CN111294276A - Mailbox-based remote control method, system, device and medium - Google Patents
Mailbox-based remote control method, system, device and medium Download PDFInfo
- Publication number
- CN111294276A CN111294276A CN202010129309.6A CN202010129309A CN111294276A CN 111294276 A CN111294276 A CN 111294276A CN 202010129309 A CN202010129309 A CN 202010129309A CN 111294276 A CN111294276 A CN 111294276A
- Authority
- CN
- China
- Prior art keywords
- mailbox
- authority
- control instruction
- address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 230000004044 response Effects 0.000 claims abstract description 27
- 238000012795 verification Methods 0.000 claims abstract description 24
- 238000004590 computer program Methods 0.000 claims description 14
- 230000005540 biological transmission Effects 0.000 claims 1
- 230000006870 function Effects 0.000 description 8
- 230000003287 optical effect Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000001360 synchronised effect Effects 0.000 description 3
- 238000013461 design Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 239000000835 fiber Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/42—Mailbox-related aspects, e.g. synchronisation of mailboxes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/046—Interoperability with other network applications or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
Abstract
The invention discloses a remote control method based on a mailbox, which comprises the following steps: receiving a mail sent by a first mailbox of a control end, and judging the type of the mail; performing authority verification on the mail in response to the fact that the type of the mail is a remote control type; responding to the mail passing the authority verification, and analyzing the mail to obtain a corresponding control instruction; sending the control instruction to a controlled end; acquiring information generated by a controlled end based on the execution of the control instruction; and sending the information to a second mailbox. The invention also discloses a system, a computer device and a readable storage medium. The scheme provided by the invention can enable the control end to realize remote control on the controlled end only by logging in the mailbox and sending the mail without installing any program.
Description
Technical Field
The invention relates to the field of remote control, in particular to a remote control method, a system, equipment and a storage medium based on a mailbox.
Background
Along with the continuous development of society, intelligence becomes more and more common in life, and remote operation and control technology is more and more arousing people's attention. Remote control generally supports network modes such as LAN, WAN, dialing mode and Internet mode, and some remote control software also supports serial port, parallel port and infrared port to control the remote machine. The remote control is generally divided into a client program and a server program, and the client program is usually installed on a computer at a main control end, and the server program is installed on a computer at a controlled end. When the remote control system is used, a client program sends a signal to a server program in a controlled computer to establish a special remote service, and then various remote control functions are used for sending remote control commands through the remote service to control various application programs in the controlled computer to run. Therefore, in the prior art, corresponding programs need to be installed at the control end when the remote control is realized, and the realization mode is complicated.
Disclosure of Invention
In view of the above, in order to overcome at least one aspect of the above problems, an embodiment of the present invention provides a mailbox-based remote control method, including the following steps:
receiving a mail sent by a first mailbox of a control end, and judging the type of the mail;
performing authority verification on the mail in response to the fact that the type of the mail is a remote control type;
responding to the mail passing the authority verification, and analyzing the mail to obtain a corresponding control instruction;
sending the control instruction to a controlled end;
acquiring information generated by a controlled end based on the execution of the control instruction;
and sending the information to a second mailbox.
In some embodiments, further comprising:
responding to the type of the mail as an authority application type, and performing identity verification on the mail;
and giving and recording the authority of the mail address and/or the IP address corresponding to the mail in response to the passing of the identity authentication.
In some embodiments, in response to the mail passing the authority verification, parsing the mail to obtain a corresponding control instruction further includes:
judging whether the control instruction can be executed according to the mail address and/or the authority level of the IP address corresponding to the mail;
in response to being able to execute the control instruction, performing subsequent steps;
and responding to the control instruction which cannot be executed, and returning information with insufficient prompting authority to the control terminal.
In some embodiments, sending the information to a second mailbox further comprises:
determining the address, the mail title and the mail text of a second mailbox to be received according to the information;
and generating a mail by using the address of the second mailbox, the mail title and the mail body and sending the mail to the second mailbox.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a mailbox-based remote control system, including:
the receiving module is configured to receive a mail sent by a first mailbox of the control end and judge the type of the mail;
the first response module is configured to respond to the fact that the type of the mail is a remote control type, and conduct authority verification on the mail;
the analysis module is configured to respond to the mail passing the authority verification and analyze the mail to obtain a corresponding control instruction;
the first sending module is configured to send the control instruction to a controlled end;
the acquisition module is configured to acquire information generated by the controlled end based on the execution of the control instruction;
a second sending module configured to send the information to a second mailbox.
In some embodiments, the system further comprises a second response module configured to:
responding to the type of the mail as an authority application type, and performing identity verification on the mail;
and giving and recording the authority of the mail address and/or the IP address corresponding to the mail in response to the passing of the identity authentication.
In some embodiments, the parsing module is further configured to:
judging whether the control instruction can be executed according to the mail address and/or the authority level of the IP address corresponding to the mail;
in response to being able to execute the control instruction, performing subsequent steps;
and responding to the control instruction which cannot be executed, and returning information with insufficient prompting authority to the control terminal.
In some embodiments, the second transmitting module is further configured to:
determining the address, the mail title and the mail text of a second mailbox to be received according to the information;
and generating a mail by using the address of the second mailbox, the mail title and the mail body and sending the mail to the second mailbox.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a computer apparatus, including:
at least one processor; and
a memory storing a computer program operable on the processor, wherein the processor executes the program to perform any of the steps of the mailbox-based remote control method as described above.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a computer-readable storage medium storing a computer program, which when executed by a processor performs the steps of any of the mailbox-based remote control methods as described above.
The invention has one of the following beneficial technical effects: the scheme provided by the invention can enable the control end to realize remote control on the controlled end only by logging in the mailbox and sending the mail without installing any program.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other embodiments can be obtained by using the drawings without creative efforts.
Fig. 1 is a schematic flowchart of a mailbox-based remote control method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a mailbox-based remote control system according to an embodiment of the present invention;
FIG. 3 is a schematic structural diagram of a computer device provided in an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a computer-readable storage medium according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following embodiments of the present invention are described in further detail with reference to the accompanying drawings.
It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are used for distinguishing two entities with the same name but different names or different parameters, and it should be noted that "first" and "second" are merely for convenience of description and should not be construed as limitations of the embodiments of the present invention, and they are not described in any more detail in the following embodiments.
According to an aspect of the present invention, an embodiment of the present invention provides a mailbox-based remote control method, as shown in fig. 1, which may include the steps of: s1, receiving a mail sent by a first mailbox of a control end, and judging the type of the mail; s2, responding to the mail type being remote control type, carrying out authority verification on the mail; s3, responding to the mail passing the authority verification, analyzing the mail to obtain a corresponding control instruction; s4, sending the control instruction to a controlled end; s5, acquiring information generated by the controlled terminal based on the execution of the control command; and S6, sending the information to a second mailbox.
The scheme provided by the invention can enable the control end to realize remote control on the controlled end only by logging in the mailbox and sending the mail without installing any program.
In some embodiments, in step S3, in response to that the mail passes the authority verification, parsing the mail to obtain a corresponding control instruction further includes:
judging whether the control instruction can be executed according to the mail address and/or the authority level of the IP address corresponding to the mail;
in response to being able to execute the control instruction, performing subsequent steps;
and responding to the control instruction which cannot be executed, and returning information with insufficient prompting authority to the control terminal.
Specifically, after receiving the mail sent by the control end, step S2 is performed first to verify the authority of the mail, that is, verify the mail address and/or IP address corresponding to the mail, to determine whether the mail address and/or IP address of the sent mail has the authority for remote control, and only after verifying the authority of the mail address and/or IP address, it is determined that the control end has the control authority, the subsequent mail parsing step is performed, otherwise, the mail is not parsed. When analyzing, the control instruction can be obtained by analyzing the subject and/or the text of the mail.
It should be noted that there may be a plurality of first mailboxes, that is, different control terminals may send mails through a plurality of different mailboxes, and at this time, the mailbox address needs to be verified. In some embodiments, the first mailbox may be one, that is, different control terminals send mails through only one mailbox, and at this time, the IP address of the control terminal sending the mail needs to be verified.
In some embodiments, if different control terminals send mails through a plurality of different mailboxes, different permission levels can be set for the plurality of mailboxes, so that the control permissions corresponding to the different mailboxes are different, and further, corresponding remote control instructions can be executed. For example, both the A mailbox and the B mailbox have control authority, but the A mailbox has lower authority and can only execute the remote control instruction with lower level, and the B mailbox has higher authority and can execute the remote control instruction with higher level.
In some embodiments, if different control terminals send mails through the same mailbox, different permission levels can be set for the IP addresses for sending the mails, so that different IP addresses correspond to different control permissions, and further, corresponding remote control instructions can be executed. For example, both the IP address a and the IP address B have control authority, but the IP address a has lower authority and can only execute the remote control instruction with lower level, and the IP address B has higher authority and can execute the remote control instruction with higher level.
Thus, after the authority level judgment, even if the mail address or the IP address has the authority, the authority level is not enough, and the control command in the mail cannot be executed.
In some embodiments, the method further comprises:
responding to the type of the mail as an authority application type, and performing identity verification on the mail;
and giving and recording the authority of the mail address and/or the IP address corresponding to the mail in response to the passing of the identity authentication.
Specifically, whether remote control is performed through a plurality of mailboxes or remote control is performed through the same mailbox, authority can be applied or authority level can be improved in advance through a mail mode, and both the mail applying the authority and the mail applying the odd-high authority level are the mails of the authority application class. When receiving the mail of the authority application, after verification, the mailbox or IP address corresponding to the mail can be remotely controlled, the authority of the mailbox or IP address corresponding to the mail is given, and response information is returned to inform the control terminal of the existing authority to carry out remote control, and simultaneously inform the control terminal of which remote control can be carried out under the current authority.
In some embodiments, sending the information to a second mailbox further comprises:
determining the address, the mail title and the mail text of a second mailbox to be received according to the information;
and generating a mail by using the address of the second mailbox, the mail title and the mail body and sending the mail to the second mailbox.
Specifically, after the controlled terminal executes the corresponding control instruction, corresponding information (e.g., log information) is generated, and then the information may be sent to the second mailbox by way of an email, where the address, the email header, and the email body of the second mailbox may be generated by using a preset template.
It should be noted that the mailbox address of the first mailbox is different from the mailbox address of the second mailbox, so that the functions of controlling the mailbox (the first mailbox) and monitoring the mailbox (the second mailbox) can be clearer, and the checking is also convenient.
The scheme provided by the invention can ensure that the control end can realize the remote control of the controlled end only by logging in the mailbox and sending the mail without installing any program.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a mailbox-based remote control system 400, as shown in fig. 2, including:
a receiving module 401, configured to receive a mail sent by a first mailbox of a control end by the receiving module 401, and determine a type of the mail;
a first response module 402, wherein the first response module 402 is configured to perform authority verification on the mail in response to the type of the mail being a remote control type;
the analysis module 403, configured to respond to that the email passes the authority verification, and analyze the email to obtain a corresponding control instruction;
a first sending module 404, where the sending module 404 is configured to send the control instruction to a controlled end;
an obtaining module 405, where the obtaining module 405 is configured to obtain information generated by the controlled end based on executing the control instruction;
a second sending module 406, the second sending module 406 configured to send the information to a second mailbox.
In some embodiments, the system 400 further comprises a second response module configured to:
responding to the type of the mail as an authority application type, and performing identity verification on the mail;
and giving and recording the authority of the mail address and/or the IP address corresponding to the mail in response to the passing of the identity authentication.
In some embodiments, the parsing module 403 is further configured to:
judging whether the control instruction can be executed according to the mail address and/or the authority level of the IP address corresponding to the mail;
in response to being able to execute the control instruction, performing subsequent steps;
and responding to the control instruction which cannot be executed, and returning information with insufficient prompting authority to the control terminal.
In some embodiments, the second sending module 406 is further configured to:
determining the address, the mail title and the mail text of a second mailbox to be received according to the information;
and generating a mail by using the address of the second mailbox, the mail title and the mail body and sending the mail to the second mailbox.
Based on the same inventive concept, according to another aspect of the present invention, as shown in fig. 3, an embodiment of the present invention further provides a computer apparatus 501, comprising:
at least one processor 520; and
a memory 510, the memory 510 storing a computer program 511 executable on the processor, the processor 520 executing the program to perform the steps of any of the above mailbox-based remote control methods.
Based on the same inventive concept, according to another aspect of the present invention, as shown in fig. 4, an embodiment of the present invention further provides a computer-readable storage medium 601, where the computer-readable storage medium 601 stores computer program instructions 610, and the computer program instructions 610, when executed by a processor, perform the steps of any of the above mailbox-based remote control methods.
Finally, it should be noted that, as will be understood by those skilled in the art, all or part of the processes of the methods of the above embodiments may be implemented by a computer program to instruct related hardware to implement the methods. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), a Random Access Memory (RAM), or the like. The embodiments of the computer program may achieve the same or similar effects as any of the above-described method embodiments.
In addition, the apparatuses, devices, and the like disclosed in the embodiments of the present invention may be various electronic terminal devices, such as a mobile phone, a Personal Digital Assistant (PDA), a tablet computer (PAD), a smart television, and the like, or may be a large terminal device, such as a server, and the like, and therefore the scope of protection disclosed in the embodiments of the present invention should not be limited to a specific type of apparatus, device. The client disclosed by the embodiment of the invention can be applied to any one of the electronic terminal devices in the form of electronic hardware, computer software or a combination of the electronic hardware and the computer software.
Furthermore, the method disclosed according to an embodiment of the present invention may also be implemented as a computer program executed by a CPU, and the computer program may be stored in a computer-readable storage medium. The computer program, when executed by the CPU, performs the above-described functions defined in the method disclosed in the embodiments of the present invention.
Further, the above method steps and system elements may also be implemented using a controller and a computer readable storage medium for storing a computer program for causing the controller to implement the functions of the above steps or elements.
Further, it should be appreciated that the computer-readable storage media (e.g., memory) herein can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. By way of example, and not limitation, nonvolatile memory can include Read Only Memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which can act as external cache memory. By way of example and not limitation, RAM is available in a variety of forms such as synchronous RAM (DRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The storage devices of the disclosed aspects are intended to comprise, without being limited to, these and other suitable types of memory.
Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the disclosure herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as software or hardware depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the disclosed embodiments of the present invention.
The various illustrative logical blocks, modules, and circuits described in connection with the disclosure herein may be implemented or performed with the following components designed to perform the functions herein: a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination of these components. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP, and/or any other such configuration.
The steps of a method or algorithm described in connection with the disclosure herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside in a user terminal. In the alternative, the processor and the storage medium may reside as discrete components in a user terminal.
In one or more exemplary designs, the functions may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor. Also, any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk and disc, as used herein, includes Compact Disc (CD), laser disc, optical disc, Digital Versatile Disc (DVD), floppy disk, blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
The foregoing is an exemplary embodiment of the present disclosure, but it should be noted that various changes and modifications could be made herein without departing from the scope of the present disclosure as defined by the appended claims. The functions, steps and/or actions of the method claims in accordance with the disclosed embodiments described herein need not be performed in any particular order. Furthermore, although elements of the disclosed embodiments of the invention may be described or claimed in the singular, the plural is contemplated unless limitation to the singular is explicitly stated.
It should be understood that, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly supports the exception. It should also be understood that "and/or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.
The numbers of the embodiments disclosed in the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments.
It will be understood by those skilled in the art that all or part of the steps of implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, and the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant to be exemplary only, and is not intended to intimate that the scope of the disclosure, including the claims, of embodiments of the invention is limited to these examples; within the idea of an embodiment of the invention, also technical features in the above embodiment or in different embodiments may be combined and there are many other variations of the different aspects of the embodiments of the invention as described above, which are not provided in detail for the sake of brevity. Therefore, any omissions, modifications, substitutions, improvements, and the like that may be made without departing from the spirit and principles of the embodiments of the present invention are intended to be included within the scope of the embodiments of the present invention.
Claims (10)
1. A mailbox-based remote control method is characterized by comprising the following steps:
receiving a mail sent by a first mailbox of a control end, and judging the type of the mail;
performing authority verification on the mail in response to the fact that the type of the mail is a remote control type;
responding to the mail passing the authority verification, and analyzing the mail to obtain a corresponding control instruction;
sending the control instruction to a controlled end;
acquiring information generated by a controlled end based on the execution of the control instruction;
and sending the information to a second mailbox.
2. The method of claim 1, further comprising:
responding to the type of the mail as an authority application type, and performing identity verification on the mail;
and giving and recording the authority of the mail address and/or the IP address corresponding to the mail in response to the passing of the identity authentication.
3. The method of claim 1, wherein in response to the mail passing the authority verification, parsing the mail to obtain a corresponding control instruction further comprises:
judging whether the control instruction can be executed according to the mail address and/or the authority level of the IP address corresponding to the mail;
in response to being able to execute the control instruction, performing subsequent steps;
and responding to the control instruction which cannot be executed, and returning information with insufficient prompting authority to the control terminal.
4. The method of claim 1, wherein the information is sent to a second mailbox, further comprising:
determining the address, the mail title and the mail text of a second mailbox to be received according to the information;
and generating a mail by using the address of the second mailbox, the mail title and the mail body and sending the mail to the second mailbox.
5. A mailbox-based remote control system, comprising:
the receiving module is configured to receive a mail sent by a first mailbox of the control end and judge the type of the mail;
the first response module is configured to respond to the fact that the type of the mail is a remote control type, and conduct authority verification on the mail;
the analysis module is configured to respond to the mail passing the authority verification and analyze the mail to obtain a corresponding control instruction;
the first sending module is configured to send the control instruction to a controlled end;
the acquisition module is configured to acquire information generated by the controlled end based on the execution of the control instruction;
a second sending module configured to send the information to a second mailbox.
6. The system of claim 5, further comprising a second response module configured to:
responding to the type of the mail as an authority application type, and performing identity verification on the mail;
and giving and recording the authority of the mail address and/or the IP address corresponding to the mail in response to the passing of the identity authentication.
7. The system of claim 5, wherein the parsing module is further configured to:
judging whether the control instruction can be executed according to the mail address and/or the authority level of the IP address corresponding to the mail;
in response to being able to execute the control instruction, performing subsequent steps;
and responding to the control instruction which cannot be executed, and returning information with insufficient prompting authority to the control terminal.
8. The system of claim 5, wherein the second transmission module is further configured to:
determining the address, the mail title and the mail text of a second mailbox to be received according to the information;
and generating a mail by using the address of the second mailbox, the mail title and the mail body and sending the mail to the second mailbox.
9. A computer device, comprising:
at least one processor; and
memory storing a computer program operable on the processor, characterized in that the processor executes the program to perform the steps of the method according to any of claims 1-4.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, is adapted to carry out the steps of the method according to any one of claims 1-4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010129309.6A CN111294276A (en) | 2020-02-28 | 2020-02-28 | Mailbox-based remote control method, system, device and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010129309.6A CN111294276A (en) | 2020-02-28 | 2020-02-28 | Mailbox-based remote control method, system, device and medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111294276A true CN111294276A (en) | 2020-06-16 |
Family
ID=71026688
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010129309.6A Pending CN111294276A (en) | 2020-02-28 | 2020-02-28 | Mailbox-based remote control method, system, device and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111294276A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113098760A (en) * | 2021-03-30 | 2021-07-09 | 建信金融科技有限责任公司 | Control execution method, device and equipment for intranet operation and storage medium |
CN115622972A (en) * | 2022-12-20 | 2023-01-17 | 广州讯鸿网络技术有限公司 | Process information-based e-mail processing method, system and device |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040088364A1 (en) * | 2002-10-30 | 2004-05-06 | Kabushiki Kaisha Toshiba | Apparatus and method for controlling electronic devices |
CN1536458A (en) * | 2003-04-11 | 2004-10-13 | ������ͨ�Ƽ��������ι�˾ | System and method for managing remote computer access host |
US20050278428A1 (en) * | 2002-05-13 | 2005-12-15 | Tetsuro Motoyama | Verification scheme for email message containing information about remotely monitored devices |
CN101222353A (en) * | 2006-12-29 | 2008-07-16 | 霍尼韦尔国际公司 | Remote control of a security system using e-mail |
CN101437050A (en) * | 2008-11-27 | 2009-05-20 | 四川长虹电器股份有限公司 | Player remote control system and player remote control method |
CN102143208A (en) * | 2010-12-24 | 2011-08-03 | Tcl集团股份有限公司 | Remote control method and system for intelligent terminal |
US20130262603A1 (en) * | 2012-03-28 | 2013-10-03 | Casio Computer Co., Ltd. | Data processing apparatus and computer readable medium |
US20140089376A1 (en) * | 2012-09-27 | 2014-03-27 | John T. Caldas | Control of applications installed on a remote device |
CN105023137A (en) * | 2015-04-29 | 2015-11-04 | 杭州猿人数据科技有限公司 | E-mail evidence processing system and processing method |
CN105785858A (en) * | 2016-03-02 | 2016-07-20 | 宇龙计算机通信科技(深圳)有限公司 | Control method and device, and terminal |
CN106330661A (en) * | 2015-06-30 | 2017-01-11 | 郭潇文 | Data centralized processing method |
CN106407591A (en) * | 2016-09-29 | 2017-02-15 | 常州天合光能有限公司 | Intelligent terminal equipment-based electric energy production simulation APP for photovoltaic system |
US20170215051A1 (en) * | 2011-09-19 | 2017-07-27 | Microsoft Technology Licensing, Llc | Remote access to a mobile communication device over a wireless local area network (wlan) |
CN107800613A (en) * | 2017-07-27 | 2018-03-13 | 平安科技(深圳)有限公司 | E-mail sending method, device, storage medium and computer equipment |
CN110336740A (en) * | 2019-06-30 | 2019-10-15 | 天津中新智冠信息技术有限公司 | A kind of device management method, server and system |
-
2020
- 2020-02-28 CN CN202010129309.6A patent/CN111294276A/en active Pending
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050278428A1 (en) * | 2002-05-13 | 2005-12-15 | Tetsuro Motoyama | Verification scheme for email message containing information about remotely monitored devices |
US20040088364A1 (en) * | 2002-10-30 | 2004-05-06 | Kabushiki Kaisha Toshiba | Apparatus and method for controlling electronic devices |
CN1536458A (en) * | 2003-04-11 | 2004-10-13 | ������ͨ�Ƽ��������ι�˾ | System and method for managing remote computer access host |
CN101222353A (en) * | 2006-12-29 | 2008-07-16 | 霍尼韦尔国际公司 | Remote control of a security system using e-mail |
CN101437050A (en) * | 2008-11-27 | 2009-05-20 | 四川长虹电器股份有限公司 | Player remote control system and player remote control method |
CN102143208A (en) * | 2010-12-24 | 2011-08-03 | Tcl集团股份有限公司 | Remote control method and system for intelligent terminal |
US20170215051A1 (en) * | 2011-09-19 | 2017-07-27 | Microsoft Technology Licensing, Llc | Remote access to a mobile communication device over a wireless local area network (wlan) |
CN106603385A (en) * | 2012-03-28 | 2017-04-26 | 卡西欧计算机株式会社 | Mail receiving apparatus and mail receiving method |
US20130262603A1 (en) * | 2012-03-28 | 2013-10-03 | Casio Computer Co., Ltd. | Data processing apparatus and computer readable medium |
US20140089376A1 (en) * | 2012-09-27 | 2014-03-27 | John T. Caldas | Control of applications installed on a remote device |
CN105023137A (en) * | 2015-04-29 | 2015-11-04 | 杭州猿人数据科技有限公司 | E-mail evidence processing system and processing method |
CN106330661A (en) * | 2015-06-30 | 2017-01-11 | 郭潇文 | Data centralized processing method |
CN105785858A (en) * | 2016-03-02 | 2016-07-20 | 宇龙计算机通信科技(深圳)有限公司 | Control method and device, and terminal |
CN106407591A (en) * | 2016-09-29 | 2017-02-15 | 常州天合光能有限公司 | Intelligent terminal equipment-based electric energy production simulation APP for photovoltaic system |
CN107800613A (en) * | 2017-07-27 | 2018-03-13 | 平安科技(深圳)有限公司 | E-mail sending method, device, storage medium and computer equipment |
CN110336740A (en) * | 2019-06-30 | 2019-10-15 | 天津中新智冠信息技术有限公司 | A kind of device management method, server and system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113098760A (en) * | 2021-03-30 | 2021-07-09 | 建信金融科技有限责任公司 | Control execution method, device and equipment for intranet operation and storage medium |
CN115622972A (en) * | 2022-12-20 | 2023-01-17 | 广州讯鸿网络技术有限公司 | Process information-based e-mail processing method, system and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20240080311A1 (en) | Managing security credentials | |
US9674175B2 (en) | Proxy server-based network site account management | |
CN105472052B (en) | Cross-domain server login method and system | |
US8776194B2 (en) | Authentication management services | |
US20120252411A1 (en) | Continuous voice authentication for a mobile device | |
CN105024986A (en) | Account login method, device and system | |
CN104125062A (en) | Login method, device, login authentication device, server, terminals and system | |
CN104394133A (en) | Login method and login system | |
CN105450614A (en) | Server account login method, apparatus and system | |
CN107396364B (en) | Method and equipment for carrying out wireless connection pre-authorization on user equipment | |
CN106060072B (en) | Authentication method and device | |
CN111294276A (en) | Mailbox-based remote control method, system, device and medium | |
CN109446093B (en) | Method and device for testing expansion platform interface | |
CN104660401A (en) | Authentication method, authentication system and terminal | |
CN110636038A (en) | Account number analysis method, account number analysis device, security gateway and system | |
US9680814B2 (en) | Method, device, and system for registering terminal application | |
CN103581881A (en) | Comprehensive number-obtaining device as well as system and method for obtaining cell phone number of user on network side | |
CN108600259B (en) | Authentication and binding method of equipment, computer storage medium and server | |
CN103164324A (en) | Microblog test method and device | |
WO2016146007A1 (en) | Method and device for checking verification code | |
WO2019091458A1 (en) | Wireless connection method, wireless access point, terminal, and device having storage function | |
US11777942B2 (en) | Transfer of trust between authentication devices | |
CN110912865A (en) | Security access control method, server and electronic equipment | |
CN108259436A (en) | Authenticating user identification processing method, application server and Verification System server | |
CN111310158A (en) | Third-party system login implementation method, device, equipment and medium based on URL (Uniform resource locator) skip |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200616 |
|
RJ01 | Rejection of invention patent application after publication |