Device control method, device and storage medium

文档序号:303617 发布日期:2021-11-26 浏览:12次 中文

阅读说明:本技术 设备控制方法、装置、设备及存储介质 (Device control method, device and storage medium ) 是由 高鲁鑫 成熙 吉大鹏 于 2021-08-30 设计创作,主要内容包括:本申请实施例公开了一种设备控制方法、装置、设备及存储介质,属于物联网技术领域,该方法包括:控制设备生成用于控制被控设备的控制指令;控制设备对控制指令进行加密,得到加密后的控制指令;控制设备向被控设备发送所加密后的控制指令;被控设备在接收到来自控制设备的加密后的控制指令的情况下,对加密后的控制指令进行解密,得到控制指令;被控设备基于控制指令执行对应的操作;被控设备生成用于记录操作执行过程的监控画面;被控设备对监控画面进行加密,得到加密后的视频;被控设备向控制设备发送加密后的视频;控制设备接收来自被控设备的加密后的视频。本申请中,保证控制指令执行过程的安全性,避免非法指令对被控设备的控制。(The embodiment of the application discloses a device control method, a device, equipment and a storage medium, which belong to the technical field of Internet of things, and the method comprises the following steps: the control equipment generates a control instruction for controlling the controlled equipment; the control equipment encrypts the control command to obtain an encrypted control command; the control equipment sends the encrypted control instruction to the controlled equipment; the controlled equipment decrypts the encrypted control instruction to obtain the control instruction under the condition of receiving the encrypted control instruction from the control equipment; the controlled device executes corresponding operation based on the control instruction; the controlled equipment generates a monitoring picture for recording the operation execution process; the controlled equipment encrypts the monitoring picture to obtain an encrypted video; the controlled equipment sends the encrypted video to the control equipment; the control device receives the encrypted video from the controlled device. In the method and the device, the safety of the control instruction execution process is ensured, and the control of illegal instructions on the controlled equipment is avoided.)

1. An apparatus control method, applied to a control apparatus, the method comprising:

generating a control instruction for controlling a controlled device;

encrypting the control instruction to obtain an encrypted control instruction;

sending the encrypted control instruction to the controlled equipment; after the encrypted control instruction is decrypted, the controlled device executes corresponding operation based on the control instruction;

and receiving an encrypted video from the controlled device, wherein the encrypted video comprises a monitoring picture for recording the operation execution process of the controlled device.

2. The method of claim 1, wherein the controlling device comprises a first chip and the controlled device comprises a second chip;

wherein the first chip includes an encryption algorithm and the second chip includes a decryption algorithm for the encryption algorithm.

3. The method according to claim 2, wherein the encrypting the control command to obtain the encrypted control command comprises:

encrypting the control instruction by adopting an encryption algorithm in the first chip to obtain the encrypted control instruction;

the encrypted control instruction comprises an identifier of the first chip, and the second chip is used for identifying the identifier of the first chip.

4. The method of claim 1, wherein the control devices include a mouse and a keyboard; the mouse and the keyboard are respectively provided with a first chip, and the first chip comprises an encryption algorithm;

the generating of the control instruction for controlling the controlled device includes:

generating a mouse control instruction for controlling the controlled equipment based on the position movement information of the mouse;

and generating a keyboard control instruction for controlling the controlled equipment based on the input information of the keyboard.

5. The method according to any one of claims 1 to 4, wherein after receiving the encrypted video from the controlled device, the method further comprises:

decrypting the encrypted video to obtain the monitoring picture sent by the controlled equipment;

verifying the operation executed by the controlled equipment based on the monitoring picture;

and sending a transmission stop instruction to the controlled device under the condition that the operation executed by the controlled device is not in accordance with the operation corresponding to the control instruction, wherein the transmission stop instruction is used for instructing the controlled device to stop network transmission.

6. An apparatus control method, applied to a controlled apparatus, the method comprising:

under the condition that an encrypted control instruction from control equipment is received, decrypting the encrypted control instruction to obtain the control instruction;

executing corresponding operation based on the control instruction;

generating a monitoring picture for recording the operation execution process;

encrypting the monitoring picture to obtain an encrypted video;

sending the encrypted video to the control device; the encrypted video is used for instructing the control device to verify the operation executed by the controlled device.

7. The method of claim 6, wherein the controlled device comprises a mouse and a keyboard; the mouse and the keyboard are respectively provided with a second chip, the second chip comprises a decryption algorithm aiming at the encryption algorithm of the first chip, and the first chip is arranged in the control equipment;

the decrypting the encrypted control instruction to obtain the control instruction includes:

and in response to the identification of the second chip successfully identifying the identification of the first chip, decrypting the encrypted control instruction by using a decryption algorithm in the second chip to obtain the control instruction.

8. An apparatus control device, characterized in that the device comprises:

the command generation module is used for generating a control command for controlling the controlled equipment;

the command encryption module is used for encrypting the control command to obtain an encrypted control command;

the instruction sending module is used for sending the encrypted control instruction to the controlled equipment; after the encrypted control instruction is decrypted, the controlled device executes corresponding operation based on the control instruction;

and the video receiving module is used for receiving the encrypted video from the controlled equipment, and the encrypted video comprises a monitoring picture for recording the operation execution process of the controlled equipment.

9. An apparatus control device, characterized in that the device comprises:

the command decryption module is used for decrypting the encrypted control command to obtain the control command under the condition of receiving the encrypted control command from the control equipment;

the instruction operation module is used for executing corresponding operation based on the control instruction;

the picture generation module is used for generating a monitoring picture for recording the operation execution process;

the video encryption module is used for encrypting the monitoring picture to obtain an encrypted video;

the video sending module is used for sending the encrypted video to the control equipment; the encrypted video is used for instructing the control device to verify the operation executed by the controlled device.

10. A computer device comprising a processor and a memory, the memory having stored therein a computer program that is loaded and executed by the processor to implement the method of any of claims 1 to 5 or to implement the method of claim 6 or 7.

11. A non-transitory computer readable storage medium having stored thereon a computer program, wherein the computer program, when executed by a processor, implements the method of any one of claims 1 to 5, or implements the method of claim 6 or 7.

Technical Field

The present application relates to the field of internet of things technology, and in particular, to a device control method, apparatus, device, and storage medium.

Background

At present, because unmanned aerial vehicle's application is more and more extensive, the remote control about electronic equipment plays important role in each field.

In the related art, when the control device remotely controls the controlled device, the control device sends a control instruction to the controlled device, and when the controlled device receives the control instruction from the control device, the controlled device detects the control instruction according to a preset rule, removes an illegal data packet, and ensures the safety of a process of executing the control instruction by the controlled device.

However, in the above related art, the security of the controlled device in executing the control command is ensured only by filtering the illegal packet according to the preset rule, and the control device cannot ensure the security of the control command execution.

Disclosure of Invention

The embodiment of the application provides a device control method, a device and a storage medium, which can ensure the safety of control instruction execution. The technical scheme is as follows:

in one aspect, an embodiment of the present application provides an apparatus control method, which is applied to control an apparatus, and the method includes:

generating a control instruction for controlling a controlled device;

encrypting the control instruction to obtain an encrypted control instruction;

sending the encrypted control instruction to the controlled equipment; after the encrypted control instruction is decrypted, the controlled device executes corresponding operation based on the control instruction;

and receiving an encrypted video from the controlled device, wherein the encrypted video comprises a monitoring picture for recording the operation execution process of the controlled device.

On the other hand, an embodiment of the present application provides an apparatus control method, which is applied to a controlled apparatus, and the method includes:

under the condition that an encrypted control instruction from control equipment is received, decrypting the encrypted control instruction to obtain the control instruction;

executing corresponding operation based on the control instruction;

generating a monitoring picture for recording the operation execution process;

encrypting the monitoring picture to obtain an encrypted video;

sending the encrypted video to the control device; the encrypted video is used for instructing the control device to verify the operation executed by the controlled device.

In another aspect, an embodiment of the present application provides an apparatus for controlling a device, where the apparatus includes:

the command generation module is used for generating a control command for controlling the controlled equipment;

the command encryption module is used for encrypting the control command to obtain an encrypted control command;

the instruction sending module is used for sending the encrypted control instruction to the controlled equipment; after the encrypted control instruction is decrypted, the controlled device executes corresponding operation based on the control instruction;

and the video receiving module is used for receiving the encrypted video from the controlled equipment, and the encrypted video comprises a monitoring picture for recording the operation execution process of the controlled equipment.

In another aspect, an embodiment of the present application provides an apparatus for controlling a device, where the apparatus includes:

the command decryption module is used for decrypting the encrypted control command to obtain the control command under the condition of receiving the encrypted control command from the control equipment;

the instruction operation module is used for executing corresponding operation based on the control instruction;

the picture generation module is used for generating a monitoring picture for recording the operation execution process;

the video encryption module is used for encrypting the monitoring picture to obtain an encrypted video;

the video sending module is used for sending the encrypted video to the control equipment; the encrypted video is used for instructing the control device to verify the operation executed by the controlled device.

In a further aspect, an embodiment of the present application provides a computer device, where the computer device includes a processor and a memory, where the memory stores a computer program, and the computer program is loaded and executed by the processor to implement the device control method.

Optionally, the computer device comprises a control device and a controlled device.

In a further aspect, the present application provides a non-transitory computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the above device control method.

In a further aspect, the present application provides a computer program product, which when running, causes a computer device to execute the above device control method.

The technical scheme provided by the embodiment of the application can bring the following beneficial effects:

in the process of controlling the controlled equipment through the control equipment, when the controlled equipment executes corresponding operation, the operation execution process is recorded, the recorded monitoring picture is sent to the control equipment, and the control equipment determines whether the control instruction is executed correctly or not according to the content recorded in the monitoring picture, so that the safety of the control instruction execution process is ensured, and the control of an illegal instruction on the controlled equipment is avoided.

Drawings

In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.

FIG. 1 is a schematic diagram of a plant control system provided by one embodiment of the present application;

FIG. 2 is a diagram illustrating the relationship between the control device and the various sections in the controlled device;

FIG. 3 is a flow chart of a method for controlling a device provided by an embodiment of the present application;

FIG. 4 is a schematic diagram illustrating an exemplary manner of controlling a device;

FIG. 5 is a block diagram of a device control apparatus provided in one embodiment of the present application;

fig. 6 is a block diagram of an apparatus control device according to another embodiment of the present application;

fig. 7 is a block diagram of an apparatus control device according to still another embodiment of the present application;

fig. 8 is a block diagram of a computer device according to an embodiment of the present application.

Detailed Description

To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.

Referring to fig. 1, a schematic diagram of an apparatus control system according to an embodiment of the present application is shown. The device control system may include: a control device 10 and a controlled device 20.

The control device 10 is used to control a controlled device 20. The control device 10 includes a network transmission section 11, a video receiving section 12, a keyboard control section 13 and a mouse control section 14. Optionally, the control device 10 generates a control instruction for the controlled device 20 through the keyboard control section 13 and the mouse control section 14, encrypts the control instruction, and sends the encrypted control instruction to the controlled device 20 through the network transmission section 11.

The controlled device 20 is configured to perform a corresponding operation in accordance with the control of the control device 10. The controlled device 20 includes a network transmission section 21, a video transmission section 22, a keyboard controlled section 23, and a mouse controlled section 24. Optionally, after receiving the encrypted control instruction, the controlled device 20 decrypts the control instruction, and executes a corresponding operation based on the control instruction by the keyboard controlled version block 23 and the mouse controlled version block 24. In this case, the controlled device 20 may monitor the picture during the execution of the operation through the video transmission block 22, generate and encrypt a monitoring video, and further transmit the encrypted video to the control device through the network transmission block 21.

Illustratively, as shown in fig. 2, in the process of controlling the control device 20 through the control device 10, the keyboard controlled block 23 is controlled by the keyboard control block 13, the mouse controlled block 24 is controlled by the mouse control block 14, and the encrypted video transmitted by the video transmission block 22 is received by the video reception block 12.

Alternatively, the control device 10 and the controlled device 20 communicate with each other via a network.

Referring to fig. 3, a flowchart of a device control method according to an embodiment of the present application is shown. The method is applied to the equipment control system shown in fig. 1. The method can comprise the following steps (301-308):

in step 301, the control device generates a control instruction for controlling the controlled device.

The control instruction is used for controlling the controlled device to execute corresponding operation. Optionally, the control device controls the controlled device to perform a corresponding operation by sending a control instruction to the controlled device, so as to implement remote control on the controlled device. The control device may correspond to one or more controlled devices, which is not limited in this embodiment of the present application.

In the embodiment of the application, after determining the controlled device to be controlled, the control device generates a control instruction for controlling the controlled device. Optionally, the control device includes a mouse and a keyboard, and the control instruction includes a mouse control instruction and a keyboard control instruction. When the control device generates the control command, the control device acquires position movement information of the mouse and input information of the keyboard, further generates a mouse control command based on the position movement information of the mouse, and generates a keyboard control command based on the input information of the keyboard. The mouse control instruction is used for controlling a mouse of the controlled equipment, and the key position control instruction is used for controlling a keyboard of the controlled equipment.

And step 302, the control device encrypts the control command to obtain the encrypted control command.

In the embodiment of the present application, after the control device generates the control instruction, the control device encrypts the control instruction to obtain an encrypted control instruction.

Optionally, the control device includes a first chip, and the controlled device includes a second chip, where the second chip is used to identify an identifier of the first chip. The first chip comprises an encryption algorithm, and after the control device obtains the control instruction, the control device encrypts the control instruction by adopting the encryption algorithm in the first chip to obtain the encrypted control instruction. It should be noted that the encrypted control instruction includes an identifier of the first chip, and the controlled device may use the second chip to identify the identifier of the first chip after receiving the encrypted control instruction from the control device. Wherein the second chip comprises a decryption algorithm for the encryption algorithm of the first chip.

Optionally, in this embodiment of the application, the first chip is respectively disposed in a mouse and a keyboard of the control device, and the encrypted control instruction includes an encrypted mouse control instruction and an encrypted keyboard control instruction. When the control device encrypts the control instruction, the control device may encrypt the mouse control instruction by using an encryption algorithm of a first chip in the mouse to obtain an encrypted mouse control instruction, and encrypt the keyboard control instruction by using an encryption algorithm of a first chip in the keyboard to obtain an encrypted keyboard control instruction.

It should be noted that the mouse and the keyboard may include the same first chip or different first chips, which is not limited in this embodiment of the present application. The encryption algorithms included in different first chips are different, and the second chips corresponding to different first chips may be different.

Step 303, the control device sends the encrypted control command to the controlled device.

In this embodiment, after encrypting the control instruction to obtain an encrypted control instruction, the control device sends the encrypted control instruction to the controlled device.

Correspondingly, the controlled device receives the encrypted control command. Optionally, the controlled device may obtain the control instruction after performing decryption processing on the encrypted control instruction, and execute a corresponding operation based on the control instruction.

And step 304, the controlled device decrypts the encrypted control instruction to obtain the control instruction under the condition that the controlled device receives the encrypted control instruction from the control device.

In this embodiment, after receiving the encrypted control instruction from the control device, the controlled device decrypts the encrypted control instruction to obtain the control instruction.

Optionally, the encrypted control instruction includes an identifier of the first chip. When the controlled device decrypts the encrypted control instruction, the identifier of the second chip is used for identifying the identifier in the encrypted control instruction, if the identifier of the second chip successfully identifies the identifier of the first chip, the encrypted control instruction is determined to be obtained by encrypting through the encryption algorithm in the first chip, and then the encrypted control instruction is decrypted through the decryption algorithm in the second chip to obtain the control instruction.

Optionally, the controlled device includes a mouse and a keyboard, the mouse and the keyboard are respectively provided with a second chip, the second chip includes a decryption algorithm for the encryption algorithm of the first chip, and the first chip is in the control device. After the controlled device determines that the encrypted control instruction is obtained by encryption of the encryption algorithm in the first chip, the encrypted mouse control instruction is decrypted by the decryption algorithm of the second chip in the mouse to obtain the mouse control instruction, and the encrypted keyboard control instruction is decrypted by the decryption algorithm of the second chip in the keyboard to obtain the keyboard control instruction.

In one possible embodiment, the first chip and the second chip have a unique correspondence. Optionally, in a case where the mouse and the keyboard of the control device respectively include different first chips, the mouse and the keyboard of the controlled device also include different second chips.

In another possible embodiment, the second chip corresponds to a plurality of first chips. Optionally, in a case where the mouse of the control device and the keyboard respectively include different first chips, the mouse of the controlled device and the keyboard include the same second chip.

In step 305, the controlled device executes corresponding operations based on the control instruction.

In the embodiment of the application, after the controlled device acquires the control instruction, the controlled device executes a corresponding operation based on the control instruction.

Optionally, the control instruction includes a mouse control instruction and a keyboard control instruction. After the controlled device obtains the mouse control instruction and the keyboard control instruction, the position movement information of the mouse is determined according to the mouse control instruction, the input information of the keyboard is determined according to the keyboard control instruction, the mouse is controlled to move to the corresponding position based on the position movement information, and the keyboard is controlled to input the corresponding information based on the input information.

In step 306, the controlled device generates a monitoring screen for recording the operation execution process.

In the embodiment of the application, the controlled device records the operation execution process in the process of executing the operation, and generates a monitoring picture for recording the operation execution process.

And 307, the controlled device encrypts the monitoring picture to obtain an encrypted video.

In this embodiment of the application, after the controlled device obtains the monitoring picture, the controlled device encrypts the monitoring picture to obtain an encrypted video. Optionally, for the encryption mode of the monitoring picture, the staff may flexibly adjust the encryption mode according to the actual situation, which is not limited in the embodiment of the present application.

And step 308, the controlled device sends the encrypted video to the control device.

In this embodiment of the present application, after acquiring the encrypted video, the controlled device sends the encrypted video to the control device. Correspondingly, the control device receives the encrypted video from the controlled device.

The encrypted video is used for indicating the control device to verify the operation executed by the controlled device, the encrypted video comprises a monitoring picture used for recording the operation execution process of the controlled device, and the control device verifies the operation execution process of the controlled device based on the monitoring picture.

By way of example, referring to fig. 4, data transmission between the control device and the controlled device in the present application will be described. The mouse 41 of the control device 40 generates a mouse control command, obtains the encrypted mouse control command through an encryption algorithm in the first chip, sends the encrypted mouse control command to the controlled device 42 through the network, and decrypts the encrypted mouse control command through a decryption algorithm in the second chip by the mouse 43 of the controlled device 42 to obtain the mouse control command. The keyboard 44 of the control device 40 generates a keyboard control instruction, obtains the encrypted keyboard control instruction through an encryption algorithm in the first chip, sends the encrypted keyboard control instruction to the controlled device 42 through the network, and decrypts the encrypted keyboard control instruction through a decryption algorithm in the second chip by the keyboard 45 of the controlled device 42 to obtain the keyboard control instruction. In addition, after the controlled device 42 obtains the mouse control command and the keyboard control command, the mouse 43 of the controlled device 42 executes a corresponding operation based on the mouse control command, the keyboard 45 executes a corresponding operation based on the keyboard control command, at this time, the monitor screen for recording the operation execution process is generated by the display 46 of the controlled device 42, and is encrypted to obtain an encrypted video, and the encrypted video is transmitted to the control device 40 through the network, and the control device 40 decrypts the encrypted video and displays the monitor screen for recording the operation execution process on the display 47.

To sum up, in the technical solution provided in this embodiment of the application, in the process of controlling the controlled device through the control device, when the controlled device executes the corresponding operation, the operation execution process is recorded, and the recorded monitoring picture is sent to the control device, and the control device determines whether the control instruction is executed correctly according to the content recorded in the monitoring picture, so as to ensure the safety of the control instruction execution process and avoid the control of the controlled device by the illegal instruction.

In addition, the control instruction is encrypted and decrypted through the chip, so that the control instruction is prevented from being tampered or replaced in the transmission process, and the safety of instruction transmission is guaranteed.

Optionally, in this embodiment of the application, after obtaining the encrypted video, the control device decrypts the encrypted video to obtain a monitoring picture sent by the controlled device, further verifies an operation executed by the controlled device based on the monitoring picture, and sends a transmission stop instruction to the controlled device when the operation executed by the controlled device does not match the operation corresponding to the control instruction. The transmission stopping instruction is used for instructing the controlled equipment to stop network transmission.

In a possible implementation manner, after the controlled device obtains the monitoring picture, the monitoring picture is displayed to the worker, the worker verifies the monitoring picture, if the operation execution process recorded in the monitoring picture does not correspond to the operation corresponding to the control instruction, it is determined that the control instruction is tampered or the controlled device is attacked, a transmission stop instruction is sent to the controlled device, and the controlled device stops network transmission based on the transmission stop instruction.

In another possible implementation, after the controlled device obtains the monitoring picture, frame-dividing the monitoring picture, and feature-extracting each frame of image, determining mouse movement information of the controlled device and input information of the keyboard from the feature information in each frame of image, if the mouse movement information and the input information of the keyboard do not correspond to the control instruction, determining that the control instruction is tampered or the controlled device is attacked, and sending a transmission stop instruction to the controlled device, so that the controlled device stops network transmission based on the transmission stop instruction.

It should be noted that the monitoring screen may include a part of the content of the operation execution process, for example, the controlled device sends the monitoring screen to the control device at a certain time interval in the operation execution process; alternatively, the monitoring screen may include all the contents of the operation execution process, such as the controlled device sending the monitoring screen to the control device after the operation execution is finished.

The following are embodiments of the apparatus of the present application that may be used to perform embodiments of the method of the present application. For details which are not disclosed in the embodiments of the apparatus of the present application, reference is made to the embodiments of the method of the present application.

Referring to fig. 5, a block diagram of a device control apparatus according to an embodiment of the present application is shown. The device has the function of realizing the equipment control method, and the function can be realized by hardware or by hardware executing corresponding software. The device can be computer equipment, and can also be arranged in the computer equipment. The apparatus 500 may comprise: an instruction generating module 510, an instruction encrypting module 520, an instruction transmitting module 530, and a video receiving module 540.

And an instruction generating module 510, configured to generate a control instruction for controlling the controlled device.

And the instruction encryption module 520 is configured to encrypt the control instruction to obtain an encrypted control instruction.

An instruction sending module 530, configured to send the encrypted control instruction to the controlled device; and the controlled equipment executes corresponding operation based on the control instruction after decrypting the encrypted control instruction.

The video receiving module 540 is configured to receive an encrypted video from the controlled device, where the encrypted video includes a monitoring picture for recording an operation execution process of the controlled device.

In an exemplary embodiment, the control device includes a first chip, and the controlled device includes a second chip; wherein the first chip includes an encryption algorithm and the second chip includes a decryption algorithm for the encryption algorithm.

In an exemplary embodiment, the instruction encrypting module 520 is configured to encrypt the control instruction by using an encryption algorithm in the first chip to obtain the encrypted control instruction; the encrypted control instruction comprises an identifier of the first chip, and the second chip is used for identifying the identifier of the first chip.

In an exemplary embodiment, the control device includes a mouse and a keyboard; the mouse and the keyboard are respectively provided with a first chip, and the first chip comprises an encryption algorithm; the instruction generating module 510 is configured to generate a mouse control instruction for controlling the controlled device based on the position movement information of the mouse; and generating a keyboard control instruction for controlling the controlled equipment based on the input information of the keyboard.

In an exemplary embodiment, as shown in fig. 6, the apparatus 500 further comprises: a video decryption module 550, an operation check module 560, and a transmission stop module 570.

And a video decryption module 550, configured to decrypt the encrypted video to obtain the monitoring picture sent by the controlled device.

And an operation checking module 560, configured to check an operation performed by the controlled device based on the monitoring screen.

A transmission stopping module 570, configured to send a transmission stopping instruction to the controlled device when the operation executed by the controlled device does not match the operation corresponding to the control instruction, where the transmission stopping instruction is used to instruct the controlled device to stop network transmission.

To sum up, in the technical solution provided in this embodiment of the application, in the process of controlling the controlled device through the control device, when the controlled device executes the corresponding operation, the operation execution process is recorded, and the recorded monitoring picture is sent to the control device, and the control device determines whether the control instruction is executed correctly according to the content recorded in the monitoring picture, so as to ensure the safety of the control instruction execution process and avoid the control of the controlled device by the illegal instruction.

Referring to fig. 7, a block diagram of a device control apparatus according to still another embodiment of the present application is shown. The device has the function of realizing the equipment control method, and the function can be realized by hardware or by hardware executing corresponding software. The device can be computer equipment, and can also be arranged in the computer equipment. The apparatus 700 may include: an instruction decryption module 710, an instruction operation module 720, a picture generation module 730, a video encryption module 740, and a video transmission module 750.

The instruction decryption module 710 is configured to, in a case that an encrypted control instruction is received from a control device, decrypt the encrypted control instruction to obtain the control instruction.

And an instruction operation module 720, configured to execute a corresponding operation based on the control instruction.

And a screen generating module 730, configured to generate a monitoring screen for recording the operation execution process.

The video encryption module 740 is configured to encrypt the monitoring picture to obtain an encrypted video.

A video sending module 750, configured to send the encrypted video to the control device; the encrypted video is used for instructing the control device to verify the operation executed by the controlled device.

In an exemplary embodiment, the controlled device includes a mouse and a keyboard; the mouse and the keyboard are respectively provided with a second chip, the second chip comprises a decryption algorithm aiming at the encryption algorithm of the first chip, and the first chip is arranged in the control equipment; the instruction decryption module 710 is configured to respond to the identifier of the second chip successfully identifying the identifier of the first chip, and decrypt the encrypted control instruction by using a decryption algorithm in the second chip to obtain the control instruction.

To sum up, in the technical solution provided in this embodiment of the application, in the process of controlling the controlled device through the control device, when the controlled device executes the corresponding operation, the operation execution process is recorded, and the recorded monitoring picture is sent to the control device, and the control device determines whether the control instruction is executed correctly according to the content recorded in the monitoring picture, so as to ensure the safety of the execution of the control instruction and avoid the control of the controlled device by an illegal instruction.

Referring to fig. 8, a block diagram of a computer device according to an embodiment of the present application is shown. The computer device can be used for realizing the functions of the device control method. The computer device may be a control device or a controlled device, which is not limited in this embodiment of the present application. Specifically, the method comprises the following steps:

the computer apparatus 800 includes a Central Processing Unit (CPU) 801, a system Memory 804 including a Random Access Memory (RAM) 802 and a Read Only Memory (ROM) 803, and a system bus 805 connecting the system Memory 804 and the CPU 801. The computer device 800 also includes a basic Input/Output (I/O) system 806 for facilitating information transfer between various devices within the computer, and a mass storage device 807 for storing an operating system 813, application programs 814, and other program modules 815.

The basic input/output system 806 includes a display 808 for displaying information and an input device 809 such as a mouse, keyboard, etc. for user input of information. Wherein a display 808 and an input device 809 are connected to the central processing unit 801 through an input output controller 810 connected to the system bus 805. The basic input/output system 806 may also include an input/output controller 810 for receiving and processing input from a number of other devices, such as a keyboard, mouse, or electronic stylus. Similarly, input-output controller 810 also provides output to a display screen, a printer, or other type of output device.

The mass storage device 807 is connected to the central processing unit 801 through a mass storage controller (not shown) connected to the system bus 805. The mass storage device 807 and its associated computer-readable media provide non-volatile storage for the computer device 800. That is, the mass storage device 807 may include a computer-readable medium (not shown) such as a hard disk or CD-ROM (Compact disk Read-Only Memory) drive.

Without loss of generality, computer readable media may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes RAM, ROM, EPROM (Erasable Programmable Read-Only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory), flash Memory or other solid state Memory technology, CD-ROM, DVD (Digital Video Disc) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices. Of course, those skilled in the art will appreciate that computer storage media is not limited to the foregoing. The system memory 804 and mass storage 807 described above may be collectively referred to as memory.

According to various embodiments of the present application, the computer device 800 may also operate as a remote computer connected to a network via a network, such as the Internet. That is, the computer device 800 may be connected to the network 812 through the network interface unit 811 coupled to the system bus 805, or may be connected to other types of networks or remote computer systems (not shown) using the network interface unit 811.

The memory also includes a computer program stored in the memory and configured to be executed by the one or more processors to implement the above-described apparatus control method.

In an exemplary embodiment, there is also provided a non-transitory computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the above-described apparatus control method.

Optionally, the computer-readable storage medium may include: ROM (Read Only Memory), RAM (Random Access Memory), SSD (Solid State drive), or optical disc. The Random Access Memory may include a ReRAM (resistive Random Access Memory) and a DRAM (Dynamic Random Access Memory).

In an exemplary embodiment, there is also provided a computer program product for implementing the above-described device control method when executed by a processor.

It should be understood that reference to "a plurality" herein means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. In addition, the step numbers described herein only exemplarily show one possible execution sequence among the steps, and in some other embodiments, the steps may also be executed out of the numbering sequence, for example, two steps with different numbers are executed simultaneously, or two steps with different numbers are executed in a reverse order to the order shown in the figure, which is not limited by the embodiment of the present application.

The above description is only exemplary of the present application and should not be taken as limiting the present application, and any modifications, equivalents, improvements and the like that are made within the spirit and principle of the present application should be included in the protection scope of the present application.

16页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种基于移动人机交互设备管理无人驾驶车辆的方法

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!