CN116419377A - Data communication method, device, terminal, storage medium, and program product - Google Patents

Data communication method, device, terminal, storage medium, and program product Download PDF

Info

Publication number
CN116419377A
CN116419377A CN202111679525.9A CN202111679525A CN116419377A CN 116419377 A CN116419377 A CN 116419377A CN 202111679525 A CN202111679525 A CN 202111679525A CN 116419377 A CN116419377 A CN 116419377A
Authority
CN
China
Prior art keywords
terminal
target application
processor
state
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111679525.9A
Other languages
Chinese (zh)
Inventor
马安生
杨玉林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN202111679525.9A priority Critical patent/CN116419377A/en
Priority to PCT/CN2022/131055 priority patent/WO2023124567A1/en
Publication of CN116419377A publication Critical patent/CN116419377A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0225Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0261Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/06Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The present application relates to a data communication method, apparatus, terminal, storage medium and program product. The method is applied to a first terminal, the first terminal comprises a first processor and a second processor, the first processor is used for running a first system, and the second processor is used for running a second system; the method comprises the following steps: receiving communication data sent by a second terminal; determining a target application according to the communication data; and if the target application is authorized in the first terminal under the condition that the first terminal is in the dormant state, responding to the communication data. The method can reduce the power consumption of the mobile communication equipment with the large-small-core dual-system architecture.

Description

Data communication method, device, terminal, storage medium, and program product
Technical Field
The present invention relates to the field of mobile terminals, and in particular, to a data communication method, apparatus, terminal, storage medium, and program product.
Background
With the development of communication technology, most mobile communication devices currently adopt a large-small-core dual-processing architecture, and large cores are usually intelligent processors with rich functions and strong processing capacity, and have more linkage functions with external terminal devices and larger communication data; the corelet generally has simpler supported functions, runs in a real-time operating system, has no ecological opening capability and is controllable in data communication.
Disclosure of Invention
Based on this, it is necessary to provide a data communication method, apparatus, terminal, storage medium and program product capable of reducing power consumption of a mobile communication device of a dual-system architecture of a large core and a small core, aiming at the technical problem of high power consumption caused by frequent wake-up of the large core in the prior art.
In a first aspect, a data communication method is provided and applied to a first terminal, wherein the first terminal comprises a first processor and a second processor, the first processor is used for running a first system, and the second processor is used for running a second system; the method comprises the following steps:
receiving communication data sent by a second terminal;
determining a target application according to the communication data;
and if the target application is authorized in the first terminal under the condition that the first system is in the dormant state, responding to the communication data.
In a second aspect, a data communication method is provided and applied to a second terminal; the method comprises the following steps:
acquiring communication data of a target application;
if the target application is authorized in the second terminal under the condition that the data communication switch of the second terminal is in a closed state, sending the communication data to a first terminal so that the first terminal responds to the communication data under the condition that a first system is in a dormant state and the target application is authorized in the first terminal; the first terminal comprises a first processor and a second processor, wherein the first processor is used for running the first system, and the second processor is used for running the second system.
In a third aspect, a data communication apparatus is provided, applied to a first terminal, where the first terminal includes a first processor and a second processor, where the first processor is configured to operate a first system, and the second processor is configured to operate a second system; the device comprises:
the receiving module is used for receiving communication data sent by the second terminal;
the first determining module is used for determining a target application according to the communication data;
and the second determining module is used for responding to the communication data if the target application is authorized in the first terminal under the condition that the first system is in a dormant state.
In a fourth aspect, there is provided a data communication apparatus for use in a second terminal, the apparatus comprising:
the acquisition module is used for acquiring communication data of the target application;
the first determining module is used for sending the communication data to the first terminal if the target application is authorized in the second terminal when the data communication switch of the second terminal is in a closed state, so that the first terminal responds to the communication data when the first system is in a dormant state and the target application is authorized in the first terminal; the first terminal comprises a first processor and a second processor, wherein the first processor is used for running the first system, and the second processor is used for running the second system.
In a fifth aspect, there is provided a terminal comprising a memory, a first processor and a second processor, the memory storing a computer program, the first processor being configured to run a first system, the second processor being configured to run a second system, the first and second processors, when executing the computer program, causing the terminal to implement the data communication method according to the first aspect.
In a sixth aspect, there is provided a terminal comprising a memory storing a computer program and a processor, which when executed causes the terminal to carry out the steps of the method of the second aspect.
In a seventh aspect, there is provided a computer readable storage medium having stored thereon a computer program which when executed by a processor implements the steps of the methods of the first and second aspects.
In an eighth aspect, there is provided a computer program product comprising a computer program which, when executed by a processor, implements the steps of the methods of the first and second aspects.
The data communication method, the device, the terminal, the storage medium and the program product are applied to the first terminal with the dual system, the first terminal receives the communication data sent by the second terminal, the target application corresponding to the communication data can be determined according to the communication data sent by the second terminal, and further, the first terminal can respond to the communication data if the target application is authorized in the first terminal under the condition that the first system is in a dormant state, particularly if the target application is not authorized in the first terminal, the first terminal does not respond to the communication data, namely does not wake up the first system, so that the situation that the first terminal frequently wakes up the first system under the condition that the communication data is received by the first terminal is avoided, and the power consumption of the first terminal is further reduced under the premise that the user experience is ensured.
Drawings
FIG. 1 is an application environment diagram of a data communication method in one embodiment;
FIG. 1a is a schematic diagram of a hardware architecture of a first terminal according to an embodiment;
FIG. 2 is a flow diagram of a method of data communication in one embodiment;
FIG. 2a is a schematic diagram illustrating interaction between a first terminal and a second terminal in one embodiment;
FIG. 2b is a schematic diagram illustrating interaction between a first terminal and a second terminal according to another embodiment;
FIG. 2c is a schematic diagram illustrating interaction between a first terminal and a second terminal according to another embodiment;
FIG. 3 is a flow chart of a method of data communication in another embodiment;
FIG. 3a is a schematic diagram illustrating interaction between a terminal and a server in one embodiment;
FIG. 3b is a schematic diagram illustrating interaction between a terminal and a server in one embodiment;
FIG. 4 is a flow chart of a method of data communication in another embodiment;
FIG. 5 is a flow diagram of a method of data communication in one embodiment;
FIG. 6 is a flow chart of a method of data communication in another embodiment;
FIG. 7 is a flow chart of a method of data communication in another embodiment;
FIG. 8 is a block diagram of a data communication device in one embodiment;
FIG. 9 is a block diagram of a data communication device in one embodiment;
FIG. 10 is an internal block diagram of a terminal in one embodiment;
fig. 11 is an internal structural view of a terminal in another embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
It will be understood that the terms "first," "second," and the like, as used herein, may be used to describe various elements, but these elements are not limited by these terms. These terms are only used to distinguish one element from another element. For example, a first client may be referred to as a second client, and similarly, a second client may be referred to as a first client, without departing from the scope of the present application. Both the first client and the second client are clients, but they are not the same client.
The data communication method provided by the application can be applied to an application environment shown in fig. 1. Wherein the first terminal 102 and the second terminal 104 may communicate via bluetooth or Wi-Fi. The first terminal 102 may be a smart watch with dual systems, but is not limited to a wristwatch, and may be other terminal devices, such as a mobile phone, a computer, an iPad, a game console, etc., or may be a portable wearable device with dual systems, such as a bracelet, a helmet, an earphone, smart glasses, etc. The first terminal 102 includes a first processor for operating the first system and a second processor for operating the second system, the first processor having an operating power consumption greater than an operating power consumption of the second processor, optionally the first processor having a processing power that is better than a processing power of the second processor. Illustratively, the hardware architecture of the first terminal 102 may be an architecture diagram as shown in fig. 1a, wherein the first system of the first terminal 102 may be an SDW3300 system; the second system may be an Apollo4 system, or the first system may be an android system, the second system may be an Rtos system, or the like. The sleep mode of the dual-system terminal refers to a state that a system with smaller power consumption in the dual-system terminal runs in the foreground and an intelligent system with larger power consumption runs in the background, taking a first system of a first terminal as an android system and a second system as an Rtos system as an example, when the android system of the first terminal is in the foreground, the android system in the dual-core system currently obtains the display right of a liquid crystal screen (Liquid Crystal Display, lcd) of the first terminal, and the liquid crystal screen lcd of the first terminal displays the content of the android system; when the Rtos system of the first terminal is in the foreground, that is, the Rtos system in the dual-core system currently obtains the lcd display right of the liquid crystal screen of the first terminal, and the lcd display content of the Rtos system. It should be noted that, in fig. 1a, the bluetooth chip BT is only an example of being mounted on the second system, and the bluetooth chip BT may also be mounted on the first system. The second terminal 102 may be, but is not limited to, any of a variety of personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices.
In one embodiment, as shown in fig. 2, a data communication method is provided, taking as an example that the method is applied to the first terminal in fig. 1, the first terminal including a first processor for running a first system and a second processor for running a second system, the data communication method comprising the steps of:
s201, receiving communication data sent by the second terminal.
Wherein the communication data may be communication data generated by an application running on the second terminal, for example, the application may be a voice communication application, and the generated communication data may be voice communication data or the like; for another example, the application may be an image presentation type application, the generated communication data may be image communication data, or the like. Optionally, the first terminal and the second terminal may establish communication connection through bluetooth, or may establish communication connection through Wi-Fi by using a wireless fidelity technology, that is, the first terminal may receive communication data sent by the second terminal through bluetooth communication with the second terminal, or may receive communication data sent by the second terminal through Wi-Fi communication with the second terminal.
Optionally, the bluetooth chip or the Wi-Fi chip of the first terminal may be mounted on the first system or may be mounted on the second system, which is to be understood that when the bluetooth chip or the Wi-Fi chip is mounted on the first system, the first system of the first terminal enters a sleep state, the first terminal may switch the running right of bluetooth or Wi-Fi to the second system; when the Bluetooth chip or the Wi-Fi chip is mounted on the second system and the second system of the first terminal enters a dormant state, the first terminal can switch the running right of the Bluetooth chip or the Wi-Fi chip to the first system.
S202, determining a target application according to the communication data.
The target application refers to a generic term of an application with different client interfaces, for example, may be a communication application in the first terminal or the second terminal, where the target application may have one client in each of the first terminal and the second terminal, and thus may be authorized in each of the first terminal and the second terminal. Optionally, the target application may be a communication application running on the first terminal, or may be an entertainment application, or may be an image presentation application. Optionally, the application identifier may be carried in the communication data sent by the second terminal, and the first terminal may determine the target application according to the application identifier in the received communication data. Or, the first terminal may analyze the character segment of the received communication data, and determine the target application corresponding to the communication data according to the analysis result of the character segment. Alternatively, the target application may be determined according to a transmission port of the communication data.
S203, if the target application is authorized in the first terminal under the condition that the first system is in the dormant state, responding to the communication data.
The first system of the first terminal can be in a dormant state or a working state. The target application may be authorized or unauthorized in the first terminal. Alternatively, the first terminal may send the voice communication data to the second terminal in response to the communication data, or may display image information corresponding to the communication data on the first terminal.
Optionally, in this embodiment, whether the target application is authorized may be preset by the user, for example, the user may preset a white list, and authorize the applications in the white list, and after determining, according to the communication data, the first terminal may determine whether the target application is authorized by checking whether the target application is in the white list; or, the first terminal may also send an application authorization request to the cloud server, request the cloud server to authorize the application, send an authorization identifier to the first terminal after authorizing the application, and after the first terminal determines the target application according to the communication data, determine whether the target application is authorized by checking whether the target application has the authorization identifier.
Optionally, in this embodiment, in a case that the first system of the first terminal is in a dormant state, that is, the second system of the first terminal is running in the foreground, if it is determined that the target application is authorized in the first terminal, as shown in fig. 2a, the first terminal may determine to respond to the communication data and normally communicate with the target application in the second terminal, for example, the first terminal may wake up the first system through the second system, and the first system performs response operations such as processing, displaying, and sending corresponding data to the second terminal; if it is determined that the target application is not authorized in the first terminal, as shown in fig. 2b, the first terminal may determine that the communication data is not responded, and the target application in the first terminal and the target application in the second terminal cannot normally communicate, for example, the second system of the first terminal may not wake up the first system, may directly discard the communication data, or store the communication data, and when the first system transitions from the sleep state to the working state, the first system processes and responds to the communication data, thereby reducing the frequency and duration of waking up the first system, and saving the power consumption of the first terminal. In addition, it can be understood that when the first system of the first terminal is in a working state, that is, the first system is operated in the foreground, because the first system is opened to the outside at this time, the linkage function with the external terminal device is more, and the communication data volume is larger, as shown in fig. 2c, at this time, whether the target application is authorized in the first terminal or not, the first terminal can respond to the received communication data, and the target application in the first terminal and the target application in the second terminal can normally communicate.
The data communication method is applied to the first terminal with the dual systems, the first terminal receives the communication data sent by the second terminal, and can determine the target application corresponding to the communication data according to the communication data sent by the second terminal, so that the first terminal can respond to the communication data if the target application is authorized in the first terminal under the condition that the first system is in a dormant state, especially if the target application is not authorized in the first terminal, the first terminal does not respond to the communication data, namely does not wake up the first system, thereby avoiding the condition that the first terminal frequently wakes up the first system under the condition of receiving the communication data, responding to the communication data when the target application is authorized in the first terminal, and further reducing the power consumption of the first terminal on the premise of ensuring the user experience.
Further, in one embodiment, the method further includes: if the target application is not authorized in the first terminal, the communication data is not responded.
The first terminal can send an authorization request to the server to authorize the application under the condition of the working state of the first system, if the server passes the authorization request of the first terminal, the application corresponding to the authorization request is authorized, if the server does not pass the authorization request of the first terminal, the application corresponding to the authorization request is not authorized, after the server authorizes the application corresponding to the authorization request of the first terminal, the authorization code of the application corresponding to the authorization request is sent to the first terminal, and the first terminal stores the authorization code sent by the server.
Optionally, in this embodiment, after the first terminal determines the target application according to the received communication data, the first terminal may query whether the first terminal stores an authorization code of the target application, if the first terminal stores the authorization code of the target application, the first terminal may determine that the target application is authorized, and if the first terminal does not store the authorization code of the target application, the first terminal may determine that the target application is unauthorized. Further, if the target application is not authorized in the first terminal, the first terminal will not respond to the communication data, alternatively, the first terminal may discard the communication data directly, or store the communication data, and when the first system transitions from the sleep state to the working state, the first system processes and responds to the communication data. Alternatively, if the target application is authorized in the first terminal, the first terminal will wake up the first system, so that the first terminal first system responds to the communication data.
In this embodiment, if the target application is not authorized in the first terminal under the condition that the first system of the first terminal is in the sleep state, the first terminal will not respond to the received communication data, so that the first terminal is prevented from waking up the first system frequently, and thus the power consumption of the first terminal is saved on the premise of ensuring user experience.
In the scenario that the first terminal determines whether to respond to the communication data according to whether the target application is authorized in the first terminal, the first terminal may query whether the first terminal stores the authorization code of the target application, and determine whether the target application is authorized, so that the first terminal needs to acquire the authorization codes of the applications first. In one embodiment, as shown in fig. 3, the method further includes:
s301, sending an authorization request to a server under the condition that a first system is in a working state; the authorization request includes an application identifier.
In this embodiment, when the first system of the first terminal is in a working state, as shown in fig. 3a and fig. 3b, an application in the first terminal may send an authorization request to the server through the network, where the authorization request includes an application identifier, and the server may authorize an application corresponding to the application identifier included in the authorization request and send an authorization response to the authorization request to the first terminal. It should be noted that, fig. 3a and fig. 3b also illustrate a process of sending an authorization request to the server by the second terminal through the network, and receiving an authorization response sent by the server to the second terminal; in fig. 3a, a data center module of a first terminal may acquire system switching information of the first terminal, and control whether the first system enters a sleep mode to control a working mode of the first terminal through a control module in the data center module, and in addition, the data center module of the first terminal may also send the working mode of the first terminal to a second terminal through the data center module, so that the second terminal may control a data communication switch state between the first terminal and the second terminal according to the working mode of the first terminal; the first system and the second system of the first terminal may be connected through a hardware serial port shown in fig. 3 a. It can be understood that when the first terminal and the second terminal are in communication connection through bluetooth, as shown in fig. 3a, communication connection can be established between the bluetooth module of the first terminal and the bluetooth module of the second terminal, and optionally, both the bluetooth module of the first terminal and the bluetooth module of the second terminal can include a bluetooth interface and a bluetooth protocol stack, and when the first terminal and the second terminal perform bluetooth communication, data transmission can be performed through respective bluetooth interfaces and bluetooth protocol stacks. Optionally, the authorization request sent by the first terminal to the server may include an application identifier of one application, or may include application identifiers of a plurality of applications, for example, the application included in the first terminal may be: the application identifier included in the authorization request sent to the server may include the identifier of the application a, or may include the identifier of the application B, or may include the identifier of the application C, or may include at least two application identifiers of the identifier of the application a, the identifier of the application B, and the identifier of the application C, in the case of the first system operating state of the first terminal.
S302, receiving an authorization response sent by a server; the authorization response includes an authorization code corresponding to the application identifier.
In this embodiment, the first terminal may receive, through network communication with the server, an authorization response sent by the server to the authorization request, where the authorization response includes an authorization code corresponding to the application identifier, and further, when the first terminal receives the authorization code corresponding to the application identifier included in the authorization response sent by the server, the first terminal may save the authorization code corresponding to the application identifier. It can be understood that when the first terminal receives the authorization code corresponding to the application identifier included in the authorization response sent by the server, the first terminal indicates that the server has authorized the application corresponding to the application identifier, and the authorization state of the application with the authorization code is authorization.
In this embodiment, under the condition of the first system working state of the first terminal, the first terminal sends an authorization request including an application identifier to the server, so that the server can authorize an application corresponding to the application identifier, and thus the first terminal can receive an authorization response sent by the server to the authorization request, where the authorization response includes an authorization code corresponding to the application identifier, so that the first terminal can accurately obtain the authorization code corresponding to the application identifier included in the sent authorization request, and the authorization code corresponds to the application identifier in the sent authorization request one by one, thereby ensuring accuracy of the authorization code received by the first terminal.
Further, in one embodiment, the method further includes: and responding to the communication data when the first system is in an operating state.
In this embodiment, when the first terminal is in the working state of the first system, because the first system of the first terminal is open to the outside, the communication data with the linkage function with the external terminal device is more and larger, at this time, whether the target application of the first terminal is an authorized application or not, the first terminal can respond to the received communication data and perform normal communication with the second terminal.
In this embodiment, when the first system of the first terminal is in a working state, the first terminal can respond to the communication data sent by the second terminal, so that normal communication can be performed between the first terminal and the second terminal, the communication quality is ensured, and the user requirement is met.
In the foregoing embodiment, the first terminal needs to determine the state of the first system, and as an implementation manner, the first terminal may determine the state of the first system according to the system handover information, and in one embodiment, as shown in fig. 4, the foregoing method further includes:
s401, acquiring system switching information of a first terminal.
The system switching information refers to information that the first terminal is switched from the first system to the first system in the working state, or refers to information that the first terminal is switched from the first system to the first system in the working state. In this embodiment, when the first system of the first terminal is switched from the sleep state to the working state, the first system of the first terminal generates switching information after being switched to the working state, and informs the switching information to a data center module Middleware STACK of the first terminal or a processor of the first terminal, so that the first terminal obtains own system switching information; when the first system needs to be switched from the working state to the dormant state, the first system generates switching information before switching and informs the switching information to a Middleware STACK data center module of the first terminal or a processor of the first terminal so that the first terminal can acquire own system switching information.
S402, determining the state of the first system according to the system switching information.
In this embodiment, if the system switching information indicates that the first system is switched from the sleep state to the working state, the first terminal may determine that the first system is in the working state; if the system switching information indicates that the first system switches from the working state to the sleep state, the first terminal may determine that the first system is in the sleep state.
Optionally, the first terminal may further send the determined state of the first system to the second terminal, so that the second terminal may control the state of the data communication switch of the second terminal according to the state of the first system, for example, the second terminal may control the state of the data communication switch of the second terminal to be an off state when the first system is in a dormant state, where normal communication between an application of the first terminal and an application of the second terminal may not be possible, or the second terminal may control the state of the data communication switch of the second terminal to be an on state when the first system is in an operating state, where normal communication may be performed between the application of the first terminal and the application of the second terminal, so that power consumption of the first terminal is further reduced under the condition that the first terminal and the second terminal are ensured to be capable of communicating.
In this embodiment, the first terminal may quickly determine the state of the first system according to the own system switching information by acquiring the own system switching information, thereby improving the efficiency of determining the state of the first system.
In one embodiment, as shown in fig. 5, a data communication method is provided, which is described by taking an example that the method is applied to the second terminal in fig. 1, and the data communication method includes the following steps:
s501, obtaining communication data of a target application.
The target application refers to a generic term of an application with different client interfaces, for example, may be a communication application in the first terminal or the second terminal, where the target application may have one client in each of the first terminal and the second terminal, and thus may be authorized in each of the first terminal and the second terminal. Optionally, in this embodiment, the target application may be an application running on the second terminal, and the target application may be a voice communication application running on the second terminal, or may be an entertainment application, or may be an image display application. Optionally, the communication data of the target application may be communication data generated by a communication application running on the second terminal, may be communication data generated by an entertainment application running on the second terminal, or may be communication data generated by an image presentation application running on the second terminal. Optionally, the second terminal may determine, according to the received trigger instruction, an application type triggered by the user, and further determine communication data generated by the application triggered by the user as communication data of the target application.
S502, if the target application is authorized in the second terminal under the condition that the data communication switch of the second terminal is in a closed state, sending communication data to the first terminal so that the first terminal responds to the communication data under the condition that the first system is in a dormant state and the target application is authorized in the first terminal; the first terminal includes a first processor for operating the first system and a second processor for operating the second system.
The second terminal may control the state of the data communication switch of the second terminal according to the state of the first system of the first terminal, for example, if the first system of the first terminal is in a dormant state, the second terminal may control the state of the data communication switch of the second terminal to be an off state; if the first system of the first terminal is in the working state, the second terminal can control the state of the data communication switch of the second terminal to be in the on state. Optionally, the target application may be authorized or not in the second terminal, in this embodiment, whether the target application is authorized in the second terminal may be preset by the user, for example, the user may preset a white list, and the applications in the white list are authorized, and the second terminal may determine whether the target application is authorized by checking whether the target application is in the white list; or, the second terminal may also send an application authorization request to the cloud server, request the cloud server to authorize the application, send an authorization identifier to the second terminal after the cloud server authorizes the application, and the second terminal may determine whether the target application is authorized by checking whether the target application has the authorization identifier. In this embodiment, optionally, if the second terminal determines that the data communication switch of the second terminal is in the off state, if the target application is authorized in the second terminal, the second terminal will send the obtained communication data of the target application to the first terminal, further, after the first terminal receives the communication data, if the first system of the first terminal is in the dormant state, the first terminal may determine whether the target application is authorized in the first terminal, if the target application is authorized in the first terminal, the first terminal may respond to the communication data, and if the target application is not authorized in the first terminal, the first terminal may not respond to the communication data.
In the data communication method, the second terminal determines whether to send communication data to the first terminal according to whether the target application is authorized in the second terminal under the condition that the data communication switch of the second terminal is in the closed state, considers whether the target application is authorized in the second terminal when sending the communication data to the first terminal, and sends the communication data to the first terminal when the target application is authorized in the second terminal, so that the first terminal responds to the received communication data under the condition that the first system is in the dormant state and the target application is authorized in the first terminal, the condition that the second terminal wakes up the first system of the first terminal frequently is avoided, and the power consumption of the first terminal is further reduced on the premise of guaranteeing user experience.
Further, in one embodiment, the method further includes: and if the target application is not authorized in the second terminal, prohibiting sending communication data to the first terminal.
In this embodiment, the second terminal may send an authorization request to the server to authorize the application of the second terminal, if the server passes the authorization request of the second terminal, the application corresponding to the authorization request is authorized, if the server does not pass the authorization request of the second terminal, the application corresponding to the authorization request is not authorized, after the server authorizes the application corresponding to the authorization request of the second terminal, the authorization code of the application corresponding to the authorization request is sent to the second terminal, and the second terminal may save the authorization code sent by the server. Optionally, in this embodiment, in a case where the data communication switch of the second terminal is in the off state, the second terminal may determine whether the target application is authorized in the second terminal by querying whether an authorization code of the target application is stored in the second terminal, if the authorization code of the target application is stored in the second terminal, the second terminal may determine that the target application is authorized in the second terminal, and if the authorization code of the target application is not stored in the second terminal, the second terminal may determine that the target application is not authorized in the second terminal. Further, if the second terminal determines that the target application is not authorized in the second terminal, the second terminal will prohibit itself from transmitting the communication data to the first terminal.
In this embodiment, the second terminal determines whether the target application is authorized in the second terminal when the data communication switch is in the off state, and if the target application is not authorized in the second terminal, the second terminal prohibits sending communication data to the first terminal, so that the situation that the second terminal frequently sends communication data to the first terminal is avoided, and further frequent awakening of the second terminal to the first system of the first terminal is avoided, and power consumption of the first terminal is saved on the premise of ensuring user experience.
In the above scenario that the second terminal is authorized according to whether the target application is in the second terminal, the second terminal may query whether the second terminal stores the authorization code of the target application, and determine whether the target application is authorized in the second terminal according to whether the second terminal stores the authorization code of the target application, so the second terminal needs to acquire the authorization codes of the applications first. In one embodiment, as shown in fig. 6, the method further includes:
s601, sending an authorization request to a server; the authorization request includes an application identifier.
In this embodiment, please continue to refer to fig. 3a and fig. 3b, the second terminal may send an authorization request to the server through the network, where the authorization request includes an application identifier, and the server may authorize an application corresponding to the application identifier included in the authorization request and send an authorization response to the authorization request to the second terminal. Optionally, the authorization request sent by the second terminal to the server may include an application identifier of one application, or may include application identifiers of a plurality of applications, for example, the application included in the second terminal may be: the application identifier included in the authorization request sent by the second terminal to the server may include the identifier of the application D, or may include the identifier of the application E, or may include the identifier of the application F, or may include at least two application identifiers of the identifier of the application D, the identifier of the application E, and the identifier of the application F.
S602, receiving an authorization response sent by a server; the authorization response includes an authorization code corresponding to the application identifier.
In this embodiment, the second terminal may receive, through network communication with the server, an authorization response sent by the server to the authorization request, where the authorization response includes an authorization code corresponding to the application identifier, and further, when the second terminal receives the authorization code corresponding to the application identifier included in the authorization response sent by the server, the second terminal may save the authorization code corresponding to the application identifier. It can be understood that when the second terminal receives the authorization code corresponding to the application identifier included in the authorization response sent by the server, the second terminal indicates that the server has authorized the application corresponding to the application identifier, and the authorization state of the application with the authorization code is authorization.
In this embodiment, the second terminal sends an authorization request including an application identifier to the server, so that the server can authorize an application corresponding to the application identifier, and thus the second terminal can receive an authorization response sent by the server and corresponding to the application identifier, and the authorization response includes an authorization code corresponding to the application identifier, so that the second terminal can accurately obtain the authorization code corresponding to the application identifier included in the sent authorization request, and the authorization code corresponds to the application identifier in the sent authorization request one by one, thereby ensuring the accuracy of the authorization code received by the second terminal.
Further, in one embodiment, the method further includes: when the data communication switch is in an on state, communication data is sent to the first terminal, so that the first terminal responds to the communication data under the condition that the first system is in a dormant state and the target application is authorized in the first terminal.
In this embodiment, when the data communication switch of the second terminal is in an on state, data interaction between the application in the second terminal and the application in the second terminal is not limited, and the application of the second terminal may send communication data to the first terminal, so that the first terminal determines whether to respond to the received communication data according to whether the target application is authorized in the first terminal when the first system is in a dormant state, and further, if the target application is authorized in the first terminal, the first terminal will respond to the received communication data.
In this embodiment, when the data communication switch of the second terminal is in an on state, the second terminal can send communication data to the first terminal, so that when the first system of the first terminal is in a dormant state, the first terminal can respond to the communication data when the target application is authorized in the first terminal, and whether to respond to the communication data is determined by whether the target application is authorized in the first terminal, thereby avoiding the second terminal from waking up the first system of the first terminal frequently, and reducing the power consumption of the first terminal.
In the above embodiment, the second terminal may control the state of its own data communication switch according to the state of the first system of the first terminal, where the second terminal needs to first acquire the state of the first system of the first terminal, and in one embodiment, as shown in fig. 7, the method further includes:
s701, receiving a state of a first system of a first terminal sent by the first terminal.
The state of the first system of the first terminal comprises that the first system is in a dormant state and the first system is in a working state. Optionally, in this embodiment, the first terminal may determine a state of its own first system according to own system switching information, where the system switching information refers to information that the first terminal switches from a state where the first system is in a sleep state to a state where the first system is in a working state, or refers to information that the first terminal switches from a state where the first system is in a working state to a state where the first system is in a sleep state. Optionally, if the first terminal determines that the system switching information indicates that the first system is switched from the sleep state to the working state, the first terminal may determine that the state of the first system is that the first system is in the working state; if the first terminal determines that the system switching information indicates that the first system is switched from the working state to the dormant state, the first terminal may determine that the state of the first system is that the first system is in the dormant state. Optionally, the first terminal may acquire the system switching information of the first terminal through its own Middleware STACK data center module, or the first terminal may also acquire the system switching information of the first terminal through its own processor, determine the state of the first system according to the system switching information, and send the state of the first system to the second terminal through bluetooth communication connection or WIFI communication connection with the second terminal. Optionally, the second terminal may receive, through its own Middleware STACK data center module, the state of the first system of the first terminal sent by the first terminal.
S702, controlling the state of the data communication switch according to the first system state of the first terminal.
In this embodiment, if the second terminal receives that the state of the first system of the first terminal is in the dormant state, the second terminal may control the data communication switch thereof to be in the off state; if the second terminal receives that the state of the first system of the first terminal is in a working state, the second terminal can control the data communication switch of the second terminal to be in an on state. It can be understood that when the data communication switch of the second terminal is in an on state, the application in the second terminal can normally communicate with the application in the first terminal, and when the data communication switch of the second terminal is in an off state, the application in the second terminal and the application in the first terminal cannot normally communicate.
In this embodiment, the second terminal receives the state of the first system of the first terminal sent by the first terminal, and can control the state of the data communication switch of the second terminal according to the state of the first system of the first terminal, so that the state of the data communication switch of the second terminal is consistent with the state of the first system of the first terminal, and accuracy of accurately controlling the state of the data communication switch of the second terminal is ensured.
According to the data communication method, whether to respond to received communication data can be determined by the first terminal according to whether the target application corresponding to the received communication data is authorized in the first terminal or not so as to reduce the power consumption of the first terminal, or whether to send the communication data to the first terminal or not can be determined according to whether the target application is authorized in the second terminal when the data communication switch of the second terminal is in a closed state, so that the first terminal responds to the communication data if the target application is authorized in the first terminal under the condition that the first system is in a dormant state, and the power consumption of the first terminal is reduced. For ease of understanding to those skilled in the art, the following detailed description of the data communication method provided in this application is provided in connection with two complete embodiments:
first, whether to respond to received communication data is determined by the first terminal according to whether a target application corresponding to the received communication data is authorized in the first terminal, to reduce power consumption of the first terminal, in which case the method may include:
s1, acquiring system switching information of a first terminal, and determining the state of the first system according to the system switching information.
S2, sending an authorization request to a server under the condition that the first system is in a working state; the authorization request includes an application identifier.
S3, receiving an authorization response sent by the server; the authorization response includes an authorization code corresponding to the application identifier.
S4, receiving communication data sent by the second terminal.
S5, determining the target application according to the communication data.
And S6, if the authorization code of the target application is stored in the first terminal, determining that the target application is authorized, and if the authorization code of the target application is not stored in the first terminal, determining that the target application is not authorized.
And S7, if the target application is not authorized in the first terminal, not responding to the communication data.
S8, under the condition that the first system is in a dormant state, if the target application is authorized in the first terminal, waking up the first system, and responding to communication data by the first system.
S9, responding to the communication data under the condition that the first system is in an operating state.
It should be noted that, for the description in the above S1-S9, reference may be made to the description related to the above embodiment, and the effects thereof are similar, which is not repeated here.
Second, determining, by the second terminal, whether to transmit communication data to the first terminal according to whether the target application is authorized in the second terminal when the data communication switch of the second terminal is in an off state, so that the first terminal responds to the communication data in a case where the first system is in a sleep state and the target application is authorized in the first terminal, to reduce power consumption of the first terminal, in which case the method may include:
S1, sending an authorization request to a server; the authorization request includes an application identifier.
S2, receiving an authorization response sent by the server; the authorization response includes an authorization code corresponding to the application identifier.
S3, receiving a state of a first system of the first terminal, which is sent by the first terminal.
S4, if the first system of the first terminal is in a dormant state, controlling the data communication switch to be in a closed state; and if the first system of the first terminal is in a working state, controlling the data communication switch to be in an on state.
S5, obtaining communication data of the target application.
S6, if the second terminal stores the authorization code of the target application, determining that the target application is authorized in the second terminal; and if the authorization code of the target application is not stored in the second terminal, determining that the target application is not authorized in the second terminal.
And S7, when the data communication switch of the second terminal is in a closed state, if the target application is unauthorized in the second terminal, the communication data is forbidden to be sent to the first terminal.
And S8, if the target application is authorized in the second terminal under the condition that the data communication switch of the second terminal is in the closed state, sending communication data to the first terminal so that the first terminal responds to the communication data under the condition that the first system is in the dormant state and the target application is authorized in the first terminal.
And S9, when the data communication switch is in an on state, sending communication data to the first terminal so that the first terminal responds to the communication data when the first system is in a dormant state and the target application is authorized in the first terminal.
It should be noted that, for the description in the above S1-S9, reference may be made to the description related to the above embodiment, and the effects thereof are similar, which is not repeated here.
It should be understood that, although the steps in the flowcharts of fig. 2-7 are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least a portion of the steps of fig. 2-7 may include multiple steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor does the order in which the steps or stages are performed necessarily occur sequentially, but may be performed alternately or alternately with at least a portion of the steps or stages in other steps or other steps.
In one embodiment, as shown in fig. 8, there is provided a data communication apparatus applied to a first terminal including a first processor for operating a first system and a second processor for operating a second system; the device comprises: the device comprises a receiving module, a first determining module and a second determining module, wherein:
and the receiving module is used for receiving the communication data sent by the second terminal.
And the first determining module is used for determining the target application according to the communication data.
And the second determining module is used for responding to the communication data if the target application is authorized in the first terminal under the condition that the first system is in the dormant state.
The data communication device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and are not described herein again.
On the basis of the above embodiment, optionally, the above apparatus further includes: an execution module, wherein:
and the execution module is used for not responding to the communication data if the target application is not authorized in the first terminal.
The data communication device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and are not described herein again.
On the basis of the above embodiment, optionally, the second determining module includes: an execution unit, wherein:
and the execution unit is used for waking up the first system and responding to the communication data by the first system.
The data communication device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and are not described herein again.
On the basis of the above embodiment, optionally, the above apparatus further includes: a third determination module and a fourth determination module, wherein:
and the third determining module is used for determining that the target application is authorized if the authorization code of the target application is stored in the first terminal.
And the fourth determining module is used for determining that the target application is unauthorized if the authorization code of the target application is not stored in the first terminal.
The data communication device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and are not described herein again.
On the basis of the above embodiment, optionally, the above apparatus further includes: a first sending module and a receiving module, wherein:
the first sending module is used for sending an authorization request to the server under the condition of the working state of the first system; the authorization request includes an application identifier.
The receiving module is used for receiving the authorization response sent by the server; the authorization response includes an authorization code corresponding to the application identifier.
The data communication device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and are not described herein again.
On the basis of the above embodiment, optionally, the above apparatus further includes: a response module, wherein:
and the response module is used for responding to the communication data under the condition of the working state of the first system.
The data communication device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and are not described herein again.
On the basis of the above embodiment, optionally, the above apparatus further includes: an acquisition module and a fifth determination module, wherein:
the acquisition module is used for acquiring the system switching information of the first terminal.
And a fifth determining module, configured to determine a state of the first system according to the system handover information.
The data communication device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and are not described herein again.
On the basis of the above embodiment, optionally, the above apparatus further includes: a second transmitting module, wherein:
And the second sending module is used for sending the state of the first system to the second terminal so that the second terminal controls the state of the data communication switch of the second terminal according to the state of the first system.
The data communication device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and are not described herein again.
For specific limitations of the data communication apparatus, reference may be made to the above limitations of the data communication method, and no further description is given here. The respective modules in the above-described data communication apparatus may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, as shown in fig. 9, there is provided a data communication apparatus applied to a second terminal; the device comprises: the device comprises an acquisition module and a first determination module, wherein:
and the acquisition module is used for acquiring the communication data of the target application.
The first determining module is used for sending communication data to the first terminal if the target application is authorized in the second terminal under the condition that the data communication switch of the second terminal is in a closed state, so that the first terminal is in a dormant state in the first system and the target application is authorized in the first terminal, and responding to the communication data; the first terminal includes a first processor for operating the first system and a second processor for operating the second system.
The data communication device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and are not described herein again.
On the basis of the above embodiment, optionally, the above apparatus further includes: an execution module, wherein:
and the execution module is used for prohibiting sending the communication data to the first terminal if the target application is not authorized in the second terminal.
The data communication device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and are not described herein again.
On the basis of the above embodiment, optionally, the above apparatus further includes: a second determination module and a third determination module, wherein:
and the second determining module is used for determining that the target application is authorized in the second terminal if the authorization code of the target application is stored in the second terminal.
And the third determining module is used for determining that the target application is not authorized in the second terminal if the authorization code of the target application is not stored in the second terminal.
The data communication device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and are not described herein again.
On the basis of the above embodiment, optionally, the above apparatus further includes: the device comprises a first sending module and a first receiving module, wherein:
The first sending module is used for sending an authorization request to the server; the authorization request includes an application identifier.
The first receiving module is used for receiving the authorization response sent by the server; the authorization response includes an authorization code corresponding to the application identifier.
The data communication device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and are not described herein again.
On the basis of the above embodiment, optionally, the above apparatus further includes: a second transmitting module, wherein:
and the second sending module is used for sending communication data to the first terminal when the data communication switch is in an on state, so that the first terminal responds to the communication data under the condition that the first system is in a dormant state and the target application is authorized in the first terminal.
The data communication device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and are not described herein again.
On the basis of the above embodiment, optionally, the above apparatus further includes: the second receiving module and the control module, wherein:
and the second receiving module is used for receiving the state of the first system of the first terminal, which is sent by the first terminal.
And the control module is used for controlling the state of the data communication switch according to the state of the first system of the first terminal.
The data communication device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and are not described herein again.
On the basis of the above embodiment, optionally, the above control module includes: a first control unit and a second control unit, wherein:
and the first control unit is used for controlling the data communication switch to be in a closed state if the first system of the first terminal is in a dormant state.
And the second control unit is used for controlling the data communication switch to be in an on state if the first system of the first terminal is in a working state.
The data communication device provided in this embodiment may execute the above method embodiment, and its implementation principle and technical effects are similar, and are not described herein again.
For specific limitations of the data communication apparatus, reference may be made to the above limitations of the data communication method, and no further description is given here. The respective modules in the above-described data communication apparatus may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, as shown in fig. 10, there is provided a terminal including a memory, a first processor and a second processor, wherein the memory stores a computer program, the first processor is used for running a first system, the second processor is used for running a second system, and the first processor and the second processor execute the computer program to enable the terminal to implement the following steps:
receiving communication data sent by a second terminal;
determining a target application according to the communication data;
and if the target application is authorized in the first terminal under the condition that the first system is in the dormant state, responding to the communication data.
The implementation principle and technical effects of the terminal provided in the above embodiment are similar to those of the above method embodiment, and are not described herein.
In one embodiment, as shown in fig. 11, there is provided a terminal including a memory and a processor, the memory storing a computer program, the processor executing the computer program causing the terminal to perform the steps of:
acquiring communication data of a target application;
if the target application is authorized in the second terminal under the condition that the data communication switch of the second terminal is in a closed state, sending communication data to the first terminal so that the first terminal responds to the communication data under the condition that the first system is in a dormant state and the target application is authorized in the first terminal; the first terminal includes a first processor for operating the first system and a second processor for operating the second system.
The implementation principle and technical effects of the terminal provided in the above embodiment are similar to those of the above method embodiment, and are not described herein.
Embodiments of the present application also provide a computer-readable storage medium. One or more non-transitory computer-readable storage media containing computer-executable instructions that, when executed by one or more processors, cause the processors to perform the steps of a data communication method.
Embodiments of the present application also provide a computer program product containing instructions that, when run on a computer, cause the computer to perform a data communication method.
It should be noted that, the user information (including, but not limited to, user equipment information, user personal information, etc.) and the data (including, but not limited to, data for analysis, stored data, presented data, etc.) referred to in the present application are information and data authorized by the user or sufficiently authorized by each party, and the collection, use and processing of the related data are required to comply with the related laws and regulations and standards of the related countries and regions.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, or the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples merely represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the invention. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application is to be determined by the claims appended hereto.

Claims (21)

1. A data communication method, characterized in that the method is applied to a first terminal, the first terminal comprises a first processor and a second processor, the first processor is used for running a first system, and the second processor is used for running a second system; the method comprises the following steps:
receiving communication data sent by a second terminal;
determining a target application according to the communication data;
And if the target application is authorized in the first terminal under the condition that the first system is in the dormant state, responding to the communication data.
2. The method according to claim 1, wherein the method further comprises:
and if the target application is not authorized in the first terminal, not responding to the communication data.
3. The method of claim 1, wherein said responding to said communication data comprises:
the first system is awakened, and the first system responds to the communication data.
4. A method according to any one of claims 1-3, wherein the method further comprises:
if the first terminal stores the authorization code of the target application, determining that the target application is authorized;
and if the authorization code of the target application is not stored in the first terminal, determining that the target application is not authorized.
5. The method according to claim 4, wherein the method further comprises:
sending an authorization request to a server under the condition that the first system is in a working state; the authorization request comprises an application identifier;
receiving an authorization response sent by the server; the authorization response comprises an authorization code corresponding to the application identifier.
6. The method according to claim 1, wherein the method further comprises:
and responding to the communication data under the condition that the first system is in an operating state.
7. A method according to claims 1-3, characterized in that the method further comprises:
acquiring system switching information of the first terminal;
and determining the state of the first system according to the system switching information.
8. The method of claim 7, wherein the method further comprises:
and sending the state of the first system to the second terminal so that the second terminal controls the state of a data communication switch of the second terminal according to the state of the first system.
9. A data communication method, characterized by being applied to a second terminal; the method comprises the following steps:
acquiring communication data of a target application;
if the target application is authorized in the second terminal under the condition that the data communication switch of the second terminal is in a closed state, sending the communication data to a first terminal so that the first terminal responds to the communication data under the condition that a first system is in a dormant state and the target application is authorized in the first terminal; the first terminal comprises a first processor and a second processor, wherein the first processor is used for running the first system, and the second processor is used for running the second system.
10. The method according to claim 9, wherein the method further comprises:
and if the target application is not authorized in the second terminal, prohibiting the communication data from being sent to the first terminal.
11. The method according to claim 9 or 10, characterized in that the method further comprises:
if the second terminal stores the authorization code of the target application, determining that the target application is authorized in the second terminal;
and if the authorization code of the target application is not stored in the second terminal, determining that the target application is not authorized in the second terminal.
12. The method of claim 11, wherein the method further comprises:
sending an authorization request to a server; the authorization request comprises an application identifier;
receiving an authorization response sent by the server; the authorization response comprises an authorization code corresponding to the application identifier.
13. The method according to claim 9, wherein the method further comprises:
and when the data communication switch is in an on state, sending the communication data to the first terminal so that the first terminal responds to the communication data under the condition that a first system is in a dormant state and the target application is authorized in the first terminal.
14. The method according to any one of claims 9-13, wherein the method further comprises:
receiving a state of a first system of the first terminal, which is sent by the first terminal;
and controlling the state of the data communication switch according to the state of the first system of the first terminal.
15. The method of claim 14, wherein controlling the state of the data communication switch according to the state of the first system of the first terminal comprises:
if the first system of the first terminal is in a dormant state, controlling the data communication switch to be in a closed state;
and if the first system of the first terminal is in a working state, controlling the data communication switch to be in an on state.
16. A data communication device, characterized in that it is applied to a first terminal, said first terminal comprising a first processor for running a first system and a second processor for running a second system; the device comprises:
the receiving module is used for receiving communication data sent by the second terminal;
the first determining module is used for determining a target application according to the communication data;
And the second determining module is used for responding to the communication data if the target application is authorized in the first terminal under the condition that the first system is in a dormant state.
17. A data communication apparatus for use with a second terminal, the apparatus comprising:
the acquisition module is used for acquiring communication data of the target application;
the first determining module is used for sending the communication data to the first terminal if the target application is authorized in the second terminal when the data communication switch of the second terminal is in a closed state, so that the first terminal responds to the communication data when the first system is in a dormant state and the target application is authorized in the first terminal; the first terminal comprises a first processor and a second processor, wherein the first processor is used for running the first system, and the second processor is used for running the second system.
18. A terminal comprising a memory, a first processor and a second processor, the memory storing a computer program, the first processor being for running a first system and the second processor being for running a second system, characterized in that the first processor and the second processor, when executing the computer program, cause the terminal to implement the data communication method of any one of claims 1 to 8.
19. A terminal comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, causes the terminal to carry out the steps of the method according to any one of claims 9 to 15.
20. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 15.
21. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any one of claims 1 to 15.
CN202111679525.9A 2021-12-31 2021-12-31 Data communication method, device, terminal, storage medium, and program product Pending CN116419377A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202111679525.9A CN116419377A (en) 2021-12-31 2021-12-31 Data communication method, device, terminal, storage medium, and program product
PCT/CN2022/131055 WO2023124567A1 (en) 2021-12-31 2022-11-10 Data communication method and apparatus, terminal, storage medium, and program product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111679525.9A CN116419377A (en) 2021-12-31 2021-12-31 Data communication method, device, terminal, storage medium, and program product

Publications (1)

Publication Number Publication Date
CN116419377A true CN116419377A (en) 2023-07-11

Family

ID=86997538

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111679525.9A Pending CN116419377A (en) 2021-12-31 2021-12-31 Data communication method, device, terminal, storage medium, and program product

Country Status (2)

Country Link
CN (1) CN116419377A (en)
WO (1) WO2023124567A1 (en)

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104221445B (en) * 2013-11-15 2019-01-11 华为终端(东莞)有限公司 A kind of method and terminal waking up terminal system
US10775875B2 (en) * 2014-06-11 2020-09-15 Mediatek Singapore Pte. Ltd. Devices and methods for switching and communication among multiple operating systems and application management methods thereof
CN105204931B (en) * 2014-06-11 2019-03-15 联发科技(新加坡)私人有限公司 Low-power consumption wearable device and its multiple operating system switching, communication and management method
KR102237511B1 (en) * 2015-04-29 2021-04-07 삼성전자주식회사 Method and appratus for controlling communication of a portable terminal in an wireless communication system
CN105227772A (en) * 2015-09-30 2016-01-06 努比亚技术有限公司 Terminal wake-up method and apparatus
US10462740B2 (en) * 2016-08-03 2019-10-29 Futurewei Technologies, Inc. System and method for waking up a radio communications module of a device
CN107231679B (en) * 2017-06-20 2020-04-14 维沃移动通信有限公司 Data packet processing method and mobile terminal

Also Published As

Publication number Publication date
WO2023124567A1 (en) 2023-07-06

Similar Documents

Publication Publication Date Title
US8532706B2 (en) Techniques to manage a subscriber identity module for a mobile wireless device
US10299210B2 (en) Method and apparatus for reducing power consumption of electronic device
JP7389264B2 (en) Wireless communication method and device with wireless communication function
KR102490415B1 (en) Electronic device and method for power saving in the electronic device
US11145272B2 (en) Embedded computing device
EP3173926A1 (en) Dual-system electronic apparatus and terminal
CN112911556A (en) Method for establishing classic Bluetooth connection between dual-mode Bluetooth devices and dual-mode Bluetooth device
US20230164868A1 (en) Method for changing rrc state, communication apparatus, and storage medium
GB2537423A (en) Embedded computing device
CN110032266B (en) Information processing method, information processing device, computer equipment and computer readable storage medium
EP4175338A1 (en) Communication processing method, communication processing apparatus and storage medium
US11246176B2 (en) Bluetooth™ low energy data transfer communication system and method
CN113905425B (en) Data service switching method and device, electronic equipment and readable storage medium
US20190156017A1 (en) Terminal and method for managing launch of an application of a terminal
US9900842B2 (en) Embedded computing device
US8761833B2 (en) Apparatus and method for power saving using predictive polling in a portable terminal
CN109511139B (en) WIFI control method and device, mobile device and computer-readable storage medium
CN116419377A (en) Data communication method, device, terminal, storage medium, and program product
WO2022156572A1 (en) Control method, control apparatus, and electronic device
CN113282361B (en) Window processing method and electronic equipment
KR102457007B1 (en) electronic device and method for controlling video sharing with the rich communication suite service
US20220417903A1 (en) Paging method and apparatus, communication device and storage medium
CN111970755A (en) Communication method and device
CN112187326A (en) Antenna control method, device, equipment and storage medium
EP4184895A1 (en) Connection keep-alive proxy device between iot device and cloud server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination