WO2017118183A1 - 远程控制方法,系统,远控执行方法,系统及移动终端 - Google Patents

远程控制方法,系统,远控执行方法,系统及移动终端 Download PDF

Info

Publication number
WO2017118183A1
WO2017118183A1 PCT/CN2016/103888 CN2016103888W WO2017118183A1 WO 2017118183 A1 WO2017118183 A1 WO 2017118183A1 CN 2016103888 W CN2016103888 W CN 2016103888W WO 2017118183 A1 WO2017118183 A1 WO 2017118183A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
operation behavior
data signal
remote
remote operation
Prior art date
Application number
PCT/CN2016/103888
Other languages
English (en)
French (fr)
Inventor
王登峰
Original Assignee
上海斐讯数据通信技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海斐讯数据通信技术有限公司 filed Critical 上海斐讯数据通信技术有限公司
Publication of WO2017118183A1 publication Critical patent/WO2017118183A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q9/00Arrangements in telecontrol or telemetry systems for selectively calling a substation from a main station, in which substation desired apparatus is selected for applying a control signal thereto or for obtaining measured values therefrom

Definitions

  • the invention belongs to the technical field of mobile communication, and relates to a control method and system, in particular to a remote control method, a system, a remote control execution method, a system and a mobile terminal.
  • the prior art uses one mobile device to control other mobile devices.
  • the specific method is to use the MHL protocol to encapsulate the touch signals, so that the touch signals can be anti-interference transmission, and the MHL protocol is A protocol in multimedia and the MHL interface is used to transmit signals. If the device does not have an MHL interface, there is no way to implement such a scheme. Therefore, the scheme has strong limitations, and it does not perform touch signals. Filtering, if it is a mistake, it will also be executed, not very protective.
  • the present invention aims to provide a remote control method, a system, a remote control execution method, a system, and a mobile terminal, which are used to solve the problem of realizing a mobile device remotely by using the MHL protocol in the prior art.
  • the control method for controlling multiple mobile devices because the MHL protocol requires the MHL interface to transmit signals, if the mobile device does not have an MHL interface, the remote control cannot be implemented, and has a strong limitation, and is accompanied by a misoperation.
  • Protective issues are used to provide a remote control method, a system, a remote control execution method, a system, and a mobile terminal, which are used to solve the problem of realizing a mobile device remotely by using the MHL protocol in the prior art.
  • an aspect of the present invention provides a remote control method, which is applied to a communication network including a master mobile terminal and a plurality of controlled mobile terminals bound to the master mobile terminal, Remote control method
  • the method includes the following steps: transmitting a connection request data signal to the controlled mobile terminal, and receiving a first feedback data signal related to the connection request data signal from the controlled mobile terminal; the first feedback data signal includes Marking a label of the routing information of the controlled mobile terminal to the master mobile terminal; establishing a data transmission tunnel with the controlled mobile terminal according to the label; reading the input to the controlled mobile
  • the remote operation behavior of the terminal identifying the legitimacy of the remote operation behavior, and converting the legality of the remote operation behavior into a legal flag bit or an illegal flag bit; the remote operation behavior of the controlled mobile terminal, the tag And the legal flag bit or the illegal flag bit is encapsulated into an operation instruction to be sent; after the controlled mobile terminal receives the operation instruction, receiving a second feedback data signal originating from the controlled mobile terminal to determine whether it is executed
  • the step of identifying the legitimacy of the remote operation behavior specifically refers to: searching the remote operation behavior one by one in a pre-stored legal operation behavior database and an illegal operation behavior database to detect the remote operation behavior. Legitimacy.
  • finding the remote operation behavior in the legal operation behavior database indicates that the remote operation behavior has legality; and finding the remote operation behavior in the illegal operation behavior database indicates the Remote operation behavior is illegal.
  • the legal flag is represented by 0; the corresponding illegal flag is represented by 1; or the legal flag is represented by 1; and the corresponding illegal flag is represented by 0.
  • the step of establishing a data transmission tunnel with the controlled mobile terminal according to the label specifically refers to establishing, by the multi-protocol label switching protocol, the label and the Control the data transmission tunnel between mobile terminals.
  • a remote control system which is applied to a communication network including a master mobile terminal and a plurality of controlled mobile terminals bound to the master mobile terminal, and the remote control system includes: first communication a module, configured to send a connection request data signal to the controlled mobile terminal, and receive a first feedback data signal related to the connection request data signal from the controlled mobile terminal; the first feedback data signal includes Marking a label of the routing information that the controlled mobile terminal routes to the master mobile terminal; a tunnel establishing module, connected to the first communications module, configured to establish a relationship with the controlled mobile terminal according to the label a data transmission tunnel; an operation module, connected to the tunnel establishment module, configured to read the input remote operation behavior of the controlled mobile terminal, identify the legality of the remote operation behavior, and perform the remote operation behavior The legality is converted into a legal flag or an illegal flag; the encapsulation module is connected to the operation module and the first communication module, and the controlled The remote operation behavior of the mobile terminal, the label, and the legal flag bit or the illegal flag bit are
  • Another aspect of the present invention provides a remote control execution method, which is applied to a communication network including a master mobile terminal and a plurality of controlled mobile terminals bound to the master mobile terminal, and the remote control execution method includes the following Step: receiving a connection request data signal originating from the master mobile terminal; determining whether the master mobile terminal is a trusted device; if yes, transmitting a first feedback data signal related to the connection request data signal to the master Controlling the mobile terminal; if not, rejecting communication with the mobile terminal; after receiving the first feedback data signal, the master mobile terminal receives an operation instruction encapsulating a remote operation behavior, a label, and a legal flag bit or an illegal flag bit If the operation instruction is a legality flag, performing the remote operation behavior, and feeding back a second feedback data signal that has performed the remote operation behavior to the master mobile terminal; if the operation is an illegal flag, the execution is refused The remote operation behavior feedbacks a second feedback data signal that rejects the remote operation behavior to the master mobile terminal.
  • a remote control execution system which is applied to a communication network including a master mobile terminal and a plurality of controlled mobile terminals bound to the master mobile terminal
  • the remote control execution system includes: a communication module, configured to receive a connection request data signal originating from the master mobile terminal; a determining module, connected to the second communication module, configured to determine whether the master mobile terminal is a trusted device; if yes, Calling the second communication module to send a first feedback data signal related to the connection request data signal to the master mobile terminal, and after receiving the first feedback data signal, the master mobile terminal receives the package a remote operation behavior, a label, and an operation instruction of a legal flag bit or an illegal flag bit; if not, causing the second communication module to refuse to communicate with the master mobile terminal; wherein, if the operation instruction is legal Marking, calling an execution module for performing the remote operation behavior, and causing the second communication module to feed back a second feedback data message that has performed a remote operation behavior Up to the master mobile terminal; if the operation instruction is legal Marking, calling
  • Yet another aspect of the present invention provides a mobile terminal, the mobile terminal comprising: the remote control system.
  • the last aspect of the present invention provides a mobile terminal, where the mobile terminal includes: the remote control execution system.
  • the remote control method, system, remote control execution method, system and mobile terminal of the present invention have the following beneficial effects:
  • the remote control method, system, remote control execution method, system and mobile terminal according to the present invention have no limitation of remote control, do not need to be changed on the mobile terminal, and expand the scope of connection control, realizing remote control at speed And double security.
  • FIG. 1 is a perspective view showing a mobile terminal of the present invention in an embodiment.
  • FIG. 2 is a flow chart showing the remote control method of the present invention in an embodiment.
  • FIG. 3 is a schematic diagram showing the principle structure of the remote control system of the present invention in an embodiment.
  • FIG. 4 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention.
  • FIG. 5 is a schematic flowchart showing the remote control execution method of the present invention in an embodiment.
  • FIG. 6 is a schematic diagram showing the principle structure of the remote control execution system of the present invention in an embodiment.
  • FIG. 7 is a schematic structural diagram of a mobile terminal according to another embodiment of the present invention.
  • the embodiment provides a remote control method, which is applied to a communication network including a master mobile terminal and a plurality of controlled mobile terminals bound to the master mobile terminal.
  • the remote control method includes the following steps:
  • the first feedback data signal includes a flag for marking the Controlling, by the mobile terminal, a label of routing information to the master mobile terminal;
  • the controlled mobile terminal After the controlled mobile terminal receives the operation instruction, receiving a second feedback data signal originating from the controlled mobile terminal to determine whether it executes the operation instruction.
  • FIG. 1 is a perspective view of a mobile terminal in an embodiment.
  • the mobile terminal 5 includes a touch display screen 50.
  • the touch display screen 50 provides an output interface and an input interface between the device and the user at the same time.
  • the touch display controller receives/transmits electrical signals from/to the touch display 50.
  • the touch display 50 then displays the visual output to the user.
  • This visual output can include text, graphics, video, and any combination thereof. Some or all of the visual output may correspond to a user interface object, as described in more detail below.
  • Touch display 50 also accepts user input based on tactile and/or tactile contacts.
  • the touch display screen 50 forms a touch sensitive surface that accepts user input.
  • the touch display 50 and the touch display controller (along with any associated modules and/or sets of instructions in the memory) detect contact on the touch display 50 (and any movement or interruption of the touch) and will detect The resulting contact is transformed into an interaction with a user interface object such as one or more soft keys displayed on touch display 50.
  • a user interface object such as one or more soft keys displayed on touch display 50.
  • the point of contact between the touch screen display 50 and the user corresponds to the user's One or more fingers.
  • the touch display 50 can use LCD (Liquid Crystal Display) technology or LPD (Light Emitting Polymer Display) technology, although other display technologies can be used in other embodiments.
  • Touch display 50 and touch display controller can detect contact and its movement or interruption using any of a variety of touch sensitive technologies including, but not limited to, capacitive, resistive, infrared, and surface acoustic wave techniques. And other proximity sensor arrays, or other techniques for determining one or more points in contact with the touch screen display 50.
  • the user can access the touch display screen 50 using any suitable object or accessory, such as a stylus, finger, or the like.
  • the contact/motion module is in conjunction with a touch screen display controller to detect contact with the touch screen display 50.
  • the contact/motion module includes various software components for performing various operations associated with contact detection with the touch display 50, such as determining whether a contact has occurred, determining whether the contact is moving, and tracking the touch display Move on 50 and determine if the contact is interrupted (ie, whether to stop contact).
  • the operation of determining the movement of the contact point may include determining the rate (amplitude), velocity (amplitude and direction), and/or acceleration (including amplitude and/or direction) of the contact point.
  • the contact/motion module and touch display controller also detect contact on the touchpad.
  • the mobile terminal 5 is, for example, a smart phone as shown in FIG. 1 as an example.
  • the smart phone is, for example, a smart phone that installs an Android operating system or an iOS operating system, or an operating system such as Palm OS, Symbian, or Blackberry OS 6.0 or Windows Phone 8.
  • FIG. 2 a schematic diagram of a flow of a remote control method in an embodiment is shown. As shown in FIG. 2, the remote control method specifically includes the following steps:
  • the master mobile terminal sends a connection request data signal to the controlled mobile terminal bound thereto, and receives a first feedback data signal that is related to the connection request data signal from the controlled mobile terminal.
  • the master mobile terminal identifies whether the mobile terminal is a controlled mobile terminal bound thereto by reading device information of the mobile terminal.
  • the device information of the controlled mobile terminal device bound to the master mobile terminal includes a specific identifier, and the master mobile terminal determines by identifying a specific identifier.
  • the first feedback data signal includes a label for marking routing information of the controlled mobile terminal to the master mobile terminal, in other words, the label is the controlled mobile
  • the terminal transmits the data information to the routing address information of the master mobile terminal.
  • Multi-Protocol Label Switching Protocol is a routing protocol. Its main principle is to establish data connection from the source to the destination, and label the path to implement the path encapsulation into a tunnel for fast delivery.
  • the predetermined manner refers to when the master mobile terminal enters a control mode of remotely controlling other controlled mobile terminals, by touching the
  • the preset area of the graphical user interface corresponding to the control mode of the master mobile terminal displays a floating window in the graphical user interface, and the user inputs a remote operation behavior of the controlled mobile terminal in the floating window.
  • the specific content for example, is that the mobile terminal is called to make a call, and the controlled mobile terminal downloads the application software to view the data information (including photos, videos, short messages, WeChat, QQ, etc.) on the controlled mobile terminal.
  • the legality of identifying the remote operation behavior specifically refers to searching the remote operation behavior one by one in the pre-stored legal operation behavior database and the illegal operation behavior database to detect the legality of the remote operation behavior.
  • illegal operations include illegally deleting contacts, dialing illegal numbers, illegally downloading application software, illegally accessing the Internet, and the like.
  • Finding the remote operation behavior in the legal operation behavior database indicates that the remote operation behavior has legality.
  • Finding the remote operation behavior in the illegal operation behavior database indicates that the remote operation behavior is illegal.
  • the legal flag bit is represented by 0; the corresponding illegal flag bit is represented by 1; or the legal flag bit is represented by 1; the corresponding illegal flag bit is represented by 0.
  • the legal flag bit or the illegal flag bit implements a firewall-like function to filter remote operation behavior.
  • the remote operation behavior of the controlled mobile terminal, the label, and the legal flag bit or the illegal flag bit are encapsulated into an operation instruction in a predetermined format.
  • the predetermined format is a tag + legal flag bit or an illegal flag bit + remote operation behavior of the controlled mobile terminal.
  • the remote control method described in this embodiment can be executed on any mobile terminal, without the limitation of remote control, without changing on the mobile terminal, and expanding the scope of connection control, realizing remote control in speed and security. Double protection.
  • the embodiment provides a remote control system 10, which is applied to a communication network including a master mobile terminal and a plurality of controlled mobile terminals bound to the master mobile terminal.
  • the master mobile terminal and the controlled mobile terminal are terminal devices with screens such as smart phones, tablet computers, and notebook computers.
  • FIG. 3 it is a schematic structural diagram of a remote control system in an embodiment.
  • the remote control system 10 includes a first communication module 101, a tunnel establishment module 102, an operation module 103, and a packaging module 104.
  • the first communication module 101 is configured to send a connection request data signal to the controlled mobile terminal bound thereto, and receive a first feedback data signal related to the connection request data signal from the controlled mobile terminal.
  • the first communication module 101 identifies whether the mobile terminal is controlled to be bound thereto by reading device information of the mobile terminal. Mobile terminal.
  • the device information of the controlled mobile terminal device bound to the master mobile terminal includes a specific identifier, and the master mobile terminal determines by identifying a specific identifier.
  • the first feedback data signal includes a label for marking routing information of the controlled mobile terminal to the master mobile terminal, in other words, the label is the controlled mobile
  • the terminal transmits the data information to the routing address information of the master mobile terminal.
  • the tunnel establishment module 102 connected to the first communication module 101 is configured to establish a data transmission tunnel with the controlled mobile terminal according to the label by calling a multi-protocol label switching protocol (MPLS protocol).
  • MPLS protocol Multi-Protocol Label Switching Protocol
  • MPLS Protocol is a routing protocol. Its main principle is to establish data connection from the source to the destination, and label the path to implement the path encapsulation into a tunnel for fast delivery.
  • the first communication module 101 may be a WIFI wireless communication module and a 3G/4G communication module.
  • the operation module 103 of the tunnel establishing module 102 is configured to read the input remote operation behavior of the controlled mobile terminal, identify the legality of the remote operation behavior, and convert the legality of the remote operation behavior into legal Flag bit or illegal flag bit.
  • the operation module 103 specifically includes: a reading unit 1031, an identification unit 1032, and a conversion unit 1033.
  • the reading unit 1031 is configured to read a remote operation behavior of the controlled mobile terminal input in a predetermined manner.
  • the predetermined manner refers to a pre-preparation of a graphical user interface corresponding to the control mode by touching the master mobile terminal when the master mobile terminal enters a control mode of remotely controlling other controlled mobile terminals.
  • Setting a window to display a floating window in the graphical user interface the user inputs a specific content of the remote operation behavior of the controlled mobile terminal in the floating window, for example, by calling the controlled mobile terminal to make a call, and being charged
  • the mobile terminal downloads the application software and views the data information (including photos, videos, short messages, WeChat, QQ, etc.) on the controlled mobile terminal.
  • the identification unit 1032 connected to the reading unit 1031 is for identifying the legitimacy of the remote operation behavior.
  • the legality of identifying the remote operation behavior specifically refers to searching the remote operation behavior one by one in the pre-stored legal operation behavior database and the illegal operation behavior database to detect the legality of the remote operation behavior.
  • illegal operations include illegally deleting contacts, dialing illegal numbers, illegally downloading application software, illegally accessing the Internet, and the like.
  • Finding the remote operation behavior in the legal operation behavior database indicates that the remote operation behavior has legality.
  • Finding the remote operation behavior in the illegal operation behavior database indicates that the remote operation behavior is illegal.
  • the conversion unit 1033 connected to the identification unit 1032 is configured to convert the legality of the remote operation behavior into a legal flag bit or an illegal flag bit.
  • the legal flag bit is represented by 0; the corresponding illegal flag bit is represented by 1; or the legal flag bit is represented by 1; the corresponding illegal flag bit is represented by 0.
  • the legal flag bit or the illegal flag bit implements a firewall-like function to filter remote operation behavior.
  • the encapsulation module 104 connected to the first communication module 101 and the operation module 103 is configured to encapsulate the remote operation behavior of the controlled mobile terminal, the label, and the legal flag bit or the illegal flag bit into a predetermined format.
  • the predetermined format is a tag + legal flag bit or an illegal flag bit + remote operation behavior of the controlled mobile terminal.
  • the present embodiment further provides a mobile terminal 2.
  • a mobile terminal 2 Referring to FIG. 4, it is a schematic structural diagram of a mobile terminal in an embodiment. As shown in FIG. 4, the mobile terminal 2 includes the remote control system 10 described above.
  • the remote control system and the mobile terminal having the remote control system can be executed on any mobile terminal without the limitation of remote control, and does not need to be changed on the mobile terminal, and the range of connection control is expanded. The dual guarantee of speed and safety of remote control is realized.
  • the embodiment provides a remote control execution method, which is applied to a communication network including a master mobile terminal and a plurality of controlled mobile terminals bound to the master mobile terminal.
  • the remote control execution method includes the following steps:
  • Determining whether the master mobile terminal is a trusted device if yes, transmitting a first feedback data signal related to the connection request data signal to the master mobile terminal; if not, rejecting communication with the master mobile terminal;
  • the master mobile terminal After receiving the first feedback data signal, the master mobile terminal receives an operation instruction encapsulating a remote operation behavior, a label, and a legal flag bit or an illegal flag bit;
  • the operation instruction is a legality flag, performing the remote operation behavior, and feeding back a second feedback data signal that has performed the remote operation behavior to the master mobile terminal;
  • the remote operation behavior is refused, and the second feedback data signal that refuses to perform the remote operation behavior is fed back to the master mobile terminal.
  • the remote control execution method described in this embodiment will be described in detail below with reference to the drawings.
  • the remote control execution method provided in this embodiment is applied to a communication network including a master mobile terminal and a plurality of controlled mobile terminals bound to the master mobile terminal.
  • the master mobile terminal and the controlled mobile terminal are terminal devices with screens such as smart phones, tablet computers, and notebook computers.
  • the remote control execution method specifically includes the following steps:
  • determining whether the master mobile terminal is a trusted device is determined by reading device information of the mobile terminal to identify whether the mobile terminal is a master mobile terminal.
  • the device information of the master mobile terminal includes a specific identifier indicating that the mobile terminal is a master device.
  • the present embodiment provides a remote control execution system 30.
  • a schematic structural diagram of the remote control execution system in an embodiment is shown.
  • the remote control execution system 30 includes a second communication module 301, a determination module 302, and an execution module 303.
  • the second communication module 301 is configured to receive a connection request data signal originating from the master mobile terminal.
  • the second communication module 301 can be a WIFI wireless communication module and a 3G/4G communication module.
  • the determining module 302 connected to the second communication module 301 is configured to determine whether the master mobile terminal is a trusted device; if yes, causing the second communication module 301 to send a first related to the connection request data signal The data signal is fed back to the master mobile terminal; if not, the communication with the master mobile terminal is refused.
  • the determining module 302 determines whether the master mobile terminal is a trusted device, and determines whether the mobile terminal is a master mobile terminal by reading device information of the mobile terminal.
  • the device information of the master mobile terminal includes a specific identifier indicating that the mobile terminal is a master device.
  • the second communication module 302 After receiving the first feedback data signal, the second communication module 302 receives an operation instruction encapsulating a remote operation behavior, a label, and a legal flag bit or an illegal flag bit.
  • the legal flag is represented by 0; the corresponding illegal flag is represented by 1.
  • the execution module 303 connected to the second communication module 301 and the determination module 302 is configured to read the operation instruction, and specifically read the flag bit in the operation instruction.
  • the operation instruction is a legality flag, that is, 0 is read
  • the remote operation behavior is performed, and the second feedback data signal that has performed the remote operation behavior is fed back to the master mobile terminal by the second communication module 301.
  • the operation is an illegal flag, that is, 1 is read, the remote operation behavior is refused, and the second feedback data signal that refuses to perform the remote operation behavior is fed back to the master mobile terminal through the second communication module 301. .
  • This embodiment further provides a mobile terminal 4.
  • FIG. 7 it is a schematic structural diagram of a mobile terminal in another embodiment. As shown in FIG. 7, the mobile terminal 4 includes the remote control execution system 30 described above.
  • the remote control method, system, remote control execution method, system and mobile terminal according to the present invention have no limitation of remote control, do not need to be changed on the mobile terminal, and expand the scope of connection control to achieve The dual control of remote control in terms of speed and safety. Therefore, the present invention effectively overcomes various shortcomings in the prior art and has high industrial utilization value.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本发明提供一种远程控制方法,包括:发送连接请求数据信号至被控移动终端,并接收第一反馈数据信号;第一反馈数据信号包括用于标记被控移动终端路由至主控移动终端的路由信息的标签;按照标签建立与被控移动终端之间的数据传输隧道;读取远程操作行为,识别远程操作行为的合法性,并将该远程操作行为的合法性转换为合法标志位或非法标志位;将对被控移动终端的远程操作行为,标签,及合法标志位或非法标志位封装成操作指令予以发送;待被控移动终端接收操作指令后,接收第二反馈数据信号以确定其是否执行该操作指令。本发明可在任意移动终端上执行,没有远程控制的局限性,且扩大了连接控制的范围,实现了远程控制在速度和安全上的双重保障。

Description

远程控制方法,系统,远控执行方法,系统及移动终端 技术领域
本发明属于移动通信技术领域,涉及一种控制方法及系统,特别是涉及一种远程控制方法,系统,远控执行方法,系统及移动终端。
背景技术
随着智能手机和平板的使用越来越广泛,功能也是越来越强大,加上庞大网络发展,各个地方基本上都有无线WiFi,智能移动终端基本随时随地都可以连接网络,移动通信网络也从3G跨越到4G时代,并大步向前发展。在这样的时代里,人们手里的智能移动终端也是逐渐增多,据互联网不完全统计,现在平均每个人至少有3台智能移动设备,那么携带这么多设备肯定是不方便。
为了解决一人携带多台智能移动设备的不便性,现有技术采用一台移动设备控制其他移动设备,具体方法为使用MHL协议来对触摸信号进行封装,让触摸信号可以抗干扰传输,MHL协议是多媒体中的一种协议并且要配合MHL接口来进行传输信号,那么如果设备没有MHL接口,这样的方案就没有办法实现,所以,该方案具有很强的局限性,并且它没有对触控信号进行过滤,如果是误操作,它也会执行,没有很好的防护性。
因此,如何提供一种远程控制方法,系统,远控执行方法,系统及移动终端,以解决现有技术中利用MHL协议实现一台移动设备远程控制多台移动设备的控制方法,由于MHL协议是需要MHL接口来进行传输信号,若移动设备没有MHL接口,无法实现远程控制而具有的较强局限性,且伴随有误操作带来的较差防护性等缺陷,实已成为本领域从业者亟待解决的技术问题。
发明内容
鉴于以上所述现有技术的缺点,本发明的目的在于提供一种远程控制方法,系统,远控执行方法,系统及移动终端,用于解决现有技术中利用MHL协议实现一台移动设备远程控制多台移动设备的控制方法,由于MHL协议是需要MHL接口来进行传输信号,若移动设备没有MHL接口,无法实现远程控制而具有的较强局限性,且伴随有误操作带来的较差防护性的问题。
为实现上述目的及其他相关目的,本发明一方面提供一种远程控制方法,应用于包括主控移动终端、多台与所述主控移动终端绑定的被控移动终端的通信网络,所述远程控制方法 包括以下步骤:发送连接请求数据信号至被控移动终端,并接收源于所述被控移动终端与所述连接请求数据信号相关的第一反馈数据信号;所述第一反馈数据信号包括用于标记所述被控移动终端路由至所述主控移动终端的路由信息的标签;按照所述标签建立与所述被控移动终端之间的数据传输隧道;读取输入的对所述被控移动终端的远程操作行为,识别该远程操作行为的合法性,并将该远程操作行为的合法性转换为合法标志位或非法标志位;将对所述被控移动终端的远程操作行为,所述标签,及合法标志位或非法标志位封装成操作指令予以发送;待所述被控移动终端接收所述操作指令后,接收源于所述被控移动终端的第二反馈数据信号以确定其是否执行该操作指令。
于本发明的一实施例中,所述识别该远程操作行为的合法性的步骤具体指:在预存的合法操作行为数据库和非法操作行为数据库中逐一查找所述远程操作行为以检测该远程操作行为的合法性。
于本发明的一实施例中,在所述合法操作行为数据库中查找到该远程操作行为表示所述远程操作行为具有合法性;在所述非法操作行为数据库中查找到该远程操作行为表示所述远程操作行为具有非法性。
于本发明的一实施例中,所述合法标志位用0表示;对应的所述非法标志位用1表示;或所述合法标志位用1表示;对应的所述非法标志位用0表示。
于本发明的一实施例中,所述按照所述标签建立与所述被控移动终端之间的数据传输隧道的步骤具体是指通过调用多协议标签交换协议按照所述标签建立与所述被控移动终端之间的数据传输隧道。
本发明另一方面提供一种远程控制系统,应用于包括主控移动终端、多台与所述主控移动终端绑定的被控移动终端的通信网络,所述远程控制系统包括:第一通信模块,用于发送连接请求数据信号至被控移动终端,并接收源于所述被控移动终端与所述连接请求数据信号相关的第一反馈数据信号;所述第一反馈数据信号包括用于标记所述被控移动终端路由至所述主控移动终端的路由信息的标签;隧道建立模块,与所述第一通信模块连接,用于按照所述标签建立与所述被控移动终端之间的数据传输隧道;操作模块,与所述隧道建立模块连接,用于读取输入的对所述被控移动终端的远程操作行为,识别该远程操作行为的合法性,并将该远程操作行为的合法性转换为合法标志位或非法标志位;封装模块,与所述操作模块和第一通信模块连接,将对所述被控移动终端的远程操作行为,所述标签,及合法标志位或非法标志位封装成操作指令,调用所述第一通信模块将所述操作指令发送,待所述被控移动终端接收所述操作指令后,接收源于所述被控移动终端的第二反馈数据信号以确定其是否执行该 操作指令。
本发明另一方面还提供一种远控执行方法,应用于包括主控移动终端、多台与所述主控移动终端绑定的被控移动终端的通信网络,所述远控执行方法包括以下步骤:接收源于所述主控移动终端的连接请求数据信号;判断该主控移动终端是否为可信任设备;若是,则发送与所述连接请求数据信号相关的第一反馈数据信号至该主控移动终端;若否,则拒绝与其通信;待所述主控移动终端接收到所述第一反馈数据信号后,接收封装有远程操作行为,标签,及合法标志位或非法标志位的操作指令;若所述操作指令中为合法性标记,执行所述远程操作行为,反馈已执行远程操作行为的第二反馈数据信号至主控移动终端;若所述操作执行中为非法标志位,拒绝执行所述远程操作行为,反馈拒绝执行该远程操作行为的第二反馈数据信号至主控移动终端。
本发明又一方面提供一种远控执行系统,应用于包括主控移动终端、多台与所述主控移动终端绑定的被控移动终端的通信网络,所述远控执行系统包括:第二通信模块,用于接收源于所述主控移动终端的连接请求数据信号;判断模块,与所述第二通信模块连接,用于判断该主控移动终端是否为可信任设备;若是,则调用所述第二通信模块发送与所述连接请求数据信号相关的第一反馈数据信号至该主控移动终端,待所述主控移动终端接收到所述第一反馈数据信号后,接收封装有远程操作行为,标签,及合法标志位或非法标志位的操作指令;若否,则令所述第二通信模块拒绝与所述主控移动终端通信;其中,若所述操作指令中为合法性标记,调用用于执行所述远程操作行为的执行模块,并令所述第二通信模块反馈已执行远程操作行为的第二反馈数据信号至主控移动终端;若所述操作执行中为非法标志位,拒绝执行所述远程操作行为,令所述第二通信模块反馈拒绝执行该远程操作行为的第二反馈数据信号至主控移动终端。
本发明又一方面还提供一种移动终端,所述移动终端包括:所述的远程控制系统。
本发明最后一方面提供一种移动终端,所述移动终端包括:所述的远控执行系统。
如上所述,本发明的远程控制方法,系统,远控执行方法,系统及移动终端,具有以下有益效果:
本发明所述的远程控制方法,系统,远控执行方法,系统及移动终端没有远程控制的局限性,不需要在移动终端上做改变,且扩大了连接控制的范围,实现了远程控制在速度和安全上的双重保障。
附图说明
图1显示为本发明的移动终端于一实施例中立体示意图。
图2显示为本发明的远程控制方法于一实施例中的流程示意图。
图3显示为本发明的远程控制系统于一实施例中的原理结构示意图。
图4显示为本发明的移动终端于一实施例中的原理结构示意图。
图5显示为本发明的远控执行方法于一实施例中的流程示意图。
图6显示为本发明的远控执行系统于一实施例中的原理结构示意图。
图7显示为本发明的移动终端于另一实施例中的原理结构示意图。
元件标号说明
10         远程控制系统
101        第一通信模块
102        隧道建立模块
103        操作模块
104        封装模块
1031       读取单元
1032       识别单元
1033       转换单元
2,4,5    移动终端
30         远控执行系统
301        第二通信模块
302        判断模块
303        执行模块
5 0        触摸显示屏
S1~S7     步骤
S1’~S8’ 步骤
具体实施方式
以下通过特定的具体实例说明本发明的实施方式,本领域技术人员可由本说明书所揭露的内容轻易地了解本发明的其他优点与功效。本发明还可以通过另外不同的具体实施方式加以实施或应用,本说明书中的各项细节也可以基于不同观点与应用,在没有背离本发明的精神下进行各种修饰或改变。需说明的是,在不冲突的情况下,以下实施例及实施例中的特征可以相互组合。
需要说明的是,以下实施例中所提供的图示仅以示意方式说明本发明的基本构想,遂图式中仅显示与本发明中有关的组件而非按照实际实施时的组件数目、形状及尺寸绘制,其实际实施时各组件的型态、数量及比例可为一种随意的改变,且其组件布局型态也可能更为复杂。
实施例一
本实施例提供一种远程控制方法,应用于包括主控移动终端、多台与所述主控移动终端绑定的被控移动终端的通信网络,所述远程控制方法包括以下步骤:
发送连接请求数据信号至被控移动终端,并接收源于所述被控移动终端与所述连接请求数据信号相关的第一反馈数据信号;所述第一反馈数据信号包括用于标记所述被控移动终端路由至所述主控移动终端的路由信息的标签;
按照所述标签建立与所述被控移动终端之间的数据传输隧道;
读取输入的对所述被控移动终端的远程操作行为,识别该远程操作行为的合法性,并将该远程操作行为的合法性转换为合法标志位或非法标志位;
将对所述被控移动终端的远程操作行为,所述标签,及合法标志位或非法标志位封装成操作指令予以发送;
待所述被控移动终端接收所述操作指令后,接收源于所述被控移动终端的第二反馈数据信号以确定其是否执行该操作指令。
以下将结合本实施例所述的远程控制方法进行详细阐述。本实施例所述的远程控制方法应用于包括主控移动终端、多台与所述主控移动终端绑定的被控移动终端的通信网络。所述主控移动终端和被控移动终端于实际的实现方式中,为智能手机、平板电脑、笔记本电脑等具有屏幕的终端设备。请参阅图1,显示为移动终端于一实施例中立体示意图。如图1所示,所述移动终端5包括触摸显示屏50。其中,所述触摸显示屏50在设备与用户之间同时提供输出接口和输入接口。触摸显示屏控制器接收/发送来自/去往触摸显示屏50的电信号。该触摸显示屏50则向用户显示可视输出。这个可视输出可以包括文本、图形、视频及其任意组合。某些或所有可视输出可与用户接口对象相对应,在下文中将对它的更多细节进行描述。
触摸显示屏50还基于触觉和/或触知接触来接受用户的输入。该触摸显示屏50形成一个接受用户输入的触摸敏感表面。该触摸显示屏50和触摸显示屏控制器(连同存储器中任何相关联的模块和/或指令集一起)检测触摸显示屏50上的接触(以及所述触摸的任何移动或中断),并且将检测到的接触变换成与显示在触摸显示屏50上的诸如一个或多个软按键之类的用户界面对象的交互。在一个示例性实施例中,触摸显示屏50与用户之间的接触点对应于用户的 一个或多个手指。该触摸显示屏50可以使用LCD(液晶显示器)技术或LPD(发光聚合物显示器)技术,但在其他实施例中可使用其他显示技术。触摸显示屏50和触摸显示屏控制器可以使用多种触敏技术中的任何一种来检测接触及其移动或中断,这些触敏技术包括但不限于电容、电阻、红外和声表面波技术,以及其他接近传感器阵列,或用于确定与触摸显示屏50相接触的一个或多个点的其他技术。用户可以使用任何适当物体或配件,例如指示笔、手指等等,来接触触摸显示屏50。
所述的接触/运动模块与触摸显示屏控制器一道来检测与触摸显示屏50的接触。该接触/运动模块包括用于执行与跟触摸显示屏50的接触检测相关联的各种操作的各种软件组件,所述操作例如确定是否发生接触,确定该接触是否移动,以及追踪触摸显示屏50上的移动,并且确定该接触是否中断(即是否停止接触)。确定接触点移动的操作可以包括确定接触点的速率(幅度)、速度(幅度和方向)和/或加速度(包括幅度和/或方向)。在某些实施例中,接触/运动模块和触摸显示屏控制器还检测触摸板上的接触。
在本实施例中,所述移动终端5例如为图1所呈现的智能手机为例进行说明。所述智能手机例如为安装Android操作系统或者iOS操作系统,或者Palm OS、Symbian(塞班)、或者Black Berry(黑莓)OS 6.0、Windows Phone 8等操作系统的智能手机。
请参阅图2,显示为远程控制方法于一实施例中的流程示意图。如图2所示,所述远程控制方法具体包括以下几个步骤:
S1,所述主控移动终端发送连接请求数据信号至与其绑定的被控移动终端,并接收源于所述被控移动终端与所述连接请求数据信号相关的第一反馈数据信号。在本实施例中,所述主控移动终端通过读取移动终端的设备信息来识别该移动终端是否为与其绑定的被控移动终端。与所述主控移动终端绑定的被控移动终端设备的设备信息包括特定标识符,所述主控移动终端通过识别特定标识符来判定。在本实施例中,所述第一反馈数据信号包括用于标记所述被控移动终端路由至所述主控移动终端的路由信息的标签,换句话说,所述标签为所述被控移动终端传输数据信息至所述主控移动终端的路由地址信息。
S2,通过调用多协议标签交换协议(MPLS协议)按照所述标签建立与所述被控移动终端之间的数据传输隧道。多协议标签交换协议(MPLS协议)为一种路由协议,它的主要原理就是将数据信息从源端到目的端建立连接,并且将经过的路径打上标签,实现路径封装成隧道,实现快速传递。
S3,读取以预定方式输入的对所述被控移动终端的远程操作行为。在本实施例中,预定方式是指在所述主控移动终端进入远程控制其他被控移动终端的控制模式时,通过触摸所述 主控移动终端与所述控制模式对应的图形用户界面的预设区域于所述图形用户界面中显示一悬浮窗,用户于该悬浮窗体内输入对所述被控移动终端的远程操作行为的具体内容,例如,通过被控移动终端拨打电话,通过被控移动终端下载应用软件,查看被控移动终端上的数据信息(包括,照片,视频,短信,微信,QQ等等)等等。
S4,识别该远程操作行为的合法性。在本实施例中,识别该远程操作行为的合法性具体是指在预存的合法操作行为数据库和非法操作行为数据库中逐一查找所述远程操作行为以检测该远程操作行为的合法性。例如,非法操作行为包括非法删除联系人、拨打非法号码、非法下载应用软件,非法上网等等操作行为。在所述合法操作行为数据库中查找到该远程操作行为表示所述远程操作行为具有合法性。在所述非法操作行为数据库中查找到该远程操作行为表示所述远程操作行为具有非法性。
S5,将该远程操作行为的合法性转换为合法标志位或非法标志位。在本实施例中,所述合法标志位用0表示;对应的所述非法标志位用1表示;或所述合法标志位用1表示;对应的所述非法标志位用0表示。在本实施例中,所述合法标志位或非法标志位实现了类似防火墙的作用,对远程操作行为进行过滤。
S6,将对所述被控移动终端的远程操作行为,所述标签,及合法标志位或非法标志位以预定格式封装成操作指令。例如,所述预定格式为标签+合法标志位或非法标志位+对所述被控移动终端的远程操作行为。
S7,将所述操作指令发送至绑定的被控移动终端。
本实施例所述的远程控制方法可在任意移动终端上执行,没有远程控制的局限性,不需要在移动终端上做改变,且扩大了连接控制的范围,实现了远程控制在速度和安全上的双重保障。
实施例二
本实施例提供一种远程控制系统10,所述远程控制系统10应用于包括主控移动终端、多台与所述主控移动终端绑定的被控移动终端的通信网络。所述主控移动终端和被控移动终端于实际的实现方式中,为智能手机、平板电脑、笔记本电脑等具有屏幕的终端设备。请参阅图3,显示为远程控制系统于一实施例中的原理结构示意图。如图3所示,所述远程控制系统10包括:第一通信模块101、隧道建立模块102、操作模块103、及封装模块104。
第一通信模块101用于发送连接请求数据信号至与其绑定的被控移动终端,并接收源于所述被控移动终端与所述连接请求数据信号相关的第一反馈数据信号。在本实施例中,所述第一通信模块101通过读取移动终端的设备信息来识别该移动终端是否为与其绑定的被控移 动终端。与所述主控移动终端绑定的被控移动终端设备的设备信息包括特定标识符,所述主控移动终端通过识别特定标识符来判定。在本实施例中,所述第一反馈数据信号包括用于标记所述被控移动终端路由至所述主控移动终端的路由信息的标签,换句话说,所述标签为所述被控移动终端传输数据信息至所述主控移动终端的路由地址信息。
与所述第一通信模块101连接的隧道建立模块102用于通过调用多协议标签交换协议(MPLS协议)按照所述标签建立与所述被控移动终端之间的数据传输隧道。多协议标签交换协议(MPLS协议)为一种路由协议,它的主要原理就是将数据信息从源端到目的端建立连接,并且将经过的路径打上标签,实现路径封装成隧道,实现快速传递。在本实施例中,所述第一通信模块101可以为WIFI无线通信模块,3G/4G通信模块。
与所述隧道建立模块102的操作模块103用于读取输入的对所述被控移动终端的远程操作行为,识别该远程操作行为的合法性,并将该远程操作行为的合法性转换为合法标志位或非法标志位。所述操作模块103具体包括:读取单元1031、识别单元1032、转换单元1033。
读取单元1031用于读取以预定方式输入的对所述被控移动终端的远程操作行为。在本实施例中,预定方式是指在所述主控移动终端进入远程控制其他被控移动终端的控制模式时,通过触摸所述主控移动终端与所述控制模式对应的图形用户界面的预设区域于所述图形用户界面中显示一悬浮窗,用户于该悬浮窗体内输入对所述被控移动终端的远程操作行为的具体内容,例如,通过被控移动终端拨打电话,通过被控移动终端下载应用软件,查看被控移动终端上的数据信息(包括,照片,视频,短信,微信,QQ等等)等等。
与读取单元1031连接的识别单元1032用于识别该远程操作行为的合法性。在本实施例中,识别该远程操作行为的合法性具体是指在预存的合法操作行为数据库和非法操作行为数据库中逐一查找所述远程操作行为以检测该远程操作行为的合法性。例如,非法操作行为包括非法删除联系人、拨打非法号码、非法下载应用软件,非法上网等等操作行为。在所述合法操作行为数据库中查找到该远程操作行为表示所述远程操作行为具有合法性。在所述非法操作行为数据库中查找到该远程操作行为表示所述远程操作行为具有非法性。
与所述识别单元1032连接的转换单元1033用于将该远程操作行为的合法性转换为合法标志位或非法标志位。在本实施例中,所述合法标志位用0表示;对应的所述非法标志位用1表示;或所述合法标志位用1表示;对应的所述非法标志位用0表示。在本实施例中,所述合法标志位或非法标志位实现了类似防火墙的作用,对远程操作行为进行过滤。
与所述第一通信模块101和操作模块103连接的封装模块104用于将对所述被控移动终端的远程操作行为,所述标签,及合法标志位或非法标志位以预定格式封装成操作指令。例 如,所述预定格式为标签+合法标志位或非法标志位+对所述被控移动终端的远程操作行为。
最后,通过所述第一通信模块10将所述操作指令发送至绑定的被控移动终端。
本实施例还提供一种移动终端2,请参阅图4,显示为移动终端于一实施例中的原理结构示意图。如图4所示,所述移动终端2包括上述的远程控制系统10。
本实施例所述的远程控制系统和具有该远程控制系统的移动终端可在任意移动终端上执行,没有远程控制的局限性,不需要在移动终端上做改变,且扩大了连接控制的范围,实现了远程控制在速度和安全上的双重保障。
实施例三
本实施例提供一种远控执行方法,应用于包括主控移动终端、多台与所述主控移动终端绑定的被控移动终端的通信网络,所述远控执行方法包括以下步骤:
接收源于所述主控移动终端的连接请求数据信号;
判断该主控移动终端是否为可信任设备;若是,则发送与所述连接请求数据信号相关的第一反馈数据信号至该主控移动终端;若否,则拒绝与其通信;
待所述主控移动终端接收到所述第一反馈数据信号后,接收封装有远程操作行为,标签,及合法标志位或非法标志位的操作指令;
若所述操作指令中为合法性标记,执行所述远程操作行为,反馈已执行远程操作行为的第二反馈数据信号至主控移动终端;
若所述操作执行中为非法标志位,拒绝执行所述远程操作行为,反馈拒绝执行该远程操作行为的第二反馈数据信号至主控移动终端。
以下将结合图示对本实施例所述的远控执行方法进行详细阐述。本实施例所提供的远控执行方法应用于包括主控移动终端、多台与所述主控移动终端绑定的被控移动终端的通信网络。所述主控移动终端和被控移动终端于实际的实现方式中,为智能手机、平板电脑、笔记本电脑等具有屏幕的终端设备。
请参阅图5,显示为远控执行方法于一实施例中的流程示意图。如图5所示,所述远控执行方法具体包括以下几个步骤:
S1’,接收源于所述主控移动终端的连接请求数据信号。
S2’,判断该主控移动终端是否为可信任设备;若是,则执行步骤S3’;若否,则执行步骤S4’,拒绝该主控移动终端通信。在本实施例中判断该主控移动终端是否为可信任设备的判断依据为通过读取移动终端的设备信息来识别该移动终端是否为主控移动终端。所述主控移动终端的设备信息包括表示该移动终端为主控设备的特定标识符。
S3’,发送与所述连接请求数据信号相关的第一反馈数据信号至该主控移动终端。
S5’,待所述主控移动终端接收到所述第一反馈数据信号后,接收封装有远程操作行为,标签,及合法标志位或非法标志位的操作指令。在本实施例中,所述合法标志位用0表示;对应的所述非法标志位用1表示。
S6’,读取所述操作指令,具体读取所述操作指令中的标志位。
S7’,若所述操作指令中为合法性标记,即读取到0,执行所述远程操作行为,反馈已执行远程操作行为的第二反馈数据信号至主控移动终端。
S8’,若所述操作执行中为非法标志位,即读取到1,拒绝执行所述远程操作行为,反馈拒绝执行该远程操作行为的第二反馈数据信号至主控移动终端。
实施例四
本实施例提供一种远控执行系统30,请参阅图6,显示为远控执行系统于一实施例中的原理结构示意图。如图6所示,所述远控执行系统30包括:第二通信模块301、判断模块302、及执行模块303。
第二通信模块301用于接收源于所述主控移动终端的连接请求数据信号。在本实施例中,所述第二通信模块301可以为WIFI无线通信模块,3G/4G通信模块。
与所述第二通信模块301连接的判断模块302用于判断该主控移动终端是否为可信任设备;若是,则令所述第二通信模块301发送与所述连接请求数据信号相关的第一反馈数据信号至该主控移动终端;若否,则拒绝与该主控移动终端通信。在本实施例中所述判断模块302判断该主控移动终端是否为可信任设备的判断依据为通过读取移动终端的设备信息来识别该移动终端是否为主控移动终端。所述主控移动终端的设备信息包括表示该移动终端为主控设备的特定标识符。
所述第二通信模块302待所述主控移动终端接收到所述第一反馈数据信号后,接收封装有远程操作行为,标签,及合法标志位或非法标志位的操作指令。在本实施例中,所述合法标志位用0表示;对应的所述非法标志位用1表示。
与所述第二通信模块301和判断模块302连接的执行模块303用于读取所述操作指令,具体读取所述操作指令中的标志位。
若所述操作指令中为合法性标记,即读取到0,执行所述远程操作行为,并通过第二通信模块301反馈已执行远程操作行为的第二反馈数据信号至主控移动终端。
若所述操作执行中为非法标志位,即读取到1,拒绝执行所述远程操作行为,并通过第二通信模块301反馈拒绝执行该远程操作行为的第二反馈数据信号至主控移动终端。
本实施例还提供一种移动终端4,请参阅图7,显示为移动终端于另一实施例中的原理结构示意图。如图7所示,所述移动终端4包括上述的远控执行系统30。
综上所述,本发明所述的远程控制方法,系统,远控执行方法,系统及移动终端没有远程控制的局限性,不需要在移动终端上做改变,且扩大了连接控制的范围,实现了远程控制在速度和安全上的双重保障。所以,本发明有效克服了现有技术中的种种缺点而具高度产业利用价值。
上述实施例仅例示性说明本发明的原理及其功效,而非用于限制本发明。任何熟悉此技术的人士皆可在不违背本发明的精神及范畴下,对上述实施例进行修饰或改变。因此,举凡所属技术领域中具有通常知识者在未脱离本发明所揭示的精神与技术思想下所完成的一切等效修饰或改变,仍应由本发明的权利要求所涵盖。

Claims (10)

  1. 一种远程控制方法,其特征在于,应用于包括主控移动终端、多台与所述主控移动终端绑定的被控移动终端的通信网络,所述远程控制方法包括以下步骤:
    发送连接请求数据信号至被控移动终端,并接收源于所述被控移动终端与所述连接请求数据信号相关的第一反馈数据信号;所述第一反馈数据信号包括用于标记所述被控移动终端路由至所述主控移动终端的路由信息的标签;
    按照所述标签建立与所述被控移动终端之间的数据传输隧道;
    读取输入的对所述被控移动终端的远程操作行为,识别该远程操作行为的合法性,并将该远程操作行为的合法性转换为合法标志位或非法标志位;
    将对所述被控移动终端的远程操作行为,所述标签,及合法标志位或非法标志位封装成操作指令予以发送;
    待所述被控移动终端接收所述操作指令后,接收源于所述被控移动终端的第二反馈数据信号以确定其是否执行该操作指令。
  2. 根据权利要求1所述的远程控制方法,其特征在于:所述识别该远程操作行为的合法性的步骤具体指:
    在预存的合法操作行为数据库和非法操作行为数据库中逐一查找所述远程操作行为以检测该远程操作行为的合法性。
  3. 根据权利要求2所述的远程控制方法,其特征在于:
    在所述合法操作行为数据库中查找到该远程操作行为表示所述远程操作行为具有合法性;
    在所述非法操作行为数据库中查找到该远程操作行为表示所述远程操作行为具有非法性。
  4. 根据权利要求2所述的远程控制方法,其特征在于:
    所述合法标志位用0表示;对应的所述非法标志位用1表示;或
    所述合法标志位用1表示;对应的所述非法标志位用0表示。
  5. 根据权利要求1所述的远程控制方法,其特征在于:所述按照所述标签建立与所述被控移动终端之间的数据传输隧道的步骤具体是指通过调用多协议标签交换协议按照所述标签建立与所述被控移动终端之间的数据传输隧道。
  6. 一种远程控制系统,其特征在于,应用于包括主控移动终端、多台与所述主控移动终端绑定的被控移动终端的通信网络,所述远程控制系统包括:
    第一通信模块,用于发送连接请求数据信号至被控移动终端,并接收源于所述被控移 动终端与所述连接请求数据信号相关的第一反馈数据信号;所述第一反馈数据信号包括用于标记所述被控移动终端路由至所述主控移动终端的路由信息的标签;
    隧道建立模块,与所述第一通信模块连接,用于按照所述标签建立与所述被控移动终端之间的数据传输隧道;
    操作模块,与所述隧道建立模块连接,用于读取输入的对所述被控移动终端的远程操作行为,识别该远程操作行为的合法性,并将该远程操作行为的合法性转换为合法标志位或非法标志位;
    封装模块,与所述操作模块和第一通信模块连接,将对所述被控移动终端的远程操作行为,所述标签,及合法标志位或非法标志位封装成操作指令,调用所述第一通信模块将所述操作指令发送,待所述被控移动终端接收所述操作指令后,接收源于所述被控移动终端的第二反馈数据信号以确定其是否执行该操作指令。
  7. 一种远控执行方法,其特征在于,应用于包括主控移动终端、多台与所述主控移动终端绑定的被控移动终端的通信网络,所述远控执行方法包括以下步骤:
    接收源于所述主控移动终端的连接请求数据信号;
    判断该主控移动终端是否为可信任设备;若是,则发送与所述连接请求数据信号相关的第一反馈数据信号至该主控移动终端;若否,则拒绝与其通信;
    待所述主控移动终端接收到所述第一反馈数据信号后,接收封装有远程操作行为,标签,及合法标志位或非法标志位的操作指令;
    若所述操作指令中为合法性标记,执行所述远程操作行为,反馈已执行远程操作行为的第二反馈数据信号至主控移动终端;
    若所述操作执行中为非法标志位,拒绝执行所述远程操作行为,反馈拒绝执行该远程操作行为的第二反馈数据信号至主控移动终端。
  8. 一种远控执行系统,其特征在于,应用于包括主控移动终端、多台与所述主控移动终端绑定的被控移动终端的通信网络,所述远控执行系统包括:
    第二通信模块,用于接收源于所述主控移动终端的连接请求数据信号;
    判断模块,与所述第二通信模块连接,用于判断该主控移动终端是否为可信任设备;若是,则调用所述第二通信模块发送与所述连接请求数据信号相关的第一反馈数据信号至该主控移动终端,待所述主控移动终端接收到所述第一反馈数据信号后,接收封装有远程操作行为,标签,及合法标志位或非法标志位的操作指令;若否,则令所述第二通信模块拒绝与所述主控移动终端通信;
    其中,若所述操作指令中为合法性标记,调用用于执行所述远程操作行为的执行模块,并令所述第二通信模块反馈已执行远程操作行为的第二反馈数据信号至主控移动终端;
    若所述操作执行中为非法标志位,拒绝执行所述远程操作行为,令所述第二通信模块反馈拒绝执行该远程操作行为的第二反馈数据信号至主控移动终端。
  9. 一种移动终端,其特征在于,所述移动终端包括:
    如权利要求6所述的远程控制系统。
  10. 一种移动终端,其特征在于,所述移动终端包括:
    如权利要求8所述的远控执行系统。
PCT/CN2016/103888 2016-01-06 2016-10-29 远程控制方法,系统,远控执行方法,系统及移动终端 WO2017118183A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610006725.0A CN105578313B (zh) 2016-01-06 2016-01-06 远程控制方法,系统,远控执行方法,系统及移动终端
CN2016100067250 2016-01-06

Publications (1)

Publication Number Publication Date
WO2017118183A1 true WO2017118183A1 (zh) 2017-07-13

Family

ID=55887896

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/103888 WO2017118183A1 (zh) 2016-01-06 2016-10-29 远程控制方法,系统,远控执行方法,系统及移动终端

Country Status (2)

Country Link
CN (1) CN105578313B (zh)
WO (1) WO2017118183A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105578313B (zh) * 2016-01-06 2019-07-12 上海斐讯数据通信技术有限公司 远程控制方法,系统,远控执行方法,系统及移动终端
US10278065B2 (en) * 2016-08-14 2019-04-30 Liveperson, Inc. Systems and methods for real-time remote control of mobile applications
CN106713494B (zh) * 2017-01-23 2020-05-08 上海上讯信息技术股份有限公司 一种智能审计方法和装置
CN111526192B (zh) * 2020-04-15 2023-04-18 Oppo广东移动通信有限公司 终端的远程控制方法、装置、终端和计算机可读存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101216709A (zh) * 2007-12-28 2008-07-09 毛建良 客户配网自动化远程实时监控系统
CN103353996A (zh) * 2013-07-17 2013-10-16 南京物联传感技术有限公司 车辆无线控制系统及基于该系统的状态信息反馈方法
CN103581253A (zh) * 2012-08-01 2014-02-12 腾讯科技(深圳)有限公司 一种远程遥控的方法、Web服务器及系统
CN104363266A (zh) * 2014-10-23 2015-02-18 北京远特科技有限公司 远程控制车辆的方法、tsp后台系统以及车载终端
CN105578313A (zh) * 2016-01-06 2016-05-11 上海斐讯数据通信技术有限公司 远程控制方法,系统,远控执行方法,系统及移动终端

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101409871B (zh) * 2008-11-17 2013-01-23 宇龙计算机通信科技(深圳)有限公司 一种远程遥控方法、系统和遥控装置
CN102170617A (zh) * 2011-04-07 2011-08-31 中兴通讯股份有限公司 移动终端及其远程控制方法
CN102932695B (zh) * 2012-11-02 2016-03-30 华为技术有限公司 一种遥控方法、智能终端及智能遥控系统
CN103237047B (zh) * 2013-03-11 2016-09-28 广东欧珀移动通信有限公司 一种远程受控、控制方法
CN104951676B (zh) * 2014-04-14 2018-04-20 腾讯科技(深圳)有限公司 移动终端控制方法、装置和系统
CN104202370A (zh) * 2014-08-19 2014-12-10 广州金山网络科技有限公司 移动终端及其远程控制方法、系统、服务器及远程控制端

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101216709A (zh) * 2007-12-28 2008-07-09 毛建良 客户配网自动化远程实时监控系统
CN103581253A (zh) * 2012-08-01 2014-02-12 腾讯科技(深圳)有限公司 一种远程遥控的方法、Web服务器及系统
CN103353996A (zh) * 2013-07-17 2013-10-16 南京物联传感技术有限公司 车辆无线控制系统及基于该系统的状态信息反馈方法
CN104363266A (zh) * 2014-10-23 2015-02-18 北京远特科技有限公司 远程控制车辆的方法、tsp后台系统以及车载终端
CN105578313A (zh) * 2016-01-06 2016-05-11 上海斐讯数据通信技术有限公司 远程控制方法,系统,远控执行方法,系统及移动终端

Also Published As

Publication number Publication date
CN105578313B (zh) 2019-07-12
CN105578313A (zh) 2016-05-11

Similar Documents

Publication Publication Date Title
CN110851051B (zh) 一种对象分享方法及电子设备
AU2018421189B2 (en) Method for quickly opening application or application function, and terminal
WO2021136133A1 (zh) 一种应用程序切换方法及电子设备
WO2021197263A1 (zh) 内容共享方法及电子设备
WO2019184666A1 (zh) 一种显示内容的方法及终端
WO2017118183A1 (zh) 远程控制方法,系统,远控执行方法,系统及移动终端
US10007621B2 (en) Method for setting universal serial bus (USB) interface of electronic device, and electronic device
WO2020259024A1 (zh) 图标分类方法、移动终端及计算机可读存储介质
WO2018049886A1 (zh) 建立热点的方法及终端设备
CN108646958B (zh) 一种应用程序启动方法及终端
US20140068469A1 (en) Mobile apparatus and method for transferring information
US10089006B2 (en) Display apparatus and the method thereof
CN109062634B (zh) 一种应用启动方法及移动终端
KR102441850B1 (ko) 서비스 처리 방법 및 이동 통신 단말
WO2020199783A1 (zh) 界面显示方法及终端设备
CN108681427B (zh) 一种访问权限控制的方法及终端设备
CN111026464A (zh) 一种识别方法及电子设备
CN110244884B (zh) 一种桌面图标管理方法及终端设备
WO2018049894A1 (zh) 数据传输方法及设备
WO2018049969A1 (zh) 热点建立方法及相关设备
WO2021208890A1 (zh) 截屏方法及电子设备
US10108388B2 (en) Display apparatus and controlling method thereof
US20220236837A1 (en) View Display Method and Electronic Device
WO2020211602A1 (zh) 应用控制方法及终端设备
US20130239069A1 (en) Control method for mobile device using setting pattern and mobile device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16883311

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16883311

Country of ref document: EP

Kind code of ref document: A1