CN112631486A - Equipment control method and device - Google Patents
Equipment control method and device Download PDFInfo
- Publication number
- CN112631486A CN112631486A CN202011496074.0A CN202011496074A CN112631486A CN 112631486 A CN112631486 A CN 112631486A CN 202011496074 A CN202011496074 A CN 202011496074A CN 112631486 A CN112631486 A CN 112631486A
- Authority
- CN
- China
- Prior art keywords
- terminal
- server
- authorized
- unauthorized
- control interface
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 119
- 238000013475 authorization Methods 0.000 claims description 17
- 230000001360 synchronised effect Effects 0.000 claims description 10
- 230000008569 process Effects 0.000 claims description 9
- 230000000007 visual effect Effects 0.000 description 87
- 230000009471 action Effects 0.000 description 63
- 238000010586 diagram Methods 0.000 description 11
- 230000006870 function Effects 0.000 description 11
- 230000002452 interceptive effect Effects 0.000 description 9
- 230000004044 response Effects 0.000 description 7
- 238000004891 communication Methods 0.000 description 6
- 230000001960 triggered effect Effects 0.000 description 5
- 230000003993 interaction Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 241001657948 Midea Species 0.000 description 2
- 241000209094 Oryza Species 0.000 description 2
- 235000007164 Oryza sativa Nutrition 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 235000009566 rice Nutrition 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 1
- 238000010411 cooking Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0484—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/451—Execution arrangements for user interfaces
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y10/00—Economic sectors
- G16Y10/80—Homes; Buildings
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y40/00—IoT characterised by the purpose of the information processing
- G16Y40/30—Control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/141—Setup of application sessions
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Development Economics (AREA)
- Architecture (AREA)
- Business, Economics & Management (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Structural Engineering (AREA)
- Civil Engineering (AREA)
- Accounting & Taxation (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Telephonic Communication Services (AREA)
Abstract
The application discloses a device control method and device. The control method of the equipment comprises the following steps: the unauthorized terminal establishes connection with the server through the temporary account to acquire an equipment control interface of the authorized terminal; and the temporary account number is associated with an account number of the authorized terminal; and the unauthorized terminal generates an operation instruction through the obtained equipment control interface, and the server can perform corresponding operation control on the equipment according to the operation instruction. The control method of the device can enable the unauthorized terminal to control the device under the condition that the device is not provided for controlling the APP and the account is not registered.
Description
Technical Field
The present application relates to the field of device control technologies, and in particular, to a device control method and apparatus.
Background
With the development of the internet of things technology, smart home devices are also rapidly popularized. A user can remotely operate one or more intelligent household devices in a home or office by using a human-computer interaction interface of an APP (application) installed on a mobile terminal such as a mobile phone and the like so as to obtain more automatic and intelligent scene control functions.
Among them, the following methods for performing human-computer interaction on smart home devices by using a mobile terminal are known:
1. by utilizing the communication functions of the mobile terminal, such as infrared/Bluetooth, the intelligent household equipment can be directly controlled without configuration.
2. The APP is installed on the mobile terminal, the mobile terminal is connected to the Internet through WiFi, cellular network and other communication modes, and the intelligent household equipment is indirectly controlled through the cloud server.
Among them, in the method 1, since the control distance is limited by the communication distance, and a plurality of devices cannot be controlled simultaneously (for example, in a scene mode such as "go home", a command needs to be issued to a combination of a plurality of devices), the use range is narrow, and most of the mainstream products in the market are the method 2. However, the method 2 needs to register a user account and configure a binding relationship with the device to be controlled before use, and needs to download a special App, which is relatively bulky.
Therefore, when a customer experiences a control function in an experience shop under the intelligent household appliance line, or a visitor wants to use the control function temporarily in a visited place, if the user does not install an apparatus control APP on the mobile terminal, or registers an account and configures and binds the intelligent household appliance, the control function using the mobile terminal cannot be realized.
Disclosure of Invention
The present application provides a method and an apparatus for controlling a device, so as to solve at least one of the above problems in the prior art.
To achieve the above object, the present application provides a method for controlling an apparatus, the method comprising:
the unauthorized terminal establishes connection with the server through the temporary account to acquire an equipment control interface of the authorized terminal; and the temporary account number is associated with an account number of the authorized terminal;
and the unauthorized terminal generates an operation instruction through the obtained equipment control interface, and the server can perform corresponding operation control on the equipment according to the operation instruction.
Wherein, the unauthorized terminal obtains the device control interface of the authorized terminal, including:
the unauthorized terminal acquires an equipment control interface adjusted by the server from the server; or,
and the unauthorized terminal acquires the equipment control interface from the authorized terminal under the authorization of the server.
Wherein, unauthorized terminal obtains equipment control interface from the server, includes:
an unauthorized terminal logs in the temporary link through the temporary account to obtain an equipment control interface; the temporary link is applied to the server by the authorized terminal and obtained, and the temporary link comprises the equipment control interface.
Wherein, the unauthorized terminal obtains the equipment control interface from the authorized terminal under the authorization of the server, including:
the unauthorized terminal establishes local synchronous connection with the authorized terminal under the authorization of the server;
and the unauthorized terminal and the authorized terminal synchronize the control interface of the interactive equipment.
The method for obtaining the device control interface of the authorized terminal by applying the authorized terminal to the server based on the device information includes:
and acquiring the equipment control interface of the corresponding equipment information of the authorized terminal.
The temporary account is obtained by an authorized terminal through applying to a server based on authorization information; the control method further comprises the following steps:
the unauthorized terminal sends the operation instruction to the server so that the server performs corresponding operation control on the equipment based on the authorization information; or,
and the unauthorized terminal sends the operation instruction to the authorized terminal so that the authorized terminal sends an operation command to the server, and the server performs corresponding operation control on the equipment.
The method comprises the following steps that the unauthorized terminal establishes connection with a server through a temporary account, and comprises the following steps:
an unauthorized terminal applies for obtaining a temporary account number from a server;
an unauthorized terminal acquires a token of an authorized terminal;
the unauthorized terminal associates the temporary account with the account of the authorized terminal using the token.
The control method further comprises the following steps:
and in the process of generating the operation instruction by the unauthorized terminal, synchronously displaying the animation on the obtained equipment control interface on the equipment control interface of the authorized terminal.
To achieve the above object, the present application provides a method for controlling an apparatus, the method comprising:
and the authorized terminal applies for the temporary account to the server, so that the unauthorized terminal establishes connection with the server according to the temporary account and acquires the equipment control interface of the authorized terminal.
The control method further comprises the following steps:
an authorized terminal applies for a temporary link to a server, wherein the temporary link comprises an equipment control interface;
and the authorized terminal displays the temporary link and the temporary account number, so that the unauthorized terminal logs in the temporary link according to the temporary account number.
The control method further comprises the following steps:
and the authorized terminal establishes synchronous connection with the unauthorized terminal under the authorization of the server so that the unauthorized terminal and the authorized terminal synchronously interact with the equipment control interface.
Wherein, the authorized terminal applies for the temporary account number from the server, including:
and the authorized terminal applies for the temporary account to the server based on the equipment information, so that the unauthorized terminal acquires an equipment control interface corresponding to the equipment information.
The control method further comprises the following steps:
the authorized terminal receives an operation instruction sent by the unauthorized terminal, and the operation instruction is generated by the unauthorized terminal through the acquired equipment control interface;
and the authorized terminal sends an operation command to the server according to the operation instruction so that the server performs corresponding operation control on the equipment.
The control method further comprises the following steps:
and synchronously displaying the animation of the unauthorized terminal on the obtained equipment control interface on the equipment control interface of the authorized terminal, wherein the animation appears in the process of generating the operation instruction.
To achieve the above object, the present application provides a method for controlling an apparatus, the method comprising:
the server confirms a temporary account number associated with the account number of the authorized terminal, wherein the temporary account number is used for enabling the unauthorized terminal to establish connection with the server, and the unauthorized terminal can obtain an equipment control interface of the authorized terminal;
and the server performs corresponding operation control on the equipment according to the operation instruction, and the operation instruction is generated by the unauthorized terminal through the obtained equipment control interface.
The server confirms the temporary account number associated with the account number of the authorized terminal, and the method comprises the following steps:
the server receives an application request of a temporary account of an authorized terminal so as to send the temporary account to the authorized terminal; or,
the server receives an application request of a temporary account of an unauthorized terminal so as to send the temporary account to the unauthorized terminal; the server interacts with the unauthorized terminal to associate the temporary account with the account of the authorized terminal using the token of the authorized terminal.
The control method further comprises the following steps:
under the condition that the unauthorized terminal establishes connection with the server through the temporary account, the server sends the equipment control interface adjusted by the server to the unauthorized terminal; or the server authorizes the authorized terminal to send the device control interface to the unauthorized terminal.
The method for receiving the application request of the temporary account of the authorized terminal by the server comprises the following steps: the server receives an application request of a temporary account of an authorized terminal based on the equipment information;
the control method further comprises the following steps: and under the condition that the unauthorized terminal establishes connection with the server through the temporary account, the server sends a device control interface of the corresponding device information of the authorized terminal to the unauthorized terminal.
To achieve the above object, the present application provides an electronic device including a processor for executing instructions to implement the above method.
To achieve the above object, the present application provides a computer-readable storage medium for storing instructions/program data that can be executed to implement the above-described method.
The unauthorized terminal is connected with the server based on the temporary account applied to the server by the authorized terminal, so that the unauthorized terminal can acquire the equipment control interface of the authorized terminal, the unauthorized terminal controls equipment based on the acquired equipment control interface of the authorized terminal, the unauthorized terminal can conveniently establish connection with the server to control the equipment based on the account and/or the authority of the authorized terminal bound with the equipment, the equipment control interface of the equipment management APP and other control equipment, and the unauthorized terminal can establish connection with the server based on the temporary account applied by the authorized terminal under the condition that the equipment control APP is not installed, the account bound with the equipment is not logged in on the equipment control APP, or the binding of the account and the equipment is not completed on the equipment control APP, so that the privacy of a secondary terminal user can be protected.
Drawings
FIG. 1 is a schematic flow chart diagram of an embodiment of a method of controlling the apparatus of the present application;
fig. 2 is a schematic view of a workflow of an unauthorized terminal in the control method of the device of the present application;
FIG. 3 is a schematic diagram illustrating the operation of a server in the control method of the apparatus of the present application;
FIG. 4 is a schematic diagram of an embodiment of a method of controlling the apparatus of the present application;
FIG. 5 is a flowchart illustrating an embodiment of a method for directing the operation of a slave terminal by a master terminal according to the present application;
FIG. 6 is a schematic view of a work flow of a master terminal in the method for guiding the operation of a slave terminal by the master terminal according to the present application;
FIG. 7 is a schematic diagram of a work flow of a slave terminal in the method for guiding the operation of the slave terminal by a master terminal according to the present application;
FIG. 8 is a flow chart illustrating another embodiment of a method for directing the operation of a slave terminal by a master terminal according to the present application;
FIG. 9 is a flow chart illustrating a method for directing the operation of a slave terminal by a master terminal according to another embodiment of the present application;
FIG. 10 is a schematic diagram of an embodiment of an electronic device;
FIG. 11 is a schematic structural diagram of an embodiment of a computer storage medium according to the present application.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, the following describes a control method and apparatus of a device provided in the present application in further detail with reference to the accompanying drawings and the detailed description.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by those skilled in the art that the embodiments described herein can be combined with other embodiments without conflict.
The control method of the equipment can be applied to a scene that a user experiences and uses own terminal control equipment under the condition that the user wants to not download the equipment control APP and does not register the equipment control account number when the user experiences the off-line experience shop from the equipment, or the scene that the user needs the own standby terminal to have the function of temporarily controlling the equipment under the condition that the user does not download the equipment control APP and/or does not register the equipment control account number. Of course, the application scenario of the control method of the device of the present application is not limited to the above scenario.
Based on this, the method for remotely operating the equipment through the terminal (or the standby terminal) of the user by borrowing the APP, the equipment control account and the permission of the shopping-guided mobile phone (or the main terminal of the user) without downloading the complete APP, registering the equipment control account and configuring the equipment permission at the terminal (or the standby terminal) of the user can be provided. Referring to fig. 1, fig. 1 is a schematic flow chart of a first embodiment of a control method of the device of the present application. The control method of the apparatus of the present embodiment includes the following steps. It should be noted that the following numbers are only used for simplifying the description, and are not intended to limit the execution order of the steps, and the execution order of the steps in the present embodiment may be arbitrarily changed without departing from the technical idea of the present application.
S101: and the authorized terminal applies for the temporary account number from the server.
The authorized terminal can apply for a temporary account to the server first, so that a subsequent unauthorized terminal can establish connection with the server based on the temporary account, acquire a device control interface of the authorized terminal, and control the device based on the device control interface of the authorized terminal, so that the unauthorized terminal can establish connection with the server based on the temporary account applied by the authorized terminal to control the device without downloading a device control APP (e.g., a american APP or an ali smart APP) and registering a device control account.
The authorized terminal may refer to a terminal that has been bound to the device through the server, that is, the authorized terminal has the right to control the device. Specifically, the authorized terminal may refer to a terminal that has installed the device control APP and has logged in an account number bound to the device on the device control APP.
And an unauthorized terminal may refer to a terminal that is not bound to a device, i.e., an unauthorized terminal does not have the right to control a device. Specifically, the unauthorized terminal may refer to a terminal where the device control APP is not installed, or a terminal where an account bound to the device is not logged in the device control APP, or a terminal where a self account and the device are not bound to each other on the device control APP.
The temporary account is obtained by applying from an authorized terminal to a server, so that the unauthorized terminal can establish connection with the server to control the device based on the account and/or permission of the authorized terminal bound with the device, the device control interface of the device management APP, and the like, and thus the unauthorized terminal can establish connection with the server to control the device based on the temporary account applied by the authorized terminal without installing the device control APP, logging in the account bound with the device on the device control APP, or completing the binding of the self account with the device on the device control APP.
Optionally, the authorized terminal may send an application request of the temporary account to the server, so that the server sends the temporary account to the authorized terminal after receiving the application request, so that when the unauthorized terminal knows or acquires the temporary account, the connection is established with the server through the temporary account.
In addition, when the authorized terminal applies for the temporary account to the server, the device information can be sent to the server together, so that the temporary account obtained by applying for the authorized account has the authority of controlling the device corresponding to the device information. The device information may include information such as a device model (e.g., KFR-35G/WDBN8D3, etc.) and a device ID (e.g., mieea _ ac _ sn001113, etc.).
In addition, when the authorized terminal applies for the temporary account to the server, the authorized terminal can send the temporary control time to the server together, so that the unauthorized terminal can control the device based on the temporary account applied for obtaining by the authorized terminal within the temporary control time.
It is understood that the temporary account is generated by the server based on the device control account on the authorized terminal, so that the control authority of the device by the temporary account is associated with the control authority of the device control account on the authorized terminal. Generally, the control authority of the temporary account number on the device is equal to or less than the control authority of the device control account number of the authorized terminal on the device. Further, when the authorized terminal applies for the temporary account to the server, the limited requirement of the control authority of the temporary account may be sent to the server, so that the server generates the temporary account based on the limited requirement and the device control account of the authorized terminal, and thus the control authority of the temporary account to the device may be equal to a union set of the limited requirement and the control authority of the device control account to the device.
The temporary account applied by the authorized terminal may be an identification code, a temporary link, or an account and a password.
S102: and the unauthorized terminal establishes connection with the server through the temporary account to acquire the equipment control interface of the authorized terminal.
After the authorized terminal applies the temporary account to the server, the unauthorized terminal can establish connection with the server through the temporary account, so that the unauthorized terminal can acquire the equipment control interface of the authorized terminal, and the subsequent unauthorized terminal can control the equipment based on the acquired equipment control interface of the authorized terminal, so that the unauthorized terminal can establish connection with the server to control the equipment based on the temporary account applied by the authorized terminal under the condition of not downloading the equipment control APP and the registration account.
In one implementation, the temporary account obtained by the authorized terminal is an identification code, and the unauthorized terminal may complete login of the temporary account by scanning the identification code, so as to establish connection with the server. For example, the authorized terminal may enter a device control applet commonly used by a third party, such as a WeChat or Payment treasure, by scanning a temporary account in the form of an identification code to complete connection with the server, so that the unauthorized terminal may display the acquired device control interface of the authorized terminal in the applet.
In another implementation manner, the temporary account obtained by the authorized terminal may include an account and a password, at this time, the unauthorized terminal may obtain the account and the password of the temporary account input by the user through an input interface of a device control applet, a web page, or the like, commonly used by a third party, such as a wechat or a payment treasure, and then establish a connection with the server based on the account and the password on the input interface, so that the unauthorized terminal may display the obtained device control interface of the authorized terminal in the device control applet, the web page, or the like, commonly used by the third party, such as the wechat or the payment treasure.
In another implementation manner, the temporary account acquired by the authorized terminal may be in the form of a website, and at this time, the unauthorized terminal may directly enter the temporary link through the temporary account to complete login of the temporary account, so as to establish connection with the server, and thus, the unauthorized terminal may display the acquired device control interface of the authorized terminal in the temporary link. Wherein, the temporary link is obtained by applying from an authorized terminal to the server. And the temporary link includes a device control interface of the authorized terminal.
It can be understood that the authorized terminal is a terminal that has been bound to the device through the server, that is, the authorized terminal has established a connection with the server, and after the unauthorized terminal establishes a connection with the server through the temporary account, the unauthorized terminal can indirectly connect with the authorized terminal through the server to obtain the device control interface of the authorized terminal through the server.
Before the unauthorized terminal acquires the device control interface of the authorized terminal through the server, the screen information of the unauthorized terminal can be sent to the server, so that the server can adjust the device control interface of the authorized terminal based on the screen information of the unauthorized terminal; the server then sends the adjusted device control interface of the authorized terminal to the unauthorized terminal. The screen information of the unauthorized terminal may include information such as a screen size and/or a screen resolution of the unauthorized terminal.
In addition, the device control interface acquired by the unauthorized terminal may be a current device control interface of the authorized terminal, and after the unauthorized terminal acquires the operation instruction through the device control interface, the operation instruction may be sent to the authorized terminal to acquire the device control interface after the authorized terminal switches in response to the operation instruction. Of course, in other implementation manners, the device control interface acquired by the unauthorized terminal may be an interactive interface, and after the unauthorized terminal acquires the operation instruction through the device control interface, the unauthorized terminal may automatically adjust the device control interface in response to the operation instruction or switch to the next device control interface.
In other implementations, the unauthorized terminal may directly obtain the device control interface of the authorized terminal from the authorized terminal under the authorization of the server, so as to interact with the device control interface synchronously with the authorized terminal under the authorization of the server. Specifically, the unauthorized terminal may establish local synchronous connection with the authorized terminal under the condition of logging in to the server through the temporary account, and the unauthorized terminal may first obtain the device control interface of the authorized terminal through the synchronous connection with the authorized terminal; and then, after generating an operation instruction based on the acquired equipment control interface, the unauthorized terminal sends the operation instruction to the authorized terminal so as to acquire the equipment control interface switched by the authorized terminal in response to the operation instruction, thereby realizing synchronous interaction of the equipment control interface between the unauthorized terminal and the authorized terminal. Of course, in other embodiments, when the device control interface of the authorized terminal acquired by the unauthorized terminal is the interactive interface, the unauthorized terminal sends the operation instruction to the authorized terminal after generating the operation instruction based on the acquired device control interface, so that the authorized terminal switches the device control interface in response to the operation instruction, thereby implementing the synchronization of the device control interfaces of the unauthorized terminal and the authorized terminal.
Further, if the temporary account is obtained by applying from the authorized terminal to the server based on the device information, the unauthorized terminal will obtain the device control interface corresponding to the device information of the authorized terminal. For example, when an authorized terminal applies for a temporary account to a server, it sends device information such as a device model (e.g., KFR-35G/WDBN8D3, etc.) and a device ID (e.g., Midea _ ac _ sn001113, etc.) to the server, so that the temporary account obtained by the authorized account application has an authority to control a device corresponding to the device information, and after an unauthorized terminal establishes a connection with the server through the temporary account, a device control interface of the device information corresponding to the authorized terminal is sent to the unauthorized terminal by the authorized terminal or the server.
S103: and the unauthorized terminal generates an operation instruction through the obtained equipment control interface, and the server can perform corresponding operation control on the equipment according to the operation instruction.
After the unauthorized terminal acquires the device control interface of the authorized terminal, an operation instruction can be generated through the acquired device control interface, so that the server performs corresponding operation control on the device according to the operation instruction.
It can be understood that, after the unauthorized terminal generates an operation instruction through the obtained device control interface, the operation instruction can be sent to the authorized terminal; the authorized terminal confirms that the operation instruction is not a control instruction for the equipment, and can respond to the operation instruction to switch the equipment control interface when only the switching instruction of the equipment control interface is used; the authorized terminal confirms that the operation instruction is a control instruction for the equipment, and performs corresponding operation control on the equipment through the server based on the operation instruction, and also performs switching of the equipment control interface based on the operation instruction so as to ensure page synchronization of the equipment control interfaces of the authorized terminal and the unauthorized terminal, so that a user of the authorized terminal can know real-time operation of the unauthorized terminal. Of course, after the unauthorized terminal generates an operation instruction through the obtained device control interface, the operation instruction can also be directly sent to the server, so that the server performs corresponding operation control on the device, and the server realizes the interface synchronization of the authorized terminal and the unauthorized terminal. After the device control interface of the authorized terminal is switched, if the authorized terminal confirms that the device control interface acquired by the unauthorized terminal does not contain the switched device control interface, the authorized terminal also sends the switched device control interface to the unauthorized terminal, so that the unauthorized terminal can control the device based on the device control interface.
In other implementation manners, after the unauthorized terminal generates an operation instruction through the obtained equipment control interface; if the operation instruction is a control instruction for the device, the unauthorized terminal can send the operation instruction to the authorized terminal or the server, so that the authorized terminal or the server can perform corresponding operation control on the device based on the operation instruction; if the operation instruction is not a control instruction for the device, only a switching instruction of the device control interface, and the device control interface obtained by the unauthorized terminal includes the device control interface switched based on the operation instruction, the unauthorized terminal may not send the operation instruction to the authorized terminal or the server; if the operation instruction is not a control instruction for the device, but is only a switching instruction for the device control interface, and the device control interface obtained by the unauthorized terminal does not include the device control interface switched based on the operation instruction, the unauthorized terminal may send the operation instruction to the authorized terminal or the server, so as to obtain the switched device control interface through the authorized terminal or the server.
It can be understood that, after the unauthorized terminal obtains the operation instruction through the device control interface, the operation instruction can be sent to the authorized terminal, so that the authorized terminal sends the operation instruction to the server based on the operation instruction, and then the server performs corresponding operation control on the device. It can be understood that, when the operation instruction is not a control instruction for the device but only a switching instruction for the device control interface, the authorized terminal may switch the device control interface in response to the operation instruction, and if the device control interface acquired by the unauthorized terminal does not include the switched device control interface, the authorized terminal may also send the switched device control interface to the unauthorized terminal.
In another implementation manner, after the unauthorized terminal acquires the operation instruction through the device control interface, the operation instruction may be directly sent to the server, so that the server performs corresponding operation control on the device based on the operation instruction. It can be understood that, when the operation instruction is not a control instruction for the device but only a switching instruction for the device control interface, the server sends the operation instruction to the authorized terminal, and the authorized terminal can switch the device control interface in response to the operation instruction, and if the device control interface acquired by the unauthorized terminal does not include the switched device control interface, the authorized terminal also sends the switched device control interface to the unauthorized terminal.
It can be understood that, because the device control interface is obtained by the unauthorized terminal based on the temporary account, after the unauthorized terminal sends the operation instruction obtained based on the device control interface to the server, the server can correspondingly control the device based on the control authority of the temporary account for the device. Specifically, if the server determines that the operation instruction does not exceed the control right of the temporary account to the device, the server performs a corresponding control operation on the device based on the operation instruction, and if the server determines that the operation instruction exceeds the control right of the temporary account to the device, the server ignores the operation instruction, and may not perform operation control corresponding to the operation instruction on the device.
In this embodiment, the unauthorized terminal establishes a connection with the server based on the temporary account applied by the authorized terminal to the server, so that the unauthorized terminal can acquire the device control interface of the authorized terminal, and thus the unauthorized terminal controls the device based on the acquired device control interface of the authorized terminal, so that the unauthorized terminal can establish a connection with the server to control the device based on the account and/or the authority of the authorized terminal bound to the device, the device control interface of the device management APP, and other control devices, so that the unauthorized terminal can protect the privacy of the secondary terminal user without installing the device control APP, logging in the account bound to the device on the device control APP, or establishing a connection with the server based on the temporary account applied by the authorized terminal without completing the binding of the self account with the device on the device control APP.
Of course, the temporary account is not limited to being obtained by the method in step S101, as long as the temporary account is associated with the account of the authorized terminal before step S102. For example, the unauthorized terminal may apply for a temporary account from the server itself, and then establish a relationship between the temporary account applied by the unauthorized terminal and an account of an authorized terminal, so that after the unauthorized terminal logs in to the server through the temporary account, the unauthorized terminal may control the device through the authority and control interface of the authorized terminal account. The association between the temporary account and the account of the authorized terminal can be established face to face, specifically, the unauthorized terminal obtains the token of the authorized terminal from the authorized terminal in a scanning mode, and then the temporary account assigned to the unauthorized terminal by the server is associated with the account of the authorized terminal by using the token of the authorized terminal.
Referring to fig. 2, for an unauthorized terminal, steps of a method for controlling a device are implemented, and fig. 2 is a schematic diagram of a workflow of the unauthorized terminal in the method for controlling a device according to the present application.
S201: and the unauthorized terminal establishes connection with the server through the temporary account to acquire the equipment control interface of the authorized terminal.
The equipment can be internet of things equipment, specifically can be intelligent household appliances and the like, such as a refrigerator or an air conditioner and the like. The unauthorized terminal may be a terminal device, such as a mobile phone or a computer.
S202: and the unauthorized terminal generates an operation instruction through the obtained equipment control interface, and the server can perform corresponding operation control on the equipment according to the operation instruction.
The steps in this embodiment are similar to those in the embodiment shown in fig. 1, and are not described again in detail. The unauthorized terminal establishes connection with the server based on the temporary account applied by the authorized terminal to the server, so that the unauthorized terminal can acquire the equipment control interface of the authorized terminal, and control the equipment based on the equipment control interface of the acquired authorized terminal, so that the unauthorized terminal can establish connection with the server based on the temporary account applied by the authorized terminal to control the equipment under the condition that the equipment control APP is not installed, the account bound with the equipment is not logged in on the equipment control APP, or the binding of the self account and the equipment is not completed on the equipment control APP, and the privacy of a slave terminal user can be protected.
For an authorized terminal, the steps of implementing the control method of the device are as follows.
S301: and the authorized terminal applies for the temporary account to the server, so that the unauthorized terminal establishes connection with the server according to the temporary account and acquires the equipment control interface of the authorized terminal.
The authorized terminal may be a terminal device, such as a mobile phone or a computer.
Optionally, the authorized terminal may apply for a temporary link to the server, where the temporary link includes the device control interface; and then the authorized terminal displays the temporary link and the temporary account number, so that the unauthorized terminal logs in the temporary link according to the temporary account number to establish connection with the server through the temporary account number.
After the unauthorized terminal establishes connection with the server through the temporary account, the authorized terminal can establish synchronous connection with the unauthorized terminal under the authorization of the server, so that the unauthorized terminal and the authorized terminal synchronously interact with the equipment control interface, and the unauthorized terminal obtains the equipment control interface of the authorized terminal. And when the temporary account is obtained by applying the authorized terminal to the server based on the device information, the device control interface obtained by the unauthorized terminal is the device control interface corresponding to the device information of the authorized terminal.
After the unauthorized terminal acquires the device control interface of the authorized terminal, an operation instruction can be generated through the device control interface, and then the operation instruction is sent to the authorized terminal, so that the authorized terminal can receive the operation instruction sent by the unauthorized terminal, and then the authorized terminal can send the operation instruction to the server according to the operation instruction, and the server performs corresponding operation control on the device.
The above steps are similar to the related steps in the embodiment shown in fig. 1, and detailed description is omitted. The authorized terminal applies for the temporary account number to the server, so that the unauthorized terminal establishes connection with the server according to the temporary account number and acquires the equipment control interface of the authorized terminal, and the unauthorized terminal can control equipment based on the acquired equipment control interface of the authorized terminal, so that the unauthorized terminal can establish connection with the server to control the equipment based on the temporary account number applied by the authorized terminal under the condition that the equipment control APP is not installed, the account number bound with the equipment is not logged in on the equipment control APP, or the binding of the self account number and the equipment is not completed on the equipment control APP, and the privacy of a slave terminal user can be protected.
Referring to fig. 3, please refer to a server for implementing steps of a device control method, and fig. 3 is a schematic diagram of a workflow of the server in the device control method of the present application.
S401: the server receives an application request of a temporary account of an authorized terminal so as to send the temporary account to the authorized terminal.
After receiving the application request of the temporary account of the authorized terminal, the server can send the temporary account to the authorized terminal, so that when the unauthorized terminal knows or acquires the temporary account, the unauthorized terminal can establish connection with the server through the temporary account, and at the moment, the server can send the device control interface of the authorized terminal to the unauthorized terminal; alternatively, the server may authorize the authorized terminal to send the device control interface to the unauthorized terminal, so that the unauthorized terminal may obtain the device control interface of the authorized terminal. When the temporary account is obtained by applying the authorized terminal to the server based on the device information, and when the unauthorized terminal establishes connection with the server through the temporary account, the server can send the device control interface corresponding to the device information of the authorized terminal to the unauthorized terminal.
S402: and the server performs corresponding operation control on the equipment according to the operation instruction.
After the server sends the device control interface of the authorized terminal to the unauthorized terminal, or the authorized terminal sends the device control interface of the authorized terminal to the unauthorized terminal under the authorization of the server, the server can obtain an operation instruction generated by the unauthorized terminal through the obtained device control interface, so that the server can perform corresponding operation control on the device according to the operation instruction.
The steps in this embodiment are similar to those in the embodiment shown in fig. 1, and are not described again in detail. The server receives an application request of a temporary account of an authorized terminal to send the temporary account to the authorized terminal, so that the unauthorized terminal can establish connection through the temporary account, the unauthorized terminal can obtain an equipment control interface of the authorized terminal through the server, the unauthorized terminal can generate an operation instruction through the obtained equipment control interface, the server can perform corresponding operation control on equipment according to the operation instruction, so that the unauthorized terminal can establish connection with the server to control the equipment based on the temporary account applied by the authorized terminal under the condition that the equipment control APP is not installed, the account bound with the equipment is not logged in on the equipment control APP, or the binding of the self account and the equipment is not completed on the equipment control APP, and the privacy of a slave terminal user can be protected.
In order to better explain the device control method of the present application, the following two device control embodiments are provided for illustrative purposes:
example 1
The authorized terminal sends a temporary use request to the server, wherein the request comprises a user account of the authorized terminal, a model (such as KFR-35G/WDBN8D3) and an ID (such as Midea _ ac _ sn001113) of a specified household appliance to be used (such as a vertical air conditioner in the center of an exhibition hall).
The server generates a temporary account and sends information for logging in the temporary account to an authorized terminal in a linked mode.
And the authorized terminal generates the two-dimensional code according to the link.
After scanning the two-dimensional code, the unauthorized terminal logs in the temporary account by accessing a WeChat applet, an HTML5 page and the like.
After the unauthorized terminal logs in the temporary account, the server authorizes the authorized terminal to synchronize the device control interface of the authorized terminal to the unauthorized terminal, so that a WeChat applet or an HTML5 interface of the unauthorized terminal can be generated based on the authorized terminal account authority and the specified model and ID of the household appliance to be used, and the interface is basically the same as the device control interface of the authorized terminal or only has partial functions of the device control interface; the server authorizes the unauthorized terminal to transmit an operation instruction (such as pressing and sliding operations of a touch screen, coordinates and the like) of the user acquired based on the WeChat applet or the HTML5 interface to the authorized terminal, and the authorized terminal controls a plug-in the APP to send a command to the household appliance through equipment installed on the authorized terminal based on the operation instruction of the unauthorized terminal, so that indirect remote control of the household appliance by the unauthorized terminal is realized.
Example 2
The authorized terminal sends a temporary use request to the server terminal, wherein the request comprises a user account of the authorized terminal, the model number, the ID and the authorization time of the specified household appliance to be used.
The server generates a temporary account and sends information for logging in the temporary account to an authorized terminal in the form of a login account and a password.
And the authorized terminal displays the login account and the password.
The unauthorized terminal acquires the login account and the password in the input interface of the WeChat applet or the HTML5 page to complete the connection with the server through the temporary account.
When an unauthorized terminal logs in a temporary account by accessing a WeChat applet or an HTML5 page and the like, the server generates a set of interactive interfaces synchronous with the equipment control interface of the authorized terminal in the form of the WeChat applet or an HTML5 page according to the functions of the corresponding household appliance to be used of the authorized terminal, and sends the interactive interfaces to the unauthorized terminal so that the unauthorized terminal can display the interactive interfaces, thus providing hardware information such as the screen resolution of the unauthorized terminal and the like when the unauthorized terminal accesses, and adjusting the typesetting of the interactive interfaces. Specifically, as shown in fig. 4, when the device control interface of the authorized terminal is updated, the device control interface is synchronized to the unauthorized terminal through the server.
The unauthorized terminal transmits an operation instruction (such as pressing and sliding operations of a touch screen, coordinates and the like) of the interactive interface by the user to the server. The server sends a command to the household appliance based on the authority of the authorized terminal account and the household appliance ID, so that indirect remote control of the household appliance by the unauthorized terminal is realized.
Or the unauthorized terminal transmits the operation instruction of the user on the interactive interface to the authorized terminal. And the authorized terminal sends a command to the household appliance through the device control APP plug-in installed on the authorized terminal based on the operation instruction of the unauthorized terminal.
The present application further provides a method for guiding control operation of a home appliance, referring to fig. 5 specifically, and fig. 5 is a schematic flow chart of a first embodiment of the method for guiding control operation of a home appliance according to the present application. The method for guiding the control operation of the household electrical appliance comprises the following steps. Wherein the master terminal and the slave terminal are connected in communication. And synchronizing the main operation interface of the main terminal with the slave operation interface of the slave terminal, namely, the functions of the main operation interface of the main terminal and the slave operation interface of the slave terminal are basically corresponding. The master operation interface of the master terminal and the slave operation interface of the slave terminal can be the same. However, as shown in fig. 4, there may be a difference between the master operation interface of the master terminal and the slave operation interface of the slave terminal. It is to be understood that the master terminal in this embodiment may be one of the authorized terminal and the unauthorized terminal in the control method of the above-described device, and the slave terminal is the other of the authorized terminal and the unauthorized terminal. For example, the master terminal obtains the slave operation interface of the slave terminal from the slave terminal through the server, and generates the master operation interface by the master terminal according to the image of the slave operation interface or the configuration (function button, authority for controlling household appliances, and the like) corresponding to the slave operation interface, or the server generates the master operation interface and transmits the master operation interface to the master terminal. It should be noted that the following numbers are only used for simplifying the description, and are not intended to limit the execution order of the steps, and the execution order of the steps in the present embodiment may be arbitrarily changed without departing from the technical idea of the present application.
S501: the main terminal receives a trigger action of a main user through a main operation interface and generates a visual element based on the trigger action.
It can be understood that a user of the master terminal is a master user, the master terminal can receive a trigger action of the master user through the master operation interface so as to interact with the slave terminal subsequently, and the slave terminal presents a master operation instruction on the slave operation interface through the visual element, so that the slave user can execute the trigger action under the guidance of the visual element displayed on the slave operation interface, and the master user can guide the slave user to operate the slave terminal through the master terminal, so that an operation guide is not made in advance, and the operation can be manually adjusted according to actual conditions.
In an implementation mode, when the master terminal senses that a master user clicks a master operation interface, the trigger position and the trigger mode of the master user on the master operation interface are recorded, and a visual element is generated based on the trigger position and the trigger mode. It is simpler to mark the trigger position and the trigger mode on the main operation interface to obtain the visual element. The triggering mode can include single click, double click, multi-click, sliding and the like.
In another implementation manner, when the main user clicks the main operation interface, the main terminal may add a mark (e.g., a red mark, etc.) at the position where the main user clicks on the main operation interface, and record the main operation interface; if the master terminal senses that the master user stops clicking the master operation interface, the mark added to the master operation interface is removed, and the recording operation of the master operation interface is maintained until the click stop time is larger than a threshold value; and if the main terminal confirms that the main user clicks the main operation interface again when the click stop time is smaller than the threshold value, adding a mark at the click position of the main user on the main operation interface, recalculating the click stop time when the main user stops clicking the main operation interface again, and stopping recording the main operation interface until the click stop time is larger than the threshold value to obtain the visual element. The threshold may be a time threshold between two clicks in a double-click operation or a multi-click operation.
In another implementation manner, when a master user clicks a master operation interface, the master terminal can capture a screen in real time to obtain a current master operation interface, and adds a mark at the clicked position of the master user on the captured master operation interface to obtain a master operation interface image sequence; if the master terminal senses that the master user stops clicking the master operation interface, the intercepting operation of the master operation interface is maintained until the click stopping time is larger than a threshold value; and if the main terminal confirms that the main user clicks the main operation interface again when the click stop time is smaller than the threshold value, adding a mark at the click position of the main user on the intercepted main operation interface, recalculating the click stop time when the main user stops clicking the main operation interface again, and stopping the interception of the main operation interface until the click stop time is larger than the threshold value to obtain the visual element.
The triggering action can be used for generating a main operation instruction for controlling the household appliance, for example, after a rice cooking button in the household appliance is clicked, the household appliance can be controlled to enter a rice cooking program.
S502: the master terminal sends the visual element to the slave terminal.
After the master terminal generates the visual elements based on the trigger actions, the trigger actions are sent to the slave terminal, so that the slave terminal displays the visual elements on the slave operation interface, and the slave user can execute the trigger actions under the guidance of the visual elements displayed on the slave operation interface.
Alternatively, the master terminal may send a visual element to the slave terminal each time a visual element is obtained.
In another implementation manner, after obtaining a visual element, the master terminal may first determine whether a trigger action corresponding to the visual element is an actual operation instruction, if not, the visual element may not be sent to the master terminal, and if so, the visual element is sent to the master terminal, so as to avoid sending the visual element to the slave terminal when the visual element is wrong or the trigger action of the misoperation has no actual guidance meaning, so as to prevent the operator of the slave terminal from bringing wrong guidance to the slave user.
In another implementation, after the master terminal generates the visual element based on the trigger action, the trigger action may be displayed on the master terminal, and when a stop transmission instruction of the master user is not obtained based on the master operation interface or when a transmission instruction of the master user is obtained based on the master operation interface, the visual element may be transmitted to the slave terminal, so that the master user may determine whether the visual element is correct, and when the visual element is correct, the visual element may be transmitted to the slave terminal to avoid that the visual element is transmitted to the slave terminal when the visual element is wrong, so as to prevent the operator of the slave terminal from being provided with wrong guidance.
S503: and displaying the acquired visual elements on the slave operation interface from the terminal.
After the slave terminal acquires the visual elements from the master terminal, the acquired visual elements can be displayed on the slave operation interface, so that the slave user can execute the trigger action under the guidance of the visual elements displayed on the slave operation interface.
In this embodiment, the master terminal receives a trigger action of the master user through the master operation interface, generates a visual element based on the trigger action, and then sends the visual element to the slave terminal, so that the slave terminal displays the visual element on the slave operation interface, and thus the slave user can execute the trigger action under the guidance of the visual element displayed on the slave operation interface, so that the master user can guide the slave user to operate the slave terminal through the master terminal, an operation guide is not prepared in advance, and the operation can be manually adjusted according to actual conditions, so that the user of the slave user can quickly and easily know the functions and the operation method of the terminal.
It is understood that the control method of the above-mentioned device may be utilized to establish a connection between the master terminal and the slave terminal and synchronize the master operation interface of the master terminal and the slave operation interface of the slave terminal.
Or the master terminal and the slave terminal establish an animation and instruction transmission channel through a remote assistance mode or a NAN cluster, and synchronize a master operation interface of the master terminal and a slave operation interface of the slave terminal through the remote assistance mode.
For the master terminal, please refer to fig. 6 for implementing the method for directing the control operation of the home appliance, and fig. 7 is a schematic diagram of a workflow of the master terminal in the method for directing the control operation of the home appliance according to the present application.
S601: and the main terminal receives the trigger action of the main user through the main operation interface.
Wherein the triggering action is used for generating a main operation instruction for controlling the household appliance
S602: the master terminal interacts with the slave terminal, so that the slave terminal presents a master operation instruction through a visual element on the slave operation interface.
In this embodiment, the steps are similar to those in the embodiment shown in fig. 5, and detailed description is omitted. The master terminal receives the trigger action of the master user through the master operation interface and interacts with the slave terminal, so that the slave terminal presents a master operation instruction through the visual element on the slave operation interface, the slave user can execute the trigger action under the guidance of the visual element displayed on the slave operation interface, the master user can guide the slave user to operate the slave terminal through the master terminal, an operation guide is omitted from being made in advance, and the operation can be adjusted manually according to actual conditions.
Referring to fig. 7, fig. 8 is a schematic view of a work flow of a slave terminal in the method for guiding the control operation of the home appliance according to the present application.
S701: and the slave terminal interacts with the master terminal to obtain the visual elements corresponding to the master operation instruction.
The main operation instruction is generated by the main terminal based on a trigger action of a main user acquired from a main operation interface, and the main operation instruction is used for controlling the Internet of things equipment.
S702: and the slave terminal displays the visual elements on the slave operation interface.
In this embodiment, the steps are similar to those in the embodiment shown in fig. 5, and detailed description is omitted. The slave terminal slave main terminal generates visual elements based on the trigger action of the master user and displays the visual elements on the slave operation interface, so that the slave user of the slave terminal can execute the trigger action under the guidance of the visual elements displayed on the slave operation interface, and the master user can guide the slave user to operate the slave terminal through the master terminal, thereby saving the operation guide made in advance and manually adjusting the operation according to the actual situation.
It can be understood that, for some operations of the control device executed by the terminal, in order to make the slave terminal feel a control operation of executing a trigger action displayed by the visual element, the master operation instruction may be temporarily not executed when the master terminal receives the trigger action; the master operation instruction is not executed until the slave operation instruction matched with the master operation instruction is received from the slave terminal, so that a user of the slave terminal can really experience the actual control effect of the triggering action of executing the visual element display on the equipment. To describe this scheme in detail, the present application provides a second embodiment of a method for controlling and directing operation of a home appliance. Specifically, as shown in fig. 8, the second embodiment of the method for directing the control operation of the home appliance of the present application includes the following steps.
S801: the main terminal receives a trigger action of a main user through a main operation interface and generates a visual element based on the trigger action.
It can be understood that, in a scene where the master terminal directs the slave terminal to control the device, the master terminal may generate a visual element based on at least one trigger action of the master user between a time point when the master user starts to operate the master operation interface and a time point when it is confirmed that the master operation instruction is the control instruction for the device, and then send the visual element to the slave terminal, so that the slave terminal can relatively quickly know how to control the device, avoid multiple interactions between the slave terminal and the master terminal for directing the slave terminal to execute a control operation, and improve the directing efficiency.
S802: the master terminal sends the visual element to the slave terminal.
S803: and displaying the acquired visual elements on the slave operation interface from the terminal.
After the slave terminal acquires the visual elements from the master terminal or receives a redisplay instruction from the master terminal, the slave terminal displays the latest visual elements acquired from the master terminal on the slave operation interface, so that a user of the slave terminal operates under the guidance of the visual elements.
And the redisplay instruction is sent by the master terminal after the master terminal determines that the slave operation instruction is not matched with the master operation instruction.
S804: and the slave terminal acquires the trigger action of the slave user through the slave operation interface.
After the acquired visual elements are displayed on the slave operation interface, the slave terminal can acquire the trigger actions of the slave user from the operation interface, so that the slave terminal can generate slave operation instructions based on the trigger actions of the slave user, the slave terminal can send the slave operation instructions to the master terminal, the master terminal can execute the master operation instructions when the master operation instructions are matched with the slave operation instructions, a user of the slave terminal can clearly feel the actual control action of the trigger actions displayed by the visual elements, and further guidance can be provided for the user of the slave terminal.
S805: the slave terminal generates a slave operation instruction based on a trigger action of the slave user.
After the trigger action of the slave user is acquired from the operation interface, the slave terminal can generate the slave operation instruction based on the trigger action of the slave user.
S806: and the slave terminal sends the slave operation instruction to the master terminal.
After the slave terminal generates the slave operation instruction based on the trigger action of the slave user, the slave operation instruction can be sent to the master terminal, so that the master terminal executes the slave operation instruction when the master terminal confirms that the slave operation instruction is matched with the master operation instruction.
S807: the master terminal determines whether the slave operation instruction matches the master operation instruction.
After the master terminal acquires the slave operation instruction from the slave terminal, whether the slave operation instruction is matched with the master operation instruction or not can be determined, if the slave operation instruction is matched with the master operation instruction, the step S808 is performed, and if the slave operation instruction is not matched with the master operation instruction, the step S809 is performed.
S808: and executing the slave operation instruction.
And if the master terminal judges that the slave operation instruction is matched with the master operation instruction, executing the slave operation instruction.
S809: and the master terminal ignores the slave operation instruction and sends a redisplay instruction to the slave terminal.
If the master terminal judges that the slave operation instruction is not matched with the master operation instruction, the slave operation instruction is ignored, and a redisplay instruction is sent to the slave terminal, so that the step S803 is performed, so that the visual element is displayed on the slave operation interface again until the slave operation instruction acquired from the slave terminal is matched with the master operation instruction and the slave operation instruction is executed.
It is understood that the master terminal may have two modes, a normal mode and a guidance mode; if the main terminal is in a normal mode, after receiving the trigger action of the main user, directly executing a main operation instruction generated by the trigger action; if the master terminal is in the guidance mode, after receiving the trigger action of the master user, the master terminal does not execute the master operation instruction generated by the trigger action of the master user for the moment, and sends the visual element generated based on the trigger action of the master user to the slave terminal, the master terminal receives the slave operation instruction generated by the slave terminal after displaying the visual element, and executes the slave operation instruction when the slave operation instruction is confirmed to be matched with the master operation instruction, so that the master terminal guides the user operation of the slave terminal in the guidance mode, and actual operation experience is brought to the slave terminal.
It can be understood that in some scenarios where the after-sales person guides the user to operate the slave terminal, the master terminal used by the after-sales person does not have the home appliance control authority, and at this time, the master terminal can only give guidance to the slave terminal, and the matching and issuing of the operation instruction for controlling the home appliance are performed by the slave terminal. To describe this scheme in detail, the present application provides a third embodiment of a method for controlling and directing operation of a home appliance. Specifically, as shown in fig. 9, the third embodiment of the method for directing the control operation of a home appliance according to the present application includes the following steps.
S901: and the main terminal receives the trigger action of the main user through the main operation interface.
Wherein the triggering action is used for generating a main operation instruction for controlling the household appliance.
S902: and the master terminal sends the master operation instruction to the slave terminals.
S903: and the slave terminal generates a visual element based on the main operation instruction.
After the slave terminal acquires the master operation instruction, the visual element can be generated based on the master operation instruction, so that the visual element can be displayed on the slave operation interface of the slave terminal in the following process to guide the slave user to execute the master operation instruction.
The visual element may be a mark on the slave operation interface or a trigger animation of a trigger action for generating the master operation instruction.
Optionally, the slave terminal may store a corresponding relationship between the master operation instruction and the visual element, so that after the slave terminal acquires the master operation instruction, the visual element corresponding to the master operation instruction may be determined based on the corresponding relationship between the master operation instruction and the visual element.
S904: and the slave terminal displays the visual elements on the slave operation interface.
After the slave terminal generates the visual element based on the master operation instruction, the visual element can be displayed on the slave operation interface, so that the user of the slave terminal can operate under the guidance of the visual element.
S905: and the slave terminal acquires the trigger action of the slave user through the slave operation interface.
After the acquired visual elements are displayed on the operation interface from the terminal, the trigger action of the user can be acquired from the operation interface.
S906: the slave terminal generates a slave operation instruction based on a trigger action of the slave user.
After the trigger action of the slave user is acquired from the operation interface, the slave terminal can generate the slave operation instruction based on the trigger action of the slave user.
S907: the slave terminal determines whether the slave operation instruction matches the master operation instruction.
After the slave terminal acquires the slave operation command, it is determined whether the slave operation command matches the master operation command, and if the slave operation command matches the master operation command, the process proceeds to step S908, and if the slave operation command does not match the master operation command, the process proceeds to step S909.
S908: and the slave terminal executes the slave operation instruction.
And if the slave terminal judges that the slave operation instruction is matched with the master operation instruction, executing the slave operation instruction to control the household appliance to execute corresponding operation.
S909: and the slave terminal ignores the slave operation instruction and displays the visual element on the slave operation interface again.
And if the slave terminal judges that the slave operation instruction is not matched with the master operation instruction, the slave operation instruction is ignored, and the visual element is displayed on the slave operation interface again until the slave operation instruction acquired from the slave terminal is matched with the master operation instruction to execute the slave operation instruction.
In order to better explain the control operation guidance method of the home appliance of the present application, the following specific embodiments are provided to guide the slave terminal to operate through the master terminal to illustrate:
example 3
After downloading the American living APP and registering the account number, the customer can add the account number of the customer into a family group by shopping guide, members in the group have the same household appliance access authority, and the flow of household appliance configuration and binding can be omitted for the customer.
And the shopping guide main terminal and the customer slave terminal present basically the same operation interface in a remote assistance mode.
The main terminal can acquire a virtual key instruction triggered and pressed by the shopping guide on the main operation interface, the virtual key instruction is not immediately executed, a visual element is generated based on the virtual key instruction, then the visual element is sent to the slave terminal of the customer, and the visual element is displayed on the corresponding button or position on the slave terminal of the customer so as to guide the customer to execute the same operation as the shopping guide.
The slave terminal forwards the received operation instruction of the customer to the master terminal, the master terminal compares the operation instruction of the slave terminal with an instruction triggered by the master terminal, and if the operation instruction of the slave terminal is matched with the instruction triggered by the master terminal, the master terminal executes the instruction; if not, the master terminal does not execute the operation and ignores the instruction sent by the slave terminal until the matching.
Example 4:
when the after-sales person guides the user to use the household appliance to control the APP, the main terminal of the after-sales person does not configure the authority for controlling the household appliance of the user, and the slave terminal of the user has the authority for controlling the household appliance of the user.
The main terminal can acquire a trigger action of triggering and pressing the after-sales personnel on the main operation interface, the trigger action is used for generating a main operation instruction for controlling the household appliance, and the main terminal sends the main operation instruction to the slave terminal. The slave terminal generates and displays the visual elements based on the master operation instruction, acquires the trigger action executed by the user under the guidance of the visual elements through the slave operation interface, and generates the slave operation instruction based on the trigger action of the slave user.
The slave terminal compares the operation instruction of the slave terminal with the instruction triggered by the master terminal, and if the operation instruction of the slave terminal is matched with the instruction triggered by the master terminal, the slave terminal executes the instruction; and if not, the slave terminal does not execute the operation, and redisplays the visual element corresponding to the main operation instruction on the slave operation interface until the visual element is matched. Thus, the master terminal cannot actively trigger the operation of the household appliance, and all the operations are visible on the slave terminal. Through the method, after-sales personnel can only give guidance, the operation right of the household appliance cannot be obtained, and the privacy and the safety of a user are ensured.
Example 5:
the master terminal acquires a trigger action of triggering and pressing by a master user on a master operation interface, the trigger action is used for generating a master operation instruction for controlling the household appliance, and the master terminal sends the master operation instruction to the slave terminal. The slave terminal generates and displays the visual elements based on the master operation instruction, acquires the trigger actions executed by the slave user under the guidance of the visual elements through the slave operation interface, and generates the slave operation instruction based on the trigger actions of the slave user.
And the slave terminal forwards the slave operation instruction to the master terminal. The master terminal compares the slave operation instruction with the master operation instruction, and if the slave operation instruction is matched with the master operation instruction, the master terminal executes the master operation instruction; and if not, the master terminal does not execute the master operation instruction, ignores the instruction sent by the slave terminal, and sends a redisplay instruction to the slave terminal so as to enable the slave terminal to redisplay the visual element corresponding to the master operation instruction until the visual element is matched.
The device control method and the home appliance control operation guidance method of the present application may be combined, and the following embodiments are provided for examples to better explain the technical solution of the combination of the device control method and the home appliance control operation guidance method:
example 6:
and the authorized terminal applies for the temporary account number from the server. And the authorized terminal displays the temporary account number to the unauthorized terminal. And the unauthorized terminal establishes connection with the server through the temporary account. The server authorizes the authorized terminal to send the device control interface to the unauthorized terminal. And the authorized terminal can obtain the trigger action of the master user through the equipment control interface, can generate a visual element based on the trigger action of the master user, and sends the visual element to the unauthorized terminal.
The unauthorized terminal displays the acquired equipment control interface of the authorized terminal, displays the visual element when acquiring the visual element, acquires the slave operation instruction through the equipment control interface of the authorized terminal displayed by the unauthorized terminal, and sends the slave operation instruction to the authorized terminal. The authorized terminal matches the slave operation instruction with a master operation instruction generated by the trigger action of the master user; if so, executing a main operation instruction; and if not, sending a redisplay instruction to the unauthorized terminal, and redisplaying the latest received visual element by the unauthorized terminal in response to the redisplay instruction until the authorized terminal confirms that the slave operation instruction is matched with the master operation instruction generated by the trigger action of the master user.
Example 7:
and the authorized terminal applies for the temporary account number from the server. And the authorized terminal displays the temporary account number to the unauthorized terminal. And the unauthorized terminal establishes connection with the server through the temporary account. And the server sends the equipment control interface of the authorized terminal to the unauthorized terminal.
And generating an operation instruction by the unauthorized terminal through the obtained equipment control interface, generating an animation in the process of generating the operation instruction by the unauthorized terminal, and synchronously displaying the animation on the equipment control interface of the authorized terminal. And the unauthorized terminal can also send the operation instruction to the authorized terminal so as to send a command to the household appliance through the plug-in the equipment control APP arranged on the authorized terminal, thereby realizing the indirect remote control of the unauthorized terminal to the household appliance.
Referring to fig. 10, fig. 10 is a schematic structural diagram of an embodiment of an electronic device according to the present application. The electronic device 10 includes a processor 12, and the processor 12 is configured to execute instructions to implement the device control method and the control operation guidance method for the home device. For a specific implementation process, please refer to the description of the foregoing embodiment, which is not repeated herein.
The processor 12 may also be referred to as a CPU (Central Processing Unit). The processor 12 may be an integrated circuit chip having signal processing capabilities. The processor 12 may also be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. A general purpose processor may be a microprocessor or the processor 12 may be any conventional processor or the like.
The electronic device 10 may further include a memory 11 for storing instructions and data required for operation of the processor 12.
The processor 12 is configured to execute instructions to implement the methods provided by any embodiment and any non-conflicting combination of the device control method and the home device control operation guidance method described above.
Referring to fig. 11, fig. 11 is a schematic structural diagram of a computer-readable storage medium according to an embodiment of the present disclosure. The computer-readable storage medium 20 of the embodiments of the present application stores instructions/program data 21, and the instructions/program data 21, when executed, implement the method provided by any embodiment of the device control method and the control operation guidance method of the home appliance of the present application, and any non-conflicting combination. The instructions/program data 21 may form a program file stored in the storage medium 20 in the form of a software product, so as to enable a computer device (which may be a personal computer, a server, or a network device) or a processor (processor) to execute all or part of the steps of the methods according to the embodiments of the present application. And the aforementioned storage medium 20 includes: various media capable of storing program codes, such as a usb disk, a mobile hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, or terminal devices, such as a computer, a server, a mobile phone, and a tablet.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of a unit is merely a logical division, and an actual implementation may have another division, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The above embodiments are merely examples and are not intended to limit the scope of the present disclosure, and all modifications, equivalents, and flow charts using the contents of the specification and drawings of the present disclosure or those directly or indirectly applied to other related technical fields are intended to be included in the scope of the present disclosure.
Claims (20)
1. A control method of an apparatus, characterized in that the control method comprises:
the unauthorized terminal establishes connection with the server through the temporary account to acquire an equipment control interface of the authorized terminal; and the temporary account number is associated with an account number of the authorized terminal;
and the unauthorized terminal generates an operation instruction through the obtained equipment control interface, and the server can perform corresponding operation control on the equipment according to the operation instruction.
2. The control method according to claim 1, wherein the unauthorized terminal obtaining the device control interface of the authorized terminal includes:
the unauthorized terminal acquires the equipment control interface adjusted by the server from the server; or,
and the unauthorized terminal acquires the equipment control interface from the authorized terminal under the authorization of the server.
3. The control method according to claim 2, wherein the unauthorized terminal obtaining the device control interface from the server includes:
the unauthorized terminal logs in a temporary link through the temporary account to acquire the equipment control interface; the temporary link is applied for obtaining from the server by the authorized terminal, and the temporary link comprises the device control interface.
4. The control method according to claim 2, wherein the unauthorized terminal obtaining the device control interface from the authorized terminal under the authorization of the server includes:
the unauthorized terminal establishes local synchronous connection with the authorized terminal under the authorization of the server;
and the unauthorized terminal and the authorized terminal synchronously interact with the equipment control interface.
5. The control method according to claim 1, wherein the obtaining of the device control interface of the authorized terminal by the authorized terminal based on the device information is performed by applying for obtaining the temporary account from the server, and includes:
and acquiring the equipment control interface of the authorized terminal corresponding to the equipment information.
6. The control method according to claim 1, wherein the temporary account is requested to the server by the authorized terminal based on authorization information; the control method further comprises the following steps:
the unauthorized terminal sends the operation instruction to the server so that the server performs corresponding operation control on the equipment based on the authorization information; or,
and the unauthorized terminal sends the operation instruction to the authorized terminal so that the authorized terminal sends an operation command to the server, and the server performs corresponding operation control on the equipment.
7. The control method according to claim 1, wherein the unauthorized terminal establishes a connection with the server through the temporary account, and the method comprises the following steps:
the unauthorized terminal applies for obtaining a temporary account number from the server;
the unauthorized terminal acquires a token of the authorized terminal;
and the unauthorized terminal associates the temporary account with the account of the authorized terminal by using the token.
8. The control method according to claim 1, characterized by further comprising:
and in the process of generating the operation instruction by the unauthorized terminal, synchronously displaying the animation on the obtained equipment control interface on the equipment control interface of the authorized terminal.
9. A control method of an apparatus, characterized in that the control method comprises:
and the authorized terminal applies for a temporary account number to the server, so that an unauthorized terminal establishes connection with the server according to the temporary account number and acquires an equipment control interface of the authorized terminal.
10. The control method according to claim 9, characterized by further comprising:
the authorized terminal applies for a temporary link to a server, wherein the temporary link comprises the equipment control interface;
and the authorized terminal displays the temporary link and the temporary account so that the unauthorized terminal logs in the temporary link according to the temporary account.
11. The control method according to claim 9, characterized by further comprising:
and the authorized terminal establishes synchronous connection with the unauthorized terminal under the authorization of the server, so that the unauthorized terminal and the authorized terminal synchronously interact with the equipment control interface.
12. The control method according to claim 9, wherein the authorized terminal applies for the temporary account from the server, and the method includes:
and the authorized terminal applies for a temporary account to the server based on the equipment information, so that the unauthorized terminal acquires an equipment control interface corresponding to the equipment information.
13. The control method according to claim 9, characterized by further comprising:
the authorized terminal receives an operation instruction sent by the unauthorized terminal, and the operation instruction is generated by the unauthorized terminal through the acquired equipment control interface;
and the authorized terminal sends an operation command to the server according to the operation instruction so that the server performs corresponding operation control on the equipment.
14. The control method according to claim 9, characterized by further comprising:
and synchronously displaying the animation of the unauthorized terminal on the obtained equipment control interface on the equipment control interface of the authorized terminal, wherein the animation appears in the process of generating the operation instruction.
15. A control method of an apparatus, characterized in that the control method comprises:
the method comprises the steps that a server confirms a temporary account number associated with an account number of an authorized terminal, wherein the temporary account number is used for enabling an unauthorized terminal to establish connection with the server, and the unauthorized terminal can obtain a device control interface of the authorized terminal;
and the server performs corresponding operation control on the equipment according to an operation instruction, wherein the operation instruction is generated by the unauthorized terminal through the obtained equipment control interface.
16. The method according to claim 15, wherein the server confirms the temporary account number associated with the account number of the authorized terminal, including:
the server receives an application request of a temporary account of the authorized terminal so as to send the temporary account to the authorized terminal; or,
the server receives an application request of a temporary account of the unauthorized terminal so as to send the temporary account to the unauthorized terminal; the server interacts with the unauthorized terminal to associate the temporary account with the account of the authorized terminal using the token of the authorized terminal.
17. The control method according to claim 16,
the server receives an application request of a temporary account of an authorized terminal, and the application request comprises the following steps: the server receives an application request of a temporary account of the authorized terminal based on the equipment information;
the control method further comprises the following steps: and under the condition that the unauthorized terminal establishes connection with the server through the temporary account, the server sends a device control interface of the authorized terminal, which corresponds to the device information, to the unauthorized terminal.
18. The control method according to claim 15, characterized by further comprising:
under the condition that the unauthorized terminal establishes connection with the server through the temporary account, the server sends an equipment control interface adjusted by the server to the unauthorized terminal; or, the server authorizes the authorized terminal to send the device control interface to the unauthorized terminal.
19. An electronic device, characterized in that the electronic device comprises a processor; the processor is configured to execute instructions to implement the method of any one of claims 1-18.
20. A computer-readable storage medium for storing instructions/program data executable to implement the method of any one of claims 1-18.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011496074.0A CN112631486A (en) | 2020-12-17 | 2020-12-17 | Equipment control method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011496074.0A CN112631486A (en) | 2020-12-17 | 2020-12-17 | Equipment control method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112631486A true CN112631486A (en) | 2021-04-09 |
Family
ID=75316401
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011496074.0A Pending CN112631486A (en) | 2020-12-17 | 2020-12-17 | Equipment control method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112631486A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114442504A (en) * | 2022-02-15 | 2022-05-06 | 深圳市华思特科技有限公司 | Intelligent home management system based on Internet of things |
CN116528394A (en) * | 2023-07-05 | 2023-08-01 | 广州疆海科技有限公司 | Equipment communication connection method, mobile terminal system and equipment terminal system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103873326A (en) * | 2012-12-07 | 2014-06-18 | 电子部品研究院 | Method for transmitting contents in a smart home environment |
CN104580175A (en) * | 2014-12-26 | 2015-04-29 | 深圳市兰丁科技有限公司 | Equipment authorization method and device |
CN104754056A (en) * | 2015-04-07 | 2015-07-01 | 北京京东尚科信息技术有限公司 | Method and system for sharing of intelligent equipment by multiple users |
CN106357653A (en) * | 2016-09-27 | 2017-01-25 | 深圳市欧瑞博电子有限公司 | Control authority sharing method and system |
CN106371327A (en) * | 2016-09-28 | 2017-02-01 | 北京小米移动软件有限公司 | Control right sharing method and device |
CN108107755A (en) * | 2017-11-20 | 2018-06-01 | 珠海格力电器股份有限公司 | Household appliance control right sharing method and device |
-
2020
- 2020-12-17 CN CN202011496074.0A patent/CN112631486A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103873326A (en) * | 2012-12-07 | 2014-06-18 | 电子部品研究院 | Method for transmitting contents in a smart home environment |
CN104580175A (en) * | 2014-12-26 | 2015-04-29 | 深圳市兰丁科技有限公司 | Equipment authorization method and device |
CN104754056A (en) * | 2015-04-07 | 2015-07-01 | 北京京东尚科信息技术有限公司 | Method and system for sharing of intelligent equipment by multiple users |
CN106357653A (en) * | 2016-09-27 | 2017-01-25 | 深圳市欧瑞博电子有限公司 | Control authority sharing method and system |
CN106371327A (en) * | 2016-09-28 | 2017-02-01 | 北京小米移动软件有限公司 | Control right sharing method and device |
CN108107755A (en) * | 2017-11-20 | 2018-06-01 | 珠海格力电器股份有限公司 | Household appliance control right sharing method and device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114442504A (en) * | 2022-02-15 | 2022-05-06 | 深圳市华思特科技有限公司 | Intelligent home management system based on Internet of things |
CN116528394A (en) * | 2023-07-05 | 2023-08-01 | 广州疆海科技有限公司 | Equipment communication connection method, mobile terminal system and equipment terminal system |
CN116528394B (en) * | 2023-07-05 | 2023-10-17 | 广州疆海科技有限公司 | Equipment communication connection method, mobile terminal system and equipment terminal system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108595137B (en) | Wireless screen projection method and device and screen projector | |
US7865932B2 (en) | Network system of projector | |
CN105141899B (en) | A kind of exchange method and system of service robot of supporting parents | |
CN111290695B (en) | Terminal control method and device based on priority control and terminal | |
CN111447133B (en) | Message transmission method and device, storage medium and electronic device | |
CN112783461A (en) | Screen projection method and device, electronic equipment and storage medium | |
WO2012040036A1 (en) | Interacting with cloud-based applications using unrelated devices | |
CN112631486A (en) | Equipment control method and device | |
US20160269973A1 (en) | Communication system, transmission terminal, communication method, and medium | |
TWM410273U (en) | Control transfer apparatus and control transfer system | |
CN112911190A (en) | Remote assistance method, electronic equipment and system | |
CN108762659B (en) | Cloud terminal control method and device, storage medium and electronic device | |
CN112527170A (en) | Equipment visualization control method and device and computer readable storage medium | |
CN116155864B (en) | Account allocation method and device for intelligent exhibition hall, storage medium and electronic equipment | |
CN114647356B (en) | Control operation guiding method and device for household appliance | |
CN115379590B (en) | Bluetooth connection establishing method and device, electronic equipment and computer storage medium | |
SE1651234A1 (en) | Cable for connecting an image displaying device to a digitalcomputer network | |
CN112748893A (en) | Wireless screen projection method, device and system | |
EP2905714A1 (en) | Method of and device for securely entering user credentials | |
KR102344580B1 (en) | Providing method, apparatus and computer-readable medium of providing a content control interface through interworking with an open type display device and a user terminal | |
CN111314442B (en) | Terminal control method and device based on time-sharing control, terminal and computer equipment | |
CN104427289A (en) | Information processing method and electronic device | |
KR102146062B1 (en) | Server, Method, and Recording Medium for experiencing Smart Device by using Store Terminal | |
CN115834095B (en) | Multi-device collaborative login method, display device and server | |
WO2020215370A1 (en) | Haptic effect control method and system, and electronic apparatus and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |