CN114285625A - Equipment interaction method and system - Google Patents
Equipment interaction method and system Download PDFInfo
- Publication number
- CN114285625A CN114285625A CN202111570511.3A CN202111570511A CN114285625A CN 114285625 A CN114285625 A CN 114285625A CN 202111570511 A CN202111570511 A CN 202111570511A CN 114285625 A CN114285625 A CN 114285625A
- Authority
- CN
- China
- Prior art keywords
- slave
- slave device
- equipment
- master
- public data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 32
- 230000003993 interaction Effects 0.000 title abstract description 14
- 230000007246 mechanism Effects 0.000 claims abstract description 22
- 238000013475 authorization Methods 0.000 claims abstract description 6
- 230000006870 function Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Landscapes
- Selective Calling Equipment (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention relates to a device interaction method and a system, wherein the method controls a slave device to start a safety protection mechanism when the master device needs to access the slave device through the same operating system but different manufacturers of the master device and the slave device, so that the master device can access non-public data of the slave device only when the slave device is subjected to safety authorization, the safety of information interaction between devices is improved, the safety protection and safety management between devices of different manufacturers are increased, and the information leakage between the devices of different manufacturers is effectively prevented.
Description
Technical Field
The invention relates to the technical field of communication, in particular to a device interaction method and system.
Background
The Hongmon system is a brand-new distributed operating system facing to the whole scene, a world with super virtual terminals interconnected is created, people, equipment and scenes are organically connected together, various intelligent terminals contacted by consumers in the whole scene life are realized to realize extremely rapid discovery, extremely rapid connection, hardware mutual assistance and resource sharing, the most appropriate equipment is used for providing the best scene experience, and the Hongmon OS is a distributed operating system facing to the whole scene based on micro-kernels.
At present, devices with the same operating system (for example, hong meng system) can be interconnected, but after the devices of hong meng systems of different manufacturers are interconnected, no matter data transmission or data acquisition is performed, the security of device information cannot be guaranteed.
Disclosure of Invention
In view of the above, an object of the present invention is to provide a device interaction method and system, so as to solve the problems of poor security and easy information leakage when devices with the same operating system are interconnected in the prior art.
According to a first aspect of the embodiments of the present invention, there is provided a device interaction method, including:
determining a master device and a slave device from a plurality of devices accessing a network;
if the operating systems of the master device and the slave device are the same, but the manufacturers are different, when the master device needs to access the slave device, the slave device is controlled to start a security protection mechanism, so that the master device can access the non-public data of the slave device only when the slave device is safely authorized.
Preferably, the controlling the slave device to open the safety protection mechanism comprises:
storing the non-public data of the slave device in a secure storage area of the slave device.
Preferably, the method further comprises:
allocating a security management area for the slave device in the master device;
and controlling the master device to independently access the non-public data of the slave device based on the safety management area.
Preferably, the method further comprises:
if the number of the slave devices is multiple, and the operating systems of a first slave device and a master device in the multiple slave devices are the same and the manufacturers are the same, and the operating systems of a second slave device and the master device are the same but the manufacturers are different, when the first slave device needs to access the second slave device, the first slave device is controlled to obtain the non-public data of the second slave device through the master device; and/or the presence of a gas in the gas,
if the number of the slave devices is multiple, and the operating systems of the first slave device and the master device in the multiple slave devices are the same, and the manufacturers are the same, and the operating systems of the second slave device and the master device are the same, but the manufacturers are different, when the second slave device needs to access the first slave device, the second slave device is switched to the master device of the first slave device, and the non-public data of the first slave device is accessed.
Preferably, when the first slave device needs to access the second slave device, controlling the first slave device to obtain the non-public data of the second slave device through the master device includes:
and controlling the first slave equipment to send an access request to the master equipment so that the master equipment inquires non-public data of second slave equipment in a corresponding security management area according to the access request and feeds the non-public data back to the first slave equipment.
Preferably, the method further comprises:
switching the second slave equipment to the master equipment of the first slave equipment, and switching the second slave equipment to the slave equipment with the same level as the first slave equipment after accessing the non-public data of the first slave equipment; and/or the presence of a gas in the gas,
and when the second slave equipment is switched to the master equipment, clearing the safety protection mechanism established by the first slave equipment and the safety management area established by the second slave equipment.
According to a second aspect of the embodiments of the present invention, there is provided an apparatus interaction system, including:
the device comprises a determining module, a judging module and a judging module, wherein the determining module is used for determining a main device and a slave device from a plurality of devices accessed to a network;
and the control module is used for controlling the slave equipment to open a safety protection mechanism when the master equipment needs to access the slave equipment if the operating systems of the master equipment and the slave equipment are the same but the manufacturers are different, so that the master equipment can access the non-public data of the slave equipment only when the slave equipment is subjected to safety authorization.
Preferably, the controlling the slave device to open the safety protection mechanism comprises:
storing the non-public data of the slave device in a secure storage area of the slave device.
Preferably, the control module is further configured to:
allocating a security management area for the slave device in the master device;
and controlling the master device to independently access the non-public data of the slave device based on the safety management area.
Preferably, the control module is further configured to:
if the number of the slave devices is multiple, and the operating systems of a first slave device and a master device in the multiple slave devices are the same and the manufacturers are the same, and the operating systems of a second slave device and the master device are the same but the manufacturers are different, when the first slave device needs to access the second slave device, the first slave device is controlled to obtain the non-public data of the second slave device through the master device; and/or the presence of a gas in the gas,
if the number of the slave devices is multiple, and the operating systems of the first slave device and the master device in the multiple slave devices are the same, and the manufacturers are the same, and the operating systems of the second slave device and the master device are the same, but the manufacturers are different, when the second slave device needs to access the first slave device, the second slave device is switched to the master device of the first slave device, and the non-public data of the first slave device is accessed.
The technical scheme provided by the embodiment of the invention can have the following beneficial effects:
the operating systems of the main equipment and the slave equipment are the same, but the manufacturers are different, when the main equipment needs to access the slave equipment, the slave equipment is controlled to start a safety protection mechanism, so that the main equipment can access non-public data of the slave equipment only when the slave equipment is safely authorized, the safety of information interaction between the equipment is improved, the safety protection and safety management between the equipment of different manufacturers are increased, and the information leakage between the equipment of different manufacturers is effectively prevented.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
FIG. 1 is a flow chart illustrating a method of device interaction in accordance with an exemplary embodiment;
FIG. 2 is a flow chart illustrating a method of device interaction in accordance with another exemplary embodiment;
FIG. 3 is a flow chart illustrating a method of device interaction in accordance with another exemplary embodiment;
FIG. 4 is a flow chart illustrating a method of device interaction in accordance with another exemplary embodiment;
FIG. 5 is a schematic block diagram illustrating a device interaction system in accordance with an exemplary embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
Example one
FIG. 1 is a flow chart illustrating a method of device interaction, as shown in FIG. 1, in accordance with an exemplary embodiment, including:
step S11, determining a master device and a slave device from a plurality of devices accessing the network;
and step S12, if the operating systems of the master device and the slave device are the same, but the manufacturers are different, when the master device needs to access the slave device, controlling the slave device to start the security protection mechanism, so that the master device can access the non-public data of the slave device only when the slave device is safely authorized.
It should be noted that the operating system includes, but is not limited to: hongmeng system, android system, saiban system, iOS system, etc. The technical solution provided by this embodiment is only applicable to interaction between devices with the same operating system, for example, there is interworking interconnection between devices of a hongmeng system. In a specific practice, the technical solution provided in this embodiment can be loaded to a gateway, a mobile terminal, and/or a computer for operation.
The main equipment is equipment for sending an access request; the slave device selects the device to which the master device is ready to send an access request.
When the master equipment needs to access the slave equipment, the master equipment sends an access request to the slave equipment, wherein the access request carries an ID number and an IP address of the master equipment; based on the ID number, the slave equipment judges whether the ID number is the same as the manufacturer of the master equipment or not, and if the ID number is different from the manufacturer of the master equipment, the slave equipment starts a safety protection mechanism: storing the non-public data of the slave device in a secure storage area of the slave device.
Based on the IP address, the slave device judges whether the slave device and the main device are in the same local area network, if so, the slave device carries out safety authorization on the main device: and feeding back the address of the self safe storage area to the main equipment, so that the main equipment accesses the non-public data of the slave equipment according to the address of the safe storage area.
In order to further improve the security of the system, a security management area can be allocated to the slave device in the master device; and controlling the master device to independently access the non-public data of the slave device based on the safety management area.
In a specific practice, the step S11 "determining the master device and the slave device from the multiple devices accessing the network" may be:
if the current equipment is determined as the master equipment, determining the next-stage equipment of the current equipment as the slave equipment;
the current equipment is any one of first-level equipment to N-level equipment, wherein N is more than or equal to 2.
For example, if hua mobile phone a with hongmeng system is connected to the network, and smart refrigerator B, smart air conditioner C and smart sound box D are also connected to the network, wherein smart refrigerator B, smart air conditioner C and smart sound box D are set as the next-level devices of hua mobile phone a by the user, hua mobile phone a is determined as the master device, and smart refrigerator B, smart air conditioner C and smart sound box D are determined as the slave devices.
For another example, if hua with hongmeng system is a mobile phone a accessing network, and the smart refrigerator B, the smart air conditioner C and the smart sound box D are also accessing network, wherein the smart sound box D is set as the next-level device of hua as the mobile phone a by the user, and the smart refrigerator B and the smart air conditioner C are set as the next-level device of the smart sound box D by the user, then hua as the mobile phone a is determined as the master device, the smart sound box D is determined as the first-level slave device, and the smart refrigerator B and the smart air conditioner C are determined as the second-level slave devices; or, the intelligent sound box D is determined as a master device, and the intelligent refrigerator B and the intelligent air conditioner C are determined as slave devices.
Referring to fig. 2, if the primary device is determined as the master device, the secondary device is determined as the slave device, the manufacturer of the primary master device is manufacturer 1, the manufacturer of the secondary slave device is manufacturer 2, and if the primary master device needs to monitor or control the secondary slave device, the secondary slave device will start the security mechanism: the secondary slave device stores the private or confidential information except the publicable information into a self safe storage area and cannot be read or written by the primary master device. If the primary master device needs to interact with the non-public data of the secondary slave device, the non-public data can be realized only after the security authorization of the secondary slave device. Meanwhile, the primary master device allocates an independent security management area for the secondary slave device, and based on the security management area, the non-public data acquired during interaction with the secondary slave device is independently managed.
The security management area is always used for storing the non-public data of the secondary slave device, so that when the primary master device accesses the secondary slave device again, the security management area does not need to be allocated to the secondary slave device again.
In specific practice, the method further comprises:
if the number of the slave devices is multiple, and the operating systems of a first slave device and a master device in the multiple slave devices are the same and the manufacturers are the same, and the operating systems of a second slave device and the master device are the same but the manufacturers are different, when the first slave device needs to access the second slave device, the first slave device is controlled to obtain the non-public data of the second slave device through the master device;
preferably, when the first slave device needs to access the second slave device, controlling the first slave device to obtain the non-public data of the second slave device through the master device includes:
and controlling the first slave equipment to send an access request to the master equipment so that the master equipment inquires non-public data of second slave equipment in a corresponding security management area according to the access request and feeds the non-public data back to the first slave equipment.
It can be understood that, since the first slave device is the same as the manufacturer of the master device, the first slave device and the master device can be interconnected at any time. If the manufacturers of the first slave device and the master device are different, the master device can actively access the first slave device due to the fact that the first slave device is lower in level than the master device, and the first slave device cannot actively access the master device.
Referring to fig. 3, if the primary device is determined as the master device, the secondary device is determined as the slave device, the manufacturer of the primary master device is manufacturer 1, the manufacturer of the primary slave device is manufacturer 1, and the manufacturer of the secondary slave device is manufacturer 2, if the primary slave device needs to interact with the secondary slave device, the interaction cannot be directly performed, and the interaction needs to be performed through the primary master device: the first secondary slave device needs to send an access request to the first primary master device, and the first primary master device inquires non-public data of the second secondary slave device in the security management area and feeds the non-public data back to the first secondary slave device.
In specific practice, the method further comprises:
if the number of the slave devices is multiple, and the operating systems of the first slave device and the master device in the multiple slave devices are the same, and the manufacturers are the same, and the operating systems of the second slave device and the master device are the same, but the manufacturers are different, when the second slave device needs to access the first slave device, the second slave device is switched to the master device of the first slave device, and the non-public data of the first slave device is accessed.
It will be appreciated that since the second slave device is of a different manufacturer than the master device, and is at a lower level than the master device, the master device may actively access the second slave device, but the second slave device may not actively access the master device. In this case, the second slave device cannot acquire the non-public data of the second slave device through the master device, and can access the non-public data of the first slave device only when the second slave device is switched to the master device of the first slave device.
In a specific practice, when the second slave device needs to access the first slave device, the level of the second slave device may be changed to a virtual level, and the second slave device is switched to the master device of the first slave device.
Preferably, the method further comprises:
switching the second slave equipment to the master equipment of the first slave equipment, and switching the second slave equipment to the slave equipment with the same level as the first slave equipment after accessing the non-public data of the first slave equipment; and/or the presence of a gas in the gas,
and when the second slave equipment is switched to the master equipment, clearing the safety protection mechanism established by the first slave equipment and the safety management area established by the second slave equipment.
Referring to fig. 4, if the primary device is determined as the master device, the secondary device is determined as the slave device, the manufacturer of the primary master device is manufacturer 1, the manufacturer of the first secondary slave device is manufacturer 1, and the manufacturer of the second secondary slave device is manufacturer 2, if the second secondary slave device needs to interact with the first secondary slave device, the second secondary slave device can be switched to the second secondary master device (master device mode), and the interaction can be performed on the first secondary slave device. In this case, the secondary slave device b can automatically switch to the original slave device mode and exist in the entire network after acquiring the non-public data of the secondary slave device b. And the safety protection mechanism established by the secondary slave equipment I and the safety management area established by the secondary slave equipment II are automatically cleared, and are reestablished when the next interaction is carried out.
It can be understood that, in the technical scheme provided by this embodiment, the operating systems of the master device and the slave device are the same, but the manufacturers are different, and when the master device needs to access the slave device, the slave device is controlled to start the security protection mechanism, so that the master device can access the non-public data of the slave device only when the slave device is authorized safely, thereby improving the security of information interaction between devices, increasing the security protection and security management between devices of different manufacturers, and effectively preventing information leakage between devices of different manufacturers.
Example two
FIG. 5 is a schematic block diagram illustrating a device interaction system 100 according to an exemplary embodiment, such as the system 100 shown in FIG. 5, including:
a determining module 101, configured to determine a master device and a slave device from multiple devices accessing a network;
and the control module 102 is configured to, if the operating systems of the master device and the slave device are the same but the manufacturers are different, control the slave device to open the security protection mechanism when the master device needs to access the slave device, so that the master device can only access the non-public data of the slave device when the slave device is securely authorized.
It should be noted that the operating system includes, but is not limited to: hongmeng system, android system, saiban system, iOS system, etc. The technical solution provided by this embodiment is only applicable to interaction between devices with the same operating system, for example, there is interworking interconnection between devices of a hongmeng system. In a specific practice, the technical solution provided in this embodiment can be loaded to a gateway, a mobile terminal, and/or a computer for operation.
The main equipment is equipment for sending an access request; the slave device selects the device to which the master device is ready to send an access request.
When the master equipment needs to access the slave equipment, the master equipment sends an access request to the slave equipment, wherein the access request carries an ID number and an IP address of the master equipment; based on the ID number, the slave equipment judges whether the ID number is the same as the manufacturer of the master equipment or not, and if the ID number is different from the manufacturer of the master equipment, the slave equipment starts a safety protection mechanism: storing the non-public data of the slave device in a secure storage area of the slave device.
Based on the IP address, the slave device judges whether the slave device and the main device are in the same local area network, if so, the slave device carries out safety authorization on the main device: and feeding back the address of the self safe storage area to the main equipment, so that the main equipment accesses the non-public data of the slave equipment according to the address of the safe storage area.
In order to further improve the security of the system, a security management area can be allocated to the slave device in the master device; and controlling the master device to independently access the non-public data of the slave device based on the safety management area.
Preferably, the control module is further configured to:
if the number of the slave devices is multiple, and the operating systems of a first slave device and a master device in the multiple slave devices are the same and the manufacturers are the same, and the operating systems of a second slave device and the master device are the same but the manufacturers are different, when the first slave device needs to access the second slave device, the first slave device is controlled to obtain the non-public data of the second slave device through the master device; and/or the presence of a gas in the gas,
if the number of the slave devices is multiple, and the operating systems of the first slave device and the master device in the multiple slave devices are the same, and the manufacturers are the same, and the operating systems of the second slave device and the master device are the same, but the manufacturers are different, when the second slave device needs to access the first slave device, the second slave device is switched to the master device of the first slave device, and the non-public data of the first slave device is accessed.
Preferably, when the first slave device needs to access the second slave device, controlling the first slave device to obtain the non-public data of the second slave device through the master device includes:
and controlling the first slave equipment to send an access request to the master equipment so that the master equipment inquires non-public data of second slave equipment in a corresponding security management area according to the access request and feeds the non-public data back to the first slave equipment.
Preferably, the control module is further configured to:
switching the second slave equipment to the master equipment of the first slave equipment, and switching the second slave equipment to the slave equipment with the same level as the first slave equipment after accessing the non-public data of the first slave equipment; and/or the presence of a gas in the gas,
and when the second slave equipment is switched to the master equipment, clearing the safety protection mechanism established by the first slave equipment and the safety management area established by the second slave equipment.
It should be noted that, the implementation manner of each module in this embodiment may refer to the description of a related step in this embodiment, and this embodiment is not described again.
It can be understood that, in the technical scheme provided by this embodiment, the operating systems of the master device and the slave device are the same, but the manufacturers are different, and when the master device needs to access the slave device, the slave device is controlled to start the security protection mechanism, so that the master device can access the non-public data of the slave device only when the slave device is authorized safely, thereby improving the security of information interaction between devices, increasing the security protection and security management between devices of different manufacturers, and effectively preventing information leakage between devices of different manufacturers.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that the terms "first," "second," and the like in the description of the present invention are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present invention, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.
Claims (10)
1. A device interaction method, comprising:
determining a master device and a slave device from a plurality of devices accessing a network;
if the operating systems of the master device and the slave device are the same, but the manufacturers are different, when the master device needs to access the slave device, the slave device is controlled to start a security protection mechanism, so that the master device can access the non-public data of the slave device only when the slave device is safely authorized.
2. The method of claim 1, wherein controlling the slave device to initiate a security mechanism comprises:
storing the non-public data of the slave device in a secure storage area of the slave device.
3. The method of claim 2, further comprising:
allocating a security management area for the slave device in the master device;
and controlling the master device to independently access the non-public data of the slave device based on the safety management area.
4. The method of claim 3, further comprising:
if the number of the slave devices is multiple, and the operating systems of a first slave device and a master device in the multiple slave devices are the same and the manufacturers are the same, and the operating systems of a second slave device and the master device are the same but the manufacturers are different, when the first slave device needs to access the second slave device, the first slave device is controlled to obtain the non-public data of the second slave device through the master device; and/or the presence of a gas in the gas,
if the number of the slave devices is multiple, and the operating systems of the first slave device and the master device in the multiple slave devices are the same, and the manufacturers are the same, and the operating systems of the second slave device and the master device are the same, but the manufacturers are different, when the second slave device needs to access the first slave device, the second slave device is switched to the master device of the first slave device, and the non-public data of the first slave device is accessed.
5. The method according to claim 4, wherein when the first slave device needs to access the second slave device, controlling the first slave device to obtain the non-public data of the second slave device through the master device comprises:
and controlling the first slave equipment to send an access request to the master equipment so that the master equipment inquires non-public data of second slave equipment in a corresponding security management area according to the access request and feeds the non-public data back to the first slave equipment.
6. The method of claim 4, further comprising:
switching the second slave equipment to the master equipment of the first slave equipment, and switching the second slave equipment to the slave equipment with the same level as the first slave equipment after accessing the non-public data of the first slave equipment; and/or the presence of a gas in the gas,
and when the second slave equipment is switched to the master equipment, clearing the safety protection mechanism established by the first slave equipment and the safety management area established by the second slave equipment.
7. A device interaction system, comprising:
the device comprises a determining module, a judging module and a judging module, wherein the determining module is used for determining a main device and a slave device from a plurality of devices accessed to a network;
and the control module is used for controlling the slave equipment to open a safety protection mechanism when the master equipment needs to access the slave equipment if the operating systems of the master equipment and the slave equipment are the same but the manufacturers are different, so that the master equipment can access the non-public data of the slave equipment only when the slave equipment is subjected to safety authorization.
8. The system of claim 7, wherein the controlling the slave device to initiate a security mechanism comprises:
storing the non-public data of the slave device in a secure storage area of the slave device.
9. The system of claim 8, wherein the control module is further configured to:
allocating a security management area for the slave device in the master device;
and controlling the master device to independently access the non-public data of the slave device based on the safety management area.
10. The system of claim 9, wherein the control module is further configured to:
if the number of the slave devices is multiple, and the operating systems of a first slave device and a master device in the multiple slave devices are the same and the manufacturers are the same, and the operating systems of a second slave device and the master device are the same but the manufacturers are different, when the first slave device needs to access the second slave device, the first slave device is controlled to obtain the non-public data of the second slave device through the master device; and/or the presence of a gas in the gas,
if the number of the slave devices is multiple, and the operating systems of the first slave device and the master device in the multiple slave devices are the same, and the manufacturers are the same, and the operating systems of the second slave device and the master device are the same, but the manufacturers are different, when the second slave device needs to access the first slave device, the second slave device is switched to the master device of the first slave device, and the non-public data of the first slave device is accessed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111570511.3A CN114285625B (en) | 2021-12-21 | 2021-12-21 | Equipment interaction method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111570511.3A CN114285625B (en) | 2021-12-21 | 2021-12-21 | Equipment interaction method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114285625A true CN114285625A (en) | 2022-04-05 |
CN114285625B CN114285625B (en) | 2023-02-03 |
Family
ID=80873505
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111570511.3A Active CN114285625B (en) | 2021-12-21 | 2021-12-21 | Equipment interaction method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114285625B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103926890A (en) * | 2014-04-08 | 2014-07-16 | 小米科技有限责任公司 | Intelligent terminal control method and device |
CN104503688A (en) * | 2014-12-31 | 2015-04-08 | 小米科技有限责任公司 | Intelligent hardware device control achieving method and device |
CN105091495A (en) * | 2015-07-31 | 2015-11-25 | 青岛海尔股份有限公司 | Method for adjusting running modes of refrigerator at APP terminal |
CN108572628A (en) * | 2017-03-14 | 2018-09-25 | 欧姆龙株式会社 | The control method and non-volatile storage medium of slave device, slave device |
CN110196556A (en) * | 2019-03-13 | 2019-09-03 | 佛山市云米电器科技有限公司 | The method of full room scenery control based on intelligent refrigerator |
CN110827819A (en) * | 2019-11-26 | 2020-02-21 | 珠海格力电器股份有限公司 | Household equipment control method and control system |
-
2021
- 2021-12-21 CN CN202111570511.3A patent/CN114285625B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103926890A (en) * | 2014-04-08 | 2014-07-16 | 小米科技有限责任公司 | Intelligent terminal control method and device |
CN104503688A (en) * | 2014-12-31 | 2015-04-08 | 小米科技有限责任公司 | Intelligent hardware device control achieving method and device |
CN105091495A (en) * | 2015-07-31 | 2015-11-25 | 青岛海尔股份有限公司 | Method for adjusting running modes of refrigerator at APP terminal |
WO2017020658A1 (en) * | 2015-07-31 | 2017-02-09 | 青岛海尔股份有限公司 | Method for adjusting refrigerator operating mode from app side |
CN108572628A (en) * | 2017-03-14 | 2018-09-25 | 欧姆龙株式会社 | The control method and non-volatile storage medium of slave device, slave device |
CN110196556A (en) * | 2019-03-13 | 2019-09-03 | 佛山市云米电器科技有限公司 | The method of full room scenery control based on intelligent refrigerator |
CN110827819A (en) * | 2019-11-26 | 2020-02-21 | 珠海格力电器股份有限公司 | Household equipment control method and control system |
Non-Patent Citations (2)
Title |
---|
智能家居: "华为智慧生活怎么绑定格力", 《WWW.ZHIHEJIA.COM/ASK/13050.HTML》 * |
智能家居: "华为音响可以控制小米智能家居吗?", 《WWW.ZHIHEJIA.COM/ASK/11881.HTML》 * |
Also Published As
Publication number | Publication date |
---|---|
CN114285625B (en) | 2023-02-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103310149B (en) | The method, apparatus and terminal of system function call | |
EP3742785B1 (en) | Session management method and device | |
CN110096220B (en) | Distributed storage system, data processing method and storage node | |
KR20080027266A (en) | Efficient formation of ad hoc networks | |
EP2536249A1 (en) | A wireless access device and method | |
CN108683633A (en) | access control method and device | |
CN111371817A (en) | Equipment control system, method and device, electronic equipment and storage medium | |
CN105281957B (en) | A kind of method and server of the access device in Internet of Things | |
CN114039798A (en) | Data transmission method and device and electronic equipment | |
CN107567070B (en) | Household appliance networking method and device | |
CN114285625B (en) | Equipment interaction method and system | |
CN110399168A (en) | Majority according to disk storage server system start method, device and equipment | |
CN111511041B (en) | Remote connection method and device | |
CN113783768B (en) | Group control method, group control device and communication system | |
CN112367412B (en) | Equipment connection management method and device based on Internet of things | |
CN112073518B (en) | Cloud storage system, cloud storage system management method and central management node | |
CN112566286B (en) | Set top box AP mode realization method and device, set top box and storage medium | |
CN110110004B (en) | Data operation method, device and storage medium | |
CN105376835A (en) | Portable equipment and method for connecting mobile terminal with portable equipment | |
CN113258679A (en) | Power grid monitoring system channel distribution method based on server instance capacity reduction | |
CN100362793C (en) | Physic separated controlling circuit and computer system of physic separated network | |
CN103081402B (en) | The method and system of the configuration information that secure access stores in UPnP data model | |
US20050138320A1 (en) | Memory allocation unit | |
CN111866003A (en) | Risk assessment method and device for terminal | |
CN105760770A (en) | Information processing method and electronic device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |