CN116028916A - Equipment control method and related equipment - Google Patents
Equipment control method and related equipment Download PDFInfo
- Publication number
- CN116028916A CN116028916A CN202111246648.3A CN202111246648A CN116028916A CN 116028916 A CN116028916 A CN 116028916A CN 202111246648 A CN202111246648 A CN 202111246648A CN 116028916 A CN116028916 A CN 116028916A
- Authority
- CN
- China
- Prior art keywords
- electronic device
- server
- authentication information
- electronic equipment
- electronic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Telephonic Communication Services (AREA)
Abstract
A device control method and related device. The method comprises the steps that a server provides authentication information for first electronic equipment, wherein the authentication information is generated based on a first account; the second electronic device obtains the authentication information from the first electronic device; the second electronic equipment authenticates the authentication information, and when the authentication is passed, the following steps are executed: switching from the inactive state to the active state; and/or inquiring the connection address of the third electronic device related to the first account number from the server, and establishing connection with the third electronic device based on the inquired connection address of the third electronic device. By the mode, the equipment can be quickly in a working state and/or connected with other equipment, and the operation is convenient.
Description
Technical Field
The present disclosure relates to the field of terminal technologies, and in particular, to a device control method and a related device.
Background
With the progress of terminal technology, the scene of multi-device interconnection is more and more. For example, in a smart home scenario, multiple home appliances in a home may be interconnected and interconnected, e.g., a tv set is connected to a mobile phone, and a mobile phone is connected to a smart refrigerator.
In general, if a user wants to connect a plurality of devices, a plurality of steps need to be performed. Taking three devices, i.e. a device 1, a device 2 and a device 3, as an example, assuming that all the three devices are mobile phones and are in a screen locking state, a user needs to unlock the three devices respectively, then perform an operation on the device 1 to connect with the device 2 and the device 3, and further perform an operation on the device 2 to connect with the device 3. In the current multi-device interconnection scene, the user operation is complicated and the experience is poor.
Disclosure of Invention
The application provides a device control method and related devices, which are used for improving convenience of user operation in a multi-device interconnection scene.
In a first aspect, a device control method is provided, which is applied to a system including a first electronic device, a second electronic device, and a server. The server provides authentication information to the first electronic device, wherein the authentication information is generated based on a first account number; the authentication information is acquired from the first electronic equipment; the second electronic equipment authenticates the authentication information, and when the authentication is passed, the following steps are executed:
Switching from the inactive state to the active state; and/or the number of the groups of groups,
inquiring a connection address of a third electronic device from the server, and establishing connection with the third electronic device based on the inquired connection address of the third electronic device, wherein the third electronic device is related to the first account.
That is, in the embodiment of the present application, the second electronic device may acquire the authentication information from the first electronic device and perform authentication, and may automatically enter the working state and/or automatically connect with the third electronic device when the authentication is passed. Therefore, the second electronic equipment is not required to be unlocked manually by a user, a series of operations are performed on the second electronic equipment to realize connection with the third electronic equipment, the operation is convenient, and the user experience is better.
In one possible design, the authentication information is generated by the server encrypting the first account based on a first key, and the second electronic device authenticates the authentication information, including: the second electronic equipment acquires a second key corresponding to the first key from the server; and the second electronic equipment decrypts the authentication information by using the second key, if the decryption is successful, the authentication is passed, and if the decryption is failed, the authentication is not passed. That is, only devices having a second key capable of decrypting the authentication information can automatically enter an operational state and/or automatically connect with other devices (devices associated with the first account number). In this way, the security is higher, and the situation that the device without the second secret key is automatically connected with other devices to cause the leakage of the privacy of the user is avoided.
In one possible design, the authentication information is generated by the server encrypting the first account based on a first key, and the second electronic device authenticates the authentication information, including: the second electronic equipment acquires a second key corresponding to the first key from the server; the second electronic equipment decrypts the authentication information by using the second key to obtain the first account; and when the second electronic equipment determines that the first account is related to the first electronic equipment, the authentication is passed, otherwise, the authentication is not passed. That is, one device can automatically enter an operational state and/or automatically connect with another device (the device associated with the first account) only if the authentication information is successfully decrypted and associated with the first account. By the method, the security is high, and the situation that the equipment which is independent of the first account number and steals the second key is automatically connected with other equipment to cause leakage of user privacy can be avoided.
In one possible design, the first account number is associated with the second electronic device, including at least one of: the current login account of the second electronic equipment is the first account; and the activation account number of the second electronic equipment is the first account number.
In one possible design, before the server provides authentication information to the first electronic device, the method further includes: the server receives application information of fourth electronic equipment, wherein the application information is used for applying authentication information corresponding to the first account; the fourth electronic device and the second electronic device are the same device, or the fourth electronic device and the third electronic device are the same device; or, the fourth electronic device is a device related to the first account number and different from both the second electronic device and the third electronic device.
For example, the server provides authentication information to the first electronic device as a tag authentication service, which needs to be performed in the case of a user application. For example, the user applies for the service using the fourth electronic device, and the server provides authentication information to the first electronic device. This way, the operation is performed under the condition that the user has a demand, and the workload can be saved while the user demand is satisfied.
In one possible design, the method further comprises: the fourth electronic equipment responds to a first operation and displays a first interface, wherein the first interface comprises the first account number and an application key; and when the fourth electronic equipment detects the second operation aiming at the application key, sending the application information to the server.
For example, taking the fourth electronic device as a mobile phone as an example, the user can apply for the tag authentication service on the mobile phone, and the operation is convenient. When the user applies for the service, the server provides authentication information for the first electronic device, and devices (such as a television, a mobile phone, a sound box and the like) in the user's home can automatically enter a working state and/or automatically realize multi-device interconnection through the first electronic device.
In one possible design, when the fourth electronic device detects the second operation for the application key, the sending the application information to the server includes: when the fourth electronic equipment detects a second operation aiming at the application key, a second interface is displayed, wherein the second interface comprises prompt information of the expense to be paid; and when the fourth electronic equipment detects that the fee payment is completed, the application information is sent to the server. That is, the tag authentication service is a payment service, after the user pays the fee, the server provides authentication information to the first electronic device, and the devices (such as a television, a mobile phone, a sound box, etc.) in the user's home can automatically enter the working state and/or automatically implement multi-device interconnection through the first electronic device.
In one possible design, the second electronic device querying the server for a connection address of a third electronic device, including: the second electronic equipment sends indication information to the server, wherein the indication information is used for indicating the second electronic equipment to pass the authentication of the authentication information; and the server performs identity verification on the second electronic equipment, and after verification is passed, the server sends the connection address of the third electronic equipment to the second electronic equipment.
It should be noted that some devices may steal the second key in the second electronic device, decrypt the authentication information using the second key, and then send the indication information to the server. If the server sends the connection address of the third electronic device to the device that steals the second key, privacy of the third electronic device is easily compromised. Therefore, after receiving the indication information reported by one device, the server does not actively send the connection address of the other device to the device, but verifies the identity of the device reporting the indication information, and if the verification passes, the connection address of the other device is sent to the device to ensure that the privacy of the device is not revealed.
In one possible design, the server performs authentication on the second electronic device, including: the server judges whether the second electronic equipment is related to the first account or not; and when the second electronic equipment is determined to be related to the first account, the verification is passed, otherwise, the verification is not passed.
For example, after receiving the indication information reported by one device, the server does not actively send the connection address of the other device to the device, but verifies whether the device reporting the indication information is related to the first account, such as whether the current login account of the device is the first account and/or whether the activation account is the first account, etc., if so, the server sends the connection address of the other device to the device to ensure that the privacy of the device is not revealed.
In one possible design, the first electronic device is an electronic tag; the second electronic equipment is provided with a reader; the reader is used for reading the authentication information in the electronic tag.
It should be noted that the first electronic device may also be other types of devices, such as a WIFI device, a bluetooth device, etc., so that the second electronic device may obtain the authentication information in the first electronic device through the WIFI module or the bluetooth module.
In one possible design, the non-operating state includes a screen locking state, the operating state includes an unlocking state, or the non-operating state includes a sleep state, and the operating state includes an awake state.
Taking a mobile phone as an example, the non-working state is a screen locking state, the working state is an unlocking state, the loudspeaker box as an example, the non-working state is a dormant state, and the working state is a wake-up state.
In a second aspect, there is also provided an apparatus control method applied to a second electronic apparatus, including: the second electronic equipment acquires authentication information from the first electronic equipment; the authentication information is generated by the server based on the first account; the second electronic equipment authenticates the authentication information, and when the authentication is passed, the following steps are executed:
switching from the inactive state to the active state; and/or the number of the groups of groups,
inquiring a connection address of a third electronic device from the server, and establishing connection with the third electronic device based on the inquired connection address of the third electronic device, wherein the third electronic device is related to the first account.
In one possible design, the authentication information is generated by the server encrypting the first account based on a first key, and the second electronic device authenticates the authentication information, including:
The second electronic equipment acquires a second key corresponding to the first key from the server;
decrypting the authentication information with the second key; if the decryption is successful, the authentication is passed, and if the decryption is failed, the authentication is not passed.
In one possible design, the authentication information is generated by the server encrypting the first account based on a first key, and the second electronic device authenticates the authentication information, including:
the second electronic equipment acquires a second key corresponding to the first key from the server;
the second electronic equipment decrypts the authentication information by using the second key to obtain the first account;
and when the second electronic equipment determines that the first account is related to the first electronic equipment, the authentication is passed, otherwise, the authentication is not passed.
In one possible design, the first account number is associated with the second electronic device, including at least one of: the current login account of the second electronic equipment is the first account; and the activation account number of the second electronic equipment is the first account number.
In one possible design, the first electronic device is an electronic tag; the second electronic equipment is provided with a reader; the reader is used for reading the authentication information in the electronic tag.
In one possible design, the non-operating state includes a screen locking state, the operating state includes an unlocking state, or the non-operating state includes a sleep state, and the operating state includes an awake state.
In a third aspect, there is also provided an apparatus control method, applied to a server, including: the server generates authentication information based on the first account; the server provides the authentication information to the first electronic equipment, wherein the authentication information is used for authentication of other electronic equipment; and after the server determines that the authentication information is authenticated by the second electronic equipment, the server sends a connection address of a third electronic equipment to the second electronic equipment, wherein the third electronic equipment is related to the first account.
In one possible design, the authentication information is generated by encrypting the first account based on a first key, and the method further includes: the server sends a second key corresponding to the first key to the second electronic device, wherein the second key is used for authenticating the authentication information.
In one possible design, before the server provides the authentication information to the first electronic device, the method further includes: the server receives application information of fourth electronic equipment, wherein the application information is used for applying authentication information corresponding to the first account; the fourth electronic device and the second electronic device are the same device, or the fourth electronic device and the third electronic device are the same device; or, the fourth electronic device is a device related to the first account number and different from both the second electronic device and the third electronic device.
In one possible design, after the server determines that the second electronic device authenticates the authentication information, sending a connection address of the third electronic device to the second electronic device includes: the server receives indication information sent by the second electronic equipment, wherein the indication information is used for indicating the second electronic equipment to pass the authentication of the authentication information; and the server performs identity verification on the second electronic equipment, and after verification is passed, the server sends the connection address of the third electronic equipment to the second electronic equipment.
In one possible design, the server performs authentication on the second electronic device, including: the server judges whether the second electronic equipment is related to the first account or not; and when the second electronic equipment is determined to be related to the first account, the verification is passed, otherwise, the verification is not passed.
In one possible design, the first electronic device is an electronic tag; the second electronic equipment is provided with a reader; the reader is used for reading the authentication information in the electronic tag.
In a fourth aspect, there is also provided a communication system comprising: the first electronic device and the second electronic device and the server;
The first electronic equipment stores authentication information; the authentication information is used for authentication of other electronic equipment;
the second electronic device includes: a processor; a memory; wherein the memory stores one or more computer programs, the one or more computer programs comprising instructions that, when executed by the processor, cause the second electronic device to perform the method steps of the second aspect described above;
the server includes: a processor; a memory; wherein the memory stores one or more computer programs, the one or more computer programs comprising instructions that, when executed by the processor, cause the second electronic device to perform the method steps as described in the third aspect above.
In a fifth aspect, there is also provided an electronic device, including:
a processor, a memory, and one or more programs;
wherein the one or more programs are stored in the memory, the one or more programs comprising instructions, which when executed by the processor, cause the electronic device to perform the method steps of any of the second aspect above.
In a sixth aspect, there is also provided a computer readable storage medium for storing a computer program which, when run on a computer, causes the computer to perform the method as set forth in any one of the first, second or third aspects above.
In a seventh aspect, there is also provided a computer program product comprising a computer program which, when run on a computer, causes the computer to perform the method of the first, second or third aspects described above.
In an eighth aspect, an embodiment of the present application further provides a chip, where the chip is coupled to a memory in an electronic device, and is configured to invoke a computer program stored in the memory and execute the technical solutions of the first aspect, the second aspect, or the third aspect of the embodiment of the present application, where "coupled" in the embodiment of the present application means that two components are directly or indirectly combined with each other.
The advantages of the second to eighth aspects are described above, with reference to the advantages of the first aspect, and the description is not repeated.
Drawings
Fig. 1 is a schematic diagram of a communication system according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a device connection according to an embodiment of the present application;
FIG. 3 is a schematic diagram of another communication system according to an embodiment of the present application;
fig. 4 is a schematic hardware structure of an electronic device according to an embodiment of the present application;
fig. 5 is a schematic flow chart of a device control method according to an embodiment of the present application;
fig. 6A to fig. 6B are schematic diagrams illustrating an application tag authentication service according to an embodiment of the present application;
fig. 7 is another schematic diagram of an application tag authentication service according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The equipment control method provided by the embodiment of the application is suitable for a communication system.
Exemplary, as shown in fig. 1, a schematic diagram of a communication system is provided in an embodiment of the present application. The communication system comprises a server and N electronic devices (called distributed devices), wherein N is an integer greater than or equal to 2. The server may be a computing device with greater processing power, greater storage capacity, such as may be various types of servers, such as cloud servers. The electronic device may be a portable electronic device, such as a mobile phone, a tablet computer, a portable computer, a wearable device (such as a smart watch, smart glasses, smart bracelet, or smart helmet) with wireless communication function, etc.; alternatively, the system may be an in-vehicle apparatus; or, the system can also be a desktop computer, an integrated machine and other devices; or, the electronic equipment can also be intelligent household equipment such as a television, a sound box and the like, and the type of the electronic equipment is not limited in the application. In the communication system shown in fig. 1, n=4 is taken as an example, namely, four electronic devices, which are taken as examples of a television, a sound box, a mobile phone and a tablet computer respectively.
The N electronic devices may log into the server side using account numbers, respectively. The account may be a system account number such as a cell phone number, mailbox, etc. For example, the N electronic devices are all bloom devices, the server is a bloom server, for example, bloom cloud, and then the N electronic devices may log in to the bloom cloud side by using the bloom account numbers respectively. The login account numbers of the N electronic devices may be the same or different.
In some embodiments, the N electronic devices may be referred to as distributed devices. For example, home distributed home appliances such as mobile phones, speakers, televisions, etc.; or distributed office equipment in an office scene such as printers, fax machines, projectors, etc. The distributed devices may be located in the same communication network, e.g., in the same Wi-Fi network; alternatively, the same account number (e.g., hua as an account number) is logged in, or belongs to the same group (e.g., a family account number), and so forth.
A connection may be established between the distributed devices. It should be noted that, the connection established by the distributed devices may be referred to as multi-device interconnection, and of course, other names may also be available, for example, a super terminal group, multi-device communication, multi-device collaboration, etc., so long as the connection is meant to be between a plurality of devices, and the present application is not limited to this name.
The process by which the distributed devices establish a connection is described below.
For example, assume that four electronic devices in fig. 1 log on to a server through the same account, and report respective device identifiers and connection addresses to the server. The account may be referred to as a first account number, such as may be a system account number, e.g., jack. The server may store a device list corresponding to the first account. The device list includes a device identifier and a connection address of a device corresponding to the first account. Illustratively, the list of devices is as follows in Table 1:
table 1: device list corresponding to first account
By way of example, the device identification may be a device model number, a device type (cell phone or tablet, etc.), a serial number, and so forth. The connection address may include an internet protocol (Internet Protocol, IP) address, a media access control (Media Access Control, MAC) address, etc., as not limited in this application.
Taking the mobile phone in fig. 1 as an example, when the user wants to connect the mobile phone with another device (other devices than the mobile phone in the four electronic devices), the connection process may include: 1. unlocking the mobile phone. 2. And performing interactive operation on the mobile phone to realize connection with other devices. It will be appreciated that step 1 is an optional step. If the mobile phone is currently in the screen locking state, the step 1 needs to be executed. If the mobile phone is currently in the unlocking state, the step 1 is not required to be executed. Wherein, lock screen state includes: a screen locking and blacking state or a screen locking and lightening state. The step 1 is performed in a plurality of ways for unlocking the mobile phone, including password unlocking, fingerprint unlocking, face unlocking, voiceprint unlocking, gesture unlocking and the like. Illustratively, as in (a) of fig. 2, the mobile phone is in a lock state (lock and black state). When the mobile phone receives an unlocking operation (e.g., a fingerprint unlocking operation, a password unlocking operation, etc.), a main interface 201 as shown in fig. 2 (b) is displayed. Icons of various applications are included in the main interface 201.
After the mobile phone is in the unlocking state, step 2 can be executed. Illustratively, with continued reference to FIG. 2 (b), the handset displays a main interface 201. When the mobile phone detects a preset operation (e.g., an operation to slide down from above the screen of the main interface 201), a control center interface 202 as shown in (c) of fig. 2 is displayed. The control center interface 202 includes therein a super terminal function card 203. It should be noted that, the name of "super terminal" is merely an example, and may be replaced by other names, such as "multi-device interconnection", "multi-device collaboration", etc., which are not limited in this embodiment of the present application. The super terminal function card 203 displays the identifiers of surrounding devices searched by the mobile phone. For example, in fig. 1, a television, a Sound box, and a tablet pc are present around the mobile phone, and then a television (Vision) identifier, a Sound box (Sound X) identifier, and a tablet pc (MatePad) identifier are displayed in the super terminal function card 203. When an operation (such as a click operation) for the super terminal function card 203 is detected, an interface 204 as shown in (d) in fig. 2 is displayed. The interface 204 includes: television identification 206, tablet identification 208, cell phone identification 207, and speaker identification 209. Illustratively, the mobile phone identifier 207 is located in the middle, and other marks are located around the mobile phone identifier 207 for characterizing devices around the mobile phone, such as televisions, tablet computers, and speakers. For example, other logos are displayed on the edge of the circular icon 210 and the cell phone logo 207 is displayed at the center position of the circular icon 211. Wherein the radius R1 of the circular icon 211 is smaller than the radius R2 of the circular icon 210.
As in fig. 2 (e), when the handset detects an operation for the television identification 206 (e.g., dragging the television identification 206 into the circular icon 211), a connection is established between the handset and the television. The mobile phone and the television can be connected through a server. For example, the mobile phone sends a connection request to the server, where the connection request carries a television identifier. Since the server stores the device list as in table 1, the server can look up table 1 to determine the connection address of the tv set, and then send the connection address of the tv set to the mobile phone. The mobile phone is connected with the television based on the connection address of the television. When the mobile phone is successfully connected to the television, the television identifier 206 and the mobile phone identifier 207 are displayed next to each other (e.g., adsorbed on the edge of the mobile phone identifier 207), which represents that the mobile phone is successfully connected to the television. It will be appreciated that if the user also wants to connect the tablet to the phone, the tablet identifier 208 is dragged to be attached to the edge of the phone identifier 207.
As can be seen from the above description, in the communication system shown in fig. 1, if a user wants to connect a mobile phone with other devices (other devices except the mobile phone from the four electronic devices), the operation flow includes: after unlocking the mobile phone (if the mobile phone is in a screen locking state), opening an interface 204 shown in fig. 2 (d) through a series of operations, and dragging an identifier corresponding to a target device (such as a television, a tablet, and a sound box) in the interface 204 to the mobile phone identifier to realize connection between the mobile phone and the target device. If the user wants to connect the mobile phone with a plurality of target devices, the identifiers corresponding to the target devices are dragged to the mobile phone identifiers one by one. Therefore, in the connection process of the mobile phone and other equipment, the user operation is complicated. Moreover, it should be noted that, in the above embodiment, the connection between the mobile phone and other devices in fig. 1 is taken as an example, and the operation flow is similar for the connection between other devices. Therefore, the interconnection and intercommunication of four electronic devices are realized, and the user operation is very complicated. If the number of the electronic devices is more, the operation is more complicated.
Fig. 3 is a schematic diagram of another communication system according to an embodiment of the present application. The communication system comprises a server, four electronic devices and a control device. The four electronic devices take a television, a sound box, a mobile phone and a tablet personal computer as examples respectively. The communication system shown in fig. 3 differs from the communication system shown in fig. 1 in that: the communication system shown in fig. 3 includes a control device in addition to the device shown in fig. 1. The control device may be used to control four electronic devices.
In some embodiments, assuming that the four electronic devices are all in the first state, the control device may control each of the four electronic devices to enter the second state. The first state may be a non-operating state, and the second state may be an operating state. Illustratively, the first state includes a screen locked state, a screen saver state, an unassisted state (otherwise referred to as an inactive state), and so forth. If the first state is a screen locking state, the corresponding second state is an unlocking state. If the first state is a screen saver state, the second state is an operating state. If the first state is an unassisted state (or referred to as an inactive state), the corresponding second state is an awake state (or referred to as an active state).
For example, taking a mobile phone as an example, when the user does not operate the mobile phone for a long time, the mobile phone can automatically lock the screen. If the user wants to continue operating the mobile phone, the mobile phone can be unlocked first. Thus, for a mobile phone, the first state may be a locked state, including a locked and black state and a locked and bright state, and the second state is an unlocked state. For another example, taking a notebook computer as an example, when the user does not operate the notebook computer for a long time, the notebook computer can automatically enter a screen saver state. When the notebook computer detects an operation (e.g., any operation on the keyboard), the screen saver state is canceled to enter the working state. Thus, for a notebook computer, the first state may be a screen saver state and the second state may be an operational state. For another example, taking a sound box as an example, when the user does not use the sound box for a long time, the sound box is in a dormant state. When the user wants to use the sound box, the sound box can be awakened by a voice instruction (such as love of a little love). Thus, for a loudspeaker, the first state may be a non-awake state and the second state may be an awake state.
One implementation manner is that the four electronic devices in fig. 3 log on the same account, i.e. the first account. The control device stores authentication information, which may be obtained by encrypting the first account using the first key. And the four electronic devices are stored with a second secret key, and the second secret key corresponds to the first secret key. For example, the first key is an encryption key and the second key is a decryption key. The four electronic devices can acquire the authentication information in the control device, authenticate the authentication information by using the second secret key, and enter a second state after passing the authentication. This will be described in detail hereinafter, and is only briefly described here. Taking a mobile phone as an example, after the mobile phone acquires the authentication information, the authentication information is authenticated by using a second key, and after the authentication is passed, the mobile phone is automatically unlocked. Therefore, if all of the four electronic devices pass the authentication of the authentication information, all of the four electronic devices enter the second state.
By the mode, a plurality of devices can be quickly unlocked or activated, the user does not need to manually execute unlocking operation on each device, and the operation is convenient.
In other embodiments, the control device may implement interconnections between four electronic devices. That is, the user does not need to perform an interactive operation (such as fig. 2) on a certain device (such as a mobile phone) to connect with other devices, so that the operation is convenient.
One implementation manner is that the four electronic devices in fig. 3 log on the same account, i.e. the first account. The control device stores authentication information, which may be obtained by encrypting the first account using the first key. And the four electronic devices are stored with a second secret key, and the second secret key corresponds to the first secret key. Wherein the authentication information in the control device is provided by the server, and the second keys in the four electronic devices are also provided by the server. The server also stores a list of devices associated with the first account (e.g., table 1 above). Taking a mobile phone as an example, the mobile phone obtains authentication information in the control device, and after the authentication information is authenticated by using the second secret key, the mobile phone inquires interconnection information of other devices (such as a television, a sound box and a tablet computer) from a server, wherein the interconnection information comprises connection addresses of the other devices. The mobile phone can be connected with other devices based on the connection address. Similarly, taking a sound box as an example, the sound box acquires authentication information in the control device, and after the authentication information is authenticated by using the second secret key, the server is queried for interconnection information of other devices (such as a television, a mobile phone and a tablet computer), wherein the interconnection information comprises connection addresses of the other devices. The sound box can be connected with other devices based on the connection address. This will be described in detail hereinafter, and is only briefly described here.
Therefore, the four electronic devices can be automatically interconnected only by acquiring the authentication information in the control device and after the authentication information passes, and a user does not need to execute a series of operations (as shown in fig. 2) on a certain device to realize connection with other devices, so that the operation is convenient and fast, and the user experience is improved.
In some embodiments, the control device may be various types of short-range communication devices. Such as an electronic tag (tag), a Bluetooth (BT) device, a near field communication (Near Field Communication, NFC) device, a wireless fidelity (wir eless fidelity, wi-Fi) device, and so forth.
Taking the control device as a bluetooth device as an example, the bluetooth device may broadcast authentication information, and bluetooth modules are disposed in the four electronic devices and may be used to receive the authentication information. Taking the control device as an NFC device as an example, NFC contact areas may be provided on four electronic devices. The user may touch or approach the control device to the NFC touch area on a certain device to enable the device to obtain authentication information in the control device. Taking the control device as an electronic tag as an example, authentication information is stored in the electronic tag. The four electronic devices are provided with readers (readers), and the readers can read authentication information in the electronic tags.
The electronic tag and reader are briefly described below.
A reader, also called reader, is a device capable of acquiring data of an electronic tag, and may be used as a separate device or may be embedded in other devices or systems. For example, in fig. 3, a reader is embedded in a mobile phone, a tablet computer, a sound box, and a television. Illustratively, the reader may transmit a radio frequency signal to the electronic tag via an antenna on the reader to query the electronic tag for data. The electronic tag is a miniature wireless transceiver, and mainly comprises an embedded electronic tag antenna, a coupling element and a chip. The chip is provided with a storage space capable of supporting the reading or writing of data by the reader. Authentication information is stored in the storage space. After the electronic tag receives the radio frequency signal sent by the reader through the electronic tag antenna, the coupling of the radio frequency signal can be realized through the coupling element, so that the energy can be provided for the chip of the electronic tag in the coupling channel, and the data (namely authentication information) stored in the chip is fed back to the reader through the electronic tag antenna. The electronic tag may be a radio frequency identification (Radio Frequency Identification, RFID) tag or other type of tag, and embodiments of the present application are not limited.
It should be noted that, the embodiments below herein mainly take the control device as an electronic tag as an example, but the embodiments are not limited to the control device being necessarily an electronic tag, and may also be a bluetooth device, an NFC device, a WIFI device, and so on.
In some embodiments, a first switch may be provided on the control device. The first switch may be used to control the control device to be in an on state or an off state. When the control device is in an on state, the other device can read the authentication information in the control device, for example, the control device starts broadcasting the authentication information. When the control device is in the off state, the other electronic device cannot read the authentication information in the control device, for example, the control device stops broadcasting the authentication information. The first switch may be a physical switch, such as a physical key, or a touch key if a touch screen is provided on the control device.
By way of example, with continued reference to fig. 3, the control device may be independent of other electronic devices (e.g., a cell phone, tablet, speaker, television, etc.), or the control device may also be a component of some electronic device (e.g., a cell phone, tablet, speaker, or television). Taking the control device as a component in the mobile phone as an example, the mobile phone has the function of the control device, for example, the control device controls four electronic devices in fig. 3 to enter the second state from the first state, and/or controls the four electronic devices to be automatically connected. Taking the example that the control device is a separate device independent of other devices, the control device may be sold separately, or may be sold in combination with a certain device (such as a mobile phone), or may be given as a gift, etc., embodiments of the present application are not limited.
The relevant apparatus of the present application is described below.
Fig. 4 shows a schematic structural diagram of the electronic device. The electronic device may be a cell phone, tablet computer, television, etc. as in fig. 3. As shown in fig. 4, the electronic device may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (universal serial bus, USB) interface 130, a charge management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, a mobile communication module 150, a wireless communication module 160, an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, a sensor module 180, keys 190, a motor 191, an indicator 192, a camera 193, a display 194, a user identification module (subscriber identification module, SIM) card interface 195, and the like. The sensor module 180 may include a pressure sensor 180A, a gyro sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, an ambient light sensor 180L, a bone conduction sensor 180M, and the like.
The processor 110 may include one or more processing units, such as: the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processor (graphics processing unit, GPU), an image signal processor (image signal processor, ISP), a controller, a memory, a video codec, a digital signal processor (digital signal processor, DSP), a baseband processor, and/or a neural network processor (neural-network processing unit, NPU), etc. Wherein the different processing units may be separate devices or may be integrated in one or more processors. The controller can be a neural center and a command center of the electronic device. The controller can generate operation control signals according to the instruction operation codes and the time sequence signals to finish the control of instruction fetching and instruction execution. A memory may also be provided in the processor 110 for storing instructions and data. In some embodiments, the memory in the processor 110 is a cache memory. The memory may hold instructions or data that the processor 110 has just used or recycled. If the processor 110 needs to reuse the instruction or data, it can be called directly from the memory. Repeated accesses are avoided and the latency of the processor 110 is reduced, thereby improving the efficiency of the system.
The USB interface 130 is an interface conforming to the USB standard specification, and may specifically be a Mini USB interface, a Micro USB interface, a USB Type C interface, or the like. The USB interface 130 may be used to connect a charger to charge an electronic device, or may be used to transfer data between the electronic device and a peripheral device. The charge management module 140 is configured to receive a charge input from a charger. The power management module 141 is used for connecting the battery 142, and the charge management module 140 and the processor 110. The power management module 141 receives input from the battery 142 and/or the charge management module 140 and provides power to the processor 110, the internal memory 121, the external memory, the display 194, the camera 193, the wireless communication module 160, and the like.
The wireless communication function of the electronic device may be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, a modem processor, a baseband processor, and the like. The antennas 1 and 2 are used for transmitting and receiving electromagnetic wave signals. Each antenna in the electronic device may be used to cover a single or multiple communication bands. Different antennas may also be multiplexed to improve the utilization of the antennas. For example: the antenna 1 may be multiplexed into a diversity antenna of a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
The mobile communication module 150 may provide a solution for wireless communication including 2G/3G/4G/5G, etc. applied on an electronic device. The mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (low noise amplifier, LNA), etc. The mobile communication module 150 may receive electromagnetic waves from the antenna 1, perform processes such as filtering, amplifying, and the like on the received electromagnetic waves, and transmit the processed electromagnetic waves to the modem processor for demodulation. The mobile communication module 150 can amplify the signal modulated by the modem processor, and convert the signal into electromagnetic waves through the antenna 1 to radiate. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be disposed in the processor 110. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be provided in the same device as at least some of the modules of the processor 110.
The wireless communication module 160 may provide solutions for wireless communication including wireless local area network (wireless local area networks, WLAN) (e.g., wireless fidelity (wireless fidelity, wi-Fi) network), bluetooth (BT), global navigation satellite system (global navigation satellite system, GNSS), frequency modulation (frequency modulation, FM), near field wireless communication technology (near field communication, NFC), infrared technology (IR), etc. for application on an electronic device. The wireless communication module 160 may be one or more devices that integrate at least one communication processing module. The wireless communication module 160 receives electromagnetic waves via the antenna 2, modulates the electromagnetic wave signals, filters the electromagnetic wave signals, and transmits the processed signals to the processor 110. The wireless communication module 160 may also receive a signal to be transmitted from the processor 110, frequency modulate it, amplify it, and convert it to electromagnetic waves for radiation via the antenna 2.
In some embodiments, the antenna 1 and the mobile communication module 150 of the electronic device are coupled, and the antenna 2 and the wireless communication module 160 are coupled, so that the electronic device can communicate with the network and other devices through wireless communication technology. The wireless communication techniques may include the Global System for Mobile communications (global system for mobile communications, GSM), general packet radio service (general packet radio service, GPRS), code division multiple access (code division multiple access, CDMA), wideband code division multiple access (wideband code division multiple access, WCDMA), time division code division multiple access (time-division code division multiple access, TD-SCDMA), long term evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC, FM, and/or IR techniques, among others. The GNSS may include a global satellite positioning system (global positioning system, GPS), a global navigation satellite system (global navigation satellite system, GLONASS), a beidou satellite navigation system (beidou navigation satellite system, BDS), a quasi zenith satellite system (quasi-zenith satellite system, QZSS) and/or a satellite based augmentation system (satellite based augmentation systems, SBAS).
The display 194 is used to display a display interface of an application or the like. The display 194 includes a display panel. The display panel may employ a liquid crystal display (liquid crystal display, LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode (AMOLED) or an active-matrix organic light-emitting diode (matrix organic light emitting diode), a flexible light-emitting diode (flex), a mini, a Micro led, a Micro-OLED, a quantum dot light-emitting diode (quantum dot light emitting diodes, QLED), or the like. In some embodiments, the electronic device may include 1 or N display screens 194, N being a positive integer greater than 1.
The electronic device 100 may implement photographing functions through an ISP, a camera 193, a video codec, a GPU, a display screen 194, an application processor, and the like.
The ISP is used to process data fed back by the camera 193. For example, when photographing, the shutter is opened, light is transmitted to the camera photosensitive element through the lens, the optical signal is converted into an electric signal, and the camera photosensitive element transmits the electric signal to the ISP for processing and is converted into an image visible to naked eyes. ISP can also optimize the noise, brightness and skin color of the image. The ISP can also optimize parameters such as exposure, color temperature and the like of a shooting scene. In some embodiments, the ISP may be provided in the camera 193.
The camera 193 is used to capture still images or video. The object generates an optical image through the lens and projects the optical image onto the photosensitive element. The photosensitive element may be a charge coupled device (charge coupled device, CCD) or a Complementary Metal Oxide Semiconductor (CMOS) phototransistor. The photosensitive element converts the optical signal into an electrical signal, which is then transferred to the ISP to be converted into a digital image signal. The ISP outputs the digital image signal to the DSP for processing. The DSP converts the digital image signal into an image signal in a standard RGB, YUV, or the like format. In some embodiments, the electronic device may include 1 or N cameras 193, N being a positive integer greater than 1.
The internal memory 121 may be used to store computer executable program code including instructions. The processor 110 executes various functional applications of the electronic device and data processing by executing instructions stored in the internal memory 121. The internal memory 121 may include a storage program area and a storage data area. The storage program area may store an operating system, and software code of at least one application program (e.g., an aiqi application, a WeChat application, etc.), etc. The storage data area may store data (e.g., images, video, etc.) generated during use of the electronic device, and so forth. In addition, the internal memory 121 may include a high-speed random access memory, and may further include a nonvolatile memory such as at least one magnetic disk storage device, a flash memory device, a universal flash memory (universal flash storage, UFS), and the like.
The external memory interface 120 may be used to connect an external memory card, such as a Micro SD card, to enable expansion of the memory capabilities of the electronic device. The external memory card communicates with the processor 110 through an external memory interface 120 to implement data storage functions. For example, files such as pictures and videos are stored in an external memory card.
The electronic device may implement audio functions through an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, an application processor, and the like. Such as music playing, recording, etc.
The pressure sensor 180A is used to sense a pressure signal, and may convert the pressure signal into an electrical signal. In some embodiments, the pressure sensor 180A may be disposed on the display screen 194. The gyro sensor 180B may be used to determine a motion gesture of the electronic device. In some embodiments, the angular velocity of the electronic device about three axes (i.e., x, y, and z axes) may be determined by the gyro sensor 180B.
The gyro sensor 180B may be used for photographing anti-shake. The air pressure sensor 180C is used to measure air pressure. In some embodiments, the electronics calculate altitude from barometric pressure values measured by barometric pressure sensor 180C, aiding in positioning and navigation. The magnetic sensor 180D includes a hall sensor. The electronic device may detect the opening and closing of the flip holster using the magnetic sensor 180D. In some embodiments, when the electronic device is a flip machine, the electronic device may detect the opening and closing of the flip according to the magnetic sensor 180D. And then according to the detected opening and closing state of the leather sheath or the opening and closing state of the flip, the characteristics of automatic unlocking of the flip and the like are set. The acceleration sensor 180E may detect the magnitude of acceleration of the electronic device in various directions (typically three axes). The magnitude and direction of gravity can be detected when the electronic device is stationary. The electronic equipment gesture recognition method can also be used for recognizing the gesture of the electronic equipment, and is applied to horizontal and vertical screen switching, pedometers and other applications.
A distance sensor 180F for measuring a distance. The electronic device may measure the distance by infrared or laser. In some embodiments, the scene is photographed and the electronic device can range using the distance sensor 180F to achieve quick focus. The proximity light sensor 180G may include, for example, a Light Emitting Diode (LED) and a light detector, such as a photodiode. The light emitting diode may be an infrared light emitting diode. The electronic device emits infrared light outwards through the light emitting diode. The electronic device uses a photodiode to detect infrared reflected light from nearby objects. When sufficient reflected light is detected, it may be determined that an object is in the vicinity of the electronic device. When insufficient reflected light is detected, the electronic device may determine that there is no object in the vicinity of the electronic device. The electronic device may detect that the user holds the electronic device near the ear to talk using the proximity light sensor 180G, so as to automatically extinguish the screen for power saving purposes. The proximity light sensor 180G may also be used in holster mode, pocket mode to automatically unlock and lock the screen.
The ambient light sensor 180L is used to sense ambient light level. The electronic device can adaptively adjust the brightness of the display 194 based on the perceived ambient light level. The ambient light sensor 180L may also be used to automatically adjust white balance when taking a photograph. Ambient light sensor 180L may also cooperate with proximity light sensor 180G to detect if the electronic device is in a pocket to prevent false touches. The fingerprint sensor 180H is used to collect a fingerprint. The electronic equipment can utilize the collected fingerprint characteristics to realize fingerprint unlocking, access the application lock, fingerprint photographing, fingerprint incoming call answering and the like.
The temperature sensor 180J is for detecting temperature. In some embodiments, the electronic device performs a temperature processing strategy using the temperature detected by temperature sensor 180J. For example, when the temperature reported by temperature sensor 180J exceeds a threshold, the electronics perform a reduction in performance of a processor located near temperature sensor 180J in order to reduce power consumption to implement thermal protection. In other embodiments, when the temperature is below another threshold, the electronic device heats the battery 142 to avoid low temperatures causing the electronic device to shut down abnormally. In other embodiments, the electronic device performs boosting of the output voltage of the battery 142 when the temperature is below a further threshold to avoid abnormal shutdown caused by low temperatures.
The touch sensor 180K, also referred to as a "touch panel". The touch sensor 180K may be disposed on the display screen 194, and the touch sensor 180K and the display screen 194 form a touch screen, which is also called a "touch screen". The touch sensor 180K is for detecting a touch operation acting thereon or thereabout. The touch sensor may communicate the detected touch operation to the application processor to determine the touch event type. Visual output related to touch operations may be provided through the display 194. In other embodiments, the touch sensor 180K may also be disposed on the surface of the electronic device at a different location than the display 194.
The bone conduction sensor 180M may acquire a vibration signal. In some embodiments, bone conduction sensor 180M may acquire a vibration signal of a human vocal tract vibrating bone pieces. The bone conduction sensor 180M may also contact the pulse of the human body to receive the blood pressure pulsation signal.
The keys 190 include a power-on key, a volume key, etc. The keys 190 may be mechanical keys. Or may be a touch key. The electronic device may receive key inputs, generating key signal inputs related to user settings and function controls of the electronic device. The motor 191 may generate a vibration cue. The motor 191 may be used for incoming call vibration alerting as well as for touch vibration feedback. For example, touch operations acting on different applications (e.g., photographing, audio playing, etc.) may correspond to different vibration feedback effects. The indicator 192 may be an indicator light, may be used to indicate a state of charge, a change in charge, a message indicating a missed call, a notification, etc. The SIM card interface 195 is used to connect a SIM card. The SIM card may be inserted into the SIM card interface 195, or removed from the SIM card interface 195 to enable contact and separation with the electronic device.
A reader is also included in the electronic device. The reader may send a radio frequency signal to the electronic tag via an antenna on the reader to query the electronic tag for data.
It will be appreciated that the components shown in fig. 4 do not constitute a particular limitation of the electronic device. The electronic device in embodiments of the invention may include more or fewer components than in fig. 4. In addition, the combination/connection relationship between the components in fig. 4 is also adjustable and modifiable.
The following describes the technical scheme provided by the embodiment of the application with reference to the accompanying drawings.
Fig. 5 is a flow chart of a device control method according to an embodiment of the present application. The method can be applied to the application scenario shown in fig. 3 or similar application scenarios. Taking the application scenario shown in fig. 3 as an example, the scenario includes a distributed device (such as a mobile phone, a television, a tablet computer, a sound box, etc.) and a server. The server included in the flow shown in fig. 5 may be the server in fig. 3, and the first electronic device and the second electronic device are each one of the distributed devices. For example, the first electronic device may be the control device in fig. 3, and the second electronic device may be the mobile phone, the television, the tablet computer, or the sound box in fig. 3. As shown in fig. 5, the process includes:
s501, the second electronic device is activated through the first account.
Illustratively, the first account may be a system account, such as a mobile phone number, a mailbox, etc., may be used as the system account. Taking the example that the second electronic device is a bloom device, the first account may be Jack@huawei.com, for example, and the server may be a bloom server, such as a bloom cloud, corresponding to the first account. That is, the second electronic device is activated on the cloud side by the account number of Jack@huawei.com.
S502, the server stores a device list corresponding to the first account.
For example, the second electronic device may report its device identification to the server upon or after activation. In this way, the device identification of the second electronic device may be included in the device list stored on the server side. The device identifier, such as a device model number, a product serial number, a device type (mobile phone, tablet computer, etc.), etc., embodiments of the present application are not limited. In other embodiments, the second electronic device may report the connection address to the server when or after activation, so that the device list may further include the connection address corresponding to the second electronic device, for example, the device list corresponding to the first account number is as follows table 2:
table 2: device list corresponding to first account
It should be noted that, in addition to the second electronic device, there may be other devices (such as a third electronic device) activated by the first account, so the device identifier and the connection address of the third electronic device are also included in table 2 above.
S503, the server provides authentication information to the first electronic device.
It will be appreciated that prior to S503, the steps may also be included: the server generates authentication information based on the first account number. One implementation manner is that the server encrypts the first account to obtain authentication information, for example, the first account is encrypted by using a first key. The first key may be, for example, a private key of the server. The first password may be a symmetric key or an asymmetric key, which is not limited in the embodiments of the present application.
The authentication information may be, for example, a digital signature (signature) or a public key infrastructure (public key infrastructure, PKI) certificate or the like. The digital signature is exemplified by various serial numbers such as a digital string, a character string, or a combination of a number and a character. For example, the server calculates the digital signature on the first key and the first account by using an encryption algorithm, that is, the digital signature is used as an output of the encryption algorithm, and an input of the encryption algorithm includes the first account, the first key, and the like. The encryption algorithm may be, for example, a hash (hash) algorithm, etc., which is not limited in this application. Taking PKI certificates as an example, PKI certificates are first briefly introduced. The PKI certificate includes therein a signature generated by a signer using a private key of the signer, which can be verified by a verifier using a public key of the signer. Two subjects, a signer and a verifier, are involved. The signer may be a trusted third party, for example, a server in the present application, i.e., an issuing authority of PKI certificates. The verifier may be a device with the public key of the signer. That is, in the present application, the server provides the PKI certificate to the first electronic device, and the verifier (e.g., the second electronic device) obtains the PKI certificate from the first electronic device for verification.
In the above, the authentication information is a digital signature and a KPI certificate as an example, and it is to be understood that the authentication information may be other types of encrypted files, so long as a verifier can authenticate the authentication information, and the application is not limited to the type.
After the server generates the authentication information, the authentication information is provided to the first electronic device, including at least one of the following modes a or B.
In the mode A, the server actively provides authentication information for the first electronic device. For example, when two devices (e.g., a second electronic device and a third electronic device) are activated on the server side using a first account, the server generates authentication information and provides the authentication information to the first electronic device. Since there is a high probability that two devices of the same user will need to connect when they are activated using the same account, authentication information is provided to facilitate connection of the two devices (to be described later).
In the mode B, after receiving the application information, the server provides authentication information to the first electronic device. The application information is used for applying for authentication information corresponding to the first account. The application information includes a first account number. The application information can be sent by the second electronic device, the third electronic device or other electronic devices related to the first account, or the user off-line sales platform inputs the application information in the server in a manual mode.
Taking the example of the mode B, and taking the example of the second electronic device sending the application information to the server, the process of sending the application information by the second electronic device includes, but is not limited to, fig. 6A to 6C below, and fig. 6A to 6C take the example of the second electronic device being a mobile phone.
As shown in fig. 6A (a), the handset displays a main interface 201. The main interface includes a setting icon 601 therein. When the handset detects an operation for the setting icon 601, a setting interface 602 as shown in fig. 6A (b) is displayed. The account options 603 are included in the interface 602. When an operation for the account option 603 is detected, an interface as shown in fig. 6A (c) is displayed, in which a first account such as jack. When an operation for the first account is detected, an interface as shown in fig. 6A (d) is displayed, where the interface includes a tag authentication service, and prompt information (such as not applied) of the current state and a key 606. When an operation for the key 606 is detected, an interface as shown in fig. 6A (e) is displayed in which a first account number is displayed, and a detailed description (for introducing specific contents of the tag authentication service to the user) is also included, as well as a key to submit an application. And when the operation of the key for submitting the application is detected, sending application information to the server.
As shown in fig. 6B (a), the mobile phone displays a font selection interface, assuming that the user selects a simplified chinese font, the mobile phone enters an interface shown in fig. 6B (B), the interface is an account login interface, after the user inputs an account and a password, the user clicks to login, the mobile phone displays an interface shown in fig. 6B (c), the interface includes an account that has been logged in, and an application-submitting button, when an operation for the button for submitting an application is detected, application information is sent to the server, and then an interface shown in fig. 6B (d) is displayed, the interface displays prompt information activation completion. Note that, with continued reference to fig. 6B (c), when the mobile phone detects an operation for the skip key, an interface as shown in fig. 6B (d) is directly displayed. That is, the user may choose to apply for the tag during activation or may not apply for the tag during activation. In case the user wants to apply after the activation is completed, the application may be applied in the setup application in the manner shown in fig. 6A.
It should be noted that fig. 6A and fig. 6B serve as two different application modes, where fig. 6B is applied when the second electronic device is activated, and fig. 6A is applied after the second electronic device is activated (for example, after a period of use). It should be understood that fig. 6A and fig. 6B are examples of two application processes, and other interfaces or key manners may be used to apply, which are not limited by the embodiments of the present application.
In other embodiments, the tag authentication service may also be a payment service. For example, please refer to fig. 7 (a), which is an application interface of the tag authentication service, when the mobile phone detects an operation of a key for submitting an application, an interface as shown in fig. 7 (b) is displayed, and the fee information and the payment manner are displayed in the interface, including manner 1 and manner 2, for example, manner 1 is a wallet, and manner 2 is a bank card. When the mobile phone detects the operation of the selection mode 1, an interface shown in fig. 7 (c) is displayed, a gesture payment window is displayed in the interface, and when the mobile phone detects the preset gesture operation, the payment is completed, an interface shown in fig. 7 (c) is displayed, and prompt information of completing the payment or applying for success is displayed in the interface.
It should be noted that, as described above, the first electronic device (i.e., the control device) may be an electronic tag or a bluetooth device, a WIFI device, or the like. Taking an electronic tag as an example, the server may provide the authentication information to the electronic tag, and then the server may inject the authentication information into the electronic tag by manually injecting (or embedding) the authentication information. If the first electronic device is a WIFI device, the server may provide the authentication information to the electronic tag by sending the authentication information to the WIFI device.
S504, the second electronic device obtains authentication information from the first electronic device.
Taking the first electronic device as an electronic tag and the second electronic device being provided with a reader as an example, the reader in the second electronic device can read authentication information in the electronic tag.
And S505, the second electronic equipment authenticates the authentication information.
One implementation manner is that the second electronic device decrypts the authentication information by using the second key, if decryption is successful, verification is passed, and if decryption is failed, verification is not passed. Wherein the second key may be obtained by the second electronic device from the server. The second key corresponds to the first key described above, and the first key can be decrypted. For example, the first key may be a private key of the server and the second key may be a public key of the server. That is, the server provides the second key to the second electronic device and provides the authentication information encrypted using the first key to the first electronic device. In this way, the second electronic device may decrypt the authentication information using its second key. In other words, only the electronic device with the second key can successfully decrypt the authentication information, and the device without the second key cannot decrypt the authentication information even if the device can acquire the authentication information, so that the device cannot automatically enter the second state and/or automatically connect with other devices (such as the third electronic device), and the privacy of the other devices can be ensured.
In another implementation manner, the second electronic device decrypts the verification by using the second key, if the decryption fails, the authentication is not passed, if the decryption is successful, the first account in the authentication information is obtained, whether the first account is related to the second electronic device is further judged, if so, the authentication is passed, otherwise, the authentication is not passed. The first account number is associated with a second electronic device, including at least one of the following: the current login account of the second electronic device is a first account, and the activation account of the second electronic device is the first account. In this way, the device with the second key does not necessarily represent a pass of verification even if it decrypts the authentication information, but only if it is successful and associated with the first account number. Thus, if a certain device is not related to the first account, even if the device steals the second key, the device cannot pass authentication, cannot be connected with other devices (such as the third electronic device) corresponding to the first account, and ensures the information security of the third electronic device.
After the second electronic device authenticates the authentication information, S507 and/or S508-S510 may be performed.
S506, the second electronic device switches from the first state to the second state. The first state is a non-working state, and the second state is a working state. For the first state and the second state, please refer to the previous description.
S507, the second electronic device queries the server for the connection address of the third electronic device.
S508, the server feeds back the connection address of the third electronic device to the second electronic device.
And S509, the second electronic device establishes connection with the third electronic device based on the connection address of the third electronic device.
In one implementation manner of S507, the second electronic device sends first information to the server, where the first information may be indication information for indicating that authentication information of the second electronic device passes authentication, that is, the authentication information provided to the first electronic device by the second electronic device passes authentication through the first information is proved to the server by the first information. Or, the first information may be interconnection information of the second electronic device, where the interconnection information includes a device identifier and a connection address of the second device. When the server receives the interconnection information of the second electronic device, the second electronic device is considered to pass the authentication of the authentication information, because the device which does not consider that the authentication passes does not report the interconnection information to the server. And after the server receives the first information, sending the connection address of the third electronic device to the server. It should be noted that, in the device list (for example, table 1) corresponding to the first account stored in the server, there may be more information of devices besides the second electronic device and the third electronic device. Therefore, the server may send the connection addresses of all devices except the second electronic device in the device list to the second electronic device. In this way, the second electronic device may be connected to all devices except the second electronic device among all devices related to the first account.
It should be noted that, with continued reference to fig. 5, after S505, only S506 may be performed, and S507 to S509 are not performed, i.e., when the second electronic device authenticates the authentication information, the second state is entered, and the connection procedure with the third electronic device is not performed. In other embodiments, after S505, S508-S510 may be directly executed, and S507 may not be executed, that is, when the second electronic device authenticates the authentication information, the server directly queries the connection address of the third electronic device to establish a connection with the third electronic device. In still other embodiments, after S505, both S506 and S507-S509 may be performed, and in the case where S506 and S507-S509 are performed, the order of execution is not limited, for example, S507-S509 may be performed first, S506 may be performed later, or S506 may be performed first, S507-S509 may be performed later, and so on.
In some embodiments, after the second electronic device switches to the second state, relevant information of the third electronic device, such as a history play record, a history operation interface, and the like, of the third electronic device may be displayed. Taking the example that the second electronic device is a mobile phone and the third electronic device is a television, when the mobile phone passes the authentication of the authentication information, the mobile phone automatically enters the second state, and then the latest play record (such as a television play, a movie and the like) of the television can be displayed. In one implementation, the television reports the history play record, the history operation interface and the like to the server, and the second electronic device acquires the information from the server and the third electronic device. In another implementation manner, the second electronic device is connected with the third electronic device, and a history play record, a history operation interface and the like of the third electronic device are obtained without being obtained through a server. By the mode, the second electronic equipment can automatically enter the second state and display the related information of the third electronic equipment, the second electronic equipment does not need to be manually controlled by a user to enter the second state, the second electronic equipment is not required to be manually connected with the third electronic equipment, and the related information of the third electronic equipment is projected to the second electronic equipment to be displayed through manual operation, so that the operation is convenient and fast, and the user experience is improved.
It will be appreciated that the second electronic device may also be disconnected after being connected to the third electronic device. In one implementation, the user may operate on the second electronic device or on the third electronic device to implement connection interruption, for example, close a wireless connection function of the second electronic device so that the second electronic device cannot be connected to the third electronic device, or may set a key on the second electronic device to interrupt connection with the third electronic device, or the like. In another implementation manner, the user can realize the connection interruption between the second electronic device and the third electronic device through the first electronic device. For example, the first electronic device is provided with a second control, and when the first electronic device detects that the second control is triggered, an instruction can be sent to the server, where the instruction is used for indicating that the connection between the second electronic device and the third electronic device is interrupted. The server sends the instruction to the second electronic device or the third electronic device instructing it to interrupt the connection with the other party. The second control and the first control described above may be the same control or different controls, and may be a physical button or a touch button, etc. By the mode, a user can realize automatic connection interruption of the two devices through operation of the control on the first electronic device, and the operation is convenient.
In the above embodiment, the distributed device includes the second electronic device and the third electronic device as an example. In some embodiments, a new device may also be added to the distributed device, such as adding a fifth electronic device. In an increasing manner, the fifth electronic device is activated to the server by using the first account, so that the server adds the device identifier and the connection address of the fifth electronic device to the device list (for example, table 2) corresponding to the first account. When the fifth electronic device is added to the device list, the server may issue a second key to the fifth electronic device, where the second key is used to decrypt the first key. The fifth electronic device may authenticate the authentication information of the first electronic device after obtaining the second key. That is, the newly joined device may obtain the second key for authenticating the authentication information, so that the newly joined device may also automatically unlock or activate and/or automatically connect with other devices (e.g., the second electronic device or the third electronic device).
In other embodiments, the devices may also be reduced in distributed devices. For example, the fifth electronic device is reduced. In one implementation, the fifth electronic device is disassociated from the first account, e.g., the fifth electronic device is re-activated using another account after exiting the first account or after restoring the fifth electronic device from the factory. In this way, the information of the fifth electronic device is deleted from the device list (e.g., table 2) corresponding to the first account recorded in the server. Before the fifth electronic device exits the distributed device, in order for the fifth electronic device to be able to authenticate the authentication information, the server sends a second key to the fifth electronic device for authenticating the authentication information. In order to avoid that the fifth electronic device still uses the second key to authenticate the authentication information, the server may send a third key to other devices that are not disassociated with the first account, where the third key is different from the second key, and other devices that are not disassociated with the first account may use the third key to authenticate the authentication information, so as to avoid privacy disclosure of the other devices.
One possible application scenario related to the device control method provided in the present application is that a user purchases a second electronic device (e.g., a mobile phone) and activates the second electronic device using a first account. The user wants to apply for a tag authentication service after using for a period of time, such as by applying in the manner shown in fig. 6A. After receiving the application information, the server may provide authentication information to the first electronic device. The seller knows which user has applied for the verification information through the server, and can mail the first electronic device to the user (for example, the application interface can include the address and the phone number of the user), or can notify the user to take the first electronic device at a designated place by telephone (for example, the application interface includes the phone number of the user), and so on. Another possible application scenario is that the first electronic device is sold in cooperation with the second electronic device; alternatively, the user purchases the second electronic device and gives the first electronic device away. That is, the user already has both the second electronic device and the first electronic device, at which time the second electronic device has not been activated and the first electronic device has no authentication information. The user activates the second electronic device using the first account number. And after the server confirms that the application information of the second electronic equipment is received, the server sends verification information to the first electronic equipment. Thus, the user can control the second electronic device using the first electronic device.
Fig. 8 is a schematic structural diagram of an electronic device 800 according to an embodiment of the present application. The electronic device 800 may be the first electronic device, the second electronic device, or the server in the foregoing. As shown in fig. 8, an electronic device 800 may include: one or more processors 801; one or more memories 802; a communication interface 803, and one or more computer programs 804, which may be connected via one or more communication buses 805. Wherein the one or more computer programs 804 are stored in the memory 802 and configured to be executed by the one or more processors 801, the one or more computer programs 804 comprising instructions. For example, when the electronic device 800 is the first electronic device in the foregoing, the instructions may be for performing the steps associated with the first electronic device as in the corresponding embodiment above. When the electronic device 800 is a second electronic device as described above, the instructions may be used to perform the steps associated with the second electronic device as in the corresponding embodiment above. When the electronic device 800 is a server as described above, the instructions may be used to perform the steps associated with the server as in the corresponding embodiments above. The communication interface 803 is used to enable communication of the electronic device 800 with other devices, for example, the communication interface may be a transceiver.
The embodiment of the application also provides a communication system. The communication system comprises a first electronic device, a second electronic device and a server. The structures of the first electronic device and the second electronic device may be shown in fig. 8. For example, when the electronic device 800 shown in fig. 8 is a first electronic device, the instructions of the one or more computer programs 804, when executed by the processor, cause the first electronic device to perform the steps of the first electronic device as in fig. 5, previously described. When the electronic device 800 shown in fig. 8 is a second electronic device, the instructions of the one or more computer programs 804, when executed by the processor, cause the second electronic device to perform the steps of the second electronic device as in fig. 5, previously described. When the electronic device 800 shown in fig. 8 is a server, the instructions of the one or more computer programs 804, when executed by the processor, cause the server to perform the steps of the server as in fig. 5, supra.
In the embodiments provided in the present application, the method provided in the embodiments of the present application is described from the point of view that the electronic device (for example, a mobile phone) is used as the execution subject. In order to implement the functions in the methods provided in the embodiments of the present application, the electronic device may include a hardware structure and/or a software module, where the functions are implemented in the form of a hardware structure, a software module, or a hardware structure plus a software module. Some of the functions described above are performed in a hardware configuration, a software module, or a combination of hardware and software modules, depending on the specific application of the solution and design constraints.
As used in the above embodiments, the term "when …" or "after …" may be interpreted to mean "if …" or "after …" or "in response to determination …" or "in response to detection …" depending on the context. Similarly, the phrase "at the time of determination …" or "if detected (a stated condition or event)" may be interpreted to mean "if determined …" or "in response to determination …" or "at the time of detection (a stated condition or event)" or "in response to detection (a stated condition or event)" depending on the context. In addition, in the above-described embodiments, relational terms such as first and second are used to distinguish one entity from another entity without limiting any actual relationship or order between the entities.
Reference in the specification to "one embodiment" or "some embodiments" or the like means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," and the like in the specification are not necessarily all referring to the same embodiment, but mean "one or more but not all embodiments" unless expressly specified otherwise. The terms "comprising," "including," "having," and variations thereof mean "including but not limited to," unless expressly specified otherwise.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present invention, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another, for example, by wired (e.g., coaxial cable, optical fiber, digital Subscriber Line (DSL)), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), etc. The schemes of the above embodiments may be used in combination without conflict.
It is noted that a portion of this patent document contains material which is subject to copyright protection. The copyright owner has reserved copyright rights, except for making copies of patent documents or recorded patent document content of the patent office.
Claims (26)
1. A device control method, applied to a system including a first electronic device, a second electronic device, and a server, the method comprising:
the server provides authentication information to the first electronic device, the authentication information being generated based on a first account number;
the second electronic device obtains the authentication information from the first electronic device;
the second electronic equipment authenticates the authentication information, and when the authentication is passed, the following steps are executed:
switching from the inactive state to the active state; and/or the number of the groups of groups,
inquiring a connection address of a third electronic device from the server, and establishing connection with the third electronic device based on the inquired connection address of the third electronic device, wherein the third electronic device is related to the first account.
2. The method of claim 1, wherein the authentication information is generated by the server encrypting the first account based on a first key, and the second electronic device authenticating the authentication information, comprising:
The second electronic equipment acquires a second key corresponding to the first key from the server;
and the second electronic equipment decrypts the authentication information by using the second key, if the decryption is successful, the authentication is passed, and if the decryption is failed, the authentication is not passed.
3. The method of claim 1, wherein the authentication information is generated by the server encrypting the first account based on a first key, and the second electronic device authenticating the authentication information, comprising:
the second electronic equipment acquires a second key corresponding to the first key from the server;
the second electronic equipment decrypts the authentication information by using the second key to obtain the first account;
and when the second electronic equipment determines that the first account is related to the first electronic equipment, the authentication is passed, otherwise, the authentication is not passed.
4. A method according to claim 3, wherein the first account number is associated with the second electronic device, comprising at least one of:
the current login account of the second electronic equipment is the first account;
And the activation account number of the second electronic equipment is the first account number.
5. The method of any of claims 1-4, further comprising, prior to the server providing authentication information to the first electronic device:
the server receives application information of fourth electronic equipment, wherein the application information is used for applying authentication information corresponding to the first account;
the fourth electronic device and the second electronic device are the same device, or the fourth electronic device and the third electronic device are the same device; or, the fourth electronic device is a device related to the first account number and different from both the second electronic device and the third electronic device.
6. The method of claim 5, wherein the method further comprises:
the fourth electronic equipment responds to a first operation and displays a first interface, wherein the first interface comprises the first account number and an application key;
and when the fourth electronic equipment detects the second operation aiming at the application key, sending the application information to the server.
7. The method of claim 6, wherein the fourth electronic device sending the application information to the server when detecting the second operation for the application key comprises:
When the fourth electronic equipment detects a second operation aiming at the application key, a second interface is displayed, wherein the second interface comprises prompt information of the expense to be paid;
and when the fourth electronic equipment detects that the fee payment is completed, the application information is sent to the server.
8. The method according to any of claims 1-7, wherein the second electronic device querying the server for a connection address of a third electronic device, comprising:
the second electronic equipment sends indication information to the server, wherein the indication information is used for indicating the second electronic equipment to pass the authentication of the authentication information;
and the server performs identity verification on the second electronic equipment, and after verification is passed, the server sends the connection address of the third electronic equipment to the second electronic equipment.
9. The method of claim 8, wherein the server authenticating the second electronic device comprises:
the server judges whether the second electronic equipment is related to the first account or not;
and when the second electronic equipment is determined to be related to the first account, the verification is passed, otherwise, the verification is not passed.
10. The method according to any one of claims 1 to 9, wherein,
the first electronic device is an electronic tag;
the second electronic equipment is provided with a reader; the reader is used for reading the authentication information in the electronic tag.
11. The method according to any one of claims 1 to 10, wherein,
the non-operating state includes a screen locking state, the operating state includes an unlocking state, or,
the non-operational state includes a sleep state and the operational state includes an awake state.
12. A device control method, applied to a second electronic device, comprising:
the second electronic equipment acquires authentication information from the first electronic equipment; the authentication information is generated by the server based on the first account;
the second electronic equipment authenticates the authentication information, and when the authentication is passed, the following steps are executed:
switching from the inactive state to the active state; and/or the number of the groups of groups,
inquiring a connection address of a third electronic device from the server, and establishing connection with the third electronic device based on the inquired connection address of the third electronic device, wherein the third electronic device is related to the first account.
13. The method of claim 12, wherein the authentication information is generated by the server encrypting the first account based on a first key, and wherein the authenticating the authentication information by the second electronic device comprises:
the second electronic equipment acquires a second key corresponding to the first key from the server;
the second electronic device decrypts the authentication information by using the second key; if the decryption is successful, the authentication is passed, and if the decryption is failed, the authentication is not passed.
14. The method of claim 12, wherein the authentication information is generated by the server encrypting the first account based on a first key, and wherein the authenticating the authentication information by the second electronic device comprises:
the second electronic equipment acquires a second key corresponding to the first key from the server;
the second electronic equipment decrypts the authentication information by using the second key to obtain the first account;
and when the second electronic equipment determines that the first account is related to the first electronic equipment, the authentication is passed, otherwise, the authentication is not passed.
15. The method of any of claims 12-14, wherein the first account number is associated with the second electronic device, comprising at least one of:
the current login account of the second electronic equipment is the first account;
and the activation account number of the second electronic equipment is the first account number.
16. The method according to any one of claims 12-15, wherein,
the first electronic device is an electronic tag;
the second electronic equipment is provided with a reader; the reader is used for reading the authentication information in the electronic tag.
17. The method according to any one of claims 12-16, wherein,
the non-operating state includes a screen locking state, the operating state includes an unlocking state, or,
the non-operational state includes a sleep state and the operational state includes an awake state.
18. A device control method, applied to a server, comprising:
the server generates authentication information based on the first account;
the server provides the authentication information to the first electronic equipment, wherein the authentication information is used for authentication of other electronic equipment;
and after the server determines that the authentication information is authenticated by the second electronic equipment, the server sends a connection address of a third electronic equipment to the second electronic equipment, wherein the third electronic equipment is related to the first account.
19. The method of claim 18, wherein the authentication information is generated by encrypting the first account number based on a first key, the method further comprising:
the server sends a second key corresponding to the first key to the second electronic device, wherein the second key is used for authenticating the authentication information.
20. The method of claim 18 or 19, further comprising, prior to the server providing the authentication information to the first electronic device:
the server receives application information of fourth electronic equipment, wherein the application information is used for applying authentication information corresponding to the first account;
the fourth electronic device and the second electronic device are the same device, or the fourth electronic device and the third electronic device are the same device; or, the fourth electronic device is a device related to the first account number and different from both the second electronic device and the third electronic device.
21. The method according to any one of claims 18-20, wherein the server sending the connection address of the third electronic device to the second electronic device after determining that the authentication information is authenticated by the second electronic device, comprises:
The server receives indication information sent by the second electronic equipment, wherein the indication information is used for indicating the second electronic equipment to pass the authentication of the authentication information;
and the server performs identity verification on the second electronic equipment, and after verification is passed, the server sends the connection address of the third electronic equipment to the second electronic equipment.
22. The method of claim 21, wherein the server authenticating the second electronic device comprises:
the server judges whether the second electronic equipment is related to the first account or not;
and when the second electronic equipment is determined to be related to the first account, the verification is passed, otherwise, the verification is not passed.
23. The method of any one of claims 18-22, wherein,
the first electronic device is an electronic tag;
the second electronic equipment is provided with a reader; the reader is used for reading the authentication information in the electronic tag.
24. A communication system, comprising: the first electronic device and the second electronic device and the server;
the first electronic equipment stores authentication information; the authentication information is used for authentication of other electronic equipment;
The second electronic device includes: a processor; a memory; wherein the memory stores one or more computer programs, the one or more computer programs comprising instructions that, when executed by the processor, cause the second electronic device to perform the steps of the second electronic device of the method of any of claims 1-11;
the server includes: a processor; a memory; wherein the memory stores one or more computer programs, the one or more computer programs comprising instructions that, when executed by the processor, cause the second electronic device to perform the steps of the server in the method of any of claims 1 to 11.
25. An electronic device, comprising:
a processor, a memory, and one or more programs;
wherein the one or more programs are stored in the memory, the one or more programs comprising instructions, which when executed by the processor, cause the electronic device to perform the method steps of any of claims 12-17 or 18-23.
26. A computer readable storage medium for storing a computer program which, when run on a computer, causes the computer to perform the method of any one of claims 1 to 23.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111246648.3A CN116028916A (en) | 2021-10-26 | 2021-10-26 | Equipment control method and related equipment |
PCT/CN2022/123965 WO2023071733A1 (en) | 2021-10-26 | 2022-10-09 | Device control method and related device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111246648.3A CN116028916A (en) | 2021-10-26 | 2021-10-26 | Equipment control method and related equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116028916A true CN116028916A (en) | 2023-04-28 |
Family
ID=86080098
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111246648.3A Pending CN116028916A (en) | 2021-10-26 | 2021-10-26 | Equipment control method and related equipment |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN116028916A (en) |
WO (1) | WO2023071733A1 (en) |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104661219B (en) * | 2015-01-15 | 2019-05-17 | 天地融科技股份有限公司 | A kind of means of communication of wireless device, wireless device and server |
EP3820077A4 (en) * | 2018-09-03 | 2021-06-09 | Huawei Technologies Co., Ltd. | Login method, token sending method, and device |
BR102018074209A2 (en) * | 2018-11-23 | 2020-06-02 | Samsung Eletrônica da Amazônia Ltda. | SAFE METHOD FOR CONFIGURING DEALS OF INTERNET OF THINGS (IOT) THROUGH WIRELESS TECHNOLOGIES |
AU2021351573A1 (en) * | 2020-09-30 | 2023-05-25 | Huawei Technologies Co., Ltd. | Cross-device authentication method and related apparatus |
-
2021
- 2021-10-26 CN CN202111246648.3A patent/CN116028916A/en active Pending
-
2022
- 2022-10-09 WO PCT/CN2022/123965 patent/WO2023071733A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2023071733A1 (en) | 2023-05-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111466099B (en) | Login method, token sending method, device and storage medium | |
CN113207122B (en) | Message transmission method and device | |
CN110752929B (en) | Application program processing method and related product | |
WO2021093855A1 (en) | Mobile device management method and device | |
US20230037251A1 (en) | Device sharing method and electronic device | |
CN113676879B (en) | Information sharing method, electronic equipment and system | |
EP4270184A1 (en) | Cross-device authentication method and electronic devices | |
CN114698149A (en) | Data transmission method and equipment | |
CN115391849A (en) | Method and device for storing ciphertext | |
EP4138462A1 (en) | Information sharing method, electronic devices and system | |
CN113645024A (en) | Key distribution method, system, device and readable storage medium and chip | |
CN113709024B (en) | Data transmission method, medium and electronic device thereof | |
CN112966297B (en) | Data protection method, system, medium and electronic device | |
CN114692094A (en) | Application program authority management method and electronic equipment | |
CN113556734B (en) | Authentication method and device | |
CN116340913A (en) | Login method, electronic equipment and computer readable storage medium | |
WO2023071733A1 (en) | Device control method and related device | |
CN114157412B (en) | Information verification method, electronic device and computer readable storage medium | |
CN113688368A (en) | A method for cross-device authentication | |
CN108683684B (en) | Method, device and system for logging in target instant messaging application | |
CN115599596B (en) | Data processing method, electronic device, system and storage medium | |
CN116049826B (en) | TPM-based data protection method, electronic equipment and storage medium | |
CN112905986B (en) | Authority authentication method, device and system and computer readable storage medium | |
US20240233933A1 (en) | Contact tracing method and related device | |
CN117376906A (en) | Communication method, communication system and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |