CN114827059B - Group member or friend adding method, electronic equipment and system - Google Patents

Group member or friend adding method, electronic equipment and system Download PDF

Info

Publication number
CN114827059B
CN114827059B CN202110129143.2A CN202110129143A CN114827059B CN 114827059 B CN114827059 B CN 114827059B CN 202110129143 A CN202110129143 A CN 202110129143A CN 114827059 B CN114827059 B CN 114827059B
Authority
CN
China
Prior art keywords
electronic device
message
antenna
distance
mobile phone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110129143.2A
Other languages
Chinese (zh)
Other versions
CN114827059A (en
Inventor
时锐
薛清风
杨嘉辰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202110129143.2A priority Critical patent/CN114827059B/en
Priority to PCT/CN2021/141790 priority patent/WO2022161071A1/en
Publication of CN114827059A publication Critical patent/CN114827059A/en
Application granted granted Critical
Publication of CN114827059B publication Critical patent/CN114827059B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Abstract

The application relates to a group member or friend adding method and electronic equipment. The method is used for running the electronic equipment of the social application, the electronic equipment comprises a first antenna and a second antenna, the transmission distance of the first antenna and the transmission distance of the second antenna are respectively a first distance and a second distance, the first distance is larger than a preset safety distance, and the second distance is smaller than or equal to the preset safety distance. The method comprises the following steps: the electronic equipment receives user input and sends a first message containing a random key through a second antenna; receiving a second message, decrypting the second message by using a random key, and acquiring a user account on the social application; sending a request message containing a user account to an application server of the social application; the request message also comprises a corresponding group identifier input by a user or a user account of the electronic equipment on the social application; and receiving a response message of the application server, and prompting the success of adding group members or the success of adding friends to the group. The method and the device ensure communication safety, reduce user operation and improve user experience.

Description

Group member or friend adding method, electronic equipment and system
Technical Field
The present disclosure relates to the field of terminal technologies, and in particular, to a method, an electronic device, and a system for adding group members or friends.
Background
The social application has the function of adding friends and group members. For example, in a social application, a user may add as a friend, add a group member, or the like by searching for a user account, scanning a two-dimensional code, or the like. However, these approaches still require the user to open the social application, and multiple manual operations to do so. Therefore, the operations of adding friends and group members among users are complicated, the time consumption is long, the popularization of social applications is not facilitated, the popularization of newly marketed social applications is not facilitated, and the user experience is poor.
Disclosure of Invention
In order to solve the technical problems, the application provides a friend adding method, electronic equipment and a system. According to the technical scheme, operations of adding friends and group members among users can be reduced, time consuming time is shortened, convenience is brought to the users, and user experience is improved.
In a first aspect, an embodiment of the present application provides a method for adding group members or friends. The method can be applied to a first electronic device, and the first electronic device runs a first social application. The first electronic device includes: the first antenna has a transmitting distance of a first distance which is larger than a preset first safety distance; the transmitting distance of the second antenna is a second distance, and the second distance is smaller than or equal to a preset first safety distance; wherein the first antenna and the second antenna are different antennas. The method comprises the following steps: receiving a first user input; the first electronic device generates a random key; the first electronic device sends a first message through the second antenna, wherein the first message comprises a random key; receiving a second message from a second electronic device; the first electronic equipment decrypts the second message by using the random key, and obtains a user account on the first social application; the first electronic device sends a request message to an application server of the first social application through the first social application and the first antenna; the request message includes a user account; the request message also comprises a corresponding group identifier input by the first user or a user account of the first electronic device on the first social application; receiving a first response message from an application server; responding to the first response message, prompting by the first electronic equipment, and inputting a group member corresponding to the group by the first user to succeed in adding, or succeed in adding friends by the first electronic equipment on a user account of the first social application; the preset first safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a clear text mode.
In the method, on the one hand, the first electronic device uses the second antenna to send the first message, and other electronic devices outside the preset distance cannot receive the first message, so that the safety of communication can be ensured. On the other hand, the user of the first electronic device does not need to carry out complex operation, and only needs to ensure that the distance between the first electronic device and the second electronic device is smaller than or equal to the preset first safety distance, so that the second electronic device can receive the first message to add friends or group members, and the complex manual operation is effectively reduced. The method is beneficial to reducing the difficulty of adding friends or group members among users and improving the communication efficiency on the basis of ensuring the communication safety.
In one possible design, the first electronic device sends the first message through the second antenna; comprising the following steps: the first electronic equipment sends a first message through the second antenna in a Bluetooth or ZigBee wireless communication mode; the first electronic device receives a second message from the second electronic device; comprising the following steps: and receiving a second message from the second electronic equipment in a Bluetooth or ZigBee wireless communication mode. In the method, the communication efficiency is improved in a Bluetooth or ZigBee wireless communication mode, and the cellular flow is saved.
In one possible design, the first electronic device generates a random key in response to a first user input; comprising the following steps: responding to the first user input, and the first electronic equipment issues an added group member service message or an added friend service message in a Wi-Fi perceived wireless communication mode through a first antenna; the first electronic equipment receives a response message from the second electronic equipment in a Wi-Fi perceived wireless communication mode; in response to the response message, the first electronic device generates a random key.
In the method, under the scene that the first electronic device and the second electronic device are not connected to the same router, the two electronic devices can also realize communication in a Wi-Fi sensing wireless communication mode.
In one possible design, the first electronic device sends the first message through the second antenna; comprising the following steps: the first electronic equipment sends a first message in a Wi-Fi perceived wireless communication mode through a second antenna; the first electronic device receives a second message from the second electronic device; comprising the following steps: a second message is received from the second electronic device in Wi-Fi aware wireless communication.
In the method, under the scene that the first electronic device and the second electronic device are not connected to the same router, the two electronic devices can also realize communication in a Wi-Fi sensing wireless communication mode.
In one possible design, the first electronic device receives a second message from the second electronic device; comprising the following steps: after the distance between the first electronic device and the second electronic device is smaller than or equal to a preset second safety distance, receiving a second message from the second electronic device; the preset second safe distance is associated with the second electronic device. The preset second safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a clear text mode. In the method, other electronic equipment outside the preset second safety distance cannot receive the second message, so that the safety of communication can be ensured.
In one possible design, the receiving a second message from a second electronic device; comprising the following steps: after the distance between the first electronic equipment and the second electronic equipment is larger than a preset second safety distance, receiving a second message from the second electronic equipment; the preset second safe distance is associated with the second electronic device.
In the method, the second electronic device may also transmit the second message using the first antenna. The method can reduce the operations of adding friends and group members among users, shorten the time consumption and improve the user experience.
In one possible design, the first electronic device sends a request message to an application server of the first social application; comprising the following steps: the method comprises the steps that through an encryption mechanism of a first social application, first electronic equipment sends a request message to an application server of the first social application; the first electronic device receives a first response message from the application server; comprising the following steps: and receiving the first response message from the application server, and acquiring the decrypted first response message through a decryption mechanism of the first social application.
In the method, the first electronic equipment and the application server of the first social application are communicated through an encryption and decryption mechanism, so that the safety of communication can be ensured.
In a second aspect, an embodiment of the present application provides a method for adding group members or friends, which is applied to a first electronic device. The first electronic device is provided with a first social application. The method comprises the following steps: receiving a first user input; responding to the first user input, and the first electronic equipment issues an add group member service message or an add friend service message through a first antenna; after the distance between the first electronic device and the second electronic device is smaller than or equal to a preset second safety distance, receiving a first message from the second electronic device; acquiring a user account on a first social application from the first message, and prompting to confirm the user account; receiving a second user input for confirming the addition; responding to the second user input, and sending a request message to an application server of the first social application by the first electronic device through the first antenna and the first social application; the request message includes a user account; the request message also comprises a corresponding group identifier input by the first user or a user account of the first electronic device on the first social application; receiving a first response message from an application server; responding to the first response message, prompting by the first electronic equipment, and inputting a group member corresponding to the group by the first user to succeed in adding, or succeed in adding friends by the first electronic equipment on a user account of the first social application; the preset second safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a clear text mode.
According to the method, operations of adding friends and group members among users can be reduced, time-consuming time is shortened, the users can use the method conveniently, and user experience is improved.
In one possible design, the first electronic device issues an add group member service message or an add friend service message through the first antenna; comprising the following steps: the first electronic equipment issues an added group member service message or an added friend service message in a Wi-Fi sensing, bluetooth or ZigBee wireless communication mode through the first antenna; the first message from the second electronic device is received; comprising the following steps: and receiving the first message from the second electronic equipment in a Wi-Fi sensing, bluetooth or ZigBee wireless communication mode. In the method, the communication efficiency is improved in a Wi-Fi sensing, bluetooth or ZigBee wireless communication mode, and the cellular flow is saved.
In one possible design, the first electronic device sends a request message to an application server of the first social application; comprising the following steps: the method comprises the steps that through an encryption mechanism of a first social application, first electronic equipment sends a request message to an application server of the first social application;
The first electronic device receives a first response message from the application server; comprising the following steps: the first electronic equipment receives the first response message from the application server and acquires the decrypted first response message through a decryption mechanism of the first social application. In the method, the first electronic equipment and the application server of the first social application are communicated through an encryption and decryption mechanism, so that the safety of communication can be ensured.
In a third aspect, an embodiment of the present application provides a method for adding group members or friends, which is applied to a first electronic device. The first electronic device runs a first social application; the first electronic device includes: the first antenna has a transmitting distance of a first distance which is larger than a preset first safety distance; the transmitting distance of the second antenna is a second distance, and the second distance is smaller than or equal to a preset first safety distance; wherein the first antenna and the second antenna are different antennas. The method comprises the following steps: receiving a first user input; responding to the first user input, and the first electronic equipment issues an add group member service message or an add friend service message through a first antenna; after the distance between the first electronic device and the second electronic device is smaller than or equal to a preset second safety distance, receiving a first message from the second electronic device; the preset second safety distance is the safety distance that the first electronic equipment and the second electronic equipment can exchange secret information in the clear; in response to the first message, acquiring a random key from the first message, and encrypting a group identifier corresponding to the first user input or a user account of the first electronic device on the first social application by using the random key; the first electronic device sends a second message through a second antenna; the second message comprises the encrypted group identifier or the user account; receiving a first response message from an application server of a first social application; responding to the first response message, prompting by the first electronic equipment, and inputting a group member corresponding to the group by the first user to succeed in adding, or succeed in adding friends by the first electronic equipment on a user account of the first social application; the preset first safety distance is a safety distance that the first electronic equipment and the second electronic equipment can exchange secret information in a plaintext manner; the preset second safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a clear text mode.
According to the method, operations of adding friends and group members among users can be reduced, time-consuming time is shortened, the use of the users is facilitated, user experience is improved, the second electronic equipment uses the second antenna to send the first message, and other electronic equipment outside a preset second safety distance cannot receive the first message, so that safety of communication can be guaranteed.
In one possible design, a first electronic device receives a first response message from an application server of a first social application; comprising the following steps: and receiving a first response message from the application server of the first social application, and acquiring the decrypted first response message through a decryption mechanism of the first social application. In the method, the first electronic equipment and the application server of the first social application are communicated through an encryption and decryption mechanism, so that the safety of communication can be ensured.
In one possible design, the first antenna is connected to the same wireless communication module as the second antenna; the wireless communication module comprises one of a Wi-Fi chip, a Bluetooth chip and a ZigBee chip.
In one possible design, the number of Wi-Fi chips, bluetooth chips or ZigBee chips in the wireless communication module is one, and the first antenna and the second antenna are connected to the Wi-Fi chips, bluetooth chips or ZigBee chips.
In a fourth aspect, an embodiment of the present application provides a method for adding group members or friends, which is applied to a first electronic device. The first electronic device is operated with a first social application, and the first electronic device comprises: the first antenna, the transmission distance of first antenna under first transmission power is first distance, and the transmission distance of first antenna under the second transmission power is the second distance, and first distance is greater than preset first safe distance, and the second distance is less than or equal to preset first safe distance. The method comprises the following steps: receiving a first user input; in response to the first user input, the first electronic device generates a random key; the first electronic device transmitting a first message over a first antenna at a second transmit power, the first message including a random key; receiving a second message from a second electronic device; in response to the second message, the first electronic device decrypts the second message by using the random key, and obtains a user account on the first social application; the method comprises the steps that first electronic equipment sends a request message to an application server of a first social application; the request message includes a user account; the request message also comprises a corresponding group identifier input by the first user or a user account of the first electronic device on the first social application; receiving a first response message from an application server; responding to the first response message, prompting by the first electronic equipment, and inputting a group member corresponding to the group by the first user to succeed in adding, or succeed in adding friends by the first electronic equipment on a user account of the first social application; the preset first safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a clear text mode.
In one possible design, a first electronic device sends a first message through the first antenna at the second transmit power; comprising the following steps: the first electronic equipment sends a first message in a Bluetooth or ZigBee wireless communication mode through the first antenna under the second transmitting power; the receiving of a second message from a second electronic device; comprising the following steps: and receiving a second message from the second electronic equipment in a Bluetooth or ZigBee wireless communication mode.
In one possible design, the first electronic device generates a random key in response to the first user input; comprising the following steps: responding to the first user input, and issuing an add group member service message or an add friend service message by the first electronic equipment through the first antenna under the first transmitting power in a Wi-Fi perceived wireless communication mode; receiving a response message from the second electronic equipment in a Wi-Fi perceived wireless communication mode; in response to the response message, the first electronic device generates a random key.
In one possible design, the first electronic device sends a first message through the first antenna at the second transmit power; comprising the following steps: the first electronic equipment sends a first message in a Wi-Fi perceived wireless communication mode through the first antenna under the second transmitting power; the receiving of a second message from a second electronic device; comprising the following steps: a second message is received from the second electronic device in Wi-Fi aware wireless communication.
In one possible design, the receiving a second message from the second electronic device; comprising the following steps: after the distance between the first electronic equipment and the second electronic equipment is smaller than or equal to a preset second safety distance, receiving a second message from the second electronic equipment; the preset second safe distance is associated with the second electronic device.
In one possible design, the first electronic device receives a second message from the second electronic device; comprising the following steps: after the distance between the first electronic equipment and the second electronic equipment is larger than a preset second safety distance, receiving a second message from the second electronic equipment; the preset second safe distance is associated with the second electronic device.
In one possible design, the first electronic device sends a request message to an application server of the first social application; comprising the following steps: the first electronic equipment sends a request message to an application server of the first social application through an encryption mechanism of the first social application; the first response message from the application server is received; comprising the following steps: and receiving a first response message from the application server, and acquiring the decrypted first response message through a decryption mechanism of the first social application.
The beneficial messages of the various embodiments in the fourth aspect may be referred to in the first aspect, and the description thereof will not be repeated here.
In a fifth aspect, an embodiment of the present application provides a method for adding group members or friends, which is applied to a first electronic device. The first electronic device is operated with a first social application, and the first electronic device comprises: the first antenna, the first antenna is the first distance of transmission under the first transmission power, the first antenna is the second distance of transmission under the second transmission power, the first distance is greater than the first safety distance of presetting, the second distance is less than or equal to the first safety distance of presetting; the method comprises the following steps: receiving a first user input; responding to the first user input, and issuing an add group member service message or an add friend service message by the first electronic equipment through a first antenna under the first transmission power; after the distance between the first electronic device and the second electronic device is smaller than or equal to a preset second safety distance, receiving a first message from the second electronic device; in response to the first message, acquiring a random key from the first message, and encrypting a group identifier corresponding to the first user input by using the random key; the first electronic equipment issues a second message through a first antenna under the second transmitting power; the second message includes the encrypted group identification; receiving a first response message from an application server of a first social application; responding to the first response message, prompting by the first electronic equipment, and inputting a group member corresponding to the group by the first user to succeed in adding, or succeed in adding friends by the first electronic equipment on a user account of the first social application; the preset first safety distance is a safety distance that the first electronic equipment and the second electronic equipment can exchange secret information in a plaintext manner; the preset second safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a clear text mode.
The beneficial message of each embodiment in the fifth aspect may be referred to the above second aspect, and will not be repeated here.
In a sixth aspect, an embodiment of the present application provides a method for adding group members or friends, which is applied to a second electronic device. The second electronic device is provided with a first social application, and comprises: the third antenna has a transmitting distance of a third distance which is larger than a preset second safety distance; the transmitting distance of the fourth antenna is a fourth distance, and the fourth distance is smaller than or equal to a preset second safety distance; wherein the third antenna and the fourth antenna are different antennas; the method comprises the following steps: after the distance between the first electronic device and the second electronic device is smaller than or equal to a preset first safety distance, a first message from the first electronic device is received; responding to the first message, acquiring a random key from the first message, acquiring a user account of the second electronic equipment on the first social application, and encrypting the user account by using the random key; the second electronic equipment sends a second message through a fourth antenna, wherein the second message comprises the encrypted user account; receiving a second response message from an application server of the first social application; responding to the second response message, prompting by the second electronic equipment, wherein the user account is added with group success, or the user account is added with friends successfully; the preset first safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a clear text mode.
According to the method, operations of adding friends and group members among users can be reduced, time-consuming time is shortened, the use of the users is facilitated, and user experience is improved.
In one possible design, a first message is received from a first electronic device; comprising the following steps: receiving a first message from a first electronic device in a Bluetooth or ZigBee wireless communication mode; the second electronic equipment sends a second message through the fourth antenna; comprising the following steps: and the second electronic equipment sends a second message through the fourth antenna in a Bluetooth or ZigBee wireless communication mode. In the method, the communication efficiency is improved in a Bluetooth or ZigBee wireless communication mode, and the cellular flow is saved.
In one possible design, before receiving the first message from the first electronic device, the method further comprises: the second electronic equipment receives the group member service adding message or friend service adding message from the first electronic equipment in a Wi-Fi perceived wireless communication mode; and responding to the group member service adding message or the friend service adding message, and sending a response message to the first electronic device by the second electronic device through the third antenna in a Wi-Fi perceived wireless communication mode.
In the method, under the scene that the first electronic device and the second electronic device are not connected to the same router, the two electronic devices can also realize communication in a Wi-Fi sensing wireless communication mode.
In one possible design, a first electronic device receives a first message from the first electronic device; comprising the following steps: receiving a first message from a first electronic device in a Wi-Fi aware wireless communication mode; the second electronic equipment sends a second message through a fourth antenna; comprising the following steps: and the second electronic equipment sends a second message to the first electronic equipment in a Wi-Fi perceived wireless communication mode through a fourth antenna. In the method, under the scene that the first electronic device and the second electronic device are not connected to the same router, the two electronic devices can also realize communication in a Wi-Fi sensing wireless communication mode.
In one possible design, the first electronic device receives a second response message from an application server of the first social application; comprising the following steps: the first electronic equipment receives a second response message from an application server of the first social application, and obtains the decrypted second response message through a decryption mechanism of the first social application. In the method, the first electronic equipment and the application server of the first social application are communicated through an encryption and decryption mechanism, so that the safety of communication can be ensured.
In a seventh aspect, an embodiment of the present application provides a method for adding group members or friends, which is applied to a second electronic device, where the second electronic device runs a first social application; the method comprises the following steps: after the distance between the first electronic device and the second electronic device is smaller than or equal to a preset first safety distance, a first message from the first electronic device is received; responding to the first message, acquiring a random key from the first message, acquiring a user account of the second electronic equipment on the first social application, and encrypting the user account by using the random key; the second electronic equipment sends a second message through a third antenna, wherein the second message comprises the encrypted user account; receiving a request message from an application server of a first social application; receiving a first user operation for confirming the addition; responding to the first user operation, and sending a reply message to the application server by the second electronic equipment; the reply message is used for indicating confirmation addition; the preset first safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a clear text mode.
According to the method, operations of adding friends and group members among users can be reduced, time-consuming time is shortened, the use of the users is facilitated, and user experience is improved.
In one possible design, the second electronic device receives a first message from the first electronic device; comprising the following steps: receiving a first message from a first electronic device in a Bluetooth or ZigBee wireless communication mode;
the second electronic device sends a second message through the fourth antenna; comprising the following steps: and the second electronic equipment sends a second message through the fourth antenna in a Bluetooth or ZigBee wireless communication mode.
In one possible design, the second electronic device may further comprise, prior to receiving the first message from the first electronic device:
the second electronic equipment receives the group member service adding message or friend service adding message from the first electronic equipment in a Wi-Fi perceived wireless communication mode;
and responding to the group member service adding message or the friend service adding message, and sending a response message to the first electronic device by the second electronic device through the third antenna in a Wi-Fi perceived wireless communication mode. In the method, under the scene that the first electronic device and the second electronic device are not connected to the same router, the two electronic devices can also realize communication in a Wi-Fi sensing wireless communication mode.
In one possible design, the second electronic device receives a first message from the first electronic device; comprising the following steps: receiving a first message from a first electronic device in a Wi-Fi aware wireless communication mode;
the second electronic device sends a second message through the fourth antenna; comprising the following steps: and the second electronic equipment sends a second message to the first electronic equipment in a Wi-Fi perceived wireless communication mode through the fourth antenna. In the method, under the scene that the first electronic device and the second electronic device are not connected to the same router, the two electronic devices can also realize communication in a Wi-Fi sensing wireless communication mode.
In one possible design, a second electronic device receives a request message from an application server of the first social application; comprising the following steps: receiving a request message from an application server of the first social application, and acquiring the decrypted request message through a decryption mechanism of the first social application;
the second electronic equipment sends a reply message to the application server; comprising the following steps: and the first electronic equipment sends a reply message to the application server through an encryption mechanism of the first social application. In the method, the first electronic equipment and the application server of the first social application are communicated through an encryption and decryption mechanism, so that the safety of communication can be ensured.
In an eighth aspect, an embodiment of the present application provides a method for adding group members or friends, which is applied to a second electronic device. The second electronic device is provided with a first social application, and comprises: the third antenna has a transmitting distance of a third distance which is larger than a preset second safety distance; the transmitting distance of the fourth antenna is a fourth distance, and the fourth distance is smaller than or equal to a preset second safety distance; wherein the third antenna and the fourth antenna are different antennas; the method comprises the following steps: receiving an add group member service message or an add friend service message from a first electronic device; responding to the addition of the group member service message or the friend service message, and acquiring a user account of the second electronic equipment on the first social application; the second electronic device sends a first message to the first electronic device through a fourth antenna; the first message includes a user account of the second electronic device on the first social application; receiving a second response message from an application server of the first social application; responding to the second response message, prompting by the second electronic equipment, wherein the user account is added with group success, or the user account is added with friends successfully; the preset second safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a clear text mode.
In one possible design, the second electronic device receives a second response message from an application server of the first social application; comprising the following steps: and receiving a second response message from the application server of the first social application, and acquiring the decrypted second response message through a decryption mechanism of the first social application.
In one possible design, after the second electronic device prompting, the method further includes: the second electronic device switches to the third antenna.
The beneficial message of each embodiment in the eighth aspect may refer to the sixth aspect or the seventh aspect, and the description is not repeated here.
In a ninth aspect, an embodiment of the present application provides a method for adding group members or friends, which is applied to a second electronic device. The second electronic device is provided with a first social application, and comprises: the third antenna has a transmitting distance of a third distance which is larger than a preset second safety distance; the transmitting distance of the fourth antenna is a fourth distance, and the fourth distance is smaller than or equal to a preset second safety distance; wherein the third antenna and the fourth antenna are different antennas; the method comprises the following steps: receiving an add group member service message or an add friend service message from a first electronic device; in response to adding the group member service message or adding the friend service message, the second electronic device generates a random key; the second electronic device sends the first message through the fourth antenna; the first message includes a random key; after the distance between the first electronic equipment and the second electronic equipment is smaller than or equal to a preset first safety distance, the second electronic equipment receives a second message from the first electronic equipment, decrypts the second message by using a random key, acquires a group identifier on a first social application, or acquires a user account of the first electronic equipment on the first social application, and acquires a user account of the second electronic equipment on the first social application; the second electronic device sends a request message to an application server of the first social application through the third antenna and the first social application; the request message includes a group identification or a user account of the first electronic device on the first social application, and a user account of the second electronic device on the first social application; receiving a second response message from the application server; responding to the second response message, prompting by the second electronic equipment, wherein the user account is added with group success, or the user account is added with friends successfully; the preset first safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a clear text mode.
In one possible design, a second electronic device receives a second response message from the application server; comprising the following steps: and receiving a second response message from the application server, and acquiring the decrypted second response message through a decryption mechanism of the first social application.
In one possible design, the wireless communication between the first electronic device and the second electronic device is one of Wi-Fi sensing, bluetooth and ZigBee.
The beneficial message of each embodiment in the ninth aspect may be referred to the sixth aspect or the seventh aspect, and the description thereof will not be repeated here.
In a tenth aspect, an embodiment of the present application provides a method for adding group members or friends, which is applied to a second electronic device. The second electronic device is provided with a first social application, and comprises: the third antenna has a third transmission distance under third transmission power, a fourth transmission distance under fourth transmission power, and the third distance is larger than a preset second safety distance and smaller than or equal to the preset second safety distance; the method comprises the following steps: after the distance between the first electronic device and the second electronic device is smaller than or equal to a preset first safety distance, a first message from the first electronic device is received; responding to the first message, acquiring a random key from the first message, acquiring a user account of the second electronic equipment on the first social application, and encrypting the user account by using the random key; the second electronic equipment sends a second message through a third antenna under the fourth transmitting power, wherein the second message comprises the encrypted user account; receiving a second response message from an application server of the first social application; responding to the second response message, prompting by the second electronic equipment, wherein the user account is added with group success, or the user account is added with friends successfully; the preset first safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a clear text mode.
In one possible design, the second electronic device receives a first message from the first electronic device, including: receiving a first message from a first electronic device in a Bluetooth or ZigBee wireless communication mode;
the second electronic equipment sends a second message through the third antenna under the fourth transmitting power; comprising the following steps: and the second electronic equipment sends a second message through the third antenna under the fourth transmitting power in a Bluetooth or ZigBee wireless communication mode.
In one possible design, the second electronic device may further comprise, prior to receiving the first message from the first electronic device:
the second electronic equipment receives the group member service adding message or friend service adding message from the first electronic equipment in a Wi-Fi perceived wireless communication mode;
and responding to the group member service adding message or the friend service adding message, and sending a response message to the first electronic equipment by the second electronic equipment through the third antenna under the fourth transmitting power in a Wi-Fi sensing wireless communication mode.
In one possible design, the second electronic device receives the first message from the first electronic device; comprising the following steps: receiving a first message from a first electronic device in a Wi-Fi aware wireless communication mode;
The second electronic equipment sends a second message through the third antenna under the fourth transmitting power; comprising the following steps: and the second electronic equipment sends a second message to the first electronic equipment in a Wi-Fi perceived wireless communication mode through the third antenna under the fourth transmitting power.
In one possible design, a second electronic device receives a second response message from an application server of the first social application; comprising the following steps: and receiving a second response message from the application server of the first social application, and acquiring the decrypted second response message through a decryption mechanism of the first social application.
The beneficial message of each embodiment in the tenth aspect may be referred to the sixth aspect or the seventh aspect, and the description thereof will not be repeated here.
In an eleventh aspect, an embodiment of the present application provides a method for adding group members or friends, which is applied to a second electronic device. The second electronic device is provided with a first social application, and comprises: the third antenna has a third distance at a third transmitting power, a fourth distance at a fourth transmitting power, the third distance is larger than a preset second safety distance, and the fourth distance is smaller than or equal to the preset second safety distance. The method comprises the following steps: receiving an add group member service message or an add friend service message from a first electronic device; responding to the addition of the group member service message or the friend service message, and acquiring a user account of the second electronic equipment on the first social application; the second electronic equipment sends a first message to the first electronic equipment through a third antenna under fourth transmitting power; the first message includes a user account of the second electronic device on the first social application; receiving a second response message from an application server of the first social application; responding to the second response message, prompting by the second electronic equipment, wherein the user account is added with group success, or the user account is added with friends successfully; the preset second safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a clear text mode.
In one possible design, a second electronic device receives a second response message from an application server of the first social application; comprising the following steps: and receiving a second response message from the application server of the first social application, and acquiring the decrypted second response message through a decryption mechanism of the first social application.
In one possible design, after the second electronic device prompting, the method further includes: the second electronic device adjusts the transmit power of the third antenna to a third transmit power.
The beneficial message of each embodiment in the eleventh aspect may refer to the sixth aspect or the seventh aspect, and the description is not repeated here.
In a twelfth aspect, an embodiment of the present application provides a method for adding group members or friends, which is applied to a second electronic device. The second electronic device is provided with a first social application, and comprises: the third antenna has a third distance at a third transmitting power, a fourth distance at a fourth transmitting power, the third distance is larger than a preset second safety distance, and the fourth distance is smaller than or equal to the preset second safety distance. The method comprises the following steps: receiving an add group member service message or an add friend service message from a first electronic device; in response to adding the group member service message or adding the friend service message, the second electronic device generates a random key; the second electronic equipment sends the first message through a third antenna under the fourth transmitting power; the first message includes a random key; after the distance between the first electronic device and the second electronic device is smaller than or equal to a preset first safety distance, the second electronic device receives a second message from the first electronic device, decrypts the second message by using a random key, acquires a group identifier on the first social application, or acquires a user account of the first electronic device on the first social application, and acquires a user account of the second electronic device on the first social application; the second electronic equipment sends a request message to an application server of the first social application through a third antenna and the first social application under a third transmitting power; the request message includes a group identification or a user account of the first electronic device on the first social application, and a user account of the second electronic device on the first social application; receiving a second response message from the application server; responding to the second response message, prompting by the second electronic equipment, wherein the user account is added with group success, or the user account is added with friends successfully; the preset first safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a clear text mode.
In one possible design, a second electronic device receives a second response message from the application server; comprising the following steps: and receiving a second response message from the application server, and acquiring the decrypted second response message through a decryption mechanism of the first social application.
In one possible design, the wireless communication between the first electronic device and the second electronic device is one of Wi-Fi sensing, bluetooth and ZigBee.
The beneficial message of each embodiment in the twelfth aspect may refer to the sixth aspect or the seventh aspect, and the description is not repeated here.
In a thirteenth aspect, an embodiment of the present application provides a method for adding group members or friends, which is applied to a first electronic device and a second electronic device. The first electronic device is operated with a first social application, and the first electronic device comprises: the first antenna has a transmitting distance of a first distance which is larger than a preset first safety distance; the transmitting distance of the second antenna is a second distance, and the second distance is smaller than or equal to a preset first safety distance; wherein the first antenna and the second antenna are different antennas; the second electronic device is provided with a first social application, and comprises: the third antenna has a transmitting distance of a third distance which is larger than a preset second safety distance; the transmitting distance of the fourth antenna is a fourth distance, and the fourth distance is smaller than or equal to a preset second safety distance; wherein the third antenna and the fourth antenna are different antennas. The method comprises the following steps:
The method comprises the steps that first electronic equipment receives first user input, and the first electronic equipment generates a random key; the first electronic device sends a first message through the second antenna, wherein the first message comprises a random key; after the distance between the first electronic device and the second electronic device is smaller than or equal to a preset first safety distance, the second electronic device receives a first message from the first electronic device; responding to the first message, the second electronic equipment acquires a random key from the first message, acquires a user account of the second electronic equipment on the first social application, and encrypts the user account by using the random key; the second electronic equipment sends a second message through a fourth antenna, wherein the second message comprises the encrypted user account; the first electronic device receives a second message from the second electronic device; the first electronic equipment decrypts the second message by using the random key, and obtains a user account on the first social application; the first electronic device sends a request message to an application server of the first social application through the first social application and the first antenna; the request message includes a user account; the request message also comprises a corresponding group identifier input by the first user or a user account of the first electronic device on the first social application; the first electronic device receives a first response message from the application server; responding to the first response message, prompting by the first electronic equipment, and inputting a group member corresponding to the group by the first user to succeed in adding, or succeed in adding friends by the first electronic equipment on a user account of the first social application; the second electronic device receives a second response message from an application server of the first social application; responding to the second response message, wherein the second electronic equipment prompts that the user account is added with group success or that the user account is added with friends successfully; the preset first safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a clear text mode.
The beneficial messages of the various embodiments in the thirteenth aspect may be referred to the above first aspect and the sixth aspect, and the description thereof will not be repeated here.
In a fourteenth aspect, embodiments of the present application provide a communication system, which may include the first electronic device as set forth in the first aspect and the second electronic device as set forth in the sixth aspect, or the first electronic device as set forth in the second aspect and the second electronic device as set forth in the seventh aspect, or the first electronic device as set forth in the third aspect and the second electronic device as set forth in the eighth aspect, or the first electronic device as set forth in the fourth aspect and the second electronic device as set forth in the tenth aspect, or the first electronic device as set forth in the fifth aspect and the second electronic device as set forth in the eleventh aspect.
In a fifteenth aspect, embodiments of the present application provide a first electronic device including a processor and a memory. Wherein the memory is for storing one or more computer programs; the one or more computer programs, when executed by the processor, enable the first electronic device to implement the method of any aspect and any possible design in any aspect performed by the first electronic device described above.
In a sixteenth aspect, embodiments of the present application provide a second electronic device comprising a processor and a memory. Wherein the memory is for storing one or more computer programs; the one or more computer programs, when executed by the processor, enable the second electronic device to implement the method of any aspect and any possible design in any aspect performed by the second electronic device described above.
In a seventeenth aspect, the present application further provides an apparatus comprising means/units for performing the method of any one of the possible designs of the above aspect. These modules/units may be implemented by hardware, or may be implemented by hardware executing corresponding software.
In an eighteenth aspect, there is further provided in an embodiment of the present application a computer readable storage medium, including a computer program, which when run on a first electronic device causes the first electronic device to perform the method of any one of the above aspects and any one of the possible designs of any of the aspects.
In a nineteenth aspect, there is further provided in an embodiment of the present application a computer readable storage medium, including a computer program, which when run on a second electronic device causes the second electronic device to perform the method of any of the above aspects and any of the possible designs of any of the aspects.
In a twentieth aspect, embodiments of the present application also provide a method comprising a computer program product, which when run on a first electronic device, causes the first electronic device to perform any of the above aspects and any of the possible designs of any of the aspects.
In a twenty-first aspect, embodiments of the present application also provide a method comprising a computer program product, which when run on a second electronic device, causes the second electronic device to perform any of the above-described aspects and any of the possible designs of any of the aspects.
In a twenty-third aspect, embodiments of the present application further provide a chip or a chip system, which is coupled to a memory for executing a computer program stored in the memory, to perform the method of any of the above aspects and any of the possible designs of any of the aspects.
The technical effects that can be achieved by the various designs in any one of the fourteenth aspect to the twenty-third aspect are referred to for description of the technical effects that can be achieved by the various designs in the first aspect to the thirteenth aspect, and the detailed description is not repeated here.
Drawings
Fig. 1A to 1D are schematic interface diagrams of a set of friend adding methods;
fig. 2 is a schematic view of a scenario of a method for adding group members or friends according to an embodiment of the present application;
fig. 3A is a schematic hardware structure of an electronic device according to an embodiment of the present application;
fig. 3B is a schematic software structure of an electronic device according to an embodiment of the present application;
fig. 4A is a schematic diagram of a wireless communication module and an antenna according to an embodiment of the present disclosure;
fig. 4B is another schematic diagram of a wireless communication module and an antenna according to an embodiment of the present disclosure;
fig. 5A to fig. 5C are schematic views of three specific structures of a wireless communication module and an antenna according to an embodiment of the present application;
fig. 6 is a schematic diagram of a wireless communication module and a transmission distance of an antenna according to an embodiment of the present application;
fig. 7 is a schematic diagram of a user operation in a group or friend adding method provided in an embodiment of the present application;
fig. 8A to fig. 8C are schematic diagrams of a friend adding method according to a first embodiment of the present disclosure;
fig. 9A to fig. 9B are schematic diagrams of a friend adding method according to a second embodiment of the present disclosure;
fig. 10A to fig. 10B are schematic diagrams of a friend adding method according to a third embodiment of the present disclosure;
11A-11D are schematic diagrams illustrating a group member adding method according to a fourth embodiment of the present application;
fig. 12A to 12B are schematic diagrams of a group member adding method according to a fifth embodiment of the present application;
FIG. 13 is a flowchart of a group member adding method according to a sixth embodiment of the present disclosure;
FIG. 14A is a flowchart of a group member adding method according to a seventh embodiment of the present disclosure;
fig. 14B is a flow chart of a friend adding method provided in the seventh embodiment of the present application;
fig. 15 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
fig. 16 is a schematic structural diagram of a communication system according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application are described below with reference to the drawings in the embodiments of the present application. In the description of the embodiments of the present application, the terminology used in the embodiments below is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of this application and the appended claims, the singular forms "a," "an," "the," and "the" are intended to include, for example, "one or more" such forms of expression, unless the context clearly indicates to the contrary. It should also be understood that in the various embodiments herein below, "at least one", "one or more" means one or more than two (including two). The term "and/or" is used to describe an association relationship of associated objects, meaning that there may be three relationships; for example, a and/or B may represent: a alone, a and B together, and B alone, wherein A, B may be singular or plural. The character "/" generally indicates that the context-dependent object is an "or" relationship.
Reference in the specification to "one embodiment" or "some embodiments" or the like means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," and the like in the specification are not necessarily all referring to the same embodiment, but mean "one or more but not all embodiments" unless expressly specified otherwise. The terms "comprising," "including," "having," and variations thereof mean "including but not limited to," unless expressly specified otherwise. The term "coupled" includes both direct and indirect connections, unless stated otherwise. The terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated.
In the embodiments of the present application, words such as "exemplary" or "such as" are used to mean serving as examples, illustrations, or descriptions. Any embodiment or design described herein as "exemplary" or "for example" should not be construed as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present related concepts in a concrete fashion.
To be used for
Figure BDA0002924900840000131
For example, the description of fig. 1A to 1D will be given by the operation of the user and the display and switching of the graphical user interface (graphical user interface, GUI) by way of example. For convenience of description, mobile devices are taken as examples of mobile phones in the following description. In fig. 1A (a), user Alisa clicks +.>
Figure BDA0002924900840000132
Figure BDA0002924900840000133
The icon 101 is applied, after which the user interface 101 in fig. 1A (a) is switched to the user interface 110 in fig. 1A (b). In fig. 1A (b), the user Alisa clicks on control 111 on the user interface 110 of his cell phone, popup window 1100. After the user Alisa clicks the add friend control 1101, the mobile phone may perform friend adding.
Illustratively, when the user Alisa clicks the add buddy control 1101, the handset displays a user interface 120 as shown in fig. 1A (c). The user Alisa may input a micro signal of the friend to be added or a mobile phone number of the friend, etc. in the search input box control 121 in the user interface 120, so as to find the friend to be added. Assume that the user Alisa has entered a buddy's phone number in the search input box control 121 in the user interface 120, and the phone displays the user interface 130 as shown in fig. 1A (d). When the mobile phone detects the operation on the search control 131, the mobile phone faces to
Figure BDA0002924900840000134
The application server of the application sends a search request and the mobile phone is from +.>
Figure BDA0002924900840000135
An application server of the application obtains the search result.
Suppose that the handset is from
Figure BDA0002924900840000136
The application server of the application successfully obtains the account information of the friend, see the user interface 140 shown in (e) of fig. 1B. The user interface 140 includes WeChat account information for friends Lucas to be added. After the user Alisa acts on the operation of adding to the address book control 141, the handset displays a user interface 150 as shown in (f) of fig. 1B. The user Alisa may input information for authentication of each other, set rights, etc. at the user interface 150. After the user Alisa is set, click on the send control 151, the user Alisa's mobile phone 100 is +.>
Figure BDA0002924900840000137
And the application server of the application sends a friend adding request.
Further, when the user Lucas receives a buddy addition request from the user alissa, the user Lucas's cell phone may display a user interface 160 as shown in fig. 1C (g). The user interface 160 is an interface of a friend adding request, and includes verification information sent by the user Alisa of the opposite side and WeChat account information of the user Alisa. When the user Lucas clicks on the operation of the go-to-verification control 161 in the user interface 160, a user interface 170 as shown in (h) in fig. 1C is displayed. If the user Lucas agrees to the add request, the user Lucas can click on the completion control 171 in the user interface 170, and the handset sends a friend add request pass through message to the application server.
Further, the mobile phone 100 of the user Alisa receives the buddy addition request pass message from the application server, and then the mobile phone displays the user interface 180 as shown in (i) of fig. 1D. After a click operation of the Lucas friend control 181 by the user Alisa on the user interface 180, the handset displays a user interface 190 as shown in (j) of FIG. 1D. The user interface 190 includes messages for prompting the user's Alisa for the handset 100 to authenticate, which may send and receive instant messages to and from each other in the user interface 190.
It can be seen that in the process of adding friend Lucas to user Alisa, user Alisa is opened
Figure BDA0002924900840000138
After application, the friend addition can be completed through multiple times of manual operations, so that the user operation is complicated, the time consumption is long, the user experience is poor, the popularization of social applications is not facilitated, and the popularization of newly marketed social applications is not facilitated. />
In order to solve the above technical problems, the present application provides a group or friend adding method, which can add group members or friends through an ultra-short distance frame and a wireless fidelity (wireless fidelity, wi-Fi) network sensing technology, because the ultra-short distance frame can only be received by an electronic device of a sender within a preset safety distance, the safety of communication can be ensured. In addition, the method reduces the complexity of adding friends among users on the basis of guaranteeing information safety, improves user experience and improves communication efficiency.
The friend adding method provided by the embodiment of the application can be applied to the communication system architecture shown in fig. 2. As shown in fig. 2, at least one of the plurality of electronic devices (including but not limited to electronic device 100, electronic device 200, …) is capable of supporting transmission of ultra-short range frames. For example, the electronic device 100 can transmit ultra-short range frames. When the distance between the electronic device 100 and the electronic device 200 is less than or equal to the preset safe distance, the electronic device 200 can receive the ultra-short distance frame from the electronic device 100. In this way, it can be ensured that the content in the ultra-short distance frame is not acquired by other electronic devices, and the electronic device 200 acquires the user account or the group account from the ultra-short distance frame, and then can perform friend addition or group member addition.
It will be appreciated that the electronic device 100 and the electronic device 200 are both illustrated schematically in fig. 2 by way of example using a mobile phone. The electronic device 100 and the electronic device 200 may also be any electronic device such as a smart speaker, a smart watch, a smart bracelet, a smart television (also referred to as a smart screen), a smart home device, and the like. The system shown in fig. 2 may also include other electronic devices. The embodiments of the present application are not limited in this regard.
In fig. 2, each electronic device may communicate with each other through a communication network, or may communicate with each other through a communication network. The communication network may be a local area network, a wide area network switched through a relay (relay) device, or a hybrid network composed of a local area network and a wide area network.
Where the communication network is a local area network, the communication network may be a Wi-Fi hotspot network, a Wi-Fi peer-to-peer (P2P) network, a bluetooth network, a Zigbee network, or a near field communication (near field communication, NFC) network, for example. When the communication network is a wide area network, the communication network may be, by way of example, a third generation mobile communication technology (3 rd-generation wireless telephone technology, 3G) network, a fourth generation mobile communication technology (4th generation mobile communication technology,4G) network, a fifth generation mobile communication technology (5 th-generation mobile communication technology, 5G) network, a future evolved public land mobile network (public land mobile network, PLMN), the internet, etc. In the scenario illustrated in fig. 2, data interacted with by different electronic devices over a communication network, including, but not limited to: at least one of a user account or a group account, a picture, a text, a video, or a result of processing an object such as the picture, the text, the video, etc. by the electronic device.
Embodiments of electronic devices, user interfaces for such electronic devices, and for using such electronic devices provided by embodiments of the present application are described below. In some embodiments, the electronic device may be a portable electronic device such as a smart phone, tablet, laptop (Laptop), wearable electronic device with wireless communication capabilities (e.g., a smart watch), and the like. It should be appreciated that in other embodiments, the electronic device described above may be a stationary electronic device (e.g., a desktop computer, etc.) rather than a portable electronic device. In some embodiments, the electronic device may be a smart home device, such as a smart speaker.
Illustratively, fig. 3A shows a hardware structure of the electronic device 100. As shown in fig. 3A, the electronic device 100 includes a processor 310, an external memory interface 320, an internal memory 321, a universal serial bus (universal serial bus, USB) interface 330, a charge management module 340, a power management module 341, a battery 342, an antenna 1, an antenna 2, a mobile communication module 350, a wireless communication module 360, an audio module 370, a speaker 370A, a receiver 370B, a microphone 370C, an earphone interface 370D, a sensor module 380, keys 390, a motor 391, an indicator 392, a camera 393, a display 394, a user identification module (subscriber identification module, SIM) card interface 395, and the like. The sensor module 380 may include a pressure sensor 380A, a gyroscope sensor 380B, a barometric pressure sensor 380C, a magnetic sensor 380D, an acceleration sensor 380E, a distance sensor 380F, a proximity sensor 380G, a fingerprint sensor 380H, a temperature sensor 380J, a touch sensor 380K, an ambient light sensor 380L, a bone conduction sensor 380M, and the like.
Processor 310 may include one or more processing units. For example: the processor 310 may include an application processor (application processor, AP), a modem processor, a graphics processor (graphics processing unit, GPU), an image signal processor (image signal processor, ISP), a controller, a video codec, a digital signal processor (digital signal processor, DSP), a baseband processor, and/or a neural-Network Processor (NPU), etc. Wherein the different processing units may be separate devices or may be integrated in one or more processors.
The electronic device implements display functions through the GPU, display screen 394, and application processor, etc. The GPU is a microprocessor for image processing, connected to the display screen 394 and the application processor. The GPU is used to perform mathematical and geometric calculations for graphics rendering. Processor 310 may include one or more GPUs that execute program instructions to generate or change display information.
The electronic device may implement the photographing function through the ISP, the camera 393, the video codec, the GPU, the display screen 394, the application processor, and the like.
The SIM card interface 395 is for interfacing with a SIM card. The SIM card may be inserted into the SIM card interface 395 or removed from the SIM card interface 395 to enable contact and separation with the electronic device. The electronic device may support 1 or N SIM card interfaces, N being a positive integer greater than 1. The SIM card interface 395 may support Nano SIM cards, micro SIM cards, and the like. The same SIM card interface 395 can be used to insert multiple cards simultaneously. The types of the plurality of cards may be the same or different. The SIM card interface 395 may also be compatible with different types of SIM cards. The SIM card interface 395 may also be compatible with external memory cards. The electronic equipment interacts with the network through the SIM card, so that the functions of communication, data communication and the like are realized. In some embodiments, the electronic device employs esims, namely: an embedded SIM card.
The wireless communication function of the electronic device may be implemented by the antenna 1, the antenna 2, the mobile communication module 350, the wireless communication module 360, a modem processor, a baseband processor, and the like. The antennas 1 and 2 are used for transmitting and receiving electromagnetic wave signals. Each antenna in the electronic device may be used to cover a single or multiple communication bands. Different antennas may also be multiplexed to improve the utilization of the antennas. For example: the antenna 1 may be multiplexed into a diversity antenna of a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
The mobile communication module 350 may provide a solution for wireless communication including 2G/3G/4G/5G, etc. applied on an electronic device. The mobile communication module 350 may include at least one filter, switch, power amplifier, low noise amplifier (low noise amplifier, LNA), etc. The mobile communication module 350 may receive electromagnetic waves from the antenna 1, perform processes such as filtering, amplifying, and the like on the received electromagnetic waves, and transmit the processed electromagnetic waves to the modem processor for demodulation. The mobile communication module 350 may amplify the signal modulated by the modem processor, and convert the signal into electromagnetic waves through the antenna 1 to radiate the electromagnetic waves. In some embodiments, at least some of the functional modules of the mobile communication module 350 may be disposed in the processor 310. In some embodiments, at least some of the functional modules of the mobile communication module 350 may be provided in the same device as at least some of the modules of the processor 310.
The wireless communication module 360 may provide solutions for wireless communication including wireless local area network (wireless local area networks, WLAN) (e.g., wireless fidelity (wireless fidelity, wi-Fi) network), bluetooth (BT), global navigation satellite system (global navigation satellite system, GNSS), frequency modulation (frequency modulation, FM), near field wireless communication technology (near field communication, NFC), infrared (infrared radiation, IR) technology, etc., as applied on electronic devices. The wireless communication module 360 may be one or more devices that integrate at least one communication processing module. The wireless communication module 360 receives electromagnetic waves via the antenna 2, modulates the electromagnetic wave signals, filters the electromagnetic wave signals, and transmits the processed signals to the processor 310. The wireless communication module 360 may also receive a signal to be transmitted from the processor 310, frequency modulate it, amplify it, and convert it to electromagnetic waves for radiation via the antenna 2.
In some embodiments, the antenna 1 and the mobile communication module 350 of the electronic device are coupled, and the antenna 2 and the wireless communication module 360 are coupled, so that the electronic device can communicate with the network and other devices through wireless communication technology. The wireless communication techniques may include a global system for mobile communications (global system for mobile communications, GSM), general packet radio service (general packet radio service, GPRS), code division multiple access (code division multiple access, CDMA), wideband code division multiple access (wideband code division multiple access, WCDMA), time division code division multiple access (time-division code division multiple access, TD-SCDMA), long term evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC, FM, and/or IR techniques, among others.
It will be appreciated that the components shown in fig. 3A do not constitute a particular limitation of the electronic device, and that the electronic device may also include more or less components than illustrated, or may combine certain components, or may split certain components, or may have a different arrangement of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware. In addition, the combination/connection relationship between the components in fig. 3A is also adjustable and modifiable.
Fig. 3B is a software architecture block diagram of the electronic device 100 according to an embodiment of the present application. The layered architecture divides the software into several layers, each with distinct roles and branches. The layers communicate with each other through a software interface. In the embodiment of the present application, the software system is divided into three layers, namely, an application layer, a service layer and an Operating System (OS) layer from top to bottom. The application layer may include a series of applications. As shown in FIG. 3B, the application layer may include social applications, contacts, calendars, text messages, and the like.
The service layer includes, but is not limited to, ultra short range services and the like. An application in the application layer may initiate registration with an ultra-short range service of the service layer and then be able to receive an ultra-short range event notification from the ultra-short range service. The ultra-short distance service comprises ultra-short distance event registration, ultra-short distance event notification, ultra-short distance packet receiving and transmitting and receiving and the like. The ultra-short distance service is to provide the capability of using ultra-short distance for the application supporting the ultra-short distance service, and to enable the un-started application to still receive the subscribed ultra-short distance package, so the software structure is provided with the ultra-short distance service in the service layer. Illustratively, the social application registers with the ultra-short distance service the characteristics of the ultra-short distance package that it is interested in, such as the service name (service name) and the feature value (what is a certain field value) of the package using Wi-Fi awareness (NAN). The ultra short range packet may be a service discovery frame (service discovery frame, SDF) such as Wi-Fi aware (NAN), or a broadcast beacon (beacon) frame of bluetooth, or may not be limited to the two frames.
The operating system layer includes a protocol stack and a driver. The protocol stack comprises a BLE protocol stack, a Wi-Fi protocol stack and a NAN protocol stack. The driving comprises ultra-short distance mode control, ultra-short distance transmission control, ultra-short distance duty ratio control, wi-Fi driving, bluetooth driving, ultra-short distance packet receiving and transmitting and the like.
In the embodiment of the present application, the electronic device 100 may include at least one of a Wi-Fi chip, a bluetooth chip, a Zigbee chip, and the like. When any chip such as Wi-Fi, bluetooth chip or Zigbee chip receives the ultra-short distance frame, the ultra-short distance frame is transmitted to ultra-short distance service in a service layer through an operating system layer, the ultra-short distance service is matched with the characteristics of the ultra-short distance packet, and then the ultra-short distance service is transmitted to social application in an application program layer. If the social application is not started, the ultra-short distance service can also call the social application through the ultra-short distance event notification, and then the ultra-short distance package is transferred to the social application. And when the social application needs to send the ultra-short distance packet, the ultra-short distance packet can be sent by using an interface provided by the ultra-short distance service and sent by a Wi-Fi or Bluetooth chip through an operating system layer.
In one example, fig. 4A illustrates a schematic structure of a wireless communication module and an antenna in the electronic device 100 according to the embodiment of the present application. As shown in fig. 4A, the electronic device 100 may include a processor 310, a wireless communication module 360, a first antenna, and a second antenna.
Wherein the first antenna and the second antenna are used for transmitting and receiving electromagnetic waves. Further, the wireless communication module 360 converts electromagnetic waves received from the first antenna or the second antenna into signals and transmits the signals to the processor 310 for processing; or the wireless communication module 360 receives a signal to be transmitted from the processor 310, and converts the signal into electromagnetic waves to radiate the electromagnetic waves through the first antenna or the second antenna.
In this embodiment of the present application, the wireless transmission distance when the first antenna works is greater than the wireless transmission distance when the second antenna works. The first transmitting distance of the first antenna transmitting signals is larger than a preset safety distance, and the second transmitting distance of the second antenna transmitting signals is smaller than or equal to the preset safety distance. For example, the range of the first transmission distance of the first antenna may be (4 meters, 20 meters), and the range of the second transmission distance of the second antenna may be (3 cm,2 meters). The value range of the first transmitting distance can be determined according to the minimum distance and the maximum distance covered by the wireless transmitting power when the first antenna works, or can be preset by a developer; the value range of the second transmitting distance can be determined according to the minimum distance and the maximum distance covered by the wireless transmitting power when the second antenna works, or can be preset by a developer. The preset safety distance is the safety distance of the interaction secret information between the electronic devices. The preset safe distance can be determined according to the maximum distance covered by the wireless transmission power when the second antenna works, and can also be a distance preset by a developer. For example, the predetermined safe distance may be 10cm, 5cm, etc. Illustratively, the preset safe distance may be in the range of (0 cm,30 cm). In this way, when the distance between the electronic apparatus 100 and the electronic apparatus 200 is less than or equal to the preset secure distance, the electronic apparatus 200 can receive the secret information transmitted by the electronic apparatus 100. In this way, the safety risk is reduced.
In some embodiments, the processor 310 may control the switching of the first antenna and the second antenna. When the electronic device 100 adopts the first antenna, the electronic device 100 can receive a message sent by the electronic device 200 when the distance between the electronic device 100 and the electronic device 200 is smaller than the first transmission distance; when the electronic device 200 employs the second antenna, the distance between the electronic device 100 and the other electronic device 200 is smaller than the second transmission distance, and the electronic device 100 is able to receive the message sent by the electronic device 200. In some embodiments, the first and second transmission distances may also be referred to as first and second distances, respectively.
In another example, fig. 4B illustrates another principle structure of a wireless communication module and an antenna in the electronic device 100 provided in the embodiment of the present application. As shown in fig. 4B, the electronic device 100 may include a processor 310, a wireless communication module 360, and a first antenna; the wireless communication module 360 includes a wireless module 3601 and a variable impedance circuit module 3602. The first antenna is used for transmitting and receiving wireless signals. Illustratively, the variable impedance circuit module 3602 may be a circuit or integrated circuit or the like composed of variable impedances. The processor 310 adjusts the wireless transmission power applied to the first antenna by controlling and adjusting the impedance value of the variable impedance circuit module 3602, thereby controlling the transmission distance when the first antenna transmits the wireless signal. For example, when the impedance value of the variable impedance circuit module 3602 is the first impedance value, the transmission power of the first antenna is the first transmission power, and the distance of the wireless signal transmitted by the first antenna is the first transmission distance (implementing the function of "first antenna" in fig. 4A); when the impedance value of the variable impedance circuit module 3602 is the second impedance value, the transmission power of the first antenna is the second transmission power, and the distance of the wireless signal transmitted by the first antenna is the second transmission distance (the function of "second antenna" in fig. 4A is implemented). Wherein the first transmit power is greater than the second transmit power; the first emission distance is greater than a preset safety distance, and the second emission distance is less than or equal to the preset safety distance. In some embodiments, the first and second transmission distances may be referred to as first and second distances, respectively.
It will be appreciated that the principle structure illustrated in one example corresponding to fig. 4A and another example corresponding to fig. 4B does not constitute a specific limitation on the wireless communication module 360 and antenna in the electronic device 100. In other embodiments, the structure of the wireless communication module 360 and antenna in the electronic device 100 may include more or less components than illustrated, or certain components may be combined, certain components may be split, or different arrangements of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
It should be understood that the wireless communication module 360 shown in fig. 4A may be a Wi-Fi chip, a bluetooth chip or a ZigBee chip, or may be a Wi-Fi chip, a bluetooth chip or a ZigBee chip and a circuit matched with the same. The wireless module 3601 shown in fig. 4B may be a Wi-Fi chip, a bluetooth chip, or a ZigBee chip, and the wireless communication module 360 shown in fig. 4B may be a Wi-Fi chip, a bluetooth chip, or a ZigBee chip and a circuit matched therewith.
Fig. 5A-5C illustrate, by way of example, three implementations of the second antenna of fig. 4A. As shown in fig. 5A-5C, the first antenna and the second antenna may share a portion of the trace. The first antenna may also be referred to as a true antenna or a strong antenna, and the second antenna may also be referred to as a false antenna or a weak antenna.
In the embodiment of the application, the first antenna and the second antenna of the electronic device can be switched through the radio frequency switch. The second antenna and the radio frequency switch (shown as a second antenna in phantom in fig. 5A-5C) may both be physically located within the shield or the second antenna may be located within the chip.
The purpose of the second antenna in the embodiments of the present application is to reduce the transmission distance as much as possible. The principle of constructing the second antenna may be:
(1) Reducing the antenna length, thereby reducing electromagnetic waves radiated into the air;
(2) Reducing radiation efficiency, converting a part of electromagnetic wave radiation into heat energy through impedance to consume;
(3) The return loss is reduced, and part of radio frequency energy is reflected back to the inside of the chip, etc.
The specific implementation of the second antenna may employ:
(i) Shortening the antenna;
(ii) Disconnecting a point in the true antenna path or grounding the point through a resistor, an inductor or a capacitor;
(iii) A shield or the like is used.
It should be appreciated that the specific implementations (i) and (ii) of the second antenna described above may be implemented on a PCB board or inside a chip (Wi-Fi chip, bluetooth chip or ZigBee chip).
It will also be appreciated that the above-described shield acts to reduce the intensity of the externally radiated signal for purposes of attenuating radiation.
It should also be understood that the above-mentioned shortening of the antenna means that the second antenna is shorter than the first antenna. The structures of the three second antennas shown in fig. 5A to 5C are shown as structures in the dashed boxes of fig. 5A to 5C. The first antenna in fig. 5A to 5C is configured by connecting a filter circuit (e.g., pi-type circuit), a matching circuit (e.g., pi-type circuit), and an antenna body (e.g., the antenna body may be a section of metal wire) outside the matching circuit through a Radio Frequency Input Output (RFIO) pin. The second antenna a shown by the dashed box in fig. 5A, the second antenna B shown by the dashed box in fig. 5B, and the second antenna C shown by the dashed box in fig. 5C are different in length but shorter than the first antenna. The filter circuit is used for preventing interference, and the matching circuit is used for matching with the first antenna.
Illustratively, as shown in fig. 5A, the second antenna a may be located within a shielded enclosure. The second antenna a may include an RFIO pin of a chip (Wi-Fi chip, bluetooth chip, or ZigBee chip) in a shielding case and a first switch of the 2 switches (the first switch is not connected to any device). Sometimes, the second antenna a may also include a trace between the RFIO pin and the first way switch. Wherein, the 2-way switch refers to a switch between a wiring or an RFIO pin and a filter circuit. The wiring or the RFIO pin can be connected with or disconnected from the filter circuit through the 2-way switch. The first switch is the switch shown in fig. 5A connected to the RFIO pin or trace and disconnected from the filter circuit. It should be appreciated that the 2-way switch in embodiments of the present application may be a single pole double throw switch.
Illustratively, as shown in fig. 5B, the second antenna B may be located within the shield. The second antenna b may include an RFIO pin of a chip (Wi-Fi chip, bluetooth chip, or ZigBee chip) in a shielding case, a first switch (a first switch connection resistor) of a 2-way switch, and a matching device. Sometimes, the second antenna b may also include a first trace between the RFIO pin and the first pass switch. Sometimes, the second antenna b may also comprise a second trace between the matching device and ground. The matching means may be a resistor. A part of the electromagnetic wave radiation can be converted into heat energy by the resistive ground, thereby reducing the radiation efficiency of the second antenna b. The 2-way switch refers to a switch between the RFIO pin or the first wiring and the resistor as well as the filter circuit, and through the switch, the RFIO pin or the first wiring can be connected with the resistor and disconnected with the filter circuit, or the RFIO pin or the first wiring can be disconnected with the resistor and connected with the filter circuit. The first switch is a switch which is connected with the matching device and disconnected with the filter circuit in the 2 switches.
Illustratively, as shown in fig. 5C, the second antenna C may be located within the shield. Wherein a matching device (e.g., a resistor) is connected to ground via a chip-matched filter circuit. The second antenna c may include an RFIO pin of a chip (Wi-Fi chip, bluetooth chip, or ZigBee chip) in a shield, a filter circuit, a first switch (a first switch connection resistor) of a 2-way switch, and a matching device (e.g., a resistor). Sometimes, the second antenna c may also include a first trace between the RFIO pin and the filter circuit. Sometimes, the second antenna c may further comprise a second trace between the filter circuit and the matching device. Grounding through a matching device (e.g., a resistor) may convert a portion of the electromagnetic wave radiation into heat energy for consumption, thereby reducing the radiation efficiency of the second antenna c. The 2-way switch refers to a switch between a filter circuit in the shielding case and a matching device and a matching circuit outside the shielding case. The 2-way switch can connect the filter circuit in the shielding case with the matching device and disconnect the filter circuit from the matching circuit outside the shielding case; alternatively, the filter circuit within the shield may be disconnected from the matching device and in communication with the matching circuit outside the shield. The first path of switch is a switch for connecting a filter circuit in the shielding case with a matching device.
It should be understood that the first antenna in fig. 5A to 5B may include an RFIO pin, a second switch of the 2-way switches, a filter circuit, a matching circuit, and an antenna body connected outside the matching circuit. Sometimes, the first antenna in fig. 5A-5B may further include a trace between the RFIO pin and a second of the 2-way switches. The second switch is a switch for connecting the RFIO pin and the filter circuit.
The first antenna in fig. 5C may include an RFIO pin, a filter circuit, a second switch of the 2-way switches, a matching circuit, and an antenna body connected outside the matching circuit. Sometimes, the first antenna in fig. 5C may also include traces between the RFIO pin and the filter circuit. The second switch is a switch for connecting the filter circuit in the shielding case and the matching circuit outside the shielding case.
It should be understood that fig. 5A to 5C are a first antenna and a second antenna physically, and in this embodiment of the present application, the electronic device may also physically have only one antenna, but logically include the first antenna and the second antenna. For example, the electronic device may mask the multistage amplifier inside the chip by adjusting the value of the register so that the transmission power of the physical antenna is the first transmission power, which may be considered as the logical first antenna at this time; the electronic device may also adjust the value of the register so that the transmit power of the physical antenna is the second transmit power, which may be considered a logical second antenna; wherein the first transmit power is greater than the second transmit power.
In the embodiment of the application, the electronic device switches the first antenna and the second antenna on logic through the value of the register in the chip, and the same effect can be achieved as the electronic device switches the first antenna and the second antenna on physical through the radio frequency switch.
The above different second antenna structures are matched with the setting of different transmitting powers (Tx powers) of the Wi-Fi chip, the Bluetooth chip or the ZigBee chip, so that different requirements (for example, from 10cm to 2 m) of ultra-short distance communication can be met.
By way of example, table 1 shows the communication distances of several different second antenna structures in combination with different transmit powers of Wi-Fi chips.
TABLE 1
Figure BDA0002924900840000191
For example, table 2 shows the communication distances of different transmit powers when several different second antenna structures are matched with the bluetooth chip.
TABLE 2
Figure BDA0002924900840000201
For example, table 3 shows the communication distances of different transmission powers when several different second antenna structures are matched with the ZigBee chip.
TABLE 3 Table 3
Figure BDA0002924900840000202
The difference between the maximum transmit power and the minimum transmit power of the antenna is correlated due to the characteristics of the physical device within the chip. If the minimum transmission power of the electronic device is reduced to be very low, the maximum transmission power is also reduced, so that the distance requirement in normal operation is not met. Because the structures of different electronic devices are different and the requirements on the safety performance of the electronic devices are different, manufacturers of the electronic devices can adopt different second antenna structures and different transmitting powers to ensure the communication distance of the electronic devices. For example, the thickness of the electronic device housing may be different for different manufacturers of electronic devices, and thus, in the case where the second antenna structure is the same and the transmission power is the same, the communication distance that the electronic device can be found may also be different. Different electronic equipment manufacturers can cooperate with the structure of the second antenna and a certain transmitting power according to the structure of the electronic equipment, so that the transmitting power corresponding to the safe distance is obtained by combining the test. The user can set the transmitting power for the three second antennas (the second antenna a, the second antenna b and the second antenna c) according to the Wi-Fi chip, the Bluetooth chip and the ZigBee chip which are actually adopted, referring to the table 1, the table 2 and the table 3, and adjust the transmitting power by combining the test result, so that the second antenna achieves the corresponding safe distance during transmitting.
In connection with the above example, as shown in fig. 6, the electronic device 100 located at position 0 and the electronic device 200 located at position 1 or position 2 are exemplified below, the first emission distance being 5 meters and the second emission distance being 3 cm.
When the electronic device 100 transmits a signal through the first antenna at the position 0, the electronic device 200 is located at the position 1, where the distance between the electronic device 100 and the electronic device 200 is smaller than the first transmission distance, and the electronic device 200 may receive the wireless signal transmitted by the electronic device 100. When the electronic device 100 transmits a signal at the position 0 through the second antenna, the electronic device 200 is located at the position 1, and at this time, the distance between the electronic device 100 and the electronic device 200 is greater than the second transmission distance, and the electronic device 200 cannot receive the wireless signal transmitted by the electronic device 100; while in the position 2 where the electronic device 200 is located, the distance between the electronic device 100 and the electronic device 200 is smaller than the second transmission distance, the electronic device 200 may receive the wireless signal transmitted by the electronic device 100. The first emission distance and the second emission distance may be a first distance and a second distance, respectively.
Accordingly, when the electronic device 100 transmits a signal at the position 0 through the first antenna at the first transmission power, the electronic device 200 is located at the position 1, where the distance between the electronic device 100 and the electronic device 200 is smaller than the first transmission distance, and the electronic device 200 may receive the wireless signal transmitted by the electronic device 100. When the electronic device 100 transmits a signal at the position 0 through the first antenna under the second transmission power, the electronic device 200 is located at the position 1, and at this time, the distance between the electronic device 100 and the electronic device 200 is greater than the second transmission distance, and the electronic device 200 cannot receive the wireless signal transmitted by the electronic device 100; while in the position 2 where the electronic device 200 is located, the distance between the electronic device 100 and the electronic device 200 is smaller than the second transmission distance, the electronic device 200 may receive the wireless signal transmitted by the electronic device 100. The first emission distance and the second emission distance may be a first distance and a second distance, respectively.
It should be appreciated that within the predetermined safety distance (e.g., 30 cm) mentioned in the above embodiments, even erroneous packets cannot be grasped using the packet grasper. In practice, the actual distance between the electronic device 100 and the electronic device 200 may be smaller than the preset safe distance. For example, the preset safety distance is 30cm; when the ultra-short distance frame transmitted by the electronic device 100 is received by the electronic device 200, the actual distance between the electronic device 100 and the electronic device 200 is less than 30cm.
Specifically, different transmission distances may be set by setting the magnitude of the transmission power. For example, the radio transmission power corresponding to the first antenna is required to be at least a certain power higher than the radio transmission power corresponding to the second antenna.
In addition, for the wireless transmitting power of the second antenna, the wireless transmitting power of any point with an external antenna on the surface of the product can be required to not exceed the preset power (for example, -65dBm and the like) so as to meet the requirement of the preset safe distance.
The following specifically describes a group member or friend adding method provided in the embodiments of the present application with reference to the accompanying drawings. Fig. 7 is a schematic diagram of an application scenario provided in the embodiment of the present application. As shown in fig. 7, the electronic device of Alisa is electronic device 100, and the electronic device of lucas is electronic device 200.Alisa and Lucas are illustrative examples of users. The electronic device 100 and the electronic device 200 may join a group or add friends upon touching or approaching each other. Wherein the electronic device 100 may include a first antenna and a second antenna, and the electronic device 200 may include a third antenna and a fourth antenna. It should be noted that the third antenna and the first antenna belong to the same antenna, and the fourth antenna and the second antenna belong to the same antenna.
For the electronic device 200, the fourth antenna belongs to the "second antenna" of the electronic device 200. This is to avoid confusion in use of the "second antenna" and is expressed using the "fourth antenna". Accordingly, the third antenna belongs to the "first antenna" of the electronic device 200. Also for reasons of avoiding confusion, a "third antenna" is used for expression. That is, the expression "fourth antenna" is used, not to say that the electronic device 200 includes at least four antennas; but rather to avoid confusion in expression. That is, the electronic device 200 may include two antennas, a "third antenna" and a "fourth antenna," and does not require the mobile device to have four antennas.
Alternatively, the electronic device 100 may include a first antenna; the electronic device 200 comprises a third antenna. The first antenna of the electronic device 100 transmits signals at the first transmit power and the second transmit power, respectively, according to the mechanism shown in fig. 4B, to implement the functions of a strong antenna or a weak antenna, respectively.
Alternatively, the third antenna of the electronic device 200 may also transmit signals with the third transmit power and the fourth transmit power, respectively, according to the mechanism shown in fig. 4B, to implement the functions of a strong antenna or a weak antenna, respectively. At this time, the fourth transmission power belongs to the "second transmission power" of the electronic apparatus 200 for the electronic apparatus 200. This is to avoid confusion in use of the "second transmit power", expressed using the "fourth transmit power". Accordingly, the third transmit power belongs to the "first transmit power" of the electronic device 200. Also for reasons of avoiding confusion, a "third transmit power" is used. That is, the expression "fourth transmission power" is used, not to say that the antenna included in the electronic device 200 has four transmission powers; but rather to avoid confusion in expression. That is, the electronic device 200 may use the antennas of "third transmit power" and "fourth transmit power" and does not require the antennas of the electronic device 200 to have four transmit powers.
For more clarity, the following description is divided into scenario one and scenario two, and the electronic device 100 and the electronic device 200 are specifically referred to as the mobile phone 100 and the mobile phone 200, respectively. Wherein, a scene one exemplarily illustrates a process that Alisa and Lucas mutually add friends on a social application; scenario two illustrates, by way of example, the process of Lucas joining a group via an Alisa introduction on a social application. It should be noted that, the embodiments of the present application are described by taking a non-full screen as an example, and the embodiments of the present application are also applicable to a full screen, which is not limited thereto.
Scene one
The following describes the interaction flow of the friend adding method in a scene specifically through embodiments one to three.
Embodiment one relates to fig. 8A to 8C. Fig. 8A shows an interactive flow diagram of a method of buddy addition in a scenario. As shown in fig. 8A, the method specifically includes the following steps:
s8700, the mobile phone 100 receives an operation of the user, which is to add a friend.
The operation of the user may be a touch operation or a voice operation, which is not limited in the embodiment of the present application.
Illustratively, referring to (a) in fig. 8B, the user interface 800 is the desktop of the user's Alisa cell phone 100. Wherein, the desktop of the mobile phone 100 of the user Alisa comprises a clock, a gallery,
Figure BDA0002924900840000221
Album, weather, browser, settings, social applications, and other applications. Upon detecting operation of clicking on control 801 of the social application, the handset 100 may display a user interface 810 as shown in fig. 8B (B).
Referring to (B) in fig. 8B, the user interface 810 is a display interface of a social application, and the user interface 810 displays information of currently existing contacts of the user Alisa. Illustratively, the social application includes an expansion control 811 on a user interface 810, and when the handset 100 detects an operation of clicking on the expansion control 811, a pop-up box 8100 is displayed. When detecting the operation of clicking the add friend control 8101, the mobile 100 issues an add friend service through the first antenna.
In addition, after detecting the operation of clicking the add friend control 8101, the mobile 100 may further prompt the user Alisa to touch the mobile 200 of the user Lucas, that is, the mobile 100 displays an interface 820 as shown in fig. 8B (c). The interface 820 includes a prompt box that prompts the user to bump with a friend device. Upon receiving the prompt, the user Alisa may approach or touch the phone 100 to the phone 200 of the user Lucas.
S8701, the mobile phone 100 issues an add friend service message through the first antenna.
Illustratively, when the user Alisa opens the "add friends" control 8101 in the social application 801 of the mobile 100, the mobile 100 will issue an add friends service message for discovering surrounding electronic devices subscribed to the service.
Illustratively, the "publication" in S8701 is in the form of a broadcast. The added buddy service message includes a unique identification address such as the IP address or MAC address of the handset 100. Optionally, the friend addition service message also includes an identification of the social application 801. The social application 801 may be uniquely identified by the identification. Optionally, the friend addition service message further includes a user account of the user Alisa on the social application.
S8702, the mobile phone 200 transmits a response message (e.g., acknowledgement (ACK) information) through the third antenna, the response message being used to inform the mobile phone 100 that the service has been received.
It should be noted that, the mobile phone 200 has subscribed to add the friend service in advance. Illustratively, the mobile phone 200 of the user Lucas automatically subscribes to the add-friends service when the social application is opened, or automatically subscribes to the add-friends service when the social application is launched as a resident background application.
Illustratively, after the mobile phone 200 receives the friend service message from the mobile phone 100, the unique identification address such as the IP address or the MAC address of the mobile phone 100 and the identification of the social application 801 are obtained.
Optionally, the response message includes a unique identification address such as an IP address or MAC address of the handset 200.
It should be noted that, through the above S8701 and S8702, the mobile phone 100 may obtain the unique identification address such as the IP address or the MAC address of the mobile phone 200, the mobile phone 200 may also obtain the unique identification address such as the IP address or the MAC address of the mobile phone 100 and the identification of the social application 801, and then the subsequent mobile phone 100 and the mobile phone 200 may send a message to each other through the same social application according to the unique identification address.
S8703, after receiving the response message, the mobile phone 100 randomly generates a key, and obtains a first message containing the key.
S8704, the mobile phone 100 switches from the first antenna to the second antenna.
S8705, the mobile phone 100 sends the first message through the second antenna.
Illustratively, after the mobile phone 100 receives the response message, the mobile phone 100 may switch from the first antenna to the second antenna by controlling the radio frequency switch, and then send the first message through the second antenna; at this time, the first message belongs to an ultra-short distance frame; in this way, the first message sent by the mobile phone 100 is not received by the electronic device outside the preset safe distance from the mobile phone 100.
In this embodiment, the first message may be a Wi-Fi aware frame or a beacon frame. Wi-Fi aware frames are Publish (publich) frames, track-up (Follow-up) frames, or Subscribe (subscore) frames. If the first message is a show-up frame, the key of the user's Alisa handset 100 may be carried in the payload field of the show-up frame. Wi-Fi aware frames are based on Wi-Fi aware technology. Wi-Fi perception technology can support point-to-point communication of mobile phone 100 and mobile phone 200 in a scene without accessing the same router, and can also support point-to-point communication of mobile phone 100 and mobile phone 200 in a scene with the same router.
In one possible implementation, the mobile phone 100 may send the first message through the second antenna, where the success rate of sending and receiving data may be reduced, and then the mobile phone 100 may repeat sending the key multiple times.
S8706, the mobile phone 200 receives the first message and obtains the secret key from the first message within the second distance from the mobile phone 200 to the mobile phone 100.
Illustratively, after the distance between the mobile phone 200 and the mobile phone 100 is smaller than the preset safe distance, the mobile phone 200 may receive the first message and obtain the key therefrom.
S8707, the mobile phone 200 obtains the user account of the social application in the mobile phone 200.
Illustratively, the user Lucas of the mobile phone 200 opens a social application, and the mobile phone 200 may obtain a user account of the user Lucas from the running social application. The social application of the cell phone 200 is the same as the social application of the cell phone 100.
Illustratively, the "user account of the social application" in S8707 includes the user account of the social application that was last logged in.
S8708, the mobile phone 200 encrypts the user account of the social application in the mobile phone 200 using the key, and generates a second message, where the second message includes the encrypted user account.
Illustratively, the mobile phone 200 obtains the user account of the social application of the mobile phone 200, and since the mobile phone 200 is a mobile phone of the user Lucas, generally, the obtained user account of the social application of the mobile phone 200 is the user account of Lucas on the social application, and encrypts the user account of Lucas on the social application using the key.
Illustratively, if the user Lucas agrees to the user Alisa to add friends, the user Lucas will bring the phone 200 closer to the phone 100 of the user Alisa; in other words, the user Lucas agrees that the mobile phone 100 of the user Alisa is actively approaching the own mobile phone 200; thus, the distance between the mobile phone 200 and the mobile phone 100 is less than or equal to the preset safe distance (e.g. 30 cm), the mobile phone 200 can receive the key from the mobile phone 100, and the mobile phone 200 uses the key to encrypt the user account of the user Lucas.
Note that, the present embodiment is not limited to the time period when the mobile phone 200 and the mobile phone 100 approach each other or the time period when they collide with each other.
In one embodiment, after the user Alisa clicks the add buddy control 8101, the user Alisa may remove the handset 100 after approaching or touching the handset 200 of the user Lucas.
In one embodiment, after the user' S Alisa clicks the add buddy control 8101 and approaches or bumps the mobile phone 200 of the user Lucas, when the mobile phone of the user Alisa receives the response message shown in S8716 and/or the mobile phone of the user Lucas receives the response message shown in S8714, the user Alisa may remove the mobile phone 100.
S8709, the mobile phone 200 switches the third antenna to the fourth antenna.
S8710, the mobile phone 200 sends the second message to the mobile phone 100 through the fourth antenna.
That is, after the mobile phone 200 of the user Lucas receives the first message, the mobile phone 200 may switch from the third antenna to the fourth antenna by controlling the radio frequency switch, and then transmit the second message through the fourth antenna; at this time, the second message belongs to an ultra-short distance frame; so that the second message sent by the mobile phone 200 is not received by the electronic device 100 outside the preset safe distance.
In this embodiment, the second message may be a Wi-Fi aware frame or a beacon frame. The Wi-Fi aware frame is a Publish (pub) frame, a Follow-up frame, or a Subscribe (Subscribe) frame, and if the second message is a Follow-up frame, the user account of the encrypted Lucas on the social application may be carried in a payload field of the Follow-up frame.
S8711, after the mobile phone 100 receives the second message from the mobile phone 200, the mobile phone 100 switches the second antenna to the first antenna.
Illustratively, the mobile phone 100 of the user Alisa may receive the second message from the mobile phone 200 when the distance between the mobile phone 200 and the mobile phone 100 is less than or equal to the preset safe distance.
Illustratively, when the mobile phone 100 of the user Alisa receives the second message, the mobile phone 100 can switch from the second antenna to the first antenna by controlling the radio frequency switch.
S8712, the mobile phone 100 sends an acknowledgement message to the mobile phone 200 through the first antenna.
S8713, after receiving the acknowledgement message, the mobile phone 200 switches from the fourth antenna to the third antenna.
That is, when the mobile phone 200 of the user Lucas receives the confirmation message, the mobile phone 200 may switch from the fourth antenna to the third antenna by controlling the radio frequency switch.
S8714, the mobile phone 100 decrypts the second message using the key to obtain the user account.
After the mobile phone 100 randomly generates the key in S8703, the key is stored locally, and at this time, the mobile phone 100 may decrypt the second message using the key, and obtain the user account of the user Lucas on the social application.
The order of S8714 and S8713 is not limited in this application.
S8715, the mobile phone 100 sends a request message to the application server of the social application through the first antenna, where the request message includes the user accounts of both parties on the social application.
Illustratively, the request message sent by the mobile phone 100 to the application server of the social application includes the user account of the user Lucas on the social application and the user account of the user Alisa on the social application. The request message is used for requesting that the user account number of the user Alisa on the social application and the user account number of the user Lucas on the social application are added together to be friends.
Compared with the friend adding process shown in fig. 1A to 1D, in the embodiment of the present application, the user of the mobile phone 100 does not need to actively search, the user of the mobile phone 100 only needs to touch the friend adding control 8101, the mobile phone 100 is close to or touches the mobile phone 200 of the friend to obtain the friend account, and the user of the mobile phone 200 does not need any operation; or, the user of the mobile phone 100 does not need to actively search, the user of the mobile phone 100 only needs to touch the friend adding control 8101, and the user of the mobile phone 200 only needs to approach or touch the mobile phone 200; therefore, the interface operation times are effectively reduced, and the user experience is improved.
S8716, the application server sends a response message to the request message to the mobile phone 200.
Illustratively, in this step, after the mobile phone 200 receives the response message of the request message, the mobile phone 200 may further display a prompt message for prompting the user that the friend addition is successful.
In the step, the user Lucas can receive the successful message of adding friends from the application service without manual confirmation. It should be understood that, in the case that the user Lucas agrees that the user Alisa adds friends, the distance between the mobile phone 100 and the mobile phone 200 is smaller than the preset reflection distance (for example, 30 cm), so the mobile phone 200 can receive the key from the mobile phone 100, which is equivalent to that the user Lucas has actively authorized the user Alisa to add the user Alisa as friends, so the manual confirmation operation of the user Lucas is not required.
Illustratively, the mobile phone 200 may also display only the prompt message that the friend addition was successful. For example, as shown in user interface 830 of FIG. 8C, interface 830 displays a prompt message from the social application for informing the user that Lucas has added a new friend.
Alternatively, the mobile phone 200 may just send out the alert sound of receiving the alert message that the friend addition is successful.
Alternatively, the mobile phone 200 may send out a prompt tone of receiving the prompt message that the friend addition is successful, and display the prompt message that the friend addition is successful.
S8717, the application server sends a response message to the request message to the mobile phone 100.
Although S8717 is located after S8716 in fig. 8A, in practice, the application server may execute S8717 and S8716 in parallel, may execute S8717 first and then S8716, and may execute S8716 first and then S8717.
S8718, after receiving the response message of the request message, the mobile phone 100 displays a prompt message that the friend addition is successful.
Alternatively, after receiving the response message of the request message, the mobile phone 100 may only send out the alert sound of receiving the alert message that the friend addition is successful.
Optionally, after receiving the response message of the request message, the mobile phone 100 may send out a prompt tone of receiving the prompt message that the friend addition is successful, and display the prompt message that the friend addition is successful.
Alternatively, after receiving the response message of the request message, the mobile phone 100 may only display the prompt message that the friend addition is successful.
After the mobile phone 100 receives the prompt message that the friend is successfully added, the user Alisa and the user Lucas can carry out instant messaging; see in particular the example shown in fig. 1D, which is not described in detail here.
In the flow shown in fig. 8A, S8710 is transmitted using a weak antenna, so as to improve security. Since in this embodiment, it is considered that an illegal electronic device (attack device) is not in the vicinity of the mobile phone 200, but the illegal electronic device (attack device) may simulate the mobile phone 100 by means of an external amplifier or the like, that is, all or part of "send first message" in S8700 to S8701, S8703, S8705, S8711 to S8712, S8714, S8718, etc. may be simulated by the illegal electronic device. Even if the illegal electronic device (attack device) simulates the mobile phone 100, all or part of "transmitting the first message" in S8700 to S8701, S8703, S8705, S8711 to S8712, S8714, S8718, etc. are performed, since the mobile phone 200 transmits the second message through the weak antenna in S8710, the illegal electronic device (attack device) cannot receive the second message in S8711, and thus cannot decrypt with the key generated by itself, and thus cannot acquire the user account of the user Lucas on the social application. Therefore, the situation that the user account of the user Lucas on the social application is acquired by illegal electronic equipment (attack equipment) is avoided, and better experience is brought to the user.
In S8710, if the mobile phone 200 sends the second message through the third antenna (i.e. the strong antenna), the illegal electronic device (attack device) may receive the second message; while the previous "sending the first message" in S8700 to S8701 and S8703 to S8705 is also performed by the illegal electronic device (attack device), so in S8714, the illegal electronic device (attack device) may decrypt with the key previously generated by itself and obtain the user account of the mobile phone 200 on the social application. Further, subsequent S8715 and S8718 may be performed, and the application server may perform subsequent S8716 and S8717; the mobile phone 100 receives the message that the stranger adds the friends, thereby affecting the use of the mobile phone 100 in social applications and bringing inconvenience to the user.
It should be noted that, S8715, S8716, and S8717 relate to communication interaction between the mobile phone 100, the mobile phone 200, and the application server, where the communication interaction is ensured to be safe by the encryption mechanism and decryption mechanism of the social application itself.
It should be noted that S8701 and S8702 are required on the premise that the mobile phone 100 and the mobile phone 200 interact with each other using Wi-Fi signals (Wi-Fi sensing). If the mobile phone 100 and the mobile phone 200 use bluetooth signals and ZigBee signals for interaction, S8701 and S8702 may not be provided.
It should be noted that, in one possible scenario, if the user account of the mobile phone 200 on the social application does not add friends with the user account of the mobile phone 100 on the social application before S8700 is performed, the response message may be that the user account of the mobile phone 200 on the social application is successfully added, or the addition fails.
Optionally, in another possible scenario, if the user account of the mobile phone 200 on the social application is already friends with the user account of the mobile phone 100 on the social application before S8700 is performed, the application server sends a response message to the mobile phone 100 for prompting to repeat the adding, or the response message is used for prompting that the user account of the mobile phone 200 on the social application is already friends with the user account of the mobile phone 100 on the social application, without adding.
It should be noted that, in this embodiment, the mobile phone 100 defaults to pass through the first antenna until the mobile phone 100 is switched to the second antenna, and after the mobile phone 100 is switched to the second antenna, the mobile phone 100 sends a message through the second antenna until the mobile phone 100 is switched to the first antenna. Similarly, the handset 200 defaults to passing through the third antenna until the handset 200 switches to the fourth antenna. After the mobile phone 200 is switched to the fourth antenna, the mobile phone 200 sends a message through the fourth antenna until the mobile phone 200 is switched to the third antenna.
The embodiment of the application takes a user Alisa and a user Lucas as examples, and illustrates a friend adding process. It should be understood that the friend adding method is equally applicable to friend adding among other users, which is not limited in this application.
In this embodiment, a Wi-Fi sensing channel can be established between the mobile phone 100 and the mobile phone 200 through a Wi-Fi sensing technology, so that the mobile phone 100 and the mobile phone 200 do not need to access the same router. The mobile phone 100 includes a first antenna and a second antenna, and the mobile phone 200 includes a third antenna and a fourth antenna, that is, the mobile phone 100 and the mobile phone 200 both support the transmission and reception of the ultra-short distance frame. Therefore, other electronic devices outside the preset safety distance cannot receive the ultra-short distance frame, so that the safety of communication can be ensured.
Compared with the mode of touching one and touching plus friends of the child watch, the child watch adopts long-distance communication and can easily cause leakage of user information, so that compared with the mode, the child watch is higher in safety based on receiving and transmitting of ultra-short distance frames.
Compared with the friend adding process shown in fig. 1A to 1D, in the embodiment of the present application, the user of the mobile phone 100 does not need to actively search, the user of the mobile phone 100 only needs to touch the friend adding control 8101, the mobile phone 100 is close to or touches the mobile phone 200 of the friend to obtain the friend account, and the user of the mobile phone 200 does not need any operation; or, the user of the mobile phone 100 does not need to actively search, the user of the mobile phone 100 only needs to touch the friend adding control 8101, and the user of the mobile phone 200 only needs to approach or touch the mobile phone 200; therefore, the interface operation times are effectively reduced, and the user experience is improved.
Scenario one may be further elucidated by way of embodiment two. The main difference between the second embodiment and the first embodiment is that in the second embodiment, the mobile phone 200 does not send the second message through the fourth antenna, but sends the second message through the third antenna; therefore, in the friend adding process in the second embodiment, in order to improve the safety and reliability of the friend adding result, the user of the mobile phone 200 needs to participate in the confirmation.
The second embodiment relates to fig. 9A to 9B. In the second embodiment, the mobile phone 100 may include a first antenna and a second antenna, and the mobile phone 200 may include a third antenna; the third antenna here corresponds to a strong or true antenna. Fig. 9A shows an interactive flow diagram of a method of buddy addition in a scenario. As shown in fig. 9A, the method specifically includes the steps of:
s9700 to S9708: the same as S8700 to S8708, respectively, please refer to the descriptions of S8700 to S8708, and the description thereof will not be repeated here.
S9709, the mobile phone 200 sends the second message to the mobile phone 100 through the third antenna.
It should be noted that, the difference between S9709 and S8710 is that the mobile phone 200 is the second message sent through the third antenna. That is, the present embodiment does not require the mobile phone 200 to support the transmission of the ultra short distance frame, but only requires the mobile phone 100 to support the transmission of the ultra short distance frame.
S9710 to S9712: the steps are the same as steps S8711 to S8713, please refer to the descriptions of steps S8711 to S8713, and the descriptions are omitted here.
S9713, after receiving the request message, the application server forwards the request message to the mobile phone 200.
S9714, after receiving the request message from the application server, the mobile phone 200 receives the operation of the user for confirming approval or rejection of being added as a friend.
The reason why the application server is required to perform S9713 and the mobile phone 200 to perform S9714 and S9715 is that in this embodiment, it is required to consider that an illegal electronic device (attack device) is not in the vicinity of the mobile phone 200, but the illegal electronic device (attack device) may simulate the mobile phone 100 by means of an external amplifier or the like, that is, "transmitting the first message" in S9700 to S9701, S9703, S9705, all or part of S9711 to S9712, S9717, etc., may be simulated by the illegal electronic device. In this way, the illegal electronic device (attack device) may receive the second message in S9709, so as to decrypt with the key generated by itself, and further obtain the user account of the user Lucas on the social application. Therefore, the user account of the user Lucas on the social application is acquired by illegal electronic equipment (attack equipment), and bad experience is brought to the user.
To avoid this, the application server needs to perform S9713 and the handset 200 needs to perform S9714 and S9715, so that S9714 provides the further confirmation step to the user Lucas of the handset 200. If the operation received by the handset 200 is used to confirm the agreement, it indicates that the user Lucas confirmation request is added with the user Lucas confirmation (e.g., alisa); if the operation received by the handset 200 is to reject the addition as a buddy, it indicates that the user Lucas is aware of the user (e.g., strangers other than Alisa) that requested the addition that is not user Lucas confirmation. Namely, the user Lucas of the mobile phone 200 further confirms to play a role of safety protection.
Illustratively, after the mobile phone 200 receives the request message forwarded by the application server, the mobile phone 200 displays an interface 940 as shown in fig. 9B. Interface 940 displays the user account of the new friend and even also displays the user image information.
In one embodiment, the user Lucas may then parse to confirm whether it is a user account (e.g., alisa) that is desired to be added; if yes, the user Lucas may touch the consent control 941; otherwise, the user Lucas may touch the reject control 942.
In another embodiment, the user Lucas may display information such as the user avatar or the user account displayed on the mobile phone 200 to the user Alisa; if the user Alisa confirms that it is his own account and avatar, a positive response is made to the user Lucas (e.g., answer in a two-person conversation that the user Lucas is "my account, no error"). After the user Alisa confirms to the user Lucas that the avatar or user account displayed on the interface is correct, the user Lucas clicks to operate the consent control 941 shown in fig. 9B. It is assumed that when the avatar displayed on the user Alisa confirmation interface is not the avatar of the user Alisa, the user Alisa notifies the user Lucas, and thus the user Lucas clicks the reject control 942 shown in fig. 9B, so that the user Lucas can be prevented from being added as a friend by an illegal user.
It is assumed that when the user Lucas confirms that the avatar displayed on the interface is not the avatar of the user Alisa, or when the user Lucas confirms that the avatar displayed on the interface is not the avatar of the user Alisa after negotiating with the user Alisa, the user Lucas clicks to operate the reject control 942 shown in fig. 9B, it is possible to avoid adding an illegal user as a friend.
S9714, the mobile phone 200 receives an operation of the user, which indicates that the user agrees or refuses to be added as a friend.
S9715, the mobile phone 200 sends a reply message to the application server, where the reply message is used to notify the friend adding result.
S9716, the application server transmits a response message to the mobile phone 100 requesting the message.
S9717, after the mobile phone 100 receives the response message of the request message, if the response message indicates that the friend addition is successful, the mobile phone 100 displays a prompt message that the friend addition is successful; if the response message indicates that the friend addition fails, the mobile phone 100 displays a prompt message of the friend addition failure.
Illustratively, after the mobile phone 100 receives the response message that the buddy addition was successful, the mobile phone 100 may display a user interface 190 as shown in (j) of fig. 1D. The user interface 190 includes messages for prompting the user's Alisa for the handset 100 to authenticate, which may send and receive instant messages to and from each other in the user interface 190.
It should be noted that, S9712, S9713, S9715, S9716, etc. relate to communication interaction between the mobile phone 100, the mobile phone 200, and the application server, where the communication interaction is ensured to be safe by an encryption mechanism and a decryption mechanism of the social application itself.
It should be noted that S9701 and S9702 are required on the premise that the mobile phone 100 and the mobile phone 200 interact with each other by using Wi-Fi signals (Wi-Fi sensing). If the mobile phone 100 and the mobile phone 200 interact with each other by using bluetooth signals and ZigBee signals, S9701 and S9702 may not be provided.
It should be noted that, in one possible scenario, if the user account of the mobile phone 200 on the social application and the user account of the mobile phone 100 on the social application are not added as friends before the mobile phone 200 performs S9700, the response message may be that the user account of the mobile phone 200 on the social application is successfully added, or the addition fails.
Optionally, in another possible scenario, if, before S9700 is performed, the user account of the mobile phone 200 on the social application is already friends with the user account of the mobile phone 100 on the social application, the application server sends a response message of the friend adding request to the mobile phone 100 to prompt the user to add repeatedly, or prompts the user account of the mobile phone 200 on the social application to be friends with the user account of the mobile phone 100 on the social application, without adding repeatedly.
It should be noted that, the mobile phone 100 defaults to pass through the first antenna until the mobile phone 100 is switched to the second antenna in this embodiment, after the mobile phone 100 is switched to the second antenna, the mobile phone 100 sends a message through the second antenna until the mobile phone 100 is switched to the first antenna. The handset 200 always sends a message through the third antenna.
In this embodiment, a Wi-Fi sensing channel can be established between the mobile phone 100 and the mobile phone 200 through a Wi-Fi sensing technology, so that the mobile phone 100 and the mobile phone 200 do not need to access the same router. The mobile phone 100 includes a first antenna and a second antenna, i.e., support the transmission and reception of ultra-short range frames. The handset 200 includes a third antenna, i.e., supporting long range communications, does not support transmission of ultra-short range frames, or is not used even if it supports transmission of ultra-short range frames. Therefore, other electronic devices outside the preset safety distance cannot receive the ultra-short distance frame transmitted by the mobile phone 100 and also the confirmation operation of the mobile phone 200, so that the safety of communication can be ensured.
Compared with the mode of touching one and touching plus friends of the child watch, the child watch adopts long-distance communication and can easily cause leakage of user information, so that compared with the mode, the child watch is higher in safety based on receiving and transmitting of ultra-short distance frames.
Compared with the friend adding process shown in fig. 1A to 1D, in the embodiment of the present application, the user of the mobile phone 100 does not need to actively search, the user of the mobile phone 100 only needs to touch the friend adding control 8101, the mobile phone 100 is close to or touches the mobile phone 200 of the friend to obtain the friend account, and the user of the mobile phone 200 only needs to confirm the operation; or, the user of the mobile phone 100 does not need to actively search, the user of the mobile phone 100 only needs to touch the friend adding control 8101, and the user of the mobile phone 200 only needs to approach or touch the mobile phone 200 to the mobile phone 100 and confirm the operation; therefore, the interface operation times are effectively reduced, and the user experience is improved.
The content of the second embodiment is the same as that of the first embodiment unless otherwise specified and unless contradiction occurs.
Scenario one may be further elucidated by means of embodiment three. The main difference between the third embodiment and the first and second embodiments is that: in the third embodiment, the mobile phone 100 does not randomly generate and send the key, and the mobile phone 200 directly sends the user account of the mobile phone 200 on the social application to the mobile phone 100; therefore, in the friend adding process shown in this embodiment, in order to improve the safety and reliability of the friend adding result, the user of the mobile phone 100 needs to participate in confirmation. In the third embodiment, the mobile phone 100 may include a first antenna; the handset 200 may include a third antenna and a fourth antenna; the first antenna here corresponds to a strong antenna or a true antenna.
Embodiment three relates to fig. 10A to 10B. Fig. 10A shows an interaction flow of another method of friend addition in a scenario. As shown in fig. 10A, the method specifically includes the following steps:
s1000 to S1001: the same as S9700 to S9701, respectively, please refer to the descriptions of S9700 to S9701, and the description thereof is omitted herein.
S1002, the mobile phone 200 obtains the user account of the mobile phone 200 on the social application, and generates the first message 20, where the first message 20 includes the user account of the mobile phone 200 on the social application.
It should be noted that, the mobile phone 200 of the user Lucas has subscribed to the added friend service in advance, so the added friend service published by the mobile phone 100 can be received. Illustratively, the mobile phone 200 automatically subscribes to the add friends service when running the social application, or subscribes to the add friends service when the social application is launched as a resident background service.
Illustratively, the user Lucas of the mobile phone 200 opens a social application, and the mobile phone 200 may obtain a user account of the user Lucas from the running social application. The social application of the cell phone 200 is the same as the social application of the cell phone 100.
Illustratively, the "user account of the social application" in S1002 includes the user account of the social application that was last logged in.
S1003, the mobile phone 200 switches from the third antenna to the fourth antenna.
S1004, the mobile phone 200 sends the first message 20 to the mobile phone 100 through the fourth antenna.
For example, after the mobile phone 200 of the user Lucas receives the friend adding service message issued by the mobile phone, the mobile phone 200 may switch from the third antenna to the fourth antenna by controlling the radio frequency switch, and then send the first message 20 through the fourth antenna, where the first message 20 belongs to an ultra-short distance frame, so that the first message 20 sent by the mobile phone 200 is not received by the mobile phone outside the safe distance.
S1005, the mobile phone 100 receives the first message 20 and sends a confirmation message through the first antenna;
s1006, the mobile phone 100 obtains and displays the user account of the mobile phone 200 on the social application.
Illustratively, after the distance between the mobile phone 200 and the mobile phone 100 is smaller than the preset safe distance, the mobile phone 100 may receive the first message 20, and then obtain the user account of the mobile phone 200 on the social application from the first message 20.
That is, if the user Lucas agrees that the user Alisa adds friends, the user Lucas will approach the mobile phone 200 to the mobile phone 100 of the user Alisa, or the user Lucas agrees that the mobile phone 100 of the user Alisa approaches the mobile phone 200 of the user himself, so that the distance between the mobile phone 100 and the mobile phone 200 is smaller than or equal to the preset safe distance (e.g. 30 cm), and the mobile phone 100 can receive the first message.
After the user account of the mobile phone 200 on the social application is obtained, the mobile phone 100 displays the user account.
S1007, after receiving the confirmation message, the mobile phone 200 switches to the third antenna.
That is, after the mobile phone 200 receives the response message of the request message, the mobile phone 200 may switch from the second antenna to the first antenna by controlling the radio frequency switch.
S1008, the mobile phone 100 receives the operation of the user, which is to confirm the consent or reject to add the friend.
Specifically, when the operation of the user is received for confirming that the friend is added, executing the subsequent steps; otherwise, the process ends and no further steps are performed.
Illustratively, after the user Alisa clicks the consent control, then continuing to execute the subsequent steps; after the user Alisa clicks the reject control, the process ends.
If S1008 is not set, although the illegal electronic device (attack device) is not in the vicinity of the mobile phone 100, the illegal electronic device (attack device) may simulate the mobile phone 200 by means of an external amplifier or the like, that is, all or part of the "send first message" or the like in S1002, S1004 may be executed by the illegal electronic device (attack device). In this way, it appears that although the user account of the user Alisa on the social application wants to add the user account of the user Lucas on the social application as a friend, in reality, the user account of the user Alisa on the social application adds an illegal electronic device (attack device) as a friend. This obviously gives the user a bad experience, resulting in inconvenience for the user.
In order to avoid the above situation, the mobile phone 100 needs to perform S1008. Thus, S1008 provides a step of further confirmation by the user of the handset 100. If the operation received by the mobile phone 100 is used to confirm the agreement, it indicates that the user Alisa confirmation is to add the user account of the mobile phone 200 on the social application (for example, the user account of the user Lucas on the social application); if the operation received by the handset 100 is for rejection, it indicates that the user Alisa confirms that not the user account of the handset 200 is being added on the social application, but the user account of a stranger (for example, the user account of a stranger other than the user Lucas on the social application) is being added. Thus, the user of the mobile phone 100 confirms the user's Alisa further, thereby playing a role in security protection.
Illustratively, after the mobile phone 100 receives the first message from the mobile phone 200, the mobile phone 100 may display an interface 1020 as shown in fig. 10B. Interface 1020 displays the user account of the new friend and even the corresponding user image information.
In one embodiment, the user Alisa may then identify whether it is a user account (e.g., lucas) that is desired to be added; if yes, the user Alisa may touch the consent control 1021; otherwise, the user Alisa may touch the reject control 1022.
In another embodiment, the user Alisa may display information such as the user avatar or the user account displayed on the mobile phone 100 to the user Lucas at this time; if the user Lucas confirms that it is his own account and avatar, a positive response is made to the user Alisa (e.g., answer in a two-person conversation that the user Alisa is "my account, no error"). When the user Lucas confirms to the user Alisa that the avatar or user account displayed on the interface is correct, the user Alisa clicks to operate the consent control 1021 shown in fig. 10B. It is assumed that when the user Lucas confirms that the avatar displayed on the interface is not the avatar of the user Alisa, the user Lucas will inform the user Alisa, so that the user Alisa will click on the reject control 1022 shown in fig. 10B, and will avoid being added as a friend by an illegal user.
Further, when the user Alisa clicks the consent control 1021, the mobile phone 200 may also display an interface 830 as shown in fig. 8C, reminding the user Lucas that a new friend has been added. The handset 100 may also display a similar interface.
S1009, when the mobile phone 100 receives the operation of the user to confirm that the friend is added, the mobile phone 100 sends a request message to the application server, where the request message is used to request to add the friend, and the request message includes the user accounts of both parties on the social application.
Illustratively, the request message includes a user account of the mobile phone 200 on the social application and a user account of the mobile phone 100 on the social application.
S1010, after receiving the request message, the application server sends a response message to the request message to the mobile phone 200.
Illustratively, in this step, after the mobile phone 200 receives the response message of the request message, the mobile phone 200 may further display a prompt message for prompting the user that the friend addition is successful.
Alternatively, the prompt may also be made by audio such as voice.
Alternatively, the prompt may also be co-prompted by audio such as voice, and a displayed prompt message.
S1011, the application server transmits a response message requesting the message to the mobile phone 100.
It should be noted that, in one possible scenario, if the user account of the mobile phone 200 on the social application and the user account of the mobile phone 100 on the social application are not added as friends before the mobile phone 200 executes S1000, the response message may be that the user account of the mobile phone 200 on the social application is successfully added or the addition fails.
Optionally, in another possible case, if, before S1000 is executed by the mobile phone 200, the user account of the mobile phone 200 on the social application is already friends with the user account of the mobile phone 100 on the social application, the application server sends a response message of the friend adding request to the mobile phone 100 to prompt the user to add repeatedly, or prompts the user account of the mobile phone 200 on the social application to be friends with the user account of the mobile phone 100 on the social application, without adding repeatedly.
S1012, after receiving the response message of the request message, the mobile phone 100 displays a prompt message that the friend addition is successful.
For example, when the mobile phone 100 receives a response message of the request message, the user Alisa and the user Lucas can perform instant messaging. The specific interface of instant messaging may be referred to as an interface shown in fig. 1D, and will not be described herein.
It should be noted that, S1009, S1010, S1011, and the like relate to communication interaction between the mobile phone 100, the mobile phone 200, and the application server, and the communication interaction is ensured to be safe by the encryption mechanism and decryption mechanism of the social application itself.
Note that in this embodiment, the mobile phone 100 defaults to pass through the first antenna; the mobile phone 200 defaults to pass through the third antenna until the mobile phone 200 is switched to the fourth antenna, and after the mobile phone 200 is switched to the fourth antenna, the mobile phone 200 sends a message through the fourth antenna until the mobile phone 200 is switched to the third antenna.
In this embodiment, the mobile phone 200 is a first message sent through a fourth antenna. That is, the present embodiment does not require the mobile phone 100 to support the transmission of the ultra-short distance frame, but only requires the mobile phone 200 to support the transmission of the ultra-short distance frame. Wi-Fi sensing channels can be established between the mobile phone 100 and the mobile phone 200 through Wi-Fi sensing technology, so that the mobile phone 100 and the mobile phone 200 do not need to be connected to the same router. The handset 200 includes a third antenna and a fourth antenna, i.e., support transmission of ultra short range frames. Therefore, other electronic devices outside the preset safe distance cannot receive the first message sent by the mobile phone 200 and also perform the confirmation operation on the mobile phone 100, so that the safety of communication can be ensured.
Compared with the mode of touching one and touching plus friends of the child watch, the child watch adopts long-distance communication and can easily cause leakage of user information, so that compared with the mode, the child watch is higher in safety based on receiving and transmitting of ultra-short distance frames.
Compared with the friend adding process shown in fig. 1A to 1D, in the embodiment of the present application, the user of the mobile phone 100 does not need to actively search, and the user of the mobile phone 100 only needs to touch the friend adding control 8101, so that the mobile phone 100 approaches or touches the mobile phone 200 of the friend and the confirmation operation, and the friend account can be obtained, and the user of the mobile phone 200 does not need any operation; or, the user of the mobile phone 100 does not need to actively search, the user of the mobile phone 100 only needs to add a friend control 8101 and confirm operation by touch, and the user of the mobile phone 200 only needs to approach or touch the mobile phone 200 to the mobile phone 100; therefore, the interface operation times are effectively reduced, and the user experience is improved.
The content of the third embodiment is the same as that of the second embodiment unless otherwise specified and unless contradiction occurs.
It should be noted that, although in the first to third embodiments, the mobile phone 100 and the mobile phone 200 are exemplified, it is clear to those skilled in the art that the electronic device 100 and the electronic device 200 provided with the same social application are applicable to the methods of the first to third embodiments.
In the first to third embodiments, all or part of the "first antenna", "second antenna", "third antenna" and "fourth antenna" are described, but it will be apparent to those skilled in the art that all or part of the "first antenna", "second antenna", "third antenna" and "fourth antenna" may be replaced with "first antenna at the first transmission power", "first antenna at the second transmission power", "third antenna at the third transmission power" and "third antenna at the fourth transmission power", respectively. The "first antenna under the first transmitting power" and the "first antenna under the second transmitting power" are the first logical antenna and the second logical antenna; the "third antenna under the third transmitting power" and the "third antenna under the fourth transmitting power" are the third antenna on the logic and the fourth antenna on the logic. The logical first antenna and the logical second antenna may be implemented by adjusting the transmit power through registers inside the chip. The third and fourth antennas may be implemented by adjusting the transmit power through registers inside the chip.
Scene two
The following describes the interaction flow of the group member adding method in the second scenario specifically through the fourth to sixth embodiments.
Embodiment four relates to fig. 11A to 11D. In the fourth embodiment, the mobile phone 100 may include a first antenna and a second antenna, and the mobile phone 200 may include a third antenna and a fourth antenna. Fig. 11A shows a method flow for adding group members in scenario two. As shown in fig. 11A, the method specifically includes the following steps:
s1100, the mobile phone 100 receives an operation of the user, which is to add the group member.
The operation may be a touch operation or a voice operation, which is not limited in the embodiment of the present application. This operation works on controls in the group of social applications (i.e., controls that are unique after entering a certain group) rather than controls outside the group.
Illustratively, when a user Alisa opens a social application on the mobile phone 100, selecting an add group member on an interface, such as a home group interface, the mobile phone 100 publishes an add group member service. Referring to fig. 11B (a), the user interface 11500 is a display interface of a social application, and the user interface 11500 displays information of existing contacts. Illustratively, the social application's user interface 11500 includes a family group control 11501. When the mobile phone 100 detects an operation for the home group control 11501, the mobile phone 100 displays an interface 11510 as shown in fig. 11B (B). Interface 11510 includes an expansion control 11511. When the handset 100 detects an operation for the expansion control 11511, the handset 100 displays a pop-up box as shown in interface 11510, which includes the add group member control 11512. When the handset 100 detects operation of the add group member control 11512, the handset 100 issues an add group member service message via the first antenna.
Further, when the mobile phone detects an operation for adding the group member control 11512, the mobile phone 100 can also prompt the user, alisa, to bump the mobile phone 200 of the user Lucas through its interface (e.g. the mobile phone 100 display interface 11520). The interface 11520 comprises a prompt box for prompting the user to collide with the friend equipment; the prompt box displays a prompt message. After the user Alisa sees the alert message, he can bring the phone 100 close to or touch the phone 200 of the user Lucas.
S1101, the mobile phone 100 issues an add group member service message through the first antenna.
Illustratively, when the user Alisa opens the "add group member" control 11512 in the social application of the mobile phone 100, the mobile phone 100 issues an add group member service message for discovering surrounding electronic devices subscribed to the add group member service.
Illustratively, the "publication" in S1101 is in the form of a broadcast. The add group membership service message includes a unique identification address such as an IP address or MAC address of the handset 100. Optionally, the add group member service message further includes an identification of the social application. The social application may be uniquely identified by the identification. Optionally, the add group member service message further includes a user account of the user Alisa on the social application.
At S1102, after receiving the add group member service message, the mobile phone 200 sends a response message (e.g., acknowledgement (ACK) message) to the mobile phone 100, where the response message is used to indicate that the mobile phone 100 has received the add group member service message.
The mobile phone 200 of the user Lucas has subscribed to the add group member service in advance. Illustratively, the mobile phone 200 automatically subscribes to the add group member service when downloading and installing the social application, or the social application is set by the system as a resident background service.
S1103 to S1114: the steps are the same as steps S8703 to S8714, please refer to the descriptions of steps S8703 to S8714, and the descriptions are omitted here.
It should be understood that after S1110, the distance between the mobile phone 100 and the mobile phone 200 is smaller than the preset safe distance (e.g., 30cm, etc.) in the case that the user Lucas agrees to the user Alisa to add it to the group member, so the mobile phone 200 can receive the key from the mobile phone 100. That is, the user Lucas has actively authorized that the user Alisa can add it as a group member, so that no manual confirmation operation of the user Lucas is required.
S1115, the mobile phone 100 sends a request message to the application server of the social application, where the request message is used to request adding of the group member.
Illustratively, the request message includes a user account of the mobile phone 200 on the social application, a group identifier corresponding to the "add group member" control of the mobile phone 100 on the social application, and a user account of the mobile phone 100 on the social application, and the request message requests the user account of the mobile phone 200 on the social application to be added into a group in which the group identifier corresponding to the "add group member" control of the mobile phone 100 on the social application is located. Taking this group as a "family group" as an example, the mobile phone 100 may request to add it to the "family group" after acquiring the user account of the mobile phone 200 on the social application.
S1116, the application server transmits a response message to the mobile phone 200 requesting the message.
In this step, the user Lucas receives the response message from the application server without manual confirmation.
Illustratively, the handset 200 may also display that a reminder message to add a group member is received. As shown in FIG. 11C, the user interface 1130 displays a prompt message from a social application. The hint message is used to inform the user that Lucas has added a new group.
Illustratively, in this step, after the mobile phone 200 receives the response message of the request message, the mobile phone 200 may further display a prompt message for prompting the group member to add successfully.
S1117, the application server transmits a response message to the request message to the mobile phone 100.
The sequence of S1116 and S1117 is not limited in this application.
S1118, after the mobile phone 100 receives the response message, the mobile phone 100 displays a prompt message that the group member added successfully.
Illustratively, when the handset 100 receives a response message that the group member added successfully, the handset 100 of the user Alisa may display a user interface 1140 as shown in fig. 11D. Interface 1140 displays a notification. The content of the notification may include: you invite Lucas to join group chat.
It should be noted that, S1115, S1116, S1117, etc. relate to communication interaction between the mobile phone 100, the mobile phone 200, and the application server, and the communication interaction is ensured to be safe by the encryption mechanism and decryption mechanism of the social application itself.
It should be noted that S1101 and S1102 are required on the premise that the mobile phone 100 and the mobile phone 200 interact with each other using Wi-Fi signals (Wi-Fi sensing). If the mobile phone 100 and the mobile phone 200 interact with each other by using bluetooth signals and ZigBee signals, S1101 and S1102 may not be provided.
It should be noted that, in one possible scenario, if the user account of the mobile phone 200 on the social application does not belong to the member of the group corresponding to the "add group member" control of the mobile phone 100 on the social application before the mobile phone 200 executes S1100, the response message may be that the user account of the mobile phone 200 on the social application is successfully added or fails to be added.
Optionally, in another possible case, if, before executing S1100, the mobile phone 200 performs S1100, the user account on the social application of the mobile phone 200 already belongs to a member of the group corresponding to the "add group member" control on the social application of the mobile phone 100, and the application server sends a response message to the mobile phone 100 to prompt the user to add repeatedly, or prompts the user account on the social application of the mobile phone 200 to identify a member of the group corresponding to the "add group member" control on the social application of the mobile phone 100, without adding repeatedly.
It should be noted that, in this embodiment, the mobile phone 100 passes through the first antenna until the mobile phone 100 is switched to the second antenna, and after the mobile phone 100 is switched to the second antenna, the mobile phone 100 sends a message through the second antenna until the mobile phone 100 is switched to the first antenna. Similarly, the handset 200 defaults to passing through the third antenna until the handset 200 switches to the fourth antenna. After the mobile phone 200 is switched to the fourth antenna, the mobile phone 200 sends a message through the fourth antenna until the mobile phone 200 is switched to the third antenna.
In this embodiment, a Wi-Fi sensing channel can be established between the mobile phone 100 and the mobile phone 200 through a Wi-Fi sensing technology, so that the mobile phone 100 and the mobile phone 200 do not need to access the same router. The mobile phone 100 includes a first antenna and a second antenna, and the mobile phone 200 includes a third antenna and a fourth antenna, that is, the mobile phone 100 and the mobile phone 200 both support the transmission and reception of the ultra-short distance frame. Therefore, other electronic devices outside the preset safety distance cannot receive the ultra-short distance frame, so that the safety of communication can be ensured. In the embodiment of the invention, the user can acquire the friend account only by touching the mobile phone 100 to the mobile phone 200 of the friend and adding the group member, thereby effectively reducing the operation times of the user.
The content of the fourth embodiment is the same as that of the first embodiment unless otherwise specified and unless contradiction occurs.
Scenario two may be further described by embodiment five. The main difference between the fifth embodiment and the fourth embodiment is that: in the fifth embodiment, the mobile phone 200 does not send the second message through the fourth antenna, but sends the second message through the third antenna; therefore, in the group member adding process in the fifth embodiment, in order to improve the security and reliability of the group member adding result, the user of the mobile phone 200 needs to participate in the confirmation. In the fifth embodiment, the mobile phone 100 may include a first antenna; the handset 200 may include a third antenna and a fourth antenna; the first antenna here corresponds to a strong antenna or a true antenna.
Embodiment five relates to fig. 12A and 12B. Fig. 12A shows an interaction flow of the method of adding group members in scenario two. As shown in fig. 12A, the method specifically includes the steps of:
s1200 to S1208: the steps are the same as steps S1100 to S1108, please refer to the descriptions of steps S1100 to S1108, and the descriptions are omitted here.
S1209, the mobile phone 200 sends the second message to the mobile phone 100 through the third antenna.
The difference between S1209 and S1110 is that the mobile phone 200 is a second message transmitted via the third antenna. That is, the present embodiment does not require the mobile phone 200 to support the transmission of the ultra short distance frame, but only requires the mobile phone 100 to support the transmission of the ultra short distance frame.
S1210 to S1212: the same as S1111 to S1113, please refer to the descriptions of S1111 to S1113, and the description thereof will not be repeated here.
S1213, the application server transmits a request message to the mobile phone 200 for requesting addition of the group member.
S1214, after receiving the request message from the application server, the mobile phone 200 receives an operation of the user for confirming approval or rejection to be added as a group member.
The reason why the application server performs S1213 and the mobile phone 200 performs S1214 and S1215 is required because it is considered that the illegal electronic device (attack device) is not in the vicinity of the mobile phone 200 in this embodiment, but the illegal electronic device (attack device) may simulate the mobile phone 100 by means of an external amplifier or the like, that is, all or part of "send first message", S1211 to S1212, S1217, etc. in S1200 to S1201, S1203, S1205 may be simulated by the illegal electronic device. In this way, the illegal electronic device (attack device) may receive the second message in S1209, so as to decrypt with the key generated by itself, and further obtain the user account of the user Lucas on the social application. Therefore, the user account of the user Lucas on the social application is acquired by illegal electronic equipment (attack equipment), and bad experience is brought to the user.
To avoid this, the application server needs to perform S1213 and the handset 200 needs to perform S1214 and S1215, so that S1214 provides the further confirmation step to the user Lucas of the handset 200. If the operation received by the mobile phone 200 is used to confirm the agreement, it indicates that the user Lucas confirmation request adds a group (for example, a family group of the mobile phone 100 on the social application) confirmed by the user Lucas; if the operation received by the handset 200 is to reject the addition as a group member, it indicates that the user Lucas learns that the addition of a group other than the user Lucas confirmation was requested (e.g., a group other than the group of family people on the social application of the handset 100). Namely, the user Lucas of the mobile phone 200 further confirms to play a role of safety protection.
S1215, the mobile phone 200 transmits a reply message of the request message to the application server, the reply message being used to notify the group member of the addition result.
S1216, the application server sends a response message to the handset 100.
It should be noted that, in one possible scenario, if the user account of the mobile phone 200 on the social application does not belong to the member of the group corresponding to the "add group member" control of the mobile phone 100 on the social application before the mobile phone 200 executes S1200, the response message may be that the user account of the mobile phone 200 on the social application is successfully added or fails to be added.
Optionally, in another possible case, if, before executing S1200, the user account of the mobile phone 200 on the social application already belongs to a member of the group corresponding to the "add group member" control of the mobile phone 100 on the social application, the application server sends a response message to the mobile phone 100 to prompt the user to add repeatedly, or prompts the user account of the mobile phone 200 on the social application already belongs to a member of the group corresponding to the "add group member" control of the mobile phone 100 on the social application, without adding repeatedly.
S1217, the mobile phone 100 receives the response message, and if the response message indicates that the group member addition is successful, the mobile phone 100 displays a prompt message that the group member addition is successful; if the response message indicates that the group member addition has failed, the mobile phone 100 displays a prompt message of the group member addition failure.
Illustratively, after the handset 100 receives a response message that the group member added successfully, the handset 100 of the user Alisa may display a user interface 1140 as shown in fig. 11D. Interface 1140 displays a notification. The content of the notification may include: you invite Lucas to join group chat.
It should be noted that, S1212, S1213, S1215, S1216, etc. relate to communication interaction between the mobile phone 100, the mobile phone 200, and the application server, where the communication interaction is ensured to be safe by an encryption mechanism and a decryption mechanism of the social application itself.
It should be noted that S1201 and S1202 are required on the premise that the mobile phone 100 and the mobile phone 200 interact with each other using Wi-Fi signals (Wi-Fi sensing). If the mobile phone 100 and the mobile phone 200 interact with each other by using bluetooth signals and ZigBee signals, S1201 and S1202 may not be provided.
It should be noted that, in one possible scenario, if the user account of the mobile phone 200 on the social application does not belong to the member of the group corresponding to the "add group member" control of the mobile phone 100 on the social application before the mobile phone 200 executes S1200, the response message may be that the user account of the mobile phone 200 on the social application is successfully added or fails to be added.
Optionally, in another possible case, if, before executing S1200, the user account of the mobile phone 200 on the social application already belongs to a member of the group corresponding to the "add group member" control of the mobile phone 100 on the social application, the application server sends a response message to the mobile phone 100 to prompt the user to add repeatedly, or prompts the user account of the mobile phone 200 on the social application already belongs to a member of the group corresponding to the "add group member" control of the mobile phone 100 on the social application, without adding repeatedly.
It should be noted that, the mobile phone 100 defaults to pass through the first antenna until the mobile phone 100 is switched to the second antenna in this embodiment, after the mobile phone 100 is switched to the second antenna, the mobile phone 100 sends a message through the second antenna until the mobile phone 100 is switched to the first antenna. The handset 200 always sends a message through the third antenna.
In this embodiment, a Wi-Fi sensing channel can be established between the mobile phone 100 and the mobile phone 200 through a Wi-Fi sensing technology, so that the mobile phone 100 and the mobile phone 200 do not need to access the same router. The mobile phone 100 includes a first antenna and a second antenna, i.e., support the transmission and reception of ultra-short range frames. The handset 200 includes a third antenna, i.e., supporting long range communications, does not support transmission of ultra-short range frames, or is not used even if it supports transmission of ultra-short range frames. Therefore, other electronic devices outside the preset safety distance cannot receive the ultra-short distance frame transmitted by the mobile phone 100 and also the confirmation operation of the mobile phone 200, so that the safety of communication can be ensured.
Compared with the mode of touching one and touching plus friends of the child watch, the child watch adopts long-distance communication and can easily cause leakage of user information, so that compared with the mode, the child watch is higher in safety based on receiving and transmitting of ultra-short distance frames.
Compared with the friend adding process shown in fig. 1A to 1D, in the embodiment of the present application, the user of the mobile phone 100 does not need to actively search, the user of the mobile phone 100 only needs to touch the adding group member control, the mobile phone 100 is close to or touches the mobile phone 200 to obtain the user account of the mobile phone 200 on the social application, and the user of the mobile phone 200 only needs to confirm the operation; or, the user of the mobile phone 100 does not need to actively search, the user of the mobile phone 100 only needs to add a group member control by touch, and the user of the mobile phone 200 only needs to approach or touch the mobile phone 200 to the mobile phone 100 and confirm the operation; therefore, the operation times of the user are effectively reduced, and the user experience is improved.
The contents of the fifth embodiment are the same as those of the fourth embodiment unless otherwise specified and unless contradiction occurs.
Scenario two may be further illustrated by embodiment six. The main difference between the sixth embodiment and the fifth and fourth embodiments is that: in the sixth embodiment, the mobile phone 100 does not randomly generate and send the key, and the mobile phone 200 directly sends the user account of the mobile phone 200 on the social application to the mobile phone 100; therefore, in the group member adding process shown in this embodiment, in order to improve the security and reliability of the group member adding result, the user of the mobile phone 100 needs to participate in the confirmation. In the sixth embodiment, the mobile phone 100 may include a first antenna; the handset 200 may include a third antenna and a fourth antenna; the first antenna here corresponds to a strong antenna or a true antenna.
Embodiment six relates to fig. 13. Fig. 13 shows an interaction flow of another method of adding group members in scenario two. As shown in fig. 13, the method specifically includes the following steps:
s1300 to S1301: the steps are the same as steps S1200 to S1201, respectively, please refer to the descriptions of steps S1200 to S1201, and are not repeated here.
In S1302, the mobile phone 200 obtains the user account of the mobile phone 200 on the social application, and generates the first message 30, where the first message 30 includes the user account of the mobile phone 200 on the social application.
It should be noted that, the mobile phone 200 of the user Lucas has subscribed to the add group member service in advance, so the add group member service message issued by the mobile phone 100 can be received. Illustratively, the mobile phone 200 automatically subscribes to add group member service messages when running a social application, or subscribes to add group member service messages when the social application is launched as a resident background service.
Illustratively, the user Lucas of the mobile phone 200 opens a social application, and the mobile phone 200 may obtain a user account of the user Lucas from the running social application. The social application of the cell phone 200 is the same as the social application of the cell phone 100.
Illustratively, the "user account of the social application" in S1302 includes the user account of the social application that was last logged in.
S1303, the mobile phone 200 switches from the third antenna to the fourth antenna.
S1304, the mobile phone 200 sends the first message 30 to the mobile phone 100 through the fourth antenna.
For example, after the mobile phone 200 of the user Lucas receives the group member added service message issued by the mobile phone, the mobile phone 200 may switch from the third antenna to the fourth antenna by controlling the radio frequency switch, and then send the first message 30 through the fourth antenna, where the first message 30 belongs to an ultra-short distance frame, so that the first message 30 sent by the mobile phone 200 is not received by the mobile phone outside the safe distance.
S1305, the mobile phone 100 receives the first message 30 and sends an acknowledgement message through the first antenna.
S1306, the mobile phone 100 acquires and displays the user account of the mobile phone 200 on the social application from the first message 30.
For example, after the distance between the mobile phone 200 and the mobile phone 100 is smaller than the preset safe distance, the mobile phone 100 may receive the first message 30, and then obtain the user account of the mobile phone 200 on the social application from the first message 30.
That is, if the user Lucas agrees that the user Alisa adds the user Lucas as a group member of a group, the user Lucas will approach the mobile phone 200 to the mobile phone 100 of the user Alisa, or the user Lucas agrees that the mobile phone 100 of the user Alisa approaches the mobile phone 200 of the user himself, so that the distance between the mobile phone 100 and the mobile phone 200 is smaller than or equal to the preset safe distance (for example, 30 cm), and the mobile phone 100 can receive the first message.
After the user account of the mobile phone 200 on the social application is obtained, the mobile phone 100 displays the user account.
S1307, after receiving the confirmation message, the mobile phone 200 switches to the third antenna.
That is, after the mobile phone 200 receives the confirmation message, the mobile phone 200 may switch from the fourth antenna to the third antenna by controlling the radio frequency switch.
S1308, the mobile phone 100 receives the operation of the user, which is to confirm approval or rejection of the user account of the mobile phone 200 on the social application as the group member.
Specifically, when the operation of the user is received to confirm that the user account is approved to be added as the group member, executing the subsequent steps; otherwise, the process ends and no further steps are performed.
Illustratively, after clicking on the consent control on the handset 100, then continuing to execute subsequent steps; after clicking the reject control on the handset 100, the flow ends.
If S1308 is not set, although the illegal electronic device (attack device) is not in the vicinity of the mobile phone 100, the illegal electronic device (attack device) may simulate the mobile phone 200 by means of an external amplifier or the like, that is, all or part of the "send first message" or the like in S1302, S1304 may be executed by the illegal electronic device (attack device). In this way, it will appear that although the user account of the user Alisa on the social application wants to add the user account of the user Lucas on the social application as a group member of a group, in reality, the user account of the user Alisa on the social application adds an illegal electronic device (attack device) as a group member of the group. This obviously gives the user a bad experience, resulting in inconvenience for the user.
To avoid the above situation, the handset 100 needs to perform S1308. Thus, S1308 provides the user of the mobile phone 100 with a step of further confirming the Alisa. If the operation received by the mobile phone 100 is used to confirm the agreement, it indicates that the user Alisa confirms that the user account of the mobile phone 200 on the social application (for example, the user account of the user Lucas on the social application) is the group member; if the operation received by the mobile phone 100 is for rejection, it indicates that the user Alisa confirms that the user account of the mobile phone 200 is not being added as a group member, but that the user account of a stranger (for example, the user account of a stranger other than the user Lucas on the social application) is being added as a group member. Thus, the user of the mobile phone 100 confirms the user's Alisa further, thereby playing a role in security protection.
Illustratively, after the mobile phone 100 receives the first message from the mobile phone 200, the interface displayed by the mobile phone 100 displays the user account of the new friend, and even displays the corresponding user image information.
In one embodiment, the user Alisa may then identify whether it is a user account (e.g., lucas) that is desired to be added; if yes, the user Alisa may touch the consent control 1021; otherwise, the user Alisa may touch the reject control 1022.
In another embodiment, the user Alisa may display information such as the user avatar or the user account displayed on the mobile phone 100 to the user Lucas at this time; if the user Lucas confirms that it is his own account and avatar, a positive response is made to the user Alisa (e.g., answer in a two-person conversation that the user Alisa is "my account, no error"). After the user Lucas confirms to the user Alisa that the avatar or user account displayed on the interface is correct, the user Alisa clicks the consent control 1021 on the operation handset 100. It is assumed that when the user Lucas confirms that the avatar displayed on the interface is not the avatar of the user Alisa, the user Lucas will inform the user Alisa, so that the user Alisa will click on the reject control 1022 on the operation handset 100, and will avoid being added as a group member by an illegal user.
Further, when the user Alisa clicks the consent control 1021, the phone 200 may also display an interface to alert the user that Lucas has been added as a group member of a group. The handset 100 may also display a similar interface.
S1309, when the mobile phone 100 receives the operation for confirming approval to add the user account as the group member, the mobile phone 100 sends a request message to the application server, where the request message is used to request to add the user account of the mobile phone 200 on the social application as the group member.
Illustratively, the request message includes a user account of the mobile phone 200 on the social application, a group identifier corresponding to the "add group member" control of the mobile phone 100 on the social application, and a user account of the mobile phone 100 on the social application, and the request message requests the user account of the mobile phone 200 on the social application to be added into a group in which the group identifier corresponding to the "add group member" control of the mobile phone 100 on the social application is located. Taking this group as a "family group" as an example, the mobile phone 100 may request to add it to the "family group" after acquiring the user account of the mobile phone 200 on the social application.
S1310, after receiving the request message, the application server sends a response message to the request message to the mobile phone 200.
Illustratively, the handset 200 may also display that a reminder message to add a group member is received. As shown in FIG. 11C, the user interface 1130 displays a prompt message from a social application. The hint message is used to inform the user that Lucas has added a new group.
Illustratively, in this step, after the mobile phone 200 receives the response message of the request message, the mobile phone 200 may further display a prompt message for prompting the group member to add successfully.
Alternatively, the prompt may also be made by audio such as voice.
Alternatively, the prompt may also be co-prompted by audio such as voice, and a displayed prompt message.
S1311, the application server sends a response message to the mobile phone 100 requesting the message.
The sequence of S1310 and S1311 is not limited in this application.
S1312, after the mobile phone 100 receives the response message, the mobile phone 100 displays a prompt message that the group member added successfully.
Illustratively, when the handset 100 receives a response message that the group member added successfully, the handset 100 of the user Alisa may display a user interface 1140 as shown in fig. 11D. Interface 1140 displays a notification. The content of the notification may include: you invite Lucas to join group chat.
It should be noted that, S1309, S1310, S1311, etc. relate to communication interaction between the mobile phone 100, the mobile phone 200, and the application server, and the communication interaction is to ensure communication security through an encryption mechanism and a decryption mechanism of the social application itself.
It should be noted that, in one possible scenario, if the user account of the mobile phone 200 on the social application does not belong to the member of the group corresponding to the "add group member" control of the mobile phone 100 on the social application before the mobile phone 200 executes S1300, the response message may be that the user account of the mobile phone 200 on the social application is successfully added or fails to be added.
Optionally, in another possible case, if, before executing S1300, the mobile phone 200 executes the step S1300, the user account of the mobile phone 200 on the social application already belongs to a member of the group corresponding to the "add group member" control of the mobile phone 100 on the social application, and the application server sends a response message to the mobile phone 100 to prompt the user to add repeatedly, or prompts the user account of the mobile phone 200 on the social application already belongs to a member of the group corresponding to the "add group member" control of the mobile phone 100 on the social application, without adding repeatedly.
Note that in this embodiment, the mobile phone 100 defaults to pass through the first antenna; the mobile phone 200 defaults to pass through the third antenna until the mobile phone 200 is switched to the fourth antenna, and after the mobile phone 200 is switched to the fourth antenna, the mobile phone 200 sends a message through the fourth antenna until the mobile phone 200 is switched to the third antenna.
In this embodiment, the mobile phone 200 is a first message sent through a fourth antenna. That is, the present embodiment does not require the mobile phone 100 to support the transmission of the ultra-short distance frame, but only requires the mobile phone 200 to support the transmission of the ultra-short distance frame. Wi-Fi sensing channels can be established between the mobile phone 100 and the mobile phone 200 through Wi-Fi sensing technology, so that the mobile phone 100 and the mobile phone 200 do not need to be connected to the same router. The handset 200 includes a third antenna and a fourth antenna, i.e., support transmission of ultra short range frames. Therefore, other electronic devices outside the preset safe distance cannot receive the first message sent by the mobile phone 200 and also perform the confirmation operation on the mobile phone 100, so that the safety of communication can be ensured.
In the embodiment of the present application, the user of the mobile phone 100 does not need to actively search, and the user of the mobile phone 100 only needs to touch and add a group member control, and the user of the mobile phone 200 does not need any operation when the mobile phone 100 approaches or touches the mobile phone 200 of the friend and confirms the operation; or, the user of the mobile phone 100 does not need to actively search, the user of the mobile phone 100 only needs to add a group member control and confirm operation in a touch manner, and the user of the mobile phone 200 only needs to approach or touch the mobile phone 200 to the mobile phone 100; therefore, the operation times of the user are effectively reduced, and the user experience is improved.
The content of the sixth embodiment is the same as that of the fifth embodiment unless otherwise specified and unless contradiction occurs.
Scenario two may be further illustrated by embodiment seven. The main difference between the seventh embodiment and the foregoing embodiments is that in the seventh embodiment, the mobile phone 200 randomly generates a key, sends the key to the mobile phone 100 through the fourth antenna, the mobile phone 100 sends the encrypted group account to the mobile phone 200 through the second antenna, and after the mobile phone 200 obtains the encrypted group account, the mobile phone 200 requests to add to the group. In the seventh embodiment, the mobile phone 100 may include a first antenna and a second antenna, and the mobile phone 200 may include a third antenna and a fourth antenna. Embodiment seven relates to fig. 14A and 14B.
Fig. 14A shows an interaction flow of another method for adding group members in scenario two. As shown in fig. 14A, the method specifically includes the steps of:
s1400a to S1401a: the steps are the same as steps S1300 to S1301, respectively, please refer to the descriptions of steps S1300 to S1301, and the descriptions are omitted here.
S1402a, after receiving the group member service adding message, the mobile phone 200 randomly generates a key, and obtains a first message including the key.
S1403a, the mobile phone 200 switches from the third antenna to the fourth antenna.
S1404a, the mobile phone 200 sends a first message to the mobile phone 100 through the fourth antenna.
Illustratively, the handset 200 may switch from the third antenna to the fourth antenna by controlling the radio frequency switch and then send the first message through the fourth antenna; at this time, the first message belongs to an ultra-short distance frame; in this way, the first message sent by the mobile phone 200 is not received by the electronic device outside the preset safe distance from the mobile phone 200.
In this embodiment, the first message may be a Wi-Fi aware frame or a beacon frame. Wi-Fi aware frames are Publish (publich) frames, track-up (Follow-up) frames, or Subscribe (subscore) frames. If the first message is a show-up frame, then the key of the user's Alisa handset 200 may be carried in the payload field of the show-up frame. Wi-Fi aware frames are based on Wi-Fi aware technology. Wi-Fi perception technology can support point-to-point communication of mobile phone 100 and mobile phone 200 in a scene without accessing the same router, and can also support point-to-point communication of mobile phone 100 and mobile phone 200 in a scene with the same router.
In one possible implementation, the mobile phone 200 may send the first message through the fourth antenna, where the success rate of sending and receiving data may be reduced, and then the mobile phone 200 may repeat sending the key multiple times.
In S1405a, the mobile phone 100 receives the first message and obtains the key from the first message.
After the distance between the mobile phone 200 and the mobile phone 100 is less than or equal to the transmission distance of the fourth antenna, the mobile phone 100 receives the first message, and then obtains the key of the mobile phone 200 from the first message.
S1406a, the mobile phone 100 encrypts the group identifier of the group corresponding to the operation on the social application in the mobile phone 100 by using the key, and obtains the second message, where the second message includes the encrypted group identifier.
Illustratively, the operation in S1400a corresponds to a group whose group identification (e.g., group name, group account number, etc.) is encrypted using a key to obtain a second message, which includes the encrypted group identification.
Optionally, the group identification is an identification uniquely identifying the group. The directory of the group on the handset 100 may also be a group identification.
S1407a, the mobile phone 100 switches from the first antenna to the second antenna.
S1408a, the mobile phone 100 sends a second message to the mobile phone 200 via the second antenna.
Illustratively, the handset 100 includes a first antenna and a second antenna, and the handset 100 can switch from the first antenna to the second antenna by controlling the radio frequency switch and then send a second message through the second antenna. The second message at this time belongs to an ultra-short distance frame, and the electronic device having a distance from the mobile phone 100 outside the preset safety distance cannot receive the second message.
In this embodiment, the second message may be a Wi-Fi aware frame or a beacon frame. The Wi-Fi aware frame is a Publish (pub) frame, a Follow-up frame, or a Subscribe (Subscribe) frame, and if the second message is a Follow-up frame, then the group identifier of the corresponding group operating on the social application in the encrypted S1400a may be carried in a payload field of the Follow-up frame.
S1409a, after receiving the second message, the mobile phone 200 sends an acknowledgement message through the fourth antenna.
S1410a, after receiving the confirmation message, the mobile phone 100 switches from the second antenna to the first antenna.
S1411a, the mobile phone 200 uses the secret key to decrypt and obtain the group identification; the mobile phone 200 obtains a user account of the mobile phone 200 on a social application.
In S1412a, the mobile phone 200 switches from the fourth antenna to the third antenna.
Illustratively, the handset 200 includes a third antenna and a fourth antenna, from which the handset 200 can be switched to the third antenna by controlling the radio frequency switch.
S1413a, the mobile phone 200 sends a request message to the application server, where the request message is used to request that the user account of the mobile phone 200 on the social application be added to the group corresponding to the group identifier.
Illustratively, the request message includes the user account of the mobile phone 200 on the social application and the group identification described above.
Optionally, the request message also includes a user account of the mobile phone 100 on the social application. Thus, the second message in S1408a is required to include the user account on the social application of the handset 100 encrypted using the key; in S1411a, the user account of the mobile phone 100 on the social application is obtained by decrypting with the key.
S1414a, the application server sends a response message to the mobile phone 200 requesting the message.
S1415a, the application server transmits a response message to the request message to the mobile phone 100.
The sequence of S1414a and S1415a is not limited in this application.
S1416a, the mobile phone 100 displays a prompt message that the group member added successfully.
In the flow shown in fig. 14A, S1408a is transmitted using a weak antenna to improve security. Since in this embodiment, it is considered that the illegal electronic device (attack device) is not in the vicinity of the mobile phone 100, the illegal electronic device (attack device) may simulate the mobile phone 200 by means of an external amplifier or the like, i.e. "send first message" of S1404a, possibly simulated by the illegal electronic device. Even if the illegal electronic device (attack device) simulates the mobile phone 200 and performs the "send first message" of S1404a, since the mobile phone 100 sends the second message through the weak antenna in S1408a, the illegal electronic device (attack device) cannot receive the second message, and thus cannot decrypt with the key generated by itself, and cannot acquire the group identifier of the group corresponding to the social application operated in S1400 a. In this way, the group identification for adding the group member is prevented from being acquired by illegal electronic equipment (attack equipment), and better experience is brought to the user.
In S1408a, if the mobile phone 100 sends the second message through the first antenna (i.e. the strong antenna), the illegal electronic device (attack device) may receive the second message; while the "send first message" in the previous S1404a is also performed by an illegal electronic device (attack device), in S1411a, the illegal electronic device (attack device) may decrypt with the key previously generated by itself, and obtain the group identifier of the corresponding group operating on the social application in S1400 a. Further, the subsequent S1413a may be performed, and the application server may perform the subsequent S1414a and S1415a; the mobile phone 100 will receive the message that the stranger adds to the group, thereby affecting the use of the mobile phone 100 on the social application, and bringing inconvenience to the user.
Illustratively, when the handset 100 receives a response message that the group member added successfully, the handset 100 may display a user interface 1140 as shown in fig. 11D. Interface 1140 displays a notification. The content of the notification may include: you invite Lucas to join group chat.
It should be noted that, in one possible scenario, if the user account of the mobile phone 200 on the social application does not belong to the member of the group corresponding to the group member adding control of the mobile phone 100 on the social application before the mobile phone 100 executes S1400a, the response message may be that the user account of the mobile phone 200 on the social application is successfully added or the addition fails.
Optionally, in another possible case, if, before executing S1400a, the user account of the mobile phone 100 on the social application already belongs to a member of the group corresponding to the "add group member" control of the mobile phone 100 on the social application, the application server sends a response message to the mobile phone 100 to prompt the user to add repeatedly, or prompts the user account of the mobile phone 200 on the social application already belongs to a member of the group corresponding to the "add group member" control of the mobile phone 100 on the social application, without adding repeatedly.
It should be noted that, in this embodiment, the mobile phone 100 defaults to pass through the first antenna until the mobile phone 100 is switched to the second antenna, and after the mobile phone 100 is switched to the second antenna, the mobile phone 100 sends a message through the second antenna until the mobile phone 100 is switched to the first antenna; the mobile phone 200 defaults to pass through the third antenna until the mobile phone 200 is switched to the fourth antenna, and after the mobile phone 200 is switched to the fourth antenna, the mobile phone 200 sends a message through the fourth antenna until the mobile phone 200 is switched to the third antenna.
In this embodiment, a Wi-Fi sensing channel can be established between the mobile phone 100 and the mobile phone 200 through Wi-Fi sensing technology, so that the mobile phone 100 and the mobile phone 200 do not need to access the same router. The handset 200 includes a third antenna and a fourth antenna, i.e., support transmission of ultra short range frames. Therefore, other electronic devices outside the preset safe distance cannot receive the first message sent by the mobile phone 200 and also perform the confirmation operation on the mobile phone 100, so that the safety of communication can be ensured.
In the embodiment of the present application, the user of the mobile phone 100 does not need to actively search, and the user of the mobile phone 100 only needs to touch and add a group member control, and the user of the mobile phone 200 does not need any operation when the mobile phone 100 approaches or touches the mobile phone 200; or, the user of the mobile phone 100 does not need to actively search, the user of the mobile phone 100 only needs to add a group member control in a touch manner, and the user of the mobile phone 200 only needs to approach or touch the mobile phone 200 to the mobile phone 100; therefore, the operation times of the user are effectively reduced, and the user experience is improved.
Fig. 14B shows an interactive flow of another method of adding friends in a scenario. As shown in fig. 14B, the method specifically includes the steps of:
s1400b to S1401b: the same as S8700 to S8701, please refer to the descriptions of S8700 to S8701, and the descriptions are omitted here.
S1402b, after receiving the friend service adding message, the mobile phone 200 randomly generates a key, and obtains a first message including the key.
S1403b, the mobile phone 200 switches from the third antenna to the fourth antenna.
S1404b, the mobile phone 200 sends the first message to the mobile phone 100 through the fourth antenna.
Illustratively, the handset 200 may switch from the third antenna to the fourth antenna by controlling the radio frequency switch and then send the first message through the fourth antenna; at this time, the first message belongs to an ultra-short distance frame; in this way, the first message sent by the mobile phone 200 is not received by the electronic device outside the preset safe distance from the mobile phone 200.
In this embodiment, the first message may be a Wi-Fi aware frame or a beacon frame. Wi-Fi aware frames are Publish (publich) frames, track-up (Follow-up) frames, or Subscribe (subscore) frames. If the first message is a show-up frame, then the key of the user's Alisa handset 200 may be carried in the payload field of the show-up frame. Wi-Fi aware frames are based on Wi-Fi aware technology. Wi-Fi perception technology can support point-to-point communication of mobile phone 100 and mobile phone 200 in a scene without accessing the same router, and can also support point-to-point communication of mobile phone 100 and mobile phone 200 in a scene with the same router.
In one possible implementation, the mobile phone 200 may send the first message through the fourth antenna, where the success rate of sending and receiving data may be reduced, and then the mobile phone 200 may repeat sending the key multiple times.
S1405b, the mobile phone 100 receives the first message, and obtains the key from the first message.
After the distance between the mobile phone 200 and the mobile phone 100 is less than or equal to the transmission distance of the fourth antenna, the mobile phone 100 receives the first message, and then obtains the key of the mobile phone 200 from the first message.
S1406b, the mobile phone 100 encrypts the user account of the mobile phone 100 on the social application by using the key, and obtains a second message, where the second message includes the encrypted user account.
S1407b, the mobile phone 100 switches from the first antenna to the second antenna.
S1408b, the mobile phone 100 sends a second message to the mobile phone 200 via the second antenna.
Illustratively, the handset 100 includes a first antenna and a second antenna, and the handset 100 can switch from the first antenna to the second antenna by controlling the radio frequency switch and then send a second message through the second antenna. The second message at this time belongs to an ultra-short distance frame, and the electronic device having a distance from the mobile phone 100 outside the preset safety distance cannot receive the second message.
S1409b, after receiving the second message, the mobile phone 200 sends the second message through the second antenna.
S1410b, after receiving the confirmation message, the mobile phone 100 switches to the first antenna.
S1411b, the mobile phone 200 receives the second message, decrypts the second message by using the key, and obtains the user account of the mobile phone 100 on the social application; the mobile phone 200 obtains a user account of the mobile phone 200 on a social application.
In S1412b, the mobile phone 200 switches from the fourth antenna to the third antenna.
Illustratively, the handset 200 includes a third antenna and a fourth antenna, from which the handset 200 can be switched to the third antenna by controlling the radio frequency switch.
S1413b, the mobile phone 200 sends a request message to the application server, where the request message is used to request that the user account of the mobile phone 100 on the social application be added as a friend.
Optionally, the request message also includes a user account of the mobile phone 200 on the social application.
S1414b, the application server sends a response message to the mobile phone 200 requesting the message.
S1415b, the application server transmits a response message to the request message to the mobile phone 100.
The order of S1414b and S1415b is not limited in this application.
S1416b, the mobile phone 100 displays a prompt message that the friend addition is successful.
In the flow shown in fig. 14B, S1408B is transmitted using a weak antenna to improve security. Since in this embodiment, it is considered that the illegal electronic device (attack device) is not in the vicinity of the mobile phone 100, the illegal electronic device (attack device) may simulate the mobile phone 200 by means of an external amplifier or the like, i.e. "send first message" of S1404b, possibly simulated by the illegal electronic device. Even if the illegal electronic device (attack device) simulates the mobile phone 200 and performs the "send first message" of S1404b, since the mobile phone 100 sends the second message through the weak antenna in S1408b, the illegal electronic device (attack device) cannot receive the second message in S1409b, and thus cannot decrypt with the key generated by itself, and thus cannot acquire the user account of the mobile phone 100 on the social application in S1400 b. In this way, the user account of the mobile phone 100 on the social application is prevented from being acquired by illegal electronic equipment (attack equipment), and better experience is brought to the user.
In S1408b, if the mobile phone 100 sends the second message through the first antenna (i.e. the strong antenna), the illegal electronic device (attack device) may receive the second message; while the "send first message" in the previous S1404b is also performed by the illegal electronic device (attack device), in S1409b, the illegal electronic device (attack device) may decrypt with the key previously generated by itself, and obtain the user account of the mobile phone 100 on the social application in S1400 b.
The content of the seventh embodiment is the same as that of the sixth embodiment unless otherwise specified and unless contradiction occurs.
It should be noted that, although in the fourth to seventh embodiments, the mobile phone 100 and the mobile phone 200 are exemplified, it is clear to those skilled in the art that the electronic device 100 and the electronic device 200 provided with the same social application are applicable to the methods of the fourth to seventh embodiments.
In the fourth to seventh embodiments, all or part of the "first antenna", "second antenna", "third antenna" and "fourth antenna" are described, but it will be apparent to those skilled in the art that all or part of the "first antenna", "second antenna", "third antenna" and "fourth antenna" may be replaced with "first antenna at the first transmission power", "first antenna at the second transmission power", "third antenna at the third transmission power" and "third antenna at the fourth transmission power", respectively. The "first antenna under the first transmitting power" and the "first antenna under the second transmitting power" are the first logical antenna and the second logical antenna; the "third antenna under the third transmitting power" and the "third antenna under the fourth transmitting power" are the third antenna on the logic and the fourth antenna on the logic. The logical first antenna and the logical second antenna may be implemented by adjusting the transmit power through registers inside the chip. The third and fourth antennas may be implemented by adjusting the transmit power through registers inside the chip.
It should be noted that, although the electronic device 100 and the electronic device 200 according to the above embodiments of the present application interact with each other by Wi-Fi signals (Wi-Fi sensing), the short-range wireless communication methods such as bluetooth and ZigBee are also applicable to the technical solutions of the above embodiments, that is, the electronic device 100 and the electronic device 200 according to the above embodiments of the present application may also interact with each other by combining with an antenna by the short-range wireless communication methods such as bluetooth and ZigBee.
All or part of the above embodiments provided in the present application may be freely and arbitrarily combined with each other.
The method for adding the group members or the friends is applicable to the following electronic equipment and system.
Fig. 15 shows an electronic device 1500 provided herein. The electronic apparatus 1500 may be the electronic apparatus 100 (first electronic apparatus) in the above embodiment, or may be the electronic apparatus 200 (second electronic apparatus) in the above embodiment. Illustratively, the electronic device 1500 includes at least one processor 1510, memory 1520, and a display 1530. Wherein processor 1510 is coupled to memory 1520 and display 1530, the coupling in embodiments of the present application may be a communication connection, may be electrical, or in other forms. In particular, memory 1520 is used to store program instructions. The display 1530 is for displaying a user interface. The processor 1510 is configured to invoke program instructions stored in the memory 1520, so that the electronic device 1500 performs steps performed by the first electronic device or the second electronic device in the group member or the friend adding method provided in the embodiment of the present application. It should be appreciated that the electronic device 1500 may be used to implement the method for adding group members or friends provided in the embodiments of the present application, and relevant features may be referred to above, which is not described herein.
In some embodiments, when the display has a touch function, the display is also referred to as a touch display. The operation on the touch display may be implemented by virtual keys. When the display screen does not have a touch function, the display screen is also called a non-touch display screen. Operation on the non-touch display may be achieved by physical keys.
Alternatively, electronic device 1500 may contain more or fewer components than shown in FIG. 15, or certain components may be combined, or certain components may be split, or a different arrangement of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware. In addition, the combination/connection relationship between the components in fig. 15 is also adjustable and modifiable.
The application provides a computer program product which, when run on a first electronic device, causes the first electronic device to execute steps executed by the first electronic device in the group member or friend adding method provided by the embodiment of the application.
The application provides a computer readable storage medium, which comprises a computer program, wherein when the computer program runs on first electronic equipment, the first electronic equipment is caused to execute steps executed by the first electronic equipment in the group member or friend adding method provided by the embodiment of the application.
The application provides a computer program product which, when run on a second electronic device, causes the second electronic device to execute steps executed by the second electronic device in the group member or friend adding method provided by the embodiment of the application.
The application provides a computer readable storage medium, which comprises a computer program, wherein when the computer program runs on second electronic equipment, the second electronic equipment is caused to execute steps executed by the second electronic equipment in the group member or friend adding method provided by the embodiment of the application.
It will be apparent to those skilled in the art that embodiments of the present application may be implemented in hardware, or in both hardware and software. When implemented in hardware and software, the functions described above may be stored on a computer-readable medium. Based on such understanding, the technical solution of the embodiments of the present application may be essentially or a part contributing to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium, including several instructions to cause a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: flash memory, removable hard disk, read-only memory, random access memory, magnetic or optical disk, and the like.
Fig. 16 shows a schematic block diagram of a communication system provided in an embodiment of the present application. The communication system may include a server 1601 and one or more electronic devices. Fig. 16 exemplarily shows a first electronic device 1602 and a second electronic device 1603. The server 1601 may be an application server in the above-described method embodiment. The first electronic device 1602 may be the electronic device 100 in the above-described method embodiment, and the second electronic device 1603 may be the electronic device 200 in the above-described method embodiment.
In addition, embodiments of the present application also provide an apparatus, which may be specifically a chip, a component, or a module, and may include a processor and a memory connected to each other; the memory is configured to store computer-executable instructions, and when the device is operated, the processor may execute the computer-executable instructions stored in the memory, so that the chip performs the methods in the above method embodiments.
The electronic device, the computer readable storage medium, the computer program product or the chip provided in this embodiment are used to execute the corresponding method provided above, so that the beneficial effects thereof can be referred to the beneficial effects in the corresponding method provided above, and will not be described herein.
It will be appreciated by those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional modules is illustrated, and in practical application, the above-described functional allocation may be performed by different functional modules according to needs, i.e. the internal structure of the apparatus is divided into different functional modules to perform all or part of the functions described above.
In the several embodiments provided in this application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of modules or units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another apparatus, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and the parts shown as units may be one physical unit or a plurality of physical units, may be located in one place, or may be distributed in a plurality of different places. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a readable storage medium. Based on such understanding, the technical solution of the embodiments of the present application may be essentially or a part contributing to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium, including several instructions to cause a device (may be a single-chip microcomputer, a chip or the like) or a processor (processor) to perform all or part of the steps of the methods of the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read Only Memory (ROM), a random access memory (random access memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes and substitutions are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (29)

1. The method for adding the group members or the friends is applied to first electronic equipment, the first electronic equipment runs a first social application, and the first electronic equipment comprises the following steps: the antenna comprises a first antenna, a second antenna and a third antenna, wherein the transmitting distance of the first antenna is a first distance which is larger than a preset first safety distance; the transmitting distance of the second antenna is a second distance which is smaller than or equal to the preset first safety distance; wherein the first antenna and the second antenna are different antennas; characterized in that the method comprises:
receiving a first user input;
the first electronic device generates a random key;
the first electronic device sends a first message through the second antenna, wherein the first message comprises the random key;
Receiving a second message from a second electronic device;
the first electronic device decrypts the second message by using the random key, and obtains a user account on the first social application;
the first electronic device sends a request message to an application server of the first social application through the first social application and the first antenna; the request message includes the user account; the request message further includes a corresponding group identifier input by the first user or a user account of the first electronic device on the first social application;
receiving a first response message from the application server;
responding to the first response message, prompting by the first electronic device that the first user inputs that the corresponding group adding group member is successful, or that the first electronic device adds friends on the user account of the first social application is successful;
the preset first safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a clear text mode.
2. The method of claim 1, wherein the step of determining the position of the substrate comprises,
The first electronic device sends a first message through the second antenna; comprising the following steps: the first electronic equipment sends a first message through the second antenna in a Bluetooth or ZigBee wireless communication mode;
the receiving of a second message from a second electronic device; comprising the following steps: and receiving a second message from the second electronic equipment in a Bluetooth or ZigBee wireless communication mode.
3. The method of claim 1, wherein the first electronic device generates a random key; comprising the following steps:
the first electronic equipment issues an added group member service message or an added friend service message in a Wi-Fi perceived wireless communication mode through the first antenna;
receiving a response message from the second electronic equipment in a Wi-Fi perceived wireless communication mode;
in response to the response message, the first electronic device generates a random key.
4. The method of claim 3, wherein the first electronic device transmits a first message via the second antenna; comprising the following steps: the first electronic equipment sends a first message in a Wi-Fi perceived wireless communication mode through the second antenna;
The receiving of a second message from a second electronic device; comprising the following steps: a second message is received from the second electronic device in Wi-Fi aware wireless communication.
5. The method of any of claims 1-4, wherein the receiving a second message from the second electronic device; comprising the following steps:
after the distance between the first electronic device and the second electronic device is less than or equal to a preset second safety distance, or after the distance between the first electronic device and the second electronic device is greater than the preset second safety distance,
receiving a second message from the second electronic device;
the preset second safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a clear text mode.
6. The method of claim 5, wherein after the receiving the second message from the second electronic device, the method further comprises:
the first electronic device sends a confirmation message to the second electronic device through the first antenna.
7. The method of any of claims 1-4, wherein the first antenna is connected to the same wireless communication module as the second antenna; the wireless communication module comprises one of a Wi-Fi chip, a Bluetooth chip and a ZigBee chip; the Wi-Fi chip, the Bluetooth chip or the ZigBee chip is arranged in the wireless communication module; the first antenna and the second antenna are connected with the Wi-Fi chip, the Bluetooth chip or the ZigBee chip.
8. The method for adding the group members or the friends is applied to first electronic equipment, and the first electronic equipment runs a first social application; characterized in that the method comprises:
receiving a first user input;
responding to the first user input, and issuing an add group member service message or an add friend service message by the first electronic equipment through a first antenna;
after the distance between the first electronic device and the second electronic device is smaller than or equal to a preset second safety distance, a first message from the second electronic device is received;
acquiring a user account on the first social application from the first message, and prompting to confirm the user account;
receiving a second user input for confirming the addition;
in response to the second user input, the first electronic device sends a request message to an application server of the first social application through the first antenna and the first social application; the request message includes the user account; the request message further includes a corresponding group identifier input by the first user or a user account of the first electronic device on the first social application;
Receiving a first response message from the application server;
responding to the first response message, prompting by the first electronic device that the first user inputs that the corresponding group adding group member is successful, or that the first electronic device adds friends on the user account of the first social application is successful;
the preset second safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a clear text mode.
9. The method of claim 8, wherein the step of determining the position of the first electrode is performed,
the first electronic equipment issues an added group member service message or an added friend service message through the first antenna; comprising the following steps: the first electronic equipment issues an added group member service message or an added friend service message in a Wi-Fi sensing, bluetooth or ZigBee wireless communication mode through the first antenna;
the first message from the second electronic device is received; comprising the following steps: and receiving the first message from the second electronic equipment in a Wi-Fi sensing, bluetooth or ZigBee wireless communication mode.
10. The method according to claim 8 or 9, wherein after the receiving the first message from the second electronic device, the method further comprises:
The first electronic device sends a confirmation message to the second electronic device through the first antenna.
11. The method for adding the group members or the friends is applied to first electronic equipment, and the first electronic equipment runs a first social application; the first electronic device includes: the antenna comprises a first antenna, a second antenna and a third antenna, wherein the transmitting distance of the first antenna is a first distance which is larger than a preset first safety distance; the transmitting distance of the second antenna is a second distance which is smaller than or equal to the preset first safety distance; wherein the first antenna and the second antenna are different antennas; characterized in that the method comprises:
receiving a first user input;
responding to the first user input, and issuing an add group member service message or an add friend service message by the first electronic equipment through the first antenna;
after the distance between the first electronic device and the second electronic device is smaller than or equal to a preset second safety distance, a first message from the second electronic device is received; the preset second safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a plaintext manner;
In response to the first message, acquiring a random key from the first message, and encrypting a group identifier corresponding to the first user input or a user account of the first electronic device on the first social application by using the random key;
the first electronic equipment sends a second message through the second antenna; the second message comprises the encrypted group identifier or the user account;
receiving a first response message from an application server of the first social application;
responding to the first response message, prompting by the first electronic device that the first user inputs that the corresponding group adding group member is successful, or that the first electronic device adds friends on the user account of the first social application is successful;
the preset first safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a plaintext manner; the preset second safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a clear text mode.
12. The method for adding the group members or the friends is applied to first electronic equipment, the first electronic equipment runs a first social application, and the first electronic equipment comprises the following steps: the first antenna is provided with a first transmission distance under the first transmission power, the transmission distance of the first antenna under the second transmission power is provided with a second distance, the first distance is larger than a preset first safety distance, and the second distance is smaller than or equal to the preset first safety distance; characterized in that the method comprises:
Receiving a first user input;
in response to the first user input, the first electronic device generates a random key;
the first electronic device sending a first message over the first antenna at the second transmit power, the first message including the random key;
receiving a second message from a second electronic device;
in response to the second message, the first electronic device decrypts the second message using the random key, and obtains a user account on the first social application;
the first electronic device sends a request message to an application server of the first social application; the request message includes the user account; the request message further includes a corresponding group identifier input by the first user or a user account of the first electronic device on the first social application;
receiving a first response message from the application server;
responding to the first response message, prompting by the first electronic device that the first user inputs that the corresponding group adding group member is successful, or that the first electronic device adds friends on the user account of the first social application is successful;
The preset first safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a clear text mode.
13. The method for adding the group members or the friends is applied to first electronic equipment, the first electronic equipment runs a first social application, and the first electronic equipment comprises the following steps: the first antenna is provided with a first transmission distance under the first transmission power, the transmission distance of the first antenna under the second transmission power is provided with a second distance, the first distance is larger than a preset first safety distance, and the second distance is smaller than or equal to the preset first safety distance; characterized in that the method comprises:
receiving a first user input;
responding to the first user input, and issuing an add group member service message or an add friend service message by the first electronic equipment through the first antenna under the first transmission power;
after the distance between the first electronic device and the second electronic device is smaller than or equal to a preset second safety distance, a first message from the second electronic device is received;
in response to the first message, acquiring a random key from the first message, encrypting a group identifier corresponding to the first user input by using the random key, or encrypting a user account of the first electronic device on the first social application;
The first electronic device issues a second message through the first antenna at the second transmit power; the second message comprises the encrypted group identifier, or the second message comprises the encrypted user account of the first electronic device on the first social application;
receiving a first response message from an application server of the first social application;
responding to the first response message, prompting by the first electronic device that the first user inputs that the corresponding group adding group member is successful, or that the first electronic device adds friends on the user account of the first social application is successful;
the preset first safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a plaintext manner; the preset second safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a clear text mode.
14. The method for adding the group members or the friends is applied to second electronic equipment, the second electronic equipment runs a first social application, and the second electronic equipment comprises: the third antenna is provided with a third transmitting distance which is larger than a preset second safety distance; the transmitting distance of the fourth antenna is a fourth distance, and the fourth distance is smaller than or equal to the preset second safety distance; wherein the third antenna and the fourth antenna are different antennas; characterized in that the method comprises:
After the distance between the first electronic device and the second electronic device is smaller than or equal to a preset first safety distance, a first message from the first electronic device is received;
in response to the first message, acquiring a random key from the first message, acquiring a user account of the second electronic device on the first social application, and encrypting the user account by using the random key;
the second electronic equipment sends a second message through the fourth antenna, wherein the second message comprises the encrypted user account;
receiving a second response message from an application server of the first social application;
responding to the second response message, wherein the second electronic equipment prompts that the user account is added with group success or that the user account is added with friends successfully;
the preset first safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a clear text mode.
15. The method of claim 14, wherein prior to the receiving the second response message from the application server of the first social application, the method further comprises:
Receiving an acknowledgement message from the first electronic device;
in response to the acknowledgement message, the second electronic device switches to the third antenna.
16. The method of claim 14 or 15, wherein prior to the receiving the first message from the first electronic device, the method further comprises:
receiving an added group member service message or an added friend service message from the first electronic equipment in a Wi-Fi perceived wireless communication mode;
and responding to the group member service adding message or the friend service adding message, and sending a response message by the second electronic equipment through the third antenna in a Wi-Fi perceived wireless communication mode.
17. The method according to claim 14 or 15, wherein,
the first message from the first electronic device is received; comprising the following steps: receiving a first message from a first electronic device in a Bluetooth or ZigBee wireless communication mode;
the second electronic device sends a second message through the fourth antenna; comprising the following steps: and the second electronic equipment sends a second message through the fourth antenna in a Bluetooth or ZigBee wireless communication mode.
18. The method for adding the group members or the friends is applied to second electronic equipment, and the second electronic equipment runs a first social application; characterized in that the method comprises:
after the distance between the first electronic device and the second electronic device is smaller than or equal to a preset first safety distance, a first message from the first electronic device is received;
in response to the first message, acquiring a random key from the first message, acquiring a user account of the second electronic device on the first social application, and encrypting the user account by using the random key;
the second electronic equipment sends a second message through a third antenna, wherein the second message comprises the encrypted user account;
receiving a request message from an application server of the first social application;
receiving a first user operation for confirming the addition;
responsive to the first user operation, the second electronic device sends a reply message to the application server; the reply message is used for indicating confirmation addition;
the preset first safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a clear text mode.
19. The method for adding the group members or the friends is applied to second electronic equipment, the second electronic equipment runs a first social application, and the second electronic equipment comprises: the third antenna is provided with a third transmitting distance which is larger than a preset second safety distance; the transmitting distance of the fourth antenna is a fourth distance, and the fourth distance is smaller than or equal to the preset second safety distance; wherein the third antenna and the fourth antenna are different antennas; characterized in that the method comprises:
receiving an add group member service message or an add friend service message from a first electronic device;
responding to the group member service adding message or the friend service adding message, and acquiring a user account of the second electronic equipment on the first social application;
the second electronic device sends a first message to the first electronic device through the fourth antenna; the first message includes a user account of the second electronic device on the first social application;
receiving a second response message from an application server of the first social application;
Responding to the second response message, wherein the second electronic equipment prompts that the user account is added with group success or that the user account is added with friends successfully;
the preset second safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a clear text mode.
20. The method of claim 19, wherein prior to the receiving the second response message from the application server of the first social application, the method further comprises:
receiving an acknowledgement message from the first electronic device;
in response to the acknowledgement message, the second electronic device switches to the third antenna.
21. The method for adding the group members or the friends is applied to second electronic equipment, the second electronic equipment runs a first social application, and the second electronic equipment comprises: the third antenna is provided with a third transmitting distance which is larger than a preset second safety distance; the transmitting distance of the fourth antenna is a fourth distance, and the fourth distance is smaller than or equal to the preset second safety distance; wherein the third antenna and the fourth antenna are different antennas; characterized in that the method comprises:
Receiving an add group member service message or an add friend service message from a first electronic device;
in response to the adding group member service message or the adding friend service message, the second electronic device generates a random key;
the second electronic device sends a first message through the fourth antenna; the first message includes the random key;
after the distance between the first electronic device and the second electronic device is smaller than or equal to a preset first safety distance, the second electronic device receives a second message from the first electronic device, decrypts the second message by using the random key, acquires a group identifier on the first social application, or acquires a user account of the first electronic device on the first social application, and acquires a user account of the second electronic device on the first social application;
the second electronic equipment sends a request message to an application server of the first social application through the third antenna and the first social application; the request message comprises the group identification or a user account of the first electronic device on the first social application and a user account of the second electronic device on the first social application;
Receiving a second response message from the application server;
responding to the second response message, wherein the second electronic equipment prompts that the user account is added with group success or that the user account is added with friends successfully;
the preset first safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a clear text mode.
22. The method of claim 21, wherein after the second electronic device receives the second message from the first electronic device, the method further comprises:
and the second electronic equipment sends an acknowledgement message through the fourth antenna.
23. The method for adding the group members or the friends is applied to second electronic equipment, the second electronic equipment runs a first social application, and the second electronic equipment comprises: the third antenna has a third transmission distance under third transmission power, and a fourth transmission distance under fourth transmission power, wherein the third distance is larger than a preset second safety distance, and the fourth distance is smaller than or equal to the preset second safety distance; characterized in that the method comprises:
After the distance between the first electronic device and the second electronic device is smaller than or equal to a preset first safety distance, a first message from the first electronic device is received;
in response to the first message, acquiring a random key from the first message, acquiring a user account of the second electronic device on the first social application, and encrypting the user account by using the random key;
the second electronic equipment sends a second message through the third antenna under the fourth transmitting power, wherein the second message comprises the encrypted user account;
receiving a second response message from an application server of the first social application;
responding to the second response message, wherein the second electronic equipment prompts that the user account is added with group success or that the user account is added with friends successfully;
the preset first safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a clear text mode.
24. The method for adding the group members or the friends is applied to second electronic equipment, the second electronic equipment runs a first social application, and the second electronic equipment comprises: the third antenna has a third transmission distance under third transmission power, and a fourth transmission distance under fourth transmission power, wherein the third distance is larger than a preset second safety distance, and the fourth distance is smaller than or equal to the preset second safety distance; characterized in that the method comprises:
Receiving an add group member service message or an add friend service message from a first electronic device;
responding to the group member service adding message or the friend service adding message, and acquiring a user account of the second electronic equipment on the first social application;
the second electronic equipment sends a first message to the first electronic equipment through the third antenna under the fourth transmitting power; the first message includes a user account of the second electronic device on the first social application;
receiving a second response message from an application server of the first social application;
responding to the second response message, wherein the second electronic equipment prompts that the user account is added with group success or that the user account is added with friends successfully;
the preset second safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a clear text mode.
25. The method for adding the group members or the friends is applied to second electronic equipment, the second electronic equipment runs a first social application, and the second electronic equipment comprises: the third antenna has a third transmission distance under third transmission power, and a fourth transmission distance under fourth transmission power, wherein the third distance is larger than a preset second safety distance, and the fourth distance is smaller than or equal to the preset second safety distance; characterized in that the method comprises:
Receiving an add group member service message or an add friend service message from a first electronic device;
in response to the adding group member service message or the adding friend service message, the second electronic device generates a random key;
the second electronic equipment sends a first message through the third antenna under the fourth transmitting power; the first message includes the random key;
after the distance between the first electronic device and the second electronic device is smaller than or equal to a preset first safety distance, the second electronic device receives a second message from the first electronic device, decrypts the second message by using the random key, acquires a group identifier on the first social application, or acquires a user account of the first electronic device on the first social application, and acquires a user account of the second electronic device on the first social application;
the second electronic equipment sends a request message to an application server of the first social application through the third antenna and the first social application under the third transmitting power; the request message comprises the group identification or a user account of the first electronic device on the first social application and a user account of the second electronic device on the first social application;
Receiving a second response message from the application server;
responding to the second response message, wherein the second electronic equipment prompts that the user account is added with group success or that the user account is added with friends successfully;
the preset first safety distance is a safety distance that the first electronic device and the second electronic device can exchange secret information in a clear text mode.
26. A first electronic device, comprising: a memory, a processor, and a computer program; wherein the computer program is stored in the memory; wherein the computer program, when executed by the processor, causes the first electronic device to implement the method of adding group members or friends as claimed in any of claims 1-13.
27. A second electronic device, comprising: a memory, a processor, and a computer program; wherein the computer program is stored in the memory; wherein the computer program, when executed by the processor, causes the first electronic device to implement the method of adding a group member or buddy according to any of claims 14-25.
28. A computer readable storage medium comprising a computer program, characterized in that the computer program, when run on a first electronic device, causes the first electronic device to perform the group member or buddy addition method of any of claims 1-13.
29. A computer readable storage medium comprising a computer program, characterized in that the computer program, when run on a second electronic device, causes the second electronic device to perform the group member or buddy addition method of any of claims 14-25.
CN202110129143.2A 2021-01-29 2021-01-29 Group member or friend adding method, electronic equipment and system Active CN114827059B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202110129143.2A CN114827059B (en) 2021-01-29 2021-01-29 Group member or friend adding method, electronic equipment and system
PCT/CN2021/141790 WO2022161071A1 (en) 2021-01-29 2021-12-27 Group member or friend adding method, and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110129143.2A CN114827059B (en) 2021-01-29 2021-01-29 Group member or friend adding method, electronic equipment and system

Publications (2)

Publication Number Publication Date
CN114827059A CN114827059A (en) 2022-07-29
CN114827059B true CN114827059B (en) 2023-06-27

Family

ID=82525605

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110129143.2A Active CN114827059B (en) 2021-01-29 2021-01-29 Group member or friend adding method, electronic equipment and system

Country Status (2)

Country Link
CN (1) CN114827059B (en)
WO (1) WO2022161071A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116095031B (en) * 2023-04-10 2023-06-20 科讯嘉联信息技术有限公司 RPA automatic micro-adding system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015027801A1 (en) * 2013-08-29 2015-03-05 华为终端有限公司 Near field communication-based data transmission method and apparatus, and near field communication device
WO2017128870A1 (en) * 2016-01-26 2017-08-03 腾讯科技(深圳)有限公司 Information processing method, first terminal, second terminal, server and system
CN108900969A (en) * 2018-06-07 2018-11-27 广东小天才科技有限公司 Good friend's adding method, device, equipment and storage medium
CN110149269A (en) * 2019-05-30 2019-08-20 华为技术有限公司 A kind of communication means, server and communication system
CN111835530A (en) * 2020-07-10 2020-10-27 Oppo广东移动通信有限公司 Group joining method and device
CN112153721A (en) * 2020-08-05 2020-12-29 华为技术有限公司 Wireless routing equipment access method and wireless routing equipment
WO2021000696A1 (en) * 2019-06-30 2021-01-07 上海连尚网络科技有限公司 Method and device for adding friend

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ATE464702T1 (en) * 2005-04-25 2010-04-15 Sony Ericsson Mobile Comm Ab ELECTRONIC DEVICE FOR A WIRELESS COMMUNICATIONS SYSTEM AND METHOD FOR OPERATING AN ELECTRONIC DEVICE FOR A WIRELESS COMMUNICATIONS SYSTEM
JP2009087044A (en) * 2007-09-28 2009-04-23 Ntt Docomo Inc Communication terminal device and community management device
CN102521743B (en) * 2011-11-16 2014-07-09 赵启程 Mobile phone safety payment method and system on basis of wireless channel
KR101388251B1 (en) * 2012-11-30 2014-04-24 숭실대학교산학협력단 Method and apparatus for authentication of unknown user in social network service
US9525753B2 (en) * 2012-12-12 2016-12-20 Netspective Communications Llc Integration of devices through a social networking platform
US9633496B2 (en) * 2014-01-09 2017-04-25 Ford Global Technologies, Llc Vehicle contents inventory system
CN104125485B (en) * 2014-07-02 2018-03-16 深圳创维数字技术有限公司 A kind of user profile shared method, equipment and system
CN105681161B (en) * 2015-08-20 2017-10-27 腾讯科技(深圳)有限公司 A kind of methods, devices and systems for adding good friend's account
CN105137750A (en) * 2015-09-24 2015-12-09 北京奇虎科技有限公司 Method realizing data transmission of intelligent watch, device and intelligent watch
CN105610949B (en) * 2015-12-30 2020-04-07 腾讯科技(深圳)有限公司 Resource data use permission sharing method, device and system
CN106209604A (en) * 2016-08-26 2016-12-07 北京小米移动软件有限公司 Add the method and device of good friend
CN106411716A (en) * 2016-10-28 2017-02-15 珠海市魅族科技有限公司 Friend adding method and apparatus
EP3949332A1 (en) * 2019-05-06 2022-02-09 Apple Inc. Standalone wearable device configuration and interface

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015027801A1 (en) * 2013-08-29 2015-03-05 华为终端有限公司 Near field communication-based data transmission method and apparatus, and near field communication device
WO2017128870A1 (en) * 2016-01-26 2017-08-03 腾讯科技(深圳)有限公司 Information processing method, first terminal, second terminal, server and system
CN108900969A (en) * 2018-06-07 2018-11-27 广东小天才科技有限公司 Good friend's adding method, device, equipment and storage medium
CN110149269A (en) * 2019-05-30 2019-08-20 华为技术有限公司 A kind of communication means, server and communication system
WO2021000696A1 (en) * 2019-06-30 2021-01-07 上海连尚网络科技有限公司 Method and device for adding friend
CN111835530A (en) * 2020-07-10 2020-10-27 Oppo广东移动通信有限公司 Group joining method and device
CN112153721A (en) * 2020-08-05 2020-12-29 华为技术有限公司 Wireless routing equipment access method and wireless routing equipment

Also Published As

Publication number Publication date
CN114827059A (en) 2022-07-29
WO2022161071A1 (en) 2022-08-04

Similar Documents

Publication Publication Date Title
US11979251B2 (en) Home device control method and device
CN112449332B (en) Bluetooth connection method and electronic equipment
CN113360108B (en) Screen projection connection control method and electronic equipment
WO2020042119A1 (en) Message transmission method and device
WO2020216160A1 (en) Automatic routing method for se, and electronic device
CN114697058B (en) Identity authentication method, electronic equipment and computer readable storage medium
EP4283931A1 (en) Nfc method and system, and electronic device
CN114697879A (en) Bluetooth pairing method, electronic device, chip and storage medium
CN114679708A (en) Communication method, system and electronic equipment
CN113038627B (en) File sharing method, mobile device and computer storage medium
CN114827059B (en) Group member or friend adding method, electronic equipment and system
US20230283994A1 (en) Automatic Control Method, Electronic Device, and Computer-Readable Storage Medium
CN114844974B (en) Method for sharing address book, mobile device, electronic device and communication system
CN112615891B (en) Pairing method and device
EP4203409A1 (en) Method and devices for configuring device
CN114844732B (en) Conference access method and electronic equipment
WO2023273458A1 (en) Device control method and apparatus
WO2023051204A1 (en) Cross-device connection method, electronic device and storage medium
WO2023098356A1 (en) Fingerprint identification method and system, and electronic device
WO2021037208A1 (en) Bluetooth connection method and electronic apparatus
CN116491100A (en) Pre-master key generation method and device of data packet transport layer security protocol DTLS
CN117480796A (en) Method and device for selecting authentication mechanism for personal Internet of things equipment, UE, network function and storage medium
CN117097839A (en) Communication method and communication system
CN117349871A (en) Message management method, electronic equipment and system
CN115913600A (en) Method, apparatus, electronic device and medium for identifying device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant