CN108769175B - Remote real machine access control method and device, storage medium and electronic equipment - Google Patents

Remote real machine access control method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN108769175B
CN108769175B CN201810494078.1A CN201810494078A CN108769175B CN 108769175 B CN108769175 B CN 108769175B CN 201810494078 A CN201810494078 A CN 201810494078A CN 108769175 B CN108769175 B CN 108769175B
Authority
CN
China
Prior art keywords
remote
program
machine
target application
real machine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810494078.1A
Other languages
Chinese (zh)
Other versions
CN108769175A (en
Inventor
秦亚洲
李秋林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JD Digital Technology Holdings Co Ltd
Jingdong Technology Holding Co Ltd
Original Assignee
JD Digital Technology Holdings Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JD Digital Technology Holdings Co Ltd filed Critical JD Digital Technology Holdings Co Ltd
Priority to CN201810494078.1A priority Critical patent/CN108769175B/en
Publication of CN108769175A publication Critical patent/CN108769175A/en
Application granted granted Critical
Publication of CN108769175B publication Critical patent/CN108769175B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/08Protocols specially adapted for terminal emulation, e.g. Telnet
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The present disclosure relates to the field of computer technologies, and in particular, to a remote genuine machine access control method, a remote genuine machine access control device, a computer-readable storage medium, and an electronic device. The method comprises the steps of receiving a control instruction aiming at a remote real machine, which is sent by a remote real machine server; acquiring program information of a target application program running on the remote real machine; judging whether the target application program is a remote access limiting program or not according to the program information; and determining whether to execute the control instruction according to the judgment result. According to the method and the device, the control instruction sent by the remote real machine server is dynamically controlled according to the result of program judgment, the system efficiency is greatly improved, the system overhead is reduced, and the control stability and flexibility are improved.

Description

Remote real machine access control method and device, storage medium and electronic equipment
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a remote genuine machine access control method, a remote genuine machine access control device, a computer-readable storage medium, and an electronic device.
Background
With the rapid development of the mobile internet, the types and versions of various mobile terminal intelligent devices are increasing, and the number of remote testing and debugging systems of various mobile terminals is increasing. Referring to the remote live machine access system shown in fig. 1, a remote live machine 11 (which may be various mobile terminals) is connected to a remote live machine server 13 through a network device 12, a user 14 obtains a remote live machine service provided by the remote live machine server 13 through a browser or client software installed on a local device 15, and the remote live machine server 13 starts the corresponding remote live machine 11 according to a remote live machine that the user needs to access. After the start-up, the interactive interface of the remote real machine 11 will be displayed on the local device 15 in real time, and the user 14 can operate the remote real machine 11 at the remote end in real time through the local device 15.
Due to the uncertainty of the remote real machine access user and the inconsistency of the use purpose, the authority management of the remote real machine is generally complex. If a user modifies the settings in the remote real machine during use, such as accessing an agent and a password, it will inevitably cause a barrier to the use of the next user. Therefore, how to handle the setting of the access right in the remote real machine is a more critical problem for accessing the service by the remote real machine.
The method mainly adopted by the existing remote real machine access system for setting and managing the authority of a mobile terminal, namely a remote real machine, is as follows: when a user accesses the remote real machine and carries out control operation, a single monitoring process is started at the remote real machine end at the same time to monitor whether a process needing access limitation in the remote real machine is started or not, and if the process needing access limitation is started, the process is immediately ended. Although the method achieves the effect of forbidding the process starting, the monitoring mode of the process with limited access needs to occupy extra resource overhead; and due to the existence of the monitoring process, the authority control of the remote real machine cannot be modified under the condition of local access (non-remote access) of the remote real machine. Therefore, whether remote access or local access is limited by the monitoring process, once the monitoring process is closed, the access authorities of the remote end and the local end are simultaneously released, and the purpose of controlling the remote access authority cannot be achieved, so that how to effectively and flexibly control the remote real machine access authority is an urgent problem to be solved.
It is to be noted that the information disclosed in the above background section is only for enhancement of understanding of the background of the present disclosure, and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
The present disclosure is directed to a remote genuine machine access control method, a remote genuine machine access control device, a computer readable storage medium and an electronic device, so as to overcome at least some technical problems of the existing remote genuine machine access control method that additional resources are required to be occupied and flexibility is poor due to limitations and disadvantages of the related art.
According to one aspect of the disclosure, a remote real machine access control method is provided, which is characterized by comprising:
receiving a control instruction aiming at the remote real machine, which is sent by the remote real machine server;
acquiring program information of a target application program running on the remote real machine;
judging whether the target application program is a remote access limiting program or not according to the program information;
and determining whether to execute the control instruction according to the judgment result.
In an exemplary embodiment of the present disclosure, the determining whether to execute the control instruction according to a result of the determination includes:
executing the control instruction when the target application program is judged not to be the remote access limiting program;
and when the target application program is judged to be the remote access limiting program, prohibiting the control instruction from being executed.
In an exemplary embodiment of the present disclosure, the method further comprises:
and closing the target application program when the target application program is judged to be the remote access limiting program.
In an exemplary embodiment of the present disclosure, the method further comprises:
and when the target application program is judged to be the program for limiting remote access, sending control invalidation information to the remote real machine server.
In an exemplary embodiment of the present disclosure, the method further comprises:
and when the target application program is judged not to be the remote access limiting program, sending a result of executing the control instruction to the remote real machine server.
In an exemplary embodiment of the present disclosure, the program information includes a name and/or an icon of the target application.
In an exemplary embodiment of the present disclosure, the acquiring program information of the target application running on the remote live machine includes:
judging a target object to be controlled according to the control instruction;
and acquiring program information of a target application program corresponding to the target object.
In an exemplary embodiment of the present disclosure, the target object includes a window, a control, and/or a location of a target application.
In an exemplary embodiment of the present disclosure, before determining whether the target application is a restricted remote access program according to the program information, the method further includes:
receiving user information sent by the remote live machine server;
information restricting a remote access procedure associated with the user information is acquired.
In an exemplary embodiment of the present disclosure, the user information includes a registered account, a user name and/or a network address of the user accessing the remote live machine server.
According to one aspect of the present disclosure, there is provided a remote live machine access control device, characterized by comprising:
the information receiving module is configured to receive a control instruction aiming at the remote live machine, which is sent by the remote live machine server;
a program acquisition module configured to acquire program information of a target application program running on the remote live machine;
the permission judging module is configured to judge whether the target application program is a program for limiting remote access or not according to the program information;
and the instruction execution module is configured to determine whether to execute the control instruction according to the judged result.
According to an aspect of the present disclosure, there is provided a computer readable storage medium having a computer program stored thereon, characterized in that the computer program, when executed by a processor, implements the remote live machine access control method as described in any one of the above.
According to one aspect of the present disclosure, there is provided an electronic device characterized by comprising a processor and a memory; wherein the memory is configured to store executable instructions of the processor, and the processor is configured to execute any one of the above remote live machine access control methods via execution of the executable instructions.
In the remote real machine access control method provided by the embodiment of the disclosure, the control of the remote real machine access authority can be completed only by using the remote driving agent to perform program judgment without independently setting a monitoring process at the remote real machine end, and the instruction sent by the remote real machine server is dynamically controlled according to the result of the program judgment, so that the system efficiency is greatly improved, the system overhead is reduced, and meanwhile, the remote control and the operation of the real machine side control are separated, and the control stability and flexibility are improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure. It is to be understood that the drawings in the following description are merely exemplary of the disclosure, and that other drawings may be derived from those drawings by one of ordinary skill in the art without the exercise of inventive faculty.
Fig. 1 schematically shows a composition diagram of a remote live machine access system.
Fig. 2 schematically shows a flowchart of steps of a remote live machine access control method in an exemplary embodiment of the present disclosure.
Fig. 3 schematically illustrates a flowchart of steps of a remote live machine access control method in an exemplary embodiment of the present disclosure.
Fig. 4 schematically shows a flowchart of steps of a remote live machine access control method in an exemplary embodiment of the present disclosure.
Fig. 5 schematically shows a block diagram of a remote live machine access control device in an exemplary embodiment of the present disclosure.
Fig. 6 schematically illustrates a schematic diagram of a program product in an exemplary embodiment of the disclosure.
Fig. 7 schematically illustrates a module diagram of an electronic device in an exemplary embodiment of the disclosure.
Fig. 8 schematically shows a block diagram of a remote live machine access system to which the remote live machine access control method according to the exemplary embodiment of the present disclosure is applied.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus their repetitive description will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
The exemplary embodiment of the present disclosure first provides a remote real machine access control method, where the remote real machine may be various terminal devices, such as a mobile terminal smart device, such as a mobile phone, a tablet computer, and the like, that establish a communication connection with a remote real machine server through a network device or other communication manners. The terminal devices can respond to the control operation of a remote user through the remote real-machine server and feed back the operation result on the real device to the user in real time in the modes of simulating images, audio, video and the like, so that the testing and debugging requirements of the user on the real-machine device and the application program on the real-machine device are met.
Referring to fig. 2, the remote live machine access control method may mainly include the following steps:
and S10, receiving a control instruction aiming at the remote real machine, which is sent by the remote real machine server.
The real-time control of the remote real machine server to the remote real machine with which the communication connection is established can be generally carried out by configuring a remote drive agent on the remote real machine. In the present embodiment, the remote driving agent first receives a control instruction for the remote live machine, which is sent by the remote live machine server. For example, when a user remotely accesses a touch device by using a browser or client software installed on a local device, various touch operations such as clicking, pressing, and sliding performed on the touch device and various information input operations such as characters and voice may be simulated by using an input device such as a mouse, a keyboard, or a microphone, and then the remote driving agent will receive a control instruction corresponding to the operations sent by the remote live-machine server.
And S20, acquiring program information of a target application program running on the remote real machine.
After receiving the control command in step S10, the method may determine the target application program running on the remote real machine to which the control command actually points, and obtain program information of the target application program, where the program information may include a name, an icon, or other various kinds of identifying information of the target application program, and may also include any information related to the target application program, such as a type, a version, a developer, and a development tool. In addition, the target application program may be a system program or a pre-installed program carried by the remote real machine, or may be another program that is initiated by the access user and installed and runs on the remote real machine, which is not particularly limited in this embodiment.
And S30, judging whether the target application program is a remote access limiting program or not according to the program information.
Whether the target application is the remote access restricted program may be determined based on the program information of the target application acquired in step S20, wherein one method for determining may be to compare the program information of the target application with the program information of the remote access restricted program. For example, the determination may be made by comparing the names and/or icons of the programs, and once the related information matches, the target application may be determined to be a program that restricts remote access. In addition, the program information of a plurality of remote access limiting programs on the remote real machine can be collected to form a data set, then the program information of the target application program is included in the data set, repeated items are searched, if the repeated items are detected, the target application program can be judged to be the remote access limiting program, and if the repeated items are not detected, the target application program can be judged not to be the remote access limiting program.
And S40, determining whether to execute the control instruction according to the judgment result.
This step may determine whether to execute the control instruction to the target application program on the remote live machine according to the result of the judgment in step S30. As shown in fig. 3, as a preferred embodiment, this step may further include the following steps:
and S41, when the target application program is judged not to be the remote access limiting program, executing the control instruction.
If the target application is not the remote access restricted program as a result of the determination in step S30, this step will execute the control instruction to the target application on the remote real machine. In addition, after the control instruction is executed, the result of executing the control instruction can be sent to the remote real-machine server, so that a user can obtain control feedback in real time.
And S42, prohibiting the control instruction from being executed when the target application program is judged to be the remote access limiting program.
If the target application is the remote access restricted program as a result of the determination in step S30, this step will prohibit the execution of the control instruction to the target application on the remote live machine. In addition, if the target application program is judged to be the remote access limiting program, the target application program can be closed, and meanwhile control invalidation information can be sent to the remote real machine server, so that the user is prevented from continuously carrying out invalid control operation on the target application program.
In the remote real machine access control method provided in the exemplary embodiment, the remote real machine access permission can be controlled only by using the program judgment of the remote driving agent without separately setting a monitoring process at the remote real machine end, and the instruction sent by the remote real machine server is dynamically controlled according to the result of the program judgment, so that the system efficiency is greatly improved, the system overhead is reduced, and meanwhile, the remote control and the operation of the real machine side control are separated, and the control stability and flexibility are improved.
Referring to fig. 4, based on the above embodiment, in another exemplary embodiment of the present disclosure, step S20 may include the following steps:
and S21, judging the target object to be controlled according to the control instruction.
A plurality of programs can be run in the foreground and the background at the same time, and this step can determine the target object that the user actually wants to control according to the control instruction received in step S10, where the target object may include a window, a control and/or a location of the target application program. For example, if the user performs a single-click operation on the local device with a mouse, this step can determine which control on the remote live machine the user wishes to trigger through the single-click operation, in which window the control is located, and to which program the window belongs. For another example, if the user performs a sliding operation with a mouse on the local device, the step may determine what sliding trajectory the user wishes to obtain on the remote real machine through the sliding operation, and may also determine the program to be controlled by the sliding operation based on the position information (which may be coordinate information) of the sliding trajectory and the position information of the objects such as the programs and their windows, controls, and the like.
And S22, acquiring program information of a target application program corresponding to the target object.
After the target object to be controlled by the control command is determined in step S21, the program information of the target application corresponding to the target object may be acquired in this step. Especially, under the condition that a plurality of foreground programs or a plurality of program windows are mutually overlapped when the remote real machine is simultaneously operated, the remote real machine access control can be more accurately realized by obtaining the target object to judge the target application program, and the misoperation is avoided.
Further, in another exemplary embodiment of the present disclosure, step S30 may be preceded by the following two steps:
receiving user information sent by the remote live machine server;
information restricting a remote access procedure associated with the user information is acquired.
Based on these two steps, in the remote live machine access control method provided in this embodiment, in addition to receiving the control instruction, user information sent by the remote live machine server is also received. The user information may include a registered account, a user name and/or a network address of the user accessing the remote live machine server. The embodiment can associate the user information of the access user with the remote access limiting program of the remote real machine, for example, the user group can be classified according to one or more information of the registration account, the user name, the network address and the like of the access user to form a plurality of categories of paid users, free users, blacklist users and the like, different access permissions can be given to users of different categories, that is, the types and the number of the remote access limiting program are set differently according to different users, so that the remote real machine access control is performed more flexibly.
It should be noted that although the above exemplary embodiments describe the various steps of the methods of the present disclosure in a particular order, this does not require or imply that these steps must be performed in that particular order, or that all of the steps must be performed, to achieve the desired results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions, etc.
In an exemplary embodiment of the present disclosure, a remote live machine access control device is also provided, and referring to fig. 5, the remote live machine access control device 50 may mainly include an information receiving module 51, a program obtaining module 52, an authority judging module 53, and an instruction executing module 54. Wherein, the information receiving module 51 is configured to receive a control instruction for the remote live machine sent by the remote live machine server; the program acquisition module 52 is configured to acquire program information of a target application program running on the remote live machine; the permission judging module 53 is configured to judge whether the target application is a remote access limiting program according to the program information; the instruction execution module 54 is configured to determine whether to execute the control instruction according to a result of the determination.
The specific details of the remote real machine access control device are already described in detail in the corresponding remote real machine access control method, and therefore are not described herein again.
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
In an exemplary embodiment of the present disclosure, there is also provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, can implement the above-described remote genuine machine access control method of the present disclosure. In some possible embodiments, various aspects of the disclosure may also be implemented in the form of a program product comprising program code; the program product may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, or a removable hard disk, etc.) or on a network; when the program product is run on a computing device (which may be a personal computer, a server, a terminal apparatus, or a network device, etc.), the program code is configured to cause the computing device to perform the method steps in the above exemplary embodiments of the disclosure.
Referring to fig. 6, a program product 60 for implementing the above method according to an embodiment of the present disclosure may employ a portable compact disc read only memory (CD-ROM) and include program code, and may run on a computing device (e.g., a personal computer, a server, a terminal device, or a network device, etc.). However, the program product of the present disclosure is not limited thereto. In the exemplary embodiment, the computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium.
The readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
A readable signal medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present disclosure may be written in any combination of one or more programming languages, including AN object oriented programming language such as Java, C + +, or the like, as well as conventional procedural programming languages, such as the C language or similar programming languages.
In an exemplary embodiment of the present disclosure, there is also provided an electronic device comprising at least one processor and at least one memory for storing executable instructions of the processor; wherein the processor is configured to perform the method steps in the above-described exemplary embodiments of the disclosure via execution of the executable instructions.
The electronic apparatus 700 in the present exemplary embodiment is described below with reference to fig. 7. The electronic device 700 is only one example and should not bring any limitations to the functionality or scope of use of the embodiments of the present disclosure.
Referring to FIG. 7, an electronic device 700 is shown in the form of a general purpose computing device. The components of the electronic device 700 may include, but are not limited to: at least one processing unit 710, at least one memory unit 720, a bus 730 that couples various system components including the processing unit 710 and the memory unit 720, and a display unit 740.
Wherein the memory unit 720 stores program code which can be executed by the processing unit 710 such that the processing unit 710 performs the method steps in the above exemplary embodiments of the present disclosure.
The storage unit 720 may include readable media in the form of volatile memory units, such as a random access memory unit 721(RAM) and/or a cache memory unit 722, and may further include a read-only memory unit 723 (ROM).
The storage unit 720 may also include a program/utility 724 having a set (at least one) of program modules 725, including but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 730 may be any representation of one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
Electronic device 700 may also communicate with one or more external devices 800 (e.g., keyboard, pointing device, Bluetooth device, etc.), with one or more devices that enable a user to interact with electronic device 700, and/or with any device (e.g., router, modem, etc.) that enables electronic device 700 to communicate with one or more other computing devices.
As will be appreciated by one skilled in the art, aspects of the present disclosure may be embodied as a system, method or program product. Accordingly, various aspects of the present disclosure may be embodied in the form of: an entirely hardware embodiment, an entirely software embodiment (including firmware, microcode, etc.) or an embodiment combining hardware and software may be referred to herein generally as a "circuit," module "or" system.
To further understand the specific application of the embodiments of the present disclosure, the following description is made in conjunction with the structural framework of an exemplary remote live machine access system.
As shown in fig. 8, the remote live machine access system mainly includes three parts, namely, a user side, a remote live machine server side and a remote live machine side.
The user side mainly comprises a control module and an image display module, wherein the control module has the main function of receiving a remote real machine operation command initiated by a user and then sending the remote real machine operation command to the remote real machine server side. The image display module has the main function of displaying the UI interface of the remote real machine in real time.
The remote real machine server mainly comprises a control processing module and an image real-time processing module, wherein the control processing module has the main function of processing a remote real machine operation command sent by the front end and then transmitting the remote real machine operation command to a remote drive agent at the remote real machine end. The image real-time processing module has the main function of capturing and transmitting the UI (user interface) image of the remote real machine in real time.
The remote real machine end mainly comprises a remote driving agent module, and the main function of the remote driving agent module is to execute real control operation corresponding to user operation on the remote real machine.
The specific flow of the remote real machine access operation can comprise the following parts:
1. the user initiates a remote real-machine access request by using a browser or client software of the user side, the user side is connected with the remote real-machine server side, a command channel is established, and the user can send a remote real-machine control command to the remote real-machine server through the command channel.
2. And the remote real machine server starts the image processing module to wait for receiving the image transmitted by the remote real machine end.
3. And the remote live machine server configures the remote driving agent to the corresponding remote live machine and starts the remote driving agent at the same time of starting the image processing module.
4. And the remote driving agent receives an operation instruction sent by the remote real machine server and executes the remote real machine access control method in the embodiment of the disclosure on the remote real machine.
5. And after the remote driving agent executes the specific operation, returning the operation result to the remote real machine server.
6. And the image real-time processing module captures a UI (user interface) of the remote real machine in real time.
7. And the image real-time processing module receives the UI image of the remote real machine in real time.
8. And the image real-time processing module returns the UI image data to the image display module of the user side in real time for display.
Through the operation process, complete remote real machine access can be completed once, wherein the method provided by the embodiment of the disclosure can be used for performing different processing on the application program to be limited from remote access and other application programs, so that the effect of controlling the access authority of the remote real machine is achieved.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments, and the features discussed in connection with the embodiments are interchangeable, if possible. In the above description, numerous specific details are provided to give a thorough understanding of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that the embodiments of the disclosure may be practiced without one or more of the specific details, or with other methods, components, materials, and so forth. In other instances, well-known structures, materials, or operations are not shown or described in detail to avoid obscuring aspects of the disclosure.

Claims (13)

1. A remote real machine access control method is characterized by comprising the following steps:
the method comprises the steps that a remote driving agent receives a control instruction aiming at a remote real machine, which is sent by a remote real machine server, wherein the remote driving agent is configured on the remote real machine;
the remote driving agent acquires program information of a target application program running on the remote real machine;
the remote driving agent judges whether the target application program is a program for limiting remote access or not according to the program information;
the remote driving agent determines whether to execute the control instruction according to the judgment result;
the real machine server is used for controlling a real machine which is in communication connection with the real machine server in real time; responding to various touch control operations and various information input operations including characters and voice on the remote real machine simulated by a user through an input device, and receiving a control instruction corresponding to the operations by the remote real machine server through the remote driving agent.
2. The remote live-machine access control method according to claim 1, wherein the determining, by the remote driving agent, whether to execute the control instruction according to a result of the judgment includes:
when the remote driving agent judges that the target application program is not the remote access limiting program, executing the control instruction;
and when the remote driving agent judges that the target application program is the remote access limiting program, forbidding the execution of the control command.
3. The remote live-machine access control method according to claim 1, further comprising:
and closing the target application program when the target application program is judged to be the remote access limiting program.
4. The remote live-machine access control method according to claim 1, further comprising:
and when the target application program is judged to be the program for limiting remote access, sending control invalidation information to the remote real machine server.
5. The remote live-machine access control method according to claim 1, further comprising:
and when the target application program is judged not to be the remote access limiting program, sending a result of executing the control instruction to the remote real machine server.
6. The remote live-machine access control method according to claim 1, wherein the program information includes a name and/or an icon of a target application.
7. The remote live machine access control method according to any one of claims 1 to 6, wherein the acquiring program information of the target application program running on the remote live machine comprises:
judging a target object to be controlled according to the control instruction;
and acquiring program information of a target application program corresponding to the target object.
8. The remote live-machine access control method as claimed in claim 7, wherein the target object comprises a window, a control and/or a position of a target application.
9. The remote live-machine access control method according to any one of claims 1 to 4, wherein before determining whether the target application is a remote access limiting program according to the program information, the method further comprises:
receiving user information sent by the remote live machine server;
information restricting a remote access procedure associated with the user information is acquired.
10. The remote live machine access control method according to claim 9, wherein the user information includes a registered account, a user name and/or a network address of a user accessing the remote live machine server.
11. A remote live machine access control device, comprising:
the information receiving module is configured to receive a control instruction aiming at the remote live machine, which is sent by the remote live machine server;
a program acquisition module configured to acquire program information of a target application program running on the remote live machine;
the permission judging module is configured to judge whether the target application program is a program for limiting remote access or not according to the program information;
an instruction execution module configured to determine whether to execute the control instruction according to a result of the determination;
the information receiving module, the program obtaining module, the permission judging module and the instruction executing module are realized based on a remote driving agent configured on the remote real machine.
12. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the remote genuine machine access control method according to any one of claims 1 to 10.
13. An electronic device, comprising:
a processor;
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the remote live machine access control method of any one of claims 1-10 via execution of the executable instructions.
CN201810494078.1A 2018-05-22 2018-05-22 Remote real machine access control method and device, storage medium and electronic equipment Active CN108769175B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810494078.1A CN108769175B (en) 2018-05-22 2018-05-22 Remote real machine access control method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810494078.1A CN108769175B (en) 2018-05-22 2018-05-22 Remote real machine access control method and device, storage medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN108769175A CN108769175A (en) 2018-11-06
CN108769175B true CN108769175B (en) 2020-07-31

Family

ID=64007745

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810494078.1A Active CN108769175B (en) 2018-05-22 2018-05-22 Remote real machine access control method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN108769175B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109829291B (en) * 2019-01-28 2020-09-11 广州云测信息技术有限公司 Authentication method for entering Android setting interface
CN111181983B (en) * 2019-12-31 2023-09-08 奇安信科技集团股份有限公司 Endogenous access control method, endogenous access control device, computing equipment and medium
CN113810448B (en) * 2020-06-17 2023-07-04 阿里巴巴集团控股有限公司 Cloud service method, deployment method, device, electronic equipment and storage medium
CN114338135A (en) * 2021-12-27 2022-04-12 奇安信科技集团股份有限公司 Remote login behavior processing method and device, computing equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1536458A (en) * 2003-04-11 2004-10-13 ������ͨ�Ƽ��������ι�˾ System and method for managing remote computer access host
CN101064604A (en) * 2006-04-29 2007-10-31 西门子公司 Remote access process, system and equipment
CN102141957A (en) * 2010-10-21 2011-08-03 华为技术有限公司 Auxiliary test method, device and system for remote real machine
CN103268288A (en) * 2013-06-18 2013-08-28 北京云测信息技术有限公司 Remote real machine debugging method and system of mobile terminal application software
CN103778053A (en) * 2012-10-18 2014-05-07 周玲玲 Remote real machine test system and method of mobile terminals
CN105704094A (en) * 2014-11-25 2016-06-22 杭州华三通信技术有限公司 Application access authority control method and device
CN106230937A (en) * 2016-07-29 2016-12-14 宇龙计算机通信科技(深圳)有限公司 Long-range control method, remote control and terminal
CN106909505A (en) * 2017-02-19 2017-06-30 郑州云海信息技术有限公司 The remote test method and device of the server OS based on java

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7711777B2 (en) * 2007-03-23 2010-05-04 International Business Machines Corporation Method and system for managing a remote control session

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1536458A (en) * 2003-04-11 2004-10-13 ������ͨ�Ƽ��������ι�˾ System and method for managing remote computer access host
CN101064604A (en) * 2006-04-29 2007-10-31 西门子公司 Remote access process, system and equipment
CN102141957A (en) * 2010-10-21 2011-08-03 华为技术有限公司 Auxiliary test method, device and system for remote real machine
CN103778053A (en) * 2012-10-18 2014-05-07 周玲玲 Remote real machine test system and method of mobile terminals
CN103268288A (en) * 2013-06-18 2013-08-28 北京云测信息技术有限公司 Remote real machine debugging method and system of mobile terminal application software
CN105704094A (en) * 2014-11-25 2016-06-22 杭州华三通信技术有限公司 Application access authority control method and device
CN106230937A (en) * 2016-07-29 2016-12-14 宇龙计算机通信科技(深圳)有限公司 Long-range control method, remote control and terminal
CN106909505A (en) * 2017-02-19 2017-06-30 郑州云海信息技术有限公司 The remote test method and device of the server OS based on java

Also Published As

Publication number Publication date
CN108769175A (en) 2018-11-06

Similar Documents

Publication Publication Date Title
CN108769175B (en) Remote real machine access control method and device, storage medium and electronic equipment
CN108804302B (en) Remote testing method, system and related equipment
CN108345543B (en) Data processing method, device, equipment and storage medium
CN109308241B (en) Method and device for monitoring starting process of application program, terminal equipment and storage medium
CN109947635B (en) Data reporting method, device, storage medium and terminal equipment
WO2019228095A1 (en) Method and apparatus for adapting handle to third-party application, and storage medium
CN107807841B (en) Server simulation method, device, equipment and readable storage medium
CN109814801A (en) Using login method, device, terminal and storage medium
CN104679239B (en) A kind of terminal input method
KR20230088427A (en) File transmission method, file transmission device and electronic device
CN110457049A (en) Realize method, apparatus, electronic equipment and the storage medium of plug-in unit automation
CN114036439A (en) Website building method, device, medium and electronic equipment
CN106815150B (en) Server-side interface test system and method
CN109491908B (en) Page detection method and device, electronic equipment and storage medium
CN107102937B (en) User interface testing method and device
CN112579997B (en) User permission configuration method and device, computer equipment and storage medium
CN113615141A (en) Account number association method, device, system, server and storage medium
CN104679506B (en) A kind of terminal
US20190149601A1 (en) Device list synchronizing method and apparatus, device, and computer storage medium
CN113094236A (en) System data acquisition method and device, computer equipment and storage medium
CN111782382A (en) Task processing method and device, storage medium and electronic equipment
CN110825370B (en) Mobile terminal application development method, device and system
CN112256563A (en) Android application stability testing method and device, electronic equipment and storage medium
CN112491940A (en) Request forwarding method and device of proxy server, storage medium and electronic equipment
CN114422236B (en) Intelligent device access method and device and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Room 221, 2nd floor, Block C, 18 Kechuang 11th Street, Beijing Economic and Technological Development Zone, 100176

Applicant after: JINGDONG DIGITAL TECHNOLOGY HOLDINGS Co.,Ltd.

Address before: Room 221, 2nd floor, Block C, 18 Kechuang 11th Street, Beijing Economic and Technological Development Zone, 100176

Applicant before: BEIJING JINGDONG FINANCIAL TECHNOLOGY HOLDING Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: Room 221, 2 / F, block C, 18 Kechuang 11th Street, Daxing District, Beijing, 100176

Patentee after: Jingdong Technology Holding Co.,Ltd.

Address before: Room 221, 2 / F, block C, 18 Kechuang 11th Street, Daxing District, Beijing, 100176

Patentee before: Jingdong Digital Technology Holding Co.,Ltd.

CP01 Change in the name or title of a patent holder
CP03 Change of name, title or address

Address after: Room 221, 2 / F, block C, 18 Kechuang 11th Street, Daxing District, Beijing, 100176

Patentee after: Jingdong Digital Technology Holding Co.,Ltd.

Address before: Room 221, 2 / F, block C, 18 Kechuang 11th Street, Beijing Economic and Technological Development Zone, 100176

Patentee before: JINGDONG DIGITAL TECHNOLOGY HOLDINGS Co.,Ltd.

CP03 Change of name, title or address