CN111294276A - Mailbox-based remote control method, system, device and medium - Google Patents

Mailbox-based remote control method, system, device and medium Download PDF

Info

Publication number
CN111294276A
CN111294276A CN202010129309.6A CN202010129309A CN111294276A CN 111294276 A CN111294276 A CN 111294276A CN 202010129309 A CN202010129309 A CN 202010129309A CN 111294276 A CN111294276 A CN 111294276A
Authority
CN
China
Prior art keywords
mail
mailbox
authority
control instruction
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010129309.6A
Other languages
Chinese (zh)
Inventor
姜红燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN202010129309.6A priority Critical patent/CN111294276A/en
Publication of CN111294276A publication Critical patent/CN111294276A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/42Mailbox-related aspects, e.g. synchronisation of mailboxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/046Interoperability with other network applications or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network

Abstract

The invention discloses a remote control method based on a mailbox, which comprises the following steps: receiving a mail sent by a first mailbox of a control end, and judging the type of the mail; performing authority verification on the mail in response to the fact that the type of the mail is a remote control type; responding to the mail passing the authority verification, and analyzing the mail to obtain a corresponding control instruction; sending the control instruction to a controlled end; acquiring information generated by a controlled end based on the execution of the control instruction; and sending the information to a second mailbox. The invention also discloses a system, a computer device and a readable storage medium. The scheme provided by the invention can enable the control end to realize remote control on the controlled end only by logging in the mailbox and sending the mail without installing any program.

Description

Mailbox-based remote control method, system, device and medium
Technical Field
The invention relates to the field of remote control, in particular to a remote control method, a system, equipment and a storage medium based on a mailbox.
Background
Along with the continuous development of society, intelligence becomes more and more common in life, and remote operation and control technology is more and more arousing people's attention. Remote control generally supports network modes such as LAN, WAN, dialing mode and Internet mode, and some remote control software also supports serial port, parallel port and infrared port to control the remote machine. The remote control is generally divided into a client program and a server program, and the client program is usually installed on a computer at a main control end, and the server program is installed on a computer at a controlled end. When the remote control system is used, a client program sends a signal to a server program in a controlled computer to establish a special remote service, and then various remote control functions are used for sending remote control commands through the remote service to control various application programs in the controlled computer to run. Therefore, in the prior art, corresponding programs need to be installed at the control end when the remote control is realized, and the realization mode is complicated.
Disclosure of Invention
In view of the above, in order to overcome at least one aspect of the above problems, an embodiment of the present invention provides a mailbox-based remote control method, including the following steps:
receiving a mail sent by a first mailbox of a control end, and judging the type of the mail;
performing authority verification on the mail in response to the fact that the type of the mail is a remote control type;
responding to the mail passing the authority verification, and analyzing the mail to obtain a corresponding control instruction;
sending the control instruction to a controlled end;
acquiring information generated by a controlled end based on the execution of the control instruction;
and sending the information to a second mailbox.
In some embodiments, further comprising:
responding to the type of the mail as an authority application type, and performing identity verification on the mail;
and giving and recording the authority of the mail address and/or the IP address corresponding to the mail in response to the passing of the identity authentication.
In some embodiments, in response to the mail passing the authority verification, parsing the mail to obtain a corresponding control instruction further includes:
judging whether the control instruction can be executed according to the mail address and/or the authority level of the IP address corresponding to the mail;
in response to being able to execute the control instruction, performing subsequent steps;
and responding to the control instruction which cannot be executed, and returning information with insufficient prompting authority to the control terminal.
In some embodiments, sending the information to a second mailbox further comprises:
determining the address, the mail title and the mail text of a second mailbox to be received according to the information;
and generating a mail by using the address of the second mailbox, the mail title and the mail body and sending the mail to the second mailbox.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a mailbox-based remote control system, including:
the receiving module is configured to receive a mail sent by a first mailbox of the control end and judge the type of the mail;
the first response module is configured to respond to the fact that the type of the mail is a remote control type, and conduct authority verification on the mail;
the analysis module is configured to respond to the mail passing the authority verification and analyze the mail to obtain a corresponding control instruction;
the first sending module is configured to send the control instruction to a controlled end;
the acquisition module is configured to acquire information generated by the controlled end based on the execution of the control instruction;
a second sending module configured to send the information to a second mailbox.
In some embodiments, the system further comprises a second response module configured to:
responding to the type of the mail as an authority application type, and performing identity verification on the mail;
and giving and recording the authority of the mail address and/or the IP address corresponding to the mail in response to the passing of the identity authentication.
In some embodiments, the parsing module is further configured to:
judging whether the control instruction can be executed according to the mail address and/or the authority level of the IP address corresponding to the mail;
in response to being able to execute the control instruction, performing subsequent steps;
and responding to the control instruction which cannot be executed, and returning information with insufficient prompting authority to the control terminal.
In some embodiments, the second transmitting module is further configured to:
determining the address, the mail title and the mail text of a second mailbox to be received according to the information;
and generating a mail by using the address of the second mailbox, the mail title and the mail body and sending the mail to the second mailbox.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a computer apparatus, including:
at least one processor; and
a memory storing a computer program operable on the processor, wherein the processor executes the program to perform any of the steps of the mailbox-based remote control method as described above.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a computer-readable storage medium storing a computer program, which when executed by a processor performs the steps of any of the mailbox-based remote control methods as described above.
The invention has one of the following beneficial technical effects: the scheme provided by the invention can enable the control end to realize remote control on the controlled end only by logging in the mailbox and sending the mail without installing any program.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other embodiments can be obtained by using the drawings without creative efforts.
Fig. 1 is a schematic flowchart of a mailbox-based remote control method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a mailbox-based remote control system according to an embodiment of the present invention;
FIG. 3 is a schematic structural diagram of a computer device provided in an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a computer-readable storage medium according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following embodiments of the present invention are described in further detail with reference to the accompanying drawings.
It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are used for distinguishing two entities with the same name but different names or different parameters, and it should be noted that "first" and "second" are merely for convenience of description and should not be construed as limitations of the embodiments of the present invention, and they are not described in any more detail in the following embodiments.
According to an aspect of the present invention, an embodiment of the present invention provides a mailbox-based remote control method, as shown in fig. 1, which may include the steps of: s1, receiving a mail sent by a first mailbox of a control end, and judging the type of the mail; s2, responding to the mail type being remote control type, carrying out authority verification on the mail; s3, responding to the mail passing the authority verification, analyzing the mail to obtain a corresponding control instruction; s4, sending the control instruction to a controlled end; s5, acquiring information generated by the controlled terminal based on the execution of the control command; and S6, sending the information to a second mailbox.
The scheme provided by the invention can enable the control end to realize remote control on the controlled end only by logging in the mailbox and sending the mail without installing any program.
In some embodiments, in step S3, in response to that the mail passes the authority verification, parsing the mail to obtain a corresponding control instruction further includes:
judging whether the control instruction can be executed according to the mail address and/or the authority level of the IP address corresponding to the mail;
in response to being able to execute the control instruction, performing subsequent steps;
and responding to the control instruction which cannot be executed, and returning information with insufficient prompting authority to the control terminal.
Specifically, after receiving the mail sent by the control end, step S2 is performed first to verify the authority of the mail, that is, verify the mail address and/or IP address corresponding to the mail, to determine whether the mail address and/or IP address of the sent mail has the authority for remote control, and only after verifying the authority of the mail address and/or IP address, it is determined that the control end has the control authority, the subsequent mail parsing step is performed, otherwise, the mail is not parsed. When analyzing, the control instruction can be obtained by analyzing the subject and/or the text of the mail.
It should be noted that there may be a plurality of first mailboxes, that is, different control terminals may send mails through a plurality of different mailboxes, and at this time, the mailbox address needs to be verified. In some embodiments, the first mailbox may be one, that is, different control terminals send mails through only one mailbox, and at this time, the IP address of the control terminal sending the mail needs to be verified.
In some embodiments, if different control terminals send mails through a plurality of different mailboxes, different permission levels can be set for the plurality of mailboxes, so that the control permissions corresponding to the different mailboxes are different, and further, corresponding remote control instructions can be executed. For example, both the A mailbox and the B mailbox have control authority, but the A mailbox has lower authority and can only execute the remote control instruction with lower level, and the B mailbox has higher authority and can execute the remote control instruction with higher level.
In some embodiments, if different control terminals send mails through the same mailbox, different permission levels can be set for the IP addresses for sending the mails, so that different IP addresses correspond to different control permissions, and further, corresponding remote control instructions can be executed. For example, both the IP address a and the IP address B have control authority, but the IP address a has lower authority and can only execute the remote control instruction with lower level, and the IP address B has higher authority and can execute the remote control instruction with higher level.
Thus, after the authority level judgment, even if the mail address or the IP address has the authority, the authority level is not enough, and the control command in the mail cannot be executed.
In some embodiments, the method further comprises:
responding to the type of the mail as an authority application type, and performing identity verification on the mail;
and giving and recording the authority of the mail address and/or the IP address corresponding to the mail in response to the passing of the identity authentication.
Specifically, whether remote control is performed through a plurality of mailboxes or remote control is performed through the same mailbox, authority can be applied or authority level can be improved in advance through a mail mode, and both the mail applying the authority and the mail applying the odd-high authority level are the mails of the authority application class. When receiving the mail of the authority application, after verification, the mailbox or IP address corresponding to the mail can be remotely controlled, the authority of the mailbox or IP address corresponding to the mail is given, and response information is returned to inform the control terminal of the existing authority to carry out remote control, and simultaneously inform the control terminal of which remote control can be carried out under the current authority.
In some embodiments, sending the information to a second mailbox further comprises:
determining the address, the mail title and the mail text of a second mailbox to be received according to the information;
and generating a mail by using the address of the second mailbox, the mail title and the mail body and sending the mail to the second mailbox.
Specifically, after the controlled terminal executes the corresponding control instruction, corresponding information (e.g., log information) is generated, and then the information may be sent to the second mailbox by way of an email, where the address, the email header, and the email body of the second mailbox may be generated by using a preset template.
It should be noted that the mailbox address of the first mailbox is different from the mailbox address of the second mailbox, so that the functions of controlling the mailbox (the first mailbox) and monitoring the mailbox (the second mailbox) can be clearer, and the checking is also convenient.
The scheme provided by the invention can ensure that the control end can realize the remote control of the controlled end only by logging in the mailbox and sending the mail without installing any program.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a mailbox-based remote control system 400, as shown in fig. 2, including:
a receiving module 401, configured to receive a mail sent by a first mailbox of a control end by the receiving module 401, and determine a type of the mail;
a first response module 402, wherein the first response module 402 is configured to perform authority verification on the mail in response to the type of the mail being a remote control type;
the analysis module 403, configured to respond to that the email passes the authority verification, and analyze the email to obtain a corresponding control instruction;
a first sending module 404, where the sending module 404 is configured to send the control instruction to a controlled end;
an obtaining module 405, where the obtaining module 405 is configured to obtain information generated by the controlled end based on executing the control instruction;
a second sending module 406, the second sending module 406 configured to send the information to a second mailbox.
In some embodiments, the system 400 further comprises a second response module configured to:
responding to the type of the mail as an authority application type, and performing identity verification on the mail;
and giving and recording the authority of the mail address and/or the IP address corresponding to the mail in response to the passing of the identity authentication.
In some embodiments, the parsing module 403 is further configured to:
judging whether the control instruction can be executed according to the mail address and/or the authority level of the IP address corresponding to the mail;
in response to being able to execute the control instruction, performing subsequent steps;
and responding to the control instruction which cannot be executed, and returning information with insufficient prompting authority to the control terminal.
In some embodiments, the second sending module 406 is further configured to:
determining the address, the mail title and the mail text of a second mailbox to be received according to the information;
and generating a mail by using the address of the second mailbox, the mail title and the mail body and sending the mail to the second mailbox.
Based on the same inventive concept, according to another aspect of the present invention, as shown in fig. 3, an embodiment of the present invention further provides a computer apparatus 501, comprising:
at least one processor 520; and
a memory 510, the memory 510 storing a computer program 511 executable on the processor, the processor 520 executing the program to perform the steps of any of the above mailbox-based remote control methods.
Based on the same inventive concept, according to another aspect of the present invention, as shown in fig. 4, an embodiment of the present invention further provides a computer-readable storage medium 601, where the computer-readable storage medium 601 stores computer program instructions 610, and the computer program instructions 610, when executed by a processor, perform the steps of any of the above mailbox-based remote control methods.
Finally, it should be noted that, as will be understood by those skilled in the art, all or part of the processes of the methods of the above embodiments may be implemented by a computer program to instruct related hardware to implement the methods. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), a Random Access Memory (RAM), or the like. The embodiments of the computer program may achieve the same or similar effects as any of the above-described method embodiments.
In addition, the apparatuses, devices, and the like disclosed in the embodiments of the present invention may be various electronic terminal devices, such as a mobile phone, a Personal Digital Assistant (PDA), a tablet computer (PAD), a smart television, and the like, or may be a large terminal device, such as a server, and the like, and therefore the scope of protection disclosed in the embodiments of the present invention should not be limited to a specific type of apparatus, device. The client disclosed by the embodiment of the invention can be applied to any one of the electronic terminal devices in the form of electronic hardware, computer software or a combination of the electronic hardware and the computer software.
Furthermore, the method disclosed according to an embodiment of the present invention may also be implemented as a computer program executed by a CPU, and the computer program may be stored in a computer-readable storage medium. The computer program, when executed by the CPU, performs the above-described functions defined in the method disclosed in the embodiments of the present invention.
Further, the above method steps and system elements may also be implemented using a controller and a computer readable storage medium for storing a computer program for causing the controller to implement the functions of the above steps or elements.
Further, it should be appreciated that the computer-readable storage media (e.g., memory) herein can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. By way of example, and not limitation, nonvolatile memory can include Read Only Memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which can act as external cache memory. By way of example and not limitation, RAM is available in a variety of forms such as synchronous RAM (DRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The storage devices of the disclosed aspects are intended to comprise, without being limited to, these and other suitable types of memory.
Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the disclosure herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as software or hardware depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the disclosed embodiments of the present invention.
The various illustrative logical blocks, modules, and circuits described in connection with the disclosure herein may be implemented or performed with the following components designed to perform the functions herein: a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination of these components. A general purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP, and/or any other such configuration.
The steps of a method or algorithm described in connection with the disclosure herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside in a user terminal. In the alternative, the processor and the storage medium may reside as discrete components in a user terminal.
In one or more exemplary designs, the functions may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor. Also, any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk and disc, as used herein, includes Compact Disc (CD), laser disc, optical disc, Digital Versatile Disc (DVD), floppy disk, blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
The foregoing is an exemplary embodiment of the present disclosure, but it should be noted that various changes and modifications could be made herein without departing from the scope of the present disclosure as defined by the appended claims. The functions, steps and/or actions of the method claims in accordance with the disclosed embodiments described herein need not be performed in any particular order. Furthermore, although elements of the disclosed embodiments of the invention may be described or claimed in the singular, the plural is contemplated unless limitation to the singular is explicitly stated.
It should be understood that, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly supports the exception. It should also be understood that "and/or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.
The numbers of the embodiments disclosed in the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments.
It will be understood by those skilled in the art that all or part of the steps of implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, and the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant to be exemplary only, and is not intended to intimate that the scope of the disclosure, including the claims, of embodiments of the invention is limited to these examples; within the idea of an embodiment of the invention, also technical features in the above embodiment or in different embodiments may be combined and there are many other variations of the different aspects of the embodiments of the invention as described above, which are not provided in detail for the sake of brevity. Therefore, any omissions, modifications, substitutions, improvements, and the like that may be made without departing from the spirit and principles of the embodiments of the present invention are intended to be included within the scope of the embodiments of the present invention.

Claims (10)

1. A mailbox-based remote control method is characterized by comprising the following steps:
receiving a mail sent by a first mailbox of a control end, and judging the type of the mail;
performing authority verification on the mail in response to the fact that the type of the mail is a remote control type;
responding to the mail passing the authority verification, and analyzing the mail to obtain a corresponding control instruction;
sending the control instruction to a controlled end;
acquiring information generated by a controlled end based on the execution of the control instruction;
and sending the information to a second mailbox.
2. The method of claim 1, further comprising:
responding to the type of the mail as an authority application type, and performing identity verification on the mail;
and giving and recording the authority of the mail address and/or the IP address corresponding to the mail in response to the passing of the identity authentication.
3. The method of claim 1, wherein in response to the mail passing the authority verification, parsing the mail to obtain a corresponding control instruction further comprises:
judging whether the control instruction can be executed according to the mail address and/or the authority level of the IP address corresponding to the mail;
in response to being able to execute the control instruction, performing subsequent steps;
and responding to the control instruction which cannot be executed, and returning information with insufficient prompting authority to the control terminal.
4. The method of claim 1, wherein the information is sent to a second mailbox, further comprising:
determining the address, the mail title and the mail text of a second mailbox to be received according to the information;
and generating a mail by using the address of the second mailbox, the mail title and the mail body and sending the mail to the second mailbox.
5. A mailbox-based remote control system, comprising:
the receiving module is configured to receive a mail sent by a first mailbox of the control end and judge the type of the mail;
the first response module is configured to respond to the fact that the type of the mail is a remote control type, and conduct authority verification on the mail;
the analysis module is configured to respond to the mail passing the authority verification and analyze the mail to obtain a corresponding control instruction;
the first sending module is configured to send the control instruction to a controlled end;
the acquisition module is configured to acquire information generated by the controlled end based on the execution of the control instruction;
a second sending module configured to send the information to a second mailbox.
6. The system of claim 5, further comprising a second response module configured to:
responding to the type of the mail as an authority application type, and performing identity verification on the mail;
and giving and recording the authority of the mail address and/or the IP address corresponding to the mail in response to the passing of the identity authentication.
7. The system of claim 5, wherein the parsing module is further configured to:
judging whether the control instruction can be executed according to the mail address and/or the authority level of the IP address corresponding to the mail;
in response to being able to execute the control instruction, performing subsequent steps;
and responding to the control instruction which cannot be executed, and returning information with insufficient prompting authority to the control terminal.
8. The system of claim 5, wherein the second transmission module is further configured to:
determining the address, the mail title and the mail text of a second mailbox to be received according to the information;
and generating a mail by using the address of the second mailbox, the mail title and the mail body and sending the mail to the second mailbox.
9. A computer device, comprising:
at least one processor; and
memory storing a computer program operable on the processor, characterized in that the processor executes the program to perform the steps of the method according to any of claims 1-4.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, is adapted to carry out the steps of the method according to any one of claims 1-4.
CN202010129309.6A 2020-02-28 2020-02-28 Mailbox-based remote control method, system, device and medium Pending CN111294276A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010129309.6A CN111294276A (en) 2020-02-28 2020-02-28 Mailbox-based remote control method, system, device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010129309.6A CN111294276A (en) 2020-02-28 2020-02-28 Mailbox-based remote control method, system, device and medium

Publications (1)

Publication Number Publication Date
CN111294276A true CN111294276A (en) 2020-06-16

Family

ID=71026688

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010129309.6A Pending CN111294276A (en) 2020-02-28 2020-02-28 Mailbox-based remote control method, system, device and medium

Country Status (1)

Country Link
CN (1) CN111294276A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113098760A (en) * 2021-03-30 2021-07-09 建信金融科技有限责任公司 Control execution method, device and equipment for intranet operation and storage medium
CN115622972A (en) * 2022-12-20 2023-01-17 广州讯鸿网络技术有限公司 Process information-based e-mail processing method, system and device

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040088364A1 (en) * 2002-10-30 2004-05-06 Kabushiki Kaisha Toshiba Apparatus and method for controlling electronic devices
CN1536458A (en) * 2003-04-11 2004-10-13 ������ͨ�Ƽ��������ι�˾ System and method for managing remote computer access host
US20050278428A1 (en) * 2002-05-13 2005-12-15 Tetsuro Motoyama Verification scheme for email message containing information about remotely monitored devices
CN101222353A (en) * 2006-12-29 2008-07-16 霍尼韦尔国际公司 Remote control of a security system using e-mail
CN101437050A (en) * 2008-11-27 2009-05-20 四川长虹电器股份有限公司 Player remote control system and player remote control method
CN102143208A (en) * 2010-12-24 2011-08-03 Tcl集团股份有限公司 Remote control method and system for intelligent terminal
US20130262603A1 (en) * 2012-03-28 2013-10-03 Casio Computer Co., Ltd. Data processing apparatus and computer readable medium
US20140089376A1 (en) * 2012-09-27 2014-03-27 John T. Caldas Control of applications installed on a remote device
CN105023137A (en) * 2015-04-29 2015-11-04 杭州猿人数据科技有限公司 E-mail evidence processing system and processing method
CN105785858A (en) * 2016-03-02 2016-07-20 宇龙计算机通信科技(深圳)有限公司 Control method and device, and terminal
CN106330661A (en) * 2015-06-30 2017-01-11 郭潇文 Data centralized processing method
CN106407591A (en) * 2016-09-29 2017-02-15 常州天合光能有限公司 Intelligent terminal equipment-based electric energy production simulation APP for photovoltaic system
US20170215051A1 (en) * 2011-09-19 2017-07-27 Microsoft Technology Licensing, Llc Remote access to a mobile communication device over a wireless local area network (wlan)
CN107800613A (en) * 2017-07-27 2018-03-13 平安科技(深圳)有限公司 E-mail sending method, device, storage medium and computer equipment
CN110336740A (en) * 2019-06-30 2019-10-15 天津中新智冠信息技术有限公司 A kind of device management method, server and system

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050278428A1 (en) * 2002-05-13 2005-12-15 Tetsuro Motoyama Verification scheme for email message containing information about remotely monitored devices
US20040088364A1 (en) * 2002-10-30 2004-05-06 Kabushiki Kaisha Toshiba Apparatus and method for controlling electronic devices
CN1536458A (en) * 2003-04-11 2004-10-13 ������ͨ�Ƽ��������ι�˾ System and method for managing remote computer access host
CN101222353A (en) * 2006-12-29 2008-07-16 霍尼韦尔国际公司 Remote control of a security system using e-mail
CN101437050A (en) * 2008-11-27 2009-05-20 四川长虹电器股份有限公司 Player remote control system and player remote control method
CN102143208A (en) * 2010-12-24 2011-08-03 Tcl集团股份有限公司 Remote control method and system for intelligent terminal
US20170215051A1 (en) * 2011-09-19 2017-07-27 Microsoft Technology Licensing, Llc Remote access to a mobile communication device over a wireless local area network (wlan)
CN106603385A (en) * 2012-03-28 2017-04-26 卡西欧计算机株式会社 Mail receiving apparatus and mail receiving method
US20130262603A1 (en) * 2012-03-28 2013-10-03 Casio Computer Co., Ltd. Data processing apparatus and computer readable medium
US20140089376A1 (en) * 2012-09-27 2014-03-27 John T. Caldas Control of applications installed on a remote device
CN105023137A (en) * 2015-04-29 2015-11-04 杭州猿人数据科技有限公司 E-mail evidence processing system and processing method
CN106330661A (en) * 2015-06-30 2017-01-11 郭潇文 Data centralized processing method
CN105785858A (en) * 2016-03-02 2016-07-20 宇龙计算机通信科技(深圳)有限公司 Control method and device, and terminal
CN106407591A (en) * 2016-09-29 2017-02-15 常州天合光能有限公司 Intelligent terminal equipment-based electric energy production simulation APP for photovoltaic system
CN107800613A (en) * 2017-07-27 2018-03-13 平安科技(深圳)有限公司 E-mail sending method, device, storage medium and computer equipment
CN110336740A (en) * 2019-06-30 2019-10-15 天津中新智冠信息技术有限公司 A kind of device management method, server and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113098760A (en) * 2021-03-30 2021-07-09 建信金融科技有限责任公司 Control execution method, device and equipment for intranet operation and storage medium
CN115622972A (en) * 2022-12-20 2023-01-17 广州讯鸿网络技术有限公司 Process information-based e-mail processing method, system and device

Similar Documents

Publication Publication Date Title
US20240080311A1 (en) Managing security credentials
US9674175B2 (en) Proxy server-based network site account management
CN105472052B (en) Cross-domain server login method and system
US8776194B2 (en) Authentication management services
US20120252411A1 (en) Continuous voice authentication for a mobile device
CN105024986A (en) Account login method, device and system
CN104125062A (en) Login method, device, login authentication device, server, terminals and system
CN104394133A (en) Login method and login system
CN105450614A (en) Server account login method, apparatus and system
CN107396364B (en) Method and equipment for carrying out wireless connection pre-authorization on user equipment
CN106060072B (en) Authentication method and device
CN111294276A (en) Mailbox-based remote control method, system, device and medium
CN109446093B (en) Method and device for testing expansion platform interface
CN104660401A (en) Authentication method, authentication system and terminal
CN110636038A (en) Account number analysis method, account number analysis device, security gateway and system
US9680814B2 (en) Method, device, and system for registering terminal application
CN103581881A (en) Comprehensive number-obtaining device as well as system and method for obtaining cell phone number of user on network side
CN108600259B (en) Authentication and binding method of equipment, computer storage medium and server
CN103164324A (en) Microblog test method and device
WO2016146007A1 (en) Method and device for checking verification code
WO2019091458A1 (en) Wireless connection method, wireless access point, terminal, and device having storage function
US11777942B2 (en) Transfer of trust between authentication devices
CN110912865A (en) Security access control method, server and electronic equipment
CN108259436A (en) Authenticating user identification processing method, application server and Verification System server
CN111310158A (en) Third-party system login implementation method, device, equipment and medium based on URL (Uniform resource locator) skip

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200616

RJ01 Rejection of invention patent application after publication