CN109716854B - Connection establishing method, device, system and medium - Google Patents
Connection establishing method, device, system and medium Download PDFInfo
- Publication number
- CN109716854B CN109716854B CN201780056634.0A CN201780056634A CN109716854B CN 109716854 B CN109716854 B CN 109716854B CN 201780056634 A CN201780056634 A CN 201780056634A CN 109716854 B CN109716854 B CN 109716854B
- Authority
- CN
- China
- Prior art keywords
- attribute data
- equipment
- connection
- user
- identification code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/14—Direct-mode setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/11—Allocation or use of connection identifiers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/15—Setup of multiple wireless link connections
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application provides a connection establishing method and equipment, relates to the technical field of communication, and aims to solve the problem that in the prior art, the usability is low due to the fact that the wearable equipment has few functions. The embodiment of the application provides a connection establishing method, which comprises the following steps: the first device acquires attribute data of the third device and transmits the attribute data to the second device. And the second equipment receives the attribute data sent by the first equipment and establishes connection with the third equipment according to the attribute data. Wherein the second device comprises a wearable device. The application is applied to the use process of the wearable device.
Description
Technical Field
The present application relates to the field of communications technologies, and in particular, to a connection establishment method and device.
Background
Currently, with the development of communication technology, wearable devices (wearable devices) are in endlessly. A wearable device refers to a portable device that can be worn directly on a user or integrated into the user's clothing or accessories. Common wearable equipment includes intelligent wrist-watch, bracelet, intelligent glasses etc..
The wearable device is not only a hardware device, but also can realize specific functions through software support, data interaction and cloud interaction. However, the existing wearable device is limited by the reasons of cost, product form and the like, so that the number of hardware components which can be carried by the wearable device is small, the function of the wearable device is limited, and the usability of the wearable device is low. If the functions of the wearable device are increased by adding hardware, the cost of the wearable device is increased, and the hardware layout of the wearable device needs to be changed, which is complicated to implement.
Disclosure of Invention
Embodiments of the present application provide a connection establishment method and device, so as to solve the problem of low usability caused by fewer functions of a wearable device in the prior art.
In a first aspect, a method for establishing a connection is provided, where the method includes: the first device acquires attribute data of the third device and transmits the attribute data to the second device. And the second equipment receives the attribute data sent by the first equipment and establishes connection with the third equipment according to the attribute data. Wherein the second device comprises a wearable device.
In the method, the first device acquires the attribute data of the third device and sends the attribute data to the second device, so that the second device can establish connection with the third device according to the attribute data. In this way, when a second device, being a wearable device, is unable to obtain attribute data of a third device due to lack of hardware support, the second device is able to obtain attribute data of the third device and establish a connection with the third device according to the attribute data "by means of" the first device.
In a second aspect, a method for establishing a connection is provided, the method including: the first device and the second device establish connection, and the first device acquires attribute data of the third device. The first device sends the attribute data of the third device to a second device connected with the first device, so that the second device establishes connection with the third device according to the attribute data of the third device. Wherein the second device comprises a wearable device.
In the method, the first device acquires the attribute data of the third device and sends the attribute data to the second device, so that the second device can establish connection with the third device according to the attribute data. In this way, when a second device, being a wearable device, is unable to obtain attribute data of a third device due to lack of hardware support, the second device is able to obtain attribute data of the third device and establish a connection with the third device according to the attribute data "by means of" the first device.
Optionally, in an implementation manner of the second aspect, the acquiring, by the first device, the attribute data of the third device includes: the first device receives indication signaling of the second device, wherein the indication signaling is used for indicating that the first device enables the target function. And the first equipment acquires the attribute data of the third equipment through the target function according to the indication signaling of the second equipment.
In the foregoing implementation manner, the second device sends the indication signaling to the first device, triggers the first device to enable the target function after receiving the indication signaling, and obtains the attribute data of the third device through the target function. Optionally, in another implementation manner of the second aspect, the acquiring, by the first device, attribute data of a third device includes: the first device receives an indication operation input by a user, wherein the indication operation is used for indicating that the first device enables a target function; and the first equipment acquires the attribute data of the third equipment according to the indication operation.
In the implementation manner, the user operates the first device, the first device is triggered to acquire the attribute data of the third device according to the user operation enabling target function, and after the first device acquires the attribute data of the third device, the first device sends the attribute data of the third device to the first device.
The target functions in the two implementations are functions that the first device has but the second device does not have. For example: a function of scanning the two-dimensional code, a function of establishing NFC connection with other devices, and the like. For example: the method for acquiring the attribute data of the third device by the first device comprises the following steps: the first device enables a photographing function. The first device scans an information identification code of the third device through the shooting function, wherein the information identification code carries attribute data of the third device. And then, the first equipment analyzes the information identification code to obtain attribute data of the third equipment.
For another example: the method for acquiring the attribute data of the third device by the first device comprises the following steps: the first device establishes a Near Field Communication (NFC) connection with the third device, and the first device acquires attribute data of the third device through the established NFC connection.
In a third aspect, a method for device connection is provided, the method comprising: the second device establishes a connection with the first device. And the second equipment receives the attribute data of the third equipment sent by the first equipment. The second device establishes a connection with the third device according to the attribute data of the third device.
Optionally, in an implementation manner of the third aspect, before the second device receives the attribute data of the third device sent by the first device, the method further includes: and the second equipment sends indication signaling to the first equipment, wherein the indication signaling is used for indicating the first equipment to enable the target function.
In the method, after the second device establishes connection with the first device, the second device receives attribute data of the third device sent by the first device, and establishes connection with the third device according to the attribute data of the third device. In this way, when a second device, being a wearable device, is unable to obtain attribute data of a third device due to lack of hardware support, the second device is able to obtain attribute data of the third device and establish a connection with the third device according to the attribute data "by means of" the first device.
In a fourth aspect, there is provided an identity verification method, the method comprising: the first device receives first biometric information input by a user. The first device sends first data to the second device according to the first biological characteristic information. And the second equipment executes preset operation according to the first data.
Optionally, after the first device receives the first biometric information, one implementation manner is that the first device performs authentication on the user according to the first biometric information, and sends an authentication result to the second device in the form of first data, and then the second device executes corresponding operation according to the first data after receiving the first data. The other implementation manner is that the first device sends the first biological characteristic information to the second device, the second device performs identity verification on the user according to the first biological characteristic information, and corresponding operation is executed according to an identity verification result.
In the method, the second device can receive the biometric information input by the user "by means of" the first device, and then the first device or the second device authenticates the user according to the biometric information, and performs corresponding operations according to the authentication result. In this way, the second device, being a wearable device, can "authenticate" the user with the biometric feature by means of the first device, even if it does not support biometric identification techniques such as fingerprint identification, iris identification, etc.
In a fifth aspect, there is provided an identity verification method, comprising: the first device and the second device establish a connection. The first device receives first biometric information input by a user. The first device sends first data to a second device connected with the first device according to the first biological characteristic information.
In the method, the second device can receive the biological characteristic information input by the user by means of the first device, and then the first device or the second device authenticates the user according to the biological characteristic information and executes corresponding operation according to the authentication result. In this way, the second device, being a wearable device, can "authenticate" the user with the biometric feature by means of the first device, even if it does not support biometric identification techniques such as fingerprint identification, iris identification, etc.
Optionally, in an implementation manner of the fifth aspect, before the first device receives the first biometric information input by the user, the method further includes: and the first equipment receives and stores the second biological characteristic information input by the user. Correspondingly, the sending, by the first device, the first data to the second device connected to the first device according to the first biometric information includes: and the first equipment carries out identity verification on the user according to the first biological characteristic information and the second biological characteristic information, and determines the access authority level of the user. Further, the first device transmits first data to the second device, the first data being indicative of the access permission level of the user.
In this implementation, the first device prestores the second biometric characteristic information entered by the user. And comparing the first biological identification characteristic information with the second biological identification characteristic information by taking the second biological identification characteristic information as reference after the first equipment receives the first biological identification characteristic information input by the user, and further carrying out identity verification on the user to obtain the access authority level of the user. And then, the first equipment sends the access authority level of the user to the second equipment, so that the second equipment executes corresponding operation according to the access authority level of the user.
Optionally, in an implementation manner of the fifth aspect, before the first device receives the first biometric information input by the user, the method further includes: the first device receives second biometric information input by the user. The first device sends the second biometric information to the second device to facilitate the second device to save the second biometric information. Correspondingly, the sending, by the first device, the first data to the second device according to the first biometric information includes: the first device sends the first biometric information to the second device.
In this implementation, the first device enters the second biometric information input by the user in advance and sends the second biometric information to the second device for saving by the second device. In this way, after the first device receives the first biometric information input by the user, the first device sends the first biometric information to the second device, the second device performs identity verification on the user according to the second biometric information and the first biometric information which are pre-stored, and corresponding operation is performed according to an identity verification result.
In a sixth aspect, there is provided an identity verification method, comprising: the second device establishes a connection with the first device. The second device receives the first data sent by the first device. And the second equipment executes preset operation according to the first data.
In the method, the second device can receive the biological characteristic information input by the user by means of the first device, and then the first device or the second device authenticates the user according to the biological characteristic information and executes corresponding operation according to the authentication result. In this way, the second device, being a wearable device, can "authenticate" the user with the biometric feature by means of the first device, even if it does not support biometric identification techniques such as fingerprint identification, iris identification, etc.
Optionally, in an implementation manner of the sixth aspect, the receiving, by the second device, first data sent by the first device and executing a preset operation according to the first data includes: and the second equipment receives first data sent by the first equipment, wherein the first data is used for representing the access authority level of the user. And the second equipment executes preset operation corresponding to the access authority level according to the access authority level of the user.
Optionally, in an implementation manner of the sixth aspect, before the second device receives the first data sent by the first device, the method further includes: and the second equipment receives the second biological characteristic information sent by the first equipment and stores the second biological characteristic information. Correspondingly, the second device receives the first data sent by the first device and executes preset operation according to the first data, including: the second equipment receives the first biological characteristic information sent by the first equipment. And the second equipment carries out identity verification on the user according to the first biological characteristic information and the second biological characteristic information, and when the identity verification is successful, the second equipment executes preset operation.
In a seventh aspect, an apparatus is provided, which includes as a first apparatus: a connection unit for establishing a connection with a second device, the second device comprising a wearable device. An acquisition unit configured to acquire attribute data of the third device. A sending unit, configured to send the attribute data of the third device to the second device, so that the second device establishes a connection with the third device according to the attribute data of the third device.
In an implementation manner of the seventh aspect, the obtaining unit is specifically configured to receive an indication signaling of the second device, where the indication signaling is used to indicate that the first device enables a target function; and acquiring attribute data of the third equipment through the target function according to the indication signaling of the second equipment.
In an implementation manner of the seventh aspect, the obtaining unit is specifically configured to receive an instruction operation input by a user, where the instruction operation is used to instruct the first device to enable a target function; and acquiring attribute data of the third equipment according to the indication operation.
Optionally, in an implementation manner of the seventh aspect, the obtaining unit is configured to enable a shooting function of the first device; scanning an information identification code of the third device through the shooting function, wherein the information identification code carries attribute data of the third device; and analyzing the information identification code to obtain attribute data of the third equipment.
Optionally, in an implementation manner of the seventh aspect, the obtaining unit is configured to establish an NFC connection with the third device through the connecting unit; and acquiring attribute data of the third device through the established NFC connection.
In an eighth aspect, there is provided an apparatus comprising, as a second apparatus: a connection unit for establishing a connection with a first device. And the receiving unit is used for receiving the attribute data of the third equipment sent by the first equipment. The connection unit is further configured to establish a connection with the third device according to the attribute data of the third device received by the receiving unit.
Optionally, in an implementation manner of the eighth aspect, the apparatus further includes: a sending unit, configured to send an indication signaling to the first device, where the indication signaling is used to indicate that the first device enables a target function.
In a ninth aspect, there is provided an apparatus comprising, as a first apparatus: a connection unit for establishing a connection with a second device. The receiving unit is used for receiving first biological characteristic information input by a user. A sending unit, configured to send first data to the second device connected to the first device according to the first biometric information.
Optionally, in an implementation manner of the ninth aspect, the receiving unit is further configured to receive and store second biometric information input by the user. The sending unit is further configured to authenticate a user according to the first biometric information and the second biometric information, and determine an access permission level of the user; and sending first data to the second equipment, wherein the first data is used for representing the access authority level of the user.
Optionally, in an implementation manner of the ninth aspect, the receiving unit is further configured to receive second biometric information input by a user; the sending unit is further configured to send the second biometric information to the second device so that the second device saves the second biometric information; the sending unit is further configured to send the first biometric information to the second device.
In a tenth aspect, there is provided an apparatus comprising, as a second apparatus: a connection unit for establishing a connection with a first device. A receiving unit, configured to receive first data sent by the first device. And the processing unit is used for executing preset operation according to the first data received by the receiving unit.
In an implementation manner of the tenth aspect, the receiving unit is further configured to receive first data sent by the first device, where the first data is used to indicate an access permission level of the user. The processing unit is further configured to execute a preset operation corresponding to the access permission level according to the access permission level of the user.
Optionally, in an implementation manner of the tenth aspect, the receiving unit is further configured to receive second biometric information sent by the first device and store the second biometric information. The receiving unit is further configured to receive first biometric information sent by the first device. The processing unit is further configured to perform identity verification according to the first biometric information and the second biometric information, and execute a preset operation when the identity verification is successful.
In an eleventh aspect, there is provided an apparatus comprising as a first apparatus a transceiver, one or more processors, and a memory for storing computer program code comprising instructions which, when executed by the one or more processors, perform the method of the second aspect as described above.
In a twelfth aspect, there is provided an apparatus comprising as a second apparatus a transceiver, one or more processors, and a memory for storing computer program code comprising instructions which, when executed by the one or more processors, perform the method of the third aspect described above.
A thirteenth aspect provides a connection establishing system, which includes the first device of the eleventh aspect, the second device of the thirteenth aspect, and a third device, wherein the first device is configured to obtain attribute data of the third device, and send the attribute data to the second device; the second device is configured to establish a connection with the third device according to the attribute data of the third device.
In a fourteenth aspect, there is provided an apparatus comprising as a first apparatus a transceiver, one or more processors, and a memory for storing computer program code comprising instructions which, when executed by the one or more processors, perform the method of the fifth aspect described above.
In a fifteenth aspect, there is provided an apparatus comprising as a second apparatus a transceiver, one or more processors, and memory for storing computer program code comprising instructions which, when executed by the one or more processors, perform the method of the sixth aspect.
In a sixteenth aspect, there is provided an identity verification system comprising the first device of the fourteenth aspect and the second device of the fifteenth aspect.
In a seventeenth aspect, there is provided a computer-readable storage medium having stored therein instructions, which, when run on a computer, cause the computer to perform the method of the second aspect described above.
In an eighteenth aspect, there is provided a computer readable storage medium having stored therein instructions, which when run on a computer, cause the computer to perform the method of the third aspect described above.
In a nineteenth aspect, there is provided a computer-readable storage medium having stored therein instructions, which, when run on a computer, cause the computer to perform the method of the above fifth aspect.
In a twentieth aspect, there is provided a computer-readable storage medium having stored therein instructions which, when run on a computer, cause the computer to perform the method of the above sixth aspect.
In a twenty-first aspect, there is provided a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of the second aspect described above.
In a twenty-second aspect, there is provided a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of the above-mentioned third aspect.
In a twenty-third aspect, there is provided a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of the above-mentioned fifth aspect.
A twenty-fourth aspect provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of the above-mentioned sixth aspect.
Drawings
Fig. 1 is a schematic diagram of a connection establishment system including a smart watch, a mobile phone, and a smart desk lamp;
FIG. 2 is a schematic diagram of a structure of a mobile phone;
FIG. 3 is a schematic diagram of an arrangement of a smart watch;
fig. 4 is a flowchart illustrating a connection establishment method according to an embodiment of the present application;
fig. 4a is a schematic flowchart of another connection establishment method according to an embodiment of the present application;
fig. 4b is a schematic flowchart of another connection establishment method according to an embodiment of the present application;
fig. 5 is a schematic diagram of a specific implementation process of the connection establishment method provided in the embodiment of the present application, applied to the system shown in fig. 1;
fig. 5a is a schematic diagram illustrating a process in which a user operates a smart watch to trigger a mobile phone to start a function of scanning a two-dimensional code to obtain attribute data of other devices according to an embodiment of the present application;
fig. 5b is a schematic diagram illustrating a process that a user operates a mobile phone to trigger the mobile phone to start a function of scanning a two-dimensional code to obtain attribute data of an intelligent desk lamp according to an embodiment of the present application;
fig. 5c is a schematic process diagram illustrating a process in which a user operates an application installed on a mobile phone to trigger the mobile phone to start a function of scanning a two-dimensional code to obtain attribute data of an intelligent desk lamp according to the embodiment of the present application;
fig. 6a is an interface schematic diagram illustrating that a prompt message is displayed on a smart watch when the smart watch establishes a bluetooth connection with a smart desk lamp according to an embodiment of the present application;
fig. 6b is a schematic diagram of an interface male that displays a prompt message on a smart phone when a bluetooth connection is established between the smart watch and the smart desk lamp according to the embodiment of the present application;
fig. 7 is a schematic diagram illustrating a process in which a user operates a smart watch to trigger the mobile phone1 to start an NFC function to acquire attribute data of the mobile phone2 according to the embodiment of the application;
fig. 8 is a schematic diagram illustrating a process in which a user operates a mobile phone to trigger a smart watch to quickly establish a bluetooth connection with another mobile phone according to an embodiment of the present application;
fig. 9 is a schematic diagram of a process in which a user operates a mobile phone to trigger a smart watch and another wireless access point to quickly establish a Wi-Fi connection according to an embodiment of the present application;
fig. 10 is a schematic diagram illustrating an identity verification system including a smart watch and a mobile phone according to an embodiment of the present application;
fig. 11 is a schematic flowchart of an identity authentication method according to an embodiment of the present application;
fig. 11a is a schematic flowchart of another authentication method according to an embodiment of the present application;
fig. 11b is a schematic flowchart of another authentication method according to an embodiment of the present application;
fig. 12 is a schematic view of an interface for entering a fingerprint for a smart watch on a mobile phone according to an embodiment of the present application;
fig. 13 is a schematic interface diagram of a smart watch display after a user 1 inputs a fingerprint on a mobile phone according to an embodiment of the present application;
fig. 14 is a schematic interface diagram of a smart watch display after a user 2 inputs a fingerprint on a mobile phone according to an embodiment of the present application;
fig. 15 is a schematic structural diagram of a first apparatus according to an embodiment of the present disclosure;
fig. 15a is a schematic structural diagram of another first apparatus provided in an embodiment of the present application;
fig. 15b is a schematic structural diagram of yet another first apparatus provided in an embodiment of the present application;
fig. 16 is a schematic structural diagram of a second apparatus provided in an embodiment of the present application;
fig. 16a is a schematic structural diagram of another second apparatus provided in the embodiment of the present application;
fig. 16b is a schematic structural diagram of another second apparatus provided in the embodiment of the present application;
fig. 17 is a schematic structural diagram of a connection establishment system according to an embodiment of the present application;
fig. 18 is a schematic structural diagram of a first apparatus according to an embodiment of the present disclosure;
fig. 18a is a schematic structural diagram of another first apparatus provided in an embodiment of the present application;
fig. 18b is a schematic structural diagram of yet another first apparatus provided in an embodiment of the present application;
fig. 19 is a schematic structural diagram of a second apparatus provided in an embodiment of the present application;
fig. 19a is a schematic structural diagram of another second apparatus provided in the embodiment of the present application;
fig. 19b is a schematic structural diagram of another second apparatus provided in the embodiment of the present application;
fig. 20 is a schematic structural diagram of an identity verification system according to an embodiment of the present application.
Detailed Description
An embodiment of the present application provides a connection establishment system, as shown in fig. 1, the system includes: a first device 101, a second device 102 and a third device 103. The first device 101 and the second device 102 establish a first connection, and the first device 101 and the third device 103 establish a second connection. The connection mode of the first connection and the second connection includes but is not limited to: bluetooth (BT) connection, Wireless-Fidelity (Wi-Fi) connection, Universal Serial Bus (USB) connection, and the like.
The first device 101 is a mobile phone, a tablet computer, a notebook computer, a super mobile personal computer, a netbook, a personal digital assistant, and the like. The second device 102 may be a wearable device such as a smart watch or a bracelet, or may be another device. In the embodiment of the present application, the first device 101 supports more hardware and can implement more functions. The second device 102 has limited hardware support and limited functionality that can be implemented. The attribute data of the third device 103 exists in a specific image or a specific format, and other devices need to analyze the specific image or the specific format before acquiring the attribute data of the third device 103, and establish a connection with the third device 103 according to the attribute data. The third device 103 may specifically be a mobile phone, may also be other wearable devices, and may also be an intelligent household device such as an intelligent desk lamp and an intelligent refrigerator. In practical application, the first device 101 may obtain the specific image through the supported target hardware, analyze the specific image, obtain the attribute data of the third device 103, and establish a connection with the third device 103 according to the attribute data. However, since the second device 102 does not support the target hardware, the specific image cannot be obtained, and further the attribute data of the third device 103 cannot be obtained, the second device 102 cannot establish a connection with the third device 103.
Taking the first device 101 as a mobile phone, as shown in fig. 2, the mobile phone 200 includes: a Radio Frequency (RF) circuit 210, a memory 220, an input unit 230, a communication module 240, a processor 250, a power supply 260, a display unit 270, a photographing unit 280, a fingerprint recognition sensor 281, an NFC unit 282, an audio circuit 290, and the like. Those skilled in the art will appreciate that the handset configuration shown in fig. 2 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The functional components of the mobile phone 200 are described below:
the RF circuit 210 may be used for receiving and transmitting signals during information transmission and reception or during a call, and in particular, receives downlink information of a base station and then processes the received downlink information to the processor 250; in addition, the uplink data is transmitted to the base station. Typically, the RF circuitry includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, RF circuit 210 may also communicate with networks and other devices via wireless communications provided by communications module 240. The wireless communication may use any communication standard or protocol, including but not limited to global system for mobile communications (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Message Service (SMS), etc.
The memory 220 may be used to store software programs and modules, and the processor 250 executes various functional applications and data processing of the mobile phone 200 by operating the software programs and modules stored in the memory 220. The memory 220 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an Application (APP) required by at least one function, such as a sound playing function, an image playing function, and the like; the storage data area may store data (such as audio data, image data, a phonebook, etc.) created according to the use of the cellular phone 200, and the like. Further, the memory 220 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The input unit 230 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the cellular phone 200. Specifically, the input unit 230 may include a touch screen 231 and other input devices 232. The touch screen 231, also referred to as a touch panel, may collect a touch operation performed by a user on or near the touch screen 231 (e.g., an operation performed by the user on or near the touch screen 231 using any suitable object or accessory such as a finger or a stylus), and drive the corresponding connection device according to a preset program. Alternatively, the touch screen 231 may include two parts, a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 250, and can receive and execute commands sent by the processor 250. In addition, the touch screen 231 may be implemented in various types, such as resistive, capacitive, infrared, and surface acoustic wave. The input unit 230 may include other input devices 232 in addition to the touch screen 231. In particular, other input devices 232 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, power switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 270 may be used to display information input by or provided to the user and various menus of the cellular phone 200. The Display unit 270 may include a Display panel 271, and optionally, the Display panel 271 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. Further, the touch screen 231 may cover the display panel 271, and when the touch screen 231 detects a touch operation thereon or nearby, the touch screen is transmitted to the processor 250 to determine the type of the touch event, and then the processor 250 provides a corresponding visual output on the display panel 271 according to the type of the touch event. Although in fig. 3 the touch screen 231 and the display panel 271 are implemented as two separate components to implement the input and output functions of the cell phone 200, in some embodiments the touch screen 231 and the display panel 271 may be integrated to implement the input and output functions of the cell phone 200.
The photographing unit 280 is configured to collect an image, send the collected image to the processor 250, and process the image collected by the photographing unit 280 by the processor 250. Alternatively, the photographing unit 280 includes a camera or the like.
The processor 250 is a control center of the mobile phone 200, connects various parts of the entire mobile phone by using various interfaces and lines, and performs various functions of the mobile phone 200 and processes data by operating or executing software programs and/or modules stored in the memory 220 and calling data stored in the memory 220, thereby performing overall monitoring of the mobile phone. Alternatively, processor 250 may include one or more processing units; optionally, the processor 250 may integrate an application processor and a modem processor, wherein the application processor mainly handles operating systems, user interfaces, application programs, and the like, and the modem processor mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 250.
The handset 200 further includes a power supply 260 (e.g., a battery) for supplying power to various components, and optionally, the power supply may be logically connected to the processor 250 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system.
Although not shown, the cellular phone 200 further includes a gravity sensor (gravity sensor), a light sensor, an infrared sensor, and the like. Specifically, the gravity sensor can detect the acceleration of the mobile phone in each direction (generally three axes), can detect the gravity and the direction when the mobile phone is stationary, and can be used for applications of recognizing the gesture of the mobile phone (such as horizontal and vertical screen switching, related games, magnetometer gesture calibration), vibration recognition related functions (such as pedometer and tapping) and the like. The light sensors may include an ambient light sensor and a proximity light sensor. The ambient light sensor can adjust the brightness of the display panel 231 according to the brightness of ambient light; the proximity light sensor may detect whether an object is near or touching the phone, and may turn off the display panel 231 and/or the backlight when the phone 200 is moved to the ear. In addition, the handset 200 may be configured with an antenna, a Wi-Fi module, a Near Field Communication (NFC) unit 282, a bluetooth module, a speaker, an accelerometer, a gyroscope, a barometer, a hygrometer, and a thermometer. The mobile phone 200 may also be configured with a sensor for implementing biometric identification, such as a fingerprint sensor 281, an iris sensor, etc., which will not be described herein.
Taking the second device 102 as a smart watch as an example, as shown in fig. 3, the smart watch 300 includes: a watch body and a wrist band, wherein the watch body may include a front case (not shown in fig. 3), a touch panel 301 (also called a touch screen), a display 302, a bottom case (not shown in fig. 3), a processor 303, a Micro Control Unit (MCU) 304, a memory 305, a Microphone (MIC) 306, a bluetooth module 308, a heart rate detection sensor 310, a power supply 312, a power supply management system 313, and the like, and although not shown, the smart watch may further include an antenna, a WiFi module, a GPS module, a speaker, an accelerometer, a gyroscope, and the like. Those skilled in the art will appreciate that the smart watch configuration shown in fig. 3 does not constitute a limitation of a smart watch, and may include more or fewer components than those shown, or some components in combination, or a different arrangement of components.
The following describes the functional components of the smart watch 300:
The display 302 may be used to display information entered by or provided to the user as well as various menus of the watch. Alternatively, the display screen 302 may be configured in the form of an LCD, OLED, or the like. Further, the touch panel 301 can cover the display screen 302, and when the touch panel 301 detects a touch operation on or near the touch panel, the touch panel is transmitted to the processor 303 to determine the type of the touch event, and then the processor 303 provides a corresponding visual output on the display screen 302 according to the type of the touch event. Although in fig. 3, the touch panel 301 and the display screen 302 are two separate components to implement the input and output functions of the watch, in some embodiments, the touch panel 301 and the display screen 302 may be integrated to implement the input and output functions of the watch.
The processor 303 is used to perform system scheduling, control the display screen, touch screen, support processing microphones 306, one or more membrane actuators, bluetooth module 308, and the like.
A microphone 306, also referred to as a microphone. The microphone 306 may convert the collected sound signals into electrical signals, which are received by the audio circuitry and converted into audio data; the audio circuit can also convert the audio data into an electric signal, transmit the electric signal to a loudspeaker, and convert the electric signal into a sound signal by the loudspeaker to output.
The bluetooth module 308 and the smart watch may interact information with other electronic devices (such as a mobile phone and a tablet computer) through the bluetooth module 308, and may be connected to a network through the electronic devices, connected to a server, and perform functions such as voice recognition.
The micro control unit 304 is used for controlling the sensor, performing calculations on sensor data, communicating with the processor 303, and the like.
The sensor may be a heart rate detection sensor 310, barometric sensor, gravity sensor, light sensor, motion sensor, or other sensor. In particular, the light sensor may include an ambient light sensor and a proximity sensor. As for the other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which are also configurable to the watch, detailed description is omitted here.
The memory 305 is used for storing software programs and data, and the processor 303 executes various functional applications and data processing of the watch by running the software programs and data stored in the memory. The memory 305 mainly includes a program storage area and a data storage area, wherein the program storage area can store an operating system, and application programs (such as a sound playing function, an image playing function, etc.) required by at least one function; the stored data area may store data created from use of the watch (e.g., audio data, a phonebook, etc.). Further, the memory may include high speed random access memory, and may also include non-volatile memory, such as a magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The smart watch 300 further includes a power source 312 (e.g., a battery) for supplying power to the various components, and optionally, the power source 312 may be logically connected to the processor 303 through a power management system 313, so as to manage charging, discharging, and power consumption management functions through the power management system 313.
Therefore, most current mobile phones support hardware such as bluetooth, NFC, cameras, infrared sensors, fingerprint identification sensors, iris identification sensors, and the like, and can realize functions such as scanning two-dimensional codes, establishing NFC connection with other devices, fingerprint identification, iris identification, infrared remote control, and the like. The smart watch mainly supports hardware such as bluetooth, rhythm of the heart sensor, motion sensor, can realize establishing bluetooth with other equipment and be connected to and functions such as the sleep of record user, rhythm of the heart, motion track, nevertheless can not realize functions such as scanning two-dimensional code, fingerprint identification, iris discernment owing to lack relevant hardware support.
Illustratively, the first device is a mobile phone, the second device is a smart watch, the third device 103 is a smart desk lamp, for example, a two-dimensional code or a bar code is pasted on the smart desk lamp, and the two-dimensional code or the bar code is used for carrying attribute data such as a bluetooth name and a bluetooth address of the smart desk lamp. After the mobile phone scans the two-dimensional code or the bar code on the intelligent desk lamp by using the shooting unit, the two-dimensional code or the bar code can be analyzed to obtain attribute data such as a Bluetooth name, a Bluetooth address and a Bluetooth pairing code of the intelligent desk lamp, Bluetooth connection is established with the intelligent desk lamp according to the attribute data, and then a user can operate the mobile phone to realize control over the intelligent desk lamp. However, the smart watch does not have a shooting unit, and cannot scan the two-dimensional code on the smart table lamp, so that the smart watch cannot be connected with the smart table lamp, and a user cannot control the smart table lamp by using the smart watch.
In order to establish a connection between a first device and a third device, an embodiment of the present application provides a connection establishment method, which may be applied in the system shown in fig. 1, as shown in fig. 4, and includes the following steps:
401. the first device and the second device establish a first connection.
Wherein the first connection comprises: the first connection also comprises wired connection modes such as USB connection, and the like, and the connection mode of the first connection is not limited in the embodiment of the application.
402. The first device acquires attribute data of the third device.
The attribute data is used for establishing connection with other equipment. The connection includes: bluetooth connection, Wi-Fi connection and other connection modes. The other device can establish connection with the third device after acquiring the attribute data. According to different contents contained in the attribute data, the connection modes established between the other equipment and the third equipment after the attribute data is acquired are different.
Illustratively, the attribute data includes a bluetooth identifier of the third device, a bluetooth Media Access Control (MAC) address, and the like, which are information required to establish a bluetooth connection. The first device can establish a bluetooth connection with the third device after acquiring the attribute data.
403. The first device sends attribute data of the third device to the second device.
404. And the second equipment establishes a second connection with the third equipment according to the attribute data of the third equipment.
The second connection comprises connection modes such as Bluetooth connection and Wi-Fi connection. The second connection and the first connection may be the same or different, and the embodiments of the present application are not limited.
Illustratively, the first device and the second device establish a bluetooth connection, the first device and the third device establish an NFC connection, the first device reads attribute data such as a Wi-Fi name and an MAC address of the third device through the established NFC connection, then the first device sends the acquired attribute data to the second device, and the second device establishes a Wi-Fi connection with the third device according to the attribute data.
In another implementation manner, the first device obtains the attribute data of the second device, sends the attribute data of the second device to the third device, and initiates a connection with the second device by the third device. Or the first device sends the attribute data of the second device to the third device and sends the attribute data of the third device to the second device, so that any device in the second device and the third device can initiate connection.
According to the method, the first device and the second device are connected, the first device obtains the attribute data of the third device and sends the attribute data to the second device, and the second device can be connected with the third device according to the attribute data. In this way, when the second device cannot directly acquire the attribute data of the third device, the first device connected with the second device sends the attribute data of the third device to the second device, and then the second device can establish connection with the third device according to the attribute data.
Optionally, after the first device and the third device establish a connection, the first device may implement control over the third device.
Optionally, when data is transmitted among the first device, the second device, and the third device, the data to be transmitted is encrypted, so that the security is higher when the data is transmitted over the air interface. The specific implementation of the encryption algorithm may refer to the prior art, and is not described herein again.
Optionally, in an implementation manner of step 402, as shown in fig. 4a, the step 402 includes the following steps:
4021a, the first device receives the indication signaling of the second device.
Wherein the indication signaling is used for indicating the second device to enable the target function.
4022a, the first device obtains the attribute data of the third device through the target function according to the indication signaling of the second device.
In the implementation shown in fig. 4a, the second device sends an indication signaling to the first device, where the indication signaling is used to indicate that the first device enables a certain function on the first device, the first device enables the function according to the indication signaling, and obtains data through the function, and as a response to the indication signaling, the first device sends the obtained data to the second device.
Specifically, the corresponding relationship between the indication signaling and the function is predefined, the second device sends the indication signaling to the first device, and the first device can identify the indication signaling sent by the second device and enable the corresponding function according to the indication signaling.
Exemplarily, as shown in the following table one, the embodiment of the present application defines a corresponding relationship between indication signaling and a function:
watch1
Indication signaling | Function(s) |
0001 | Two-dimensional code identification |
0002 | Identifying fingerprints |
0003 | ...... |
Correspondingly, after the first device receives the indication message of the second device, the first device executes the corresponding operation and returns the execution result to the second device.
For example, as shown in the following table two, in the embodiment of the present application, a corresponding relationship between an indication signaling returned by the second device and a function is defined.
Watch two
Indication signaling | Function(s) |
1001 | Returning a result of recognizing the two- |
1002 | Returning the result of identifying the |
1003 | ...... |
The result of returning and identifying the two-dimensional code may be the original data of the two-dimensional code, or may be the attribute data identified by the second device. The result of returning the identification fingerprint can be the original data of the fingerprint and also can be the result data of successful or failed fingerprint identification.
By combining the corresponding relationship shown in the first table and the second table, for example, when the second device sends an indication signaling of "0001" to the first device, the first device determines that the corresponding function is "identify two-dimensional code" according to the indication signaling after receiving the indication signaling, the first device enables the shooting function of the shooting unit to identify the two-dimensional code, and after identifying the two-dimensional code, the second device replies the indication signaling of "1001" to the first device, and the indication signaling has a result carrying the identify two-dimensional code.
In the method shown in fig. 4a, by improving the protocol for supporting connection establishment between the first device and the second device, the indication signaling is added without affecting the function of the existing protocol, so that the indication signaling can be transmitted between the first device and the second device.
Optionally, the user operates the second device to trigger the second device to send the indication signaling to the first device, and different operations of the user are used to trigger the second device to send different indication signaling. Then in another implementation of step 402, as shown in fig. 4b, this step 402 includes:
4021b, the first device receives an indication operation input by a user, wherein the indication operation is used for indicating the first device to enable a target function and sending data acquired through the target function to the second device;
4022b, the first device acquires the attribute data of the third device according to the instruction operation.
In the implementation shown in fig. 4b, the user operates the first device, so that the first device acquires the attribute data of the third device, and sends the attribute data of the third device to the second device.
In order to illustrate the method more clearly, for example, the first device is a mobile phone, the second device is a wearable device (the wearable device is specifically an intelligent watch in the following description, for example), the third device is an intelligent home device (the intelligent home device is specifically an intelligent desk lamp in the following description, for example), and the intelligent desk lamp is marked with a two-dimensional code, and the two-dimensional code carries attribute data such as a bluetooth name and a bluetooth MAC address of the intelligent desk lamp. In the prior art, the smart watch cannot scan the two-dimensional code on the smart desk lamp because the smart watch does not have hardware supporting scanning of the two-dimensional code, and the smart watch cannot be directly connected with the smart desk lamp. After the method is applied, as shown in fig. 5, the mobile phone and the smart watch establish a bluetooth connection; and because the mobile phone is provided with the shooting unit, the two-dimensional code on the intelligent desk lamp can be scanned to acquire attribute data such as the Bluetooth name of the intelligent desk lamp, and the attribute data is sent to the intelligent watch. After the intelligent watch acquires the attribute data, the intelligent watch can establish Bluetooth connection with the intelligent desk lamp according to the attribute data so as to control the intelligent desk lamp. Specifically, in an implementation manner, an Application program (APP) for controlling the smart home is installed on the smart watch, and a user controls the smart desk lamp by operating the APP, wherein the APP controls the smart desk lamp to be turned on or turned off, and the brightness of the smart desk lamp is controlled. In another implementation, the user controls the smart table lamp by operating physical keys of the smart watch. In another implementation, the distance between the smart watch and the smart desk lamp is determined by the smart watch according to the signal intensity value of the connection between the smart watch and the smart desk lamp, and the smart watch is worn by the user generally, so that the distance can be regarded as the distance between the user and the smart desk lamp, and further the brightness of the smart desk lamp can be adjusted according to the distance between the user and the smart desk lamp. In other implementation manners, the smart watch determines the current scene of the user according to data such as height and position, when the current scene of the user is judged to be the place where the desk lamp is located, such as a bedroom, the brightness of the current environment where the user is located is detected according to the installed sensor, when the brightness is weak, the smart watch automatically controls the desk lamp to be turned on, and the brightness of the desk lamp is adjusted or the smart desk lamp is turned off according to the environment.
After the mobile phone and the smart watch are connected, as shown in fig. 5a, an optional way of triggering the mobile phone to acquire the attribute data of the smart desk lamp and send the attribute data to the smart watch is as follows: the smart watch loads an interface 501 displaying icons "gallery", "heart rate", "clock", "settings", etc., and when the user selects the icon "settings", the smart watch loads a settings interface 502, the setting interface comprises Wi-Fi and Bluetooth, the connection between the smart watch and the mobile Phone marked with Phone1 is established, after the user selects the mobile Phone marked with Phone1, the smart watch loads the interface 503, the interface is loaded with the functionality that the handset identified as "Phone 1" can provide for the smart watch, when the user selects the function of 'recognizing the two-dimensional code/bar code', the smart watch sends an instruction to the mobile phone, and after the mobile phone receives the instruction, automatically brings up the camera function and loads the interface 504 for scanning the two-dimensional code/bar code, and then after the user successfully scans the two-dimensional code of the intelligent desk lamp, the mobile phone sends the attribute data of the intelligent desk lamp to the intelligent watch.
Optionally, in other implementation manners, one optional manner of triggering the mobile phone to obtain the attribute data of the smart desk lamp and sending the attribute data to the smart watch is as follows: the smart watch is loaded with an Application program (APP) for interacting with the mobile phone, the user operates the APP to send an indication signaling to the mobile phone, the indication signaling is used for indicating the mobile phone to start a function of identifying the two-dimensional code/bar code, and the mobile phone opens a camera according to the indication signaling and identifies the two-dimensional code/bar code, and then sends attribute data of the smart desk lamp to the smart watch.
As shown in fig. 5b, another optional manner for triggering the mobile phone to obtain the attribute data of the smart desk lamp and send the attribute data to the smart watch is as follows: the user opens the bluetooth setup interface 601 of the mobile phone, and the identifiers of all devices which have established bluetooth connection with the mobile phone are displayed on the interface, including the identifier of the smart watch. The method comprises the steps that a button is displayed on the right side of an identifier of the intelligent watch, when a user clicks the button, an interface 602 which can be operated by the user on the intelligent watch is loaded and displayed, wherein the interface comprises the steps of 'ignoring the equipment', 'establishing connection with other equipment' and 'acquiring data for the equipment', when the user selects 'establishing connection with other equipment', an interface 603 is displayed, all possible connection establishing modes are displayed on the interface 603, the mode comprises a mode of 'scanning a two-dimensional code/bar code', when the mobile phone detects that the user selects the button after the mode of 'scanning the two-dimensional code/bar code', the shooting function of the mobile phone is automatically called out, an interface 604 for scanning the two-dimensional code/bar code is loaded, and then when the user successfully scans the two-dimensional code of the intelligent watch, attribute data of the intelligent desk lamp are sent to the intelligent desk lamp.
Through this implementation, when the user is not used to the operation wrist-watch or when inconvenient operation wrist-watch, the user can send the attribute data of intelligent desk lamp to intelligent wrist-watch through operating the cell-phone, and then intelligent wrist-watch can be established with intelligent desk lamp and be connected.
As shown in fig. 5c, another optional manner for triggering the mobile phone to obtain the attribute data of the smart desk lamp and send the attribute data to the smart watch is as follows: as shown in the interface 701, an application program "wear" is installed on the mobile phone, and the mobile phone can control and manage all wearable devices connected with the mobile phone by operating the APP. When a user opens the APP of 'wearing', an interface 702 displaying all wearable devices connected with the interface of the mobile phone is loaded, when the user selects the wearable device marked as 'WATCH 1', an interface 703 for managing WATCH1 is loaded, when the user selects the option of 'recognizing two-dimensional code/bar code', the mobile phone automatically calls a shooting function of the mobile phone and loads an interface 704 for scanning the two-dimensional code/bar code, and then when the user successfully scans the two-dimensional code of the intelligent desk lamp, attribute data of the intelligent desk lamp is sent to the intelligent WATCH.
After the mobile phone scans the two-dimensional code on the intelligent desk lamp, in one implementation mode, the mobile phone directly sends the two-dimensional code to the intelligent watch, the intelligent watch analyzes the two-dimensional code to obtain attribute data of the intelligent desk lamp, and then connection is established with the intelligent desk lamp according to the attribute data. In another implementation mode, the mobile phone analyzes the two-dimension code to obtain attribute data of the intelligent desk lamp, then the attribute data is sent to the intelligent watch, and the intelligent watch establishes Bluetooth connection with the intelligent desk lamp according to the attribute data.
In addition, when the attribute data that intelligence wrist-watch obtained includes bluetooth name, bluetooth MAC address, does not include the bluetooth and matches the sign indicating number, intelligence wrist-watch is obtaining the attribute data of intelligent desk lamp after, and intelligence wrist-watch need match with intelligent desk lamp earlier, just can establish the connection of intelligence wrist-watch and intelligent desk lamp after pairing successfully.
In this case, in an implementation manner, as shown in fig. 6a, after the smart watch obtains attribute data of the smart desk lamp, connection to the smart desk lamp is initiated, as shown in 801, a prompt box pops up on the smart watch, and the prompt box is used for prompting a user whether to pair with the smart desk lamp; when the user determines that the equipment matched with the intelligent watch is the intelligent desk lamp, the user can click on the prompt box for confirmation, and the intelligent watch is matched with the intelligent desk lamp and connected with the intelligent desk lamp after detecting the confirmation operation of the user.
In another implementation manner, as shown in fig. 6b, after the mobile phone obtains the attribute data of the smart desk lamp, as shown in 802, a prompt box is popped up on the mobile phone, and the prompt box is used for prompting a user whether to pair the smart watch with the smart desk lamp, when the user determines to pair the smart watch with the smart desk lamp, the user can click on the prompt box for confirmation, after the mobile phone detects the confirmation operation of the user, the attribute data of the smart desk lamp is sent to the smart watch, and the smart watch pairs with the smart desk lamp according to the attribute data and establishes a bluetooth connection with the smart desk lamp.
Through the implementation manner shown in fig. 6b, when the user is not used to or inconvenient to operate the smart watch, the user can establish connection between the smart watch and the smart desk lamp by operating the mobile phone. In addition, when a plurality of intelligent watches need to be connected with the intelligent desk lamp, all prompt boxes used for prompting whether the intelligent watches are connected with the intelligent desk lamp or not are displayed through the mobile phone, and then a user can confirm the prompt boxes only by operating the mobile phone, so that the connection between the intelligent watches and the intelligent desk lamp is established.
When the attribute data sent by the mobile phone comprises the Bluetooth name, the Bluetooth MAC address and the Bluetooth pairing code, after the intelligent watch receives the attribute data of the intelligent desk lamp, the intelligent watch automatically establishes Bluetooth connection with the intelligent desk lamp according to the attribute data. In the implementation mode, after the intelligent watch acquires the attribute data of the intelligent desk lamp, one-key type automatic connection can be established with the intelligent desk lamp, the processes of pairing the intelligent watch and the intelligent desk lamp and user confirmation are omitted, and the quick connection of the intelligent watch and the intelligent desk lamp can be realized.
In summary, with the above implementation manner, when the smart watch cannot directly acquire the attribute data of the smart desk lamp due to lack of hardware support so as to establish connection with the smart desk lamp, the smart watch acquires the attribute data of the smart desk lamp "by means of" the hardware of the mobile phone, and then establishes connection with the smart desk lamp.
Currently, most mobile phones support NFC functionality, while most smartwatches do not. The NFC connection can be established for data transmission only by the mutual approach, namely, the collision between the devices with the NFC function. In consideration of convenience of NFC data transmission, the smart watch can acquire attribute data of other equipment by means of an NFC function of the mobile phone, and then can be connected with the other equipment quickly. Wherein the attribute data comprises data for establishing a connection, such as data for establishing a bluetooth connection, a Wi-Fi connection.
For example, as shown in fig. 7, a connection is established between a smart watch and a mobile Phone1, an interface 901 displaying icons such as "gallery", "heart rate", "clock", "setup" and the like is loaded on the smart watch, when a user selects the icon "setup", the smart watch loads a setup interface 902 including "Wi-Fi" and "bluetooth", the smart watch and the mobile Phone identified as "Phone 1" establish a bluetooth connection, after the user selects the mobile Phone identified as "Phone 1", the smart watch loads an interface 903, the interface loads a function that the mobile Phone identified as "Phone 1" can provide to the smart watch, when the user selects the function "NFC enable", the smart watch sends an indication signaling to the mobile Phone1, the indication signaling is used to indicate that the mobile Phone1 enables the NFC function, and the mobile Phone receives the indication signaling to execute a process 904: when a user brings the mobile phone1 close to the mobile phone2, the mobile phone1 and the mobile phone2 establish NFC connection and acquire attribute data of the mobile phone 2. Further, the mobile phone1 sends the attribute data of the mobile phone2 to the smart watch, and the smart watch automatically establishes a connection with the mobile phone2 according to the attribute data.
In other implementation manners, when the mobile phone1 approaches the mobile phone2, the mobile phone1 automatically sends the attribute data of the smart watch to the mobile phone2, and then the mobile phone2 automatically initiates connection with the smart watch according to the attribute data.
In other implementation manners, when the mobile phone1 is close to the mobile phone2, the mobile phone1 sends the attribute data of the smart watch to the mobile phone2, and sends the attribute data of the mobile phone2 to the smart watch, that is, the attribute data of the smart watch and the attribute data of the mobile phone2 are exchanged through the mobile phone1, and then any one of the smart watch and the mobile phone2 can initiate connection according to the obtained attribute data.
In other implementation manners, the user operates the mobile phone1 to trigger the mobile phone1 to "hit" the mobile phone2 to acquire the attribute data of the mobile phone2 and send the attribute data of the mobile phone2 to the smart watch, and the specific implementation thereof can refer to fig. 5b and 5 c. Unlike fig. 5b and 5c, the user selects "enable NFC functionality" to trigger the above-described process.
In the method shown in fig. 7, when the smart watch establishes a bluetooth connection or a Wi-Fi connection with the mobile phone2, as long as the mobile phone1 and the mobile phone2 "hit" each other, the mobile phone1 may acquire the attribute data of the mobile phone2 through the NFC connection established with the mobile phone2 and send the attribute data of the mobile phone2 to the smart watch, and then the smart watch establishes a connection with the mobile phone2 according to the attribute data of the mobile phone 2. The processes of scanning the mobile phone2 and inputting the password of the smart watch are omitted, and the implementation method for quickly establishing the connection between the smart watch and the mobile phone2 is provided.
In practical applications, in the system shown in fig. 1, a first device and a second device establish a first connection, and a first device and a third device establish a second connection, wherein the first connection and the second connection may be the same or different. When the second device and the third device are connected, the user needs to operate the second device and the third device respectively, which is complex in implementation process. For example: the method comprises the steps that Bluetooth connection is established between first equipment and second equipment, Bluetooth connection is established between the second equipment and third equipment, when the Bluetooth connection is established between the second equipment and the third equipment, a user needs to open Bluetooth setting interfaces of the second equipment and the third equipment respectively and scan peripheral equipment with Bluetooth functions, and when the second equipment scans the third equipment, the third equipment is selected to carry out Bluetooth pairing and the like to establish connection with the third equipment. In this process, the second device needs to scan the third device, which may cause problems: the longer scanning time causes more time to establish connection between the second device and the third device; or the third device cannot see the second device, the second device cannot successfully scan the third device, the third device cannot be displayed on the second device after the user sets the operation interface of the third device, and then the second device cannot be connected with the third device.
After the method shown in fig. 4 in this embodiment of the present application is adopted, the first device obtains the attribute data of the third device and directly sends the attribute data of the third device to the second device, and then the second device can obtain the attribute data of the third device and automatically establish a connection with the second device.
Illustratively, the first device is a mobile phone1, the second device is a smart watch, and the third device is a mobile phone 2. The mobile phone1 and the smart watch establish Bluetooth connection, and the mobile phone1 and the mobile phone2 establish Bluetooth connection.
When the smart WATCH and the mobile Phone2 establish a bluetooth connection, after the method shown in fig. 4 in the embodiment of the present application is adopted, as shown in fig. 8, a user opens a bluetooth setting interface 1001 of the mobile Phone1, and displays on the interface identifiers of all devices that have established a bluetooth connection with the mobile Phone1, and displays a button on the right side of the identifier of each device, where the identifiers include the identifier WATCH1 of the smart WATCH and the identifier Phone2 of the mobile Phone 2. A button is displayed on the right side of the identifier WATCH1 of the smart WATCH, and when a user clicks the button, an interface 1002 which is displayed and is possible to be operated by the user on the smart WATCH is loaded, and the interface includes "ignore the device", "establish connection with other devices", and "acquire data for the device", and when the user selects "establish connection with other devices", an interface 1003 is displayed, and the interface displays all possible connection establishment modes, including "bluetooth", and when the mobile Phone detects that the user selects the "bluetooth" mode, an interface 1004 is displayed, the interface 1004 displays names of all other devices which have stored bluetooth attribute data, and after each name, a selection button corresponds to the mobile Phone1, and when the user detects that the user selects the button on the right side of the identifier Phone2 of the mobile Phone2, the bluetooth attribute data of the mobile Phone2 is sent to the smart WATCH.
When the bluetooth attribute data comprises the bluetooth identifier and the bluetooth MAC address of the mobile phone2 and does not contain the pairing code, the smart watch initiates a bluetooth pairing process with the mobile phone2 after receiving the attribute data, and when the smart watch and the mobile phone2 successfully perform bluetooth pairing, a bluetooth connection is established.
When the bluetooth attribute data includes the bluetooth identifier and the bluetooth MAC address of the mobile phone2 and further includes the bluetooth pairing code, the smart watch automatically establishes a bluetooth connection with the mobile phone2 according to the bluetooth attribute data of the mobile phone 2.
Optionally, when it is detected that the user selects the button on the right side of the identification Phone2 of the mobile Phone2, the mobile Phone1 sends the bluetooth attribute data of the smart watch to the mobile Phone2 in addition to sending the bluetooth attribute data of the mobile Phone2 to the smart watch.
Optionally, in another implementation, when the smart watch establishes the bluetooth connection with the mobile phone2, the smart watch and the mobile phone2 respectively display prompt information for prompting the user of a bluetooth connection request between the smart watch and the mobile phone2, and when the user confirms that the smart watch establishes the bluetooth connection with the mobile phone 2.
It can be seen that, in the manner shown in fig. 8, a user can send the bluetooth attribute data of the mobile phone2 to the smartwatch by operating the mobile phone1, and then the smartwatch can automatically establish a bluetooth connection with the mobile phone 2. The step that the user operates the smart watch and the mobile phone2 respectively is omitted, and the smart watch and the mobile phone2 can be connected in a quick one-key mode.
Illustratively, the first device is a mobile phone, the second device is a smart watch, the third device is a certain wireless Access Point (AP), the mobile phone and the smart watch establish a bluetooth connection, and the mobile phone and the wireless access Point establish a Wi-Fi connection.
When the smart WATCH and the wireless access point establish Wi-Fi connection, after the method shown in fig. 4 in the embodiment of the present application is adopted, as shown in fig. 9, a user opens a bluetooth setting interface 1101 of a mobile phone, and identifiers of all devices that have established bluetooth connection with the mobile phone are displayed on the interface, where the identifiers include the identifier WATCH1 of the smart WATCH. A button is displayed to the right of the logo of the smart watch, and the user clicking on the button loads an interface 1102 displaying the possible operations of the smart watch by the user, including "ignore this device", "establish a connection with another device", and "acquire data for this device". When a user selects 'connection establishment with other equipment', an interface 1103 is displayed, the interface displays all possible connection establishment modes, including 'Wi-Fi' mode, when the mobile phone detects that the user selects the 'Wi-Fi' mode, an interface 1104 displaying identifications of all equipment with stored Wi-Fi attribute data is displayed, for example, when the interface 1104 displays an AP1, an AP2 and an AP3, each identification corresponds to a selection button, and when the mobile phone detects that the user selects a button on the right side of the AP1, the mobile phone sends the Wi-Fi attribute data of the AP1 to the smart watch, wherein the Wi-Fi attribute data includes the identification of the equipment, the address of the equipment, the access password of the equipment and the like, and the smart watch automatically establishes Wi-Fi connection with the AP1 according to the Wi-Fi attribute data of the AP 1.
In the prior art, when an intelligent watch wants to access a wireless access point to establish Wi-Fi connection with the wireless access point, the watch needs to open a Wi-Fi setting interface, scan the wireless access point, select the wireless access point, and input an access password to successfully access the wireless access point. In the mode shown in fig. 9, a user operates the mobile phone, the mobile phone sends Wi-Fi attribute data such as an identifier, an address, an access password, and the like of the wireless access point to the smart watch, and then the smart watch automatically establishes Wi-Fi connection with the wireless access point according to the Wi-Fi attribute data after acquiring the Wi-Fi attribute data, so that the smart watch can quickly establish Wi-Fi connection with the wireless access point.
Optionally, after the smart watch receives Wi-Fi attribute data of the wireless access point, the smart watch pops up a prompt box to prompt a user whether to access the smart watch to the wireless access point, and after the smart watch detects a confirmation operation of the user, the smart watch accesses the wireless access point to establish a Wi-Fi connection with the wireless access point. In other implementation manners, after the mobile phone acquires the Wi-Fi attribute data of the wireless access point, a prompt box is popped up on the mobile phone and used for prompting the user whether to access the smart watch to the wireless access point, and after the confirmation operation of the user is detected, the Wi-Fi attribute data is sent to the smart watch, so that the smart watch can access the wireless access point according to the Wi-Fi attribute data.
The traditional identification method comprises identification articles (such as keys, certificates, ATM cards and the like) and identification knowledge (such as user names and passwords), but as foreign objects are mainly borrowed, once the identification articles and the identification knowledge for proving the identity are stolen or forgotten, the identity of the identification articles and the identification knowledge can be easily faked or replaced by others. Compared with the traditional identity authentication method, the biological identification technology has higher safety, confidentiality and convenience. The biological characteristic identification technology has the advantages of difficult forgetting, good anti-counterfeiting performance, difficult counterfeiting or theft, portability, availability at any time and any place and the like. The biometric identification technology is that personal identity is identified by closely combining a computer with high-tech means such as optics, acoustics, biosensors and the principle of biometrics and utilizing the inherent physiological characteristics (such as fingerprints and irises) and behavior characteristics (such as handwriting, voice, gait and the like) of a human body. At present, many electronic devices use biometric technology to authenticate users, but some devices are limited by hardware implementation forms or cost, and have no biometric sensor, and cannot authenticate users by using good characteristics of biometric technology.
An embodiment of the present application provides an identity authentication system, as shown in fig. 10, the system includes a first device 1201 and a second device 1202. The first device 1201 and the second device 1202 are connectable to each other. The above connection modes include but are not limited to: bluetooth (BT) connection, Wireless-Fidelity (Wi-Fi) connection, Universal Serial Bus (USB) connection, and the like.
The first device 1201 supports a biometric function, and may be a mobile phone, a tablet computer, a notebook computer, a super mobile personal computer, a netbook, a personal digital assistant, and the like. The second device 1202 may be a wearable device such as a smart watch or a bracelet, or may be another device that cannot support a biometric function.
Taking the first device 1201 as a mobile phone as an example, the structure of the mobile phone can be referred to the foregoing fig. 2, which is not described herein again; taking the second device 1202 as an example of a smart watch, the structure of the smart watch can be referred to the above fig. 3, which is not described herein again.
It can be seen that fingerprint identification sensor supports fingerprint identification is installed to current most cell-phones, but current intelligent wrist-watch is because not possessing the fingerprint identification sensor, can't support fingerprint identification, and this makes intelligent wrist-watch can't utilize fingerprint identification's good characteristic, can't carry out authentication to the user fast effectually.
In order to solve the above problem, an embodiment of the present application provides an authentication method, which can be applied to the authentication system shown in fig. 10. As shown in fig. 11, the method comprises the steps of:
1301. the first device and the second device establish a connection.
The first device is a device supporting a biometric function, and the second device is a device incapable of supporting the biometric function. Illustratively, the first device is a mobile phone, a PAD, or the like. The second equipment is wearable equipment such as intelligent wrist-watch, bracelet.
1302. The first device receives first biometric information input by a user.
The first biological characteristic information comprises fingerprint characteristic information, iris characteristic information, face characteristic information and the like.
1303. And the first equipment sends first data to the second equipment according to the first biological characteristic information.
In one implementation of this step, the first device authenticates the user according to the first biometric information input by the user and sends the authentication result as the first data to the second device.
In another implementation of this step, the first device sends the first biometric information entered by the user as the first data to the second device.
1304. And the second equipment executes preset operation according to the first data.
The preset operation comprises unlocking, enabling a preset function, enabling or forbidding preset APP and the like.
In this step, when the first data is an authentication result, the second device executes a preset operation according to the authentication result. And when the first data is the biological characteristic information, the second equipment carries out identity authentication on the user according to the biological characteristic information, and then executes preset operation according to an identity authentication result.
According to the identity authentication method, the first equipment is provided with the sensor required for supporting biological identification, so that the identity authentication of the user can be carried out by utilizing a biological identification technology. Therefore, when the second device cannot support the biological identification, the second device collects the biological identification characteristics of the user through the first device by means of the first device, authenticates the user according to the biological identification characteristics, and executes corresponding operation according to the authentication result. In this way, the second device is able to authenticate the user using the good characteristics of biometric technology without supporting biometric functionality itself.
Optionally, as shown in fig. 11a, before step 1302, the method further includes the following steps:
1401. the first device receives and stores second biological characteristic information input by the user in advance.
The second biological characteristic information comprises fingerprint characteristic information, iris characteristic information, face characteristic information and the like.
Correspondingly, in an implementation manner of step 1303, as shown in fig. 11a, specifically:
1303a, the first device performs identity verification according to the first biometric information and pre-stored second biometric information, and sends the first data to the second device after the identity verification is successful.
In the implementation manner, the first device "replaces" the second device to perform the authentication on the user, and notifies the second device of the authentication result, so that the second device executes the corresponding operation after receiving the authentication result.
Optionally, as shown in fig. 11b, before step 1302, the following steps are further included:
1501. the first device receives second biometric information input by the user in advance.
1502. The first device sends the second biometric information to the second device.
1503. The second device saves the second biometric information.
Then in another implementation manner of step 1303, step 1303 includes:
1303b, the first equipment sends the first biological characteristic information to the second equipment.
Correspondingly, step 1304 may be specifically implemented as:
1304. and the second equipment carries out identity verification on the user according to the first biological characteristic information and second pre-stored biological characteristic information, and executes preset operation after the identity verification is successful.
In this implementation manner, the first device sends the second biometric information to the second device, so that the second device stores the second biometric information in advance, the second device performs identity verification on the user according to the first biometric information and the second biometric information, and performs a preset operation after the identity verification is successful.
For example, the first device is a mobile phone, the second device is a wearable device (hereinafter, the wearable device is specifically described as a smart watch as an example), the mobile phone supports a biometric function, and the smart watch cannot perform biometric identification due to the absence of a sensor required for biometric identification. Taking the biometric characteristic as the fingerprint characteristic as an example, after the method provided by the embodiment of the application is applied, as shown in fig. 12, the smart watch and the mobile phone establish a bluetooth connection in advance. The user displays the identifications of all devices establishing Bluetooth connection with the mobile phone on a Bluetooth setting interface 1601 of the mobile phone, and a button is displayed on the right side of the identification of each device. After the smart WATCH and the mobile phone establish a bluetooth connection, a bluetooth setting interface of the mobile phone displays an identifier WATCH1 of the smart WATCH, and then after the mobile phone detects that a user selects a button on the right side of WATCH1, an interface 1602 which can be operated by the user on the smart WATCH is loaded and displayed, wherein the interface includes "ignore the device", "establish a connection with other devices", "acquire data for the device", and "enter a biological identification characteristic for the device", when the user selects "enter a biological identification characteristic for the device", the interface 1604 is loaded to prompt the user to select a biological characteristic to be entered, when the user selects to enter a fingerprint, fingerprint entry interfaces 1603 to 1605 are loaded, and the user enters a fingerprint in the fingerprint entry interface. The mobile phone stores the corresponding relation between the fingerprint input by the user and the watch. After the fingerprint is successfully entered, the mobile phone loads the successful entry interface 1606
It should be noted that the fingerprint entered by the user for the mobile phone and the fingerprint entered for the smart watch should be different fingerprints.
Optionally, the mobile phone sends the fingerprint entered by the user for the smart watch to the smart watch as a reference fingerprint. Thus, referring to FIG. 13, as shown at 1701, when a user enters a fingerprint on a cell phone, the cell phone compares the fingerprint that the user has entered this time with a pre-stored reference fingerprint to authenticate the user and confirm the device (whether the cell phone or the smart watch) that the user wants to operate. When the device which the user wants to operate is confirmed to be the watch and the user is successfully authenticated, as shown by 1702, the mobile phone sends an indication signal that the fingerprint identification is successful to the watch, and after the watch receives the indication signal that the fingerprint identification is successful, the watch jumps to an interface 1704 with an icon of an APP displayed on the interface 1703 to show that the unlocking is successful, and then the user can operate the smart watch.
Optionally, when the fingerprints of the plurality of different devices are entered into the mobile phone, the mobile phone may respectively replace the different devices to perform the identity authentication on the user and notify the corresponding devices after the identity authentication is successful, and the devices execute corresponding operations according to the identity authentication result sent by the mobile phone.
For example, a user may unlock different devices on a cell phone using different fingerprints. For example: fingerprint 1 of cell-phone 2, fingerprint 2 of smart watch1, fingerprint 3 of smart watch 2 and fingerprint 4 of smart television have been typeeed respectively on cell-phone 1. When the user inputs the fingerprint 1 into the mobile phone1, the mobile phone1 unlocks the mobile phone2 after the fingerprint identification succeeds, and when the user inputs the fingerprint 2 into the mobile phone1, the mobile phone1 unlocks the smart watch1 after the fingerprint identification succeeds. When the user inputs the fingerprint 3 into the mobile phone1, the mobile phone1 unlocks the smart watch 2 after the fingerprint identification is successful. When a user inputs a fingerprint 4 on the mobile phone1, the mobile phone1 is successfully subjected to fingerprint identification, and then the smart television is turned on.
Optionally, in order to protect the privacy of the user, fingerprints of different users are input into the mobile phone for the smart watch, and different operation permissions are set for the different users. Therefore, for the key data of the smart watch, only part of users have the permission to view the key data, and other users cannot view the key data.
For example, as shown in fig. 13, when a user 1 inputs a fingerprint 1 on a mobile phone, the user 1 is authenticated, after the user 1 succeeds in authentication, the mobile phone sends an instruction to the smart watch, after receiving the instruction, the smart watch succeeds in unlocking and provides all functions for the user 1 to operate, and an interface 1704 displays icons of all APPs.
Referring to fig. 14, as shown at 1801, when user 2 enters a fingerprint 2 on the handset, the handset authenticates user 2. After the identity authentication is successful, as shown in 1802, the mobile phone sends an instruction to the smart watch, and after receiving the instruction, the smart watch jumps to an interface 1804 from an interface 1803 to indicate that the unlocking is successful, and provides partial functions for the user 2 to operate. Specifically, compare with interface 1704, interface 1804 only shows the icon of these two APPs of "rhythm of the heart" and "alarm clock", does not show the icon of this APP of "setting" and "payment treasured", shows that the user can't change the setting of smart watch and can't operate the payment treasured, and then user 2 can't learn privacy information such as user's payment treasured balance. In other implementations, a portion of the icons on the smartwatch are gray, indicating that the user cannot operate the application to which the gray icon corresponds. The remaining icons are displayed normally indicating that the user can manipulate the other icons.
The interaction flow, the indication signaling, and the like related to the embodiment of the present application may be encrypted or unencrypted, which is not limited in the embodiment of the present application.
The above-mentioned scheme provided by the embodiment of the present application is introduced mainly from the perspective of interaction between network elements. It is to be understood that each network element, for example, the first device, the second device, etc., contains corresponding hardware structures and/or software modules for performing each function in order to realize the functions. Those of skill in the art would readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the first device, the second device, and the like may be divided into functional modules according to the above method examples, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. It should be noted that, in the embodiment of the present application, the division of the module is schematic, and is only one logic function division, and there may be another division manner in actual implementation.
In the case of dividing each functional module by corresponding functions, fig. 15 shows a possible structural diagram of the first device according to the above embodiment, and the first device 1900 includes: a connection unit 1901, an acquisition unit 1902, and a transmission unit 1903. The connection unit 1901 is used to support the first device 1900 to perform the processes 401 and 404 in fig. 4 and other processes in the method embodiment. The obtaining unit 1902 is configured to support the first device 1900 to execute the process 402 in fig. 4, the processes 4021a and 4022a in fig. 4a, the processes 4021b and 4022b in fig. 4b, and other processes in the method embodiment. The sending unit 1903 is configured to support the first device 1900 to perform the process 403 in fig. 4 and other processes in the method embodiment.
All relevant contents of each step related to the above method embodiment may be referred to the functional description of the corresponding functional module, and are not described herein again.
Fig. 15a shows a possible schematic configuration of the first device according to the above exemplary embodiment, in the case of an integrated unit. The first device 2000 includes: a processing module 2002 and a communication module 2003. The processing module 2002 is used to control and manage the actions of the first device, e.g., the processing module 2002 is used to support the first device to perform the processes 401, 402, 404 in fig. 4, the processes 4021a, 4022a in fig. 4a, the processes 4021b and 4022b in fig. 4b, and/or other processes for the techniques described herein. The communication module 2003 is used to support communication between the first device and other network entities, for example, a second device. The first device may also include a memory module 2001 for storing program codes and data of the first device.
The Processing module 2002 may be a Processor or a controller, such as a Central Processing Unit (CPU), a general purpose Processor, a Digital Signal Processor (DSP), an Application-Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor may also be a combination of computing functions, e.g., comprising one or more microprocessors, DSPs, and microprocessors, among others. The communication module 2003 may be a transceiver, a transceiving circuit, a communication interface, or the like. The memory module 2001 may be a memory.
When the processing module 2002 is a processor, the communication module 2003 is a transceiver, and the storage module 2001 is a memory, the first device according to the embodiment of the present application may be the first device shown in fig. 15 b.
Referring to fig. 15b, the first apparatus 2100 includes: a processor 2101, a transceiver 2102, a memory 2103, and a bus 2104. Wherein the transceiver 2102, the processor 2101 and the memory 2103 are interconnected via a bus 2104; the bus 2104 may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 15b, but this does not indicate only one bus or one type of bus.
In the case of dividing each functional module by corresponding functions, fig. 16 shows a possible structural diagram of the second device involved in the above embodiment, and the second device 2200 includes: a connection unit 2201 and a reception unit 2202. The connection unit 2201 is configured to support the second device 2200 to perform the processes 401 and 404 in fig. 4, and the receiving unit 2202 is configured to support the second device 2200 to perform the process 403 in fig. 4.
All relevant contents of each step related to the above method embodiment may be referred to the functional description of the corresponding functional module, and are not described herein again.
Fig. 16a shows a possible schematic configuration of the second device according to the above exemplary embodiment, in the case of an integrated unit. The second device 2300 includes: a processing module 2302 and a communication module 2303. The processing module 2302 is used to control and manage the actions of the second device, e.g., the processing module 2302 is used to support the second device performing the processes 401, 402 in fig. 4 and/or other processes for the techniques described herein. The communication module 2303 is used to support communication between the second device and other network entities, such as with the first device. The second device may further include a storage module 2301 for storing program codes and data of the second device.
The Processing module 2302 may be a Processor or a controller, and may be, for example, a Central Processing Unit (CPU), a general-purpose Processor, a Digital Signal Processor (DSP), an Application-Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor may also be a combination of computing functions, e.g., comprising one or more microprocessors, DSPs, and microprocessors, among others. The communication module 2303 may be a transceiver, a transceiving circuit, a communication interface, or the like. The storage module 2301 may be a memory.
When the processing module 2302 is a processor, the communication module 2303 is a transceiver, and the storage module 2301 is a memory, the second device according to the embodiment of the present application may be the second device shown in fig. 16 b.
Referring to fig. 16b, the second device 2400 includes: a processor 2401, a transceiver 2402, a memory 2403, and a bus 2404. Wherein, the transceiver 2402, the processor 2401 and the memory 2403 are connected to each other through a bus 2404; the bus 2404 may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 16b, but this does not indicate only one bus or one type of bus.
Referring to fig. 17, an embodiment of the present application provides a connection establishment system 2500, where the connection establishment system 2500 includes a first device 2501, a second device 2502, and a third device 2503. The first device 2501 is configured to obtain attribute data of the third device 2503, and send the attribute data to the second device 2502. The second device 2502 is configured to establish a connection with the third device 2503 according to the attribute data of the third device 2503.
In the case of dividing each functional module by corresponding functions, fig. 18 shows a possible structural diagram of the first device involved in the above embodiment, and the first device 2600 includes: a connection unit 2601, a reception unit 2602, and a transmission unit 2603. Connection unit 2601 is configured to support first device 2600 to perform procedure 1301 in fig. 11, receive unit 2602 is configured to support first device 2600 to perform procedure 1302 in fig. 11, procedure 1401 in fig. 11a, and procedure 1501 in fig. 11b, and transmit unit 2603 is configured to support first device 2600 to perform procedure 1303 in fig. 11, procedure 1303a in fig. 11a, and procedures 1502 and 1303b in fig. 11 b.
All relevant contents of each step related to the above method embodiment may be referred to the functional description of the corresponding functional module, and are not described herein again.
Fig. 18a shows a possible schematic configuration of the first device according to the above exemplary embodiment, in the case of an integrated unit. The first apparatus 2700 includes: a processing module 2702 and a communication module 2703. Processing module 2702 is used to control and manage the actions of first device 2700, e.g., processing module 2702 is used to support the first device in performing process 1301 in fig. 11, process 1303a in fig. 11a, and/or other processes for the techniques described herein. The communication module 2703 is used to support communication between the first device and other network entities, for example, communication with a second device. The first device may also include a storage module 2701 for storing program codes and data of the first device.
The Processing module 2702 may be a Processor or a controller, such as a Central Processing Unit (CPU), a general purpose Processor, a Digital Signal Processor (DSP), an Application-Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor may also be a combination of computing functions, e.g., comprising one or more microprocessors, DSPs, and microprocessors, among others. The communication module 2703 may be a transceiver, a transceiving circuit, a communication interface, or the like. The storage module 2701 may be a memory.
When the processing module 2702 is a processor, the communication module 2703 is a transceiver, and the storage module 2701 is a memory, the first device according to the embodiment of the present application may be the first device shown in fig. 15 b.
Referring to fig. 18b, the first device 2800 includes: a processor 2801, a transceiver 2802, a memory 2803, and a bus 2804. Wherein the transceiver 2802, the processor 2801, and the memory 2803 are connected to each other by a bus 2804; the bus 2804 may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 18b, but this does not indicate only one bus or one type of bus.
In the case of dividing each functional module by corresponding functions, fig. 19 shows a possible structural diagram of the second device according to the above embodiment, and the second device 2900 includes: a connection unit 2901, a reception unit 2902, and a processing unit 2903. The connection unit 2901 is configured to support the second device 2900 to execute the process 1301 in fig. 11, the receiving unit 2902 is configured to support the second device 2900 to execute the process 1303 in fig. 11, the process 1303a in fig. 11a, and the processes 1502 and 1303b in fig. 11b, and the processing unit 2903 is configured to support the second device 2900 to execute the process 1304 in fig. 11.
All relevant contents of each step related to the above method embodiment may be referred to the functional description of the corresponding functional module, and are not described herein again.
Fig. 19a shows a possible structural representation of the second device according to the exemplary embodiment described above, in the case of an integrated unit. The second device 3000 includes: a processing module 3002 and a communication module 3003. Processing module 3002 is used to control and manage actions of the second device, e.g., processing module 3002 is used to support the second device in performing processes 1301, 1304 in fig. 11 and/or other processes for the techniques described herein. The communication module 3003 is used to support communication between the second device and other network entities, for example, with the first device. The second device may further comprise a storage module 3001 for storing program codes and data of the second device.
The Processing module 3002 may be a Processor or a controller, such as a Central Processing Unit (CPU), a general purpose Processor, a Digital Signal Processor (DSP), an Application-Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor may also be a combination of computing functions, e.g., comprising one or more microprocessors, DSPs, and microprocessors, among others. The communication module 3003 may be a transceiver, a transceiver circuit, a communication interface, or the like. The storage module 3001 may be a memory.
When the processing module 3002 is a processor, the communication module 3003 is a transceiver, and the storage module 3001 is a memory, the second device according to the embodiment of the present application may be the second device shown in fig. 19 b.
Referring to fig. 19b, the second device 3100 includes: a processor 3101, a transceiver 3102, a memory 3103, and a bus 3104. Among them, the transceiver 3102, the processor 3101, and the memory 3103 are connected to each other through a bus 3104; the bus 3104 may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 19b, but this does not indicate only one bus or one type of bus.
Referring to fig. 20, an embodiment of the present application provides an authentication system 3200, where the connection establishing system 3200 includes a first device 3201 and a second device 3202. Wherein the first device 3201 and the second device 3202 are configured to interact to implement the methods illustrated in fig. 11, 11a, and 11 b.
The steps of a method or algorithm described in connection with the disclosure herein may be embodied in hardware or in software instructions executed by a processor. The software instructions may be comprised of corresponding software modules that may be stored in Random Access Memory (RAM), flash Memory, Read Only Memory (ROM), Erasable Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), registers, a hard disk, a removable disk, a compact disc Read Only Memory (CD-ROM), or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an ASIC.
Those skilled in the art will recognize that in one or more of the examples described above, the functions described herein may be implemented in hardware, software, firmware, or any combination thereof. When implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
The above-mentioned embodiments, objects, technical solutions and advantages of the present application are further described in detail, it should be understood that the above-mentioned embodiments are only examples of the present application, and are not intended to limit the scope of the present application, and any modifications, equivalent substitutions, improvements and the like made on the basis of the technical solutions of the present application should be included in the scope of the present application.
Claims (12)
1. A method for connection establishment, the method comprising:
the method comprises the steps that a first device acquires attribute data of a third device and sends the attribute data to a second device, wherein the second device comprises a wearable device, and the attribute data cannot be acquired by the second device due to lack of target functions;
the second equipment receives the attribute data sent by the first equipment and establishes connection with the third equipment according to the attribute data;
the first device acquiring attribute data of a third device includes:
the first device receives indication signaling of the second device, wherein the indication signaling is used for indicating the first device to enable the target function; the target function is a shooting function;
the first equipment scans an information identification code of the third equipment through the shooting function according to the indication signaling of the second equipment, wherein the information identification code carries attribute data of the third equipment;
the first equipment analyzes the information identification code to obtain attribute data of the third equipment;
or the first device acquires attribute data of a third device, including:
the first device receives an indication operation input by a user, wherein the indication operation is used for indicating the first device to enable the target function; the target function is a shooting function;
the first equipment scans an information identification code of the third equipment through the shooting function according to the indication operation, wherein the information identification code carries attribute data of the third equipment;
and the first equipment analyzes the information identification code to obtain attribute data of the third equipment.
2. A method for connection establishment, the method comprising:
establishing a connection between a first device and a second device, the second device comprising a wearable device;
the first equipment acquires attribute data of third equipment, wherein the attribute data is the attribute data which cannot be acquired by the second equipment due to lack of target functions;
the first device sends attribute data of the third device to the second device connected with the first device, so that the second device establishes connection with the third device according to the attribute data of the third device;
the first device acquiring attribute data of a third device includes:
the first equipment receives indication signaling of the second equipment, wherein the indication signaling is used for indicating that the first equipment enables a target function; the target function is a shooting function;
the first equipment scans an information identification code of the third equipment through the shooting function according to the indication signaling of the second equipment, wherein the information identification code carries attribute data of the third equipment;
the first equipment analyzes the information identification code to obtain attribute data of the third equipment;
or the first device acquires attribute data of a third device, including:
the first device receives an indication operation input by a user, wherein the indication operation is used for indicating that the first device enables a target function; the target function is a shooting function;
the first equipment scans an information identification code of the third equipment through the shooting function according to the indication operation, wherein the information identification code carries attribute data of the third equipment;
and the first equipment analyzes the information identification code to obtain attribute data of the third equipment.
3. The method of claim 2, wherein the first device obtains attribute data of a third device, comprising:
the first device and the third device establish a Near Field Communication (NFC) connection;
and the first equipment acquires the attribute data of the third equipment through the established NFC connection.
4. A method of device connectivity, the method comprising:
the second equipment and the first equipment establish connection;
the second equipment receives attribute data of third equipment sent by the first equipment, wherein the attribute data is the attribute data which cannot be obtained by the second equipment due to lack of a target function;
the second equipment establishes connection with the third equipment according to the attribute data of the third equipment;
before the second device receives the attribute data of the third device sent by the first device, the method further includes:
the second device sends an indication signaling to the first device, wherein the indication signaling is used for indicating the first device to enable a target function, and the target function is a shooting function.
5. A connection establishment apparatus characterized by comprising, as a first apparatus:
a connection unit for establishing a connection with a second device, the second device comprising a wearable device;
an acquisition unit configured to acquire attribute data of a third device, the attribute data being attribute data that the second device cannot acquire due to lack of a target function;
a sending unit, configured to send attribute data of the third device to the second device, so that the second device establishes a connection with the third device according to the attribute data of the third device;
the obtaining unit is specifically further configured to receive an indication signaling of the second device, where the indication signaling is used to indicate that the first device enables a target function, and the target function is a shooting function; scanning an information identification code of the third equipment through the shooting function according to the indication signaling of the second equipment, wherein the information identification code carries attribute data of the third equipment; analyzing the information identification code to obtain attribute data of the third equipment;
the acquiring unit is specifically further configured to receive an instruction operation input by a user, where the instruction operation is used to instruct the first device to enable a target function, and the target function is a shooting function; scanning an information identification code of the third equipment through the shooting function according to the indication operation, wherein the information identification code carries attribute data of the third equipment; and analyzing the information identification code to obtain attribute data of the third equipment.
6. Connection establishment device according to claim 5,
the acquiring unit is configured to establish an NFC connection with the third device through the connecting unit; and acquiring attribute data of the third device through the established NFC connection.
7. A connection establishment apparatus characterized by comprising, as a second apparatus:
a connection unit for establishing a connection with a first device;
a receiving unit, configured to receive attribute data of a third device sent by the first device, where the attribute data is attribute data that cannot be obtained by the second device due to lack of a target function;
the connection unit is further configured to establish a connection with the third device according to the attribute data of the third device received by the receiving unit;
a sending unit, configured to send an indication signaling to the first device, where the indication signaling is used to indicate that the first device enables a target function, and the target function is a shooting function.
8. A connection establishing apparatus, characterized in that the connection establishing apparatus is a first apparatus, the connection establishing apparatus comprising a transceiver, one or more processors and a memory for storing computer program code, the computer program code comprising instructions, which when executed by the one or more processors, the connection establishing apparatus performs the method of any of claims 2 to 3.
9. A connection establishing apparatus as a second apparatus, the connection establishing apparatus comprising a transceiver, one or more processors, and memory for storing computer program code, the computer program code comprising instructions, which when executed by the one or more processors, cause the connection establishing apparatus to perform the method of claim 4.
10. A connection establishment system, characterized in that the system comprises the first device of claim 8, the second device of claim 9, and a third device, the first device is configured to acquire attribute data of the third device, and send the attribute data to the second device, the attribute data being attribute data that the second device cannot acquire due to lack of a target function; the second device is used for establishing connection with the third device according to the attribute data of the third device; the first device acquiring attribute data of a third device includes: the first device receives an indication signaling of the second device, wherein the indication signaling is used for indicating the first device to enable the target function, and the target function is a shooting function; the first equipment scans an information identification code of the third equipment through the shooting function according to the indication signaling of the second equipment, wherein the information identification code carries attribute data of the third equipment; the first equipment analyzes the information identification code to obtain attribute data of the third equipment; or the first device acquires attribute data of a third device, including: the first device receives an indication operation input by a user, wherein the indication operation is used for indicating the first device to enable the target function, and the target function is a shooting function; the first equipment scans an information identification code of the third equipment through the shooting function according to the indication operation, wherein the information identification code carries attribute data of the third equipment; and the first equipment analyzes the information identification code to obtain attribute data of the third equipment.
11. A computer-readable storage medium having stored thereon instructions which, when executed on a computer, cause the computer to perform the method of any of claims 2 to 3.
12. A computer-readable storage medium having stored thereon instructions which, when executed on a computer, cause the computer to perform the method of claim 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111034827.0A CN113766672B (en) | 2017-05-31 | 2017-05-31 | Connection establishment method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/086701 WO2018218541A1 (en) | 2017-05-31 | 2017-05-31 | Connection establishment method and device |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111034827.0A Division CN113766672B (en) | 2017-05-31 | 2017-05-31 | Connection establishment method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109716854A CN109716854A (en) | 2019-05-03 |
CN109716854B true CN109716854B (en) | 2021-12-31 |
Family
ID=64455194
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201780056634.0A Active CN109716854B (en) | 2017-05-31 | 2017-05-31 | Connection establishing method, device, system and medium |
CN202111034827.0A Active CN113766672B (en) | 2017-05-31 | 2017-05-31 | Connection establishment method and device |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111034827.0A Active CN113766672B (en) | 2017-05-31 | 2017-05-31 | Connection establishment method and device |
Country Status (2)
Country | Link |
---|---|
CN (2) | CN109716854B (en) |
WO (1) | WO2018218541A1 (en) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020242964A1 (en) * | 2019-05-29 | 2020-12-03 | Dexcom, Inc. | System and method for wireless communication of analyte data |
CN112312366B (en) * | 2019-07-26 | 2022-10-28 | 华为技术有限公司 | Method, electronic equipment and system for realizing functions through NFC (near field communication) tag |
CN113766671A (en) * | 2020-06-01 | 2021-12-07 | 深圳Tcl新技术有限公司 | WiFi connection control method and system based on two-dimensional code and display terminal |
CN111988769A (en) * | 2020-07-24 | 2020-11-24 | 青岛经济技术开发区海尔热水器有限公司 | Equipment function setting method and system |
CN112286070B (en) * | 2020-10-30 | 2024-10-22 | 维沃移动通信(杭州)有限公司 | Equipment control method and device and electronic equipment |
CN112770201A (en) * | 2020-11-16 | 2021-05-07 | 无锡时柒伍科技有限公司 | Lyric display stereo set that bluetooth is connected |
CN115134402B (en) * | 2021-03-29 | 2024-06-04 | 华为技术有限公司 | Equipment connection method and electronic equipment |
CN113297556A (en) * | 2021-07-01 | 2021-08-24 | 读书郎教育科技有限公司 | Student flat handwriting unlocking device and method based on intelligent desk lamp |
CN113543103A (en) * | 2021-07-13 | 2021-10-22 | 读书郎教育科技有限公司 | Student flat plate unlocking method and device based on intelligent desk lamp gait recognition |
CN113853031B (en) * | 2021-09-18 | 2024-04-02 | 雅迪科技集团有限公司 | Helmet connection mode switching method and device |
CN113919457A (en) * | 2021-09-30 | 2022-01-11 | 联想(北京)有限公司 | Processing method and related equipment |
CN114389910A (en) * | 2022-01-12 | 2022-04-22 | 湖北星纪时代科技有限公司 | Terminal control method and terminal control device based on UWB implementation |
CN114882691A (en) * | 2022-06-15 | 2022-08-09 | 杨宏伟 | Equipment control method, system and device based on image recognition and control equipment |
WO2024087071A1 (en) * | 2022-10-26 | 2024-05-02 | 华为技术有限公司 | Communication method, apparatus, and system |
CN117864059A (en) * | 2023-06-30 | 2024-04-12 | 花瓣支付(深圳)有限公司 | Vehicle control system, method and electronic equipment |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106658360A (en) * | 2016-10-19 | 2017-05-10 | 广东欧珀移动通信有限公司 | Data transmission method and data transmission device |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102180959B1 (en) * | 2013-12-09 | 2020-11-19 | 삼성전자주식회사 | Adaptive beam sweeping coordination method and apparatus in a wireless communication system |
CN103701000B (en) * | 2013-12-27 | 2017-04-19 | 北京奇虎科技有限公司 | Smart Hub with Bluetooth pairing function and Bluetooth pairing method thereof |
CN104202523B (en) * | 2014-09-01 | 2017-06-30 | 广东欧珀移动通信有限公司 | Realize controlling many method and system of camera installation simultaneously by Wearable |
US20160065374A1 (en) * | 2014-09-02 | 2016-03-03 | Apple Inc. | Method of using one device to unlock another device |
CN205050141U (en) * | 2014-09-30 | 2016-02-24 | 苹果公司 | Electronic equipment |
KR20160042569A (en) * | 2014-10-10 | 2016-04-20 | 삼성전자주식회사 | Multi-connection method and electronic device supporting the same |
US10219242B2 (en) * | 2015-01-20 | 2019-02-26 | Futurewei Technologies, Inc. | System and method for delivering notifications |
CN105430760B (en) * | 2015-10-30 | 2019-10-22 | 上海摩软通讯技术有限公司 | Connection method and system between equipment |
CN105938526A (en) * | 2016-03-07 | 2016-09-14 | 李明 | Identity authentication method and system |
CN105959287A (en) * | 2016-05-20 | 2016-09-21 | 中国银联股份有限公司 | Biological feature based safety certification method and device |
CN106488394A (en) * | 2016-10-19 | 2017-03-08 | 广东欧珀移动通信有限公司 | A kind of method and device of equipment connection |
-
2017
- 2017-05-31 WO PCT/CN2017/086701 patent/WO2018218541A1/en active Application Filing
- 2017-05-31 CN CN201780056634.0A patent/CN109716854B/en active Active
- 2017-05-31 CN CN202111034827.0A patent/CN113766672B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106658360A (en) * | 2016-10-19 | 2017-05-10 | 广东欧珀移动通信有限公司 | Data transmission method and data transmission device |
Also Published As
Publication number | Publication date |
---|---|
WO2018218541A1 (en) | 2018-12-06 |
CN113766672B (en) | 2023-11-21 |
CN109716854A (en) | 2019-05-03 |
CN113766672A (en) | 2021-12-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109716854B (en) | Connection establishing method, device, system and medium | |
US11269981B2 (en) | Information displaying method for terminal device and terminal device | |
RU2618932C2 (en) | Method, installation and device of unblocking process for terminal | |
CN107437009B (en) | Authority control method and related product | |
CN108521494B (en) | Terminal control method and device, readable storage medium and terminal | |
KR102162955B1 (en) | Method for performing authentication using biometrics information and portable electronic device supporting the same | |
CN106778175B (en) | Interface locking method and device and terminal equipment | |
US11184754B2 (en) | Data sharing method and terminal | |
US20130007876A1 (en) | System and method of providing biometric quick launch | |
EP3454240B1 (en) | Unlocking methods and related products | |
CN108288154B (en) | Starting method and device of payment application program and mobile terminal | |
US20170374065A1 (en) | Method and apparatus for performing operations associated with biometric templates | |
CN106445596B (en) | Method and device for managing setting items | |
WO2018094920A1 (en) | Ppg authentication method and device | |
CN107451450B (en) | Biometric identification method and related product | |
KR102544488B1 (en) | Electronic apparatus and method for performing authentication | |
CN107516070B (en) | Biometric identification method and related product | |
CN104573437B (en) | Information authentication method, device and terminal | |
JP7532720B2 (en) | Terminal, method, computer-readable storage medium and computer program | |
WO2018223402A1 (en) | Function control method and terminal | |
WO2019019837A1 (en) | Biological identification method and related product | |
CN106570383A (en) | Unlocking method and apparatus for mobile terminal, and mobile terminal | |
CN108537025B (en) | Privacy protection method and device, computer readable storage medium and terminal | |
CN108491713B (en) | Safety reminding method and electronic equipment | |
CN107480495B (en) | Unlocking method of mobile terminal and related product |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |