CN113765897A - Sharing use method and system of electronic equipment - Google Patents

Sharing use method and system of electronic equipment Download PDF

Info

Publication number
CN113765897A
CN113765897A CN202110958927.6A CN202110958927A CN113765897A CN 113765897 A CN113765897 A CN 113765897A CN 202110958927 A CN202110958927 A CN 202110958927A CN 113765897 A CN113765897 A CN 113765897A
Authority
CN
China
Prior art keywords
sharing
information
client
equipment
shared
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110958927.6A
Other languages
Chinese (zh)
Inventor
王珏欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Wanqianwei Network Technology Co ltd
Original Assignee
Beijing Wanqianwei Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Wanqianwei Network Technology Co ltd filed Critical Beijing Wanqianwei Network Technology Co ltd
Priority to CN202110958927.6A priority Critical patent/CN113765897A/en
Publication of CN113765897A publication Critical patent/CN113765897A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The application relates to a sharing use method and a system of electronic equipment; the method comprises the following steps: a first client sends a sharing request to a server; the second client sends the authentication information to the server; the server compares and verifies the secondary user identity identification and the identity verification information, and sends the shared information to the second client after the verification is passed; and the second client acquires the use permission of the sharing equipment according to the sharing information. According to the scheme, the shared electronic equipment is not required to be connected with the Internet, and only the low-power-consumption near-field communication capacity is required to be possessed by the shared electronic equipment, so that the equipment cost is reduced; the specific identity of the invited party is not known in advance by an authorization party, and an account is not required to be registered in advance by the invited party, so that the invited party can be an uncertain group, such as express delivery, take-out, net car appointment drivers and the like, and the electronic equipment is conveniently authorized to an unfamiliar stranger for use; the scheme has higher flexibility and greatly expands the use scene of the shared electronic equipment.

Description

Sharing use method and system of electronic equipment
Technical Field
The application relates to the technical field of Internet of things, in particular to a sharing use method and system of electronic equipment.
Background
IoT (Internet of Things) equipment is widely applied to social production and life, and various sensors, controllers, door locks and the like bring great convenience to life and work of users. In a household and business scene, a user shares a device with the use right to other people, and the sharing is a very common scene, for example, scenes that a certain IoT device needs to be used together can occur among family members, between the upper and lower levels of a company, among members in an organization team, and the like.
At present, manufacturers and service integrators of IoT devices provide remote "sharing" functions, which mostly depend on the ability of the IoT devices to directly connect to the wide area internet; when a user shares the user with the user, the server issues the operation authority to the IoT equipment or the IoT equipment gateway through the wide area internet, and then the IoT equipment processing module or the gateway records a new authority person locally; so that other clients receiving the "share" invitation can use the device. The method needs the equipment with networking capability, such as laying a gateway, integrating a 4G module and a WiFi module, and the equipment purchasing and implementing cost is high.
In the related art, if one IoT device itself cannot be connected to the wide area internet or there is no "gateway" connected to the wide area internet, the "sharing" function is degraded to send an operation password (a long-term password or a temporary password) to the sharer, and then the sharer inputs the operation password through an input device or medium associated with the IoT device. This kind of mode operation is comparatively loaded down with trivial details, and has security risks such as password reveal, is falsely used.
In addition, some 'sharing' functions of existing software and hardware depend on the premise that both sides are users of the platform, and one account is allowed to access resources of the other account. In practice, more and more scenes are a temporary authorization relationship and even a temporary use requirement, even the situation that the other party is uncertain of which specific person, such as authorization to express chicks, takeout personnel, network car booking drivers and the like, the other party cannot know the specific person in advance, and the other party cannot be required to register an account on a specific platform in advance, so that the scheme that sharing can be completed only by registering the account in advance is not applicable.
In summary, the following problems exist in the prior art:
(1) the equipment hardware specification requirement is higher depending on the capacity of the IoT equipment for connecting the wide area internet, so that the purchase cost and the failure rate are both improved;
(2) networking gateways need to be arranged on part of IoT equipment, namely, the field wiring and other weak current construction cost and risks are increased;
(3) the potential safety hazards of password leakage, illegal use and the like exist by depending on the transmission of the password or the secret key;
(4) the sharing parties need to determine the identities of each other in advance and complete platform account registration, and application scenarios are limited.
Disclosure of Invention
To overcome, at least to some extent, the problems in the related art, the present application provides a method and system for shared use of electronic devices.
According to a first aspect of embodiments of the present application, a method for sharing and using an electronic device is provided, including:
a first client sends a sharing request to a server; the sharing request at least comprises the following information: a master user identity identifier, a slave user identity identifier, a sharing equipment identifier and a sharing time period;
the second client sends the authentication information to the server;
the server compares and verifies the secondary user identity identification and the identity verification information, and sends the shared information to the second client after the verification is passed; the shared information at least comprises the following information: sharing equipment identification, sharing time period and communication key;
and the second client acquires the use permission of the sharing equipment according to the sharing information.
Further, the method further comprises:
the server verifies the identity identification of the master user and the shared equipment identification, and judges whether the master user has the use authority of the shared equipment;
if the master user has the use authority, the server returns the sharing permission information to the first client; otherwise, returning the sharing forbidding information.
Further, the method further comprises:
after receiving the sharing permission information, the first client generates invitation information according to the sharing permission information;
the first client sends invitation information to the second client.
Further, the sharing permission information contains an invitation instruction; accordingly, the first client generates invitation information according to the invitation instruction.
Further, the second client sends authentication information to the server, including:
the second client acquires the input secondary user identity information;
and the second client generates identity authentication information according to the identity information of the secondary user, the equipment information of the second client and/or the invitation instruction and sends the identity authentication information to the server.
Further, the method further comprises:
and after receiving the sharing information, the second client generates a sharing equipment list allowing operation at present according to the sharing information and displays the sharing equipment list on the interactive interface.
Further, the shared information further includes the following information: a connection mode;
accordingly, the method further comprises:
the second client selects the specified shared equipment from the currently-allowed shared equipment list according to the operation on the interactive interface;
and the second client determines the corresponding connection mode according to the selected sharing equipment, calls the corresponding software and hardware functional components and initiates control connection.
Further, the method further comprises:
when the application program on the second client is closed, automatically clearing the shared device list;
when the application program is opened again, the information acquisition interface is displayed, the identity authentication information is acquired again, and an authentication request is sent to the server;
when the sharing time period is over, the corresponding sharing information is automatically invalidated.
Further, the method further comprises:
the sharing equipment determines the remaining time allowed to be shared according to the sharing time period;
and starting timing while opening the use authority, and closing the use authority when the duration reaches the remaining time.
According to a second aspect of embodiments of the present application, there is provided a shared use system of an electronic device, including: the system comprises a server, a first client, a second client and a sharing device;
a first client sends a sharing request to a server; the sharing request at least comprises the following information: a master user identity identifier, a slave user identity identifier, a sharing equipment identifier and a sharing time period;
the second client sends the authentication information to the server;
the server compares and verifies the secondary user identity identification and the identity verification information, and sends the shared information to the second client after the verification is passed; the shared information at least comprises the following information: sharing equipment identification, sharing time period and communication key;
and the second client acquires the use permission of the sharing equipment according to the sharing information.
The technical scheme provided by the embodiment of the application has the following beneficial effects:
according to the scheme, the shared electronic equipment is not required to be connected with the Internet, and only the low-power-consumption near-field communication capacity is required to be possessed by the shared electronic equipment, so that the equipment cost is reduced; because the authority sharing information does not need to be issued to the sharing electronic equipment, the sharing initiation is not influenced by accidental network disconnection and power failure of the sharing electronic equipment; the specific identity of the invited party is not known in advance by an authorization party, and an account is not required to be registered in advance by the invited party, so that the invited party can be an uncertain group, such as express delivery, take-out, net car appointment drivers and the like, and the electronic equipment is conveniently authorized to an unfamiliar stranger for use; the scheme has higher flexibility and greatly expands the use scene of the shared electronic equipment.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
FIG. 1 is a schematic diagram of an application environment illustrating a method for shared use of electronic devices according to an example embodiment.
FIG. 2 is a flow chart illustrating a method of shared use of an electronic device according to an example embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of methods and systems consistent with certain aspects of the present application, as detailed in the appended claims.
The sharing and using method of the electronic device can be applied to the application environment shown in fig. 1. The application environment comprises a first client 102, a second client 104, a shared electronic device 108, a network, a server 106 and a database, wherein the first client 102, the second client 104 and the server 106 can be in communication connection through the network. The network may include various types of wired or wireless networks; for example, the network may be a wide area internet, a local area network, or a combination network based on the internet and the local area network, which is not described herein. The network may also be based on a corresponding communication protocol when performing data transmission, for example, the web browser may be based on an HTTP communication protocol when receiving a service code corresponding to a web page, and the mobile application may be based on a Websocket communication protocol when receiving the service code. The second client 104 and the shared electronic device 108 may be communicatively connected through a short-range wireless communication technology, for example, may communicate through bluetooth, NFC, or the like.
The first client 102 and the second client 104 may be, but are not limited to, various smart phones, tablet computers, and portable wearable devices. Meanwhile, fig. 1 shows a case where the number of the first client 102 and the second client 104 is one, but the application does not limit the number of the first client 102 and the second client 104, and more or fewer clients may be included. The first client 102 and the second client 104 run an application program, and the application program can interact with the server 106 and the shared electronic device 108 when running, so as to implement a shared use method of the electronic device.
The server 106 may be implemented as a stand-alone server or a server cluster composed of a plurality of servers; in operation, the server 106 may run an application program to interact with the first client 102 and the second client 104, so as to implement a shared usage method of the electronic device. The database comprises a plurality of databases or database clusters, or only a single database; the database may also be a database in a server.
FIG. 2 is a flow chart illustrating a method of shared use of an electronic device according to an example embodiment. The method may comprise the steps of:
a first client sends a sharing request to a server; the sharing request at least comprises the following information: a master user identity identifier, a slave user identity identifier, a sharing equipment identifier and a sharing time period;
the second client sends the authentication information to the server;
the server compares and verifies the secondary user identity identification and the identity verification information, and sends the shared information to the second client after the verification is passed; the shared information at least comprises the following information: sharing equipment identification, sharing time period and communication key;
and the second client acquires the use permission of the sharing equipment according to the sharing information.
According to the scheme, the shared electronic equipment is not required to be connected with the Internet, and only the low-power-consumption near-field communication capacity is required to be possessed by the shared electronic equipment, so that the equipment cost is reduced; because the authority sharing information does not need to be issued to the sharing electronic equipment, the sharing initiation is not influenced by accidental network disconnection and power failure of the sharing electronic equipment; the specific identity of the invited party is not known in advance by an authorization party, and an account is not required to be registered in advance by the invited party, so that the invited party can be an uncertain group, such as express delivery, take-out, flash delivery, a network car appointment driver, security personnel in shift and the like, and the electronic equipment is conveniently authorized to be used by unfamiliar strangers; the scheme has higher flexibility and greatly expands the use scene of the shared electronic equipment.
It should be understood that, although the steps in the flowchart of fig. 2 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps in fig. 2 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The following describes the scheme of the present application in an expanded manner with reference to a specific application scenario.
The application provides a sharing and using method of IoT equipment without passwords, gateways and internet access, and the sharing and using method is composed of networked client equipment, a client application program, IoT equipment capable of carrying out near field communication with the client equipment and a remote server. Wherein the client device is generally a smartphone in which an APP or a wechat applet can be installed.
Step one, preparation.
Before the IoT equipment is used by a user, the server stores digital information of each IoT equipment, such as a model, a connection method, a serial number, a secret key of a communication encryption or authentication link and the like.
And step two, initiating sharing.
In some embodiments, the method further comprises:
the server verifies the identity identification of the master user and the shared equipment identification, and judges whether the master user has the use authority of the shared equipment;
if the master user has the use authority, the server returns the sharing permission information to the first client; otherwise, returning the sharing forbidding information.
In some embodiments, the method further comprises:
after receiving the sharing permission information, the first client generates invitation information according to the sharing permission information;
the first client sends invitation information to the second client.
In some embodiments, the sharing permission information includes an invitation instruction; accordingly, the first client generates invitation information according to the invitation instruction.
The user (hereinafter referred to as a "master user") has an IoT device operation right, and provides identification information identification of other people (hereinafter referred to as "secondary users") who wish to invite authorization for common use, such as a real mobile phone number, a virtual mobile phone number, a job number and the like, through a client application program to initiate sharing. The client side collects the shared necessary information and then sends the information to the remote server; the remote server records information such as main user information, auxiliary user information, shared equipment, sharing time interval and the like.
The necessary information required for sharing at least comprises a primary user identity identifier, secondary user identity information and a shared IoT equipment identifier; if the security check needs to be enhanced, at least one other verification mode of the secondary user can be supplemented, such as a real name or an identity card number, or a secret language or a password agreed by both parties.
And step three, the secondary user declares the identity.
In some embodiments, the sending, by the second client, the authentication information to the server includes:
the second client acquires the input secondary user identity information;
and the second client generates identity authentication information according to the identity information of the secondary user, the equipment information of the second client and/or the invitation instruction and sends the identity authentication information to the server.
In some embodiments, the method further comprises:
and after receiving the sharing information, the second client generates a sharing equipment list allowing operation at present according to the sharing information and displays the sharing equipment list on the interactive interface.
The secondary user receives sharing information sent by the primary user; the sharing information can be short messages, WeChat applet sharing, system notifications, an operation page of a client application program, an application program entry, or a secondary user notified by a primary user, and the like; and the secondary user opens the client small program or APP through code scanning, connection clicking and other modes, and enters an operation interface for sharing.
The client can automatically acquire the current mobile phone number of the secondary user or manually input other appointed identity information identifiers by the secondary user through a universal mature technical means to declare the identity of the secondary user; if the enhanced security verification is required in the second step, the client should simultaneously prompt and collect additional verification data, such as real names and the like.
Optionally, the program may verify the authenticity of the information input by the secondary user at this step, such as adding a short message verification code, certificate identification, identity card verification, and the like.
And after receiving the identity declaration of the secondary user (and completing 'security enhancement verification' and 'authenticity verification'), the client program sends the identity declaration to the server.
And step four, verifying the authorization relationship.
And after receiving the identity information declared by the secondary user, the server side inquires the shared information stored in the second step for comparison, finds the device information and the shared time period invited to be shared by the secondary user, encrypts the device information and the shared time period and sends the encrypted device information to the secondary user client side application program, wherein the information at least comprises a sharing initiator, a shared device name, a device serial number, a communication connection mode, a communication secret key and the like.
And step five, sharing the using equipment.
The secondary user client application program receives the information, organizes and displays the information in the UI as a device list which can be selected and operated by the current secondary user. The auxiliary user selects the equipment to be used from the list, and the client application program calls the corresponding software and hardware functional components according to the equipment serial number, the connection mode (such as Bluetooth, NFC and the like), the communication secret key and the like to initiate the control connection.
In some embodiments, the shared information further includes the following information: a connection mode;
accordingly, the method further comprises:
the second client selects the specified shared equipment from the currently-allowed shared equipment list according to the operation on the interactive interface;
and the second client determines the corresponding connection mode according to the selected sharing equipment, calls the corresponding software and hardware functional components and initiates control connection.
Since the IoT device targeted by the present invention is not connected to the internet, the secondary user should arrive at the scene to operate the device in close proximity.
And step six, finishing.
In some embodiments, the method further comprises:
when the application program on the second client is closed, automatically clearing the shared device list;
when the application program is opened again, the information acquisition interface is displayed, the identity authentication information is acquired again, and an authentication request is sent to the server;
when the sharing time period is over, the corresponding sharing information is automatically invalidated.
And after the secondary user finishes using, closing the application program of the handheld terminal. The application program should automatically clear the sharing device list before closing, and when the application program is opened next time, the secondary user is required to acquire the identity claim again and initiates a request to the background server again, so that the secondary user is prevented from initiating an instruction for operating the device through the cached list after the effective sharing time period is exceeded or the sharing is cancelled.
And seventhly, canceling and failing.
The invited sharing use of the secondary user automatically fails after the invited period is over; the master user can also revoke a share at any time, and even if the secondary user provides a valid identity declaration after revocation, the revoked share information still cannot be returned in the step four.
In some embodiments, the method further comprises:
the sharing equipment determines the remaining time allowed to be shared according to the sharing time period;
and starting timing while opening the use authority, and closing the use authority when the duration reaches the remaining time.
To sum up, the technical scheme of this application has following beneficial effect:
(1) the master user has high speed for initiating sharing and high success rate, theoretically, the speed is approximately equal to 4G or Wifi network transmission time, and the success rate can reach 100%;
(2) because the authority sharing information does not need to be issued to the equipment, the equipment is accidentally disconnected from the network and the power supply does not influence the sharing initiation;
(3) the cost of sharing and using the IoT equipment by the service provider is reduced, namely, a network environment suitable for an IoT equipment gateway is not required to be built in a service site provided with the IoT equipment, the IoT equipment with the 4G, WiFi function is not required to be purchased, and only equipment with low-power near-field communication capability (such as Bluetooth, NFC and the like) is adopted;
(4) the 'revocation sharing' is more reliable, namely, assuming that the network connection of the service site is interrupted, the server in other sharing methods cannot issue a revocation instruction to the equipment, so that the 'revocation sharing' cannot be realized. The invention does not have the condition;
(5) the sharing use flow does not depend on any password which needs to be manually set, stored and input by a user, and the conditions of password leakage, equipment falsifying and the like can be avoided;
(6) the invention does not depend on an authorizer to know the specific identity of the invited party in advance, can authorize approximate objects such as couriers, takeaway guys, net car drivers and the like, does not need the invited party to register an account in advance, has higher flexibility and greatly expands the use scene.
As shown in fig. 1, an embodiment of the present application further provides a shared use system of an electronic device, including: the system comprises a server, a first client, a second client and a sharing device;
a first client sends a sharing request to a server; the sharing request at least comprises the following information: a master user identity identifier, a slave user identity identifier, a sharing equipment identifier and a sharing time period;
the second client sends the authentication information to the server;
the server compares and verifies the secondary user identity identification and the identity verification information, and sends the shared information to the second client after the verification is passed; the shared information at least comprises the following information: sharing equipment identification, sharing time period and communication key;
and the second client acquires the use permission of the sharing equipment according to the sharing information.
With regard to the system in the above embodiment, the specific steps in which the respective modules perform operations have been described in detail in the embodiment related to the method, and are not described in detail herein. The various modules in the above-described system may be implemented in whole or in part by software, hardware, and combinations thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that, in the description of the present application, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present application, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.

Claims (10)

1. A shared use method of an electronic device, comprising:
a first client sends a sharing request to a server; the sharing request at least comprises the following information: a master user identity identifier, a slave user identity identifier, a sharing equipment identifier and a sharing time period;
the second client sends the authentication information to the server;
the server compares and verifies the secondary user identity identification and the identity verification information, and sends the shared information to the second client after the verification is passed; the shared information at least comprises the following information: sharing equipment identification, sharing time period and communication key;
and the second client acquires the use permission of the sharing equipment according to the sharing information.
2. The method of claim 1, further comprising:
the server verifies the identity identification of the master user and the shared equipment identification, and judges whether the master user has the use authority of the shared equipment;
if the master user has the use authority, the server returns the sharing permission information to the first client; otherwise, returning the sharing forbidding information.
3. The method of claim 2, further comprising:
after receiving the sharing permission information, the first client generates invitation information according to the sharing permission information;
the first client sends invitation information to the second client.
4. The method of claim 3, wherein the information allowing sharing comprises an invitation instruction; accordingly, the first client generates invitation information according to the invitation instruction.
5. The method of claim 4, wherein the second client sends authentication information to the server, comprising:
the second client acquires the input secondary user identity information;
and the second client generates identity authentication information according to the identity information of the secondary user, the equipment information of the second client and/or the invitation instruction and sends the identity authentication information to the server.
6. The method of any one of claims 1-5, further comprising:
and after receiving the sharing information, the second client generates a sharing equipment list allowing operation at present according to the sharing information and displays the sharing equipment list on the interactive interface.
7. The method according to claim 6, wherein the shared information further comprises the following information: a connection mode;
accordingly, the method further comprises:
the second client selects the specified shared equipment from the currently-allowed shared equipment list according to the operation on the interactive interface;
and the second client determines the corresponding connection mode according to the selected sharing equipment, calls the corresponding software and hardware functional components and initiates control connection.
8. The method of claim 6, further comprising:
when the application program on the second client is closed, automatically clearing the shared device list;
when the application program is opened again, the information acquisition interface is displayed, the identity authentication information is acquired again, and an authentication request is sent to the server;
when the sharing time period is over, the corresponding sharing information is automatically invalidated.
9. The method of any one of claims 1-5, further comprising:
the sharing equipment determines the remaining time allowed to be shared according to the sharing time period;
and starting timing while opening the use authority, and closing the use authority when the duration reaches the remaining time.
10. A shared use system of an electronic device, comprising: the system comprises a server, a first client, a second client and a sharing device;
a first client sends a sharing request to a server; the sharing request at least comprises the following information: a master user identity identifier, a slave user identity identifier, a sharing equipment identifier and a sharing time period;
the second client sends the authentication information to the server;
the server compares and verifies the secondary user identity identification and the identity verification information, and sends the shared information to the second client after the verification is passed; the shared information at least comprises the following information: sharing equipment identification, sharing time period and communication key;
and the second client acquires the use permission of the sharing equipment according to the sharing information.
CN202110958927.6A 2021-08-20 2021-08-20 Sharing use method and system of electronic equipment Pending CN113765897A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110958927.6A CN113765897A (en) 2021-08-20 2021-08-20 Sharing use method and system of electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110958927.6A CN113765897A (en) 2021-08-20 2021-08-20 Sharing use method and system of electronic equipment

Publications (1)

Publication Number Publication Date
CN113765897A true CN113765897A (en) 2021-12-07

Family

ID=78790554

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110958927.6A Pending CN113765897A (en) 2021-08-20 2021-08-20 Sharing use method and system of electronic equipment

Country Status (1)

Country Link
CN (1) CN113765897A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115664865A (en) * 2022-12-27 2023-01-31 安徽国审信息科技有限公司 Verification data transmission method, system, computer equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737424A (en) * 2018-05-24 2018-11-02 深圳市零度智控科技有限公司 Authority sharing method, server, system and the readable storage medium storing program for executing of smart home
CN108833507A (en) * 2018-05-31 2018-11-16 长安大学 A kind of authorization identifying system and method for shared product
WO2019032623A1 (en) * 2017-08-08 2019-02-14 T-Mobile Usa, Inc. Service sharing between devices
CN109995709A (en) * 2017-12-29 2019-07-09 上海智显光电科技有限公司 A kind of system and method for realizing collaborative share
CN111921186A (en) * 2020-06-24 2020-11-13 北京视博云信息技术有限公司 Cloud game peripheral sharing method, device and system
CN112738805A (en) * 2020-12-30 2021-04-30 青岛海尔科技有限公司 Device control method and apparatus, storage medium, and electronic device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019032623A1 (en) * 2017-08-08 2019-02-14 T-Mobile Usa, Inc. Service sharing between devices
CN109995709A (en) * 2017-12-29 2019-07-09 上海智显光电科技有限公司 A kind of system and method for realizing collaborative share
CN108737424A (en) * 2018-05-24 2018-11-02 深圳市零度智控科技有限公司 Authority sharing method, server, system and the readable storage medium storing program for executing of smart home
CN108833507A (en) * 2018-05-31 2018-11-16 长安大学 A kind of authorization identifying system and method for shared product
CN111921186A (en) * 2020-06-24 2020-11-13 北京视博云信息技术有限公司 Cloud game peripheral sharing method, device and system
CN112738805A (en) * 2020-12-30 2021-04-30 青岛海尔科技有限公司 Device control method and apparatus, storage medium, and electronic device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115664865A (en) * 2022-12-27 2023-01-31 安徽国审信息科技有限公司 Verification data transmission method, system, computer equipment and storage medium
CN115664865B (en) * 2022-12-27 2023-05-12 深圳巨隆基科技有限公司 Verification data transmission method, system, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN105915344B (en) A kind of electron key shared service system for house lease
US11572713B1 (en) Smart lock box
CN106134143B (en) Method, apparatus and system for dynamic network access-in management
US9876796B2 (en) Systems and methods for group authentication
CN102405630B (en) System of multiple domains and domain ownership
CN109891416A (en) For authenticating and the system and method for authorization device
WO2018020375A1 (en) Blockchain-implemented method and system
JP2017210862A (en) Methods, programs and systems for location enabled electronic lock control
CN104637131A (en) Authorization method and authorization device for access control system and access control system
CN104769913A (en) Policy-based resource access via NFC
CN111742531A (en) Profile information sharing
CN106127888B (en) Intelligent lock operation method and smart lock operating system
CN107886602A (en) A kind of method for unlocking and system
CN105075219A (en) Network system comprising a security management server and a home network, and method for including a device in the network system
CN106559213A (en) Device management method, equipment and system
WO2019101156A1 (en) Device control method, and related device for same
CN103778379B (en) Application in management equipment performs and data access
CN104853354A (en) Bluetooth authentication method and system thereof
CN107944709A (en) A kind of training space Sharing Management system and method
CN108876987A (en) Building access control method, Cloud Server and computer readable storage medium
CN116980163A (en) Data processing method, device, equipment and medium based on trusted execution environment
CN113765897A (en) Sharing use method and system of electronic equipment
KR101968417B1 (en) Message security transmission system in smart home service system and method thereof
CN109801418A (en) User autonomous controllable fining authorization management method and device
CN103559430B (en) application account management method and device based on Android system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20211207