CN114422808A - Cloud mobile phone interaction method and device, electronic equipment and storage medium - Google Patents

Cloud mobile phone interaction method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114422808A
CN114422808A CN202210015655.0A CN202210015655A CN114422808A CN 114422808 A CN114422808 A CN 114422808A CN 202210015655 A CN202210015655 A CN 202210015655A CN 114422808 A CN114422808 A CN 114422808A
Authority
CN
China
Prior art keywords
server
mobile phone
target application
cloud mobile
cloud
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210015655.0A
Other languages
Chinese (zh)
Other versions
CN114422808B (en
Inventor
黄坚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN202210015655.0A priority Critical patent/CN114422808B/en
Priority claimed from CN202210015655.0A external-priority patent/CN114422808B/en
Publication of CN114422808A publication Critical patent/CN114422808A/en
Application granted granted Critical
Publication of CN114422808B publication Critical patent/CN114422808B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/21Server components or server architectures
    • H04N21/218Source of audio or video content, e.g. local disk arrays
    • H04N21/2181Source of audio or video content, e.g. local disk arrays comprising remotely distributed storage units, e.g. when movies are replicated over a plurality of video servers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/14Digital output to display device ; Cooperation and interconnection of the display device with other functional units
    • G06F3/1454Digital output to display device ; Cooperation and interconnection of the display device with other functional units involving copying of the display data of a local workstation or window to a remote workstation or window so that an actual copy of the data is displayed simultaneously on two or more displays, e.g. teledisplay
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The disclosure provides a cloud mobile phone interaction method and device, electronic equipment and a storage medium, and relates to the field of cloud computing, in particular to the field of cloud mobile phones. The specific implementation scheme is as follows: the method comprises the steps that a cloud mobile phone interacts with a server through a target application to obtain resource data sent by the server, wherein the cloud mobile phone is in a first safety environment, and the server is in a second safety environment; and the cloud mobile phone generates audio and video stream according to the resource data and transmits the audio and video stream to a physical machine for playing. The embodiment of the disclosure can improve data transmission safety.

Description

Cloud mobile phone interaction method and device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of cloud computing, and in particular, to the field of cloud phones, and in particular, to a cloud phone interaction method and apparatus, an electronic device, and a storage medium.
Background
Cloud computing provides access to storage resources at large processing power and large locations, while mobile devices provide the ability to access and interact with cloud computing resources from anywhere at any time. Based on the theoretical basis, the concept of the cloud machine is proposed. The cloud computing platform is a smart phone application cloud platform based on cloud computing powerful virtual application and mobile internet.
In order to enable a device with low computational power used by a user to execute a function requiring high computational power, a cloud-end interaction mode such as a cloud mobile phone or a cloud server is generally used to provide the required computational power for the user.
Disclosure of Invention
The disclosure provides a cloud mobile phone interaction method and device, electronic equipment and a storage medium.
According to one aspect of the disclosure, a cloud mobile phone interaction method is provided, which includes:
the method comprises the steps that a cloud mobile phone interacts with a server through a target application to obtain resource data sent by the server, wherein the cloud mobile phone is in a first safety environment, and the server is in a second safety environment;
and the cloud mobile phone generates audio and video stream according to the resource data and transmits the audio and video stream to a physical machine for playing.
According to an aspect of the present disclosure, a cloud mobile phone interaction apparatus is provided, including:
the target application is used for interacting with a server and acquiring resource data sent by the server, wherein the cloud mobile phone is in a first security environment, and the server is in a second security environment;
and the audio and video stream generating module is used for generating audio and video streams according to the resource data and transmitting the audio and video streams to the physical machine for playing.
According to another aspect of the present disclosure, there is provided an electronic device including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the cloud phone interaction method of any embodiment of the present disclosure.
According to another aspect of the present disclosure, there is provided a non-transitory computer readable storage medium storing computer instructions for causing a computer to perform the cloud phone interaction method according to any one of the embodiments of the present disclosure.
According to another aspect of the present disclosure, there is provided a computer program product comprising a computer program which, when executed by a processor, implements the cloud phone interaction method according to any one of the embodiments of the present disclosure.
The embodiment of the disclosure can improve data transmission safety.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present disclosure, nor do they limit the scope of the present disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The drawings are included to provide a better understanding of the present solution and are not to be construed as limiting the present disclosure. Wherein:
fig. 1 is a schematic diagram of a cloud mobile phone interaction method provided according to an embodiment of the present disclosure;
fig. 2 is a schematic diagram of a cloud mobile phone interaction method provided in accordance with an embodiment of the present disclosure;
fig. 3 is a schematic diagram of another cloud-based handset interaction method provided in accordance with an embodiment of the present disclosure;
fig. 4 is a scene diagram of a cloud mobile phone interaction method provided in an embodiment of the present disclosure;
FIG. 5 is a diagram of a scenario of existing application interaction with a server;
fig. 6 is a schematic diagram of a cloud mobile phone interaction apparatus provided in accordance with an embodiment of the present disclosure;
fig. 7 is a block diagram of an electronic device for implementing a cloud phone interaction method according to an embodiment of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure are described below with reference to the accompanying drawings, in which various details of the embodiments of the disclosure are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present disclosure. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Fig. 1 is a flowchart of a cloud mobile phone interaction method disclosed in an embodiment of the present disclosure, which may be applied to a situation of cloud mobile phone interaction on an image in a video stream. The method of the embodiment may be executed by a cloud mobile phone interaction device, where the device may be implemented in a software and/or hardware manner, and is specifically configured in an electronic device with a certain data operation capability, where the electronic device may be a client device or a server device, and the client device may be a mobile phone, a tablet computer, a vehicle-mounted terminal, a desktop computer, and the like.
S101, interacting with a server through a target application to acquire resource data sent by the server, wherein the cloud mobile phone is in a first security environment, and the server is in a second security environment.
The target application is an application configured in the cloud mobile phone. And the target application and the server perform data transmission, and the server provides service for the target application and sends the resource data to the target application. Illustratively, the target application is a live application, the server provides a live service for the target application, and the resource data may be a live video stream. As another example, the target application is a game application, the server provides game services for the target application, and the resource data may be game data. As another example, the target application is a financial transaction application, the server provides a financial transaction server for the target application, and the resource data may be transaction data.
The cloud mobile phone and the server are both in a secure environment. The first secure environment may be the same as or different from the second secure environment. Being in a secure environment means that data transmitted between the cloud handset and the server is secure and reliable. The secure environment may include network security, physical security, and the like. Network security means that the channel, source, etc. of network transmission are secure. The physical security may mean that the machine room where the cloud mobile phone is located and the machine room where the server is located are secure, for example, there is no fire hazard. The first security environment and the second security environment may be configured based on the same criteria, the server is configured in both security environments, and the server in the first security environment configures the cloud handset. The server is configured in a second secure environment. The cloud mobile phone and the server operate independently.
And S102, generating audio and video stream according to the resource data, and transmitting the audio and video stream to a physical machine for playing.
The audio and video stream is used for intercepting an application interface and/or application audio of the cloud mobile phone and transmitting the application interface and/or application audio to the physical machine for playing, and may refer to image data and/or audio data transmitted between the cloud mobile phone and the physical machine in a streaming form. The target application updates the application interface according to the resource data, and the cloud mobile phone periodically intercepts the application interface to form a video stream; the target application updates application audio according to the resource data, the cloud mobile phone periodically collects the audio of the target application to form audio streams, and the audio streams and the video streams are determined to be audio and video streams. And transmitting the video stream to the physical machine, and playing the video stream by the physical machine so as to display the same updated application interface in the physical machine.
In fact, the existing target application is in a physical machine in a general internet environment, i.e. a public network, which is generally an insecure environment. In order to ensure data security, the server is placed in a secure environment, and data transmission between the server and the target application is encrypted transmission. However, when the mobile phone or tablet is in an insecure client (for example, a mobile phone or tablet with firmware maliciously modified by a user, or a mobile phone or tablet with highest authority (root) acquired), a malicious person can acquire data decryption stored locally in the mobile phone by an application, or insert a stub to acquire dynamically interactive data when an application system calls, or even acquire interactive and stored data by modifying a version of the application, so that the data is insecure. Moreover, some ports of the server need to be exposed to the public network through the firewall, and the server is attacked.
According to the technical scheme, the target application arranged in the cloud mobile phone in the first safety environment and the server arranged in the second safety environment are used for data interaction, so that data safety can be improved and attack risks can be reduced in the data transmission process and the data generation and data processing process.
Fig. 2 is a flowchart of another cloud mobile phone interaction method disclosed in the embodiment of the present disclosure, which is further optimized and expanded based on the above technical solution, and can be combined with the above optional embodiments. The method comprises the following steps of interacting with a server through a target application, and specifically: and under the condition that the cloud mobile phone meets the safe access condition, interacting with the server through the target application.
S201, under the condition that the cloud mobile phone meets the safe access condition, the cloud mobile phone interacts with a server through a target application to acquire resource data sent by the server, wherein the cloud mobile phone is in a first safe environment, and the server is in a second safe environment.
The safety access condition is used for the server to carry out access control on the target application in the cloud mobile phone. The security access condition is specifically used for detecting whether the cloud mobile phone to which the target application belongs has an access right. Illustratively, the secure access condition is used to detect whether an Internet Protocol (IP) address of the cloud handset belongs to a secure set of IP addresses to determine whether the cloud handset accesses the server.
Optionally, the security access condition includes at least one of: request access control conditions, server access control conditions, and network layer access control conditions.
The request access control condition is used for performing access control on a request sent by a target application. For example, the request access control condition may refer to detecting, for each request received by the server, whether the type of the request and/or the content has an access right, and illustratively, the server allows access to the a data, and the server does not allow access to the B data, and accordingly, the server receives the request for accessing the a, and may allow access, and the server receives the request for accessing the B, and does not allow access. And the server access control condition is used for performing access control on the cloud mobile phone to which the target application belongs. For example, the server access control condition may refer to detecting whether the sender has access right for the sender of the data received by the server, for example, sender C sending the request has access right, and the server allows access to C; the sender D sending the request has no access right and the server does not allow D access. And the network layer access control condition is used for performing access control on the cloud mobile phone to which the target application belongs on the network layer. For example, the network layer access control condition may refer to a sender of data received by a firewall of a network environment where the server is located, and detect whether the sender has an access right, for example, sender E sending a request has an access right, and the firewall or the router allows E to access the server; the sender F sending the request has no access right, and the firewall or the router does not allow F to access the server, namely the server cannot receive the data sent by F.
By configuring the security access conditions including at least one of request access control conditions, server access control conditions and network layer access control conditions, access control can be respectively performed from the dimensions of a request, a server, a network layer and the like, so that the access security is improved, the security of data received by the server is improved, and data tampering is reduced.
Optionally, when the cloud mobile phone meets the security access condition, interacting with the server through the target application includes: and interacting with the server through the target application under the condition that the network segment of the cloud mobile phone meets the safe network segment condition.
A network segment refers to a network address in a computer network that can directly communicate using the same physical layer device (transmission medium, repeater, hub, etc.). Whether the cloud mobile phone has the access right can be detected through the network. The secure network segment condition is used for detecting whether the network segment of the cloud mobile phone is a secure network segment. Illustratively, the network segment of the cloud mobile phone meets the secure network segment condition, which indicates that the network segment of the cloud mobile phone is the secure network segment, and the cloud mobile phone is in the secure environment and can access the server.
In one particular example, the secure network segment condition is that the server allows access to devices of the 10.11.0.x network segment. The network segment of the cloud mobile phone A is a 10.100.x network segment, the network segment of the cloud mobile phone B is a 10.200.x network segment, and the server allows the cloud mobile phone A to access but not the cloud mobile phone B.
As another example, the secure network segment condition is that the firewall of the secure environment in which the server resides allows access to devices of the 10.11.0.x network segment. The network segment of the cloud mobile phone A is a 10.100.x network segment, the network segment of the cloud mobile phone B is a 10.200.x network segment, the firewall is used for communicating the data of the cloud mobile phone A, the firewall is not used for communicating the data of the cloud mobile phone B, and therefore the cloud mobile phone A can access the server.
By interacting the target application with the server under the condition that the cloud mobile phone network segment is a safe network segment, network segment safety verification can be carried out on the cloud mobile phone, the server is accessed by equipment in the safe network segment, the access safety of the server is improved, and therefore the safety of interactive data between the server and the target application is improved.
It should be noted that the request access control condition, the server access control condition, and the network layer access control condition are dimensions of access control, and the secure network segment condition is a specific determination manner. Specifically, for the server access control condition and the network layer access control condition, the server can determine whether the cloud mobile phone meets the server access control condition by detecting whether the network segment of the cloud mobile phone meets the security network segment condition; the network layer can determine whether the cloud mobile phone meets the network layer access control condition by detecting whether the network segment of the cloud mobile phone meets the secure network segment condition. The request access control condition may be that, when the network segment of the cloud mobile phone satisfies the secure network segment condition, the type and/or content of the request is detected to determine whether the cloud mobile phone satisfies the request access control condition. Thus, the request access control conditions, server access control conditions, and network layer access control conditions may be used in conjunction with the secure network segment conditions or may be used independently.
And S202, generating audio and video stream according to the resource data, and transmitting the audio and video stream to a physical machine for playing.
Optionally, interacting with the server through the target application includes: accessing a server through a target application; and receiving the resource data sent by the server through the target application.
The server provides services for the cloud mobile phone through the target application. The target application accesses the server, and the server feeds back resource data aiming at the access of the target application. It should be noted that the server performs access control on the target application, and does not limit the data sent by the server. Specifically, the server can issue data to the application in the general internet environment without limiting whether the issued object is in the secure environment. In fact, the server performs access control on the access object, and may not limit the object that actively issues data. In addition, a stricter limitation is that the server also limits an object which actively issues data, for example, in a case that the cloud mobile phone is in a secure environment and the cloud mobile phone satisfies a secure access condition, the server issues data to the cloud mobile phone.
By performing access control on the cloud mobile phone to which the target application of the access server belongs, the access security of the target application can be improved, and the data security in the access process of the target application can be improved.
According to the technical scheme, the target application is indicated to interact with the server under the condition that the cloud mobile phone meets the safe access condition, so that the access safety between the cloud mobile phone and the server can be improved, and the data safety in the access process of the target application is improved.
Fig. 3 is a flowchart of another cloud mobile phone interaction method disclosed in the embodiment of the present disclosure, which is further optimized and expanded based on the above technical solution, and can be combined with the above optional embodiments. The cloud mobile phone interaction method is optimized as follows: and carrying out encrypted data transmission with a physical machine, wherein the encrypted data comprises audio/video stream data and/or control stream data.
S301, interacting with a server through a target application to acquire resource data sent by the server, wherein the cloud mobile phone is in a first security environment, and the server is in a second security environment.
Optionally, the target application stores the resource data locally, i.e. in a secure environment. In addition, the target application can also store interaction data between the server and the target application in the secure environment, and control instructions of the target application sent by the physical machine are stored in the secure environment. The data can not fall into a physical machine of a user, and the data safety is also ensured, namely the data does not fall to the ground, so that the storage safety is improved.
And S302, generating audio and video stream according to the resource data, and encrypting and transmitting the audio and video stream to a physical machine for playing.
Although the audio/video stream is different from the resource data, only a visual image and an audible audio of the resource data can be played, but there is still a risk of insecurity, and the audio/video stream can be encrypted and transmitted to a physical machine. So that the physical machine decrypts the encrypted data to obtain the audio/video stream and plays the audio/video stream.
In addition, encrypted data transmission can be carried out on the data and the physical machine, and the encrypted data comprises audio and video stream data and/or control stream data. The control stream data refers to control instruction data transmitted in the form of a stream. The physical machine sends a control instruction of the target application to the cloud mobile phone, and the target application sends the control instruction to the cloud mobile phone,
optionally, the server is for providing transaction data.
The server and the target application can be applied to application scenes sensitive to data security. Illustratively, the server provides a banking server, and the target application may be a banking application; the server provides bond service, and the target application is bond transaction application; the server provides financial service, and the target application is a financial statement application; the server provides game services, and the target application is a game application and the like.
The transaction data is used to provide information for financial transactions. Generally, the information requirement of the user in the transaction data cannot be revealed, that is, the requirement on data security is high, and the method is suitable for improving the data security by the cloud mobile phone interaction method provided by the embodiment of the disclosure.
The server is configured to provide the transaction data and is applied to the application scene of the transaction, so that the safety of the transaction data can be improved, and the safety of user information can be improved.
According to the technical scheme, the data security of the audio and video stream is improved by carrying out encryption transmission on the audio and video stream generated according to the resource data, so that the security of the resource data is improved, the leakage of the resource data is reduced, and the security of cloud mobile phone interaction is improved.
Fig. 4 is a scene diagram of a cloud mobile phone interaction method disclosed in an embodiment of the present disclosure.
The physical machine is configured in a general internet environment, i.e. in an insecure environment. And a screen projection client in the physical machine and the cloud mobile phone perform data transmission of audio and video streams and control streams. The cloud handset and the server are configured in a secure environment. And the target application of the cloud mobile phone interacts with the server. The interaction data between the target application and the server is always in the safe environment and does not fall into the unsafe environment. Therefore, the safety of the interactive data is improved.
In the prior art, as shown in fig. 5, the target application is configured in a physical machine, and the physical machine is configured in a general internet environment, that is, in an unsafe environment. The server is configured in a secure environment. The data transmitted by the server and the target application either falls into an unsafe environment, resulting in data that is at risk of being unsafe.
By privatizing and deploying the cloud mobile phone in a secure environment needing protection, a user can only acquire screen content allowed to be seen, and other data (including stored data and network interaction data) are generated in the secure environment. In addition, the network access control of the cloud mobile phone only allows the server to be accessed, and does not allow the server to be accessed to any other unauthorized resource, so that an attacker can not contact the target application completely, the attack such as application modification or network monitoring can not be carried out completely, the server is not exposed in the public network at all, the attack can not be carried out, and the safety of textbook data is greatly improved.
According to an embodiment of the present disclosure, fig. 6 is a structural diagram of a cloud mobile phone interaction apparatus in an embodiment of the present disclosure, and the embodiment of the present disclosure is applicable to a case of performing cloud mobile phone interaction on an image in a video stream. The device is realized by software and/or hardware and is specifically configured in electronic equipment with certain data operation capacity.
As shown in fig. 6, a cloud mobile phone interaction apparatus 600 includes: a target application 601 and an audio-video stream generation module 602; wherein the content of the first and second substances,
the target application 601 is used for interacting with the server and acquiring resource data sent by the server, wherein the cloud mobile phone is in a first security environment, and the server is in a second security environment;
and the audio/video stream generation module 602 is configured to generate audio/video streams according to the resource data, and transmit the audio/video streams to the physical machine for playing.
According to the technical scheme, the target application arranged in the cloud mobile phone in the first safety environment and the server arranged in the second safety environment are used for data interaction, so that data safety can be improved and attack risks can be reduced in the data transmission process and the data generation and data processing process.
Further, the target application 601 includes: and the access control unit is used for interacting with the server under the condition that the cloud mobile phone meets the safe access condition.
Further, the security access condition includes at least one of: request access control conditions, server access control conditions, and network layer access control conditions.
Further, the target application 601 includes: a server access unit for accessing a server; and the data receiving unit is used for receiving the resource data sent by the server.
Further, the access control unit includes: and the network segment verification subunit is used for interacting with the server through the target application under the condition that the network segment of the cloud mobile phone meets the safe network segment condition.
Further, the audio/video stream generating module 602 includes: and the stream transmission encryption unit is used for generating audio and video streams according to the resource data and encrypting and transmitting the audio and video streams to the physical machine for playing.
Further, the server is used for providing transaction data.
The cloud mobile phone interaction device can execute the cloud mobile phone interaction method provided by any embodiment of the disclosure, and has corresponding functional modules and beneficial effects for executing the cloud mobile phone interaction method.
In the technical scheme of the disclosure, the collection, storage, use, processing, transmission, provision, disclosure and other processing of the personal information of the related user are all in accordance with the regulations of related laws and regulations and do not violate the good customs of the public order.
The present disclosure also provides an electronic device, a readable storage medium, and a computer program product according to embodiments of the present disclosure.
FIG. 7 illustrates a schematic area diagram of an example electronic device 700 that can be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 7, the device 700 comprises a computing unit 701, which may perform various suitable actions and processes according to a computer program stored in a Read Only Memory (ROM)702 or a computer program loaded from a storage unit 708 into a Random Access Memory (RAM) 703. In the RAM 703, various programs and data required for the operation of the device 700 can also be stored. The computing unit 701, the ROM 702, and the RAM 703 are connected to each other by a bus 704. An input/output (I/O) interface 705 is also connected to bus 704.
Various components in the device 700 are connected to the I/O interface 705, including: an input unit 706 such as a keyboard, a mouse, or the like; an output unit 707 such as various types of displays, speakers, and the like; a storage unit 708 such as a magnetic disk, optical disk, or the like; and a communication unit 709 such as a network card, modem, wireless communication transceiver, etc. The communication unit 709 allows the device 700 to exchange information/data with other devices via a computer network, such as the internet, and/or various telecommunication networks.
Computing unit 701 may be a variety of general purpose and/or special purpose processing components with processing and computing capabilities. Some examples of the computing unit 701 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, and so forth. The computing unit 701 performs the various methods and processes described above, such as a cloud handset interaction method. For example, in some embodiments, the cloud-phone interaction method may be implemented as a computer software program tangibly embodied in a machine-readable medium, such as storage unit 708. In some embodiments, part or all of a computer program may be loaded onto and/or installed onto device 700 via ROM 702 and/or communications unit 709. When loaded into RAM 703 and executed by computing unit 701, may perform one or more steps of the cloud handset interaction method described above. Alternatively, in other embodiments, computing unit 701 may be configured by any other suitable means (e.g., by way of firmware) to perform the cloud handset interaction method.
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), system on a chip (SOCs), Complex Programmable Logic Devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for implementing the methods of the present disclosure may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowchart and/or area diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server may be a cloud server, a server of a distributed system, or a server with a combined blockchain.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present disclosure may be executed in parallel, sequentially, or in different orders, as long as the desired results of the technical solutions disclosed in the present disclosure can be achieved, and the present disclosure is not limited herein.
The above detailed description should not be construed as limiting the scope of the disclosure. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present disclosure should be included in the scope of protection of the present disclosure.

Claims (17)

1. A cloud mobile phone interaction method comprises the following steps:
interacting with a server through a target application to acquire resource data sent by the server, wherein the cloud mobile phone is in a first security environment, and the server is in a second security environment;
and generating audio and video stream according to the resource data, and transmitting the audio and video stream to a physical machine for playing.
2. The method of claim 1, wherein the interacting with the server through the target application comprises:
and interacting with the server through the target application under the condition that the cloud mobile phone meets a safe access condition.
3. The method of claim 2, wherein the security access condition comprises at least one of: request access control conditions, server access control conditions, and network layer access control conditions.
4. The method of claim 2, wherein the interacting with the server by the target application comprises:
accessing the server through the target application;
and receiving the resource data sent by the server through the target application.
5. The method of claim 2, wherein the interacting with the server through the target application in the case that the cloud handset satisfies a secure access condition comprises:
and interacting with the server through the target application under the condition that the network segment of the cloud mobile phone meets the safe network segment condition.
6. The method of claim 1, wherein the generating audio and video streams according to the resource data and transmitting the audio and video streams to a physical machine for playing comprises:
and generating audio and video stream according to the resource data, and encrypting and transmitting the audio and video stream to a physical machine for playing.
7. The method of claim 1, wherein the server is used to provide transaction data.
8. A cloud cell-phone interaction device includes:
the target application is used for interacting with a server and acquiring resource data sent by the server, wherein the cloud mobile phone is in a first security environment, and the server is in a second security environment;
and the audio and video stream generating module is used for generating audio and video streams according to the resource data and transmitting the audio and video streams to the physical machine for playing.
9. The apparatus of claim 8, wherein the target application comprises:
and the access control unit is used for interacting with the server under the condition that the cloud mobile phone meets a safe access condition.
10. The apparatus of claim 9, wherein the secure access condition comprises at least one of: request access control conditions, server access control conditions, and network layer access control conditions.
11. The apparatus of claim 9, wherein the target application comprises:
a server access unit for accessing the server;
and the data receiving unit is used for receiving the resource data sent by the server.
12. The apparatus of claim 9, wherein the access control unit comprises:
and the network segment verification subunit is used for interacting with the server through the target application under the condition that the network segment of the cloud mobile phone meets the safe network segment condition.
13. The apparatus of claim 8, wherein the audio-video stream generation module comprises:
and the stream transmission encryption unit is used for generating audio and video streams according to the resource data and encrypting and transmitting the audio and video streams to the physical machine for playing.
14. The apparatus of claim 8, wherein the server is to provide transaction data.
15. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the cloud handset interaction method of any of claims 1-7.
16. A non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the cloud handset interaction method of any one of claims 1-7.
17. A computer program product comprising a computer program which, when executed by a processor, implements the cloud handset interaction method of any of claims 1-7.
CN202210015655.0A 2022-01-07 Cloud mobile phone interaction method and device, electronic equipment and storage medium Active CN114422808B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210015655.0A CN114422808B (en) 2022-01-07 Cloud mobile phone interaction method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210015655.0A CN114422808B (en) 2022-01-07 Cloud mobile phone interaction method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN114422808A true CN114422808A (en) 2022-04-29
CN114422808B CN114422808B (en) 2024-06-28

Family

ID=

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130060657A1 (en) * 2011-04-04 2013-03-07 Parago, Inc. Hosting E-Commerce Based on Cloud Computing
CN103442126A (en) * 2013-08-06 2013-12-11 际时空信息技术有限公司 Mobile phone communication method and system based on cloud service
CN104283841A (en) * 2013-07-02 2015-01-14 阿里巴巴集团控股有限公司 Method, device and system for carrying out service access control on third-party application
CN105119928A (en) * 2015-09-07 2015-12-02 百度在线网络技术(北京)有限公司 Data transmission method, device and system for Android intelligent terminal
CN105430000A (en) * 2015-12-17 2016-03-23 北京华油信通科技有限公司 Cloud computing security management system
US20170195298A1 (en) * 2014-05-29 2017-07-06 Entersekt International Limited Method and System for Determining a Compromise Risk Associated with a Unique Device Identifier
US20180041557A1 (en) * 2015-04-07 2018-02-08 Intel Corporation Cloud computing for mobile client devices
US20180302495A1 (en) * 2017-04-12 2018-10-18 International Business Machines Corporation Method and System for Mobile Applications Update in the Cloud
CN109639697A (en) * 2018-12-24 2019-04-16 广州微算互联信息技术有限公司 Cloud mobile phone safe throws method, mobile terminal and the server of screen
CN109729081A (en) * 2018-12-24 2019-05-07 广州微算互联信息技术有限公司 The method and server of cloud mobile phone safe audit
CN111107099A (en) * 2019-12-28 2020-05-05 北京工业大学 Self-adaptive access control method suitable for mixed cloud environment
CN111803923A (en) * 2020-06-09 2020-10-23 广州速启科技有限责任公司 Game sharing method based on cloud mobile phone system, electronic equipment and storage medium
CN112134866A (en) * 2020-09-15 2020-12-25 腾讯科技(深圳)有限公司 Service access control method, device, system and computer readable storage medium
CN113010897A (en) * 2021-03-19 2021-06-22 中国联合网络通信集团有限公司 Cloud computing security management method and system
CN113190811A (en) * 2021-05-13 2021-07-30 深圳奥赛思科技有限公司 Method capable of safely transmitting network data and cloud server
CN113556584A (en) * 2021-07-21 2021-10-26 北京百度网讯科技有限公司 Screenshot transmission method and device of cloud mobile phone, electronic equipment and storage medium
WO2021218751A1 (en) * 2020-04-30 2021-11-04 华为技术有限公司 Cloud phone-based media data processing method and terminal device
CN113709708A (en) * 2021-08-20 2021-11-26 北京百度网讯科技有限公司 Data transmission method, device, equipment and storage medium
CN113726883A (en) * 2021-08-30 2021-11-30 北京百度网讯科技有限公司 Cloud data processing method, related device and computer program product

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130060657A1 (en) * 2011-04-04 2013-03-07 Parago, Inc. Hosting E-Commerce Based on Cloud Computing
CN104283841A (en) * 2013-07-02 2015-01-14 阿里巴巴集团控股有限公司 Method, device and system for carrying out service access control on third-party application
CN103442126A (en) * 2013-08-06 2013-12-11 际时空信息技术有限公司 Mobile phone communication method and system based on cloud service
US20170195298A1 (en) * 2014-05-29 2017-07-06 Entersekt International Limited Method and System for Determining a Compromise Risk Associated with a Unique Device Identifier
US20180041557A1 (en) * 2015-04-07 2018-02-08 Intel Corporation Cloud computing for mobile client devices
CN105119928A (en) * 2015-09-07 2015-12-02 百度在线网络技术(北京)有限公司 Data transmission method, device and system for Android intelligent terminal
CN105430000A (en) * 2015-12-17 2016-03-23 北京华油信通科技有限公司 Cloud computing security management system
US20180302495A1 (en) * 2017-04-12 2018-10-18 International Business Machines Corporation Method and System for Mobile Applications Update in the Cloud
CN109639697A (en) * 2018-12-24 2019-04-16 广州微算互联信息技术有限公司 Cloud mobile phone safe throws method, mobile terminal and the server of screen
CN109729081A (en) * 2018-12-24 2019-05-07 广州微算互联信息技术有限公司 The method and server of cloud mobile phone safe audit
CN111107099A (en) * 2019-12-28 2020-05-05 北京工业大学 Self-adaptive access control method suitable for mixed cloud environment
WO2021218751A1 (en) * 2020-04-30 2021-11-04 华为技术有限公司 Cloud phone-based media data processing method and terminal device
CN111803923A (en) * 2020-06-09 2020-10-23 广州速启科技有限责任公司 Game sharing method based on cloud mobile phone system, electronic equipment and storage medium
CN112134866A (en) * 2020-09-15 2020-12-25 腾讯科技(深圳)有限公司 Service access control method, device, system and computer readable storage medium
CN113010897A (en) * 2021-03-19 2021-06-22 中国联合网络通信集团有限公司 Cloud computing security management method and system
CN113190811A (en) * 2021-05-13 2021-07-30 深圳奥赛思科技有限公司 Method capable of safely transmitting network data and cloud server
CN113556584A (en) * 2021-07-21 2021-10-26 北京百度网讯科技有限公司 Screenshot transmission method and device of cloud mobile phone, electronic equipment and storage medium
CN113709708A (en) * 2021-08-20 2021-11-26 北京百度网讯科技有限公司 Data transmission method, device, equipment and storage medium
CN113726883A (en) * 2021-08-30 2021-11-30 北京百度网讯科技有限公司 Cloud data processing method, related device and computer program product

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
闫莅;: "移动云计算领域的网络安全解决方案探究", 信息技术, no. 01 *
雒珊;刘洪瑞;: "一种基于5G云手机的设计方案研究", 中国设备工程, no. 17, 7 September 2020 (2020-09-07) *

Similar Documents

Publication Publication Date Title
US9477534B2 (en) Inter-extension messaging
WO2018177124A1 (en) Service processing method and device, data sharing system and storage medium
WO2016160595A1 (en) System and method for threat-driven security policy controls
US20160366130A1 (en) Apparatus and method for providing security service based on virtualization
KR20220160549A (en) Cluster access method, apparatus, electronic equipment and media
JP7317084B2 (en) REMOTE VERIFICATION METHOD, DEVICE, DEVICE, SYSTEM AND MEDIUM OF TRUSTED ENVIRONMENT
CN102868728A (en) Network proxy method based on virtual channel in virtual desktop infrastructure (VDI) environment
CN113849835B (en) Key processing method, device, equipment and storage medium
CN112987942B (en) Method, device and system for inputting information by keyboard, electronic equipment and storage medium
CN113225351B (en) Request processing method and device, storage medium and electronic equipment
US10129074B2 (en) Techniques for accessing logical networks via a virtualized gateway
CN115333828A (en) Web access security encryption verification method and equipment based on UKEY hardware
WO2023185514A1 (en) Message transmission methods and apparatuses, storage medium and electronic device
US11777870B1 (en) Machine-learning (ML)-based systems and methods for maximizing resource utilization
CN116011590A (en) Federal learning method, device and system
CN114422808B (en) Cloud mobile phone interaction method and device, electronic equipment and storage medium
KR20100019165A (en) System and method for providing internet banking service
CN113779522B (en) Authorization processing method, device, equipment and storage medium
CN115333851A (en) Automatic driving data transmission method and device and electronic equipment
CN114422808A (en) Cloud mobile phone interaction method and device, electronic equipment and storage medium
CN116018580B (en) Techniques for instance persistence data across cloud shells
CN115941766A (en) Operation and maintenance data processing method and device
US20220058245A1 (en) Dynamic data watermarking for leakage source detection
CN114244700A (en) Port processing method and device, electronic equipment and computer readable storage medium
CN108833418B (en) Method, device and system for defending attack

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant