WO2016165447A1 - Method, apparatus, and system for remotely controlling terminal - Google Patents

Method, apparatus, and system for remotely controlling terminal Download PDF

Info

Publication number
WO2016165447A1
WO2016165447A1 PCT/CN2016/072200 CN2016072200W WO2016165447A1 WO 2016165447 A1 WO2016165447 A1 WO 2016165447A1 CN 2016072200 W CN2016072200 W CN 2016072200W WO 2016165447 A1 WO2016165447 A1 WO 2016165447A1
Authority
WO
WIPO (PCT)
Prior art keywords
control terminal
terminal
mac address
flag bit
access request
Prior art date
Application number
PCT/CN2016/072200
Other languages
French (fr)
Chinese (zh)
Inventor
魏明业
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016165447A1 publication Critical patent/WO2016165447A1/en

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C17/00Arrangements for transmitting signals characterised by the use of a wireless electrical link
    • G08C17/02Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C2201/00Transmission systems of control signals via wireless link
    • G08C2201/40Remote control systems using repeaters, converters, gateways
    • G08C2201/42Transmitting or receiving remote control signals via a network

Definitions

  • the present invention relates to the field of wireless communications, and in particular to a method, device and system for a remote control terminal.
  • Projection devices are becoming more and more popular in people's daily life. It is found that most projection devices can only accept one remote control and cannot be controlled simultaneously by multiple remote controls. For example, in the process of using a portable home projection device, if one device It can only be remotely controlled by one terminal and is not suitable for home operation. When a projection device has been remotely controlled, if it is not disconnected, the second remote control device cannot be remotely controlled.
  • a network protocol Internet Protocol, IP for short
  • IP Internet Protocol
  • remote control generally one-to-one remote control, that is, recording the IP address of the remote control device, and only the IP address can remotely control the projection device, and can no longer be used.
  • IP Internet Protocol
  • the terminal device cannot be remotely operated by multiple remote control devices at the same time, and there is currently no effective solution.
  • the present invention provides a method, device and system for remotely controlling a terminal to at least solve the problem that the terminal device cannot be simultaneously remotely operated by a plurality of remote control devices in the related art.
  • a method for remotely controlling a terminal includes:
  • the controlled terminal receives the access request information of the control terminal
  • the controlled terminal verifies whether the flag bit carried by the access request is correct according to the recorded flag bit, and if it is determined that the flag bit is correct, And entering the control terminal, where the marking bit carried by the access request is sent by the controlled terminal to the control terminal, and the IP of the control terminal corresponds to the marking bit.
  • the method further includes:
  • the method before the controlled terminal determines whether the network protocol address IP in the access request information is an access IP, the method further includes:
  • the controlled terminal acquires a physical address MAC address of the control terminal from the access request information, and determines whether the MAC address is a trusted MAC address;
  • determining whether the network protocol address IP in the access request information is an accessed IP After determining that the MAC address is the trusted MAC address, determining whether the network protocol address IP in the access request information is an accessed IP.
  • the method further includes:
  • the control terminal feeds back information that the MAC address is not the trusted MAC address.
  • the method further includes:
  • the controlled terminal deletes the access request information.
  • control terminal sending the flag bit corresponding to the IP of the control terminal to the control terminal includes:
  • the controlled terminal carries the flag bit corresponding to the IP of the control terminal in the redundant bit of the control frame in the WiFi communication mode, and sends the flag bit to the control terminal.
  • an apparatus for remotely controlling a terminal includes:
  • a receiving module configured to receive, by the control terminal, access request information of the control terminal
  • a determining module configured to determine, by the controlled terminal, whether the network protocol address IP in the access request information is an accessed IP
  • An access module configured to: when determining that the IP of the control terminal is not an access IP, the controlled terminal verifies whether the flag bit carried by the access request is correct according to the recorded flag bit, and determines the flag bit In the right case, the control terminal is accessed, wherein the flag bit carried by the access request is sent by the controlled terminal to the control terminal, and the IP of the control terminal corresponds to the flag bit.
  • the device further includes:
  • the sending module is configured to determine whether the control terminal is the first connection, and if it is the first connection, send the flag bit corresponding to the IP of the control terminal to the control terminal, and the controlled terminal records the flag bit.
  • the device further includes:
  • a security module configured to: obtain, by the controlled terminal, a physical address MAC address of the control terminal from the access request information, and determine whether the MAC address is a trusted MAC address;
  • determining whether the network protocol address IP in the access request information is an accessed IP After determining that the MAC address is the trusted MAC address, determining whether the network protocol address IP in the access request information is an accessed IP.
  • the device further includes:
  • the feedback module is configured to, when determining that the MAC address is not the trusted MAC address, feed back to the control terminal that the MAC address is not the trusted MAC address.
  • the device further includes:
  • a system for controlling a remote terminal includes: a controlled terminal, and a control terminal;
  • the controlled terminal receives the access request information of the control terminal
  • the controlled terminal acquires a physical address MAC address of the control terminal from the access request information, and determines whether the MAC address is a trusted MAC address;
  • the controlled terminal verifies whether the flag bit carried by the access request is correct according to the recorded flag bit, and if it is determined that the flag bit is correct, And entering the control terminal, where the marking bit carried by the access request is sent by the controlled terminal to the control terminal, and the IP of the control terminal corresponds to the marking bit.
  • the controlled terminal receives the access request information of the control terminal, and the controlled terminal determines whether the IP in the access request information is an accessed IP, and when determining that the IP of the control terminal is not the accessed IP, The controlled terminal verifies whether the flag bit carried by the access request is correct according to the recorded flag bit, and if the flag bit is determined to be correct, accessing the control terminal, where the flag bit carried by the access request is the
  • the control terminal sends the IP address of the control terminal to the control terminal, and the IP address of the control terminal corresponds to the mark bit, which solves the problem that the terminal device cannot be remotely operated by multiple remote control devices at the same time, and realizes that a plurality of remote control terminals simultaneously operate the target terminal remotely.
  • FIG. 1 is a flow chart of a remote control terminal according to an embodiment of the present invention.
  • FIG. 2 is a block diagram 1 of a remote control terminal device according to an embodiment of the present invention.
  • FIG. 3 is a structural block diagram 2 of an apparatus for controlling a remote terminal according to an embodiment of the present invention
  • FIG. 4 is a structural block diagram 3 of an apparatus for controlling a remote terminal according to an embodiment of the present invention.
  • FIG. 5 is a structural block diagram 4 of an apparatus for controlling a remote terminal according to an embodiment of the present invention.
  • FIG. 6 is a structural block diagram 5 of an apparatus for controlling a remote terminal according to an embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of an apparatus of a remote control terminal according to a preferred embodiment of the present invention.
  • FIG. 8 is a flowchart of a control process of a remote control terminal according to a preferred embodiment of the present invention.
  • FIG. 9 is a flow chart of a remote control terminal in accordance with a preferred embodiment of the present invention.
  • FIG. 1 is a flowchart of a remote control terminal according to an embodiment of the present invention. As shown in FIG. 1 , the process includes the following steps:
  • Step S102 The controlled terminal receives the access request information of the control terminal.
  • Step S104 the controlled terminal determines whether the IP in the access request information is an accessed IP
  • Step S106 when it is determined that the IP of the control terminal is not the accessed IP, the controlled terminal verifies whether the flag bit carried by the access request is correct according to the marked flag bit, and if it is determined that the flag bit is correct, the access is performed.
  • the control terminal wherein the flag bit carried by the access request is sent by the controlled terminal to the control terminal, and the IP of the control terminal corresponds to the flag bit.
  • the controlled terminal receives the access request information of the control terminal, and the controlled terminal determines whether the IP in the access request information is the accessed IP, and when determining that the IP of the control terminal is not the accessed IP, The controlled terminal verifies whether the flag bit carried by the access request is correct according to the recorded flag bit, and if the flag bit is determined to be correct, accessing the control terminal, where the flag bit carried by the access request is the
  • the control terminal sends the control terminal to the control terminal, and the IP of the control terminal corresponds to the flag bit.
  • the IP address access mode is used for remote control, and one controlled device can only access one control terminal.
  • the controlled device can access multiple control devices, which solves the problem that the terminal device cannot be remotely operated by multiple remote control devices at the same time, and realizes that multiple remote control terminals simultaneously operate the target terminal remotely.
  • the controlled terminal After determining that the IP of the control terminal is not the access IP, determining whether the control terminal is the first connection, if the connection is the first time, sending the flag corresponding to the IP of the control terminal to the control terminal, The controlled terminal records the flag bit.
  • This embodiment provides a manner of setting the flag bit, and the flag bit may also be preset by the user.
  • the controlled terminal acquires the physical address MAC address of the control terminal from the access request information. Determining whether the MAC address is a trusted MAC address, wherein after determining that the MAC address is the trusted MAC address, determining the access Whether the network protocol address IP in the request information is the accessed IP, first check whether the MAC address of the control terminal is a trusted MAC address, and further secure verification, thereby improving the security of the access control terminal.
  • the control terminal feeds back information that the MAC address is not the trusted MAC address.
  • the controlled terminal when it is determined that the IP of the control terminal is the accessed IP, the controlled terminal deletes the access request information, and the implementation scheme of the embodiment is that even if the request is the same IP address, And the current IP address is already connected to the controlled terminal, or can receive the request information request, the received instruction is not displayed on the controlled terminal, but after disconnection, the received request information is continuously received. It is inconvenient to operate, and it also causes trouble to the user. After deleting the access request information of the accessed IP, the user operation is simplified.
  • the controlled terminal sends the flag bit corresponding to the IP of the control terminal to the control terminal, and the controlled terminal carries the tag corresponding to the IP of the control terminal by using the redundant bit of the control frame in the WiFi communication mode.
  • Bit, sent to the control terminal, due to the 802.11 frame, the Type field of the MAC header, the Subtype value of the control frame 0000 ⁇ 1001 is not currently used, and the unused control field can be randomly marked with the field, requiring control
  • the terminal records the tag bit and records the tag bit position.
  • a device for remotely controlling a terminal is provided, which is used to implement the above-mentioned embodiments and preferred embodiments, and has not been described again.
  • the term "module” may implement a combination of software and/or hardware of a predetermined function.
  • the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
  • FIG. 2 is a structural block diagram 1 of a remote control terminal device according to an embodiment of the present invention. As shown in FIG. 2, the device includes:
  • the receiving module 22 is configured to receive access request information of the control terminal
  • the determining module 24 is connected to the receiving module 22, and is configured to determine whether the network protocol address IP in the access request information is an accessed IP;
  • the access module 26 is connected to the determining module 24, and is configured to: when determining that the IP of the control terminal is not an access IP, the controlled terminal verifies whether the flag bit carried by the access request is correct according to the recorded flag bit, and determines that the If the flag is correct, the control terminal is accessed, and the flag bit carried by the access request is sent by the controlled terminal to the control terminal, and the IP of the control terminal corresponds to the flag bit.
  • the receiving module 22 receives the access request information of the control terminal, and the determining module 24 determines whether the IP in the access request information is the accessed IP, and the access module 26 determines that the IP of the control terminal is not connected.
  • the controlled terminal verifies whether the flag bit carried by the access request is correct according to the marked flag bit, and if it is determined that the flag bit is correct, accessing the control terminal, where the flag bit carried by the access request is For the controlled terminal to be sent to the control terminal, the IP of the control terminal corresponds to the flag bit.
  • the IP address access mode is used for remote control, and one controlled device can only access one control terminal.
  • the controlled device can access multiple control devices, which solves the problem that the terminal device cannot be remotely operated by multiple remote control devices at the same time, and realizes that multiple remote control terminals simultaneously operate the target terminal remotely.
  • FIG. 3 is a structural block diagram 2 of an apparatus for controlling a remote terminal according to an embodiment of the present invention. As shown in FIG. 3, the device includes:
  • the sending module 32 is connected to the determining module 24, and is configured to determine whether the control terminal is the first connection. If it is the first connection, send the flag bit corresponding to the IP of the control terminal to the control terminal, and the controlled terminal records the flag bit and provides The way to set the flag bit can also be set by the user in advance.
  • FIG. 4 is a structural block diagram 3 of an apparatus for controlling a remote terminal according to an embodiment of the present invention. As shown in FIG. 4, the device includes:
  • the security module 42 is connected to the receiving module 22, and is configured to obtain, by the controlled terminal, the physical address MAC address of the control terminal from the access request information, and determine whether the MAC address is a trusted MAC address, where it is determined that the MAC address is After the trusted MAC address, it is determined whether the network protocol address IP in the access request information is an accessed IP. First, it is checked whether the MAC address of the control terminal is a trusted MAC address, and one step of security verification is performed to improve access control. Terminal security.
  • FIG. 5 is a structural block diagram of a device for controlling a remote terminal according to an embodiment of the present invention. As shown in FIG. 5, the device includes:
  • the feedback module 52 is connected to the security module 42 and is configured to, when determining that the MAC address is not the trusted MAC address, feed back to the control terminal that the MAC address is not the trusted MAC address.
  • FIG. 6 is a structural block diagram 5 of a device for controlling a remote terminal according to an embodiment of the present invention. As shown in FIG. 6 , the device includes:
  • the deletion module 62 is connected to the determination module 24, and is configured to delete the access request information when the IP of the control terminal is the accessed IP, and set the network protocol address IP of the control terminal to be After the IP address is accessed, if the IP address of the control terminal is the accessed IP address, the access request information is deleted.
  • the implementation scheme of this embodiment is that even the request of the same IP address, and the current IP address.
  • the command can still be received, and the receiving command is not displayed on the controlled terminal, but after disconnecting, the received request information will be received continuously, which is inconvenient to operate, and also causes trouble to the user, and deletes the accessed IP. User access is simplified after access request information.
  • each of the above modules may be implemented by software or hardware.
  • the foregoing may be implemented by, but not limited to, the foregoing modules are all located in the same processor; or, the modules are located in multiple In the processor.
  • a system for controlling a remote terminal receives the access request information of the control terminal, and the controlled terminal acquires the physical address MAC of the control terminal from the access request information.
  • the flag bit verifies whether the flag bit carried by the access request is correct, and if the flag bit is determined to be correct, accessing the control terminal, where the flag bit carried by the access request is sent to the controlled terminal by the controlled terminal
  • the IP address of the control terminal corresponds to the marked bit, which solves the problem that the terminal device cannot be remotely operated by multiple remote control devices at the same time, and realizes multiple remote control The terminal simultaneously operates the target terminal remotely.
  • the instruction stack in the memory area of the controlled terminal, is prestored, and the instruction stack is equivalent to a part of the function of the determining module 24 in the above embodiment, and the instruction instruction area is marked in the instruction stack to send the instruction terminal IP.
  • the address and the instruction label, the same IP address label only receives the first instruction, and sets the disconnection flag bit. If the first instruction has been received, after the second instruction is sent, the terminal will feedback the received information to the control terminal, destroying the second The instruction can receive the resent instruction when the first instruction is disconnected. Control information can be sent repeatedly with different IP addresses.
  • the controlled terminal records the transmission request address message, and the transmission request address message must be verified by the controlled terminal before being implemented.
  • connection interface is closed, and the subsequent request message is processed according to the sending IP address. If it is the same IP, the connection is rejected. If it is not the same IP, the verification process needs to be reconnected. .
  • the IP information is received, the IP address receives the command, and the receiving command field is sorted in chronological order.
  • the security protection measure is equivalent to the access module 26 and the sending module 32 in the foregoing embodiment.
  • a fixed tag bit is sent to the authentication MAC address, and the control device is required to send a fixed tag bit and a fixed tag.
  • Bit in the control frame blank field the fixed tag bit verification information is stored in the access IP field, since the accessed IP is already a trusted IP, if the cloned MAC address is used, the command can be safely controlled, and the control frame blank field cannot be verified. Fix the mark position and do safety and control.
  • FIG. 7 is a schematic structural diagram of a remote control terminal according to a preferred embodiment of the present invention. As shown in FIG. 7, the device includes:
  • Terminal 1 terminal 2, which is a control terminal, functions as a remote control;
  • the controlled devices include:
  • the address is assigned a fixed IP.
  • the access IP address is equivalent to the partial function of the determining module 24 in the foregoing embodiment: storing the accessed IP address as the connection judgment basis, and if the subsequent access data is the same IP, the access is no longer accepted.
  • Incoming request if access is allowed for different IPs, that is, if the instruction has been sent, the flag bit is set to 1, and the second instruction is no longer accepted. After disconnection, the second instruction is accepted, and the area is also used for storage verification. Bit.
  • the access instruction storage area is equivalent to the partial function of the receiving module 22 in the above embodiment: the remote command is stored in order.
  • the security authentication that is, the security judgment module, is equivalent to some functions of the security module 42 in the foregoing embodiment, and is used to compare the MAC address of the requesting terminal, and whether the access IP is the same as the MAC address and the IP address stored in the controlled terminal. .
  • FIG. 8 is a flowchart of a control process of a remote control terminal according to a preferred embodiment of the present invention. As shown in FIG. 8, the steps include:
  • Step S802 receiving a control instruction
  • Step S804 the instructions are sorted in the receiving order storage area according to the receiving order
  • Step S806 executing control commands in sequence
  • FIG. 9 is a flowchart of a remote control terminal according to a preferred embodiment of the present invention. As shown in FIG. 9, the steps include:
  • Step S901 Receive an access request sent by the control terminal, where the request is from a terminal in the same Wireless-Fldelity (WiFi) environment as the controlled terminal, and the connection manner includes but is not limited to WiFi direct connection, and WiFi sharing (WiFi-tethering) connection and WiFi access
  • WiFi Wireless-Fldelity
  • Step S902 after receiving the request, the controlled terminal requests to obtain the MAC address of the control terminal.
  • Step S903 receiving a MAC address fed back by the control terminal
  • Step S904 determining whether the MAC address is a trusted MAC address, and the trusted MAC address is manually set by the user, that is, storing a list of trusted MAC addresses in the controlled terminal, and confirming the control terminal MAC by comparing with the trusted MAC address list. Whether the address is a trusted MAC address
  • Step S905 if it is a non-trusted MAC address, rejecting the request, and feeding back to the terminal, the MAC address is an untrusted MAC address.
  • Step S906 determining whether it is an accessed IP (a fixed IP is assigned to the accessed MAC address, the flag is always 1 if the IP is in the connected state, and the flag is 0 if it is disconnected)
  • Step S907 If the IP is accessed to the control terminal, the IP address is the accessed IP address.
  • Step S908 if the IP is already accessed, the sent request instruction is destroyed (since the current product implementation scheme is that even if the request is the same IP address, and the current IP address is already connected to the controlled terminal, the instruction can be accepted, and the instruction is not accepted. Displayed on the controlled terminal, but after disconnecting, it will continue to receive the request information sent before, which is not easy to operate, and also causes trouble to the user.
  • Step S909 if it is not already connected to the IP, it is determined whether it is the first connection.
  • Step S910 if it is the first connection, send a flag bit to the control terminal, and the flag bit is sent through the wifi. Because of the 902.11 frame, the Type field of the MAC header, the Subtype value of the control frame 0000 to 1001 is Reserved, and currently If used, the control terminal may be randomly marked with a field that is not used, and the control terminal is required to record the flag bit. At the same time, the mark bit position is recorded in the IP access storage area. For example, a MAC address has been whitelisted and judged to be the first access. The controlled terminal allocates 0101 as the MAC address/IP address tag and records the corresponding tag bit.
  • Step S911 if the non-first access has accessed the IP, the request is received, and the verification control device sends the fixed by wifi. Mark the bit to determine if the mark is correct
  • Step S912 if the flag bit is empty, or the flag bit is incorrect, the request is rejected, and the control terminal feeds back, the MAC address is a clone MAC address, and the access is not allowed.
  • Step S913 if the flag bit is correct, the IP address is stored in the receiving IP address storage area.
  • Step S914 the IP access flag bit of the accessed control terminal is set to 1
  • the user uses the projection device at home.
  • the access mode of the projection device is IP access
  • IP accesses the projection device through IP
  • receives the settings received by the first request access command can also meet the requirements of security prevention and control.
  • the technical solution of the present invention which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk,
  • a storage medium such as ROM/RAM, disk
  • the optical disc includes a number of instructions for causing a terminal device (which may be a cell phone, a computer, a server, or a network device, etc.) to perform the methods described in various embodiments of the present invention.
  • a terminal device which may be a cell phone, a computer, a server, or a network device, etc.
  • Embodiments of the present invention also provide a storage medium.
  • the storage medium may be configured to store program code for performing the method steps of the above embodiment:
  • the foregoing storage medium may include, but not limited to, a USB flash drive, a Read-Only Memory (ROM), a Random Access Memory (RAM), a mobile hard disk, and a magnetic memory.
  • ROM Read-Only Memory
  • RAM Random Access Memory
  • a mobile hard disk e.g., a hard disk
  • magnetic memory e.g., a hard disk
  • the processor performs the method steps of the foregoing embodiments according to the stored program code in the storage medium.
  • modules or steps of the present invention described above can be implemented by a general-purpose computing device that can be centralized on a single computing device or distributed across a network of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
  • the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof are fabricated as a single integrated circuit module.
  • the invention is not limited to any specific combination of hardware and software.
  • the controlled terminal receives the access request information of the control terminal, and the controlled terminal determines whether the IP in the access request information is an accessed IP, and determines the IP of the control terminal.
  • the controlled terminal verifies whether the flag bit carried by the access request is correct according to the recorded flag bit, and accesses the control terminal if the flag bit is determined to be correct, where the access request is The carried flag is sent to the control terminal by the controlled terminal, and the IP of the control terminal corresponds to the marked bit, which solves the problem that the terminal device cannot be remotely operated by multiple remote control devices at the same time, and realizes multiple remote control terminals simultaneously Remotely operate the target terminal.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Provided are a method, apparatus, and system for remotely controlling a terminal. The method comprises: a controlled terminal receiving access request information from a controlling terminal (S102); the controlled terminal determining whether a network protocol address (IP) in the access request information is an IP already accessed (S104); if it is determined that the IP of the controlling terminal is not an IP already accessed, then the controlled terminal verifies, in accordance with the recorded mark bit, whether the marker carried by the access request is correct; if it is determined that the mark bit is correct, then the controlling terminal is accessed, wherein the mark bit carried by the access request is sent to the controlling terminal by the controlled terminal, and the IP of the controlling terminal corresponds to the mark bit (S106). The mark bit corresponding to the IP of the controlling terminal solves the problem of it being impossible to remotely control and operate a terminal device via a plurality of remote control devices at the same time, such that a plurality of remote control terminals may remotely control and operate a target terminal at the same time.

Description

遥控终端的方法、装置及系统Method, device and system for remote terminal 技术领域Technical field
本发明涉及无线通信领域,具体而言,涉及一种遥控终端的方法、装置及系统。The present invention relates to the field of wireless communications, and in particular to a method, device and system for a remote control terminal.
背景技术Background technique
投影设备在在人们的日常生活中使用越来越普遍,发现大部分投影设备只能接受一个遥控相应,不能由多个遥控同时控制,例如,在使用便携式家庭投影设备过程中,如果一台设备只能被一个终端遥控,不适合家庭操作。当一台投影设备已被遥控控制后,如不断开,第二条遥控设备无法进行遥控。Projection devices are becoming more and more popular in people's daily life. It is found that most projection devices can only accept one remote control and cannot be controlled simultaneously by multiple remote controls. For example, in the process of using a portable home projection device, if one device It can only be remotely controlled by one terminal and is not suitable for home operation. When a projection device has been remotely controlled, if it is not disconnected, the second remote control device cannot be remotely controlled.
在相关技术中,采用网络协议(Internet Protocol,简称为IP)地址接入方式遥控,一般为一对一遥控,即记录遥控设备的IP地址,仅该IP地址可对投影设备进行遥控,不可再接入第二个设备,若想更换遥控设备,则需断开当前已有IP地址,才能接入新遥控设备。In the related art, a network protocol (Internet Protocol, IP for short) address access method is used for remote control, generally one-to-one remote control, that is, recording the IP address of the remote control device, and only the IP address can remotely control the projection device, and can no longer be used. To access the second device, if you want to replace the remote control device, you need to disconnect the existing IP address to access the new remote control device.
针对相关技术中,终端设备不能由多个遥控设备同时遥控操作的问题,目前还没有有效的解决方案。In view of the related art, the terminal device cannot be remotely operated by multiple remote control devices at the same time, and there is currently no effective solution.
发明内容Summary of the invention
本发明提供了一种遥控终端的方法、装置及系统,以至少解决相关技术中终端设备不能由多个遥控设备同时遥控操作的问题。The present invention provides a method, device and system for remotely controlling a terminal to at least solve the problem that the terminal device cannot be simultaneously remotely operated by a plurality of remote control devices in the related art.
根据本发明的一个实施例,提供了一种遥控终端的方法,包括:According to an embodiment of the present invention, a method for remotely controlling a terminal includes:
被控制终端接收控制终端的接入请求信息;The controlled terminal receives the access request information of the control terminal;
所述被控制终端判定所述接入请求信息中的IP是否为已接入IP;Determining, by the controlled terminal, whether the IP in the access request information is an accessed IP;
在判定所述控制终端的IP不是已接入IP时,所述被控制终端依据记录的标记位验证所述接入请求携带的标记位是否正确,在判定所述标记位正确的情况下,接入所述控制终端,其中,所述接入请求携带的标记位为所述被控制终端发送给所述控制终端的,所述控制终端的IP与所述标记位相对应。When it is determined that the IP of the control terminal is not an access IP, the controlled terminal verifies whether the flag bit carried by the access request is correct according to the recorded flag bit, and if it is determined that the flag bit is correct, And entering the control terminal, where the marking bit carried by the access request is sent by the controlled terminal to the control terminal, and the IP of the control terminal corresponds to the marking bit.
在本发明的实施例中,在判定所述控制终端的IP不是已接入IP时之后,所述方法还包括:In an embodiment of the present invention, after determining that the IP of the control terminal is not already connected to the IP, the method further includes:
判断所述控制终端是否是首次连接,若是首次连接,发送所述控制终端的IP对应的所述标记位给所述控制终端,所述被控制终端记录所述标记位。Determining whether the control terminal is the first connection, and if it is the first connection, sending the flag bit corresponding to the IP of the control terminal to the control terminal, and the controlled terminal records the flag bit.
在本发明的实施例中,在被控制终端判定所述接入请求信息中的网络协议地址IP是否为已接入IP之前,所述方法还包括: In an embodiment of the present invention, before the controlled terminal determines whether the network protocol address IP in the access request information is an access IP, the method further includes:
所述被控制终端从所述接入请求信息中获取所述控制终端的物理地址MAC地址,判定所述MAC地址是否为受信MAC地址;The controlled terminal acquires a physical address MAC address of the control terminal from the access request information, and determines whether the MAC address is a trusted MAC address;
其中,在判定所述MAC地址是所述受信MAC地址后,判定所述接入请求信息中的网络协议地址IP是否为已接入IP。After determining that the MAC address is the trusted MAC address, determining whether the network protocol address IP in the access request information is an accessed IP.
在本发明的实施例中,所述方法还包括:In an embodiment of the invention, the method further includes:
在判定所述MAC地址不是所述受信MAC地址的情况下,给控制终端反馈所述MAC地址不是所述受信MAC地址的信息。In the case that it is determined that the MAC address is not the trusted MAC address, the control terminal feeds back information that the MAC address is not the trusted MAC address.
在本发明的实施例中,在判定所述控制终端的网络协议地址IP是否为已接入IP之后,所述方法还包括:In an embodiment of the present invention, after determining whether the network protocol address IP of the control terminal is an accessed IP, the method further includes:
在所述控制终端的IP为已接入IP的情况下,所述被控制终端删除所述接入请求信息。When the IP of the control terminal is an accessed IP, the controlled terminal deletes the access request information.
在本发明的实施例中,所述被控制终端发送所述控制终端的IP对应的标记位给所述控制终端包括:In the embodiment of the present invention, the control terminal sending the flag bit corresponding to the IP of the control terminal to the control terminal includes:
所述被控制终端通过WiFi通信方式中控制帧的冗余位携带所述控制终端的IP对应的标记位,发送给所述控制终端。The controlled terminal carries the flag bit corresponding to the IP of the control terminal in the redundant bit of the control frame in the WiFi communication mode, and sends the flag bit to the control terminal.
根据本发明的另一实施例,提供了一种遥控终端的装置,包括:According to another embodiment of the present invention, an apparatus for remotely controlling a terminal includes:
接收模块,设置为被控制终端接收控制终端的接入请求信息;a receiving module, configured to receive, by the control terminal, access request information of the control terminal;
判定模块,设置为所述被控制终端判定所述接入请求信息中的网络协议地址IP是否为已接入IP;a determining module, configured to determine, by the controlled terminal, whether the network protocol address IP in the access request information is an accessed IP;
接入模块,设置为在判定所述控制终端的IP不是已接入IP时,所述被控制终端依据记录的标记位验证所述接入请求携带的标记位是否正确,在判定所述标记位正确的情况下,接入所述控制终端,其中,所述接入请求携带的标记位为所述被控制终端发送给所述控制终端的,所述控制终端的IP与所述标记位相对应。An access module, configured to: when determining that the IP of the control terminal is not an access IP, the controlled terminal verifies whether the flag bit carried by the access request is correct according to the recorded flag bit, and determines the flag bit In the right case, the control terminal is accessed, wherein the flag bit carried by the access request is sent by the controlled terminal to the control terminal, and the IP of the control terminal corresponds to the flag bit.
在本发明的实施例中,所述装置还包括:In an embodiment of the invention, the device further includes:
发送模块,设置为判断所述控制终端是否是首次连接,若是首次连接,发送所述控制终端的IP对应的所述标记位给所述控制终端,所述被控制终端记录所述标记位。The sending module is configured to determine whether the control terminal is the first connection, and if it is the first connection, send the flag bit corresponding to the IP of the control terminal to the control terminal, and the controlled terminal records the flag bit.
在本发明的实施例中,所述装置还包括:In an embodiment of the invention, the device further includes:
安全模块,设置为所述被控制终端从所述接入请求信息中获取所述控制终端的物理地址MAC地址,判定所述MAC地址是否为受信MAC地址;a security module, configured to: obtain, by the controlled terminal, a physical address MAC address of the control terminal from the access request information, and determine whether the MAC address is a trusted MAC address;
其中,在判定所述MAC地址是所述受信MAC地址后,判定所述接入请求信息中的网络协议地址IP是否为已接入IP。 After determining that the MAC address is the trusted MAC address, determining whether the network protocol address IP in the access request information is an accessed IP.
在本发明的实施例中,所述装置还包括:In an embodiment of the invention, the device further includes:
反馈模块,设置为在判定所述MAC地址不是所述受信MAC地址的情况下,给控制终端反馈所述MAC地址不是所述受信MAC地址的信息。The feedback module is configured to, when determining that the MAC address is not the trusted MAC address, feed back to the control terminal that the MAC address is not the trusted MAC address.
在本发明的实施例中,所述装置还包括:In an embodiment of the invention, the device further includes:
删除模块,设置为在所述控制终端的IP为已接入IP的情况下,所述被控制终端删除所述接入请求信息。And deleting the module, where the controlled terminal deletes the access request information if the IP of the control terminal is an accessed IP.
根据本发明的另一实施例,提供了一种遥控终端的系统,包括:被控制终端,控制终端;According to another embodiment of the present invention, a system for controlling a remote terminal includes: a controlled terminal, and a control terminal;
被控制终端接收控制终端的接入请求信息;The controlled terminal receives the access request information of the control terminal;
所述被控制终端从所述接入请求信息中获取所述控制终端的物理地址MAC地址,判定所述MAC地址是否为受信MAC地址;The controlled terminal acquires a physical address MAC address of the control terminal from the access request information, and determines whether the MAC address is a trusted MAC address;
在判定所述MAC地址是所述受信MAC地址后,判定所述接入请求信息中的网络协议地址IP是否为已接入IP;After determining that the MAC address is the trusted MAC address, determining whether the network protocol address IP in the access request information is an accessed IP;
在判定所述控制终端的IP不是已接入IP时,所述被控制终端依据记录的标记位验证所述接入请求携带的标记位是否正确,在判定所述标记位正确的情况下,接入所述控制终端,其中,所述接入请求携带的标记位为所述被控制终端发送给所述控制终端的,所述控制终端的IP与所述标记位相对应。When it is determined that the IP of the control terminal is not an access IP, the controlled terminal verifies whether the flag bit carried by the access request is correct according to the recorded flag bit, and if it is determined that the flag bit is correct, And entering the control terminal, where the marking bit carried by the access request is sent by the controlled terminal to the control terminal, and the IP of the control terminal corresponds to the marking bit.
通过本发明,被控制终端接收控制终端的接入请求信息,该被控制终端判定该接入请求信息中的IP是否为已接入IP,在判定该控制终端的IP不是已接入IP时,该被控制终端依据记录的标记位验证该接入请求携带的标记位是否正确,在判定该标记位正确的情况下,接入该控制终端,其中,该接入请求携带的标记位为该被控制终端发送给该控制终端的,该控制终端的IP与该标记位相对应,解决了终端设备不能由多个遥控设备同时遥控操作的问题,实现了多个遥控终端同时遥控操作目标终端。According to the present invention, the controlled terminal receives the access request information of the control terminal, and the controlled terminal determines whether the IP in the access request information is an accessed IP, and when determining that the IP of the control terminal is not the accessed IP, The controlled terminal verifies whether the flag bit carried by the access request is correct according to the recorded flag bit, and if the flag bit is determined to be correct, accessing the control terminal, where the flag bit carried by the access request is the The control terminal sends the IP address of the control terminal to the control terminal, and the IP address of the control terminal corresponds to the mark bit, which solves the problem that the terminal device cannot be remotely operated by multiple remote control devices at the same time, and realizes that a plurality of remote control terminals simultaneously operate the target terminal remotely.
附图说明DRAWINGS
此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:The drawings described herein are intended to provide a further understanding of the invention, and are intended to be a part of the invention. In the drawing:
图1是根据本发明实施例的一种遥控终端的流程图;1 is a flow chart of a remote control terminal according to an embodiment of the present invention;
图2是根据本发明实施例的一种遥控终端装置的结构框图一;2 is a block diagram 1 of a remote control terminal device according to an embodiment of the present invention;
图3是根据本发明实施例的一种遥控终端的装置的结构框图二;3 is a structural block diagram 2 of an apparatus for controlling a remote terminal according to an embodiment of the present invention;
图4是根据本发明实施例的一种遥控终端的装置的结构框图三;4 is a structural block diagram 3 of an apparatus for controlling a remote terminal according to an embodiment of the present invention;
图5是根据本发明实施例的一种遥控终端的装置的结构框图四; FIG. 5 is a structural block diagram 4 of an apparatus for controlling a remote terminal according to an embodiment of the present invention; FIG.
图6是根据本发明实施例的一种遥控终端的装置的结构框图五;6 is a structural block diagram 5 of an apparatus for controlling a remote terminal according to an embodiment of the present invention;
图7是根据本发明优选实施例的一种遥控终端的装置结构示意图;FIG. 7 is a schematic structural diagram of an apparatus of a remote control terminal according to a preferred embodiment of the present invention; FIG.
图8是根据本发明优选实施例的一种遥控终端的控制过程流程图;FIG. 8 is a flowchart of a control process of a remote control terminal according to a preferred embodiment of the present invention; FIG.
图9是根据本发明优选实施例的一种遥控终端的流程图。9 is a flow chart of a remote control terminal in accordance with a preferred embodiment of the present invention.
具体实施方式detailed description
下文中将参考附图并结合实施例来详细说明本发明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。The invention will be described in detail below with reference to the drawings in conjunction with the embodiments. It should be noted that the embodiments in the present application and the features in the embodiments may be combined with each other without conflict.
需要说明的是,本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。It is to be understood that the terms "first", "second" and the like in the specification and claims of the present invention are used to distinguish similar objects, and are not necessarily used to describe a particular order or order.
在本实施例中提供了一种遥控终端的方法,图1是根据本发明实施例的一种遥控终端的流程图,如图1所示,该流程包括如下步骤:In the embodiment, a method for remotely controlling a terminal is provided. FIG. 1 is a flowchart of a remote control terminal according to an embodiment of the present invention. As shown in FIG. 1 , the process includes the following steps:
步骤S102,被控制终端接收控制终端的接入请求信息;Step S102: The controlled terminal receives the access request information of the control terminal.
步骤S104,该被控制终端判定该接入请求信息中的IP是否为已接入IP;Step S104, the controlled terminal determines whether the IP in the access request information is an accessed IP;
步骤S106,在判定该控制终端的IP不是已接入IP时,该被控制终端依据记录的标记位验证该接入请求携带的标记位是否正确,在判定该标记位正确的情况下,接入该控制终端,其中,该接入请求携带的标记位为该被控制终端发送给该控制终端的,该控制终端的IP与该标记位相对应。Step S106, when it is determined that the IP of the control terminal is not the accessed IP, the controlled terminal verifies whether the flag bit carried by the access request is correct according to the marked flag bit, and if it is determined that the flag bit is correct, the access is performed. The control terminal, wherein the flag bit carried by the access request is sent by the controlled terminal to the control terminal, and the IP of the control terminal corresponds to the flag bit.
通过上述步骤,被控制终端接收控制终端的接入请求信息,该被控制终端判定该接入请求信息中的IP是否为已接入IP,在判定该控制终端的IP不是已接入IP时,该被控制终端依据记录的标记位验证该接入请求携带的标记位是否正确,在判定该标记位正确的情况下,接入该控制终端,其中,该接入请求携带的标记位为该被控制终端发送给该控制终端的,该控制终端的IP与该标记位相对应,相比于相关技术中,采用IP地址接入方式遥控,一个被控制设备只能接入一个控制终端,在本实施例中被控制设备可以接入多个控制设备,解决了终端设备不能由多个遥控设备同时遥控操作的问题,实现了多个遥控终端同时遥控操作目标终端。Through the above steps, the controlled terminal receives the access request information of the control terminal, and the controlled terminal determines whether the IP in the access request information is the accessed IP, and when determining that the IP of the control terminal is not the accessed IP, The controlled terminal verifies whether the flag bit carried by the access request is correct according to the recorded flag bit, and if the flag bit is determined to be correct, accessing the control terminal, where the flag bit carried by the access request is the The control terminal sends the control terminal to the control terminal, and the IP of the control terminal corresponds to the flag bit. Compared with the related art, the IP address access mode is used for remote control, and one controlled device can only access one control terminal. In the example, the controlled device can access multiple control devices, which solves the problem that the terminal device cannot be remotely operated by multiple remote control devices at the same time, and realizes that multiple remote control terminals simultaneously operate the target terminal remotely.
在本实施例中,在判定该控制终端的IP不是已接入IP时之后,判断该控制终端是否是首次连接,若是首次连接,发送该控制终端的IP对应的该标记位给该控制终端,该被控制终端记录该标记位,本实施例提供了设置该标记位的方式,该标记位还可以是由用户预先输入设置的。In this embodiment, after determining that the IP of the control terminal is not the access IP, determining whether the control terminal is the first connection, if the connection is the first time, sending the flag corresponding to the IP of the control terminal to the control terminal, The controlled terminal records the flag bit. This embodiment provides a manner of setting the flag bit, and the flag bit may also be preset by the user.
在本实施例中,在被控制终端判定该接入请求信息中的网络协议地址IP是否为已接入IP之前,该被控制终端从该接入请求信息中获取该控制终端的物理地址MAC地址,判定该MAC地址是否为受信MAC地址,其中,在判定该MAC地址是该受信MAC地址后,判定该接入 请求信息中的网络协议地址IP是否为已接入IP,首先检验该控制终端的MAC地址是否是受信MAC地址,多了一步安全验证,提高了接入控制终端的安全性。In this embodiment, before the controlled terminal determines whether the network protocol address IP in the access request information is the accessed IP, the controlled terminal acquires the physical address MAC address of the control terminal from the access request information. Determining whether the MAC address is a trusted MAC address, wherein after determining that the MAC address is the trusted MAC address, determining the access Whether the network protocol address IP in the request information is the accessed IP, first check whether the MAC address of the control terminal is a trusted MAC address, and further secure verification, thereby improving the security of the access control terminal.
在本实施例中,在判定该MAC地址不是该受信MAC地址的情况下,给控制终端反馈该MAC地址不是该受信MAC地址的信息,In this embodiment, when it is determined that the MAC address is not the trusted MAC address, the control terminal feeds back information that the MAC address is not the trusted MAC address.
在本实施例中,在判定该控制终端的IP为已接入IP的情况下,该被控制终端删除该接入请求信息,由于本实施例的实现方案是,即使是同一IP地址的请求,并且当前IP地址已经连接到被控终端,还是可以接收请求信息的指令,接收的该指令不显示在被控终端上,但在断开连接后,会不停接收到之前发送过的请求信息,不便于操作,也给用户造成困扰,删除已接入IP的接入请求信息后,简化了用户操作。In this embodiment, when it is determined that the IP of the control terminal is the accessed IP, the controlled terminal deletes the access request information, and the implementation scheme of the embodiment is that even if the request is the same IP address, And the current IP address is already connected to the controlled terminal, or can receive the request information request, the received instruction is not displayed on the controlled terminal, but after disconnection, the received request information is continuously received. It is inconvenient to operate, and it also causes trouble to the user. After deleting the access request information of the accessed IP, the user operation is simplified.
在本实施例中,该被控制终端发送该控制终端的IP对应的标记位给该控制终端包括,该被控制终端通过WiFi通信方式中控制帧的冗余位携带该控制终端的IP对应的标记位,发送给该控制终端,由于802.11帧,帧头(Mac header)的Type字段,控制帧的Subtype值0000~1001目前并未使用,可随机向该控制终端标记并未使用的字段,要求控制终端记录该标记位,同时将标记位位置记录。In this embodiment, the controlled terminal sends the flag bit corresponding to the IP of the control terminal to the control terminal, and the controlled terminal carries the tag corresponding to the IP of the control terminal by using the redundant bit of the control frame in the WiFi communication mode. Bit, sent to the control terminal, due to the 802.11 frame, the Type field of the MAC header, the Subtype value of the control frame 0000~1001 is not currently used, and the unused control field can be randomly marked with the field, requiring control The terminal records the tag bit and records the tag bit position.
在本实施例中还提供了一种遥控终端的装置,该装置用于实现上述实施例及优选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。In the embodiment, a device for remotely controlling a terminal is provided, which is used to implement the above-mentioned embodiments and preferred embodiments, and has not been described again. As used below, the term "module" may implement a combination of software and/or hardware of a predetermined function. Although the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
图2是根据本发明实施例的一种遥控终端装置的结构框图一,如图2所示,该装置包括:2 is a structural block diagram 1 of a remote control terminal device according to an embodiment of the present invention. As shown in FIG. 2, the device includes:
接收模块22,设置为接收控制终端的接入请求信息;The receiving module 22 is configured to receive access request information of the control terminal;
判定模块24与接收模块22连接,设置为判定该接入请求信息中的网络协议地址IP是否为已接入IP;The determining module 24 is connected to the receiving module 22, and is configured to determine whether the network protocol address IP in the access request information is an accessed IP;
接入模块26与判定模块24连接,设置为在判定该控制终端的IP不是已接入IP时,该被控制终端依据记录的标记位验证该接入请求携带的标记位是否正确,在判定该标记位正确的情况下,接入该控制终端,其中,该接入请求携带的标记位为该被控制终端发送给该控制终端的,该控制终端的IP与该标记位相对应。The access module 26 is connected to the determining module 24, and is configured to: when determining that the IP of the control terminal is not an access IP, the controlled terminal verifies whether the flag bit carried by the access request is correct according to the recorded flag bit, and determines that the If the flag is correct, the control terminal is accessed, and the flag bit carried by the access request is sent by the controlled terminal to the control terminal, and the IP of the control terminal corresponds to the flag bit.
通过上述步骤,接收模块22接收控制终端的接入请求信息,判定模块24判定该接入请求信息中的IP是否为已接入IP,接入模块26在判定该控制终端的IP不是已接入IP时,该被控制终端依据记录的标记位验证该接入请求携带的标记位是否正确,在判定该标记位正确的情况下,接入该控制终端,其中,该接入请求携带的标记位为该被控制终端发送给该控制终端的,该控制终端的IP与该标记位相对应,相比于相关技术中,采用IP地址接入方式遥控,一个被控制设备只能接入一个控制终端,在本实施例中被控制设备可以接入多个控制设备,解决了终端设备不能由多个遥控设备同时遥控操作的问题,实现了多个遥控终端同时遥控操作目标终端。 Through the above steps, the receiving module 22 receives the access request information of the control terminal, and the determining module 24 determines whether the IP in the access request information is the accessed IP, and the access module 26 determines that the IP of the control terminal is not connected. In the case of IP, the controlled terminal verifies whether the flag bit carried by the access request is correct according to the marked flag bit, and if it is determined that the flag bit is correct, accessing the control terminal, where the flag bit carried by the access request is For the controlled terminal to be sent to the control terminal, the IP of the control terminal corresponds to the flag bit. Compared with the related art, the IP address access mode is used for remote control, and one controlled device can only access one control terminal. In this embodiment, the controlled device can access multiple control devices, which solves the problem that the terminal device cannot be remotely operated by multiple remote control devices at the same time, and realizes that multiple remote control terminals simultaneously operate the target terminal remotely.
图3是根据本发明实施例的一种遥控终端的装置的结构框图二,如图3所示,该装置除包括图2所示的所有模块外,还包括:FIG. 3 is a structural block diagram 2 of an apparatus for controlling a remote terminal according to an embodiment of the present invention. As shown in FIG. 3, the device includes:
发送模块32与判定模块24连接,设置为判断该控制终端是否是首次连接,若是首次连接,发送该控制终端的IP对应的该标记位给该控制终端,该被控制终端记录该标记位,提供了设置该标记位的方式,该标记位还可以是由用户预先输入设置的。The sending module 32 is connected to the determining module 24, and is configured to determine whether the control terminal is the first connection. If it is the first connection, send the flag bit corresponding to the IP of the control terminal to the control terminal, and the controlled terminal records the flag bit and provides The way to set the flag bit can also be set by the user in advance.
图4是根据本发明实施例的一种遥控终端的装置的结构框图三,如图4所示,该装置除包括图2所示的所有模块外,还包括:4 is a structural block diagram 3 of an apparatus for controlling a remote terminal according to an embodiment of the present invention. As shown in FIG. 4, the device includes:
安全模块42与接收模块22连接,设置为该被控制终端从该接入请求信息中获取该控制终端的物理地址MAC地址,判定该MAC地址是否为受信MAC地址,其中,在判定该MAC地址是该受信MAC地址后,判定该接入请求信息中的网络协议地址IP是否为已接入IP,首先检验该控制终端的MAC地址是否是受信MAC地址,多了一步安全验证,提高了接入控制终端的安全性。The security module 42 is connected to the receiving module 22, and is configured to obtain, by the controlled terminal, the physical address MAC address of the control terminal from the access request information, and determine whether the MAC address is a trusted MAC address, where it is determined that the MAC address is After the trusted MAC address, it is determined whether the network protocol address IP in the access request information is an accessed IP. First, it is checked whether the MAC address of the control terminal is a trusted MAC address, and one step of security verification is performed to improve access control. Terminal security.
图5是根据本发明实施例的一种遥控终端的装置的结构框图四,如图5所示,该装置除包括图4所示的所有模块外,还包括:FIG. 5 is a structural block diagram of a device for controlling a remote terminal according to an embodiment of the present invention. As shown in FIG. 5, the device includes:
反馈模块52与安全模块42连接,设置为在判定该MAC地址不是该受信MAC地址的情况下,给控制终端反馈该MAC地址不是该受信MAC地址的信息。The feedback module 52 is connected to the security module 42 and is configured to, when determining that the MAC address is not the trusted MAC address, feed back to the control terminal that the MAC address is not the trusted MAC address.
图6是根据本发明实施例的一种遥控终端的装置的结构框图五,如图6所示,该装置除包括图2所示的所有模块外,还包括:FIG. 6 is a structural block diagram 5 of a device for controlling a remote terminal according to an embodiment of the present invention. As shown in FIG. 6 , the device includes:
删除模块62与判定模块24连接,设置为在该控制终端的IP为已接入IP的情况下,该被控制终端删除该接入请求信息,设置为在判定该控制终端的网络协议地址IP是否为已接入IP之后,在该控制终端的IP为已接入IP的情况下,删除该接入请求信息,由于本实施例的实现方案是,即使是同一IP地址的请求,并且当前IP地址已经连接到被控终端。还是可以接收指令,接收指令不显示在被控终端上,但在断开连接后,会不停接收到之前发送过的请求信息,不便于操作,也给用户造成困扰,删除已接入IP的接入请求信息后,简化了用户操作。The deletion module 62 is connected to the determination module 24, and is configured to delete the access request information when the IP of the control terminal is the accessed IP, and set the network protocol address IP of the control terminal to be After the IP address is accessed, if the IP address of the control terminal is the accessed IP address, the access request information is deleted. The implementation scheme of this embodiment is that even the request of the same IP address, and the current IP address. Already connected to the controlled terminal. The command can still be received, and the receiving command is not displayed on the controlled terminal, but after disconnecting, the received request information will be received continuously, which is inconvenient to operate, and also causes trouble to the user, and deletes the accessed IP. User access is simplified after access request information.
需要说明的是,上述各个模块是可以通过软件或硬件来实现的,对于后者,可以通过以下方式实现,但不限于此:上述模块均位于同一处理器中;或者,上述模块分别位于多个处理器中。It should be noted that each of the above modules may be implemented by software or hardware. For the latter, the foregoing may be implemented by, but not limited to, the foregoing modules are all located in the same processor; or, the modules are located in multiple In the processor.
在本实施例中还提供了一种遥控终端的系统,通过本发明,被控制终端接收控制终端的接入请求信息,该被控制终端从该接入请求信息中获取该控制终端的物理地址MAC地址,判定该MAC地址是否为受信MAC地址,在判定该MAC地址是该受信MAC地址后,该被控制终端判定该控制终端的网络协议地址IP是否为已接入IP,该被控制终端依据记录的标记位验证该接入请求携带的标记位是否正确,在判定该标记位正确的情况下,接入该控制终端,其中,该接入请求携带的标记位为该被控制终端发送给该控制终端的,该控制终端的IP与该标记位相对应,解决了终端设备不能由多个遥控设备同时遥控操作的问题,实现了多个遥控 终端同时遥控操作目标终端。In this embodiment, a system for controlling a remote terminal is further provided. The controlled terminal receives the access request information of the control terminal, and the controlled terminal acquires the physical address MAC of the control terminal from the access request information. An address, determining whether the MAC address is a trusted MAC address, and after determining that the MAC address is the trusted MAC address, the controlled terminal determines whether the network protocol address IP of the control terminal is an accessed IP, and the controlled terminal according to the record The flag bit verifies whether the flag bit carried by the access request is correct, and if the flag bit is determined to be correct, accessing the control terminal, where the flag bit carried by the access request is sent to the controlled terminal by the controlled terminal The IP address of the control terminal corresponds to the marked bit, which solves the problem that the terminal device cannot be remotely operated by multiple remote control devices at the same time, and realizes multiple remote control The terminal simultaneously operates the target terminal remotely.
下面结合优选实施例和实施方式对本发明进行详细说明The present invention will be described in detail below in conjunction with the preferred embodiments and embodiments.
在本发明的优选实施例中,在被控制终端的内存区域中,预存指令栈,该指令栈相当于上述实施例中判定模块24的部分功能,该指令栈内划分指令区域标记发送指令终端IP地址与指令标号,同一IP地址标号只接收第一指令,并设置断开标记位,若第一指令已被接收,则第二指令发送后,终端会给控制终端反馈已接收信息,销毁第二指令;当第一指令断开后,方可接收重新发送的指令。不同IP地址可重复发送控制信息。被控制终端记录发送请求地址消息,发送请求地址消息必须经过被控制终端校验后方可实施。若第一IP地址已发送消息并确认消息接收成功,连接接口即封闭,后续发送请求消息根据发送IP地址分别处理,若为同一IP则拒绝,若为非同一IP,则需要重新连接校验流程。In a preferred embodiment of the present invention, in the memory area of the controlled terminal, the instruction stack is prestored, and the instruction stack is equivalent to a part of the function of the determining module 24 in the above embodiment, and the instruction instruction area is marked in the instruction stack to send the instruction terminal IP. The address and the instruction label, the same IP address label only receives the first instruction, and sets the disconnection flag bit. If the first instruction has been received, after the second instruction is sent, the terminal will feedback the received information to the control terminal, destroying the second The instruction can receive the resent instruction when the first instruction is disconnected. Control information can be sent repeatedly with different IP addresses. The controlled terminal records the transmission request address message, and the transmission request address message must be verified by the controlled terminal before being implemented. If the first IP address has been sent and the message is successfully received, the connection interface is closed, and the subsequent request message is processed according to the sending IP address. If it is the same IP, the connection is rejected. If it is not the same IP, the verification process needs to be reconnected. .
遥控过程中,接收IP信息,IP地址接收指令,在接收指令字段按时间顺序排序操作。During the remote control process, the IP information is received, the IP address receives the command, and the receiving command field is sorted in chronological order.
安全保护措施,相当于上述实施例中的接入模块26和发送模块32,在第一次认证过程中,会给认证MAC地址发送一个固定标记位,会要求控制设备发送固定标记位,固定标记位在控制帧空白字段,固定标记位验证信息存储于接入IP字段,由于已接入IP已为可受信IP,若为克隆MAC地址,指令可得到安全控制,无法校验控制帧空白字段的固定标记位,做好安全防控。The security protection measure is equivalent to the access module 26 and the sending module 32 in the foregoing embodiment. During the first authentication process, a fixed tag bit is sent to the authentication MAC address, and the control device is required to send a fixed tag bit and a fixed tag. Bit in the control frame blank field, the fixed tag bit verification information is stored in the access IP field, since the accessed IP is already a trusted IP, if the cloned MAC address is used, the command can be safely controlled, and the control frame blank field cannot be verified. Fix the mark position and do safety and control.
本发明的优选实施例提供了一种远程控制被控终端的系统,图7是根据本发明优选实施例的一种遥控终端的装置结构示意图,如图7所示,该装置包括:A preferred embodiment of the present invention provides a system for remotely controlling a controlled terminal. FIG. 7 is a schematic structural diagram of a remote control terminal according to a preferred embodiment of the present invention. As shown in FIG. 7, the device includes:
终端1,终端2,为控制终端,起到远程遥控作用;Terminal 1, terminal 2, which is a control terminal, functions as a remote control;
被控设备包括:The controlled devices include:
1.内存栈:1. Memory stack:
(1).存储受信MAC地址或受信IP地址存储区域,相当于上述实施例中安全模块42的部分功能;用户可存储受信MAC地址或受信IP地址,作为鉴权使用,每个控制终端的MAC地址分配固定IP。(1) storing a trusted MAC address or a trusted IP address storage area, which is equivalent to some functions of the security module 42 in the above embodiment; the user can store the trusted MAC address or the trusted IP address, which is used for authentication, and the MAC of each control terminal. The address is assigned a fixed IP.
(2).接入IP地址,相当于上述实施例中判定模块24的部分功能:存储接入的IP地址,作为连接判断依据,后续接入的数据,若为同一IP,则不再接受接入请求,若为不同IP才允许接入,即指令已发送则置标记位为1,不再接受第二指令,断开后,才可接受第二指令,该区域也用于存储验证固定比较位。(2) The access IP address is equivalent to the partial function of the determining module 24 in the foregoing embodiment: storing the accessed IP address as the connection judgment basis, and if the subsequent access data is the same IP, the access is no longer accepted. Incoming request, if access is allowed for different IPs, that is, if the instruction has been sent, the flag bit is set to 1, and the second instruction is no longer accepted. After disconnection, the second instruction is accepted, and the area is also used for storage verification. Bit.
(3).接入指令存储区域,相当于上述实施例中接收模块22的部分功能:按顺序存储遥控指令。(3) The access instruction storage area is equivalent to the partial function of the receiving module 22 in the above embodiment: the remote command is stored in order.
2.安全认证,即安全判断模块,相当于上述实施例中安全模块42的部分功能,用于对比请求终端的MAC地址,以及接入IP是否与被控终端内存储的MAC地址与IP地址相同。 2. The security authentication, that is, the security judgment module, is equivalent to some functions of the security module 42 in the foregoing embodiment, and is used to compare the MAC address of the requesting terminal, and whether the access IP is the same as the MAC address and the IP address stored in the controlled terminal. .
本发明还提供了控制过程实施例,图8是根据本发明优选实施例的一种遥控终端的控制过程流程图,如图8所示,其步骤包括:The present invention also provides a control process embodiment. FIG. 8 is a flowchart of a control process of a remote control terminal according to a preferred embodiment of the present invention. As shown in FIG. 8, the steps include:
步骤S802,接收控制指令Step S802, receiving a control instruction
步骤S804,指令在接收指令存储区域按接收顺序排序Step S804, the instructions are sorted in the receiving order storage area according to the receiving order
步骤S806,依次执行控制指令Step S806, executing control commands in sequence
本发明的优选实施例还提供了一个系统交互方法实施例,图9是根据本发明优选实施例的一种遥控终端的流程图,如图9所示,其步骤包括:A preferred embodiment of the present invention also provides a system interaction method embodiment. FIG. 9 is a flowchart of a remote control terminal according to a preferred embodiment of the present invention. As shown in FIG. 9, the steps include:
步骤S901,接收控制终端发送的接入请求,该请求来自于与被控终端在同一无线保真(Wireless-Fldelity,简称WiFi)环境下的终端,连接方式包括但不限于WiFi直连,WiFi共享(WiFi-tethering)连接以及WiFi接入Step S901: Receive an access request sent by the control terminal, where the request is from a terminal in the same Wireless-Fldelity (WiFi) environment as the controlled terminal, and the connection manner includes but is not limited to WiFi direct connection, and WiFi sharing (WiFi-tethering) connection and WiFi access
步骤S902,接收到请求后,被控终端要求获取控制终端的MAC地址Step S902, after receiving the request, the controlled terminal requests to obtain the MAC address of the control terminal.
步骤S903,接收到控制终端反馈的MAC地址Step S903, receiving a MAC address fed back by the control terminal
步骤S904,判断该MAC地址是否为可信MAC地址,可信MAC地址来自于用户手动设置,即在被控终端内部存储可信MAC地址列表,通过与可信MAC地址列表对比来确认控制终端MAC地址是否为可信MAC地址Step S904, determining whether the MAC address is a trusted MAC address, and the trusted MAC address is manually set by the user, that is, storing a list of trusted MAC addresses in the controlled terminal, and confirming the control terminal MAC by comparing with the trusted MAC address list. Whether the address is a trusted MAC address
步骤S905,若为非受信MAC地址,拒绝该请求,给终端反馈,该MAC地址为非受信MAC地址Step S905, if it is a non-trusted MAC address, rejecting the request, and feeding back to the terminal, the MAC address is an untrusted MAC address.
步骤S906,判断是否为已接入IP(已接入MAC地址会分配固定IP,该IP若处于连接状态则标志为始终为1,若断开则标志位置为0)Step S906, determining whether it is an accessed IP (a fixed IP is assigned to the accessed MAC address, the flag is always 1 if the IP is in the connected state, and the flag is 0 if it is disconnected)
步骤S907,若是已接入IP给控制终端反馈信息,该IP地址为已接入IP地址。Step S907: If the IP is accessed to the control terminal, the IP address is the accessed IP address.
步骤S908,若是已接入IP则销毁发送的请求指令(由于目前产品的实现方案是,即使是同一IP地址的请求,并且当前IP地址已经连接到被控终端。还是可以接受指令,接受指令不显示在被控终端上,但再断开连接后,会不停接受到之前发送过的请求信息,不便于操作,也给用户造成困扰。顾需要销毁已连接IP地址的第二指令请求)Step S908, if the IP is already accessed, the sent request instruction is destroyed (since the current product implementation scheme is that even if the request is the same IP address, and the current IP address is already connected to the controlled terminal, the instruction can be accepted, and the instruction is not accepted. Displayed on the controlled terminal, but after disconnecting, it will continue to receive the request information sent before, which is not easy to operate, and also causes trouble to the user. Consider the second instruction request to destroy the connected IP address)
步骤S909,若不是已接入IP,则判断是否为首次连接Step S909, if it is not already connected to the IP, it is determined whether it is the first connection.
步骤S910,若为首次连接,发送标记位给控制终端,该标记位通过wifi发送,由于902.11帧,帧头(Mac header)的Type字段,控制帧的Subtype值0000~1001是Reserved,目前并未使用,可随机向该控制终端标记并未使用的字段,要求控制终端记录该标记位。同时将标记位位置记录在IP接入存储区域。例如某MAC地址已列入白名单,同时判断为首次接入,被控终端分配0101为该MAC地址/IP地址标记位,并记录对应标记位。Step S910, if it is the first connection, send a flag bit to the control terminal, and the flag bit is sent through the wifi. Because of the 902.11 frame, the Type field of the MAC header, the Subtype value of the control frame 0000 to 1001 is Reserved, and currently If used, the control terminal may be randomly marked with a field that is not used, and the control terminal is required to record the flag bit. At the same time, the mark bit position is recorded in the IP access storage area. For example, a MAC address has been whitelisted and judged to be the first access. The controlled terminal allocates 0101 as the MAC address/IP address tag and records the corresponding tag bit.
步骤S911,若是非首次接入已接入IP,则接收该请求,验证控制设备通过wifi发送固定 标记位,判断标记位是否正确Step S911, if the non-first access has accessed the IP, the request is received, and the verification control device sends the fixed by wifi. Mark the bit to determine if the mark is correct
步骤S912,若标记位为空,或标记位不正确,则拒绝该请求,并给控制终端反馈,该MAC地址为克隆MAC地址,不允许接入Step S912, if the flag bit is empty, or the flag bit is incorrect, the request is rejected, and the control terminal feeds back, the MAC address is a clone MAC address, and the access is not allowed.
步骤S913,若标记位正确,则将IP地址存入接收IP地址存储区域Step S913, if the flag bit is correct, the IP address is stored in the receiving IP address storage area.
步骤S914,该已接入控制终端的IP接入标记位设置为1Step S914, the IP access flag bit of the accessed control terminal is set to 1
通过上述步骤,用户在家中使用投影设备,相关技术中投影设备接入方式为IP接入后,只有IP断开才可以再接入另一IP,操作不便捷,也无法多人使用,通过本发明的的优选实施例,在一个用户通过IP接入投影设备后,并不影响另一用户接入该投影设备对其进行远程遥控,同时可在投影设备中设定可信的MAC地址和只接收第一请求接入指令接收的设置,也能满足安全防控的要求。Through the above steps, the user uses the projection device at home. In the related art, after the access mode of the projection device is IP access, only the IP is disconnected before the other IP can be accessed, the operation is not convenient, and the multi-person cannot be used. A preferred embodiment of the invention, after a user accesses the projection device through IP, does not affect another user accessing the projection device for remote control thereof, and can set a trusted MAC address and only the projection device. Receiving the settings received by the first request access command can also meet the requirements of security prevention and control.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到根据上述实施例的方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本发明各个实施例所述的方法。本发明的实施例还提供了一种存储介质。可选地,在本实施例中,上述存储介质可以被设置为存储用于执行上述实施例的方法步骤的程序代码:Through the description of the above embodiments, those skilled in the art can clearly understand that the method according to the above embodiment can be implemented by means of software plus a necessary general hardware platform, and of course, by hardware, but in many cases, the former is A better implementation. Based on such understanding, the technical solution of the present invention, which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk, The optical disc includes a number of instructions for causing a terminal device (which may be a cell phone, a computer, a server, or a network device, etc.) to perform the methods described in various embodiments of the present invention. Embodiments of the present invention also provide a storage medium. Optionally, in the embodiment, the storage medium may be configured to store program code for performing the method steps of the above embodiment:
可选地,在本实施例中,上述存储介质可以包括但不限于:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。Optionally, in this embodiment, the foregoing storage medium may include, but not limited to, a USB flash drive, a Read-Only Memory (ROM), a Random Access Memory (RAM), a mobile hard disk, and a magnetic memory. A variety of media that can store program code, such as a disc or a disc.
可选地,在本实施例中,处理器根据存储介质中已存储的程序代码执行上述实施例的方法步骤。Optionally, in this embodiment, the processor performs the method steps of the foregoing embodiments according to the stored program code in the storage medium.
可选地,本实施例中的具体示例可以参考上述实施例及可选实施方式中所描述的示例,本实施例在此不再赘述。For example, the specific examples in this embodiment may refer to the examples described in the foregoing embodiments and the optional embodiments, and details are not described herein again.
显然,本领域的技术人员应该明白,上述的本发明的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,可选地,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本发明不限制于任何特定的硬件和软件结合。It will be apparent to those skilled in the art that the various modules or steps of the present invention described above can be implemented by a general-purpose computing device that can be centralized on a single computing device or distributed across a network of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein. The steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof are fabricated as a single integrated circuit module. Thus, the invention is not limited to any specific combination of hardware and software.
以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。 The above description is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.
工业实用性Industrial applicability
基于本发明实施例提供的上述技术方案,被控制终端接收控制终端的接入请求信息,该被控制终端判定该接入请求信息中的IP是否为已接入IP,在判定该控制终端的IP不是已接入IP时,该被控制终端依据记录的标记位验证该接入请求携带的标记位是否正确,在判定该标记位正确的情况下,接入该控制终端,其中,该接入请求携带的标记位为该被控制终端发送给该控制终端的,该控制终端的IP与该标记位相对应,解决了终端设备不能由多个遥控设备同时遥控操作的问题,实现了多个遥控终端同时遥控操作目标终端。 Based on the foregoing technical solution provided by the embodiment of the present invention, the controlled terminal receives the access request information of the control terminal, and the controlled terminal determines whether the IP in the access request information is an accessed IP, and determines the IP of the control terminal. When the IP address is not accessed, the controlled terminal verifies whether the flag bit carried by the access request is correct according to the recorded flag bit, and accesses the control terminal if the flag bit is determined to be correct, where the access request is The carried flag is sent to the control terminal by the controlled terminal, and the IP of the control terminal corresponds to the marked bit, which solves the problem that the terminal device cannot be remotely operated by multiple remote control devices at the same time, and realizes multiple remote control terminals simultaneously Remotely operate the target terminal.

Claims (13)

  1. 一种遥控终端的方法,包括:A method of remotely controlling a terminal, comprising:
    被控制终端接收控制终端的接入请求信息;The controlled terminal receives the access request information of the control terminal;
    所述被控制终端判定所述接入请求信息中的网络协议地址IP是否为已接入IP;Determining, by the controlled terminal, whether the network protocol address IP in the access request information is an accessed IP;
    在判定所述控制终端的IP不是已接入IP时,所述被控制终端依据记录的标记位验证所述接入请求携带的标记位是否正确,在判定所述标记位正确的情况下,接入所述控制终端,其中,所述接入请求携带的标记位为所述被控制终端发送给所述控制终端的,所述控制终端的IP与所述标记位相对应。When it is determined that the IP of the control terminal is not an access IP, the controlled terminal verifies whether the flag bit carried by the access request is correct according to the recorded flag bit, and if it is determined that the flag bit is correct, And entering the control terminal, where the marking bit carried by the access request is sent by the controlled terminal to the control terminal, and the IP of the control terminal corresponds to the marking bit.
  2. 根据权利要求1所述的方法,其中,在判定所述控制终端的IP不是已接入IP时之后,所述方法还包括:The method of claim 1, wherein after determining that the IP of the control terminal is not already connected to an IP, the method further comprises:
    判断所述控制终端是否是首次连接,若是首次连接,发送所述控制终端的IP对应的所述标记位给所述控制终端,所述被控制终端记录所述标记位。Determining whether the control terminal is the first connection, and if it is the first connection, sending the flag bit corresponding to the IP of the control terminal to the control terminal, and the controlled terminal records the flag bit.
  3. 根据权利要求1所述的方法,其中,被控制终端判定所述接入请求信息中的网络协议地址IP是否为已接入IP之前,所述方法还包括:The method according to claim 1, wherein the method further comprises: before the controlled terminal determines whether the network protocol address IP in the access request information is an access IP, the method further comprises:
    所述被控制终端从所述接入请求信息中获取所述控制终端的物理地址MAC地址,判定所述MAC地址是否为受信MAC地址;The controlled terminal acquires a physical address MAC address of the control terminal from the access request information, and determines whether the MAC address is a trusted MAC address;
    其中,在判定所述MAC地址是所述受信MAC地址后,判定所述接入请求信息中的网络协议地址IP是否为已接入IP。After determining that the MAC address is the trusted MAC address, determining whether the network protocol address IP in the access request information is an accessed IP.
  4. 根据权利要求3所述的方法,其中,所述方法还包括:The method of claim 3, wherein the method further comprises:
    在判定所述MAC地址不是所述受信MAC地址的情况下,给控制终端反馈所述MAC地址不是所述受信MAC地址的信息。In the case that it is determined that the MAC address is not the trusted MAC address, the control terminal feeds back information that the MAC address is not the trusted MAC address.
  5. 根据权利要求1所述的方法,其中,在判定所述控制终端的网络协议地址IP是否为已接入IP之后,所述方法还包括:The method of claim 1, wherein after determining whether the network protocol address IP of the control terminal is an accessed IP, the method further comprises:
    在所述控制终端的IP为已接入IP的情况下,所述被控制终端删除所述接入请求信息。When the IP of the control terminal is an accessed IP, the controlled terminal deletes the access request information.
  6. 根据权利要求1至权利要求5任一项所述的方法,其中,所述被控制终端发送所述控制终端的IP对应的标记位给所述控制终端包括:The method according to any one of claims 1 to 5, wherein the control terminal transmitting the flag bit corresponding to the IP of the control terminal to the control terminal comprises:
    所述被控制终端通过无线保真WiFi通信方式中控制帧的冗余位携带所述控制终端的IP对应的标记位,发送给所述控制终端。The controlled terminal carries the flag bit corresponding to the IP of the control terminal in the redundant bit of the control frame in the wireless fidelity WiFi communication mode, and sends the flag bit to the control terminal.
  7. 一种遥控终端的装置,包括:A device for remotely controlling a terminal, comprising:
    接收模块,设置为被控制终端接收控制终端的接入请求信息;a receiving module, configured to receive, by the control terminal, access request information of the control terminal;
    判定模块,设置为所述被控制终端判定所述接入请求信息中的网络协议地址IP是否 为已接入IP;a determining module, configured to determine, by the controlled terminal, whether a network protocol address IP in the access request information is Is already connected to the IP;
    接入模块,设置为在判定所述控制终端的IP不是已接入IP时,所述被控制终端依据记录的标记位验证所述接入请求携带的标记位是否正确,在判定所述标记位正确的情况下,接入所述控制终端,其中,所述接入请求携带的标记位为所述被控制终端发送给所述控制终端的,所述控制终端的IP与所述标记位相对应。An access module, configured to: when determining that the IP of the control terminal is not an access IP, the controlled terminal verifies whether the flag bit carried by the access request is correct according to the recorded flag bit, and determines the flag bit In the right case, the control terminal is accessed, wherein the flag bit carried by the access request is sent by the controlled terminal to the control terminal, and the IP of the control terminal corresponds to the flag bit.
  8. 根据权利要求7所述的装置,其中,在判定所述控制终端的IP不是已接入IP时之后,所述装置还包括:The apparatus according to claim 7, wherein after determining that the IP of the control terminal is not already connected to the IP, the apparatus further comprises:
    发送模块,设置为判断所述控制终端是否是首次连接,若是首次连接,发送所述控制终端的IP对应的所述标记位给所述控制终端,所述被控制终端记录所述标记位。The sending module is configured to determine whether the control terminal is the first connection, and if it is the first connection, send the flag bit corresponding to the IP of the control terminal to the control terminal, and the controlled terminal records the flag bit.
  9. 根据权利要求7所述的装置,其中,所述装置还包括:The apparatus of claim 7 wherein said apparatus further comprises:
    安全模块,设置为所述被控制终端从所述接入请求信息中获取所述控制终端的物理地址MAC地址,判定所述MAC地址是否为受信MAC地址;a security module, configured to: obtain, by the controlled terminal, a physical address MAC address of the control terminal from the access request information, and determine whether the MAC address is a trusted MAC address;
    其中,在判定所述MAC地址是所述受信MAC地址后,判定所述接入请求信息中的网络协议地址IP是否为已接入IP。After determining that the MAC address is the trusted MAC address, determining whether the network protocol address IP in the access request information is an accessed IP.
  10. 根据权利要求9所述的装置,其中,所述装置还包括:The apparatus of claim 9 wherein said apparatus further comprises:
    反馈模块,设置为在判定所述MAC地址不是所述受信MAC地址的情况下,给控制终端反馈所述MAC地址不是所述受信MAC地址的信息。The feedback module is configured to, when determining that the MAC address is not the trusted MAC address, feed back to the control terminal that the MAC address is not the trusted MAC address.
  11. 根据权利要求7所述的装置,其中,所述装置还包括:The apparatus of claim 7 wherein said apparatus further comprises:
    删除模块,设置为在所述控制终端的IP为已接入IP的情况下,所述被控制终端删除所述接入请求信息。And deleting the module, where the controlled terminal deletes the access request information if the IP of the control terminal is an accessed IP.
  12. 根据权利要求7至权利要求11任一项所述的装置,其中,所述被控制终端发送所述控制终端的IP对应的标记位给所述控制终端包括:The device according to any one of claims 7 to 11, wherein the control terminal transmitting the flag bit corresponding to the IP of the control terminal to the control terminal comprises:
    所述被控制终端通过WiFi通信方式中控制帧的冗余位携带所述控制终端的IP对应的标记位,发送给所述控制终端。The controlled terminal carries the flag bit corresponding to the IP of the control terminal in the redundant bit of the control frame in the WiFi communication mode, and sends the flag bit to the control terminal.
  13. 一种遥控终端的系统,包括:被控制终端,控制终端;A system for remotely controlling a terminal, comprising: a controlled terminal, and a control terminal;
    所述被控制终端,设置为接收所述控制终端的接入请求信息;The controlled terminal is configured to receive access request information of the control terminal;
    所述被控制终端,设置为从所述接入请求信息中获取所述控制终端的物理地址MAC地址,判定所述MAC地址是否为受信MAC地址;在判定所述MAC地址是所述受信MAC地址后,判定所述接入请求信息中的网络协议地址IP是否为已接入IP;以及在判定所述控制终端的IP不是已接入IP时,依据记录的标记位验证所述接入请求携带的标记位是否正确,在判定所述标记位正确的情况下,接入所述控制终端,其中,所述接入请求携带的 标记位为所述被控制终端发送给所述控制终端的,所述控制终端的IP与所述标记位相对应。 The controlled terminal is configured to obtain a physical address MAC address of the control terminal from the access request information, determine whether the MAC address is a trusted MAC address, and determine that the MAC address is the trusted MAC address. Determining whether the network protocol address IP in the access request information is an accessed IP; and when determining that the IP of the control terminal is not an access IP, verifying that the access request is carried according to the recorded flag bit. Whether the flag bit is correct, and if the flag bit is determined to be correct, accessing the control terminal, wherein the access request is carried The flag bit is sent to the control terminal by the controlled terminal, and the IP of the control terminal corresponds to the flag bit.
PCT/CN2016/072200 2015-09-23 2016-01-26 Method, apparatus, and system for remotely controlling terminal WO2016165447A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510613615.6 2015-09-23
CN201510613615.6A CN106548611A (en) 2015-09-23 2015-09-23 The method of remote terminal, apparatus and system

Publications (1)

Publication Number Publication Date
WO2016165447A1 true WO2016165447A1 (en) 2016-10-20

Family

ID=57125770

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/072200 WO2016165447A1 (en) 2015-09-23 2016-01-26 Method, apparatus, and system for remotely controlling terminal

Country Status (2)

Country Link
CN (1) CN106548611A (en)
WO (1) WO2016165447A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108206858A (en) * 2016-12-16 2018-06-26 杭州零零科技有限公司 A kind of long-range control method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101344985A (en) * 2008-08-26 2009-01-14 刘正东 Wireless remote control method
CN102087778A (en) * 2009-12-02 2011-06-08 希姆通信息技术(上海)有限公司 Wireless fidelity (WIFI)-based household appliance control system
CN104519593A (en) * 2013-09-26 2015-04-15 中国移动通信集团公司 Method and equipment for wireless remote control
US20150130596A1 (en) * 2010-12-13 2015-05-14 Zoran Corporation Systems and methods for remote control adaptive configuration

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100556242B1 (en) * 2002-07-27 2006-03-03 삼성전자주식회사 Remote control system for internet and remote control method refrigerator
CN102271313B (en) * 2010-06-04 2014-06-11 中兴通讯股份有限公司 Mobile-communication-network-based remote appliance control system and method
CN103312573B (en) * 2013-06-14 2016-12-28 西安交通大学 A kind of domestic network system equipment finds and recognition methods
US20150098455A1 (en) * 2013-10-09 2015-04-09 Darren William Fritsch WiFi Enabled Wide Area Automation System
WO2015157942A1 (en) * 2014-04-16 2015-10-22 华为终端有限公司 Device and method for accessing wireless network
CN104869253A (en) * 2015-05-19 2015-08-26 北京五悦信息科技有限公司 Method and system for connecting mobile terminal to intelligent dressing mirror

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101344985A (en) * 2008-08-26 2009-01-14 刘正东 Wireless remote control method
CN102087778A (en) * 2009-12-02 2011-06-08 希姆通信息技术(上海)有限公司 Wireless fidelity (WIFI)-based household appliance control system
US20150130596A1 (en) * 2010-12-13 2015-05-14 Zoran Corporation Systems and methods for remote control adaptive configuration
CN104519593A (en) * 2013-09-26 2015-04-15 中国移动通信集团公司 Method and equipment for wireless remote control

Also Published As

Publication number Publication date
CN106548611A (en) 2017-03-29

Similar Documents

Publication Publication Date Title
US11848939B2 (en) System and method for managing and securing a distributed ledger for a decentralized peer-to-peer network
EP3323246B1 (en) Using temporary credentials in guest mode
US11055397B2 (en) Methods, mediums, and systems for establishing and using security questions
US10506068B2 (en) Cloud-based cross-device digital pen pairing
US10645557B2 (en) Transferable ownership tokens for discrete, identifiable devices
KR101673238B1 (en) Method, apparatus, electronic device, program and recording medium for connection management
WO2016165536A1 (en) Identity verification method and device
CN110602216B (en) Method and device for using single account by multiple terminals, cloud server and storage medium
JP6756009B2 (en) Data transmission
US9137245B2 (en) Login method, apparatus, and system
WO2014172956A1 (en) Login method,apparatus, and system
US20170223539A1 (en) Authentication method, wireless router and computer storage medium
CN108289074B (en) User account login method and device
CN103905399A (en) Account registration management method and apparatus
US9092612B2 (en) Method and system for secure access to data files copied onto a second storage device from a first storage device
WO2017084456A1 (en) Wifi hotspot processing method, device and system
US10681094B2 (en) Control system, communication control method, and program product
US10567962B1 (en) Systems and methods for connecting internet-connected devices to wireless access points
US20150020167A1 (en) System and method for managing files
CN114760112B (en) Wireless local area network-oriented intelligent home equipment networking method, system, equipment and storage medium
WO2022105365A1 (en) Device control method and system, electronic device, and storage medium
CN113271299A (en) Login method and server
WO2019091458A1 (en) Wireless connection method, wireless access point, terminal, and device having storage function
WO2016165447A1 (en) Method, apparatus, and system for remotely controlling terminal
WO2018010256A1 (en) Method and device for wi-fi sharing

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16779422

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 3015206

Country of ref document: CA

122 Ep: pct application non-entry in european phase

Ref document number: 16779422

Country of ref document: EP

Kind code of ref document: A1