CN113765897A - Sharing use method and system of electronic equipment - Google Patents
Sharing use method and system of electronic equipment Download PDFInfo
- Publication number
- CN113765897A CN113765897A CN202110958927.6A CN202110958927A CN113765897A CN 113765897 A CN113765897 A CN 113765897A CN 202110958927 A CN202110958927 A CN 202110958927A CN 113765897 A CN113765897 A CN 113765897A
- Authority
- CN
- China
- Prior art keywords
- sharing
- information
- client
- equipment
- shared
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 50
- 238000012795 verification Methods 0.000 claims abstract description 21
- 238000004891 communication Methods 0.000 claims abstract description 20
- 230000002452 interceptive effect Effects 0.000 claims description 6
- 238000013475 authorization Methods 0.000 abstract description 7
- 230000006870 function Effects 0.000 description 7
- 230000000977 initiatory effect Effects 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 3
- 238000003860 storage Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000003999 initiator Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Abstract
The application relates to a sharing use method and a system of electronic equipment; the method comprises the following steps: a first client sends a sharing request to a server; the second client sends the authentication information to the server; the server compares and verifies the secondary user identity identification and the identity verification information, and sends the shared information to the second client after the verification is passed; and the second client acquires the use permission of the sharing equipment according to the sharing information. According to the scheme, the shared electronic equipment is not required to be connected with the Internet, and only the low-power-consumption near-field communication capacity is required to be possessed by the shared electronic equipment, so that the equipment cost is reduced; the specific identity of the invited party is not known in advance by an authorization party, and an account is not required to be registered in advance by the invited party, so that the invited party can be an uncertain group, such as express delivery, take-out, net car appointment drivers and the like, and the electronic equipment is conveniently authorized to an unfamiliar stranger for use; the scheme has higher flexibility and greatly expands the use scene of the shared electronic equipment.
Description
Technical Field
The application relates to the technical field of Internet of things, in particular to a sharing use method and system of electronic equipment.
Background
IoT (Internet of Things) equipment is widely applied to social production and life, and various sensors, controllers, door locks and the like bring great convenience to life and work of users. In a household and business scene, a user shares a device with the use right to other people, and the sharing is a very common scene, for example, scenes that a certain IoT device needs to be used together can occur among family members, between the upper and lower levels of a company, among members in an organization team, and the like.
At present, manufacturers and service integrators of IoT devices provide remote "sharing" functions, which mostly depend on the ability of the IoT devices to directly connect to the wide area internet; when a user shares the user with the user, the server issues the operation authority to the IoT equipment or the IoT equipment gateway through the wide area internet, and then the IoT equipment processing module or the gateway records a new authority person locally; so that other clients receiving the "share" invitation can use the device. The method needs the equipment with networking capability, such as laying a gateway, integrating a 4G module and a WiFi module, and the equipment purchasing and implementing cost is high.
In the related art, if one IoT device itself cannot be connected to the wide area internet or there is no "gateway" connected to the wide area internet, the "sharing" function is degraded to send an operation password (a long-term password or a temporary password) to the sharer, and then the sharer inputs the operation password through an input device or medium associated with the IoT device. This kind of mode operation is comparatively loaded down with trivial details, and has security risks such as password reveal, is falsely used.
In addition, some 'sharing' functions of existing software and hardware depend on the premise that both sides are users of the platform, and one account is allowed to access resources of the other account. In practice, more and more scenes are a temporary authorization relationship and even a temporary use requirement, even the situation that the other party is uncertain of which specific person, such as authorization to express chicks, takeout personnel, network car booking drivers and the like, the other party cannot know the specific person in advance, and the other party cannot be required to register an account on a specific platform in advance, so that the scheme that sharing can be completed only by registering the account in advance is not applicable.
In summary, the following problems exist in the prior art:
(1) the equipment hardware specification requirement is higher depending on the capacity of the IoT equipment for connecting the wide area internet, so that the purchase cost and the failure rate are both improved;
(2) networking gateways need to be arranged on part of IoT equipment, namely, the field wiring and other weak current construction cost and risks are increased;
(3) the potential safety hazards of password leakage, illegal use and the like exist by depending on the transmission of the password or the secret key;
(4) the sharing parties need to determine the identities of each other in advance and complete platform account registration, and application scenarios are limited.
Disclosure of Invention
To overcome, at least to some extent, the problems in the related art, the present application provides a method and system for shared use of electronic devices.
According to a first aspect of embodiments of the present application, a method for sharing and using an electronic device is provided, including:
a first client sends a sharing request to a server; the sharing request at least comprises the following information: a master user identity identifier, a slave user identity identifier, a sharing equipment identifier and a sharing time period;
the second client sends the authentication information to the server;
the server compares and verifies the secondary user identity identification and the identity verification information, and sends the shared information to the second client after the verification is passed; the shared information at least comprises the following information: sharing equipment identification, sharing time period and communication key;
and the second client acquires the use permission of the sharing equipment according to the sharing information.
Further, the method further comprises:
the server verifies the identity identification of the master user and the shared equipment identification, and judges whether the master user has the use authority of the shared equipment;
if the master user has the use authority, the server returns the sharing permission information to the first client; otherwise, returning the sharing forbidding information.
Further, the method further comprises:
after receiving the sharing permission information, the first client generates invitation information according to the sharing permission information;
the first client sends invitation information to the second client.
Further, the sharing permission information contains an invitation instruction; accordingly, the first client generates invitation information according to the invitation instruction.
Further, the second client sends authentication information to the server, including:
the second client acquires the input secondary user identity information;
and the second client generates identity authentication information according to the identity information of the secondary user, the equipment information of the second client and/or the invitation instruction and sends the identity authentication information to the server.
Further, the method further comprises:
and after receiving the sharing information, the second client generates a sharing equipment list allowing operation at present according to the sharing information and displays the sharing equipment list on the interactive interface.
Further, the shared information further includes the following information: a connection mode;
accordingly, the method further comprises:
the second client selects the specified shared equipment from the currently-allowed shared equipment list according to the operation on the interactive interface;
and the second client determines the corresponding connection mode according to the selected sharing equipment, calls the corresponding software and hardware functional components and initiates control connection.
Further, the method further comprises:
when the application program on the second client is closed, automatically clearing the shared device list;
when the application program is opened again, the information acquisition interface is displayed, the identity authentication information is acquired again, and an authentication request is sent to the server;
when the sharing time period is over, the corresponding sharing information is automatically invalidated.
Further, the method further comprises:
the sharing equipment determines the remaining time allowed to be shared according to the sharing time period;
and starting timing while opening the use authority, and closing the use authority when the duration reaches the remaining time.
According to a second aspect of embodiments of the present application, there is provided a shared use system of an electronic device, including: the system comprises a server, a first client, a second client and a sharing device;
a first client sends a sharing request to a server; the sharing request at least comprises the following information: a master user identity identifier, a slave user identity identifier, a sharing equipment identifier and a sharing time period;
the second client sends the authentication information to the server;
the server compares and verifies the secondary user identity identification and the identity verification information, and sends the shared information to the second client after the verification is passed; the shared information at least comprises the following information: sharing equipment identification, sharing time period and communication key;
and the second client acquires the use permission of the sharing equipment according to the sharing information.
The technical scheme provided by the embodiment of the application has the following beneficial effects:
according to the scheme, the shared electronic equipment is not required to be connected with the Internet, and only the low-power-consumption near-field communication capacity is required to be possessed by the shared electronic equipment, so that the equipment cost is reduced; because the authority sharing information does not need to be issued to the sharing electronic equipment, the sharing initiation is not influenced by accidental network disconnection and power failure of the sharing electronic equipment; the specific identity of the invited party is not known in advance by an authorization party, and an account is not required to be registered in advance by the invited party, so that the invited party can be an uncertain group, such as express delivery, take-out, net car appointment drivers and the like, and the electronic equipment is conveniently authorized to an unfamiliar stranger for use; the scheme has higher flexibility and greatly expands the use scene of the shared electronic equipment.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
FIG. 1 is a schematic diagram of an application environment illustrating a method for shared use of electronic devices according to an example embodiment.
FIG. 2 is a flow chart illustrating a method of shared use of an electronic device according to an example embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of methods and systems consistent with certain aspects of the present application, as detailed in the appended claims.
The sharing and using method of the electronic device can be applied to the application environment shown in fig. 1. The application environment comprises a first client 102, a second client 104, a shared electronic device 108, a network, a server 106 and a database, wherein the first client 102, the second client 104 and the server 106 can be in communication connection through the network. The network may include various types of wired or wireless networks; for example, the network may be a wide area internet, a local area network, or a combination network based on the internet and the local area network, which is not described herein. The network may also be based on a corresponding communication protocol when performing data transmission, for example, the web browser may be based on an HTTP communication protocol when receiving a service code corresponding to a web page, and the mobile application may be based on a Websocket communication protocol when receiving the service code. The second client 104 and the shared electronic device 108 may be communicatively connected through a short-range wireless communication technology, for example, may communicate through bluetooth, NFC, or the like.
The first client 102 and the second client 104 may be, but are not limited to, various smart phones, tablet computers, and portable wearable devices. Meanwhile, fig. 1 shows a case where the number of the first client 102 and the second client 104 is one, but the application does not limit the number of the first client 102 and the second client 104, and more or fewer clients may be included. The first client 102 and the second client 104 run an application program, and the application program can interact with the server 106 and the shared electronic device 108 when running, so as to implement a shared use method of the electronic device.
The server 106 may be implemented as a stand-alone server or a server cluster composed of a plurality of servers; in operation, the server 106 may run an application program to interact with the first client 102 and the second client 104, so as to implement a shared usage method of the electronic device. The database comprises a plurality of databases or database clusters, or only a single database; the database may also be a database in a server.
FIG. 2 is a flow chart illustrating a method of shared use of an electronic device according to an example embodiment. The method may comprise the steps of:
a first client sends a sharing request to a server; the sharing request at least comprises the following information: a master user identity identifier, a slave user identity identifier, a sharing equipment identifier and a sharing time period;
the second client sends the authentication information to the server;
the server compares and verifies the secondary user identity identification and the identity verification information, and sends the shared information to the second client after the verification is passed; the shared information at least comprises the following information: sharing equipment identification, sharing time period and communication key;
and the second client acquires the use permission of the sharing equipment according to the sharing information.
According to the scheme, the shared electronic equipment is not required to be connected with the Internet, and only the low-power-consumption near-field communication capacity is required to be possessed by the shared electronic equipment, so that the equipment cost is reduced; because the authority sharing information does not need to be issued to the sharing electronic equipment, the sharing initiation is not influenced by accidental network disconnection and power failure of the sharing electronic equipment; the specific identity of the invited party is not known in advance by an authorization party, and an account is not required to be registered in advance by the invited party, so that the invited party can be an uncertain group, such as express delivery, take-out, flash delivery, a network car appointment driver, security personnel in shift and the like, and the electronic equipment is conveniently authorized to be used by unfamiliar strangers; the scheme has higher flexibility and greatly expands the use scene of the shared electronic equipment.
It should be understood that, although the steps in the flowchart of fig. 2 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps in fig. 2 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The following describes the scheme of the present application in an expanded manner with reference to a specific application scenario.
The application provides a sharing and using method of IoT equipment without passwords, gateways and internet access, and the sharing and using method is composed of networked client equipment, a client application program, IoT equipment capable of carrying out near field communication with the client equipment and a remote server. Wherein the client device is generally a smartphone in which an APP or a wechat applet can be installed.
Step one, preparation.
Before the IoT equipment is used by a user, the server stores digital information of each IoT equipment, such as a model, a connection method, a serial number, a secret key of a communication encryption or authentication link and the like.
And step two, initiating sharing.
In some embodiments, the method further comprises:
the server verifies the identity identification of the master user and the shared equipment identification, and judges whether the master user has the use authority of the shared equipment;
if the master user has the use authority, the server returns the sharing permission information to the first client; otherwise, returning the sharing forbidding information.
In some embodiments, the method further comprises:
after receiving the sharing permission information, the first client generates invitation information according to the sharing permission information;
the first client sends invitation information to the second client.
In some embodiments, the sharing permission information includes an invitation instruction; accordingly, the first client generates invitation information according to the invitation instruction.
The user (hereinafter referred to as a "master user") has an IoT device operation right, and provides identification information identification of other people (hereinafter referred to as "secondary users") who wish to invite authorization for common use, such as a real mobile phone number, a virtual mobile phone number, a job number and the like, through a client application program to initiate sharing. The client side collects the shared necessary information and then sends the information to the remote server; the remote server records information such as main user information, auxiliary user information, shared equipment, sharing time interval and the like.
The necessary information required for sharing at least comprises a primary user identity identifier, secondary user identity information and a shared IoT equipment identifier; if the security check needs to be enhanced, at least one other verification mode of the secondary user can be supplemented, such as a real name or an identity card number, or a secret language or a password agreed by both parties.
And step three, the secondary user declares the identity.
In some embodiments, the sending, by the second client, the authentication information to the server includes:
the second client acquires the input secondary user identity information;
and the second client generates identity authentication information according to the identity information of the secondary user, the equipment information of the second client and/or the invitation instruction and sends the identity authentication information to the server.
In some embodiments, the method further comprises:
and after receiving the sharing information, the second client generates a sharing equipment list allowing operation at present according to the sharing information and displays the sharing equipment list on the interactive interface.
The secondary user receives sharing information sent by the primary user; the sharing information can be short messages, WeChat applet sharing, system notifications, an operation page of a client application program, an application program entry, or a secondary user notified by a primary user, and the like; and the secondary user opens the client small program or APP through code scanning, connection clicking and other modes, and enters an operation interface for sharing.
The client can automatically acquire the current mobile phone number of the secondary user or manually input other appointed identity information identifiers by the secondary user through a universal mature technical means to declare the identity of the secondary user; if the enhanced security verification is required in the second step, the client should simultaneously prompt and collect additional verification data, such as real names and the like.
Optionally, the program may verify the authenticity of the information input by the secondary user at this step, such as adding a short message verification code, certificate identification, identity card verification, and the like.
And after receiving the identity declaration of the secondary user (and completing 'security enhancement verification' and 'authenticity verification'), the client program sends the identity declaration to the server.
And step four, verifying the authorization relationship.
And after receiving the identity information declared by the secondary user, the server side inquires the shared information stored in the second step for comparison, finds the device information and the shared time period invited to be shared by the secondary user, encrypts the device information and the shared time period and sends the encrypted device information to the secondary user client side application program, wherein the information at least comprises a sharing initiator, a shared device name, a device serial number, a communication connection mode, a communication secret key and the like.
And step five, sharing the using equipment.
The secondary user client application program receives the information, organizes and displays the information in the UI as a device list which can be selected and operated by the current secondary user. The auxiliary user selects the equipment to be used from the list, and the client application program calls the corresponding software and hardware functional components according to the equipment serial number, the connection mode (such as Bluetooth, NFC and the like), the communication secret key and the like to initiate the control connection.
In some embodiments, the shared information further includes the following information: a connection mode;
accordingly, the method further comprises:
the second client selects the specified shared equipment from the currently-allowed shared equipment list according to the operation on the interactive interface;
and the second client determines the corresponding connection mode according to the selected sharing equipment, calls the corresponding software and hardware functional components and initiates control connection.
Since the IoT device targeted by the present invention is not connected to the internet, the secondary user should arrive at the scene to operate the device in close proximity.
And step six, finishing.
In some embodiments, the method further comprises:
when the application program on the second client is closed, automatically clearing the shared device list;
when the application program is opened again, the information acquisition interface is displayed, the identity authentication information is acquired again, and an authentication request is sent to the server;
when the sharing time period is over, the corresponding sharing information is automatically invalidated.
And after the secondary user finishes using, closing the application program of the handheld terminal. The application program should automatically clear the sharing device list before closing, and when the application program is opened next time, the secondary user is required to acquire the identity claim again and initiates a request to the background server again, so that the secondary user is prevented from initiating an instruction for operating the device through the cached list after the effective sharing time period is exceeded or the sharing is cancelled.
And seventhly, canceling and failing.
The invited sharing use of the secondary user automatically fails after the invited period is over; the master user can also revoke a share at any time, and even if the secondary user provides a valid identity declaration after revocation, the revoked share information still cannot be returned in the step four.
In some embodiments, the method further comprises:
the sharing equipment determines the remaining time allowed to be shared according to the sharing time period;
and starting timing while opening the use authority, and closing the use authority when the duration reaches the remaining time.
To sum up, the technical scheme of this application has following beneficial effect:
(1) the master user has high speed for initiating sharing and high success rate, theoretically, the speed is approximately equal to 4G or Wifi network transmission time, and the success rate can reach 100%;
(2) because the authority sharing information does not need to be issued to the equipment, the equipment is accidentally disconnected from the network and the power supply does not influence the sharing initiation;
(3) the cost of sharing and using the IoT equipment by the service provider is reduced, namely, a network environment suitable for an IoT equipment gateway is not required to be built in a service site provided with the IoT equipment, the IoT equipment with the 4G, WiFi function is not required to be purchased, and only equipment with low-power near-field communication capability (such as Bluetooth, NFC and the like) is adopted;
(4) the 'revocation sharing' is more reliable, namely, assuming that the network connection of the service site is interrupted, the server in other sharing methods cannot issue a revocation instruction to the equipment, so that the 'revocation sharing' cannot be realized. The invention does not have the condition;
(5) the sharing use flow does not depend on any password which needs to be manually set, stored and input by a user, and the conditions of password leakage, equipment falsifying and the like can be avoided;
(6) the invention does not depend on an authorizer to know the specific identity of the invited party in advance, can authorize approximate objects such as couriers, takeaway guys, net car drivers and the like, does not need the invited party to register an account in advance, has higher flexibility and greatly expands the use scene.
As shown in fig. 1, an embodiment of the present application further provides a shared use system of an electronic device, including: the system comprises a server, a first client, a second client and a sharing device;
a first client sends a sharing request to a server; the sharing request at least comprises the following information: a master user identity identifier, a slave user identity identifier, a sharing equipment identifier and a sharing time period;
the second client sends the authentication information to the server;
the server compares and verifies the secondary user identity identification and the identity verification information, and sends the shared information to the second client after the verification is passed; the shared information at least comprises the following information: sharing equipment identification, sharing time period and communication key;
and the second client acquires the use permission of the sharing equipment according to the sharing information.
With regard to the system in the above embodiment, the specific steps in which the respective modules perform operations have been described in detail in the embodiment related to the method, and are not described in detail herein. The various modules in the above-described system may be implemented in whole or in part by software, hardware, and combinations thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that, in the description of the present application, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present application, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.
Claims (10)
1. A shared use method of an electronic device, comprising:
a first client sends a sharing request to a server; the sharing request at least comprises the following information: a master user identity identifier, a slave user identity identifier, a sharing equipment identifier and a sharing time period;
the second client sends the authentication information to the server;
the server compares and verifies the secondary user identity identification and the identity verification information, and sends the shared information to the second client after the verification is passed; the shared information at least comprises the following information: sharing equipment identification, sharing time period and communication key;
and the second client acquires the use permission of the sharing equipment according to the sharing information.
2. The method of claim 1, further comprising:
the server verifies the identity identification of the master user and the shared equipment identification, and judges whether the master user has the use authority of the shared equipment;
if the master user has the use authority, the server returns the sharing permission information to the first client; otherwise, returning the sharing forbidding information.
3. The method of claim 2, further comprising:
after receiving the sharing permission information, the first client generates invitation information according to the sharing permission information;
the first client sends invitation information to the second client.
4. The method of claim 3, wherein the information allowing sharing comprises an invitation instruction; accordingly, the first client generates invitation information according to the invitation instruction.
5. The method of claim 4, wherein the second client sends authentication information to the server, comprising:
the second client acquires the input secondary user identity information;
and the second client generates identity authentication information according to the identity information of the secondary user, the equipment information of the second client and/or the invitation instruction and sends the identity authentication information to the server.
6. The method of any one of claims 1-5, further comprising:
and after receiving the sharing information, the second client generates a sharing equipment list allowing operation at present according to the sharing information and displays the sharing equipment list on the interactive interface.
7. The method according to claim 6, wherein the shared information further comprises the following information: a connection mode;
accordingly, the method further comprises:
the second client selects the specified shared equipment from the currently-allowed shared equipment list according to the operation on the interactive interface;
and the second client determines the corresponding connection mode according to the selected sharing equipment, calls the corresponding software and hardware functional components and initiates control connection.
8. The method of claim 6, further comprising:
when the application program on the second client is closed, automatically clearing the shared device list;
when the application program is opened again, the information acquisition interface is displayed, the identity authentication information is acquired again, and an authentication request is sent to the server;
when the sharing time period is over, the corresponding sharing information is automatically invalidated.
9. The method of any one of claims 1-5, further comprising:
the sharing equipment determines the remaining time allowed to be shared according to the sharing time period;
and starting timing while opening the use authority, and closing the use authority when the duration reaches the remaining time.
10. A shared use system of an electronic device, comprising: the system comprises a server, a first client, a second client and a sharing device;
a first client sends a sharing request to a server; the sharing request at least comprises the following information: a master user identity identifier, a slave user identity identifier, a sharing equipment identifier and a sharing time period;
the second client sends the authentication information to the server;
the server compares and verifies the secondary user identity identification and the identity verification information, and sends the shared information to the second client after the verification is passed; the shared information at least comprises the following information: sharing equipment identification, sharing time period and communication key;
and the second client acquires the use permission of the sharing equipment according to the sharing information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110958927.6A CN113765897A (en) | 2021-08-20 | 2021-08-20 | Sharing use method and system of electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110958927.6A CN113765897A (en) | 2021-08-20 | 2021-08-20 | Sharing use method and system of electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113765897A true CN113765897A (en) | 2021-12-07 |
Family
ID=78790554
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110958927.6A Pending CN113765897A (en) | 2021-08-20 | 2021-08-20 | Sharing use method and system of electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113765897A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115664865A (en) * | 2022-12-27 | 2023-01-31 | 安徽国审信息科技有限公司 | Verification data transmission method, system, computer equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108737424A (en) * | 2018-05-24 | 2018-11-02 | 深圳市零度智控科技有限公司 | Authority sharing method, server, system and the readable storage medium storing program for executing of smart home |
CN108833507A (en) * | 2018-05-31 | 2018-11-16 | 长安大学 | A kind of authorization identifying system and method for shared product |
WO2019032623A1 (en) * | 2017-08-08 | 2019-02-14 | T-Mobile Usa, Inc. | Service sharing between devices |
CN109995709A (en) * | 2017-12-29 | 2019-07-09 | 上海智显光电科技有限公司 | A kind of system and method for realizing collaborative share |
CN111921186A (en) * | 2020-06-24 | 2020-11-13 | 北京视博云信息技术有限公司 | Cloud game peripheral sharing method, device and system |
CN112738805A (en) * | 2020-12-30 | 2021-04-30 | 青岛海尔科技有限公司 | Device control method and apparatus, storage medium, and electronic device |
-
2021
- 2021-08-20 CN CN202110958927.6A patent/CN113765897A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019032623A1 (en) * | 2017-08-08 | 2019-02-14 | T-Mobile Usa, Inc. | Service sharing between devices |
CN109995709A (en) * | 2017-12-29 | 2019-07-09 | 上海智显光电科技有限公司 | A kind of system and method for realizing collaborative share |
CN108737424A (en) * | 2018-05-24 | 2018-11-02 | 深圳市零度智控科技有限公司 | Authority sharing method, server, system and the readable storage medium storing program for executing of smart home |
CN108833507A (en) * | 2018-05-31 | 2018-11-16 | 长安大学 | A kind of authorization identifying system and method for shared product |
CN111921186A (en) * | 2020-06-24 | 2020-11-13 | 北京视博云信息技术有限公司 | Cloud game peripheral sharing method, device and system |
CN112738805A (en) * | 2020-12-30 | 2021-04-30 | 青岛海尔科技有限公司 | Device control method and apparatus, storage medium, and electronic device |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115664865A (en) * | 2022-12-27 | 2023-01-31 | 安徽国审信息科技有限公司 | Verification data transmission method, system, computer equipment and storage medium |
CN115664865B (en) * | 2022-12-27 | 2023-05-12 | 深圳巨隆基科技有限公司 | Verification data transmission method, system, computer equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105915344B (en) | A kind of electron key shared service system for house lease | |
US11572713B1 (en) | Smart lock box | |
CN106134143B (en) | Method, apparatus and system for dynamic network access-in management | |
US9876796B2 (en) | Systems and methods for group authentication | |
CN102405630B (en) | System of multiple domains and domain ownership | |
CN109891416A (en) | For authenticating and the system and method for authorization device | |
WO2018020375A1 (en) | Blockchain-implemented method and system | |
JP2017210862A (en) | Methods, programs and systems for location enabled electronic lock control | |
CN104637131A (en) | Authorization method and authorization device for access control system and access control system | |
CN104769913A (en) | Policy-based resource access via NFC | |
CN111742531A (en) | Profile information sharing | |
CN106127888B (en) | Intelligent lock operation method and smart lock operating system | |
CN107886602A (en) | A kind of method for unlocking and system | |
CN105075219A (en) | Network system comprising a security management server and a home network, and method for including a device in the network system | |
CN106559213A (en) | Device management method, equipment and system | |
WO2019101156A1 (en) | Device control method, and related device for same | |
CN103778379B (en) | Application in management equipment performs and data access | |
CN104853354A (en) | Bluetooth authentication method and system thereof | |
CN107944709A (en) | A kind of training space Sharing Management system and method | |
CN108876987A (en) | Building access control method, Cloud Server and computer readable storage medium | |
CN116980163A (en) | Data processing method, device, equipment and medium based on trusted execution environment | |
CN113765897A (en) | Sharing use method and system of electronic equipment | |
KR101968417B1 (en) | Message security transmission system in smart home service system and method thereof | |
CN109801418A (en) | User autonomous controllable fining authorization management method and device | |
CN103559430B (en) | application account management method and device based on Android system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20211207 |