CN114286296A - Remote control method, server, controlled device, system, device, and medium - Google Patents

Remote control method, server, controlled device, system, device, and medium Download PDF

Info

Publication number
CN114286296A
CN114286296A CN202111525980.3A CN202111525980A CN114286296A CN 114286296 A CN114286296 A CN 114286296A CN 202111525980 A CN202111525980 A CN 202111525980A CN 114286296 A CN114286296 A CN 114286296A
Authority
CN
China
Prior art keywords
control command
server
short message
controlled
controlled equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111525980.3A
Other languages
Chinese (zh)
Inventor
王华涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cloudminds Robotics Co Ltd
Original Assignee
Cloudminds Robotics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cloudminds Robotics Co Ltd filed Critical Cloudminds Robotics Co Ltd
Priority to CN202111525980.3A priority Critical patent/CN114286296A/en
Publication of CN114286296A publication Critical patent/CN114286296A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the invention relates to the technical field of control, in particular to a remote control method, a server, controlled equipment, a system, equipment and a medium. The remote control method is applied to a server and comprises the following steps: generating a control command; and under the condition that a mobile data network of the controlled equipment is unavailable, the control command is issued to the controlled equipment through a short message so as to control the controlled equipment to act. Under the condition that the mobile data network of the controlled equipment is unavailable, the server can still carry out remote control on the controlled equipment, the dependence of the remote control on the mobile data network is overcome, and the controlled equipment is prevented from being out of control.

Description

Remote control method, server, controlled device, system, device, and medium
Technical Field
The embodiment of the invention relates to the technical field of control, in particular to a remote control method, a server, controlled equipment, a system, equipment and a medium.
Background
Smart devices sometimes need to be remotely managed, such as the robot needs to respond to performance testing tasks from the robot supplier. Remote control relies on communication between the server and the controlled device, i.e. the controlled device is required to connect to the network. At present, two ways of accessing to the network are provided for the controlled device, one is accessing to WiFi, and the other is accessing to a mobile data network provided by a mobile communication operator, so that in a place where WiFi cannot be covered, information can be sent and received through the mobile data network provided by the mobile communication operator, and the controlled device can still be controlled through the server.
However, when the coverage of the mobile data signal provided by the mobile communication operator is poor or the hardware of the controlled device fails, the controlled device is likely to fail to use the mobile data network normally, and thus cannot communicate with the server, which eventually leads to the uncontrolled device.
Disclosure of Invention
Embodiments of the present invention provide a remote control method, a server, a controlled device, a system, a device, and a medium, so that the server can still control the controlled device when a mobile data network of the controlled device is unavailable, thereby avoiding the controlled device from being out of control.
In order to achieve the above object, an embodiment of the present invention provides a remote control method applied to a server, including: generating a control command; and under the condition that a mobile data network of the controlled equipment is unavailable, the control command is issued to the controlled equipment through a short message so as to control the controlled equipment to act.
In order to achieve the above object, an embodiment of the present invention further provides a remote control method applied to a controlled device, including: receiving a control command sent by a server through a short message; and performing action according to the control command.
To achieve the above object, an embodiment of the present invention further provides a server, including: the generating module is used for generating a control command; and the sending module is used for sending the control command to the controlled equipment through a short message under the condition that a mobile data network of the controlled equipment is unavailable so as to control the controlled equipment to act.
To achieve the above object, an embodiment of the present invention further provides a controlled apparatus, including: the receiving module is used for receiving a control command sent by the server through a short message; and the execution module is used for acting according to the control command.
To achieve the above object, an embodiment of the present invention further provides a remote control system, including: a server as described above, and a number of controlled devices as described above.
To achieve the above object, an embodiment of the present invention further provides an electronic device, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a remote control method as claimed in any one of the preceding claims.
To achieve the above object, an embodiment of the present invention further provides a computer-readable storage medium storing a computer program, which when executed by a processor, implements the remote control method as described in any one of the above.
According to the remote control method provided by the embodiment of the invention, the server generates the control command which needs to be issued to the controlled equipment, and then issues the control command to the controlled equipment through the short message under the condition that the mobile data network of the controlled equipment is determined to be unavailable. The dependence of communication between the server and the controlled equipment on the mobile data network is overcome, and even if the mobile data network is unavailable, the server can still issue a control command to the controlled equipment, so that the controlled equipment is controlled, and the controlled equipment is prevented from being out of control.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the figures in which like reference numerals refer to similar elements and which are not to scale unless otherwise specified.
Fig. 1 is a flowchart of a remote control method provided in an embodiment of the present invention;
FIG. 2 is a flow chart of a remote control method provided in another embodiment of the present invention;
fig. 3 is a schematic structural diagram of a server provided in another embodiment of the present invention;
fig. 4 is a schematic structural view of a controlled apparatus provided in another embodiment of the present invention;
fig. 5 is a schematic structural diagram of a remote control system provided in another embodiment of the present invention;
fig. 6 is a schematic structural diagram of an electronic device provided in another embodiment of the present invention.
Detailed Description
As known in the background art, communication between a server and a controlled device currently depends on a mobile data network, and particularly, in a place where WiFi coverage is not available, communication can be performed only through the mobile data network. However, this causes a problem that the server cannot communicate with the controlled device when the mobile data network is unavailable, which eventually leads to the uncontrolled device.
Analysis shows that the unavailability of the mobile data network of the controlled device does not mean that contact with the outside world is completely unavailable. In particular, when the mobile data network of the controlled device is not available, the mobile data network cannot be used, and the signaling channel of the controlled device may still be available, for example, the controlled device may send and receive short messages through a signaling system No. 7 or the like.
In order to solve the above problem, an embodiment of the present invention provides a remote control method, which is applied to a server, and includes: generating a control command; and under the condition that a mobile data network of the controlled equipment is unavailable, the control command is issued to the controlled equipment through a short message so as to control the controlled equipment to act.
According to the remote control method provided by the embodiment of the invention, when the mobile data network of the controlled equipment is unavailable, the cloud end enables the signaling channel between the cloud end and the controlled equipment to send the control command to the controlled equipment in a short message mode through the signaling channel, so that the controlled equipment can still receive the control command sent by the cloud end to act, namely still be in a controlled state and not be out of control, and the dependence of remote control on the mobile data network is overcome.
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the embodiments of the present invention will be described in detail with reference to the accompanying drawings. However, it will be appreciated by those of ordinary skill in the art that in various embodiments of the invention, numerous technical details are set forth in order to provide a better understanding of the present invention. However, the claimed invention may be practiced without these specific details or with various changes and modifications based on the following embodiments.
The following embodiments are divided for convenience of description, and should not constitute any limitation to the specific implementation manner of the present invention, and the embodiments may be mutually incorporated and referred to without contradiction.
An embodiment of the present invention provides a remote control method, which is applied to a server, and a flow of the remote control method is shown in fig. 1, where the remote control method includes:
step 101, generating a control command.
In this embodiment, the control command is mainly used to instruct the controlled device to execute a specified task, where the control command may be generated by the server according to a received user command, or may be generated autonomously by the server. The format, type, etc. of the control command are not limited in the present embodiment.
In some examples, generating the control command may be implemented as follows: receiving a user command, wherein the user command can be sent to the server by a user terminal, or the setting of a user on an interactive interface provided by the server can be transmitted to the server through an interface; analyzing a user command to obtain at least one instruction, wherein the user command may be analyzed into different numbers of instructions along with the change of the complexity of a task indicated by the user command or the complexity of a task execution condition, for example, a capture task may be analyzed into a plurality of instructions such as environment analysis, target positioning, motion planning and the like, and when each instruction is simpler and clearer, the subsequent coding pressure is smaller and the efficiency is higher; and coding the obtained instruction according to a pre-stored data dictionary to obtain an instruction set, wherein the data dictionary is agreed by the controlled equipment and the server together, and the agreed mode can be that the data dictionary is predefined in the system when the controlled equipment and other equipment are deployed or started, or the server periodically sends the data dictionary to the controlled equipment to ensure that the same data dictionary is used for server coding and controlled equipment decoding. In particular, in consideration of security in data dictionary transmission, it may be required that the server issues the data dictionary to the controlled device through a Virtual Private Network (VPN) tunnel in the mobile data Network when the mobile data Network of the controlled device is available.
It is worth mentioning that encoding according to the data dictionary can enhance the concealment of the control command, and even if the intercepted or sent error is lack of the correct data dictionary, the correct information cannot be analyzed, so that information leakage cannot occur, and encrypted transmission is realized. And the control instruction of the subsequent controlled equipment can be issued in a short message mode, and one short message can only support 160 characters, and the command length can be shortened according to the data dictionary code.
To facilitate a better understanding of the encoding according to a data dictionary, the following is illustrated, wherein the various definitions in the data dictionary are shown in the following table:
before coding After being coded Code length
Software S 1
Hardware H 1
Command A 1
Command connector C 1
Table 1 code definition table for information statements
Before coding After being coded Code length
Wireless network card 001 3
Camera head 002 3
Microphone (CN) 003 3
TABLE 2 code definition table for hardware operands
Before coding After being coded Code length
VPN application 001 3
Media player 002 3
TABLE 3 code definition table of software operation object
Before coding After being coded Code length
01 Restarting 2
00 Starting up 2
02 Stop 2
Table 4 code definition table of operations
The structure of an instruction may be defined as: software and hardware type + operation object + operation, different instructions, different operation objects and different operations can be connected by a command connector, for example, two instructions are coded as: the software and hardware type of the first instruction + the operation object of the first instruction + the operation of the first instruction + the command connector + the software and hardware type of the second instruction + the operation object of the second instruction + the operation of the second instruction, and a certain instruction is coded as follows: the software and hardware type of the first operation object + the command connector + the software and hardware type of the second operation object + the operation instruction and the like. Of course, some declaration information may also be inserted into the above structure, such as a start identifier for starting description of operation information added between an operation object and an operation from the end of the operation object description in an instruction.
For example, a user command indicates the controlled device to restart the network card, at this time, the user command is analyzed, and a command, that is, the network card is restarted, can be determined, where the software and hardware type is hardware, the operation object is the network card, and the operation action is restart, and then the encoded control command can be expressed as: h001a 01; the user command indicates the controlled device to open the VPN, at this time, the user command is analyzed, and a command can be determined, that is, the VPN is opened, wherein the software and hardware type is software, the operation object is a VPN application, and the operation action is open, then the encoded control command can be expressed as: s001a 01; the user command instructs the controlled device to restart the network card and start the VPN, at this time, the user command is analyzed, two instructions can be determined, under the condition that no special statement or no sequence exists, different instructions are encoded according to the sequence in the user command, and the encoded control command can be expressed as: h001a01CS001a 01. It should be noted that a in the above coding result is used to declare the content of the operation to be described.
It should be noted that the codes defined by the data dictionary pre-stored by the server at least need to cover the configured software and hardware devices of all the controlled devices controlled by the server and the supportable operations of the devices, so as to support the server to control the controlled devices controlled by the server. However, the data dictionary pre-stored in each controlled device at least needs to cover each software and hardware device configured by the controlled device and the operation supportable by each device, so as to support the response of the controlled device to the instruction issued by the server. Of course, the data dictionary pre-stored by the controlled device may be the same as the data dictionary pre-stored by the server. Whether they are the same or not, they are called the database dictionary agreed by the server and the controlled device together, and are not described herein.
It should be noted that the data dictionary needs to have a certain margin for defining the code to ensure the extension of the data dictionary, and after the controlled device adds devices and applications, the data dictionary can still be extended to achieve normal control.
And 102, under the condition that a mobile data network of the controlled equipment is unavailable, issuing a control command to the controlled equipment through a short message to control the controlled equipment to act.
It can be understood that when the mobile data network is unavailable, only other communication modes are required to normally receive and transmit the control command, and therefore, considering that the signaling channel between the controlled device and the server may still be available, at this time, the transmission channel of the control command may be adjusted from the original mobile data network to the signaling channel, that is, the channel for transmitting the short message, so that the control command is transmitted to the controlled device in a short message manner, instead of only depending on the mobile data network, and when the mobile data network is unavailable, only the control over the controlled device is given up, resulting in the problem of runaway of the controlled device.
Particularly, when issuing a control instruction to a controlled device, it is desirable to have a certain security protection capability to avoid the occurrence of problems such as tampering of a control command.
Based on this, in some examples, before issuing the control command to the controlled device by the short message, the remote control method further includes: and encrypting the control command according to a preset encryption key, wherein the encryption key and a decryption key corresponding to the encryption key are agreed by the controlled equipment and the server together, so that the controlled equipment can accurately decode and execute the encrypted control command after receiving the encrypted control command. Certainly, the agreed mode may be predefined in the system when the controlled device and other devices are deployed, or the server periodically issues an encryption/decryption key and the like to the controlled device, so as to ensure that the server can accurately decrypt the encrypted information sent by the other party when encoding and decoding the controlled device. In particular, in consideration of security during transmission, when the mobile data network of the controlled device is available, the server may be required to issue the encryption and decryption keys to the controlled device through the mobile data network, and different controlled devices may use different sets of encryption and decryption keys, and the like, which is not described herein any more. Correspondingly, the control command is issued to the controlled equipment through the short message, and the method comprises the following steps: and sending the encrypted control command to the controlled equipment through a short message.
It should be noted that the encryption key in the server corresponds to the decryption key in the controlled device, and in consideration of the fact that the controlled device actively sends a message to the server through a short message, the controlled device also needs the encryption key and the server also needs the decryption key, and at this time, the decryption key in the server corresponds to the encryption key in the controlled device. However, the present embodiment does not limit whether the decryption key in the server and the encryption key in the controlled device correspond to the encryption key in the server and the decryption key in the controlled device, and the same set of encryption and decryption keys may be used or may not be used.
In other examples, before issuing the control command to the controlled device by the short message, the remote control method further includes: the token is added to the control command, wherein the token is generated by the controlled device and reported to the server by the controlled device, and particularly, in order to guarantee the security of the token, the token can be reported to the server by the controlled device through the mobile data network when the mobile data network is available. Correspondingly, the control command is issued to the controlled equipment through the short message, and the method comprises the following steps: and issuing the control command with the attached token to the controlled equipment through the short message, so that the controlled equipment can verify the control command according to the token attached to the control command.
It can be understood that the three situations are implementation manners proposed for improving the security of the control command, and in other examples, the three situations may be combined, for example, a token is added while the control command is encrypted, and details are not repeated here.
Certainly, the controlled device may issue the control command through the short message when the short message function of the controlled device is available, and the controlled device cannot receive the control command when the short message function is unavailable, so that before the control command is issued to the controlled device through the short message, the remote control method further includes: and sending a query request to the controlled equipment through the short message, so that the controlled equipment can detect whether the short message function is available according to the query request. Correspondingly, the control command is issued to the controlled equipment through the short message, and the method comprises the following steps: and after receiving the short message function available response returned by the controlled equipment, sending a control command to the controlled equipment through a short message. Of course, under the condition that no response is received within a certain time, the server may determine that the short message function of the controlled device is unavailable, and no control command is issued. Furthermore, when the short message function of the controlled device is unavailable, the server controlled device may also perform an alarm, so that the related user or operation and maintenance personnel may perform maintenance and the like on the controlled device.
It is understood that the mobile data network of the controlled device may not always be available, and in case the mobile data network of the controlled device is available, it may be prioritized to issue the control command using the mobile data network. In particular, in order to improve the security of issuing the control command through the mobile data network, in the case that the mobile data network of the controlled device is available, the control command is issued to the controlled device through a VPN tunnel in the mobile data network to control the controlled device to perform an action, wherein the VPN tunnel may be provided at the server.
It can also be understood that, before issuing the control command, the server may first detect whether the mobile data network of the controlled device is available, in the case that the mobile data network is available, issue the control command through the mobile data network, and in the case that the mobile data network is unavailable, issue the control command through a short message, where detecting whether the mobile data network of the controlled device is available may be to send data to the controlled device through the mobile data network, and the like.
Based on this, in some examples, the controlled device establishes a heartbeat link with the server mobile data network, such as a heartbeat connection over a VPN tunnel, and at this time, after the control command is generated, the remote control method further includes: and detecting whether the mobile data network of the controlled equipment is available according to the state of the heartbeat connection, wherein the mobile data network is judged to be available under the condition that the heartbeat link is in a connected state, and the mobile data network is judged to be unavailable under the condition that the heartbeat link is in a disconnected state.
In other examples, after generating the control command, the remote control method further comprises: the method comprises the steps of sending an inquiry request to controlled equipment through a mobile data network, detecting whether the mobile data network of the controlled equipment is available according to whether the controlled equipment responds to the inquiry request, judging whether the mobile data network of the controlled equipment is unavailable under the condition that the controlled equipment does not respond within a certain time, judging whether the quality of the mobile data network returned by the controlled equipment meets a preset quality condition or not under the condition that the controlled equipment responds, judging that the mobile data network of the controlled equipment is available under the condition that the preset quality condition is met, and judging that the mobile data network of the controlled equipment is unavailable under the condition that the preset quality condition is not met.
It should be noted that, in the above example, after the control command is generated, it is described as an example to detect whether the mobile data network of the controlled device is available, in other embodiments, the generation of the control command and the detection of the availability of the mobile data network may occur simultaneously, or it is detected first whether the mobile data network of the controlled device is available, and then the control command is generated, which is not described herein again.
In another aspect, the embodiment of the present invention further provides a remote control method, which is applied to a controlled device, where the controlled device may be an electronic device such as a robot, a mechanical arm, or a computer. The flow of the remote control method is shown in fig. 2, and includes:
step 201, receiving a control command sent by a server through a short message.
In this embodiment, since the controlled short message is sent by a short message, when the control command is received in the form of a short message, the controlled device may also be required to detect the received short message according to a certain policy, and screen the short message where the obtained control command is located from the common short message.
Of course, since the server issues the control command through the mobile data network when the mobile data network of the controlled device is available, the controlled device is also subjected to the control command issued by the server through the mobile data network. The present embodiment is mainly directed to a remote control method in a scenario where a mobile data network of a controlled device is unavailable, and does not mean that the controlled device according to the present embodiment can only receive a control command issued by a short message.
It is understood that, in the case where the controlled device receives the control command transmitted by the short message, the server may need to detect whether the short message function of the controlled device is available before issuing the control command. Based on this, in some examples, before receiving the control command, the remote control method further includes: receiving a query request issued by a server, and triggering a process of detecting whether a short message function is available or not after the controlled equipment receives the query request, namely detecting whether the short message function is available or not according to the request of the server; and returning a short message function available response to the server under the condition of detecting that the short message function is available. Then, the server will issue a control command under the condition of obtaining the available response of the short message function, and the controlled device will receive the control command issued by the server. And when the short message function is detected to be unavailable, the controlled equipment does not receive the query request sent by the server and does not generate a response, or when the short message function is available, the query request can be received, but before the response is sent, the short message function becomes unavailable and cannot respond. And when the server does not receive the response of the controlled equipment, the server does not issue the control command any more, and the controlled equipment does not receive the control command.
Of course, after receiving the query request issued by the cloud server, the controlled device may preferentially check whether the mobile data network of the controlled device is available, and when the mobile data network of the controlled device is available, return a mobile data network available response to the server, so that the server triggers a process of sending a control command through mobile network data according to the mobile data network available response. It should be noted that the mobile data network availability mentioned here is understood to mean that the mobile data network is restored from unavailable to available. And when the mobile data network of the mobile terminal is unavailable, continuously detecting whether the short message function is available.
It should be noted that, when the response result of the query request is a mobile data network data available response, the controlled device may directly return a response through the VPN tunnel, and when the response result of the query request is a short message function available response, the controlled device returns a response through a short message, at this time, the controlled device may also encrypt the response, encode the response according to a data dictionary, or attach a token, which is generated by the server and issued by the server only, so that the server decrypts, or verifies the received response, and the like. Therefore, it is easy to see that, at this time, the server is the receiver, the controlled device is the sender, and the steps that the receiver and the sender need to execute at this time are similar to the steps in the scenario where the server sends information and the controlled device is the receiver, and are not described here any more.
Step 202, according to the control command, the operation is performed.
The embodiment does not limit the way of the controlled device responding to the control command, and the related tasks can be completed according to the instruction of the control command.
In some examples, since the control command issued by the server is encoded according to the data dictionary, before execution, the received control command needs to be decoded first, that is, before acting according to the control command, the remote control method further includes: and decoding the control command according to a data dictionary, wherein the data dictionary is agreed by the controlled equipment and the server together. Correspondingly, acting according to the control command comprises: and performing action according to the decoded control command.
In other examples, the controlled device detects that the control command is encrypted, and therefore, before executing, it needs to decrypt the received control command, that is, before acting according to the control command, the remote control method further includes: decrypting the control command according to a pre-stored decryption key; the decryption key and the encryption key corresponding to the decryption key are both agreed by the controlled device and the server together. Correspondingly, acting according to the control command comprises: and performing action according to the decrypted control command.
In still other examples, the controlled device detects that the control command also carries the token, and therefore, before executing, a check needs to be performed to determine whether the control command is safe and reliable, that is, before performing an action according to the control command, the remote control method further includes: and verifying the control command according to the received token, wherein the received token can be matched with a non-invalid token issued by the control command, if the matching is successful, the verification is judged to be passed, and if the matching is failed, the verification is judged to be not passed. Correspondingly, acting according to the control command comprises: and when the control command passes the verification, performing action according to the control command. Of course, in the case where the control command fails the verification, the control command is discarded.
It can be understood that the server may determine two or three ways to process the control command according to the data dictionary encoding, the encrypting, and the additional token, and accordingly, the controlled device needs to analyze the received control command into an executable instruction through corresponding operations in the data dictionary decoding, and the token checking, so as to perform an action according to the executable instruction, which is not described herein any more.
The steps of the above methods are divided for clarity, and the implementation may be combined into one step or split some steps, and the steps are divided into multiple steps, so long as the same logical relationship is included, which are all within the protection scope of the present patent; it is within the scope of the patent to add insignificant modifications to the algorithms or processes or to introduce insignificant design changes to the core design without changing the algorithms or processes.
Another aspect of the embodiments of the present invention further provides a server, as shown in fig. 3, including:
a generating module 301, configured to generate a control command.
The sending module 302 is configured to issue a control command to the controlled device through a short message to control the controlled device to perform an action when the mobile data network of the controlled device is unavailable.
It should be noted that, in some examples, in a cloud collaboration scenario, the functional modules are specifically deployed on a cloud server, that is, the server is a cloud server, so that the cloud server controls the controlled terminal device, which is not described herein any more.
It is to be understood that this embodiment is a server embodiment corresponding to the first method embodiment, and that this embodiment may be implemented in cooperation with the first method embodiment. The related technical details mentioned in the first method embodiment are still valid in this embodiment, and are not described herein again in order to reduce repetition. Accordingly, the related-art details mentioned in the present embodiment can also be applied to the first method embodiment.
It should be noted that, all the modules involved in this embodiment are logic modules, and in practical application, one logic unit may be one physical unit, may also be a part of one physical unit, and may also be implemented by a combination of multiple physical units. In addition, in order to highlight the innovative part of the present invention, a unit which is not so closely related to solve the technical problem proposed by the present invention is not introduced in the present embodiment, but this does not indicate that there is no other unit in the present embodiment.
Another aspect of the embodiments of the present invention further provides a controlled device, as shown in fig. 4, including:
the receiving module 401 is configured to receive a control command sent by a server through a short message.
And an executing module 402, configured to perform an action according to the control command.
In particular, the functional module is deployed on a robot, that is, the controlled device is a robot, so as to implement remote control of the robot, which is not described herein any more.
It should be understood that this embodiment is a robot embodiment corresponding to the second embodiment, and that this embodiment can be implemented in cooperation with the second embodiment. The related technical details mentioned in the second method embodiment are still valid in this embodiment, and are not described herein again in order to reduce repetition. Accordingly, the related art details mentioned in the present embodiment can also be applied to the second method embodiment.
It should be noted that, all the modules involved in this embodiment are logic modules, and in practical application, one logic unit may be one physical unit, may also be a part of one physical unit, and may also be implemented by a combination of multiple physical units. In addition, in order to highlight the innovative part of the present invention, a unit which is not so closely related to solve the technical problem proposed by the present invention is not introduced in the present embodiment, but this does not indicate that there is no other unit in the present embodiment.
Another aspect of the embodiments of the present invention further provides a remote control system, as shown in fig. 5, including: an end server and a plurality of controlled devices.
The server is used for generating a control command; detecting whether a mobile data network of a controlled device is available; under the condition that a mobile data network of the controlled equipment is available, a control command is issued to the controlled equipment through a VPN tunnel in the mobile data network so as to control the controlled equipment to act; and under the condition that the mobile data network of the controlled equipment is unavailable, transmitting a control command to the controlled equipment through the short message so as to control the controlled equipment to act. The controlled device is used for receiving a control command, and the control command is issued by the server according to the mode; and performing action according to the control command.
Particularly, the server can be a cloud server, and the controlled device can be a robot, so that the robot is cooperatively controlled based on the cloud server, and the method is more efficient, rapid and accurate.
It should be understood that the present embodiment is a system embodiment corresponding to the method embodiment, and the present embodiment can be implemented in cooperation with the method embodiment. The related technical details mentioned in the method embodiment are still valid in this embodiment, and are not described herein again in order to reduce repetition. Accordingly, the related art details mentioned in the present embodiment can also be applied in the method embodiment.
It should be noted that, all the modules involved in this embodiment are logic modules, and in practical application, one logic unit may be one physical unit, may also be a part of one physical unit, and may also be implemented by a combination of multiple physical units. In addition, in order to highlight the innovative part of the present invention, a unit which is not so closely related to solve the technical problem proposed by the present invention is not introduced in the present embodiment, but this does not indicate that there is no other unit in the present embodiment.
Another aspect of the embodiments of the present invention further provides an electronic device, as shown in fig. 6, including: at least one processor 601; and a memory 602 communicatively coupled to the at least one processor 601; the memory 602 stores instructions executable by the at least one processor 601, and the instructions are executed by the at least one processor 601 to enable the at least one processor 601 to perform the remote control method described in any of the above method embodiments.
Where the memory 602 and the processor 601 are coupled by a bus, the bus may comprise any number of interconnected buses and bridges that couple one or more of the various circuits of the processor 601 and the memory 602 together. The bus may also connect various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface provides an interface between the bus and the transceiver. The transceiver may be one element or a plurality of elements, such as a plurality of receivers and transmitters, providing a means for communicating with various other apparatus over a transmission medium. The data processed by the processor 601 is transmitted over a wireless medium via an antenna, which further receives the data and transmits the data to the processor 601.
The processor 601 is responsible for managing the bus and general processing and may also provide various functions including timing, peripheral interfaces, voltage regulation, power management, and other control functions. While memory 602 may be used to store data used by processor 601 in performing operations.
In another aspect, an embodiment of the present invention further provides a computer-readable storage medium storing a computer program. The computer program, when executed by a processor, implements the remote control method described in any of the method embodiments.
That is, those skilled in the art can understand that all or part of the steps in the method according to the above embodiments may be implemented by a program instructing related hardware, where the program is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a processor (processor) to execute all or part of the steps in the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific embodiments for practicing the invention, and that various changes in form and details may be made therein without departing from the spirit and scope of the invention in practice.

Claims (18)

1. A remote control method is applied to a server and comprises the following steps:
generating a control command;
and under the condition that a mobile data network of the controlled equipment is unavailable, the control command is issued to the controlled equipment through a short message so as to control the controlled equipment to act.
2. The remote control method of claim 1, wherein the generating a control command comprises:
receiving a user command;
analyzing the user command to obtain at least one instruction;
and coding the obtained instruction according to a pre-stored data dictionary to obtain the control command, wherein the data dictionary is agreed by the controlled equipment and the server together.
3. The remote control method according to claim 1 or 2, wherein before the sending the control command to the controlled device by short message, the method further comprises:
encrypting the control command according to a preset encryption key, wherein the encryption key and a decryption key corresponding to the encryption key are both agreed by the controlled equipment and the server together;
the issuing of the control command to the controlled device through the short message comprises:
and sending the encrypted control command to the controlled equipment through a short message.
4. The remote control method according to claim 1 or 2, wherein before the control command is issued to the controlled device by short message, the method comprises:
adding a token to the control command, wherein the token is generated by the controlled equipment and reported to the server by the controlled equipment;
the issuing of the control command to the controlled device through the short message comprises:
and issuing the control command with the token to the controlled equipment through a short message, so that the controlled equipment can verify the control command according to the token.
5. The remote control method according to claim 1 or 2, wherein the controlled device establishes a heartbeat connection with the server in the mobile data network, and after the generating of the control command, the method further comprises:
and detecting whether the mobile data network of the controlled equipment is available according to the state of the heartbeat connection, wherein the mobile data network is judged to be available under the condition that the heartbeat link is in a connected state, and the mobile data network is judged to be unavailable under the condition that the heartbeat link is in a disconnected state.
6. The remote control method according to claim 1 or 2, wherein before the sending the control command to the controlled device by short message, the method further comprises:
sending a query request to the controlled equipment through a short message, so that the controlled equipment can detect whether a short message function is available according to the query request;
the issuing of the control command to the controlled device through the short message comprises:
and after receiving a short message function available response returned by the controlled equipment, issuing the control command to the controlled equipment through a short message.
7. A remote control method is applied to a controlled device and comprises the following steps:
receiving a control command sent by a server through a short message;
and performing action according to the control command.
8. The remote control method of claim 7, wherein the control command is encoded, and prior to acting upon the control command, the method further comprises:
decoding the control command according to a data dictionary, wherein the data dictionary is agreed by the controlled equipment and the server together;
the acting according to the control command comprises:
and performing action according to the decoded control command.
9. The remote control method according to claim 7 or 8, wherein in a case where the control command is received by a short message, the control command is encrypted, and before the action according to the control command, the method further comprises:
decrypting the control command according to a pre-stored decryption key; the decryption key and the encryption key corresponding to the decryption key are agreed by the controlled equipment and the server together;
the acting according to the control command comprises:
and performing action according to the decrypted control command.
10. The remote control method according to claim 7 or 8, wherein when the control command is received by a short message, the control command further carries a token, and before the action according to the control command, the method further comprises:
verifying the control command according to the received token;
the acting according to the control command comprises:
and when the control command passes the verification, performing action according to the control command.
11. The remote control method according to claim 7 or 8, wherein, prior to the receiving the control command, the method further comprises:
receiving a query request issued by the server;
detecting whether a short message function is available according to the query request;
under the condition that the short message function is detected to be available, a short message function available response is returned to the server;
and under the condition that the short message function is detected to be unavailable, not responding.
12. A server, comprising:
the generating module is used for generating a control command;
and the sending module is used for sending the control command to the controlled equipment through a short message under the condition that the mobile data network of the controlled equipment is unavailable so as to control the controlled equipment to act.
13. The server according to claim 12, wherein the server is a cloud server.
14. A controlled device, comprising:
the receiving module is used for receiving a control command sent by the server through a short message;
and the execution module is used for acting according to the control command.
15. The controlled apparatus according to claim 14, characterized in that the controlled apparatus is a robot.
16. A remote control system, comprising: a server as claimed in claim 12 or 13, and a number of controlled devices as claimed in claim 14 or 15.
17. An electronic device, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the remote control method of any one of claims 1 to 6 or to perform the remote control method of any one of claims 7 to 11.
18. A computer-readable storage medium storing a computer program, wherein the computer program, when executed by a processor, implements a remote control method according to any one of claims 1 to 6, or implements a remote control method according to any one of claims 7 to 11.
CN202111525980.3A 2021-12-14 2021-12-14 Remote control method, server, controlled device, system, device, and medium Pending CN114286296A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111525980.3A CN114286296A (en) 2021-12-14 2021-12-14 Remote control method, server, controlled device, system, device, and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111525980.3A CN114286296A (en) 2021-12-14 2021-12-14 Remote control method, server, controlled device, system, device, and medium

Publications (1)

Publication Number Publication Date
CN114286296A true CN114286296A (en) 2022-04-05

Family

ID=80872064

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111525980.3A Pending CN114286296A (en) 2021-12-14 2021-12-14 Remote control method, server, controlled device, system, device, and medium

Country Status (1)

Country Link
CN (1) CN114286296A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101175014A (en) * 2006-11-03 2008-05-07 上海科泰信息技术有限公司 General wireless grouping service wireless router with virtual special network function
CN101779481A (en) * 2007-08-17 2010-07-14 高通股份有限公司 Security for a heterogeneous ad hoc mobile broadband network
CN202083942U (en) * 2011-03-22 2011-12-21 扬州大学 Home appliance manager based on double controls by network and short message
CN103118443A (en) * 2013-01-15 2013-05-22 杭州华三通信技术有限公司 Configuration method and configuration device for long-distance branch device
CN107483301A (en) * 2017-08-28 2017-12-15 四川长虹电器股份有限公司 The control method of intelligent domestic system
CN107492240A (en) * 2016-06-13 2017-12-19 国网天津市电力公司 A kind of method that distribution automation transformation debugging is carried out using 4G networks
CN109129484A (en) * 2018-09-13 2019-01-04 北京小米移动软件有限公司 robot control method, device and storage medium
CN109979047A (en) * 2019-01-12 2019-07-05 深圳旦倍科技有限公司 Multi net voting intelligent door lock control method, storage medium, controller and Fingerprint Lock
CN109993948A (en) * 2017-12-29 2019-07-09 深圳市云海物联科技有限公司 A kind of safety protecting method, central controller and security protection system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101175014A (en) * 2006-11-03 2008-05-07 上海科泰信息技术有限公司 General wireless grouping service wireless router with virtual special network function
CN101779481A (en) * 2007-08-17 2010-07-14 高通股份有限公司 Security for a heterogeneous ad hoc mobile broadband network
CN202083942U (en) * 2011-03-22 2011-12-21 扬州大学 Home appliance manager based on double controls by network and short message
CN103118443A (en) * 2013-01-15 2013-05-22 杭州华三通信技术有限公司 Configuration method and configuration device for long-distance branch device
CN107492240A (en) * 2016-06-13 2017-12-19 国网天津市电力公司 A kind of method that distribution automation transformation debugging is carried out using 4G networks
CN107483301A (en) * 2017-08-28 2017-12-15 四川长虹电器股份有限公司 The control method of intelligent domestic system
CN109993948A (en) * 2017-12-29 2019-07-09 深圳市云海物联科技有限公司 A kind of safety protecting method, central controller and security protection system
CN109129484A (en) * 2018-09-13 2019-01-04 北京小米移动软件有限公司 robot control method, device and storage medium
CN109979047A (en) * 2019-01-12 2019-07-05 深圳旦倍科技有限公司 Multi net voting intelligent door lock control method, storage medium, controller and Fingerprint Lock

Similar Documents

Publication Publication Date Title
CN108762791B (en) Firmware upgrading method and device
US9179312B2 (en) Registration and login method and mobile terminal
CN111277610B (en) Gateway control system, method, intelligent device and intelligent device server
CN112632521B (en) Request response method and device, electronic equipment and storage medium
CN112039826B (en) Login method and device applied to applet end, electronic equipment and readable medium
CN111586671B (en) Embedded user identification card configuration method and device, communication equipment and storage medium
CN109729000B (en) Instant messaging method and device
CN104935435A (en) Login methods, terminal and application server
US9430638B2 (en) Authentication method, authentication apparatus and authentication device
CN111404706A (en) Application downloading method, secure element, client device and service management device
CN115129332A (en) Firmware burning method, computer equipment and readable storage medium
KR102292007B1 (en) Network node security using short range communication
CN114095277A (en) Power distribution network secure communication method, secure access device and readable storage medium
CN114286296A (en) Remote control method, server, controlled device, system, device, and medium
CN107635218B (en) Method and device for generating and injecting SIMLOCK password
WO2019205357A1 (en) Two-dimensional code encryption method, two-dimensional code transmission system and storage medium
CN112702731B (en) SIM card information transmission method and device, computer equipment and storage medium
CN106685931B (en) Smart card application management method and system, terminal and smart card
CN114692124A (en) Data reading and writing method and device and electronic equipment
CN112822041A (en) Information configuration method and device, mobile terminal and computer readable storage medium
CN114978785B (en) Control method for special machine interconnection authentication
CN111464293A (en) Data sending method, data receiving method, storage medium and terminal equipment
CN111212042B (en) Data transmission method, device and system
US20240176860A1 (en) Dynamic Command Protection Method and Dynamic Command Protection System by Using Time-Vary Salt Data
CN116600297B (en) Registration method, device, system and communication equipment based on 5G private network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 200245 Building 8, No. 207, Zhongqing Road, Minhang District, Shanghai

Applicant after: Dayu robot Co.,Ltd.

Address before: 200245 Building 8, No. 207, Zhongqing Road, Minhang District, Shanghai

Applicant before: Dalu Robot Co.,Ltd.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20220405

RJ01 Rejection of invention patent application after publication