-mentioned long-range control method can be with overall applicability in second terminal.
Using the long-range control method of the present invention, following scene can be achieved:
1), in kinsfolk, the management of the communication terminal of the parent old man weaker to communication security discriminating power or child, Old man or child can notify parent the very first time using communication terminal during its information comprising swindle or doubtful swindle received, Parent can carry out remote operation to old man or child using mobile phone, can be done when being judged as swindle or doubtful swindle equivalent risk long-range Deletion action.
2), other to need between a side and its manager monitored or protect, its information content sent needs to obtain Instruction of letting pass can just be carried out, and accomplish actual communication safety.
It is also possible to be applied to more scenes using the long-range control method of the present invention, among the protection of the present invention.
Fig. 2 is the long-range control method flow chart that second embodiment of the invention provides, as shown in Fig. 2 the long-range control Method processed comprises the following steps:
Step 201:First terminal matches in advance with second terminal;
Step 202:Monitor the information that swindle or doubtful swindle whether are included in the Content of Communication of the first terminal;
Step 203:When including the information of swindle or doubtful swindle in the Content of Communication for monitoring first terminal, according to institute Content of Communication is stated to generate corresponding announcement information and send second terminal;
Step 204:First terminal is handled Content of Communication accordingly by the remote control of the second terminal.
This long-range control method be can be applicable in first terminal, including system used in monitoring step or module can be set Put in first terminal, the detailed embodiment the step of long-range control method is with reference to the correspondence in above-mentioned first embodiment Description, is not repeated herein.
Fig. 3 is the functional block diagram for the remote control that third embodiment of the present invention provides, as shown in figure 3, institute State remote control 100 and be applied to the main control terminal that energy remote control is guarded terminal, it includes:
Authentication module 10, the authorization information of terminal is guarded for obtaining;The main control terminal obtains described kept Possesses the authority that terminal is guarded described in remote control after protecting the authorization information of terminal;
Monitoring modular 20, for whether monitoring in the Content of Communication for being guarded terminal comprising swindle or doubtful swindle Information;
Receiving module 40, for receiving the terminal of being guarded in information of its Content of Communication comprising swindle or doubtful swindle The announcement information of Shi Xiangying generations;And
Processing module 50 is corresponding for being carried out according to announcement information control to the Content of Communication for being guarded terminal Processing.
It is described guarded terminal can first terminal described above, the main control terminal can second terminal described above, Above-mentioned authentication module 10, monitoring modular 20, receiving module 40 and processing module 50 is performed described by above-mentioned first embodiment The process step of control method.
In with above-mentioned further embodiment, the remote control 100 also includes information temporary storage module 30, The monitoring modular 20, which is additionally operable to work as, monitors the letter comprising swindle or doubtful swindle in the Content of Communication for being guarded terminal During breath, monitoring is described to be guarded whether terminal is replied the Content of Communication, if described guarded is led to described in terminal-pair Letter content is replied, and the return information guarded terminal and sent temporarily is detained by described information temporary storage module 30, described The corresponding announcement information that monitoring modular 20 generates according to the Content of Communication can include believing the reply temporarily detained The current confirmation of breath.
The processing module 50, which is used to be let pass according to the current confirmation selection, or refusal clearance is described is guarded The return information of terminal, the return information for being guarded terminal if refusal is let pass, the main control terminal remote control institute State and guarded return information described in terminal deletion and the Content of Communication.
Preferably, the remote control 100 also includes sending module 60, and the monitoring modular 20 monitors described kept Protect in the Content of Communication of terminal whether the information comprising swindle or doubtful swindle, which includes monitoring, described is guarded whether terminal answers Or fraudulent call is dialed, if monitoring that fraudulent call is answered or dialed to the terminal of being guarded, the sending module 60 is sent Prompting message is guarded terminal to described, and is guarded described in the main control terminal remote control described in terminal deletion in communication Hold.
Long-range control method and remote control provided by the invention, which are worked as, monitors first terminal (by terminal is guarded) When Content of Communication includes swindle or doubtful swindle, corresponding announcement information is generated according to the Content of Communication and sent to second terminal (main control terminal);The second terminal (main control terminal) (is guarded end according to announcement information control to the first terminal End) Content of Communication handled accordingly, such as deleting communication or current confirmation is provided, to cause second terminal (master control Terminal) there is defencive function to first terminal (by terminal is guarded).
The protection of the present invention program extends to terminal, and the terminal applied below to the present invention is described.
Fig. 4 is the schematic diagram for the terminal that four embodiment of the invention provides.The terminal 1 of the embodiment includes:Processing Device 2, memory 3 and the computer program that can be run in the memory 3 and on the processor 2 is stored in, such as this The long-range control method program of invention.The processor 2 realizes above-mentioned each embodiment when performing the computer program Step in long-range control method, such as step 101 shown in Fig. 1 is to step 106.Or the processor 2 performs the meter Realize the function of each module in said apparatus embodiment during calculation machine program, for example, certification, monitoring, information temporary storage, transmission, reception and Processing etc..
Exemplary, the computer program can be divided into one or more modules, one or more of moulds Block is stored in the memory, and by the computing device, to complete the present invention.One or more of modules can be with It is the series of computation machine programmed instruction section that can complete specific function, the instruction segment is used to describe the computer program in institute State the implementation procedure in terminal.
The terminal 1 can be the computing devices such as desktop PC, notebook, palm PC and cloud server.Institute Stating terminal 1 may include, but be not limited only to, processor 2, memory 3.It will be understood by those skilled in the art that the schematic diagram is only Only it is the restriction of the example of terminal, not structure paired terminal, parts more more or less than diagram can be included, or combine certain A little parts, or different parts, such as the terminal 1 can also include input-output equipment, network access equipment, bus Deng.
Alleged processor 2 can be CPU (Central Processing Unit, CPU), can also be it His general processor, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other PLDs, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor can also be any conventional processor Deng the processor is the control centre of the terminal, utilizes various interfaces and the various pieces of the whole terminal of connection.
The memory 3 can be used for storing the computer program and/or module, and the processor 2 is by running or holding Row is stored in computer program and/or module in the memory 3, and calls the data being stored in memory 3, realizes The various functions of the terminal 1.The memory 3 can mainly include storing program area and storage data field, wherein, storage program Area can storage program area, the application program (such as sound-playing function, image player function etc.) needed at least one function Deng;Storage data field can store uses created data (such as voice data, phone directory etc.) etc. according to mobile phone.In addition, Memory 3 can include high-speed random access memory, can also include nonvolatile memory, such as hard disk, internal memory, grafting Formula hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card), at least one disk memory, flush memory device or other volatile solid-state parts.
If the integrated module of the terminal 1 realized in the form of SFU software functional unit and as independent production marketing or In use, it can be stored in a computer read/write memory medium.Based on such understanding, the present invention realizes above-mentioned implementation All or part of flow in example method, by computer program the hardware of correlation can also be instructed to complete, described meter Calculation machine program can be stored in a computer-readable recording medium, and the computer program can be achieved when being performed by processor 2 The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation Code can be source code form, object identification code form, executable file or some intermediate forms etc..The computer-readable medium It can include:Any entity or device, recording medium, USB flash disk, mobile hard disk, the magnetic of the computer program code can be carried Dish, CD, computer storage, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It is it should be noted that described The content that computer-readable medium includes can carry out appropriate increasing according to legislation in jurisdiction and the requirement of patent practice Subtract, such as in some jurisdictions, electric carrier signal and electricity are not included according to legislation and patent practice, computer-readable medium Believe signal.
Embodiment of above is merely illustrative of the technical solution of the present invention and unrestricted, although the preferable embodiment party with reference to more than The present invention is described in detail formula, it will be understood by those within the art that, can be to technical scheme Modify or equivalent substitution should not all depart from the spirit and scope of technical solution of the present invention.

Claims (10)

1. a kind of long-range control method, it is characterised in that methods described includes:
Second terminal obtains the control authority of first terminal;
Monitor the information that swindle or doubtful swindle whether are included in the Content of Communication of the first terminal;
When the Content of Communication of the first terminal includes the information of swindle or doubtful swindle, the second terminal is received according to The announcement information of Content of Communication generation;
The second terminal controls according to the announcement information and the Content of Communication of the first terminal is handled accordingly.
2. long-range control method as claimed in claim 1, it is characterised in that methods described also includes working as monitoring described first In the Content of Communication of terminal comprising swindle or doubtful swindle information when, whether monitor the first terminal to the Content of Communication Replied;If the first terminal is replied the Content of Communication, temporarily detain what the first terminal was sent Return information and the second terminal receive the current confirmation of the return information for the first terminal, and described second eventually After end receives the current confirmation, selection is let pass or the return information of the refusal clearance first terminal.
3. long-range control method as claimed in claim 2, it is characterised in that if second terminal refusal lets pass described the The return information of one terminal, then delete the return information and the Content of Communication.
4. the long-range control method as described in claim 1-3 any one, it is characterised in that the Content of Communication includes short Letter, wechat, mail or QQ;If including website links, prize information or account number cipher in the Content of Communication, it is identified as Information comprising swindle or doubtful swindle.
5. long-range control method as claimed in claim 1, it is characterised in that methods described also includes monitoring the first terminal Fraudulent call whether is answered or dials, if monitoring that fraudulent call, the second terminal are answered or dialed to the first terminal Prompting message is sent to the first terminal, and first terminal described in the second terminal remote control deletes the call note Record.
6. a kind of long-range control method, it is characterised in that methods described includes:
First terminal matches in advance with second terminal;
Monitor the information that swindle or doubtful swindle whether are included in the Content of Communication of the first terminal;
When including the information of swindle or doubtful swindle in the Content of Communication for monitoring first terminal, given birth to according to the Content of Communication Into corresponding announcement information and send second terminal;
First terminal is handled Content of Communication accordingly by the remote control of the second terminal.
7. a kind of remote control, the main control terminal of terminal is guarded applied to energy remote control, it is characterised in that described remote Process control device includes:
Authentication module, for obtaining the authorization information for being guarded terminal;The main control terminal obtains described guarded Possesses the authority that terminal is guarded described in remote control after the authorization information of terminal;
Monitoring modular, the information of swindle or doubtful swindle whether is included in the Content of Communication for being guarded terminal for monitoring;
Receiving module, for receive it is described by guarded terminal its Content of Communication include swindle or doubtful swindle information when it is corresponding The announcement information of generation;And
Processing module, the Content of Communication for being guarded terminal is handled accordingly according to announcement information control.
8. remote control as claimed in claim 7, it is characterised in that also including information temporary storage module, the monitoring mould Block be additionally operable to when monitor it is described guarded comprising swindle or doubtful swindle in the Content of Communication of terminal information when, described in monitoring Guarded whether terminal is replied the Content of Communication, guarded Content of Communication described in terminal-pair if described and returned It is multiple, the return information guarded terminal and sent temporarily is detained by described information temporary storage module, the announcement information includes pair The current confirmation of the return information temporarily detained.
9. remote control as claimed in claim 8, it is characterised in that the processing module is used for according to described current true Recognize information and select the return information for being guarded terminal of letting pass of letting pass or refuse, if refusal clearance is described to be guarded terminal Return information, then guarded described in the main control terminal remote control in return information described in terminal deletion and the communication Hold.
10. remote control as claimed in claim 7, it is characterised in that the remote control also includes sending mould Block, guarded in the Content of Communication of terminal whether the information comprising swindle or doubtful swindle includes described in the monitoring module monitors Monitor it is described guarded fraudulent call is answered or dialed to terminal whether, if monitoring that swindleness is answered or dialed to the terminal of being guarded Phone is deceived, the sending module sends prompting message and guarded terminal, and quilt described in the main control terminal remote control to described Guard Content of Communication described in terminal deletion.
CN201710764934.6A 2017-08-30 2017-08-30 Long-range control method and remote control Withdrawn CN107580043A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710764934.6A CN107580043A (en) 2017-08-30 2017-08-30 Long-range control method and remote control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710764934.6A CN107580043A (en) 2017-08-30 2017-08-30 Long-range control method and remote control

Publications (1)

Publication Number Publication Date
CN107580043A true CN107580043A (en) 2018-01-12

Family

ID=61030584

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710764934.6A Withdrawn CN107580043A (en) 2017-08-30 2017-08-30 Long-range control method and remote control

Country Status (1)

Country Link
CN (1) CN107580043A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113067945A (en) * 2021-03-12 2021-07-02 深圳市安络科技有限公司 Method, device and equipment for dissuading fraud calls

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1564482A (en) * 2004-03-19 2005-01-12 杭州波导软件有限公司 Mobile communication terminal with distance control function
CN105101213A (en) * 2015-06-26 2015-11-25 小米科技有限责任公司 Information processing method and device
CN105530594A (en) * 2014-09-30 2016-04-27 小米科技有限责任公司 Communication method and device based remote control
CN106130852A (en) * 2016-08-30 2016-11-16 广东美的制冷设备有限公司 A kind of safety long-distance controls the method and device of household electrical appliances, air-conditioning

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1564482A (en) * 2004-03-19 2005-01-12 杭州波导软件有限公司 Mobile communication terminal with distance control function
CN105530594A (en) * 2014-09-30 2016-04-27 小米科技有限责任公司 Communication method and device based remote control
CN105101213A (en) * 2015-06-26 2015-11-25 小米科技有限责任公司 Information processing method and device
CN106130852A (en) * 2016-08-30 2016-11-16 广东美的制冷设备有限公司 A kind of safety long-distance controls the method and device of household electrical appliances, air-conditioning

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113067945A (en) * 2021-03-12 2021-07-02 深圳市安络科技有限公司 Method, device and equipment for dissuading fraud calls

Similar Documents

Publication Publication Date Title
CN103516859B (en) Stranger Calls processing method and terminal unit
CN101252748A (en) System and method for realizing privacy SMS on mobile terminal
CN104464045A (en) Two-dimension code-based access control method and two-dimension code-based access control system
CN110598383B (en) Method and device for removing account authority limit
CN109769244B (en) Abnormal telephone card identification method, device, equipment and readable storage medium
CN106571998A (en) Parking contact method and system capable of protecting privacy and convenient to contact
CN110636505A (en) Method and system for protecting account security
CN109685483A (en) Key management system and key management method
US20210248625A1 (en) Aid entity's authentication method and apparatus for management entity for protecting human rights of management object
CN107241362B (en) Method and device for identifying identity of verification code input user
CN108269335A (en) A kind of intelligent entrance guard control system and method
CN109150864B (en) Anti-cheating method and device based on secondary authentication
KR101306074B1 (en) Method and system to prevent phishing
CN107580043A (en) Long-range control method and remote control
CN109446778A (en) Immovable Property Registration information acquisition method, computer installation and computer readable storage medium based on recognition of face
CN102355643B (en) Short message processing method, device and system
CN106936807A (en) A kind of recognition methods of malicious operation and device
CN107580121A (en) Long-range guard method and device, terminal and storage medium
CN111063061A (en) Method, equipment and storage medium for using temporary password for intelligent door lock
CN116418915A (en) Abnormal number identification method, device, server and storage medium
CN111709803B (en) Method and system for preventing unauthorized business handling
CN114168423A (en) Abnormal number calling monitoring method, device, equipment and storage medium
CN114338915A (en) Caller ID risk identification method, caller ID risk identification device, caller ID risk identification equipment and storage medium
CN108156330B (en) Message management system and method based on mobile terminal
CN113038480B (en) Identification method, device, server and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20180112