CN114285625B - Equipment interaction method and system - Google Patents

Equipment interaction method and system Download PDF

Info

Publication number
CN114285625B
CN114285625B CN202111570511.3A CN202111570511A CN114285625B CN 114285625 B CN114285625 B CN 114285625B CN 202111570511 A CN202111570511 A CN 202111570511A CN 114285625 B CN114285625 B CN 114285625B
Authority
CN
China
Prior art keywords
slave
slave device
equipment
master
public data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111570511.3A
Other languages
Chinese (zh)
Other versions
CN114285625A (en
Inventor
赵越
唐政清
蒋雪
杨敏恒
康文斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN202111570511.3A priority Critical patent/CN114285625B/en
Publication of CN114285625A publication Critical patent/CN114285625A/en
Application granted granted Critical
Publication of CN114285625B publication Critical patent/CN114285625B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to a device interaction method and a system, wherein the method controls a slave device to start a safety protection mechanism when the master device needs to access the slave device through the same operating systems but different manufacturers of the master device and the slave device, so that the master device can access non-public data of the slave device only when the slave device is safely authorized, the safety of information interaction between devices is improved, the safety protection and safety management between devices of different manufacturers are increased, and the information leakage between the devices of different manufacturers is effectively prevented.

Description

Equipment interaction method and system
Technical Field
The invention relates to the technical field of communication, in particular to a device interaction method and system.
Background
The Hongmon system is a brand-new distributed operating system facing to the whole scene, a world with super virtual terminals interconnected is created, people, equipment and scenes are organically connected together, various intelligent terminals contacted by consumers in the whole scene life are realized to realize extremely rapid discovery, extremely rapid connection, hardware mutual assistance and resource sharing, the most appropriate equipment is used for providing the best scene experience, and the Hongmon OS is a distributed operating system facing to the whole scene based on micro-kernels.
At present, devices with the same operating system (for example, hong meng system) can be interconnected, but after the devices of hong meng systems of different manufacturers are interconnected, no matter data transmission or data acquisition is performed, the security of device information cannot be guaranteed.
Disclosure of Invention
In view of this, an object of the present invention is to provide a device interaction method and system, so as to solve the problems in the prior art that when devices having the same operating system are interconnected, security is poor and information is easily leaked.
According to a first aspect of embodiments of the present invention, there is provided an apparatus interaction method, including:
determining a master device and a slave device from a plurality of devices accessing a network;
if the operating systems of the master device and the slave device are the same, but the manufacturers are different, when the master device needs to access the slave device, the slave device is controlled to start a security protection mechanism, so that the master device can access the non-public data of the slave device only when the slave device is safely authorized.
Preferably, the controlling the slave device to open the safety protection mechanism comprises:
storing the non-public data of the slave device in a secure storage area of the slave device.
Preferably, the method further comprises:
allocating a security management area for the slave device in the master device;
and controlling the master device to independently access the non-public data of the slave device based on the safety management area.
Preferably, the method further comprises:
if the number of the slave devices is multiple, and the operating systems of a first slave device and a master device in the multiple slave devices are the same and the manufacturers are the same, and the operating systems of a second slave device and the master device are the same but the manufacturers are different, when the first slave device needs to access the second slave device, the first slave device is controlled to obtain the non-public data of the second slave device through the master device; and/or the presence of a gas in the gas,
if the number of the slave devices is multiple, and the operating systems of a first slave device and the master device in the multiple slave devices are the same, and the manufacturers of the slave devices are the same, and the operating systems of a second slave device and the master device are the same, but the manufacturers of the slave devices are different, when the second slave device needs to access the first slave device, the second slave device is switched to the master device of the first slave device, and the non-public data of the first slave device is accessed.
Preferably, when the first slave device needs to access the second slave device, controlling the first slave device to obtain the non-public data of the second slave device through the master device includes:
and controlling the first slave equipment to send an access request to the master equipment so that the master equipment inquires non-public data of second slave equipment in a corresponding security management area according to the access request and feeds the non-public data back to the first slave equipment.
Preferably, the method further comprises:
switching the second slave equipment to the master equipment of the first slave equipment, and switching the second slave equipment to the slave equipment with the same level as the first slave equipment after accessing the non-public data of the first slave equipment; and/or the presence of a gas in the gas,
and when the second slave equipment is switched to the master equipment, clearing the safety protection mechanism established by the first slave equipment and the safety management area established by the second slave equipment.
According to a second aspect of the embodiments of the present invention, there is provided an apparatus interaction system, including:
the device comprises a determining module, a judging module and a judging module, wherein the determining module is used for determining a main device and a slave device from a plurality of devices accessed to a network;
and the control module is used for controlling the slave equipment to open a safety protection mechanism when the master equipment needs to access the slave equipment if the operating systems of the master equipment and the slave equipment are the same but the manufacturers are different, so that the master equipment can access the non-public data of the slave equipment only when the slave equipment is subjected to safety authorization.
Preferably, the controlling the slave device to open the safety protection mechanism comprises:
storing the non-public data of the slave device in a secure storage area of the slave device.
Preferably, the control module is further configured to:
distributing a safety management area for the slave equipment in the master equipment;
and controlling the master device to independently access the non-public data of the slave device based on the safety management area.
Preferably, the control module is further configured to:
if the number of the slave devices is multiple, and the operating systems of a first slave device and a master device in the multiple slave devices are the same and the manufacturers are the same, and the operating systems of a second slave device and the master device are the same but the manufacturers are different, when the first slave device needs to access the second slave device, the first slave device is controlled to obtain the non-public data of the second slave device through the master device; and/or the presence of a gas in the gas,
if the number of the slave devices is multiple, and the operating systems of the first slave device and the master device in the multiple slave devices are the same, and the manufacturers are the same, and the operating systems of the second slave device and the master device are the same, but the manufacturers are different, when the second slave device needs to access the first slave device, the second slave device is switched to the master device of the first slave device, and the non-public data of the first slave device is accessed.
The technical scheme provided by the embodiment of the invention can have the following beneficial effects:
the operating systems of the main equipment and the slave equipment are the same, but the manufacturers are different, when the main equipment needs to access the slave equipment, the slave equipment is controlled to start a safety protection mechanism, so that the main equipment can access non-public data of the slave equipment only when the slave equipment is safely authorized, the safety of information interaction between the equipment is improved, the safety protection and safety management between the equipment of different manufacturers are increased, and the information leakage between the equipment of different manufacturers is effectively prevented.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
FIG. 1 is a flow chart illustrating a method of device interaction in accordance with an exemplary embodiment;
FIG. 2 is a flow chart illustrating a method of device interaction in accordance with another exemplary embodiment;
FIG. 3 is a flow chart illustrating a method of device interaction in accordance with another exemplary embodiment;
FIG. 4 is a flow chart illustrating a method of device interaction in accordance with another exemplary embodiment;
FIG. 5 is a schematic block diagram illustrating a device interaction system in accordance with an exemplary embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
Example one
FIG. 1 is a flow chart illustrating a method of device interaction, as shown in FIG. 1, in accordance with an exemplary embodiment, including:
step S11, determining a master device and a slave device from a plurality of devices accessing a network;
and S12, if the operating systems of the master device and the slave device are the same but the manufacturers are different, when the master device needs to access the slave device, controlling the slave device to start a safety protection mechanism so that the master device can access the non-public data of the slave device only when the slave device is subjected to safety authorization.
It should be noted that the operating system includes, but is not limited to: hongmeng system, android system, saiban system, iOS system, etc. The technical solution provided by this embodiment is only applicable to interaction between devices with the same operating system, for example, there is interworking interconnection between devices of a hongmeng system. In a specific practice, the technical solution provided in this embodiment can be loaded to a gateway, a mobile terminal, and/or a computer for operation.
The main equipment is equipment for sending an access request; the slave device selects the device to which the master device is ready to send an access request.
When the master equipment needs to access the slave equipment, the master equipment sends an access request to the slave equipment, wherein the access request carries an ID number and an IP address of the master equipment; based on the ID number, the slave equipment judges whether the ID number is the same as the manufacturer of the master equipment or not, and if the ID number is different from the manufacturer of the master equipment, the slave equipment starts a safety protection mechanism: storing the non-public data of the slave device in a secure storage area of the slave device.
Based on the IP address, the slave equipment judges whether the slave equipment and the master equipment are in the same local area network, if so, the slave equipment carries out safety authorization on the master equipment: and feeding back the address of the self safe storage area to the main equipment so that the main equipment accesses the non-public data of the slave equipment according to the address of the safe storage area.
In order to further improve the security of the system, a security management area can be allocated to the slave device in the master device; and controlling the master device to independently access the non-public data of the slave device based on the safety management area.
In a specific practice, the step S11 "determining the master device and the slave device from the multiple devices accessing the network" may be:
if the current equipment is determined to be the master equipment, determining the next-stage equipment of the current equipment to be the slave equipment;
the current equipment is any one of first-level equipment to N-level equipment, wherein N is more than or equal to 2.
For example, if hua mobile phone a with hongmeng system is connected to the network, and smart refrigerator B, smart air conditioner C and smart sound box D are also connected to the network, wherein smart refrigerator B, smart air conditioner C and smart sound box D are set as the next-level devices of hua mobile phone a by the user, hua mobile phone a is determined as the master device, and smart refrigerator B, smart air conditioner C and smart sound box D are determined as the slave devices.
For another example, if hua with hongmeng system is a mobile phone a accessing network, and the smart refrigerator B, the smart air conditioner C and the smart sound box D are also accessing network, wherein the smart sound box D is set as the next-level device of hua as the mobile phone a by the user, and the smart refrigerator B and the smart air conditioner C are set as the next-level device of the smart sound box D by the user, then hua as the mobile phone a is determined as the master device, the smart sound box D is determined as the first-level slave device, and the smart refrigerator B and the smart air conditioner C are determined as the second-level slave devices; or, the intelligent sound box D is determined as a master device, and the intelligent refrigerator B and the intelligent air conditioner C are determined as slave devices.
Referring to fig. 2, if the primary device is determined as the master device, the secondary device is determined as the slave device, the manufacturer of the primary master device is manufacturer 1, the manufacturer of the secondary slave device is manufacturer 2, and if the primary master device needs to monitor or control the secondary slave device, the secondary slave device will start the security mechanism: the secondary slave device stores the private or confidential information except the publicable information into a self safe storage area and cannot be read or written by the primary master device. If the primary master device needs to interact with the non-public data of the secondary slave device, the non-public data can be realized only after the security authorization of the secondary slave device. Meanwhile, the primary master device allocates an independent security management area for the secondary slave device, and based on the security management area, the non-public data acquired during interaction with the secondary slave device is independently managed.
The security management area is always used for storing non-public data of the secondary slave device, so that when the primary master device accesses the secondary slave device again, the security management area data does not need to be distributed to the secondary slave device again.
In specific practice, the method further comprises:
if the number of the slave devices is multiple, and the operating systems of a first slave device and a master device in the multiple slave devices are the same and the manufacturers are the same, and the operating systems of a second slave device and the master device are the same but the manufacturers are different, when the first slave device needs to access the second slave device, the first slave device is controlled to obtain the non-public data of the second slave device through the master device;
preferably, when the first slave device needs to access the second slave device, controlling the first slave device to obtain the non-public data of the second slave device through the master device includes:
and controlling the first slave equipment to send an access request to the master equipment so that the master equipment inquires non-public data of second slave equipment in a corresponding security management area according to the access request and feeds the non-public data back to the first slave equipment.
It can be understood that, since the first slave device is the same as the manufacturer of the master device, the first slave device and the master device can be interconnected at any time. If the manufacturers of the first slave device and the master device are different, the master device can actively access the first slave device due to the fact that the first slave device is lower in level than the master device, and the first slave device cannot actively access the master device.
Referring to fig. 3, if the primary device is determined as a master device, the secondary device is determined as a slave device, a manufacturer of the primary master device is manufacturer 1, a manufacturer of the secondary slave device i is manufacturer 1, and a manufacturer of the secondary slave device ii is manufacturer 2, if the secondary slave device i needs to interact with the secondary slave device ii, the interaction cannot be directly performed, and the interaction needs to be performed through the primary master device: the first secondary slave device needs to send an access request to the first primary master device, and the first primary master device inquires non-public data of the second secondary slave device in the security management area and feeds the non-public data back to the first secondary slave device.
In specific practice, the method further comprises:
if the number of the slave devices is multiple, and the operating systems of the first slave device and the master device in the multiple slave devices are the same, and the manufacturers are the same, and the operating systems of the second slave device and the master device are the same, but the manufacturers are different, when the second slave device needs to access the first slave device, the second slave device is switched to the master device of the first slave device, and the non-public data of the first slave device is accessed.
It will be appreciated that since the second slave device is of a different manufacturer than the master device, and is at a lower level than the master device, the master device may actively access the second slave device, but the second slave device may not actively access the master device. In this case, the second slave device cannot acquire the non-public data of the second slave device through the master device, and can access the non-public data of the first slave device only when the second slave device is switched to the master device of the first slave device.
In a specific practice, when the second slave device needs to access the first slave device, the level of the second slave device may be changed to a virtual level, and the second slave device is switched to the master device of the first slave device.
Preferably, the method further comprises:
switching the second slave equipment to the master equipment of the first slave equipment, and switching the second slave equipment to the slave equipment with the same level as the first slave equipment after accessing the non-public data of the first slave equipment; and/or the presence of a gas in the gas,
and when the second slave equipment is switched to the master equipment, clearing the safety protection mechanism established by the first slave equipment and the safety management area established by the second slave equipment.
Referring to fig. 4, if the primary device is determined as the master device, the secondary device is determined as the slave device, the manufacturer of the primary master device is manufacturer 1, the manufacturer of the first secondary slave device is manufacturer 1, and the manufacturer of the second secondary slave device is manufacturer 2, if the second secondary slave device needs to interact with the first secondary slave device, the second secondary slave device can be switched to the second secondary master device (master device mode), and the interaction can be performed on the first secondary slave device. In this case, the secondary slave device b can automatically switch to the original slave device mode and exist in the entire network after acquiring the non-public data of the secondary slave device b. And the safety protection mechanism established by the secondary slave equipment I and the safety management area established by the secondary slave equipment II are automatically cleared, and are reestablished when the next interaction is carried out.
It can be understood that, in the technical scheme provided by this embodiment, the operating systems of the master device and the slave device are the same, but the manufacturers are different, and when the master device needs to access the slave device, the slave device is controlled to start the security protection mechanism, so that the master device can access the non-public data of the slave device only when the slave device is authorized safely, thereby improving the security of information interaction between devices, increasing the security protection and security management between devices of different manufacturers, and effectively preventing information leakage between devices of different manufacturers.
Example two
FIG. 5 is a schematic block diagram illustrating a device interaction system 100 according to an exemplary embodiment, such as the system 100 shown in FIG. 5, including:
a determining module 101, configured to determine a master device and a slave device from multiple devices accessing a network;
and the control module 102 is configured to, if the operating systems of the master device and the slave device are the same but the manufacturers are different, control the slave device to open the security protection mechanism when the master device needs to access the slave device, so that the master device can only access the non-public data of the slave device when the slave device is securely authorized.
It should be noted that the operating system includes, but is not limited to: hongmeng system, android system, saiban system, iOS system, etc. The technical solution provided by this embodiment is only applicable to interaction between devices with the same operating system, for example, there is interworking interconnection between devices of a hongmeng system. In a specific practice, the technical solution provided in this embodiment can be loaded to a gateway, a mobile terminal, and/or a computer for operation.
The main equipment is equipment for sending an access request; the slave device is a device selected by the master device to which it is ready to send an access request.
When the master equipment needs to access the slave equipment, the master equipment sends an access request to the slave equipment, wherein the access request carries an ID number and an IP address of the master equipment; based on the ID number, the slave equipment judges whether the ID number is the same as the manufacturer of the master equipment or not, and if the ID number is different from the manufacturer of the master equipment, the slave equipment starts a safety protection mechanism: storing the non-public data of the slave device in a secure storage area of the slave device.
Based on the IP address, the slave device judges whether the slave device and the main device are in the same local area network, if so, the slave device carries out safety authorization on the main device: and feeding back the address of the self safe storage area to the main equipment, so that the main equipment accesses the non-public data of the slave equipment according to the address of the safe storage area.
In order to further improve the security of the system, a security management area can be allocated to the slave device in the master device; and controlling the master device to independently access the non-public data of the slave device based on the safety management area.
Preferably, the control module is further configured to:
if the number of the slave devices is multiple, and the operating systems of a first slave device and a master device in the multiple slave devices are the same and the manufacturers are the same, and the operating systems of a second slave device and the master device are the same but the manufacturers are different, when the first slave device needs to access the second slave device, the first slave device is controlled to obtain the non-public data of the second slave device through the master device; and/or the presence of a gas in the gas,
if the number of the slave devices is multiple, and the operating systems of the first slave device and the master device in the multiple slave devices are the same, and the manufacturers are the same, and the operating systems of the second slave device and the master device are the same, but the manufacturers are different, when the second slave device needs to access the first slave device, the second slave device is switched to the master device of the first slave device, and the non-public data of the first slave device is accessed.
Preferably, when the first slave device needs to access the second slave device, controlling the first slave device to obtain the non-public data of the second slave device through the master device includes:
and controlling the first slave equipment to send an access request to the master equipment so that the master equipment inquires non-public data of second slave equipment in a corresponding security management area according to the access request and feeds the non-public data back to the first slave equipment.
Preferably, the control module is further configured to:
switching the second slave equipment to the master equipment of the first slave equipment, and switching the second slave equipment to the slave equipment with the same level as the first slave equipment after accessing the non-public data of the first slave equipment; and/or the presence of a gas in the gas,
and when the second slave equipment is switched to the master equipment, clearing the safety protection mechanism established by the first slave equipment and the safety management area established by the second slave equipment.
It should be noted that, the implementation manner of each module in this embodiment may refer to the description of a related step in this embodiment, and this embodiment is not described again.
It can be understood that, in the technical solution provided in this embodiment, by controlling the slave device to start the security protection mechanism when the master device needs to access the slave device, the master device controls the slave device to access the non-public data of the slave device only when the slave device is authorized securely, so that the security of information interaction between devices is improved, the security protection and security management between devices of different manufacturers are increased, and information leakage between devices of different manufacturers is effectively prevented.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that the terms "first," "second," and the like in the description of the present invention are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. In addition, in the description of the present invention, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (8)

1. A device interaction method, comprising:
determining a master device and a slave device from a plurality of devices accessing a network;
if the operating systems of the master device and the slave device are the same, but the manufacturers are different, when the master device needs to access the slave device, the slave device is controlled to start a security protection mechanism, so that the master device can access the non-public data of the slave device only when the slave device is safely authorized;
if the number of the slave devices is multiple, and the operating systems of a first slave device and a master device in the multiple slave devices are the same and the manufacturers are the same, and the operating systems of a second slave device and the master device are the same but the manufacturers are different, when the first slave device needs to access the second slave device, the first slave device is controlled to obtain the non-public data of the second slave device through the master device; and/or the presence of a gas in the gas,
if the number of the slave devices is multiple, and the operating systems of a first slave device and the master device in the multiple slave devices are the same, and the manufacturers of the slave devices are the same, and the operating systems of a second slave device and the master device are the same, but the manufacturers of the slave devices are different, when the second slave device needs to access the first slave device, the second slave device is switched to the master device of the first slave device, and the non-public data of the first slave device is accessed.
2. The method of claim 1, wherein controlling the slave device to initiate a security mechanism comprises:
storing the non-public data of the slave device in a secure storage area of the slave device.
3. The method of claim 2, further comprising:
distributing a safety management area for the slave equipment in the master equipment;
and controlling the master device to independently access the non-public data of the slave device based on the safety management area.
4. The method according to claim 1, wherein when the first slave device needs to access the second slave device, controlling the first slave device to obtain the non-public data of the second slave device through the master device comprises:
and controlling the first slave equipment to send an access request to the master equipment so that the master equipment inquires non-public data of second slave equipment in a corresponding security management area according to the access request and feeds the non-public data back to the first slave equipment.
5. The method of claim 1, further comprising:
switching the second slave equipment to the master equipment of the first slave equipment, and switching the second slave equipment to the slave equipment with the same level as the first slave equipment after accessing the non-public data of the first slave equipment; and/or the presence of a gas in the gas,
and when the second slave equipment is switched to the master equipment, clearing the safety protection mechanism established by the first slave equipment and the safety management area established by the second slave equipment.
6. A device interaction system, comprising:
the device comprises a determining module, a judging module and a judging module, wherein the determining module is used for determining a main device and a slave device from a plurality of devices accessed to a network;
the control module is used for controlling the slave equipment to start a safety protection mechanism when the master equipment needs to access the slave equipment if the operating systems of the master equipment and the slave equipment are the same but the manufacturers are different, so that the master equipment can access the non-public data of the slave equipment only when the slave equipment is subjected to safety authorization;
the control module is further configured to:
if the number of the slave devices is multiple, and the operating systems of a first slave device and a master device in the multiple slave devices are the same and the manufacturers are the same, and the operating systems of a second slave device and the master device are the same but the manufacturers are different, when the first slave device needs to access the second slave device, the first slave device is controlled to obtain the non-public data of the second slave device through the master device; and/or the presence of a gas in the gas,
if the number of the slave devices is multiple, and the operating systems of the first slave device and the master device in the multiple slave devices are the same, and the manufacturers are the same, and the operating systems of the second slave device and the master device are the same, but the manufacturers are different, when the second slave device needs to access the first slave device, the second slave device is switched to the master device of the first slave device, and the non-public data of the first slave device is accessed.
7. The system of claim 6, wherein the controlling the slave device to initiate a security mechanism comprises:
storing the non-public data of the slave device in a secure storage area of the slave device.
8. The system of claim 7, wherein the control module is further configured to:
allocating a security management area for the slave device in the master device;
and controlling the master device to independently access the non-public data of the slave device based on the safety management area.
CN202111570511.3A 2021-12-21 2021-12-21 Equipment interaction method and system Active CN114285625B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111570511.3A CN114285625B (en) 2021-12-21 2021-12-21 Equipment interaction method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111570511.3A CN114285625B (en) 2021-12-21 2021-12-21 Equipment interaction method and system

Publications (2)

Publication Number Publication Date
CN114285625A CN114285625A (en) 2022-04-05
CN114285625B true CN114285625B (en) 2023-02-03

Family

ID=80873505

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111570511.3A Active CN114285625B (en) 2021-12-21 2021-12-21 Equipment interaction method and system

Country Status (1)

Country Link
CN (1) CN114285625B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105091495A (en) * 2015-07-31 2015-11-25 青岛海尔股份有限公司 Method for adjusting running modes of refrigerator at APP terminal
CN108572628A (en) * 2017-03-14 2018-09-25 欧姆龙株式会社 The control method and non-volatile storage medium of slave device, slave device
CN110196556A (en) * 2019-03-13 2019-09-03 佛山市云米电器科技有限公司 The method of full room scenery control based on intelligent refrigerator

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103926890B (en) * 2014-04-08 2018-02-16 小米科技有限责任公司 Intelligent terminal control method and device
CN104503688B (en) * 2014-12-31 2018-03-02 小米科技有限责任公司 The control method and device of intelligent hardware devices
CN110827819A (en) * 2019-11-26 2020-02-21 珠海格力电器股份有限公司 Household equipment control method and control system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105091495A (en) * 2015-07-31 2015-11-25 青岛海尔股份有限公司 Method for adjusting running modes of refrigerator at APP terminal
WO2017020658A1 (en) * 2015-07-31 2017-02-09 青岛海尔股份有限公司 Method for adjusting refrigerator operating mode from app side
CN108572628A (en) * 2017-03-14 2018-09-25 欧姆龙株式会社 The control method and non-volatile storage medium of slave device, slave device
CN110196556A (en) * 2019-03-13 2019-09-03 佛山市云米电器科技有限公司 The method of full room scenery control based on intelligent refrigerator

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
华为智慧生活怎么绑定格力;智能家居;《www.zhihejia.com/ask/13050.html》;20210520;第1-2页 *
华为音响可以控制小米智能家居吗?;智能家居;《www.zhihejia.com/ask/11881.html》;20210427;第1页 *

Also Published As

Publication number Publication date
CN114285625A (en) 2022-04-05

Similar Documents

Publication Publication Date Title
RU2640724C1 (en) Method of troubleshooting process, device and system based on virtualization of network functions
CN108370341B (en) Resource allocation method, virtual network function manager and network element management system
CN103310149B (en) The method, apparatus and terminal of system function call
EP3742785B1 (en) Session management method and device
CN109271258A (en) Implementation method, device, terminal and the storage medium that Read-Write Locks are reentried
CN110096220B (en) Distributed storage system, data processing method and storage node
CN108845877B (en) Method, device and system for managing memory
EP2536249A1 (en) A wireless access device and method
CN108683633A (en) access control method and device
KR102045662B1 (en) System and method for managing logical channels for accessing several virtual profiles within a secure element
CN103905514A (en) Server, terminal device and network data access right management method
CN112468539A (en) Method, device and equipment for calling K8S cluster user resources and readable medium
CN110795385B (en) Trusted core and computing core resource allocation method and device of system on chip
CN114285625B (en) Equipment interaction method and system
CN111511041B (en) Remote connection method and device
CN108833570B (en) Cluster storage and balanced transmission system based on cloud storage
CN114173396B (en) Method and device for determining terminal networking time, electronic equipment and storage medium
CN112367412B (en) Equipment connection management method and device based on Internet of things
CN111444062B (en) Method and device for managing master node and slave node of cloud database
CN114938394A (en) Cross-cluster network control method, device, equipment and storage medium
CN113258679A (en) Power grid monitoring system channel distribution method based on server instance capacity reduction
CN100362793C (en) Physic separated controlling circuit and computer system of physic separated network
CN103081402B (en) The method and system of the configuration information that secure access stores in UPnP data model
CN105760770A (en) Information processing method and electronic device
US20050138320A1 (en) Memory allocation unit

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant