CN116975836A - Application control method and device, electronic equipment and storage medium - Google Patents

Application control method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN116975836A
CN116975836A CN202210431010.5A CN202210431010A CN116975836A CN 116975836 A CN116975836 A CN 116975836A CN 202210431010 A CN202210431010 A CN 202210431010A CN 116975836 A CN116975836 A CN 116975836A
Authority
CN
China
Prior art keywords
application
target
connection
control
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210431010.5A
Other languages
Chinese (zh)
Inventor
李辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen TCL New Technology Co Ltd
Original Assignee
Shenzhen TCL New Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen TCL New Technology Co Ltd filed Critical Shenzhen TCL New Technology Co Ltd
Priority to CN202210431010.5A priority Critical patent/CN116975836A/en
Priority to PCT/CN2022/094777 priority patent/WO2023201835A1/en
Publication of CN116975836A publication Critical patent/CN116975836A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/542Event management; Broadcasting; Multicasting; Notifications

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Multimedia (AREA)
  • Stored Programmes (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the invention discloses an application control method, an application control device, electronic equipment and a storage medium; the embodiment of the invention can acquire the control application information of the control application to be connected with the target connection application in the local terminal; determining a target control application based on the control application information; sending security authentication information of the target connection application to the target control application through the target connection application; based on the security authentication information, establishing a secure communication connection between the target connection application and the target control application; controlling, by the target control application, the target connection application based on the secure communication connection; according to the embodiment of the invention, the target control application in the Internet of things equipment can be connected with the target connection application in the Internet of things equipment, and the target control application is used for controlling the target connection application, so that a user can conveniently control and operate the Internet of things equipment, and the user experience is improved.

Description

Application control method and device, electronic equipment and storage medium
Technical Field
The invention relates to the technical field of the internet of things, in particular to an application control method, an application control device, electronic equipment and a storage medium.
Background
Along with the rapid development of current technology, people are increasingly used to control home appliances in the internet of things system through mobile phones and other convenient intelligent devices, such as intelligent televisions, intelligent sound boxes and the like.
Currently, for internet of things devices such as smart televisions, core functions of the internet of things devices such as video playing, audio playing and the like are to integrate data or functions of part of application programs in the market into the internet of things devices. However, due to the limitation of factors such as development capability of the internet of things equipment manufacturer, many application programs do not support integrating functions or data into the equipment, so that the user cannot experience the functions of the application programs in a manner of directly controlling the internet of things equipment, and user experience is affected.
Disclosure of Invention
The embodiment of the invention provides an application control method, an application control device, electronic equipment and a storage medium, which can bind functions of various application programs of the Internet of things equipment through control application in the Internet of things equipment, so that a user can conveniently control and operate the Internet of things equipment, and user experience is improved.
The embodiment of the invention provides an application control method, which comprises the following steps:
acquiring control application information of a control application to be connected with a target connection application in a local terminal;
Determining a target control application based on the control application information;
sending security authentication information of the target connection application to the target control application through the target connection application;
based on the security authentication information, establishing a secure communication connection between the target connection application and the target control application;
and controlling the target connection application based on the secure communication connection through the target control application.
Correspondingly, an embodiment of the present invention provides an application control device, including:
the information acquisition unit is used for acquiring control application information of a control application to be connected with the target connection application in the local terminal;
an application determining unit configured to determine a target control application based on the control application information;
an information sending unit, configured to send, to the target control application, security authentication information of the target connection application through the target connection application;
a connection establishment unit configured to establish a secure communication connection between the target connection application and the target control application based on the secure authentication information;
and the application control unit is used for controlling the target connection application based on the secure communication connection through the target control application.
Optionally, the security authentication information includes a target connection application identifier and a security authentication identifier of the target connection application;
the connection establishing unit is used for acquiring connection application information of a connection application which can be connected with the target control application in the local terminal, wherein the connection application information comprises connection application identifiers of the connection applications;
determining connection application information of the target connection application according to each connection application identifier and the target connection application identifier;
and establishing the secure communication connection between the target connection application and the target control application based on the secure authentication identification of the target connection application and the connection application information.
Optionally, the connection establishment unit is configured to send, based on the security authentication information, security check information of the target control application to the target connection application through the target control application;
and based on the safety verification information, establishing the safety communication connection between the target connection application and the target control application.
Optionally, the connection establishment unit is configured to establish a connection to be verified between the target connection application and the target control application based on the security authentication information;
Acquiring a connection verification request of the target connection application, and sending security verification information of the target control application to the target connection application through the target control application according to the connection verification request;
and establishing the secure communication connection between the target connection application and the target control application based on the secure verification information and the connection to be verified.
Optionally, the connection establishment unit comprises a credibility checking unit and a connection establishment subunit;
the credibility checking unit is used for triggering the target connection application to perform credibility checking on the safety checking information based on the safety checking information;
the connection establishment subunit is configured to establish a secure communication connection between the target connection application and the target control application if the security check information passes the trust check.
Optionally, the credibility checking unit is configured to trigger the target connection application to send credibility verification information to the target control application based on the security verification information;
and carrying out credibility verification on the safety verification information by the target control application based on the credibility verification information.
Optionally, the application control unit is configured to receive, by using the target control application, a control instruction sent by the control device;
forwarding, by the target control application, the control instruction to the target connection application according to the secure connection;
and controlling the target connection application to execute the connection application operation indicated by the control instruction.
Correspondingly, the embodiment of the invention also provides electronic equipment, which comprises a memory and a processor; the memory stores an application program, and the processor is configured to run the application program in the memory, so as to execute steps in any one of the application control methods provided by the embodiments of the present invention.
Correspondingly, the embodiment of the invention also provides a computer readable storage medium, which stores a plurality of instructions, wherein the instructions are suitable for being loaded by a processor to execute the steps in any application control method provided by the embodiment of the invention.
In addition, the embodiment of the invention also provides a computer program product, which comprises a computer program or instructions, wherein the computer program or instructions realize the steps in any of the application control methods provided by the embodiment of the invention when being executed by a processor.
By adopting the scheme of the embodiment of the invention, the control application information of the control application to be connected with the target connection application in the local terminal can be obtained; determining a target control application based on the control application information; sending security authentication information of the target connection application to the target control application through the target connection application; based on the security authentication information, establishing a secure communication connection between the target connection application and the target control application; controlling, by the target control application, the target connection application based on the secure communication connection; in the embodiment of the invention, the target connection application and the target control application which are connected with each other are determined based on the control application information of the target control application, and the security authentication information for establishing the security communication connection is acquired, so that the target control application in the Internet of things equipment can be connected with the target connection application in the Internet of things equipment, the target control application is used for controlling the target connection application, the control operation of a user on the Internet of things equipment is facilitated, and the user experience is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the description of the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic view of a scenario of an application control method provided in an embodiment of the present invention;
FIG. 2 is a flow chart of an application control method provided by an embodiment of the present invention;
FIG. 3 is a schematic diagram of a connection relationship between a target control application and a connection application according to an embodiment of the present invention;
fig. 4 is a schematic diagram of a technical implementation of an application control method according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an application control device according to an embodiment of the present invention;
fig. 6 is another schematic structural diagram of an application control device according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to fall within the scope of the invention.
The embodiment of the invention provides an application control method, an application control device, electronic equipment and a computer readable storage medium. Specifically, the embodiment of the invention provides an application control method suitable for an application control device, and the application control device can be integrated in electronic equipment.
The electronic device may be a terminal or the like, including but not limited to a mobile terminal and a fixed terminal, for example, a mobile terminal including but not limited to a smart phone, a smart watch, a tablet computer, a notebook computer, a smart car, etc., wherein the fixed terminal includes but not limited to a desktop computer, a smart television, etc.
The electronic device may be a server, which may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server that provides cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDN (Content Delivery Network ), and basic cloud computing services such as big data and artificial intelligence platform, but is not limited thereto.
The application control method of the embodiment of the invention can be realized by the terminal or can be realized by the terminal and the server together.
The method for controlling the application is described below by taking a case where the terminal and the server together implement the method.
As shown in fig. 1, an application control system provided by an embodiment of the present invention includes a terminal 10, a server 20, and the like; the terminal 10 and the server 20 are connected to each other through a network, for example, a wired or wireless network connection.
The terminal 10 may be a terminal for executing application control, and configured to obtain control application information of a control application to be connected with a target connection application in a local terminal, determine a target control application based on the control application information, send security authentication information of the target connection application to the target control application through the target connection application, and establish a secure communication connection between the target connection application and the target control application based on the security authentication information.
The server 20 may be configured to receive a control instruction input by a user, and send the control instruction to the terminal 10.
The terminal 10 may receive the control instruction, and control the target connection application based on the secure communication connection through the target control application.
It will be appreciated that the user may also directly input the control command to the terminal 10, which is not limited in the embodiment of the present invention.
The following will describe in detail. The following description of the embodiments is not intended to limit the preferred embodiments.
The embodiments of the present invention will be described in terms of an application control device, which may be integrated in a terminal in particular.
As shown in fig. 2, the specific flow of the application control method of the present embodiment may be as follows:
201. and acquiring control application information of a control application to be connected with the target connection application in the local terminal.
The target connection application is an application program which needs to be connected with the control application. The application type of the target connection application may be a video application, a communication application, a music application, etc., and the embodiment of the present invention does not limit the application type of the target connection application.
Specifically, the determining of the target connection application may be automatically taking the application of the non-control application as the target connection application when the application of any non-control application in the detection terminal is started; alternatively, the target connection application may be determined according to a user selection operation of an application in the terminal.
In the embodiment of the invention, the target connection application and the control application are positioned in the same terminal, so that the target connection application is controlled by the target control application after the target control application is connected with the target connection application.
In some optional embodiments, the control application in the local may be determined through information in the local broadcast, so as to obtain control application information of the control application, that is, before step 201, the application control method provided by the embodiment of the present invention may further include:
Acquiring a local broadcast message;
and analyzing the local broadcast message, and determining a control application to be connected with the target connection application in the local of the terminal.
The local broadcast message may be a localhost broadcast, i.e., a broadcast performed locally at the terminal. For example, some applications in the terminal may send local broadcast messages, other applications may receive local broadcast messages sent by the applications, and so on.
For example, the local broadcast message may be received by the target connection application, and each control application may be found in the local broadcast message by the target connection application.
202. And determining a target control application based on the control application information.
The control application information may be information for describing the control application. For example, the control application information may include, but is not limited to, a vendor identification number, an application identification number, and/or an application name of the control application, etc.
In some examples, the target control application may be automatically determined. For example, in the target connection application, a control application that can only be connected with a control application corresponding to a certain application identification number may be set through preset connection information, and then the target control application may be determined according to the control application information and the preset connection information in the target connection application.
In other examples, the target control application may be selected by the user at his discretion. For example, when the terminal has a display page, a selection page may be displayed on the terminal for the user to select a target control application to connect with the target connection application. That is, the step of "determining the target control application based on the control application information" may specifically include:
based on the control application information, displaying a control application selection control in an application page of the target connection application;
and receiving a control application selection instruction input by a user, and determining a target control application connected with the target connection application according to the control application selection instruction.
The control application selection instruction may be automatically generated through operations such as touch control of a user, or may be input by the user through modes such as voice and text, which is not limited in the embodiment of the present invention.
For example, the target connection application may list, in the application page, control applications corresponding to all the control application information according to the control application information, and prompt the user to select which control application to connect with. And responding to the control application selection operation of the user, and taking the control application selected by the user as a target control application.
203. And sending the security authentication information of the target connection application to the target control application through the target connection application.
The target control application is a control application connected with the target connection application. It will be appreciated that there may be several control applications in the same terminal, as shown in fig. 3, and that each control application may also be connected to several applications.
For example, the connection of the same control application to a plurality of applications may be implemented by the following code:
specifically, when the target control application is determined by a manner determined by the user at his own discretion, step 203 may include:
and responding to the control application selection instruction, and sending the security authentication information of the target connection application to the target control application through the target connection application.
The security authentication information may include, but is not limited to, a target connection application identifier of the target connection application, a security authentication identifier, and the like. For example, the target connection application identifier may be a unique identifier of the target connection application, the security authentication identifier may be a unique password of the target connection application, such as a PIN code of the target connection application, or the like.
204. And based on the security authentication information, establishing a secure communication connection between the target connection application and the target control application.
The secure communication connection is a connection for communication between the target connection application and the target control application. For example, the target connection application may forward control instructions to the target control application over the secure communication connection, and so on.
In some alternative embodiments, the secure communication connection may be established directly through the target connection application, based on the secure authentication information. For example, the target connection application may directly attempt to establish a connection with each connection application according to the PIN code in the security authentication information, and use the successfully established connection as the secure communication connection between the target connection application and the target control application.
In other optional embodiments, the security authentication information may include a target connection application identifier and a security authentication identifier of the target connection application, and the target control application may obtain application information of the target connection application from the received application information of the plurality of connection applications according to the target connection application identifier. That is, the step of "establishing a secure communication connection between the target connection application and the target control application based on the secure authentication information" may specifically include:
Acquiring connection application information of a connection application which can be connected with the target control application in the local terminal, wherein the connection application information comprises connection application identifiers of the connection applications;
determining connection application information of the target connection application according to each connection application identifier and the target connection application identifier;
and establishing the secure communication connection between the target connection application and the target control application based on the secure authentication identification of the target connection application and the connection application information.
The connection application information is used for describing the connection application, and the connection application information may include, but is not limited to, a vendor identification number, an application name, and/or an application unique identification of the connection application.
The connection application that can be connected with the target control application in the local may be determined through the information in the local broadcast, so as to obtain control application information of the control application, that is, before step 201, the application control method provided by the embodiment of the present invention may further include:
acquiring a local broadcast message;
and analyzing the local broadcast message, and determining a connection application to be connected with the target control application in the local of the terminal.
For example, the local broadcast message may be received by the target control application, and each connection application may be found in the local broadcast message by the target control application.
Specifically, the connection application information of the target connection application may be determined from the connection application information of the plurality of connection applications by matching the identifiers, that is, the step of determining the connection application information of the target connection application according to each of the connection application identifiers and the target connection application identifier may include:
and matching the connection application identifiers with the target connection application identifiers, and taking connection application information corresponding to the connection application identifiers successfully matched with the target connection application identifiers as connection application information of the target connection application.
When the identifiers are matched, the two identifiers are identical as a condition of successful matching, or the identifiers sent by the target connection application each time may be changed according to a certain mapping rule due to different transmission time of the identifiers, at this time, the two identifiers may be matched with a preset mapping rule as a condition of successful matching, and so on.
In some alternative embodiments, it may be confirmed by the user whether a secure communication connection between the target connection application and the target control application is to be established. For example, when the terminal has a display page, the page may be confirmed on the terminal for the user to confirm that the secure communication connection between the target connection application and the target control application is established. That is, the step of "establishing a secure communication connection between the target connection application and the target control application based on the secure authentication identification of the target connection application and the connection application information" may include:
Based on the connection application information of the target connection application, a connection application confirmation control is displayed in an application page of the target control application so that the user can confirm to establish connection between the target control application and the target connection application;
and receiving a connection confirmation instruction input by a user, and establishing the secure communication connection between the target connection application and the target control application based on the secure authentication identifier of the target connection application.
The control application selection instruction may be automatically generated through operations such as touch control of a user, or may be input by the user through modes such as voice and text, which is not limited in the embodiment of the present invention.
For example, the target control application may display connection application information of the target connection application in an application page, prompting the user to confirm connection with the target connection application. And in response to a connection confirmation operation of a user, establishing a secure communication connection between the target connection application and the target control application.
It will be appreciated that when a connection is established, if the target connection application reads information having a certain public property, such as vendor Id, application Id, etc., of the target control application, and the validity of the information is not verified, the established communication connection may not be secure for the target connection application, and thus, the target connection application is provided with information having higher security in combination with the target control application for verification by the target connection application. That is, the step of "establishing a secure communication connection between the target connection application and the target control application based on the secure authentication information" may specifically include:
Based on the security authentication information, sending security verification information of the target control application to the target connection application through the target control application;
and based on the safety verification information, establishing the safety communication connection between the target connection application and the target control application.
The security check information may be information that the target control application has privacy, and may prove that the target control application is indeed the initiator in the connection establishment process. For example, the security verification information may include a public key of a device certificate of the target control application, or may include other information of the target control application besides the public key of the device certificate of the target control application, which is not limited by the embodiment of the present invention.
In some examples, the security check information may be sent directly by the target control application to the target connection application during the establishment of the secure communication connection. Alternatively, the security check information may be sent when the target connection application requests a validity check of the information. That is, the step of "transmitting, by the target control application, security check information of the target control application to the target connection application based on the security authentication information" may specifically include:
Establishing a connection to be verified between the target connection application and the target control application based on the security authentication information;
acquiring a connection verification request of the target connection application, and sending security verification information of the target control application to the target connection application through the target control application according to the connection verification request;
at this time, the step of "establishing a secure communication connection between the target connection application and the target control application based on the security check information" may specifically include:
and establishing the secure communication connection between the target connection application and the target control application based on the secure verification information and the connection to be verified.
The connection to be verified can be marked by the target connection application. For example, the target connection application may detect a connection currently established, and if the connection is not trusted, mark the connection as a connection to be verified.
In the actual application process, since the security of the connection is unknown to the target connection application, the target connection application generally performs the reliability check. That is, the step of "establishing a secure communication connection between the target connection application and the target control application based on the security check information" may specifically include:
Triggering the target connection application to perform credibility verification on the safety verification information based on the safety verification information;
and if the safety verification information passes the credibility verification, establishing the safety communication connection between the target connection application and the target control application.
The trust check may include, but is not limited to: whether the certificate belongs to a trusted, such as a trusted root certificate issue; whether the signature is correct; whether the random number is correct, etc.
When the security verification information passes the credibility verification, the connection to be verified can be marked as credible connection through the target connection application and used as the security communication connection between the target connection application and the target control application.
In some optional examples, the step of "triggering the target connection application to perform the trust check on the security check information based on the security check information" may specifically include:
triggering the target connection application to send credibility verification information to the target control application based on the safety verification information;
and carrying out credibility verification on the safety verification information by the target control application based on the credibility verification information.
The trust verification information may be a key of the target connection application, or the trust verification information may be a random number provided by the target connection application, or the like.
Specifically, the step of "performing, by the target control application, the trust verification on the security verification information based on the trust verification information" may include:
generating credibility feedback information based on the credibility verification information and control application information through the target control application, and sending the credibility feedback information to the target connection application;
and carrying out credibility verification on the credibility feedback information based on the credibility verification information through the target connection application.
The credibility feedback information can be obtained by mapping the credibility verification information and the control application information by a target control application through a preset feedback mapping rule.
For example, the target control application may encrypt its device information, such as vendor Id, application name, and random number, using a device certificate private key signature to obtain the trusted feedback information.
In some embodiments, when the target connection application performs the reliability check, it may be checked whether the information such as vendor Id, application name and the like in the reliability feedback information is consistent with the control application information of the target control application.
205. And controlling the target connection application based on the secure communication connection through the target control application.
In the embodiment of the invention, the target connection application completes the access authentication work with the target control application, and the subsequent control can be realized.
The IoT control end sends the control command to the target control application, and the target control application can wake up the target connection application when necessary, forward the command, and realize control.
In some optional examples, the step of "controlling, by the target control application, the target connection application based on the secure communication connection" may specifically include:
receiving a control instruction sent by control equipment through the target control application;
forwarding, by the target control application, the control instruction to the target connection application according to the secure connection;
and controlling the target connection application to execute the connection application operation indicated by the control instruction.
Taking the internet of things device as an example of intelligent electricity, a content providing application (target connection application) and a target control application in the intelligent television can establish a secure communication connection through a technical schematic diagram as shown in fig. 4.
Specifically, the establishment of the secure communication connection between the content providing application and the target control application in the smart television can be realized through the following codes.
@startuml
The actor "user" as user
participiant "target control application" as tv
Participant content providing application as cast
autonumber 1
tv- > tv: automatic start-up with tv system
user- > cast user launches content providing application
cast- > tv: localhost broadcast discovery target control application
tv- > cast, information of the target control application is returned
cast- > user, prompting user whether to pair with television
user- > cast user-determined pairing
cast- > tv, transmitting basic information of content providing application and PIN code
tv- > cast localhost broadcast discovery content providing application
cast- > tv, information of the content providing application is returned
tv- > user prompting the user whether to pair with the content providing application
user- > tv user-determined pairing
tv- > cast, use of PIN code to establish connection
cast- > cast, marked connection unreliable
tv- > cast, send device certificate public key
tv- > cast, send request check random number
cast- > tv return random number
tv- > cast, transmitting device information signed using device certificate private key and random number
cast- > cast, checking information and certificate, comparing information of target control application
cast- > cast, marking the connection to be verified as trusted
tv- > cast, sending control certificate or Token to perform subsequent control to complete configuration
@enduml
As can be seen from the above, the embodiment of the present invention can obtain the control application information of the control application to be connected with the target connection application in the local terminal; determining a target control application based on the control application information; sending security authentication information of the target connection application to the target control application through the target connection application; based on the security authentication information, establishing a secure communication connection between the target connection application and the target control application; controlling, by the target control application, the target connection application based on the secure communication connection; in the embodiment of the invention, the target connection application and the target control application which are connected with each other are determined based on the control application information of the target control application, and the security authentication information for establishing the security communication connection is acquired, so that the target control application in the Internet of things equipment can be connected with the target connection application in the Internet of things equipment, the target control application is used for controlling the target connection application, the control operation of a user on the Internet of things equipment is facilitated, and the user experience is improved.
In order to better implement the above method, correspondingly, the embodiment of the invention also provides an application control device.
Referring to fig. 5, the apparatus may include:
an information obtaining unit 501, configured to obtain control application information of a control application to be connected to a target connection application in a local terminal;
an application determining unit 502, which may be configured to determine a target control application based on the control application information;
an information transmitting unit 503, configured to transmit security authentication information of the target connection application to the target control application through the target connection application;
a connection establishment unit 504, configured to establish a secure communication connection between the target connection application and the target control application based on the secure authentication information;
the application control unit 505 may be configured to control, by the target control application, the target connection application based on the secure communication connection.
In some optional embodiments, the security authentication information may include a target connection application identifier and a security authentication identifier of the target connection application;
the connection establishing unit 504 may be configured to obtain connection application information of a connection application that may be connected to the target control application in the local area of the terminal, where the connection application information may include a connection application identifier of each connection application;
Determining connection application information of the target connection application according to each connection application identifier and the target connection application identifier;
and establishing the secure communication connection between the target connection application and the target control application based on the secure authentication identification of the target connection application and the connection application information.
In some optional embodiments, the connection establishment unit 504 may be configured to send, based on the security authentication information, security check information of the target control application to the target connection application through the target control application;
and based on the safety verification information, establishing the safety communication connection between the target connection application and the target control application.
In some optional embodiments, the connection establishing unit 504 may be configured to establish a connection to be verified between the target connection application and the target control application based on the security authentication information;
acquiring a connection verification request of the target connection application, and sending security verification information of the target control application to the target connection application through the target control application according to the connection verification request;
and establishing the secure communication connection between the target connection application and the target control application based on the secure verification information and the connection to be verified.
In some alternative embodiments, as shown in fig. 6, the connection establishment unit 504 may include a trust verification unit 5041 and a connection establishment subunit 5042;
the credibility checking unit 5041 may be configured to trigger the target connection application to perform credibility checking on the security check information based on the security check information;
the connection establishment subunit 5042 may be configured to establish a secure communication connection between the target connection application and the target control application if the security check information passes the trust check.
In some optional embodiments, the trust verification unit 5041 may be configured to trigger the target connection application to send trust verification information to the target control application based on the security verification information;
and carrying out credibility verification on the safety verification information by the target control application based on the credibility verification information.
In some alternative embodiments, the application control unit 505 may be configured to receive, by using the target control application, a control instruction sent by the control device;
forwarding, by the target control application, the control instruction to the target connection application according to the secure connection;
And controlling the target connection application to execute the connection application operation indicated by the control instruction.
From the above, the control application information of the control application to be connected with the target connection application in the local terminal can be obtained through the application control device; determining a target control application based on the control application information; sending security authentication information of the target connection application to the target control application through the target connection application; based on the security authentication information, establishing a secure communication connection between the target connection application and the target control application; controlling, by the target control application, the target connection application based on the secure communication connection; in the embodiment of the invention, the target connection application and the target control application which are connected with each other are determined based on the control application information of the target control application, and the security authentication information for establishing the security communication connection is acquired, so that the target control application in the Internet of things equipment can be connected with the target connection application in the Internet of things equipment, the target control application is used for controlling the target connection application, the control operation of a user on the Internet of things equipment is facilitated, and the user experience is improved.
In addition, the embodiment of the present invention further provides an electronic device, which may be a terminal or a server, as shown in fig. 7, and shows a schematic structural diagram of the electronic device according to the embodiment of the present invention, specifically:
the electronic device may include Radio Frequency (RF) circuitry 701, memory 702 including one or more computer-readable storage media, input unit 703, display unit 704, sensor 705, audio circuitry 706, wireless fidelity (WiFi, wireless Fidelity) module 707, processor 708 including one or more processing cores, and power supply 709. It will be appreciated by those skilled in the art that the electronic device structure shown in fig. 7 is not limiting of the electronic device and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components. Wherein:
the RF circuit 701 may be used for receiving and transmitting signals during a message or a call, and in particular, after receiving downlink information of a base station, the downlink information is processed by one or more processors 708; in addition, data relating to uplink is transmitted to the base station. Typically, RF circuitry 701 includes, but is not limited to, an antenna, at least one amplifier, a tuner, one or more oscillators, a subscriber identity module (SIM, subscriber Identity Module) card, a transceiver, a coupler, a low noise amplifier (LNA, low Noise Amplifier), a duplexer, and the like. In addition, the RF circuit 701 may also communicate with networks and other devices through wireless communication. The wireless communication may use any communication standard or protocol including, but not limited to, global system for mobile communications (GSM, global System of Mobile communication), general packet radio service (GPRS, general Packet Radio Service), code division multiple access (CDMA, code Division Multiple Access), wideband code division multiple access (WCDMA, wideband Code Division Multiple Access), long term evolution (LTE, long Term Evolution), email, short message service (SMS, short Messaging Service), and the like.
The memory 702 may be used to store software programs and modules, and the processor 708 may perform various functional applications and data processing by executing the software programs and modules stored in the memory 702. The memory 702 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program (such as a sound playing function, an image playing function, etc.) required for at least one function, and the like; the storage data area may store data created according to the use of the electronic device (such as audio data, phonebooks, etc.), and the like. In addition, the memory 702 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device. Accordingly, the memory 702 may also include a memory controller to provide access to the memory 702 by the processor 708 and the input unit 703.
The input unit 703 may be used to receive input numeric or character information and to generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control. In particular, in one particular embodiment, the input unit 703 may include a touch-sensitive surface, as well as other input devices. The touch-sensitive surface, also referred to as a touch display screen or a touch pad, may collect touch operations thereon or thereabout by a user (e.g., operations thereon or thereabout by a user using any suitable object or accessory such as a finger, stylus, etc.), and actuate the corresponding connection means according to a predetermined program. Alternatively, the touch-sensitive surface may comprise two parts, a touch detection device and a touch controller. The touch detection device detects the touch azimuth of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch detection device and converts it into touch point coordinates, which are then sent to the processor 708, and can receive commands from the processor 708 and execute them. In addition, touch sensitive surfaces may be implemented in a variety of types, such as resistive, capacitive, infrared, and surface acoustic waves. The input unit 703 may comprise other input devices in addition to the touch-sensitive surface. In particular, other input devices may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, mouse, joystick, etc.
The display unit 704 may be used to display information input by a user or information provided to a user and various graphical user interfaces of the electronic device, which may be composed of graphics, text, icons, video, and any combination thereof. The display unit 704 may include a display panel, which may be optionally configured in the form of a liquid crystal display (LCD, liquid Crystal Display), an Organic Light-Emitting Diode (OLED), or the like. Further, the touch-sensitive surface may overlay a display panel, and upon detection of a touch operation thereon or thereabout, the touch-sensitive surface is passed to the processor 708 to determine the type of touch event, and the processor 708 then provides a corresponding visual output on the display panel based on the type of touch event. Although in fig. 7 the touch sensitive surface and the display panel are implemented as two separate components for input and output functions, in some embodiments the touch sensitive surface may be integrated with the display panel to implement the input and output functions.
The electronic device may also include at least one sensor 705, such as a light sensor, a motion sensor, and other sensors. In particular, the light sensor may include an ambient light sensor that may adjust the brightness of the display panel according to the brightness of ambient light, and a proximity sensor that may turn off the display panel and/or backlight when the electronic device is moved to the ear. As one of the motion sensors, the gravity acceleration sensor can detect the acceleration in all directions (generally three axes), and can detect the gravity and the direction when the mobile phone is stationary, and can be used for applications of recognizing the gesture of the mobile phone (such as horizontal and vertical screen switching, related games, magnetometer gesture calibration), vibration recognition related functions (such as pedometer and knocking), and the like; other sensors such as gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc. that may also be configured with the electronic device are not described in detail herein.
Audio circuitry 706, speakers, and a microphone may provide an audio interface between the user and the electronic device. The audio circuit 706 may transmit the received electrical signal converted from audio data to a speaker, where it is converted into a sound signal for output; on the other hand, the microphone converts the collected sound signals into electrical signals, which are received by the audio circuit 706 and converted into audio data, which are processed by the audio data output processor 708 for transmission to, for example, another electronic device via the RF circuit 701, or which are output to the memory 702 for further processing. The audio circuit 706 may also include an ear bud jack to provide communication of the peripheral ear bud with the electronic device.
WiFi belongs to a short-distance wireless transmission technology, and the electronic equipment can help a user to send and receive emails, browse webpages, access streaming media and the like through the WiFi module 707, so that wireless broadband Internet access is provided for the user. Although fig. 7 shows a WiFi module 707, it is to be understood that it is not a necessary component of an electronic device, and may be omitted entirely as needed within a range that does not change the essence of the invention.
The processor 708 is the control center of the electronic device, utilizes various interfaces and lines to connect the various parts of the overall handset, performs various functions of the electronic device and processes data by running or executing software programs and/or modules stored in the memory 702, and invoking data stored in the memory 702. Optionally, the processor 708 may include one or more processing cores; preferably, the processor 708 may integrate an application processor that primarily handles operating systems, user interfaces, applications, etc., with a modem processor that primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 708.
The electronic device also includes a power supply 709 (e.g., a battery) for powering the various components, which may be logically connected to the processor 708 by a power management system, such as to perform functions such as managing charge, discharge, and power consumption by the power management system. The power supply 709 may also include one or more of any of a direct current or alternating current power supply, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
Although not shown, the electronic device may further include a camera, a bluetooth module, etc., which will not be described herein. In particular, in this embodiment, the processor 708 in the electronic device loads executable files corresponding to the processes of one or more application programs into the memory 702 according to the following instructions, and the processor 708 executes the application programs stored in the memory 702, so as to implement various functions as follows:
acquiring control application information of a control application to be connected with a target connection application in a local terminal;
determining a target control application based on the control application information;
sending security authentication information of the target connection application to the target control application through the target connection application;
Based on the security authentication information, establishing a secure communication connection between the target connection application and the target control application;
and controlling the target connection application based on the secure communication connection through the target control application.
Those of ordinary skill in the art will appreciate that all or a portion of the steps of the various methods of the above embodiments may be performed by instructions, or by instructions controlling associated hardware, which may be stored in a computer-readable storage medium and loaded and executed by a processor.
To this end, an embodiment of the present invention provides a computer readable storage medium having stored therein a plurality of instructions capable of being loaded by a processor to perform the steps of any one of the application control methods provided by the embodiments of the present invention. For example, the instructions may perform the steps of:
acquiring control application information of a control application to be connected with a target connection application in a local terminal;
determining a target control application based on the control application information;
sending security authentication information of the target connection application to the target control application through the target connection application;
Based on the security authentication information, establishing a secure communication connection between the target connection application and the target control application;
and controlling the target connection application based on the secure communication connection through the target control application.
The specific implementation of each operation above may be referred to the previous embodiments, and will not be described herein.
Wherein the computer-readable storage medium may comprise: read Only Memory (ROM), random access Memory (RAM, random Access Memory), magnetic or optical disk, and the like.
Because the instructions stored in the computer readable storage medium may execute the steps in any one of the application control methods provided in the embodiments of the present application, the beneficial effects that any one of the application control methods provided in the embodiments of the present application can be achieved, which are detailed in the previous embodiments and are not described herein.
According to one aspect of the present application, there is also provided a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the electronic device reads the computer instructions from the computer-readable storage medium and executes the computer instructions to cause the electronic device to perform the methods provided in the various alternative implementations of the embodiments described above.
The foregoing has described in detail the application control method, apparatus, electronic device and storage medium provided by the embodiments of the present invention, and specific examples have been applied to illustrate the principles and embodiments of the present invention, where the foregoing examples are only used to help understand the method and core idea of the present invention; meanwhile, as those skilled in the art will have variations in the specific embodiments and application scope in light of the ideas of the present invention, the present description should not be construed as limiting the present invention.

Claims (11)

1. An application control method, comprising:
acquiring control application information of a control application to be connected with a target connection application in a local terminal;
determining a target control application based on the control application information;
sending security authentication information of the target connection application to the target control application through the target connection application;
based on the security authentication information, establishing a secure communication connection between the target connection application and the target control application;
and controlling the target connection application based on the secure communication connection through the target control application.
2. The application control method according to claim 1, wherein the security authentication information includes a target connection application identification and a security authentication identification of the target connection application;
the establishing a secure communication connection between the target connection application and the target control application based on the secure authentication information includes:
acquiring connection application information of a connection application which can be connected with the target control application in the local terminal, wherein the connection application information comprises connection application identifiers of the connection applications;
determining connection application information of the target connection application according to each connection application identifier and the target connection application identifier;
and establishing the secure communication connection between the target connection application and the target control application based on the secure authentication identification of the target connection application and the connection application information.
3. The application control method according to any one of claims 1-2, characterized in that the establishing a secure communication connection between the target connection application and the target control application based on the secure authentication information comprises:
based on the security authentication information, sending security verification information of the target control application to the target connection application through the target control application;
And based on the safety verification information, establishing the safety communication connection between the target connection application and the target control application.
4. The application control method according to claim 3, wherein the transmitting, by the target control application, security check information of the target control application to the target connection application based on the security authentication information includes:
establishing a connection to be verified between the target connection application and the target control application based on the security authentication information;
acquiring a connection verification request of the target connection application, and sending security verification information of the target control application to the target connection application through the target control application according to the connection verification request;
the establishing a secure communication connection between the target connection application and the target control application based on the security check information includes:
and establishing the secure communication connection between the target connection application and the target control application based on the secure verification information and the connection to be verified.
5. The application control method according to claim 3, wherein the establishing a secure communication connection between the target connection application and the target control application based on the security check information includes:
Triggering the target connection application to perform credibility verification on the safety verification information based on the safety verification information;
and if the safety verification information passes the credibility verification, establishing the safety communication connection between the target connection application and the target control application.
6. The application control method according to claim 5, wherein triggering the target connection application to perform the trust check on the security check information based on the security check information includes:
triggering the target connection application to send credibility verification information to the target control application based on the safety verification information;
and carrying out credibility verification on the safety verification information by the target control application based on the credibility verification information.
7. The application control method according to any one of claims 1 to 6, characterized in that the controlling, by the target control application, the target connection application based on the secure communication connection includes:
receiving a control instruction sent by control equipment through the target control application;
forwarding, by the target control application, the control instruction to the target connection application according to the secure connection;
And controlling the target connection application to execute the connection application operation indicated by the control instruction.
8. An application control apparatus, characterized by comprising:
the information acquisition unit is used for acquiring control application information of a control application to be connected with the target connection application in the local terminal;
an application determining unit configured to determine a target control application based on the control application information;
an information sending unit, configured to send, to the target control application, security authentication information of the target connection application through the target connection application;
a connection establishment unit configured to establish a secure communication connection between the target connection application and the target control application based on the secure authentication information;
and the application control unit is used for controlling the target connection application based on the secure communication connection through the target control application.
9. An electronic device comprising a memory and a processor; the memory stores an application program, and the processor is configured to execute the application program in the memory to perform the steps in the application control method according to any one of claims 1 to 7.
10. A computer readable storage medium storing a plurality of instructions adapted to be loaded by a processor to perform the steps in the application control method of any one of claims 1 to 7.
11. A computer program product comprising a computer program or instructions which, when executed by a processor, implement the steps of the application control method of any one of claims 1 to 7.
CN202210431010.5A 2022-04-22 2022-04-22 Application control method and device, electronic equipment and storage medium Pending CN116975836A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202210431010.5A CN116975836A (en) 2022-04-22 2022-04-22 Application control method and device, electronic equipment and storage medium
PCT/CN2022/094777 WO2023201835A1 (en) 2022-04-22 2022-05-24 Application control method, apparatus, terminal device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210431010.5A CN116975836A (en) 2022-04-22 2022-04-22 Application control method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116975836A true CN116975836A (en) 2023-10-31

Family

ID=88418993

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210431010.5A Pending CN116975836A (en) 2022-04-22 2022-04-22 Application control method and device, electronic equipment and storage medium

Country Status (2)

Country Link
CN (1) CN116975836A (en)
WO (1) WO2023201835A1 (en)

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7131070B1 (en) * 1999-05-13 2006-10-31 Ricoh Company, Ltd. Application unit monitoring and reporting system and method
CN105487658A (en) * 2015-11-24 2016-04-13 小米科技有限责任公司 Application operation control method and apparatus
CN109144383A (en) * 2018-07-17 2019-01-04 努比亚技术有限公司 A kind of application control method, terminal and computer readable storage medium
CN112000258B (en) * 2019-05-27 2024-07-26 腾讯科技(深圳)有限公司 Operation control method and device, intelligent terminal and storage medium
CN111880845A (en) * 2020-07-24 2020-11-03 西安万像电子科技有限公司 Method, system and device for controlling target application
CN112181224A (en) * 2020-09-28 2021-01-05 腾讯科技(深圳)有限公司 Control method and device of target application, storage medium and electronic device

Also Published As

Publication number Publication date
WO2023201835A1 (en) 2023-10-26

Similar Documents

Publication Publication Date Title
US11057376B2 (en) Method, apparatus, and system for controlling intelligent device, and storage medium
CN104518875B (en) A kind of method that authentication and account obtain, mobile terminal
US10304461B2 (en) Remote electronic service requesting and processing method, server, and terminal
CN105024984B (en) Authority setting method, apparatus and system
WO2016150270A1 (en) Method and apparatus for processing group session message
WO2015090248A1 (en) Server overload protection method and device
US20180035296A1 (en) Screen unlocking method and apparatus, and storage medium
CN111478849B (en) Service access method, device and storage medium
CN109039989B (en) Address resolution protocol spoofing detection method, host and computer-readable storage medium
CN110418311B (en) Interconnection method and device based on multiple terminals and terminal
CN104917905B (en) Processing method, terminal and the server of Stranger Calls
CN107104930A (en) It is a kind of that the methods, devices and systems for checking authority are set
CN107995151B (en) Login verification method, device and system
CN115174418A (en) Communication environment safety early warning method and device, electronic equipment and storage medium
CN106020945B (en) Shortcut item adding method and device
CN109600340B (en) Operation authorization method, device, terminal and server
CN107592289B (en) Password setting method and device
CN117411655A (en) Equipment decryption control method and device, electronic equipment and storage medium
CN116980851A (en) Method and device for sharing subroutines between locomotives, electronic equipment and storage medium
CN108616873B (en) Data transmission method, information transmission method, device, mobile equipment and storage medium
CN107995150B (en) Identity verification method and device
CN107148011B (en) Method, device and system for executing target service
CN116975836A (en) Application control method and device, electronic equipment and storage medium
CN114189436B (en) Multi-cluster configuration deployment method and device, electronic equipment and storage medium
CN111182141B (en) Method, device and storage medium for acquiring state of terminal device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination