CN111212090A - Terminal list acquisition method and device, computer equipment and storage medium - Google Patents
Terminal list acquisition method and device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN111212090A CN111212090A CN202010104376.2A CN202010104376A CN111212090A CN 111212090 A CN111212090 A CN 111212090A CN 202010104376 A CN202010104376 A CN 202010104376A CN 111212090 A CN111212090 A CN 111212090A
- Authority
- CN
- China
- Prior art keywords
- terminal
- information
- tag
- tag information
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 64
- 238000004590 computer program Methods 0.000 claims description 22
- 230000003993 interaction Effects 0.000 claims description 16
- 238000004891 communication Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 10
- 230000002452 interceptive effect Effects 0.000 description 5
- 238000012795 verification Methods 0.000 description 5
- 230000008569 process Effects 0.000 description 4
- 238000001514 detection method Methods 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The application relates to a terminal list acquisition method, a terminal list acquisition device, computer equipment and a storage medium. The method comprises the following steps: sending a first tag acquisition request to a server, and receiving first tag information returned by the server according to the first tag acquisition request, wherein the first tag information is the tag information distributed to a first terminal by the server; acquiring a target corresponding relation between second label information and terminal identification information of a second terminal, wherein the second label information is label information distributed to the second terminal by a server; and determining an identifiable terminal list of the first terminal according to the first tag information and the target corresponding relation, wherein the identifiable terminal list comprises terminal identification information of the identifiable terminal of the first terminal. By adopting the method, the recognizable terminal list of the first terminal can be obtained, so that the equipment visibility is controlled, and the privacy is improved.
Description
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for acquiring a terminal list, a computer device, and a storage medium.
Background
DLNA is known as Digital Living Network Alliance (Digital Living Network Alliance) and is intended to be an enterprise organization, a photo and video. DLNA is initiated by sony, intel, microsoft, etc. and is established to solve the interconnection and interworking between wireless networks and wired networks including personal PCs, consumer electronics, mobile devices, etc., so that unlimited sharing and growth of digital media and content services become possible, and there are many member companies at present.
The DLNA includes devices such as DMS (Digital Media Server) for storing and providing Media contents, DMR, DMC, etc.; the DMC (Digital Media Controller) is used for searching the DMS content and pushing the DMS content to the DMR; the DMR (Digital Media renderer) is used to play the DMS content pushed by the DMC.
However, in the prior art, no authority verification is performed between the DMC and the DMR accessing the local area network, and as long as the devices conform to the DLNA specification, the devices can be scanned by the DMC to push the content, that is, all DMR devices are visible to the DMC by default, which causes a problem of insufficient privacy of the DLNA devices.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a terminal list acquiring method, apparatus, computer device and storage medium, which can acquire a recognizable terminal list of a first terminal, thereby controlling device visibility and improving privacy.
In one embodiment, a terminal list acquisition method is provided, and the method includes:
sending a first tag acquisition request to a server, and receiving first tag information returned by the server according to the first tag acquisition request, wherein the first tag information is the tag information distributed to a first terminal by the server;
acquiring a target corresponding relation between second label information and terminal identification information of a second terminal, wherein the second label information is label information distributed to the second terminal by a server;
and determining an identifiable terminal list of the first terminal according to the first tag information and the target corresponding relation, wherein the identifiable terminal list comprises terminal identification information of the identifiable terminal of the first terminal.
In one embodiment, another terminal list acquisition method is provided, and the method includes:
sending a second tag obtaining request to the server, and obtaining second tag information returned by the server according to the second tag obtaining request, wherein the second tag information is tag information distributed to a second terminal by the server;
the second tag information is used for indicating the first terminal to determine an identifiable terminal list of the first terminal according to the first tag information and the corresponding relation between the second tag information and the terminal identification information of the second terminal, the identifiable terminal list comprises the terminal identification information of the identifiable terminal of the first terminal, and the first tag information is the tag information distributed to the first terminal by the server.
In one embodiment, a further method for acquiring a terminal list is provided, where the method includes:
receiving a first tag obtaining request sent by a first terminal, and returning first tag information to the first terminal according to the first tag obtaining request, wherein the first tag information is the tag information distributed to the first terminal by a server;
receiving a second tag obtaining request sent by a second terminal, and returning second tag information to the second terminal according to the second tag obtaining request, wherein the second tag information is the tag information distributed to the second terminal by a server;
the first tag information and the second tag information are used for indicating the first terminal to determine an identifiable terminal list of the first terminal according to the corresponding relation between the first tag information and the second tag information and the terminal identification information of the second terminal, and the identifiable terminal list comprises the terminal identification information of the identifiable terminal of the first terminal.
A terminal list acquisition apparatus, the apparatus comprising:
the first server interaction module is used for sending a first tag obtaining request to the server and receiving first tag information returned by the server according to the first tag obtaining request, wherein the first tag information is tag information distributed to the first terminal by the server.
And the second terminal information acquisition module is used for acquiring the corresponding relation between the second label information and the terminal identification information of the second terminal, wherein the second label information is the label information distributed to the second terminal by the server.
And the first checking module is used for determining an identifiable terminal list of the first terminal according to the first label information and the corresponding relation, wherein the identifiable terminal list comprises the terminal identification information of the identifiable terminal of the first terminal.
Or the second server interaction module is configured to send a second tag acquisition request to the server, acquire second tag information returned by the server according to the second tag acquisition request, where the second tag information is tag information allocated to the second terminal by the server.
The second tag information is used for indicating the first terminal to determine an identifiable terminal list of the first terminal according to the first tag information and the corresponding relation between the second tag information and the terminal identification information of the second terminal, the identifiable terminal list comprises the terminal identification information of the identifiable terminal of the first terminal, and the first tag information is the tag information distributed to the first terminal by the server.
Or, the interface module is configured to receive a first tag acquisition request sent by the first terminal, and return first tag information to the first terminal according to the first tag acquisition request, where the first tag information is tag information allocated to the first terminal by the server; and also receiving a second tag acquisition request sent by the second terminal, and returning second tag information to the second terminal according to the second tag acquisition request, wherein the second tag information is the tag information distributed to the second terminal by the server.
The first tag information and the second tag information are used for indicating the first terminal to determine an identifiable terminal list of the first terminal according to the corresponding relation between the first tag information and the second tag information and the terminal identification information of the second terminal, and the identifiable terminal list comprises the terminal identification information of the identifiable terminal of the first terminal.
A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
the method comprises the steps of sending a first label obtaining request to a server, and receiving first label information returned by the server according to the first label obtaining request, wherein the first label information is label information distributed to a first terminal by the server.
And acquiring the target corresponding relation between the second label information and the terminal identification information of the second terminal, wherein the second label information is the label information distributed to the second terminal by the server.
And determining an identifiable terminal list of the first terminal according to the first tag information and the target corresponding relation, wherein the identifiable terminal list comprises terminal identification information of the identifiable terminal of the first terminal.
Or sending a second tag obtaining request to the server, and obtaining second tag information returned by the server according to the second tag obtaining request, wherein the second tag information is tag information distributed to the second terminal by the server.
The second tag information is used for indicating the first terminal to determine an identifiable terminal list of the first terminal according to the first tag information and the corresponding relation between the second tag information and the terminal identification information of the second terminal, the identifiable terminal list comprises the terminal identification information of the identifiable terminal of the first terminal, and the first tag information is the tag information distributed to the first terminal by the server.
Or receiving a first tag obtaining request sent by the first terminal, and returning first tag information to the first terminal according to the first tag obtaining request, wherein the first tag information is the tag information distributed to the first terminal by the server.
And receiving a second tag acquisition request sent by the second terminal, and returning second tag information to the second terminal according to the second tag acquisition request, wherein the second tag information is the tag information distributed to the second terminal by the server.
The first tag information and the second tag information are used for indicating the first terminal to determine an identifiable terminal list of the first terminal according to the corresponding relation between the first tag information and the second tag information and the terminal identification information of the second terminal, and the identifiable terminal list comprises the terminal identification information of the identifiable terminal of the first terminal.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
sending a first tag acquisition request to a server, and receiving first tag information returned by the server according to the first tag acquisition request, wherein the first tag information is the tag information distributed to a first terminal by the server;
and acquiring the target corresponding relation between the second label information and the terminal identification information of the second terminal, wherein the second label information is the label information distributed to the second terminal by the server.
And determining an identifiable terminal list of the first terminal according to the first tag information and the target corresponding relation, wherein the identifiable terminal list comprises terminal identification information of the identifiable terminal of the first terminal.
Or sending a second tag obtaining request to the server, and obtaining second tag information returned by the server according to the second tag obtaining request, wherein the second tag information is tag information distributed to the second terminal by the server.
The second tag information is used for indicating the first terminal to determine an identifiable terminal list of the first terminal according to the first tag information and the corresponding relation between the second tag information and the terminal identification information of the second terminal, the identifiable terminal list comprises the terminal identification information of the identifiable terminal of the first terminal, and the first tag information is the tag information distributed to the first terminal by the server.
Or receiving a first tag obtaining request sent by the first terminal, and returning first tag information to the first terminal according to the first tag obtaining request, wherein the first tag information is the tag information distributed to the first terminal by the server.
Receiving a second tag obtaining request sent by a second terminal, and returning second tag information to the second terminal according to the second tag obtaining request, wherein the second tag information is the tag information distributed to the second terminal by a server; the first tag information and the second tag information are used for indicating the first terminal to determine an identifiable terminal list of the first terminal according to the corresponding relation between the first tag information and the second tag information and the terminal identification information of the second terminal, and the identifiable terminal list comprises the terminal identification information of the identifiable terminal of the first terminal.
According to the terminal list obtaining method, the terminal list obtaining device, the computer equipment and the storage medium, the target corresponding relation of the first label information distributed to the first terminal by the server, the second label information distributed to the second terminal by the server and the terminal identification information of the second terminal is obtained, the recognizable terminal list corresponding to the first terminal can be determined by matching the first label information with the second label information, so that the visibility of the second terminal to the first terminal can be controlled, and the privacy is improved.
Drawings
Fig. 1 is an application environment diagram of a terminal list acquisition method in one embodiment;
fig. 2 is a flowchart illustrating a terminal list acquisition method according to an embodiment;
fig. 3 is a flowchart illustrating a terminal list acquisition method in another embodiment;
fig. 4 is a flowchart illustrating a terminal list acquisition method in yet another embodiment;
fig. 5 is a flowchart illustrating a terminal list acquisition method applied to a second terminal;
FIG. 6 is a schematic diagram of an interaction flow of each device in the technical solution;
fig. 7 is a block diagram showing a configuration of a terminal list acquisition apparatus according to an embodiment;
fig. 8 is a block diagram showing the configuration of a terminal list acquisition apparatus in another embodiment;
fig. 9 is a block diagram showing a configuration of a terminal list acquisition apparatus in still another embodiment;
FIG. 10 is a diagram showing an internal structure of a computer device according to an embodiment.
Fig. 11 is an internal configuration diagram of a computer device in another embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The terminal list acquisition method provided by the application can be applied to the application environment shown in fig. 1. The first terminal 102 and the second terminal 104 communicate with the server 106 through a network, and the first terminal 102 and the second terminal 104 may also communicate with each other through a network. The first terminal 102 is configured to serve as a DMC (digital media Controller) in the DLNA system, and may be, but is not limited to, various desktop computers, notebook computers, smart phones, tablet computers, digital cameras, and portable wearable devices; the second terminal 104 is used as a DMR (Digital Media Renderer) in the DLNA system, and is configured to receive and play Media content pushed by the DMC, and may be but not limited to various screen-projectable devices, such as a television and the like; the server 106 may be implemented as a stand-alone server or as a server cluster comprised of multiple servers.
In an embodiment, as shown in fig. 2, a method for acquiring a terminal list is provided, which is described by taking the method as an example applied to the first terminal in fig. 1, and includes the following steps:
The first terminal may be a DMC (Digital Media Controller) in a DLNA system, and the first tag acquisition request may include terminal identification information of the first terminal; the first tag information is the tag information allocated to the first terminal by a server in the same local area network as the first terminal, and the tag information may be a single permission level parameter or a permission level list including multiple permission level parameters, or a single second terminal tag parameter or a tag list including multiple second terminal tag parameters.
Specifically, a first terminal sends a first tag acquisition request to a server, wherein the first tag acquisition request includes terminal identification information of the first terminal; after receiving a first tag acquisition request, the server distributes first tag information to the first terminal according to a preset service rule and returns the first tag information to the first terminal; in specific implementation, the preset service rule may be to allocate first tag information to the first terminal according to a device type of the first terminal or a time when the server receives the first tag acquisition request, for example: when the device type of the first terminal is a smart phone, the distributed first label information is authority level 1, and when the device type of the first terminal is a tablet computer, the distributed first label information is authority level 2; or, when the time when the server receives the first tag obtaining request is within a first time period, the assigned first tag information is authority level 1, and when the time when the server receives the first tag obtaining request is within a second time period, the assigned first tag information is authority level 2, where the first time period may be set to 9 to 18 points per day, and the second time period may be set to 18 to 22 points per day, or any time period may be set according to the user's needs.
Wherein, the second terminal may be a DMR (Digital Media Renderer) in the DLNA system, and the second tag information is the tag information allocated to the second terminal by the server in step 202, and the second tag information may be a single permission level parameter or a single second terminal tag parameter; the target corresponding relationship is a corresponding relationship between the second tag information of the second terminal and the terminal identification information of the second terminal.
Specifically, the first terminal may obtain, from the server, a target correspondence between the terminal identification information of the second terminal and the second tag information stored in the server, or may directly obtain, from the second terminal, the target correspondence between the terminal identification information of the second terminal and the second tag information.
The identifiable terminal of the first terminal is a second terminal identifiable by the first terminal, namely an identifiable DMR corresponding to the DMC. It can be seen that each first terminal only identifies the corresponding second terminal or terminals, that is, the second terminals in the same local area network are not visible to all the first terminals accessing the local area network. Here, whether the first terminal can recognize one second terminal depends on whether the first tag information and the second tag information assigned to both by the server match.
Specifically, the first terminal matches the first tag information of the first terminal with the acquired second tag information of each second terminal, when the second tag information matches the first tag information, the terminal identification information of the second terminal corresponding to the second tag information is obtained according to the target correspondence, the second terminal is determined to be an identifiable terminal of the first terminal, and an identifiable terminal list is generated according to the terminal identification information of each identifiable terminal. For example, the DMC matches first tag information of the DMC with second tag information of a "modelURL" node of each DMR of the DMR list obtained in step 204, and if the first tag information matches the second tag information, the DMR displays the DMC, that is, the DMR is an identifiable DMR device, and if the first tag information does not match the second tag information, the DMR does not display the DMC.
In the terminal list acquiring method, the recognizable terminal list corresponding to the first terminal can be determined by acquiring the target corresponding relation among the first label information distributed to the first terminal by the server, the second label information distributed to the second terminal by the server and the terminal identification information of the second terminal and matching the first label information with the second label information, so that the visibility of the first terminal by the second terminal can be controlled, and the privacy is improved.
In an embodiment, as shown in fig. 3, a method for acquiring a terminal list is provided, which is described by taking the method as an example applied to the first terminal in fig. 1, and includes the following steps:
Here, for the specific definition of step 302, reference may be made to the above definition of step 202, which is not described herein again.
Here, the first terminal may be a DMC (Digital Media Controller) in the DLNA system, and the second terminal may be a DMR (Digital Media Renderer) in the DLNA system.
Specifically, the DMR may set the second tag information allocated by the server in a "model url" node of the "device service and information description document", and the DMC may discover, through the UPnP detection protocol, a DMR list located in the same local area network as the DMC itself, and acquire the second tag information of the "model url" node of each DMR in the DMR list.
Specifically, the server may assign authority levels to the first terminal and the second terminal, where the first tag information and the second tag information are authority level parameters such as 1, 2, 3, and 4; and comparing the first label information with the second label information, and judging that the second terminal is an identifiable terminal of the first terminal when the first label information and the second label information are the same and the first terminal and the second terminal are positioned at the same authority level.
And 308, if yes, the first terminal judges that the second terminal corresponding to the second tag information is an identifiable terminal of the first terminal.
The identifiable terminal list may include terminal identification information of each identifiable terminal corresponding to the first terminal, that is, a Universally Unique Identifier (UUID) of the identifiable DMR corresponding to the DMC.
If not, it is determined that the second terminal corresponding to the second tag information is not an identifiable terminal of the first terminal in step 312. Specifically, in order to reduce the storage pressure of the first terminal, the second tag information and the terminal identification information corresponding to the second terminal, which are acquired and stored before, may be deleted in the first terminal.
In this embodiment, the method obtains the terminal identifier information of the second terminal and the second tag information of the second terminal by detecting each second terminal in the same local area network as the first terminal, and checks whether the second tag information matches with the first tag information of the first terminal to obtain the recognizable terminal list.
In an embodiment, as shown in fig. 4, a method for acquiring a terminal list is provided, which is described by taking the method as an example applied to the first terminal in fig. 1, and includes the following steps:
step 402, the first terminal sends a first tag obtaining request to the server, and receives first tag information returned by the server according to the first tag obtaining request, wherein the first tag information is tag information distributed to the first terminal by the server.
In step 404, the first terminal obtains, from the server, terminal identification information of each second terminal and second tag information of each second terminal that are registered in the server, where the second tag information is tag information that is allocated to the second terminal by the server.
The server stores registered terminal identification information of each second terminal and second tag information of each second terminal, and the first terminal can also acquire the registered terminal identification information of each second terminal and the second tag information of each second terminal from the server when receiving the first tag information distributed by the server, and obtain the second terminal capable of realizing interactive communication of the first terminal according to the first tag information and the second tag information, namely, the identifiable terminal corresponding to the first terminal.
Step 406, when the second tag information of the second terminal matches the first tag information of the first terminal, determining that the second terminal corresponding to the second tag information is an identifiable terminal of the first terminal.
And step 408, obtaining a list of identifiable terminals according to the terminal identification information of each identifiable terminal.
The list of identifiable terminals is stored in a first terminal, and the first terminal interacts with only a second terminal in the list of identifiable terminals.
In this embodiment, the first terminal directly obtains the terminal identification information of each second terminal and the second tag information of each second terminal registered in the server from the server, so that the first terminal obtains the identifiable terminal list without interacting with the second terminals, and the obtaining efficiency is improved.
In one embodiment, the first tag obtaining request is a first registration request of the first terminal, and the registration step of the first terminal is as follows:
when a first terminal accesses a local area network, a first registration request is sent to a server, wherein the first registration request comprises terminal identification information of the first terminal.
The first terminal receives first label information returned by the server according to the first registration request, wherein the first label information is label information configured for the first terminal after the server completes registration of the first terminal according to the terminal identification information of the first terminal.
In this embodiment, the first terminal sends the first registration request to the server when accessing the local area network, and obtains the first tag information returned by the server according to the first registration request, so that the first tag information allocated by the server can be immediately obtained as soon as the first terminal enters a new local area network, and is stored in the first terminal in advance, thereby facilitating verification and matching of subsequent tag information and improving processing efficiency.
In one embodiment, the first registration request includes terminal identification information of the first terminal and a public key of the first terminal, and the public key of the first terminal is used for encrypting information to be transmitted to the first terminal by the server.
Specifically, a first terminal may generate a public key and a private key through an RSA algorithm, and send a first registration request to a server, where the first registration request includes terminal identification information and the public key of the first terminal; and after receiving the first registration request, the server stores the terminal identification information and the public key of the first terminal, distributes first label information for the first terminal, encrypts information to be transmitted to the first terminal by using the public key of the first terminal, and then transmits the information to the first terminal.
When the first terminal registers on the server, the information to be transmitted to the first terminal by the server includes first tag information allocated by the server for the first terminal, or in order to improve the acquisition efficiency of the identifiable terminal list, the information to be transmitted to the first terminal by the server includes the first tag information, second tag information of each second terminal registered in the server, and terminal identification information of each second terminal registered, and the first terminal can directly obtain the identifiable terminal list according to the information without interacting with the second terminal.
When the first terminal lacks the second terminal information in the current storage, the first terminal may send a request for obtaining the second terminal information to the server, and the server feeds back the second terminal information corresponding to the first terminal according to the request, at this time, the information to be transmitted to the first terminal by the server includes the second tag information of at least one second terminal and the terminal identification information of the second terminal, which are registered in the server.
After receiving the encrypted information sent by the server, the first terminal decrypts the information transmitted to the first terminal by the server according to the private key of the first terminal, so as to obtain the first tag information, or obtain the first tag information, the second tag information of each second terminal registered in the server, and the terminal identification information of each second terminal registered in the server, or obtain the second tag information of at least one second terminal registered in the server and the terminal identification information of the second terminal.
In conclusion, the information sent to the first terminal by the server is encrypted, so that the security of the information interaction between the first terminal and the server is effectively ensured.
Further, the information to be transmitted to the first terminal by the server further includes public keys of the second terminals registered in the server, or when the first terminal sends a target public key acquisition request to the server, the information to be transmitted to the first terminal by the server includes a public key of a target terminal of the first terminal, and the target terminal is one or more second terminals in the identifiable terminal list.
The method comprises the steps that a first terminal encrypts information to be pushed according to a public key of a second terminal to obtain encrypted pushing information, the encrypted pushing information is sent to the corresponding second terminal, and the information to be pushed comprises screen projection information, first label information of the first terminal and the public key of the first terminal.
In this embodiment, the method may encrypt the interaction information between the server and the first terminal through the public key of the first terminal, and encrypt the interaction information between the first terminal and the second terminal through the public key of the second terminal, thereby effectively ensuring the security of the interaction information between the first terminal and other devices.
In an embodiment, as shown in fig. 5, another method for acquiring a terminal list is provided, which is described by taking the method applied to the second terminal in fig. 1 as an example, and includes the following steps:
The second terminal may be a Digital Media Renderer (DMR) in the DLNA system, and the second tag acquisition request may be a second registration request of the second terminal, where the second registration request includes terminal identification information of the second terminal.
Specifically, when the second terminal accesses a new local area network, the second terminal sends a second registration request to the server, where the second registration request may include terminal identification information of the second terminal, and further, the second registration request may further include a public key of the second terminal, where the public key of the second terminal is used to encrypt information to be transmitted to the second terminal by the server, and the information to be transmitted to the second terminal by the server includes second tag information.
And step 504, second label information returned by the server according to the second label acquisition request is acquired, and the second label information is label information distributed to the second terminal by the server.
When the second tag obtaining request is a second registration request of the second terminal, the second tag information is tag information configured for the second terminal by the server after the registration of the second terminal is completed according to the terminal identification information of the second terminal.
Specifically, under the condition that the second registration request includes the terminal identification information and the public key of the second terminal, the information transmitted to the second terminal by the server is the second tag information encrypted by the public key of the second terminal, and at this time, the second terminal decrypts the information transmitted to the second terminal by the server according to the private key of the second terminal to obtain the second tag information.
Here, the second tag information is used to instruct the first terminal to determine an identifiable terminal list of the first terminal according to the first tag information and a correspondence between the second tag information and the terminal identification information of the second terminal, the identifiable terminal list includes the terminal identification information of the identifiable terminal of the first terminal, and the first tag information is the tag information assigned to the first terminal by the server.
The first terminal may be a Digital Media Controller (DMC) in the DLNA system, and the screen projection information is screen projection content that the DMC in the DLNA system needs to project onto the DMR.
Specifically, the first terminal acquires a public key of the second terminal from the server, encrypts the information to be pushed by using the public key of the second terminal, and sends the encrypted push information obtained after encryption to the second terminal.
And step 508, decrypting the encrypted push information according to the private key of the second terminal to obtain screen projection information, and the first tag information and the public key of the first terminal, wherein the public key of the first terminal is used for encrypting the information transmitted to the first terminal by the second terminal.
In specific implementation, if the decryption fails or the second tag information is not matched with the first tag information, the communication with the first terminal is refused. Specifically, when the second terminal is to send information to the first terminal, the public key of the first terminal may be used to encrypt the information content and then send the encrypted information content to the first terminal, and the first terminal decrypts the received encrypted information using the private key of the first terminal to obtain the information content transmitted by the second terminal to the first terminal.
In this embodiment, the second terminal verifies the acquired second tag information and the first tag information of the first terminal, so that the second terminal only processes the message pushed by the matched first terminal, and privacy is ensured; meanwhile, the interactive information between the second terminal and the server and between the second terminal and the first terminal are protected by encryption, and the interactive information security between the devices is better.
In an embodiment, a further terminal list obtaining method is provided, which is described by taking the application of the method to the server in fig. 1 as an example, and includes the following steps:
the server receives a first label obtaining request sent by the first terminal, and returns first label information to the first terminal according to the first label obtaining request, wherein the first label information is the label information distributed to the first terminal by the server.
And the server receives a second label acquisition request sent by the second terminal, and returns second label information to the second terminal according to the second label acquisition request, wherein the second label information is the label information distributed to the second terminal by the server.
The first tag information and the second tag information are used for indicating the first terminal to determine an identifiable terminal list of the first terminal according to the corresponding relation between the first tag information and the terminal identification information of the second terminal, and the identifiable terminal list comprises the terminal identification information of the identifiable terminal of the first terminal.
As a specific implementation manner, the first tag obtaining request is a first registration request of the first terminal, and the first registration request includes terminal identification information and a public key of the first terminal.
Returning first label information to the first terminal according to the first label acquisition request, wherein the first label information comprises: registering the first terminal according to the terminal identification information of the first terminal, and configuring first label information for the first terminal; and sending the first label information encrypted according to the public key of the first terminal to the first terminal.
The second tag obtaining request is a second registration request of the second terminal, and the second registration request includes the terminal identification information and the public key of the second terminal.
Returning second tag information to the second terminal according to the second tag acquisition request, wherein the second tag information comprises: registering the second terminal according to the terminal identification information of the second terminal, and configuring second label information for the second terminal; and sending the second label information encrypted according to the public key of the second terminal to the second terminal.
Specifically, after receiving registration requests of a first terminal and a second terminal, a server establishes a data table for storing device information of each first terminal and each second terminal in a local area network, and allocates the device information to respective tag information of the first terminal and the second terminal, where the device information of the terminal includes terminal identification information.
In the embodiment, the method allocates the tag information to the first terminal and the second terminal respectively through the server, so that the first terminal and the second terminal can perform verification and matching through respective tag information to obtain the identifiable terminal list corresponding to the first terminal, thereby controlling the visibility of the second terminal device and enhancing the privacy of the system.
In one embodiment, the method further comprises:
receiving a target public key acquisition request sent by a first terminal, wherein the target public key acquisition request comprises terminal identification information of the first terminal and terminal identification information of a target terminal;
and sending the public key of the target terminal to the first terminal according to the terminal identification information of the target terminal, wherein the target terminal is one or more second terminals in the identifiable terminal list of the first terminal.
In this embodiment, the server may obtain the public key of the request returned to the target terminal according to the target public key of the first terminal, so that information encryption during interaction between the first terminal and the second terminal is facilitated, and the security of data transmission is ensured.
In one embodiment, the method further comprises: and receiving a first terminal configuration parameter and a second terminal configuration parameter which are input from the outside through a preset interface.
For example, the preset interface may be a management platform interface provided on or connected to the server, the management platform interface may be provided with a list of a plurality of first terminals and second terminals, and an input box is provided at a configuration parameter position corresponding to each of the first terminals and the second terminals, and the input box is configured to receive manually input first terminal configuration parameters and second terminal configuration parameters, such as permission parameters.
And obtaining first label information according to the first terminal configuration parameters. Specifically, after receiving the first terminal configuration parameter, the server checks whether the first terminal configuration parameter meets the format requirement of the first tag information, and if so, sets the first terminal configuration parameter as the first tag information.
And obtaining second label information according to the second terminal configuration parameters. The step of obtaining the second tag information may refer to the above definition of the step of obtaining the first tag information, and is not described herein again.
For example, if the authority level parameter 2 is manually input in the input box corresponding to one first terminal and then the authority level parameter 2 is input in the input boxes corresponding to a plurality of second terminals, the tag information corresponding to the first terminal and the plurality of second terminals is the authority level parameter 2.
In this embodiment, a management platform of the first terminal and the second terminal is provided, which may dynamically configure tag information of the first terminal and the second terminal, and may flexibly adjust an identifiable terminal list of the first terminal and control visibility of the second terminal.
In an embodiment, as shown in fig. 6, a terminal list obtaining method is described by taking an interaction flow among the server, the first terminal and the second terminal in fig. 1 as an example, where the first terminal may be a DMC (Digital media controller) in a DLNA system, and the second terminal may be a DMR (Digital media renderer) in the DLNA system, and the method includes the following steps:
Specifically, the second terminal generates a public key and a private key of the second terminal through an RSA algorithm, and the public key of the second terminal is used for encrypting information to be sent to the second terminal by the first terminal and the server side.
And 606, after receiving the encrypted information, the second terminal decrypts the encrypted information by using a private key of the second terminal to obtain second label information.
Specifically, the second terminal decrypts the information with its own private key to obtain second tag information, and sets the second tag information under a "modelURL" node of the "device service and information description document".
Step 608, when the first terminal accesses the new local area network, the first terminal sends a first registration request to the server, where the first registration request includes the public key of the first terminal and the terminal identification information.
Specifically, the first terminal generates a public key and a private key of the first terminal through an RSA algorithm, and the public key of the first terminal is used for encrypting information to be sent to the first terminal by the second terminal and the server side.
In the embodiment, the server is used for managing the authority of the first terminal and the second terminal of the incoming domain network, different label information is distributed to different terminal devices, the first terminal and the second terminal are checked and matched in the interaction process, and the identifiable terminal list corresponding to the first terminal is obtained, so that the visibility of the second terminal device can be controlled, and the privacy is enhanced; meanwhile, the interactive information among the first terminal, the second terminal and the server can be encrypted, so that the interactive information security among the devices is ensured, and the privacy and security of the DLNA system are improved.
It should be understood that although the various steps in the flow charts of fig. 1-6 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 1-6 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternating with other steps or at least some of the sub-steps or stages of other steps.
In one embodiment, as shown in fig. 7, a terminal list obtaining apparatus is provided, which includes a first server interaction module 702, a second terminal information obtaining module 704, and a first checking module 706, wherein:
the first server interaction module 702 is configured to send a first tag acquisition request to a server, and receive first tag information returned by the server according to the first tag acquisition request, where the first tag information is tag information allocated to the first terminal by the server.
The second terminal information obtaining module 704 is configured to obtain a corresponding relationship between second tag information and terminal identification information of the second terminal, where the second tag information is tag information that is allocated to the second terminal by the server.
The first checking module 706 is configured to determine an identifiable terminal list of the first terminal according to the first tag information and the corresponding relationship, where the identifiable terminal list includes terminal identification information of an identifiable terminal of the first terminal.
In one embodiment, the second terminal information obtaining module 704 includes:
the second terminal detection unit is used for detecting each second terminal in the same local area network with the first terminal and acquiring the terminal identification information of at least one second terminal and the second label information of the second terminal;
a server data acquisition unit configured to acquire, from the server, terminal identification information of each second terminal and second tag information of each second terminal that have been registered in the server; the target corresponding relationship is a corresponding relationship between the second tag information of the second terminal and the terminal identification information of the second terminal.
In one embodiment, the first verification module 706 includes:
the verification unit is used for judging that the second terminal corresponding to the second tag information is an identifiable terminal of the first terminal when the second tag information in the target corresponding relation is matched with the first tag information; and when the second tag information in the target corresponding relationship is not matched with the first tag information, judging that the second terminal corresponding to the second tag information is not an identifiable terminal of the first terminal, and deleting the second tag information and the terminal identification information corresponding to the second terminal. And the list unit is used for obtaining the identifiable terminal list according to the terminal identification information of each identifiable terminal.
In one embodiment, the first tag obtaining request is a first registration request of the first terminal, and the first registration request includes terminal identification information of the first terminal; the first tag information is tag information configured for the first terminal by the server after the registration of the first terminal is completed according to the terminal identification information of the first terminal.
In one embodiment, the first registration request further includes a public key of the first terminal, and the public key of the first terminal is used for encrypting information to be transmitted to the first terminal by the server.
The information to be transmitted to the first terminal by the server includes first tag information, or the information to be transmitted to the first terminal by the server includes the first tag information, second tag information of each second terminal registered in the server, and terminal identification information of each second terminal registered, or the information to be transmitted to the first terminal by the server includes second tag information of at least one second terminal registered in the server and terminal identification information of the second terminal.
The above terminal list obtaining apparatus further includes a first information security module 708, where the first information security module includes a decryption unit and an encryption unit, where:
and the decryption unit is used for decrypting the information transmitted to the first terminal by the server according to the private key of the first terminal to obtain the first label information, or obtaining the first label information, the second label information of each second terminal registered in the server and the terminal identification information of each second terminal registered, or obtaining the second label information of at least one second terminal registered in the server and the terminal identification information of the second terminal. The information to be transmitted to the first terminal by the server further includes public keys of the second terminals registered in the server, or public keys of target terminals of the first terminal, and the target terminals are one or more second terminals in the identifiable terminal list.
And the encryption unit is used for encrypting the information to be pushed according to the public key of the second terminal to obtain encrypted pushed information, wherein the information to be pushed comprises screen projection information, first label information of the first terminal and the public key of the first terminal. The device also comprises an information pushing module used for sending the encrypted pushing information to the corresponding second terminal.
In one embodiment, as shown in fig. 8, there is provided a terminal list obtaining apparatus, which includes a second server interaction module 802, wherein:
the second server interaction module 802 is configured to send a second tag obtaining request to the server, and obtain second tag information returned by the server according to the second tag obtaining request, where the second tag information is tag information allocated to the second terminal by the server. The second tag information is used for indicating the first terminal to determine an identifiable terminal list of the first terminal according to the first tag information and the corresponding relation between the second tag information and the terminal identification information of the second terminal, the identifiable terminal list comprises the terminal identification information of the identifiable terminal of the first terminal, and the first tag information is the tag information distributed to the first terminal by the server.
In one embodiment, the second tag obtaining request is a second registration request of the second terminal, and the second registration request includes terminal identification information of the second terminal; the second tag information is tag information configured for the second terminal by the server after the server completes registration of the second terminal according to the terminal identification information of the second terminal. The second registration request further comprises a public key of the second terminal, the public key of the second terminal is used for encrypting information to be transmitted to the second terminal by the server, and the information to be transmitted to the second terminal by the server comprises second label information.
The apparatus further includes a first terminal information receiving module 804, a second checking module 806, and a second information security module 808, wherein:
the first terminal information receiving module 804 is configured to receive encrypted push information sent by a first terminal, where the encrypted push information is information obtained by encrypting information to be pushed by the first terminal by using a public key of a second terminal, and the information to be pushed includes screen projection information, and first tag information and a public key of the first terminal.
The second checking module 806 is configured to check whether the first tag information and the second tag information match, and when the second tag information does not match with the first tag information, refuse to communicate with the first terminal.
The second information security module 808 is configured to decrypt, according to the private key of the second terminal, the information transmitted to the second terminal by the server, so as to obtain second tag information; the device further comprises a private key generation module, a first terminal and a second terminal, wherein the private key generation module is used for generating private key information of the first terminal, and the private key generation module is used for generating private key information of the second terminal; and refusing to communicate with the first terminal when the decryption fails.
In one embodiment, as shown in fig. 9, a terminal list obtaining apparatus is provided, which includes an interface module 902, where:
the interface module 902 is configured to receive a first tag acquisition request sent by a first terminal, and return first tag information to the first terminal according to the first tag acquisition request, where the first tag information is tag information allocated to the first terminal by a server; and the second tag information is the tag information distributed to the second terminal by the server. The first tag information and the second tag information are used for indicating the first terminal to determine an identifiable terminal list of the first terminal according to the corresponding relation between the first tag information and the second tag information and the terminal identification information of the second terminal, and the identifiable terminal list comprises the terminal identification information of the identifiable terminal of the first terminal.
In one embodiment, the first tag obtaining request is a first registration request of the first terminal, and the first registration request includes terminal identification information and a public key of the first terminal; the second tag obtaining request is a second registration request of the second terminal, and the second registration request comprises terminal identification information and a public key of the second terminal; at this time, the interface module 902 includes a first registration interface unit and a second registration interface unit: the first registration interface unit is used for registering the first terminal according to the terminal identification information of the first terminal and sending the first label information encrypted according to the public key of the first terminal to the first terminal. The second registration interface unit is used for registering the second terminal according to the terminal identification information of the second terminal and sending the second label information encrypted according to the public key of the second terminal to the second terminal.
In one embodiment, the interface module 902 further comprises: the public key acquisition interface unit is used for receiving a target public key acquisition request sent by a first terminal, wherein the target public key acquisition request comprises terminal identification information of the first terminal and terminal identification information of a target terminal; and sending the public key of the target terminal to the first terminal according to the terminal identification information of the target terminal, wherein the target terminal is one or more second terminals in the identifiable terminal list of the first terminal.
In one embodiment, the apparatus further comprises a device management module 904 and a custom configuration module 906, wherein: the device management module 904 is configured to configure first tag information for the first terminal and/or configure second tag information for the second terminal.
The user-defined configuration module 906 is configured to receive a first terminal configuration parameter and a second terminal configuration parameter input from the outside through a preset interface; obtaining first label information according to the configuration parameters of the first terminal; and obtaining second label information according to the second terminal configuration parameters.
For the specific definition of the terminal list obtaining device, refer to the above definition of the terminal list obtaining method, which is not described herein again. Each module in the terminal list acquisition apparatus may be wholly or partially implemented by software, hardware, or a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, and its internal structure diagram may be as shown in fig. 10. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing data. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a terminal list acquisition method.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 11. The computer device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a terminal list acquisition method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 11 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program: sending a first tag acquisition request to a server, and receiving first tag information returned by the server according to the first tag acquisition request, wherein the first tag information is the tag information distributed to a first terminal by the server; acquiring a target corresponding relation between second label information and terminal identification information of a second terminal, wherein the second label information is label information distributed to the second terminal by a server; and determining an identifiable terminal list of the first terminal according to the first tag information and the target corresponding relation, wherein the identifiable terminal list comprises terminal identification information of the identifiable terminal of the first terminal.
In one embodiment, a computer device is provided, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program: sending a second tag obtaining request to the server, and obtaining second tag information returned by the server according to the second tag obtaining request, wherein the second tag information is tag information distributed to a second terminal by the server; the second tag information is used for indicating the first terminal to determine an identifiable terminal list of the first terminal according to the first tag information and the corresponding relation between the second tag information and the terminal identification information of the second terminal, the identifiable terminal list comprises the terminal identification information of the identifiable terminal of the first terminal, and the first tag information is the tag information distributed to the first terminal by the server.
In one embodiment, a computer device is provided, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program: receiving a first tag obtaining request sent by a first terminal, and returning first tag information to the first terminal according to the first tag obtaining request, wherein the first tag information is the tag information distributed to the first terminal by a server; receiving a second tag obtaining request sent by a second terminal, and returning second tag information to the second terminal according to the second tag obtaining request, wherein the second tag information is the tag information distributed to the second terminal by a server; the first tag information and the second tag information are used for indicating the first terminal to determine an identifiable terminal list of the first terminal according to the corresponding relation between the first tag information and the second tag information and the terminal identification information of the second terminal, and the identifiable terminal list comprises the terminal identification information of the identifiable terminal of the first terminal.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of: sending a first tag acquisition request to a server, and receiving first tag information returned by the server according to the first tag acquisition request, wherein the first tag information is the tag information distributed to a first terminal by the server; acquiring a target corresponding relation between second label information and terminal identification information of a second terminal, wherein the second label information is label information distributed to the second terminal by a server; and determining an identifiable terminal list of the first terminal according to the first tag information and the target corresponding relation, wherein the identifiable terminal list comprises terminal identification information of the identifiable terminal of the first terminal.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of: sending a second tag obtaining request to the server, and obtaining second tag information returned by the server according to the second tag obtaining request, wherein the second tag information is tag information distributed to a second terminal by the server; the second tag information is used for indicating the first terminal to determine an identifiable terminal list of the first terminal according to the first tag information and the corresponding relation between the second tag information and the terminal identification information of the second terminal, the identifiable terminal list comprises the terminal identification information of the identifiable terminal of the first terminal, and the first tag information is the tag information distributed to the first terminal by the server.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of: receiving a first tag obtaining request sent by a first terminal, and returning first tag information to the first terminal according to the first tag obtaining request, wherein the first tag information is the tag information distributed to the first terminal by a server; receiving a second tag obtaining request sent by a second terminal, and returning second tag information to the second terminal according to the second tag obtaining request, wherein the second tag information is the tag information distributed to the second terminal by a server; the first tag information and the second tag information are used for indicating the first terminal to determine an identifiable terminal list of the first terminal according to the corresponding relation between the first tag information and the second tag information and the terminal identification information of the second terminal, and the identifiable terminal list comprises the terminal identification information of the identifiable terminal of the first terminal.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.
Claims (10)
1. A terminal list acquisition method is characterized by comprising the following steps:
sending a first tag obtaining request to a server, and receiving first tag information returned by the server according to the first tag obtaining request, wherein the first tag information is the tag information distributed to a first terminal by the server;
obtaining second label informationAnda target corresponding relation of terminal identification information of a second terminal, wherein the second tag information is the tag information distributed to the second terminal by the server;
and determining an identifiable terminal list of the first terminal according to the first tag information and the target corresponding relation, wherein the identifiable terminal list comprises terminal identification information of identifiable terminals of the first terminal.
2. The method according to claim 1, wherein the obtaining of the target correspondence between the second tag information and the terminal identification information of the second terminal comprises:
detecting each second terminal in the same local area network with the first terminal, and acquiring terminal identification information of at least one second terminal and second label information of the second terminal;
or, acquiring, from the server, terminal identification information of each of the second terminals and second tag information of each of the second terminals that are registered in the server;
the target corresponding relationship is a corresponding relationship between the second tag information of the second terminal and the terminal identification information of the second terminal.
3. The method according to claim 2, wherein the determining the identifiable terminal list of the first terminal according to the first tag information and the target correspondence comprises:
when second tag information in the target corresponding relation is matched with the first tag information, judging that a second terminal corresponding to the second tag information is an identifiable terminal of the first terminal;
obtaining the identifiable terminal list according to the terminal identification information of each identifiable terminal;
preferably, when the second tag information in the target correspondence is not matched with the first tag information, it is determined that the second terminal corresponding to the second tag information is not an identifiable terminal of the first terminal, and the second tag information and the terminal identification information corresponding to the second terminal are deleted.
4. The method according to any one of claims 1 to 3, wherein the first tag obtaining request is a first registration request of the first terminal, and the first registration request includes terminal identification information of the first terminal; the first tag information is tag information configured for the first terminal by the server after the registration of the first terminal is completed according to the terminal identification information of the first terminal.
5. The method according to claim 4, wherein the first registration request further comprises a public key of the first terminal, the public key of the first terminal being used for encrypting information to be transmitted by the server to the first terminal;
the information to be transmitted to the first terminal by the server includes the first tag information, or the information to be transmitted to the first terminal by the server includes the first tag information, the second tag information of each second terminal registered in the server, and the terminal identification information of each second terminal registered, or the information to be transmitted to the first terminal by the server includes the second tag information of at least one second terminal registered in the server and the terminal identification information of the second terminal;
the method further comprises the following steps:
decrypting information transmitted to the first terminal by the server according to a private key of the first terminal to obtain the first tag information, or obtaining the first tag information, second tag information of each second terminal registered in the server and terminal identification information of each second terminal registered, or obtaining second tag information of at least one second terminal registered in the server and terminal identification information of the second terminal;
preferably, the information to be transmitted to the first terminal by the server further includes a public key of each second terminal registered in the server, or a public key of a target terminal of the first terminal, where the target terminal is one or more second terminals in the identifiable terminal list;
the method further comprises the following steps:
encrypting information to be pushed according to the public key of the second terminal to obtain encrypted pushed information, wherein the information to be pushed comprises screen projection information, first label information of the first terminal and the public key of the first terminal;
and sending the encrypted push information to the corresponding second terminal.
6. A terminal list acquisition method is characterized by comprising the following steps:
sending a second tag obtaining request to a server, and obtaining second tag information returned by the server according to the second tag obtaining request, wherein the second tag information is tag information distributed to a second terminal by the server;
the second tag information is used for instructing a first terminal to determine an identifiable terminal list of the first terminal according to first tag information and a corresponding relationship between the second tag information and terminal identification information of the second terminal, the identifiable terminal list comprises the terminal identification information of the identifiable terminal of the first terminal, and the first tag information is tag information distributed to the first terminal by the server;
preferably, the second tag obtaining request is a second registration request of the second terminal, where the second registration request includes terminal identification information of the second terminal; the second tag information is tag information configured for the second terminal after the server completes registration of the second terminal according to the terminal identification information of the second terminal;
preferably, the second registration request further includes a public key of a second terminal, where the public key of the second terminal is used to encrypt information to be transmitted to the second terminal by the server, and the information to be transmitted to the second terminal by the server includes the second tag information;
the method further comprises the following steps: decrypting the information transmitted to the second terminal by the server according to the private key of the second terminal to obtain the second label information;
preferably, the method further comprises: receiving encrypted push information sent by the first terminal, wherein the encrypted push information is obtained by encrypting information to be pushed by the first terminal by adopting a public key of the second terminal, and the information to be pushed comprises screen projection information, and first label information and a public key of the first terminal;
decrypting the encrypted push information according to a private key of the second terminal to obtain screen projection information, first label information and a public key of the first terminal, wherein the public key of the first terminal is used for encrypting information transmitted to the first terminal by the second terminal;
preferably, when the decryption fails or the second tag information does not match the first tag information, the communication with the first terminal is rejected.
7. A terminal list acquisition method is characterized by comprising the following steps:
receiving a first tag obtaining request sent by a first terminal, and returning first tag information to the first terminal according to the first tag obtaining request, wherein the first tag information is the tag information distributed to the first terminal by a server;
receiving a second tag obtaining request sent by a second terminal, and returning second tag information to the second terminal according to the second tag obtaining request, wherein the second tag information is the tag information distributed to the second terminal by a server;
the first tag information and the second tag information are used for indicating the first terminal to determine an identifiable terminal list of the first terminal according to the correspondence between the first tag information and the second tag information and the terminal identification information of the second terminal, wherein the identifiable terminal list comprises the terminal identification information of the identifiable terminal of the first terminal;
preferably, the first tag obtaining request is a first registration request of the first terminal, where the first registration request includes terminal identification information and a public key of the first terminal;
the returning of the first tag information to the first terminal according to the first tag obtaining request includes: registering the first terminal according to the terminal identification information of the first terminal, and configuring the first label information for the first terminal; sending the first label information encrypted according to the public key of the first terminal to the first terminal;
the second tag obtaining request is a second registration request of the second terminal, and the second registration request comprises terminal identification information and a public key of the second terminal;
the returning of the second tag information to the second terminal according to the second tag obtaining request includes: registering the second terminal according to the terminal identification information of the second terminal, and configuring the second label information for the second terminal; sending the second label information encrypted according to the public key of the second terminal to the second terminal;
preferably, the method further comprises:
receiving a target public key acquisition request sent by the first terminal, wherein the target public key acquisition request comprises terminal identification information of the first terminal and terminal identification information of a target terminal;
sending the public key of the target terminal to the first terminal according to the terminal identification information of the target terminal, wherein the target terminal is one or more second terminals in an identifiable terminal list of the first terminal;
preferably, the method further comprises:
receiving a first terminal configuration parameter and a second terminal configuration parameter which are input from the outside through a preset interface;
obtaining the first label information according to the first terminal configuration parameter;
and obtaining the second label information according to the second terminal configuration parameters.
8. A terminal list acquisition apparatus, characterized in that the apparatus comprises:
the first server interaction module is used for sending a first tag acquisition request to a server and receiving first tag information returned by the server according to the first tag acquisition request, wherein the first tag information is the tag information distributed to a first terminal by the server;
a second terminal information obtaining module, configured to obtain a corresponding relationship between second tag information and terminal identification information of a second terminal, where the second tag information is tag information that is allocated to the second terminal by the server;
an identifiable terminal list module, configured to determine an identifiable terminal list of the first terminal according to the first tag information and the correspondence, where the identifiable terminal list includes terminal identification information of an identifiable terminal of the first terminal;
or, the second server interaction module is configured to send a second tag acquisition request to a server, and receive second tag information returned by the server according to the second tag acquisition request, where the second tag information is tag information allocated to a second terminal by the server;
the second tag information is used for instructing a first terminal to determine an identifiable terminal list of the first terminal according to first tag information and a corresponding relationship between the second tag information and terminal identification information of the second terminal, the identifiable terminal list comprises the terminal identification information of the identifiable terminal of the first terminal, and the first tag information is tag information distributed to the first terminal by the server;
or, the first interface module is configured to receive a first tag acquisition request sent by a first terminal, and return first tag information to the first terminal according to the first tag acquisition request, where the first tag information is tag information that is allocated to the first terminal by a server;
the second interface module is used for receiving a second tag acquisition request sent by a second terminal and returning second tag information to the second terminal according to the second tag acquisition request, wherein the second tag information is the tag information distributed to the second terminal by a server;
the first tag information and the second tag information are used for indicating the first terminal to determine an identifiable terminal list of the first terminal according to the correspondence between the first tag information and the second tag information and the terminal identification information of the second terminal, wherein the identifiable terminal list comprises the terminal identification information of the identifiable terminal of the first terminal.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method of any of claims 1 to 7 are implemented when the computer program is executed by the processor.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010104376.2A CN111212090A (en) | 2020-02-20 | 2020-02-20 | Terminal list acquisition method and device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010104376.2A CN111212090A (en) | 2020-02-20 | 2020-02-20 | Terminal list acquisition method and device, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111212090A true CN111212090A (en) | 2020-05-29 |
Family
ID=70788578
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010104376.2A Pending CN111212090A (en) | 2020-02-20 | 2020-02-20 | Terminal list acquisition method and device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111212090A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112417408A (en) * | 2020-12-11 | 2021-02-26 | 北京北信源软件股份有限公司 | Authority control method and device, electronic equipment and storage medium |
Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020180581A1 (en) * | 2001-05-29 | 2002-12-05 | Fujitsu Limited | Device control system |
CN101064628A (en) * | 2006-04-28 | 2007-10-31 | 华为技术有限公司 | Household network appliance safe management system and method |
CN101390365A (en) * | 2006-01-09 | 2009-03-18 | 诺基亚公司 | Enhancements for discovering device owners in a UPnP searching service |
CN101521575A (en) * | 2009-04-09 | 2009-09-02 | 深圳华为通信技术有限公司 | Method, control point, equipment and communication system for collocating accessing authority |
CN102394869A (en) * | 2011-10-21 | 2012-03-28 | 河南科技大学 | Digital content sharing method and system for digital network |
CN102447693A (en) * | 2011-11-02 | 2012-05-09 | 中兴通讯股份有限公司 | Screen sharing method and system for DLNA (Digital Living Network Alliance) terminals in home network |
CN102891836A (en) * | 2011-07-22 | 2013-01-23 | 中兴通讯股份有限公司 | UPnP (Universal Plug And Play) access control method, server and client |
CN102904747A (en) * | 2012-09-14 | 2013-01-30 | 华为技术有限公司 | Detection method, device and system of server-side equipment universally unique identifier (UUID) in digital living network alliance (DLNA) |
CN103428054A (en) * | 2012-05-24 | 2013-12-04 | 华为终端有限公司 | Method and apparatus for media information access control, and digital home multimedia system |
US20140082151A1 (en) * | 2012-09-14 | 2014-03-20 | Tencent Technology (Shenzhen) Company Limited | Method, device, server, and system for managing devices |
CN104519035A (en) * | 2013-10-08 | 2015-04-15 | 中兴通讯股份有限公司 | Multimedia management method and DLNA (digital living network alliance) equipment |
CN105100883A (en) * | 2015-07-03 | 2015-11-25 | 惠州Tcl移动通信有限公司 | Method, mobile terminal and system for selecting media equipment according to application message |
CN105306451A (en) * | 2015-09-28 | 2016-02-03 | 青岛海信电器股份有限公司 | Method and device for controlling DLNA (Digital Living Network Alliance) equipment service permission |
CN105323125A (en) * | 2014-07-25 | 2016-02-10 | 中兴通讯股份有限公司 | Cross-family network processing method, HTTP gateway, DLNA (digital living network alliance) apparatus |
CN106488207A (en) * | 2016-11-23 | 2017-03-08 | 努比亚技术有限公司 | A kind of multi-screen projecting method based on DLNA agreement and terminal |
CN106789470A (en) * | 2016-12-23 | 2017-05-31 | Tcl海外电子(惠州)有限公司 | terminal resource sharing method, device and system |
CN108513154A (en) * | 2018-04-16 | 2018-09-07 | 惠州Tcl家电集团有限公司 | Intelligent home furnishing control method, smart television based on smart television and storage medium |
CN108989879A (en) * | 2018-08-28 | 2018-12-11 | 广州视源电子科技股份有限公司 | Screen projection control method, device and system |
-
2020
- 2020-02-20 CN CN202010104376.2A patent/CN111212090A/en active Pending
Patent Citations (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020180581A1 (en) * | 2001-05-29 | 2002-12-05 | Fujitsu Limited | Device control system |
CN101390365A (en) * | 2006-01-09 | 2009-03-18 | 诺基亚公司 | Enhancements for discovering device owners in a UPnP searching service |
CN101064628A (en) * | 2006-04-28 | 2007-10-31 | 华为技术有限公司 | Household network appliance safe management system and method |
CN101521575A (en) * | 2009-04-09 | 2009-09-02 | 深圳华为通信技术有限公司 | Method, control point, equipment and communication system for collocating accessing authority |
CN102891836A (en) * | 2011-07-22 | 2013-01-23 | 中兴通讯股份有限公司 | UPnP (Universal Plug And Play) access control method, server and client |
CN102394869A (en) * | 2011-10-21 | 2012-03-28 | 河南科技大学 | Digital content sharing method and system for digital network |
CN102447693A (en) * | 2011-11-02 | 2012-05-09 | 中兴通讯股份有限公司 | Screen sharing method and system for DLNA (Digital Living Network Alliance) terminals in home network |
CN103428054A (en) * | 2012-05-24 | 2013-12-04 | 华为终端有限公司 | Method and apparatus for media information access control, and digital home multimedia system |
CN102904747A (en) * | 2012-09-14 | 2013-01-30 | 华为技术有限公司 | Detection method, device and system of server-side equipment universally unique identifier (UUID) in digital living network alliance (DLNA) |
US20140082151A1 (en) * | 2012-09-14 | 2014-03-20 | Tencent Technology (Shenzhen) Company Limited | Method, device, server, and system for managing devices |
CN104519035A (en) * | 2013-10-08 | 2015-04-15 | 中兴通讯股份有限公司 | Multimedia management method and DLNA (digital living network alliance) equipment |
CN105323125A (en) * | 2014-07-25 | 2016-02-10 | 中兴通讯股份有限公司 | Cross-family network processing method, HTTP gateway, DLNA (digital living network alliance) apparatus |
CN105100883A (en) * | 2015-07-03 | 2015-11-25 | 惠州Tcl移动通信有限公司 | Method, mobile terminal and system for selecting media equipment according to application message |
CN105306451A (en) * | 2015-09-28 | 2016-02-03 | 青岛海信电器股份有限公司 | Method and device for controlling DLNA (Digital Living Network Alliance) equipment service permission |
CN106488207A (en) * | 2016-11-23 | 2017-03-08 | 努比亚技术有限公司 | A kind of multi-screen projecting method based on DLNA agreement and terminal |
CN106789470A (en) * | 2016-12-23 | 2017-05-31 | Tcl海外电子(惠州)有限公司 | terminal resource sharing method, device and system |
CN108513154A (en) * | 2018-04-16 | 2018-09-07 | 惠州Tcl家电集团有限公司 | Intelligent home furnishing control method, smart television based on smart television and storage medium |
CN108989879A (en) * | 2018-08-28 | 2018-12-11 | 广州视源电子科技股份有限公司 | Screen projection control method, device and system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112417408A (en) * | 2020-12-11 | 2021-02-26 | 北京北信源软件股份有限公司 | Authority control method and device, electronic equipment and storage medium |
CN112417408B (en) * | 2020-12-11 | 2024-07-23 | 北京北信源软件股份有限公司 | Authority control method, authority control device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105376216B (en) | A kind of remote access method, proxy server and client | |
JP5100286B2 (en) | Cryptographic module selection device and program | |
CN108965416B (en) | Medical data sharing method and device, computer equipment and storage medium | |
CN112632581A (en) | User data processing method and device, computer equipment and storage medium | |
CN102970135B (en) | For finding method and apparatus of the shared secret without leaking non-shared secret | |
CN111917711B (en) | Data access method and device, computer equipment and storage medium | |
US20110154436A1 (en) | Provider Management Methods and Systems for a Portable Device Running Android Platform | |
CN112399392A (en) | Communication connection method, device, equipment and storage medium of home care terminal | |
KR20130031435A (en) | Method and apparatus for generating and managing of encryption key portable terminal | |
CN101048971B (en) | Method and system for managing authentication and payment for use of broadcast material | |
KR102171377B1 (en) | Method of login control | |
CN112087417B (en) | Terminal authority control method and device, computer equipment and storage medium | |
CN113407361A (en) | Desktop access control method and system | |
CN111259363B (en) | Service access information processing method, system, device, equipment and storage medium | |
CN113132982B (en) | Data forwarding method and device, computer equipment and storage medium | |
CN111212090A (en) | Terminal list acquisition method and device, computer equipment and storage medium | |
CN114157425B (en) | Method and device for responding to service request | |
KR101900060B1 (en) | Security element operating with wireless router, the wireless router, and method of forming internet network using the security element | |
CN112350824B (en) | Key distribution method, system and computer equipment in data sharing exchange | |
CN112000493B (en) | Data processing system, method, electronic device and storage medium | |
CN114117488A (en) | File management method, file uploading method, file decryption method and related equipment | |
CN114338132A (en) | Secret-free login method, client application, operator server and electronic equipment | |
CN110071908B (en) | Terminal binding method and device, computer equipment and storage medium | |
CN104717235B (en) | A kind of resources of virtual machine detection method | |
CN114070620A (en) | Short address access method and device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200529 |