CN114285625B - Equipment interaction method and system - Google Patents
Equipment interaction method and system Download PDFInfo
- Publication number
- CN114285625B CN114285625B CN202111570511.3A CN202111570511A CN114285625B CN 114285625 B CN114285625 B CN 114285625B CN 202111570511 A CN202111570511 A CN 202111570511A CN 114285625 B CN114285625 B CN 114285625B
- Authority
- CN
- China
- Prior art keywords
- slave
- slave device
- equipment
- master
- public data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Abstract
The invention relates to a device interaction method and a system, wherein the method controls a slave device to start a safety protection mechanism when the master device needs to access the slave device through the same operating systems but different manufacturers of the master device and the slave device, so that the master device can access non-public data of the slave device only when the slave device is safely authorized, the safety of information interaction between devices is improved, the safety protection and safety management between devices of different manufacturers are increased, and the information leakage between the devices of different manufacturers is effectively prevented.
Description
Technical Field
The invention relates to the technical field of communication, in particular to a device interaction method and system.
Background
The Hongmon system is a brand-new distributed operating system facing to the whole scene, a world with super virtual terminals interconnected is created, people, equipment and scenes are organically connected together, various intelligent terminals contacted by consumers in the whole scene life are realized to realize extremely rapid discovery, extremely rapid connection, hardware mutual assistance and resource sharing, the most appropriate equipment is used for providing the best scene experience, and the Hongmon OS is a distributed operating system facing to the whole scene based on micro-kernels.
At present, devices with the same operating system (for example, hong meng system) can be interconnected, but after the devices of hong meng systems of different manufacturers are interconnected, no matter data transmission or data acquisition is performed, the security of device information cannot be guaranteed.
Disclosure of Invention
In view of this, an object of the present invention is to provide a device interaction method and system, so as to solve the problems in the prior art that when devices having the same operating system are interconnected, security is poor and information is easily leaked.
According to a first aspect of embodiments of the present invention, there is provided an apparatus interaction method, including:
determining a master device and a slave device from a plurality of devices accessing a network;
if the operating systems of the master device and the slave device are the same, but the manufacturers are different, when the master device needs to access the slave device, the slave device is controlled to start a security protection mechanism, so that the master device can access the non-public data of the slave device only when the slave device is safely authorized.
Preferably, the controlling the slave device to open the safety protection mechanism comprises:
storing the non-public data of the slave device in a secure storage area of the slave device.
Preferably, the method further comprises:
allocating a security management area for the slave device in the master device;
and controlling the master device to independently access the non-public data of the slave device based on the safety management area.
Preferably, the method further comprises:
if the number of the slave devices is multiple, and the operating systems of a first slave device and a master device in the multiple slave devices are the same and the manufacturers are the same, and the operating systems of a second slave device and the master device are the same but the manufacturers are different, when the first slave device needs to access the second slave device, the first slave device is controlled to obtain the non-public data of the second slave device through the master device; and/or the presence of a gas in the gas,
if the number of the slave devices is multiple, and the operating systems of a first slave device and the master device in the multiple slave devices are the same, and the manufacturers of the slave devices are the same, and the operating systems of a second slave device and the master device are the same, but the manufacturers of the slave devices are different, when the second slave device needs to access the first slave device, the second slave device is switched to the master device of the first slave device, and the non-public data of the first slave device is accessed.
Preferably, when the first slave device needs to access the second slave device, controlling the first slave device to obtain the non-public data of the second slave device through the master device includes:
and controlling the first slave equipment to send an access request to the master equipment so that the master equipment inquires non-public data of second slave equipment in a corresponding security management area according to the access request and feeds the non-public data back to the first slave equipment.
Preferably, the method further comprises:
switching the second slave equipment to the master equipment of the first slave equipment, and switching the second slave equipment to the slave equipment with the same level as the first slave equipment after accessing the non-public data of the first slave equipment; and/or the presence of a gas in the gas,
and when the second slave equipment is switched to the master equipment, clearing the safety protection mechanism established by the first slave equipment and the safety management area established by the second slave equipment.
According to a second aspect of the embodiments of the present invention, there is provided an apparatus interaction system, including:
the device comprises a determining module, a judging module and a judging module, wherein the determining module is used for determining a main device and a slave device from a plurality of devices accessed to a network;
and the control module is used for controlling the slave equipment to open a safety protection mechanism when the master equipment needs to access the slave equipment if the operating systems of the master equipment and the slave equipment are the same but the manufacturers are different, so that the master equipment can access the non-public data of the slave equipment only when the slave equipment is subjected to safety authorization.
Preferably, the controlling the slave device to open the safety protection mechanism comprises:
storing the non-public data of the slave device in a secure storage area of the slave device.
Preferably, the control module is further configured to:
distributing a safety management area for the slave equipment in the master equipment;
and controlling the master device to independently access the non-public data of the slave device based on the safety management area.
Preferably, the control module is further configured to:
if the number of the slave devices is multiple, and the operating systems of a first slave device and a master device in the multiple slave devices are the same and the manufacturers are the same, and the operating systems of a second slave device and the master device are the same but the manufacturers are different, when the first slave device needs to access the second slave device, the first slave device is controlled to obtain the non-public data of the second slave device through the master device; and/or the presence of a gas in the gas,
if the number of the slave devices is multiple, and the operating systems of the first slave device and the master device in the multiple slave devices are the same, and the manufacturers are the same, and the operating systems of the second slave device and the master device are the same, but the manufacturers are different, when the second slave device needs to access the first slave device, the second slave device is switched to the master device of the first slave device, and the non-public data of the first slave device is accessed.
The technical scheme provided by the embodiment of the invention can have the following beneficial effects:
the operating systems of the main equipment and the slave equipment are the same, but the manufacturers are different, when the main equipment needs to access the slave equipment, the slave equipment is controlled to start a safety protection mechanism, so that the main equipment can access non-public data of the slave equipment only when the slave equipment is safely authorized, the safety of information interaction between the equipment is improved, the safety protection and safety management between the equipment of different manufacturers are increased, and the information leakage between the equipment of different manufacturers is effectively prevented.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
FIG. 1 is a flow chart illustrating a method of device interaction in accordance with an exemplary embodiment;
FIG. 2 is a flow chart illustrating a method of device interaction in accordance with another exemplary embodiment;
FIG. 3 is a flow chart illustrating a method of device interaction in accordance with another exemplary embodiment;
FIG. 4 is a flow chart illustrating a method of device interaction in accordance with another exemplary embodiment;
FIG. 5 is a schematic block diagram illustrating a device interaction system in accordance with an exemplary embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
Example one
FIG. 1 is a flow chart illustrating a method of device interaction, as shown in FIG. 1, in accordance with an exemplary embodiment, including:
step S11, determining a master device and a slave device from a plurality of devices accessing a network;
and S12, if the operating systems of the master device and the slave device are the same but the manufacturers are different, when the master device needs to access the slave device, controlling the slave device to start a safety protection mechanism so that the master device can access the non-public data of the slave device only when the slave device is subjected to safety authorization.
It should be noted that the operating system includes, but is not limited to: hongmeng system, android system, saiban system, iOS system, etc. The technical solution provided by this embodiment is only applicable to interaction between devices with the same operating system, for example, there is interworking interconnection between devices of a hongmeng system. In a specific practice, the technical solution provided in this embodiment can be loaded to a gateway, a mobile terminal, and/or a computer for operation.
The main equipment is equipment for sending an access request; the slave device selects the device to which the master device is ready to send an access request.
When the master equipment needs to access the slave equipment, the master equipment sends an access request to the slave equipment, wherein the access request carries an ID number and an IP address of the master equipment; based on the ID number, the slave equipment judges whether the ID number is the same as the manufacturer of the master equipment or not, and if the ID number is different from the manufacturer of the master equipment, the slave equipment starts a safety protection mechanism: storing the non-public data of the slave device in a secure storage area of the slave device.
Based on the IP address, the slave equipment judges whether the slave equipment and the master equipment are in the same local area network, if so, the slave equipment carries out safety authorization on the master equipment: and feeding back the address of the self safe storage area to the main equipment so that the main equipment accesses the non-public data of the slave equipment according to the address of the safe storage area.
In order to further improve the security of the system, a security management area can be allocated to the slave device in the master device; and controlling the master device to independently access the non-public data of the slave device based on the safety management area.
In a specific practice, the step S11 "determining the master device and the slave device from the multiple devices accessing the network" may be:
if the current equipment is determined to be the master equipment, determining the next-stage equipment of the current equipment to be the slave equipment;
the current equipment is any one of first-level equipment to N-level equipment, wherein N is more than or equal to 2.
For example, if hua mobile phone a with hongmeng system is connected to the network, and smart refrigerator B, smart air conditioner C and smart sound box D are also connected to the network, wherein smart refrigerator B, smart air conditioner C and smart sound box D are set as the next-level devices of hua mobile phone a by the user, hua mobile phone a is determined as the master device, and smart refrigerator B, smart air conditioner C and smart sound box D are determined as the slave devices.
For another example, if hua with hongmeng system is a mobile phone a accessing network, and the smart refrigerator B, the smart air conditioner C and the smart sound box D are also accessing network, wherein the smart sound box D is set as the next-level device of hua as the mobile phone a by the user, and the smart refrigerator B and the smart air conditioner C are set as the next-level device of the smart sound box D by the user, then hua as the mobile phone a is determined as the master device, the smart sound box D is determined as the first-level slave device, and the smart refrigerator B and the smart air conditioner C are determined as the second-level slave devices; or, the intelligent sound box D is determined as a master device, and the intelligent refrigerator B and the intelligent air conditioner C are determined as slave devices.
Referring to fig. 2, if the primary device is determined as the master device, the secondary device is determined as the slave device, the manufacturer of the primary master device is manufacturer 1, the manufacturer of the secondary slave device is manufacturer 2, and if the primary master device needs to monitor or control the secondary slave device, the secondary slave device will start the security mechanism: the secondary slave device stores the private or confidential information except the publicable information into a self safe storage area and cannot be read or written by the primary master device. If the primary master device needs to interact with the non-public data of the secondary slave device, the non-public data can be realized only after the security authorization of the secondary slave device. Meanwhile, the primary master device allocates an independent security management area for the secondary slave device, and based on the security management area, the non-public data acquired during interaction with the secondary slave device is independently managed.
The security management area is always used for storing non-public data of the secondary slave device, so that when the primary master device accesses the secondary slave device again, the security management area data does not need to be distributed to the secondary slave device again.
In specific practice, the method further comprises:
if the number of the slave devices is multiple, and the operating systems of a first slave device and a master device in the multiple slave devices are the same and the manufacturers are the same, and the operating systems of a second slave device and the master device are the same but the manufacturers are different, when the first slave device needs to access the second slave device, the first slave device is controlled to obtain the non-public data of the second slave device through the master device;
preferably, when the first slave device needs to access the second slave device, controlling the first slave device to obtain the non-public data of the second slave device through the master device includes:
and controlling the first slave equipment to send an access request to the master equipment so that the master equipment inquires non-public data of second slave equipment in a corresponding security management area according to the access request and feeds the non-public data back to the first slave equipment.
It can be understood that, since the first slave device is the same as the manufacturer of the master device, the first slave device and the master device can be interconnected at any time. If the manufacturers of the first slave device and the master device are different, the master device can actively access the first slave device due to the fact that the first slave device is lower in level than the master device, and the first slave device cannot actively access the master device.
Referring to fig. 3, if the primary device is determined as a master device, the secondary device is determined as a slave device, a manufacturer of the primary master device is manufacturer 1, a manufacturer of the secondary slave device i is manufacturer 1, and a manufacturer of the secondary slave device ii is manufacturer 2, if the secondary slave device i needs to interact with the secondary slave device ii, the interaction cannot be directly performed, and the interaction needs to be performed through the primary master device: the first secondary slave device needs to send an access request to the first primary master device, and the first primary master device inquires non-public data of the second secondary slave device in the security management area and feeds the non-public data back to the first secondary slave device.
In specific practice, the method further comprises:
if the number of the slave devices is multiple, and the operating systems of the first slave device and the master device in the multiple slave devices are the same, and the manufacturers are the same, and the operating systems of the second slave device and the master device are the same, but the manufacturers are different, when the second slave device needs to access the first slave device, the second slave device is switched to the master device of the first slave device, and the non-public data of the first slave device is accessed.
It will be appreciated that since the second slave device is of a different manufacturer than the master device, and is at a lower level than the master device, the master device may actively access the second slave device, but the second slave device may not actively access the master device. In this case, the second slave device cannot acquire the non-public data of the second slave device through the master device, and can access the non-public data of the first slave device only when the second slave device is switched to the master device of the first slave device.
In a specific practice, when the second slave device needs to access the first slave device, the level of the second slave device may be changed to a virtual level, and the second slave device is switched to the master device of the first slave device.
Preferably, the method further comprises:
switching the second slave equipment to the master equipment of the first slave equipment, and switching the second slave equipment to the slave equipment with the same level as the first slave equipment after accessing the non-public data of the first slave equipment; and/or the presence of a gas in the gas,
and when the second slave equipment is switched to the master equipment, clearing the safety protection mechanism established by the first slave equipment and the safety management area established by the second slave equipment.
Referring to fig. 4, if the primary device is determined as the master device, the secondary device is determined as the slave device, the manufacturer of the primary master device is manufacturer 1, the manufacturer of the first secondary slave device is manufacturer 1, and the manufacturer of the second secondary slave device is manufacturer 2, if the second secondary slave device needs to interact with the first secondary slave device, the second secondary slave device can be switched to the second secondary master device (master device mode), and the interaction can be performed on the first secondary slave device. In this case, the secondary slave device b can automatically switch to the original slave device mode and exist in the entire network after acquiring the non-public data of the secondary slave device b. And the safety protection mechanism established by the secondary slave equipment I and the safety management area established by the secondary slave equipment II are automatically cleared, and are reestablished when the next interaction is carried out.
It can be understood that, in the technical scheme provided by this embodiment, the operating systems of the master device and the slave device are the same, but the manufacturers are different, and when the master device needs to access the slave device, the slave device is controlled to start the security protection mechanism, so that the master device can access the non-public data of the slave device only when the slave device is authorized safely, thereby improving the security of information interaction between devices, increasing the security protection and security management between devices of different manufacturers, and effectively preventing information leakage between devices of different manufacturers.
Example two
FIG. 5 is a schematic block diagram illustrating a device interaction system 100 according to an exemplary embodiment, such as the system 100 shown in FIG. 5, including:
a determining module 101, configured to determine a master device and a slave device from multiple devices accessing a network;
and the control module 102 is configured to, if the operating systems of the master device and the slave device are the same but the manufacturers are different, control the slave device to open the security protection mechanism when the master device needs to access the slave device, so that the master device can only access the non-public data of the slave device when the slave device is securely authorized.
It should be noted that the operating system includes, but is not limited to: hongmeng system, android system, saiban system, iOS system, etc. The technical solution provided by this embodiment is only applicable to interaction between devices with the same operating system, for example, there is interworking interconnection between devices of a hongmeng system. In a specific practice, the technical solution provided in this embodiment can be loaded to a gateway, a mobile terminal, and/or a computer for operation.
The main equipment is equipment for sending an access request; the slave device is a device selected by the master device to which it is ready to send an access request.
When the master equipment needs to access the slave equipment, the master equipment sends an access request to the slave equipment, wherein the access request carries an ID number and an IP address of the master equipment; based on the ID number, the slave equipment judges whether the ID number is the same as the manufacturer of the master equipment or not, and if the ID number is different from the manufacturer of the master equipment, the slave equipment starts a safety protection mechanism: storing the non-public data of the slave device in a secure storage area of the slave device.
Based on the IP address, the slave device judges whether the slave device and the main device are in the same local area network, if so, the slave device carries out safety authorization on the main device: and feeding back the address of the self safe storage area to the main equipment, so that the main equipment accesses the non-public data of the slave equipment according to the address of the safe storage area.
In order to further improve the security of the system, a security management area can be allocated to the slave device in the master device; and controlling the master device to independently access the non-public data of the slave device based on the safety management area.
Preferably, the control module is further configured to:
if the number of the slave devices is multiple, and the operating systems of a first slave device and a master device in the multiple slave devices are the same and the manufacturers are the same, and the operating systems of a second slave device and the master device are the same but the manufacturers are different, when the first slave device needs to access the second slave device, the first slave device is controlled to obtain the non-public data of the second slave device through the master device; and/or the presence of a gas in the gas,
if the number of the slave devices is multiple, and the operating systems of the first slave device and the master device in the multiple slave devices are the same, and the manufacturers are the same, and the operating systems of the second slave device and the master device are the same, but the manufacturers are different, when the second slave device needs to access the first slave device, the second slave device is switched to the master device of the first slave device, and the non-public data of the first slave device is accessed.
Preferably, when the first slave device needs to access the second slave device, controlling the first slave device to obtain the non-public data of the second slave device through the master device includes:
and controlling the first slave equipment to send an access request to the master equipment so that the master equipment inquires non-public data of second slave equipment in a corresponding security management area according to the access request and feeds the non-public data back to the first slave equipment.
Preferably, the control module is further configured to:
switching the second slave equipment to the master equipment of the first slave equipment, and switching the second slave equipment to the slave equipment with the same level as the first slave equipment after accessing the non-public data of the first slave equipment; and/or the presence of a gas in the gas,
and when the second slave equipment is switched to the master equipment, clearing the safety protection mechanism established by the first slave equipment and the safety management area established by the second slave equipment.
It should be noted that, the implementation manner of each module in this embodiment may refer to the description of a related step in this embodiment, and this embodiment is not described again.
It can be understood that, in the technical solution provided in this embodiment, by controlling the slave device to start the security protection mechanism when the master device needs to access the slave device, the master device controls the slave device to access the non-public data of the slave device only when the slave device is authorized securely, so that the security of information interaction between devices is improved, the security protection and security management between devices of different manufacturers are increased, and information leakage between devices of different manufacturers is effectively prevented.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that the terms "first," "second," and the like in the description of the present invention are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. In addition, in the description of the present invention, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.
Claims (8)
1. A device interaction method, comprising:
determining a master device and a slave device from a plurality of devices accessing a network;
if the operating systems of the master device and the slave device are the same, but the manufacturers are different, when the master device needs to access the slave device, the slave device is controlled to start a security protection mechanism, so that the master device can access the non-public data of the slave device only when the slave device is safely authorized;
if the number of the slave devices is multiple, and the operating systems of a first slave device and a master device in the multiple slave devices are the same and the manufacturers are the same, and the operating systems of a second slave device and the master device are the same but the manufacturers are different, when the first slave device needs to access the second slave device, the first slave device is controlled to obtain the non-public data of the second slave device through the master device; and/or the presence of a gas in the gas,
if the number of the slave devices is multiple, and the operating systems of a first slave device and the master device in the multiple slave devices are the same, and the manufacturers of the slave devices are the same, and the operating systems of a second slave device and the master device are the same, but the manufacturers of the slave devices are different, when the second slave device needs to access the first slave device, the second slave device is switched to the master device of the first slave device, and the non-public data of the first slave device is accessed.
2. The method of claim 1, wherein controlling the slave device to initiate a security mechanism comprises:
storing the non-public data of the slave device in a secure storage area of the slave device.
3. The method of claim 2, further comprising:
distributing a safety management area for the slave equipment in the master equipment;
and controlling the master device to independently access the non-public data of the slave device based on the safety management area.
4. The method according to claim 1, wherein when the first slave device needs to access the second slave device, controlling the first slave device to obtain the non-public data of the second slave device through the master device comprises:
and controlling the first slave equipment to send an access request to the master equipment so that the master equipment inquires non-public data of second slave equipment in a corresponding security management area according to the access request and feeds the non-public data back to the first slave equipment.
5. The method of claim 1, further comprising:
switching the second slave equipment to the master equipment of the first slave equipment, and switching the second slave equipment to the slave equipment with the same level as the first slave equipment after accessing the non-public data of the first slave equipment; and/or the presence of a gas in the gas,
and when the second slave equipment is switched to the master equipment, clearing the safety protection mechanism established by the first slave equipment and the safety management area established by the second slave equipment.
6. A device interaction system, comprising:
the device comprises a determining module, a judging module and a judging module, wherein the determining module is used for determining a main device and a slave device from a plurality of devices accessed to a network;
the control module is used for controlling the slave equipment to start a safety protection mechanism when the master equipment needs to access the slave equipment if the operating systems of the master equipment and the slave equipment are the same but the manufacturers are different, so that the master equipment can access the non-public data of the slave equipment only when the slave equipment is subjected to safety authorization;
the control module is further configured to:
if the number of the slave devices is multiple, and the operating systems of a first slave device and a master device in the multiple slave devices are the same and the manufacturers are the same, and the operating systems of a second slave device and the master device are the same but the manufacturers are different, when the first slave device needs to access the second slave device, the first slave device is controlled to obtain the non-public data of the second slave device through the master device; and/or the presence of a gas in the gas,
if the number of the slave devices is multiple, and the operating systems of the first slave device and the master device in the multiple slave devices are the same, and the manufacturers are the same, and the operating systems of the second slave device and the master device are the same, but the manufacturers are different, when the second slave device needs to access the first slave device, the second slave device is switched to the master device of the first slave device, and the non-public data of the first slave device is accessed.
7. The system of claim 6, wherein the controlling the slave device to initiate a security mechanism comprises:
storing the non-public data of the slave device in a secure storage area of the slave device.
8. The system of claim 7, wherein the control module is further configured to:
allocating a security management area for the slave device in the master device;
and controlling the master device to independently access the non-public data of the slave device based on the safety management area.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111570511.3A CN114285625B (en) | 2021-12-21 | 2021-12-21 | Equipment interaction method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111570511.3A CN114285625B (en) | 2021-12-21 | 2021-12-21 | Equipment interaction method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114285625A CN114285625A (en) | 2022-04-05 |
CN114285625B true CN114285625B (en) | 2023-02-03 |
Family
ID=80873505
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111570511.3A Active CN114285625B (en) | 2021-12-21 | 2021-12-21 | Equipment interaction method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114285625B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105091495A (en) * | 2015-07-31 | 2015-11-25 | 青岛海尔股份有限公司 | Method for adjusting running modes of refrigerator at APP terminal |
CN108572628A (en) * | 2017-03-14 | 2018-09-25 | 欧姆龙株式会社 | The control method and non-volatile storage medium of slave device, slave device |
CN110196556A (en) * | 2019-03-13 | 2019-09-03 | 佛山市云米电器科技有限公司 | The method of full room scenery control based on intelligent refrigerator |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103926890B (en) * | 2014-04-08 | 2018-02-16 | 小米科技有限责任公司 | Intelligent terminal control method and device |
CN104503688B (en) * | 2014-12-31 | 2018-03-02 | 小米科技有限责任公司 | The control method and device of intelligent hardware devices |
CN110827819A (en) * | 2019-11-26 | 2020-02-21 | 珠海格力电器股份有限公司 | Household equipment control method and control system |
-
2021
- 2021-12-21 CN CN202111570511.3A patent/CN114285625B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105091495A (en) * | 2015-07-31 | 2015-11-25 | 青岛海尔股份有限公司 | Method for adjusting running modes of refrigerator at APP terminal |
WO2017020658A1 (en) * | 2015-07-31 | 2017-02-09 | 青岛海尔股份有限公司 | Method for adjusting refrigerator operating mode from app side |
CN108572628A (en) * | 2017-03-14 | 2018-09-25 | 欧姆龙株式会社 | The control method and non-volatile storage medium of slave device, slave device |
CN110196556A (en) * | 2019-03-13 | 2019-09-03 | 佛山市云米电器科技有限公司 | The method of full room scenery control based on intelligent refrigerator |
Non-Patent Citations (2)
Title |
---|
华为智慧生活怎么绑定格力;智能家居;《www.zhihejia.com/ask/13050.html》;20210520;第1-2页 * |
华为音响可以控制小米智能家居吗?;智能家居;《www.zhihejia.com/ask/11881.html》;20210427;第1页 * |
Also Published As
Publication number | Publication date |
---|---|
CN114285625A (en) | 2022-04-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
RU2640724C1 (en) | Method of troubleshooting process, device and system based on virtualization of network functions | |
CN108370341B (en) | Resource allocation method, virtual network function manager and network element management system | |
CN103310149B (en) | The method, apparatus and terminal of system function call | |
EP3742785B1 (en) | Session management method and device | |
CN109271258A (en) | Implementation method, device, terminal and the storage medium that Read-Write Locks are reentried | |
CN110096220B (en) | Distributed storage system, data processing method and storage node | |
CN108845877B (en) | Method, device and system for managing memory | |
EP2536249A1 (en) | A wireless access device and method | |
CN108683633A (en) | access control method and device | |
KR102045662B1 (en) | System and method for managing logical channels for accessing several virtual profiles within a secure element | |
CN103905514A (en) | Server, terminal device and network data access right management method | |
CN112468539A (en) | Method, device and equipment for calling K8S cluster user resources and readable medium | |
CN110795385B (en) | Trusted core and computing core resource allocation method and device of system on chip | |
CN114285625B (en) | Equipment interaction method and system | |
CN111511041B (en) | Remote connection method and device | |
CN108833570B (en) | Cluster storage and balanced transmission system based on cloud storage | |
CN114173396B (en) | Method and device for determining terminal networking time, electronic equipment and storage medium | |
CN112367412B (en) | Equipment connection management method and device based on Internet of things | |
CN111444062B (en) | Method and device for managing master node and slave node of cloud database | |
CN114938394A (en) | Cross-cluster network control method, device, equipment and storage medium | |
CN113258679A (en) | Power grid monitoring system channel distribution method based on server instance capacity reduction | |
CN100362793C (en) | Physic separated controlling circuit and computer system of physic separated network | |
CN103081402B (en) | The method and system of the configuration information that secure access stores in UPnP data model | |
CN105760770A (en) | Information processing method and electronic device | |
US20050138320A1 (en) | Memory allocation unit |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |