CN117668778A - Resource extension method, electronic device and storage medium - Google Patents

Resource extension method, electronic device and storage medium Download PDF

Info

Publication number
CN117668778A
CN117668778A CN202211045232.XA CN202211045232A CN117668778A CN 117668778 A CN117668778 A CN 117668778A CN 202211045232 A CN202211045232 A CN 202211045232A CN 117668778 A CN117668778 A CN 117668778A
Authority
CN
China
Prior art keywords
resource
equipment
cache data
supporting
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211045232.XA
Other languages
Chinese (zh)
Inventor
张腾
周艳
郭坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202211045232.XA priority Critical patent/CN117668778A/en
Publication of CN117668778A publication Critical patent/CN117668778A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a resource extension method, electronic equipment and a storage medium, wherein the method comprises the following steps: when the first device detects that the authorized application cannot be normally operated due to limited resources, connection is established with the second device; requesting resource information from the second device; determining a supporting device according to the resource information of the second device, wherein the supporting device provides the resource required by the first device; and running the authorization application according to the resource provided by the supporting equipment, wherein the authorization range of the authorization application is unchanged. The method provided by the application is helpful for solving the problem that the device cannot use the authorized application under the condition of limited resources.

Description

Resource extension method, electronic device and storage medium
Technical Field
The present disclosure relates to the field of communications, and in particular, to a resource extension method, an electronic device, and a storage medium.
Background
With the rapid development of communication technology, more and more electronic devices enrich the lives of people. In daily life, a user typically holds various types of electronic devices, such as a mobile phone, a tablet, a wearable device, a car set, and the like. On these electronic devices, some third party applications are typically installed.
For a vehicle, the third party application running above is typically a customized version specific to the vehicle, and the third party application typically runs in a manner that authorizes the vehicle, that is, an unauthorized third party application cannot run on the vehicle, or a verification error may occur when the third party operation authorized on the vehicle is copied to other electronic devices for running. Although the security and legitimacy of the third party application are ensured by the authorization mode, when the authorized third party application cannot run on the vehicle due to the reasons of limited resources, such as hardware damage of the vehicle or insufficient storage resources, the user cannot enjoy the service provided by the authorized third party application on the vehicle, so that the use experience of the user is reduced.
Disclosure of Invention
The application provides a resource extension method, electronic equipment and a storage medium, which are beneficial to solving the problem that equipment cannot use authorized application under the condition of limited resources.
In a first aspect, the present application provides a resource extension method applied to a first device, where the first device installs an authorized application, including:
When the first device detects that the authorized application cannot be normally operated due to limited resources, connection is established with a second device;
requesting resource information from the second device;
determining a supporting device according to the resource information of the second device, wherein the supporting device provides the resource required by the first device;
and running the authorized application according to the resource provided by the supporting equipment, wherein the authorized range of the authorized application is unchanged.
In the method, the main equipment requests the resource from the peripheral equipment under the condition of limited resource, so that the main equipment can smoothly run the authorized application under the condition of not changing the authorized range of the authorized application, and the use experience of a user can be improved.
In one possible implementation manner, the method further includes:
acquiring reference information, wherein the reference information is used for representing the state of the second equipment;
the determination supporting apparatus according to the resource information of the second apparatus includes:
and determining the supporting equipment according to the resource information of the second equipment and the reference information of the second equipment.
In the method, the support equipment is determined by combining the reference information of the second equipment, so that the support equipment with sufficient available resources and high resource quality can be more accurately selected, and the support efficiency can be further improved.
In one possible implementation, the resource limitation includes storage resource limitation and/or hardware resource limitation.
In one possible implementation, the support device includes a second device, and the storage resources and/or hardware resources required by the first device are provided by the second device.
In the present application, by using a single device as the support device, complexity in the support scenario can be reduced.
In one possible implementation manner, before the determining the supporting device according to the resource information of the second device, the method further includes:
and judging whether the normal operation of the supporting equipment is affected after the supporting equipment performs resource supporting.
In the method, whether the supporting equipment can normally operate after the resource supporting is judged, so that the problem that the supporting equipment cannot normally operate due to excessive resource supporting after the resource supporting can be avoided, and the operation jam of the supporting equipment can be avoided.
In one possible implementation manner, the supporting device includes a plurality of second devices, and the storage resources and/or hardware resources required by the first device are provided by the plurality of second devices.
In the method, the plurality of devices are used as the supporting devices, so that the resources required by the first device can be shared by the plurality of supporting devices, the situation that a single device shares excessive resources can be avoided, and the load of the supporting devices is reduced.
In one possible implementation manner, if the storage resources required by the first device are provided by the plurality of second devices, each second device serving as the supporting device provides a target proportion of the storage resources.
In the embodiment of the present application, by allocating the supported resources in proportion among the plurality of support devices, the situation allocation of the resource devices can be combined, so that the support efficiency can be improved.
In one possible implementation, the target proportion of storage resources is determined by available storage resources of each second device as the support device.
In the embodiment of the present invention, the support proportion of the support devices is determined by using the available storage resources, so that the rationality of the resources provided by each support device can be improved, and a large burden caused by excessive support of any support device can be avoided.
In one possible implementation manner, if the resource is limited to be a storage resource, the running the authorized application according to the resource provided by the support device includes:
sending cache data to the support equipment, wherein the cache data is data which is required to be cached for running the authorized application;
sending a query request to the support device;
And receiving data corresponding to the query request, and running the authorization application based on the data corresponding to the query request.
In one possible implementation manner, before the sending the cached data to the support device, the method further includes:
and carrying out index identification on the cache data.
In the method, index identification is carried out on the cache data, so that the data required at this time can be requested according to the index identification, the request efficiency can be improved, and the reduction of data transmission efficiency caused by the whole cache data request at each time is avoided.
In one possible implementation manner, if the number of the support devices is plural, the sending the cache data to the support device includes:
dividing the cache data;
and respectively sending the divided cache data to a plurality of supporting devices, wherein the divided cache data corresponds to the device identifiers of the supporting devices.
In the method, the resource utilization of the plurality of support devices can be effectively realized by sending the divided cache data to different support devices, so that the efficiency of the resource utilization can be improved.
In one possible implementation manner, the sending the cache data to the support device includes:
Encrypting the cache data to obtain encrypted cache data;
and sending the encrypted cache data to the supporting equipment.
In the method, the security of the authorized application can be improved by encrypting the cache data, and the authorized application is prevented from being stolen.
In one possible implementation manner, the method further includes:
and sending first equipment identity information to the supporting equipment, wherein the first identity information is used for representing the software and hardware identification of the first equipment.
In the method, the device and the system, the identity information of the main equipment is sent to the supporting equipment, so that verification can be passed when authorization verification is carried out on the data stored in the supporting equipment, and the influence on the use experience of a user due to the fact that the service terminal is caused by verification failure is avoided.
In a second aspect, the present application provides a resource extension method, applied to a second device, including:
establishing a connection with a first device;
receiving a resource information request sent by the first equipment, wherein the resource information request is sent when the first equipment resources are limited;
and sending the resource information of the second device to the first device.
In one possible implementation manner, the method further includes:
Establishing connection with other second devices;
and sending the resource information of the second equipment to the other second equipment.
In one possible implementation, the resource limitation includes storage resource limitation and/or hardware resource limitation.
In one possible implementation manner, if the second device is a supporting device, the supporting device is a device that provides resources required by the first device, and the method further includes:
the second device provides all the resources required by the first device; or (b)
The second device provides a portion of the resources required by the first device.
In one possible implementation manner, if the portion of the resources required by the second device to provide the first device is storage resources, the portion of the storage resources is determined by the maximum available resources of the second device.
In one possible implementation manner, the method further includes:
receiving cache data sent by the first equipment; or (b)
And receiving the encrypted cache data sent by the first equipment.
In one possible implementation manner, the method further includes:
receiving a query request sent by the first equipment;
sending the cache data corresponding to the query request to the first device; or (b)
And sending the encrypted cache data corresponding to the query request to the first device.
In one possible implementation manner, the method further includes:
receiving first equipment identity information sent by the first equipment, wherein the first equipment identity information is used for representing software and hardware identifiers of the first equipment;
binding the first equipment identity information with the cache data or the encrypted cache data.
In one possible implementation manner, the method further includes:
receiving an authorization check request sent by the first device, wherein the authorization check request is used for carrying out authorization check on the cache data or the encrypted cache data;
inquiring and obtaining first equipment identity information corresponding to the cache data or the encrypted cache data;
and sending the first equipment identity information to the first equipment.
In a third aspect, the present application provides a resource extension apparatus applied to a first device, where the first device installs an authorized application, including:
the connection module is used for establishing connection with the second equipment after the first equipment detects that the authorized application cannot be normally operated due to limited resources;
a request module, configured to request resource information from the second device;
A determining module, configured to determine a supporting device according to the resource information of the second device, where the supporting device provides the resource required by the first device;
and the operation module is used for operating the authorized application according to the resource provided by the supporting equipment, wherein the authorized range of the authorized application is unchanged.
In one possible implementation manner, the determining module is further configured to obtain reference information, where the reference information is used to characterize a state of the second device;
and determining the supporting equipment according to the resource information of the second equipment and the reference information of the second equipment.
In one possible implementation, the resource limitation includes storage resource limitation and/or hardware resource limitation.
In one possible implementation, the support device includes a second device, and the storage resources and/or hardware resources required by the first device are provided by the second device.
In one possible implementation manner, the resource expansion device further includes:
and the judging module is used for judging whether the normal operation of the supporting equipment is affected after the supporting equipment performs resource supporting.
In one possible implementation manner, the supporting device includes a plurality of second devices, and the storage resources and/or hardware resources required by the first device are provided by the plurality of second devices.
In one possible implementation manner, if the storage resources required by the first device are provided by the plurality of second devices, each second device serving as the supporting device provides a target proportion of the storage resources.
In one possible implementation, the target proportion of storage resources is determined by available storage resources of each second device as the support device.
In one possible implementation manner, the operation module is specifically configured to send cache data to the support device, where the cache data is data that is required to be cached for running the authorized application;
sending a query request to the support device;
and receiving data corresponding to the query request, and running the authorization application based on the data corresponding to the query request.
In one possible implementation manner, the resource expansion device further includes:
and the index module is used for carrying out index identification on the cache data.
In one possible implementation manner, the operation module is further configured to segment the cached data;
and respectively sending the divided cache data to a plurality of supporting devices, wherein the divided cache data corresponds to the device identifiers of the supporting devices.
In one possible implementation manner, the operation module is further configured to encrypt the cached data to obtain encrypted cached data;
and sending the encrypted cache data to the supporting equipment.
In one possible implementation manner, the operation module is further configured to send first equipment identity information to the supporting equipment, where the first identity information is used to characterize a software and hardware identifier of the first equipment.
In a fourth aspect, the present application provides a resource extension apparatus, applied to a second device, including:
the connection module is used for establishing connection with the first equipment;
the receiving module is used for receiving a resource information request sent by the first equipment, wherein the resource information request is sent when the first equipment resources are limited;
and the sending module is used for sending the resource information of the second device to the first device.
In one possible implementation manner, the connection module is further configured to establish a connection with another second device;
the sending module is further configured to send resource information of the second device to the other second device.
In one possible implementation, the resource limitation includes storage resource limitation and/or hardware resource limitation.
In one possible implementation manner, the resource expansion device further includes:
a providing module, configured to provide all resources required by the first device by the second device; or (b)
The second device provides a portion of the resources required by the first device.
In one possible implementation manner, if the portion of the resources required by the second device to provide the first device is storage resources, the portion of the storage resources is determined by the maximum available resources of the second device.
In one possible implementation manner, the receiving module is further configured to receive buffered data sent by the first device; or (b)
And receiving the encrypted cache data sent by the first equipment.
In one possible implementation manner, the receiving module is further configured to receive a query request sent by the first device;
the sending module is further configured to send cache data corresponding to the query request to the first device; or (b)
And sending the encrypted cache data corresponding to the query request to the first device.
In one possible implementation manner, the receiving module is further configured to receive first equipment identity information sent by the first equipment, where the first equipment identity information is used to characterize a software and hardware identifier of the first equipment;
Binding the first equipment identity information with the cache data or the encrypted cache data.
In one possible implementation manner, the receiving module is further configured to receive an authorization check request sent by the first device, where the authorization check request is used to perform authorization check on the cached data or encrypted cached data;
the sending module is further used for inquiring and obtaining first equipment identity information corresponding to the cache data or the encrypted cache data;
and sending the first equipment identity information to the first equipment.
In a fifth aspect, the present application provides a first device comprising: a processor and a memory for storing a computer program; the processor is configured to run the computer program to implement the resource extension method according to the first aspect.
In a sixth aspect, the present application provides a second apparatus comprising: a processor and a memory for storing a computer program; the processor is configured to run the computer program to implement the resource extension method according to the first aspect.
In a seventh aspect, the present application provides a computer readable storage medium having a computer program stored therein, which when run on a computer, causes the computer to implement the resource extension method according to the first or second aspect.
In an eighth aspect, the present application provides a computer program product comprising a computer program which, when executed by a computer, causes the computer to implement the resource extension method according to the first or second aspect.
In a possible implementation manner, the program in the eighth aspect may be stored in whole or in part on a storage medium packaged together with the processor, or may be stored in part or in whole on a memory not packaged together with the processor.
In a ninth aspect, the present application provides a resource extension system, where the resource extension system includes: a first device for performing any one of the methods provided in the first aspect and a second device for performing any one of the methods provided in the second aspect.
Drawings
Fig. 1 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
fig. 2 is an application scenario architecture diagram provided in an embodiment of the present application;
FIG. 3 is a flow chart illustrating an embodiment of a resource extension method provided herein;
FIG. 4 is a schematic diagram of a supporting device selection algorithm according to an embodiment of the present disclosure;
FIG. 5 is a flowchart illustrating another embodiment of a resource extension method provided in the present application;
FIG. 6 is a flowchart illustrating a resource extension method according to another embodiment of the present disclosure;
FIG. 7 is a schematic structural diagram of one embodiment of a resource extension device provided in the present application;
fig. 8 is a schematic structural diagram of another embodiment of a resource expansion device provided in the present application.
Detailed Description
In the embodiment of the present application, unless otherwise specified, the character "/" indicates that the front-rear association object is one or a relationship. For example, A/B may represent A or B. "and/or" describes an association relationship of an association object, meaning that three relationships may exist. For example, a and/or B may represent: a exists alone, A and B exist together, and B exists alone.
It should be noted that the terms "first," "second," and the like in the embodiments of the present application are used for distinguishing between description and not necessarily for indicating or implying a relative importance or number of features or characteristics that are indicated, nor does it imply a sequential order.
In the embodiments of the present application, "at least one" means one or more, and "a plurality" means two or more. Furthermore, "at least one item(s)" below, or the like, refers to any combination of these items, and may include any combination of single item(s) or plural items(s). For example, at least one (one) of A, B or C may represent: a, B, C, a and B, a and C, B and C, or A, B and C. Wherein each of A, B, C may itself be an element or a collection comprising one or more elements.
In this application embodiments, "exemplary," "in some embodiments," "in another embodiment," etc. are used to indicate an example, instance, or illustration. Any embodiment or design described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, the term use of an example is intended to present concepts in a concrete fashion.
"of", "corresponding" and "corresponding" in the embodiments of the present application may be sometimes used in combination, and it should be noted that the meaning to be expressed is consistent when the distinction is not emphasized. In the embodiments of the present application, communications and transmissions may sometimes be mixed, and it should be noted that, when the distinction is not emphasized, the meaning expressed is consistent. For example, a transmission may include sending and/or receiving, either nouns or verbs.
The equal to that relates to in this application embodiment can be with being greater than even using, is applicable to the technical scheme that adopts when being greater than, also can be with being less than even using, is applicable to the technical scheme that adopts when being less than. It should be noted that when the number is equal to or greater than the sum, the number cannot be smaller than the sum; when the value is equal to or smaller than that used together, the value is not larger than that used together.
For a vehicle, the third party application running above is typically a customized version specific to the vehicle, and the third party application typically runs in a manner that authorizes the vehicle, that is, an unauthorized third party application cannot run on the vehicle, or a verification error may occur when the third party operation authorized on the vehicle is copied to other electronic devices for running. Although the security and legitimacy of the third party application are ensured by the authorization mode, when the authorized third party application cannot run on the vehicle due to the reasons of limited resources, such as hardware damage of the vehicle or insufficient storage resources, the user cannot enjoy the service provided by the authorized third party application on the vehicle, so that the use experience of the user is reduced.
Based on the above problems, an embodiment of the present application provides a resource extension method, which is applied to an electronic device. The electronic device may be a terminal device, such as a cell phone, pad, car phone, smart screen, etc. A terminal device can also be called a User Equipment (UE), an access terminal, a subscriber unit, a subscriber station, a mobile station, a remote terminal, a mobile device, a User terminal, a wireless communication device, a User agent, or a User Equipment. The mobile device may be a Station (ST) in a WLAN, which may be a cellular telephone, a cordless telephone, a session initiation protocol (Session Initiation Protocol, SIP) phone, a wireless local loop (Wireless Local Loop, WLL) station, a personal digital assistant (Personal Digital Assistant, PDA) device, a handheld device with wireless communication capabilities, a computing device or other processing device connected to a wireless modem, an in-vehicle device, a car networking terminal, a computer, a laptop computer, a handheld communication device, a handheld computing device, a satellite radio, a wireless modem card, a television Set Top Box (STB), a customer premises equipment (customer premise equipment, CPE) and/or other devices for communicating over a wireless system as well as next generation communication systems, such as a mobile terminal in a 5G network or a mobile device in a future evolved public land mobile network (Public Land Mobile Network, PLMN) network, etc.
Fig. 1 first shows a schematic configuration of an electronic device 100.
The electronic device 100 may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (universal serial bus, USB) interface 130, a charge management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, a mobile communication module 150, a wireless communication module 160, an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, a sensor module 180, keys 190, a motor 191, an indicator 192, a camera 193, a display 194, and a subscriber identity module (subscriber identification module, SIM) card interface 195, etc. The sensor module 180 may include a pressure sensor 180A, a gyro sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, an ambient light sensor 180L, a bone conduction sensor 180M, and the like.
It should be understood that the illustrated structure of the embodiment of the present invention does not constitute a specific limitation on the electronic device 100. In other embodiments of the present application, electronic device 100 may include more or fewer components than shown, or certain components may be combined, or certain components may be split, or different arrangements of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
The processor 110 may include one or more processing units, such as: the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processor (graphics processing unit, GPU), an image signal processor (image signal processor, ISP), a controller, a video codec, a digital signal processor (digital signal processor, DSP), a baseband processor, and/or a neural network processor (neural-network processing unit, NPU), etc. Wherein the different processing units may be separate devices or may be integrated in one or more processors.
The controller can generate operation control signals according to the instruction operation codes and the time sequence signals to finish the control of instruction fetching and instruction execution.
A memory may also be provided in the processor 110 for storing instructions and data. In some embodiments, the memory in the processor 110 is a cache memory. The memory may hold instructions or data that the processor 110 has just used or recycled. If the processor 110 needs to reuse the instruction or data, it can be called directly from the memory. Repeated accesses are avoided and the latency of the processor 110 is reduced, thereby improving the efficiency of the system.
In some embodiments, the processor 110 may include one or more interfaces. The interfaces may include an integrated circuit (inter-integrated circuit, I2C) interface, an integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, a pulse code modulation (pulse code modulation, PCM) interface, a universal asynchronous receiver transmitter (universal asynchronous receiver/transmitter, UART) interface, a mobile industry processor interface (mobile industry processor interface, MIPI), a general-purpose input/output (GPIO) interface, a subscriber identity module (subscriber identity module, SIM) interface, and/or a universal serial bus (universal serial bus, USB) interface, among others.
The USB interface 130 is an interface conforming to the USB standard specification, and may specifically be a Mini USB interface, a Micro USB interface, a USB Type C interface, or the like. The USB interface 130 may be used to connect a charger to charge the electronic device 100, and may also be used to transfer data between the electronic device 100 and a peripheral device. And can also be used for connecting with a headset, and playing audio through the headset. The interface may also be used to connect other electronic devices, such as AR devices, etc.
It should be understood that the interfacing relationship between the modules illustrated in the embodiments of the present invention is only illustrative, and is not meant to limit the structure of the electronic device 100. In other embodiments of the present application, the electronic device 100 may also use different interfacing manners, or a combination of multiple interfacing manners in the foregoing embodiments.
The charge management module 140 is configured to receive a charge input from a charger. The charger can be a wireless charger or a wired charger. In some wired charging embodiments, the charge management module 140 may receive a charging input of a wired charger through the USB interface 130. In some wireless charging embodiments, the charge management module 140 may receive wireless charging input through a wireless charging coil of the electronic device 100. The charging management module 140 may also supply power to the electronic device through the power management module 141 while charging the battery 142.
The power management module 141 is used for connecting the battery 142, and the charge management module 140 and the processor 110. The power management module 141 receives input from the battery 142 and/or the charge management module 140 to power the processor 110, the internal memory 121, the display 194, the camera 193, the wireless communication module 160, and the like. The power management module 141 may also be configured to monitor battery capacity, battery cycle number, battery health (leakage, impedance) and other parameters. In other embodiments, the power management module 141 may also be provided in the processor 110. In other embodiments, the power management module 141 and the charge management module 140 may be disposed in the same device.
The wireless communication function of the electronic device 100 may be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, a modem processor, a baseband processor, and the like.
The antennas 1 and 2 are used for transmitting and receiving electromagnetic wave signals. Each antenna in the electronic device 100 may be used to cover a single or multiple communication bands. Different antennas may also be multiplexed to improve the utilization of the antennas. For example: the antenna 1 may be multiplexed into a diversity antenna of a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
The mobile communication module 150 may provide a solution for wireless communication including 2G/3G/4G/5G, etc., applied to the electronic device 100. The mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (low noise amplifier, LNA), etc. The mobile communication module 150 may receive electromagnetic waves from the antenna 1, perform processes such as filtering, amplifying, and the like on the received electromagnetic waves, and transmit the processed electromagnetic waves to the modem processor for demodulation. The mobile communication module 150 can amplify the signal modulated by the modem processor, and convert the signal into electromagnetic waves through the antenna 1 to radiate. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be disposed in the processor 110. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be provided in the same device as at least some of the modules of the processor 110.
The modem processor may include a modulator and a demodulator. The modulator is used for modulating the low-frequency baseband signal to be transmitted into a medium-high frequency signal. The demodulator is used for demodulating the received electromagnetic wave signal into a low-frequency baseband signal. The demodulator then transmits the demodulated low frequency baseband signal to the baseband processor for processing. The low frequency baseband signal is processed by the baseband processor and then transferred to the application processor. The application processor outputs sound signals through an audio device (not limited to the speaker 170A, the receiver 170B, etc.), or displays images or video through the display screen 194. In some embodiments, the modem processor may be a stand-alone device. In other embodiments, the modem processor may be provided in the same device as the mobile communication module 150 or other functional module, independent of the processor 110.
The wireless communication module 160 may provide solutions for wireless communication including wireless local area network (wireless local area networks, WLAN) (e.g., wireless fidelity (wireless fidelity, wi-Fi) network), bluetooth (BT), global navigation satellite system (global navigation satellite system, GNSS), frequency modulation (frequency modulation, FM), near field wireless communication technology (near field communication, NFC), infrared technology (IR), etc., as applied to the electronic device 100. The wireless communication module 160 may be one or more devices that integrate at least one communication processing module. The wireless communication module 160 receives electromagnetic waves via the antenna 2, modulates the electromagnetic wave signals, filters the electromagnetic wave signals, and transmits the processed signals to the processor 110. The wireless communication module 160 may also receive a signal to be transmitted from the processor 110, frequency modulate it, amplify it, and convert it to electromagnetic waves for radiation via the antenna 2.
In some embodiments, antenna 1 and mobile communication module 150 of electronic device 100 are coupled, and antenna 2 and wireless communication module 160 are coupled, such that electronic device 100 may communicate with a network and other devices through wireless communication techniques. The wireless communication techniques may include the Global System for Mobile communications (global system for mobile communications, GSM), general packet radio service (general packet radio service, GPRS), code division multiple access (code division multiple access, CDMA), wideband code division multiple access (wideband code division multiple access, WCDMA), time division code division multiple access (time-division code division multiple access, TD-SCDMA), long term evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC, FM, and/or IR techniques, among others. The GNSS may include a global satellite positioning system (global positioning system, GPS), a global navigation satellite system (global navigation satellite system, GLONASS), a beidou satellite navigation system (beidou navigation satellite system, BDS), a quasi zenith satellite system (quasi-zenith satellite system, QZSS) and/or a satellite based augmentation system (satellite based augmentation systems, SBAS).
The electronic device 100 implements display functions through a GPU, a display screen 194, an application processor, and the like. The GPU is a microprocessor for image processing, and is connected to the display 194 and the application processor. The GPU is used to perform mathematical and geometric calculations for graphics rendering. Processor 110 may include one or more GPUs that execute program instructions to generate or change display information.
The display screen 194 is used to display images, videos, and the like. The display 194 includes a display panel. The display panel may employ a liquid crystal display (liquid crystal display, LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode (AMOLED) or an active-matrix organic light-emitting diode (matrix organic light emitting diode), a flexible light-emitting diode (flex), a mini, a Micro led, a Micro-OLED, a quantum dot light-emitting diode (quantum dot light emitting diodes, QLED), or the like. In some embodiments, the electronic device 100 may include 1 or N display screens 194, N being a positive integer greater than 1.
The electronic device 100 may implement photographing functions through an ISP, a camera 193, a video codec, a GPU, a display screen 194, an application processor, and the like.
The ISP is used to process data fed back by the camera 193. For example, when photographing, the shutter is opened, light is transmitted to the camera photosensitive element through the lens, the optical signal is converted into an electric signal, and the camera photosensitive element transmits the electric signal to the ISP for processing and is converted into an image visible to naked eyes. ISP can also optimize the noise, brightness and skin color of the image. The ISP can also optimize parameters such as exposure, color temperature and the like of a shooting scene. In some embodiments, the ISP may be provided in the camera 193.
The camera 193 is used to capture still images or video. The object generates an optical image through the lens and projects the optical image onto the photosensitive element. The photosensitive element may be a charge coupled device (charge coupled device, CCD) or a Complementary Metal Oxide Semiconductor (CMOS) phototransistor. The photosensitive element converts the optical signal into an electrical signal, which is then transferred to the ISP to be converted into a digital image signal. The ISP outputs the digital image signal to the DSP for processing. The DSP converts the digital image signal into an image signal in a standard RGB, YUV, or the like format. In some embodiments, electronic device 100 may include 1 or N cameras 193, N being a positive integer greater than 1.
The digital signal processor is used for processing digital signals, and can process other digital signals besides digital image signals. For example, when the electronic device 100 selects a frequency bin, the digital signal processor is used to fourier transform the frequency bin energy, or the like.
Video codecs are used to compress or decompress digital video. The electronic device 100 may support one or more video codecs. In this way, the electronic device 100 may play or record video in a variety of encoding formats, such as: dynamic picture experts group (moving picture experts group, MPEG) 1, MPEG2, MPEG3, MPEG4, etc.
The NPU is a neural-network (NN) computing processor, and can rapidly process input information by referencing a biological neural network structure, for example, referencing a transmission mode between human brain neurons, and can also continuously perform self-learning. Applications such as intelligent awareness of the electronic device 100 may be implemented through the NPU, for example: image recognition, face recognition, speech recognition, text understanding, etc.
The external memory interface 120 may be used to connect an external memory card, such as a Micro SD card, to enable expansion of the memory capabilities of the electronic device 100. The external memory card communicates with the processor 110 through an external memory interface 120 to implement data storage functions. For example, files such as music, video, etc. are stored in an external memory card.
The internal memory 121 may be used to store computer executable program code including instructions. The internal memory 121 may include a storage program area and a storage data area. The storage program area may store an application program (such as a sound playing function, an image playing function, etc.) required for at least one function of the operating system, etc. The storage data area may store data created during use of the electronic device 100 (e.g., audio data, phonebook, etc.), and so on. In addition, the internal memory 121 may include a high-speed random access memory, and may further include a nonvolatile memory such as at least one magnetic disk storage device, a flash memory device, a universal flash memory (universal flash storage, UFS), and the like. The processor 110 performs various functional applications of the electronic device 100 and data processing by executing instructions stored in the internal memory 121 and/or instructions stored in a memory provided in the processor.
The electronic device 100 may implement audio functions through an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, an application processor, and the like. Such as music playing, recording, etc.
The audio module 170 is used to convert digital audio information into an analog audio signal output and also to convert an analog audio input into a digital audio signal. The audio module 170 may also be used to encode and decode audio signals. In some embodiments, the audio module 170 may be disposed in the processor 110, or a portion of the functional modules of the audio module 170 may be disposed in the processor 110.
The speaker 170A, also referred to as a "horn," is used to convert audio electrical signals into sound signals. The electronic device 100 may listen to music, or to hands-free conversations, through the speaker 170A.
A receiver 170B, also referred to as a "earpiece", is used to convert the audio electrical signal into a sound signal. When electronic device 100 is answering a telephone call or voice message, voice may be received by placing receiver 170B in close proximity to the human ear.
Microphone 170C, also referred to as a "microphone" or "microphone", is used to convert sound signals into electrical signals. When making a call or transmitting voice information, the user can sound near the microphone 170C through the mouth, inputting a sound signal to the microphone 170C. The electronic device 100 may be provided with at least one microphone 170C. In other embodiments, the electronic device 100 may be provided with two microphones 170C, and may implement a noise reduction function in addition to collecting sound signals. In other embodiments, the electronic device 100 may also be provided with three, four, or more microphones 170C to enable collection of sound signals, noise reduction, identification of sound sources, directional recording functions, etc.
The earphone interface 170D is used to connect a wired earphone. The headset interface 170D may be a USB interface 130 or a 3.5mm open mobile electronic device platform (open mobile terminal platform, OMTP) standard interface, a american cellular telecommunications industry association (cellular telecommunications industry association of the USA, CTIA) standard interface.
The keys 190 include a power-on key, a volume key, etc. The keys 190 may be mechanical keys. Or may be a touch key. The electronic device 100 may receive key inputs, generating key signal inputs related to user settings and function controls of the electronic device 100.
The motor 191 may generate a vibration cue. The motor 191 may be used for incoming call vibration alerting as well as for touch vibration feedback. For example, touch operations acting on different applications (e.g., photographing, audio playing, etc.) may correspond to different vibration feedback effects. The motor 191 may also correspond to different vibration feedback effects by touching different areas of the display screen 194. Different application scenarios (such as time reminding, receiving information, alarm clock, game, etc.) can also correspond to different vibration feedback effects. The touch vibration feedback effect may also support customization.
The indicator 192 may be an indicator light, may be used to indicate a state of charge, a change in charge, a message indicating a missed call, a notification, etc.
The SIM card interface 195 is used to connect a SIM card. The SIM card may be inserted into the SIM card interface 195, or removed from the SIM card interface 195 to enable contact and separation with the electronic device 100. The electronic device 100 may support 1 or N SIM card interfaces, N being a positive integer greater than 1. The SIM card interface 195 may support Nano SIM cards, micro SIM cards, and the like. The same SIM card interface 195 may be used to insert multiple cards simultaneously. The types of the plurality of cards may be the same or different. The SIM card interface 195 may also be compatible with different types of SIM cards. The SIM card interface 195 may also be compatible with external memory cards. The electronic device 100 interacts with the network through the SIM card to realize functions such as communication and data communication. In some embodiments, the electronic device 100 employs esims, i.e.: an embedded SIM card. The eSIM card can be embedded in the electronic device 100 and cannot be separated from the electronic device 100.
The resource extension method provided in the embodiment of the present application will now be described with reference to fig. 2 to 6.
Fig. 2 is an application scenario architecture diagram provided in an embodiment of the present application. As shown in fig. 2, the application scenario includes a first device, one or more second devices, and a server. The first device and the second device may be the electronic device 100 described above.
The first device may be a master device in which the authorization application may be pre-installed. Wherein the authorized application is a third party application with an authorized License (License). In some embodiments, the authorization application may be authorized for use by the first device in an authorized manner, in which case the authorization application may only be used legally by the first device, and if the program of the authorization application is copied to another device, the program may fail to operate properly due to a failure of the authorization check.
The second device may be a device other than the master device, for example, when the first device resources are limited, the second device may provide the corresponding resources as a support device.
The server may be a server device that provides services for the authorized application. By way of example, the server may be a video server, a music server, a map server, or the like. It will be appreciated that the types of servers described above are merely exemplary and are not limiting to embodiments of the present application, and in some embodiments, other types of servers are also possible.
The server can also perform authorization verification on the data of the authorized application, so that the rights and interests of the authorized application are prevented from being damaged by copying or embezzling the data of the authorized application.
The first device and the second device may be in a distributed environment. Taking the simon system as an example, the first device and the one or more second devices may be in a distributed environment by way of a soft bus, so that the first device and the one or more second devices may be discovered and interconnected with each other. Among other things, soft buses are understood to be a bus technology, and currently common buses may include buses such as peripheral component interconnect (Peripheral Component Interconnect, PCI) buses, control area network (Controller Area Network, CAN) buses, mobile industry processor interface (Mobile Industry Processor Interface, MIPI) buses, integrated circuit (Inter-Integrated Circuit, IIC) buses, and the like. The soft bus can also be called as a distributed soft bus, which is a communication base of distributed equipment such as a mobile phone, a tablet, an intelligent wearable device, an intelligent screen, a car machine and the like, and provides uniform distributed communication capability for interconnection and intercommunication between the equipment. The main functions of the soft bus may include: discovery, connection, networking/topology management, task bus, and data bus. Wherein the "find" function refers to searching whether there are related devices around; "connection" functionality refers to establishing a connection with a discovered device; the networking/topology management function refers to performing network topology management on discovered devices, such as forming a star network topology or forming a Mesh network topology; the task bus function refers to a path for transmitting small data amount information based on the established network topology; the "data bus" function refers to a path for transmitting information of a larger data amount. The first device and the one or more second devices may share the same system account, for example, a hong Monte System, and the first device and the one or more second devices may share the same Monte Account.
In some alternative embodiments, the first device and the second device may also be in a lan environment, where a connection manner of the lan may be a wired connection or a wireless connection, and embodiments of the present application are not limited in particular. The first device may communicate with one or more second devices when the first device is in the same local area network as the one or more second devices.
The embodiment of the application can be applied to a travel cabin scene, for example, a video application is pre-installed on a vehicle of a user, and the video application is authorized to be used. However, when the user downloads other applications on the car, the storage space of the car is insufficient, and thus the video application cannot be opened.
Alternatively, embodiments of the present application may also be applied in a home scenario, for example, where a user purchases a smart screen in which an authorized video application is pre-installed. However, when the user installs other applications in the smart screen, the storage space of the smart screen is insufficient, and thus the video application cannot be opened.
Or, the embodiment of the application may also be applied in the scenes of upgrading games, large tool software and system upgrading, for example, when a user needs to upgrade games, large tool software or system in electronic equipment, because the memory space occupied by the games, large tool software or system is larger, the buffer memory occupied during upgrading is larger, and therefore, when the memory space of the electronic equipment of the user is insufficient, the upgrading of the games, large tool software or system is affected.
Next, the resource expansion method provided in the present application is exemplified below by taking the first device as a car machine and the second device as a mobile phone. Wherein the first device has an authorized application installed therein. It should be understood that the embodiments of the present application are only exemplified by a first device and a second device, that is, one first device is supported by one second device, but the embodiments of the present application are not limited thereto, and in some embodiments, a plurality of second devices may also support one first device.
As shown in fig. 3, a flow chart of an embodiment of a resource expansion method provided in the present application specifically includes the following steps:
in step 301, when the first device detects that the authorized application cannot be normally operated due to limited resources, the second device is discovered.
In particular, the resource limitation may be a limitation of storage resources, for example, the storage space is insufficient, which may cause that the authorized application cannot be normally opened due to insufficient cache space when the first device opens the authorized application, so that the user cannot normally use the authorized application.
In some alternative embodiments, the resource limitation may also be a hardware resource limitation, which may be, for example, a hardware damage, thereby possibly resulting in an inability to open the authorized application normally, or an inability of the user to use the authorized application even after the authorized application is opened. Taking hardware as a camera as an example, the limited hardware resource can be the damage of the camera. If the camera is damaged, an authorized application such as a photographing application using the camera cannot normally run, and thus a user cannot normally use the authorized application such as the photographing application to perform operations such as photographing.
After the first device detects that the authorized application cannot be used due to limited resources, the first device can search to find whether the second device exists in the periphery, so that whether supportable devices exist can be determined. The second device may be discovered through a soft bus, or may be discovered through a local area network, which is not limited in this embodiment of the present application.
In step 302, a first device establishes a connection with a second device.
Specifically, when the first device discovers the second device, a connection request may be sent to the second device for establishing a connection with the second device.
It will be appreciated that if there are a plurality of second devices around the first device, the first device may also establish a connection with the plurality of second devices after discovering the plurality of second devices.
In some alternative embodiments, a connection may be established between the plurality of second devices, so that when any device between the plurality of second devices cannot use the authorized application due to limited resources, a supporting device may be found, and thus efficiency of resource expansion may be improved.
In step 303, the first device requests resource information from the second device.
Specifically, after the first device establishes a connection with the second device, a resource information request may be sent to the second device for requesting resource information. The resource information may include: and storing the resource information such as the space and hardware.
By way of example, the hardware resource information may include information of a hardware category, a hardware model, etc., and the hardware may include, for example: the hardware such as the camera, the gyroscope, the sensor and the like, and it is understood that the hardware may also comprise other types of hardware, which are not exemplified herein. The resource information of the second device is acquired by the first device, and the supporting device can be selected according to the resource information of the second device, so that the problem of limited resources of the first device can be effectively solved.
In some optional embodiments, the first device may also send the resource information to the second device, and acquire the resource information of the first device through the second device, and may select the first device as the supporting device when the resource of the second device is limited, so that the problem that the resource of the second device is limited may be effectively solved.
In some alternative embodiments, the first device may obtain the reference information in addition to requesting the resource information from the second device. The reference information is used to characterize the state of the second device. The reference information may be used as a reference factor for determining the support device among the one or more second devices.
The reference information may include, for example: the system account number of the second device, the connection mode of the first device and the second device, the transmission speed of the first device and the second device, the distance between the first device and the second device, the position of the second device, the system of the first device and the second device, the signal intensity of the second device and the like. It will be appreciated that the types of reference information described above are merely exemplary and are not limiting to embodiments of the present application, and that in some embodiments, more or fewer types of reference information may be included.
The system account may be an account for logging in the electronic device system, for example, a hong Monte System, and after the user logs in the hong Monte System using the hong Monte Account, the electronic device logged in by the user may be one distributed device in the hong Monte System, may be found by other distributed devices in the hong Monte System, or may be found by other distributed devices in the hong Monte System.
The connection mode may be a connection mode between devices. The connection mode can be wired or wireless. The wireless means may include soft bus, bluetooth, or wireless fidelity (Wireless Fidelity, wi-Fi), etc. It will be appreciated that the wireless means described above may also include other types of means, not to be limiting.
The transmission speed may be a data transmission speed. When the first device establishes a connection with the second device, a data test may be performed, for example, test data may be sent to the second device, so as to obtain a transmission speed between the first device and the second device.
The distance refers to a distance between devices, and may include a distance between a first device and one or more second devices, or may include a distance between the second devices.
The above-mentioned position refers to the relative position where the second device and the first device are located. In the travel cabin scene, whether the first device and the second device are in the same vehicle or different vehicles can be determined through signal strength judgment. It can be understood that the metal shell of the vehicle has a strong shielding effect on signals, if the first device and the second device are in a different-vehicle scene, after the first device and the second device are connected, the signal intensity of the second device detected by the first device has a cliff-like drop, and at this time, the signal intensity of the second device detected by the first device is weaker.
The system refers to the operating system used by the device. By way of example, the operating system may include systems such as android, hong, and the like.
The signal strength may be the strength of a wireless signal when the device is in a wireless connection. The wireless connection may include, for example, wi-Fi, bluetooth, etc.
In some alternative embodiments, the second device may also request resource information from other devices (e.g., the first device and the remaining second devices) and obtain reference information. The method for the second device to request the resource information and obtain the reference information may refer to the method for the first device to request the resource information and obtain the reference information, which is not described herein. The second equipment requests the resource information and acquires the reference information, so that when the second equipment cannot use the authorized application due to limited resources, the support equipment can be timely determined in other equipment according to the resource information and the reference information, and the efficiency of resource expansion can be improved.
The second device sends the resource information to the first device, step 304. And the corresponding first equipment receives the resource information sent by the second equipment.
In step 305, the first device determines, according to the resource information of the second device, a supporting device, where the supporting device provides the resources required by the first device.
Specifically, after the first device acquires the resource information of the second device, the supporting device may be determined according to the resource information of the second device.
For example, if the first device is limited in storage resources and the second device has free storage resources, the first device may use the second device as a support device and use the storage space of the second device as an assist, so that the first device may use the above-mentioned authorized application.
If the first device is limited in hardware resources, the second device can provide corresponding hardware, and the first device can use the second device as a supporting device and use the hardware of the second device as an auxiliary device, so that the first device can use the authorized application.
It will be appreciated that the number of support devices may be one or more. If the first device establishes a connection with a second device, the number of support devices may be one, that is, the first device may use the second device that establishes a connection with the first device as a support device; if the first device establishes a connection with a plurality of second devices, the number of support devices may be one or more, that is, the first device may select one or more second devices from the plurality of second devices that establish a connection with the first device as support devices.
In some alternative embodiments, in order not to affect the operation of the second device, in selecting the supporting device from the second device, the operation situation after the second device performs the supporting may also be considered.
For example, if the first device is limited in storage resources, after the second device supports the storage resources of the first device, the storage usage rate of the second device reaches a higher value, for example, reaches 100%, which may cause the second device to be blocked, and the first device may not use the second device as a support device.
Alternatively, if the first device is limited in hardware resources, for example, the camera of the first device is bad, and the second device is performing video call, at this time, if the second device supports the camera for the first device, the video call in the second device may fail, so in this scenario, the first device may not use the second device as a support device.
In some alternative embodiments, if a first device is connected to a plurality of second devices and the first device is limited to a type of resource, for example, limited storage resources or limited hardware resources, then one of the plurality of second devices may be selected as a support device. The method for selecting the support device from the plurality of second devices may be based on the reference information and the resource information of the second devices.
The selection algorithm of the support apparatus will now be exemplarily described with reference to fig. 4. Referring to fig. 4, after the first device obtains the reference information and the resource information of the plurality of second devices, each parameter and the resource information in the reference information of each second device may be scored, where the parameters may be parameters such as a system account number of the second device, a location of the second device, a connection manner of the first device and the second device, a transmission speed of the first device and the second device, a distance between the first device and the second device, a system of the first device and the second device, and a signal strength of the second device.
Taking the resource information of the second device as an example, if the hardware type and the hardware model provided by the second device are the same as the resources required by the first device, the score of the resource information of the second device is higher, and if the hardware type and the hardware model provided by the second device are not the same as the resources required by the first device, the score of the resource information of the second device is lower; and/or the more sufficient the storage resources provided by the second device, the higher the score of the resource information of the second device, and the less the storage resources available to the second device, the lower the score of the resource information of the second device.
Or taking the system account number of the second device as an example, if the system account number of the first device is the same as the system account number of any second device, the score of the system account number parameter of the second device is higher; if the system account numbers of the first device and any one of the second devices are different, the score of the system account number parameter of the second device is lower.
Or taking the position of the second device as an example, if the first device and any second device are determined to be in the same scene, the score of the position parameter of the second device is higher; if the first equipment and any second equipment are determined to be in the different-car scene, the score of the position parameter of the second equipment is lower.
Or taking the connection mode of the first device and the second device as an example, if the connection mode of the first device and any one of the second devices is wired connection, the score of the connection mode parameter of the second device is higher, and if the connection mode of the first device and any one of the second devices is wireless connection, the score of the connection mode parameter of the second device is lower.
Or taking the transmission speeds of the first device and the second device as an example, if the transmission speeds of the first device and any one of the second devices are higher, the score of the transmission speed parameter of the second device is higher; if the transmission speeds of the first device and any second device are slower, the score of the transmission speed parameter of the second device is lower.
Or taking the distance between the first device and the second device as an example, if the distance between the first device and the second device is relatively close, the score of the distance parameter of the second device is relatively high; if the first device is farther from the second device, the distance parameter of the second device has a lower score.
Or taking the signal intensity of the second device as an example, if the connection mode of the first device and any second device is wireless connection, the stronger the signal of the second device is, the higher the score of the signal intensity parameter of the second device is; the weaker the signal of the second device, the lower the score of the signal strength parameter of the second device.
Or taking the system of the first equipment and the second equipment as an example, if the system of the first equipment is the same as the system of any second equipment, the score of the system parameter of the second equipment is higher; if the system of the first device is not the same as the system of any second device, the score of the system parameter of the second device is lower.
Therefore, the first device can preferentially select the second device which has sufficient resources, is the same as the first device in hardware type and signal, is connected with the first device system account and/or is in wired connection with the first device, is close to the first device and/or is in a same-vehicle scene with the first device, is strong in signal and/or is fast in transmission speed with the first device from the plurality of second devices as the supporting device.
In addition, in addition to scoring the parameters in the resource information and the reference information, a corresponding weight coefficient may be set for each parameter in the resource information and the reference information, so that statistics may be performed on the resource information and the reference information in each second device. For example, the statistical manner may be that each parameter in the resource information and the reference information in each second device is weighted, so that a final score of each second device may be obtained statistically, and thus a supporting device may be determined according to the final score of each second device, for example, the supporting device may be the second device with the highest score.
In some alternative embodiments, if a first device is connected to a plurality of second devices and the first device is limited to one type of resource, e.g., storage resources are limited or hardware resources are limited, the plurality of second devices may be selected as support devices from the plurality of second devices, and the amount of support resources for each resource device may be determined.
For example, taking a storage resource as an example, if the storage resource required by the first device is larger, the storage resource available to one second device is insufficient to meet the storage resource required by the first device, at this time, the first device may select a plurality of second devices as supporting devices, so that the sum of the storage resources available to the plurality of second devices meets the storage resource required by the first device.
The first device selects a plurality of second devices as supporting devices in the following manner: the second devices with more abundant free resources may provide a larger proportion of memory resources and the second devices with less free resources may provide a smaller proportion of memory resources. When the second device is selected as a support device and the available resources of the support device are determined, a preset condition may be set, which may be used to characterize the maximum available resources of the second device. Taking the storage resource as an example, the preset condition of the second device may be 80%, that is, after the second device supports the storage resource of the first device, the occupancy rate of the storage resource in the second device cannot exceed 80%, so that the second device can be ensured to operate smoothly without being blocked. It will be appreciated that the above-described storage resource occupancy values of 80% are merely exemplary and are not limiting to embodiments of the present application, and in some embodiments, the above-described storage resource occupancy values may be other values.
For example, assuming that the first device needs 100M storage resources, first, if the idle storage resources of the second device a are sufficient, the available maximum storage resource is 50M, the second device a may be used as a supporting device, and it may be determined that the second device a supports 50M storage resources; secondly, if the idle storage resource of the second device B is the next time, the available maximum storage resource is 30M, the second device B may be used as a supporting device, and it may be determined that the second device B supports 30M storage resources; then, if the idle memory resource of the second device C is again 20M, the second device C may be used as a supporting device, and it may be determined that the second device C supports 20M memory resource. After the first device selects the second device a, the second device B, and the second device C as the supporting devices, the sum of the storage resources available to the second device a, the second device B, and the second device C is 100M, and the storage resources 100M required by the first device are already satisfied, at which point the first device may stop the selection of the supporting devices.
Alternatively, the manner in which the first device selects the plurality of second devices as the supporting devices may be: a higher priority second device may provide a greater proportion of storage resources and a lower priority second device may provide a lesser proportion of storage resources. The priority level may be determined by a support device selection algorithm as shown in fig. 4. For example, the second device with the higher final score has a higher priority and the second device with the lower final score has a lower priority.
For example, assuming that the first device needs 100M storage resources, first, if the priority of the second device a is higher, the available maximum storage resource is 20M, the second device a may be used as a supporting device, and it may be determined that the second device a supports 20M storage resources; secondly, if the priority of the second device B is 30M, the second device B may be used as a supporting device, and it may be determined that the second device B supports 30M storage resources; then, if the priority of the second device C is again the maximum available storage resource is 50M, the second device C may be used as a support device, and it may be determined that the second device C supports the 50M storage resource. After the first device selects the second device a, the second device B, and the second device C as the supporting devices, the sum of the storage resources available to the second device a, the second device B, and the second device C is 100M, and the storage resources 100M required by the first device are already satisfied, at which point the first device may stop the selection of the supporting devices.
In some alternative embodiments, if the first device is connected to a plurality of second devices and the first device is limited by multiple types of resources, for example, limited storage resources, limited hardware resources, and the like, the plurality of second devices may be selected as support devices from the plurality of second devices.
For example, assuming that the first device needs both storage resources and hardware resources, if the second device a may provide storage resources and the second device B may provide hardware resources, the first device may select the second device a and the second device B as support devices.
It may be appreciated that, when the first device is limited to multiple types of resources, if the available resources of one second device are not enough to meet any type of resources required by the first device, the resources of the multiple second devices may be selected to meet any type of resources required by the first device, where a manner of selecting the resources of the multiple second devices to meet any type of resources required by the first device may be specifically referred to the related description in the foregoing embodiments, which is not repeated herein.
In step 306, the first device runs the authorization application according to the resource provided by the support device, wherein the authorization scope of the authorization application is unchanged.
Specifically, after the first device determines the supporting device, the above-mentioned authorized application may be executed according to the resource provided by the supporting device, for example, the authorized application may be notified that the resource required by the authorized application is sufficient, and thus the first device may be caused to execute the authorized application. It can be understood that when the resource provided by the supporting device is used, the authorization range of the authorized application is not changed, so that the authorized application which cannot be operated due to the limited resource can be opened through the resource supported by the peripheral device under the condition that the authorization range is not changed, and the use experience of the user can be improved.
Taking the resource provided by the supporting device as a hardware resource as an example, after the first device determines the supporting device, the first device may send a resource usage request to the supporting device for using the hardware resource in the supporting device. Accordingly, after the support device receives the resource use request sent by the first device, the support device can open corresponding hardware in the support device for the authorized application of the first device to use, so that the authorized application can run smoothly.
Alternatively, taking the resource provided by the support device as the storage resource as an example, the first device may send the cache data to the support device after determining the support device. The cached data may be data that is required to be cached for opening the authorized application. Accordingly, the support device may store the buffered data in the support device after receiving the buffered data sent by the first device, so that the buffered data is sent to the first device when the first device requests the buffered data.
In the embodiment of the application, the main device requests the resource from the peripheral device under the condition of limited resource, so that the main device can smoothly run the authorized application under the condition of not changing the authorized range of the authorized application, and the use experience of a user can be improved.
The above exemplary resource expansion manner is illustrated by fig. 2 to fig. 4, and by the above resource expansion manner, an authorized application that cannot be normally operated due to resource limitation can be smoothly operated under the condition that the first device resource is limited. However, for a scenario in which storage resources are limited, in the process that the first device sends the cached data to the supporting device, in order to avoid that the cached data is used in infringement, the cached data may also be protected.
Fig. 5 is a flowchart of another embodiment of the resource extension method provided in the present application, and in order to protect the cached data, the step 304 may further include the following steps:
in step 501, a first device generates a key.
Specifically, in order to ensure the security of the cached data, the key may be randomly generated without being hacked by the support device. The key may be a symmetric key, that is, the support device does not store the key, so that the security of the cached data may be ensured. The first device may not only encrypt with the key, but also decrypt with the key.
It is understood that the encryption key may be in the form of a number, a character, a combination of numbers or characters, which is not particularly limited in the embodiments of the present application.
In step 502, the first device encrypts the buffered data using the key to obtain encrypted buffered data.
Specifically, after the first device generates the key, the cached data may be encrypted using the key, whereby the encrypted cached data may be obtained. The cache data may be data that cannot be stored in the first device due to insufficient storage resources.
It will be appreciated that the encryption algorithm for encrypting the buffered data may refer to existing encryption algorithms, such as: data encryption standard (Data Encryption Standard, DES), RC2, RC4, international data encryption algorithm (International Data Encryption Algorithm, IDEA), advanced encryption standard (Advanced Encryption Standard, AES), etc., to which the embodiments of the present application are not particularly limited.
In step 503, the first device sends the encrypted cache data to the support device. Correspondingly, the support device receives and stores the encrypted cache data sent by the first device.
Specifically, after the first device obtains the encrypted cache data, the encrypted cache data may be sent to the supporting device, so that the supporting device may store the encrypted cache data, and the storage space of the first device is not occupied.
Because the support device only stores the encrypted cache data and does not have the key generated by the first device, the encrypted cache data cannot be decrypted, so that the security of the cache data can be ensured, and the legal rights and interests of authorized applications can be ensured.
In step 504, the first device sends a query request to the support device. Correspondingly, the support device receives the query request sent by the first device.
Specifically, when the first device has a service requirement of the authorized application, a query request may be sent to the supporting device to obtain the corresponding cache data, so that the authorized application may run smoothly, and thus, the user may use the authorized application smoothly to enjoy the service provided by the authorized application. For example, taking a map application as an example, when a user needs to navigate, the first device may send a query request to the support device for requesting to cache data, so that the map application may smoothly navigate, thereby enabling the user to enjoy the navigation service.
It will be appreciated that the query request may be used to query all of the cached data, or may query some of the cached data, that is, the queried data may be based on business requirements. Therefore, in some optional embodiments, in step 503, the first device may further perform index identification on the cached data in the process of sending the encrypted cached data to the support device, so that the first device may be convenient to query the cached data.
In some optional embodiments, when the first device performs index identification on the cached data, if the cached data is stored in the plurality of support devices, the cached data may also be bound with a device identifier, where the device identifier is used to distinguish a device, so that the first device may quickly obtain corresponding data when requesting the data, and avoid a decrease in efficiency of querying the data caused by unclear storage devices of the cached data, thereby resulting in a decrease in operation efficiency of the authorized application.
In a specific implementation, the first device may establish a mapping table of the cache data and the supporting device, where the mapping table is used to characterize a mapping relationship between the cache data and the supporting device, and when the first device needs to request the cache data, the supporting device corresponding to the cache data to be queried may be queried according to the mapping table.
Table 1 is a mapping table of the cache data and the supporting device.
TABLE 1
Caching data index Device identification
Caching data 1 Support apparatus 1
Caching data 2 Support apparatus 2
Caching data 3 Support apparatus 2
Referring to table 1, taking the example of dividing the cache data into 3 parts of cache data 1, cache data 2 and cache data 3, if the first device stores the cache data 1 in the support device 1, the cache data 1 may be mapped with the support device 1; if the first device stores the cached data 2 in the supporting device 2, the cached data 2 may be mapped with the supporting device 2; if the first device stores the cache data 3 in the support device 2, the cache data 3 may be mapped with the support device 2. That is, one or more portions of the buffered data may be stored in a support device, which is not particularly limited in the embodiments of the present application.
Wherein, when storing the divided cache data in the supporting device, the cache data of a plurality of continuous parts can be stored in the same supporting device;
alternatively, the plurality of discontinuous portions of the buffered data may be stored in the same supporting device, which is not particularly limited in the embodiment of the present application.
It will be appreciated that the above-described manner of dividing the cache data to obtain the plurality of portions is merely illustrative and not limiting of embodiments of the present application, and in some embodiments the cache data may be divided into more or less portions.
In step 505, the support device sends, to the first device, encrypted cache data corresponding to the query request based on the query request. Correspondingly, the first device receives encrypted cache data corresponding to the query request sent by the supporting device.
Specifically, when the support device receives the query request, the encrypted cache data may be queried based on the query request, so that the encrypted cache data corresponding to the query request may be obtained, and after the encrypted cache data corresponding to the query request is obtained, the encrypted cache data corresponding to the query request may be sent to the first device.
It will be appreciated that the buffered data transmitted by the support device is also encrypted, thereby ensuring the security of the buffered data against theft or eavesdropping during transmission.
In step 506, the first device decrypts the encrypted cache data corresponding to the query request and uses the decrypted cache data.
Specifically, after the first device receives the encrypted cache data corresponding to the query request sent by the support device, the first device may decrypt the encrypted cache data corresponding to the query request, thereby obtaining the cache data, so that the authorized application may run smoothly.
After the first device obtains the cached data, the cached data and other related data are used to interact with the server, so that a specific process of enabling the user to enjoy the service provided by the authorized application can refer to an existing process, which is not described herein.
In the embodiment of the application, the buffer data is encrypted, so that the buffer data cannot be cracked and stolen after being sent to the supporting equipment, the security of the authorized application can be ensured, and the legal rights and interests of the authorized application are maintained.
The protection of cached data is illustrated above by way of example in fig. 5. Next, authorization verification by the support apparatus will be described with reference to fig. 6. The authorization may be verified during the process of providing services to the first device by the authorization application. Since the storage resource used by the cache data is provided by the supporting equipment, when the authorization verification is performed, the equipment information of the supporting equipment is acquired, so that the authorization verification is failed, the service of the authorized application is stopped, and the service experience of the user is affected.
Fig. 6 is a flowchart of still another embodiment of the resource extension method provided in the present application, and in order to avoid a verification failure in the authorization verification of the authorized application, the step 304 may further include the following steps:
in step 601, the first device sends first device identity information to the support device. Correspondingly, the supporting device receives the first device identity information sent by the first device.
Specifically, when the first device determines the supporting device, the first device identity information may also be sent to the supporting device. The first equipment identity information is used for identifying software and hardware identification information of the first equipment. The first device identity information may be, for example, a device serial number of the first device, or may be other types of identity identifiers, which is not limited in particular in the embodiments of the present application.
In the scenario where the limited resource is a storage resource, the manner in which the first device sends the first device identity information to the supporting device may be:
the first device sends cache data and first device identity information to the supporting device at the same time;
or after the first device sends the cache data to the supporting device, the first device sends the first device identity information to the supporting device;
Or after the first device sends the first device identity information to the supporting device, the first device sends the cache data to the supporting device.
The buffer data sent by the first device to the supporting device may be encrypted or unencrypted, which is not limited in the embodiment of the present application.
In step 602, the supporting device binds the encrypted cache data with the first device identity information.
Specifically, after the supporting device receives the encrypted cache data and the first device identity information, the encrypted cache data may be bound with the first device identity information.
It will be appreciated that the second device also has its own identity information, e.g. second device identity information. For convenience of explanation, the second equipment identity information of the supporting equipment may be referred to as supporting equipment identity information. Therefore, in the supporting device, the first device identity information and the supporting device identity information may be respectively bound with different data, for example, the encrypted cache data and the first device identity information are bound, and the data of the authorized application of the supporting device is bound with the supporting device identity information, so that the supporting device does not influence the authorization check of the encrypted cache data or the authorization check of the authorized application of the supporting device.
In a specific implementation, a mapping table of data and equipment identity information may be stored in the supporting equipment, where the mapping table is used to characterize a mapping relationship between the stored data and the equipment identity information.
Table 2 is a mapping table of data and device identity information.
TABLE 2
Data Device identity information
Encrypting cached data First device identity information
Data supporting self-authorizing applications of devices Supporting device identity information
Referring to table 2, the supporting device includes first equipment identity information and supporting equipment identity information, wherein the first equipment identity information and the supporting equipment identity information correspond to encrypted cache data and data of an authorized application of the supporting device, respectively, for example, the first equipment identity information corresponds to the encrypted cache data, and the supporting equipment identity information corresponds to the data of the authorized application of the supporting device. By the mapping relation, the supporting equipment identity information can be fed back when the data of the self-authorized application in the supporting equipment is subjected to authorization verification, and the first equipment identity information can be fed back when the encrypted cache data in the supporting equipment is subjected to authorization verification.
In step 603, the authorization application sends an authorization check request to the support device, for requesting authorization check of the encrypted cache data. Accordingly, the support device receives an authorization verification request sent by the authorization application.
Specifically, when the authorization application needs to perform authorization verification on any device, the device may be requested to acquire device identity information.
If the authorization application performs authorization verification on the data of the authorization application stored in the first device, the first device may feed back the first device identity information, and since the authorization application is only authorized for the first device, the authorization verification can be determined to pass through the authorization verification on the first device identity information.
It may be understood that the authorization verification may be performed on the first device identity information by the server, and a specific authorization verification manner may refer to an existing authorization verification procedure, which is not described herein.
If the authorization application performs authorization verification on the encrypted cache data stored in the support device, the authorization application may send an authorization verification request to the support device for requesting authorization verification on the encrypted cache data. By verifying the authorization of the encrypted cache data, the damage to the rights and interests of the authorized application caused by the theft of the data can be avoided.
The support device sends the first device identity information to the authorized application, step 604. Correspondingly, the authorization application receives the first equipment identity information sent by the supporting equipment.
Specifically, after receiving the authorization verification request, the support device may send corresponding device identity information based on the authorization verification request.
For example, if it is determined that the authorization check request is to perform authorization check on data of an authorized application of the support device itself, the support device may send support device identity information to the requested authorized application.
If it is determined that the authorization check request is for performing authorization check on the encrypted cache data sent by the first device, the support device may send first device identity information to the requested authorization application.
In step 605, the authorization application performs authorization verification based on the first device identity information sent by the support device.
Specifically, after the authorization application receives the first equipment identity information sent by the supporting equipment, authorization verification may be performed based on the first equipment identity information. Since the authorization application is installed in the first device and is only authorized to the first device. Therefore, when the authorization application performs authorization verification, only the first device identity information is transmitted to pass the authorization verification. In this scenario, the first device sends the first device identity information to the supporting device in advance, so that the supporting device can feed back the first device identity information instead of feeding back the supporting device identity information when receiving the authorization check request, thereby successfully completing authorization check and avoiding failure in checking caused by feeding back the supporting device identity information.
In the embodiment of the application, the first equipment sends the first equipment identity information to the supporting equipment, so that the authorization check of the encrypted cache data can be successfully completed when the authorization application performs the authorization check, the authorization application can be smoothly operated, the interruption of the authorization application service caused by the failure of the authorization check is avoided, and the use experience of a user can be improved.
Fig. 7 is a schematic structural diagram of an embodiment of a resource expansion device of the present application, as shown in fig. 7, where the resource expansion device 70 is applied to a first device, and the first device installs an authorized application, the resource expansion device 70 may include: a connection module 71, a request module 72, a determination module 73 and an operation module 74; wherein,
a connection module 71, configured to establish a connection with a second device after the first device detects that the authorized application cannot be normally operated due to limited resources;
a request module 72, configured to request resource information from the second device;
a determining module 73, configured to determine, according to the resource information of the second device, a supporting device, where the supporting device provides resources required by the first device;
an operation module 74, configured to operate the authorized application according to the resource provided by the support device, where an authorization scope of the authorized application is unchanged.
In one possible implementation manner, the determining module 73 is further configured to obtain reference information, where the reference information is used to characterize the state of the second device;
and determining the supporting equipment according to the resource information of the second equipment and the reference information of the second equipment.
In one possible implementation, the resource limitation includes storage resource limitation and/or hardware resource limitation.
In one possible implementation, the support device includes a second device, and the storage resources and/or hardware resources required by the first device are provided by the second device.
In one possible implementation manner, the resource expansion device 70 further includes:
and the judging module is used for judging whether the normal operation of the supporting equipment is affected after the supporting equipment performs resource supporting.
In one possible implementation manner, the supporting device includes a plurality of second devices, and the storage resources and/or hardware resources required by the first device are provided by the plurality of second devices.
In one possible implementation manner, if the storage resources required by the first device are provided by the plurality of second devices, each second device serving as the supporting device provides a target proportion of the storage resources.
In one possible implementation, the target proportion of storage resources is determined by available storage resources of each second device as the support device.
In one possible implementation manner, the operation module 74 is specifically configured to send cache data to the support device, where the cache data is data that is required to be cached for running the authorized application;
sending a query request to the support device;
and receiving data corresponding to the query request, and running the authorization application based on the data corresponding to the query request.
In one possible implementation manner, the resource expansion device 70 further includes:
and the index module is used for carrying out index identification on the cache data.
In one possible implementation manner, the operation module 74 is further configured to segment the cached data;
and respectively sending the divided cache data to a plurality of supporting devices, wherein the divided cache data corresponds to the device identifiers of the supporting devices.
In one possible implementation manner, the operation module 74 is further configured to encrypt the cached data to obtain encrypted cached data;
and sending the encrypted cache data to the supporting equipment.
In one possible implementation manner, the operation module 74 is further configured to send first device identity information to the supporting device, where the first device identity information is used to characterize a hardware and software identifier of the first device.
The resource extension device 70 provided in the embodiment shown in fig. 7 may be used to implement the technical solutions of the method embodiments shown in fig. 1-6 of the present application, and the implementation principle and technical effects may be further referred to in the related description of the method embodiments.
Fig. 8 is a schematic structural diagram of another embodiment of a resource expansion device of the present application, as shown in fig. 8, where the resource expansion device 80 is applied to a second apparatus, the resource expansion device 80 may include: a connection module 81, a reception module 82, and a transmission module 83; wherein,
a connection module 81 for establishing a connection with a first device;
a receiving module 82, configured to receive a resource information request sent by the first device, where the resource information request is sent when resources of the first device are limited;
a sending module 83, configured to send resource information of the second device to the first device.
In one possible implementation manner, the connection module 81 is further configured to establish a connection with another second device;
The sending module 83 is further configured to send resource information of the second device to the other second device.
In one possible implementation, the resource limitation includes storage resource limitation and/or hardware resource limitation.
In one possible implementation manner, the resource expansion device 80 further includes:
a providing module, configured to provide all resources required by the first device by the second device; or (b)
The second device provides a portion of the resources required by the first device.
In one possible implementation manner, if the portion of the resources required by the second device to provide the first device is storage resources, the portion of the storage resources is determined by the maximum available resources of the second device.
In one possible implementation manner, the receiving module 82 is further configured to receive buffered data sent by the first device; or (b)
And receiving the encrypted cache data sent by the first equipment.
In one possible implementation manner, the receiving module 82 is further configured to receive a query request sent by the first device;
the sending module 83 is further configured to send cache data corresponding to the query request to the first device; or (b)
And sending the encrypted cache data corresponding to the query request to the first device.
In one possible implementation manner, the receiving module 82 is further configured to receive first equipment identity information sent by the first equipment, where the first equipment identity information is used to characterize a software and hardware identifier of the first equipment;
binding the first equipment identity information with the cache data or the encrypted cache data.
In one possible implementation manner, the receiving module 82 is further configured to receive an authorization check request sent by the first device, where the authorization check request is used to perform authorization check on the cached data or encrypted cached data;
the sending module 83 is further configured to query and obtain first equipment identity information corresponding to the cached data or encrypted cached data;
and sending the first equipment identity information to the first equipment.
The resource extension device 80 provided in the embodiment shown in fig. 8 may be used to implement the technical solutions of the method embodiments shown in fig. 1-6 of the present application, and the implementation principle and technical effects may be further referred to in the related description of the method embodiments.
It should be understood that the division of the modules of the resource extension device shown in fig. 7 and fig. 8 is merely a division of a logic function, and may be fully or partially integrated into a physical entity or may be physically separated. And these modules may all be implemented in software in the form of calls by the processing element; or can be realized in hardware; it is also possible that part of the modules are implemented in the form of software called by the processing element and part of the modules are implemented in the form of hardware. For example, the detection module may be a separately established processing element or may be implemented integrated in a certain chip of the electronic device. The implementation of the other modules is similar. In addition, all or part of the modules can be integrated together or can be independently implemented. In implementation, each step of the above method or each module above may be implemented by an integrated logic circuit of hardware in a processor element or an instruction in a software form.
For example, the modules above may be one or more integrated circuits configured to implement the methods above, such as: one or more specific integrated circuits (Application Specific Integrated Circuit; hereinafter ASIC), or one or more microprocessors (Digital Signal Processor; hereinafter DSP), or one or more field programmable gate arrays (Field Programmable Gate Array; hereinafter FPGA), etc. For another example, the modules may be integrated together and implemented in the form of a System-On-a-Chip (SOC).
In the above embodiments, the processor may include, for example, a CPU, a DSP, a microcontroller, or a digital signal processor, and may further include a GPU, an embedded Neural Network Processor (NPU) and an image signal processor (Image Signal Processing; ISP), where the processor may further include a necessary hardware accelerator or a logic processing hardware circuit, such as an ASIC, or one or more integrated circuits for controlling the execution of the program in the technical solution of the present application, and so on. Further, the processor may have a function of operating one or more software programs, which may be stored in a storage medium.
Embodiments of the present application also provide a computer-readable storage medium having a computer program stored therein, which when run on a computer, causes the computer to perform the methods provided by the embodiments shown in fig. 1-6 of the present application.
Embodiments of the present application also provide a computer program product comprising a computer program which, when run on a computer, causes the computer to perform the methods provided by the embodiments shown in fig. 1-6 of the present application.
In the embodiments of the present application, "at least one" means one or more, and "a plurality" means two or more. "and/or", describes an association relation of association objects, and indicates that there may be three kinds of relations, for example, a and/or B, and may indicate that a alone exists, a and B together, and B alone exists. Wherein A, B may be singular or plural. The character "/" generally indicates that the context-dependent object is an "or" relationship. "at least one of the following" and the like means any combination of these items, including any combination of single or plural items. For example, at least one of a, b and c may represent: a, b, c, a and b, a and c, b and c or a and b and c, wherein a, b and c can be single or multiple.
Those of ordinary skill in the art will appreciate that the various elements and algorithm steps described in the embodiments disclosed herein can be implemented as a combination of electronic hardware, computer software, and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In several embodiments provided herein, any of the functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a Read-Only Memory (hereinafter referred to as ROM), a random access Memory (Random Access Memory) and various media capable of storing program codes such as a magnetic disk or an optical disk.
The foregoing is merely specific embodiments of the present application, and any person skilled in the art may easily conceive of changes or substitutions within the technical scope of the present application, which should be covered by the protection scope of the present application. The protection scope of the present application shall be subject to the protection scope of the claims.

Claims (25)

1. A method of resource extension, applied to a first device, the first device having an authorized application installed, the method comprising:
when the first device detects that the authorized application cannot be normally operated due to limited resources, connection is established with a second device;
requesting resource information from the second device;
determining a supporting device according to the resource information of the second device, wherein the supporting device provides the resource required by the first device;
and running the authorized application according to the resource provided by the supporting equipment, wherein the authorized range of the authorized application is unchanged.
2. The method according to claim 1, wherein the method further comprises:
acquiring reference information, wherein the reference information is used for representing the state of the second equipment;
the determination supporting apparatus according to the resource information of the second apparatus includes:
And determining the supporting equipment according to the resource information of the second equipment and the reference information of the second equipment.
3. The method according to claim 1 or 2, wherein the resource limitation comprises storage resource limitation and/or hardware resource limitation.
4. A method according to claim 3, wherein the support device comprises a second device, and wherein the storage resources and/or hardware resources required by the first device are provided by the second device.
5. The method of claim 4, wherein prior to determining a support device based on the resource information of the second device, the method further comprises:
and judging whether the normal operation of the supporting equipment is affected after the supporting equipment performs resource supporting.
6. A method according to claim 3, wherein the support device comprises a plurality of second devices, the storage resources and/or hardware resources required by the first device being provided by the plurality of second devices.
7. The method of claim 6, wherein each second device that is the support device provides a target proportion of the storage resources if the storage resources required by the first device are provided by the plurality of second devices.
8. The method of claim 7, wherein the target proportion of storage resources is determined by available storage resources of each second device that is the support device.
9. The method of claim 3, wherein if the resource limitation is a storage resource limitation, the running the authorized application according to the resource provided by the support device comprises:
sending cache data to the support equipment, wherein the cache data is data which is required to be cached for running the authorized application;
sending a query request to the support device;
and receiving data corresponding to the query request, and running the authorization application based on the data corresponding to the query request.
10. The method of claim 9, wherein prior to sending the cached data to the support device, the method further comprises:
and carrying out index identification on the cache data.
11. The method of claim 9, wherein if the number of support devices is plural, the sending the cache data to the support device comprises:
dividing the cache data;
and respectively sending the divided cache data to a plurality of supporting devices, wherein the divided cache data corresponds to the device identifiers of the supporting devices.
12. The method of any of claims 9-11, wherein the sending the cached data to the support device comprises:
encrypting the cache data to obtain encrypted cache data;
and sending the encrypted cache data to the supporting equipment.
13. The method according to claim 9, wherein the method further comprises:
and sending first equipment identity information to the supporting equipment, wherein the first identity information is used for representing the software and hardware identification of the first equipment.
14. A method of resource extension, for use with a second device, the method comprising:
establishing a connection with a first device;
receiving a resource information request sent by the first equipment, wherein the resource information request is sent when the first equipment resources are limited;
and sending the resource information of the second device to the first device.
15. The method of claim 14, wherein the method further comprises:
establishing connection with other second devices;
and sending the resource information of the second equipment to the other second equipment.
16. The method according to claim 14 or 15, wherein the resource limitation comprises storage resource limitation and/or hardware resource limitation.
17. The method of claim 16, wherein if the second device is a support device, the support device is a device that provides resources required by the first device, the method further comprising:
the second device provides all the resources required by the first device; or (b)
The second device provides a portion of the resources required by the first device.
18. The method of claim 17, wherein if the portion of the resources required by the second device to provide the first device are storage resources, the portion of the storage resources is determined by a maximum available resource of the second device.
19. The method of claim 17, wherein the method further comprises:
receiving cache data sent by the first equipment; or (b)
And receiving the encrypted cache data sent by the first equipment.
20. The method of claim 19, wherein the method further comprises:
receiving a query request sent by the first equipment;
sending the cache data corresponding to the query request to the first device; or (b)
And sending the encrypted cache data corresponding to the query request to the first device.
21. The method of claim 19, wherein the method further comprises:
receiving first equipment identity information sent by the first equipment, wherein the first equipment identity information is used for representing software and hardware identifiers of the first equipment;
binding the first equipment identity information with the cache data or the encrypted cache data.
22. The method of claim 21, wherein the method further comprises:
receiving an authorization check request sent by the first device, wherein the authorization check request is used for carrying out authorization check on the cache data or the encrypted cache data;
inquiring and obtaining first equipment identity information corresponding to the cache data or the encrypted cache data;
and sending the first equipment identity information to the first equipment.
23. A first device, comprising: a processor and a memory for storing a computer program; the processor is configured to run the computer program to implement the resource extension method of any of claims 1-13.
24. A second device, comprising: a processor and a memory for storing a computer program; the processor is configured to execute the computer program to implement the resource extension method of any of claims 14-22.
25. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program which, when run on a computer, implements the resource extension method according to any of claims 1-22.
CN202211045232.XA 2022-08-30 2022-08-30 Resource extension method, electronic device and storage medium Pending CN117668778A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211045232.XA CN117668778A (en) 2022-08-30 2022-08-30 Resource extension method, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211045232.XA CN117668778A (en) 2022-08-30 2022-08-30 Resource extension method, electronic device and storage medium

Publications (1)

Publication Number Publication Date
CN117668778A true CN117668778A (en) 2024-03-08

Family

ID=90068671

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211045232.XA Pending CN117668778A (en) 2022-08-30 2022-08-30 Resource extension method, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN117668778A (en)

Similar Documents

Publication Publication Date Title
WO2021051986A1 (en) Method for establishing connection between apparatuses, and electronic device
CN111373713B (en) Message transmission method and device
CN111628916B (en) Method for cooperation of intelligent sound box and electronic equipment
CN110730114B (en) Method and equipment for configuring network configuration information
CN111010693B (en) Method for providing wireless fidelity network access service and electronic equipment
EP3986008A1 (en) Method for using remote sim module, and electronic apparatus
CN113973398B (en) Wireless network connection method, electronic equipment and chip system
CN115119194A (en) Bluetooth connection method and related device
CN115567932B (en) Method, system and equipment for synchronizing key information
CN114895991B (en) Content sharing method and electronic equipment
CN111093110B (en) HTTP request transmission method and equipment
CN113645622B (en) Device authentication method, electronic device and storage medium
CN113126948A (en) Audio playing method and related equipment
CN114157412B (en) Information verification method, electronic device and computer readable storage medium
CN116133165A (en) Headset connection system, method, headset, electronic device, and readable storage medium
CN117668778A (en) Resource extension method, electronic device and storage medium
CN117425227A (en) Method and device for establishing session based on WiFi direct connection
CN116340913A (en) Login method, electronic equipment and computer readable storage medium
CN113678481B (en) Wireless audio system, audio communication method and equipment
CN113676440A (en) Authority negotiation method and device in communication process and electronic equipment
CN114845297B (en) Application program access method, electronic device and storage medium
CN115087134B (en) Bluetooth connection method and electronic equipment
CN113950048B (en) Connection establishment method, electronic device and storage medium
CN117009956A (en) Isolation method, isolation system and related device
CN117459241A (en) Login method, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination