CN112351414A - Equipment control method, device, system and storage medium - Google Patents
Equipment control method, device, system and storage medium Download PDFInfo
- Publication number
- CN112351414A CN112351414A CN202011158721.7A CN202011158721A CN112351414A CN 112351414 A CN112351414 A CN 112351414A CN 202011158721 A CN202011158721 A CN 202011158721A CN 112351414 A CN112351414 A CN 112351414A
- Authority
- CN
- China
- Prior art keywords
- connection
- equipment
- authentication request
- code
- bluetooth
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/11—Allocation or use of connection identifiers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/14—Direct-mode setup
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present disclosure relates to a device control method, apparatus, system, and storage medium, the method comprising: when the identity identification information of the first end corresponding to the acquired connection triggering instruction is verified to be legal, a first authentication request for requesting Bluetooth connection matching with second equipment is sent to the second end; acquiring first matching information sent by a second end, wherein the first matching information comprises a first connection code; responding to a first Bluetooth connection request sent by second equipment and analyzing a second connection code from the first Bluetooth connection request, wherein the first connection code is matched with the second connection code when the first authentication request and the second authentication request sent by the second equipment meet preset matching conditions; and controlling the first equipment and the second equipment to establish Bluetooth connection based on the first matching information and the second connection code. Based on this disclosure, the operation of bluetooth connection can be simplified, and the equipment interconnection efficiency is improved.
Description
Technical Field
The present disclosure relates to the field of wireless communications technologies, and in particular, to a device control method, apparatus, system, and storage medium.
Background
Bluetooth technology is a radio technology that supports short-range communication of devices, enabling wireless information exchange between devices that support bluetooth functionality. Through bluetooth connection, the requirement of the device interconnection process on connecting accessories and connecting networks can be reduced, and the method is one of the main connection modes between the intelligent devices at present.
In the related art, to implement bluetooth connection between smart devices, the following steps are generally required: firstly, a Bluetooth switch on the intelligent equipment is turned on, then the intelligent equipment is mutually searched, after the searching is successful, a user is required to select opposite-end intelligent equipment to be matched on an operation interface of the intelligent equipment, then the user manually inputs a Personal Identification Number (PIN) code of the opposite-end intelligent equipment, and then if the opposite-end intelligent equipment checks that the received PIN code is consistent with the PIN code value of the intelligent equipment, the matching is confirmed to be successful and Bluetooth connection is established. The device connection method not only has a complex Bluetooth connection process, but also needs manual intervention, and reduces user experience.
Disclosure of Invention
The present disclosure provides a device control method, apparatus, system and storage medium, to at least solve at least one problem in the related art that the bluetooth connection process is complicated and manual intervention is required, which reduces user experience. The technical scheme of the disclosure is as follows:
according to a first aspect of the embodiments of the present disclosure, there is provided an apparatus control method, applied to a first apparatus, including:
acquiring a connection triggering instruction sent by a first end, wherein the connection triggering instruction is used for indicating to trigger the first equipment and at least one second equipment to execute Bluetooth connection;
when the identity identification information of the first end corresponding to the connection triggering instruction is verified to be legal, sending a first authentication request for requesting Bluetooth connection matching with the second equipment to a second end;
acquiring first matching information sent by the second end according to the first authentication request, wherein the first matching information comprises a first connection code used for pairing with second equipment;
responding to a first Bluetooth connection request sent by the second equipment, and analyzing a second connection code from the first Bluetooth connection request, wherein the second connection code is generated by the second end according to a second authentication request sent by the second equipment; when the first authentication request and the second authentication request meet a preset matching condition, the first connection code and the second connection code are matched;
and controlling the first equipment and the second equipment to establish Bluetooth connection based on the first matching information and the second connection code.
As an optional implementation manner, the step of controlling the first device to establish a bluetooth connection with the second device based on the first matching information and the second connection code includes:
backfilling the first connection code to at least one Bluetooth module carried in the first equipment, and comparing whether the first connection code is matched with the analyzed second connection code through the at least one Bluetooth module;
and when the comparison result is matched, establishing Bluetooth connection with the second equipment.
As an optional implementation manner, after the step of obtaining the first matching information sent by the second end according to the first authentication request, the method further includes:
sending a second Bluetooth connection request carrying the first connection code to a second device, so that the requested second device performs connection code matching based on the first connection code and a second connection code obtained from the second end;
and receiving a connection response fed back by the requested second equipment when the connection code is successfully matched, and establishing Bluetooth connection with the requested second equipment.
As an optional implementation manner, the first matching information further includes a device relationship table of at least one second device requesting connection matching with the first device, and the device relationship table records device description information and device address information of each second device;
the step of sending a second device connection request carrying the first connection code to a second device includes:
analyzing the equipment description information of the second equipment to be connected from the connection triggering instruction;
determining at least one second device matched with the analyzed device description information from the device relation table to serve as a target device;
and sending a second device connection request carrying the first connection code to the target device based on the device address information of the target device recorded in the device relation table.
As an optional implementation, the connection triggering instruction comprises a voice triggering instruction of a user;
before the step of sending a first authentication request for requesting bluetooth connection matching with the second device to the second terminal when the identity identification information of the first terminal corresponding to the connection triggering instruction is verified to be legal, the method further includes:
determining a distance from the first end;
when the distance is smaller than or equal to a preset distance threshold, analyzing a voice trigger instruction sent by the first end to obtain a voiceprint feature to be authenticated corresponding to the voice trigger instruction;
if the voice trigger instruction is stored in the pre-stored valid voiceprint feature set, a valid voiceprint feature matched with the voiceprint feature to be authenticated is found, and identity identification information of the first end corresponding to the voice trigger instruction is determined to be valid.
According to a second aspect of the embodiments of the present disclosure, there is provided a device control apparatus, applied to a first device, including:
the device comprises a trigger instruction acquisition module, a first terminal and at least one second terminal, wherein the trigger instruction acquisition module is configured to execute and acquire a connection trigger instruction sent by the first terminal, and the connection trigger instruction is used for indicating to trigger the first device and at least one second device to execute Bluetooth connection;
the authentication request sending module is configured to send a first authentication request for requesting Bluetooth connection matching with the second device to the second terminal when the identity identification information of the first terminal corresponding to the connection triggering instruction is verified to be legal;
a matching obtaining module configured to perform obtaining of first matching information sent by the second end according to the first authentication request, where the first matching information includes a first connection code for pairing with a second device;
the analysis module is configured to analyze a second connection code from the first Bluetooth connection request in response to the first Bluetooth connection request sent by the second device, wherein the second connection code is generated by the second end according to a second authentication request sent by the second device; when the first authentication request and the second authentication request meet a preset matching condition, the first connection code and the second connection code are matched;
a first connection module configured to perform controlling the first device to establish a Bluetooth connection with the second device based on the first matching information and the second connection code.
As an optional implementation, the first connection module includes:
the matching unit is configured to backfill the first connection code into at least one Bluetooth module carried in the first device, and compare whether the first connection code is matched with the parsed second connection code through the at least one Bluetooth module;
a connection unit configured to perform establishing a Bluetooth connection with the second device when the comparison result is a match.
As an optional implementation, the apparatus further comprises:
the connection request module is configured to execute sending a second Bluetooth connection request carrying the first connection code to a second device, so that the requested second device performs connection code matching based on the first connection code and a second connection code acquired from the second end;
and the second connection module is configured to execute receiving a connection response fed back by the requested second device when the connection code matching is successful, and establish Bluetooth connection with the requested second device.
As an optional implementation manner, the first matching information further includes a device relationship table of at least one second device requesting connection matching with the first device, and the device relationship table records device description information and device address information of each second device; the connection request module includes:
the instruction analysis unit is configured to analyze the device description information of the second device to be connected from the connection triggering instruction;
a target device determining unit configured to perform determination of at least one second device matching the parsed device description information from the device relationship table as a target device;
a connection request unit configured to execute sending a second device connection request carrying the first connection code to the target device based on the device address information of the target device recorded in the device relationship table.
As an optional implementation, the apparatus further comprises a user authentication module, the user authentication module comprising:
a distance determination unit configured to perform determination of a distance to the first end;
the voiceprint recognition unit is configured to analyze the voice trigger instruction sent by the first end when the distance is smaller than or equal to a preset distance threshold value, and obtain to-be-authenticated voiceprint characteristics corresponding to the voice trigger instruction;
an identity authentication unit configured to search a valid voiceprint feature matched with the voiceprint feature to be authenticated if the voiceprint feature set is stored in a pre-stored valid voiceprint feature set, and determine that the identity information of the first end corresponding to the voice trigger instruction is valid
According to a third aspect of the embodiments of the present disclosure, there is provided an apparatus control method, applied to a second terminal, including:
receiving a first authentication request sent by a first device and used for requesting the Bluetooth connection matching with a second device, and receiving a second authentication request sent by at least one second device and used for requesting the Bluetooth connection matching with the first device; the first authentication request and the second authentication request are respectively sent by the first device and the second device when the identity identification information of the first end corresponding to the connection triggering instruction is verified to be legal;
correspondingly allocating first matching information and second matching information according to the first authentication request and the second authentication request respectively, wherein the first matching information comprises a first connection code used for being paired with second equipment, and the second matching information comprises a second connection code matched with the first connection code; when the first authentication request and the second authentication request meet a preset matching condition, the first connection code and the second connection code are matched;
and sending the distributed first matching information and second matching information to corresponding first equipment and second equipment so as to enable the first equipment to control the first equipment to establish Bluetooth connection with the second equipment based on the first matching information and the second connection code, and/or enable the second equipment to control the second equipment to establish Bluetooth connection with the first equipment based on the second matching information and the first connection code.
As an optional implementation manner, the step of correspondingly allocating first matching information and second matching information according to the first authentication request and the second authentication request respectively includes:
triggering a timing starting instruction when monitoring an authentication request sent by the first device or the second device when the identity identification information of the first end corresponding to the connection triggering instruction is verified to be legal; the connection triggering instruction is used for indicating to trigger the first equipment and at least one second equipment to execute Bluetooth connection;
determining that the received first authentication request and the second authentication request meet a preset matching condition within a time period when the timing time is less than or equal to a preset time threshold;
and correspondingly allocating paired first matching information and second matching information for each first authentication request and second authentication request which meet the preset matching condition, wherein a first connection code in the paired first matching information is matched with a second connection code in the paired second matching information.
According to a fourth aspect of the embodiments of the present disclosure, there is provided an apparatus control device, applied to a second end, including:
the authentication request receiving module is configured to execute receiving a first authentication request sent by a first device and used for requesting the Bluetooth connection matching with a second device, and receiving a second authentication request sent by at least one second device and used for requesting the Bluetooth connection matching with the first device; the first authentication request and the second authentication request are respectively sent by the first device and the second device when the identity identification information of the first end corresponding to the connection triggering instruction is verified to be legal;
the authentication request processing module is configured to execute corresponding allocation of first matching information and second matching information according to the first authentication request and the second authentication request, wherein the first matching information comprises a first connection code used for pairing with a second device, and the second matching information comprises a second connection code; when the first authentication request and the second authentication request meet a preset matching condition, the first connection code and the second connection code are matched;
and the issuing module is configured to execute sending the distributed first matching information and second matching information to corresponding first equipment and second equipment, so that the first equipment controls the first equipment to establish Bluetooth connection with the second equipment based on the first matching information and the second connection code, and/or so that the second equipment controls the second equipment to establish Bluetooth connection with the first equipment based on the second matching information and the first connection code.
As an optional implementation manner, the authentication request processing module includes:
the timing unit is configured to trigger a timing starting instruction when monitoring an authentication request which is sent by the first device or the second device and carries legal identity identification information corresponding to the connection triggering instruction; the connection triggering instruction is used for indicating to trigger the first equipment and at least one second equipment to execute Bluetooth connection;
the authentication request matching unit is configured to determine that the received first authentication request and the second authentication request meet a preset matching condition within a time period when the timing time is less than or equal to a preset time threshold;
and the authentication request processing unit is configured to execute corresponding allocation of paired first matching information and second matching information for each first authentication request and second authentication request which meet the preset matching condition, wherein a first connection code in the paired first matching information is matched with a second connection code in the paired second matching information.
According to a fifth aspect of embodiments of the present disclosure, there is provided an appliance control system including a first appliance, a second appliance, and a second terminal;
the first device and the second device respectively acquire a connection triggering instruction sent by a first end, wherein the connection triggering instruction is used for indicating to trigger the first device and at least one second device to execute Bluetooth connection;
when the identity identification information of the first end corresponding to the connection triggering instruction is verified to be legal, the first equipment and the second equipment respectively send a first authentication request and a second authentication request for requesting Bluetooth connection matching to the second end;
the second terminal correspondingly allocates first matching information and second matching information respectively according to the first authentication request and the second authentication request, wherein the first matching information comprises a first connection code for pairing with second equipment, and the second matching information comprises a second connection code; when the first authentication request and the second authentication request meet a preset matching condition, the first connection code and the second connection code are matched;
the second end sends the distributed first matching information and second matching information to corresponding first equipment and second equipment;
the first device responds to a first Bluetooth connection request sent by the second device, and analyzes the second connection code from the first Bluetooth connection request;
and the first equipment controls the first equipment to establish Bluetooth connection with the second equipment based on the first matching information and the second connection code.
According to a sixth aspect of the embodiments of the present disclosure, there is provided a storage medium, wherein instructions of the storage medium, when executed by a processor of an electronic device, enable the electronic device to perform the device control method according to any one of the above embodiments.
According to a seventh aspect of the embodiments of the present disclosure, there is provided an electronic apparatus including:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the device control method according to any of the above embodiments.
According to an eighth aspect of embodiments of the present disclosure, there is provided a computer program product comprising computer instructions stored in a computer readable storage medium. The processor of the electronic device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the electronic device executes the device control method provided in any one of the above embodiments.
The technical scheme provided by the embodiment of the disclosure at least brings the following beneficial effects:
the first device and the second device respectively respond to the connection triggering instruction sent by the first end, authentication requests are respectively sent to the second end when the identity of the first end is verified to be legal, the second end uniformly distributes matched connection codes to the authentication requests meeting preset matching conditions, and after the first device and the second device receive the corresponding connection codes, Bluetooth connection between the devices is carried out based on the matched verification codes. Therefore, the user does not need to select the second equipment from all the connectable equipment searched by the first equipment on the operation interface, the user does not need to acquire the factory preset PIN value or the user-defined PIN value of the second equipment, and manually input the PIN code to carry out Bluetooth pairing connection, the Bluetooth connection operation of the equipment is simplified, the equipment interconnection efficiency is improved, the user intervention is reduced, the Bluetooth connection is simultaneously suitable for carrying out Bluetooth connection between the equipment without the user operation interface, the Bluetooth connection method is particularly suitable for equipment interconnection in smart homes, and the application range is wider. In addition, because the matched connection code is sent by the second end responding to the authentication request, the Bluetooth connection process does not depend on a user-defined PIN value or a factory preset PIN, the problem caused by leakage of the preset PIN can be avoided, the equipment connection safety is improved, the Bluetooth connection method is suitable for building a complex Bluetooth networking, and better service can be provided for the user.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and, together with the description, serve to explain the principles of the disclosure and are not to be construed as limiting the disclosure.
Fig. 1 is a schematic diagram illustrating an implementation environment of a device control method according to an exemplary embodiment.
FIG. 2 is a flow chart illustrating a method of device control according to an exemplary embodiment.
Fig. 3 is a flow chart illustrating another method of device control according to an example embodiment.
Fig. 4 is a flowchart illustrating that the first device verifies that the identification information of the first end corresponding to the connection triggering instruction is legal according to an exemplary embodiment.
Fig. 5 is a flowchart illustrating yet another apparatus control method according to an exemplary embodiment.
Fig. 6 is a flowchart illustrating yet another apparatus control method according to an exemplary embodiment.
Fig. 7 is a block diagram illustrating an apparatus control device according to an exemplary embodiment.
FIG. 8 is a block diagram of another device control apparatus shown in accordance with an exemplary embodiment
FIG. 9 is a block diagram illustrating another device control system in accordance with an exemplary embodiment.
FIG. 10 is a block diagram illustrating an electronic device in accordance with an example embodiment.
Detailed Description
In order to make the technical solutions of the present disclosure better understood by those of ordinary skill in the art, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings.
It should be noted that the terms "first," "second," and the like in the description and claims of the present disclosure and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the disclosure described herein are capable of operation in sequences other than those illustrated or otherwise described herein. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
Fig. 1 is a schematic diagram of an implementation environment of a device control method according to an exemplary embodiment, and referring to fig. 1, the implementation environment includes a first end 101, a first device 102, a second device 103, and a second end 104.
The first device 102 and the second device 103 may be bluetooth-enabled smart devices, including but not limited to at least one of a smart phone, a smart home, a tablet, and a smart wearable device, for example. The smart home comprises but is not limited to a smart sound box, a smart television, a smart household detector, a smart lamp, a smart purifier, a smart robot, a smart refrigerator and the like. The first device 102 and the second device 103 may have a computer program supporting the device control method loaded thereon. It should be understood that the number of the first devices 102 and the second devices 103 may be at least one, such as several, or more. In bluetooth technology, when bluetooth communication is performed between each pair of bluetooth devices, one of the bluetooth devices must be a master device and the other bluetooth device must be a slave device. When the Bluetooth communication is started, the master device searches the slave devices and initiates a Bluetooth connection request with the searched slave devices, and after the pairing is successful, the Bluetooth connection is established, so that the Bluetooth communication can be performed between the master device and the slave devices. For ease of differentiation and illustration, the first device 102 may be referred to herein as a slave device and the second device 103 may be referred to herein as a master device. Of course, the two identities may be interchanged when necessary, for example, the first device 102 may switch from the slave identity to the master identity to actively send a bluetooth connection request to other slave devices; the second device 103 may also switch from the master device identity to the slave device identity, wait for a bluetooth connection request from another master device, and then implement bluetooth communication between the first device 102 or the second device 103 and another device.
The first terminal 101 may be a user or a mobile terminal to generate a connection triggering instruction for a bluetooth connection between the first device 102 and the second device 103. If the first end 101 is a user, the first device 102 and the second device 103 may be equipped with a module for detecting and recognizing a connection triggering instruction issued by the user, so as to respond to the instruction of the user based on the module. If the first end 101 is a mobile terminal, the mobile terminal may be in communication connection with the first device 102 and the second device 103 through a network. The mobile terminal can be at least one of a smart phone, an intelligent wearable device, an intelligent home, a tablet computer and the like.
The second end 104 may be at least one of a server, a server cluster, a distributed system, a unified authentication platform, a cloud server, a virtualization center, and the like. The second end 104 may be respectively connected to the first device 102 and the second device 103 through a network, and then issues corresponding feedback information based on the authentication requests respectively sent by the first device 102 and the second device 103, so as to implement bluetooth pairing and communication between the first device 102 and the second device 103 based on the feedback information.
Fig. 2 is a flowchart illustrating a device control method according to an exemplary embodiment, where, as shown in fig. 2, the device control method is used for an example of an interaction process among the first device, the second device, and the second peer in the implementation environment diagram, and includes the following steps.
In step S201, a first device and a second device respectively obtain a connection triggering instruction sent by a first end, where the connection triggering instruction is used to instruct the first device and at least one second device to execute bluetooth connection.
Optionally, when the first device and the second device are required to communicate, the first end may send a connection triggering instruction to the first device and the second device at the same time, so as to trigger the first device and the at least one second device to start performing bluetooth connection.
The connection triggering instruction may be differentiated according to the type of the first terminal. If the first end is a user, the connection triggering instruction may include at least one of a voice triggering instruction (such as speaking, singing, etc.), a gesture triggering instruction (such as a space score, etc.), a limb triggering instruction (such as dancing, a specific action, making a ring, clapping, etc.), and the like of the user. If the first end is a mobile terminal, the connection triggering instruction may include a message instruction, a triggering signal instruction, and the like sent by the mobile terminal. It should be understood that the specific form of the connection triggering instruction includes, but is not limited to, this.
In step S202, when it is verified that the identification information of the first end corresponding to the connection triggering instruction is legal, the first device and the second device respectively send a first authentication request and a second authentication request for requesting bluetooth connection matching to the second end.
Optionally, after the first device and the second device respectively receive the connection triggering instruction simultaneously sent by the first end, the validity of the identity of the initiator of the received connection triggering instruction may be verified respectively. And when the first equipment and the second equipment respectively verify that the identity identification information of the first end corresponding to the connection triggering instruction is legal, responding to the connection triggering instruction, and respectively sending an authentication request for performing Bluetooth connection matching to the second end.
It should be understood that the first device may verify whether the identification information of the first end corresponding to the connection triggering instruction is legal, and the verification criteria for verifying whether the identification information of the first end corresponding to the connection triggering instruction is legal may be different from the verification criteria for verifying whether the identification information of the first end corresponding to the connection triggering instruction is legal by the second device. That is, the legitimate user identity that the first device is allowed to use and the legitimate user that the second device is allowed to use may not be consistent.
For example only, taking the first end as a user, in a smart home scenario, if a user a only has usage rights to use a first device B, a second device C, and a second device D in a certain environmental range (such as a living room or a bedroom), the user a does not have usage rights to use a second device E and a second device F in the environmental range. At this time, when the user a initiates a connection triggering instruction to the smart device in the environment range, all devices in the environment range receive the connection triggering instruction, but because the second device E and the second device F do not allow the user a to use, the two devices verify that the identification information of the user a is illegal, and further do not respond to the connection triggering instruction of the user a, and stop executing subsequent device bluetooth connection operations. And because other devices in the environment range allow the user A to use, the other devices verify that the identity identification information of the user A is legal, namely that the connection triggering instruction requesting the Bluetooth connection is legal, and then the other devices can respond to the connection triggering instruction sent by the user A and respectively send authentication requests for carrying out Bluetooth matching to the second end.
The first authentication request may include identity information of the first end, and may also include device information of the first device. The second authentication request may include at least identification information of the first end and may also include device information of the second device. The device information may include at least one of a device name, a device identification, and device address information. If there are a plurality of second devices verifying that the identification information of the first end corresponding to the connection triggering instruction is legal, the number of the second authentication requests may be a plurality of matching numbers. Of course, the number of the first authentication requests may be plural. It should be understood that the specific contents of the first authentication request and the second authentication request are not limited thereto, and may also include device information of peer devices to be interconnected by bluetooth, for example.
In step S203, the second terminal correspondingly allocates first matching information and second matching information according to the first authentication request and the second authentication request, where the first matching information includes a first connection code for pairing with the second device, the second matching information includes a second connection code, and when the first authentication request and the second authentication request satisfy a preset matching condition, the first connection code matches the second connection code.
The first matching information is used for reflecting information of Bluetooth connection pairing between the first device and other devices. The second matching information is used for reflecting the information that the second device and other devices are paired in Bluetooth connection. The other device may be a device other than itself and capable of bluetooth connectivity.
After confirming the authentication request meeting the preset matching condition, the second terminal may assign the same verification code M (e.g., PIN code) to each of the first authentication request and the second authentication request meeting the preset matching condition, so that the subsequent bluetooth interconnection between the first device and the second device may be performed based on the same verification code M.
And the second terminal allocates a verification code N different from the verification code M to the received authentication request which does not satisfy the preset matching condition, that is, when the first authentication request and the second authentication request do not satisfy the preset matching condition, the first connection code and the second connection code are not matched, so that the equipment corresponding to the authentication request which does not satisfy the preset matching condition does not participate in the equipment interconnection.
In an alternative embodiment, the first connection code and the second connection code may be verification codes (such as PIN codes) for setting direct bluetooth matching. The number of the first connection codes and the second connection codes may be one or more. It should be understood that the first connection code and the second connection code are not fixed values, and may vary randomly.
For example only, if the plurality of second devices and the first device may be interconnected two by two, in order to improve the pairing efficiency, the number of the first connection codes and the number of the second connection codes may be one, for example, the first connection codes and the second connection codes are both set as the verification code M, so that the plurality of second devices and the first device may perform fast bluetooth pairing and connection by using the verification code M.
If the plurality of second devices and the first device cannot be interconnected two by two, the number of the first connection codes and the number of the second connection codes may be multiple at this time in order to improve the accuracy of device connection and the efficiency of device connection. For example only, according to the connection network relationship or the connection triggering instruction of the first device and the second device, the first device may be interconnected with the second device 1 and the second device 3, the first device may be interconnected with the second device 2 and the second device 4, and the second device 3 may be interconnected with the second device 4 and the second device 5. In this way, the second end may assign the same authentication code a for the first device, the second device 1, and the second device 3 to interconnect with each other, the second end may assign the same authentication code B for the first device, the second device 2, and the second device 4 to interconnect with each other, and the second end may assign the same authentication code C for the second device 3, the second device 4, and the second device 5 to interconnect with each other. Thus, the set of first connection codes corresponding to the first device is { a, B }, the set of second connection codes corresponding to the second device 1 is { a }, the set of second connection codes corresponding to the second device 2 is { B }, the set of second connection codes corresponding to the second device 3 is { a, C }, the set of second connection codes corresponding to the second device 4 is { B, C }, and the set of second connection codes corresponding to the second device 5 is { C }.
In another alternative embodiment, the first connection code and the second connection code may be values obtained by encrypting the verification code M.
For example only, the first connection code may be an encryption code generated based on a preset encryption and decryption algorithm according to the verification code M and the device information of the first device; the second connection code may be an encryption code generated based on a preset encryption algorithm according to the verification code M and the device information of the second device. After the first device and the second device receive the first connection code and the second connection code, respectively, the first device and the second device may decrypt the first connection code and the second connection code by using the preset encryption and decryption algorithm, respectively, to obtain the verification code M. The preset encryption and decryption algorithm includes, but is not limited to, a hash algorithm, an asymmetric encryption and decryption algorithm, a symmetric encryption and decryption algorithm, and the like. Through encrypting the verification code of distribution and then transmitting, the safety of Bluetooth connection can be improved, the problem caused by the fact that the verification code is leaked or intercepted is avoided, and the reliability and the safety of Bluetooth connection are improved.
The preset matching condition may include, but is not limited to: one or more of a matching condition based on a preset request time, a matching condition based on a preset pairing device relationship, and a matching condition based on a matching condition of a preset request number (e.g., a maximum number of interconnections).
In an exemplary embodiment, taking a preset matching condition as an example of the matching condition based on the preset request time, the step S203 may include:
in step S2031, the second end triggers a timing start instruction when monitoring the authentication request sent by the first device or the second device.
Optionally, when monitoring the authentication request sent by the first device or the second device, that is, when the second end receives the first authentication request, the second end triggers a start timing instruction, starts a timer to perform timing, receives a first authentication request sent by the first device to request bluetooth connection matching with the second device, and receives at least one second authentication request sent by the second device to request bluetooth connection matching with the first device.
The first authentication request refers to an authentication request sent by the first device or the second device and received for the first time after the predetermined time if the authentication request sent by the first device or the second device is not received within the predetermined time period. For example, the predetermined time period may be 1 minute, and if the authentication request sent by the first device or the second device is not received within one of 1 minute, the authentication request sent by the first device or the second device, which is received by the second end for the first time after the 1 minute, is the first authentication request.
In an optional embodiment, the second end may assign a user partition to each legitimate user, and each user partition may correspond to a user identity. The first authentication request and the second authentication request both include the identity information of the user corresponding to the connection triggering instruction, and the user partition to which the first authentication request or the second authentication request received by the second end belongs respectively can be determined according to the identity information of the user. When the second end receives a first authentication request sent by the first device or the second device, a timer is started to count time, a user partition corresponding to the first authentication request is used as a target partition, the authentication requests belonging to the target partition are monitored continuously, and the receiving time corresponding to each authentication request belonging to the target partition is recorded. If the first authentication request is sent by the first device, the receiving time of the first authentication request a is 0 second, the receiving time of the second authentication request a which is continuously received and belongs to the target partition is 5 seconds, the receiving time of the second authentication request B is 12 seconds, the receiving time of the second authentication request C is 25 seconds, the receiving time of the second authentication request D is 30 seconds, the receiving time of the second authentication request E is 33 seconds, and so on. By allocating a user partition to each legal user and timing only the authentication request in the target partition corresponding to the first authentication request, the authentication requests sent by other connection triggering instructions responding to non-target users can be eliminated, and the accuracy of equipment connection is improved.
In step S2032, the second terminal determines that the received first authentication request and the second authentication request satisfy the preset matching condition within a time period in which the counted time is less than or equal to the preset time threshold.
The preset time threshold may be set to any value of, but not limited to, 10 to 60 seconds, for example, 30 seconds, 45 seconds, and the like. Taking the preset time threshold value as 30 seconds as an example, all the first authentication requests and the second authentication requests received by the second terminal when the timing time is not more than 30 seconds are confirmed to satisfy the preset matching condition, and all the overtime authentication requests received when the timing time is more than 30 seconds are confirmed to not satisfy the preset matching condition.
For example only, the receiving time of each of the first authentication request a and the second authentication request a-D does not exceed 30 seconds, and it is determined that both the first authentication request a and the second authentication request a-D received by the second end satisfy the preset matching condition, and the devices corresponding to the five authentication requests may perform device interconnection this time. And if the receiving time of the second authentication request E exceeds 30 seconds, the second device request E does not satisfy the preset matching condition for device interconnection at this time, and at this time, the second device corresponding to the second device request E cannot perform device interconnection with the devices corresponding to the five authentication requests at this time.
It should be understood that before determining the authentication requests meeting the preset matching conditions, it may also be verified whether the identification information of the users corresponding to each authentication request is consistent, and if so, it is determined whether the authentication requests meet the preset matching conditions; if the authentication request does not conform to the identity identification information of the first end, the authentication request which does not conform to the identity identification information of the first end is eliminated, interference of a connection triggering instruction of a non-target user is reduced, and accuracy of equipment connection is improved.
In step S2033, the second terminal correspondingly allocates paired first matching information and second matching information for each of the first authentication request and the second authentication request that satisfy the preset matching condition, where a first connection code in the paired first matching information matches a second connection code in the paired second matching information.
After the second end confirms the authentication requests meeting the preset matching condition, the same verification code M (for example, PIN code) may be allocated to each of the first authentication request and the second authentication request meeting the preset matching condition, that is, the verification codes in the same batch are the same, so that the subsequent first device and the second device may perform bluetooth interconnection based on the same verification code M.
The first connection code and the second connection code may be verification codes (such as PIN codes) for performing a setup direct bluetooth match. The number of the first connection codes and the second connection codes may be one or more. It should be understood that the first connection code and the second connection code are not fixed values, and may be randomly changed at a preset period. Alternatively, the first connection code and the second connection code may be values obtained by encrypting the verification code M. Of course, the first connection code and the second connection code may be of different types, for example, the first connection code is a PIN code, and the second connection code is a value obtained by encrypting the verification code.
Whether the first authentication request or the second authentication request received by the second end is preset with the matching condition is determined based on the matching condition of the preset request time, so that the time and the calculation amount for matching the authentication requests are reduced, and the connection safety and the connection efficiency of the equipment are improved.
In step S204, the second end sends the allocated first matching information and second matching information to the corresponding first device and second device.
In an optional implementation manner, the second end may return, by the original route, the first matching information to the first device according to a device address and a request path corresponding to a first authentication request sent by the first device, and the second end returns, by the original route, the second matching information to the corresponding second device according to a device address and a request path corresponding to a second authentication request sent by the second device, so that the first device controls to establish a bluetooth connection with the second device based on the first matching information and the second connection code, and/or the second device controls to establish a bluetooth connection with the first device based on the second matching information and the first connection code. The device address may include a device physical address, a device IP address, and the like.
In step S205, the first device analyzes the second connection code from the first bluetooth connection request in response to the first bluetooth connection request sent by the second device.
For each pair of bluetooth device connections, one of them is a master device and the other is a slave device. Here, the first device may act as a slave device and the second device may act as a master device, and the second device may transmit the first bluetooth connection request to the first device. Of course, the identities of the first device and the second device may be interchanged when needed, and the first device may actively send a second bluetooth connection request to the second device.
When establishing a bluetooth connection between a first device and a second device, the second device sends a first bluetooth connection request to the first device, where the first bluetooth connection request may include second matching information sent by a second end, and the second matching information at least includes a second connection code. After receiving the first bluetooth connection request, the first device may analyze the second connection code from the first bluetooth connection request, so that the first device performs bluetooth pairing verification based on the second connection code.
In step S206, the first device controls the first device to establish a bluetooth connection with the second device based on the first matching information and the second connection code.
After the first device resolves the second connection code of the second device, the first device may verify whether the first connection code in the first matching information and the resolved second connection code are matched, and if the code values of the first connection code and the resolved second connection code are matched, the first device is controlled to establish a bluetooth connection with the second device requesting the connection; otherwise, controlling the first device not to establish Bluetooth connection with the second device requesting connection.
In an optional implementation manner, when the first connection code and the second connection code are verification codes (e.g., PIN codes) matched with bluetooth, the first device may directly verify whether the values of the first connection code and the second connection code are the same, and if the values of the first connection code and the second connection code are the same, it is determined that the bluetooth pairing between the first device and the second device is successful, and the bluetooth connection is established. Or, when the first connection code and the second connection code are values obtained by encrypting the verification code (for example, a PIN code), the first device may decrypt the first connection code and the second connection code respectively and then obtain the first verification code and the second verification code correspondingly, and then verify whether the values of the first verification code and the second verification code are the same, if the values of the first verification code and the second verification code are the same, it is determined that the bluetooth pairing of the first device and the second device is successful, and the bluetooth connection is established.
It should be understood that the bluetooth functionality of the first device and the second device may be turned on by default. Of course, in some cases, if it is detected that the bluetooth function of each device has not been successfully turned on, the device may be triggered to turn on, so as to facilitate bluetooth interconnection between the devices.
In the related art, during the bluetooth connection process, the conventional bluetooth connection mechanism needs to rely on a preset PIN code to perform pairing connection. The preset PIN code is typically factory preset, such as a default four digit number (e.g., 0000, 1234, or 8888, etc.), or may be a user-defined value. After the master Bluetooth device searches the slave Bluetooth devices, a user needs to select the slave Bluetooth devices to be matched on an operation interface, before the master Bluetooth device is matched, the user needs to know preset PIN codes of the slave Bluetooth devices in advance and manually input the preset PIN codes of the slave Bluetooth devices, the master Bluetooth device sends a matching request carrying the PIN to the slave Bluetooth devices, the slave Bluetooth devices are matched with the preset PIN codes stored in the slave Bluetooth devices after receiving the PIN codes, and if the two are consistent, the master Bluetooth device is successfully matched and connected with the master Bluetooth device. The existing Bluetooth connection method of the equipment not only has a complicated Bluetooth connection process, but also needs manual intervention and PIN code presetting, so that the user experience is reduced, and the existing Bluetooth connection method is also not suitable for establishing Bluetooth connection between equipment without an operation interface.
The first device and the second device respectively respond to the connection triggering instruction sent by the first end, authentication requests are respectively sent to the second end when the identity of the first end is verified to be legal, the second end uniformly distributes matched connection codes to the authentication requests meeting preset matching conditions, and after the first device and the second device receive the corresponding connection codes, Bluetooth connection between the devices is carried out based on the matched verification codes. Therefore, the user does not need to select the second equipment from all searched connectable equipment on the operation interface of the first equipment, the user does not need to acquire the factory preset PIN value or the user-defined PIN value of the second equipment, and manually input the PIN code to carry out Bluetooth pairing connection, the Bluetooth connection operation of the equipment is simplified, the equipment interconnection efficiency is improved, the user intervention is reduced, the Bluetooth connection is simultaneously suitable for carrying out Bluetooth connection between the equipment without the user operation interface, the Bluetooth connection method is particularly suitable for equipment interconnection in smart homes, and the application range is wider. In addition, because the matched connection code is sent by the second end responding to the authentication request, the Bluetooth connection process does not depend on a user-defined PIN value or a factory preset PIN, the problem caused by leakage of the preset PIN can be avoided, the equipment connection safety is improved, the Bluetooth connection method is suitable for building a complex Bluetooth networking, and better service can be provided for the user.
Fig. 3 is a flowchart illustrating another apparatus control method according to an exemplary embodiment, where the apparatus control method is used in the first apparatus in the above implementation environment schematic diagram, as shown in fig. 3, and includes the following steps.
In step S301, a connection triggering instruction sent by the first end is obtained, where the connection triggering instruction is used to instruct the first device and at least one second device to execute bluetooth connection.
Optionally, the first terminal sends a connection triggering instruction to the first device and the at least one second device that need bluetooth connection, so as to wake up the first device and the at least one second device that need bluetooth connection and trigger the devices to start device connection operations. The connection triggering instruction may include device information of the awakened device, such as at least one of a device name, a device number, a device identification, and the like.
The connection triggering instruction may include, but is not limited to, at least one of a user's voice triggering instruction (e.g., speaking, singing, etc.), gesture triggering instruction (e.g., space stroke, etc.), limb triggering instruction (e.g., dancing, special action, ringing fingers, clapping hands, etc.), and the like.
It should be noted that other specific contents of the step S301 may refer to the step S201 in the foregoing embodiment, and are not described herein again.
In step S302, when the identity information of the first end corresponding to the connection triggering instruction is verified to be legal, a first authentication request for requesting bluetooth connection matching with the second device is sent to the second end.
Optionally, since the corresponding valid user of each first device or second device may be different, as long as the user has the right to control the first device or second device simultaneously when the identity information of the initiating user of the connection triggering instruction is verified to be valid. When the identity verification of the first end is legal, the first device needs to respond to the connection triggering instruction sent by the first end and send a first authentication request for requesting Bluetooth connection matching with the second device to the second end. The first authentication request may carry identity information of the first end, device information of the first device, and the like. The identification information of the user may include at least one of an identification of the user, a user name, a user registration account, and the like. The device information may include at least one of a device name, a device address, and the like.
It should be noted that other specific contents of the step S302 may refer to the step S202 in the foregoing embodiment, and are not described herein again.
In step S303, first matching information sent by the second end according to the first authentication request is obtained, where the first matching information includes a first connection code for pairing with the second device.
In step S304, in response to a first bluetooth connection request sent by a second device, a second connection code is parsed from the first bluetooth connection request, where the second connection code is generated by a second end according to a second authentication request sent by the second device; and when the first authentication request and the second authentication request meet a preset matching condition, the first connection code and the second connection code are matched.
In step S305, establishing a bluetooth connection with the second device is controlled based on the first matching information and the second connection code.
Optionally, after receiving the first authentication request and the second authentication request respectively sent by the first device and the second device, the second end issues corresponding first matching information and second matching information for the first device and the second device, respectively. The first matching information of the first device comprises at least a first connection code for pairing with the second device, and the second matching information comprises at least a second connection code. And when the first authentication request and the second authentication request meet a preset matching condition, the first connection code and the second connection code are matched. The preset matching condition may include at least a matching condition of the request time. Then, the second device may send a first bluetooth connection request carrying the second connection code to the first device, and the first device analyzes the second connection code after receiving the first bluetooth connection request, so that the first device performs bluetooth connection with the second device based on bluetooth mechanism control according to the acquired first matching information and the analyzed second connection code.
In an exemplary embodiment, the step of controlling the bluetooth connection with the second device based on the first matching information and the second connection code in step S305 may include:
in the step S3051, backfilling the first connection code to at least one bluetooth module mounted in the first device, and comparing, by the at least one bluetooth module, whether the first connection code matches the parsed second connection code;
and in the step S3052, when the comparison result is matched, establishing Bluetooth connection with the second equipment.
Specifically, the first connection code is backfilled into at least one bluetooth module carried in the first device, then the connection function of the bluetooth module is started, and based on a bluetooth connection mechanism, each backfilled first connection code is verified through the at least one bluetooth module and whether a second connection code obtained through analysis is matched or not is obtained. If the first connection code in one Bluetooth module is matched with the second connection code obtained by analysis, determining that the comparison result is matched, and establishing Bluetooth connection between the first equipment and the second equipment corresponding to the second connection code obtained by analysis; and if the first connection code backfilled in the Bluetooth module is not matched with the second connection code obtained by analysis, the comparison result is not matched, and the Bluetooth connection of the second equipment corresponding to the second connection code is not established.
For example only, if the first connection code for interconnecting the first device with the second device 1 and the second device 3 is the verification code a, two bluetooth modules (such as the bluetooth module 1 and the bluetooth module 2) in the first device may respectively backfill the verification code a, and then interconnect with the first device 1 and the second device 3 by using the bluetooth module 1 and the bluetooth module 2, respectively. If the first connection code of the first device, which is further interconnected with the second device 2 and the second device 4, is the verification code B, the verification code B may be refilled by the other two bluetooth modules (such as the bluetooth module 3 and the bluetooth module 4) in the first device, and then the bluetooth module 3 and the bluetooth module 4 are respectively interconnected with the first device 2 and the second device 4.
Through carrying at least one bluetooth module in first equipment for first equipment accessible this bluetooth module interconnects simultaneously with at least one second equipment, and then builds more complicated bluetooth connection network. Because the function of every smart machine is limited, through the bluetooth connection network of building, each smart machine can cooperate in order to realize abundanter interactive function each other, and user experience feels better.
It should be noted that other specific contents of the steps S303 to S305 can refer to the steps S203 to S206 in the above embodiment, and are not described herein again.
The method and the device for Bluetooth connection between the first and second terminals respond to a connection triggering instruction sent by the first terminal through the first device, an authentication request is sent to the second terminal when the identity of the first terminal is verified to be legal, the second terminal uniformly distributes matched connection codes to the authentication request meeting preset matching conditions, the first device analyzes the second connection codes from a first Bluetooth connection request sent by the second device after receiving the first connection codes sent by the second terminal, and Bluetooth connection between the devices is carried out based on the first connection codes and the second connection codes. Therefore, the user does not need to select the second equipment from all the connectable equipment searched by the first equipment on the operation interface, the user does not need to acquire the factory preset PIN value or the user-defined PIN value of the second equipment, and manually input the PIN code to carry out Bluetooth pairing connection, the Bluetooth connection operation of the equipment is simplified, the equipment interconnection efficiency is improved, the user intervention is reduced, the Bluetooth connection is simultaneously suitable for carrying out Bluetooth connection between the equipment without the user operation interface, the Bluetooth connection method is particularly suitable for equipment interconnection in smart homes, and the application range is wider. In addition, because the matched connection code is sent by the second end responding to the authentication request, the Bluetooth connection process does not depend on a user-defined PIN value or a factory preset PIN, the problem caused by leakage of the preset PIN can be avoided, the equipment connection safety is improved, the Bluetooth connection method is suitable for building a complex Bluetooth networking, and better service can be provided for the user.
In an exemplary embodiment, before the step of sending a first authentication request for requesting bluetooth connection matching with a second device to a second end of a second end when the identification information of the first end corresponding to the connection triggering instruction is verified to be legal, the method may further include a step of verifying whether the identification information of the first end corresponding to the connection triggering instruction is legal. The following description will take the connection trigger command as a voice trigger command of the user as an example. Fig. 4 is a flowchart illustrating that the first device verifies that the identification information of the first end corresponding to the connection triggering instruction is legal according to an exemplary embodiment, and as shown in fig. 4, the method includes the following steps.
In step S401, a distance to the first end is determined.
Optionally, the first device may have a sound source orientation recognition function, which may detect sound signals within the environment in real time; when a voice trigger instruction sent by a user is received, the distance between the first equipment and the first end is determined, namely the distance between the first equipment and the position where the voice trigger instruction sent by the user is located. For example only, the first device may determine a location at which the user uttered speech using a sound source orientation recognition algorithm to determine a separation from the user based on the location. The sound source localization recognition algorithm includes, but is not limited to, an algorithm which is a localization principle based on a time difference of arrival, a localization algorithm based on a sound pressure amplitude ratio, and the like.
In step S402, when the distance is smaller than or equal to a preset distance threshold, analyzing the voice trigger instruction sent by the first end to obtain a voiceprint feature to be authenticated corresponding to the voice trigger instruction.
Optionally, when it is determined that the distance between the first device and the first end is smaller than or equal to the preset distance threshold, it is determined that the voice trigger instruction meets the voiceprint authentication trigger condition, and the voiceprint feature to be authenticated is obtained by analyzing the voice trigger instruction. On the contrary, when the distance between the first device and the first end is determined to be larger than the preset distance threshold, the voice trigger instruction is determined not to accord with the voiceprint authentication trigger condition, and the voiceprint authentication step and the subsequent steps are stopped.
Wherein, the preset distance threshold value can be determined according to the Bluetooth communication distance between the first device and the second device. Since bluetooth technology is a radio technology that supports short-range communication of devices, the devices supporting bluetooth connections are typically up to 10 meters away. In order to ensure that the first device and the second device can be connected via bluetooth smoothly, the distance between the first device and the first end or the distance between the second device and the first end may be any value less than or equal to 5 meters, that is, the preset distance threshold may be any value less than or equal to 5 meters. Of course, in other embodiments, the predetermined distance threshold may be selected to be other suitable values that ensure the quality of bluetooth communications between devices.
In step S403, if a valid voiceprint feature matching the voiceprint feature to be authenticated is found in the pre-stored valid voiceprint feature set, it is determined that the identification information of the first end corresponding to the voice trigger instruction is valid.
Optionally, the legal user may register identity in the unified authentication platform in advance, and input the voiceprint information of the user to construct a legal voiceprint feature set. The valid voiceprint feature set can comprise voiceprint features of a valid user, and also can comprise at least one of user identification and user identity information of the valid user. The unified authentication platform can manage the legal voiceprint feature set of each device, update (such as addition, deletion or modification) of the corresponding legal voiceprint features according to the condition of each device, the corresponding legal voiceprint features of different devices can be different, and then the managed legal voiceprint feature sets are respectively issued to the corresponding devices to be stored, so that the devices can directly and rapidly search and match according to the locally stored legal voiceprint feature sets, the time for identity legal verification is reduced, and the Bluetooth connection efficiency of the devices is improved.
If the voice trigger instruction is stored in the pre-stored valid voiceprint feature set, the first device finds a valid voiceprint feature matched with the voiceprint feature to be authenticated, and determines that the identity information of the first end corresponding to the voice trigger instruction is valid, so that step S403 and subsequent steps can be executed; otherwise, the first device does not perform the subsequent steps.
It should be noted that the specific content of the second device verifying whether the identity information of the first end corresponding to the connection triggering instruction is legal is similar to the identity validity verification process of the first device, and is not described herein again.
In an exemplary embodiment, as shown in fig. 5, after the step of obtaining the first matching information sent by the second end according to the first authentication request, the method may further include:
in step S501, a second bluetooth connection request carrying the first connection code is sent to a second device, so that the requested second device performs connection code matching based on the first connection code and a second connection code obtained from the second end;
in step S502, a connection response fed back by the requested second device when the connection code matching succeeds is received, and a bluetooth connection with the requested second device is established.
Here, the bluetooth identities of the first device and the second device are interchanged, that is, the first device is switched to a master device identity, a second bluetooth connection request carrying the first connection code is sent to the second device, so that the requested second device performs connection code matching based on the first connection code and a second connection code obtained from the second end, when the requested second device verifies that the connection code is successfully matched, a connection response corresponding to the connection code matching success is sent to the first device, and the first device establishes bluetooth connection with the requested second device. Through carrying out the bluetooth identity to first equipment and exchanging, initiatively send the second bluetooth to peripheral second equipment and connect the request, improved the initiative and the flexibility that bluetooth is connected between the equipment, still can provide better equipment connection effect simultaneously.
In an exemplary embodiment, the first matching information may further include a device relationship table of at least one second device requesting connection matching with the first device, and the device relationship table records device description information and device address information of each second device. At this time, as shown in fig. 6, the step of sending the second device connection request carrying the first connection code to the second device may include:
in step S601, parsing device description information of the second device to be connected from the connection trigger instruction;
in step S602, at least one second device that matches the parsed device description information is determined from the device relationship table as a target device;
in step S603, a second device connection request carrying the first connection code is sent to the target device based on the device address information of the target device recorded in the device relationship table.
The device description information is used to reflect unique identity information of the device, and includes, for example, a device nickname (e.g., small a, small B, etc.), a device function name (e.g., smart speaker, smart lamp, smart detector, etc.), a device number, a device identifier, and the like. The device address information is address information for making a bluetooth connection, such as a device MAC address.
In practical application, if the connection triggering instruction is that the intelligent sound box is connected with the intelligent detector, analyzing the connection triggering instruction to obtain that the equipment description information of the first equipment is the intelligent sound box, the equipment description information of the second equipment to be connected is the intelligent detector, and then finding the intelligent detector matched with the equipment description information of the second equipment to be connected from first matching information acquired by the first equipment from the second end to serve as target equipment; and then, the first device can directionally send a second device connection request carrying the first connection code to the intelligent detector by using the target device MAC address.
And setting a device relation table of at least one second device requesting connection matching with the first device in the first matching information, wherein the device relation table records the device description information and the device address information of each second device. Therefore, the device description information to be connected is analyzed according to the connection triggering instruction, the matched target device and the device address information of the target device are searched in the device relation table, and then the second device connection request carrying the first connection code is directly sent to the target device in a directional mode according to the device address information of the target device, so that the situation that the first device actively searches for the surrounding second devices to be connected is reduced, the target device to be connected does not need to be determined by a user, user intervention is reduced, the adaptability to different scenes is improved, meanwhile, the device searching and user determination time is reduced, and the device connection efficiency is improved.
It should be noted that the second matching information obtained by the second device from the second end may also include a device relationship table of at least one other device requesting connection matching with the second device, where the device relationship table records device description information and device address information of each device. At the moment, the second equipment analyzes the equipment description information of the equipment to be connected from the connection triggering instruction; determining at least one device matched with the analyzed device description information from a device relation table in the second matching information as a target device; and sending a device connection request carrying a second connection code to the target device based on the device address information of the target device recorded in the device relation table in the second matching information. Therefore, the second equipment actively searches the peripheral equipment to be connected, the user does not need to participate in determining the target equipment to be connected, the user intervention is reduced, the user experience is improved, and the equipment connection efficiency is improved when the searching and the user determining are reduced.
The device control method provided by the embodiment of the disclosure can be applied to any of the following scenarios.
For example, in an intelligent home scene, different pieces of intelligent home equipment have different functions, for example, an intelligent sound box is mainly used for playing audio, an intelligent detector is mainly used for detecting an indoor environment condition, and an intelligent television is used for playing a video file. However, in general, these smart devices are independent of each other, and are not aware of each other's existence, nor can they provide services to users together. By adopting the device control method provided by the embodiment of the disclosure, taking the intelligent sound box and the intelligent detector as examples, a user (namely, a first end) sends a connection trigger instruction which is to connect the intelligent sound box and the intelligent detector indoors (such as a living room), and the intelligent sound box and the intelligent detector receive the connection trigger instruction at the same time; when the intelligent loudspeaker box and the intelligent detector respectively verify that the user identity is legal, a first authentication request and a second authentication request for requesting Bluetooth connection matching are respectively sent to a second terminal (such as a unified authentication platform). When the second end monitors the authentication request sent by the intelligent sound box or the intelligent detector, namely the second end receives the first authentication request, a timing instruction is triggered, a timer is started to time, if the authentication requests sent by the intelligent sound box and the intelligent detector respectively are received within a preset time threshold (for example, 30 seconds), the intelligent sound box and the intelligent detector are determined to meet preset matching conditions at the time, the same verification code is distributed to the intelligent sound box and the intelligent detector, and the verification code is issued to the intelligent sound box and the intelligent detector respectively in an original way, so that the intelligent sound box and the intelligent detector are connected in a Bluetooth pairing mode based on the verification code and by utilizing a Bluetooth mechanism. After the Bluetooth connection between the intelligent sound box and the intelligent detector is established, the intelligent sound box and the intelligent detector can work cooperatively to provide better service for users.
For example, when the smart speaker and the smart detector have established a bluetooth connection, if the user wants to know the indoor air condition, an inquiry about the air condition, such as "small X, how today is the indoor air quality? "the intelligent sound box discerns the key word of the air quality in the user's instruction, acquires the air quality result (for example indoor humidity, indoor specific gas concentration, indoor temperature etc.) that its detected from intelligent detector, and later intelligent sound box plays this intelligent detector's testing result for the user can know the indoor air condition fast, and user experience effect is good.
In a scenario where bluetooth networking is complex, generally, bluetooth device interconnection needs to go through steps of peripheral device search, user confirmation of a target bluetooth device, manual input of a pairing PIN by the user, and the like, and in a case where the networking between bluetooth devices is complex, inconvenience is undoubtedly brought to the user. For example, device a is connected to device B1, device C1, device a is connected to device B2, device C3, and device B2 is connected to device C2. By applying the device control method provided by the embodiment of the disclosure, the user only needs to stagger and send the first connection triggering instruction of "device a is connected with device B1 and device C1", the second connection triggering instruction of "device a is connected with device B2 and device C3", and the third connection triggering instruction of "device B2 is connected with device C2", then these devices send the authentication request to the second end after verifying that the user identity is legal, the second end allocates the verification code I to "device a and device B1" and device C1 ", allocates the verification code II to" device a and device B2 and device C3 ", allocates the verification code III to" device B2 and device C2 ", and then these devices backfill the acquired verification codes into at least one bluetooth module, thereby realizing bluetooth connection and networking with other devices through different verification codes. Because the second end distributes different identifying codes, these equipment carry out the interconnection based on different identifying codes respectively, mutual bluetooth network deployment mutual noninterference can carry out complicated bluetooth network deployment fast, provides more abundant service.
In addition, by the device connection control method, data exchange between devices which cannot directly perform Bluetooth communication due to obstacles or distance limitation can be realized. For example, if the device 1 and the device 3 need to be interconnected, the device 1 and the device 3 cannot be directly interconnected due to interference factors such as obstacles. If the bluetooth networking constructed at present is: device 1-device 2-device 3, i.e. device 1 and device 2 are bluetooth interconnected and device 2 and device 3 are bluetooth interconnected. Indirect data exchange between the device 1 and the device 3 is realized by the device 2 serving as a data exchange bridge between the device 1 and the device 3.
Of course, in addition to the above scenarios, the embodiments of the present disclosure may also be applied to other scenarios requiring bluetooth interconnection of devices.
Fig. 7 is a block diagram illustrating an apparatus control device according to an exemplary embodiment. Referring to fig. 7, the apparatus is applied to a first device and includes a trigger instruction obtaining module 710, an authentication request sending module 720, a matching obtaining module 730, a parsing module 740, and a first connection module 750.
The trigger instruction obtaining module 710 is configured to execute obtaining a connection trigger instruction sent by a first end, where the connection trigger instruction is used to instruct the first device to be triggered to execute bluetooth connection with at least one second device;
the authentication request sending module 720 is configured to send a first authentication request for requesting bluetooth connection matching with the second device to the second terminal when the identity information of the first terminal corresponding to the connection triggering instruction is verified to be legal;
the matching obtaining module 730 is configured to perform obtaining of first matching information sent by the second end according to the first authentication request, where the first matching information includes a first connection code for pairing with a second device;
the parsing module 740 is configured to perform parsing, in response to a first bluetooth connection request sent by the second device, a second connection code from the first bluetooth connection request, where the second connection code is generated by the second end according to a second authentication request sent by the second device; when the first authentication request and the second authentication request meet a preset matching condition, the first connection code and the second connection code are matched;
the first connection module 750 is configured to perform controlling the first device to establish a bluetooth connection with the second device based on the first matching information and the second connection code.
In an exemplary embodiment, as shown in fig. 8, the first connection module 750 may include a matching unit 751 and a connection unit 752.
The matching unit 751 is configured to backfill the first connection code into at least one bluetooth module mounted in the first device, and compare whether the first connection code is matched with the parsed second connection code through the at least one bluetooth module;
the connection unit 752 is configured to perform establishing a bluetooth connection with the second device when the comparison result is a match.
In an exemplary embodiment, the apparatus may further include a connection request module 760 and a second connection module 770.
The connection request module 760 is configured to perform sending a second bluetooth connection request carrying the first connection code to a second device, so that the requested second device performs connection code matching based on the first connection code and a second connection code obtained from the second end;
the second connection module 770 is configured to perform receiving a connection response fed back by the requested second device when the connection code matching is successful, and establishing a bluetooth connection with the requested second device.
In an exemplary embodiment, the first matching information further includes a device relationship table of at least one second device requesting connection matching with the first device, and the device relationship table records device description information and device address information of each second device. The connection request module 760 may include an instruction parsing unit 761, a target device determining unit 762, and a connection request unit 763.
The instruction parsing unit 761 is configured to perform parsing of the device description information of the second device to be connected from the connection trigger instruction;
the target device determining unit 762 is configured to determine, as the target device, at least one second device matching the parsed device description information from the device relationship table;
the connection request unit 763 is configured to execute sending, to the target device, a second device connection request carrying the first connection code based on the device address information of the target device recorded in the device relationship table.
In an exemplary embodiment, the apparatus may further include a user authentication module 780. The user authentication module 780 includes a distance determination unit 781, a voiceprint recognition unit 782, and an authentication unit 783.
The distance determination unit 781 configured to perform determination of a distance to the first end;
the voiceprint recognition unit 782 is configured to, when the distance is smaller than or equal to a preset distance threshold, analyze the voice trigger instruction sent by the first end, and obtain a to-be-authenticated voiceprint feature corresponding to the voice trigger instruction;
the identity authentication unit 783 is configured to perform, if the valid voiceprint feature set is stored in advance, finding a valid voiceprint feature matched with the voiceprint feature to be authenticated, and determining that the identity information of the first end corresponding to the voice trigger instruction is valid.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
FIG. 9 is a block diagram illustrating another device control system in accordance with an exemplary embodiment. Referring to fig. 8, the system may include a first device 910, a second device 920, and a second end 930.
The first device 910 and the second device 920 are configured to execute a connection triggering instruction respectively sent by a first end, where the connection triggering instruction is used to instruct the first device 910 and at least one second device 920 to execute bluetooth connection;
when the identity information of the first end corresponding to the connection triggering instruction is verified to be legal, the first device 910 and the second device 920 are further configured to perform sending a first authentication request and a second authentication request for requesting bluetooth connection matching to the second end 930, respectively;
the second end 930 configured to perform corresponding allocation of first matching information and second matching information according to the first authentication request and the second authentication request, respectively, and send the allocated first matching information and second matching information to the corresponding first device and second device; the first matching information comprises a first connection code for pairing with a second device, and the second matching information comprises a second connection code; when the first authentication request and the second authentication request meet a preset matching condition, the first connection code and the second connection code are matched;
the first device 910 is further configured to perform parsing the second connection code from the first bluetooth connection request in response to the first bluetooth connection request sent by the second device 920;
the first device 910 is further configured to perform controlling to establish a bluetooth connection with the second device 920 based on the first matching information and the second connection code.
In an exemplary embodiment, the second end 930 includes an authentication request receiving module 931, an authentication request processing module 932, and a issuing module 933.
The authentication request receiving module 931 configured to perform receiving a first authentication request sent by a first device for requesting a bluetooth connection match with a second device, and receiving a second authentication request sent by at least one second device for requesting a bluetooth connection match with the first device;
the authentication request processing module 932 is configured to perform corresponding assignment of first matching information and second matching information according to the first authentication request and the second authentication request, respectively, where the first matching information includes a first connection code for pairing with a second device, and the second matching information includes a second connection code; when the first authentication request and the second authentication request meet a preset matching condition, the first connection code and the second connection code are matched;
the issuing module 835 is configured to execute returning the allocated first matching information and second matching information to the corresponding first device and second device according to an authentication request path, so that the first device controls the first device to establish a bluetooth connection with the second device based on the first matching information and the second connection code, and/or the second device controls the second device to establish a bluetooth connection with the first device based on the second matching information and the first connection code.
In an exemplary embodiment, the authentication request processing module 932 includes a timing unit 9321, an authentication request matching unit 9322, and an authentication request processing unit 9323.
The timing unit 9321 is configured to trigger a timing start instruction when monitoring an authentication request which is sent by the first device or the second device and carries legal identity information corresponding to the connection trigger instruction; the connection triggering instruction is used for indicating to trigger the first equipment and at least one second equipment to execute Bluetooth connection;
the authentication request matching unit 9322 is configured to perform determining that the received first authentication request and the second authentication request satisfy a preset matching condition within a time period in which the timing time is less than or equal to a preset time threshold;
the authentication request processing unit 9323 is configured to perform corresponding assignment of paired first matching information and second matching information for each of the first authentication request and the second authentication request that satisfy the preset matching condition, where a first connection code in the paired first matching information matches a second connection code in the paired second matching information.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
FIG. 10 is a block diagram illustrating an electronic device in accordance with an example embodiment. Referring to fig. 10, an electronic device includes a processor; a memory for storing processor-executable instructions; wherein the processor is configured to implement the steps of any of the apparatus control methods in the above embodiments when executing the instructions stored in the memory.
The electronic device may be a bluetooth-enabled device, a terminal, a server, or a similar computing device, taking the electronic device as a server as an example, fig. 10 is a block diagram of an electronic device for device control according to an exemplary embodiment, where the electronic device 1000 may have a relatively large difference due to different configurations or performances, and may include one or more Central Processing Units (CPUs) 1010 (the processors 1010 may include but are not limited to Processing devices such as a microprocessor MCU or a programmable logic device FPGA), a memory 1030 for storing data, and one or more storage media 1020 (e.g., one or more mass storage devices) for storing applications 1023 or data 1022. Memory 1030 and storage media 1020 may be, among other things, transient or persistent storage. The program stored in the storage medium 1020 may include one or more modules, each of which may include a sequence of instructions operating on an electronic device. Still further, the central processor 1010 may be configured to communicate with the storage medium 1020 to execute a series of instruction operations in the storage medium 1020 on the electronic device 1000.
The electronic device 1000 may also include one or more power supplies 1060, one or more wired or wireless network interfaces 1050, one or more input-output interfaces 1040, and/or one or more operating systems 1021, such as Windows Server, Mac OS X, Unix, Linux, FreeBSD, and so forth.
Input-output interface 1040 may be used to receive or transmit data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the electronic device 1000. In one example, i/o Interface 1040 includes a Network adapter (NIC) that may be coupled to other Network devices via a base station to communicate with the internet. In an exemplary embodiment, the input/output interface 1040 may be a Radio Frequency (RF) module for communicating with the internet in a wireless manner.
It will be understood by those skilled in the art that the structure shown in fig. 10 is merely an illustration and is not intended to limit the structure of the electronic device. For example, the electronic device 1000 may also include more or fewer components than shown in FIG. 10, or have a different configuration than shown in FIG. 10.
In an exemplary embodiment, a storage medium comprising instructions, such as a memory comprising instructions, executable by a processor of the electronic device 1000 to perform the above-described method is also provided. Alternatively, the storage medium may be a non-transitory computer readable storage medium, which may be, for example, a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
In an exemplary embodiment, a computer program product is also provided that includes computer instructions stored in a computer readable storage medium. The processor of the electronic device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the electronic device executes the device control method provided in any one of the above embodiments.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.
Claims (10)
1. An apparatus control method applied to a first apparatus, comprising:
acquiring a connection triggering instruction sent by a first end, wherein the connection triggering instruction is used for indicating to trigger the first equipment and at least one second equipment to execute Bluetooth connection;
when the identity identification information of the first end corresponding to the connection triggering instruction is verified to be legal, sending a first authentication request for requesting Bluetooth connection matching with the second equipment to a second end;
acquiring first matching information sent by the second end according to the first authentication request, wherein the first matching information comprises a first connection code used for pairing with second equipment;
responding to a first Bluetooth connection request sent by the second equipment, and analyzing a second connection code from the first Bluetooth connection request, wherein the second connection code is generated by the second end according to a second authentication request sent by the second equipment; when the first authentication request and the second authentication request meet a preset matching condition, the first connection code and the second connection code are matched;
and controlling the first equipment and the second equipment to establish Bluetooth connection based on the first matching information and the second connection code.
2. The device control method according to claim 1, wherein the step of controlling the first device to establish the bluetooth connection with the second device based on the first matching information and the second connection code comprises:
backfilling the first connection code to at least one Bluetooth module carried in the first equipment, and comparing whether the first connection code is matched with the analyzed second connection code through the at least one Bluetooth module;
and when the comparison result is matched, establishing Bluetooth connection with the second equipment.
3. The device control method according to claim 1, wherein after the step of obtaining the first matching information sent by the second end according to the first authentication request, the method further comprises:
sending a second Bluetooth connection request carrying the first connection code to a second device, so that the requested second device performs connection code matching based on the first connection code and a second connection code obtained from the second end;
and receiving a connection response fed back by the requested second equipment when the connection code is successfully matched, and establishing Bluetooth connection with the requested second equipment.
4. The device control method according to claim 3, wherein the first matching information further includes a device relationship table of at least one second device requesting connection matching with the first device, and device description information and device address information of each second device are recorded in the device relationship table;
the step of sending a second device connection request carrying the first connection code to a second device includes:
analyzing the equipment description information of the second equipment to be connected from the connection triggering instruction;
determining at least one second device matched with the analyzed device description information from the device relation table to serve as a target device;
and sending a second device connection request carrying the first connection code to the target device based on the device address information of the target device recorded in the device relation table.
5. The device control method according to any one of claims 1 to 4, wherein the connection trigger instruction includes a voice trigger instruction of a user;
before the step of sending a first authentication request for requesting bluetooth connection matching with the second device to the second terminal when the identity identification information of the first terminal corresponding to the connection triggering instruction is verified to be legal, the method further includes:
determining a distance from the first end;
when the distance is smaller than or equal to a preset distance threshold, analyzing a voice trigger instruction sent by the first end to obtain a voiceprint feature to be authenticated corresponding to the voice trigger instruction;
if the voice trigger instruction is stored in the pre-stored valid voiceprint feature set, a valid voiceprint feature matched with the voiceprint feature to be authenticated is found, and identity identification information of the first end corresponding to the voice trigger instruction is determined to be valid.
6. An apparatus control method applied to a second end, comprising:
receiving a first authentication request sent by a first device and used for requesting the Bluetooth connection matching with a second device, and receiving a second authentication request sent by at least one second device and used for requesting the Bluetooth connection matching with the first device; the first authentication request and the second authentication request are respectively sent by the first device and the second device when the identity identification information of the first end corresponding to the connection triggering instruction is verified to be legal;
correspondingly allocating first matching information and second matching information according to the first authentication request and the second authentication request respectively, wherein the first matching information comprises a first connection code for pairing with second equipment, and the second matching information comprises a second connection code; when the first authentication request and the second authentication request meet a preset matching condition, the first connection code and the second connection code are matched;
and sending the distributed first matching information and second matching information to corresponding first equipment and second equipment so as to enable the first equipment to control the first equipment to establish Bluetooth connection with the second equipment based on the first matching information and the second connection code, and/or enable the second equipment to control the second equipment to establish Bluetooth connection with the first equipment based on the second matching information and the first connection code.
7. The device control method according to claim 6, wherein the step of correspondingly allocating first matching information and second matching information according to the first authentication request and the second authentication request respectively comprises:
triggering a timing starting instruction when monitoring an authentication request sent by the first device or the second device when the identity identification information of the first end corresponding to the connection triggering instruction is verified to be legal; the connection triggering instruction is used for indicating to trigger the first equipment and at least one second equipment to execute Bluetooth connection;
determining that the received first authentication request and the second authentication request meet a preset matching condition within a time period when the timing time is less than or equal to a preset time threshold;
and correspondingly allocating paired first matching information and second matching information for each first authentication request and second authentication request which meet the preset matching condition, wherein a first connection code in the paired first matching information is matched with a second connection code in the paired second matching information.
8. An apparatus control device applied to a first apparatus, comprising:
the device comprises a trigger instruction acquisition module, a first terminal and at least one second terminal, wherein the trigger instruction acquisition module is configured to execute and acquire a connection trigger instruction sent by the first terminal, and the connection trigger instruction is used for indicating to trigger the first device and at least one second device to execute Bluetooth connection;
the authentication request sending module is configured to send a first authentication request for requesting Bluetooth connection matching with the second device to the second terminal when the identity identification information of the first terminal corresponding to the connection triggering instruction is verified to be legal;
a matching obtaining module configured to perform obtaining of first matching information sent by the second end according to the first authentication request, where the first matching information includes a first connection code for pairing with a second device;
the analysis module is configured to analyze a second connection code from the first Bluetooth connection request in response to the first Bluetooth connection request sent by the second device, wherein the second connection code is generated by the second end according to a second authentication request sent by the second device; when the first authentication request and the second authentication request meet a preset matching condition, the first connection code and the second connection code are matched;
a first connection module configured to perform controlling the first device to establish a Bluetooth connection with the second device based on the first matching information and the second connection code.
9. An equipment control system, comprising a first equipment, a second equipment and a second end;
the first device and the second device respectively acquire a connection triggering instruction sent by a first end, wherein the connection triggering instruction is used for indicating to trigger the first device and at least one second device to execute Bluetooth connection;
when the identity identification information of the first end corresponding to the connection triggering instruction is verified to be legal, the first equipment and the second equipment respectively send a first authentication request and a second authentication request for requesting Bluetooth connection matching to the second end;
the second terminal correspondingly allocates first matching information and second matching information respectively according to the first authentication request and the second authentication request, wherein the first matching information comprises a first connection code for pairing with second equipment, and the second matching information comprises a second connection code; when the first authentication request and the second authentication request meet a preset matching condition, the first connection code and the second connection code are matched;
the second end sends the distributed first matching information and second matching information to corresponding first equipment and second equipment;
the first device responds to a first Bluetooth connection request sent by the second device, and analyzes the second connection code from the first Bluetooth connection request;
and the first equipment controls the first equipment to establish Bluetooth connection with the second equipment based on the first matching information and the second connection code.
10. A storage medium in which instructions, when executed by a processor of an electronic device, enable the electronic device to perform the device control method of any one of claims 1 to 5, or the device control method of claim 6 or 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011158721.7A CN112351414B (en) | 2020-10-26 | 2020-10-26 | Equipment control method, device, system and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011158721.7A CN112351414B (en) | 2020-10-26 | 2020-10-26 | Equipment control method, device, system and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112351414A true CN112351414A (en) | 2021-02-09 |
CN112351414B CN112351414B (en) | 2021-11-02 |
Family
ID=74360234
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011158721.7A Active CN112351414B (en) | 2020-10-26 | 2020-10-26 | Equipment control method, device, system and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112351414B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113194465A (en) * | 2021-04-20 | 2021-07-30 | 歌尔股份有限公司 | BLE connection verification method and device between terminals and readable storage medium |
WO2022228028A1 (en) * | 2021-04-30 | 2022-11-03 | 华为技术有限公司 | File sharing method and electronic device |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104580235A (en) * | 2015-01-21 | 2015-04-29 | 北京深思数盾科技有限公司 | Authentication method and authentication system for equipment connection |
CN104917715A (en) * | 2014-03-10 | 2015-09-16 | 联想(北京)有限公司 | Information processing method, information processing device, server and electronic equipment |
US20160255461A1 (en) * | 2011-06-14 | 2016-09-01 | Sonifi Solutions, Inc. | Method and apparatus for pairing a mobile device to an output device |
CN107454558A (en) * | 2017-08-02 | 2017-12-08 | 神州融安科技(北京)有限公司 | A kind of method that master-slave equipment reaches bluetooth and connected automatically by sharing information |
CN108418845A (en) * | 2018-07-13 | 2018-08-17 | 上海银基信息安全技术股份有限公司 | Bluetooth pairing code matches Preparation Method, system, terminal, server and mobile unit |
CN108616354A (en) * | 2018-04-27 | 2018-10-02 | 北京信息科技大学 | Cryptographic key negotiation method and equipment in a kind of mobile communication |
US20180293841A1 (en) * | 2017-04-07 | 2018-10-11 | Jcm American Corporation | Device, System, and Method for Facilitating Communications Between Electronic Gaming Machines and Mobile Devices |
CN109005541A (en) * | 2018-07-20 | 2018-12-14 | 北京海泰方圆科技股份有限公司 | Bluetooth connecting method, device and system |
CN109255873A (en) * | 2018-09-14 | 2019-01-22 | 天津安伴智能科技有限公司 | Bluetooth method for unlocking, apparatus and system |
CN110944313A (en) * | 2019-12-04 | 2020-03-31 | 惠州Tcl移动通信有限公司 | Bluetooth connection method, device, storage medium and terminal |
CN111541642A (en) * | 2020-03-17 | 2020-08-14 | 广州亚美智造科技有限公司 | Bluetooth encryption communication method and device based on dynamic secret key and computer equipment |
-
2020
- 2020-10-26 CN CN202011158721.7A patent/CN112351414B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160255461A1 (en) * | 2011-06-14 | 2016-09-01 | Sonifi Solutions, Inc. | Method and apparatus for pairing a mobile device to an output device |
CN104917715A (en) * | 2014-03-10 | 2015-09-16 | 联想(北京)有限公司 | Information processing method, information processing device, server and electronic equipment |
CN104580235A (en) * | 2015-01-21 | 2015-04-29 | 北京深思数盾科技有限公司 | Authentication method and authentication system for equipment connection |
US20180293841A1 (en) * | 2017-04-07 | 2018-10-11 | Jcm American Corporation | Device, System, and Method for Facilitating Communications Between Electronic Gaming Machines and Mobile Devices |
CN107454558A (en) * | 2017-08-02 | 2017-12-08 | 神州融安科技(北京)有限公司 | A kind of method that master-slave equipment reaches bluetooth and connected automatically by sharing information |
CN108616354A (en) * | 2018-04-27 | 2018-10-02 | 北京信息科技大学 | Cryptographic key negotiation method and equipment in a kind of mobile communication |
CN108418845A (en) * | 2018-07-13 | 2018-08-17 | 上海银基信息安全技术股份有限公司 | Bluetooth pairing code matches Preparation Method, system, terminal, server and mobile unit |
CN109005541A (en) * | 2018-07-20 | 2018-12-14 | 北京海泰方圆科技股份有限公司 | Bluetooth connecting method, device and system |
CN109255873A (en) * | 2018-09-14 | 2019-01-22 | 天津安伴智能科技有限公司 | Bluetooth method for unlocking, apparatus and system |
CN110944313A (en) * | 2019-12-04 | 2020-03-31 | 惠州Tcl移动通信有限公司 | Bluetooth connection method, device, storage medium and terminal |
CN111541642A (en) * | 2020-03-17 | 2020-08-14 | 广州亚美智造科技有限公司 | Bluetooth encryption communication method and device based on dynamic secret key and computer equipment |
Non-Patent Citations (2)
Title |
---|
SAMTA GAJBHIYE等: "Design, Implementation and Security Analysis of Bluetooth Pairing Protocol in NS2", 《2016 INTL. CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI)》 * |
朱正伟: "一种利用NFC技术实现蓝牙快速连接的研究", 《自动化仪表》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113194465A (en) * | 2021-04-20 | 2021-07-30 | 歌尔股份有限公司 | BLE connection verification method and device between terminals and readable storage medium |
CN113194465B (en) * | 2021-04-20 | 2023-11-24 | 歌尔股份有限公司 | BLE connection verification method and device between terminals and readable storage medium |
WO2022228028A1 (en) * | 2021-04-30 | 2022-11-03 | 华为技术有限公司 | File sharing method and electronic device |
Also Published As
Publication number | Publication date |
---|---|
CN112351414B (en) | 2021-11-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110235456B (en) | Intelligent device network access method, mobile terminal, cloud server, device and system | |
CN107483715B (en) | Method and system for communication between terminal and equipment, terminal and storage medium | |
KR102417682B1 (en) | Method and apparatus for managing nick name using a voice recognition | |
CN110933614B (en) | Communication processing method and device and electronic equipment | |
WO2022016669A1 (en) | Bluetooth network configuration method, device, and storage medium | |
US20170093510A1 (en) | Audio playing method and apparatus based on bluetooth connection | |
CN112351414B (en) | Equipment control method, device, system and storage medium | |
EP3595247A1 (en) | Identity authentication method and system, server and terminal | |
CN111149334A (en) | Remote device control | |
CN112738805A (en) | Device control method and apparatus, storage medium, and electronic device | |
KR20140124304A (en) | Controlling Method for Communication and Electronic Device supporting the same | |
CN112152853A (en) | Equipment network distribution method and device, computer-readable storage medium and electronic device | |
KR20140117349A (en) | Connecting wireless devices | |
CN111490916B (en) | Method, system, device and medium for binding ZigBee sub-devices of ZigBee | |
US20190089693A1 (en) | Systems and methods for authenticating internet-of-things devices | |
CN106789470B (en) | Terminal resource sharing method, device and system | |
CN110858971A (en) | Intelligent device network distribution method and system | |
US20240134958A1 (en) | Device control permission setting method and apparatus, and computer device and storage medium | |
US20230156466A1 (en) | Bluetooth Networking Method for Electronic Device and Related Device | |
CN104615005A (en) | Internal management control method of interactive multimedia equipment group | |
KR20220013837A (en) | Method and apparatus for managing electronic device | |
CN113596141B (en) | Method and device for setting device control authority, computer device and storage medium | |
WO2021248963A1 (en) | Home appliance, networking method therefor, control terminal, and computer storage medium | |
CN110855535A (en) | Gateway equipment, home equipment and connection method between gateway equipment and home equipment | |
US20240020369A1 (en) | Speech control system and method, apparatus, device, medium, and program product |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |