This application is based upon and claims priority to Chinese Patent Application No. 202111573333.X, filed on Dec. 21, 2021, the entire contents of which are incorporated herein by reference.
The present invention relates to the field of remote control technologies, and more particularly to a remote control-based method for protecting information on a device screen.
The popularization and development of mobile devices have provided enterprises with unprecedented productivity, and more and more mobile devices have been applied to the production and operation processes in enterprises. The use of mobile devices allows businesses of enterprises to break the geographical boundaries and come into all corners of the city. However, it has also become more difficult to implement effective management and support for these remote mobile devices. When these remote mobile devices fail, for example, a system or software service crash, the business of an enterprise may be paralyzed, while on-site maintenance not only requires a large amount of time but on-site maintenance also increases the cost.
Remote control technology can learn about on-site situations quickly, and immediately carry out remote processing, thereby achieving timely troubleshooting and effectively reducing travel costs. Normally, the screens of a controlling terminal and a controlled terminal are synchronized. When maintenance personnel performs remote maintenance at the controlling terminal, especially for remote mobile devices placed in public places, some operations are undesirable to be seen by others due to privacy or security reasons, for example, inputting an administrator password, or confidential background settings. Therefore, remote control requires a more secure and private protection environment to protect the security of enterprise information.
To resolve the foregoing problem, the present invention provides a remote control-based method for protecting information on a device screen.
The present invention adopts the following technical solutions.
A remote control-based method for protecting information on a device screen is provided, where a controlling terminal controls a controlled terminal through a remote control system, and the remote control-based method specifically includes the following steps:
Further, in step S2, when the transparency of the floating layer is adjusted, backlight of the screen of the controlled terminal is turned off.
Further, the floating layer is a transparent superimposed layer.
Further, the floating layer in step S2 is a full-screen floating layer or a regional floating layer.
Further, an operating system of the controlled terminal is an Android system.
Further, an operating system of the controlling terminal is any one of the Android system, an iphone operation system (IOS), a Mac system, or a Windows system.
Further, before step S1, the remote control-based method further includes: starting the remote control system and entering a safe mode.
Further, after step S4, the remote control-based method further includes: exiting from the safe mode and closing the remote control system.
Further, step S4 includes: if the operating system of the controlled terminal has accessibility permission, checking, through the accessibility permission, whether the screenshot is covered by the floating layer; if the screenshot is covered by the floating layer, performing brightness enhancement processing according to red-green-blue (RGB) three primary colors, and then sending the screenshot to the controlling terminal, and if the screenshot is not covered by the floating layer, directly sending the screenshot to the controlling terminal.
Further, step S4 includes: if the operating system of the controlled terminal does not have accessibility permission, but has root or root-free permission, detecting a black coverage proportion of the screenshot; if the black coverage proportion is greater than or equal to 90%, performing brightness enhancement processing through gamma correction based on red-green-blue (RGB) three primary colors, and then sending the screenshot to the controlling terminal, and if the black coverage proportion is less than 90%, directly sending the screenshot to the controlling terminal.
After the foregoing technical solution is used, compared with the background art, the present invention has the following advantages:
The present invention provides a remote control-based method for protecting information on a device screen. During remote control of an Android device, a display screen on the remote device is hidden by setting a floating layer, so that information on the screen is unreadable, but maintenance personnel at a controlling terminal can still read the screen of the remote device normally, thereby avoiding the leakage of screen information on the remote device, providing a safer and more private environment for the remote control, and protecting the security of information.
In order to make the object, the technical solution and the advantages of the present invention clearer, the present invention is further described in detail with reference to the following drawings and embodiments. It should be understood that the specific examples described herein are merely intended to explain the present invention, rather than to limit the present invention.
First, start the remote control system and enter a safe mode.
S1: superimpose a floating layer on a content page of a screen of the controlled terminal, where the floating layer is a full-screen floating layer or a regional floating layer; and the floating layer is a transparent superimposed layer. Specifically, a full-screen black transparent floating layer is used in this embodiment.
S2: adjust transparency of the floating layer to allow the content page on the screen of the controlled terminal to be invisible. For example, adjust the transparency of the floating layer to 80-99%, and turn off backlight of the screen of the controlled terminal, so that the content page on the screen of the controlled terminal is invisible. In this step, after the content page displayed on the screen of the controlled terminal is covered by the black transparent floating layer with very low transparency, the screen is extremely approximate to black. In addition, because the backlight has been turned off, the whole screen cannot be read normally, thereby protecting the screen information.
S3: take a screenshot of the controlled terminal. In this step, because the transparency of the floating layer is not 100% (completely opaque), the screenshot is nearly black, but it still retains information of the original content page.
S4: the remote control system adjusts brightness of the screenshot, increases the brightness of the screenshot to restore the screen to be normally visible, and displays the adjusted screenshot at the controlling terminal, so that maintenance personnel at the controlling terminal can see the information of the normal content page.
If the remote control system is not granted permission for the floating layer, the remote control system cannot set or edit the floating layer. If the remote control system is granted permission for the floating layer, step S4 includes the following two cases:
(1) If the operating system of the controlled terminal has accessibility permission, “accessibility permission-floating layer” is enabled. The remote control system checks, with the accessibility permission, whether the screenshot is covered by the floating layer. If the screenshot is covered by the floating layer, brightness enhancement processing is performed based on red-green-blue (RGB) three primary colors by multiplying all values by 10 with Android's built-in API, and then the screenshot is sent to the controlling terminal. If the screenshot is not covered by the floating layer, the screenshot is directly sent to the controlling terminal.
(2) If the operating system of the controlled terminal does not have accessibility permission, but has root or root-free permission, “general floating layer” is enabled. The remote control system first detects a black coverage proportion of the screenshot. If the black coverage proportion is greater than or equal to 90%, brightness enhancement processing is performed through gamma correction based on red-green-blue (RGB) three primary colors, and then the screenshot is sent to the controlling terminal. If the black coverage proportion is less than 90%, the screenshot is directly sent to the controlling terminal. This is because in this case, only the middle region of the screenshot is covered by the black floating layer, while bars in the upper and lower part are not covered. If the remote control system adjusts the brightness of the entire screenshot through non-gamma correction, the uncovered bars in the upper and lower part will be overexposed, and the brightness will be falsely increased because of misjudgment as using a screen with a black background.
Specifically, a device with root permission can directly obtain the permission to take screenshots and simulate taps and swipes. Root-free permission means that a common device without root permission can obtain, by running adb shell, the permission to take screenshots and simulate taps and swipes.
After the operations are complete, exit from the safe mode and close the remote control system. In this embodiment, an operating system of the controlling terminal is an Android system, an IOS, a Mac system, or a Windows system.
Specifically, the screen flow of the method described in this embodiment is as follows:
1. Enable remote control at the controlling terminal. As shown in
2. After the remote control system enters the safe mode, as shown in
3. In this case, as shown in
4. After the remote maintenance is completed, exit from the safe mode, as shown in
The method in this embodiment greatly protects the screen privacy when a user remotely controls an Android device, for example, inputting a password, viewing confidential information, and performing a confidential operation, thereby remotely protecting information of the controlling terminal from being disclosed and viewed.
The above described are merely specific implementations of the present invention, and the protection scope of the present invention is not limited thereto. Any modification or replacement easily conceived by those skilled in the art within the technical scope of the present invention should fall within the protection scope of the present invention. Therefore, the protection scope of the present invention should be subject to the protection scope of the claims.
Number | Date | Country | Kind |
---|---|---|---|
202111573333.X | Dec 2021 | CN | national |
Number | Name | Date | Kind |
---|---|---|---|
9406157 | Liu | Aug 2016 | B2 |
10306184 | Petrov | May 2019 | B1 |
11151309 | Gao | Oct 2021 | B1 |
11317053 | Zhu | Apr 2022 | B2 |
11647392 | Lawrence | May 2023 | B1 |
11678011 | Fu | Jun 2023 | B1 |
11908571 | Trojman | Feb 2024 | B1 |
20140123299 | Jung | May 2014 | A1 |
20150278534 | Thiyagarajan | Oct 2015 | A1 |
20150302621 | Liu | Oct 2015 | A1 |
20160082839 | Ricci | Mar 2016 | A1 |
20170040002 | Basson et al. | Feb 2017 | A1 |
20170064208 | Salimpour | Mar 2017 | A1 |
20170068829 | Shaw | Mar 2017 | A1 |
20180336373 | Deenadayal | Nov 2018 | A1 |
20190253611 | Wang | Aug 2019 | A1 |
20190373210 | Nguyen | Dec 2019 | A1 |
20200193559 | Sano | Jun 2020 | A1 |
20200349296 | Young | Nov 2020 | A1 |
20210026508 | Jacobs | Jan 2021 | A1 |
20210203627 | Luo | Jul 2021 | A1 |
20210349677 | Baldev | Nov 2021 | A1 |
20220035958 | Homma | Feb 2022 | A1 |
20220116546 | Gummadi | Apr 2022 | A1 |
20220245265 | Silverstein | Aug 2022 | A1 |
20220253268 | Deole | Aug 2022 | A1 |
20220300598 | Ford | Sep 2022 | A1 |
20220309183 | Jose | Sep 2022 | A1 |
20220414241 | Chittampally | Dec 2022 | A1 |
Number | Date | Country |
---|---|---|
113642053 | Nov 2021 | CN |
Entry |
---|
Bundalo, Zlatko et al. Increasing desktop application and user data protection using smartphone. 2016 24th Telecommunications Forum (TELFOR). https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7818870 (Year: 2016). |
Bhanpurawala, Alifiya et al. Screen sharing application for mobile phones. 2015 International Conference on Technologies for Sustainable Development (ICTSD). https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7095867 (Year: 2015). |
Bryant, Ian. Factors in sharing sensitive security information. 2014 Science and Information Conference. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6918243 (Year: 2014). |
Guerar, Meriem et al. Using Screen Brightness to Improve Security in Mobile Social Network Access. EEE Transactions on Dependable and Secure Computing, vol. 15, Issue: 4. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7547911 (Year: 2018). |
Yue, Huanjing et al. Recaptured Screen Image Demoiréing. IEEE Transactions on Circuits and Systems for Video Technology, vol. 31, Issue: 1. https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8972378 (Year: 2021). |
Number | Date | Country | |
---|---|---|---|
20230195947 A1 | Jun 2023 | US |