CN116782186A - Offline equipment control method and related device - Google Patents

Offline equipment control method and related device Download PDF

Info

Publication number
CN116782186A
CN116782186A CN202210618803.8A CN202210618803A CN116782186A CN 116782186 A CN116782186 A CN 116782186A CN 202210618803 A CN202210618803 A CN 202210618803A CN 116782186 A CN116782186 A CN 116782186A
Authority
CN
China
Prior art keywords
electronic device
message
offline
key
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210618803.8A
Other languages
Chinese (zh)
Inventor
柳正
李�泳
吴忠刚
胡石帮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to PCT/CN2023/080697 priority Critical patent/WO2023169545A1/en
Publication of CN116782186A publication Critical patent/CN116782186A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses an offline equipment control method and a related device, which are applied to an offline equipment control system, wherein the system comprises second electronic equipment, third electronic equipment and a server, and the second electronic equipment is in an offline state; the method comprises the following steps: the server acquires a first message, wherein the first message is used for indicating the second electronic equipment to execute a first instruction; the second electronic equipment broadcasts a first offline message through the near field communication module; the third electronic device obtains a first offline message; in response to the first offline message, the third electronic device sends a second message to the server; after receiving the second message, the server sends a third message to the third electronic device, wherein the third message is used for indicating the second electronic device to execute the first instruction; the third electronic device sends a third message to the second electronic device; the second electronic device executes the first instruction based on the third message. Therefore, the offline device can be controlled to execute the offline instruction, so that data leakage and data loss are avoided, and the privacy safety of a user is protected.

Description

Offline equipment control method and related device
Technical Field
The application relates to the technical field of electronics, in particular to an off-line equipment control method and a related device.
Background
After the mobile devices such as the notebook computer, the tablet computer or the mobile phone are lost, if the important data of the user are stored in the mobile devices, the risk of privacy disclosure exists. At present, in order to cope with equipment loss, an electronic device can be provided with a device searching function, and aiming at two devices logging in the same account, a user can check the positioning of the other device on one device and control the other device to execute instructions such as screen locking so as to avoid important data leakage and protect privacy safety of the user.
However, in the event that the device is lost online (e.g., networked), instructions can be received from other devices logging into the same account; if the lost device is always offline (e.g., disconnected), the user cannot control the lost device to execute the instructions. Especially for devices such as notebook computers that cannot connect to a cellular network, the devices may remain offline after they are lost.
Disclosure of Invention
The application provides an offline equipment control method and a related device, which can control offline equipment to execute offline instructions so as to avoid data leakage and data loss and protect privacy safety of users.
In a first aspect, the present application provides an offline device control method, applied to an offline device control system, where the system includes a second electronic device, a third electronic device, and a server, where the second electronic device is in an offline state; the method comprises the following steps: the server acquires a first message, wherein the first message is used for indicating the second electronic equipment to execute a first instruction; the second electronic equipment broadcasts a first offline message through the near field communication module; the third electronic device obtains a first offline message; in response to the first offline message, the third electronic device sends a second message to the server; after receiving the second message, the server sends a third message to the third electronic device, wherein the third message is used for indicating the second electronic device to execute the first instruction; the third electronic device sends a third message to the second electronic device; the second electronic device executes the first instruction based on the third message.
When the embodiment of the application is implemented, the offline message can be broadcast when the equipment is offline; after the offline information is received by the online peripheral equipment nearby the offline equipment, the information can be reported to the server so as to indicate that the peripheral equipment can assist the offline equipment and the server to transmit the information. Therefore, the server can send a message to the offline device through the peripheral device to control the offline device to execute a specific task, so that the lost data loss and data leakage of the offline device can be avoided, and the privacy of a user is protected.
In one implementation, the system further includes a first electronic device, and before the server obtains the first message, the method further includes: the method comprises the steps that first electronic equipment receives first input operation of a user; in response to the first input operation, the first electronic device sends a first message to the server. When the embodiment of the application is implemented, when the equipment is offline, a user can trigger an offline instruction aiming at the offline equipment by using other electronic equipment so as to control the offline equipment to execute a specific task.
In one implementation, before the first electronic device receives the first input operation of the user, the method further includes: the first electronic device displays a first interface of the first application, wherein the first interface comprises a first functional control, and the first functional control is used for triggering the first electronic device to generate a first instruction for controlling the second electronic device; the first electronic device receives a first input operation of a user, including: the first electronic device receives a first input operation of a user for a first functionality control, the first input operation including one or more operations. When the embodiment of the application is implemented, when the equipment is offline, a user can also utilize the specific application (such as the equipment searching application) installed by other electronic equipment to send the offline instruction aiming at the offline equipment to the server so as to control the offline equipment to execute the specific task, thereby effectively improving the user experience.
In one implementation, the first interface further includes a first identifier of the second electronic device, the first identifier being used to indicate that the second electronic device is currently in an offline state. By implementing the embodiment of the application, through the specific application (such as a search device application) installed on the electronic device, a user can check whether other devices are in an offline state; therefore, the user can conveniently acquire the offline state of other equipment in time, and further offline control is performed on the offline equipment through the offline instruction in time, so that data loss and data leakage of the offline equipment are avoided, and user experience is effectively improved.
In one implementation, the second message is used to indicate that the third electronic device may assist the offline second electronic device in transmitting the message. By implementing the embodiment of the application, the server can determine that the offline instruction can be sent to the offline equipment through the peripheral equipment based on the information uploaded by the peripheral equipment of the offline equipment so as to realize offline control of the offline equipment.
In one implementation, the second message is used to indicate an offline position of the second electronic device acquired by the third electronic device. Alternatively, the offline position may be a position of the device acquired by the positioning module of the peripheral device, and since the peripheral device is near the offline device, the position of the peripheral device may be regarded as a current offline position of the offline device. Optionally, the offline position may also be a current position of the offline device, where the peripheral device uses a position of the device as a reference position, and is acquired by using a short-range positioning technology. By implementing the embodiment of the application, even if the device is offline, the server and the first electronic device triggering the offline instruction can acquire the position of the offline device.
In one implementation, the method further includes: after the second electronic equipment executes the first instruction, a fourth message is sent through the near field communication module, wherein the fourth message is used for indicating the second electronic equipment to execute the first instruction; the third electronic device receives a fourth message; the third electronic device sends a fifth message to the server, wherein the fifth message is used for indicating that the second electronic device has executed the first instruction; the server sends a sixth message to the first electronic device, the sixth message indicating that the second electronic device has executed the first instruction. After the offline device executes the offline instruction, the embodiment of the application can feed back the confirmation message to the first electronic device triggering the offline instruction so as to facilitate the first electronic device to know whether the offline device is successfully controlled or not in time.
In one implementation, the method further includes: and responding to the first input operation, the first electronic equipment displays first prompt information, and the first prompt information is used for prompting the second electronic equipment which is indicating to be offline to execute the first instruction. By implementing the embodiment of the application, the user can know the control progress of the offline equipment in time through the prompt information, and the user experience is effectively improved.
In one implementation, the method further includes: after the first electronic equipment receives the sixth message, second prompt information is displayed based on the sixth message; the second prompt information is used for prompting the second electronic equipment to execute the first instruction. By implementing the embodiment of the application, the user can know the control result of the offline equipment in time through the prompt information, and the user experience is effectively improved.
In one implementation, the first instructions are to implement one or more of the following: data erasure, data encryption, data backup, screen locking, displaying preset screen locking information and playing preset audio. The operation that the first instruction can implement is not specifically limited in the embodiment of the present application.
In one implementation, the first input operation includes a second input operation, a third input operation, and a fourth input operation; the first electronic device receives a first input operation of a user, including: the first electronic device receives a second input operation acting on the first functional control; in response to the second input operation, the first electronic device displays a confirmation control and at least two file type options, the at least two file type options including a first option; the first electronic device receives a third input operation acting on the first option; the first electronic device receives a fourth input operation acting on the confirmation control; the first instruction is used for realizing one or more of data protection operations such as data erasure, data encryption, data backup and the like, the first instruction also comprises a file type aimed by the data protection operation, and the file type aimed by the data protection operation comprises a file type corresponding to the first option. By implementing the embodiment of the application, the user can select the file type to be subjected to data protection, thereby meeting the diversified requirements of the user and effectively improving the user experience.
In one implementation manner, the first instruction is used for implementing one or more of data protection operations such as data erasure, data encryption, data backup, and the like, and after the second electronic device executes the first instruction based on the third message, the method further includes: the second electronic device displays third prompt information, and the third prompt information is used for prompting the second electronic device to execute the first instruction. After the offline device executes the offline instructions from other devices, the embodiment of the application can display the prompt information to prompt the user that the data erasure, the data encryption or the data backup are performed, thereby effectively improving the user experience.
In one implementation, the sending, by the third electronic device, a third message to the second electronic device includes: and after the third electronic equipment receives the third message, when the second offline message broadcast by the second electronic equipment is scanned, the third message is sent to the second electronic equipment through the near field communication module. When the embodiment of the application is implemented and the peripheral equipment is close to the offline equipment again, the message corresponding to the offline instruction can be sent to the offline equipment; thus, the offline device can be controlled to execute the offline instruction as long as the online peripheral device exists nearby the offline device.
In one implementation manner, before the first electronic device receives the first input operation of the user, the method further includes: the method comprises the steps that first electronic equipment logs in a first account of a first application; the second electronic equipment logs in a first account of the first application; the first electronic device and the second electronic device establish a binding relationship based on a first account of the first application. By implementing the embodiment of the application, a user can bind one or more other devices in advance through a specific application (such as a search device application) on the first electronic device. In this way, even when other devices are offline, the offline instruction can be triggered by the first electronic device to control the bound offline device.
In one implementation, a first electronic device and a second electronic device hold a first key, the first key being used for mutually authenticating identities of the first electronic device and the second electronic device; the second electronic device and the server hold a second key, and the second key is used for mutually authenticating identities of the second electronic device and the server; the first electronic device and the server hold a third key, and the third key is used for mutually authenticating identities of the first electronic device and the server; the first message comprises a second ciphertext, and the second ciphertext is generated by the first electronic device after encrypting the first instruction by using the first key and the third key in sequence; the third message comprises a third ciphertext, and the third ciphertext is generated by the server after decrypting the second ciphertext by using the third key and then encrypting by using the second key; the first instruction is obtained after the second electronic device decrypts the third ciphertext using the second key and the first key. In the embodiment of the application, in the control process of the off-line equipment, the off-line instruction is encrypted and transmitted by utilizing a specific key between every two pieces of equipment so as to authenticate the identity of the other party; therefore, the counterfeiting and the tampering of the offline instructions by malicious equipment can be avoided, and the control safety of the offline equipment is ensured.
In one implementation, the fourth message and the fifth message include a fourth ciphertext of the confirmation message, the fourth ciphertext being generated after the second electronic device encrypts the confirmation message using the second key, the confirmation message being used to indicate that the second electronic device has executed the first instruction; the sixth message includes a confirmation message obtained after the server decrypts the fourth ciphertext using the second key. In the embodiment of the application, in the offline equipment control process, the equipment uses a specific key to encrypt and transmit the confirmation message so as to authenticate the identity of the other party; therefore, the falsification and the falsification of the confirmation message of the malicious equipment can be avoided, and the safety of the offline equipment control is ensured.
In one implementation, the fourth message and the fifth message include a fourth ciphertext of the acknowledgement message, the fourth ciphertext being generated by the second electronic device after sequentially encrypting the acknowledgement message using the first key and the second key, the acknowledgement message being used to indicate that the second electronic device has executed the first instruction; the sixth message comprises a fifth ciphertext of the confirmation message, wherein the fifth ciphertext is generated by the server after decrypting the fourth ciphertext by using the second key and encrypting by using the third key; the method further comprises the following steps: after the first electronic device receives the sixth message sent by the server, the first electronic device sequentially decrypts the fifth ciphertext by using the third key and the first key to obtain the confirmation message. In the embodiment of the application, in the offline equipment control process, the equipment uses a specific key to encrypt and transmit the confirmation message so as to authenticate the identity of the other party; therefore, the falsification and the falsification of the confirmation message of the malicious equipment can be avoided, and the safety of the offline equipment control is ensured.
In one implementation, before receiving a first input operation of a user, the first electronic device and the second electronic device establish a binding relationship, and the first key, the second key and the third key are generated in a binding process of the first electronic device and the second electronic device; the server stores a first correspondence between a second device identifier of the second electronic device and a second key, and a second correspondence between the first device identifier of the first electronic device and a third key. When the embodiment of the application is implemented, the first electronic equipment and the second electronic equipment are bound, and the first electronic equipment, the second electronic equipment and the server can negotiate the key for authenticating the identity of the other party in advance, so that the subsequent offline instruction and/or confirmation message can be transmitted in an encrypted manner, and the control safety of the offline equipment is ensured.
In one implementation, a fourth key is also generated in the binding process of the first electronic device and the second electronic device, and the first electronic device and the second electronic device both hold the fourth key; the first message further includes first indication information of a derivative key of the fourth key and a second device identification of the second electronic device; after the server receives the first message, the server stores a third corresponding relation of the second ciphertext, the first indication information and the second equipment identifier based on the first message; the first offline message further includes a derivative key of the fourth key; the second message further includes second indication information of a derivative key of the fourth key; before the server sends the third message to the third electronic device, the method further includes: the server matches the first indication information with the second indication information; and when the first indication information and the second indication information are successfully matched, the server generates a third ciphertext based on the second ciphertext corresponding to the first indication information. Alternatively, the indication information of the derivative key may be the derivative key itself, or a Hash value of the derivative key. In the implementation of the embodiment of the application, in the offline control process, the message transmission with the peripheral equipment does not carry the equipment information (such as the equipment identifier) of the offline equipment, but the offline equipment is implied by the indication information of the derivative key; therefore, the off-line equipment can be prevented from being tracked, malicious equipment is prevented from forging and falsifying information from the off-line equipment by using equipment information, and the safety of off-line control is ensured.
In one implementation manner, the server generates a third ciphertext based on the second ciphertext corresponding to the first indication information, and the method includes: determining the equipment identifier of the target equipment corresponding to the first indication information as a second equipment identifier of the second electronic equipment based on the third corresponding relation; determining a third key for authenticating the identity of the first electronic device based on the first correspondence, and determining a second key for authenticating the identity of the second electronic device based on the second correspondence; the server decrypts the second ciphertext by using the third key to obtain a decrypted first ciphertext; and encrypting the first ciphertext by using the second key to obtain an encrypted third ciphertext.
In one implementation, the third message further includes first indication information of a derivative of the fourth key; after the third electronic device receives the third message, the method further includes: the third electronic device scans a second offline message broadcast by the second electronic device, wherein the second offline message comprises a derivative key of the fourth key; the third electronic device sending a third message to the second electronic device, including: and if the indication information of the derivative key of the fourth key in the second offline message is successfully matched with the first indication information, the third electronic device sends a third message to the second electronic device through the close range communication module.
In one implementation, in a binding process of the first electronic device and the second electronic device, the first electronic device and the second electronic device generate first keys respectively based on a preset algorithm, the second electronic device and the server generate second keys respectively based on the preset algorithm, and the first electronic device and the server generate third keys respectively based on the preset algorithm.
In a second aspect, the present application provides an offline device control method, applied to a server, which is characterized in that the method includes: the server acquires a first message, wherein the first message is used for indicating the second electronic equipment to execute a first instruction; the server receives a second message sent by the third electronic equipment, wherein the second message is sent after the third electronic equipment scans a first offline message broadcast by the second electronic equipment through the close range communication module, and the first offline message is broadcast when the second electronic equipment is in an offline state; after receiving the second message, the server sends a third message to the offline second electronic device via the third electronic device, where the third message is used to instruct the second electronic device to execute the first instruction.
When the embodiment of the application is implemented, the offline message can be broadcast when the equipment is offline; after the offline information is received by the online peripheral equipment nearby the offline equipment, the information can be reported to the server so as to indicate that the peripheral equipment can assist the offline equipment and the server to transmit the information. Therefore, the server can send a message to the offline device through the peripheral device to control the offline device to execute a specific task, so that the lost data loss and data leakage of the offline device can be avoided, and the privacy of a user is protected.
In one implementation, the server obtains a first message, including: the server receives a first message sent by the first electronic device. When the embodiment of the application is implemented, when the equipment is offline, a user can trigger an offline instruction aiming at the offline equipment by using other electronic equipment so as to control the offline equipment to execute a specific task.
In one implementation, the second message is used to indicate that the third electronic device may assist the offline second electronic device in transmitting the message. By implementing the embodiment of the application, the server can determine that the offline instruction can be sent to the offline equipment through the peripheral equipment based on the information uploaded by the peripheral equipment of the offline equipment so as to realize offline control of the offline equipment.
In one implementation, the second message is used to indicate an offline position of the second electronic device acquired by the third electronic device. Alternatively, the offline position may be a position of the device acquired by the positioning module of the peripheral device, and since the peripheral device is near the offline device, the position of the peripheral device may be regarded as a current offline position of the offline device. Optionally, the offline position may also be a current position of the offline device, where the peripheral device uses a position of the device as a reference position, and is acquired by using a short-range positioning technology. By implementing the embodiment of the application, even if the device is offline, the server and the first electronic device triggering the offline instruction can acquire the position of the offline device.
In one implementation, the first instructions are to implement one or more of the following: data erasure, data encryption, data backup, screen locking, displaying preset screen locking information and playing preset audio. The operation that the first instruction can implement is not specifically limited in the embodiment of the present application.
In one implementation, when the first instruction is used to implement one or more of data protection operations such as data erasure, data encryption, data backup, etc., the first instruction includes a file type for which the data protection operation is directed. By implementing the embodiment of the application, the user can select the file type to be subjected to data protection, thereby meeting the diversified requirements of the user and effectively improving the user experience.
In one implementation manner, before the server obtains the first message, the method further includes: the method comprises the steps that a server receives a binding request of a first electronic device and/or a second electronic device, the binding request is used for requesting to establish a binding relationship for the first electronic device and the second electronic device based on a first account of a first application, and the first electronic device and the second electronic device are both logged in to the first account. By implementing the embodiment of the application, a user can bind one or more other devices in advance through a specific application (such as a search device application) on the first electronic device. In this way, even when other devices are offline, the offline instruction can be triggered by the first electronic device to control the bound offline device.
In one implementation, a first electronic device and a second electronic device hold a first key, the first key being used for mutually authenticating identities of the first electronic device and the second electronic device; the second electronic device and the server hold a second key, and the second key is used for mutually authenticating identities of the second electronic device and the server; the first electronic device and the server hold a third key, and the third key is used for mutually authenticating identities of the first electronic device and the server; the first message comprises a second ciphertext, and the second ciphertext is generated by the first electronic device after encrypting the first instruction by using the first key and the third key in sequence; the third message comprises a third ciphertext, and the third ciphertext is generated by the server after decrypting the second ciphertext by using the third key and then encrypting by using the second key; the first instruction is obtained after the second electronic device decrypts the third ciphertext by using the second key and the first key. In the embodiment of the application, in the control process of the off-line equipment, the off-line instruction is encrypted and transmitted by utilizing a specific key between every two pieces of equipment so as to authenticate the identity of the other party; therefore, the counterfeiting and the tampering of the offline instructions by malicious equipment can be avoided, and the control safety of the offline equipment is ensured.
In one implementation, the method further includes: the server receives a fifth message sent by the third electronic device, wherein the fifth message is sent after the third electronic device receives a fourth message sent by the second electronic device through the near field communication module, and the fourth message and the fifth message are used for indicating that the second electronic device has executed a first instruction; the server sends a sixth message to the first electronic device, the sixth message indicating that the second electronic device has executed the first instruction. After the offline device executes the offline instruction, the embodiment of the application can feed back the confirmation message to the first electronic device triggering the offline instruction so as to facilitate the first electronic device to know whether the offline device is successfully controlled or not in time.
In one implementation, the fourth message and the fifth message include a fourth ciphertext of the confirmation message, the fourth ciphertext being generated after the second electronic device encrypts the confirmation message using the second key, the confirmation message being used to indicate that the second electronic device has executed the first instruction; the sixth message includes a confirmation message obtained after the server decrypts the fourth ciphertext using the second key. In the embodiment of the application, in the offline equipment control process, the equipment uses a specific key to encrypt and transmit the confirmation message so as to authenticate the identity of the other party; therefore, the falsification and the falsification of the confirmation message of the malicious equipment can be avoided, and the safety of the offline equipment control is ensured.
In one implementation, the fourth message and the fifth message include a fourth ciphertext of the acknowledgement message, the fourth ciphertext being generated by the second electronic device after sequentially encrypting the acknowledgement message using the first key and the second key, the acknowledgement message being used to indicate that the second electronic device has executed the first instruction; the sixth message comprises a fifth ciphertext of the confirmation message, wherein the fifth ciphertext is generated by the server after decrypting the fourth ciphertext by using the second key and encrypting by using the third key; the confirmation message obtained by the first electronic device is obtained after the first electronic device decrypts the fifth ciphertext by using the third key and the first key. In the embodiment of the application, in the offline equipment control process, the equipment uses a specific key to encrypt and transmit the confirmation message so as to authenticate the identity of the other party; therefore, the falsification and the falsification of the confirmation message of the malicious equipment can be avoided, and the safety of the offline equipment control is ensured.
In one implementation, before the server obtains the first message, the first electronic device and the second electronic device establish a binding relationship, and the first key, the second key and the third key are generated in a binding process of the first electronic device and the second electronic device; the server stores a first correspondence between the device identification of the second electronic device and the second key, and a second correspondence between the device identification of the first electronic device and the third key. When the embodiment of the application is implemented, the first electronic equipment and the second electronic equipment are bound, and the first electronic equipment, the second electronic equipment and the server can negotiate the key for authenticating the identity of the other party in advance, so that the subsequent offline instruction and/or confirmation message can be transmitted in an encrypted manner, and the control safety of the offline equipment is ensured.
In one implementation, a fourth key is also generated in the binding process of the first electronic device and the second electronic device, and the first electronic device and the second electronic device both hold the fourth key; the first message further includes first indication information of a derivative key of the fourth key and a second device identification of the second electronic device; after the server acquires the first message, the server stores a third corresponding relation of the second ciphertext, the first indication information and the equipment identifier of the second electronic equipment based on the first message; the first offline message further includes a derivative key of the fourth key; the second message further includes second indication information of a derivative key of the fourth key; before the server sends the third message to the offline second electronic device via the third electronic device, the method further includes: the server matches the first indication information with the second indication information; and when the first indication information and the second indication information are successfully matched, the server generates a third ciphertext based on the second ciphertext corresponding to the first indication information. Alternatively, the indication information of the derivative key may be the derivative key itself, or a Hash value of the derivative key. In the implementation of the embodiment of the application, in the offline control process, the message transmission with the peripheral equipment does not carry the equipment information (such as the equipment identifier) of the offline equipment, but the offline equipment is implied by the indication information of the derivative key; therefore, the off-line equipment can be prevented from being tracked, malicious equipment is prevented from forging and falsifying information from the off-line equipment by using equipment information, and the safety of off-line control is ensured.
In one implementation manner, the server generates a third ciphertext based on the second ciphertext corresponding to the first indication information, and the method includes: determining the equipment identifier of the target equipment corresponding to the first indication information as a second equipment identifier of the second electronic equipment based on the third corresponding relation; determining a third key for authenticating the identity of the first electronic device based on the first correspondence, and determining a second key for authenticating the identity of the second electronic device based on the second correspondence; the server decrypts the second ciphertext by using the third key to obtain a decrypted first ciphertext; and encrypting the first ciphertext by using the second key to obtain an encrypted third ciphertext.
In a third aspect, the present application provides an offline device control method, applied to a second electronic device in an offline state, where the method includes: when the second electronic equipment is in an offline state, broadcasting a first offline message through the close-range communication module; the second electronic equipment receives a third message sent by the server through a third electronic equipment which is online nearby; the third message is sent after the server acquires the first message and the second message of the third electronic device, the second message is sent after the third electronic device receives the first offline message, and the first message and the third message are used for indicating the second electronic device to execute the first instruction; the second electronic device executes the first instruction based on the third message.
When the embodiment of the application is implemented, the offline message can be broadcast when the equipment is offline; after the offline information is received by the online peripheral equipment nearby the offline equipment, the information can be reported to the server so as to indicate that the peripheral equipment can assist the offline equipment and the server to transmit the information. Therefore, the server can send a message to the offline device through the peripheral device to control the offline device to execute a specific task, so that the lost data loss and data leakage of the offline device can be avoided, and the privacy of a user is protected.
In one implementation, the first message is sent by the first electronic device to the server. When the embodiment of the application is implemented, when the equipment is offline, a user can trigger an offline instruction aiming at the offline equipment by using other electronic equipment so as to control the offline equipment to execute a specific task.
In one implementation, the second message is used to indicate that the third electronic device may assist the offline second electronic device in transmitting the message. By implementing the embodiment of the application, the server can determine that the offline instruction can be sent to the offline equipment through the peripheral equipment based on the information uploaded by the peripheral equipment of the offline equipment so as to realize offline control of the offline equipment.
In one implementation, the second message is used to indicate an offline position of the second electronic device acquired by the third electronic device. By implementing the embodiment of the application, even if the device is offline, the server and the first electronic device triggering the offline instruction can acquire the position of the offline device.
In one implementation, the method further includes: after the second electronic device executes the first instruction, a seventh message is sent to the server through the third electronic device, and the seventh message is used for indicating that the second electronic device has executed the first instruction. After the offline device executes the offline instruction, the embodiment of the application can feed back the confirmation message to the first electronic device triggering the offline instruction so as to facilitate the first electronic device to know whether the offline device is successfully controlled or not in time.
In one implementation, the first instructions are to implement one or more of the following: data erasure, data encryption, data backup, screen locking, displaying preset screen locking information and playing preset audio. The operation that the first instruction can implement is not specifically limited in the embodiment of the present application.
In one implementation, when the first instruction is used to implement one or more of data protection operations such as data erasure, data encryption, data backup, etc., the first instruction includes a file type for which the data protection operation is directed. By implementing the embodiment of the application, the user can select the file type to be subjected to data protection, thereby meeting the diversified requirements of the user and effectively improving the user experience.
In one implementation manner, the first instruction is used for implementing one or more of data protection operations such as data erasure, data encryption, data backup, and the like, and after the second electronic device executes the first instruction based on the third message, the method further includes: the second electronic device displays third prompt information, and the third prompt information is used for prompting the second electronic device to execute the first instruction.
In an implementation manner, before broadcasting the first offline message through the close range communication module, the method further includes: the second electronic equipment logs in a first account of the first application; the second electronic device and the first electronic device establish a binding relationship based on a first account of the first application. By implementing the embodiment of the application, a user can bind one or more other devices in advance through a specific application (such as a search device application) on the first electronic device. In this way, even when other devices are offline, the offline instruction can be triggered by the first electronic device to control the bound offline device.
In one implementation, a first electronic device and a second electronic device hold a first key, the first key being used for mutually authenticating identities of the first electronic device and the second electronic device; the second electronic device and the server hold a second key, and the second key is used for mutually authenticating identities of the second electronic device and the server; the first electronic device and the server hold a third key, and the third key is used for mutually authenticating identities of the first electronic device and the server; the first message comprises a second ciphertext, and the second ciphertext is generated by the first electronic device after encrypting the first instruction by using the first key and the third key in sequence; the third message comprises a third ciphertext, and the third ciphertext is generated by the server after decrypting the second ciphertext by using the third key and then encrypting by using the second key; the first instruction is obtained after the second electronic device decrypts the third ciphertext by using the second key and the first key. In the embodiment of the application, in the control process of the off-line equipment, the off-line instruction is encrypted and transmitted by utilizing a specific key between every two pieces of equipment so as to authenticate the identity of the other party; therefore, the counterfeiting and the tampering of the offline instructions by malicious equipment can be avoided, and the control safety of the offline equipment is ensured.
In one implementation, the seventh message includes a fourth ciphertext of the acknowledgment message; the fourth ciphertext is generated by the second electronic device using the second key encryption, or the fourth ciphertext is generated by the second electronic device using the second key and the first key encryption, the ciphertext of the second key for the server authentication confirm message from the second electronic device, and the ciphertext of the first key for the first electronic device authentication confirm message from the second electronic device. In the embodiment of the application, in the offline equipment control process, the equipment uses a specific key to encrypt and transmit the confirmation message so as to authenticate the identity of the other party; therefore, the falsification and the falsification of the confirmation message of the malicious equipment can be avoided, and the safety of the offline equipment control is ensured.
In one implementation, before the first offline message is broadcast through the close-range communication module, the first electronic device and the second electronic device establish a binding relationship, and the first key, the second key and the third key are generated in a binding process of the first electronic device and the second electronic device. When the embodiment of the application is implemented, the first electronic equipment and the second electronic equipment are bound, and the first electronic equipment, the second electronic equipment and the server can negotiate the key for authenticating the identity of the other party in advance, so that the subsequent offline instruction and/or confirmation message can be transmitted in an encrypted manner, and the control safety of the offline equipment is ensured.
In a fourth aspect, the present application provides an electronic device comprising one or more processors and one or more memories. The one or more memories are coupled to the one or more processors, the one or more memories being configured to store computer program code comprising computer instructions that, when executed by the one or more processors, cause the electronic device to perform the offline device control method of any of the possible implementations of the first, second, or third aspects described above.
In a fifth aspect, an embodiment of the present application provides a computer storage medium, including computer instructions, which when executed on an electronic device, cause the electronic device to perform the method for controlling an offline device in any possible implementation manner of the first aspect, the second aspect, or the third aspect.
In a sixth aspect, embodiments of the present application provide a computer program product which, when run on a computer, causes the computer to perform the method of offline device control in any of the possible implementations of the first, second or third aspects described above.
Drawings
Fig. 1 is a schematic diagram of a system architecture of a communication system according to an embodiment of the present application;
Fig. 2 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a cloud server according to an embodiment of the present application;
fig. 4A to fig. 4D are related user interfaces of the search device APP provided in the embodiments of the present application;
FIGS. 5A-5H are related user interfaces for pairing-binding of a lookup device provided by an embodiment of the present application;
FIGS. 6A-6E are diagrams illustrating user interfaces associated with controlling an offline device according to embodiments of the present application;
FIGS. 7A-7L are diagrams illustrating user interfaces associated with controlling an offline device according to embodiments of the present application;
FIG. 8A is a flowchart illustrating an offline device control method according to an embodiment of the present application;
fig. 8B is a flowchart of an offline device control method according to an embodiment of the present application;
fig. 8C is a schematic diagram of information transmission provided in an embodiment of the present application;
fig. 9A is a schematic software structure of an electronic device according to an embodiment of the present application;
fig. 9B is a schematic diagram of a system architecture of an offline device control system according to an embodiment of the present application.
Detailed Description
The technical solutions of the embodiments of the present application will be clearly and thoroughly described below with reference to the accompanying drawings. Wherein, in the description of the embodiments of the present application, unless otherwise indicated, "/" means or, for example, a/B may represent a or B; the text "and/or" is merely an association relation describing the associated object, and indicates that three relations may exist, for example, a and/or B may indicate: the three cases where a exists alone, a and B exist together, and B exists alone, and furthermore, in the description of the embodiments of the present application, "plural" means two or more than two.
The terms "first," "second," and the like, are used below for descriptive purposes only and are not to be construed as implying or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more such feature, and in the description of embodiments of the application, unless otherwise indicated, the meaning of "a plurality" is two or more.
The term "User Interface (UI)" in the following embodiments of the present application is a media interface for interaction and information exchange between an application program or an operating system and a user, which enables conversion between an internal form of information and a form acceptable to the user. The user interface is a source code written in a specific computer language such as java, extensible markup language (extensible markup language, XML) and the like, and the interface source code is analyzed and rendered on the electronic equipment to finally be presented as content which can be identified by a user. A commonly used presentation form of the user interface is a graphical user interface (graphic user interface, GUI), which refers to a user interface related to computer operations that is displayed in a graphical manner. It may be a visual interface element of text, icons, buttons, menus, tabs, text boxes, dialog boxes, status bars, navigation bars, widgets, etc., displayed in a display of the electronic device.
First, a communication system 10 according to an embodiment of the present application is provided.
Fig. 1 schematically illustrates a communication system 10 provided in an embodiment of the present application. As shown in fig. 1, the communication system 10 includes an electronic device 100, one or more electronic devices (e.g., the electronic device 200) that establish a binding relationship with the electronic device 100 for a lookup device, one or more online peripheral devices (e.g., the peripheral device 300) near the electronic device 200, and a cloud device (e.g., the cloud server 400).
The electronic device 100, electronic device 200, and peripheral device 300 may be a cell phone, tablet, desktop, laptop, handheld, notebook, ultra-mobile personal computer (ultra-mobile personal computer, UMPC), netbook, cell phone, personal digital assistant (personal digital assistant, PDA), augmented reality (augmented reality, AR) device, virtual Reality (VR) device, artificial intelligence (artificial intelligence, AI) device, wearable device (smart bracelet), vehicle-mounted device, smart home device (smart television, smart screen, large screen device, etc.), and/or smart city device. The electronic device 200 may also be a digital device such as a speaker, a bluetooth headset, etc. that is not configured with a display screen. The specific types of the electronic apparatus 100, the electronic apparatus 200, and the peripheral apparatus 300 are not particularly limited in the embodiment of the present application. The electronic device 100 and the electronic device 200 may be provided with the same operating system, or may be provided with different operating systems, for example, iOS, android, microsoft, hong, and the like.
Cloud server 400 may be a server, a server cluster comprising a plurality of servers, or a cloud computing center.
The electronic device 100, the electronic device 200, and the peripheral device 300 may communicate with the cloud server 400 through one or more communication networks 500. The communication network 500 may be a local area network (local area networks, LAN) or a wide area network (wide area networks, WAN), such as the internet. The communication network 500 may be implemented using any known network communication protocol, which may be various wired or wireless communication protocols such as ethernet, universal serial bus (universal serial bus, USB), FIREWIRE (FIREWIRE), global system for mobile communications (global system for mobile communications, GSM), general packet radio service (general packet radio service, GPRS), code division multiple access (code division multiple access, CDMA), wideband code division multiple access (wideband code division multiple access, WCDMA), time division multiple access (time-division code division multiple access, TD-SCDMA), long term evolution (long term evolution, LTE), bluetooth (bluetooth), BT), wireless fidelity (wireless fidelity, wi-Fi), near field communication (near field communication, NFC), voice over internet protocol (voice over Internet protocol, voIP), ultra Wideband (UWB), zigBee communication, communication protocols supporting a network slice architecture, or any other suitable communication protocol.
In some implementations, the electronic device refers to: the electronic device accesses the communication network 500 (i.e., a local area network and/or a wide area network), and can communicate with the cloud server 400 through the communication network 500; off-line for electronic device means: the electronic device does not access the communication network 500 and cannot communicate with the cloud server 400. In some implementations, the electronic device refers to: the electronic device accesses the communication network 500, can communicate with the cloud server 400 through the communication network 500, and is connected with a SIM card. Off-line for electronic device means: the electronic device does not access the communication network 500 and/or the electronic device is not connected to a SIM card.
The SIM card may be an entity SIM card, and the electronic device includes a SIM card interface, through which the entity SIM card may be connected; alternatively, the SIM card may be a virtual SIM card, and the electronic device is connected to the virtual SIM card, i.e. accesses the operator network.
The electronic device 100 configures a display screen, and after being bound to the electronic device 200, may provide the electronic device 200 with related functions of the search device. When the electronic device 200 is offline, the user may also send an offline instruction to the cloud server 400 through the electronic device 100; the offline instruction is used to control the offline electronic device 200 to perform functions related to the search device, such as performing data erasure, data encryption, data backup, screen locking, or playing sound. Optionally, after the electronic device 100 and the electronic device 200 are bound, the electronic device 200 may also provide the electronic device 100 with the related functions of the search device.
In the embodiment of the present application, the electronic device 100 and the electronic device 200 are provided with an end-side search network service, where the end-side search network service is used for providing related services of offline control, such as sending, encrypting and decrypting offline instructions; the binding relationship of the lookup device between the electronic device 100 and the electronic device 200 may also be referred to as a binding relationship of the lookup network. In the embodiment of the present application, the binding relationship of the search device may be established by the electronic device 100 and the electronic device 200 through a short-range communication technology, or may be established by logging in the same account, and the manner of establishing the binding relationship of the search device by the electronic device 100 and the electronic device 200 is not specifically limited. The near field communication technology may be a bluetooth communication technology, or may be an NFC technology, a UWB communication technology, a ZigBee communication technology, or the like, and the comparison of the embodiments of the present application is not limited in particular.
The electronic device 200 may or may not be configured with a display screen. When the electronic device 200 determines that the device is offline, the offline broadcast may be transmitted through a specific near field communication technology (e.g., bluetooth low energy (Bluetooth Low Energy, BLE) communication technology). The BLE communication technology is a personal area network technology, and aims to significantly reduce power consumption and cost while maintaining an equivalent communication range, compared with a conventional bluetooth communication technology.
The peripheral device 300 is provided with an end-side search network service and can listen to offline broadcasts transmitted through a specific short-range communication technology (e.g., BLE communication technology). After the online peripheral device 300 listens to the offline broadcast of the electronic device 200, an assistance indication message for the electronic device 200 may be sent to the cloud server 400.
Note that, the near field communication technology (for example, wi-Fi communication technology) used for pairing and binding between the electronic device 100 and the electronic device 200 and the near field communication technology (for example, BLE communication technology) used for transmitting and receiving data between the peripheral device 300 and the electronic device 200 may be the same or different, and are not particularly limited herein.
The cloud server 400 may store offline instructions sent by the electronic device 100. After receiving the assistance indication message sent by the peripheral device 300, the offline instruction of the electronic device 100 may be forwarded to the offline electronic device 200 by the online peripheral device 300, so as to control the offline electronic device 200 to execute the offline instruction (such as data erasure or data encryption) and ensure the data security of the lost electronic device 200.
According to the communication system 10 provided by the embodiment of the application, when the lost electronic equipment 200 is offline, the electronic equipment 200 can be controlled to execute the offline instruction of the electronic equipment 100, so that data leakage and data loss are avoided, and the privacy safety of a user is protected.
The electronic device 100, the electronic device 200, the peripheral device 300, and the cloud server 400 may be deployed on land, including indoor, outdoor, handheld, or vehicle-mounted, may be deployed on water, may be deployed on an aerial aircraft, and may be deployed on a satellite, and the embodiment of the present application is not limited in this respect.
It should be understood that fig. 1 is merely a schematic system architecture of a communication system provided by an embodiment of the present application, and does not constitute a specific limitation on the communication system 10, and the communication system 10 may include more or less devices than those shown in the drawings, for example, may further include a wireless relay device and a wireless backhaul device (not shown in fig. 1), which are not limited herein.
The following describes a structure of an electronic device 100 according to an embodiment of the present application. The structures of the electronic device 200 and the peripheral device 300 according to the embodiments of the present application may refer to the related description of the electronic device 200, and will not be described in detail later.
Fig. 2 shows a schematic structural diagram of the electronic device 100. The electronic device 100 may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (universal serial bus, USB) interface 130, a charge management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, a mobile communication module 150, a wireless communication module 160, an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, a sensor module 180, keys 190, a motor 191, an indicator 192, a camera 193, a display 194, and a subscriber identity module (subscriber identification module, SIM) card interface 195, etc. The sensor module 180 may include a pressure sensor 180A, a gyro sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, an ambient light sensor 180L, a bone conduction sensor 180M, and the like.
It should be understood that the illustrated structure of the embodiment of the present application does not constitute a specific limitation on the electronic device 100. In other embodiments of the application, electronic device 100 may include more or fewer components than shown, or certain components may be combined, or certain components may be split, or different arrangements of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
The processor 110 may include one or more processing units, such as: the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processor (graphics processing unit, GPU), an image signal processor (image signal processor, ISP), a controller, a video codec, a digital signal processor (digital signal processor, DSP), a baseband processor, and/or a neural network processor (neural-network processing unit, NPU), etc. Wherein the different processing units may be separate devices or may be integrated in one or more processors.
The controller can generate operation control signals according to the instruction operation codes and the time sequence signals to finish the control of instruction fetching and instruction execution.
A memory may also be provided in the processor 110 for storing instructions and data. In some embodiments, the memory in the processor 110 is a cache memory. The memory may hold instructions or data that the processor 110 has just used or recycled. If the processor 110 needs to reuse the instruction or data, it can be called directly from the memory. Repeated accesses are avoided and the latency of the processor 110 is reduced, thereby improving the efficiency of the system.
In some embodiments, the processor 110 may include one or more interfaces. The interfaces may include an integrated circuit (inter-integrated circuit, I2C) interface, an integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, a pulse code modulation (pulse code modulation, PCM) interface, a universal asynchronous receiver transmitter (universal asynchronous receiver/transmitter, UART) interface, a mobile industry processor interface (mobile industry processor interface, MIPI), a general-purpose input/output (GPIO) interface, a subscriber identity module (subscriber identity module, SIM) interface, and/or a universal serial bus (universal serial bus, USB) interface, among others.
The I2C interface is a bi-directional synchronous serial bus comprising a serial data line (SDA) and a serial clock line (derail clock line, SCL). In some embodiments, the processor 110 may contain multiple sets of I2C buses. The processor 110 may be coupled to the touch sensor 180K, charger, flash, camera 193, etc., respectively, through different I2C bus interfaces. For example: the processor 110 may be coupled to the touch sensor 180K through an I2C interface, such that the processor 110 communicates with the touch sensor 180K through an I2C bus interface to implement a touch function of the electronic device 100.
The I2S interface may be used for audio communication. In some embodiments, the processor 110 may contain multiple sets of I2S buses. The processor 110 may be coupled to the audio module 170 via an I2S bus to enable communication between the processor 110 and the audio module 170. In some embodiments, the audio module 170 may transmit an audio signal to the wireless communication module 160 through the I2S interface, to implement a function of answering a call through the bluetooth headset.
PCM interfaces may also be used for audio communication to sample, quantize and encode analog signals. In some embodiments, the audio module 170 and the wireless communication module 160 may be coupled through a PCM bus interface. In some embodiments, the audio module 170 may also transmit audio signals to the wireless communication module 160 through the PCM interface to implement a function of answering a call through the bluetooth headset. Both the I2S interface and the PCM interface may be used for audio communication.
The UART interface is a universal serial data bus for asynchronous communications. The bus may be a bi-directional communication bus. It converts the data to be transmitted between serial communication and parallel communication. In some embodiments, a UART interface is typically used to connect the processor 110 with the wireless communication module 160. For example: the processor 110 communicates with a bluetooth module in the wireless communication module 160 through a UART interface to implement a bluetooth function. In some embodiments, the audio module 170 may transmit an audio signal to the wireless communication module 160 through a UART interface, to implement a function of playing music through a bluetooth headset.
The MIPI interface may be used to connect the processor 110 to peripheral devices such as a display 194, a camera 193, and the like. The MIPI interfaces include camera serial interfaces (camera serial interface, CSI), display serial interfaces (display serial interface, DSI), and the like. In some embodiments, processor 110 and camera 193 communicate through a CSI interface to implement the photographing functions of electronic device 100. The processor 110 and the display 194 communicate via a DSI interface to implement the display functionality of the electronic device 100.
The GPIO interface may be configured by software. The GPIO interface may be configured as a control signal or as a data signal. In some embodiments, a GPIO interface may be used to connect the processor 110 with the camera 193, the display 194, the wireless communication module 160, the audio module 170, the sensor module 180, and the like. The GPIO interface may also be configured as an I2C interface, an I2S interface, a UART interface, an MIPI interface, etc.
The USB interface 130 is an interface conforming to the USB standard specification, and may specifically be a Mini USB interface, a Micro USB interface, a USB Type C interface, or the like. The USB interface 130 may be used to connect a charger to charge the electronic device 100, and may also be used to transfer data between the electronic device 100 and a peripheral device. And can also be used for connecting with a headset, and playing audio through the headset. The interface may also be used to connect other electronic devices, such as AR devices, etc.
It should be understood that the interfacing relationship between the modules illustrated in the embodiments of the present application is only illustrative, and is not meant to limit the structure of the electronic device 100. In other embodiments of the present application, the electronic device 100 may also employ different interfacing manners in the above embodiments, or a combination of multiple interfacing manners.
The charge management module 140 is configured to receive a charge input from a charger. The charger can be a wireless charger or a wired charger. In some wired charging embodiments, the charge management module 140 may receive a charging input of a wired charger through the USB interface 130. In some wireless charging embodiments, the charge management module 140 may receive wireless charging input through a wireless charging coil of the electronic device 100. The charging management module 140 may also supply power to the electronic device through the power management module 141 while charging the battery 142.
The power management module 141 is used for connecting the battery 142, and the charge management module 140 and the processor 110. The power management module 141 receives input from the battery 142 and/or the charge management module 140 to power the processor 110, the internal memory 121, the display 194, the camera 193, the wireless communication module 160, and the like. The power management module 141 may also be configured to monitor battery capacity, battery cycle number, battery health (leakage, impedance) and other parameters. In other embodiments, the power management module 141 may also be provided in the processor 110. In other embodiments, the power management module 141 and the charge management module 140 may be disposed in the same device.
The wireless communication function of the electronic device 100 may be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, a modem processor, a baseband processor, and the like.
The antennas 1 and 2 are used for transmitting and receiving electromagnetic wave signals. Each antenna in the electronic device 100 may be used to cover a single or multiple communication bands. Different antennas may also be multiplexed to improve the utilization of the antennas. For example: the antenna 1 may be multiplexed into a diversity antenna of a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
The mobile communication module 150 may provide a solution for wireless communication including 2G/3G/4G/5G, etc., applied to the electronic device 100. The mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (low noise amplifier, LNA), etc. The mobile communication module 150 may receive electromagnetic waves from the antenna 1, perform processes such as filtering, amplifying, and the like on the received electromagnetic waves, and transmit the processed electromagnetic waves to the modem processor for demodulation. The mobile communication module 150 can amplify the signal modulated by the modem processor, and convert the signal into electromagnetic waves through the antenna 1 to radiate. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be disposed in the processor 110. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be provided in the same device as at least some of the modules of the processor 110.
The modem processor may include a modulator and a demodulator. The modulator is used for modulating the low-frequency baseband signal to be transmitted into a medium-high frequency signal. The demodulator is used for demodulating the received electromagnetic wave signal into a low-frequency baseband signal. The demodulator then transmits the demodulated low frequency baseband signal to the baseband processor for processing. The low frequency baseband signal is processed by the baseband processor and then transferred to the application processor. The application processor outputs sound signals through an audio device (not limited to the speaker 170A, the receiver 170B, etc.), or displays images or video through the display screen 194. In some embodiments, the modem processor may be a stand-alone device. In other embodiments, the modem processor may be provided in the same device as the mobile communication module 150 or other functional module, independent of the processor 110.
The wireless communication module 160 may provide solutions for wireless communication including wireless local area network (wireless local area networks, WLAN) (e.g., wireless fidelity (wireless fidelity, wi-Fi) network), bluetooth (BT), global navigation satellite system (global navigation satellite system, GNSS), frequency modulation (frequency modulation, FM), near field wireless communication technology (near field communication, NFC), infrared technology (IR), etc., as applied to the electronic device 100. The wireless communication module 160 may be one or more devices that integrate at least one communication processing module. The wireless communication module 160 receives electromagnetic waves via the antenna 2, demodulates and filters the electromagnetic wave signals, and transmits the processed signals to the processor 110. The wireless communication module 160 may also receive a signal to be transmitted from the processor 110, frequency modulate it, amplify it, and convert it to electromagnetic waves for radiation via the antenna 2.
In some embodiments, antenna 1 and mobile communication module 150 of electronic device 100 are coupled, and antenna 2 and wireless communication module 160 are coupled, such that electronic device 100 may communicate with a network and other devices through wireless communication techniques. The wireless communication techniques may include the Global System for Mobile communications (global system for mobile communications, GSM), general packet radio service (general packet radio service, GPRS), code division multiple access (code division multiple access, CDMA), wideband code division multiple access (wideband code division multiple access, WCDMA), time division code division multiple access (time-division code division multiple access, TD-SCDMA), long term evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC, FM, and/or IR techniques, among others. The GNSS may include a global satellite positioning system (global positioning system, GPS), a global navigation satellite system (global navigation satellite system, GLONASS), a beidou satellite navigation system (beidou navigation satellite system, BDS), a quasi zenith satellite system (quasi-zenith satellite system, QZSS) and/or a satellite based augmentation system (satellite based augmentation systems, SBAS).
The electronic device 100 implements display functions through a GPU, a display screen 194, an application processor, and the like. The GPU is a microprocessor for image processing, and is connected to the display 194 and the application processor. The GPU is used to perform mathematical and geometric calculations for graphics rendering. Processor 110 may include one or more GPUs that execute program instructions to generate or change display information.
The display screen 194 is used to display images, videos, and the like. The display 194 includes a display panel. The display panel may employ a liquid crystal display (liquid crystal display, LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode (AMOLED) or an active-matrix organic light-emitting diode (matrix organic light emitting diode), a flexible light-emitting diode (flex), a mini, a Micro led, a Micro-OLED, a quantum dot light-emitting diode (quantum dot light emitting diodes, QLED), or the like. In some embodiments, the electronic device 100 may include 1 or N display screens 194, N being a positive integer greater than 1.
The electronic device 100 may implement photographing functions through an ISP, a camera 193, a video codec, a GPU, a display screen 194, an application processor, and the like.
The ISP is used to process data fed back by the camera 193. For example, when photographing, the shutter is opened, light is transmitted to the camera photosensitive element through the lens, the optical signal is converted into an electric signal, and the camera photosensitive element transmits the electric signal to the ISP for processing and is converted into an image visible to naked eyes. ISP can also optimize the noise, brightness and skin color of the image. The ISP can also optimize parameters such as exposure, color temperature and the like of a shooting scene. In some embodiments, the ISP may be provided in the camera 193.
The camera 193 is used to capture still images or video. The object generates an optical image through the lens and projects the optical image onto the photosensitive element. The photosensitive element may be a charge coupled device (charge coupled device, CCD) or a Complementary Metal Oxide Semiconductor (CMOS) phototransistor. The photosensitive element converts the optical signal into an electrical signal, which is then transferred to the ISP to be converted into a digital image signal. The ISP outputs the digital image signal to the DSP for processing. The DSP converts the digital image signal into an image signal in a standard RGB, YUV, or the like format. In some embodiments, electronic device 100 may include 1 or N cameras 193, N being a positive integer greater than 1.
The digital signal processor is used for processing digital signals, and can process other digital signals besides digital image signals. For example, when the electronic device 100 selects a frequency bin, the digital signal processor is used to fourier transform the frequency bin energy, or the like.
Video codecs are used to compress or decompress digital video. The electronic device 100 may support one or more video codecs. In this way, the electronic device 100 may play or record video in a variety of encoding formats, such as: dynamic picture experts group (moving picture experts group, MPEG) 1, MPEG2, MPEG3, MPEG4, etc.
The NPU is a neural-network (NN) computing processor, and can rapidly process input information by referencing a biological neural network structure, for example, referencing a transmission mode between human brain neurons, and can also continuously perform self-learning. Applications such as intelligent awareness of the electronic device 100 may be implemented through the NPU, for example: image recognition, face recognition, speech recognition, text understanding, etc.
The internal memory 121 may include one or more random access memories (random access memory, RAM) and one or more non-volatile memories (NVM).
The random access memory may include a static random-access memory (SRAM), a dynamic random-access memory (dynamic random access memory, DRAM), a synchronous dynamic random-access memory (synchronous dynamic random access memory, SDRAM), a double data rate synchronous dynamic random-access memory (double data rate synchronous dynamic random access memory, DDR SDRAM, such as fifth generation DDR SDRAM is commonly referred to as DDR5 SDRAM), etc.; the nonvolatile memory may include a disk storage device, a flash memory (flash memory).
The FLASH memory may include NOR FLASH, NAND FLASH, 3D NAND FLASH, etc. divided according to an operation principle, may include single-level memory cells (SLC), multi-level memory cells (MLC), triple-level memory cells (TLC), quad-level memory cells (QLC), etc. divided according to a storage specification, may include universal FLASH memory (english: universal FLASH storage, UFS), embedded multimedia memory cards (embedded multi media Card, eMMC), etc. divided according to a storage specification.
The random access memory may be read directly from and written to by the processor 110, may be used to store executable programs (e.g., machine instructions) for an operating system or other on-the-fly programs, may also be used to store data for users and applications, and the like.
The nonvolatile memory may store executable programs, store data of users and applications, and the like, and may be loaded into the random access memory in advance for the processor 110 to directly read and write.
The external memory interface 120 may be used to connect external non-volatile memory to enable expansion of the memory capabilities of the electronic device 100. The external nonvolatile memory communicates with the processor 110 through the external memory interface 120 to implement a data storage function. For example, files such as music and video are stored in an external nonvolatile memory.
The electronic device 100 may implement audio functions through an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, an application processor, and the like. Such as music playing, recording, etc.
The audio module 170 is used to convert digital audio information into an analog audio signal output and also to convert an analog audio input into a digital audio signal. The audio module 170 may also be used to encode and decode audio signals. In some embodiments, the audio module 170 may be disposed in the processor 110, or a portion of the functional modules of the audio module 170 may be disposed in the processor 110.
The speaker 170A, also referred to as a "horn," is used to convert audio electrical signals into sound signals.
A receiver 170B, also referred to as a "earpiece", is used to convert the audio electrical signal into a sound signal.
Microphone 170C, also referred to as a "microphone" or "microphone", is used to convert sound signals into electrical signals.
The earphone interface 170D is used to connect a wired earphone.
The pressure sensor 180A is used to sense a pressure signal, and may convert the pressure signal into an electrical signal. In some embodiments, the pressure sensor 180A may be disposed on the display screen 194. The pressure sensor 180A is of various types, such as a resistive pressure sensor, an inductive pressure sensor, a capacitive pressure sensor, and the like.
The gyro sensor 180B may be used to determine a motion gesture of the electronic device 100. In some embodiments, the angular velocity of electronic device 100 about three axes (i.e., x, y, and z axes) may be determined by gyro sensor 180B.
The air pressure sensor 180C is used to measure air pressure.
The magnetic sensor 180D includes a hall sensor.
The acceleration sensor 180E may detect the magnitude of acceleration of the electronic device 100 in various directions (typically three axes). The magnitude and direction of gravity may be detected when the electronic device 100 is stationary. But also for recognizing the gesture of the electronic device.
A distance sensor 180F for measuring a distance. The electronic device 100 may measure the distance by infrared or laser.
The proximity light sensor 180G may include, for example, a Light Emitting Diode (LED) and a light detector, such as a photodiode.
The ambient light sensor 180L is used to sense ambient light level. The electronic device 100 may adaptively adjust the brightness of the display 194 based on the perceived ambient light level.
The fingerprint sensor 180H is used to collect a fingerprint.
The temperature sensor 180J is for detecting temperature. In some embodiments, the electronic device 100 performs a temperature processing strategy using the temperature detected by the temperature sensor 180J.
The touch sensor 180K, also referred to as a "touch device". The touch sensor 180K may be disposed on the display screen 194, and the touch sensor 180K and the display screen 194 form a touch screen, which is also called a "touch screen". The touch sensor 180K is for detecting a touch operation acting thereon or thereabout. The touch sensor may communicate the detected touch operation to the application processor to determine the touch event type. Visual output related to touch operations may be provided through the display 194. In other embodiments, the touch sensor 180K may also be disposed on the surface of the electronic device 100 at a different location than the display 194.
The bone conduction sensor 180M may acquire a vibration signal.
The keys 190 include a power-on key, a volume key, etc. The keys 190 may be mechanical keys. Or may be a touch key. The electronic device 100 may receive key inputs, generating key signal inputs related to user settings and function controls of the electronic device 100.
The following describes a structure of a cloud server 400 provided in an embodiment of the present application.
Fig. 3 schematically illustrates a structure of a cloud server 400 according to an embodiment of the present application. As shown in fig. 3, the cloud server 400 may include: one or more server processors 201, memory 202, communication interface 203, receiver 205, transmitter 206, coupler 207, antenna 208, server interface 209. These components may be connected by a bus 204 or otherwise, fig. 3 being an example of a connection via a bus. Wherein:
the communication interface 203 may be used for the cloud server 400 to communicate with other communication devices, such as terminal devices. Specifically, the terminal device may be the electronic device 100 shown in fig. 3. Specifically, the communication interface 203 may be a 5G communication interface, or may be a communication interface of a new air interface in the future. Not limited to a wireless communication interface, the cloud server 400 may also be configured with a wired communication interface 203, such as a local access network (local access network, LAN) interface. The transmitter 206 may be used to transmit the signal output by the server processor 201. The receiver 205 may be configured to perform a reception process on the mobile communication signal received by the antenna 208.
In some embodiments of the present application, the transmitter 206 and the receiver 205 may be considered as one wireless modem. In the cloud server 400, the number of transmitters 206 and receivers 205 may each be one or more. The antenna 208 may be used to convert electromagnetic energy in the transmission line into electromagnetic waves in free space or to convert electromagnetic waves in free space into electromagnetic energy in the transmission line. The coupler 207 is used to divide the mobile communication signal received by the antenna 208 into a plurality of channels and distributes the channels to the plurality of receivers 205.
Memory 202 is coupled to server processor 201 for storing various software programs and/or sets of instructions. In particular, memory 202 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic disk storage devices, flash memory devices, or other non-volatile solid-state storage devices. Memory 202 may store network communication programs that may be used to communicate with one or more additional devices, one or more terminal devices, and one or more network devices.
In some embodiments of the present application, the memory 202 may be used to store an implementation program of the method for processing web access anomalies provided by one or more embodiments of the present application on the cloud server 400 side.
The server processor 201 may be used to read and execute computer readable instructions. Specifically, the server processor 201 may be configured to invoke a program stored in the memory 202, for example, an implementation program on the cloud server 400 side of a method for handling a web access exception provided in one or more embodiments of the present application, and execute instructions included in the program.
It should be noted that, the cloud server 400 shown in fig. 3 is only one implementation manner of the embodiment of the present application, and in practical application, the cloud server 400 may further include more or fewer components, which is not limited herein.
An application scenario of the offline device control method provided by the embodiment of the present application is described below.
In some embodiments, the electronic device 100 is installed with a find device Application (APP), through which APP can view all electronic devices that are bound, and can view networking status, device status, and location information of the bound devices, and can also control the bound devices to perform related functions of the find device, such as data erasure, data encryption, data backup, screen locking, or playing sounds, etc.
Fig. 4A-4D illustrate, by way of example, viewing a related user interface of a bound electronic device.
Fig. 4A shows a main interface 11 on the electronic device 100 for exposing an installed Application (APP). The main interface 11 may include: status bar 101, tray 102 with commonly used application icons, and other application icons 103. Wherein:
the tray 102 with common application icons may show: telephone icons, contact icons, text message icons, and camera icons. Other application icons 103 may show: browser icons, gallery icons, music icons, setup icons, and icons 103A of the find device APP. The main interface 11 may also include a page indicator 104. Other application icons may be distributed across multiple pages and page indicator 104 may be used to indicate which page the user is currently viewing the application in. The user may slide the area of the other application icons left and right to view the application icons in the other pages.
As shown in fig. 4A and 4B, the icon 103A of the search device APP may receive an input operation (e.g., a click operation) of the user; if the search device APP does not currently log in the account, the electronic device 100 may display the login interface 12 of the search device APP in response to the above-mentioned input operation. The login interface 12 includes a login control 201.
As shown in fig. 4B and 4C, the login control 201 may receive an input operation (e.g., a click operation) by a user, and in response to the input operation, the electronic device 100 displays a login option 202 to login to an existing account of the system (e.g., account 1) and a login option 203 to login to another account.
Taking the login option 202 as an example, as shown in fig. 4C and fig. 4D, the login option 202 may receive an input operation (such as a click operation) of a user, and in response to the input operation, the electronic device 100 displays the user interface 13 after the device APP logs in to the existing account of the system. The user interface 13 includes a map display area 204 and a list of devices.
The device list may include device tags 205 of the electronic device 100, and device tags of at least one electronic device bound to the electronic device 100, such as a smart band device tag 206 and a headset device tag 207. Taking the smart band device tag 206 as an example, the device tag 206 may include a device icon 206A and/or a device model 206B. The device list also includes networking identifications for each device that indicate whether the device is in an online or offline state. For example, the networking identification 208 of the smart band indicates that the smart band is currently in an online state.
The map display area 204 may display the locations of the devices in the list of devices in the map. Taking the smart bracelet as an example, the smart bracelet displays a device tag 209 of the smart bracelet at a location in the map.
It will be appreciated that, if the search device APP is currently logged in, the user clicks the icon 103A of the search device APP, and then the electronic device 100 may directly display the user interface 13 shown in fig. 4D.
In an embodiment of the present application, the electronic device 100 may bind a new electronic device (e.g., the electronic device 200).
In some embodiments, the electronic device 100 and the electronic device 200 may pair the lookup devices through a near field communication technology to establish a binding relationship of the lookup devices. The near field communication technology may be a bluetooth communication technology, or may be a communication technology such as NFC communication or UWB communication. In one implementation, when the electronic device 100 and the electronic device 200 establish a communication connection for the first time through a close range communication technology, the electronic device 100 and the electronic device 200 are automatically triggered to perform pairing of the search devices; when the electronic device 100 and the electronic device 200 do not establish communication connection for the first time through the above-mentioned near field communication technology, the user may also manually trigger the electronic device 100 and the electronic device 200 to perform pairing of the search devices, which is not specifically limited herein.
By way of example, taking the example that the electronic device 200 is a notebook computer, fig. 5A-5H illustrate related user interfaces by which the electronic device 100 and the electronic device 200 are paired.
As shown in fig. 5A, when the electronic device 100 and the electronic device 200 establish a bluetooth communication connection for the first time, the electronic device 100 and the electronic device 200 are automatically triggered to perform pairing of the search devices. Optionally, as shown in fig. 5B, during the pairing process, if the search device APP of the electronic device 100 does not log in the account, the electronic device 100 displays the popup window 310. The popup 310 includes a prompt 311, a cancel control 312, and a login account control 313. The prompt information 311 is used to prompt the user to log in to the account. The cancel control 312 is used to cancel the pairing this time and stop displaying the popup window 310.
As shown in fig. 5B and 5C, the login account control 313 may receive an input operation (e.g., a click operation) by a user, and in response to the input operation, the electronic device 100 displays the pop-up window 320. The popup 320 includes a login option 321 to login to an existing account of the system (e.g., account 1), a login option 322 to login to another account, and a cancel control 323. Login option 321 and login option 322 are used to login to the account; the cancel control 323 is used to cancel pairing this time and stop displaying the popup window 320.
As shown in fig. 5C and 5D, the login option 321 may receive an input operation (e.g., a click operation) by a user, and in response to the input operation, the electronic device 100 displays the pop-up window 330. The popup 330 includes account and header 331 for account 1, prompt 332, cancel control 333, and confirm control 334. The prompt 332 is used to prompt the association of the electronic device 200 to the currently logged-in account. The cancel control 333 is used to cancel pairing this time and stop displaying the popup window 330.
It should be noted that, if the search device APP of the electronic device 100 has logged in to the account number 1 when the pairing is triggered, the electronic device 100 may also directly display the popup window 330 without displaying the popup windows shown in fig. 5B and 5C.
In some implementations, in the pairing and binding process of the electronic device 100 and the electronic device 200, when the search device APP of the electronic device 100 and the search device APP of the electronic device 200 log in the same account (for example, account 1), or the account logged in by the two have a preset relationship (i.e., the account logged in by the two is an associated account), the electronic device 100 and the electronic device 200 can complete the pairing and binding. It can be understood that when the account number 1 and the account number 2 are in a preset relationship, the account number 1 can obtain authorization of the binding relationship of the searching device of the account number 2, and the electronic device of the login account number 1 and the electronic device of the login account number 2 can perform pairing binding of the searching device. For example, the preset relationship may refer to the account 2 being a family account bound to the account 1, or a specific group (e.g. location sharing group, family group) of the account 1 includes the account 2. The embodiment of the present application does not specifically limit the preset relationship.
As shown in fig. 5D and 5E, the confirmation control 334 may receive an input operation (e.g., a click operation) by a user, in response to which the electronic device 100 displays the pop-up window 340. The popup 340 includes a pairing progress bar 341 and a cancel control 342. The pairing progress bar 341 is used to indicate the pairing progress of the electronic device 100 and the electronic device 200. The cancel control 342 is used to cancel pairing this time and stop displaying the popup window 340.
As shown in fig. 5F, after the electronic device 100 and the electronic device 200 are successfully paired, the electronic device 100 and the electronic device 200 establish a binding relationship of the search device, and the electronic device 100 displays a popup window 350, where the popup window 350 includes a prompt 351 and a view control 352. The hint information 351 is used to hint functions (e.g., view location, set to a lost mode, play sound and data protection) and view control 352 that the find device APP can provide to the electronic device 200.
As shown in fig. 5F and 5G, the view control 352 may receive an input operation (e.g., a click operation) by a user, and in response to the input operation, the electronic device 100 displays the user interface 13 of the search device APP. The device list of the user interface 13 has newly added a device tag 401 of the successfully paired electronic device 200 and a networking identification 402 of the electronic device 200. At this point, the networking identification 402 indicates that the electronic device 200 is online. The map display area 204 of the user interface 13 has newly added a device tag 210 of the electronic device 200.
As shown in fig. 5G and 5H, the device tag 401 of the electronic device 200 may receive an input operation (e.g., a click operation) by a user, and in response to the input operation, the electronic device 100 displays an address 403 of the electronic device 200, an acquisition time 404 of the address 403, device information 405 (e.g., a battery level indicator, a network symbol, etc.) of the electronic device 200, and functionality controls, which may include a positioning device control 406, a lost mode control 407, a play sound control 408, and a data protection control 409.
The locating device control 406 may be used to query the current location of the electronic device 200 to update the address 403 and the display location of the device tag 210 of the electronic device 200 in the map display area 204.
The lost mode control 407 can be used to set the electronic device 200 to a lost mode. For example, the electronic device 200 may lock the screen in the lost mode so that other users cannot use the electronic device 200.
The play sound control 408 may be used to control the electronic device 200 to play a specified audio (e.g., a ring tone) to facilitate the owner's search for a lost electronic device 200.
The data protection control 409 may be used to control the electronic device 200 for data encryption, data erasure, or data backup in order to protect the data of the electronic device 200.
In some embodiments, without the pairing links of fig. 5B to 5F, the electronic device 100 and the electronic device 200 may also establish the binding relationship of the lookup device through a trust ring that logs in to the same account. The manner in which the electronic device 100 and the electronic device 200 establish the binding relationship of the lookup device in the embodiment of the present application is not particularly limited.
Taking the example that the electronic device 200 is a notebook computer as an example, fig. 6A to 6E illustrate related user interfaces of the electronic device 200 that the electronic device 100 controls offline after the electronic device 100 and the electronic device 200 are bound.
As shown in fig. 6A, after the electronic device 200 is offline, the networking identifier 402 indicates that the electronic device 200 is offline, and the address 403 displays an address that is the last address acquired before the electronic device 200 is offline.
In the embodiment of the present application, when the electronic device 200 is offline, any one of the functionality controls (i.e., the positioning device control 406, the loss mode control 407, the play sound control 408, and the data protection control 409) shown in fig. 6A may receive an input operation of a user, and in response to the input operation, the electronic device 100 may send an offline instruction to the offline electronic device 200 through the peripheral device 300 near the electronic device 200, so as to control the electronic device 200 to execute an operation corresponding to the functionality control.
For example, as shown in fig. 6A and 6B, the lost mode control 407 may receive an input operation (e.g., a click operation) by a user, and in response to the input operation, the electronic device 100 displays the pop-up window 410. The popup window 410 is used to set the screen locking information and/or the screen locking password of the electronic device 200. The popup 410 includes a contact entry box 411, a message entry box 412, a password entry box 420, a password entry box 421, a cancel control 413, a skip control 414, and a confirm control 415. The cancel control 413 is used to cancel setting the electronic device 200 to the lost mode and trigger the electronic device 100 to stop displaying the popup window 410. Skip control 414 is used to skip setting the screen lock information and/or screen lock password of electronic device 200, directly setting electronic device 200 to a lost mode.
As shown in fig. 6C and 6D, the user inputs a contact in the contact input box 411, and after the message is input in the message input box 412, the confirmation control 415 receives an input operation (e.g., a click operation) of the user; in response to the above-described input operation, the electronic device 100 generates an offline instruction and displays a prompt 416, where the prompt 416 is used to indicate that the electronic device 200 is setting a lost mode, that is, to perform screen locking and display screen locking information (e.g., contact information and messages input by the user) set by the user. The electronic device 100 transmits the offline instruction to the offline electronic device 200 through the online peripheral device 300.
As shown in fig. 6C, the user may also enter a new lock screen password in password entry box 420 and password entry box 421; the offline instruction is further used to instruct the electronic device 200 to set a new screen locking password. When setting a new screen locking password, a user needs to input the same password in a password input box 420 and a password input box 421; when different passwords are input, the electronic device 100 may display a prompt message to prompt the user that the password input is inconsistent. It is understood that the password input box 421 is used to ensure the correctness of the password input by the user. Alternatively, only one password input box of the screen locking password may be displayed in the popup window 410, which is not limited herein.
It can be appreciated that in the embodiment of the present application, when the lost device is locked through the lost mode control 407, the screen locking information may be set or not set, and a new screen locking password may be set or not set. When the lost device is provided with the screen locking password, the lost device can only be unlocked through the new screen locking password after the user sets the new screen locking password through the popup window 410.
In some embodiments, as shown in fig. 6E, after the electronic device 100 controls the offline electronic device 200 to set the loss mode through the offline instruction, the offline electronic device 200 may feedback a confirmation message through the nearby online peripheral device 300; the electronic device 100 may display the hint information 417 based on the confirmation message fed back by the peripheral device 300. The prompt 417 is used to prompt the offline electronic device 200 that the lost mode has been successfully set.
It will be appreciated that controlling the electronic device 200 offline displays user-entered lock screen information (e.g., user-entered contact information) to facilitate contact with the owner of the electronic device 200 after other users have detected the missing electronic device 200.
For example, as shown in fig. 6E and 7A, the data protection control 409 may receive an input operation (e.g., a click operation) by a user, and in response to the input operation, the electronic device 100 displays the pop-up window 501. The pop-up window 501 may include a plurality of data protection options, such as a data erasure option 502, a data encryption option 503, and a data backup option 504; file type options such as all options 505, multimedia options 506, document options 507, application data options 508, contact data options 509 may also be included; a cancel control 510 and a confirm control 511 may also be included.
It should be noted that, options 506 to 509 are exemplary options provided by the embodiment of the present application, and should not be limited to the embodiment of the present application, and other file type options may also be used by the embodiment of the present application.
In the embodiment of the present application, the user may select a desired data protection option (i.e., one of the plurality of data protection options), and then select a file type (i.e., all options 505, or at least one of options 506 to 509) that needs to be protected; the user may then operate the confirm control 511; in response to a user input operation (e.g., a click operation) to the confirm control 511, the electronic device 100 may generate an offline instruction for instructing to perform the data protection operation corresponding to the data protection option described above, such as the data erasure operation corresponding to the data erasure option 502, the data encryption operation corresponding to the data encryption option 503, and the data backup operation corresponding to the data backup option 504, for the file type selected by the user.
As shown in fig. 7B and 7C, after the user selects the data erasure option 502 and the all options 505, the confirmation control 511 receives an input operation (e.g., a click operation) of the user; in response to the above-described input operation, the electronic device 100 generates an offline instruction and displays a prompt 513; the offline instruction is used to perform data erasure on the file type selected by the user, and the prompt message 513 is used to prompt the electronic device 200 to perform data erasure.
In some embodiments, as shown in fig. 7D, after the electronic device 100 controls the offline electronic device 200 to complete data erasure through the offline instruction, the offline electronic device 200 may feedback a confirmation message through the nearby online peripheral device 300; the electronic device 100 may display a prompt 514 based on the acknowledgement message fed back by the electronic device 200. The prompt 514 is used to prompt the electronic device 200 that the data is erased. Optionally, hint information 514 is also used to hint the erased file type.
In some embodiments, after the offline electronic device 200 executes the offline instruction, the electronic device 200 displays a prompt message, where the prompt message is used to prompt the electronic device 200 that the offline instruction has been executed. Optionally, the offline instruction is used for one or more of data protection operations such as data erasure, data encryption, and data backup.
For example, as shown in fig. 7E, after the electronic device 200 completes data erasure according to the offline instruction, a prompt 515 may be displayed, where the prompt 515 is used to prompt the electronic device 200 that data erasure has been performed. Optionally, hint information 515 is also used to hint the erased file type.
As shown in fig. 7F and 7G, after the user selects the data encryption option 503, the electronic device 100 displays a password input box 516 and a password input box 517 in the pop-up window 501. The password input box 516 and the password input box 517 are used to set a password for data encryption. Alternatively, only one data-encrypted password input box may be displayed in the popup window 501, which is not limited herein.
As shown in fig. 7H and 7I, after the user inputs the encryption password in the password input box 516 and the password input box 517 and selects all options 505, the confirmation control 511 receives an input operation (e.g., a click operation) by the user; in response to the input operation, the electronic device 100 generates an offline instruction and displays a prompt 518; the offline instruction is used to perform data erasure on the file type selected by the user, and the prompt 518 is used to prompt the electronic device 200 to encrypt data. As shown in fig. 7J, after the electronic device 200 completes data encryption according to the offline instruction, the electronic device 100 may display a prompt 519 according to a confirmation message fed back by the electronic device 200, where the prompt 519 is used to prompt the electronic device 200 that data encryption has been performed. Optionally, hint information 519 is also used to hint the encrypted file type.
As shown in fig. 7K, after the electronic device 200 completes data encryption according to the offline instruction, a prompt 520 may be displayed, where the prompt 520 is used to prompt the electronic device 200 that data encryption has been performed. Optionally, hint information 520 is also used to hint the encrypted file type.
In some embodiments, when the electronic device 200 is offline, if there is an online peripheral device in the vicinity of the electronic device 200, the electronic device 100 may further acquire and display the offline position of the electronic device 200 uploaded by the peripheral device.
As shown in fig. 7J and 7L, when the electronic device 200 is offline, the pointing device control 406 may receive an input operation (e.g., a click operation) by a user, and in response to the input operation, the electronic device 100 acquires and displays an address 521 generated based on the offline position uploaded by the peripheral device 300, and may update the position of the device tag 210 of the electronic device 200 in the map display area 204 according to the address.
In some embodiments, without the user operating the pointing device control 406, the electronic device 100 can also obtain and display the address 521 and update the location of the device tag 210 of the electronic device 200 in the map display area 204 based on the address 521.
In some embodiments, the electronic device 100 may not be installed with a separate search device APP, and the functions provided by the search device APP related to fig. 5G to 7L may be implemented in a system setting of a system application of the electronic device 100, or may be implemented in a web page search device APP, which is not specifically limited in this embodiment of the present application.
Based on the foregoing communication system, hardware structure and application scenario, the offline device control method provided by the embodiment of the present application is described in detail below.
In the offline device control method provided by the embodiment of the application, the electronic device 100 and the lost device can be paired and bound with the searching device in advance; when the lost device is offline, a user can send an offline instruction for the lost device to the cloud server by using the electronic device 100 bound with the lost device; when the cloud server receives the assistance indication message for the lost device, which is uploaded by the peripheral devices on line near the lost device, an offline instruction of the electronic device 100 is sent to the lost device through the peripheral device, so that the lost device can execute the offline instruction. Thus, when the lost device is offline, the electronic device 100 can still control the lost device to perform a specific task, so as to avoid data loss and data leakage of the lost device, and protect user privacy.
Fig. 8A illustrates a flow chart of an off-line device control method including, but not limited to, steps S101 to S113.
S101, the electronic device 100 and the electronic device 200 perform pairing and binding of the searching device.
For example, referring to the descriptions related to fig. 5A to 5H, the electronic device 100 may install a search device APP, through which the electronic device 100 and the electronic device 200 may perform pairing binding of the search devices, which is not described herein.
In some embodiments, during the pairing and binding process of the electronic device 100 and the electronic device 200, the electronic device 100 sends a pairing request to an application server (e.g. the cloud server 400) of the lookup device APP, where the pairing request is used to request to pair and bind with the electronic device 200; after the cloud server 400 interacts with the electronic device 100 and the electronic device 200, when it is determined that the electronic device 100 and the electronic device 200 log in the same account (for example, account 1), a pairing request from the electronic device 100 is forwarded to the electronic device 200, and a pairing response from the electronic device 200 is forwarded to the electronic device 100.
When the electronic device 200 is offline, the electronic device 100 receives the input operation 1 and generates an offline instruction in response to the input operation 1.
Referring to the related descriptions of fig. 6A to 7L, when the user confirms that the electronic device 200 is lost and the electronic device 200 is in an offline state, in order to avoid data loss or leakage of the electronic device 200, the user may trigger the electronic device 100 to send an offline instruction by searching for a functional control (such as the loss mode control 407, the play sound control 408, and the data protection control 409 shown in fig. 6A) provided by the device APP and corresponding to the electronic device 200, where the offline instruction is used to instruct the electronic device 200 to perform one or more of the following operations: data erasure, data encryption, data backup, playing sound, setting a lost mode, etc.
Illustratively, the functionality control corresponding to the electronic device 200 provided by the search device APP includes a functionality control 1.
In some implementations, the electronic device 100 receives an input operation 1 for a functionality control 1, the input operation 1 comprising one or more operations; in response to the input operation 1, if the electronic device 100 determines that the electronic device 200 is in an offline state, an offline instruction corresponding to the function control 1 is generated. Optionally, message 1 includes an offline instruction. Optionally, message 1 includes ciphertext encrypted by the offline instruction.
For example, referring to the associated descriptions of fig. 6A-6E, functionality control 1 may be a lost mode control 407, and input operation 1 may include a click operation on lost mode control 407, with offline instructions indicating that the electronic device is to be placed in lost mode. Optionally, the offline instruction is specifically configured to instruct to lock the screen of the electronic device. Optionally, the input operation 1 may further include an input operation of inputting a contact address by the user in the contact address input box 411, an input operation of inputting a message in the message input box 412, and an input operation acting on the confirmation control 415, and the offline instruction is further used to instruct to display the contact address and the message on the lock screen interface of the electronic device. Optionally, the input operation 1 may further include an input operation of inputting a screen locking password by the user in the password input box 420 and the password input box 421, and the offline instruction is further used to instruct the electronic device to set a new screen locking password.
Illustratively, referring to fig. 6A, the function control 1 is a play sound control 408, and the input operation 1 includes a click operation on the play sound control 408, and the offline instruction is used to instruct the electronic device to play sound.
By way of example, referring to the relevant descriptions of fig. 6E-7K, functionality control 1 is data protection control 409, input operation 1 may include a click operation on play data protection control 409, an input operation on one data protection option 1 (e.g., data erasure option 502), an input operation on at least one file type option (e.g., all options 505, or at least one of options 506-509), and an input operation on validation control 511; the offline instruction is used to instruct the user to perform a data protection operation (e.g., data erasure) corresponding to the data protection option 1 on the file type option selected by the user.
For example, referring to the related descriptions of fig. 7F to 7K, when the data protection option 1 is the data encryption option 503, the input operation 1 may further include an operation of inputting an encryption password by the user at the password input box 516 and the password input box 517.
S103, the electronic device 100 sends a message 1 to the cloud server 400, where the message 1 is used to instruct the electronic device 200 to execute the offline instruction.
And S104, when the electronic equipment 200 determines that the equipment is offline, broadcasting offline broadcast 1 through the short-range communication module.
In some implementations, the above-described close range communication module is a BLE communication module. The electronic device 200 turns on the find device function; when the electronic device 200 is offline, offline broadcast 1 is transmitted by the BLE communication module based on a preset period timing.
In some implementations, the electronic device 200 may query a network connection state of the device, and when determining that the device is disconnected based on the network connection state, the electronic device 200 determines that the device is in an offline state; conversely, when the device is determined to be networked based on the network connection state, the electronic device 200 determines that the device is in an online state.
In some implementations, when determining that the device is disconnected and/or the electronic device 200 is not connected to the SIM card based on the network connection status of the electronic device 200, the electronic device 200 determines that the device is in an offline state; when it is determined that the present device is networked based on the network connection state and the electronic device 200 is connected with the SIM card, the electronic device 200 determines that the present device is in an on-line state.
In some implementations, the electronic device 200 may broadcast a heartbeat packet through the communication network 500, and when the heartbeat packet is failed to be sent, or response information fed back by other devices (such as the cloud server 400) based on the heartbeat packet is not received within a preset duration, the electronic device 200 determines that the device is in an offline state; otherwise, when the heartbeat packet is successfully sent or response information fed back by other equipment based on the heartbeat packet is received within a preset time, the equipment is judged to be in an on-line state. Alternatively, the electronic device 200 may be a smart home device, or a wearable device (e.g., a headset, a sports bracelet), or the like.
S105, the online peripheral device 300 scans the offline broadcast through the above-mentioned close range communication module.
In the embodiment of the present application, the peripheral device 300 starts the function of searching the device, and the online peripheral device 300 can communicate with the cloud server 400; when the peripheral device 300 is in an on-line state, the BLE communication module scans off-line broadcasting of nearby devices based on a preset scanning policy.
In some implementations, when the peripheral device 300 is in an online state, offline broadcast is scanned periodically with a preset scanning period and scanning duration through the BLE communication module. For example, the scanning period is 600ms, and the scanning period is 100ms.
S106, after the peripheral device 300 scans the offline broadcast 1 from the electronic device 200, the message 2 is sent to the cloud server 400.
In some implementations, message 2 is used to indicate that peripheral device 300 may assist electronic device 200 in transmitting a message.
In some implementations, after the peripheral device 300 scans the offline broadcast 1 from the electronic device 200, a prompt is displayed to prompt the user whether to assist other devices in offline control. After receiving the confirmation operation from the user, the peripheral device 300 transmits the message 2 to the cloud server 400.
It can be appreciated that all online peripheral devices near the electronic device 200 can scan to the offline broadcast 1 through the above-mentioned close range communication module, and send an assistance indication message (i.e. the above-mentioned message 2) to the cloud server 400.
S107, the cloud server 400 determines, based on the message 1 and the message 2, that the offline instruction indicated by the message 1 is used to control the offline device indicated by the message 2.
In the embodiment of the present application, the message 1 may carry the indication information 1 for indicating the target device of the offline instruction, and the message 2 may also carry the indication information 2 for indicating the offline device. The cloud server 400 matches the indication information 1 with the indication information 2, and if the matching is successful, the cloud server 400 determines that the offline instruction is used for controlling the offline device indicated by the message 2, and the online peripheral device 300 can assist the offline device to transmit data.
Optionally, the indication information 1 and the indication information 2 are derived public keys of public keys generated when the electronic device 100 binds the electronic device 200 or Hash values of the derived public keys. Alternatively, the indication information 1 and the indication information 2 are device identifiers that can indicate offline devices, for example, the device identifiers are universal device identifiers (unique device identifier description, UUID), unique device identifiers (Unique Device Identifier, UDID), and the like.
The specific implementation manner is described in detail in the following embodiments, which are not described herein.
S108, the cloud server 400 sends a message 3 to the peripheral device 300, where the message 3 is used to instruct the electronic device 200 to execute the offline instruction.
After receiving the message 2 sent by the peripheral device 300, if it is determined based on the message 2 that the peripheral device 300 can assist in forwarding the offline instruction for the electronic device 200, the cloud server 400 sends a message 3 to the peripheral device 300, where it is desirable to forward the message 3 to the offline electronic device 200 through the peripheral device 300, so as to instruct the electronic device 200 to execute the offline instruction from the electronic device 100.
S109, the peripheral device 300 sends the message 3 to the electronic device 200 through the above-mentioned short-range communication module.
In some implementations, after receiving the message 3, when the offline broadcast 1 of the electronic device 200 is scanned again, the peripheral device 300 establishes a communication connection with the electronic device 200 through the BLE communication module, and then sends the message 3 to the electronic device 200 based on the communication connection. It will be appreciated that the message 3 may be forwarded to the electronic device 200 when the peripheral device 300 of the caretaker is again close to the electronic device 200 off-line.
S110, the electronic device 200 executes the offline instruction based on the message 3.
After the electronic device 200 executes the offline instruction, the short-range communication module broadcasts a message 4, where the message 4 indicates that the offline instruction is executed.
S112, after the peripheral device 300 scans the message 4 through the above-mentioned close range communication module, it sends the message 4 to the cloud server 400.
In some implementations, after the electronic device 200 executes the offline instruction, if the above-mentioned communication connection between the electronic device 200 and the peripheral device 300 is not disconnected, the electronic device 200 may also send the message 4 directly to the peripheral device 300 through the communication connection.
S113, the cloud server 400 sends a message 5 to the electronic device 100, where the message 5 is used to indicate that the offline instruction is executed.
In some implementations, the message 4 may be a scan_rsp message. The message 4 and the message 5 may be the same message or different messages, and are not particularly limited herein.
Referring to the related description of fig. 6A to 7K, after the electronic device 200 executes the offline instruction and feeds back the confirmation message, the electronic device 100 may display a prompt message based on the confirmation message to prompt the user that the electronic device 200 has executed the offline instruction.
For example, message 4 and message 5 may be the aforementioned acknowledgement messages, and referring to the related descriptions of fig. 6A-6E, the user triggers the electronic device 100 to send an offline instruction through the lost mode control 407, where the offline instruction is used to instruct to set the electronic device 200 to the lost mode; in response to the confirmation message fed back by the electronic device 200, the electronic device 100 displays a prompt 417, where the prompt 417 is used to prompt the electronic device 200 that the loss mode has been set. For example, referring to the associated descriptions of fig. 7A-7E, a user triggers the electronic device 100 via the data protection control 409 to send an offline instruction for indicating that a data erasure is performed for a particular file type; in response to the confirmation message fed back by the electronic device 200, the electronic device 100 displays a prompt 514, where the prompt 514 is used to prompt the electronic device 200 that the data erasure is completed. For example, referring to the associated descriptions of FIGS. 7F-7K, offline instructions are used to instruct data encryption to be performed on a particular file type; in response to the confirmation message fed back by the electronic device 200, the electronic device 100 displays a prompt 518, where the prompt 518 is used to prompt the electronic device 200 that data encryption has been completed.
In some implementations, in step S106, the peripheral device also obtains an offline position of the electronic device 200 in response to the offline broadcast 1 of the electronic device 200. Message 2 may be an offline positioning message, message 2 also indicating the offline position. Step S106 may be followed by S114 and S115.
In some implementations, the offline position is actually the position of the local device acquired by the positioning module of the peripheral device 300, and since the peripheral device 300 is in the vicinity of the electronic device 200, the position of the peripheral device 300 can be regarded as the current offline position of the electronic device 200. Optionally, the obtaining, by the peripheral device 300, the offline position of the electronic device 200 specifically includes: the peripheral device 300 invokes the location module of the device to obtain the current location of the device, which is the offline location. Optionally, the obtaining, by the peripheral device 300, the offline position of the electronic device 200 specifically includes: the peripheral device 300 uses the location of the device that was recently acquired by the location module of the device as the offline location.
In some implementations, the offline position is a position of the peripheral device 300 using a position of the peripheral device as a reference position, and a short-range positioning technology is used to obtain the position of the electronic device 200. Optionally, the obtaining, by the peripheral device 300, the offline position of the electronic device 200 specifically includes: the peripheral device 300 obtains the azimuth of the electronic device 200 and the distance from the electronic device 200 using a short-range positioning technique (e.g., bluetooth positioning technique); the peripheral device 300 obtains the position information of the device by using the positioning module; and then taking the position information of the device as a reference, and acquiring the current offline position of the electronic device 200 based on the azimuth and the distance of the electronic device 200.
S114, the cloud server 400 sends a message 6 to the electronic device 100, where the message 6 is used to indicate the offline position of the electronic device 200.
S115, the electronic device 100 displays the offline position of the electronic device 200 based on the message 6.
Referring to the related description of fig. 7J and 7L, after the electronic device 100 acquires the offline position of the electronic device 200, the offline position of the electronic device 200 may be displayed in the user interface 11, and the display position of the device tag of the electronic device 200 in the map display area 204 may be updated according to the offline position of the electronic device 200.
In some implementations of the offline device control method provided by the embodiments of the present application, the electronic device 100, the lost device and the cloud server may negotiate in advance a key for authenticating the identity of the other party; in the off-line control process, the off-line instructions are encrypted and transmitted by utilizing a specific key between every two devices so as to authenticate the identity of the other party; thus, the counterfeiting and the tampering of the offline instructions by malicious equipment are avoided, and the security of offline control is ensured. In addition, in the offline control process, the message transmission with the peripheral device does not carry the device information (such as the device identifier) of the lost device and the search device (i.e. the electronic device 100); therefore, the lost equipment and the searching equipment can be prevented from being tracked, malicious equipment is prevented from forging and falsifying information from the lost equipment and the searching equipment by using equipment information, and the safety of offline control is ensured.
Exemplary, fig. 8B shows a flow diagram of an offline device control method.
As shown in fig. 8B, step S101 may specifically include: the electronic device 100 and the electronic device 200 perform pairing and binding of the lookup device, in the pairing and binding process, a key K1, a key K2 and a key O1 are generated, a public key P and a corresponding private key d, the key K1 is used for mutually authenticating identities between the electronic device 200 and the electronic device 100, the key K2 is used for mutually authenticating identities between the electronic device 200 and the cloud server 400, and the key O1 is used for mutually authenticating identities between the electronic device 100 and the cloud server 400.
In some embodiments, referring to fig. 8C, in the pairing process of the electronic device 100 and the electronic device 200, through three-party interaction of the electronic device 100, the electronic device 200 and the cloud server 400, the electronic device 100 and the electronic device 200 generate the same key K1 based on a preset algorithm, respectively, the electronic device 200 and the electronic device 100 hold the key K1, and the key K1 is used for mutually authenticating identities of the electronic device 200 and the electronic device 100; the electronic device 100 and the cloud server 400 respectively generate the same secret key O1 based on a preset algorithm, the electronic device 100 and the cloud server 400 hold the secret key O1, and the secret key O1 is used for mutually authenticating identities of the electronic device 100 and the cloud server 400; the electronic device 200 and the cloud server 400 respectively generate the same secret key K2 based on a preset algorithm, the electronic device 200 and the cloud server 400 hold the secret key K2, and the secret key K2 is used for mutually authenticating identities of the electronic device 200 and the cloud server 400.
For example, the predetermined algorithm is elliptic curve diffie-hellman key exchange (Elliptic Curve Diffie-Hellman key Exchange, ECDH) algorithm. The two devices can negotiate the same key without sharing any private information using the ECDH algorithm, and the key generated using the ECDH algorithm can transmit secure encrypted material in an unsecure channel.
In some embodiments, during pairing of electronic device 100 and electronic device 200, electronic device 100 also generates public key P and corresponding private key d; electronic device 200 may hold public key P and electronic device 100 may hold private key d and public key P. The private key d and the public key P may be used for encrypted transmission of information.
It should be noted that, the public key (public key) and the private key (private key) are a key pair (i.e., a public key and a private key) obtained by an encryption algorithm. For example: the encryption algorithm can be an asymmetric encryption algorithm such as elliptic curve cryptography (EllipticCurveCryptography, ECC), livister-Samor-Adleman (Rivest-Shamir-Adleman, RSA for short) or a digital signature algorithm (Digital Signature Algorithm, DSA for short). The key pair obtained by the encryption algorithm has uniqueness; the public key is a part of the public key pair and is externally disclosed; the private key is a non-public part and is not disclosed externally and needs to be saved by the device. The data must be decrypted with the corresponding private key if encrypted with the public key and with the corresponding public key if encrypted with the private key.
Step S102 may specifically include: when the electronic device 200 is offline, the electronic device 100 receives the input operation 1, and generates, in response to the input operation 1, the encrypted authentication information C2 corresponding to the offline instruction and the Hash value 1 of the derivative public key Pi of the public key P, where the encrypted authentication information C2 is generated by sequentially encrypting the offline instruction using the key K1 and the key O1.
In some embodiments, the electronic device 100 may also upload the derivative public key Pi or the Hash value of the derivative public key Pi in advance. For example, in the binding process of the electronic device 100 and the lookup device of the electronic device 200, after the electronic device 100 obtains the public key P, the Hash value of the public key Pi or the derivative public key Pi is uploaded to the server.
In some embodiments, the electronic device 100 encrypts the offline instruction sequentially using the key K1 and the key O1 to generate the encrypted authentication information C2, specifically including: the electronic device 100 encrypts the offline instruction X by using the key K1, generating encrypted authentication information C1; the electronic device 100 encrypts the encrypted authentication information C1 with the key O1, and generates encrypted authentication information C2.
In some embodiments, the encryption is performed using an authentication encryption (authenticated encryption with associated data, AEAD) algorithm for the associated data, which is an encryption scheme with authentication functionality, while providing confidentiality, integrity, and authenticability. Illustratively, c1=aead (K1, X), c2=aead (O1, C1, ad=sn). Where the field "ad=sn" is an encrypted field of the AEAD algorithm, AD (additional data) refers to additional information in the AEAD algorithm, and SN (serial number) refers to a sequence number in the AEAD algorithm.
Illustratively, offline instruction X is used to perform data erasure; x=file type|erasure||freshness value T, a first field in X indicates an erased file type, a second field in X indicates an operation performed by X, freshness value T is a random number, freshness value T is used for encryption; c1 AEAD (K1, file type erase fresh value T).
In the embodiment of the application, the Hash value of the derivative public key Pi is obtained by operating the derivative public key Pi according to a preset Hash algorithm. The Hash algorithm is a function that is used to compress messages of arbitrary length to a message digest of a certain fixed length (i.e., a Hash value), which can be used to check the integrity of the message, preventing it from being tampered with.
After the electronic device 100 and the electronic device 200 obtain the public key P, the public key P is derived in a fixed period, and a plurality of derived public keys Pi having a time dimension are generated. It will be appreciated that the derivative public keys Pi generated by the electronic device 100 and the electronic device 200 for the same time are identical.
In some implementations, in step S101, during the binding process of the electronic device 100 and the electronic device 200, the cloud server 400 may also obtain the public key P; in step S103, the cloud server 400 may generate a Hash value 1 of the derivative public key Pi of the public key P; i.e. without the electronic device 100 uploading the derivative public key Pi or the Hash value 1 to the cloud server 400.
Step S103 may specifically include: the electronic device 100 transmits a message 1 to the cloud server 400, the message 1 including the encrypted authentication information C2 and the Hash value 1.
For example, referring to fig. 8C, after the electronic device 100 sequentially encrypts the offline instruction X using the key K1 and the key O1, the encrypted ciphertext C2 is transmitted to the cloud server 400. In the embodiment of the application, the encrypted authentication information can also be called ciphertext.
It should be noted that, the message 1 includes a Hash value 1 of the derivative public key Pi of the public key P held by the electronic device 200, and the Hash value 1 in the message 1 may be used to implicitly indicate that the offline instruction indicated by the message 1 is directed to the electronic device 200. The above-described encryption authentication information C2 and Hash value 1 may be separately distributed, and are not particularly limited herein.
In some implementations, the cloud server 400 may store, in the offline instruction database, a correspondence of device identifications of the respective lookup devices, device identifications of the lost devices, encrypted authentication information of the uploaded offline instructions, and Hash values of the derived public keys. For example, after receiving the message 1 sent by the electronic device 100 in step S103, the cloud server 400 stores the correspondence relationship among the device identifier of the electronic device 100, the device identifier of the electronic device 200, the encrypted authentication information C2, and the Hash value 1 of the derivative public key Pi in the offline instruction database. The device identifier of the electronic device 200 may be carried in the message 1, or may be uploaded to the cloud server 400 by the electronic device 100 before step S103, which is not limited herein specifically.
In some embodiments, the electronic device 100 may obtain, in advance, hash values of a plurality of derivative public keys within a predetermined time period (e.g., one week) in the future, and upload the Hash values to the cloud server 400. The Hash value 1 includes Hash values of a plurality of derivative public keys within the preset time period.
Step S104 may specifically include: when the electronic device 200 determines that the device is offline, the offline broadcast 1 is broadcast through the close range communication module, and the offline broadcast 1 includes the derivative public key Pi of the public key P.
Referring to fig. 8C, when the electronic device 200 is offline, BLE offline broadcast may be broadcast through the BLE communication module.
Step S106 may specifically include: after the peripheral device 300 scans the offline broadcast 1 from the electronic device 200, a message 2 is sent to the cloud server 400, and the message 2 includes the Hash value 2 of the derivative public key Pi.
It should be noted that, the message 2 includes the Hash value 2 of the derivative public key Pi of the public key P held by the electronic device 200, and the Hash value 2 in the message 2 may be used to implicitly indicate that the message 2 is specific to the electronic device 200.
In some implementations, the electronic device 200 may also broadcast the Hash value 2 of the derivative public key Pi directly through the offline broadcast 1 without the peripheral device 300 calculating the Hash value.
Step S107 may specifically include: the cloud server 400 matches the Hash value 2 in the message 2 with the Hash value 1 in the message 1; if the matching is successful, the cloud server 400 acquires the encrypted authentication information C3, and the encrypted authentication information C3 is generated by decrypting C2 with the key O1 and then encrypting with the key K2.
Step S108 may specifically include: the cloud server 400 transmits a message 3 to the peripheral device 300, the message 3 including the encrypted authentication information C3 and the Hash value 2 of the derivative public key Pi.
In some implementations, the cloud server 400 stores, in the offline instruction database, the encrypted authentication information of the offline instructions sent by each electronic device and the Hash value of the corresponding derivative public key. After receiving the message 2, the cloud server 400 matches the Hash value 2 in the message 2 with a Hash value (for example, hsh value 1) corresponding to the encryption authentication information of each offline instruction in the offline instruction database; the Hash value 1 successfully matched is obtained, so that the device identifier of the lost device (i.e., the device identifier of the electronic device 100) and the encryption authentication information C2 corresponding to the Hash value 1 can be obtained.
In addition, the cloud server 400 also stores a correspondence of a key O1 corresponding to the device identifier of the electronic device 100 and a correspondence of a key K2 corresponding to the device identifier of the electronic device 200; referring to fig. 8C, based on the device identifier of the electronic device 100, the cloud server 400 obtains the key O1 to decrypt the encrypted authentication information C2, generating the encrypted authentication information C1; based on the device identifier of the electronic device 200, the cloud server 400 acquires the key K2 to encrypt the encrypted authentication information C2, and generates encrypted authentication information C3.
In some implementations, the successful match refers to the Hash value 1 being equal to the Hash value 2. In some implementations, the Hash value 1 includes Hash values of a plurality of derivative public keys within the preset time period, and the matching success means that the Hash value 2 is equal to one of the Hash values of the plurality of derivative public keys.
It should be noted that, after the electronic device 100 and the electronic device 200 are bound, the electronic device 100 and the electronic device 200 both hold the public key P, and may obtain the same derivative public key Pi corresponding to the public key P. Hash value 1 of derivative public key Pi in message 1 implies that message 1 is for electronic device 200 and Hash value 2 of derivative public key Pi in message 2 implies that message 2 is for electronic device 200. If the Hash value 1 matches the Hash value 2, it may be determined that the offline instruction indicated by the electronic device 100 in the message 1 is for the device assisted by the peripheral device 300, i.e., the electronic device 200 implied by the Hash value 2.
Illustratively, c2=aead (O1, C1, ad=sn). Cloud server 400 decrypts C2 using key O1 to obtain C1, O1 -1 C2=c1; cloud server 400 encrypts C1 with key K2 to obtain C3, c3=aead (K2, C1, ad=sn).
It will be appreciated that the key O1 is used by the cloud server 400 to verify the identity of the electronic device 100, determining that the encrypted authentication information C2 is from a legitimate user. All peripheral devices that assist in the reporting of the electronic device 200 may receive the encrypted authentication information of the offline instruction issued by the cloud server 400.
Step S109 may specifically include: based on the Hash value 2 of the derivative public key Pi in the message 3, the peripheral device 300 transmits the message 3 to the electronic device 200 through the above-described near field communication module.
In some implementations, message 3 includes a Hash value 2 of derivative public key Pi; after receiving the message 3, the peripheral device 300 scans the offline broadcast 1 of the electronic device 200 again to obtain the derivative public key Pi in the offline broadcast 1; the peripheral device 300 matches the Hash value in the message 3 with the Hash value of the derivative public key Pi in the offline broadcast 1, and if the matching is successful, sends the message 3 to the electronic device 200.
Referring to fig. 8C, the cloud server 400 transmits the ciphertext C3 to the electronic apparatus 200 via the peripheral apparatus 300.
Step S110 may specifically include S110A and S110B.
S110A, the electronic device 200 decrypts the encrypted authentication information C3 in the message 3 by using the key K2 and the key K1, and obtains the offline instruction.
Specifically, referring to fig. 8C, the electronic device 200 decrypts the encrypted authentication information C3 corresponding to the offline instruction X by using the key K2, and obtains the encrypted authentication information C1; the peripheral device 300 decrypts the encrypted authentication information C1 using the key K1, and obtains the offline instruction X.
Illustratively, c3=aead (K2, C1, ad=sn), c1=aead (K1, X). The electronic device 200 decrypts K2 using the key O1 to obtain C1, K2 -1 C2=c1; the electronic device 200 decrypts C1 to obtain X, K2 by using the key K2 -1 ·C1=X。
It will be appreciated that the key K2 is used by the electronic device 200 to verify the identity of the cloud server 400, and the key K1 is used by the electronic device 200 to verify the identity of the electronic device 100.
S110B, the electronic device 200 executes the offline instruction.
In step S111, specifically, after the electronic device 200 executes the offline instruction, the short-range communication module broadcasts a message 4, where the message 4 includes a validation ciphertext and a derivative public key Pi after encryption of a validation message, and the validation message is used to indicate that the offline instruction has been executed.
Alternatively, referring to fig. 8C, the acknowledgement message may be a scan_rsp message.
Step S112 may specifically include: after the peripheral device 300 scans the message 4 through the above-mentioned close range communication module, the peripheral device 300 transmits the above-mentioned message 4 to the cloud server 400, and the message 4 includes the Hash value 3 of the derivative public key Pi.
Step S113 may specifically include S113A and S113B.
S113A, the cloud server 400 matches the Hash value 3 in the message 4 with the Hash value 1 in the message 1, and if the matching is successful, S113B is executed.
S113B, the cloud server 400 determines to transmit the message 5 to the electronic device 100 based on the message 4.
In some implementations, referring to fig. 8C, the validation ciphertext included in message 4 is encrypted using key K2. Before the cloud server 400 sends the message 5, the server 400 decrypts the confirmation ciphertext using the key K2 and obtains the confirmation message, where the message 5 includes the confirmation message.
In some implementations, the message 4 includes a confirmation ciphertext D2, the confirmation ciphertext D2 being encrypted sequentially with the key K1 and the key K2. Before the cloud server 400 sends the message 5, the cloud server 400 decrypts the confirmation ciphertext D2 by using the key K2, and then obtains the confirmation ciphertext D1 of the confirmation message encrypted by the key K1; message 5 includes an acknowledgment ciphertext D1. After receiving the message 5, the electronic device 100 decrypts the confirmation ciphertext D2 using the key K1, and obtains the confirmation message.
In some implementations, the message 4 includes a confirmation ciphertext D2, the confirmation ciphertext D2 being encrypted sequentially with the key K1 and the key K2. Before the cloud server 400 sends the message 5, the cloud server 400 decrypts the confirmation ciphertext D2 by using the key K2, and then obtains the confirmation ciphertext D1 of the confirmation message encrypted by the key K1; the cloud server 400 encrypts the confirmation ciphertext D1 by using the key O1 to obtain a confirmation ciphertext D3 sequentially encrypted by the key K1 and the key O1; message 5 includes an acknowledgment ciphertext D3. After receiving the message 5, the electronic device 100 decrypts the confirmation ciphertext D3 by using the key O1, and obtains the confirmation ciphertext D3 encrypted by the key K1; after decrypting the confirmation ciphertext D2 using the key K1, the electronic device 100 obtains the confirmation message.
It will be appreciated that the cloud server 400 may authenticate the identity of the electronic device 200 using the key K2; the electronic device 100 may authenticate the identity of the cloud server 400 using the key O1, and the electronic device 100 may authenticate the identity of the electronic device 200 using the key K1.
In some implementations, the validation cipher text included in message 4 is encrypted using derivative public key Pi of public key P, and message 5 also includes the validation cipher text described above; the electronic device 200 decrypts the confirmation ciphertext using the derivative private key di of the private key d, and obtains the confirmation message.
In some implementations, in step S102, the electronic device 100 may also upload the derivative public key Pi to the cloud server 400 through the message 1 instead of the hash of the derivative public key Pi; in step S106, the peripheral device 300 may upload the derivative public key Pi to the cloud server 400 through the message 2 instead of the hash of the derivative public key Pi; in step S107, the cloud server 400 matches the derivative public key in the message 1 with the derivative public key in the message 2, and if the matching is successful, the encryption authentication information C3 is obtained.
In some implementations, the message 2 may be an offline positioning message, and in step S106, the message 2 sent by the peripheral device 300 may include a location ciphertext of the offline location of the electronic device 200, where the location ciphertext is generated by encrypting the offline location using the derivative public key Pi and the encryption algorithm. Step S106 may be followed by S114 and S115.
In step S114, the message 6 issued by the cloud server 400 to the electronic device 100 includes the location ciphertext of the offline location of the electronic device 200.
In step S115, the electronic device 100 decrypts the position ciphertext using the derivative private key di of the private key d, and obtains and displays the offline position of the electronic device 200.
In summary, in the case that the offline broadcast 1, the message 2, and the message 3 interacted with the peripheral device 300 do not carry the device identifier of the electronic device 100, the encryption authentication information of the offline instruction of the electronic device 200 may be obtained by using the matching of the derivative public key Pi or the matching of the hash value of the derivative public key Pi, and forwarded to the electronic device 200 through the peripheral device 300.
In some embodiments, the offline control method may not use the related information of the public key P (such as a derivative public key of the public key P, a Hash value of the derivative public key, etc.) to implicitly refer to the electronic device 200; the message interaction among the electronic device 100, the electronic device 200, the peripheral device 300, and the cloud server 400 may indicate the electronic device 200 through the device identification of the electronic device 200, and may indicate the electronic device 100 through the device identification of the electronic device 100. The embodiment of the present application is not particularly limited thereto. An exemplary description is given below. By way of example only, and not by way of limitation,
In step S103, the message 1 includes the encrypted authentication information C2 and the device identifier 1 of the lost device (i.e., the device identifier of the electronic device 200), the device identifier 1 being used to indicate that the offline instruction indicated by the message 1 is for the electronic device 200.
In step S104, the offline broadcast 1 includes the device identification 1 of the electronic device 200.
In step S106, the message 2 includes the device identifier 1 of the missing device (i.e., the device identifier of the electronic device 200), where the device identifier 1 is used to indicate that the message 2 is for the electronic device 200, and the message 2 is used to indicate that the peripheral device 300 may assist the electronic device 200 in transmitting the message.
In step S107, based on the device identifier 1 in the message 2 and the device identifier 1 in the message 1, the encrypted authentication information C2 of the offline instruction corresponding to the device identifier 1 (i.e., the device identifier of the electronic device 200) is acquired, and the encrypted authentication information C3 is acquired based on the encrypted authentication information C2 of the offline instruction.
In step S108, the message 3 includes the device identification 1 of the lost device and the encrypted authentication information C3. Device identification 1 is used to indicate that the offline instruction indicated by message 3 is for electronic device 200.
In step S109, the peripheral device 300 transmits the message 3 to the electronic device 200 through the short-range communication module based on the device identification 1 in the message 3.
In step S111, the message 4 includes the device identifier 2 of the lookup device (i.e., the device identifier of the electronic device 100), where the device identifier 2 is used to indicate that the acknowledgement message indicated by the message 4 is sent to the electronic device 100.
In step S113, the cloud server 400 transmits a message 5 to the electronic device 100 based on the device identification 2 in the message 4.
For specific embodiments, reference may be made to the related descriptions of the offline device control method shown in fig. 8A and 8B, which are not repeated here.
The software structure of the electronic device 100 is described below, and the software structures of the electronic device 100 and the peripheral device 200 may refer to the software structure of the electronic device 100, which will not be described in detail later.
For example, the software system of the electronic device 100 may employ a layered architecture, an event driven architecture, a micro-core architecture, a micro-service architecture, or a cloud architecture. In the embodiment of the application, taking an Android system with a layered architecture as an example, a software structure of the electronic device 100 is illustrated. Fig. 9A is a software configuration block diagram of the electronic device 100 according to the embodiment of the present application.
The layered architecture divides the software into several layers, each with distinct roles and branches. The layers communicate with each other through a software interface. In some embodiments, the Android system is divided into four layers, from top to bottom, an application layer, an application framework layer, an Zhuoyun row (Android run) and system libraries, and a kernel layer, respectively.
The application layer may include a series of application packages. As shown in fig. 9A, the application package may include applications for cameras, gallery, calendar, talk, map, navigation, WLAN, bluetooth, music, video, short message, etc.
The application framework layer provides an application programming interface (application programming interface, API) and programming framework for application programs of the application layer. The application framework layer includes a number of predefined functions. As shown in fig. 9A, the application framework layer may include a window manager, a content provider, a view system, a phone manager, a resource manager, a notification manager, and the like.
The window manager is used for managing window programs. The window manager can acquire the size of the display screen, judge whether a status bar exists, lock the screen, intercept the screen and the like.
The content provider is used to store and retrieve data and make such data accessible to applications. The data may include video, images, audio, calls made and received, browsing history and bookmarks, phonebooks, etc.
The view system includes visual controls, such as controls to display text, controls to display pictures, and the like. The view system may be used to build applications. The display interface may be composed of one or more views. For example, a display interface including a text message notification icon may include a view displaying text and a view displaying a picture.
The telephony manager is used to provide the communication functions of the electronic device 100. Such as the management of call status (including on, hung-up, etc.).
The resource manager provides various resources for the application program, such as localization strings, icons, pictures, layout files, video files, and the like.
The notification manager allows the application to display notification information in a status bar, can be used to communicate notification type messages, can automatically disappear after a short dwell, and does not require user interaction. Such as notification manager is used to inform that the download is complete, message alerts, etc. The notification manager may also be a notification in the form of a chart or scroll bar text that appears on the system top status bar, such as a notification of a background running application, or a notification that appears on the screen in the form of a dialog window. For example, a text message is prompted in a status bar, a prompt tone is emitted, the terminal vibrates, and an indicator light blinks.
Android run time includes a core library and virtual machines. Android run time is responsible for scheduling and management of the Android system.
The core library consists of two parts: one part is a function which needs to be called by java language, and the other part is a core library of android.
The application layer and the application framework layer run in a virtual machine. The virtual machine executes java files of the application program layer and the application program framework layer as binary files. The virtual machine is used for executing the functions of object life cycle management, stack management, thread management, security and exception management, garbage collection and the like.
The system library may include a plurality of functional modules. For example: surface manager (surface manager), media Libraries (Media Libraries), three-dimensional graphics processing Libraries (e.g., openGL ES), 2D graphics engines (e.g., SGL), etc.
The surface manager is used to manage the display subsystem and provides a fusion of 2D and 3D layers for multiple applications.
Media libraries support a variety of commonly used audio, video format playback and recording, still image files, and the like. The media library may support a variety of audio and video encoding formats, such as MPEG4, h.264, MP3, AAC, AMR, JPG, PNG, etc.
The three-dimensional graphic processing library is used for realizing three-dimensional graphic drawing, image rendering, synthesis, layer processing and the like.
The 2D graphics engine is a drawing engine for 2D drawing.
The kernel layer is a layer between hardware and software. The inner core layer at least comprises a display driver, a camera driver, an audio driver and a sensor driver.
The offline control system provided by the embodiment of the application is described below.
Fig. 9B illustrates an offline control system according to an embodiment of the present application, where, as shown in fig. 9B, the offline control system includes an electronic device 100, an electronic device 200, a peripheral device 300, and a cloud server 400.
The application program layers of the electronic device 100, the electronic device 200, and the peripheral device 300 all include a search device APP, the application program framework layer includes an end-side search network service, and the system module includes a network module and a near field communication module (e.g., BLE communication module). In one implementation, the electronic device 200 and the peripheral device 300 are provided with an end-side search network service, and the electronic device 200 and the peripheral device 300 may not be provided with the search device APP; the electronic device 200 and the peripheral device 300 communicate with the cloud server 400 through the end-side search web service. Cloud server 400 includes cloud-side lookup web services.
The searching device APP is used for receiving input operation of a user so as to realize pairing and binding of searching network services among devices, triggering the device APP to inquire the offline position of the lost device and triggering the device APP to issue an offline instruction for controlling the lost device; the offline instructions are to instruct the lost device to perform one or more of: data erasure, data encryption, data backup, playing sound, setting a lost mode, etc.
The terminal side searching network service is used for providing services such as pairing binding of searching network, encryption and decryption of offline instructions and offline positions, assistance of offline equipment to report messages, storage of offline instructions issued by a cloud, forwarding of offline instructions of the cloud to lost equipment and the like.
The network module may be a network module corresponding to the foregoing communication network 500, and is responsible for providing a network connection service to implement communication between the present device and the cloud server 400.
And the near field communication module (for example, a BLE communication module) is used for providing low-power-consumption off-line broadcasting, scanning off-line broadcasting, general attribute profile (Generic Attribute Profile, GATT) connection and other services, and GATT is a service interface protocol of BLE.
The cloud side searches network service for realizing the services of encrypting and decrypting the offline instruction, storing the offline instruction, issuing the offline instruction, storing the position ciphertext, issuing the position ciphertext, inquiring the offline position and the like.
An offline control method according to an embodiment of the present application is exemplarily described based on the offline control system shown in fig. 9B.
(1) After the electronic device 100 and the electronic device 200 establish communication connection through the BLE communication module, the search device APP of the electronic device 100 invokes a terminal side search network service to trigger a pairing procedure with the electronic device 200. The pairing process includes that the network module is invoked by the network service of the electronic device 100 to send a pairing request to the cloud server 400, where the pairing request is used to request to establish a binding relationship with the electronic device 200 for searching for the network service.
In some implementations, the pairing process further includes: the electronic device 100 and the electronic device 200 generate the same key K1 based on a preset algorithm, the electronic device 100 and the cloud server 400 generate the same key O1 based on a preset algorithm, and the electronic device 200 and the cloud server 400 generate the same key K2 based on a preset algorithm.
(2) The search device APP of the electronic device 100 receives an input operation 1 of a user; in response to the input operation 1, the above-mentioned search device APP generates an offline instruction for the offline electronic device 200; the searching equipment APP calls the end-side searching network service to report the offline instruction to the cloud server 400 through the network module. After receiving the offline instruction, the cloud-side search network service of the cloud server 400 stores the offline instruction.
In some implementations, the end-side lookup network service of the electronic device 100 is further configured to encrypt the offline instruction through the key K1 and the key O1, and invoke the network module to report the encrypted offline instruction to the cloud server 400.
(3) When the end-side network searching service of the electronic device 200 determines that the electronic device 200 is offline, the BLE communication module is invoked to broadcast offline broadcast 1. When the peripheral device 300 is on line, the network service is searched at the end side of the peripheral device 300 to call the BLE communication module to scan the offline broadcast of other devices based on a preset scanning strategy, and scan to the offline broadcast 1.
(4) The BLE communication module of the peripheral device 300 reports the offline broadcast 1 to the end-side lookup network service of the device, and the end-side lookup network service invokes the network module of the device to send an assistance indication message (i.e. the foregoing message 2) to the cloud server 400, where the assistance indication message is used to indicate that the peripheral device 300 can assist the electronic device 200 in transmitting data.
(5) After receiving the assistance indication message, the cloud-side search network service of the cloud server 400 issues the offline instruction to the peripheral device 300.
In some implementations, the cloud-side search network service of the cloud server 400 is further configured to decrypt the offline instruction reported by the electronic device 100 through the key O1, and encrypt the offline instruction with the key K2; and then issues an offline instruction encrypted by the key K1 and the key K2 to the peripheral device 300.
(6) The network module of the peripheral device 300 receives the offline instruction, searches the network service from the end side of the peripheral device 300, and sends the offline instruction; the end-side lookup network service invokes the BLE communication module of the peripheral device 300 to send the offline instruction to the electronic device 200.
(7) After receiving the offline instruction, the BLE communication module of the electronic device 200 searches for a network service from the end side of the electronic device 200 and sends the offline instruction; the terminal side searching network service sends the offline instruction to the searching device APP of the electronic device 200; the search device APP executes the above-mentioned offline instruction.
In some implementations, the end-side lookup network service of the electronic device 200 is further configured to decrypt the offline instruction sent by the peripheral device 300 through the key K2 and the key K1, so as to obtain the decrypted original offline instruction.
In the embodiment of the present application, the first electronic device may be the electronic device 100, the second electronic device may be the electronic device 200, the third electronic device may be the electronic device 300, and the server may be the cloud server 400. The first identification may be a networking identification of the aforementioned electronic device 200.
The first message may be the foregoing message 1, the first offline message may be the foregoing offline broadcast 1, the second offline message may be the foregoing offline broadcast 2, the first instruction may be the foregoing offline instruction, the second message may be the foregoing message 2, the third message may be the foregoing message 3, the fourth and fifth messages may be the foregoing message 4, and the sixth message may be the foregoing message 5.
The first input operation may be the foregoing input operation 1, and the first function control may be the function control shown in fig. 6A, for example, the lost mode control 407, the play sound control 408, and the data protection control 409. The first account number may be the aforementioned account number 1.
Illustratively, the first function control is a loss mode control 407, the first instruction is used to set a loss mode, the first prompt may be a prompt 416 shown in fig. 6D, and the second prompt may be a prompt 417 shown in fig. 6E.
For example, the first function control is a data protection control 409, the first instruction is used to implement data erasure, the first hint information may be hint information 513 shown in fig. 7C, the second hint information may be hint information 514 shown in fig. 7D, and the third hint information may be hint information 515 shown in fig. 7E.
For example, the first function control is a data protection control 409, the first instruction is used to implement data encryption, the first prompt information may be the prompt information 518 shown in fig. 7I, the second prompt information may be the prompt information 519 shown in fig. 7J, and the third prompt information may be the prompt information 520 shown in fig. 7K; the first option may be all options 505, or at least one of options 506 to 509; the validation control may be a validation control 511.
The first key may be the aforementioned key K1, the second key may be the aforementioned key K2, and the third key may be the aforementioned key O1. The first ciphertext may be the encryption authentication information C1, the second ciphertext may be the encryption authentication information C2, and the third ciphertext may be the encryption authentication information C3. The fourth ciphertext may be, for example, the validation ciphertext described above. Illustratively, the fourth ciphertext may be the confirmation ciphertext D2, and the fifth ciphertext may be the confirmation ciphertext D3.
The fourth key may be the public key P, and the indication information of the derivative public key may be the derivative public key itself or a Hash value of the derivative public key. For example, the first indication information may be the aforementioned indication information 1 (e.g., derivative public key Pi or Hash value 1), and the second indication information may be the aforementioned indication information 2 (e.g., derivative public key Pi or Hash value 2).
The embodiments of the present application may be arbitrarily combined to achieve different technical effects.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions in accordance with the present application are produced in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital subscriber line), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a DVD), or a semiconductor medium (e.g., a Solid State Disk (SSD)), or the like.
Those of ordinary skill in the art will appreciate that implementing all or part of the above-described method embodiments may be accomplished by a computer program to instruct related hardware, the program may be stored in a computer readable storage medium, and the program may include the above-described method embodiments when executed. And the aforementioned storage medium includes: ROM or random access memory RAM, magnetic or optical disk, etc.
In summary, the foregoing description is only exemplary embodiments of the present invention and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, improvement, etc. made according to the disclosure of the present invention should be included in the protection scope of the present invention.

Claims (39)

1. The off-line equipment control method is characterized by being applied to an off-line equipment control system, wherein the system comprises a second electronic equipment, a third electronic equipment and a server, and the second electronic equipment is in an off-line state; the method comprises the following steps:
the method comprises the steps that a server obtains a first message, wherein the first message is used for indicating the second electronic equipment to execute a first instruction;
the second electronic equipment broadcasts a first offline message through the near field communication module;
The third electronic device obtains the first offline message;
in response to the first offline message, the third electronic device sends a second message to the server;
after receiving the second message, the server sends a third message to the third electronic device, where the third message is used to instruct the second electronic device to execute the first instruction;
the third electronic device sends the third message to the second electronic device;
the second electronic device executes the first instruction based on the third message.
2. The method of claim 1, wherein the system further comprises a first electronic device, and wherein the server, prior to obtaining the first message, further comprises:
the first electronic equipment receives a first input operation of a user;
in response to the first input operation, the first electronic device sends a first message to the server.
3. The method of claim 2, wherein prior to the first electronic device receiving a first input operation by a user, the method further comprises:
the first electronic device displays a first interface of a first application, wherein the first interface comprises a first functional control, and the first functional control is used for triggering the first electronic device to generate the first instruction for controlling the second electronic device;
The first electronic device receives a first input operation of a user, including:
the first electronic device receives a first input operation of a user for the first functionality control, the first input operation including one or more operations.
4. The method of claim 3, wherein the first interface further comprises a first identification of the second electronic device, the first identification indicating that the second electronic device is currently in an offline state.
5. The method of claim 1, wherein the second message is used to indicate that the third electronic device can assist the offline second electronic device in transmitting a message.
6. The method of claim 1 or 5, wherein the second message is used to indicate an offline position of the second electronic device acquired by the third electronic device.
7. The method according to claim 1, wherein the method further comprises:
after the second electronic equipment executes the first instruction, a fourth message is sent through the close range communication module, wherein the fourth message is used for indicating that the second electronic equipment has executed the first instruction;
The third electronic device receives the fourth message;
the third electronic device sends the fifth message to the server, wherein the fifth message is used for indicating that the second electronic device has executed the first instruction;
the server sends a sixth message to the first electronic device, the sixth message indicating that the second electronic device has executed the first instruction.
8. A method according to claim 3, characterized in that the method further comprises:
and responding to the first input operation, the first electronic equipment displays first prompt information, wherein the first prompt information is used for prompting the second electronic equipment which is indicating offline to execute the first instruction.
9. A method according to claim 3, characterized in that the method further comprises:
after the first electronic equipment receives the sixth message, second prompt information is displayed based on the sixth message;
the second prompt message is used for prompting the second electronic device to execute the first instruction.
10. The method of claim 1, wherein the first instruction is to implement one or more of: data erasure, data encryption, data backup, screen locking, displaying preset screen locking information and playing preset audio.
11. A method according to claim 3, wherein the first input operation comprises a second input operation, a third input operation and a fourth input operation;
the first electronic device receives a first input operation of a user, including:
the first electronic device receives the second input operation acting on the first functional control;
in response to the second input operation, the first electronic device displays a confirmation control and at least two file type options, the at least two file type options including a first option;
the first electronic device receiving the third input operation acting on the first option;
the first electronic device receives the fourth input operation acting on the confirmation control;
the first instruction is used for realizing one or more of data protection operations such as data erasure, data encryption, data backup and the like, the first instruction also comprises a file type aimed at by the data protection operation, and the file type aimed at by the data protection operation comprises a file type corresponding to the first option.
12. The method of claim 10 or 11, wherein the first instruction is configured to perform one or more of data protection operations such as data erasure, data encryption, data backup, and the like,
After the second electronic device executes the first instruction based on the third message, the method further includes:
the second electronic device displays third prompt information, and the third prompt information is used for prompting that the second electronic device has executed the first instruction.
13. The method of claim 1, wherein the third electronic device sending the third message to the second electronic device comprises:
and after the third electronic equipment receives the third message, when the second offline message broadcast by the second electronic equipment is scanned, the third message is sent to the second electronic equipment through the close range communication module.
14. The method of claim 2, wherein before the first electronic device receives the first input operation of the user, further comprising:
the first electronic equipment logs in a first account of a first application; the second electronic device logs in the first account of the first application;
the first electronic device and the second electronic device establish a binding relationship based on the first account of the first application.
15. The method according to any of claims 2 to 14, wherein the first electronic device and the second electronic device hold a first key for mutually authenticating identities of the first electronic device and the second electronic device; the second electronic equipment and the server hold a second key, and the second key is used for mutually authenticating identities of the second electronic equipment and the server; the first electronic device and the server hold a third key, and the third key is used for mutually authenticating identities of the first electronic device and the server;
The first message comprises a second ciphertext, and the second ciphertext is generated by the first electronic device after encrypting the first instruction by using the first key and the third key in sequence;
the third message comprises a third ciphertext, and the third ciphertext is generated by the server after decrypting the second ciphertext by using the third key and then encrypting by using the second key;
the first instruction is obtained after the second electronic device decrypts the third ciphertext by using the second key and the first key.
16. The method of claim 15, wherein the step of determining the position of the probe is performed,
the fourth message and the fifth message comprise a fourth ciphertext of a confirmation message, the fourth ciphertext is generated after the second electronic device encrypts the confirmation message by using the second key, and the confirmation message is used for indicating that the second electronic device has executed the first instruction;
the sixth message includes the confirmation message, which is obtained after the server decrypts the fourth ciphertext using the second key.
17. The method of claim 15, wherein the step of determining the position of the probe is performed,
The fourth message and the fifth message comprise a fourth ciphertext of a confirmation message, the fourth ciphertext is generated by the second electronic device after sequentially encrypting the confirmation message by using the first key and the second key, and the confirmation message is used for indicating that the second electronic device has executed the first instruction;
the sixth message comprises a fifth ciphertext of the confirmation message, wherein the fifth ciphertext is generated by the server after decrypting the fourth ciphertext by using the second key and encrypting by using the third key;
the method further comprises the steps of:
and after the first electronic equipment receives the sixth message sent by the server, decrypting the fifth ciphertext by using the third key and the first key in sequence to obtain the confirmation message.
18. The method of claim 15, wherein the first electronic device and the second electronic device establish a binding relationship prior to the receiving the first input operation by the user, the first key, the second key, and the third key being generated during the binding of the first electronic device and the second electronic device; the server stores a first correspondence between a second device identifier of the second electronic device and the second key, and a second correspondence between a first device identifier of the first electronic device and the third key.
19. The method of claim 18, wherein a fourth key is also generated during the binding of the first electronic device and the second electronic device, the first electronic device and the second electronic device each holding the fourth key;
the first message further includes first indication information of a derivative key of the fourth key and a second device identification of the second electronic device; after the server receives the first message, the server stores a third corresponding relation of the second ciphertext, the first indication information and the second equipment identifier based on the first message;
the first offline message further includes a derivative of the fourth key;
the second message further includes second indication information of a derivative key of the fourth key;
before the server sends the third message to the third electronic device, the method further includes:
the server matches the first indication information with the second indication information; and when the first indication information and the second indication information are successfully matched, the server generates the third ciphertext based on the second ciphertext corresponding to the first indication information.
20. The method of claim 19, wherein the server generating the third ciphertext based on the second ciphertext corresponding to the first indication information comprises:
determining the equipment identifier of the target equipment corresponding to the first indication information as the second equipment identifier of the second electronic equipment based on a third corresponding relation; determining the third key for authenticating the identity of the first electronic device based on the first correspondence, and determining the second key for authenticating the identity of the second electronic device based on the second correspondence;
the server decrypts the second ciphertext by using the third key to obtain a decrypted first ciphertext; and encrypting the first ciphertext by using the second key to obtain the encrypted third ciphertext.
21. The method of claim 19, wherein the third message further comprises the first indication of a derivative of the fourth key; after the third electronic device receives the third message, the method further includes:
the third electronic device scans a second offline message broadcast by the second electronic device, wherein the second offline message comprises a derivative key of the fourth key;
The third electronic device sending the third message to the second electronic device, including:
and if the indication information of the derivative key of the fourth key in the second offline message is successfully matched with the first indication information, the third electronic device sends the third message to the second electronic device through a short-range communication module.
22. An offline device control method applied to a server, comprising the following steps:
the server acquires a first message, wherein the first message is used for indicating a second electronic device to execute a first instruction;
the server receives a second message sent by the third electronic device, wherein the second message is sent after the third electronic device scans a first offline message broadcasted by the second electronic device through a close range communication module, and the first offline message is broadcasted when the second electronic device is in an offline state;
after receiving the second message, the server sends the third message to the offline second electronic device through the third electronic device, where the third message is used to instruct the second electronic device to execute the first instruction.
23. The method of claim 22, wherein the server obtaining the first message comprises:
the server receives a first message sent by the first electronic device.
24. The method of claim 22, wherein the second message is used to indicate that the third electronic device can assist the offline second electronic device in transmitting a message.
25. The method of claim 22 or 24, wherein the second message is used to indicate an offline position of the second electronic device acquired by the third electronic device.
26. The method of claim 22, wherein the first instruction is to implement one or more of: data erasure, data encryption, data backup, screen locking, displaying preset screen locking information and playing preset audio.
27. The method of claim 26, wherein the first instruction, when used to implement one or more of a data protection operation such as data erasure, data encryption, data backup, etc., includes a file type for which the data protection operation is intended.
28. The method of claim 23, wherein before the server obtains the first message, further comprising:
The server receives a binding request of the first electronic device and/or the second electronic device, wherein the binding request is used for requesting to establish a binding relationship for the first electronic device and the second electronic device based on the first account of the first application, and the first electronic device and the second electronic device are both logged in to the first account.
29. An offline device control method applied to a second electronic device in an offline state, the method comprising:
when the second electronic equipment is in an offline state, broadcasting a first offline message through a close range communication module;
the second electronic equipment receives the third message sent by the server through a third electronic equipment which is online nearby; the third message is sent after the server acquires a first message and a second message of the third electronic device, the second message is sent after the third electronic device receives the first offline message, and the first message and the third message are used for indicating the second electronic device to execute the first instruction;
the second electronic device executes the first instruction based on the third message.
30. The method of claim 29, wherein the first message is sent by a first electronic device to the server.
31. The method of claim 29, wherein the second message is used to indicate that the third electronic device can assist the offline second electronic device in transmitting a message.
32. The method of claim 29 or 31, wherein the second message is used to indicate an offline position of the second electronic device acquired by the third electronic device.
33. The method of claim 29, further comprising:
and after the second electronic equipment executes the first instruction, a seventh message is sent to the server through the third electronic equipment, wherein the seventh message is used for indicating that the second electronic equipment has executed the first instruction.
34. The method of claim 29, wherein the first instruction is to implement one or more of: data erasure, data encryption, data backup, screen locking, displaying preset screen locking information and playing preset audio.
35. The method of claim 34, wherein the first instruction, when used to implement one or more of a data protection operation such as data erasure, data encryption, data backup, etc., includes a file type for which the data protection operation is intended.
36. The method of claim 29 or 35, wherein the first instruction is configured to perform one or more of a data protection operation such as data erasure, data encryption, data backup, etc.,
after the second electronic device executes the first instruction based on the third message, the method further includes:
the second electronic device displays third prompt information, and the third prompt information is used for prompting that the second electronic device has executed the first instruction.
37. The method of claim 30, wherein before broadcasting the first offline message via the near field communication module, further comprising:
the second electronic device logs in the first account of the first application;
and the second electronic equipment and the first electronic equipment establish a binding relation based on the first account number of the first application.
38. An electronic device comprising a memory and a processor, the memory and the processor being electrically coupled, the memory for storing program instructions, the processor being configured to invoke all or a portion of the program instructions stored in the memory to perform the method of any of claims 1-21, claims 22-29, or claims 29-37.
39. A computer storage medium comprising computer instructions which, when run on an electronic device, cause the electronic device to perform the method of any one of claims 1-21, claims 22-29, or claims 29-37.
CN202210618803.8A 2022-03-11 2022-06-01 Offline equipment control method and related device Pending CN116782186A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2023/080697 WO2023169545A1 (en) 2022-03-11 2023-03-10 Offline device control method and related apparatus

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2022102385639 2022-03-11
CN202210238563 2022-03-11

Publications (1)

Publication Number Publication Date
CN116782186A true CN116782186A (en) 2023-09-19

Family

ID=88008702

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210618803.8A Pending CN116782186A (en) 2022-03-11 2022-06-01 Offline equipment control method and related device

Country Status (1)

Country Link
CN (1) CN116782186A (en)

Similar Documents

Publication Publication Date Title
CN111466099B (en) Login method, token sending method, device and storage medium
WO2021121125A1 (en) Control method for smart home devices and medium and terminal thereof
US10275581B2 (en) Method and apparatus for sharing content between electronic devices
CN113609498B (en) Data protection method and electronic equipment
WO2021135593A1 (en) Device sharing method and electronic device
CN113408016B (en) Method and device for storing ciphertext
WO2022179443A1 (en) Nfc method and system, and electronic device
CN115080941B (en) Account login method and electronic equipment
CN114553814A (en) Method and device for processing push message
CN113965789B (en) Screen projection method, terminal and communication system
WO2022111469A1 (en) File sharing method and apparatus, and electronic device
CN116484431A (en) Data protection method, electronic equipment and storage medium
CN113468606A (en) Application program access method and electronic equipment
CN113645024B (en) Key distribution method, system, device and readable storage medium and chip
CN116782186A (en) Offline equipment control method and related device
WO2023169545A1 (en) Offline device control method and related apparatus
CN116956311A (en) Asynchronous authorization method, system, electronic device and computer readable storage medium
CN114692119A (en) Method for verifying application and electronic equipment
CN112966297A (en) Data protection method, system, medium and electronic device
CN115001667B (en) Key agreement method, system, electronic device and computer readable storage medium
WO2023071733A1 (en) Device control method and related device
CN116049826B (en) TPM-based data protection method, electronic equipment and storage medium
CN115550415B (en) Device connection method and electronic device
CN117376906A (en) Communication method, communication system and electronic equipment
CN118102295A (en) Communication method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination