Remote control method, computing device and storage medium

A technology of remote control and control commands, applied in the Internet field, can solve problems such as not fundamentally solving and preventing illegal operations, threats to information security and computer system security, user data leakage, etc., to achieve the effect of protecting private data or commercial data

Active Publication Date: 2021-08-20
UNIONTECH SOFTWARE TECH CO LTD
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it has not fundamentally solved and prevented the untrusted command injection and illegal operation of the desktop in the remote process of the user, resulting in the leakage of user data and threatening the user's information security and computer system security.
[0003] Moreover, there are certain risks in the use of multi-level indirect remote control. For example, when there are three computers a, b, and c, a remotely controls b, and b remotely controls c. In this way, a indirectly controls c, but , the user of computer c may not want to be accessed by a, and through this indirect access method, the user data on computer c will be leaked to a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Remote control method, computing device and storage medium
  • Remote control method, computing device and storage medium
  • Remote control method, computing device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0027] In the remote desktop solution, the remote control mainly includes the main control terminal and the controlled terminal. For example, the controlling terminal a remotely controls the controlled terminal b. In the remote process, there are untrusted command injections or illegal desktop operations (for example, the master terminal a sends untrusted commands to the controlled terminal b or controls the controlled terminal b t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a remote control method, a computing device and a storage medium. The remote control method is executed in a first terminal, the first terminal is in communication connection with a second terminal, and the first terminal is remotely controlled by the second terminal. The method comprises the following steps: receiving a target instruction from the second terminal; detecting whether the target instruction is a malicious instruction; if the target instruction is a malicious instruction, filtering the target instruction, and generating an early warning prompt; otherwise, responding to the target instruction by executing the corresponding operation.

Description

technical field [0001] The invention relates to the field of the Internet, in particular to a remote control method, computing equipment and storage media. Background technique [0002] With the rapid development of network technology, technologies such as remote office or remote assistance are widely used. From the birth to maturity of remote desktop technology, data security and privacy protection (for example, destroying user systems, illegally obtaining user privacy data,) have always been It is the key technology to be solved. In recent years, many related technologies have emerged, such as remote desktop isolation technology, process isolation technology, and so on. However, it has not fundamentally solved and prevented the untrustworthy command injection and illegal operation of the desktop in the remote process of the user, resulting in the leakage of user data and threatening the user's information security and computer system security. [0003] Moreover, there are...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/56
CPCG06F21/556G06F21/562
Inventor 赵良云李琳张磊
Owner UNIONTECH SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products