CN108769175A - Remote real machine access control method, device, storage medium and electronic equipment - Google Patents

Remote real machine access control method, device, storage medium and electronic equipment Download PDF

Info

Publication number
CN108769175A
CN108769175A CN201810494078.1A CN201810494078A CN108769175A CN 108769175 A CN108769175 A CN 108769175A CN 201810494078 A CN201810494078 A CN 201810494078A CN 108769175 A CN108769175 A CN 108769175A
Authority
CN
China
Prior art keywords
real machine
remote real
remote
destination application
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810494078.1A
Other languages
Chinese (zh)
Other versions
CN108769175B (en
Inventor
秦亚洲
李秋林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JD Digital Technology Holdings Co Ltd
Jingdong Technology Holding Co Ltd
Original Assignee
Beijing Jingdong Financial Technology Holding Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Financial Technology Holding Co Ltd filed Critical Beijing Jingdong Financial Technology Holding Co Ltd
Priority to CN201810494078.1A priority Critical patent/CN108769175B/en
Publication of CN108769175A publication Critical patent/CN108769175A/en
Application granted granted Critical
Publication of CN108769175B publication Critical patent/CN108769175B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/08Protocols specially adapted for terminal emulation, e.g. Telnet
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

This disclosure relates to field of computer technology, and in particular to a kind of remote real machine access control method, remote real machine access control apparatus, computer readable storage medium and electronic equipment.This method includes the control instruction for remote real machine for receiving remote real machine server and sending;Obtain the program information of the destination application run on the remote real machine;Judge whether the destination application is limitation remote access process according to described program information;Determined whether to execute the control instruction according to the result of judgement.The control instruction that the disclosure is sent according to the result that program judges come dynamic control remote real machine server, greatly improves system effectiveness, reduces overhead, improve control stability and flexibility.

Description

Remote real machine access control method, device, storage medium and electronic equipment
Technical field
This disclosure relates to field of computer technology, and in particular to a kind of remote real machine access control method, remote real machine are visited Ask control device, computer readable storage medium and electronic equipment.
Background technology
With the rapid development of mobile Internet, the type and version of various mobile terminal smart machines are continuously increased, various The remote testing of mobile terminal and debugging system are also more and more.Remote real machine shown in Figure 1 accesses system, remote real machine 11 (can be various mobile terminals) are connected to by the network equipment 12 on remote real machine server 13, and user 14 is set by local The browser or client software installed on standby 15 obtains the remote real machine service of the offer of remote real machine server 13, remotely Prototype server 13 needs the remote real machine accessed to start corresponding remote real machine 11 according to user.It is long-range true after startup The interactive interface of machine 11 will real-time display, user 14 can be by local devices 15 come real-time operation distal end on local device 15 Remote real machine 11.
Due to the uncertainty of remote real machine accessing user and using purpose inconsistency, the rights management to remote real machine It is typically more complicated.If a user has modified the setting in remote real machine in use, for example, access agent and Password will necessarily give the use of next user to cause obstacle.Therefore, setting for the access rights in remote real machine how is handled well Set be remote real machine access service a relatively crucial problem.
The side that existing remote real machine access system mainly uses the priority assignation management of mobile terminal, that is, remote real machine Method is:User access remote real machine and implement control operation when, remote real machine end simultaneously start one individually monitor into Journey needs whether the process of limitation access starts to monitor in remote real machine, if it find that the process that limitation accesses is activated, stand Terminate the process quarter.Although this method has achieved the effect that forbid process initiation, the process accessed limitation is monitored Mode need to occupy additional resource overhead;And due to the presence of monitoring process, at remote real machine end, local IP access is (non-remote Journey access) in the case of can not to remote real machine carry out permission control on modification.It can be seen that either remote access is gone back It is local IP access all by the limitation of monitored process, and once closes monitoring process, the access of remote port and local side Permission will be decontroled simultaneously, but be unable to reach remote access permission control purpose, therefore how effectively and neatly control Remote real machine access rights processed are a problem to be solved.
It should be noted that information is only used for reinforcing the reason to the background of the disclosure disclosed in above-mentioned background technology part Solution, therefore may include the information not constituted to the prior art known to persons of ordinary skill in the art.
Invention content
The disclosure is designed to provide a kind of remote real machine access control method, remote real machine access control apparatus, meter Calculation machine readable storage medium storing program for executing and electronic equipment, so overcome limitation and defect due to the relevant technologies at least to a certain extent and It is caused to need to occupy extra resource and the poor technology of flexibility present in existing remote real machine access control method Problem.
According to one aspect of the disclosure, a kind of remote real machine access control method is provided, is characterized in that, is wrapped It includes:
Receive the control instruction for remote real machine that remote real machine server is sent;
Obtain the program information of the destination application run on the remote real machine;
Judge whether the destination application is limitation remote access process according to described program information;
Determined whether to execute the control instruction according to the result of judgement.
In a kind of exemplary embodiment of the disclosure, the result according to judgement determines whether that executing the control refers to Order includes:
When it is limitation remote access process to judge the destination application not, the control instruction is executed;
When it is limitation remote access process to judge the destination application, forbid executing the control instruction.
In a kind of exemplary embodiment of the disclosure, the method further includes:
When it is limitation remote access process to judge the destination application, the destination application is closed.
In a kind of exemplary embodiment of the disclosure, the method further includes:
When it is limitation remote access process to judge the destination application, sends and control to the remote real machine server Invalid information processed.
In a kind of exemplary embodiment of the disclosure, the method further includes:
When it is limitation remote access process to judge the destination application not, sent to the remote real machine server Execute the result of the control instruction.
In a kind of exemplary embodiment of the disclosure, described program information include destination application title and/or Icon.
It is described to obtain the intended application journey run on the remote real machine in a kind of exemplary embodiment of the disclosure The program information of sequence includes:
The target object for judging to need to control according to the control instruction;
Obtain the program information of the corresponding destination application of the target object.
In a kind of exemplary embodiment of the disclosure, the target object includes the window of destination application, control The position and/or.
In a kind of exemplary embodiment of the disclosure, judging that the destination application is according to described program information Before the no remote access process for limitation, the method further includes:
Receive the user information that the remote real machine server is sent;
Obtain the information of limitation remote access process associated with the user information.
In a kind of exemplary embodiment of the disclosure, the user information includes that user accesses the remote real machine service Login account, user name and/or the network address of device.
According to one aspect of the disclosure, a kind of remote real machine access control apparatus is provided, is characterized in that, is wrapped It includes:
Information receiving module is configured as receiving the control instruction for remote real machine that remote real machine server is sent;
Program acquisition module is configured as obtaining the program letter of the destination application run on the remote real machine Breath;
Permission judgment module is configured as judging whether the destination application is that limitation is remote according to described program information Journey accesses program;
Instruction execution module is configured as being determined whether to execute the control instruction according to the result of judgement.
According to one aspect of the disclosure, a kind of computer readable storage medium is provided, computer program is stored thereon with, It is characterized in that, the remote real machine access control of any description above is realized when the computer program is executed by processor Method.
According to one aspect of the disclosure, a kind of electronic equipment is provided, is characterized in that, including processor and storage Device;Wherein, memory is used to store the executable instruction of the processor, and the processor is configured as via can described in execution It executes instruction to execute the remote real machine access control method of any description above.
In the remote real machine access control method that the embodiment of the present disclosure is provided, need not individually it be set at remote real machine end Monitoring process is set, and acts on behalf of the control for judging to complete remote real machine access rights into line program merely with remote boot server, The instruction that the result judged according to program sends come dynamic control remote real machine server, greatly improves system effectiveness, subtracts Lack overhead, while the operation for allowing remote control and prototype side to control separates, improves control stability and flexibly Property.
It should be understood that above general description and following detailed description is only exemplary and explanatory, not The disclosure can be limited.
Description of the drawings
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure Example, and together with specification for explaining the principles of this disclosure.It should be evident that the accompanying drawings in the following description is only the disclosure Some embodiments for those of ordinary skill in the art without creative efforts, can also basis These attached drawings obtain other attached drawings.
Fig. 1 schematically shows the composition schematic diagram that remote real machine accesses system.
Fig. 2 schematically shows the step flow chart of disclosure exemplary embodiment medium-long range prototype access control method.
Fig. 3 schematically shows the step flow chart of disclosure exemplary embodiment medium-long range prototype access control method.
Fig. 4 schematically shows the step flow chart of disclosure exemplary embodiment medium-long range prototype access control method.
Fig. 5 schematically shows the composition frame chart of disclosure exemplary embodiment medium-long range prototype access control apparatus.
Fig. 6 schematically shows a kind of schematic diagram of program product in disclosure exemplary embodiment.
Fig. 7 schematically shows the module diagram of a kind of electronic equipment in disclosure exemplary embodiment.
Fig. 8 schematically shows the remote real machine visit using disclosure exemplary embodiment medium-long range prototype access control method Ask the block diagram of system.
Specific implementation mode
Example embodiment is described more fully with reference to the drawings.However, example embodiment can be real in a variety of forms It applies, and is not understood as limited to example set forth herein;On the contrary, these embodiments are provided so that the disclosure will more comprehensively and Completely, and by the design of example embodiment comprehensively it is communicated to those skilled in the art.Described feature, structure or characteristic It can in any suitable manner be incorporated in one or more embodiments.
In addition, attached drawing is only the schematic illustrations of the disclosure, it is not necessarily drawn to scale.Identical attached drawing mark in figure Note indicates same or similar part, thus will omit repetition thereof.Some block diagrams shown in attached drawing are work( Energy entity, not necessarily must be corresponding with physically or logically independent entity.Software form may be used to realize these work( Energy entity, or these functional entitys are realized in one or more hardware modules or integrated circuit, or at heterogeneous networks and/or place These functional entitys are realized in reason device device and/or microcontroller device.
The exemplary embodiment of the disclosure provides a kind of remote real machine access control method first, and wherein remote real machine can be with It is the various terminal equipment by the network equipment or other communication modes and the foundation communication connection of remote real machine server, such as The mobile terminals such as mobile phone, tablet computer smart machine.These terminal devices can respond remote subscriber by remote real machine server Control operation and the operating result in a manner of analog image, audio, video etc. in user's Real-time Feedback real equipment, to User is completed for the test of the application program in prototype equipment and prototype equipment and debugging demand.
Referring to Fig. 2, which mainly may comprise steps of:
Step S10. receives the control instruction for remote real machine that remote real machine server is sent.
Remote real machine server can generally pass through for establishing the real-time control of the remote real machine of communication connection therewith The mode that remote boot server agency is configured on the remote real machine carries out.In the present embodiment, remote boot server agency receive first by The control instruction for remote real machine that remote real machine server is sent.For example, user is installed on using local device Browser mouse, keyboard or microphone etc. can be utilized defeated when either client software remotely accesses a touch control device It is each to enter the various touch control operations and word and voice etc. such as click, pressing and the sliding that equipment simulating carries out on the touch control device The operation of kind of information input, then remote boot server agency it is corresponding will to receive being operated with these of being sent out by remote real machine server Control instruction.
Step S20. obtains the program information of the destination application run on the remote real machine.
Received by step S10 may determine that after control instruction the control instruction be actually pointed to transported on remote real machine Capable destination application and the program information for obtaining the destination application, wherein program information may include the intended application Title, icon or other various information with identification of program can also include type, version, developer, exploitation work Tool etc. arbitrarily with the relevant information of destination application.In addition, destination application can be the included system of remote real machine Program or prepackage program, can also be other programs run on remote real machine that installation is initiated by accessing user, this implementation Example does not do this particular determination.
Step S30. judges whether the destination application is limitation remote access process according to described program information.
It may determine that whether the destination application is limited according to the program information of the step S20 destination applications obtained Remote access process processed, one of which judgment method can be by the program information of destination application and limitation remote access journey The program information of sequence is compared.For example, the title of comparison program may be used and/or the mode of icon is judged, once Relevant information, which is coincide, then may determine that the destination application is limitation remote access process.Furthermore it is possible to be directed to remote real machine On the program informations of multiple limitation remote access process carry out being aggregated to form data acquisition system, then by the journey of destination application Sequence information is included in the data set and merges retrieval duplicate keys, may determine that the destination application is limitation if detecting duplicate keys Remote access process, and may determine that the destination application if duplicate keys are not detected not is limitation remote access process.
Step S40. determines whether to execute the control instruction according to the result of judgement.
This step can determine whether to hold to destination application on remote real machine according to the result judged in step S30 Row control instruction.As shown in figure 3, this step may comprise steps of as a preferred implementation manner, again:
Step S41. executes the control and refers to when it is limitation remote access process to judge the destination application not It enables.
If judging in step S30 the result is that destination application is not to limit remote access process, this step On remote real machine the control instruction will be executed to destination application.It, can also be in addition, after executing control instruction The remote real machine server send execute the control instruction as a result, being fed back so that user obtains control in real time.
Step S42. forbids executing the control and refers to when it is limitation remote access process to judge the destination application It enables.
If judging in step S30 the result is that destination application is limitation remote access process, this step will Forbid executing the control instruction to destination application on remote real machine.In addition, if it is determined that the destination application It is limitation remote access process, the destination application can also be closed, while can also be sent out to the remote real machine server Control invalid information is sent, to avoid user from continuing to make invalid control operation to destination application.
It, need not be independent at remote real machine end in the remote real machine access control method that the present exemplary embodiment is provided Monitoring process is set, and acts on behalf of the control for judging to complete remote real machine access rights into line program merely with remote boot server System, the instruction that the result judged according to program sends come dynamic control remote real machine server, greatly improves system effectiveness, Reduce overhead, while the operation for allowing remote control and prototype side to control separates, and improves control stability and spirit Activity.
Referring to Fig. 4, be based on above-described embodiment, in another exemplary embodiment of the present disclosure, step S20 may include with Lower step:
The target object that step S21. judges to need to control according to the control instruction.
Usually can be simultaneously on foreground and the multiple programs of running background on remote real machine, this step connects according in step S10 The control instruction received may determine that the practical target object for wishing to control of user, which may include intended application journey Window, control and/or the position of sequence.For example, user utilizes mouse to implement a single-click operation on the local device, then this step It may determine that user wishes which window which control, the control for being triggered by the single-click operation on remote real machine are located at Which program the interior and window belongs to.In another example user utilizes mouse to implement a slide on the local device, then This step may determine that user wishes which kind of sliding trace obtained on remote real machine by the slide, be based on the sliding rail The location information (can be coordinate information) and the location information of the objects such as each program and its window, control of mark can also judge The program controlled required for the slide.
Step S22. obtains the program information of the corresponding destination application of the target object.
After judging that control instruction needs the target object controlled by step S21, this step can obtain the target object The program information of corresponding destination application.Multiple foreground programs or multiple are run especially on remote real machine simultaneously The case where program window is overlapped mutually, by obtaining target object to judge that destination application can be realized more accurately remotely Prototype access control, avoids the occurrence of maloperation.
Further, in another exemplary embodiment of the present disclosure, can also include following two steps before step S30 Suddenly:
Receive the user information that the remote real machine server is sent;
Obtain the information of limitation remote access process associated with the user information.
Based on the two steps, in remote real machine access control method provided in this embodiment, refer in addition to receiving control Other than order, the user information of remote real machine server transmission is also received.Wherein, user information may include described in user accesses Login account, user name and/or the network address of remote real machine server.The present embodiment can will access the user information of user It is associated with the formation of the limitation remote access process of remote real machine, such as can be according to the login account, user name, net for accessing user One or more information such as network address classifies to user group, forms paying customer, free users, black list user etc. Etc. multiple classifications, and different access rights can be assigned for different classes of user, that is, for different users to limit The type and quantity of remote access process processed do differentiation setting, to carry out remote real machine access control more flexiblely.
It should be noted that, although exemplary embodiment above describes each step of method in the disclosure with particular order Suddenly, still, this does not require that either hint must execute these steps according to the particular order or have to carry out whole Step could realize desired result.Additionally or alternatively, it is convenient to omit multiple steps are merged into one by certain steps Step executes, and/or a step is decomposed into execution of multiple steps etc..
In an exemplary embodiment of the disclosure, a kind of remote real machine access control apparatus is also provided, referring to Fig. 5, remotely Prototype access control apparatus 50 may include mainly information receiving module 51, program acquisition module 52,53 and of permission judgment module Instruction execution module 54.Wherein, information receiving module 51 is configured as receiving being directed to remotely very for remote real machine server transmission The control instruction of machine;Program acquisition module 52 is configured as obtaining the journey of the destination application run on the remote real machine Sequence information;Permission judgment module 53 is configured as judging whether the destination application is that limitation is remote according to described program information Journey accesses program;Instruction execution module 54 is configured as being determined whether to execute the control instruction according to the result of judgement.
The detail of above-mentioned remote real machine access control apparatus is in corresponding remote real machine access control method It is described in detail, therefore details are not described herein again.
It should be noted that although being referred to several modules or list for acting the equipment executed in above-detailed Member, but this division is not enforceable.In fact, according to embodiment of the present disclosure, it is above-described two or more The feature and function of module either unit can embody in a module or unit.Conversely, an above-described mould Either the feature and function of unit can be further divided into and embodied by multiple modules or unit block.
In an exemplary embodiment of the disclosure, a kind of computer readable storage medium is also provided, calculating is stored thereon with Machine program can realize the above-mentioned remote real machine access control method of the disclosure when computer program is executed by processor. In some possible embodiments, various aspects of the disclosure is also implemented as a kind of form of program product comprising Program code;It (can be CD-ROM, USB flash disk or mobile hard that the program product, which can be stored in a non-volatile memory medium, Disk etc.) in or network on;When described program product (can be personal computer, server, terminal installation in a computing device Or network equipment etc.) on when running, said program code is for making the computing device execute above-mentioned each example in the disclosure Method and step in property embodiment.
It is shown in Figure 6, it, can be with according to the program product 60 for realizing the above method of embodiment of the present disclosure Using portable compact disc read-only memory (CD-ROM) and include program code, and can be (such as personal in computing device Computer, server, terminal installation or network equipment etc.) on run.However, the program product of the disclosure is without being limited thereto.? In the present exemplary embodiment, computer readable storage medium can be any include or storage program tangible medium, the program The either device use or in connection of execution system, device can be commanded.
The arbitrary combination of one or more readable medium may be used in described program product.Readable medium can be readable Signal media or readable storage medium storing program for executing.
Readable storage medium storing program for executing for example can be but be not limited to the system of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, device Or device or arbitrary above combination.The more specific example (non exhaustive list) of readable storage medium storing program for executing includes:With one The electrical connection of a or multiple conducting wires, portable disc, hard disk, random access memory (RAM), read-only memory (ROM), erasable type Programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), optical memory Part, magnetic memory device or above-mentioned any appropriate combination.
Readable signal medium may include in a base band or as the data-signal that a carrier wave part is propagated, wherein carrying Readable program code.Diversified forms, including but not limited to electromagnetic signal, optical signal may be used in the data-signal of this propagation Or above-mentioned any appropriate combination.Readable signal medium can also be the arbitrary readable medium other than readable storage medium storing program for executing, should Readable medium can send, propagate either transmission for being used by instruction execution system, device or device or in connection The program used.
The program code for including on readable medium can transmit with any suitable medium, including but not limited to wirelessly, have Line, optical cable, RF etc. or above-mentioned any appropriate combination.
Can with any combination of one or more programming languages come write for execute the disclosure operation program Code, described program design language include object oriented program language, Java, C++ etc., further include conventional mistake Formula programming language, such as C language or similar programming language.Program code can be calculated fully in user and be set Standby upper execution is partly executed, is set as an independent software package execution, partly in user's calculating on the user computing device Standby upper part executes or is executed in remote computing device or server completely on a remote computing.It is being related to remotely In the situation of computing device, remote computing device can pass through the network of any kind (including LAN (LAN) or wide area network (WAN) etc.) it is connected to user calculating equipment;Or, it may be connected to external computing device, such as provided using Internet service Quotient is connected by internet.
In an exemplary embodiment of the disclosure, a kind of electronic equipment is also provided, the electronic equipment includes at least one Processor and at least one memory for storing the executable instruction of the processor;Wherein, the processor by with It is set to and executes the method and step in the disclosure in above-mentioned each exemplary embodiment via the executable instruction is executed.
The electronic equipment 700 in the present exemplary embodiment is described with reference to Fig. 7.Electronic equipment 700 is only One example should not bring any restrictions to the function and use scope of the embodiment of the present disclosure.
Shown in Figure 7, electronic equipment 700 is showed in the form of universal computing device.The component of electronic equipment 700 can be with Including but not limited to:At least one processing unit 710, at least one storage unit 720, connection different system component (including place Manage unit 710 and storage unit 720) bus 730, display unit 740.
Wherein, storage unit 720 has program stored therein code, and said program code can be executed by processing unit 710 so that Processing unit 710 executes the method and step in above-mentioned each exemplary embodiment in the disclosure.
Storage unit 720 may include the readable medium of volatile memory cell form, such as Random Access Storage Unit 721 (RAM) and/or cache memory unit 722 can further include read-only memory unit 723 (ROM).
Storage unit 720 can also include program/utility 724 with one group of (at least one) program module 725, Such program module includes but not limited to:Operating system, one or more application program, other program modules and program Data may include the realization of network environment in each or certain combination in these examples.
Bus 730 can be to indicate one or more in a few class bus structures, including storage unit bus or storage Cell controller, peripheral bus, graphics acceleration port, processing unit use the arbitrary bus structures in various bus structures Local bus.
Electronic equipment 700 can also be with one or more external equipments 800 (such as keyboard, sensing equipment, bluetooth equipment Deng) communication, the equipment communication that user can also be allow to interact with the electronic equipment 700 with one or more, and/or with Enable any equipment that the electronic equipment 700 communicated with other one or more computing devices (such as router, modulation Demodulator etc.) communication.This communication can be carried out by input/output (I/O) interface 750.Also, electronic equipment 700 may be used also To pass through network adapter 760 and one or more network (such as LAN (LAN), wide area network (WAN) and/or public network Network, such as internet) communication.As shown in fig. 7, network adapter 760 can be by other of bus 730 and electronic equipment 700 Module communicates.It should be understood that although not shown in the drawings, other hardware and/or software mould can be used in conjunction with electronic equipment 700 Block, including but not limited to:Microcode, device driver, redundant processing unit, external disk drive array, RAID system, tape Driver and data backup storage system etc..
It will be appreciated by those skilled in the art that various aspects of the disclosure can be implemented as system, method or program product. Therefore, various aspects of the disclosure can be with specific implementation is as follows, i.e.,:Complete hardware embodiment, complete software The embodiment that embodiment (including firmware, microcode etc.) or hardware and software combine, may be collectively referred to as here " circuit ", " module " or " system ".
For a further understanding of the concrete application of each embodiment in the disclosure, with reference to a kind of illustrative remote real machine The structural framing of access system explains to its operating process.
As shown in figure 8, it includes user terminal, remote real machine server end and remote real machine end that remote real machine, which accesses system mainly, Three parts.
User terminal includes mainly control module and image display, and the major function of wherein control module is to receive to receive to use The remote real machine operational order that family is initiated, then sendes it to remote real machine server end.The main work(of image display Can be the interfaces UI of real-time echo remote real machine.
Remote real machine server end includes mainly control process module and view synthesis module, wherein control process mould The major function of block is the remote real machine operational order for handling front end and sending, then it is given to the long-range drive at remote real machine end Dynamic agency.The major function of view synthesis module is the UI interface images of real-time crawl and transmission remote real machine.
Remote real machine end includes mainly remote boot server proxy module, and the major function of remote boot server proxy module is long-range True control operation corresponding with user's operation is executed on prototype.
The detailed process of remote real machine access operation may include with lower part:
1, user initiates remote real machine access request using the browser or client software of user terminal, user terminal with it is remote Cheng Zhenji server ends establish connection, and command channel is established, and user can be sent by command channel to remote real machine server Remote real machine control command.
2, remote real machine startup of server image processing module waits the image of remote real machine end transmission to be received.
3, remote real machine server while starting image processing module by remote boot server proxy configurations to corresponding remote Cheng Zhenji is upper and starts remote boot server agency.
4, remote boot server agency receives the operational order that remote real machine server is sent out, this public affairs is executed on remote real machine Open the remote real machine access control method in above-described embodiment.
5, after remote boot server agency has executed concrete operations, operating result is returned into remote real machine server.
6, view synthesis module captures the interfaces UI of remote real machine in real time.
7, UI image of the view synthesis module real-time reception to remote real machine.
8, UI image datas are returned to the image display of user terminal and shown by view synthesis module in real time.
Primary complete remote real machine can be completed by the above operating process to access, wherein carrying by the embodiment of the present disclosure The method of confession can carry out different processing to the application program of remote access to be limited and other application programs, to reach Control the effect of remote real machine access rights.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the disclosure Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or Person's adaptive change follows the general principles of this disclosure and includes the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by appended Claim is pointed out.
Above-mentioned described feature, structure or characteristic can be incorporated in one or more embodiment party in any suitable manner In formula, if possible, it is characterized in discussed in each embodiment interchangeable.In the above description, it provides many specific thin Section fully understands embodiment of the present disclosure to provide.It will be appreciated, however, by one skilled in the art that this can be put into practice Disclosed technical solution is without one or more in specific detail, or other methods, component, material may be used Deng.In other cases, known features, material or operation are not shown in detail or describe to avoid each side of the fuzzy disclosure Face.

Claims (13)

1. a kind of remote real machine access control method, which is characterized in that including:
Receive the control instruction for remote real machine that remote real machine server is sent;
Obtain the program information of the destination application run on the remote real machine;
Judge whether the destination application is limitation remote access process according to described program information;
Determined whether to execute the control instruction according to the result of judgement.
2. remote real machine access control method according to claim 1, which is characterized in that described true according to the result of judgement Whether executing the control instruction calmly includes:
When it is limitation remote access process to judge the destination application not, the control instruction is executed;
When it is limitation remote access process to judge the destination application, forbid executing the control instruction.
3. remote real machine access control method according to claim 1, which is characterized in that the method further includes:
When it is limitation remote access process to judge the destination application, the destination application is closed.
4. remote real machine access control method according to claim 1, which is characterized in that the method further includes:
When it is limitation remote access process to judge the destination application, control nothing is sent to the remote real machine server Imitate information.
5. remote real machine access control method according to claim 1, which is characterized in that the method further includes:
When it is limitation remote access process to judge the destination application not, sends and execute to the remote real machine server The result of the control instruction.
6. remote real machine access control method according to claim 1, which is characterized in that described program information includes target The title and/or icon of application program.
7. the remote real machine access control method according to any one of claim 1-6, which is characterized in that the acquisition The program information of the destination application run on the remote real machine includes:
The target object for judging to need to control according to the control instruction;
Obtain the program information of the corresponding destination application of the target object.
8. remote real machine access control method according to claim 7, which is characterized in that the target object includes target Window, control and/or the position of application program.
9. the remote real machine access control method according to any one of claim 1-4, which is characterized in that according to institute It states program information and judges whether the destination application is before limiting remote access process, the method further includes:
Receive the user information that the remote real machine server is sent;
Obtain the information of limitation remote access process associated with the user information.
10. remote real machine access control method according to claim 9, which is characterized in that the user information includes using Family accesses login account, user name and/or the network address of the remote real machine server.
11. a kind of remote real machine access control apparatus, which is characterized in that including:
Information receiving module is configured as receiving the control instruction for remote real machine that remote real machine server is sent;
Program acquisition module is configured as obtaining the program information of the destination application run on the remote real machine;
Permission judgment module is configured as judging whether the destination application is that limitation is long-range and visits according to described program information Ask program;
Instruction execution module is configured as being determined whether to execute the control instruction according to the result of judgement.
12. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The remote real machine access control method described in any one of claim 1-10 is realized when being executed by processor.
13. a kind of electronic equipment, which is characterized in that including:
Processor;
Memory, the executable instruction for storing the processor;
Wherein, the processor is configured as carrying out any one of perform claim requirement 1-10 via the execution executable instruction The remote real machine access control method.
CN201810494078.1A 2018-05-22 2018-05-22 Remote real machine access control method and device, storage medium and electronic equipment Active CN108769175B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810494078.1A CN108769175B (en) 2018-05-22 2018-05-22 Remote real machine access control method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810494078.1A CN108769175B (en) 2018-05-22 2018-05-22 Remote real machine access control method and device, storage medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN108769175A true CN108769175A (en) 2018-11-06
CN108769175B CN108769175B (en) 2020-07-31

Family

ID=64007745

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810494078.1A Active CN108769175B (en) 2018-05-22 2018-05-22 Remote real machine access control method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN108769175B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109829291A (en) * 2019-01-28 2019-05-31 广州云测信息技术有限公司 A kind of authentication method into Android set interface
CN111181983A (en) * 2019-12-31 2020-05-19 奇安信科技集团股份有限公司 Endogenous access control method, endogenous access control device, computing equipment and medium
CN113709243A (en) * 2021-08-27 2021-11-26 广州博冠信息科技有限公司 Equipment remote control method and device, electronic equipment and storage medium
CN113810448A (en) * 2020-06-17 2021-12-17 阿里巴巴集团控股有限公司 Cloud service method, deployment method, device, electronic equipment and storage medium
CN114338135A (en) * 2021-12-27 2022-04-12 奇安信科技集团股份有限公司 Remote login behavior processing method and device, computing equipment and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1536458A (en) * 2003-04-11 2004-10-13 ������ͨ�Ƽ��������ι�˾ System and method for managing remote computer access host
CN101064604A (en) * 2006-04-29 2007-10-31 西门子公司 Remote access process, system and equipment
US20080235596A1 (en) * 2007-03-23 2008-09-25 Kulvir Singh Bhogal Method and system for managing a remote control session
CN102141957A (en) * 2010-10-21 2011-08-03 华为技术有限公司 Auxiliary test method, device and system for remote real machine
CN103268288A (en) * 2013-06-18 2013-08-28 北京云测信息技术有限公司 Remote real machine debugging method and system of mobile terminal application software
CN103778053A (en) * 2012-10-18 2014-05-07 周玲玲 Remote real machine test system and method of mobile terminals
CN105704094A (en) * 2014-11-25 2016-06-22 杭州华三通信技术有限公司 Application access authority control method and device
CN106230937A (en) * 2016-07-29 2016-12-14 宇龙计算机通信科技(深圳)有限公司 Long-range control method, remote control and terminal
CN106909505A (en) * 2017-02-19 2017-06-30 郑州云海信息技术有限公司 The remote test method and device of the server OS based on java

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1536458A (en) * 2003-04-11 2004-10-13 ������ͨ�Ƽ��������ι�˾ System and method for managing remote computer access host
CN101064604A (en) * 2006-04-29 2007-10-31 西门子公司 Remote access process, system and equipment
US20080235596A1 (en) * 2007-03-23 2008-09-25 Kulvir Singh Bhogal Method and system for managing a remote control session
CN102141957A (en) * 2010-10-21 2011-08-03 华为技术有限公司 Auxiliary test method, device and system for remote real machine
CN103778053A (en) * 2012-10-18 2014-05-07 周玲玲 Remote real machine test system and method of mobile terminals
CN103268288A (en) * 2013-06-18 2013-08-28 北京云测信息技术有限公司 Remote real machine debugging method and system of mobile terminal application software
CN105704094A (en) * 2014-11-25 2016-06-22 杭州华三通信技术有限公司 Application access authority control method and device
CN106230937A (en) * 2016-07-29 2016-12-14 宇龙计算机通信科技(深圳)有限公司 Long-range control method, remote control and terminal
CN106909505A (en) * 2017-02-19 2017-06-30 郑州云海信息技术有限公司 The remote test method and device of the server OS based on java

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109829291A (en) * 2019-01-28 2019-05-31 广州云测信息技术有限公司 A kind of authentication method into Android set interface
CN109829291B (en) * 2019-01-28 2020-09-11 广州云测信息技术有限公司 Authentication method for entering Android setting interface
CN111181983A (en) * 2019-12-31 2020-05-19 奇安信科技集团股份有限公司 Endogenous access control method, endogenous access control device, computing equipment and medium
CN111181983B (en) * 2019-12-31 2023-09-08 奇安信科技集团股份有限公司 Endogenous access control method, endogenous access control device, computing equipment and medium
CN113810448A (en) * 2020-06-17 2021-12-17 阿里巴巴集团控股有限公司 Cloud service method, deployment method, device, electronic equipment and storage medium
CN113810448B (en) * 2020-06-17 2023-07-04 阿里巴巴集团控股有限公司 Cloud service method, deployment method, device, electronic equipment and storage medium
CN113709243A (en) * 2021-08-27 2021-11-26 广州博冠信息科技有限公司 Equipment remote control method and device, electronic equipment and storage medium
CN113709243B (en) * 2021-08-27 2024-04-30 广州博冠信息科技有限公司 Equipment remote control method and device, electronic equipment and storage medium
CN114338135A (en) * 2021-12-27 2022-04-12 奇安信科技集团股份有限公司 Remote login behavior processing method and device, computing equipment and storage medium

Also Published As

Publication number Publication date
CN108769175B (en) 2020-07-31

Similar Documents

Publication Publication Date Title
CN108769175A (en) Remote real machine access control method, device, storage medium and electronic equipment
CN108345543B (en) Data processing method, device, equipment and storage medium
CN110489101B (en) Interface simulation method, system, medium and electronic equipment
CN104699591A (en) Reappearing method and device of test scenes
CN105378624A (en) Showing interactions as they occur on a whiteboard
CN111416756B (en) Protocol testing method, device, computer equipment and storage medium
CN111177112A (en) Database blocking method and device based on operation and maintenance management system and electronic equipment
CN113342697B (en) Simulation test system and method for flash translation layer
CN111597542A (en) Verification information sharing method and device, electronic equipment and storage medium
CN108737638A (en) Application control method, apparatus, mobile terminal and computer-readable medium
US8977968B2 (en) Pseudo-remote terminal IOTA mobile diagnostics and electronic customer care
CN111459358A (en) Application program control method and electronic equipment
CN108615158B (en) Risk detection method and device, mobile terminal and storage medium
CN108282542A (en) Remote operation method and device for test equipment
CN109491908B (en) Page detection method and device, electronic equipment and storage medium
CN107809742A (en) Processing method, device, storage medium and the terminal of location information
CN106790171A (en) The method of session control, device and computer-readable recording medium
CN112463266A (en) Execution policy generation method and device, electronic equipment and storage medium
CN105094633A (en) Method and device for transmitting control instruction
CN112988138A (en) System and method for application in an integrated development environment
CN111273967A (en) Remote hook setting method and device suitable for Android system and electronic equipment
CN114422236B (en) Intelligent device access method and device and electronic device
CN108449428A (en) A kind of method for connecting network, device, server and storage medium
CN112214743A (en) Method, device, equipment and storage medium for simulating account login
CN110188532B (en) Password protection method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Room 221, 2nd floor, Block C, 18 Kechuang 11th Street, Beijing Economic and Technological Development Zone, 100176

Applicant after: JINGDONG DIGITAL TECHNOLOGY HOLDINGS Co.,Ltd.

Address before: Room 221, 2nd floor, Block C, 18 Kechuang 11th Street, Beijing Economic and Technological Development Zone, 100176

Applicant before: BEIJING JINGDONG FINANCIAL TECHNOLOGY HOLDING Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: Room 221, 2 / F, block C, 18 Kechuang 11th Street, Daxing District, Beijing, 100176

Patentee after: Jingdong Technology Holding Co.,Ltd.

Address before: Room 221, 2 / F, block C, 18 Kechuang 11th Street, Daxing District, Beijing, 100176

Patentee before: Jingdong Digital Technology Holding Co.,Ltd.

CP01 Change in the name or title of a patent holder
CP03 Change of name, title or address

Address after: Room 221, 2 / F, block C, 18 Kechuang 11th Street, Daxing District, Beijing, 100176

Patentee after: Jingdong Digital Technology Holding Co.,Ltd.

Address before: Room 221, 2 / F, block C, 18 Kechuang 11th Street, Beijing Economic and Technological Development Zone, 100176

Patentee before: JINGDONG DIGITAL TECHNOLOGY HOLDINGS Co.,Ltd.

CP03 Change of name, title or address