[go: up one dir, main page]

CN105245596B - A remote control method and server - Google Patents

A remote control method and server Download PDF

Info

Publication number
CN105245596B
CN105245596B CN201510642615.9A CN201510642615A CN105245596B CN 105245596 B CN105245596 B CN 105245596B CN 201510642615 A CN201510642615 A CN 201510642615A CN 105245596 B CN105245596 B CN 105245596B
Authority
CN
China
Prior art keywords
password
server
account
client
access mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510642615.9A
Other languages
Chinese (zh)
Other versions
CN105245596A (en
Inventor
董世绸
张日和
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN ADVANCED RIVER SYSTEM TECHNOLOGY Co Ltd
Original Assignee
SHENZHEN ADVANCED RIVER SYSTEM TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN ADVANCED RIVER SYSTEM TECHNOLOGY Co Ltd filed Critical SHENZHEN ADVANCED RIVER SYSTEM TECHNOLOGY Co Ltd
Priority to CN201510642615.9A priority Critical patent/CN105245596B/en
Publication of CN105245596A publication Critical patent/CN105245596A/en
Priority to PCT/CN2016/080664 priority patent/WO2017054443A1/en
Application granted granted Critical
Publication of CN105245596B publication Critical patent/CN105245596B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of long-range control methods, user logs in the access mode that first server obtains second server by client, client is established P2P with second server with the help of first server using access mode and is connect, and then client logs in second server and sends control signal to terminal by second server, terminal receives control signal and executes operation according to control signal.The invention also discloses a kind of servers, a kind of network attached storage equipment.Through the above way, the present invention may be implemented to be among Intranet or do not have fixed IP even if second server, P2P can also be established with client with the help of first server to connect, user remotely manages and controls terminal realization by second server.

Description

A kind of long-range control method and server
Technical field
The present invention relates to network technology, in particular to a kind of long-range control method, server, system and network storage are set It is standby.
Background technique
Under the background of Internet of Things high speed development, information-based high development, the open quick and network interconnection of communication are generated Data volume increase, improve requirement of the people to the safety of work living environment, comfort and efficiency.Smart home It is the certainty of computer technology, network technology and automatic control technology infiltration traditional home appliance industry development.
In the prior art, various household electrical appliance can be used in family life, user is by IR remote controller or manually Mode controls household electrical appliance, thus user can only carry out the control of household electrical appliance at home, this mode be not easy to user's device with When control the electric appliance of family everywhere.
In current Internet application, the storage of cloud data, data processing and data management etc. are provided in the public network The server of shared resource service is referred to as publicly-owned Cloud Server.And data storage, data processing are provided in local area network And the server of the shared resources service such as data management is referred to as privately owned Cloud Server.It can be with installing terminal interaction journey in private clound Sequence controls the terminal in family, and user carries out the terminal in remote control home by remotely accessing privately owned Cloud Server.But by It is limited in IP resource, privately owned Cloud Server is often positioned among Intranet, even if being located on public network, also without fixed IP Location cannot also realize that user directly accesses private clound, can not achieve direct long-range control of the user to terminal in family.
Summary of the invention
Present invention solves the technical problem that being that cannot directly access private clound and right for user existing in the prior art The problem of terminal is manipulated provides a kind of long-range control method, server, system and network attached storage equipment, for solving It certainly can not achieve user in the prior art and directly access private clound and the problem of to the direct long-range control of terminal.
In order to solve the above technical problem, the present invention provides a technical solution be: a kind of long-range control method is provided, It include: the access side that client obtains corresponding second server using the first account and first password login first server Formula;Client is established P2P with second server with the help of first server using access mode and is connect;Client uses the Two accounts and the second password login second server;Client sends control signal to terminal by second server;Terminal connects It receives control signal and executes operation according to control signal.
Wherein, client logs in first server to include: client with the access mode for obtaining second server uses the One account and first password log in first server;Client is checked using the addressable server list of the first account and is selected When the second server to be accessed only may have access to second server with the access mode for obtaining second server or the first account, Client directly obtains the access mode of second server from first server.
Wherein, each addressable server runs several terminal interaction programs, and periodically reports to first server The mount message of terminal interaction program is further listed in addressable server using the addressable server list of the first account The terminal interaction program listing of installation, in order to which client is checked and is managed.
Wherein, client is identical or different using permission possessed by different account login second servers.
Wherein, password needed for password needed for client logs in first server and login third server is third Password;The step of client login first server includes: that first server reception client is close using the first account and first The logging request of code;First server obtains the access mode and corresponding third account of third server according to the first account; First server is according to access mode and corresponding third account request third server, to obtain the 4th password, the 4th password It is to be obtained to third password using the first non-reversible algorithm;The 4th password and the 5th password are matched, wherein the 5th password is first Server obtains first password using the first non-reversible algorithm;Logging request is responded according to matching result, if the 4th password With the 5th password match, then client logs in first server success, otherwise login failure.
Wherein, password needed for password needed for client logs in first server and login third server is third Password;The step of client login first server includes: that first server reception client is close using the first account and first The logging request of code;First server obtains the access mode and corresponding third account of third server according to the first account; First server is according to access mode and corresponding third account request third server, to obtain the 4th password, the 4th password It is to be obtained to third password using the first non-reversible algorithm;The 6th password and the 7th password are matched, wherein the 6th password is first Server obtains the 4th password with the 8th password combination, and the 8th password is making to third password of saving in advance of first server The password obtained with the second non-reversible algorithm, the 7th password is obtained to the 5th password and the 9th password combination, wherein the 5th Password is that first server obtains first password using the first non-reversible algorithm, and the 9th password is that first server is close to first Code is obtained using the second non-reversible algorithm;Logging request is responded according to matching result, if the 6th password and the 7th password match, Then client logs in first server success, otherwise login failure.
Wherein, second server runs several terminal interaction programs, the corresponding terminal of each terminal interaction program;Visitor It includes: that client accesses second server that family end, which sends control signal to terminal by second server, with to selected end Interactive program is held to issue control signal;Second server receives control signal, sends control signals to selected terminal and hands over Mutual program;Terminal interaction program receives control signal and is sent to corresponding terminal.
Wherein, terminal generates feedback signal also according to the working condition of itself and is sent to corresponding terminal interaction program;Eventually Interactive program is held to receive feedback signal and accordingly more new state, so that client is checked and is manipulated.
Wherein, first server is publicly-owned Cloud Server, and second server is privately owned Cloud Server.
Wherein, first server is publicly-owned Cloud Server, and third server is privately owned Cloud Server.
In order to solve the above technical problem, the present invention provides another technical solution be: a kind of remote control method is provided Method, comprising: first server receives and customer in response end uses the logging request of the first account and first password;First server The access mode of corresponding second server is sent to client;First server helps client to use access mode and the Two servers establish P2P connection so that client using after the second account and the second code entry second server by the Two servers send control signal to terminal, and terminal receives control signal and executes operation according to control signal.
Wherein, password needed for password needed for client logs in first server and login third server is third Password;The step of first server reception and the logging request at customer in response end includes: that first server receives client use The logging request of first account and first password;First server according to the first account obtain third server access mode and Corresponding third account;First server is according to access mode and corresponding third account request third server, to obtain Four passwords, the 4th password are to be obtained to third password using the first non-reversible algorithm;The 4th password and the 5th password are matched, wherein 5th password is that first server obtains first password using the first non-reversible algorithm;It is logged in and is asked according to matching result response It asks, if the 4th password and the 5th password match, client logs in first server success, otherwise login failure.
Wherein, password needed for password needed for client logs in first server and login third server is third Password;The step of first server reception and the logging request at customer in response end includes: that first server receives client use The logging request of first account and first password;First server according to the first account obtain third server access mode and Corresponding third account;First server is according to access mode and corresponding third account request third server, to obtain Four passwords, the 4th password are to be obtained to third password using the first non-reversible algorithm;The 6th password and the 7th password are matched, wherein 6th password is that first server obtains the 4th password with the 8th password combination, and the 8th password is that first server saves in advance The password that third password is obtained using the second non-reversible algorithm, the 7th password be to the 5th password and the 9th password combination and It obtains, wherein the 5th password is that first server obtains first password using the first non-reversible algorithm, the 9th password is first Server obtains first password using the second non-reversible algorithm;Logging request is responded according to matching result, if the 6th password With the 7th password match, then client logs in first server success, otherwise login failure.
In order to solve the above technical problem, the present invention provides another technical solution be: a kind of server is provided, wrap Include: login response module uses the logging request of the first account and first password for receiving simultaneously customer in response end;Send mould Block, for the access mode of corresponding second server to be sent to client;Link block is established, being used to help client makes It establishes P2P with second server with access mode to connect, so that client uses the second account and the second code entry second Control signal is sent to terminal by second server after server, terminal receives control signal and executes behaviour according to control signal Make.
Wherein, password needed for password needed for client logs in first server and login third server is third Password;Login response module includes: receiving unit, is asked for receiving client using the login of the first account and first password It asks;Unit is addressed, for obtaining the access mode and third account of third server according to the first account;Acquiring unit is used for According to access mode and corresponding third account request third server, to obtain the 4th password, the 4th password is close to third Code is obtained using the first non-reversible algorithm;Matching unit, for matching the 4th password and the 5th password, wherein the 5th password is pair First password is obtained using the first non-reversible algorithm;Response unit, for responding logging request according to matching result, if the 4th Password and the 5th password match, then the first account logins successfully, otherwise login failure.
Wherein, password needed for password needed for client logs in first server and login third server is third Password;Login response module includes: receiving unit, is asked for receiving client using the login of the first account and first password It asks;Unit is addressed, for obtaining the access mode and corresponding third account of third server according to the first account;It obtains single Member, for according to access mode and corresponding third account request third server, to obtain the 4th password, the 4th password to be pair Third password is obtained using the first non-reversible algorithm;Matching unit, for matching the 6th password and the 7th password, wherein the 6th is close Code is obtained to the 4th password and the 8th password combination, and the 8th password is that using third password for pre- preservation is second irreversible The password that algorithm obtains, the 7th password is obtained to the 5th password and the 9th password combination, wherein the 5th password is to first Password is obtained using the first non-reversible algorithm, and the 9th password is to be obtained to first password using the second non-reversible algorithm;Response is single Member, for according to matching result respond logging request, if the 6th password and the 7th password match, the first account log at Function, otherwise login failure.
In order to solve the above technical problem, the present invention provides another technical solution be: a kind of server is provided, wrap Include: processor, memory and network communications circuits, memory and network communications circuits are separately connected processor;Processor is used for Operation service program is asked with receiving simultaneously customer in response end by network communications circuits using the login of the first account and first password It asks, the access mode of corresponding second server is sent to client by network communications circuits, passes through network communications circuits It helps client to establish P2P with second server using access mode to connect, so that client uses the second account and second Control signal is sent to terminal by second server after code entry second server, terminal receives control signal and according to control Signal processed executes operation.
Wherein processor is also used to operation service program, with check with management client application program, second server and The control of second server installation.
In order to solve the above technical problem, the present invention provides another technical solution be: a kind of network attached deposit is provided Store up equipment, comprising: processor, hard disk and routing circuit, hard disk and routing circuit are separately connected processor;Processor is for running First service program is connect with establishing P2P with client by routing circuit with the help of first server, is received and is responded The logging request of use the second account and the second password that client is sent by routing circuit, processor are also used to run second Then service routine will control signal hair by routing circuit to receive the control signal that client is sent by routing circuit Give terminal.
Wherein, processor is for running several terminal interaction programs, the corresponding terminal of each terminal interaction program;Place Reason device is also used to run second service program, to receive the terminal interaction journey for manipulating selection that client is sent by routing circuit The control signal of sequence sends control signals to selected terminal interaction program;Processor is used to run terminal interaction program, To receive control signal and be sent to corresponding terminal by routing circuit.
Wherein, processor is also used to run terminal interaction program, is sent by routing circuit with to receive corresponding terminal Feedback signal, and more new state based on the feedback signal, so that client is checked and is manipulated;Wherein feedback signal is terminal according to certainly What the working condition of body generated.
The beneficial effects of the present invention are: the access side of first server management the first account and corresponding second server Formula, so that client logs in the access mode of available second server after first server using the first account, and the P2P is established with second server with the help of one server to connect, and allows user to pass through second server remotely to control Terminal.Even if second server is among Intranet or does not have fixed IP, can also with the help of first server with Client connection, and using client access second server to realize remote control terminal.
Detailed description of the invention
Fig. 1 is the flow chart of the first embodiment of long-range control method of the present invention;
Fig. 2 is the schematic diagram of the second embodiment of long-range control method of the present invention;
Fig. 3 is the flow chart of the fourth embodiment of long-range control method of the present invention;
Fig. 4 is the flow chart of the 5th embodiment of long-range control method of the present invention;
Fig. 5 is the flow chart of the sixth embodiment of long-range control method of the present invention;
Fig. 6 is the schematic diagram of the sixth embodiment of long-range control method of the present invention;
Fig. 7 is the flow chart of the 7th embodiment of long-range control method of the present invention;
Fig. 8 is the flow chart of the 8th embodiment of long-range control method of the present invention;
Fig. 9 is the flow chart of the 9th embodiment of long-range control method of the present invention;
Figure 10 is the schematic diagram of the first embodiment of server of the present invention;
Figure 11 is the schematic diagram of the second embodiment of server of the present invention;
Figure 12 is the schematic diagram of the 3rd embodiment of server of the present invention;
Figure 13 is the schematic diagram of the fourth embodiment of server of the present invention;
Figure 14 is the schematic diagram of the first embodiment of inventive network attached storage device.
Specific embodiment
As shown in Figure 1, the first embodiment of long-range control method of the present invention includes:
S110: client logs in first server using the first account and first password to obtain corresponding second server Access mode;
User inputs the first account on client (such as browser or application program) and first password logs in the first clothes It is engaged in device, operation is for recording the data of account and the information using the addressable another server of the account in first server The first account is searched in library in the database, and obtains the address and port of corresponding second server, obtains corresponding second clothes The access mode of business device.
S120: client is established P2P with second server with the help of first server using access mode and is connect;
If second server is located on public network, the access mode of second server can be used to connect second service for client Device.If client and second server are located among two different Intranets, client uses the second service obtained The address and port of device send the first connection request to second server, due to logical not with second server before client Believed, the first connection of network address translation (Network Address Translation, NAT) refusal of second server side Request.Although request is refused, the NAT of client-side is had recorded in the address and port information and this Intranet of second server Client once initiated the connection this information to second server.The client that second server is issued according to first server The second connection request is initiated to client in address and port, since the NAT of client-side retains the record of second server, the Two servers are considered as the external host once crossed with client communication, and the second connection request is allowed through.Client end response is asked It asks and establishes P2P with second server and connect.
S130: client uses the second account and the second password login second server;
Client and second server are established after P2P connect, and user is defeated at client (such as browser or application program) Enter the second account and the second password login second server, log in the second password of second server and logs in first server First password can be the same or different.
S140: client sends control signal to terminal by second server;
User checks the terminal list that second server is listed, chooses certain after client successfully logs in second server A terminal makes control action, and client sends control signal to second server, control in signal comprising the terminal chosen and Control action.Second server receives the control signal that client is sent, and then sends control signals to selected terminal. The equipment that terminal refers to for manipulation further includes that other are controllable other than the household electrical appliances such as air-conditioning, water heater, humidifier, TV Home equipment, such as lamps and lanterns, door lock, curtain etc..
S150: terminal receives control signal and executes operation according to control signal.
The terminal chosen receives the control signal that second server is sent, and is executed according to the control action in control signal Corresponding operating.For example, user's client to be logged in, and by second server to the behaviour of terminal progress " opening " or " closing " Make: firstly, control signal of the user in client input " opening " or " closing ", and then client is by " opening " or " closing " Control signal is sent to second server, and " opening " or the control signal of " closing " are sent to accordingly by the second last server again Terminal, terminal according to control signal execute " opening " or " closing " operation.
From above embodiments it is found that user inputs account and password login first server, first service on the client Device operation data library obtains the access mode of corresponding second server, and access mode is sent to client by first server, Client is established P2P with second server with the help of first server and is connect, and client inputs account number cipher and logs in second Server.Client can be communicated directly with second server as a result, realize remotely controling and operating to terminal.
The second embodiment of long-range control method of the present invention is on the basis of first embodiment, and client logs in the first clothes Business device includes: that client uses the first account and password login first server with the access mode for obtaining second server;Visitor Family end is checked using the addressable server list of the first account and selects the second server to be accessed to obtain second service The access mode of device;Or first account only may have access to second server when, client directly from first server obtain second clothes The access mode of business device.
After client logs in first server, in the user interface of client, can view can using the first account Server list with the server list of access, i.e., with the binding of the first account.After viewing accessible server list, The server to be accessed is selected, selected server is second server, and obtains the access mode of second server.If Using only one accessible second server of the first account, client directly obtains second server from first server Access mode, no longer selected.
Each addressable server runs several terminal interaction programs, and periodically hands over to first server reporting terminal The mount message of mutual program lists the end of each addressable server installation using the addressable server list of the first account Interactive program list is held, as shown in Fig. 2, in order to which client is checked and is managed.
The terminal interaction program that first server is managed collectively addressable server and installs thereon, addressable service Device is periodically to the mount message of first server reporting terminal interactive program, therefore addressable server list can be arranged further The terminal interaction program listing of addressable server installation out, for client selection.
The 3rd embodiment of long-range control method of the present invention is on the basis of first embodiment, and client uses different Account logs in that permission possessed by second server is identical or different, if any account can manage and to be installed on second server All terminal interaction programs, and some accounts can only manage a portion terminal interaction program installed on second server. Such as all terminal interaction programs can be managed using parent's account, the account of child is unable to the terminal interaction of Management Television machine Program, guest's account cannot manage terminal interaction program of door lock etc..
As shown in figure 3, client logs in the close of first server in the fourth embodiment of long-range control method of the present invention The step of code and the password for logging in third server are third password, and client logs in first server include:
S111: first server receives the logging request that client uses the first account and first password;
User inputs the first account and first password on the client (such as browser or application program) to attempt to log on First server, first server operation service program further can be with operation data library.
S112: first server obtains the access mode and corresponding third account of third server according to the first account;
Client logs in first server and third server uses same password.Remember in the database of first server It has recorded the first account, is corresponding with the first account using another server of same password and the information of corresponding another account, To be verified for obtaining password.First server searches the first account in the database, and obtains the account corresponding Address, port information and the corresponding third account of three servers.
S113: first server is according to access mode and corresponding third account request third server, to obtain the 4th Password, the 4th password are to be obtained to third password using the first non-reversible algorithm;
First server establishes connection according to the address port information of corresponding third server and third server, to the Three servers send obtain the 4th password request, the 4th password be third password is obtained using the first non-reversible algorithm it is close Code.In general, the first non-reversible algorithm refer to Hash (Hash) algorithm or add salt hash algorithm, can be used MD5, SHA1, SHA2, SHA256, SHA512, PBKDF2 any of them are as hash algorithm.User is when completing the setting of the first account The user password of confirmation is third password, and the password that login first server and third server use is third password.
S114: matching the 4th password and the 5th password, wherein the 5th password, which is first server, uses the to first password One non-reversible algorithm obtains;
First server obtains the 5th password using the first non-reversible algorithm to the first password that user inputs, and to the 4th Password and the 5th password are matched, and judge that the 4th password and whether identical or both the relationship of the 5th password meet predetermined article Part.
S115: responding logging request according to matching result, if the 4th password and the 5th password match, client is logged in First server is successful, otherwise login failure;
If the 4th password and the success of the 5th password match, judgement first password is identical with third password or both pass System meets predetermined condition, i.e. the password of user's input is identical as user password or both relationship meets predetermined condition, first service Device refuses the logging request of client by the logging request of client, otherwise first server, and returns to miscue.
Client logs in third server and first server uses same password, saves on third server complete Password does not save password in first server.First server is obtained to the request of third server when user logs in first server Complete password is obtained, and the password of user's input is verified accordingly.Accordingly even when first server is broken, can not also obtain User password is used to access third server, ensure that the safety of third server data.
As shown in figure 4, client logs in the close of first server in the 5th embodiment of long-range control method of the present invention The step of code and the password for logging in third server are third password, and client logs in first server include:
S121: first server receives the logging request that client uses the first account and first password;
User inputs the first account and first password on the client (such as browser or application program) to attempt to log on First server, first server operation service program further can be with operation data library.
S122: first server obtains the access mode and corresponding third account of third server according to the first account;
Client logs in first server and third server uses same password.Remember in the database of first server It has recorded the first account, is corresponding with the first account using another server of same password and the information of corresponding another account, To be verified for obtaining password.First server searches the first account in the database, and obtains the account corresponding Address, port information and the corresponding third account of three servers.
S123: first server is according to access mode and corresponding third account request third server, to obtain the 4th Password, the 4th password are to be obtained to third password using the first non-reversible algorithm;
First server establishes connection according to the address port information of corresponding third server and third server, to the Three servers send obtain the 4th password request, the 4th password be third password is obtained using the first non-reversible algorithm it is close Code.In general, the first non-reversible algorithm refer to Hash (Hash) algorithm or add salt hash algorithm, can be used MD5, SHA1, SHA2, SHA256, SHA512, PBKDF2 any of them are as hash algorithm.User is when completing the setting of the first account The user password of confirmation is third password, and the password that login first server and third server use is third password.The Three servers can save third password, use the first non-reversible algorithm to third password after receiving the request of first server First server is sent to after obtaining the 4th password;The 4th password can also be obtained using the first non-reversible algorithm to third password And the 4th password is saved, the 4th password is directly transmitted after receiving the request of first server.It cannot be reversed according to the 4th password Reckoning obtains third password, prevents the leakage for being trapped and causing user password in data transmission procedure.
S124: the 6th password of matching and the 7th password, wherein the 6th password is first server to the 4th password and the 8th Password combination and obtain, the 8th password is being obtained to third password using the second non-reversible algorithm of saving in advance of first server Password, the 7th password is obtained to the 5th password and the 9th password combination, wherein the 5th password is first server to first Password is obtained using the first non-reversible algorithm, and the 9th password is that first server obtains first password using the second non-reversible algorithm It arrives;
Preserve the 8th password in first server in advance, first server is just after each user confirms modification user password The 8th password is obtained using the second non-reversible algorithm to the third password after modification and is saved;First server is to the 4th password The 6th password is obtained with the 8th password combination.Hash calculation is reused after referring to extraction section digit using the second non-reversible algorithm Method adds salt hash algorithm to be handled.Combination, which can be, is stitched together the 4th password and the 8th password, is also possible to Refer to by the 4th password and the 8th password splicing after using hash algorithm or add salt hash algorithm handle.First server The 5th password also is obtained using the first non-reversible algorithm to the first password of user's input, it is irreversible using second to first password Algorithm obtains the 9th password, then obtains the 7th password to the 5th password and the 9th password combination;Then first server is to the 6th Password and the 7th password are matched, and judge that the 6th password and whether identical or both the relationship of the 7th password meet predetermined article Part.
S125: responding logging request according to matching result, if the 6th password and the 7th password match, client is logged in First server is successful, otherwise login failure;
If the 6th password and the success of the 7th password match, judgement first password is identical with third password or both pass System meets predetermined condition, that is, the password inputted is identical as user password or both relationship meets predetermined condition, and first server is logical The logging request of client is crossed, the logging request of first server refusal client is otherwise returned, and returns to miscue.Such as One account is equipped with a main password and at least one sub- password, and there are corresponding relationships, such as son between sub- password and main password Password is a part of main password, and the first password of user's input can also be logged in successfully when being any one sub- password, at this time The relationship of the relationship of 6th password and the 7th password, first password and third password meets scheduled condition.
From above embodiments it is found that needed for password needed for client login first server and login third server Password is third password, and complete password is saved on third server, only saves in first server and passes through non-reversible algorithm The password of processing, and complete password cannot be obtained according to the password saved in first server.User logs in first service First server obtains complete password to the request of third server when device, and verifies accordingly to the password of user's input.This Even if sample first server is broken, it can not also obtain user password and be used to access third server, ensure that third server The safety of data.
As shown in Figure 5 and Figure 6, in the sixth embodiment of long-range control method of the present invention, second server operation is several A terminal interaction program, the corresponding terminal of each terminal interaction program;Client is sent to terminal by second server and is controlled Signal processed includes:
S210: client accesses second server, to issue control signal to selected terminal interaction program;
Client checks the terminal interaction program listing on second server, and the corresponding terminal of the terminal to be manipulated is selected to hand over Mutual program simultaneously makes control action, and client sends control signal to selected terminal interaction program.
S220: second server receives control signal, sends control signals to selected terminal interaction program;
Second server receives the control signal that client is sent, then by the control of the selected terminal interaction program of manipulation Signal processed is sent to selected terminal interaction program.
S230: terminal interaction program receives control signal and is sent to corresponding terminal;
Selected terminal interaction program receives control signal and simultaneously sends control signals to corresponding terminal, terminal according to It controls signal and executes corresponding operating.
S240: terminal generates feedback signal according to the working condition of itself and is sent to corresponding terminal interaction program;
After terminal executes corresponding operating according to control signal, working condition may change, and terminal is according to certainly at this time The working condition of body generates feedback signal, and is sent to corresponding terminal interaction program.
S250: terminal interaction program receives feedback signal and accordingly more new state, so that client is checked and is manipulated;
Terminal interaction program receives the feedback signal that corresponding terminal is sent, and more new state based on the feedback signal, so that Terminal interaction program can reflect the working condition of counterpart terminal in real time, so that client is checked and is manipulated.
As seen from the above embodiment, client is established P2P with second server with the help of first server and is connect, visitor Family end can directly log in second server, check simultaneously controlling terminal, realization pair by the terminal interaction program in second server Terminal is remotely directly controlled and is operated.
In one embodiment of long-range control method of the present invention, first server is publicly-owned Cloud Server, second service Device is privately owned Cloud Server, and second server is the server that user selects access.Public cloud is mainly used for managing user's letter Breath, private clound facility information and entry maps relationship of corresponding user's private clound etc., private clound is mainly used for saving user Private information and privately owned file etc..The present embodiment can be in conjunction with the embodiment of one server of any of the above.
In one embodiment of long-range control method of the present invention, first server is publicly-owned Cloud Server, third service Device is privately owned Cloud Server, and third server can be the same or different with second server.Public cloud is mainly used for managing User information, private clound facility information and entry maps relationship of corresponding user's private clound etc., private clound is mainly used for protecting Deposit the private information and privately owned file etc. of user.The present embodiment can be combined with above-described embodiment four or embodiment five.
As shown in fig. 7, the 7th embodiment of long-range control method of the present invention includes:
S310: first server receives and customer in response end uses the logging request of the first account and first password;
User inputs the first account on the client and first password logs in first server, runs and uses in first server In the database of record account and the information using the addressable another server of the account, the first account is searched in the database Number, and obtain the address and port of corresponding second server, that is, obtain the access mode of corresponding second server.
S320: the access mode of corresponding second server is sent to client by first server;
The access mode for the second server that first server will acquire, the i.e. address and port of second server are sent to Client connect so that client establishes P2P using access mode and second server and logs in second server.
S330: first server help client is established P2P with second server using access mode and is connect, so that Client sends control signal to terminal by second server using after the second account and the second code entry second server, Terminal receives control signal and executes operation according to control signal;
First server, which helps client to establish the process that P2P is connect with second server, can refer to long-range control of the invention The description of S120 step in method first embodiment, the wherein main effect of first server is by the address and port of client It issues second server and second server is notified to initiate the connection request.Client and second server are established after P2P connect, The second account and the second code entry second server can be used in client, then sends control letter to terminal by second server Number, terminal receives control signal and executes operation according to control signal.
From above embodiments it is found that first server receives and customer in response end stepping on using the first account and first password Record request, first server operation data library obtains the access mode of corresponding second server and access mode is sent to visitor Family end, first server also help client to establish P2P with second server to connect, allow client directly with the second clothes Business device is communicated, and realizes remotely controling and operating to terminal.
As shown in figure 8, the 8th embodiment of long-range control method of the present invention is further limited on the basis of seven embodiments Password needed for determining password needed for client logs in first server and logging in third server is third password;
First server receive and customer in response end logging request the step of include:
S311: first server receives the logging request that client uses the first account and first password;
User inputs the first account and first password on the client (such as browser or application program) to attempt to log on First server, first server operation service program further can be with operation data library.
S312: first server obtains the access mode and corresponding third account of third server according to the first account;
Client logs in first server and third server uses same password.Remember in the database of first server It has recorded the first account, is corresponding with the first account using another server of same password and the information of corresponding another account, To be verified for obtaining password.First server searches the first account in the database, and obtains the account corresponding Address, port information and the corresponding third account of three servers.
S313: first server is according to access mode and corresponding third account request third server, to obtain the 4th Password, the 4th password are to be obtained to third password using the first non-reversible algorithm;
First server establishes connection according to the address port information of corresponding third server and third server, to the Three servers send obtain the 4th password request, the 4th password be third password is obtained using the first non-reversible algorithm it is close Code.In general, the first non-reversible algorithm refer to Hash (Hash) algorithm or add salt hash algorithm, can be used MD5, SHA1, SHA2, SHA256, SHA512, PBKDF2 any of them are as hash algorithm.User is when completing the setting of the first account The user password of confirmation is third password, and the password that login first server and third server use is third password.
S314: matching the 4th password and the 5th password, wherein the 5th password, which is first server, uses the to first password One non-reversible algorithm obtains;
First server obtains the 5th password using the first non-reversible algorithm to the first password that user inputs, and to the 4th Password and the 5th password are matched, and judge that the 4th password and whether identical or both the relationship of the 5th password meet predetermined article Part.
S315: responding logging request according to matching result, if the 4th password and the 5th password match, client is logged in First server is successful, otherwise login failure;
If the 4th password and the success of the 5th password match, judgement first password is identical with third password or both pass System meets predetermined condition, i.e. the password of user's input is identical as user password or both relationship meets predetermined condition, first service Device refuses the logging request of client by the logging request of client, otherwise first server, and returns to miscue.
Client logs in third server and first server uses same password, saves on third server complete Password does not save password in first server.First server is obtained to the request of third server when user logs in first server Complete password is obtained, and the password of user's input is verified accordingly.Accordingly even when first server is broken, can not also obtain User password is used to access third server, ensure that the safety of third server data.
As shown in figure 9, client logs in needed for first server in the 9th embodiment of long-range control method of the present invention Password and log in third server needed for password be third password;
First server receive and customer in response end logging request the step of include:
S321: first server receives the logging request that client uses the first account and first password;
User inputs the first account and first password on the client (such as browser or application program) to attempt to log on First server, first server operation service program further can be with operation data library.
S322: first server obtains the access mode and corresponding third account of third server according to the first account;
Client logs in first server and third server uses same password.Remember in the database of first server It has recorded the first account, is corresponding with the first account using another server of same password and the information of corresponding another account, To be verified for obtaining password.First server searches the first account in the database, and obtains the account corresponding Address, port information and the corresponding third account of three servers.
S323: first server is according to access mode and corresponding third account request third server, to obtain the 4th Password, the 4th password are to be obtained to third password using the first non-reversible algorithm;
First server establishes connection according to the address port information of corresponding third server and third server, to the Three servers send obtain the 4th password request, the 4th password be third password is obtained using the first non-reversible algorithm it is close Code.In general, the first non-reversible algorithm refer to Hash (Hash) algorithm or add salt hash algorithm, can be used MD5, SHA1, SHA2, SHA256, SHA512, PBKDF2 any of them are as hash algorithm.User is when completing the setting of the first account The user password of confirmation is third password, and the password that login first server and third server use is third password.The Three servers can save third password, use the first non-reversible algorithm to third password after receiving the request of first server First server is sent to after obtaining the 4th password;The 4th password can also be obtained using the first non-reversible algorithm to third password And the 4th password is saved, the 4th password is directly transmitted after receiving the request of first server.It cannot be reversed according to the 4th password Reckoning obtains third password, prevents the leakage for being trapped and causing user password in data transmission procedure.
S324: the 6th password of matching and the 7th password, wherein the 6th password is first server to the 4th password and the 8th Password combination and obtain, the 8th password is being obtained to third password using the second non-reversible algorithm of saving in advance of first server Password, the 7th password is obtained to the 5th password and the 9th password combination, wherein the 5th password is first server to first Password is obtained using the first non-reversible algorithm, and the 9th password is that first server obtains first password using the second non-reversible algorithm It arrives;
Preserve the 8th password in first server in advance, first server is just after each user confirms modification user password The 8th password is obtained using the second non-reversible algorithm to the third password after modification and is saved;First server is to the 4th password The 6th password is obtained with the 8th password combination.Hash calculation is reused after referring to extraction section digit using the second non-reversible algorithm Method adds salt hash algorithm to be handled.Combination, which can be, is stitched together the 4th password and the 8th password, is also possible to Refer to by the 4th password and the 8th password splicing after using hash algorithm or add salt hash algorithm handle.First server The 5th password also is obtained using the first non-reversible algorithm to the first password of user's input, it is irreversible using second to first password Algorithm obtains the 9th password, then obtains the 7th password to the 5th password and the 9th password combination;Then first server is to the 6th Password and the 7th password are matched, and judge that the 6th password and whether identical or both the relationship of the 7th password meet predetermined article Part.
S325: responding logging request according to matching result, if the 6th password and the 7th password match, client is logged in First server is successful, otherwise login failure;
If the 6th password and the success of the 7th password match, judgement first password is identical with third password or both pass System meets predetermined condition, that is, the password inputted is identical as user password or both relationship meets predetermined condition, and first server is logical The logging request of client is crossed, the logging request of first server refusal client is otherwise returned, and returns to miscue.Such as One account is equipped with a main password and at least one sub- password, and there are corresponding relationships, such as son between sub- password and main password Password is a part of main password, and the first password of user's input can also be logged in successfully when being any one sub- password, at this time The relationship of the relationship of 6th password and the 7th password, first password and third password meets scheduled condition.
From above embodiments it is found that needed for password needed for client login first server and login third server Password is third password, and complete password is saved on third server, only saves in first server and passes through non-reversible algorithm The password of processing, and complete password cannot be obtained according to the password saved in first server.User logs in first service First server obtains complete password to the request of third server when device, and verifies accordingly to the password of user's input.This Even if sample first server is broken, it can not also obtain user password and be used to access third server, ensure that third server The safety of data.
As shown in Figure 10, the first embodiment of server of the present invention includes:
Login response module 11 uses the logging request of the first account and first password for receiving simultaneously customer in response end;
Sending module 12, for the access mode of corresponding second server to be sent to client;
Link block 13 is established, is used to help client and establishes P2P with second server using access mode to connect, with So that client sends control to terminal by second server using after the second account and the second code entry second server Signal, terminal receive control signal and execute operation according to control signal.
From above embodiments it is found that first server receives and customer in response end stepping on using the first account and first password Record request, first server operation data library obtains the access mode of corresponding second server and access mode is sent to visitor Family end, first server also help client to establish P2P with second server to connect, allow client directly with second Server is communicated, and realizes remotely controling and operating to terminal.
As shown in figure 11, the second embodiment of server of the present invention is on the basis of the first embodiment of server of the present invention Improvement, wherein client log in first server needed for password and log in third server needed for password be that third is close Code;Login response module 11 includes:
Receiving unit 111 uses the logging request of the first account and first password for receiving client;It is transported on server Row service routine receives the logging request of user.
Unit 112 is addressed, for obtaining the access mode and corresponding third account of third server according to the first account; Further operation data library on server, for recording the corresponding another clothes using same password of the first account, the first account The information for device and the third account of being engaged in, to be verified for obtaining password.The first account is searched in the database, and obtains correspondence Third server address and port and third account, refuse logging request if it can not find corresponding account information and return Return miscue.
Acquiring unit 113 is used for according to access mode and corresponding third account request third server, to obtain the 4th Password, the 4th password are to be obtained to third password using the first non-reversible algorithm.In general, the first non-reversible algorithm refers to Kazakhstan Uncommon (Hash) algorithm adds salt hash algorithm, and it is wherein any that MD5, SHA1, SHA2, SHA256, SHA512, PBKDF2 can be used It is a kind of to be used as hash algorithm.User is third password in the user password for completing to confirm when the setting of the first account, logs in first Password needed for password needed for server and login third server is third password.Reverse push is unable to according to the 4th password Calculation obtains third password, prevents the leakage for being trapped and causing user password in data transmission procedure.
Matching unit 114, for matching the 4th password and the 5th password, wherein the 5th password is to use the to first password One non-reversible algorithm obtains;It is close that the 5th is calculated from the acquisition first password of receiving unit 111 and using the first non-reversible algorithm Code obtains the 4th password from acquiring unit 113, and the two is compared.
Response unit 115, for responding logging request according to matching result, if the 4th password and the 5th password match, Then client logins successfully, otherwise login failure;If the 4th password and the 5th password are identical or both relationship meets pre- Fixed condition determines that identical with third password or both the relationship of first password meets predetermined condition, and server passes through client Logging request, otherwise refuse the logging request of client, and return to miscue.Such as an account is equipped with a main password With at least one sub- password, there are corresponding relationships between sub- password and main password, for example sub- password is a part of main password, is used The first password of family input can also be logged in successfully when being any one sub- password, at this time the pass of the 4th password and the 5th password The relationship of system, first password and third password meets scheduled condition.
As shown in figure 12, in the 3rd embodiment of server of the present invention, wherein client is logged in needed for first server Password and log in third server needed for password be third password;Login response module 11 includes:
Receiving unit 211 uses the logging request of the first account and first password for receiving client;It is transported on server Row service routine receives the logging request of user, stores user information in database.
Unit 212 is addressed, for obtaining the access mode and corresponding third account of third server according to the first account; Further operation data library on server, for recording the first account, the corresponding another server of the first account and third account Information, to be verified for obtaining password.The first account is searched in the database, and obtains corresponding third server Address and port and third account refuse logging request if it can not find corresponding account information and return to miscue.
Acquiring unit 213 is used for according to access mode and corresponding third account request third server, to obtain the 4th Password, the 4th password are to be obtained to third password using the first non-reversible algorithm;User is true when completing the setting of the first account The user password recognized is third password, and password needed for password needed for logging in first server and login third server is Third password.It cannot reversely be calculated according to the 4th password and obtain third password, prevent from being trapped and causing in data transmission procedure The leakage of user password.
Matching unit 214, for matching the 6th password and the 7th password, wherein the 6th password is to from acquiring unit 213 The 4th password and the 8th password combination that obtain and obtain, the 8th password be the third password saved in advance is used it is second irreversible The password that algorithm obtains;7th password is obtained to the 5th password and the 9th password combination, wherein the 5th password is to from connecing It receives the first password that unit 211 obtains to obtain using the first non-reversible algorithm, the 9th password is obtained to from receiving unit 211 First password is obtained using the second non-reversible algorithm;Second non-reversible algorithm is different from the first non-reversible algorithm, even if second not Reversible algorithm is cracked, and obtained result is also different from third password, and cannot extrapolate complete according to result is cracked Three passwords.
Response unit 215, for responding logging request according to matching result, if the 6th password and the 7th password match, Then client logins successfully, otherwise login failure;If the 6th password and the 7th password are identical or both relationship meets pre- Fixed condition determines that identical with third password or both the relationship of first password meets predetermined condition, and server passes through client Logging request, otherwise refuse the logging request of client, and return to miscue.Such as an account is equipped with a main password With at least one sub- password, there are corresponding relationships between sub- password and main password, for example sub- password is a part of main password, is used The first password of family input can also be logged in successfully when being any one sub- password, at this time the pass of the 6th password and the 7th password The relationship of system, first password and third password meets scheduled condition.
From above embodiments it is found that needed for password needed for client login first server and login third server Password is third password, and client uses the login first server of the first account and first password, first server according to First account obtains the access mode and corresponding third account of third server, and then according to access mode and corresponding third Account request third server carries out password authentification to obtain the 4th password, and the verifying correct client of password logins successfully, otherwise Client login failure.
As shown in figure 13, the fourth embodiment of server of the present invention includes:
Processor, memory and network communications circuits, memory and network communications circuits are separately connected processor;
Processor uses first for running first service program, to receive simultaneously customer in response end by network communications circuits The logging request of account and first password, runs and inquires database, searches the first account in the database, and obtains corresponding The access mode (i.e. address and port) of corresponding second server is passed through network communication by the address and port of second server Circuit is sent to client, helps client to establish P2P using access mode and second server by network communications circuits and connects It connects, so that client is sent by second server to terminal using after the second account and the second code entry second server Signal is controlled, and then terminal receives control signal and executes operation according to control signal.
5th embodiment of server of the present invention is on the basis of fourth embodiment, and processor is further used for operation Two service routines are installed on second server and second server with issuing and safeguarding client application, check and manage Terminal interaction program.Second service program is responsible for issuing new client application and carries out daily maintenance and pipe to it Reason.Second service program is also responsible for that the terminal interaction program installed on second server and second server is checked and managed Reason, including when terminal manufacturer update terminal interaction program, push and update to second server, the terminal interaction newly issued is provided Program is for second server downloading.
The server that any embodiment of server of the present invention provides is usually publicly-owned Cloud Server, and second server is private There is Cloud Server.Publicly-owned Cloud Server is for checking and management client application program, privately owned Cloud Server and privately owned cloud service The terminal interaction program installed on device, and help privately owned Cloud Server to establish P2P with client and connect, so that client logs in private There is Cloud Server and the long-range control and management to terminal are realized by privately owned Cloud Server.
As shown in figure 14, the first embodiment of inventive network attached storage device includes:
Processor, hard disk and routing circuit, hard disk and routing circuit are separately connected processor;The wan interface of routing circuit It is connected through the internet to server, LAN interface is separately connected Intranet equipment, and routing circuit is for completing data packet in processor Transmission between corresponding interface.Processor is for exchanging routing iinformation, searching routing table and forwarding data packet, cooperation routing electricity Realize the routing functions such as the interconnection of local area network and wide area network, the processing of data and distribution, flow control in road.
Processor is also used to run first service program, to pass through routing circuit and client with the help of first server P2P connection is established at end, receives the login of use the second account and the second password that simultaneously customer in response end is sent by routing circuit Request, processor are also used to run second service program, to receive the control signal that client is sent by routing circuit, then Terminal is sent control signals to by routing circuit.
The second embodiment of inventive network attached storage device is implemented in inventive network attached storage device first On the basis of example, processor is also used to run several terminal interaction programs, the corresponding terminal of each terminal interaction program;Place Reason device is also used to run second service program, to receive the terminal interaction journey that client is chosen by the manipulation that routing circuit is sent The control signal of sequence sends control signals to selected terminal interaction program;Processor is used to run terminal interaction program, To receive control signal and be sent to corresponding terminal by routing circuit, receive what corresponding terminal was sent by routing circuit Feedback signal, and more new state based on the feedback signal, so that client is checked and is manipulated, wherein feedback signal is terminal according to certainly What the working condition of body generated.
Each terminal interaction program corresponds to a terminal, and user logs in second server operation control terminal by client and hands over Mutual program and realize the operation and control to corresponding terminal.Client first sends control signals to the terminal interaction journey chosen Sequence, the terminal interaction program then chosen send control signals to corresponding terminal, and corresponding terminal makes phase according to control signal It should operate.
Client is established the purpose that P2P is connect with second server and is, realization directly controls terminal, therefore terminal Interactive program needs to show the current working status of counterpart terminal.Terminal will indicate that itself after itself working condition changes The feedback signal of working condition issues corresponding terminal interaction program on second server, so that client is checked and is manipulated.This One operation can be to be carried out after terminal receives the control signal sent of terminal interaction program and carries out corresponding operating, can also be Other operations (such as reservation switch, manipulation of other user's short distances etc.) for changing terminal operating status carry out after occurring.
Network attached storage equipment is generally as privately owned Cloud Server, help of the privately owned Cloud Server in publicly-owned Cloud Server P2P is established with client down to connect, and client is allowed to log in privately owned Cloud Server and by the realization pair of privately owned Cloud Server The long-range control and management of terminal.
Mode the above is only the implementation of the present invention is not intended to limit the scope of the invention, all to utilize this Equivalent structure or equivalent flow shift made by description of the invention and accompanying drawing content, it is relevant to be applied directly or indirectly in other Technical field is included within the scope of the present invention.

Claims (12)

1. a kind of long-range control method characterized by comprising
Client logs in first server using the first account and first password to obtain the access mode of second server;
The client establishes P2P with the second server with the help of first server using the access mode Connection;
The client uses second server described in the second account and the second password login;
The client sends control signal to terminal by the second server;
The terminal receives the control signal and executes operation according to the control signal;
Password needed for wherein the client logs in the first server and log in third server needed for password be Third password;
The client logs in the step of first server and includes:
The first server receives the logging request that the client uses first account and the first password;It is described First server obtains the access mode and corresponding third account of the third server according to first account;Described One server third server according to the access mode and corresponding third account request, to obtain the 4th password, institute Stating the 4th password is to be obtained to the third password using the first non-reversible algorithm;The 4th password and the 5th password are matched, Wherein the 5th password is that the first server obtains the first password using first non-reversible algorithm;According to Matching result responds the logging request, if the 4th password and the 5th password match, the client is logged in The first server is successful, otherwise login failure;Or
The first server receives the logging request that the client uses first account and the first password;It is described First server obtains the access mode and corresponding third account of third server according to first account;First clothes It is engaged in device third server according to the access mode and corresponding third account request, to obtain the 4th password, described the Four passwords are to be obtained to the third password using the first non-reversible algorithm;The 6th password and the 7th password are matched, wherein described 6th password is that the first server obtains the 4th password with the 8th password combination, and the 8th password is described The password obtained to the third password using the second non-reversible algorithm that first server saves in advance, the 7th password is pair 5th password and the 9th password combination and obtain, wherein the 5th password is that the first server makes the first password It is obtained with first non-reversible algorithm, the 9th password, which is the first server, uses described the to the first password Two non-reversible algorithms obtain;The logging request is responded according to matching result, if the 6th password and the 7th password Matching, then the client logs in the first server success, otherwise login failure.
2. the method according to claim 1, wherein
The client logs in the first server with the access mode for obtaining second server
The client logs in first server using the first account and first password;
The client checks using the addressable server list of first account and selects the second server to be accessed When only may have access to the second server with the access mode for obtaining the second server or first account, the visitor Family end directly obtains the access mode of the second server from the first server.
3. according to the method described in claim 2, it is characterized in that,
Each addressable server runs several terminal interaction programs, and periodically reports institute to the first server The mount message of terminal interaction program is stated, the use addressable server list of the first account is further listed in described The terminal interaction program listing of addressable server installation, in order to which the client is checked and is managed.
4. the method according to claim 1, wherein
The client is identical or different using permission possessed by the different account login second servers.
5. the method according to claim 1, wherein
The second server runs several terminal interaction programs, each corresponding terminal of the terminal interaction program;
The client sends control signal to the terminal by the second server
The client accesses the second server, to issue control signal to selected terminal interaction program;
The second server receives the control signal, and the control signal is sent to the selected terminal interaction journey Sequence;
The terminal interaction program receives the control signal and is sent to corresponding terminal.
6. according to the method described in claim 5, it is characterized in that,
The terminal generates feedback signal also according to the working condition of itself and is sent to the corresponding terminal interaction program;
The terminal interaction program receives the feedback signal and accordingly more new state, so that the client is checked and is manipulated.
7. method according to any one of claims 1 to 6, which is characterized in that
The first server is publicly-owned Cloud Server, and the second server is privately owned Cloud Server.
8. method according to any one of claims 1 to 6, which is characterized in that
The first server is publicly-owned Cloud Server, and the third server is privately owned Cloud Server.
9. a kind of long-range control method characterized by comprising
First server receives and customer in response end uses the logging request of the first account and first password;
The access mode of second server is sent to the client by the first server;
The first server help client is established P2P with the second server using the access mode and is connect, So that the client passes through the second server after using second server described in the second account and the second password login Control signal is sent to terminal, the terminal receives the control signal and executes operation according to the control signal;
Password needed for wherein the client logs in the first server and log in third server needed for password be Third password;
The first server receives and the step of logging request at customer in response end includes:
The first server receives the logging request that the client uses first account and the first password;It is described First server obtains the access mode and corresponding third account of the third server according to first account;Described One server third server according to the access mode and corresponding third account request, to obtain the 4th password, institute Stating the 4th password is to be obtained to the third password using the first non-reversible algorithm;The 4th password and the 5th password are matched, Wherein the 5th password is that the first server obtains the first password using first non-reversible algorithm;According to Matching result responds the logging request, if the 4th password and the 5th password match, the client is logged in The first server is successful, otherwise login failure;Or
The first server receives the logging request that the client uses first account and the first password;It is described First server obtains the access mode and corresponding third account of third server according to first account;First clothes It is engaged in device third server according to the access mode and corresponding third account request, to obtain the 4th password, described the Four passwords are to be obtained to the third password using the first non-reversible algorithm;The 6th password and the 7th password are matched, wherein described 6th password is that the first server obtains the 4th password with the 8th password combination, and the 8th password is described The password obtained to the third password using the second non-reversible algorithm that first server saves in advance, the 7th password is pair 5th password and the 9th password combination and obtain, wherein the 5th password is that the first server makes the first password It is obtained with first non-reversible algorithm, the 9th password, which is the first server, uses described the to the first password Two non-reversible algorithms obtain;The logging request is responded according to matching result, if the 6th password and the 7th password Matching, then the client logs in the first server success, otherwise login failure.
10. a kind of server characterized by comprising
Login response module uses the logging request of the first account and first password for receiving simultaneously customer in response end;
Sending module, for the access mode of corresponding second server to be sent to the client;
Link block is established, the client is used to help using the access mode and the second server and establishes P2P company It connects, so that the client passes through described second after using second server described in second account and the second code entry Server sends control signal to terminal, and the terminal receives the control signal and executes operation according to the control signal;
Password needed for wherein the client logs in the first server and log in third server needed for password be Third password;
The login response module includes:
Receiving unit uses the logging request of first account and the first password for receiving the client;Addressing Unit, for obtaining the access mode and third account of third server according to first account;Acquiring unit is used for basis Third server described in the access mode and corresponding third account request, to obtain the 4th password, the 4th password is The third password is obtained using the first non-reversible algorithm;Matching unit, for matching the 4th password and the 5th password, Wherein the 5th password is to be obtained to the first password using first non-reversible algorithm;Response unit is used for basis Matching result responds the logging request, if the 4th password and the 5th password match, first account log at Function, otherwise login failure;Or
Receiving unit uses the logging request of first account and the first password for receiving the client;Addressing Unit, for obtaining the access mode and corresponding third account of third server according to first account;Acquiring unit is used In the third server according to the access mode and corresponding third account request, to obtain the 4th password, the described 4th Password is to be obtained to the third password using the first non-reversible algorithm;Matching unit, it is close for the 6th password of matching and the 7th Code, wherein the 6th password is obtained to the 4th password and the 8th password combination, the 8th password is pre- preservation The password that the third password is obtained using the second non-reversible algorithm, the 7th password is close to the 5th password and the 9th Code character conjunction obtains, wherein the 5th password is to be obtained to the first password using first non-reversible algorithm, it is described 9th password is to be obtained to the first password using second non-reversible algorithm;Response unit, for according to matching result The logging request is responded, if the 6th password and the 7th password match, first account is logined successfully, no Then login failure.
11. a kind of server characterized by comprising
Processor, memory and network communications circuits, the memory and network communications circuits are separately connected the processor;
The processor is used for running first service program with receiving simultaneously customer in response end by the network communications circuits The access mode of corresponding second server is passed through the network communications circuits by the logging request of the first account and first password It is sent to the client, helps the client to use the access mode and described second by the network communications circuits Server establishes P2P connection, so that after the client is using second server described in the second account and the second password login Control signal is sent to terminal by the second server, the terminal receives the control signal and believes according to the control Number execute operation;
Password needed for wherein the client logs in the server and log in third server needed for password be Third password;
The processor uses first account and described first for running first service program, to receive the client The logging request of password;The access mode and corresponding third account of the third server are obtained according to first account; According to third server described in the access mode and corresponding third account request, to obtain the 4th password, the described 4th is close Code is to be obtained to the third password using the first non-reversible algorithm;The 4th password and the 5th password are matched, wherein described 5th password is to be obtained to the first password using first non-reversible algorithm;The login is responded according to matching result to ask It asks, if the 4th password and the 5th password match, the client logs in the server success, otherwise logs in Failure;Or
The processor uses first account and described first for running first service program, to receive the client The logging request of password;The access mode and corresponding third account of third server are obtained according to first account;According to Third server described in the access mode and corresponding third account request, to obtain the 4th password, the 4th password is The third password is obtained using the first non-reversible algorithm;The 6th password and the 7th password are matched, wherein the 6th password It is to be obtained to the 4th password and the 8th password combination, the 8th password is using the third password for pre- preservation The password that second non-reversible algorithm obtains, the 7th password are obtained to the 5th password and the 9th password combination, wherein institute Stating the 5th password is to be obtained to the first password using first non-reversible algorithm, and the 9th password is to described first Password is obtained using second non-reversible algorithm;The logging request is responded according to matching result, if the 6th password With the 7th password match, then the client logs in the server success, otherwise login failure.
12. server according to claim 11, which is characterized in that
The processor, which is further used for operation second service program, to be checked and manages to issue and safeguard client application Manage the terminal interaction program installed on the second server and the second server.
CN201510642615.9A 2015-09-30 2015-09-30 A remote control method and server Expired - Fee Related CN105245596B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510642615.9A CN105245596B (en) 2015-09-30 2015-09-30 A remote control method and server
PCT/CN2016/080664 WO2017054443A1 (en) 2015-09-30 2016-04-29 Remote control method, server and network attached storage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510642615.9A CN105245596B (en) 2015-09-30 2015-09-30 A remote control method and server

Publications (2)

Publication Number Publication Date
CN105245596A CN105245596A (en) 2016-01-13
CN105245596B true CN105245596B (en) 2019-02-05

Family

ID=55043094

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510642615.9A Expired - Fee Related CN105245596B (en) 2015-09-30 2015-09-30 A remote control method and server

Country Status (2)

Country Link
CN (1) CN105245596B (en)
WO (1) WO2017054443A1 (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105245596B (en) * 2015-09-30 2019-02-05 深圳市先河系统技术有限公司 A remote control method and server
CN207115046U (en) * 2016-03-18 2018-03-16 上海科斗电子科技有限公司 intelligent hardware network interaction system
CN105847243B (en) * 2016-03-18 2021-02-26 北京小米移动软件有限公司 Method and device for accessing a smart camera
CN106453238B (en) * 2016-08-22 2020-02-21 深圳市先河系统技术有限公司 Login method and system, electronic terminal, public network server and private cloud equipment
CN106331118A (en) * 2016-08-26 2017-01-11 深圳市智物联网络有限公司 A data processing system, a public cloud server and private cloud servers in an internet of things
WO2018099115A1 (en) * 2016-11-30 2018-06-07 华为技术有限公司 Method and device for detecting password, and terminal
CN106850384A (en) * 2017-01-12 2017-06-13 深圳市先河系统技术有限公司 A kind of method and mobile terminal for realizing accessing equipment in LAN
CN107104958B (en) * 2017-04-14 2020-06-19 深圳市先河系统技术有限公司 Method for managing private cloud equipment, private cloud, public cloud equipment and storage device
CN109413120B (en) * 2017-08-16 2022-06-17 北京小鸟听听科技有限公司 Communication method and device, electronic equipment and server
CN110298162A (en) * 2019-05-22 2019-10-01 深圳壹账通智能科技有限公司 Application client login method, device, computer equipment and storage medium
CN110488617A (en) * 2019-07-08 2019-11-22 湖南优创智能科技有限公司 Intelligent home control system, method and terminal device
CN112347439B (en) * 2020-11-11 2023-04-11 西安万像电子科技有限公司 Method and system for visitor login access
CN112702391B (en) * 2020-12-09 2022-12-30 湖南新九方科技有限公司 Remote networking method and networking system for industrial control equipment
CN115174128B (en) * 2021-03-19 2024-07-02 北京金山云网络技术有限公司 Login management method and device and private cloud control server
CN115811432B (en) * 2022-12-06 2025-09-09 睿云联(厦门)网络通讯技术有限公司 Terminal remote access method, equipment and medium based on TCP message proxy
CN116868740B (en) * 2023-06-30 2024-08-13 广东环境保护工程职业学院 Plant maintenance method, device, system and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102413182A (en) * 2011-11-17 2012-04-11 南京天溯自动化控制系统有限公司 Intelligent household equipment remote monitoring device and method
CN102594823A (en) * 2012-02-20 2012-07-18 南京邮电大学 Trusted system for remote secure access of intelligent home
CN104394051A (en) * 2014-11-28 2015-03-04 杨光源 Intelligent home control system and intelligent home router
CN104917748A (en) * 2015-04-14 2015-09-16 百度在线网络技术(北京)有限公司 Method and device for performing conversion and processing on password information

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202424779U (en) * 2011-11-17 2012-09-05 南京天溯自动化控制系统有限公司 Remote monitoring device for intelligent home furnishing equipment
CN102938729B (en) * 2012-10-30 2016-12-21 山东智慧生活数据系统有限公司 The long-range control method of intelligent gateway, intelligent domestic system and home appliance
US20140244001A1 (en) * 2013-02-25 2014-08-28 Qualcomm Incorporated Controlling many different devices from a smart controller
US20150198938A1 (en) * 2014-01-15 2015-07-16 Green Edge Technologies, Inc. Systems, devices, methods and graphical user interface for configuring a building automation system
CN104320494A (en) * 2014-11-15 2015-01-28 周成亮 Intelligent home doorbell system based on cloud technology and Internet of Things technology
CN204650255U (en) * 2015-05-20 2015-09-16 宁夏中远智信科技有限公司 A kind of intelligent home control system based on P2P interconnection technique
CN104917840A (en) * 2015-06-15 2015-09-16 深圳市太太爱物联智能家居有限公司 Equipment and method for implementing remote intelligent control of cooking
CN105245596B (en) * 2015-09-30 2019-02-05 深圳市先河系统技术有限公司 A remote control method and server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102413182A (en) * 2011-11-17 2012-04-11 南京天溯自动化控制系统有限公司 Intelligent household equipment remote monitoring device and method
CN102594823A (en) * 2012-02-20 2012-07-18 南京邮电大学 Trusted system for remote secure access of intelligent home
CN104394051A (en) * 2014-11-28 2015-03-04 杨光源 Intelligent home control system and intelligent home router
CN104917748A (en) * 2015-04-14 2015-09-16 百度在线网络技术(北京)有限公司 Method and device for performing conversion and processing on password information

Also Published As

Publication number Publication date
CN105245596A (en) 2016-01-13
WO2017054443A1 (en) 2017-04-06

Similar Documents

Publication Publication Date Title
CN105245596B (en) A remote control method and server
EP3073699B1 (en) System and method for controlling mutual access of smart devices
KR102350430B1 (en) Over-the-air provisioning and configuration of hardware elements in a home automation system
US9769245B2 (en) Method for communicating data between a domestic appliance and a user terminal, a domestic appliance, and a system comprising a domestic appliance and a user terminal
US9479504B2 (en) Method and apparatus for controlling access between home device and external server in home network system
US9979729B2 (en) Controlling access for a home control device including an online mode and an offline mode
US11146643B2 (en) Message bus agent apparatus, signaling server, message bus management server, connection establishment method, and program
CN110557448A (en) Control method and system for smart home
US11677578B2 (en) Automatic transitions in automation settings
CN104683435B (en) Network system keeps connection method, electronic equipment, server
CN109474692A (en) A kind of intelligent household appliance remote control method, apparatus and system
CN110932944A (en) Method and system for controlling intelligent household equipment by visitor terminal
CN112312515B (en) Binding method and device of intelligent equipment, electronic equipment and storage medium
CN117751553A (en) Method, device, computer equipment and storage medium for account association
CN105743746A (en) Intelligent home electric appliance management method, management apparatus and management system
US11095471B2 (en) Home-automation system and method for constituting the topology of a home-automation system
CN105991698A (en) Method, system and device for mobile terminal remotely managing intelligent router file
CN103439934A (en) Intelligent electrical appliance control method, server and system
CN115695510B (en) Control instruction sending method, device, storage medium and electronic device
JP2014512719A (en) Control system and pairing method for control system
CN108370629B (en) Lighting commissioning system and method for commissioning at least one infrastructure element
KR102340693B1 (en) METHOD AND HOME IoT SERVICE SYSTEM FOR SETTING USER AUTHORITY
JP2014239369A (en) Energy consumption apparatus control device and energy consumption apparatus control method
US10554433B2 (en) Method for discovering the configuration of a home-automation facility
US20180084059A1 (en) Communication device, communication method, controlled device, and non-transitory computer readable medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190205