WO2022160977A1 - 一种会议接入方法及电子设备 - Google Patents
一种会议接入方法及电子设备 Download PDFInfo
- Publication number
- WO2022160977A1 WO2022160977A1 PCT/CN2021/137534 CN2021137534W WO2022160977A1 WO 2022160977 A1 WO2022160977 A1 WO 2022160977A1 CN 2021137534 W CN2021137534 W CN 2021137534W WO 2022160977 A1 WO2022160977 A1 WO 2022160977A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- electronic device
- distance
- conference
- antenna
- preset
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 296
- 230000004044 response Effects 0.000 claims abstract description 307
- 230000006854 communication Effects 0.000 claims abstract description 161
- 238000004891 communication Methods 0.000 claims abstract description 159
- 230000005540 biological transmission Effects 0.000 claims description 429
- 238000004590 computer program Methods 0.000 claims description 92
- 230000007246 mechanism Effects 0.000 claims description 74
- 230000008569 process Effects 0.000 description 44
- 230000000875 corresponding effect Effects 0.000 description 42
- 230000006870 function Effects 0.000 description 27
- 238000010586 diagram Methods 0.000 description 19
- 238000013459 approach Methods 0.000 description 17
- 238000004904 shortening Methods 0.000 description 14
- 238000010295 mobile communication Methods 0.000 description 13
- 238000012545 processing Methods 0.000 description 12
- 230000005855 radiation Effects 0.000 description 9
- 230000003993 interaction Effects 0.000 description 8
- 230000002452 interceptive effect Effects 0.000 description 5
- 230000009286 beneficial effect Effects 0.000 description 4
- 230000001413 cellular effect Effects 0.000 description 4
- 239000013307 optical fiber Substances 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000013461 design Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 239000003999 initiator Substances 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 238000013528 artificial neural network Methods 0.000 description 1
- 230000003190 augmentative effect Effects 0.000 description 1
- 239000003990 capacitor Substances 0.000 description 1
- 230000001276 controlling effect Effects 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 238000010348 incorporation Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 239000002184 metal Substances 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 239000004984 smart glass Substances 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/1813—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
- H04L12/1818—Conference organisation arrangements, e.g. handling schedules, setting up parameters needed by nodes to attend a conference, booking network resources, notifying involved parties
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/1813—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
- H04L12/1822—Conducting the conference, e.g. admission, detection, selection or grouping of participants, correlating users to one or more conference sessions, prioritising transmission
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/56—Arrangements for connecting several subscribers to a common circuit, i.e. affording conference facilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/56—Arrangements for connecting several subscribers to a common circuit, i.e. affording conference facilities
- H04M3/567—Multimedia conference systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/14—Systems for two-way working
- H04N7/141—Systems for two-way working between two video terminals, e.g. videophone
- H04N7/147—Communication arrangements, e.g. identifying the communication as a video-communication, intermediate storage of the signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/14—Systems for two-way working
- H04N7/15—Conference systems
- H04N7/155—Conference systems involving storage of or access to video conference sessions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/047—Key management, e.g. using generic bootstrapping architecture [GBA] without using a trusted network node as an anchor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/63—Location-dependent; Proximity-dependent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/71—Hardware identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2201/00—Electronic components, circuits, software, systems or apparatus used in telephone systems
- H04M2201/18—Comparators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/60—Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
- H04M2203/609—Secret communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/02—Details of telephonic subscriber devices including a Bluetooth interface
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/04—Details of telephonic subscriber devices including near field communication means, e.g. RFID
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Definitions
- the embodiments of the present application relate to the field of communication technologies, and in particular, to a conference access method and an electronic device.
- the above method has many operation steps; in addition, the user is prone to wrong selection, multiple selection or missing selection during the operation, which requires the user to re-select; all of the above lead to cumbersome operation for the user, inconvenient to use, time-consuming, and user experience. poor. How to enable users to quickly and conveniently add conference members and improve user experience during the above conference creation and conference process has become our goal.
- the present application provides a conference access method and an electronic device.
- the technical solution provided by the present application can reduce the operation steps of adding conference members during the above-mentioned conference creation and conference process, improve the inconvenience of use, shorten the time-consuming time, and improve the user experience, so that users can quickly and conveniently add conference members.
- a first electronic device is provided.
- the first electronic device is installed with a first conference application, and the first electronic device does not access the conference through the first conference application.
- the first electronic device includes: a SIM card; a processor; a memory;
- the transmission distance is a first distance, and the first distance is greater than a preset first safety distance;
- the second antenna, the transmission distance of the second antenna is a second distance, and the second distance is less than or equal to the preset first safety distance;
- the computer a program wherein the computer program is stored on the memory, and when the computer program is executed by the processor, causes the first electronic device to perform the following steps: receiving the first input; in response to the first input, broadcasting the first message through the first antenna;
- the first message includes a meeting joining request and an identification of the first electronic device;
- the first response message is received within a fourth distance from the second electronic device;
- the first response message includes a random key and an identification of the second electronic device;
- the first response message is associated with the first
- the first electronic device can switch the first antenna and the second antenna, so that the first electronic device is close to or close to the second electronic device serving as the chairman of the conference based on the ultra-short-distance communication method. Touch to access the current conference, thereby simplifying the process of accessing the conference by the first electronic device, shortening the time for the first electronic device to access the conference, and improving user experience in the scenario of a conference chairman.
- the first input is a user input and the second input is a user input.
- the first input is a plurality of user inputs
- the second input is a plurality of user inputs.
- each of the first input and the second input may include multiple user inputs, and multiple forms of user input.
- the first electronic device further includes a wireless communication module, and both the first antenna and the second antenna are connected to the wireless communication module. That is, in this embodiment of the present application, the first antenna and the second antenna are connected to the same wireless communication module.
- the wireless communication module includes a Wi-Fi chip, a Bluetooth chip, or a Zigbee chip; the first antenna and the second antenna are connected to the Wi-Fi chip, the Bluetooth chip, and the Bluetooth chip.
- the chip and Zigbee chip One of the chip and Zigbee chip.
- it can be considered that the first antenna and the second antenna are connected to the same chip.
- a first electronic device is provided.
- the first electronic device is installed with a first conference application, the first electronic device does not access the conference through the first conference application, and the first electronic device includes: a SIM card; a processor; a memory; The distance is a first distance, and the first distance is greater than a preset first safety distance; the second antenna, the transmission distance of the second antenna is a second distance, and the second distance is less than or equal to the preset first safety distance; and a computer program , wherein the computer program is stored on the memory, and when the computer program is executed by the processor, causes the first electronic device to perform the following steps: receiving the first input; in response to the first input, broadcasting the first message through the second antenna; A message includes a meeting joining request and an identification of the first electronic device; a first response message is received within a fourth distance from the second electronic device; the first response message includes a random key and an identification of the second electronic device; A response message is associated with the first message; the second electronic device accesses the conference through the
- the first electronic device can switch the second antenna and the first antenna, so that the first electronic device is close to or close to the second electronic device serving as the chairman of the conference based on the ultra-short-distance communication method. Touch to access the current conference, thereby simplifying the process of accessing the conference by the first electronic device, shortening the time for the first electronic device to access the conference, and improving user experience in the scenario of a conference chairman.
- the SIM card includes at least one of an embedded SIM card, a card-type SIM card, and an eSIM card.
- a first electronic device is provided.
- the first electronic device is installed with a first conference application, the first electronic device does not access the conference through the first conference application, and the first electronic device includes: a SIM card; a processor; a memory;
- the transmission distance under one transmission power is the first distance, and the first distance is greater than the preset first safety distance;
- the transmission distance of the first antenna under the second transmission power is the second distance, and the second distance is less than or equal to the preset first distance a first safe distance;
- the first transmit power is greater than the second transmit power; and a computer program, wherein the computer program is stored on the memory and, when executed by the processor, causes the first electronic device to perform the steps of: receiving the first input ; in response to the first input, through the first antenna under the first transmit power, broadcast the first message; the first message includes the meeting joining request and the identification of the first electronic device; within a fourth distance from the second electronic device, The first response message is received; the first response message includes the random key and the identifier of the second
- the first electronic device can adjust the transmit power of the first antenna, so that the first electronic device can approach or touch the second electronic device that is the chairman of the conference based on the ultra-short-distance communication method.
- One touch is used to access the current conference, thereby simplifying the process for the first electronic device to access the conference, shortening the time for the first electronic device to access the conference, and improving user experience in a scenario where there is a conference chairman.
- the first electronic device further includes a wireless communication module, the wireless communication module includes a Wi-Fi chip, a Bluetooth chip or a Zigbee chip; the first antenna is connected to the Wi-Fi chip, the Bluetooth chip and the Zigbee chip one of.
- a first electronic device is provided.
- the first electronic device is installed with a first conference application, the first electronic device does not access the conference through the first conference application, and the first electronic device includes: a SIM card; a processor; a memory;
- the transmission distance under one transmission power is the first distance, and the first distance is greater than the preset first safety distance;
- the transmission distance of the first antenna under the second transmission power is the second distance, and the second distance is less than or equal to the preset first distance a first safe distance;
- the first transmit power is greater than the second transmit power; and a computer program, wherein the computer program is stored on the memory and, when executed by the processor, causes the first electronic device to perform the steps of: receiving the first input ;
- the first message includes the meeting joining request and the identification of the first electronic device; within a fourth distance from the second electronic device,
- the first response message is received;
- the first response message includes the random key and the identifier of the second electronic device;
- the first electronic device can adjust the transmit power of the first antenna, so that the first electronic device can approach or touch the second electronic device that is the chairman of the conference based on the ultra-short-distance communication method.
- One touch is used to access the current conference, thereby simplifying the process for the first electronic device to access the conference, shortening the time for the first electronic device to access the conference, and improving user experience in a scenario where there is a conference chairman.
- the first antenna in the technical solutions of the first aspect and the second aspect is replaced with the first antenna under the first transmission power
- the second antenna is replaced with the first antenna under the second transmission power
- different transmission distances may be achieved by using different antennas, and different transmission distances may also be achieved by adjusting the transmission power of the same antenna.
- a first electronic device is provided.
- the first electronic device is installed with a first conference application, the first electronic device does not access the conference through the first conference application, and the first electronic device includes: a SIM card; a processor; a memory; The distance is a first distance, and the first distance is greater than a preset first safety distance; the second antenna, the transmission distance of the second antenna is a second distance, and the second distance is less than or equal to the preset first safety distance; and a computer program , wherein the computer program is stored on the memory, and when the computer program is executed by the processor, the first electronic device performs the following steps: receiving the first input; in response to the first input, generating a random key, and broadcasting through the second antenna.
- the first message includes a meeting joining request, an identifier of the first electronic device and a random key; the first response message is received within a fourth distance from the second electronic device; the first response message includes encrypted information; The first response message is associated with the first message; the second electronic device accesses the conference through the first conference application; decrypts the encrypted information using the random key, and obtains the conference ID and conference password of the conference; The server of the conference application sends a second message; the second message includes information after encrypting the conference ID, the conference password and the account of the first electronic device on the first conference application through the encryption mechanism of the first conference application; receiving the first conference The calling phone of the application; after the calling phone is connected, join the conference; wherein, the fourth distance is less than or equal to a preset second safety distance; the preset second safety distance is the exchange of secrets between the second electronic device and the first electronic device A safe distance for information; the preset first safe distance is a safe distance for the first electronic device and the second electronic device to exchange secret information.
- the first electronic device can switch the first antenna and the second antenna, so that the first electronic device can be close to or close to the second electronic device in the conference based on the ultra-short-range communication method. Touch to access the current conference, thereby simplifying the process of accessing the conference by the first electronic device, shortening the time for the first electronic device to access the conference, and improving user experience in a scenario without a conference chairman.
- a first electronic device is provided.
- the first electronic device is installed with a first conference application, the first electronic device does not access the conference through the first conference application, and the first electronic device includes: a SIM card; a processor; a memory;
- the transmission distance under one transmission power is the first distance, and the first distance is greater than the preset first safety distance;
- the transmission distance of the first antenna under the second transmission power is the second distance, and the second distance is less than or equal to the preset first distance a first safe distance;
- the first transmit power is greater than the second transmit power; and a computer program, wherein the computer program is stored on the memory and, when executed by the processor, causes the first electronic device to perform the steps of: receiving the first input ;
- a random key is generated, and the first message is broadcast through the first antenna under the second transmission power;
- the first message includes a meeting joining request, the identification of the first electronic device and the random key;
- the first response message is received within a fourth distance of the second electronic device;
- the first electronic device can adjust the transmit power of the first antenna, so that the first electronic device can approach or touch the second electronic device in the conference based on the ultra-short-range communication method.
- One touch is used to access the current conference, thereby simplifying the process for the first electronic device to access the conference, shortening the time for the first electronic device to access the conference, and improving user experience in a scenario without a conference chairman.
- the sixth aspect can be obtained by replacing the first antenna in the technical solution of the fifth aspect with the first antenna under the first transmission power, and the second antenna with the first antenna under the second transmission power. technical solution.
- a second electronic device is provided.
- the second electronic device is installed with a first conference application, the second electronic device accesses the conference through the first conference application, and the account of the second electronic device on the first conference application is the conference chairperson during the conference, and the second electronic device includes : processor; memory; the third antenna, the transmission distance of the third antenna is the third distance, and the third distance is greater than the preset second safe distance; the fourth antenna, the transmission distance of the fourth antenna is the fourth distance, the fourth distance The distance is less than or equal to a preset second safety distance; and a computer program, wherein the computer program is stored on the memory, and when the computer program is executed by the processor, causes the second electronic device to perform the following steps: at a distance from the first electronic device; Within a distance, a first message from the first electronic device is received; the first message includes a meeting joining request and an identification of the first electronic device; in response to the first message, a random key is generated; through the fourth antenna, the first message is sent a response message; the
- the second electronic device as the conference chairman, can approach or touch other electronic devices that want to access the conference based on the ultra-short-range communication method, so that other electronic devices can access the current conference in which the second electronic device is the conference chairman. , thereby simplifying the process for other electronic devices to access the conference, shortening the time for other electronic devices to access the conference, and improving user experience in a scenario with a conference chairperson.
- the third input is a user input.
- the second electronic device further includes a wireless communication module, and both the third antenna and the fourth antenna are connected to the wireless communication module. That is, in this embodiment of the present application, the third antenna and the fourth antenna are connected to the same wireless communication module.
- the wireless communication module includes a Wi-Fi chip, a Bluetooth chip or a Zigbee chip; the third antenna and the fourth antenna are both connected to the Wi-Fi chip, One of the Bluetooth chip and Zigbee chip.
- the third antenna and the fourth antenna are connected to the same chip.
- a second electronic device is provided.
- the second electronic device is installed with a first conference application, the second electronic device accesses the conference through the first conference application, and the account of the second electronic device on the first conference application is the conference chairman in the conference;
- the second electronic device includes : processor; memory; the third antenna, the transmission distance of the third antenna is the third distance, and the third distance is greater than the preset second safe distance;
- the fourth antenna the transmission distance of the fourth antenna is the fourth distance, the fourth distance
- the distance is less than or equal to a preset second safety distance; and a computer program, wherein the computer program is stored on the memory, and when the computer program is executed by the processor, causes the second electronic device to perform the following steps: at a distance from the first electronic device; Within two distances, the first message from the first electronic device is received; the first message includes a conference joining request and the identification of the first electronic device; in response to the first message, a random key is generated; through the fourth antenna, the first message is sent A response message; the first response
- the second electronic device as the conference chairman, can approach or touch other electronic devices that want to access the conference based on the ultra-short-range communication method, so that other electronic devices can access the current conference in which the second electronic device is the conference chairman. , thereby simplifying the process for other electronic devices to access the conference, shortening the time for other electronic devices to access the conference, and improving user experience in a scenario with a conference chairperson.
- a second electronic device is provided.
- the second electronic device is installed with a first conference application, the second electronic device accesses the conference through the first conference application, and the account of the second electronic device on the first conference application is the conference chairman in the conference;
- the second electronic device includes : processor; memory; third antenna, the transmission distance of the third antenna under the third transmission power is the third distance, and the third distance is greater than the preset second safe distance; the transmission of the third antenna under the fourth transmission power
- the distance is a fourth distance, and the fourth distance is less than or equal to a preset second safe distance; the third transmission power is greater than the fourth transmission power; and a computer program, wherein the computer program is stored on the memory, when the computer program is executed by the processor , so that the second electronic device performs the following steps: within a first distance from the first electronic device, receiving a first message from the first electronic device; the first message includes a meeting joining request and an identifier of the first electronic device; responding to Based on the first message, a random key is generated;
- the first electronic device on the first conference application receives a third input for indicating agreeing to join the conference; sending a third message to the server of the first conference application through the third antenna under the third transmit power;
- the three messages include the encrypted SIM card number of the first electronic device, the account of the first electronic device on the first conference application, the account of the second electronic device on the first conference application, and the conference The information after the conference identification; wherein, the second distance is less than or equal to the preset first safety distance; the first distance is greater than the preset first safety distance; the preset first safety distance is the first electronic device and the second electronic device.
- a safe distance for devices to exchange secret information; the preset second safe distance is a safe distance for the first electronic device and the second electronic device to exchange secret information.
- the second electronic device as the conference chairman, can approach or touch other electronic devices that want to access the conference based on the ultra-short-range communication method, so that other electronic devices can access the current conference in which the second electronic device is the conference chairman. , thereby simplifying the process for other electronic devices to access the conference, shortening the time for other electronic devices to access the conference, and improving user experience in a scenario with a conference chairperson.
- the second electronic device further includes a wireless communication module, the wireless communication module includes a Wi-Fi chip, a Bluetooth chip or a Zigbee chip; the third antenna is connected to the Wi-Fi chip, the Bluetooth chip and the Zigbee chip one of the.
- a tenth aspect provides a second electronic device.
- the second electronic device is installed with a first conference application, the second electronic device accesses the conference through the first conference application, and the account of the second electronic device on the first conference application is the conference chairman in the conference;
- the second electronic device includes : processor; memory; third antenna, the transmission distance of the third antenna under the third transmission power is the third distance, and the third distance is greater than the preset second safe distance; the transmission of the third antenna under the fourth transmission power
- the distance is a fourth distance, and the fourth distance is less than or equal to a preset second safe distance; the third transmission power is greater than the fourth transmission power; and a computer program, wherein the computer program is stored on the memory, when the computer program is executed by the processor , so that the second electronic device performs the following steps: within a second distance from the first electronic device, receiving a first message from the first electronic device; the first message includes a meeting joining request and an identifier of the first electronic device; responding to Based on the first message, a random
- the first electronic device on the first conference application receives a third input for indicating agreeing to join the conference; sending a third message to the server of the first conference application through the third antenna under the third transmit power;
- the three messages include the encrypted SIM card number of the first electronic device, the account of the first electronic device on the first conference application, the account of the second electronic device on the first conference application, and the conference The information after the conference identification; wherein, the second distance is less than or equal to the preset first safety distance; the first distance is greater than the preset first safety distance; the preset first safety distance is the first electronic device and the second electronic device.
- a safe distance for devices to exchange secret information; the preset second safe distance is a safe distance for the first electronic device and the second electronic device to exchange secret information.
- the second electronic device as the conference chairman, can approach or touch other electronic devices that want to access the conference based on the ultra-short-range communication method, so that other electronic devices can access the current conference in which the second electronic device is the conference chairman. , thereby simplifying the process for other electronic devices to access the conference, shortening the time for other electronic devices to access the conference, and improving user experience in a scenario with a conference chairperson.
- the third antenna in the technical solutions of the seventh aspect and the eighth aspect is replaced with a third antenna under the third transmission power
- the fourth antenna is replaced with the third antenna under the fourth transmission power
- the technical solutions of the ninth aspect and the tenth aspect can be obtained.
- a second electronic device is provided.
- the second electronic device is installed with the first conference application, the second electronic device accesses the conference through the first conference application, and the account of the second electronic device on the first conference application is a conference member who is not the conference chairman in the conference;
- the second electronic device includes: a processor; a memory; a third antenna, the transmission distance of the third antenna is a third distance, and the third distance is greater than the preset second safety distance; a fourth antenna, the transmission distance of the fourth antenna is the fourth distance distance, the fourth distance is less than or equal to the preset second safety distance; and a computer program, wherein the computer program is stored on the memory, and when the computer program is executed by the processor, causes the second electronic device to perform the following steps: Within a first distance of the electronic device, a first message from the first electronic device is received; the first message includes a meeting joining request and an identification of the first electronic device; in response to the first message, a random key is generated; through the fourth antenna , send the first response message; the
- the safe distance is a safe distance between the first electronic device and the second electronic device to exchange secret information; the preset second safe distance is a safe distance between the first electronic device and the second electronic device to exchange secret information.
- the second electronic device as a conference member who is not the chairman of the conference, can approach or touch other electronic devices to be connected to the conference based on the ultra-short-range communication method, so that other electronic devices can access the conference participants of the second electronic device.
- the process of accessing the conference by other electronic devices is simplified, the time for other electronic devices to access the conference is shortened, and the user experience is improved.
- a twelfth aspect provides a second electronic device, where a first conference application is installed on the second electronic device, the second electronic device accesses a conference through the first conference application, and an account of the second electronic device on the first conference application is A conference member who is not the conference chairman in the conference; it is characterized in that the second electronic device includes: a processor; a memory; a third antenna, the transmission distance of the third antenna is a third distance, and the third distance is greater than a preset second safety distance distance; a fourth antenna, the emission distance of the fourth antenna is a fourth distance, and the fourth distance is less than or equal to a preset second safety distance; and a computer program, wherein the computer program is stored on the memory, when the computer program is executed by the processor , causing the second electronic device to perform the following steps: within a second distance from the first electronic device, receiving a first message from the first electronic device; the first message includes a meeting joining request and an identifier of the first electronic device; In response to the first message, a random key
- the second electronic device as a conference member who is not the chairman of the conference, can approach or touch other electronic devices to be connected to the conference based on the ultra-short-range communication method, so that other electronic devices can access the conference participants of the second electronic device.
- the process of accessing the conference by other electronic devices is simplified, the time for other electronic devices to access the conference is shortened, and the user experience is improved.
- a thirteenth aspect provides a second electronic device.
- the second electronic device is installed with the first conference application, the second electronic device accesses the conference through the first conference application, and the account of the second electronic device on the first conference application is a conference member who is not the conference chairman in the conference;
- the second electronic device includes: a processor; a memory; a third antenna, the transmission distance of the third antenna under the third transmission power is a third distance, and the third distance is greater than the preset second safety distance; the third antenna transmits at the fourth The transmission distance under the power is a fourth distance, and the fourth distance is less than or equal to the preset second safety distance; the third transmission power is greater than the fourth transmission power; and the computer program, wherein the computer program is stored on the memory, when the computer program is When executed, the processor causes the second electronic device to perform the following steps: receiving a first message from the first electronic device within a first distance from the first electronic device; the first message includes a meeting joining request and the first electronic device In response to the first message, a random key is
- the second distance is less than or equal to the preset first safety distance; the first distance is greater than the preset first safety distance; the preset first safety distance is a safety distance for exchanging secret information between the first electronic device and the second electronic device;
- the preset second security distance is a security distance at which the first electronic device and the second electronic device exchange secret information.
- a fourteenth aspect provides a second electronic device.
- the second electronic device is installed with the first conference application, the second electronic device accesses the conference through the first conference application, and the account of the second electronic device on the first conference application is a conference member who is not the conference chairman in the conference;
- the second electronic device includes: a processor; a memory; a third antenna, the transmission distance of the third antenna under the third transmission power is a third distance, and the third distance is greater than the preset second safety distance; the third antenna transmits at the fourth The transmission distance under the power is a fourth distance, and the fourth distance is less than or equal to the preset second safety distance; the third transmission power is greater than the fourth transmission power; and the computer program, wherein the computer program is stored on the memory, when the computer program is When executed, the processor causes the second electronic device to perform the following steps: receiving a first message from the first electronic device within a second distance from the first electronic device; the first message includes a meeting joining request and the first electronic device In response to the first message, a random key is
- the second distance is less than or equal to the preset first safety distance; the first distance is greater than the preset first safety distance; the preset first safety distance is a safety distance for exchanging secret information between the first electronic device and the second electronic device;
- the preset second security distance is a security distance at which the first electronic device and the second electronic device exchange secret information.
- the third antenna in the technical solutions of the eleventh and twelfth aspects is replaced with the third antenna under the third transmission power
- the fourth antenna is replaced with the third antenna under the fourth transmission power.
- the technical solutions of the thirteenth and fourteenth aspects can be obtained.
- a fifteenth aspect provides a second electronic device.
- the second electronic device is installed with a first conference application, and the second electronic device accesses the conference through the first conference application;
- the second electronic device includes: a processor; a memory; a third antenna, and the transmission distance of the third antenna is a third distance, the third distance is greater than the preset second safety distance;
- the fourth antenna, the emission distance of the fourth antenna is the fourth distance, and the fourth distance is less than or equal to the preset second safety distance; and a computer program, wherein the computer program Stored in the memory, when executed by the processor, the computer program causes the second electronic device to perform the following steps: receiving a first message from the first electronic device within a second distance from the first electronic device; the first message It includes a meeting joining request, an identification of the first electronic device and a random key; a first response message is sent through the fourth antenna; the first response message includes encrypted information; the encrypted information is the meeting identification and meeting password of the conference using a random key The encrypted information, or the encrypted information is
- the second electronic device in the current conference can approach or touch other electronic devices that want to access the conference based on the ultra-short-range communication method, so that other electronic devices can access the current conference, so that there is no conference chairperson.
- the process for other electronic devices to access the conference is simplified, the time for other electronic devices to access the conference is shortened, and the user experience is improved.
- a sixteenth aspect provides a second electronic device.
- the second electronic device is installed with a first conference application, and the second electronic device accesses the conference through the first conference application;
- the second electronic device includes: a processor; a memory; a third antenna, and the third antenna is under a third transmit power
- the transmission distance of the antenna is the third distance, and the third distance is greater than the preset second safety distance;
- the transmission distance of the third antenna under the fourth transmission power is the fourth distance, and the fourth distance is less than or equal to the preset second safety distance
- the third transmission power is greater than the fourth transmission power; and a computer program, wherein the computer program is stored on the memory, and when the computer program is executed by the processor, the second electronic device is caused to perform the following steps: at a second distance from the first electronic device Within the distance, the first message from the first electronic device is received; the first message includes a conference joining request, the identifier of the first electronic device and the random key; the first response message is sent through the third antenna under the fourth transmit power
- the second electronic device in the current conference can approach or touch other electronic devices that want to access the conference based on the ultra-short-range communication method, so that other electronic devices can access the current conference, so that there is no conference chairperson.
- the process for other electronic devices to access the conference is simplified, the time for other electronic devices to access the conference is shortened, and the user experience is improved.
- a seventeenth aspect provides a conference access method, which is applied to a first electronic device.
- the first electronic device is installed with a first conference application, the first electronic device does not access the conference through the first conference application, and the first electronic device includes: a SIM card; a first antenna, the transmission distance of the first antenna is the first distance, the first distance is greater than the preset first safety distance; the second antenna, the transmission distance of the second antenna is the second distance, and the second distance is less than or equal to the preset first safety distance;
- the method includes: receiving a first input ; in response to the first input, through the first antenna, broadcast the first message; the first message includes the meeting joining request and the identification of the first electronic device; within a fourth distance from the second electronic device, the first response message is received
- the first response message includes the random key and the identifier of the second electronic device; the first response message is associated with the first message; the second electronic device accesses the conference through the first conference application, and the second electronic device is in the first conference application
- the account number on
- the account number on the application obtains encrypted information; through the second antenna, a second message is sent; the second message includes the identifier of the second electronic device and the encrypted information; a call from the first conference application is received; after the call is connected, Joining a conference attended by the second electronic device; wherein, the fourth distance is less than or equal to a preset second safety distance; the preset second safety distance is a safety distance at which the second electronic device and the first electronic device exchange secret information; The preset first security distance is a security distance at which the first electronic device and the second electronic device exchange secret information.
- An eighteenth aspect provides a conference access method, which is applied to a first electronic device.
- the first electronic device is installed with a first conference application, the first electronic device is not connected to the conference through the first conference application, the first electronic device includes: a SIM card; a first antenna, the transmission distance of the first antenna is the first distance, the first distance is greater than the preset first safety distance; the second antenna, the transmission distance of the second antenna is the second distance, and the second distance is less than or equal to the preset first safety distance; the method includes: receiving a first input ; in response to the first input, through the second antenna, broadcast the first message; the first message includes the meeting joining request and the identification of the first electronic device; within a fourth distance from the second electronic device, the first response message is received The first response message includes the random key and the identifier of the second electronic device; the first response message is associated with the first message; the second electronic device accesses the conference through the first conference application, and the second electronic device is in the first conference application
- the account number on the meeting
- a nineteenth aspect provides a conference access method, which is applied to a first electronic device.
- the first electronic device is installed with a first conference application, the first electronic device does not access the conference through the first conference application, the first electronic device includes: a SIM card; a first antenna, the first antenna transmits under the first transmission power The distance is the first distance, and the first distance is greater than the preset first safety distance; the transmission distance of the first antenna under the second transmission power is the second distance, and the second distance is less than or equal to the preset first safety distance; a transmit power is greater than the second transmit power; the method includes: receiving a first input; in response to the first input, broadcasting a first message through a first antenna under the first transmit power; the first message includes a conference join request and a first An identification of an electronic device; within a fourth distance from the second electronic device, a first response message is received; the first response message includes a random key and an identification of the second electronic device; the first response message is related to the first message connection; the second electronic device accesses the
- a twentieth aspect provides a conference access method, which is applied to a first electronic device.
- the first electronic device is installed with a first conference application, the first electronic device does not access the conference through the first conference application, the first electronic device includes: a SIM card; a first antenna, the first antenna transmits under the first transmission power The distance is the first distance, and the first distance is greater than the preset first safety distance; the transmission distance of the first antenna under the second transmission power is the second distance, and the second distance is less than or equal to the preset first safety distance; a transmit power is greater than a second transmit power; the method includes: receiving a first input; in response to the first input, broadcasting a first message through a first antenna under the second transmit power; the first message includes a conference join request and a first An identification of an electronic device; within a fourth distance from the second electronic device, a first response message is received; the first response message includes a random key and an identification of the second electronic device; the first response message is related to the first message The second electronic device accesses the conference
- a twenty-first aspect provides a conference access method, which is applied to a first electronic device.
- the first electronic device is installed with a first conference application, the first electronic device is not connected to the conference through the first conference application, the first electronic device includes: a SIM card; a first antenna, the transmission distance of the first antenna is the first distance, the first distance is greater than the preset first safety distance; the second antenna, the transmission distance of the second antenna is the second distance, and the second distance is less than or equal to the preset first safety distance;
- the method includes: receiving a first input ; In response to the first input, a random key is generated, and through the second antenna, the first message is broadcast; the first message includes a meeting joining request, the identification of the first electronic device and the random key; at the fourth distance from the second electronic device within the distance, the first response message is received; the first response message includes encrypted information; the first response message is associated with the first message; the second electronic device accesses the conference through the first conference application; decrypts the encrypted information using a random key,
- a twenty-second aspect provides a conference access method, which is applied to a first electronic device.
- the first electronic device is installed with a first conference application, the first electronic device does not access the conference through the first conference application, the first electronic device includes: a SIM card; a first antenna, the first antenna transmits under the first transmission power The distance is the first distance, and the first distance is greater than the preset first safety distance; the transmission distance of the first antenna under the second transmission power is the second distance, and the second distance is less than or equal to the preset first safety distance; a transmit power is greater than the second transmit power; the method includes: receiving a first input; in response to the first input, generating a random key, and broadcasting a first message through a first antenna under the second transmit power; the first message includes A meeting joining request, an identifier of the first electronic device and a random key; a first response message is received within a fourth distance from the second electronic device; the first response message includes encrypted information; the first response message and the first message associated; the second electronic device accesses
- a twenty-third aspect provides a conference access method, which is applied to a second electronic device.
- the second electronic device is installed with the first conference application, the second electronic device accesses the conference through the first conference application, and the account of the second electronic device on the first conference application is the conference chairman in the conference;
- the second electronic device includes: The third antenna, the transmission distance of the third antenna is the third distance, and the third distance is greater than the preset second safety distance;
- the fourth antenna, the transmission distance of the fourth antenna is the fourth distance, and the fourth distance is less than or equal to the preset distance the second safe distance;
- the method includes: within a first distance from the first electronic device, receiving a first message from the first electronic device; the first message includes a meeting joining request and an identification of the first electronic device; responding generating a random key based on the first message; sending a first response message through the fourth antenna; the first response message including the random key and the identifier of the second electronic device; within a second distance from the first electronic device, receiving to the second message from
- An account number on a conference application receiving a third input indicating agreeing to join the conference; sending a third message to the server of the first conference application through the third antenna; the third message includes an encryption mechanism through the first conference application, Encrypt the SIM card number of the first electronic device, the account of the first electronic device on the first conference application, the account of the second electronic device on the first conference application, and the information after the conference identification of the conference; wherein, the second distance is less than or equal to the preset first safety distance; the first distance is greater than the preset first safety distance; the preset first safety distance is a safety distance for exchanging secret information between the first electronic device and the second electronic device; the preset first safety distance The second safe distance is a safe distance at which the first electronic device and the second electronic device exchange secret information.
- a twenty-fourth aspect provides a conference access method, which is applied to a second electronic device.
- the second electronic device is installed with the first conference application, the second electronic device accesses the conference through the first conference application, and the account of the second electronic device on the first conference application is the conference chairman in the conference;
- the second electronic device includes: The third antenna, the transmission distance of the third antenna is the third distance, and the third distance is greater than the preset second safety distance;
- the fourth antenna, the transmission distance of the fourth antenna is the fourth distance, and the fourth distance is less than or equal to the preset distance the second safe distance;
- the method includes: within a second distance from the first electronic device, receiving a first message from the first electronic device; the first message includes a meeting joining request and an identification of the first electronic device; responding generating a random key based on the first message; sending a first response message through the fourth antenna; the first response message including the random key and the identifier of the second electronic device; within a first distance from the first electronic device, receiving to the second message
- An account number on a conference application receiving a third input indicating agreeing to join the conference; sending a third message to the server of the first conference application through the third antenna; the third message includes an encryption mechanism through the first conference application, Encrypt the SIM card number of the first electronic device, the account of the first electronic device on the first conference application, the account of the second electronic device on the first conference application, and the information after the conference identification of the conference; wherein, the second distance is less than or equal to the preset first safety distance; the first distance is greater than the preset first safety distance; the preset first safety distance is a safety distance for exchanging secret information between the first electronic device and the second electronic device; the preset first safety distance The second safe distance is a safe distance at which the first electronic device and the second electronic device exchange secret information.
- a twenty-fifth aspect provides a conference access method, which is applied to a second electronic device.
- the second electronic device is installed with a first conference application, the second electronic device accesses the conference through the first conference application, and the account of the second electronic device on the first conference application is the conference chairman in the conference;
- the second electronic device includes : the third antenna, the transmission distance of the third antenna under the third transmission power is the third distance, and the third distance is greater than the preset second safety distance;
- the transmission distance of the third antenna under the fourth transmission power is the fourth distance , the fourth distance is less than or equal to the preset second safety distance;
- the third transmit power is greater than the fourth transmit power;
- the method includes: within a first distance from the first electronic device, receiving the first A message;
- the first message includes a conference joining request and an identification of the first electronic device; in response to the first message, a random key is generated;
- the first response message is sent through the third antenna under the fourth transmit power;
- the first response message Including a
- a twenty-sixth aspect provides a conference access method, which is applied to a second electronic device.
- the second electronic device is installed with a first conference application, the second electronic device accesses the conference through the first conference application, and the account of the second electronic device on the first conference application is the conference chairman in the conference;
- the second electronic device includes : the third antenna, the transmission distance of the third antenna under the third transmission power is the third distance, and the third distance is greater than the preset second safety distance;
- the transmission distance of the third antenna under the fourth transmission power is the fourth distance , the fourth distance is less than or equal to the preset second safety distance;
- the third transmission power is greater than the fourth transmission power;
- the method includes: within the second distance from the first electronic device, receiving the first electronic device from the first electronic device.
- the lower third antenna sends a third message to the server of the first conference application; the third message includes the encryption mechanism of the first conference application, encrypting the SIM card number of the first electronic device, the first electronic device in the first conference application account on the first conference application, the account of the second electronic device on the first conference application, and the information after the conference identification of the conference; wherein, the
- a twenty-seventh aspect provides a conference access method, which is applied to a second electronic device.
- the second electronic device is installed with the first conference application, the second electronic device accesses the conference through the first conference application, and the account of the second electronic device on the first conference application is a conference member who is not the conference chairman in the conference;
- the second electronic device includes: a third antenna, the transmission distance of the third antenna is the third distance, and the third distance is greater than the preset second safety distance; the fourth antenna, the transmission distance of the fourth antenna is the fourth distance, the fourth distance is less than or equal to a preset second safety distance;
- the method includes: within a first distance from the first electronic device, receiving a first message from the first electronic device; the first message includes a meeting joining request and a first electronic device identification of the device; in response to the first message, a random key is generated; through the fourth antenna, a first response message is sent; the first response message includes the random key and the identification of the second electronic device; Within two distances, a second message
- An account of an electronic device on the first conference application sending a third message to the server of the first conference application through the third antenna; the third message includes encrypting the SIM card of the first electronic device through the encryption mechanism of the first conference application number, the account number of the first electronic device on the first conference application, the account number of the second electronic device on the first conference application, and the information after the conference identification of the conference; wherein the second distance is less than or equal to the preset first security distance; the first distance is greater than the preset first safety distance; the preset first safety distance is a safety distance for exchanging secret information between the first electronic device and the second electronic device; the preset second safety distance is the first electronic device A safe distance between the device and the second electronic device to exchange secret information.
- a twenty-eighth aspect provides a conference access method, which is applied to a second electronic device.
- the second electronic device is installed with a first conference application, the second electronic device accesses the conference through the first conference application, and the account of the second electronic device on the first conference application is a conference member who is not the conference chairman in the conference;
- the The second electronic device includes: a third antenna, the transmission distance of the third antenna is the third distance, and the third distance is greater than the preset second safety distance;
- the fourth antenna the transmission distance of the fourth antenna is the fourth distance, the fourth distance
- the distance is less than or equal to a preset second safe distance;
- the method includes: within a second distance from the first electronic device, receiving a first message from the first electronic device; the first message includes a meeting joining request and a first identification of the electronic device; in response to the first message, a random key is generated; through the fourth antenna, a first response message is sent; the first response message includes the random key and the identification of the second electronic device; Within the first
- the account of the first electronic device on the first conference application; the third message is sent to the server of the first conference application through the third antenna; the third message includes encrypting the SIM of the first electronic device through the encryption mechanism of the first conference application
- a twenty-ninth aspect provides a conference access method, which is applied to a second electronic device.
- the second electronic device is installed with the first conference application, the second electronic device accesses the conference through the first conference application, and the account of the second electronic device on the first conference application is a conference member who is not the conference chairman in the conference;
- the second electronic device includes: a third antenna, the transmission distance of the third antenna under the third transmission power is a third distance, and the third distance is greater than the preset second safety distance; the transmission distance of the third antenna under the fourth transmission power is the fourth distance, the fourth distance is less than or equal to the preset second safety distance; the third transmission power is greater than the fourth transmission power;
- the method includes: within a first distance from the first electronic device, receiving a a first message of the electronic device; the first message includes a conference joining request and an identification of the first electronic device; in response to the first message, a random key is generated; the first response message is sent through the third antenna under the fourth transmit power;
- the first response message
- a thirtieth aspect provides a conference access method, which is applied to a second electronic device.
- the second electronic device is installed with the first conference application, the second electronic device accesses the conference through the first conference application, and the account of the second electronic device on the first conference application is a conference member who is not the conference chairman in the conference;
- the second electronic device includes: a third antenna, the transmission distance of the third antenna under the third transmission power is a third distance, and the third distance is greater than the preset second safety distance; the transmission distance of the third antenna under the fourth transmission power is a fourth distance, and the fourth distance is less than or equal to the preset second safe distance; the third transmission power is greater than the fourth transmission power;
- the method includes: within a second distance from the first electronic device, receiving a signal from the first electronic device a first message of the electronic device; the first message includes a conference joining request and an identification of the first electronic device; in response to the first message, a random key is generated; the first response message is sent through the third antenna under the fourth transmit power
- a thirty-first aspect provides a conference access method, which is applied to a second electronic device.
- the second electronic device is installed with a first conference application, and the second electronic device accesses the conference through the first conference application;
- the second electronic device includes: a third antenna, the transmission distance of the third antenna is a third distance, and the third distance is greater than the preset second safety distance;
- the fourth antenna the emission distance of the fourth antenna is the fourth distance, and the fourth distance is less than or equal to the preset second safety distance;
- the method includes: at a distance from the first electronic device Within two distances, the first message from the first electronic device is received; the first message includes a conference joining request, the identifier of the first electronic device and the random key; the first response message is sent through the fourth antenna; the first response message Including encrypted information;
- the encrypted information is the information encrypted by using a random key to encrypt the conference ID and password of the conference, or the encrypted information is the information encrypted by using a random key to encrypt the conference ID of the conference
- a thirty-second aspect provides a conference access method, which is applied to a second electronic device.
- the second electronic device is installed with a first conference application, and the second electronic device accesses the conference through the first conference application;
- the second electronic device includes: a third antenna, and the transmission distance of the third antenna under the third transmission power is the first Three distances, the third distance is greater than the preset second safe distance;
- the transmit distance of the third antenna under the fourth transmit power is the fourth distance, and the fourth distance is less than or equal to the preset second safe distance;
- the method includes: within a second distance from the first electronic device, receiving a first message from the first electronic device;
- the first message includes a conference joining request, an identifier of the first electronic device and a random key; send the first response message through the third antenna under the fourth transmit power;
- the first response message includes encrypted information;
- the encrypted information is the information encrypted by using the random key to encrypt the conference ID and conference password of the conference
- a thirty-third aspect provides a conference access system.
- the system includes a first electronic device, a second electronic device and a server, the first electronic device and the second electronic device are both installed with a first conference application, the first electronic device does not access the conference through the first conference application, and the second electronic device
- the conference is accessed through the first conference application, and the account of the second electronic device on the first conference application is the conference chairperson in the conference.
- the first electronic device includes a first antenna and a second antenna, wherein the transmission distance of the first antenna is the first distance, and the first distance is greater than the preset first safety distance; the transmission distance of the second antenna is the second distance, and the first distance is the first distance.
- the second distance is less than or equal to the preset first safety distance.
- the second electronic device includes a third antenna and a fourth antenna, wherein the transmission distance of the third antenna is a third distance, and the third distance is greater than a preset second safety distance; the transmission distance of the fourth antenna is a fourth distance, and the The fourth distance is less than or equal to the preset second safety distance.
- the first electronic device receives the first input; the first electronic device broadcasts the first message through the first antenna in response to the first input; the first message includes the meeting joining request and the identification of the first electronic device; the second electronic device broadcasts the first message through the first antenna in response to the first input; The device receives the first message from the first electronic device within a first distance from the first electronic device; the second electronic device generates a random key in response to the first message; the second electronic device sends the message through the fourth antenna a first response message; the first response message includes a random key and an identifier of the second electronic device; the first electronic device receives the first response message within a fourth distance from the second electronic device; the first electronic device receives A second input for instructing to join the conference; the first electronic device, in response to the second input, uses a random key to encrypt the SIM card number of the first electronic device and the account number of the first electronic device on the first conference application to obtain encrypted information
- the first electronic device sends a second message through the second antenna; the second message includes the identification
- the second distance is less than or equal to the preset first safety distance; the fourth distance is less than or equal to the preset second safety distance; the preset second safety distance is the exchange of secret information between the second electronic device and the first electronic device.
- the preset first safety distance is a safety distance between the first electronic device and the second electronic device to exchange secret information.
- a thirty-fourth aspect provides a conference access system.
- the system includes a first electronic device, a second electronic device and a server, the first electronic device and the second electronic device are both installed with a first conference application, the first electronic device does not access the conference through the first conference application, and the second electronic device
- the conference is accessed through the first conference application, and the account of the second electronic device on the first conference application is the conference chairperson in the conference.
- the first electronic device includes a first antenna and a second antenna, wherein the transmission distance of the first antenna is the first distance, and the first distance is greater than the preset first safety distance; the transmission distance of the second antenna is the second distance, and the first distance is the first distance.
- the second distance is less than or equal to the preset first safety distance.
- the second electronic device includes a third antenna and a fourth antenna, wherein the transmission distance of the third antenna is a third distance, and the third distance is greater than a preset second safety distance; the transmission distance of the fourth antenna is a fourth distance, and the The fourth distance is less than or equal to the preset second safety distance.
- the first electronic device receives the first input; the first electronic device broadcasts the first message through the second antenna in response to the first input; the first message includes the meeting joining request and the identification of the first electronic device; the second electronic device broadcasts the first message through the second antenna in response to the first input; The device receives the first message from the first electronic device within a second distance from the first electronic device; the second electronic device generates a random key in response to the first message; the second electronic device sends the message through the fourth antenna a first response message; the first response message includes a random key and an identifier of the second electronic device; the first electronic device receives the first response message within a fourth distance from the second electronic device; the first electronic device responds to For the first response message, use the random key to encrypt the SIM card number of the first electronic device and the account number of the first electronic device on the first conference application to obtain encrypted information; the first electronic device sends the second message through the first antenna; The second message includes the identification of the second electronic device and the encrypted information; the second electronic device receives the second message
- the server sends a call to the first electronic device; the first electronic device joins the conference attended by the second electronic device after connecting the call.
- the second distance is less than or equal to the preset first safety distance; the fourth distance is less than or equal to the preset second safety distance; the preset second safety distance is the exchange of secret information between the second electronic device and the first electronic device
- the preset first safety distance is a safety distance between the first electronic device and the second electronic device to exchange secret information.
- a thirty-fifth aspect provides a conference access system.
- the first antenna in the system provided in the thirty-third aspect is replaced with the first antenna under the first transmit power
- the second antenna in the system provided in the thirty-third aspect is replaced with the second antenna under the second transmit power
- the third antenna below, the rest of the content is the same.
- a thirty-sixth aspect provides a conference access system.
- the first antenna in the system provided in the thirty-fourth aspect is replaced with the first antenna under the first transmit power
- the second antenna in the system provided in the thirty-fourth aspect is replaced with the second transmit power.
- replace the fourth antenna in the system provided in the thirty-fourth aspect with a fourth transmit power The third antenna below, the rest of the content is the same.
- the first electronic device of the party to be accessed may be close to or close to the second electronic device serving as the conference chairman based on the ultra-short-range communication method. Touch to access the current conference, thereby simplifying the process of accessing the conference by the first electronic device, shortening the time for the first electronic device to access the conference, and improving user experience in the scenario of a conference chairman.
- a thirty-seventh aspect provides a conference access system.
- the system includes a first electronic device, a second electronic device, a third electronic device and a server.
- the first electronic device, the second electronic device and the third device are all installed with a first conference application, and the first electronic device has not passed the first conference.
- the application accesses the conference, the second electronic device and the third electronic device access the conference through the first conference application, the account of the second electronic device on the first conference application is a conference member who is not the conference chairman in the conference, and the third electronic device
- the account on the first conference application is the conference chairperson in the conference.
- the first electronic device includes a first antenna and a second antenna, wherein the transmission distance of the first antenna is the first distance, and the first distance is greater than the preset first safety distance; the transmission distance of the second antenna is the second distance, and the first distance is the first distance. The second distance is less than or equal to the preset first safety distance.
- the second electronic device includes a third antenna and a fourth antenna, wherein the transmission distance of the third antenna is a third distance, and the third distance is greater than a preset second safety distance; the transmission distance of the fourth antenna is a fourth distance, and the The fourth distance is less than or equal to the preset second safety distance.
- the first electronic device receives the first input; the first electronic device broadcasts the first message through the first antenna in response to the first input; the first message includes the meeting joining request and the identification of the first electronic device; the second electronic device broadcasts the first message through the first antenna in response to the first input; The device receives the first message from the first electronic device within a first distance from the first electronic device; the second electronic device generates a random key in response to the first message; the second electronic device sends the message through the fourth antenna a first response message; the first response message includes a random key and an identifier of the second electronic device; the first electronic device receives the first response message within a fourth distance from the second electronic device; the first electronic device receives A second input for instructing to join the conference; the first electronic device, in response to the second input, uses a random key to encrypt the SIM card number of the first electronic device and the account number of the first electronic device on the first conference application to obtain encrypted information
- the first electronic device sends a second message through the second antenna; the second message includes the identification
- the second distance is less than or equal to the preset first safety distance; the fourth distance is less than or equal to the preset second safety distance; the preset second safety distance is the exchange of secret information between the second electronic device and the first electronic device.
- the preset first safety distance is a safety distance between the first electronic device and the second electronic device to exchange secret information.
- a thirty-eighth aspect provides a conference access system.
- the first electronic device broadcasts the first message through the second antenna in response to the first input; the second electronic device receives the first message from the first electronic device within a second distance from the first electronic device; The first electronic device sends the second message through the first antenna; the second electronic device receives the second message from the first electronic device within the first distance from the first electronic device; the remaining contents are the same as those of the thirty-seventh aspect
- the system provided is the same.
- a thirty-ninth aspect provides a conference access system.
- the first antenna in the system provided in the thirty-seventh aspect is replaced with the first antenna under the first transmission power
- the second antenna in the system provided in the thirty-seventh aspect is replaced with the second antenna under the second transmission power
- the first antenna replace the third antenna in the system provided by the thirty-seventh aspect with the third antenna under the third transmit power
- the third antenna below, the rest of the content is the same.
- a fortieth aspect provides a conference access system.
- the first antenna in the system of the thirty-eighth aspect is replaced with the first antenna under the first transmit power
- the second antenna in the system provided in the thirty-eighth aspect is replaced with the first antenna under the second transmit power
- An antenna, replacing the third antenna in the system of the thirty-eighth aspect with a third antenna under a third transmission power, and replacing the fourth antenna in the system provided in the thirty-eighth aspect with a third antenna under the fourth transmission power The third antenna, the rest of the content is the same.
- the first electronic device of the party to be accessed can approach or touch the conference member who is not the conference chairman based on the ultra-short-distance communication method. , to access the current conference, thereby simplifying the process for the first electronic device to access the conference, shortening the time for the first electronic device to access the conference, and improving user experience in a scenario with a conference chairman.
- a conference access system in a forty-first aspect, includes a first electronic device, a second electronic device and a server, the first electronic device and the second electronic device are both installed with a first conference application, the first electronic device does not access the conference through the first conference application, and the second electronic device Access the conference through the first conference application.
- the first electronic device includes a first antenna and a second antenna, wherein the transmission distance of the first antenna is the first distance, and the first distance is greater than the preset first safety distance; the transmission distance of the second antenna is the second distance, and the first distance is the first distance.
- the second distance is less than or equal to the preset first safety distance.
- the second electronic device includes a third antenna and a fourth antenna, wherein the transmission distance of the third antenna is a third distance, and the third distance is greater than a preset second safety distance; the transmission distance of the fourth antenna is a fourth distance, and the The fourth distance is less than or equal to the preset second safety distance.
- the first electronic device receives the first input; the first electronic device generates a random key in response to the first input, and broadcasts the first message through the second antenna; the first message includes a meeting joining request, a identification and random key; the second electronic device receives the first message within a second distance from the first electronic device; the second electronic device sends the first response message through the fourth antenna; the first response message includes encrypted information; The encrypted information is the information encrypted with the random key for the conference identification and the conference password of the conference, or the encrypted information is the information encrypted with the random key for the conference identification of the conference; Within four distances, the first response message is received; the second electronic device switches to the third antenna after a preset duration; the first electronic device decrypts the encrypted information using the random key, and obtains the conference ID and conference password of the conference; The first electronic device sends a second message through the first antenna and the encryption mechanism of the first conference application, and the second message includes the conference ID, the conference password and the account of the first electronic device on the first conference application; the server receives the first message
- the server determines whether the conference password is correct; if the conference password is correct, the server sends the An electronic device sends a call, and the first electronic device connects to the call and then accesses the conference.
- the second distance is less than or equal to the preset first safety distance; the fourth distance is less than or equal to the preset second safety distance; the preset second safety distance is the exchange of secret information between the second electronic device and the first electronic device
- the preset first safety distance is a safety distance between the first electronic device and the second electronic device to exchange secret information.
- a conference access system is provided.
- the first antenna in the system of the forty-first aspect is replaced with the first antenna under the first transmit power
- the second antenna in the system provided in the forty-first aspect is replaced with the first antenna under the second transmit power
- the third antenna, the rest of the content is the same.
- the first electronic device of the party to be accessed may communicate with the conference members based on the ultra-short-distance communication method. Approach or touch to access the current conference, thereby simplifying the process of the first electronic device accessing the conference, shortening the time for the first electronic device to access the conference, and improving user experience.
- a forty-third aspect provides a computer-readable storage medium, the computer-readable storage medium comprising a computer program, when the computer program is executed on the first electronic device, the first electronic device is caused to perform the operations as described in the seventeenth aspect to the first electronic device.
- a forty-fourth aspect provides a computer-readable storage medium, the computer-readable storage medium comprising a computer program that, when the computer program is run on a second electronic device, causes the second electronic device to perform the steps from the twenty-third aspect to the A method of any one of the thirty-second aspects and any one of the implementations of any one of the aspects.
- a computer program product is provided.
- the computer program product runs on a computer, the computer is caused to perform the method of any one of the seventeenth to thirty-second aspects and any one of the implementations of any one of the aspects.
- FIG. 1 is a schematic diagram of a conference access scenario provided by an embodiment of the present application
- FIG. 2 is a schematic diagram of a provided conference access process
- FIG. 3 is a schematic diagram of a hardware structure of an electronic device provided by an embodiment of the present application.
- 4A is a schematic diagram of the principle of an ultra-short-range wireless communication module and an antenna provided by an embodiment of the present application;
- 4B is a schematic diagram of the principle of an ultra-short-range wireless communication module and an antenna provided by an embodiment of the present application;
- 5A-5C are schematic diagrams of specific structures of an ultra-short-range wireless communication module and an antenna provided by an embodiment of the present application;
- FIG. 6 is a schematic diagram of a transmission distance of an ultra-short-range wireless communication module and an antenna in a conference access method provided by an embodiment of the present application;
- FIG. 7 is a schematic structural diagram of an antenna for ultra-short-range communication provided by an embodiment of the present application.
- FIG. 8A is a schematic flowchart of a conference access method provided by an embodiment of the present application.
- FIG. 8B is another schematic flowchart of a conference access method provided by an embodiment of the present application.
- FIG. 8C is another schematic flowchart of a conference access method provided by an embodiment of the present application.
- FIG. 9 is a schematic diagram of a time-sharing switching mode of an electronic device provided by an embodiment of the present application.
- FIG. 10 is a schematic interface diagram of an electronic device provided by an embodiment of the present application.
- FIG. 11 is another interface schematic diagram of the electronic device provided by the embodiment of the application.
- FIG. 12 is a schematic diagram of a conference access process provided by an embodiment of the present application.
- FIG. 13A is a schematic flowchart of a conference access method provided by an embodiment of the present application.
- FIG. 13B is another schematic flowchart of a conference access method provided by an embodiment of the present application.
- FIG. 13C is another schematic flowchart of a conference access method provided by an embodiment of the present application.
- FIG. 14 is another schematic diagram of a conference access process provided by an embodiment of the present application.
- FIG. 15A is a schematic flowchart of a conference access method provided by an embodiment of the present application.
- FIG. 15B is another schematic flowchart of a conference access method provided by an embodiment of the present application.
- FIG. 16 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
- first and second are only used for descriptive purposes, and cannot be understood as indicating or implying relative importance or implying the number of indicated technical features.
- a feature defined as “first” or “second” may expressly or implicitly include one or more of that feature.
- plural means two or more.
- words such as “exemplarily” or “for example” are used to represent examples, illustrations or illustrations. Any embodiment or design described in the embodiments of the present application as “exemplarily” or “such as” should not be construed as preferred or advantageous over other embodiments or designs. Rather, the use of words such as “exemplarily” or “such as” is intended to present the related concepts in a specific manner.
- FIG. 1 is a schematic diagram of a scenario of conference access provided by an embodiment of the present application.
- the electronic device 200 can be used as a conference initiator to create a conference. It can be understood that, if the conference is a regular conference, the electronic device 200, the login account on the electronic device 200, or the login account of the conference application on the electronic device 200 may be considered as the conference chairman.
- the electronic device 100 and the electronic device 300 can access the conference created by the electronic device 200 .
- the conference members corresponding to the electronic device 100 and the electronic device 300 may be the electronic device 100 and the electronic device 300 , or the login account on the electronic device 100 and the electronic device 300 , or the electronic device 100 , the login account of the conference application on the electronic device 300 .
- the electronic device 200 is used as the chairman of the conference, and the electronic device 100 and the electronic device 300 are used as conference members for description.
- the login account on the electronic device 200 or the login account of the conference application on the electronic device 200 is the conference chairman
- the login account on the electronic device 100 and the electronic device 300 is the conference member, or, It is also within the scope of this application to use the login account of the conference application on the electronic device 100 and the electronic device 300 as a conference member.
- the electronic device 100 may also be referred to as a first electronic device
- the electronic device 200 may also be referred to as a second electronic device
- the electronic device 300 may also be referred to as a third electronic device.
- meeting members include the meeting chair.
- a meeting member is different from the meeting chair.
- the conference participants include the conference chairperson and the conference members; in the absence of the conference chairperson, the conference participants include the conference members.
- the conference can be a conference without a conference chair.
- the electronic device 200 only initiates the conference, and the electronic device 100 and the electronic device 300 can access the conference; however, there is no conference chair in the conference, that is, there is no conference. host.
- one conference corresponds to one conference group. All conference participants form a conference group.
- the conference group corresponding to the conference includes the electronic device 200 , the electronic device 100 , and the electronic device 300 .
- the electronic device 100 and the electronic device 300 are only illustrative examples, and it is not limited that only two electronic devices access the conference, and the number of electronic devices accessing the conference may be any number.
- the electronic device 200 serving as the conference initiator may also be other electronic devices. This application is only a schematic example, and does not limit the conference initiating party to only the electronic device 200 .
- the server 400 may be a conference server for managing conferences, providing conference call services, and the like.
- the server 400 may include a voice over internet protocol (VOIP) server or the like.
- VOIP voice over internet protocol
- the server 400 may be used to confirm whether the electronic device serving as the conference chairman is legal, and may also be used to confirm whether the electronic device requesting to access the conference is legal.
- the server 400 can obtain the account and conference ID of the electronic device serving as the conference chairman on the conference application, and determine the account of the electronic device on the conference application as the chairman of the conference corresponding to the conference ID stored in the server 400, thereby determining The legality of the electronic device as the chairman of the meeting.
- the electronic device 100, the electronic device 200, and the electronic device 300 can communicate with the server through any one of communication modes such as 2G/3G/4G/5G cellular mobile communication, optical fiber communication, and Ethernet communication. 400 Communications.
- the communication modes of the electronic device 100 , the electronic device 200 and the electronic device 300 and the server 400 may all be the same, may be partially the same, or may be completely different. In this way, the information of the server 400 is forwarded, and a conference call between electronic devices can be realized.
- the electronic device 100, the electronic device 200, and the electronic device 300 can access a routing device (eg, a router) through the first communication method, and communicate with the server 400 through the routing device through the second communication method, thereby implementing a conference call.
- a routing device eg, a router
- the first communication method may be cellular mobile communication such as 2G/3G/4G/5G, optical fiber communication, Bluetooth (BT), wireless local area networks (WLAN) (such as Wi-Fi), Zigbee, FM (frequency modulation, FM), near field communication (near field communication, NFC), infrared (infrared, IR), general 2.4G/5G frequency band wireless communication and any communication method in USB communication.
- the second communication method may be a cellular mobile communication method such as 2G/3G/4G/5G or an optical fiber communication method.
- Electronic devices for example, electronic device 100, electronic device 200, and electronic device 300 in the embodiments of the present application include, but are not limited to, smart phones, smart headphones, smart screens, smart speakers, tablet computers, and wearable devices with wireless communication functions (such as smart watches, smart bracelets, smart rings, smart glasses), in-vehicle devices, augmented reality (AR)/virtual reality (VR) devices, personal digital assistants (personal digital assistant, PDA), etc.
- Exemplary embodiments of electronic devices include, but are not limited to, onboard Portable wireless routing device for Windows, Linux or other operating systems.
- the above-mentioned electronic device may also be other portable devices, such as a laptop computer (Laptop) or the like. It should also be understood that, in some other embodiments, the above-mentioned electronic device may not be a portable device, but a device such as a desktop computer.
- the user of the electronic device 200 When the electronic device 200 creates a conference or adds conference members during the conference, the user of the electronic device 200 enables the conference members to access the current conference through an interactive operation interface. For example, the user of the electronic device 200 can select or input identification information such as user names or account numbers corresponding to the meeting members in the interactive operation interface, so as to connect the meeting members to the meeting created by the electronic device 200 .
- block 201 displays the information of the contacts who are not connected to the conference.
- Block 202 displays the information of the conference members who have joined the conference.
- the user on the electronic device 200 side wishes to add a new conference member as user A, and can click the selection box in front of user A on the electronic device 200, and then click the control 203; The relevant information is added to block 202. Therefore, the electronic device corresponding to user A is connected to the conference.
- the user can also input the information of the conference member to be added in the search box, so as to find the conference member to be added and connect it to the current conference.
- the user may also select a conference member who has already joined the conference, and then click the control 204 to cause the selected conference member to exit the current conference.
- the user of the electronic device 200 since the user of the electronic device 200 usually needs to select one by one when adding meeting members during the creation of the meeting or the process of the meeting, the user of the electronic device 200 usually needs to select one by one, which requires many steps and a long operation time.
- the interactive operation interface is easily blocked by the conference interface (such as an audio interface or a video interface, etc.), therefore
- the user of the electronic device 200 performs an interactive operation, it is easy to touch the conference interface by mistake, causing the conference to be interrupted, thereby making the conference in a stagnant state. To sum up, the operation of adding conference members is cumbersome, time-consuming, inconvenient to use, and has poor user experience.
- the present application provides a conference access method and electronic device.
- Electronic devices can interact with each other through ultra-short-range communication. It is hoped to interact with the electronic device of the current conference, with the electronic device of the chairman of the conference, or with other electronic devices that have been connected to the current conference, through natural interaction such as touching or approaching. mode to access the current conference.
- a fast and convenient conference access method is provided, which is simple to operate, takes less time, and has better user experience; moreover, this method ensures security; in addition, this method also solves the problem of false touches.
- the electronic device 100, the electronic device 200, and the electronic device 300 shown in FIG. 1 can interact with other electronic devices to add new conference members based on the ultra-short-range communication method on the one hand.
- a conference call can be made based on any one of the above-mentioned common communication methods such as cellular mobile communication such as 2G/3G/4G/5G, optical fiber communication, and Ethernet communication. That is to say, the electronic device can switch between the ultra-short-range communication method and the ordinary communication method, or the electronic device can perform the ultra-short-distance communication method and the above-mentioned ordinary communication method in parallel to realize different functions.
- the ultra-short-range communication method refers to a communication method that can communicate only when the distance between the two communicating parties is within a preset safe distance.
- the preset security distance refers to the distance at which the two communicating parties can exchange secret information.
- the preset safety distance may be less than or equal to any short distance such as 30 cm, 20 cm or 10 cm.
- the preset safety distance can be specifically set according to the user's needs. It can be understood that for both parties in communication, since ultra-short-distance communication can only be performed within a preset safe distance, the ultra-short-distance communication method can ensure the security of data transmission.
- the ultra-short-distance communication method can be an improved communication method based on a variety of traditional communication methods.
- the ultra-short-distance communication method may include one of a Wi-Fi ultra-short-distance communication method, a Bluetooth ultra-short-distance communication method, and a Zigbee ultra-short-distance communication method.
- an ultra-short-range communication method can be realized by adding an antenna capable of realizing ultra-short-range communication. That is to say, there is no need to add new hardware devices or substantially modify existing hardware devices to realize the ultra-short-range communication method.
- the scenario shown in FIG. 1 can be divided into the following two scenarios:
- Scenario 1 In scenario 1, there is no electronic device accessing the conference created by the current electronic device 200 . That is, neither the electronic device 100 nor the electronic device 300 is connected to the current conference. In Scenario 1, the electronic device 200 starts to create a conference and prepares to access other electronic devices (eg, the electronic device 100 and the electronic device 300). It can also be considered that in Scenario 1, only the electronic device 200 is the member participating in the conference. The electronic device of the party to be connected can join the conference created by the electronic device 200 by approaching the electronic device 200 .
- Scenario 2 In scenario 2, at least one electronic device accesses the conference created by the current electronic device 200 . That is, currently, the electronic device 200 is in a conference with at least one other electronic device, and the corresponding conference group includes the electronic device 200 and at least one other electronic device.
- the conference in this embodiment of the present application includes a regular conference and a conference without a conference chairman. Therefore, scenario 2 may also include a scenario where a conference chairman exists and a scenario where there is no conference chairman. In a scenario where a conference chairman exists and a scenario where there is no conference chairman, the electronic device of the party to be connected can join the current conference by approaching any electronic device participating in the conference.
- FIG. 3 shows a schematic diagram of a hardware structure of an electronic device provided by an embodiment of the present application.
- the electronic device may be any one of the electronic device 100 , the electronic device 200 and the electronic device 300 shown in FIG. 1 .
- the electronic device 200 may include a processor 210, an external memory interface 220, an internal memory 221, a universal serial bus (USB) interface 230, a battery 240, an antenna 1 , Antenna 2, Mobile Communication Module 250, Wireless Communication Module 260, Audio Module 270, Speaker 270A, Receiver 270B, Microphone 270C, Sensor Module 280, Key 290, Motor 291, Indicator 292, Camera 293, Display 294, and User Identity module (subscriber identification module, SIM) card interface 295 and so on.
- a processor 210 an external memory interface 220, an internal memory 221, a universal serial bus (USB) interface 230, a battery 240, an antenna 1 , Antenna 2, Mobile Communication Module 250, Wireless Communication Module 260, Audio Module 270, Speaker 270A, Receiver 270B, Microphone 270C, Sensor Module 280, Key 290, Motor 291, Indicator 292, Camera 293, Display 294, and User Identity module (subscriber identification module, SIM) card interface 295 and so on
- the structures illustrated in the embodiments of the present application do not constitute a specific limitation on the electronic device 200 .
- the electronic device 200 may include more or less components than shown, or combine some components, or separate some components, or arrange different components.
- the illustrated components may be implemented in hardware, software, or a combination of software and hardware.
- the processor 210 may include one or more processing units, for example, the processor 210 may include an application processor (application processor, AP), a modem processor, a graphics processor (graphics processing unit, GPU), an image signal processor (image signal processor, ISP), controller, memory, video codec, digital signal processor (digital signal processor, DSP), baseband processor, and/or neural-network processing unit (NPU) Wait. Wherein, different processing units may be independent devices, or may be integrated in one or more processors.
- application processor application processor, AP
- modem processor graphics processor
- ISP image signal processor
- controller memory
- video codec digital signal processor
- DSP digital signal processor
- NPU neural-network processing unit
- the processor 210 may include one or more interfaces.
- the interface may include an integrated circuit (inter-integrated circuit, I2C) interface, an integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, a pulse code modulation (pulse code modulation, PCM) interface, a universal asynchronous transceiver (universal asynchronous transmitter) receiver/transmitter, UART) interface, mobile industry processor interface (MIPI), general-purpose input/output (GPIO) interface, subscriber identity module (SIM) interface, and / or universal serial bus (universal serial bus, USB) interface, etc.
- I2C integrated circuit
- I2S integrated circuit built-in audio
- PCM pulse code modulation
- PCM pulse code modulation
- UART universal asynchronous transceiver
- MIPI mobile industry processor interface
- GPIO general-purpose input/output
- SIM subscriber identity module
- USB universal serial bus
- the USB interface 230 is an interface that conforms to the USB standard specification, and may specifically be a Mini USB interface, a Micro USB interface, a USB Type C interface, and the like. It can be understood that the interface connection relationship between the modules illustrated in the embodiments of the present application is only a schematic illustration, and does not constitute a structural limitation of the mobile routing device 200 . In other embodiments of the present application, the mobile routing device 200 may also adopt different interface connection manners in the foregoing embodiments, or a combination of multiple interface connection manners.
- the wireless communication function of the electronic device 200 may be implemented by the antenna 1, the antenna 2, the mobile communication module 250, the wireless communication module 260, the modulation and demodulation processor, the baseband processor, and the like.
- Antenna 1 and Antenna 2 are used to transmit and receive electromagnetic wave signals.
- Each antenna in mobile routing device 200 may be used to cover a single or multiple communication frequency bands. Different antennas can also be reused to improve antenna utilization.
- the antenna 1 can be multiplexed as a diversity antenna of the wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
- the mobile communication module 250 may provide mobile communication solutions including 2G/3G/4G/5G etc. applied on the electronic device 200 .
- the mobile communication module 250 may include at least one filter, switch, power amplifier, low noise amplifier (LNA), and the like.
- the mobile communication module 250 can receive electromagnetic waves from the antenna 1, filter and amplify the received electromagnetic waves, and transmit them to the baseband communication processor for demodulation.
- the mobile communication module 250 can also amplify the signal modulated by the baseband communication processor, and then convert it into electromagnetic waves for radiation through the antenna 1 .
- at least part of the functional modules of the mobile communication module 250 may be provided in the processor 210 .
- at least part of the functional modules of the mobile communication module 250 may be provided in the same device as at least part of the modules of the processor 210 .
- the wireless communication module 260 can provide applications on the electronic device 200 including wireless local area networks (WLAN) (such as wireless fidelity (Wi-Fi) networks), bluetooth (BT), global navigation satellites Wireless communication solutions such as global navigation satellite system (GNSS), frequency modulation (FM), near field communication (NFC), and infrared technology (IR).
- WLAN wireless local area networks
- BT Bluetooth
- GNSS global navigation satellite system
- FM frequency modulation
- NFC near field communication
- IR infrared technology
- the wireless communication module 260 may be one or more devices integrating at least one communication processing module.
- the wireless communication module 260 receives electromagnetic waves via the antenna 2 , frequency modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 210 .
- the wireless communication module 260 can also receive the signal to be sent from the application processor 211 , perform frequency modulation on it, amplify the signal, and then convert it into an electromagnetic wave for radiation through the antenna 2 .
- the antenna 2 may be used to implement the above-mentioned ultra-short-range communication manner.
- FIGS. 4A-4B are schematic structural diagrams of an antenna capable of ultra-short-range communication.
- FIG. 4A shows the principle structure of an ultra-short-range wireless communication module and an antenna provided by an embodiment of the present application.
- the electronic device 200 may include a processor 210 , a wireless communication module 260 , an antenna A and a wire B, wherein the above-mentioned antenna 2 includes an antenna A and an antenna B.
- the antenna A also called a first antenna, such as a strong antenna
- an antenna B also called a second antenna, such as a weak antenna
- the wireless communication module 260 converts the electromagnetic wave received from the antenna A or the antenna B into a signal, and sends the signal to the processor 210 for processing; or the wireless communication module 260 receives the signal to be sent from the processor 210, via a strong antenna Or weak antennas turn into electromagnetic waves and radiate out.
- the first transmission distance (such as 10 meters, 5 meters, etc., which can be set by the user) of the signal transmitted by the strong antenna is greater than the second transmission distance of the signal transmitted by the weak antenna (such as 0.2 meters, 0.3 meters, etc., specifically can be set by the user).
- the second transmission distance of the weak antenna transmission signal is less than or equal to the preset safety distance; wherein, the preset safety distance is the distance for the user of the electronic device 200 to exchange secret information with another electronic device through the electronic device 200 .
- the preset safety distance may be 50cm, 40cm, 30cm, 20cm, and the like.
- the processor 210 may control the switching of strong antennas and weak antennas.
- the electronic device 200 When the electronic device 200 adopts a strong antenna, the electronic device 200 receives the signal sent by the other electronic device only when the distance between the electronic device 200 and another electronic device is less than the first transmission distance; when the electronic device 200 adopts a weak antenna , only when the distance between the electronic device 200 and the other electronic device is smaller than the second transmission distance, the electronic device receives the signal sent by the other electronic device.
- the first emission distance is greater than the preset safety distance
- the second emission distance is smaller than or equal to the preset safety distance.
- the first transmission distance and the second transmission distance may be referred to as a first distance and a second distance, respectively.
- FIG. 4B shows another principle structure of an ultra-short-range wireless communication module and an antenna provided by an embodiment of the present application.
- the electronic device 200 may include a processor 210 , a wireless communication module 260 and an antenna 2 .
- the wireless communication module 260 includes a wireless module 261 and a variable impedance circuit module 262 .
- Antenna 2 is used to transmit and receive wireless signals.
- the variable impedance circuit module 262 may be a circuit composed of variable impedance, an integrated circuit, or the like.
- the processor 210 controls and adjusts the impedance value of the variable impedance circuit module 262 to adjust the transmission power loaded on the antenna 2, thereby controlling the transmission distance when the antenna 2 transmits wireless signals.
- the transmission power of the antenna 2 is the first transmission power
- the distance at which the wireless signal is transmitted by the antenna 2 is the first transmission distance (to achieve a strong antenna). function)
- the transmission power of the antenna 2 is the second transmission power
- the distance at which the antenna 2 transmits the wireless signal is the second transmission distance (to realize the function of the weak antenna) ).
- the first transmit power is greater than the second transmit power
- the first transmit distance is greater than a preset safe distance
- the second transmit distance is less than or equal to the preset safe distance.
- the first transmission distance and the second transmission distance may be referred to as a first distance and a second distance, respectively.
- other descriptions about the processor 210 and the wireless communication module 260 are the same as those in the example corresponding to FIG. 4A , and are not repeated here.
- the electronic device 100 and the electronic device 300 may also include the ultra-short-range wireless communication module and the structure of the antenna.
- the electronic device 100 may include a processor 110 , a wireless communication module 160 , and an antenna 2 , where the antenna 2 includes an antenna A and an antenna B.
- the electronic device 100 may include a processor 110 , a wireless communication module 160 and an antenna 2 .
- the specific description is the same as or similar to the description related to FIG. 4A and FIG. 4B , and will not be repeated here.
- the principle structures illustrated in one example corresponding to FIG. 4A and another example corresponding to FIG. 4B do not constitute specific limitations on the wireless communication module and the antenna in the electronic device 200 .
- the structure of the wireless communication module and the antenna in the electronic device 200 may include more or less components than those shown in the figure, or combine some components, or separate some components, or arrange different components .
- the illustrated components may be implemented in hardware, software, or a combination of software and hardware.
- the above content is also applicable to the structure of the ultra-short-range wireless communication module and the antenna of the electronic device 100 ; details are not repeated here.
- the above-mentioned strong antenna and weak antenna may share a part of the wiring, for example, as described in the embodiments shown in FIGS. 5A-5C .
- Figures 5A-5C illustrate three implementations of the strong antenna and the weak antenna in Figure 4A.
- the structure of a wireless communication module and an antenna of the electronic device 100 and the electronic device 300 may also adopt the three manners shown in FIGS. 5A-5C .
- the strong antenna and the weak antenna may share a part of the wiring.
- the strong antenna and the weak antenna in the electronic device in the embodiment of the present application can be switched by a radio frequency switch.
- both the weak antenna and the radio frequency switch (the weak antenna shown in the dashed box in Figures 5A-5C) can be placed in the shielding case or the weak antenna can be placed in the chip.
- the purpose of the weak antenna in the embodiment of the present application is to reduce the transmission distance as much as possible.
- the principle of constructing a weak antenna can be:
- weak antenna The specific implementation of weak antenna can be used:
- the above-mentioned shortening of the antenna means that the weak antenna is shorter than the strong antenna.
- the structures of the three weak antennas are shown in FIGS. 5A to 5C , and the weak antennas are shown as the structures in the dotted boxes in FIGS. 5A to 5C .
- the structures of the strong antennas in FIGS. 5A to 5C are all connected to a filter circuit (eg, a ⁇ -type circuit), a matching circuit (eg, a ⁇ -type circuit) and a matching circuit through radio frequency input/output (RFIO) pins.
- External antenna body eg, the antenna body may be a length of metal trace).
- the weak antenna a shown in the dashed box in FIG.
- the weak antenna b shown in the dashed box in FIG. 5B , and the weak antenna c shown in the dashed box in FIG. 5C have different lengths, but are shorter than the strong antennas.
- the function of the filter circuit is to prevent interference, and the matching circuit is used to match the strong antenna.
- the weak antenna a may be located in the shield.
- the weak antenna a may include the RFIO pin of the Wi-Fi chip in the shield and the first switch of the two switches (the first switch is not connected to any device).
- the weak antenna a may also include a trace between the RFIO pin and the first switch.
- the two-way switch refers to the switch between the trace or RFIO pin and the filter circuit. Through the two-way switch, the trace or the RFIO pin can be connected or disconnected from the filter circuit.
- the first switch is the switch shown in FIG. 5A that is connected to the RFIO pin or trace and disconnected from the filter circuit. It should be understood that the two-way switch in the embodiment of the present application may be a single-pole double-throw switch.
- the weak antenna b may be located in the shielding case.
- the weak antenna b may include the RFIO pin of the Wi-Fi chip in the shield, the first switch of the two switches (the first switch is connected to a resistor), and a matching device.
- the weak antenna b may also include a first trace between the RFIO pin and the first switch.
- the weak antenna b may also include a second trace between the matching device and the ground.
- the matching device can be a resistor. Part of the electromagnetic wave radiation can be converted into heat energy and consumed by grounding the resistance, thereby reducing the radiation efficiency of the weak antenna b.
- the two-way switch refers to the switch between the RFIO pin or the first wiring and the resistor and filter circuit. Through this switch, the RFIO pin or the first wiring can be connected to the resistor and disconnected from the filter circuit. On, or the RFIO pin or the first trace can be disconnected from the resistor and connected to the filter circuit.
- the first switch is a switch connected to the matching device and disconnected from the filter circuit among the two switches.
- the weak antenna c may be located in the shielding case.
- the filter circuit matched by the chip is followed by a matching device (for example, a resistor) to the ground.
- the weak antenna c may include the RFIO pin of the Wi-Fi chip in the shield, the filter circuit, the first switch of the two switches (the first switch is connected to a resistor), and a matching device (eg, a resistor).
- the weak antenna c may also include a first trace between the RFIO pin and the filter circuit.
- the weak antenna c may also include a second trace between the filter circuit and the matching device.
- the two-way switch refers to the switch between the filter circuit inside the shield, the matching device, and the matching circuit outside the shield.
- the first switch is a switch used to connect the filter circuit and the matching device in the shield.
- the above-mentioned strong antennas in FIGS. 5A to 5B may include RFIO pins, the second switch of the two switches, a filter circuit, a matching circuit, and an antenna body externally connected to the matching circuit.
- the strong antenna in FIGS. 5A to 5B may also include a trace between the RFIO pin and the second switch of the two switches.
- the second switch is a switch used to connect the RFIO pin and the filter circuit.
- the above-mentioned strong antenna in FIG. 5C may include an RFIO pin, a filter circuit, a second switch of the two switches, a matching circuit, and an antenna body connected outside the matching circuit.
- the strong antenna in Figure 5C can also include traces between the RFIO pins and the filter circuit.
- the second switch is a switch used to connect the filter circuit inside the shield and the matching circuit outside the shield.
- the wireless communication module 260 shown in FIG. 4A may be a Wi-Fi chip, or may be a Wi-Fi chip and its matching circuit.
- the wireless module 261 shown in FIG. 4B may be a Wi-Fi chip, and the wireless communication module 260 shown in FIG. 4B may be a Wi-Fi chip and its matching circuit.
- the above different weak antenna structures, together with the different transmit power (Tx power) settings of the Wi-Fi chip, can meet different ultra-short-range communication requirements (for example, from 10cm to 2m).
- Table 1 shows the communication distances of different transmit powers when several different weak antenna (second antenna) structures cooperate with the Wi-Fi chip.
- Table 2 shows the communication distances of different transmit powers when several different second antenna structures cooperate with the Bluetooth chip.
- Table 3 shows the communication distances of different transmit powers when several different second antenna structures cooperate with the ZigBee chip.
- the difference between the maximum transmit power and the minimum transmit power of the antenna is correlated. If the minimum transmit power of the electronic device 200 is reduced very low, the maximum transmit power will also be reduced, so that the distance requirement during normal operation cannot be met.
- manufacturers of smart devices can use different second antenna structures and transmit powers to ensure the communication distance of smart devices.
- the thickness of the smart air conditioner housing may be different, so under the condition of the same second antenna structure and the same transmit power, the communication distance at which the smart air conditioner can be discovered may also be different.
- Different smart device manufacturers can test the safe distance at which the smart device can be discovered based on the structure of the smart device itself, the structure of the second antenna and a certain transmit power.
- the electronic device 200 includes multiple chips (for example, the electronic device 200 includes a Wi-Fi chip, a Bluetooth chip, and a ZigBee chip), then the Wi-Fi chip, the Bluetooth chip, and the ZigBee chip in the electronic device 200
- the chips can share the first antenna and the second antenna in the above-mentioned FIG. 5A; or, the Wi-Fi chip, the Bluetooth chip and the ZigBee chip in the electronic device 200 can share the first and second antennas in the above-mentioned FIG. 5B; or,
- the Wi-Fi chip, the Bluetooth chip, and the ZigBee chip in the electronic device 200 may share the first antenna and the second antenna in FIG. 5C .
- the Wi-Fi chip, the Bluetooth chip and the ZigBee chip in the electronic device 200 may not share the first antenna and the second antenna.
- FIGS. 5A to 5C are the physical first antenna and the second antenna, and the first device can switch the physical first antenna and the second antenna through the radio frequency switch.
- the first device may also have only one antenna physically, but logically includes a first antenna and a second antenna.
- the electronic device 200 can implement the logical first antenna and the second antenna by adjusting the transmit power of the physical antenna. For example, when the transmit power of the physical antenna is the first transmit power, it can be regarded as the first logical antenna; when the transmit power of the physical antenna is the second transmit power, it can be regarded as the second logical antenna an antenna; wherein the first transmit power is greater than the second transmit power.
- the electronic device 200 can adjust the transmit power of the physical antenna by adjusting the devices inside the chip.
- the electronic device 200 may adjust the transmit power of the physical antenna through a multi-stage amplifier inside the chip.
- the electronic device 200 can shield the multi-stage amplifier inside the chip by adjusting the value of the register, so that the transmit power of the physical antenna is the first transmit power, which can be regarded as the logical first antenna at this time; the electronic device 200 It is also possible to adjust the value of the register so that the transmit power of the physical antenna is the second transmit power, which can be considered as the second logical antenna at this time; wherein, the first transmit power is greater than the second transmit power.
- the electronic device 200 can also adjust the transmit power of the physical antenna through a peripheral circuit outside the chip.
- the first antenna and the second antenna involved in the various embodiments of the present application may be the physical first antenna and the second antenna, or may be the logical first antenna and the second antenna.
- the electronic device 200 switching the logical first antenna and the second antenna can achieve the same effect as the electronic device 200 switching the physical first antenna and the second antenna through a radio frequency switch.
- the electronic device adopts a strong antenna, if the distance between the electronic device (located at the center of the circle shown in FIG. 6 ) and another electronic device is less than the first distance (such as the other electronic device is located at the position 1 shown in FIG. 6 ), then The electronic device can communicate with another electronic device; when the electronic device adopts a weak antenna, if the distance between the electronic device (located at the center of the circle shown in Position 2) shown in Figure 6, the electronic device can communicate with another electronic device.
- the antenna of the electronic device when the antenna of the electronic device is configured with the first transmit power, if the distance between the electronic device (located at the center of the circle shown in FIG. 6 ) and another electronic device is smaller than the first distance (as shown in FIG. position 1), the electronic device can communicate with another electronic device; when the antenna of the electronic device is configured to the second transmit power, if the distance between the electronic device (located at the center of the circle shown in FIG. 6 ) and the other electronic device is less than At a second distance (eg, the mobile device is in position 2 as shown in FIG. 6 ), the electronic device can communicate with another electronic device.
- a second distance eg, the mobile device is in position 2 as shown in FIG. 6
- the accuracy of the first distance and the second distance will not be so accurate, and there may be certain errors. In this way, the first distance or the second distance will present a range in actual operation, rather than a precise numerical distance. In addition, in different environments, even with the same antenna and the same transmit power, differences in the first distance and differences in the second distance may occur.
- the antenna 2 in FIG. 3 may include a variety of different working modes, for example, including working modes such as a normal mode and an ultra-short-range mode.
- working modes such as a normal mode and an ultra-short-range mode.
- the transmit power of the antenna 2 is different.
- the normal mode the transmit power of the antenna 2 is relatively large, and the electronic device can communicate with other electronic devices at a long distance.
- the ultra-short-range mode the transmit power of the antenna 2 is relatively small, and the electronic device can communicate with other electronic devices in a short distance.
- the antenna 2 may include two different antennas: the antenna A and the antenna B.
- the antenna A since the transmission power of the antenna A is relatively large, when the communication is performed through the antenna A, the electronic device can communicate with other electronic devices at a long distance. It can also be considered that the current antenna 2 works in the above-mentioned normal mode. Since the transmit power of the antenna B is relatively small, when communicating through the antenna B, the electronic device can communicate with other electronic devices in a short distance. It can also be considered that the current antenna 2 works in the above-mentioned ultra-short-range mode.
- the antenna transmit power is small and the communication distance is short; in the normal mode, the antenna transmit power is large and the communication distance is long.
- the embodiment of the present application provides a method for accessing a conference.
- the electronic device of the party to be accessed can join the current conference by approaching or touching the chairman of the conference based on the ultra-short-range communication method.
- FIG. 8A is a flowchart of a method for accessing a conference provided by an embodiment of the present application.
- the electronic device 100 is the party to be connected, that is, the electronic device that wants to access the current conference.
- the electronic device 200 is the conference chairperson, and it can be considered that the account of the electronic device 200 on the conference application is the account of the conference creator.
- the current conference that the electronic device 200 participates in is recorded as conference A.
- the electronic device 100 includes a first antenna and a second antenna.
- the first antenna is a strong antenna
- the second antenna is a weak antenna
- the first transmission distance of the signal transmitted by the first antenna is greater than the second transmission distance of the signal transmitted by the second antenna
- the second transmission distance is less than or equal to the preset safety distance .
- the electronic device 200 includes a third antenna and a fourth antenna.
- the third antenna is a strong antenna
- the fourth antenna is a weak antenna
- the third transmission distance of the signal transmitted by the third antenna is greater than the fourth transmission distance of the signal transmitted by the fourth antenna
- the fourth transmission distance is less than or equal to the preset safety distance .
- the preset safe distance is the distance at which the user of the electronic device exchanges secret information with another electronic device through the electronic device.
- the preset safety distance may be 30cm.
- the conference access method provided by the embodiment of the present application includes:
- the electronic device 100 receives the first input.
- the electronic device 100 receives the first input after opening the conference application in response to the user's operation.
- the conference application refers to an application that can conduct conferences in the form of audio or video.
- the conference application may be Huawei's Changlian call, WeChat audio and video call, or other applications capable of conducting conferences, and the embodiment of the present application does not limit the type of conference applications.
- the first input is that the user clicks on an option of "touch to meeting" in the meeting application.
- the first input may also be voice input, gesture input, or other forms of input after the electronic device 100 starts the conference application, which is not limited in this embodiment of the present application.
- the electronic device 100 may directly receive the first input. That is, the electronic device 100 may receive the first input in the case of displaying the main interface or other application interfaces.
- the first input may be a voice input of "touch to a conference", a specific gesture input, a touch operation, or an input in other forms, which is not limited in this embodiment of the present application.
- the first input indicates that the user on the side of the electronic device 100 wants to access the current conference.
- the user on the electronic device 100 side wants to access the current conference means that the user wants the electronic device 100, the login account on the electronic device 100 or the login account of the conference application on the electronic device 100 to be able to access the current conference.
- the electronic device 100 broadcasts a first message through the first antenna, where the first message includes a conference joining request and an identity (identity, ID) of the electronic device 100 .
- the electronic device 100 upon receiving the first input, broadcasts a first message through the first antenna, the first message including the meeting join request and the ID of the electronic device 100 . Since the transmission distance of the first antenna is relatively long, the electronic device that is far away from the electronic device 100 can also receive the first message.
- the transmission distance of the first antenna is 5m
- all electronic devices within a distance of 5m from the electronic device 100 may receive the first message.
- the ID of the electronic device 100 represents information that can uniquely identify the electronic device 100 .
- the ID of the electronic device 100 may be information such as the MAC address of the electronic device 100 .
- the first message may be a Neighborhood Aware Network (NAN) service discovery frame (SDF) publish message or other type of broadcast message. This application does not limit the type of the first message.
- NAN Neighborhood Aware Network
- SDF service discovery frame
- the electronic device 200 receives the first message, obtains the conference joining request and the ID of the electronic device 100, and generates a random key.
- the electronic device 200 broadcasts the first message through the first antenna, if the electronic device 200 is located within the transmission distance of the first antenna of the electronic device 100, the electronic device 200 can receive the first message and then obtain the first message Contains the meeting join request and the ID of the electronic device 100 .
- the electronic device 200 may also generate a random key. Encrypting information with a random key can improve the security of subsequent information transmission.
- the electronic device 200 sends a first response message through the fourth antenna, where the first response message includes the random key and the ID of the electronic device 200.
- the ID of the electronic device 200 represents information that can uniquely identify the electronic device 200 .
- the ID of the electronic device 200 may be information such as the MAC address of the electronic device 200 .
- the first response message may further include information such as a conference ID or a conference password of conference A (the conference attended by the electronic device 200 ).
- the first response message may further include basic conference information, such as conference subject, conference introduction, and conference participants.
- the first response message may be a NAN SDF Follow-up message or other type of broadcast message. This application does not limit the type of the first response message.
- the transmission distance of the fourth antenna is relatively short. Therefore, when the distance between the electronic device 100 and the electronic device 200 is relatively short, the electronic device 100 can receive the first response message, so that a distance-based trust relationship can be established between the electronic device 100 and the electronic device 200 . Under this trust relationship, safe and reliable data interaction can be achieved.
- the electronic device 200 switches between the third antenna and the fourth antenna by means of time division multiplexing.
- the electronic device 200 maintains normal communication of conference A through the third antenna most of the time, and enables the electronic device of the party to be accessed to access the conference A through the access method provided by the embodiment of the present application through the fourth antenna in a small part of the time.
- the electronic device 200 is in the normal communication of the conference A most of the time, and allows other electronic devices to access the conference A through the fourth antenna seldom time.
- the electronic device 200 can switch between the ultra-short-distance mode and the normal mode in a time-sharing manner by switching the antenna, so as to transmit call data and ultra-short-distance transmission data in different modes at different times. It should be noted that, since the period of time-division switching is in milliseconds, during the switching process, it is difficult for the user to notice that the electronic device switches between the ultra-short-range mode and the normal mode. That is to say, the user may consider that the ultra-short-distance transmission process and the conference call data transmission process occur simultaneously.
- the electronic device 200 may periodically switch between the third antenna and the fourth antenna.
- the communication data is exchanged with the server 400 through the router, so as to ensure the normal progress of the conference call.
- the electronic device 200 switches to the fourth antenna, if other electronic devices request to join the current conference, the electronic device 200 invites other electronic devices close to the electronic device 200 to access the current conference through Wi-Fi channel 6 .
- the electronic device 100 within the transmission distance of the fourth antenna, the electronic device 100 receives the first response message, and acquires the random key and the ID of the electronic device 200.
- the transmission distance of the fourth antenna is relatively short. Therefore, when the distance between the electronic device 100 and the electronic device 200 is relatively short, the electronic device 100 to receive the first response message.
- the electronic device 100 obtains the random key and the ID of the electronic device 200 in the first response message.
- the electronic device 100 is located within the emission distance of the fourth antenna, which can be implemented by the electronic device 100 approaching the electronic device 200, or by the electronic device 200 approaching the electronic device 100, or by the electronic device 100 and the electronic device 100.
- the electronic devices 200 are implemented close to each other.
- the electronic device 100 being located within the emission distance of the fourth antenna may be realized by touching the electronic device 100 to the electronic device 200 .
- the electronic device 100 may also obtain information such as the conference ID or the conference password of the conference A.
- the electronic device 100 receives a second input for indicating joining, and encrypts the SIM card number of the electronic device 100 and the account number of the electronic device 100 on the conference application using a random key.
- the electronic device 100 may directly receive a second input for indicating joining.
- the electronic device 100 may display part or all of the content of the first response message, and after the user views and confirms the first response message, receives a second input for indicating joining .
- the electronic device 100 can display the ID of the electronic device 200 on the screen of the electronic device 100 , and can also display information such as the conference ID of the conference A.
- the second input is received when the user on the side of the electronic device 100 checks and confirms that the conference in which the electronic device 200 is the chairman of the conference is a conference to which the electronic device 100 is to join.
- the second input may be a touch operation, voice input, gesture input, or other forms of input, which are not limited in this application.
- the obtained random key generated by the electronic device 200 can be used to encrypt the SIM card number of the electronic device 100 and the account number of the electronic device 100 on the conference application.
- the SIM card number of the electronic device 100 is used for the server to call back the electronic device 100 .
- the account of the electronic device 100 on the conference application represents the account logged in the conference application of the electronic device 100 .
- the account of the electronic device 100 on the conference application may be account information such as a nickname of the Changlian application, a WeChat account, and the like.
- the account of the electronic device 100 on the conference application is the WeChat account logged in on the electronic device 100 . It can be understood that, the electronic device 100 can be pulled into the conference A through the account of the electronic device 100 on the conference application.
- the electronic device 100 sends a second message through the second antenna, where the second message includes the ID of the electronic device 200 and the information encrypted with the random key.
- the electronic device 100 Since the electronic device 100 receives the first response message within the transmission distance of the fourth antenna, it can be considered that the distance between the electronic device 100 and the electronic device 200 is very close. In this case, the electronic device 100 may send the second message to the electronic device 200 through the second antenna.
- the second message includes the information encrypted with the random key in S806a and the ID of the electronic device 200 .
- the ID of the electronic device 200 may be in plain text and does not need to be encrypted.
- the random key is generated by the electronic device 200, only the electronic device 200 can decrypt the information encrypted by the random key. Even if other electronic devices obtain the encrypted information, they cannot obtain the specific content of the information, so that the security in the communication process can be improved.
- the electronic device 200 receives the second message, decrypts it with a random key, and obtains the SIM card number of the electronic device 100 and the account number of the electronic device 100 on the conference application.
- the electronic device 200 since the electronic device 100 sends the second message through the second antenna in S807a, the electronic device 200 can only receive the second message when it is within the transmission distance of the second antenna.
- the electronic device 200 can decrypt the encrypted information in the second message by using the random key generated by itself, and obtain the SIM card number of the electronic device 100 and the account number of the electronic device 100 on the conference application.
- S804a if the second message is received within the preset time period, S808a is executed; if the second message is not received within the preset time period, it means that the electronic device 100 has not communicated with the electronic device 100.
- the devices 200 are in close proximity, that is to say, the electronic device 100 does not intend to join the conference where the electronic device 200 is located, so it directly exits and ends the process.
- the electronic device 200 receives a third input for indicating consent.
- the electronic device 200 after receiving the second message, the electronic device 200 directly receives a third input for indicating consent.
- the electronic device 200 A third input indicating consent may be received directly.
- the electronic device 200 displays the SIM card number of the electronic device 100 in the second message, and the account number of the electronic device 100 on the conference application and other information, and the user checks and confirms these information. Then, a third input for indicating consent is received.
- the electronic device 200 needs to show the user the information of the electronic device of the party to be accessed. For related information, as shown in FIG. 11 , after the user has viewed and confirmed the information, and clicked the “Agree” control, the electronic device 200 can receive the third input for indicating consent.
- the third input may be a touch operation, voice input, gesture input or other forms of input, which are not limited in this application.
- the electronic device 200 sends the third message to the server only after receiving the third input for indicating approval, that is, performing subsequent steps such as S810a. If the electronic device 200 receives the third input for indicating rejection, the method flow ends, and the electronic device 100 does not join the conference A.
- step S809a may be omitted, and subsequent steps S810a-S814a are directly executed.
- the electronic device 200 may directly use the third antenna to use the encryption provided for the conference by the conference application after receiving the second message. mechanism to send a third message.
- the current conference has no permission restrictions (that is, anyone can access the current conference), and the consent of the conference chairman is not required.
- the electronic device of the party to be connected can be connected to the current conference by touching any electronic device participating in the conference, which is more efficient.
- the electronic device 200 sends a third message through the third antenna through the encryption mechanism provided by the conference application for the conference, where the third message includes the SIM card number of the electronic device 100, the account number of the electronic device 100 on the conference application, and the electronic device 200 Account and conference ID on the conference application.
- the electronic device 200 may send the third message through the third antenna through the encryption mechanism provided for the conference by the conference application.
- the conference application can provide a specific encryption mechanism for each conference in the conference application, so as to ensure that when the conference communicates normally, people outside the conference cannot obtain conference information, further ensuring the security of the conference.
- the WeChat application can provide the meeting A with a specific encryption mechanism.
- the specific manner of the encryption mechanism is not limited.
- the third message includes the SIM card number of the electronic device 100, the account number of the electronic device 100 in the conference application, the account number of the electronic device 200 in the conference application, and the conference ID.
- the server 400 receives the third message, and obtains the SIM card number of the electronic device 100, the account number of the electronic device 100 on the conference application, and the account number of the electronic device 200 on the conference application through the decryption mechanism provided by the conference application for the conference , Conference ID.
- a server corresponding to the conference application can provide a decryption mechanism for the conference, and the encryption mechanism corresponds to the decryption mechanism.
- the server 400 obtains specific information in the received third message through a corresponding decryption mechanism.
- the server 400 determines whether the account of the electronic device 200 on the conference application is the chairperson of the conference corresponding to the conference ID.
- the server 400 determines whether the account of the electronic device 200 in the conference application is the chairman of the conference corresponding to the conference ID according to the obtained account and conference ID of the electronic device 200 in the conference application.
- the server 400 stores a corresponding list of conference IDs and the accounts of each conference chairperson on the conference application, and the server 400 determines whether the account of the electronic device 200 on the conference application is the chairperson of the conference corresponding to the conference ID through the list. .
- the server 400 calls back the electronic device 100 according to the obtained SIM card number of the electronic device 100 .
- the process ends.
- the electronic device 100 is turned on, and joins the conference through the first antenna.
- the electronic device 100 joins the conference, that is, joins the conference A through the first antenna.
- the user of the electronic device 100 finds that he does not need to access the conference A or wants to quit the conference A after the electronic device 100 accesses the conference A, the user can hang up the conference A at any time, so that the electronic device 100 quits the conference A.
- the user can exit the meeting application by clicking the "hang up” control. Users can also exit the meeting by voice input "exit meeting” and other methods. This embodiment of the present application does not limit the manner in which the electronic device exits the conference.
- the electronic device 100 may be switched to the first antenna after S807a, or may be switched to the first antenna in S814a, which is not limited in this embodiment of the present application.
- FIG. 8B is a flowchart of another conference access method provided by an embodiment of the present application.
- the electronic device 100 is the party to be connected, the electronic device 200 is the chairman of the conference, and the current conference that the electronic device 200 participates in is recorded as conference A.
- the electronic device 100 includes a first antenna and a second antenna.
- the first antenna is a strong antenna
- the second antenna is a weak antenna
- the first transmission distance of the signal transmitted by the first antenna is greater than the second transmission distance of the signal transmitted by the second antenna
- the second transmission distance is less than or equal to the preset safety distance .
- the electronic device 200 includes a third antenna and a fourth antenna.
- the third antenna is a strong antenna
- the fourth antenna is a weak antenna
- the third transmission distance of the signal transmitted by the third antenna is greater than the fourth transmission distance of the signal transmitted by the fourth antenna
- the fourth transmission distance is less than or equal to the preset safety distance .
- the preset safe distance is the distance at which the user of the electronic device exchanges secret information with another electronic device through the electronic device.
- the preset safety distance may be 30cm.
- the conference access method provided by the embodiment of the present application includes:
- the electronic device 100 receives the first input.
- S801b is the same as S801a, refer to the description of S801a, and details are not repeated here.
- the electronic device 100 broadcasts a first message through the second antenna, where the first message includes the conference joining request and the ID of the electronic device 100.
- the electronic device 100 may broadcast the first message through the second antenna (weak antenna).
- the transmission distance of the second antenna is short, the distance between the electronic device that can receive the first message and the electronic device 100 is relatively short.
- the electronic device 200 receives the first message, acquires the conference joining request and the ID of the electronic device 100, and generates a random key.
- the electronic device 200 Since the transmission distance of the second antenna is short, the electronic device 200 is located within the transmission distance of the second antenna, and the electronic device 200 receives the first message indicating that the distance between the electronic device 200 and the electronic device 100 is relatively short.
- the electronic device 200 is located within the emission distance of the second antenna, which can be implemented by approaching the electronic device 100 to the electronic device 200, or by the electronic device 200 approaching the electronic device 100, or by the electronic device 100 and the electronic device 100.
- the electronic devices 200 are implemented close to each other.
- the electronic device 200 being located within the transmission distance of the second antenna may be realized by touching the electronic device 100 to the electronic device 200 .
- the electronic device 200 sends a first response message through the fourth antenna, where the first response message includes the random key and the ID of the electronic device 200.
- the random key may be sent in plaintext. Since the distance between the electronic device 100 and the electronic device 200 is less than or equal to the preset security distance, it can be considered that it is safe to send the random key in plaintext.
- the electronic device 100 receives the first response message, and obtains the random key and the ID of the electronic device 200.
- S804b-S805b are similar to S804a-S805a, refer to the description of S804a-S805a, and are not repeated here.
- the electronic device 100 encrypts the SIM card number of the electronic device 100 and the account number of the electronic device 100 on the conference application using the random key.
- the electronic device 100 since the electronic device 100 is close to the electronic device 200, it can be determined that the electronic device 100 wants to join the conference A where the electronic device 200 is located. In this way, the electronic device 100 can directly use the random key to encrypt the SIM card number of the electronic device 100 and the account number of the electronic device 100 on the conference application after S805b without receiving a second input for indicating joining.
- the electronic device 100 may also use a random key to encrypt the SIM card number of the electronic device 100 and the account number of the electronic device 100 on the conference application after receiving the second input for indicating joining, to further ensure that the electronic device Joined meeting without error.
- the electronic device 100 sends a second message through the first antenna, where the second message includes the ID of the electronic device 200 and the information encrypted with the random key.
- the electronic device 100 sends the second message through the first antenna.
- the electronic device 100 and the electronic device 200 do not need to be in the emission distance of the second antenna of the electronic device 100 all the time, and the electronic device 100 can move away from the electronic device 200 after initially approaching the electronic device 200, so as to facilitate other electronic devices Joining the conference A by being close to the electronic device 200 improves the convenience of operation.
- the electronic device 200 receives the second message, decrypts it with a random key, and obtains the SIM card number of the electronic device 100 and the account number of the electronic device 100 on the conference application.
- the electronic device 200 can only receive the second message within the transmission distance of the first antenna.
- the electronic device 200 receives a third input for indicating consent.
- this step can be omitted, and the subsequent steps can be directly performed.
- the electronic device 200 sends a third message through the third antenna through the encryption mechanism provided by the conference application for the conference, where the third message includes the SIM card number of the electronic device 100, the account number of the electronic device 100 on the conference application, and the electronic device 200 Account and conference ID on the conference application.
- the server 400 receives the third message, and obtains the SIM card number of the electronic device 100, the account number of the electronic device 100 on the conference application, and the account number of the electronic device 200 on the conference application through the decryption mechanism provided by the conference application for the conference , Conference ID.
- the server 400 determines whether the account of the electronic device 200 on the conference application is the chairman of the conference corresponding to the conference ID.
- the electronic device 100 is turned on, and joins the conference through the first antenna.
- S809b-S814b are the same as S809a-S814a, please refer to the description of S809a-S814a, which will not be repeated here.
- the difference between the conference access method shown in FIG. 8A and the conference access method shown in FIG. 8B is that in FIG. 8A , the electronic device 100 first broadcasts the first message through the first antenna, and then The second antenna sends the second message; in FIG. 8B , the electronic device 100 first broadcasts the first message through the second antenna, and then sends the second message through the first antenna.
- the electronic device 100 can start to request to join the meeting A, and then the electronic device 100 and the electronic device 200 are close to join the meeting. meeting A.
- the distance between the electronic device 100 and the electronic device 200 is less than or equal to the preset safe distance, and then the electronic device 100 can be separated from the electronic device 200 by a certain distance , continue to complete the process of joining meeting A.
- the conference access method provided by the embodiments of the present application does not limit the specific timing of the proximity between the party to be accessed and the conference chairman, as long as the conference access During the process, the party to be connected and the conference chairperson should be close to or touch each other.
- the electronic device 100 and the electronic device 200 respectively include two antennas, and different transmission distances are implemented by different antennas.
- the electronic device 100 may use only one of the first antenna and the second antenna during the conference access process, and realize different transmission distances by adjusting the transmission power of the antenna.
- the electronic device 200 may also use only one antenna among the third antenna and the fourth antenna, and realize different transmission distances by adjusting the transmission power of the antenna.
- the electronic device 100 and the electronic device 200 may each have only one antenna, and different transmission distances can be achieved by adjusting the transmission power of the antenna.
- the electronic device 100 includes only the first antenna
- the electronic device 200 includes only the third antenna.
- the electronic device 100 is the party to be connected, the electronic device 200 is the chairman of the conference, and the current conference that the electronic device 200 participates in is recorded as conference A.
- the electronic device 100 only includes the first antenna, and different transmission distances can be achieved by adjusting the transmission power of the first antenna.
- the transmit power of the first antenna includes a first transmit power and a second transmit power, and the first transmit power is greater than the second transmit power.
- the electronic device 200 includes only the third antenna, the transmit power of the third antenna includes the third transmit power and the fourth transmit power, and the third transmit power is greater than the fourth transmit power. In this way, it can be considered that the third antenna under the third transmission power is a strong antenna, and the third antenna under the fourth transmission power is a weak antenna.
- the method includes:
- the electronic device 100 receives the first input.
- S801c is the same as S801a, please refer to the description of S801a, which will not be repeated here.
- the electronic device 100 broadcasts a first message through the first antenna under the first transmit power, where the first message includes the conference joining request and the ID of the electronic device 100.
- the electronic device 200 receives the first message, obtains the conference joining request and the ID of the electronic device 100, and generates a random key.
- the electronic device 200 sends a first response message through the third antenna under the fourth transmit power, where the first response message includes the random key and the ID of the electronic device 200.
- the electronic device 100 within the transmission distance of the third antenna under the fourth transmission power, the electronic device 100 receives the first response message, and acquires the random key and the ID of the electronic device 200.
- the electronic device 100 receives the second input for indicating joining, and encrypts the SIM card number of the electronic device 100 and the account number of the electronic device 100 on the conference application using a random key.
- the electronic device 100 sends a second message through the first antenna under the second transmit power, where the second message includes the ID of the electronic device 200 and the information encrypted with the random key.
- the electronic device 200 receives the second message, decrypts it using the random key, obtains the SIM card number of the electronic device 100, and the electronic device 100 is used in the conference application account on .
- the electronic device 200 receives a third input for indicating consent.
- this step can be omitted, and the subsequent steps can be directly performed.
- the electronic device 200 sends a third message through the third antenna under the third transmit power and through the encryption mechanism provided by the conference application for the conference, where the third message includes the SIM card number of the electronic device 100, the number of the SIM card of the electronic device 100 in the conference application account on the conference application, the account and conference ID of the electronic device 200 in the conference application.
- the server 400 receives the third message, and obtains the SIM card number of the electronic device 100, the account number of the electronic device 100 on the conference application, and the account number of the electronic device 200 on the conference application through the decryption mechanism provided by the conference application for the conference , Conference ID.
- the server 400 determines whether the account of the electronic device 200 on the conference application is the chairperson of the conference corresponding to the conference ID.
- the electronic device 100 is turned on, and joins the conference through the first antenna under the first transmit power.
- the method shown in FIG. 8C described above is similar to the method described in FIG. 8A .
- the first antenna in FIG. 8A is replaced with the first antenna under the first transmit power in FIG. 8C
- the second antenna in FIG. 8A is replaced with the first antenna under the second transmit power in FIG. 8C
- the third antenna in FIG. 8A is replaced with the third antenna under the third transmit power in FIG. 8C
- the fourth antenna in FIG. 8A is replaced with the third antenna under the fourth transmit power in FIG. 8C .
- different transmission distances are achieved by switching different antennas
- different transmission distances are achieved by adjusting the transmission power of the same antenna.
- a new schematic flowchart (not shown) can be obtained by the same substitution. Similar to the method shown in FIG. 8B , different from implementing different transmission distances by switching different antennas in FIG. 8B , in the new schematic flowchart, different transmission distances are implemented by adjusting the transmission power of the same antenna. It can also be considered that the effects of different antennas can be achieved by adjusting the transmit power of the same antenna.
- the electronic device 100 may include a strong antenna and a weak antenna (a first antenna and a second antenna), and the electronic device 200 only includes a third antenna, and different transmission distances can be achieved by adjusting the transmission power of the third antenna.
- the electronic device 200 may include strong antennas and weak antennas (a third antenna and a fourth antenna), and the electronic device 100 includes only the first antenna. By adjusting the transmission power of the first antenna, different transmission distances can be achieved. This embodiment of the present application does not limit this.
- the above-mentioned electronic device 100 is only a schematic example, and it is not limited that only one electronic device is connected to the meeting A in which the electronic device 200 is the chairman of the meeting. This application does not limit the number of electronic devices connected to conference A.
- the participating members of the conference A may also have one or more other electronic devices, which is not limited in this application.
- the electronic device of the party to be accessed can join the electronic device that is the chairman of the conference nearby by approaching or touching the natural interaction method based on the ultra-short-range communication method.
- the electronic device 100 of the party to be accessed and the electronic device 200 serving as the conference chairman only need to approach or touch, and the electronic device 100 can join the conference where the electronic device 200 is located.
- the user Y corresponding to the electronic device 100 is added to the participant information displayed by the electronic device 200 .
- Electronic device 1 used by user 1 is the conference chairperson of the current conference, and multiple electronic devices (such as electronic device 2- 10) The current meeting can be conveniently and quickly accessed by being close to or touching the electronic device 1 respectively.
- the above-mentioned S809a, S809b and S809c can be omitted, and the electronic device 200 can In the case of the third input of consent, the subsequent steps are directly executed, so that the electronic device 100 joins the current conference.
- the electronic device 200 may also be other conference participants who are not the conference chairman. In this case, the above steps S809a, S809b and S809c can also be omitted.
- the conference access method provided by the embodiment of the present application is simple in operation, takes less time, and provides better user experience. In addition, the method reduces the complexity of the operation and solves the problem of false touches. In addition, during the conference access process, the electronic devices communicate through ultra-short-distance communication, and the communication distance is very short, so the two communicating parties can establish safe and reliable data interaction, thereby ensuring security.
- the above-mentioned methods shown in FIG. 8A-FIG. 8C and extended describe the process that the party to be accessed accesses the current conference by approaching or touching the conference chairperson.
- the party to be accessed can also access the current conference by approaching or touching a conference member.
- conference members refer to conference participants other than the conference chairman. 13A-13C, the process of joining the current conference by approaching or touching the conference participant based on the ultra-short-range communication method by the electronic device of the party to be accessed will be described in detail.
- FIG. 13A is a flowchart of a method for accessing a conference provided by an embodiment of the present application.
- the electronic device 100 is the party to be connected, the electronic device 200 is a conference member, the electronic device 300 is the conference chairman, and the conference where the electronic device 200 and the electronic device 300 are located is recorded as conference A.
- the electronic device 100 includes a first antenna and a second antenna.
- the first antenna is a strong antenna
- the second antenna is a weak antenna
- the first transmission distance of the signal transmitted by the first antenna is greater than the second transmission distance of the signal transmitted by the second antenna
- the second transmission distance is less than or equal to the preset safety distance .
- the electronic device 200 includes a third antenna and a fourth antenna.
- the third antenna is a strong antenna
- the fourth antenna is a weak antenna
- the third transmission distance of the signal transmitted by the third antenna is greater than the fourth transmission distance of the signal transmitted by the fourth antenna
- the fourth transmission distance is less than or equal to the preset safety distance .
- the preset safe distance is the distance at which the user of the electronic device exchanges secret information with another electronic device through the electronic device.
- the preset safety distance may be 30cm.
- the method includes:
- the electronic device 100 receives the first input.
- the electronic device 100 broadcasts a first message through the first antenna, where the first message includes a conference joining request and the ID of the electronic device 100.
- the electronic device 200 receives the first message, obtains the conference joining request and the ID of the electronic device 100, and generates a random key.
- the electronic device 200 receives the first message broadcast by the electronic device 100 , and acquires a meeting joining request and the ID of the electronic device 100 according to the first message.
- the electronic device 200 generates a random key. Encrypting information with a random key can improve the security of subsequent information transmission.
- the electronic device 200 sends a first response message through the fourth antenna, where the first response message includes the random key and the ID of the electronic device 200.
- the electronic device 100 receives the first response message, and obtains the random key and the ID of the electronic device 200.
- the electronic device 100 receives a second input for indicating joining, and encrypts the SIM card number of the electronic device 100 and the account number of the electronic device 100 on the conference application using a random key.
- the electronic device 100 sends a second message through the second antenna, where the second message includes the ID of the electronic device 200 and the information encrypted with the random key.
- the electronic device 200 receives the second message, decrypts it using the random key, and obtains the SIM card number of the electronic device 100 and the account number of the electronic device 100 on the conference application.
- S901a-S908a are similar to S801a-S808a, except that the conference chairperson (electronic device 200) communicating with the electronic device 100 of the party to be accessed is replaced with a conference member (electronic device 200), and the rest of the contents remain unchanged, see S801a- The description of S808a will not be repeated here.
- the electronic device 200 sends a third message through the third antenna through the encryption mechanism provided by the conference application for the conference, where the third message includes the SIM card number of the electronic device 100, the account number of the electronic device 100 on the conference application, and the electronic device 200 Account on the meeting app.
- the electronic device 200 Since the electronic device 200 receives the second message sent by the electronic device 100, the electronic device 200 sends the third message through the third antenna through the encryption mechanism provided for the conference by the conference application.
- the third message includes the SIM card number of the electronic device 100, the account number of the electronic device 100 on the conference application, and the account number of the electronic device 200 on the conference application.
- the third message may further include other information such as the conference ID of conference A. This embodiment of the present application does not limit this.
- the server 400 receives the third message, and obtains the SIM card number of the electronic device 100, the account number of the electronic device 100 on the conference application, and the account number of the electronic device 200 on the conference application through the decryption mechanism provided by the conference application for the conference .
- the server 400 decrypts the received third message through the corresponding decryption mechanism of the conference, and obtains the SIM card number of the electronic device 100, the account number of the electronic device 100 on the conference application, and the location of the electronic device 200 in the conference application. Account on the meeting app.
- the server 400 may also obtain the conference ID.
- the server 400 sends a third message to the electronic device 300 through the encryption mechanism provided by the conference application for the conference.
- the server 400 may determine, according to the account of the electronic device 200 on the conference application (optionally, even further according to the conference ID of the conference A), that the conference chair of the conference A is the electronic device 300 on the conference application account, and then send a third message to the electronic device 300.
- the server 400 may also determine the conference chairperson only according to the conference ID.
- the server 400 After the server 400 determines the conference chairman, it can send the encrypted third message to the electronic device 300 serving as the conference chairman.
- the sending of the third message by the server 400 to the electronic device 300 means that the server 400 sends the third message to the conference application logged in on the electronic device 300 .
- the electronic device 300 receives the third message, and obtains the SIM card number of the electronic device 100, the account number of the electronic device 100 on the conference application, and the ID of the electronic device 200 on the conference application through the decryption mechanism provided by the conference application for the conference. account number.
- the electronic device 300 when the electronic device 300 receives the encrypted third message, it can obtain the SIM card number of the electronic device 100 included in the third message, the account number of the electronic device 100 on the conference application, and the electronic device through the corresponding decryption mechanism. 200 accounts on the meeting app.
- the electronic device 300 receives a third input for indicating approval or rejection.
- the electronic device 300 receives the third input after acquiring the content of the third message.
- the electronic device 300 displays the content of the third message. For example, the electronic device 300 displays the SIM card number of the electronic device 100, the account number of the electronic device 100 on the conference application, and the account number of the electronic device 200 on the conference application in a prompt box on the screen. After the user views and confirms the content of the third message, the electronic device 300 may receive the third input.
- the third input may be a touch operation, voice input, gesture input or other forms of input, which are not limited in this application.
- the electronic device 300 sends a fourth message to the server 400 by using the encryption mechanism provided by the conference application for the conference, where the fourth message includes third input information corresponding to the third input.
- the third input information may be "agree” or "reject”.
- the server 400 dials back the SIM card number of the electronic device 100; if the third input indicating rejection is received, the server 400 notifies the electronic device 100 that the conference joining request is rejected The chairman of the meeting refused.
- the electronic device 100 is turned on, and joins the conference through the first antenna.
- the server 400 dials back the SIM card number of the electronic device 100, and then the electronic device 100 is connected, and the electronic device 100 joins the conference A through the first antenna.
- the server 400 If a third input indicating rejection is received, the server 400 notifies the electronic device 100 that the conference joining request is rejected by the conference chair, the process ends, and S916a is not executed.
- the user of the electronic device 100 finds that he does not need to access the conference A or wants to quit the conference A after the electronic device 100 accesses the conference A, the user can hang up the conference A at any time, so that the electronic device 100 quits the conference A.
- the user can exit the meeting application by clicking the "hang up” control. Users can also exit the meeting by voice input "exit meeting” and other methods. This embodiment of the present application does not limit the manner in which the electronic device exits the conference.
- the electronic device 100 may be switched to the first antenna after S907a, or may be switched to the first antenna in S916a, which is not limited in this embodiment of the present application.
- FIG. 13B is a flowchart of another conference access method provided by an embodiment of the present application.
- the electronic device 100 is the party to be connected, the electronic device 200 is a conference member, the electronic device 300 is the conference chairman, and the conference where the electronic device 200 and the electronic device 300 are located is recorded as conference A.
- the electronic device 100 includes a first antenna and a second antenna.
- the first antenna is a strong antenna
- the second antenna is a weak antenna
- the first transmission distance of the signal transmitted by the first antenna is greater than the second transmission distance of the signal transmitted by the second antenna
- the second transmission distance is less than or equal to the preset safety distance .
- the electronic device 200 includes a third antenna and a fourth antenna.
- the third antenna is a strong antenna
- the fourth antenna is a weak antenna
- the third transmission distance of the signal transmitted by the third antenna is greater than the fourth transmission distance of the signal transmitted by the fourth antenna
- the fourth transmission distance is less than or equal to the preset safety distance .
- the preset safe distance is the distance at which the user of the electronic device exchanges secret information with another electronic device through the electronic device.
- the preset safety distance may be 30cm.
- the conference access method provided by the embodiment of the present application includes:
- the electronic device 100 receives the first input.
- the electronic device 100 broadcasts a first message through the second antenna, where the first message includes the conference joining request and the ID of the electronic device 100.
- the electronic device 200 receives the first message, obtains the conference joining request and the ID of the electronic device 100, and generates a random key.
- the electronic device 200 sends a first response message through the fourth antenna, where the first response message includes the random key and the ID of the electronic device 200.
- the electronic device 100 receives the first response message, and acquires the random key and the ID of the electronic device 200.
- the electronic device 100 encrypts the SIM card number of the electronic device 100 and the account number of the electronic device 100 on the conference application using the random key.
- the electronic device 100 sends a second message through the first antenna, the second message includes the ID of the electronic device 200, the SIM card number of the electronic device 100 encrypted with the random key, and the account number of the electronic device 100 on the conference application.
- the electronic device 200 receives the second message, decrypts it using the random key, and obtains the SIM card number of the electronic device 100 and the account number of the electronic device 100 on the conference application.
- S901b-S908b are similar to S801b-S808b, the only difference is that the conference chairman (electronic device 200) communicating with the electronic device 100 of the party to be accessed is replaced by a conference member (electronic device 200), and the rest of the contents remain unchanged, see S801b- The description of S808b will not be repeated here.
- the electronic device 200 sends a third message through the third antenna through the encryption mechanism provided by the conference application for the conference, where the third message includes the SIM card number of the electronic device 100, the account number of the electronic device 100 on the conference application, and the electronic device 200 Account on the meeting app.
- the server 400 receives the third message, and obtains the SIM card number of the electronic device 100, the account number of the electronic device 100 on the conference application, and the account number of the electronic device 200 on the conference application through the decryption mechanism provided by the conference application for the conference .
- the server 400 sends a third message to the electronic device 300 through the encryption mechanism provided by the conference application for the conference.
- the electronic device 300 receives the third message, and obtains the SIM card number of the electronic device 100, the account number of the electronic device 100 on the conference application, and the ID of the electronic device 200 on the conference application through the decryption mechanism provided by the conference application for the conference. account number.
- the electronic device 300 receives a third input for indicating approval or rejection.
- the electronic device 300 sends a fourth message to the server 400 through the encryption mechanism provided by the conference application for the conference, where the fourth message includes third input information corresponding to the third input.
- the server 400 dials back the SIM card number of the electronic device 100; if the third input indicating refusal is received, the server 400 notifies the electronic device 100 that the conference joining request has been rejected. The chairman of the meeting refused.
- the electronic device 100 is turned on, and joins the conference through the first antenna.
- S909b-S916b are the same as S909a-S916a, refer to the description of S909a-S916a, and are not repeated here.
- the difference between the conference access method shown in FIG. 13A and the conference access method shown in FIG. 13B is that in FIG. 13A , the electronic device 100 broadcasts the first message through the first antenna first, and then broadcasts the first message through the second antenna. Send the second message; in FIG. 13B , the electronic device 100 first broadcasts the first message through the second antenna, and then sends the second message through the first antenna.
- the electronic device 100 can start to request to join the meeting A, and then the electronic device 100 and the electronic device 200 are close to join the meeting. meeting A.
- the distance between the electronic device 100 and the electronic device 200 is less than or equal to the preset first safety distance, and is also less than or equal to the preset second safety distance After that, the electronic device 100 can leave the electronic device 200 at a certain distance and continue to complete the process of joining the conference A.
- the conference access method provided by the embodiment of the present application does not limit the specific timing of the proximity between the party to be accessed and the conference members, as long as the conference access During the process, the pre-access party and the conference members can approach or touch each other.
- the electronic device 100 and the electronic device 300 respectively include two antennas, and different transmission distances can be achieved by different antennas.
- the electronic device 100 may use only one of the first antenna and the second antenna during the conference access process, and realize different transmission distances by adjusting the transmission power of the antenna.
- the electronic device 300 may also use only one of the third antenna and the fourth antenna, and by adjusting the transmission power of the antenna, different transmission distances can be achieved.
- the electronic device 100 and the electronic device 200 may each have only one antenna, and different transmission distances can be achieved by adjusting the transmission power of the antenna.
- the electronic device 100 includes only the first antenna
- the electronic device 200 includes only the third antenna.
- the electronic device 100 is the party to be connected, the electronic device 200 is a conference member, the electronic device 300 is the conference chairperson, and the conference in which the electronic device 200 and the electronic device 200 are located is conference A.
- the electronic device 100 only includes the first antenna, and different transmission distances can be achieved by adjusting the transmission power of the first antenna.
- the transmit power of the first antenna includes a first transmit power and a second transmit power, and the first transmit power is greater than the second transmit power.
- the electronic device 200 includes only the third antenna, the transmit power of the third antenna includes the third transmit power and the fourth transmit power, and the third transmit power is greater than the fourth transmit power. In this way, it can be considered that the third antenna under the third transmission power is a strong antenna, and the third antenna under the fourth transmission power is a weak antenna.
- the method includes:
- the electronic device 100 receives the first input.
- the electronic device 100 broadcasts a first message through the first antenna under the first transmit power, where the first message includes the conference joining request and the ID of the electronic device 100.
- the electronic device 200 receives the first message, obtains the conference joining request and the ID of the electronic device 100, and generates a random key.
- the electronic device 200 sends a first response message through the third antenna under the fourth transmit power, where the first response message includes the random key and the ID of the electronic device 200.
- the electronic device 100 within the transmission distance of the third antenna under the fourth transmission power, the electronic device 100 receives the first response message, and acquires the random key and the ID of the electronic device 200.
- the electronic device 100 receives the second input for indicating joining, and encrypts the SIM card number of the electronic device 100 and the account number of the electronic device 100 on the conference application using a random key.
- the electronic device 100 sends a second message through the first antenna under the second transmit power, where the second message includes the ID of the electronic device 200 and the information encrypted with the random key.
- the electronic device 200 receives the second message, decrypts it using the random key, obtains the SIM card number of the electronic device 100, and the electronic device 100 is used in the conference application account on .
- the electronic device 200 sends a third message through the third antenna under the third transmit power and through the encryption mechanism provided by the conference application for the conference, where the third message includes the SIM card number of the electronic device 100 and the electronic device 100 on the conference application account, and the account of the electronic device 200 on the conference application.
- the server 400 receives the third message, and obtains the SIM card number of the electronic device 100, the account number of the electronic device 100 on the conference application, and the account number of the electronic device 200 on the conference application through the decryption mechanism provided by the conference application for the conference .
- the server 400 sends a third message to the electronic device 300 through the encryption mechanism provided by the conference application for the conference.
- the electronic device 300 receives the third message, and obtains the SIM card number of the electronic device 100, the account number of the electronic device 100 on the conference application, and the ID of the electronic device 200 on the conference application through the decryption mechanism provided by the conference application for the conference. account number.
- the electronic device 300 receives a third input for indicating approval or rejection.
- the electronic device 300 sends a fourth message to the server 400 through the encryption mechanism provided by the conference application for the conference, where the fourth message includes third input information corresponding to the third input.
- the server 400 dials back the SIM card number of the electronic device 100; if receiving the third input indicating refusal, the server 400 notifies the electronic device 100 that the conference joining request is rejected The chairman of the meeting refused.
- the electronic device 100 is turned on, and joins the conference through the first antenna under the first transmit power.
- S901c-S916c are similar to S901a-S916a.
- the first antenna in S901a-S916a is replaced with the first antenna under the first transmit power in S901c-S916c
- the second antenna in S901a-S916a is replaced with the second antenna in S901c-S916c under the second transmit power
- replace the third antenna in S901a-S916a with the third antenna under the third transmit power in S901c-S916c
- a new schematic flowchart (not shown) can be obtained by the same substitution.
- the method in the new flowchart is similar to the method in FIG. 13B , but different from the method shown in FIG. 13B by switching different antennas to achieve different transmission distances.
- different transmission distances are achieved by adjusting the transmission power of the same antenna. It can also be considered that the effects of different antennas can be achieved by adjusting the transmit power of the same antenna.
- the electronic device 100 may include a strong antenna and a weak antenna (a first antenna and a second antenna), and the electronic device 200 only includes a third antenna, and different transmission distances can be achieved by adjusting the transmission power of the third antenna.
- the electronic device 200 may include strong antennas and weak antennas (a third antenna and a fourth antenna), and the electronic device 100 includes only the first antenna. By adjusting the transmission power of the first antenna, different transmission distances can be achieved. This embodiment of the present application does not limit this.
- the above electronic device 100 is only a schematic example, and it is not limited that only one electronic device joins the conference A by interacting with the conference members. This application does not limit the number of electronic devices connected to conference A.
- the electronic device 100 of the party to be accessed can join the electronic device 200 as a member of the conference by approaching or touching the natural interaction method based on the ultra-short-range communication method.
- the conference where the electronic device 200 and the electronic device 300 are located.
- the electronic device 100 can join the electronic device through ultra-short-range communication 200 conferences.
- the participant information displayed by the electronic device 300 in addition to the user X corresponding to the electronic device 200 and the user Z corresponding to the electronic device 300 , the user Y corresponding to the electronic device 100 is also added.
- the electronic device 1 used by user 1 is the conference chairperson of the current conference
- the electronic device 2 used by user 2 is the conference member of the current conference
- the electronic device 2 and electronic device 1 are both connected to the current conference.
- Multiple electronic devices (such as electronic devices 3 to 10 ) to be connected to the current conference can be conveniently and quickly accessed to the current conference by being close to or touching the electronic device 2 respectively.
- the conference access method provided by the embodiment of the present application is simple in operation, takes less time, and provides better user experience.
- the method can reduce the complexity of operations when adding conference members during a conference, reduce the possibility of accidental touches, effectively avoid the occlusion of the conference interface by the interactive operation interface, and avoid problems such as conference interruption caused by accidental touches.
- the electronic devices communicate through ultra-short-distance communication, and the communication distance is very short, so the two communicating parties can establish safe and reliable data interaction, thereby ensuring security.
- the electronic device of the party to be connected can join the current conference by approaching or touching any electronic device participating in the current conference.
- FIGS. 8A to 8C and FIGS. 13A to 13C above are all applied in a scenario where a conference chairperson exists.
- a conference chairperson exists in daily life.
- FIG. 15A is a flowchart of a method for accessing a conference provided by an embodiment of the present application.
- the electronic device 100 is the party to be connected, the electronic device 200 is a conference member in the conference, and the current conference that the electronic device 200 participates in is recorded as conference A. Since there is no conference chairperson, the electronic device 200 may be any electronic device in conference A.
- the electronic device 100 includes a first antenna and a second antenna.
- the first antenna is a strong antenna
- the second antenna is a weak antenna
- the first transmission distance of the signal transmitted by the first antenna is greater than the second transmission distance of the signal transmitted by the second antenna
- the second transmission distance is less than or equal to the preset safety distance .
- the electronic device 200 includes a third antenna and a fourth antenna.
- the third antenna is a strong antenna
- the fourth antenna is a weak antenna
- the third transmission distance of the signal transmitted by the third antenna is greater than the fourth transmission distance of the signal transmitted by the fourth antenna
- the fourth transmission distance is less than or equal to the preset safety distance .
- the preset safe distance is the distance at which the user of the electronic device exchanges secret information with another electronic device through the electronic device.
- the preset safety distance may be 30cm.
- the method includes:
- the electronic device 100 receives the first input and generates a random key.
- the electronic device 100 receives the first input after opening the conference application in response to the user's operation.
- the first input is that the user clicks on an option of "touch to meeting" in the meeting application.
- the first input may also be voice input, gesture input, or other forms of input after the electronic device 100 starts the conference application, which is not limited in this embodiment of the present application.
- the electronic device 100 may directly receive the first input. That is, the electronic device 100 may receive the first input in the case of displaying the main interface or other application interfaces.
- the first input may be a voice input of "touch to a conference", a specific gesture input, a touch operation, or an input in other forms, which is not limited in this embodiment of the present application.
- the electronic device 100 may generate a random key while receiving the first input.
- the electronic device 100 may generate a random key after receiving the first input.
- the electronic device 100 broadcasts a first message through the second antenna, where the first message includes a conference joining request, an ID of the electronic device 100 and a random key.
- the ID of the electronic device 100 represents information that can uniquely identify the electronic device 100 .
- the ID of the electronic device 100 may be information such as the MAC address of the electronic device 100 .
- the electronic device 100 broadcasts the first message through the second antenna, and the transmission distance of the second antenna is short, so the distance between the electronic device that can receive the first message and the electronic device 100 is relatively short.
- This step is similar to S802b, except that the first message broadcast in S1002a further includes the random key generated by the electronic device 100.
- the electronic device 200 receives the first message, obtains the conference joining request, the ID and random key of the electronic device 100, and encrypts the conference ID and conference password with the random key.
- the electronic device 200 can receive the first message when the distance between the electronic device 200 and the electronic device 100 is relatively short.
- Join request ID of electronic device 100 and random key.
- the electronic device 200 may use a random key to encrypt the conference ID and conference password of the conference A that the electronic device 200 participates in.
- meeting A may not have a meeting password.
- the electronic device 200 encrypts the conference ID of conference A using a random key.
- the electronic device 200 sends a first response message through the fourth antenna, where the first response message includes the ID of the electronic device 100 and the information obtained by encrypting the conference ID and the conference password with a random key.
- the electronic device 200 Since the electronic device 100 is relatively close to the electronic device 200, the electronic device 200 sends the first response message through the fourth antenna.
- the distance between the electronic device 200 and the electronic device 100 is within a preset safe distance, which can ensure the security of information transmission.
- the first response message includes the ID of the electronic device, and the information after the meeting ID and the meeting password are encrypted with a random key.
- the first response message includes the ID of the electronic device, and the information after encrypting the conference ID with a random key.
- the random key here is generated by the electronic device 100. Therefore, only the electronic device 100 can decrypt the encrypted information and obtain the conference ID and conference password of the conference A, thereby improving the security in the communication process.
- the electronic device 100 receives the first response message, decrypts it with a random key, and obtains the conference ID and the conference password.
- the electronic device 100 if there is no meeting password, the electronic device 100 only obtains the meeting ID.
- the electronic device 200 switches to the third antenna after a preset time period.
- the preset duration is a short period of time, such as 2ms, 3ms, etc.
- the preset duration can be set by the user, and the present application does not specifically limit the preset duration.
- the electronic device 200 enables the electronic device 100 to join the conference A in an ultra-short distance manner through the fourth antenna (weak antenna). However, since the electronic device 200 is in conference A, the electronic device 200 should maintain normal conference communication via the router and the Internet through the third antenna (strong antenna) most of the time.
- the electronic device 200 switches to the third antenna after a preset time period, so as to ensure normal conference communication.
- the electronic device 100 sends a second message through the first antenna and the encryption mechanism provided for the conference by the conference application, where the second message includes the conference ID, the conference password and the account of the electronic device 100 on the conference application.
- the electronic device 100 sends a second message through the first antenna and the encryption mechanism provided for the conference by the conference application, where the second message includes the conference ID and the electronic device.
- the server 400 receives the second message, and obtains the conference ID, the conference password and the account of the electronic device 100 on the conference application through the decryption mechanism provided by the conference application for the conference.
- the server 400 obtains the conference ID and the account of the electronic device 100 on the conference application through the decryption mechanism provided by the conference application for the conference.
- the server 400 determines whether the conference password is correct.
- the server 400 determines whether the conference password is correct by comparing whether the conference ID is consistent with the conference password.
- the server 400 determines whether the meeting ID is valid.
- the server 400 determines whether the conference ID is legal by determining whether the conference ID exists; or the server 400 determines whether the conference ID is legal by determining whether the conference ID is the current conference.
- the server 400 may store a corresponding list of conference IDs and conference passwords; or, the server 400 may call data stored in a specific memory to determine whether the conference password is correct.
- the electronic device 100 is connected to join the conference through the first antenna.
- the server 400 determines that the conference ID is valid, the electronic device 100 is connected to join the conference through the first antenna.
- the server 400 determines that the conference password is incorrect, the electronic device 100 does not join the current conference, and the process ends.
- the server 400 determines that the meeting ID is invalid, the electronic device 100 does not join the current meeting, and the process ends.
- the user of the electronic device 100 finds that he does not need to access the conference A or wants to quit the conference A after the electronic device 100 accesses the conference A, the user can hang up the conference A at any time, so that the electronic device 100 quits the conference A.
- the user can exit the meeting application by clicking the "hang up” control. Users can also exit the meeting by voice input "exit meeting” and other methods. This embodiment of the present application does not limit the manner in which the electronic device exits the conference.
- the electronic device 100 may be switched to the first antenna after S1005a, or may be switched to the first antenna in S1007a, which is not limited in this embodiment of the present application.
- the electronic device 100 and the electronic device 200 respectively include two antennas, and different transmission distances are implemented by different antennas.
- the electronic device 100 may use only one of the first antenna and the second antenna during the conference access process, and realize different transmission distances by adjusting the transmission power of the antenna.
- the electronic device 200 may also use only one antenna among the third antenna and the fourth antenna, and realize different transmission distances by adjusting the transmission power of the antenna.
- the electronic device 100 and the electronic device 200 may each have only one antenna, and different transmission distances can be achieved by adjusting the transmission power of the antenna.
- the electronic device 100 includes only the first antenna
- the electronic device 200 includes only the third antenna.
- the electronic device 100 is the party to be connected, the electronic device 200 is a conference member in the conference, and the current conference that the electronic device 200 participates in is recorded as conference A. Since there is no conference chairperson, the electronic device 200 may be any electronic device in conference A.
- the electronic device 100 only includes the first antenna, and different transmission distances can be achieved by adjusting the transmission power of the first antenna.
- the transmit power of the first antenna includes a first transmit power and a second transmit power, and the first transmit power is greater than the second transmit power.
- the electronic device 200 includes only the third antenna, the transmit power of the third antenna includes the third transmit power and the fourth transmit power, and the third transmit power is greater than the fourth transmit power. In this way, it can be considered that the third antenna under the third transmission power is a strong antenna, and the third antenna under the fourth transmission power is a weak antenna.
- the method includes:
- the electronic device 100 receives the first input and generates a random key.
- the electronic device 100 broadcasts a first message through the first antenna under the second transmit power, where the first message includes a conference joining request, an ID of the electronic device 100 and a random key.
- the electronic device 200 receives the first message, obtains the conference joining request, the ID of the electronic device 100 and the random key, and encrypts the conference ID using the random key and meeting password.
- the electronic device 200 sends a first response message through the third antenna under the fourth transmit power, where the first response message includes the ID of the electronic device 100 and the information after encrypting the conference ID and conference password with a random key.
- the electronic device 100 receives the first response message, decrypts it with a random key, and obtains the conference ID and the conference password.
- the electronic device 200 switches the fourth transmit power of the third antenna to the third transmit power after a preset time period.
- the electronic device 100 sends a second message through the first antenna under the first transmit power and through the encryption mechanism provided by the conference application for the conference, where the second message includes the conference ID, the conference password and the information of the electronic device 100 on the conference application. account number.
- the server 400 receives the second message, and obtains the conference ID, the conference password and the account of the electronic device 100 on the conference application through the decryption mechanism provided by the conference application for the conference.
- the server 400 determines whether the conference password is correct.
- the electronic device 100 If the server 400 determines that the conference password is correct, the electronic device 100 is turned on, and joins the conference through the first antenna under the first transmit power.
- the method shown in FIG. 15B described above is similar to the method described in FIG. 15A.
- the first antenna in FIG. 15A is replaced with the first antenna under the first transmit power in FIG. 15B
- the second antenna in FIG. 15A is replaced with the first antenna under the second transmit power in FIG. 15B
- the third antenna in FIG. 15A is replaced with the third antenna under the third transmit power in FIG. 15B
- the fourth antenna in FIG. 15A is replaced with the third antenna under the fourth transmit power in FIG. 15B .
- different transmission distances are achieved by switching different antennas
- different transmission distances are achieved by adjusting the transmission power of the same antenna.
- the electronic device 100 may include a strong antenna and a weak antenna (a first antenna and a second antenna), and the electronic device 200 only includes a third antenna, and different transmission distances can be achieved by adjusting the transmission power of the third antenna.
- the electronic device 200 may include a strong antenna and a weak antenna (a third antenna and a fourth antenna), and the electronic device 100 only includes the first antenna, and different transmission distances can be achieved by adjusting the transmission power of the first antenna. This embodiment of the present application does not limit this.
- the above-mentioned electronic device 100 is only a schematic example, and it is not limited that only one electronic device is connected to the meeting A in which the electronic device 200 is the chairman of the meeting. This application does not limit the number of electronic devices connected to conference A.
- the participating members of the conference A may also have one or more other electronic devices, which is not limited in this application.
- the electronic device of the party to be connected can join the current conference by approaching or touching any electronic device in the conference based on the ultra-short-range communication method. middle.
- the conference access method provided by the embodiment of the present application can reduce the complexity of operations when adding a new conference participant during a conference in a conference scenario without a conference chairman, and facilitate quick and easy access of the electronic device of the party to be accessed. current meeting.
- the electronic devices can access the conference through natural interaction such as approaching or touching.
- the conference access method provided by the embodiment of the present application is simple in operation, takes less time, and provides better user experience.
- the method can reduce the complexity of the operation when the conference is created and the conference members are added during the conference, and reduce the possibility of false touches.
- the two parties in the communication can establish a safe and reliable data interaction to ensure the security of data transmission.
- the ultra-short-range communication method is a communication method based on traditional wireless communication methods, such as traditional Wi-Fi or traditional Bluetooth technology. Ultra-short-range communication can be achieved.
- the ultra-short-range communication capability of electronic devices can be used as the basic capability, and an API interface is provided, which can be called by third-party applications to use the ultra-short-range communication capability. That is to say, the ultra-short-distance communication method does not need to add hardware such as chips or devices, or significantly modify the existing hardware.
- the electronic device includes corresponding hardware and/or software modules for executing each function.
- the present application can be implemented in hardware or in the form of a combination of hardware and computer software in conjunction with the algorithm steps of each example described in conjunction with the embodiments disclosed herein. Whether a function is performed by hardware or computer software driving hardware depends on the specific application and design constraints of the technical solution. Those skilled in the art may use different methods to implement the described functionality for each particular application in conjunction with the embodiments, but such implementations should not be considered beyond the scope of this application.
- the electronic device may be divided into functional modules according to the foregoing method example.
- each function module may be divided corresponding to each function, or two or more functions may be integrated into one processing module.
- the above-mentioned integrated modules can be implemented in the form of hardware. It should be noted that, the division of modules in this embodiment is schematic, and is only a logical function division, and there may be other division manners in actual implementation.
- FIG. 16 is a schematic diagram of a possible composition of the electronic device 1600 other than those involved in the foregoing embodiment.
- the electronic device 1600 may include a transceiver module 1601 and a processing module 1602 .
- the electronic device may be electronic device 200 .
- the transceiver module 1601 can be used to support the electronic device 1600 to perform S803a-S804a, S808a-S810a, S803b-S804b, S808b-S810b, S803c-S804c, and S808c-S810c in FIG. 8A-FIG. 8C in the above embodiment; FIG. 8A-FIG. 8C in the above embodiment; FIG.
- the processing module 1602 can be used to support the electronic device 1600 to perform S803a, S803b and S803c in FIG. 8A-FIG. 8C in the above embodiment; 912a, S912b, S912c in FIG. 13A-FIG. 13C; S1006b; and/or other actions or functions performed by the electronic device 200 in the foregoing method embodiments.
- the electronic device may be the electronic device 100 .
- the transceiver module 1601 can be used to support the electronic device 1600 to perform S801a-S802a, S805a-S807a, S801b-S802b, S805b-S807b, S801c-S802c, S805c-S807c in FIG. 8A-FIG. 8C in the above embodiment; FIG. 13A - 901a-S902a, S905a-S907a, S901b-S902b, S905b-S907b, S901c-S902c, S905c-S907c in Fig.
- the processing module 1602 can be used to support the electronic device 1600 to perform S805a-S806a, S814a, S805b-S806b, S814b, S805c-S806c, and S814c in the above-mentioned embodiments in FIGS. 8A-8C ; S905a-S906a in FIGS. 13A-13C , S916a, S905b-S906b, S916b, S905c-S906c, S916c; and/or other actions or functions performed by the electronic device 100 in the foregoing method embodiments.
- the electronic device may be the electronic device 300 .
- the transceiver module 1601 can be used to support the electronic device 1600 to perform S903a-S904a, S908a-S909a, S903b-S904b, S908b-S909b, S903c-S904c, S908c-S909c in FIG. 13A-FIG. 13C in the above embodiment; and/ Or other actions or functions performed by the electronic device 300 in the above method embodiments.
- the processing module 1602 may be configured to support the electronic device 1600 to perform S908a-S909a, S908b-S909b, S908c-S909c in FIG. 13A-FIG. 13C in the foregoing embodiments; and/or other actions performed by the electronic device 300 in the foregoing method embodiments or Function.
- the electronic device 1600 is presented in the form of dividing each functional module in an integrated manner.
- Module herein may refer to a specific ASIC, circuit, processor and memory executing one or more software or firmware programs, inherited logic circuits, and/or other devices that may provide the above-described functions.
- the electronic device 1600 may take the form shown in FIG. 3 .
- the processor 210 in FIG. 3 can cause the electronic device 1600 to perform the actions performed by the electronic device in the foregoing method embodiments by invoking the computer instructions stored in the internal memory 221 .
- embodiments of the present application further provide a computer-readable storage medium, where computer instructions are stored in the computer-readable storage medium, and when the computer instructions are executed on an electronic device, the electronic device is made to execute the above-mentioned related methods.
- the steps implement the conference access method in the above embodiment.
- the electronic device may be the electronic device 100 in the above method embodiment.
- the electronic device may be the electronic device 200 in the above method embodiment.
- the electronic device may be the electronic device 300 in the above method embodiment.
- the embodiments of the present application further provide a computer program product, when the computer program product runs on a computer, the computer program product causes the computer to execute the above-mentioned relevant steps, so as to realize the conference access method executed by the electronic device in the above-mentioned embodiment.
- the electronic device may be the electronic device 100 in the above method embodiment.
- the electronic device may be the electronic device 200 in the above method embodiment.
- the electronic device may be the electronic device 300 in the above method embodiment.
- the embodiments of the present application further provide an electronic device, and the electronic device may specifically be a chip, a component, a module, or a system-on-chip.
- the electronic device may include a connected processor and a memory; wherein, the memory is used to store computer instructions, and when the apparatus is running, the processor can execute the computer instructions stored in the memory, so that the chip executes the execution of the electronic device in the above method embodiments.
- Conference access method For example, the electronic device may be the electronic device 100 in the above method embodiment. Alternatively, the electronic device may be the electronic device 200 in the above method embodiment. Alternatively, the electronic device may be the electronic device 300 in the above method embodiment.
- an embodiment of the present application further provides a conference access system, where the conference access system includes an electronic device 100 , an electronic device 200 , and an electronic device 300 .
- the electronic device 100 , the electronic device 200 and the electronic device 300 in the conference access system can respectively execute the conference access methods executed by the electronic device 100 , the electronic device 200 and the electronic device 300 in the above embodiments.
- FIG. 1 For example, for a schematic diagram of the architecture of the conference access system, see FIG. 1 .
- the electronic equipment, computer-readable storage medium, computer program product, chip or system-on-chip provided by the embodiments of the present application are all used to execute the corresponding methods provided above. Therefore, the beneficial effects that can be achieved can be referred to above. The beneficial effects in the corresponding method provided in this article will not be repeated here.
- the disclosed apparatus and method may be implemented in other manners.
- the device embodiments described above are only illustrative.
- the division of the modules or units is only a logical function division. In actual implementation, there may be other division methods.
- multiple units or components may be Incorporation may either be integrated into another device, or some features may be omitted, or not implemented.
- the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical, mechanical or other forms.
- the units described as separate components may or may not be physically separated, and components shown as units may be one physical unit or multiple physical units, that is, they may be located in one place, or may be distributed to multiple different places . Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
- each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
- the above-mentioned integrated units may be implemented in the form of hardware, or may be implemented in the form of software functional units.
- the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it may be stored in a readable storage medium.
- the technical solutions of the embodiments of the present application can be embodied in the form of software products in essence, or the parts that contribute to the prior art, or all or part of the technical solutions, which are stored in a storage medium , including several instructions to make a device (may be a single chip microcomputer, a chip, etc.) or a processor (processor) to execute all or part of the steps of the methods described in the various embodiments of the present application.
- the aforementioned storage medium includes: U disk, mobile hard disk, read only memory (ROM), random access memory (random access memory, RAM), magnetic disk or optical disk and other media that can store program codes.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本申请提供一种会议接入方法及电子设备,涉及通信技术领域,能够使得电子设备方便快捷地接入当前会议。具体方案为:第一电子设备通过第一天线,广播第一消息;在距离第二电子设备的第四距离内,接收到第一响应消息;通过第二天线,发送第二消息;在接通呼叫电话后,加入第二电子设备参加的会议。其中,第一电子设备包括第一天线和第二天线,第一天线的发射距离为第一距离,第一距离大于预设的第一安全距离;第二天线的发射距离为第二距离,第二距离小于或等于预设的第一安全距离;第四距离小于或等于预设的第二安全距离。本申请实施例能够在会议的创建和参加中,减少操作步骤,改善使用不便,缩短耗时时长,提高用户体验。
Description
本申请要求于2021年1月30日提交国家知识产权局、申请号为202110131858.1、申请名称为“一种会议接入方法及电子设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请实施例涉及通信技术领域,尤其涉及一种会议接入方法及电子设备。
在日常生活中,我们已经越来越频繁地参加诸如音频、视频等单一媒体或多媒体形式的双方或多方会议。在上述会议创建中或会议过程中,用户通过创建会议的电子设备的操作界面,添加会议成员,使得会议成员加入会议。
然而,上述方式的操作步骤较多;另外,用户在操作中容易错选、多选或漏选,这样就需要用户重新选择;以上均导致用户操作繁琐,使用不便,耗时较长,用户体验较差。如何在上述会议创建中及会议过程中,使得用户快捷方便地添加会议成员,提高用户体验,成为我们追求的目标。
发明内容
为了解决上述的技术问题,本申请提供一种会议接入方法及电子设备。本申请提供的技术方案能够在上述会议创建和会议过程中,减少添加会议成员的操作步骤,改善使用的不便,缩短耗时时长,提高用户体验,使得用户能够快捷方便地添加会议成员。
为达到上述目的,本申请实施例采用如下技术方案:
第一方面,提供一种第一电子设备。该第一电子设备安装有第一会议应用,第一电子设备未通过该第一会议应用接入会议,该第一电子设备包括:SIM卡;处理器;存储器;第一天线,第一天线的发射距离为第一距离,第一距离大于预设的第一安全距离;第二天线,第二天线的发射距离为第二距离,第二距离小于或等于预设的第一安全距离;以及计算机程序,其中计算机程序存储在存储器上,当计算机程序被处理器执行时,使得第一电子设备执行以下步骤:接收到第一输入;响应于第一输入,通过第一天线,广播第一消息;第一消息包括会议加入请求和第一电子设备的标识;在距离第二电子设备的第四距离内,接收到第一响应消息;第一响应消息包括随机密钥和第二电子设备的标识;第一响应消息与第一消息相关联;第二电子设备通过第一会议应用接入会议,第二电子设备在第一会议应用上的帐号在会议中为会议主席;接收到用于指示加入会议的第二输入;响应于第二输入,使用随机密钥加密第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号,得到加密信息;通过第二天线,发送第二消息;第二消息包括第二电子设备的标识以及加密信息;接收到第一会议应用的呼叫电话;在接通呼叫电话后,加入第二电子设备参加的会议;其中,第四距离小于或等于预设的第二安全距离;预设的第二安全距离为第二电子设备与第一电子设备交换秘密信息的一个安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
这样,第一电子设备作为欲接入方的电子设备,能够通过切换第一天线和第二天线, 使得第一电子设备基于超短距通信方式,与作为会议主席的第二电子设备相靠近或碰一碰,来接入当前会议,从而在有会议主席的场景下,简化了第一电子设备接入会议的过程,缩短了第一电子设备接入会议的时间,提升了用户体验。
根据第一方面,第一输入为一个用户输入,第二输入为一个用户输入。
根据第一方面,或者以上第一方面的任意一种实现方式,第一输入为多个用户输入,第二输入为多个用户输入。这里,第一输入和第二输入各自可以包括多个用户输入,以及多种用户输入的形式。
根据第一方面,或者以上第一方面的任意一种实现方式,第一电子设备还包括一个无线通信模块,第一天线和第二天线都连接该无线通信模块。也就是说,在本申请实施例中,第一天线和第二天线连接至同一个无线通信模块。
根据第一方面,或者以上第一方面的任意一种实现方式,无线通信模块包括一个Wi-Fi芯片、一个蓝牙芯片或一个Zigbee芯片;第一天线和第二天线都连接Wi-Fi芯片、蓝牙芯片和Zigbee芯片中的一个。这里,可以认为,第一天线和第二天线连接至同一个芯片。
第二方面,提供一种第一电子设备。该第一电子设备安装有第一会议应用,第一电子设备未通过第一会议应用接入会议,该第一电子设备包括:SIM卡;处理器;存储器;第一天线,第一天线的发射距离为第一距离,第一距离大于预设的第一安全距离;第二天线,第二天线的发射距离为第二距离,第二距离小于或等于预设的第一安全距离;以及计算机程序,其中计算机程序存储在存储器上,当计算机程序被处理器执行时,使得第一电子设备执行以下步骤:接收到第一输入;响应于第一输入,通过第二天线,广播第一消息;第一消息包括会议加入请求和第一电子设备的标识;在距离第二电子设备的第四距离内,接收到第一响应消息;第一响应消息包括随机密钥和第二电子设备的标识;第一响应消息与第一消息相关联;第二电子设备通过第一会议应用接入会议,第二电子设备在第一会议应用上的帐号在会议中为会议主席;响应于第一响应消息,使用随机密钥加密第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号,得到加密信息;通过第一天线,发送第二消息;第二消息包括第二电子设备的标识以及加密信息;接收到第一会议应用的呼叫电话;在接通呼叫电话后,加入第二电子设备参加的会议;其中,第四距离小于或等于预设的第二安全距离;预设的第二安全距离为第二电子设备与第一电子设备交换秘密信息的一个安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
这样,第一电子设备作为欲接入方的电子设备,能够通过切换第二天线和第一天线,使得第一电子设备基于超短距通信方式,与作为会议主席的第二电子设备相靠近或碰一碰,来接入当前会议,从而在有会议主席的场景下,简化了第一电子设备接入会议的过程,缩短了第一电子设备接入会议的时间,提升了用户体验。
根据第二方面,SIM卡包括嵌入式SIM卡、卡片式SIM卡和eSIM卡中的至少一种。
第三方面,提供一种第一电子设备。该第一电子设备安装有第一会议应用,第一电子设备未通过第一会议应用接入会议,该第一电子设备包括:SIM卡;处理器;存储器;第一天线,第一天线在第一发射功率下的发射距离为第一距离,第一距离大于预设的第一安全距离;第一天线在第二发射功率下的发射距离为第二距离,第二距离小于或等于预设的第一安全距离;第一发射功率大于第二发射功率;以及计算机程序,其中计算机程序存储 在存储器上,当计算机程序被处理器执行时,使得第一电子设备执行以下步骤:接收到第一输入;响应于第一输入,通过第一发射功率下的第一天线,广播第一消息;第一消息包括会议加入请求和第一电子设备的标识;在距离第二电子设备的第四距离内,接收到第一响应消息;第一响应消息包括随机密钥和第二电子设备的标识;第一响应消息与第一消息相关联;第二电子设备通过第一会议应用接入会议,第二电子设备在第一会议应用上的帐号在会议中为会议主席;接收到用于指示加入会议的第二输入;响应于第二输入,使用随机密钥加密第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号,得到加密信息;通过第二发射功率下的第一天线,发送第二消息;第二消息包括第二电子设备的标识以及加密信息;接收到第一会议应用的呼叫电话;在接通呼叫电话后,加入第二电子设备参加的会议;其中,第四距离小于或等于预设的第二安全距离;预设的第二安全距离为第二电子设备与第一电子设备交换秘密信息的一个安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
这样,第一电子设备作为欲接入方的电子设备,能够通过调节第一天线的发射功率,使得第一电子设备基于超短距通信方式,与作为会议主席的第二电子设备相靠近或碰一碰,来接入当前会议,从而在有会议主席的场景下,简化了第一电子设备接入会议的过程,缩短了第一电子设备接入会议的时间,提升了用户体验。
根据第三方面,第一电子设备还包括一个无线通信模块,该无线通信模块包括一个Wi-Fi芯片、一个蓝牙芯片或一个Zigbee芯片;第一天线连接Wi-Fi芯片、蓝牙芯片和Zigbee芯片中的一个。
第四方面,提供一种第一电子设备。该第一电子设备安装有第一会议应用,第一电子设备未通过第一会议应用接入会议,该第一电子设备包括:SIM卡;处理器;存储器;第一天线,第一天线在第一发射功率下的发射距离为第一距离,第一距离大于预设的第一安全距离;第一天线在第二发射功率下的发射距离为第二距离,第二距离小于或等于预设的第一安全距离;第一发射功率大于第二发射功率;以及计算机程序,其中计算机程序存储在存储器上,当计算机程序被处理器执行时,使得第一电子设备执行以下步骤:接收到第一输入;响应于第一输入,通过第二发射功率下的第一天线,广播第一消息;第一消息包括会议加入请求和第一电子设备的标识;在距离第二电子设备的第四距离内,接收到第一响应消息;第一响应消息包括随机密钥和第二电子设备的标识;第一响应消息与第一消息相关联;第二电子设备通过第一会议应用接入会议,第二电子设备在第一会议应用上的帐号在会议中为会议主席;响应于第一响应消息,使用随机密钥加密第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号,得到加密信息;通过第一发射功率下的第一天线,发送第二消息;第二消息包括第二电子设备的标识以及加密信息;接收到第一会议应用的呼叫电话;在接通呼叫电话后,加入第二电子设备参加的会议;其中,第四距离小于或等于预设的第二安全距离;预设的第二安全距离为第二电子设备与第一电子设备交换秘密信息的一个安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
这样,第一电子设备作为欲接入方的电子设备,能够通过调节第一天线的发射功率,使得第一电子设备基于超短距通信方式,与作为会议主席的第二电子设备相靠近或碰一碰,来接入当前会议,从而在有会议主席的场景下,简化了第一电子设备接入会议的过程,缩 短了第一电子设备接入会议的时间,提升了用户体验。
可以理解的是,将第一方面和第二方面的技术方案中的第一天线替换为第一发射功率下的第一天线,第二天线替换为第二发射功率下的第一天线,即可得到第三方面和第四方面的技术方案。
也就是说,在本申请实施例中,可以通过不同天线实现不同的发射距离,也可以通过调节同一个天线的发射功率,实现不同的发射距离。
第五方面,提供一种第一电子设备。该第一电子设备安装有第一会议应用,第一电子设备未通过第一会议应用接入会议,该第一电子设备包括:SIM卡;处理器;存储器;第一天线,第一天线的发射距离为第一距离,第一距离大于预设的第一安全距离;第二天线,第二天线的发射距离为第二距离,第二距离小于或等于预设的第一安全距离;以及计算机程序,其中计算机程序存储在存储器上,当计算机程序被处理器执行时,使得第一电子设备执行以下步骤:接收到第一输入;响应于第一输入,生成随机密钥,通过第二天线,广播第一消息;第一消息包括会议加入请求、第一电子设备的标识和随机密钥;在距离第二电子设备的第四距离内,接收到第一响应消息;第一响应消息包括加密信息;第一响应消息与第一消息相关联;第二电子设备通过第一会议应用接入会议;使用随机密钥解密加密信息,获取到会议的会议标识和会议密码;通过第一天线,向第一会议应用的服务器发送第二消息;第二消息包括通过第一会议应用的加密机制,加密会议标识、会议密码和第一电子设备在第一会议应用上的帐号后的信息;接收到第一会议应用的呼叫电话;在接通呼叫电话后,加入会议;其中,第四距离小于或等于预设的第二安全距离;预设的第二安全距离为第二电子设备与第一电子设备交换秘密信息的一个安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
这样,第一电子设备作为欲接入方的电子设备,能够通过切换第一天线和第二天线,使得第一电子设备基于超短距通信方式,与处于会议中的第二电子设备相靠近或碰一碰,来接入当前会议,从而在无会议主席的场景下,简化了第一电子设备接入会议的过程,缩短了第一电子设备接入会议的时间,提升了用户体验。
第六方面,提供一种第一电子设备。该第一电子设备安装有第一会议应用,第一电子设备未通过第一会议应用接入会议,该第一电子设备包括:SIM卡;处理器;存储器;第一天线,第一天线在第一发射功率下的发射距离为第一距离,第一距离大于预设的第一安全距离;第一天线在第二发射功率下的发射距离为第二距离,第二距离小于或等于预设的第一安全距离;第一发射功率大于第二发射功率;以及计算机程序,其中计算机程序存储在存储器上,当计算机程序被处理器执行时,使得第一电子设备执行以下步骤:接收到第一输入;响应于第一输入,生成随机密钥,通过第二发射功率下的第一天线,广播第一消息;第一消息包括会议加入请求、第一电子设备的标识和随机密钥;在距离第二电子设备的第四距离内,接收到第一响应消息;第一响应消息包括加密信息;第一响应消息与第一消息相关联;第二电子设备通过第一会议应用接入会议;使用随机密钥解密加密信息,获取到会议的会议标识和会议密码;通过第一发射功率下的第一天线,向第一会议应用的服务器发送第二消息;第二消息包括通过第一会议应用的加密机制,加密会议标识、会议密码和第一电子设备在第一会议应用上的帐号后的信息;接收到第一会议应用的呼叫电话;在接通呼叫电话后,加入会议;其中,第四距离小于或等于预设的第二安全距离;预设的 第二安全距离为第二电子设备与第一电子设备交换秘密信息的一个安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
这样,第一电子设备作为欲接入方的电子设备,能够通过调节第一天线的发射功率,使得第一电子设备基于超短距通信方式,与处于会议中的第二电子设备相靠近或碰一碰,来接入当前会议,从而在无会议主席的场景下,简化了第一电子设备接入会议的过程,缩短了第一电子设备接入会议的时间,提升了用户体验。
可以理解的是,将第五方面的技术方案中的第一天线替换为第一发射功率下的第一天线,第二天线替换为第二发射功率下的第一天线,即可得到第六方面的技术方案。
第七方面,提供一种第二电子设备。该第二电子设备安装有第一会议应用,第二电子设备通过第一会议应用接入会议,第二电子设备在第一会议应用上的帐号在会议中为会议主席,该第二电子设备包括:处理器;存储器;第三天线,第三天线的发射距离为第三距离,第三距离大于预设的第二安全距离;第四天线,第四天线的发射距离为第四距离,第四距离小于或等于预设的第二安全距离;以及计算机程序,其中计算机程序存储在存储器上,当计算机程序被处理器执行时,使得第二电子设备执行以下步骤:在距离第一电子设备的第一距离内,接收到来自第一电子设备的第一消息;第一消息包括会议加入请求和第一电子设备的标识;响应于第一消息,生成随机密钥;通过第四天线,发送第一响应消息;第一响应消息包括随机密钥和第二电子设备的标识;在距离第一电子设备的第二距离内,接收到来自第一电子设备的第二消息;第二消息包括第二电子设备的标识以及加密信息;使用随机密钥解密加密信息,获取到第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号;接收到用于指示同意加入会议的第三输入;通过第三天线,向第一会议应用的服务器发送第三消息;第三消息包括通过第一会议应用的加密机制,加密第一电子设备的SIM卡号码、第一电子设备在第一会议应用上的帐号、第二电子设备在第一会议应用上的帐号和会议的会议标识后的信息;其中,第二距离小于或等于预设的第一安全距离;第一距离大于预设的第一安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离;预设的第二安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
这样,第二电子设备作为会议主席,能够基于超短距通信方式,与欲接入会议的其他电子设备相靠近或碰一碰,使得其他电子设备接入第二电子设备作为会议主席的当前会议,从而在有会议主席的场景下,简化了其他电子设备接入会议的过程,缩短了其他电子设备接入会议的时间,提升了用户体验。
根据第七方面,第三输入为一个用户输入。
根据第七方面,或者以上第七方面的任意一种实现方式,第二电子设备还包括一个无线通信模块,第三天线和第四天线都连接该无线通信模块。也就是说,在本申请实施例中,第三天线和第四天线连接至同一个无线通信模块。
根据第七方面,或者以上第七方面的任意一种实现方式,该无线通信模块包括一个Wi-Fi芯片、一个蓝牙芯片或一个Zigbee芯片;第三天线和第四天线都连接Wi-Fi芯片、蓝牙芯片和Zigbee芯片中的一个。这里,可以认为,第三天线和第四天线连接至同一个芯片。
第八方面,提供一种第二电子设备。该第二电子设备安装有第一会议应用,第二电子 设备通过第一会议应用接入会议,第二电子设备在第一会议应用上的帐号在会议中为会议主席;该第二电子设备包括:处理器;存储器;第三天线,第三天线的发射距离为第三距离,第三距离大于预设的第二安全距离;第四天线,第四天线的发射距离为第四距离,第四距离小于或等于预设的第二安全距离;以及计算机程序,其中计算机程序存储在存储器上,当计算机程序被处理器执行时,使得第二电子设备执行以下步骤:在距离第一电子设备的第二距离内,接收到来自第一电子设备的第一消息;第一消息包括会议加入请求和第一电子设备的标识;响应于第一消息,生成随机密钥;通过第四天线,发送第一响应消息;第一响应消息包括随机密钥和第二电子设备的标识;在距离第一电子设备的第一距离内,接收到来自第一电子设备的第二消息;第二消息包括第二电子设备的标识以及加密信息;使用随机密钥解密加密信息,获取到第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号;接收到用于指示同意加入会议的第三输入;通过第三天线,向第一会议应用的服务器发送第三消息;第三消息包括通过第一会议应用的加密机制,加密第一电子设备的SIM卡号码、第一电子设备在第一会议应用上的帐号、第二电子设备在第一会议应用上的帐号和会议的会议标识后的信息;其中,第二距离小于或等于预设的第一安全距离;第一距离大于预设的第一安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离;预设的第二安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
这样,第二电子设备作为会议主席,能够基于超短距通信方式,与欲接入会议的其他电子设备相靠近或碰一碰,使得其他电子设备接入第二电子设备作为会议主席的当前会议,从而在有会议主席的场景下,简化了其他电子设备接入会议的过程,缩短了其他电子设备接入会议的时间,提升了用户体验。
第九方面,提供一种第二电子设备。该第二电子设备安装有第一会议应用,第二电子设备通过第一会议应用接入会议,第二电子设备在第一会议应用上的帐号在会议中为会议主席;该第二电子设备包括:处理器;存储器;第三天线,第三天线在第三发射功率下的发射距离为第三距离,第三距离大于预设的第二安全距离;第三天线在第四发射功率下的发射距离为第四距离,第四距离小于或等于预设的第二安全距离;第三发射功率大于第四发射功率;以及计算机程序,其中计算机程序存储在存储器上,当计算机程序被处理器执行时,使得第二电子设备执行以下步骤:在距离第一电子设备的第一距离内,接收到来自第一电子设备的第一消息;第一消息包括会议加入请求和第一电子设备的标识;响应于第一消息,生成随机密钥;通过第四发射功率下的第三天线,发送第一响应消息;第一响应消息包括随机密钥和第二电子设备的标识;在距离第一电子设备的第二距离内,接收到来自第一电子设备的第二消息;第二消息包括第二电子设备的标识以及加密信息;使用随机密钥解密加密信息,获取到第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号;接收到用于指示同意加入会议的第三输入;通过第三发射功率下的第三天线,向第一会议应用的服务器发送第三消息;第三消息包括通过第一会议应用的加密机制,加密第一电子设备的SIM卡号码、第一电子设备在第一会议应用上的帐号、第二电子设备在第一会议应用上的帐号和会议的会议标识后的信息;其中,第二距离小于或等于预设的第一安全距离;第一距离大于预设的第一安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离;预设的第二安全距离为第一电子设备与第二 电子设备交换秘密信息的一个安全距离。
这样,第二电子设备作为会议主席,能够基于超短距通信方式,与欲接入会议的其他电子设备相靠近或碰一碰,使得其他电子设备接入第二电子设备作为会议主席的当前会议,从而在有会议主席的场景下,简化了其他电子设备接入会议的过程,缩短了其他电子设备接入会议的时间,提升了用户体验。
根据第九方面,该第二电子设备还包括一个无线通信模块,该无线通信模块包括一个Wi-Fi芯片、一个蓝牙芯片或一个Zigbee芯片;第三天线连接Wi-Fi芯片、蓝牙芯片和Zigbee芯片中的一个。
第十方面,提供一种第二电子设备。该第二电子设备安装有第一会议应用,第二电子设备通过第一会议应用接入会议,第二电子设备在第一会议应用上的帐号在会议中为会议主席;该第二电子设备包括:处理器;存储器;第三天线,第三天线在第三发射功率下的发射距离为第三距离,第三距离大于预设的第二安全距离;第三天线在第四发射功率下的发射距离为第四距离,第四距离小于或等于预设的第二安全距离;第三发射功率大于第四发射功率;以及计算机程序,其中计算机程序存储在存储器上,当计算机程序被处理器执行时,使得第二电子设备执行以下步骤:在距离第一电子设备的第二距离内,接收到来自第一电子设备的第一消息;第一消息包括会议加入请求和第一电子设备的标识;响应于第一消息,生成随机密钥;通过第四发射功率下的第三天线,发送第一响应消息;第一响应消息包括随机密钥和第二电子设备的标识;在距离第一电子设备的第一距离内,接收到来自第一电子设备的第二消息;第二消息包括第二电子设备的标识以及加密信息;使用随机密钥解密加密信息,获取到第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号;接收到用于指示同意加入会议的第三输入;通过第三发射功率下的第三天线,向第一会议应用的服务器发送第三消息;第三消息包括通过第一会议应用的加密机制,加密第一电子设备的SIM卡号码、第一电子设备在第一会议应用上的帐号、第二电子设备在第一会议应用上的帐号和会议的会议标识后的信息;其中,第二距离小于或等于预设的第一安全距离;第一距离大于预设的第一安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离;预设的第二安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
这样,第二电子设备作为会议主席,能够基于超短距通信方式,与欲接入会议的其他电子设备相靠近或碰一碰,使得其他电子设备接入第二电子设备作为会议主席的当前会议,从而在有会议主席的场景下,简化了其他电子设备接入会议的过程,缩短了其他电子设备接入会议的时间,提升了用户体验。
可以理解的是,将第七方面和第八方面的技术方案中的第三天线替换为在第三发射功率下的第三天线,将第四天线替换为在第四发射功率下的第三天线,即可得到第九方面和第十方面的技术方案。
第十一方面,提供一种第二电子设备。该第二电子设备安装有第一会议应用,第二电子设备通过第一会议应用接入会议,第二电子设备在第一会议应用上的帐号在会议中为非会议主席的会议成员;该第二电子设备包括:处理器;存储器;第三天线,第三天线的发射距离为第三距离,第三距离大于预设的第二安全距离;第四天线,第四天线的发射距离为第四距离,第四距离小于或等于预设的第二安全距离;以及计算机程序,其中计算机程 序存储在存储器上,当计算机程序被处理器执行时,使得第二电子设备执行以下步骤:在距离第一电子设备的第一距离内,接收到来自第一电子设备的第一消息;第一消息包括会议加入请求和第一电子设备的标识;响应于第一消息,生成随机密钥;通过第四天线,发送第一响应消息;第一响应消息包括随机密钥和第二电子设备的标识;在距离第一电子设备的第二距离内,接收到来自第一电子设备的第二消息;第二消息包括第二电子设备的标识以及加密信息;使用随机密钥解密加密信息,获取到第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号;通过第三天线,向第一会议应用的服务器发送第三消息;第三消息包括通过第一会议应用的加密机制,加密第一电子设备的SIM卡号码、第一电子设备在第一会议应用上的帐号、第二电子设备在第一会议应用上的帐号和会议的会议标识后的信息;其中,第二距离小于或等于预设的第一安全距离;第一距离大于预设的第一安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离;预设的第二安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
这样,第二电子设备作为非会议主席的会议成员,能够基于超短距通信方式,与欲接入会议的其他电子设备相靠近或碰一碰,使得其他电子设备接入第二电子设备参加的当前会议,从而在有会议主席的场景下,简化了其他电子设备接入会议的过程,缩短了其他电子设备接入会议的时间,提升了用户体验。
第十二方面,提供一种第二电子设备,第二电子设备安装有第一会议应用,第二电子设备通过第一会议应用接入会议,第二电子设备在第一会议应用上的帐号在会议中为非会议主席的会议成员;其特征在于,第二电子设备包括:处理器;存储器;第三天线,第三天线的发射距离为第三距离,第三距离大于预设的第二安全距离;第四天线,第四天线的发射距离为第四距离,第四距离小于或等于预设的第二安全距离;以及计算机程序,其中计算机程序存储在存储器上,当计算机程序被处理器执行时,使得第二电子设备执行以下步骤:在距离第一电子设备的第二距离内,接收到来自第一电子设备的第一消息;第一消息包括会议加入请求和第一电子设备的标识;响应于第一消息,生成随机密钥;通过第四天线,发送第一响应消息;第一响应消息包括随机密钥和第二电子设备的标识;在距离第一电子设备的第一距离内,接收到来自第一电子设备的第二消息;第二消息包括第二电子设备的标识以及加密信息;使用随机密钥解密加密信息,获取到第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号;通过第三天线,向第一会议应用的服务器发送第三消息;第三消息包括通过第一会议应用的加密机制,加密第一电子设备的SIM卡号码、第一电子设备在第一会议应用上的帐号、第二电子设备在第一会议应用上的帐号和会议的会议标识后的信息;其中,第二距离小于或等于预设的第一安全距离;第一距离大于预设的第一安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离;预设的第二安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
这样,第二电子设备作为非会议主席的会议成员,能够基于超短距通信方式,与欲接入会议的其他电子设备相靠近或碰一碰,使得其他电子设备接入第二电子设备参加的当前会议,从而在有会议主席的场景下,简化了其他电子设备接入会议的过程,缩短了其他电子设备接入会议的时间,提升了用户体验。
第十三方面,提供一种第二电子设备。该第二电子设备安装有第一会议应用,第二电子设备通过第一会议应用接入会议,第二电子设备在第一会议应用上的帐号在会议中为非会议主席的会议成员;该第二电子设备包括:处理器;存储器;第三天线,第三天线在第三发射功率下的发射距离为第三距离,第三距离大于预设的第二安全距离;第三天线在第四发射功率下的发射距离为第四距离,第四距离小于或等于预设的第二安全距离;第三发射功率大于第四发射功率;以及计算机程序,其中计算机程序存储在存储器上,当计算机程序被处理器执行时,使得第二电子设备执行以下步骤:在距离第一电子设备的第一距离内,接收到来自第一电子设备的第一消息;第一消息包括会议加入请求和第一电子设备的标识;响应于第一消息,生成随机密钥;通过第四发射功率下的第三天线,发送第一响应消息;第一响应消息包括随机密钥和第二电子设备的标识;在距离第一电子设备的第二距离内,接收到来自第一电子设备的第二消息;第二消息包括第二电子设备的标识以及加密信息;使用随机密钥解密加密信息,获取到第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号;通过第三发射功率下的第三天线,向第一会议应用的服务器发送第三消息;第三消息包括通过第一会议应用的加密机制,加密第一电子设备的SIM卡号码、第一电子设备在第一会议应用上的帐号、第二电子设备在第一会议应用上的帐号和会议的会议标识后的信息;其中,第二距离小于或等于预设的第一安全距离;第一距离大于预设的第一安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离;预设的第二安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
第十四方面,提供一种第二电子设备。该第二电子设备安装有第一会议应用,第二电子设备通过第一会议应用接入会议,第二电子设备在第一会议应用上的帐号在会议中为非会议主席的会议成员;该第二电子设备包括:处理器;存储器;第三天线,第三天线在第三发射功率下的发射距离为第三距离,第三距离大于预设的第二安全距离;第三天线在第四发射功率下的发射距离为第四距离,第四距离小于或等于预设的第二安全距离;第三发射功率大于第四发射功率;以及计算机程序,其中计算机程序存储在存储器上,当计算机程序被处理器执行时,使得第二电子设备执行以下步骤:在距离第一电子设备的第二距离内,接收到来自第一电子设备的第一消息;第一消息包括会议加入请求和第一电子设备的标识;响应于第一消息,生成随机密钥;通过第四发射功率下的第三天线,发送第一响应消息;第一响应消息包括随机密钥和第二电子设备的标识;在距离第一电子设备的第一距离内,接收到来自第一电子设备的第二消息;第二消息包括第二电子设备的标识以及加密信息;使用随机密钥解密加密信息,获取到第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号;通过第三发射功率下的第三天线,向第一会议应用的服务器发送第三消息;第三消息包括通过第一会议应用的加密机制,加密第一电子设备的SIM卡号码、第一电子设备在第一会议应用上的帐号、第二电子设备在第一会议应用上的帐号和会议的会议标识后的信息;其中,第二距离小于或等于预设的第一安全距离;第一距离大于预设的第一安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离;预设的第二安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
可以理解的是,将第十一方面和第十二方面的技术方案中的第三天线替换为在第三发 射功率下的第三天线,将第四天线替换为在第四发射功率下的第三天线,即可得到第十三方面和第十四方面的技术方案。
第十五方面,提供一种第二电子设备。该第二电子设备安装有第一会议应用,第二电子设备通过第一会议应用接入会议;该第二电子设备包括:处理器;存储器;第三天线,第三天线的发射距离为第三距离,第三距离大于预设的第二安全距离;第四天线,第四天线的发射距离为第四距离,第四距离小于或等于预设的第二安全距离;以及计算机程序,其中计算机程序存储在存储器上,当计算机程序被处理器执行时,使得第二电子设备执行以下步骤:在距离第一电子设备的第二距离内,接收到来自第一电子设备的第一消息;第一消息包括会议加入请求、第一电子设备的标识和随机密钥;通过第四天线,发送第一响应消息;第一响应消息包括加密信息;加密信息为使用随机密钥对会议的会议标识和会议密码加密后的信息,或者加密信息为使用随机密钥对会议的会议标识加密后的信息;在经过预设时长后,切换至第三天线;其中,第二距离小于或等于预设的第一安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离;预设的第二安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
这样,处于当前会议中的第二电子设备能够基于超短距通信方式,与欲接入会议的其他电子设备相靠近或碰一碰,使得其他电子设备接入当前会议,从而在无会议主席的场景下,简化了其他电子设备接入会议的过程,缩短了其他电子设备接入会议的时间,提升了用户体验。
第十六方面,提供一种第二电子设备。该第二电子设备安装有第一会议应用,第二电子设备通过第一会议应用接入会议;该第二电子设备包括:处理器;存储器;第三天线,第三天线在第三发射功率下的发射距离为第三距离,第三距离大于预设的第二安全距离;第三天线在第四发射功率下的发射距离为第四距离,第四距离小于或等于预设的第二安全距离;第三发射功率大于第四发射功率;以及计算机程序,其中计算机程序存储在存储器上,当计算机程序被处理器执行时,使得第二电子设备执行以下步骤:在距离第一电子设备的第二距离内,接收到来自第一电子设备的第一消息;第一消息包括会议加入请求、第一电子设备的标识和随机密钥;通过第四发射功率下的第三天线,发送第一响应消息;第一响应消息包括加密信息;加密信息为使用随机密钥对会议的会议标识和会议密码加密后的信息,或者加密信息为使用随机密钥对会议的会议标识加密后的信息;在经过预设时长后,将第三天线的发射功率调整为第三发射功率;其中,第二距离小于或等于预设的第一安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离;预设的第二安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
这样,处于当前会议中的第二电子设备能够基于超短距通信方式,与欲接入会议的其他电子设备相靠近或碰一碰,使得其他电子设备接入当前会议,从而在无会议主席的场景下,简化了其他电子设备接入会议的过程,缩短了其他电子设备接入会议的时间,提升了用户体验。
可以理解的是,将第十五方面的技术方案中的第三天线替换为第三发射功率下的第三天线,第四天线替换为第四发射功率下的第三天线,即可得到第十六方面的技术方案。
第十七方面,提供一种会议接入方法,应用于第一电子设备。该第一电子设备安装有第一会议应用,第一电子设备未通过第一会议应用接入会议,第一电子设备包括:SIM卡; 第一天线,第一天线的发射距离为第一距离,第一距离大于预设的第一安全距离;第二天线,第二天线的发射距离为第二距离,第二距离小于或等于预设的第一安全距离;该方法包括:接收到第一输入;响应于第一输入,通过第一天线,广播第一消息;第一消息包括会议加入请求和第一电子设备的标识;在距离第二电子设备的第四距离内,接收到第一响应消息;第一响应消息包括随机密钥和第二电子设备的标识;第一响应消息与第一消息相关联;第二电子设备通过第一会议应用接入会议,第二电子设备在第一会议应用上的帐号在会议中为会议主席;接收到用于指示加入会议的第二输入;响应于第二输入,使用随机密钥加密第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号,得到加密信息;通过第二天线,发送第二消息;第二消息包括第二电子设备的标识以及加密信息;接收到第一会议应用的呼叫电话;在接通呼叫电话后,加入第二电子设备参加的会议;其中,第四距离小于或等于预设的第二安全距离;预设的第二安全距离为第二电子设备与第一电子设备交换秘密信息的一个安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
第十八方面,提供一种会议接入方法,应用于第一电子设备。该第一电子设备安装有第一会议应用,第一电子设备未通过第一会议应用接入会议,第一电子设备包括:SIM卡;第一天线,第一天线的发射距离为第一距离,第一距离大于预设的第一安全距离;第二天线,第二天线的发射距离为第二距离,第二距离小于或等于预设的第一安全距离;该方法包括:接收到第一输入;响应于第一输入,通过第二天线,广播第一消息;第一消息包括会议加入请求和第一电子设备的标识;在距离第二电子设备的第四距离内,接收到第一响应消息;第一响应消息包括随机密钥和第二电子设备的标识;第一响应消息与第一消息相关联;第二电子设备通过第一会议应用接入会议,第二电子设备在第一会议应用上的帐号在会议中为会议主席;响应于第一响应消息,使用随机密钥加密第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号,得到加密信息;通过第一天线,发送第二消息;第二消息包括第二电子设备的标识以及加密信息;接收到第一会议应用的呼叫电话;在接通呼叫电话后,加入第二电子设备参加的会议;其中,第四距离小于或等于预设的第二安全距离;预设的第二安全距离为第二电子设备与第一电子设备交换秘密信息的一个安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
第十九方面,提供一种会议接入方法,应用于第一电子设备。该第一电子设备安装有第一会议应用,第一电子设备未通过第一会议应用接入会议,第一电子设备包括:SIM卡;第一天线,第一天线在第一发射功率下的发射距离为第一距离,第一距离大于预设的第一安全距离;第一天线在第二发射功率下的发射距离为第二距离,第二距离小于或等于预设的第一安全距离;第一发射功率大于第二发射功率;该方法包括:接收到第一输入;响应于第一输入,通过第一发射功率下的第一天线,广播第一消息;第一消息包括会议加入请求和第一电子设备的标识;在距离第二电子设备的第四距离内,接收到第一响应消息;第一响应消息包括随机密钥和第二电子设备的标识;第一响应消息与第一消息相关联;第二电子设备通过第一会议应用接入会议,第二电子设备在第一会议应用上的帐号在会议中为会议主席;接收到用于指示加入会议的第二输入;响应于第二输入,使用随机密钥加密第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号,得到加密信息;通 过第二发射功率下的第一天线,发送第二消息;第二消息包括第二电子设备的标识以及加密信息;接收到第一会议应用的呼叫电话;在接通呼叫电话后,加入第二电子设备参加的会议;其中,第四距离小于或等于预设的第二安全距离;预设的第二安全距离为第二电子设备与第一电子设备交换秘密信息的一个安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
第二十方面,提供一种会议接入方法,应用于第一电子设备。该第一电子设备安装有第一会议应用,第一电子设备未通过第一会议应用接入会议,第一电子设备包括:SIM卡;第一天线,第一天线在第一发射功率下的发射距离为第一距离,第一距离大于预设的第一安全距离;第一天线在第二发射功率下的发射距离为第二距离,第二距离小于或等于预设的第一安全距离;第一发射功率大于第二发射功率;该方法包括:接收到第一输入;响应于第一输入,通过第二发射功率下的第一天线,广播第一消息;第一消息包括会议加入请求和第一电子设备的标识;在距离第二电子设备的第四距离内,接收到第一响应消息;第一响应消息包括随机密钥和第二电子设备的标识;第一响应消息与第一消息相关联;第二电子设备通过第一会议应用接入会议,第二电子设备在第一会议应用上的帐号在会议中为会议主席;响应于第一响应消息,使用随机密钥加密第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号,得到加密信息;通过第一发射功率下的第一天线,发送第二消息;第二消息包括第二电子设备的标识以及加密信息;接收到第一会议应用的呼叫电话;在接通呼叫电话后,加入第二电子设备参加的会议;其中,第四距离小于或等于预设的第二安全距离;预设的第二安全距离为第二电子设备与第一电子设备交换秘密信息的一个安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
第二十一方面,提供一种会议接入方法,应用于第一电子设备。该第一电子设备安装有第一会议应用,第一电子设备未通过第一会议应用接入会议,第一电子设备包括:SIM卡;第一天线,第一天线的发射距离为第一距离,第一距离大于预设的第一安全距离;第二天线,第二天线的发射距离为第二距离,第二距离小于或等于预设的第一安全距离;该方法包括:接收到第一输入;响应于第一输入,生成随机密钥,通过第二天线,广播第一消息;第一消息包括会议加入请求、第一电子设备的标识和随机密钥;在距离第二电子设备的第四距离内,接收到第一响应消息;第一响应消息包括加密信息;第一响应消息与第一消息相关联;第二电子设备通过第一会议应用接入会议;使用随机密钥解密加密信息,获取到会议的会议标识和会议密码;通过第一天线,向第一会议应用的服务器发送第二消息;第二消息包括通过第一会议应用的加密机制,加密会议标识、会议密码和第一电子设备在第一会议应用上的帐号后的信息;接收到第一会议应用的呼叫电话;在接通呼叫电话后,加入会议;其中,第四距离小于或等于预设的第二安全距离;预设的第二安全距离为第二电子设备与第一电子设备交换秘密信息的一个安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
第二十二方面,提供一种会议接入方法,应用于第一电子设备。该第一电子设备安装有第一会议应用,第一电子设备未通过第一会议应用接入会议,第一电子设备包括:SIM卡;第一天线,第一天线在第一发射功率下的发射距离为第一距离,第一距离大于预设的第一安全距离;第一天线在第二发射功率下的发射距离为第二距离,第二距离小于或等于 预设的第一安全距离;第一发射功率大于第二发射功率;该方法包括:接收到第一输入;响应于第一输入,生成随机密钥,通过第二发射功率下的第一天线,广播第一消息;第一消息包括会议加入请求、第一电子设备的标识和随机密钥;在距离第二电子设备的第四距离内,接收到第一响应消息;第一响应消息包括加密信息;第一响应消息与第一消息相关联;第二电子设备通过第一会议应用接入会议;使用随机密钥解密加密信息,获取到会议的会议标识和会议密码;通过第一发射功率下的第一天线,向第一会议应用的服务器发送第二消息;第二消息包括通过第一会议应用的加密机制,加密会议标识、会议密码和第一电子设备在第一会议应用上的帐号后的信息;接收到第一会议应用的呼叫电话;在接通呼叫电话后,加入会议;其中,第四距离小于或等于预设的第二安全距离;预设的第二安全距离为第二电子设备与第一电子设备交换秘密信息的一个安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
第二十三方面,提供一种会议接入方法,应用于第二电子设备。该第二电子设备安装有第一会议应用,第二电子设备通过第一会议应用接入会议,第二电子设备在第一会议应用上的帐号在会议中为会议主席;第二电子设备包括:第三天线,第三天线的发射距离为第三距离,第三距离大于预设的第二安全距离;第四天线,第四天线的发射距离为第四距离,第四距离小于或等于预设的第二安全距离;该方法包括:在距离第一电子设备的第一距离内,接收到来自第一电子设备的第一消息;第一消息包括会议加入请求和第一电子设备的标识;响应于第一消息,生成随机密钥;通过第四天线,发送第一响应消息;第一响应消息包括随机密钥和第二电子设备的标识;在距离第一电子设备的第二距离内,接收到来自第一电子设备的第二消息;第二消息包括第二电子设备的标识以及加密信息;使用随机密钥解密加密信息,获取到第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号;接收到用于指示同意加入会议的第三输入;通过第三天线,向第一会议应用的服务器发送第三消息;第三消息包括通过第一会议应用的加密机制,加密第一电子设备的SIM卡号码、第一电子设备在第一会议应用上的帐号、第二电子设备在第一会议应用上的帐号和会议的会议标识后的信息;其中,第二距离小于或等于预设的第一安全距离;第一距离大于预设的第一安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离;预设的第二安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
第二十四方面,提供一种会议接入方法,应用于第二电子设备。该第二电子设备安装有第一会议应用,第二电子设备通过第一会议应用接入会议,第二电子设备在第一会议应用上的帐号在会议中为会议主席;第二电子设备包括:第三天线,第三天线的发射距离为第三距离,第三距离大于预设的第二安全距离;第四天线,第四天线的发射距离为第四距离,第四距离小于或等于预设的第二安全距离;该方法包括:在距离第一电子设备的第二距离内,接收到来自第一电子设备的第一消息;第一消息包括会议加入请求和第一电子设备的标识;响应于第一消息,生成随机密钥;通过第四天线,发送第一响应消息;第一响应消息包括随机密钥和第二电子设备的标识;在距离第一电子设备的第一距离内,接收到来自第一电子设备的第二消息;第二消息包括第二电子设备的标识以及加密信息;使用随机密钥解密加密信息,获取到第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号;接收到用于指示同意加入会议的第三输入;通过第三天线,向第一会议应用 的服务器发送第三消息;第三消息包括通过第一会议应用的加密机制,加密第一电子设备的SIM卡号码、第一电子设备在第一会议应用上的帐号、第二电子设备在第一会议应用上的帐号和会议的会议标识后的信息;其中,第二距离小于或等于预设的第一安全距离;第一距离大于预设的第一安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离;预设的第二安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
第二十五方面,提供一种会议接入方法,应用于第二电子设备。该第二电子设备安装有第一会议应用,第二电子设备通过第一会议应用接入会议,第二电子设备在第一会议应用上的帐号在会议中为会议主席;该第二电子设备包括:第三天线,第三天线在第三发射功率下的发射距离为第三距离,第三距离大于预设的第二安全距离;第三天线在第四发射功率下的发射距离为第四距离,第四距离小于或等于预设的第二安全距离;第三发射功率大于第四发射功率;该方法包括:在距离第一电子设备的第一距离内,接收到来自第一电子设备的第一消息;第一消息包括会议加入请求和第一电子设备的标识;响应于第一消息,生成随机密钥;通过第四发射功率下的第三天线,发送第一响应消息;第一响应消息包括随机密钥和第二电子设备的标识;在距离第一电子设备的第二距离内,接收到来自第一电子设备的第二消息;第二消息包括第二电子设备的标识以及加密信息;使用随机密钥解密加密信息,获取到第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号;接收到用于指示同意加入会议的第三输入;通过第三发射功率下的第三天线,向第一会议应用的服务器发送第三消息;第三消息包括通过第一会议应用的加密机制,加密第一电子设备的SIM卡号码、第一电子设备在第一会议应用上的帐号、第二电子设备在第一会议应用上的帐号和会议的会议标识后的信息;其中,第二距离小于或等于预设的第一安全距离;第一距离大于预设的第一安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离;预设的第二安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
第二十六方面,提供一种会议接入方法,应用于第二电子设备。该第二电子设备安装有第一会议应用,第二电子设备通过第一会议应用接入会议,第二电子设备在第一会议应用上的帐号在会议中为会议主席;该第二电子设备包括:第三天线,第三天线在第三发射功率下的发射距离为第三距离,第三距离大于预设的第二安全距离;第三天线在第四发射功率下的发射距离为第四距离,第四距离小于或等于预设的第二安全距离;第三发射功率大于第四发射功率;该方法包括:在距离第一电子设备的第二距离内,接收到来自第一电子设备的第一消息;第一消息包括会议加入请求和第一电子设备的标识;响应于第一消息,生成随机密钥;通过第四发射功率下的第三天线,发送第一响应消息;第一响应消息包括随机密钥和第二电子设备的标识;在距离第一电子设备的第一距离内,接收到来自第一电子设备的第二消息;第二消息包括第二电子设备的标识以及加密信息;使用随机密钥解密加密信息,获取到第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号;接收到用于指示同意加入会议的第三输入;通过第三发射功率下的第三天线,向第一会议应用的服务器发送第三消息;第三消息包括通过第一会议应用的加密机制,加密第一电子设备的SIM卡号码、第一电子设备在第一会议应用上的帐号、第二电子设备在第一会议应用上的帐号和会议的会议标识后的信息;其中,第二距离小于或等于预设的第一安全距离; 第一距离大于预设的第一安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离;预设的第二安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
第二十七方面,提供一种会议接入方法,应用于第二电子设备。该第二电子设备安装有第一会议应用,第二电子设备通过第一会议应用接入会议,第二电子设备在第一会议应用上的帐号在会议中为非会议主席的会议成员;该第二电子设备包括:第三天线,第三天线的发射距离为第三距离,第三距离大于预设的第二安全距离;第四天线,第四天线的发射距离为第四距离,第四距离小于或等于预设的第二安全距离;该方法包括:在距离第一电子设备的第一距离内,接收到来自第一电子设备的第一消息;第一消息包括会议加入请求和第一电子设备的标识;响应于第一消息,生成随机密钥;通过第四天线,发送第一响应消息;第一响应消息包括随机密钥和第二电子设备的标识;在距离第一电子设备的第二距离内,接收到来自第一电子设备的第二消息;第二消息包括第二电子设备的标识以及加密信息;使用随机密钥解密加密信息,获取到第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号;通过第三天线,向第一会议应用的服务器发送第三消息;第三消息包括通过第一会议应用的加密机制,加密第一电子设备的SIM卡号码、第一电子设备在第一会议应用上的帐号、第二电子设备在第一会议应用上的帐号和会议的会议标识后的信息;其中,第二距离小于或等于预设的第一安全距离;第一距离大于预设的第一安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离;预设的第二安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
第二十八方面,提供一种会议接入方法,应用于第二电子设备。该第二电子设备安装有第一会议应用,该第二电子设备通过第一会议应用接入会议,第二电子设备在第一会议应用上的帐号在会议中为非会议主席的会议成员;该第二电子设备包括:第三天线,第三天线的发射距离为第三距离,第三距离大于预设的第二安全距离;第四天线,第四天线的发射距离为第四距离,第四距离小于或等于预设的第二安全距离;该方法包括:在距离第一电子设备的第二距离内,接收到来自第一电子设备的第一消息;第一消息包括会议加入请求和第一电子设备的标识;响应于第一消息,生成随机密钥;通过第四天线,发送第一响应消息;第一响应消息包括随机密钥和第二电子设备的标识;在距离第一电子设备的第一距离内,接收到来自第一电子设备的第二消息;第二消息包括第二电子设备的标识以及加密信息;使用随机密钥解密加密信息,获取到第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号;通过第三天线,向第一会议应用的服务器发送第三消息;第三消息包括通过第一会议应用的加密机制,加密第一电子设备的SIM卡号码、第一电子设备在第一会议应用上的帐号、第二电子设备在第一会议应用上的帐号和会议的会议标识后的信息;其中,第二距离小于或等于预设的第一安全距离;第一距离大于预设的第一安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离;预设的第二安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
第二十九方面,提供一种会议接入方法,应用于第二电子设备。该第二电子设备安装有第一会议应用,第二电子设备通过第一会议应用接入会议,第二电子设备在第一会议应用上的帐号在会议中为非会议主席的会议成员;该第二电子设备包括:第三天线,第三天线在第三发射功率下的发射距离为第三距离,第三距离大于预设的第二安全距离;第三天 线在第四发射功率下的发射距离为第四距离,第四距离小于或等于预设的第二安全距离;第三发射功率大于第四发射功率;该方法包括:在距离第一电子设备的第一距离内,接收到来自第一电子设备的第一消息;第一消息包括会议加入请求和第一电子设备的标识;响应于第一消息,生成随机密钥;通过第四发射功率下的第三天线,发送第一响应消息;第一响应消息包括随机密钥和第二电子设备的标识;在距离第一电子设备的第二距离内,接收到来自第一电子设备的第二消息;第二消息包括第二电子设备的标识以及加密信息;使用随机密钥解密加密信息,获取到第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号;通过第三发射功率下的第三天线,向第一会议应用的服务器发送第三消息;第三消息包括通过第一会议应用的加密机制,加密第一电子设备的SIM卡号码、第一电子设备在第一会议应用上的帐号、第二电子设备在第一会议应用上的帐号和会议的会议标识后的信息;其中,第二距离小于或等于预设的第一安全距离;第一距离大于预设的第一安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离;预设的第二安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
第三十方面,提供一种会议接入方法,应用于第二电子设备。该第二电子设备安装有第一会议应用,第二电子设备通过第一会议应用接入会议,第二电子设备在第一会议应用上的帐号在会议中为非会议主席的会议成员;该第二电子设备包括:第三天线,第三天线在第三发射功率下的发射距离为第三距离,第三距离大于预设的第二安全距离;第三天线在第四发射功率下的发射距离为第四距离,第四距离小于或等于预设的第二安全距离;第三发射功率大于第四发射功率;该方法包括:在距离第一电子设备的第二距离内,接收到来自第一电子设备的第一消息;第一消息包括会议加入请求和第一电子设备的标识;响应于第一消息,生成随机密钥;通过第四发射功率下的第三天线,发送第一响应消息;第一响应消息包括随机密钥和第二电子设备的标识;在距离第一电子设备的第一距离内,接收到来自第一电子设备的第二消息;第二消息包括第二电子设备的标识以及加密信息;使用随机密钥解密加密信息,获取到第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号;通过第三发射功率下的第三天线,向第一会议应用的服务器发送第三消息;第三消息包括通过第一会议应用的加密机制,加密第一电子设备的SIM卡号码、第一电子设备在第一会议应用上的帐号、第二电子设备在第一会议应用上的帐号和会议的会议标识后的信息;其中,第二距离小于或等于预设的第一安全距离;第一距离大于预设的第一安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离;预设的第二安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
第三十一方面,提供一种会议接入方法,应用于第二电子设备。该第二电子设备安装有第一会议应用,第二电子设备通过第一会议应用接入会议;该第二电子设备包括:第三天线,第三天线的发射距离为第三距离,第三距离大于预设的第二安全距离;第四天线,第四天线的发射距离为第四距离,第四距离小于或等于预设的第二安全距离;该方法包括:在距离第一电子设备的第二距离内,接收到来自第一电子设备的第一消息;第一消息包括会议加入请求、第一电子设备的标识和随机密钥;通过第四天线,发送第一响应消息;第一响应消息包括加密信息;加密信息为使用随机密钥对会议的会议标识和会议密码加密后的信息,或者加密信息为使用随机密钥对会议的会议标识加密后的信息;在经过预设时长 后,切换至第三天线;其中,第二距离小于或等于预设的第一安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离;预设的第二安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
第三十二方面,提供一种会议接入方法,应用于第二电子设备。该第二电子设备安装有第一会议应用,第二电子设备通过第一会议应用接入会议;该第二电子设备包括:第三天线,第三天线在第三发射功率下的发射距离为第三距离,第三距离大于预设的第二安全距离;第三天线在第四发射功率下的发射距离为第四距离,第四距离小于或等于预设的第二安全距离;第三发射功率大于第四发射功率;该方法包括:在距离第一电子设备的第二距离内,接收到来自第一电子设备的第一消息;第一消息包括会议加入请求、第一电子设备的标识和随机密钥;通过第四发射功率下的第三天线,发送第一响应消息;第一响应消息包括加密信息;加密信息为使用随机密钥对会议的会议标识和会议密码加密后的信息,或者加密信息为使用随机密钥对会议的会议标识加密后的信息;在经过预设时长后,将第三天线的发射功率调整为第三发射功率;其中,第二距离小于或等于预设的第一安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离;预设的第二安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
第三十三方面,提供一种会议接入系统。该系统包括第一电子设备、第二电子设备和服务器,第一电子设备和第二电子设备均安装有第一会议应用,第一电子设备未通过第一会议应用接入会议,第二电子设备通过第一会议应用接入会议,第二电子设备在第一会议应用上的帐号在会议中为会议主席。第一电子设备包括第一天线和第二天线,其中,第一天线的发射距离为第一距离,第一距离大于预设的第一安全距离;第二天线的发射距离为第二距离,第二距离小于或等于预设的第一安全距离。第二电子设备包括第三天线和第四天线,其中,第三天线的发射距离为第三距离,第三距离大于预设的第二安全距离;第四天线的发射距离为第四距离,第四距离小于或等于预设的第二安全距离。其中,第一电子设备接收到第一输入;第一电子设备响应于第一输入,通过第一天线,广播第一消息;第一消息包括会议加入请求和第一电子设备的标识;第二电子设备在距离第一电子设备的第一距离内,接收到来自第一电子设备的第一消息;第二电子设备响应于第一消息,生成随机密钥;第二电子设备通过第四天线,发送第一响应消息;第一响应消息包括随机密钥和第二电子设备的标识;第一电子设备在距离第二电子设备的第四距离内,接收到第一响应消息;第一电子设备接收到用于指示加入会议的第二输入;第一电子设备响应于第二输入,使用随机密钥加密第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号,得到加密信息;第一电子设备通过第二天线,发送第二消息;第二消息包括第二电子设备的标识以及加密信息;第二电子设备在距离第一电子设备的第二距离内,接收到来自第一电子设备的第二消息;第二电子设备使用随机密钥解密加密信息,获取到第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号;第二电子设备接收到用于指示同意加入会议的第三输入;第二电子设备通过第三天线,向服务器发送第三消息;第三消息包括通过第一会议应用的加密机制,加密第一电子设备的SIM卡号码、第一电子设备在第一会议应用上的帐号、第二电子设备在第一会议应用上的帐号和会议的会议标识后的信息;服务器向第一电子设备发送呼叫电话;第一电子设备在接通呼叫电话后,加入第二电子设备参加的会议。其中,第二距离小于或等于预设的第一安全距离;第四距离小于或 等于预设的第二安全距离;预设的第二安全距离为第二电子设备与第一电子设备交换秘密信息的一个安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
第三十四方面,提供一种会议接入系统。该系统包括第一电子设备、第二电子设备和服务器,第一电子设备和第二电子设备均安装有第一会议应用,第一电子设备未通过第一会议应用接入会议,第二电子设备通过第一会议应用接入会议,第二电子设备在第一会议应用上的帐号在会议中为会议主席。第一电子设备包括第一天线和第二天线,其中,第一天线的发射距离为第一距离,第一距离大于预设的第一安全距离;第二天线的发射距离为第二距离,第二距离小于或等于预设的第一安全距离。第二电子设备包括第三天线和第四天线,其中,第三天线的发射距离为第三距离,第三距离大于预设的第二安全距离;第四天线的发射距离为第四距离,第四距离小于或等于预设的第二安全距离。其中,第一电子设备接收到第一输入;第一电子设备响应于第一输入,通过第二天线,广播第一消息;第一消息包括会议加入请求和第一电子设备的标识;第二电子设备在距离第一电子设备的第二距离内,接收到来自第一电子设备的第一消息;第二电子设备响应于第一消息,生成随机密钥;第二电子设备通过第四天线,发送第一响应消息;第一响应消息包括随机密钥和第二电子设备的标识;第一电子设备在距离第二电子设备的第四距离内,接收到第一响应消息;第一电子设备响应于第一响应消息,使用随机密钥加密第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号,得到加密信息;第一电子设备通过第一天线,发送第二消息;第二消息包括第二电子设备的标识以及加密信息;第二电子设备在距离第一电子设备的第一距离内,接收到来自第一电子设备的第二消息;第二电子设备使用随机密钥解密加密信息,获取到第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号;第二电子设备接收到用于指示同意加入会议的第三输入;第二电子设备通过第三天线,向服务器发送第三消息;第三消息包括通过第一会议应用的加密机制,加密第一电子设备的SIM卡号码、第一电子设备在第一会议应用上的帐号、第二电子设备在第一会议应用上的帐号和会议的会议标识后的信息;服务器向第一电子设备发送呼叫电话;第一电子设备在接通呼叫电话后,加入第二电子设备参加的会议。其中,第二距离小于或等于预设的第一安全距离;第四距离小于或等于预设的第二安全距离;预设的第二安全距离为第二电子设备与第一电子设备交换秘密信息的一个安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
第三十五方面,提供一种会议接入系统。其中,将第三十三方面提供的系统中的第一天线替换为第一发射功率下的第一天线,将第三十三方面提供的系统中的第二天线替换为第二发射功率下的第一天线,将第三十三方面提供的系统中的第三天线替换为第三发射功率下的第三天线,将第三十三方面提供的系统中的第四天线替换为第四发射功率下的第三天线,其余内容相同。
第三十六方面,提供一种会议接入系统。其中,将第三十四方面提供的系统中的第一天线替换为第一发射功率下的第一天线,将第三十四方面提供的系统中的第二天线替换为第二发射功率下的第一天线,将第三十四方面提供的系统中的第三天线替换为第三发射功率下的第三天线,将第三十四方面提供的系统中的第四天线替换为第四发射功率下的第三天线,其余内容相同。
在上述第三十三方面至第三十六方面中的会议接入系统中,欲接入方的第一电子设备可以基于超短距通信方式,与作为会议主席的第二电子设备相靠近或碰一碰,来接入当前会议,从而在有会议主席的场景下,简化了第一电子设备接入会议的过程,缩短了第一电子设备接入会议的时间,提升了用户体验。
第三十七方面,提供一种会议接入系统。该系统包括第一电子设备、第二电子设备、第三电子设备和服务器,第一电子设备、第二电子设备和第三设备均安装有第一会议应用,第一电子设备未通过第一会议应用接入会议,第二电子设备和第三电子设备通过第一会议应用接入会议,第二电子设备在第一会议应用上的帐号在会议中为非会议主席的会议成员,第三电子设备在第一会议应用上的帐号在会议中为会议主席。第一电子设备包括第一天线和第二天线,其中,第一天线的发射距离为第一距离,第一距离大于预设的第一安全距离;第二天线的发射距离为第二距离,第二距离小于或等于预设的第一安全距离。第二电子设备包括第三天线和第四天线,其中,第三天线的发射距离为第三距离,第三距离大于预设的第二安全距离;第四天线的发射距离为第四距离,第四距离小于或等于预设的第二安全距离。其中,第一电子设备接收到第一输入;第一电子设备响应于第一输入,通过第一天线,广播第一消息;第一消息包括会议加入请求和第一电子设备的标识;第二电子设备在距离第一电子设备的第一距离内,接收到来自第一电子设备的第一消息;第二电子设备响应于第一消息,生成随机密钥;第二电子设备通过第四天线,发送第一响应消息;第一响应消息包括随机密钥和第二电子设备的标识;第一电子设备在距离第二电子设备的第四距离内,接收到第一响应消息;第一电子设备接收到用于指示加入会议的第二输入;第一电子设备响应于第二输入,使用随机密钥加密第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号,得到加密信息;第一电子设备通过第二天线,发送第二消息;第二消息包括第二电子设备的标识以及加密信息;第二电子设备在距离第一电子设备的第二距离内,接收到来自第一电子设备的第二消息;第二电子设备使用随机密钥解密加密信息,获取到第一电子设备的SIM卡号码以及第一电子设备在第一会议应用上的帐号;第二电子设备通过第三天线,向服务器发送第三消息;第三消息包括通过第一会议应用的加密机制,加密第一电子设备的SIM卡号码、第一电子设备在第一会议应用上的帐号、第二电子设备在第一会议应用上的帐号和会议的会议标识后的信息;服务器接收第三消息;服务器向第三电子设备发送第三消息;第三电子设备通过第一会议应用的解密机制,获取第一电子设备的SIM卡号码、第一电子设备在第一会议应用上的账号、第二电子设备在第一会议应用上的帐号和会议的会议标识;第三电子设备接收到用于指示同意的第三输入;第三电子设备向服务器发送第四消息,第四消息是通过第一会议应用的加密机制,加密第三输入对应的第三输入信息后的信息;服务器向第一电子设备发送呼叫电话;若第三输入为同意,第一电子设备在接通呼叫电话后,加入第二电子设备参加的会议;若第三输入为拒绝,呼叫电话通知第一电子设备会议加入请求被会议主席拒绝。其中,第二距离小于或等于预设的第一安全距离;第四距离小于或等于预设的第二安全距离;预设的第二安全距离为第二电子设备与第一电子设备交换秘密信息的一个安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换秘密信息的一个安全距离。
第三十八方面,提供一种会议接入系统。其中,第一电子设备响应于第一输入,通过第二天线,广播第一消息;第二电子设备在距离第一电子设备的第二距离内,接收到来自 第一电子设备的第一消息;第一电子设备通过第一天线,发送第二消息;第二电子设备在距离第一电子设备的第一距离内,接收到来自第一电子设备的第二消息;其余内容与第三十七方面提供的系统相同。
第三十九方面,提供一种会议接入系统。其中,将第三十七方面提供的系统中的第一天线替换为第一发射功率下的第一天线,将第三十七方面提供的系统中的第二天线替换为第二发射功率下的第一天线,将第三十七方面提供的系统中的第三天线替换为第三发射功率下的第三天线,将第三十七方面提供的系统中的第四天线替换为第四发射功率下的第三天线,其余内容相同。
第四十方面,提供一种会议接入系统。其中,将第三十八方面的系统中的第一天线替换为第一发射功率下的第一天线,将第三十八方面提供的系统中的第二天线替换为第二发射功率下的第一天线,将第三十八方面的系统中的第三天线替换为第三发射功率下的第三天线,将第三十八方面提供的系统中的第四天线替换为第四发射功率下的第三天线,其余内容相同。
在上述第三十七方面至第四十方面中的会议接入系统中,欲接入方的第一电子设备可以基于超短距通信方式,与非会议主席的会议成员相靠近或碰一碰,来接入当前会议,从而在有会议主席的场景下,简化了第一电子设备接入会议的过程,缩短了第一电子设备接入会议的时间,提升了用户体验。
第四十一方面,提供一种会议接入系统。该系统包括第一电子设备、第二电子设备和服务器,第一电子设备和第二电子设备均安装有第一会议应用,第一电子设备未通过第一会议应用接入会议,第二电子设备通过第一会议应用接入会议。第一电子设备包括第一天线和第二天线,其中,第一天线的发射距离为第一距离,第一距离大于预设的第一安全距离;第二天线的发射距离为第二距离,第二距离小于或等于预设的第一安全距离。第二电子设备包括第三天线和第四天线,其中,第三天线的发射距离为第三距离,第三距离大于预设的第二安全距离;第四天线的发射距离为第四距离,第四距离小于或等于预设的第二安全距离。其中,第一电子设备接收到第一输入;第一电子设备响应于第一输入,生成随机密钥,通过第二天线,广播第一消息;第一消息包括会议加入请求、第一电子设备的标识和随机密钥;第二电子设备在距离第一电子设备的第二距离内,接收第一消息;第二电子设备通过第四天线,发送第一响应消息;第一响应消息包括加密信息;加密信息为使用随机密钥对会议的会议标识和会议密码加密后的信息,或者加密信息为使用随机密钥对会议的会议标识加密后的信息;第一电子设备在距离第二电子设备的第四距离内,接收到第一响应消息;第二电子设备在经过预设时长后,切换至第三天线;第一电子设备使用随机密钥解密加密信息,获取到会议的会议标识和会议密码;第一电子设备通过第一天线,通过第一会议应用的加密机制,发送第二消息,第二消息包括会议标识、会议密码和第一电子设备在第一会议应用上的账号;服务器接收到第二消息,通过第一会议应用的解密机制,获取会议标识、会议密码和第一电子设备在第一会议应用上的账号;服务器确定会议密码是否正确;在会议密码正确的情况下,服务器向第一电子设备发送呼叫电话,第一电子设备接通该呼叫电话后接入会议。其中,第二距离小于或等于预设的第一安全距离;第四距离小于或等于预设的第二安全距离;预设的第二安全距离为第二电子设备与第一电子设备交换秘密信息的一个安全距离;预设的第一安全距离为第一电子设备与第二电子设备交换 秘密信息的一个安全距离。
第四十二方面,提供一种会议接入系统。其中,将第四十一方面的系统中的第一天线替换为第一发射功率下的第一天线,将第四十一方面提供的系统中的第二天线替换为第二发射功率下的第一天线,将第四十一方面的系统中的第三天线替换为第三发射功率下的第三天线,将第四十一方面提供的系统中的第四天线替换为第四发射功率下的第三天线,其余内容相同。
在上述第四十一方面至第四十二方面中的会议接入系统中,在无会议主席的场景中,欲接入方的第一电子设备可以基于超短距通信方式,与会议成员相靠近或碰一碰,来接入当前会议,从而简化了第一电子设备接入会议的过程,缩短了第一电子设备接入会议的时间,提升了用户体验。
第四十三方面,提供一种计算机可读存储介质,该计算机可读存储介质包括计算机程序,当计算机程序在第一电子设备上运行时,使得第一电子设备执行如第十七方面至第二十二方面中任意一个方面以及任意一个方面中任意一种实现方式的方法。
第四十四方面,提供一种计算机可读存储介质,该计算机可读存储介质包括计算机程序,当计算机程序在第二电子设备上运行时,使得第二电子设备执行如第二十三方面至第三十二方面中任意一个方面以及任意一个方面中任意一种实现方式的方法。
第四十五方面,提供一种计算机程序产品。当该计算机程序产品在计算机上运行时,使得计算机执行如第十七方面至第三十二方面中任意一个方面以及任意一个方面中任意一种实现方式的方法。
上述其他方面对应的有益效果,可以参见关于设备方面的有益效果的描述,此处不予赘述。
图1为本申请实施例提供的会议接入的场景示意图;
图2为提供的会议接入过程的示意图;
图3为本申请实施例提供的一种电子设备的硬件结构示意图;
图4A为本申请实施例提供的超短距无线通信模块及天线的原理示意图;
图4B为本申请实施例提供的超短距无线通信模块及天线的原理示意图;
图5A-图5C为本申请实施例提供的一种超短距无线通信模块及天线的具体结构示意图;
图6为本申请实施例提供的会议接入方法中超短距无线通信模块及天线的发射距离示意图;
图7为本申请实施例提供的进行超短距通信的天线的结构示意图;
图8A为本申请实施例提供的会议接入方法的一种流程示意图;
图8B为本申请实施例提供的会议接入方法的另一种流程示意图;
图8C为本申请实施例提供的会议接入方法的又一种流程示意图;
图9为本申请实施例提供的电子设备分时切换模式的示意图;
图10为本申请实施例提供的电子设备的一种界面示意图;
图11为本申请实施例提供的电子设备的另一种界面示意图;
图12为本申请实施例提供的会议接入过程的一种示意图;
图13A为本申请实施例提供的会议接入方法的一种流程示意图;
图13B为本申请实施例提供的会议接入方法的另一种流程示意图;
图13C为本申请实施例提供的会议接入方法的又一种流程示意图;
图14为本申请实施例提供的会议接入过程的另一种示意图;
图15A为本申请实施例提供的会议接入方法的一种流程示意图;
图15B为本申请实施例提供的会议接入方法的另一种流程示意图;
图16为本申请实施例提供的一种电子设备的结构示意图。
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述。其中,在本申请实施例的描述中,除非另有说明,“/”表示或的意思。例如,A/B可以表示A或B。本文中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系。例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,在本申请实施例的描述中,“多个”是指两个或多于两个。
以下,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括一个或者更多个该特征。在本实施例的描述中,除非另有说明,“多个”的含义是两个或两个以上。
在本申请实施例中,“示例性地”或者“例如”等词用于表示作例子、例证或说明。本申请实施例中被描述为“示例性地”或者“例如”的任何实施例或设计方案不应被解释为比其它实施例或设计方案更优选或更具优势。确切而言,使用“示例性地”或者“例如”等词旨在以具体方式呈现相关概念。
图1为本申请实施例提供的会议接入的场景示意图。如图1所示,电子设备200可以作为会议发起方,用来创建会议。可以理解的是,若会议为常规会议,则可以认为电子设备200、电子设备200上的登录帐号、或电子设备200上会议应用的登录帐号为会议主席。电子设备100和电子设备300可以接入电子设备200创建的会议。相应地,在会议中,电子设备100、电子设备300对应的会议成员,可以为电子设备100、电子设备300,也可以为电子设备100、电子设备300上的登录帐号,还可以为电子设备100、电子设备300上会议应用的登录帐号。为了方便说明,后续仅以电子设备200为会议主席、电子设备100和电子设备300为会议成员进行说明。不过,本领域技术人员应当了解,以电子设备200上的登录帐号,或者电子设备200上会议应用的登录帐号为会议主席,以电子设备100、电子设备300上的登录帐号为会议成员,或者,以电子设备100、电子设备300上会议应用的登录帐号为会议成员,也在本申请的范围之内。电子设备100也可称为第一电子设备,电子设备200也可称为第二电子设备,电子设备300也可称为第三电子设备。
广义上讲,会议成员包括会议主席。狭义上讲,会议成员不同于会议主席。
在有会议主席的情形下,会议参加者包括会议主席和会议成员;在无会议主席的情形下,会议参加者包括会议成员。
可选地,会议可以为无会议主席的会议。例如,微信应用下的多人音频或视频通话的会议场景,可以认为电子设备200仅仅发起会议,电子设备100和电子设备300可以接入该会议;但该会议不存在会议主席,即不存在会议主持方。
可以理解的是,一个会议对应一个会议群组。所有的会议参加者构成一个会议群组。例如,电子设备200创建一个会议,电子设备100和电子设备300接入该会议后,则该会议对应的会议群组包括电子设备200、电子设备100和电子设备300。这里,电子设备100和电子设备300仅为示意性举例,并非限定只有2个电子设备接入该会议,接入该会议的电子设备的数量可以为任意数量。可以理解的是,作为会议发起方的电子设备200还可以是其他电子设备。本申请仅为示意性举例,并非限定会议发起方只能是电子设备200。
服务器400可以是会议服务器,用于对会议进行管理,提供会议通话业务等。例如,服务器400可以包括网络语音协议(voice over internet protocol,VOIP)服务器等。在本申请实施例中,服务器400可以用于确认作为会议主席的电子设备是否合法,还可以用于确认请求接入会议的电子设备是否合法。例如,服务器400能够获取作为会议主席的电子设备在会议应用上的帐号和会议ID,通过确定该电子设备在会议应用上的帐号为服务器400中存储的该会议ID对应的会议的主席,从而确定该电子设备作为会议主席的合法性。
可选地,电子设备100、电子设备200和电子设备300可以通过诸如2G/3G/4G/5G等的蜂窝移动通信、光纤通信和以太网通信等通信方式中的任意一种通信方式,与服务器400通信。其中,电子设备100、电子设备200和电子设备300三者,与服务器400的通信方式,可以全部相同,也可以部分相同,还可以全部不同。这样,服务器400的信息转发,可以实现电子设备之间的会议通话。可选地,电子设备100、电子设备200和电子设备300可以通过第一通信方式接入路由设备(例如,路由器),经由路由设备通过第二通信方式与服务器400进行通信,从而实现会议通话。其中,第一通信方式可以是2G/3G/4G/5G等蜂窝移动通信,光纤通信,蓝牙(bluetooth,BT),无线局域网(wireless local area networks,WLAN)(如Wi-Fi),Zigbee,调频(frequency modulation,FM),近场通信(near field communication,NFC),红外(infrared,IR),通用2.4G/5G频段无线通信和USB通信等中的任意通信方式。示例性地,第二通信方式可以是诸如2G/3G/4G/5G等的蜂窝移动通信方式或光纤通信方式。
本申请实施例的电子设备(例如,电子设备100、电子设备200和电子设备300)包括但不限于智能手机、智能耳机、智能屏幕、智能音箱、平板电脑、具备无线通讯功能的可穿戴设备(如智能手表、智能手环、智能戒指、智能眼镜)、车载设备、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、个人数字助理(personal digital assistant,PDA)等。电子设备的示例性实施例包括但不限于搭载
Windows、Linux或者其它操作系统的便携式无线路由设备。上述电子设备也可为其它便携式设备,诸如膝上型计算机(Laptop)等。还应当理解的是,在其他一些实施例中,上述电子设备也可以不是便携式设备,而是台式计算机等设备。
电子设备200在上述会议创建或在会议过程中,添加会议成员时,由电子设备200的用户通过交互操作界面,使得会议成员接入当前会议。例如,电子设备200的用户可以在交互操作界面中,勾选或输入会议成员对应的用户名或帐号等标识信息,从而将会议成员接入电子设备200创建的会议中。
示例性地,如图2所示,方框201显示未接入该会议的联系人信息。方框202显示已经接入该会议的会议成员信息。示例性地,在图2中,电子设备200侧的用户希望添加的新的会议成员为用户A,可以在电子设备200上点击用户A前方的选择框,然后点击控件 203;即可将用户A的相关信息添加至方框202中。从而,将用户A对应的电子设备接入该会议中。
可选地,在图2中,用户还可以在搜索框中输入要添加的会议成员的信息,从而找到该要添加的会议成员,并将其接入当前会议。
可选地,在图2中,用户还可以通过选择已经接入会议的会议成员,再点击控件204,使得选择的会议成员退出当前会议。
在上述过程中,一方面,由于电子设备200在创建会议或会议过程中,添加会议成员时,电子设备200的用户通常需要逐一选择,步骤较多,操作时长较长,选择过程中容易出现漏选、错选或多选的情况;另一方面,由于电子设备200的屏幕大小有限,在添加新的会议成员时,交互操作界面容易被会议界面(例如音频界面或视频界面等)遮挡,因此电子设备200的用户在进行交互操作时,容易误触会议界面而造成会议中断,从而使得会议处于停滞状态。综上,添加会议成员的操作繁琐,耗时较长,使用不便,用户体验较差。
为了解决上述的技术问题,本申请提供了一种会议接入方法及电子设备。电子设备之间可以通过超短距通信方式进行交互,希望接入当前会议的电子设备,与会议主席的电子设备或与已接入当前会议的其他电子设备,通过碰一碰或者靠近等自然交互方式,来接入当前会议。这样,就提供了一种快捷方便的会议接入方式,操作简单,耗时较短,用户体验较佳;并且,该方式保证了安全性;另外,该方式还解决了误触的问题。
在本申请实施例提供的会议接入方法中,图1示出的电子设备100、电子设备200和电子设备300,一方面可以基于超短距通信方式,与其他电子设备交互添加新的会议成员;另一方面可以基于上述诸如2G/3G/4G/5G等的蜂窝移动通信、光纤通信和以太网通信等普通通信方式中的任意一种通信方式,进行会议通话。也就是说,电子设备可以在超短距通信方式与普通通信方式之间进行切换,或者,电子设备可以并行进行超短距通信方式和上述的普通通信方式,从而实现不同的功能。
其中,超短距通信方式指的是,在通信双方之间的距离位于预设的安全距离以内,才能通信的一种通信方式。其中,预设的安全距离是指通信双方能够交换秘密信息的距离。示例性地,预设的安全距离可以小于或者等于30cm、20cm或10cm等任意的短距离。预设的安全距离可以根据用户的需要,具体设置。可以理解的是,对于通信双方来说,由于仅能够在预设的安全距离内,才能进行超短距通信,所以超短距通信方式能够保证数据传输的安全性。
超短距通信方式可以是在多种传统的通信方式的基础上改进的一种通信方式。例如,超短距通信方式可以包括Wi-Fi超短距通信方式、蓝牙超短距通信方式和Zigbee超短距通信方式等中的一种。
需要说明的是,在一些实施例中,实现超短距通信方式时,可以不增添新的硬件设备。例如,可以在不改变原有硬件设备基础的情况下,改变天线的发射功率,从而实现超短距通信方式。在另一些实施例中,实现超短距通信方式时,可以仅对现有硬件设备进行小幅度的改进。例如,可以通过增加一个能够实现超短距通信的天线来实现超短距通信方式。也就是说,实现超短距通信方式无需新增硬件设备或大幅度改造现有硬件设备。
在图1所示的场景中,根据电子设备100和电子设备300中是否存在至少一个电子设备已经接入当前电子设备200创建的会议,可以将图1所示的场景分为以下两个场景:
场景1:在场景1中,不存在接入当前电子设备200创建的会议的电子设备。也就是说,电子设备100和电子设备300均未接入当前会议。在场景1中,电子设备200开始创建会议,准备接入其他电子设备(例如电子设备100和电子设备300)。也可以认为,在场景1中,会议参与成员只有电子设备200。欲接入方的电子设备可以通过与电子设备200相靠近,来加入电子设备200创建的会议中。
场景2:在场景2中,至少存在一个电子设备接入当前电子设备200创建的会议。也就是说,当前,电子设备200与至少一个其他电子设备正在进行会议,对应的会议群组中包括电子设备200和至少一个其他电子设备。根据上述内容可知,本申请实施例中的会议包括常规会议和无会议主席的会议,因此,在场景2中还可以包括会议主席存在的场景和无会议主席的场景。在会议主席存在的场景和无会议主席的场景下,欲接入方的电子设备可以通过与参与会议的任意一个电子设备相靠近,来加入当前的会议。
示例性地,图3示出了本申请实施例提供的电子设备的硬件结构示意图。这里,电子设备可以是图1所示的电子设备100、电子设备200和电子设备300中任一个电子设备。
以电子设备200为例,如图3所示,电子设备200可以包括处理器210,外部存储器接口220,内部存储器221,通用串行总线(universal serial bus,USB)接口230,电池240,天线1,天线2,移动通信模块250,无线通信模块260,音频模块270,扬声器270A,受话器270B,麦克风270C,传感器模块280,按键290,马达291,指示器292,摄像头293,显示屏294,以及用户标识模块(subscriber identification module,SIM)卡接口295等。
可以理解的是,本申请实施例示意的结构并不构成对电子设备200的具体限定。在本申请另一些实施例中,电子设备200可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。图示的部件可以以硬件,软件或软件和硬件的组合实现。
处理器210可以包括一个或多个处理单元,例如:处理器210可以包括应用处理器(application processor,AP),调制解调处理器,图形处理器(graphics processing unit,GPU),图像信号处理器(image signal processor,ISP),控制器,存储器,视频编解码器,数字信号处理器(digital signal processor,DSP),基带处理器,和/或神经网络处理器(neural-network processing unit,NPU)等。其中,不同的处理单元可以是独立的器件,也可以集成在一个或多个处理器中。
在一些实施例中,处理器210可以包括一个或多个接口。接口可以包括集成电路(inter-integrated circuit,I2C)接口,集成电路内置音频(inter-integrated circuit sound,I2S)接口,脉冲编码调制(pulse code modulation,PCM)接口,通用异步收发传输器(universal asynchronous receiver/transmitter,UART)接口,移动产业处理器接口(mobile industry processor interface,MIPI),通用输入输出(general-purpose input/output,GPIO)接口,用户标识模块(subscriber identity module,SIM)接口,和/或通用串行总线(universal serial bus,USB)接口等。
USB接口230是符合USB标准规范的接口,具体可以是Mini USB接口,Micro USB接口,USB Type C接口等。可以理解的是,本申请实施例示意的各模块间的接口连接关系,只是示意性说明,并不构成对移动路由设备200的结构限定。在本申请另一些实施例中,移动路由设备200也可以采用上述实施例中不同的接口连接方式,或多种接口连接方式的 组合。
电子设备200的无线通信功能可以通过天线1,天线2,移动通信模块250,无线通信模块260,调制解调处理器以及基带处理器等实现。
天线1和天线2用于发射和接收电磁波信号。移动路由设备200中的每个天线可用于覆盖单个或多个通信频带。不同的天线还可以复用,以提高天线的利用率。例如:可以将天线1复用为无线局域网的分集天线。在另外一些实施例中,天线可以和调谐开关结合使用。
移动通信模块250可以提供应用在电子设备200上的包括2G/3G/4G/5G等移动通信的解决方案。移动通信模块250可以包括至少一个滤波器,开关,功率放大器,低噪声放大器(low noise amplifier,LNA)等。移动通信模块250可以由天线1接收电磁波,并对接收的电磁波进行滤波,放大等处理,传送至基带通信处理器进行解调。移动通信模块250还可以对经基带通信处理器调制后的信号放大,经天线1转为电磁波辐射出去。在一些实施例中,移动通信模块250的至少部分功能模块可以被设置于处理器210中。在一些实施例中,移动通信模块250的至少部分功能模块可以与处理器210的至少部分模块被设置在同一个器件中。
无线通信模块260可以提供应用在电子设备200上的包括无线局域网(wireless local area networks,WLAN)(如无线保真(wireless fidelity,Wi-Fi)网络),蓝牙(bluetooth,BT),全球导航卫星系统(global navigation satellite system,GNSS),调频(frequency modulation,FM),近距离无线通信技术(near field communication,NFC),红外技术(infrared,IR)等无线通信的解决方案。无线通信模块260可以是集成至少一个通信处理模块的一个或多个器件。示例性的,无线通信模块260经由天线2接收电磁波,将电磁波信号调频以及滤波处理,将处理后的信号发送到处理器210。无线通信模块260还可以从应用处理器211接收待发送的信号,对其进行调频,放大,经天线2转为电磁波辐射出去。
本申请实施例可以通过天线2来实现上述超短距通信方式。示例性地,图4A-图4B是能够进行超短距通信的天线的结构示意图。
在一种示例中,图4A示出了本申请实施例提供的超短距无线通信模块及天线的原理结构。如图4A所示,电子设备200可以包括处理器210,无线通信模块260,天线A和电线B,其中,上述天线2包括天线A和天线B。
其中,天线A(也称为第一天线,比如强天线)和天线B(也称为第二天线,比如弱天线)用于发射和接收电磁波。进一步的,无线通信模块260将从天线A或天线B接收的电磁波转换为信号,并将信号发送至处理器210进行处理;或者无线通信模块260从处理器210接收待发送的信号,经由强天线或弱天线转为电磁波辐射出去。本申请实施例中,强天线发射信号的第一发射距离(比如10米、5米等,具体可由用户设定)大于弱天线发射信号的第二发射距离(比如0.2米、0.3米等,具体可由用户设定)。弱天线发射信号的第二发射距离小于或等于预设的安全距离;其中,预设的安全距离为电子设备200的用户通过电子设备200与另一电子设备交换秘密信息的距离。比如预设的安全距离可为50cm、40cm、30cm、20cm等。如此,只有电子设备200位于与另一电子设备小于等于预设的安全距离的范围内时,才能够接收到另一电子设备发送的秘密信息。这样,降低了安全风险(比如,在距另一电子设备的50cm以外,该秘密信息不会被其他设备接收到)。电子设备 200的用户可在周边安全的情形下,才将电子设备200靠近至另一电子设备的预设的安全距离内,从而提高了安全性。在一些实施例中,处理器210可控制强天线与弱天线的切换。当电子设备200采用强天线时,只有在电子设备200与另一电子设备之间的距离小于第一发射距离,电子设备200才接收到另一电子设备发送的信号;当电子设备200采用弱天线时,只有在电子设备200与另一电子设备之间的距离小于第二发射距离,电子设备才接收到另一电子设备发送的信号。其中,第一发射距离大于预设的安全距离;第二发射距离小于或等于预设的安全距离。在一些实施例中,第一发射距离和第二发射距离可分别称为第一距离和第二距离。
在另一种示例中,图4B示出了本申请实施例提供的超短距无线通信模块及天线的另一种原理结构。如图4B所示,电子设备200可以包括处理器210,无线通信模块260和天线2。其中,无线通信模块260包括无线模块261和可变阻抗电路模块262。天线2用于发射和接收无线信号。可变阻抗电路模块262可为由可变阻抗组成的电路或者集成线路等。处理器210通过控制调整可变阻抗电路模块262的阻抗值,调节加载于天线2的发射功率,从而控制天线2发射无线信号时的发射距离。示例性的,可变阻抗电路模块262的阻值为第一阻值时,天线2的发射功率为第一发射功率,此时天线2发射无线信号的距离为第一发射距离(实现强天线的功能);可变阻抗电路模块262的阻值为第二阻值时,天线2的发射功率为第二发射功率,此时天线2发射无线信号的距离为第二发射距离(实现弱天线的功能)。其中,第一发射功率大于第二发射功率;第一发射距离大于预设的安全距离,第二发射距离小于或等于预设的安全距离。在一些实施例中,第一发射距离和第二发射距离可分别称为第一距离和第二距离。在图4B对应的另一种示例中,有关处理器210、无线通信模块260的其他说明,与图4A对应的一种示例中的相关描述相同,此处不再赘述。
需要说明的是,虽然图4A和图4B中的超短距无线通信模块及天线的结构是以电子设备200为例说明的,但电子设备100和电子设备300也可包括超短距无线通信模块及天线的结构。比如,与图4A中的附图标记相对应的,电子设备100可以包括处理器110,无线通信模块160,天线2,其中,天线2包括天线A和天线B。与图4B中的附图标记相对应的,电子设备100可以包括处理器110,无线通信模块160和天线2。具体说明与有关图4A、图4B的说明相同或类似,此处不再赘述。
可以理解的是,图4A对应的一种示例和图4B对应的另一种示例中示意的原理结构并不构成对电子设备200中的无线通信模块及天线的具体限定。在另一些实施例中,电子设备200中的无线通信模块及天线的结构可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。图示的部件可以以硬件,软件或软件和硬件的组合实现。相应地,上述内容也适于电子设备100的超短距无线通信模块及天线的结构;此处不再赘述。
在一些实施例中,上述强天线和弱天线可以共用一部分走线,例如图5A-图5C所示实施例中的描述。
示例性地,图5A-图5C示出了图4A中强天线和弱天线的三种实现方式。电子设备100和电子设备300的一种无线通信模块及天线的结构,也可采用图5A-图5C示出的三种方式。如图5A-图5C所示,强天线和弱天线可以共用一部分走线。
本申请实施例中电子设备中的强天线和弱天线可以通过射频开关进行切换。物理上可 以将弱天线与射频开关(如图5A-图5C中虚线框中所示为弱天线)都置于屏蔽罩内或者将弱天线置于芯片内。
本申请实施例中的弱天线的目的就是要尽可能减小发射距离。构造弱天线的原理可以是:
(1)减小天线长度,从而减小辐射到空气中的电磁波;
(2)减小辐射效率,通过电阻将一部分的电磁波辐射转化为热能消耗掉;
(3)降低回波损耗,将部分射频能量反射回芯片内部等。
弱天线具体的实现可以采用:
(i)将天线变短;
(ii)将强天线路径中某点断开,或者在该点通过电阻、电感或者电容接地;
(iii)使用屏蔽罩等。
应理解,上述弱天线具体的实现(i)和(ii)可以在PCB板上或者芯片内部实现。
还应理解,上述屏蔽罩的作用是为了削弱辐射。
还应理解,上述将天线变短是指弱天线相比于强天线来说,弱天线更短。图5A至图5C所示的三种弱天线的结构,弱天线如图5A至图5C的虚线框中的结构所示。图5A至图5C中强天线的结构都是通过射频输入输出(radio frequency input/output,RFIO)引脚连接滤波电路(例如,π型电路)、匹配电路(例如,π型电路)以及匹配电路外的天线体(例如,该天线体可以是一段金属走线)。图5A中虚线框所示的弱天线a、图5B中虚线框所示的弱天线b以及图5C中虚线框所示的弱天线c的长度不同,但是相比于强天线都更短。滤波电路的作用是防止干扰,匹配电路是用来与强天线匹配。
示例性的,如图5A所示,弱天线a可以位于屏蔽罩内。其中,弱天线a可以包括屏蔽罩内Wi-Fi芯片的RFIO引脚和两路开关中的第一路开关(第一路开关不连接任何器件)。有时,弱天线a还可包括在RFIO引脚和第一路开关之间的走线。其中,两路开关指的是走线或RFIO引脚与滤波电路之间的开关。通过该两路开关可以将走线或RFIO引脚,与滤波电路连通或者断开。所述第一路开关为图5A所示的与RFIO引脚或走线相连、且与滤波电路之间断开的开关。应理解,本申请实施例中的两路开关可以是单刀双掷开关。
示例性的,如图5B所示,弱天线b可以位于屏蔽罩内。其中,弱天线b可以包括屏蔽罩内Wi-Fi芯片的RFIO引脚、两路开关的第一路开关(第一路开关连接电阻)和匹配器件。有时,弱天线b还可包括在RFIO引脚和第一路开关之间的第一走线。有时,弱天线b还可包括匹配器件与地之间的第二走线。匹配器件可以为电阻。通过电阻接地可以将一部分的电磁波辐射转化为热能消耗掉,从而减小了弱天线b的辐射效率。其中,所述两路开关指的是RFIO引脚或第一走线与电阻、滤波电路之间的开关,通过该开关,可以将RFIO引脚或第一走线与电阻相连、与滤波电路断开,或者可以将RFIO引脚或第一走线与电阻断开、而与滤波电路相连通。所述的第一路开关为所述两路开关中与匹配器件相连、且与滤波电路断开的开关。
示例性的,如图5C所示,弱天线c可以位于屏蔽罩内。其中,经由芯片匹配的滤波电路后接匹配器件(例如,电阻)到地。弱天线c可以包括屏蔽罩内Wi-Fi芯片的RFIO引脚、滤波电路、两路开关的第一路开关(第一路开关连接电阻)和匹配器件(比如,电阻)。有时,弱天线c还可以包括RFIO引脚与滤波电路之间的第一走线。有时,弱天线c 还可以包括滤波电路与匹配器件之间的第二走线。通过匹配器件(比如,电阻)接地可以将一部分的电磁波辐射转化为热能消耗掉,从而减小了弱天线c的辐射效率。其中,所述两路开关指的是屏蔽罩内的滤波电路与匹配器件、屏蔽罩外的匹配电路之间的开关。通过该两路开关,可以将屏蔽罩内的滤波电路与匹配器件相连、与屏蔽罩外的匹配电路断开;或者,可以将屏蔽罩内的滤波电路与匹配器件断开、而与屏蔽罩外的匹配电路相连通。所述的第一路开关为用于连接屏蔽罩内的滤波电路与匹配器件的开关。
应理解,上述图5A至图5B中的强天线可以包括RFIO引脚、两路开关中的第二路开关,滤波电路、匹配电路以及匹配电路外连接的天线体。有时,图5A至图5B中的强天线还可以包括RFIO引脚与所述两路开关中的第二路开关之间的走线。所述第二路开关为用于连接RFIO引脚与滤波电路的开关。
上述图5C中的强天线可以包括RFIO引脚、滤波电路、两路开关中的第二路开关、匹配电路以及匹配电路外连接的天线体。有时,图5C中的强天线还可以包括RFIO引脚与滤波电路之间的走线。所述第二路开关为用于连接屏蔽罩内的滤波电路与屏蔽罩外的匹配电路的开关。
应理解,图4A所示的无线通信模块260可以是Wi-Fi芯片,也可以是Wi-Fi芯片及与其匹配的电路。图4B所示的无线模块261可以是Wi-Fi芯片,图4B所示的无线通信模块260可以是Wi-Fi芯片及与其匹配的电路。
以上不同的弱天线结构配合Wi-Fi芯片的不同发射功率(Tx power)的设置,可以达到不同的超短距通讯的要求(例如,从10cm到2m)。
示例性的,表1示出了几种不同的弱天线(第二天线)结构配合Wi-Fi芯片时不同发射功率的通讯距离。
表1
示例性的,表2示出了几种不同的第二天线结构配合蓝牙芯片时不同发射功率的通讯距离。
表2
示例性的,表3示出了几种不同的第二天线结构配合ZigBee芯片时不同发射功率的通讯距离。
表3
由于芯片内物理器件的特性,天线最大发射功率和最小发射功率之差是相关联的。如果把电子设备200的最小发射功率降得很低,则最大发射功率也会被降低,这样就不满足正常工作时的距离要求。本申请实施例中,由于不同的智能设备的结构不同以及对智能设备的安全性能要求不同,所以智能设备的生产厂商可以采用不同的第二天线结构以及发射功率来保证智能设备的通讯距离。示例性的,对于不同的智能空调生产厂商,其智能空调外壳的厚度可能不同,那么在第二天线结构相同以及发射功率相同的情况下,智能空调能够被发现的通讯距离也可能不同。不同的智能设备生产厂商可以根据其智能设备本身的结构,配合第二天线的结构以及一定的发射功率,从而测试出智能设备被发现的安全距离。
应理解,本申请实施例中,电子设备200包括多个芯片(例如,电子设备200包括Wi-Fi芯片、蓝牙芯片和ZigBee芯片),则电子设备200中的Wi-Fi芯片、蓝牙芯片和ZigBee芯片可以共用上述图5A中的第一天线和第二天线;或者,电子设备200中的Wi-Fi芯片、蓝牙芯片和ZigBee芯片可以共用上述图5B中的第一天线和第二天线;或者,电子设备200中的Wi-Fi芯片、蓝牙芯片和ZigBee芯片可以共用上述图5C中的第一天线和第二天线。
或者,电子设备200中的Wi-Fi芯片、蓝牙芯片和ZigBee芯片也可以不共用第一天线和第二天线。
还应理解,上述图5A至图5C为物理上的第一天线和第二天线,第一设备可以通过射频开关切换物理上的第一天线和第二天线。本申请实施例中第一设备也可以在物理上只有一根天线,但是逻辑上包括第一天线和第二天线。
电子设备200可以通过调节物理上的天线的发射功率,来实现逻辑上的第一天线和第二天线。例如,当物理上的天线的发射功率为第一发射功率时,可以认为是逻辑上的第一天线;当物理上的天线的发射功率为第二发射功率时,可以认为是逻辑上的第二天线;其中,第一发射功率大于第二发射功率。
一种可能的实现方式是,电子设备200可以通过调节芯片内部的器件来调节物理上的天线的发射功率。例如,电子设备200可以通过芯片内部的多级放大器来调节物理上的天线的发射功率。
例如,电子设备200可以通过调节寄存器的值来屏蔽芯片内部的多级放大器,从而使得物理上的天线的发射功率为第一发射功率,此时可以认为是逻辑上的第一天线;电子设备200也可以通过调节寄存器的值从而使得物理上的天线的发射功率为第二发射功率,此时可以认为是逻辑上的第二天线;其中,第一发射功率大于第二发射功率。
另一种可能的实现方式是,电子设备200也可以通过芯片外部的外围电路来调节物理上的天线的发射功率。
本申请各个实施例中涉及的第一天线和第二天线可以是物理上的第一天线和第二天线,也可以是逻辑上的第一天线和第二天线。
本申请实施例中,电子设备200切换逻辑上的第一天线和第二天线与电子设备200通过射频开关来切换物理上的第一天线和第二天线可以达到相同的效果。
结合上述示例,以第一距离是5米,第二距离是0.3米为例。当电子设备采用强天线时,如果电子设备(位于图6所示的圆心)与另一电子设备之间的距离小于第一距离(如另一电子设备位于图6所示的位置1),则电子设备可与另一电子设备通信;当电子设备采用弱天线时,如果电子设备(位于图6所示的圆心)与另一电子设备之间的距离小于第二距离(如另一电子设备位于图6所示的位置2),电子设备可与另一电子设备通信。
相应地,当电子设备的天线配置为第一发射功率时,如果电子设备(位于图6所示的圆心)与另一电子设备之间的距离小于第一距离(如移动设备位于图6所示的位置1),电子设备可与另一电子设备通信;当电子设备的天线配置为第二发射功率时,如果电子设备(位于图6所示的圆心)与另一电子设备之间的距离小于第二距离(如移动设备位于图6所示的位置2),电子设备可与另一电子设备通信。
实际操作中,第一距离和第二距离的精度不会那么精准,可能会存在一定的误差。这样,会使得第一距离或第二距离在实际操作中呈现一个范围,而不是一个精准的数值距离。另外,在不同的环境下,即使是同样的天线和同样的发射功率,也可能出现第一距离的不同,以及第二距离的不同。
在一些实施例中,如图7中的(a)所示,图3中的天线2可以包括多种不同的工作模式,例如包括普通模式和超短距模式等工作模式。在不同的工作模式下,天线2发射功率不同。例如,在普通模式下,天线2的发射功率较大,电子设备能够与其他电子设备在距离较远的情况下进行通信。再例如,在超短距模式下,天线2的发射功率较小,电子设备能够与其他电子设备在距离较近的情况下进行通信。
在另一些实施例中,如图7中的(b)所示,天线2可以包括天线A和天线B两根不同的天线。其中,由于天线A的发射功率较大,因此通过天线A进行通信时,电子设备能够与其他电子设备在距离较远的情况下进行通信。也可以认为,当前天线2在上述的普通模式下工作。由于天线B的发射功率较小,因此通过天线B进行通信时,电子设备能够与其他电子设备在距离较近的情况下进行通信。也可以认为,当前天线2在上述的超短距模式下工作。
也就是说,在超短距模式下,天线发射功率小,通信距离短;在普通模式下,天线发射功率大,通信距离长。
本申请实施例提供了一种会议接入方法,欲接入方的电子设备可以基于超短距通信方式,通过与会议主席相靠近或碰一碰来加入当前会议。
图8A为本申请实施例提供的一种会议接入方法的流程图。其中,电子设备100为欲接入方,即想要接入当前会议的电子设备。电子设备200为会议主席,可以认为,电子设备200在会议应用上的帐号为会议创建者的帐号。电子设备200参加的当前会议记为会议A。
在图8A所示的方法中,电子设备100包括第一天线和第二天线。其中,第一天线为强天线,第二天线为弱天线,第一天线发射信号的第一发射距离大于第二天线发射信号的第二发射距离,第二发射距离小于或等于预设的安全距离。电子设备200包括第三天线和第四天线。其中,第三天线为强天线,第四天线为弱天线,第三天线发射信号的第三发射 距离大于第四天线发射信号的第四发射距离,第四发射距离小于或等于预设的安全距离。预设的安全距离为电子设备的用户通过该电子设备与另一电子设备交换秘密信息的距离。例如,预设的安全距离可以为30cm。
如图8A所示,本申请实施例提供的会议接入方法,包括:
S801a、电子设备100接收到第一输入。
在一些实施例中,电子设备100响应于用户的操作开启会议应用之后,接收到第一输入。
其中,会议应用表示能够以音频或者视频等形式进行会议的应用。例如,会议应用可以是华为的畅连通话、微信音视频通话或其他能够进行会议的应用,本申请实施例对会议应用的类型不作限定。
在一些实施例中,第一输入为用户点击会议应用中“碰一碰接入会议”的选项。第一输入还可以是电子设备100开启会议应用之后的语音输入、手势输入或其他形式的输入,本申请实施例对此不作限定。
在另一些实施例中,电子设备100可以直接接收第一输入。也就是说,电子设备100可以在显示主界面或其他应用界面的情况下,接收第一输入。
示例性的,第一输入可以是“碰一碰接入会议”的语音输入、特定手势输入、触摸操作或其他形式的输入,本申请实施例对此不作限定。
在本申请实施例中,第一输入指示电子设备100侧的用户想要接入当前会议。
可以理解的是,电子设备100侧的用户想要接入当前会议表示,用户希望电子设备100、电子设备100上的登录帐号或者电子设备100上会议应用的登录帐号可以接入当前会议。
S802a、电子设备100通过第一天线,广播第一消息,第一消息包括会议加入请求和电子设备100的标识(identity,ID)。
在一些实施例中,电子设备100在接收到第一输入时,通过第一天线广播第一消息,第一消息包括会议加入请求和电子设备100的ID。由于第一天线的发射距离较远,因此,与电子设备100相距较远的电子设备也可以接收到第一消息。
例如,若第一天线的发射距离为5m,则与电子设备100相距5m内的电子设备均有可能接收到第一消息。
其中,电子设备100的ID表示能够唯一识别电子设备100的信息。例如,电子设备100的ID可以是电子设备100的MAC地址等信息。
在一些实施例中,第一消息可以是临近感知网络(neighborhood aware network,NAN)服务发现帧(service discovery frame,SDF)发布(publish)消息或其他类型的广播消息。本申请对第一消息的类型不作限定。
S803a、在位于第一天线的发射距离内,电子设备200接收到第一消息,获取到会议加入请求和电子设备100的ID,生成随机密钥。
由于电子设备100通过第一天线广播第一消息,因此,若电子设备200位于电子设备100的第一天线的发射距离内,则电子设备200可以接收到第一消息,进而获取到第一消息中包含的会议加入请求和电子设备100的ID。
在本申请实施例中,电子设备200还可以生成随机密钥。通过随机密钥加密信息,能够提高之后信息传输的安全性。
S804a、电子设备200通过第四天线,发送第一响应消息,第一响应消息包括随机密钥和电子设备200的ID。
其中,电子设备200的ID表示能够唯一识别电子设备200的信息。例如,电子设备200的ID可以是电子设备200的MAC地址等信息。
在一些实施例中,第一响应消息还可以包括会议A(电子设备200参加的会议)的会议ID或会议密码等信息。
在一些实施例中,第一响应消息还可以包括会议基本信息,例如会议主题、会议介绍和会议与会人等。
在一些实施例中,第一响应消息可以是NAN SDF Follow-up消息或其他类型的广播消息。本申请对第一响应消息的类型不作限定。
可以理解的是,由于电子设备200通过第四天线发送第一响应消息,第四天线的发射距离较短,因此,在电子设备100与电子设备200之间的距离较近的情况下,电子设备100才可以接收到第一响应消息,从而电子设备100和电子设备200之间可以建立基于距离的信任关系。在此信任关系下,能够实现安全可靠的数据交互。
在本申请实施例中,电子设备200通过时分复用的方式在第三天线和第四天线之间切换。电子设备200大部分时间通过第三天线保持会议A的正常通信,小部分时间通过第四天线使得欲接入方的电子设备通过本申请实施例提供的接入方法接入会议A。
如图9所示,电子设备200大多时间处于会议A的正常通信,很少的时间通过第四天线使得其他电子设备接入会议A。电子设备200可以通过切换天线,实现在超短距模式与普通模式之间分时切换,从而在不同的时间采用不同的模式分别传送通话数据和超短距传输数据。需要说明的是,由于时分切换的周期是以毫秒为单位的,因此在切换过程中,用户是难以察觉到电子设备在超短距模式与普通模式之间切换的。也就是说,用户可以认为超短距传输过程和会议通话数据传输过程同时发生。
示例性的,电子设备200可以在第三天线和第四天线中周期性地切换。电子设备200切换至第三天线时,通过路由器与服务器400进行通话数据交互,保证会议通话正常进行。电子设备200切换至第四天线时,若其他电子设备请求加入当前会议,则电子设备200通过Wi-Fi信道6邀请与电子设备200距离很近的其他电子设备接入当前会议。
S805a、在位于第四天线的发射距离内,电子设备100接收到第一响应消息,获取到随机密钥和电子设备200的ID。
在本申请实施例中,由于电子设备200通过第四天线发送第一响应消息,第四天线的发射距离较短,因此,电子设备100与电子设备200之间的距离较近时,电子设备100才可以接收到第一响应消息。
进而,电子设备100获取到第一响应消息中的随机密钥和电子设备200的ID。
在一些实施例中,电子设备100位于第四天线的发射距离内,可以通过电子设备100向电子设备200靠近实现,也可以通过电子设备200向电子设备100靠近实现,还可以通过电子设备100和电子设备200彼此靠近实现。
在另一些实施例中,电子设备100位于第四天线的发射距离内可以是通过电子设备100欲电子设备200碰一碰实现的。
在一些实施例中,电子设备100还可以获取到会议A的会议ID或会议密码等信息。
S806a、电子设备100接收到用于指示加入的第二输入,使用随机密钥加密电子设备100的SIM卡号码,及电子设备100在会议应用上的帐号。
在一些实施例中,电子设备100接收到第一响应消息之后,可以直接接收用于指示加入的第二输入。
在另一些实施例中,电子设备100接收到第一响应消息之后,可以显示第一响应消息的部分或全部内容,在用户查看并确认第一响应消息之后,接收用于指示加入的第二输入。
如图10所示,电子设备100接收到第一响应消息之后,可以在电子设备100的屏幕上显示电子设备200的ID,还可以显示会议A的会议ID等信息。在电子设备100侧的用户查看并确认电子设备200作为会议主席的会议是电子设备100要加入的会议时,接收第二输入。
可选地,第二输入可以是触摸操作、语音输入、手势输入或其他形式的输入,本申请对此不作限制。
在本申请实施例中,电子设备100接收第二输入之后,可以使用获取到的电子设备200生成的随机密钥对电子设备100的SIM卡号码以及电子设备100在会议应用上的帐号进行加密。
其中,电子设备100的SIM卡号码用于服务器对电子设备100的回拨。
在一些实施例中,电子设备100在会议应用上的帐号表示,电子设备100的会议应用上登录的帐号。例如,电子设备100在会议应用上的帐号可以是畅连应用昵称、微信号等帐号信息。
若会议应用是微信,则电子设备100在会议应用上的帐号为电子设备100上登录的微信帐号。可以理解的是,通过电子设备100在会议应用上的帐号可以将电子设备100拉入会议A。
S807a、电子设备100通过第二天线,发送第二消息,第二消息包括电子设备200的ID,以及随机密钥加密后的信息。
由于电子设备100在位于第四天线的发射距离内接收到第一响应消息,因此可以认为,电子设备100与电子设备200之间的距离很近。这样的情况下,电子设备100可以通过第二天线向电子设备200发送第二消息。
其中,第二消息包括S806a中随机密钥加密后的信息,以及电子设备200的ID。
在本申请实施例中,电子设备200的ID可以是明文,不需要进行加密。
可以理解的是,由于随机密钥是电子设备200生成的,因此只有电子设备200可以对随机密钥加密后的信息进行解密。其他电子设备即使获取到加密后的信息,也无法获取到信息的具体内容,从而可以提高通信过程中的安全性。
S808a、在位于第二天线的发射距离内,电子设备200接收到第二消息,使用随机密钥解密,获取到电子设备100的SIM卡号码,以及电子设备100在会议应用上的帐号。
在本申请实施例中,由于电子设备100在S807a中通过第二天线发送第二消息,因此电子设备200在位于第二天线的发射距离内时才可以接收到第二消息。
进而,电子设备200可以使用自己生成的随机密钥对第二消息中的加密信息进行解密,获取到电子设备100的SIM卡号码,以及电子设备100在会议应用上的帐号。
需要说明的是,电子设备200执行S804a之后,若在预设时长内接收到第二消息,则 执行S808a;若在预设时长内未接收到第二消息,则说明电子设备100并未与电子设备200相靠近,也就是说,电子设备100不打算加入电子设备200所在的会议,因此直接退出,结束流程。
S809a、电子设备200接收到用于指示同意的第三输入。
在一些实施例中,电子设备200接收到第二消息后,直接接收用于指示同意的第三输入。
示例性的,在电子设备200所在的会议A权限较低或没有权限的情况下,例如,介绍垃圾分类等公益性的会议,电子设备200侧的用户希望会议参与者更多,则电子设备200可以直接接收用于指示同意的第三输入。
在另一些实施例中,电子设备200接收到第二消息后,显示第二消息中电子设备100的SIM卡号码,以及电子设备100在会议应用上的帐号等信息,在用户查看并确认这些信息后,接收用于指示同意的第三输入。
示例性的,在电子设备200所在的会议权限较高的情况下,例如,电子设备200所在的会议讨论的是保密内容的情况下,电子设备200需要向用户展示欲接入方的电子设备的相关信息,如图11所示,在用户查看并确认这些信息之后,点击“同意”控件之后,电子设备200才可以接收到用于指示同意的第三输入。
可选地,第三输入可以是触摸操作、语音输入、手势输入或其他形式的输入,本申请对此不作限制。
在本申请实施例中,电子设备200接收到用于指示同意的第三输入后,才向服务器发送第三消息,即执行后续S810a等步骤。若电子设备200接收到用于指示拒绝的第三输入后,该方法流程结束,电子设备100不加入会议A。
需要说明的是,在一些实施例中,步骤S809a可以省略,直接执行后续步骤S810a-S814a。例如,电子设备200(此时电子设备200可以为会议主席,也可以为非会议主席的会议成员)可以在接收到第二消息后,直接通过第三天线,通过会议应用为该会议提供的加密机制,发送第三消息。此时,当前会议没有权限限制(即任何人都可以接入当前会议),不需要会议主席同意。这种情况下欲接入方的电子设备,可以通过与任何一台参与会议的电子设备碰一碰,即可接入当前会议,更为快捷。
S810a、电子设备200通过第三天线,通过会议应用为该会议提供的加密机制,发送第三消息,第三消息包括电子设备100的SIM卡号码、电子设备100在会议应用上的帐号、电子设备200在会议应用上的帐号、会议ID。
在本申请实施例中,电子设备200接收到用于指示同意的第三输入后,可以通过第三天线,通过会议应用为该会议提供的加密机制,发送第三消息。
在一些实施例中,会议应用可以为该会议应用中的各会议提供特定的加密机制,从而保证会议正常通信时,该会议以外的人是无法获取到会议信息的,进一步保证会议的安全性。
示例性的,若当前电子设备200通过微信应用进行会议A,则微信应用可以向会议A提供一个特定的加密机制。本申请实施例中,对该加密机制的具体方式不作限定。
在一些实施例中,第三消息包括电子设备100的SIM卡号码、电子设备100在会议应用上的帐号、电子设备200在会议应用上的帐号、会议ID。
S811a、服务器400接收到第三消息,通过会议应用为该会议提供的解密机制,获取到电子设备100的SIM卡号码、电子设备100在会议应用上的帐号、电子设备200在会议应用上的帐号、会议ID。
可以理解的是,若会议应用为会议提供特定的加密机制,则会议应用对应的服务器可以为该会议提供解密机制,加密机制与解密机制相对应。
在本申请实施例中,服务器400通过对应的解密机制,获取接收到的第三消息中的具体信息。
S812a、服务器400确定电子设备200在会议应用上的帐号是否为会议ID对应的会议的主席。
在本申请实施例中,服务器400根据获取到的电子设备200在会议应用上的帐号和会议ID,确定电子设备200在会议应用上的帐号是否为会议ID对应的会议的主席。
在一些实施例中,服务器400存储有会议ID与各会议主席在会议应用上的帐号的对应列表,服务器400通过该列表确定电子设备200在会议应用上的帐号是否为会议ID对应的会议的主席。
S813a、若电子设备200在会议应用上的帐号为会议ID对应的会议的主席,则回拨电子设备100的SIM卡号码。
在本申请实施例中,若电子设备200在会议应用上的帐号为会议ID对应的会议的主席,则服务器400根据获取到的电子设备100的SIM卡号码,回拨电子设备100。
在另一些实施例中,若电子设备200在会议应用上的帐号不是会议ID对应的会议的主席,则该流程结束。
S814a、电子设备100接通,通过第一天线加入会议。
在本申请实施例中,服务器400回拨电子设备100的SIM卡号码之后,电子设备100接通,则电子设备100通过第一天线加入会议,即加入会议A。
可选地,若电子设备100接入会议A后,电子设备100的用户发现不需要接入会议A或想要退出会议A,则用户可以随时挂断会议A,使得电子设备100退出会议A。例如,用户可以通过点击“挂断”控件来退出会议应用。用户还可以通过语音输入“退出会议”等其他方式退出该会议。本申请实施例对电子设备退出会议的方式不作限定。
可选地,电子设备100可以在S807a之后,切换为第一天线,也可以在S814a中切换为第一天线,本申请实施例对此不作限定。
图8B为本申请实施例提供的另一种会议接入方法的流程图。其中,电子设备100为欲接入方,电子设备200为会议主席,电子设备200参加的当前会议记为会议A。
在图8B所示的方法中,电子设备100包括第一天线和第二天线。其中,第一天线为强天线,第二天线为弱天线,第一天线发射信号的第一发射距离大于第二天线发射信号的第二发射距离,第二发射距离小于或等于预设的安全距离。电子设备200包括第三天线和第四天线。其中,第三天线为强天线,第四天线为弱天线,第三天线发射信号的第三发射距离大于第四天线发射信号的第四发射距离,第四发射距离小于或等于预设的安全距离。预设的安全距离为电子设备的用户通过该电子设备与另一电子设备交换秘密信息的距离。例如,预设的安全距离可以为30cm。
如图8B所示,本申请实施例提供的会议接入方法,包括:
S801b、电子设备100接收到第一输入。
S801b与S801a相同,参见S801a的描述,此处不再赘述。
S802b、电子设备100通过第二天线,广播第一消息,第一消息包括会议加入请求和电子设备100的ID。
在本申请实施例中,电子设备100可以通过第二天线(弱天线)来广播第一消息。
可以理解的是,由于第二天线的发射距离较短,因此可以接收到第一消息的电子设备与电子设备100之间的距离较近。
S803b、在位于第二天线的发射距离内,电子设备200接收到第一消息,获取到会议加入请求和电子设备100的ID,生成随机密钥。
由于第二天线的发射距离较短,因此位于第二天线的发射距离内,电子设备200接收到第一消息表明,电子设备200与电子设备100之间的距离较近。
在一些实施例中,电子设备200位于第二天线的发射距离内,可以通过电子设备100向电子设备200靠近实现,也可以通过电子设备200向电子设备100靠近实现,还可以通过电子设备100和电子设备200彼此靠近实现。
在另一些实施例中,电子设备200位于第二天线的发射距离内可以是通过电子设备100欲电子设备200碰一碰实现的。
S804b、电子设备200通过第四天线,发送第一响应消息,第一响应消息包括随机密钥和电子设备200的ID。
在本申请实施例中,随机密钥可以是通过明文发送的。由于电子设备100与电子设备200之间距离小于获得等于预设的安全距离,因此可以认为,通过明文发送随机密钥是安全的。
S805b、在位于第四天线的发射距离内,电子设备100接收到第一响应消息,获取到随机密钥和电子设备200的ID。
S804b-S805b与S804a-S805a类似,参见S804a-S805a的描述,此处不再赘述。
S806b、电子设备100使用随机密钥加密电子设备100的SIM卡号码,及电子设备100在会议应用上的帐号。
在本申请实施例中,由于电子设备100与电子设备200相靠近,因此可以确定电子设备100想要加入电子设备200所在的会议A。这样,电子设备100可以在S805b之后直接使用随机密钥加密电子设备100的SIM卡号码,以及电子设备100在会议应用上的帐号,不需要接收用于指示加入的第二输入。
可选地,电子设备100也可以在接收到用于指示加入的第二输入之后,使用随机密钥加密电子设备100的SIM卡号码,及电子设备100在会议应用上的帐号,进一步保证电子设备加入的会议无误。
S807b、电子设备100通过第一天线,发送第二消息,第二消息包括电子设备200的ID,以及随机密钥加密后的信息。
在本申请实施例中,电子设备100通过第一天线发送第二消息。这样,电子设备100与电子设备200不需要一直处于电子设备100的第二天线的发射距离,电子设备100可以在最初与电子设备200相靠近之后,离开电子设备200一段距离,从而方便其他电子设备与电子设备200相靠近来加入会议A,提高操作的便利性。
S808b、在位于第一天线的发射距离内,电子设备200接收到第二消息,使用随机密钥解密,获取到电子设备100的SIM卡号码,以及电子设备100在会议应用上的帐号。
由于电子设备100通过第一天线发送第二消息,因此电子设备200在第一天线的发射距离内才可以接收到第二消息。
S809b、电子设备200接收到用于指示同意的第三输入。
在一些实施例中,该步骤可以省略,直接执行后续步骤。
S810b、电子设备200通过第三天线,通过会议应用为该会议提供的加密机制,发送第三消息,第三消息包括电子设备100的SIM卡号码、电子设备100在会议应用上的帐号、电子设备200在会议应用上的帐号、会议ID。
S811b、服务器400接收到第三消息,通过会议应用为该会议提供的解密机制,获取到电子设备100的SIM卡号码、电子设备100在会议应用上的帐号、电子设备200在会议应用上的帐号、会议ID。
S812b、服务器400确定电子设备200在会议应用上的帐号是否为会议ID对应的会议的主席。
S813b、若电子设备200在会议应用上的帐号为会议ID对应的会议的主席,则回拨电子设备100的SIM卡号码。
S814b、电子设备100接通,通过第一天线加入会议。
上述S809b-S814b与S809a-S814a相同,参见S809a-S814a的描述,此处不再赘述。
通过上述描述,可以看出,图8A所示的会议接入方法与图8B所示的会议接入方法的区别在于:图8A中,电子设备100先通过第一天线广播第一消息,再通过第二天线发送第二消息;图8B中,电子设备100先通过第二天线广播第一消息,再通过第一天线发送第二消息。
可以认为,在图8A所示的方法中,电子设备100与电子设备200之间距离较远时,电子设备100就可以开始请求加入会议A,之后电子设备100与电子设备200相靠近,从而加入会议A。在图8B所示的方法中,电子设备100请求加入会议A时,电子设备100与电子设备200之间的距离小于或等于预设的安全距离,之后电子设备100可以离开电子设备200一定的距离,继续完成加入会议A的过程。
通过图8A和图8B所示的方法,可以理解的是,本申请实施例提供的会议接入方法并不限定欲接入方与会议主席之间相靠近的具体时机,只要在会议接入的过程中,欲接入方与会议主席之间相靠近或者碰一碰即可。
上述图8A和图8B所示的方法中,电子设备100和电子设备200分别包括两个天线,通过不同的天线实现不同的发射距离。
在一些实施例中,电子设备100在会议接入过程中可以仅使用第一天线和第二天线中的一个天线,通过调节该天线的发射功率,实现不同的发射距离。同样,电子设备200也可以仅使用第三天线和第四天线中的一个天线,通过调节该天线的发射功率,实现不同的发射距离。
在另一些实施例中,电子设备100和电子设备200分别可以仅具有一个天线,通过调节该天线的发射功率,实现不同的发射距离。例如,电子设备100仅包括第一天线,电子设备200仅包括第三天线。
下面参见图8C,描述本申请实施例提供的另一种会议接入方法。其中,电子设备100为欲接入方,电子设备200为会议主席,电子设备200参加的当前会议记为会议A。
在图8C所示的方法中,电子设备100仅包括第一天线,可以通过调节第一天线的发射功率,实现不同的发射距离。例如,第一天线的发射功率包括第一发射功率和第二发射功率,第一发射功率大于第二发射功率。这样,可以认为,第一发射功率下的第一天线为强天线,第二发射功率下的第一天线为弱天线。类似的,电子设备200仅包括第三天线,第三天线的发射功率包括第三发射功率和第四发射功率,第三发射功率大于第四发射功率。这样,可以认为,第三发射功率下的第三天线为强天线,第四发射功率下的第三天线为弱天线。
如图8C所示,该方法包括:
S801c、电子设备100接收到第一输入。
S801c与S801a相同,参见S801a的描述,此处不再赘述。
S802c、电子设备100通过第一发射功率下的第一天线,广播第一消息,第一消息包括会议加入请求和电子设备100的ID。
在本申请实施例中,由于第一发射功率下的第一天线与S802a中的强天线(第一天线)类似,区别仅在与强天线的实现方式不同,因此,可以认为S802c与S802a类似,具体描述参见S802a,此处不再赘述。
S803c、在位于第一发射功率下的发射距离内,电子设备200接收到第一消息,获取到会议加入请求和电子设备100的ID,生成随机密钥。
S804c、电子设备200通过第四发射功率下的第三天线,发送第一响应消息,第一响应消息包括随机密钥和电子设备200的ID。
在本申请实施例中,由于第四发射功率下的第三天线与S804a中的弱天线(第四天线)类似,区别仅在于弱天线的实现方式不同,因此,可以认为S804c与S804a类似,具体描述参见S804a,此处不再赘述。
S805c、在位于第四发射功率下的第三天线的发射距离内,电子设备100接收到第一响应消息,获取到随机密钥和电子设备200的ID。
S806c、电子设备100接收到用于指示加入的第二输入,使用随机密钥加密电子设备100的SIM卡号码,及电子设备100在会议应用上的帐号。
S807c、电子设备100通过第二发射功率下的第一天线,发送第二消息,第二消息包括电子设备200的ID,以及随机密钥加密后的信息。
在本申请实施例中,由于第二发射功率下的第一天线与S807a中的弱天线(第二天线)类似,区别仅在与弱天线的实现方式不同,因此,可以认为S807c与S807a类似,具体描述参见S807a,此处不再赘述。
S808c、在位于第二发射功率下的第一天线的发射距离内,电子设备200接收到第二消息,使用随机密钥解密,获取到电子设备100的SIM卡号码,以及电子设备100在会议应用上的帐号。
S809c、电子设备200接收到用于指示同意的第三输入。
在一些实施例中,该步骤可以省略,直接执行后续步骤。
S810c、电子设备200通过第三发射功率下的第三天线,通过会议应用为该会议提供 的加密机制,发送第三消息,第三消息包括电子设备100的SIM卡号码、电子设备100在会议应用上的帐号、电子设备200在会议应用上的帐号、会议ID。
在本申请实施例中,由于第三发射功率下的第三天线与S810a中的强天线(第三天线)类似,区别仅在与强天线的实现方式不同,因此,可以认为S810c与S810a类似,具体描述参见S810a,此处不再赘述。
S811c、服务器400接收到第三消息,通过会议应用为该会议提供的解密机制,获取到电子设备100的SIM卡号码、电子设备100在会议应用上的帐号、电子设备200在会议应用上的帐号、会议ID。
S812c、服务器400确定电子设备200在会议应用上的帐号是否为会议ID对应的会议的主席。
S813c、若电子设备200在会议应用上的帐号为会议ID对应的会议的主席,则回拨电子设备100的SIM卡号码。
S814c、电子设备100接通,通过第一发射功率下的第一天线加入会议。
上述图8C所示的方法与图8A所述的方法类似。其中,将图8A中的第一天线替换为图8C中的第一发射功率下的第一天线,将图8A中的第二天线替换为图8C中的第二发射功率下的第一天线,将图8A中的第三天线替换为图8C中的第三发射功率下的第三天线,将图8A中的第四天线替换为图8C中的第四发射功率下的第三天线。在图8A所示的方法中,通过切换不同天线实现不同的发射距离,在图8C所示的方法中,通过调节同一个天线的发射功率实现不同的发射距离。
类似地,针对图8B所述的方法,通过同样的替换,可以得到新的流程示意图(未画出)。与图8B所示的方法类似,不同于图8B中通过切换不同天线来实现不同的发射距离,新的流程示意图中通过调节同一个天线的发射功率实现不同的发射距离。也可以认为,通过调节同一个天线的发射功率来实现不同天线的效果。
可以理解的是,上述方法可以任意组合。例如,电子设备100可以包括强天线和弱天线(第一天线和第二天线),电子设备200仅包括第三天线,通过第三天线的调节发射功率,实现不同的发射距离。再例如,电子设备200可以包括强天线和弱天线(第三天线和第四天线),电子设备100仅包括第一天线,通过调节第一天线的发射功率,实现不同的发射距离。本申请实施例对此不作限定。
需要说明的是,上述电子设备100仅为示意性举例,并非限定只有1个电子设备接入电子设备200作为会议主席的会议A。本申请对接入会议A的电子设备的个数不作限定。
在一些实施例中,会议A的参与成员除了电子设备200之外,还可以有其他一个或多个电子设备,本申请对此不作限定。
通过图8A-图8C所示及扩展的方法,欲接入方的电子设备能够基于超短距通信方式,与附近作为会议主席的电子设备通过相靠近或碰一碰这种自然交互方式,加入会议主席所在的会议。在该过程中,如图12所示,欲接入方的电子设备100与作为会议主席的电子设备200只需要靠近或碰一碰之后,电子设备100即可加入电子设备200所在的会议中。如图12所示,电子设备200显示的与会人信息中增加了电子设备100对应的用户Y。
举例来说,会议室1内有欲接入当前会议的多个电子设备,用户1使用的电子设备1作为当前会议的会议主席,欲接入当前会议的多个电子设备(比如电子设备2-10)分别与 电子设备1相靠近或碰一碰即可方便、快速地接入当前会议。
需要说明的是,在一些实施例中,若当前会议无权限,希望尽可能多的人都可以加入当前会议,则上述S809a、S809b和S809c可以省去,电子设备200可以在不接收用于指示同意的第三输入的情况下,直接执行后续步骤,使得电子设备100加入当前会议。
还需要说明的是,在一些实施例中,电子设备200也可以是非会议主席的其他会议参与成员。这种情况下,上述步骤S809a、S809b和S809c也可以省略。
本申请实施例提供的会议接入方法操作简单,耗时较短,用户体验较佳。另外,该方法降低了操作的复杂度,解决了误触的问题。此外,由于会议接入过程中,电子设备之间通过超短距通信方式进行通信,通信距离很短,因此通信双方能够建立安全可靠的数据交互,从而保证了安全性。
上述图8A-图8C所示及扩展的方法描述了欲接入方通过与会议主席相靠近或碰一碰,来接入当前会议的过程。在一些实施例中,欲接入方还可以通过与会议成员相靠近或碰一碰,接入当前会议。此处,会议成员指的是出了会议主席以外的会议参与方。下面将结合图13A-图13C,具体描述欲接入方的电子设备基于超短距通信方式,通过与会议参与方相靠近或碰一碰来加入当前会议的过程。
图13A为本申请实施例提供的一种会议接入方法的流程图。其中,电子设备100为欲接入方,电子设备200为会议成员,电子设备300为会议主席,电子设备200与电子设备300所在的会议记为会议A。
在图13A所示的方法中,电子设备100包括第一天线和第二天线。其中,第一天线为强天线,第二天线为弱天线,第一天线发射信号的第一发射距离大于第二天线发射信号的第二发射距离,第二发射距离小于或等于预设的安全距离。电子设备200包括第三天线和第四天线。其中,第三天线为强天线,第四天线为弱天线,第三天线发射信号的第三发射距离大于第四天线发射信号的第四发射距离,第四发射距离小于或等于预设的安全距离。预设的安全距离为电子设备的用户通过该电子设备与另一电子设备交换秘密信息的距离。例如,预设的安全距离可以为30cm。
如图13A所示,所述方法包括:
S901a、电子设备100接收到第一输入。
S902a、电子设备100通过第一天线,广播第一消息,第一消息包括会议加入请求和电子设备100的ID。
S903a、在位于第一天线的发射距离内,电子设备200接收到第一消息,获取到会议加入请求和电子设备100的ID,生成随机密钥。
在本申请实施例中,电子设备200接收到电子设备100广播的第一消息,根据第一消息获取到会议加入请求和电子设备100的ID。
在本申请实施例中,电子设备200生成随机密钥。通过随机密钥加密信息,能够提高之后信息传输的安全性。
S904a、电子设备200通过第四天线,发送第一响应消息,第一响应消息包括随机密钥和电子设备200的ID。
S905a、在位于第四天线的发射距离内,电子设备100接收到第一响应消息,获取到随机密钥和电子设备200的ID。
S906a、电子设备100接收到用于指示加入的第二输入,使用随机密钥加密电子设备100的SIM卡号码,及电子设备100在会议应用上的帐号。
S907a、电子设备100通过第二天线,发送第二消息,第二消息包括电子设备200的ID,以及随机密钥加密后的信息。
S908a、在位于第二天线的发射距离内,电子设备200接收到第二消息,使用随机密钥解密,获取到电子设备100的SIM卡号码,以及电子设备100在会议应用上的帐号。
上述S901a-S908a与S801a-S808a类似,区别仅在于将与欲接入方的电子设备100通信的会议主席(电子设备200)替换为会议成员(电子设备200),其余内容不变,参见S801a-S808a的描述,此处不再赘述。
S909a、电子设备200通过第三天线,通过会议应用为会议提供的加密机制,发送第三消息,第三消息包括电子设备100的SIM卡号码、电子设备100在会议应用上的帐号、电子设备200在会议应用上的帐号。
由于电子设备200接收到电子设备100发送的第二消息,因此电子设备200通过第三天线,通过会议应用为会议提供的加密机制,发送第三消息。
相应地,第三消息包括电子设备100的SIM卡号码、电子设备100在会议应用上的帐号、电子设备200在会议应用上的帐号。
可选的,第三消息还可以包括会议A的会议ID等其他信息。本申请实施例对此不作限定。
S910a、服务器400接收到第三消息,通过会议应用为该会议提供的解密机制,获取到电子设备100的SIM卡号码、电子设备100在会议应用上的帐号、电子设备200在会议应用上的帐号。
在本申请实施例中,服务器400通过会议相应的解密机制,对接收到的第三消息进行解密,获取到电子设备100的SIM卡号码、电子设备100在会议应用上的帐号、电子设备200在会议应用上的帐号。
在一些实施例中,若第三消息中包括会议A的会议ID,则服务器400还可以获取会议ID。
S911a、服务器400通过会议应用为该会议提供的加密机制,向电子设备300发送第三消息。
在一些实施例中,服务器400可以根据电子设备200在会议应用上的帐号(可选地,甚至还进一步根据会议A的会议ID),确定出会议A的会议主席为电子设备300在会议应用上的帐号,进而向电子设备300发送第三消息。
在另一些实施例中,服务器400也可以仅根据会议ID确定会议主席。
服务器400确定会议主席之后,可以向作为会议主席的电子设备300发送加密后的第三消息。
可以认为,服务器400向电子设备300发送第三消息表示,服务器400向在电子设备300上登陆的会议应用发送第三消息。
S912a、电子设备300接收到第三消息,通过会议应用为该会议提供的解密机制,获取到电子设备100的SIM卡号码、电子设备100在会议应用上的帐号、电子设备200在会议应用上的帐号。
相应地,电子设备300接收到加密后的第三消息,可以通过对应的解密机制,获取到第三消息中包括的电子设备100的SIM卡号码、电子设备100在会议应用上的帐号、电子设备200在会议应用上的帐号。
S913a、电子设备300接收到用于指示同意或拒绝的第三输入。
在一些实施例中,电子设备300获取到第三消息的内容后,接收第三输入。
在另一些实施例中,电子设备300获取到第三消息的内容后,显示第三消息的内容。例如,电子设备300在屏幕上的提示框中显示电子设备100的SIM卡号码、电子设备100在会议应用上的帐号、电子设备200在会议应用上的帐号。在用户查看并确认第三消息的内容之后,电子设备300才可以接收第三输入。
可选的,第三输入可以是触摸操作、语音输入、手势输入或其他形式的输入,本申请对此不作限定。
S914a、电子设备300通过会议应用为该会议提供的加密机制,向服务器400发送第四消息,第四消息包括第三输入对应的第三输入信息。
在本申请实施例中,第三输入信息可以是“同意”,也可以是“拒绝”。
其中,“同意”表示电子设备300允许电子设备100加入会议A;“拒绝”表示电子设备300不允许电子设备100加入会议A。
S915a、若接收到指示同意的第三输入,则所述服务器400回拨电子设备100的SIM卡号码;若接收到指示拒绝的第三输入,则所述服务器400通知电子设备100会议加入请求被会议主席拒绝。
S916a、电子设备100接通,通过第一天线加入会议。
若接收到指示同意的第三输入,则所述服务器400回拨电子设备100的SIM卡号码,进而,电子设备100接通,通过第一天线使电子设备100加入会议A。
若接收到指示拒绝的第三输入,则所述服务器400通知电子设备100会议加入请求被会议主席拒绝,流程结束,不再执行S916a。
可选地,若电子设备100接入会议A后,电子设备100的用户发现不需要接入会议A或想要退出会议A,则用户可以随时挂断会议A,使得电子设备100退出会议A。例如,用户可以通过点击“挂断”控件来退出会议应用。用户还可以通过语音输入“退出会议”等其他方式退出该会议。本申请实施例对电子设备退出会议的方式不作限定。
可选地,电子设备100可以在S907a之后,切换为第一天线,也可以在S916a中切换为第一天线,本申请实施例对此不作限定。
图13B为本申请实施例提供的另一种会议接入方法的流程图。其中,电子设备100为欲接入方,电子设备200为会议成员,电子设备300为会议主席,电子设备200与电子设备300所在的会议记为会议A。
在图13B所示的方法中,电子设备100包括第一天线和第二天线。其中,第一天线为强天线,第二天线为弱天线,第一天线发射信号的第一发射距离大于第二天线发射信号的第二发射距离,第二发射距离小于或等于预设的安全距离。电子设备200包括第三天线和第四天线。其中,第三天线为强天线,第四天线为弱天线,第三天线发射信号的第三发射距离大于第四天线发射信号的第四发射距离,第四发射距离小于或等于预设的安全距离。预设的安全距离为电子设备的用户通过该电子设备与另一电子设备交换秘密信息的距离。 例如,预设的安全距离可以为30cm。
如图13B所示,本申请实施例提供的会议接入方法,包括:
S901b、电子设备100接收到第一输入。
S902b、电子设备100通过第二天线,广播第一消息,第一消息包括会议加入请求和电子设备100的ID。
S903b、在位于第二天线的发射距离内,电子设备200接收到第一消息,获取到会议加入请求和电子设备100的ID,生成随机密钥。
S904b、电子设备200通过第四天线,发送第一响应消息,第一响应消息包括随机密钥和电子设备200的ID。
S905b、在位于第四天线的发射距离内,电子设备100接收到第一响应消息,获取到随机密钥和电子设备200的ID。
S906b、电子设备100使用随机密钥加密电子设备100的SIM卡号码,及电子设备100在会议应用上的帐号。
S907b、电子设备100通过第一天线,发送第二消息,第二消息包括电子设备200的ID,以及随机密钥加密后的电子设备100的SIM卡号码和电子设备100在会议应用上的帐号。
S908b、在位于第一天线的发射距离内,电子设备200接收到第二消息,使用随机密钥解密,获取到电子设备100的SIM卡号码,以及电子设备100在会议应用上的帐号。
上述S901b-S908b与S801b-S808b类似,区别仅在于将与欲接入方的电子设备100通信的会议主席(电子设备200)替换为会议成员(电子设备200),其余内容不变,参见S801b-S808b的描述,此处不再赘述。
S909b、电子设备200通过第三天线,通过会议应用为会议提供的加密机制,发送第三消息,第三消息包括电子设备100的SIM卡号码、电子设备100在会议应用上的帐号、电子设备200在会议应用上的帐号。
S910b、服务器400接收到第三消息,通过会议应用为该会议提供的解密机制,获取到电子设备100的SIM卡号码、电子设备100在会议应用上的帐号、电子设备200在会议应用上的帐号。
S911b、服务器400通过会议应用为该会议提供的加密机制,向电子设备300发送第三消息。
S912b、电子设备300接收到第三消息,通过会议应用为该会议提供的解密机制,获取到电子设备100的SIM卡号码、电子设备100在会议应用上的帐号、电子设备200在会议应用上的帐号。
S913b、电子设备300接收到用于指示同意或拒绝的第三输入。
S914b、电子设备300通过会议应用为该会议提供的加密机制,向服务器400发送第四消息,第四消息包括第三输入对应的第三输入信息。
S915b、若接收到指示同意的第三输入,则所述服务器400回拨电子设备100的SIM卡号码;若接收到指示拒绝的第三输入,则所述服务器400通知电子设备100会议加入请求被会议主席拒绝。
S916b、电子设备100接通,通过第一天线加入会议。
上述S909b-S916b与S909a-S916a相同,参见S909a-S916a的描述,此处不再赘述。
通过上述内容可知,图13A所示的会议接入方法与图13B所示的会议接入方法的区别在于:图13A中,电子设备100先通过第一天线广播第一消息,再通过第二天线发送第二消息;图13B中,电子设备100先通过第二天线广播第一消息,再通过第一天线发送第二消息。
可以认为,在图13A所示的方法中,电子设备100与电子设备200之间距离较远时,电子设备100就可以开始请求加入会议A,之后电子设备100与电子设备200相靠近,从而加入会议A。在图13B所示的方法中,电子设备100请求加入会议A时,电子设备100与电子设备200之间的距离小于或等于预设的第一安全距离,也小于或等于预设的第二安全距离,之后电子设备100可以离开电子设备200一定的距离,继续完成加入会议A的过程。
通过图13A和图13B所示的方法,可以理解的是,本申请实施例提供的会议接入方法并不限定欲接入方与会议成员之间相靠近的具体时机,只要在会议接入的过程中,预接入方与会议成员之间相靠近或者碰一碰即可。
上述图13A和图13B所示的方法中,电子设备100和电子设备300分别包括两个天线,通过不同的天线实现不同的发射距离。
在一些实施例中,电子设备100在会议接入过程中可以仅使用第一天线和第二天线中的一个天线,通过调节该天线的发射功率,实现不同的发射距离。同样,电子设备300也可以仅使用第三天线和第四天线中的一个天线,通过调节该天线的发射功率,实现不同的发射距离。
在另一些实施例中,电子设备100和电子设备200分别可以仅具有一个天线,通过调节该天线的发射功率,实现不同的发射距离。例如,电子设备100仅包括第一天线,电子设备200仅包括第三天线。
下面参见图13C,描述本申请实施例提供的另一种会议接入方法。其中,电子设备100为欲接入方,电子设备200为会议成员,电子设备300为会议主席,电子设备200和电子设备200所在的会议为会议A。
在图13C所示的方法中,电子设备100仅包括第一天线,可以通过调节第一天线的发射功率,实现不同的发射距离。例如,第一天线的发射功率包括第一发射功率和第二发射功率,第一发射功率大于第二发射功率。这样,可以认为,第一发射功率下的第一天线为强天线,第二发射功率下的第一天线为弱天线。类似的,电子设备200仅包括第三天线,第三天线的发射功率包括第三发射功率和第四发射功率,第三发射功率大于第四发射功率。这样,可以认为,第三发射功率下的第三天线为强天线,第四发射功率下的第三天线为弱天线。
如图13C所示,该方法包括:
S901c、电子设备100接收到第一输入。
S902c、电子设备100通过第一发射功率下的第一天线,广播第一消息,第一消息包括会议加入请求和电子设备100的ID。
S903c、在位于第一发射功率下的第一天线的发射距离内,电子设备200接收到第一消息,获取到会议加入请求和电子设备100的ID,生成随机密钥。
S904c、电子设备200通过第四发射功率下的第三天线,发送第一响应消息,第一响应消息包括随机密钥和电子设备200的ID。
S905c、在位于第四发射功率下的第三天线的发射距离内,电子设备100接收到第一响应消息,获取到随机密钥和电子设备200的ID。
S906c、电子设备100接收到用于指示加入的第二输入,使用随机密钥加密电子设备100的SIM卡号码,及电子设备100在会议应用上的帐号。
S907c、电子设备100通过第二发射功率下的第一天线,发送第二消息,第二消息包括电子设备200的ID,以及随机密钥加密后的信息。
S908c、在位于第二发射功率下的第一天线的发射距离内,电子设备200接收到第二消息,使用随机密钥解密,获取到电子设备100的SIM卡号码,以及电子设备100在会议应用上的帐号。
S909c、电子设备200通过第三发射功率下的第三天线,通过会议应用为会议提供的加密机制,发送第三消息,第三消息包括电子设备100的SIM卡号码、电子设备100在会议应用上的帐号、电子设备200在会议应用上的帐号。
S910c、服务器400接收到第三消息,通过会议应用为该会议提供的解密机制,获取到电子设备100的SIM卡号码、电子设备100在会议应用上的帐号、电子设备200在会议应用上的帐号。
S911c、服务器400通过会议应用为该会议提供的加密机制,向电子设备300发送第三消息。
S912c、电子设备300接收到第三消息,通过会议应用为该会议提供的解密机制,获取到电子设备100的SIM卡号码、电子设备100在会议应用上的帐号、电子设备200在会议应用上的帐号。
S913c、电子设备300接收到用于指示同意或拒绝的第三输入。
S914c、电子设备300通过会议应用为该会议提供的加密机制,向服务器400发送第四消息,第四消息包括第三输入对应的第三输入信息。
S915c、若接收到指示同意的第三输入,则所述服务器400回拨电子设备100的SIM卡号码;若接收到指示拒绝的第三输入,则所述服务器400通知电子设备100会议加入请求被会议主席拒绝。
S916c、电子设备100接通,通过第一发射功率下的第一天线加入会议。
上述S901c-S916c与S901a-S916a类似。其中,将S901a-S916a中的第一天线替换为S901c-S916c中的第一发射功率下的第一天线,将S901a-S916a中的第二天线替换为S901c-S916c中的第二发射功率下的第一天线,将S901a-S916a中的第三天线替换为S901c-S916c中的第三发射功率下的第三天线,将S901a-S916a中的第四天线替换为S901c-S916c中的第四发射功率下的第三天线。其余内容参见S901a-S916a的描述,此处不再赘述。
针对图13B中的S901b-S916b,通过同样的替换,可以得到新的流程示意图(未画出)。新的流程示意图中的方法与图13B中的方法类似,不同于图13B中通过切换不同天线来实现不同的发射距离,新的流程示意图中通过调节同一个天线的发射功率实现不同的发射距离。也可以认为,通过调节同一个天线的发射功率来实现不同天线的效果。
可以理解的是,上述描述的方法可以任意组合。例如,电子设备100可以包括强天线和弱天线(第一天线和第二天线),电子设备200仅包括第三天线,通过第三天线的调节发射功率,实现不同的发射距离。再例如,电子设备200可以包括强天线和弱天线(第三天线和第四天线),电子设备100仅包括第一天线,通过调节第一天线的发射功率,实现不同的发射距离。本申请实施例对此不作限定。
需要说明的是,上述电子设备100仅为示意性举例,并非限定只有1个电子设备通过与会议成员交互加入会议A。本申请对接入会议A的电子设备的个数不作限定。
通过图13A-图13C所示及扩展的方法,欲接入方的电子设备100能够基于超短距通信方式,与作为会议成员的电子设备200通过靠近或碰一碰这样的自然交互方式,加入电子设备200和电子设备300所在的会议。在该过程中,如图14所示,欲接入方的电子设备100与作为会议成员的电子设备200只需要靠近或碰一碰之后,电子设备100即可通过超短距通信方式加入电子设备200所在的会议。如图14所示,电子设备300显示的与会人信息中,除了电子设备200对应的用户X,电子设备300对应的用户Z之外,还增加了电子设备100对应的用户Y。
举例来说,会议室1内有欲接入当前会议的多个电子设备,用户1使用的电子设备1作为当前会议的会议主席,用户2使用的电子设备2作为当前会议的会议成员,电子设备2与电子设备1均接入当前会议。欲接入当前会议的多个电子设备(比如电子设备3-10)分别与电子设备2相靠近或碰一碰即可方便、快速地接入当前会议。
本申请实施例提供的会议接入方法操作简单,耗时较短,用户体验较佳。另外,该方法能够降低在会议进行中添加会议成员时操作的复杂度,降低误触的可能性,有效避免了交互操作界面对会议界面的遮挡,同时避免误触造成的会议中断等问题。此外,由于会议接入过程中,电子设备之间通过超短距通信方式进行通信,通信距离很短,因此通信双方能够建立安全可靠的数据交互,从而保证了安全性。
通过上述内容,可以理解的是,欲接入方的电子设备可以通过与参加当前会议的任意一个电子设备通过靠近或碰一碰的方式,从而加入当前会议。
上面图8A-图8C以及图13A-图13C描述的会议接入方法都应用于存在会议主席的场景中。在日常生活中,存在很多会议主席的会议场景。例如,通过微信进行的多人语音会议,其中,并不存在特定的会议主席。
下面结合图15A和图15B,具体描述在无会议主席的场景下的一种会议接入方法。
图15A为本申请实施例提供的一种会议接入方法的流程图。其中,电子设备100为欲接入方,电子设备200为会议中的会议成员,电子设备200参加的当前会议记为会议A。由于不存在会议主席,电子设备200可以是会议A中的任一个电子设备。
在图15A所示的方法中,电子设备100包括第一天线和第二天线。其中,第一天线为强天线,第二天线为弱天线,第一天线发射信号的第一发射距离大于第二天线发射信号的第二发射距离,第二发射距离小于或等于预设的安全距离。电子设备200包括第三天线和第四天线。其中,第三天线为强天线,第四天线为弱天线,第三天线发射信号的第三发射距离大于第四天线发射信号的第四发射距离,第四发射距离小于或等于预设的安全距离。预设的安全距离为电子设备的用户通过该电子设备与另一电子设备交换秘密信息的距离。例如,预设的安全距离可以为30cm。
如图15A所示,该方法包括:
S1001a、电子设备100接收到第一输入,生成随机密钥。
在一些实施例中,电子设备100响应于用户的操作开启会议应用之后,接收到第一输入。
在一些实施例中,第一输入为用户点击会议应用中“碰一碰接入会议”的选项。第一输入还可以是电子设备100开启会议应用之后的语音输入、手势输入或其他形式的输入,本申请实施例对此不作限定。
在另一些实施例中,电子设备100可以直接接收第一输入。也就是说,电子设备100可以在显示主界面或其他应用界面的情况下,接收第一输入。
示例性的,第一输入可以是“碰一碰接入会议”的语音输入、特定手势输入、触摸操作或其他形式的输入,本申请实施例对此不作限定。
在一些实施例中,电子设备100接收到第一输入的同时,可以生成随机密钥。
在一些实施例中,电子设备100接收到第一输入之后,可以生成随机密钥。
S1002a、电子设备100通过第二天线,广播第一消息,第一消息包括会议加入请求、电子设备100的ID和随机密钥。
在本申请实施例中,电子设备100的ID表示能够唯一识别电子设备100的信息。例如,电子设备100的ID可以是电子设备100的MAC地址等信息。
可以理解的是,电子设备100通过第二天线广播第一消息,第二天线的发射距离较短,因此可以接收到第一消息的电子设备与电子设备100的距离较近。
该步骤与S802b类似,区别在于,S1002a广播的第一消息中还包括电子设备100生成的随机密钥。
S1003a、在位于第二天线的发射距离内,电子设备200接收到第一消息,获取到会议加入请求、电子设备100的ID和随机密钥,使用随机密钥加密会议ID和会议密码。
由于电子设备100通过第二天线广播第一消息,第二天线的发射距离较短,因此电子设备200与电子设备100距离较近的情况下,电子设备200可以接收到第一消息,获取到会议加入请求、电子设备100的ID和随机密钥。
在本申请实施例中,电子设备200可以使用随机密钥加密电子设备200参加的会议A的会议ID和会议密码。
在一些实施例中,会议A可以没有会议密码。在没有会议密码的情况下,电子设备200使用随机密钥加密会议A的会议ID。
S1004a、电子设备200通过第四天线,发送第一响应消息,第一响应消息包括电子设备100的ID,以及随机密钥加密会议ID和会议密码后的信息。
由于电子设备100与电子设备200距离较近,因此电子设备200通过第四天线发送第一响应消息。
可以理解的,电子设备200与电子设备100之间的距离在预设的安全距离内,能够保证信息传输的安全性。
在一些实施例中,第一响应消息包括电子设备的ID,以及随机密钥加密会议ID和会议密码后的信息。
在另一些实施例中,第一响应消息包括电子设备的ID,以及随机密钥加密会议ID后 的信息。
可以理解的是,这里的随机密钥由电子设备100生成,因此,只有电子设备100能够对加密的信息进行解密,获取会议A的会议ID以及会议密码,从而提高了通信过程中的安全性。
S1005a、在位于第四天线的发射距离内,电子设备100接收到第一响应消息,使用随机密钥解密,获取到会议ID和会议密码。
在一些实施例中,若不存在会议密码,则电子设备100仅获取到会议ID。
S1006a、电子设备200经过预设时长后,切换至第三天线。
其中,预设时长通过是较短的一个时间段,例如2ms、3ms等,预设时长可以由用户设定,本申请对预设时长不作具体限定。
电子设备200通过第四天线(弱天线)使得电子设备100能够通过超短距方式加入会议A。然而,由于电子设备200处于会议A中,因此电子设备200大部分时间应该通过第三天线(强天线),经由路由器和因特网来保持正常的会议通信。
因此,电子设备200经过预设时长后,切换至第三天线,从而保证正常的会议通信。
S1007a、电子设备100通过第一天线,通过会议应用为该会议提供的加密机制,发送第二消息,第二消息包括会议ID、会议密码和电子设备100在会议应用上的帐号。
在一些实施例中,若会议权限较低,不存在会议密码,则电子设备100通过第一天线,通过会议应用为该会议提供的加密机制,发送第二消息,第二消息包括会议ID和电子设备100在会议应用上的帐号。
S1008a、服务器400接收到第二消息,通过会议应用为该会议提供的解密机制,获取到会议ID、会议密码和电子设备100在会议应用上的帐号。
在一些实施例中,若不存在会议密码,则服务器400通过会议应用为该会议提供的解密机制,获取到会议ID和电子设备100在会议应用上的帐号。
S1009a、服务器400确定会议密码是否正确。
在一些实施例中,服务器400通过比对会议ID与会议密码是否一致,来判断会议密码是否正确。
在另一些实施例中,若不存在会议密码,则服务器400确定会议ID是否合法。
例如,服务器400通过确定会议ID是否存在,来判断会议ID是否合法;或者服务器400通过确定会议ID是否为当前会议,来判断会议ID是否合法。
可以理解的是,服务器400中可以存储会议ID与会议密码的对应列表;或者,服务器400可以调用特定存储器中存储的数据来确定会议密码是否正确。
S1010a、若服务器400确定会议密码正确,则电子设备100接通,通过第一天线加入会议。
在一些实施例中,在无会议密码的情况下,若服务器400确定该会议ID合法,则电子设备100接通,通过第一天线加入会议。
在另一些实施例中,若服务器400确定会议密码错误,则电子设备100不加入当前会议,流程结束。
在又一些实施例中,在无会议密码的情况下,若服务器400确定该会议ID不合法,则电子设备100不加入当前会议,流程结束。
可选地,若电子设备100接入会议A后,电子设备100的用户发现不需要接入会议A或想要退出会议A,则用户可以随时挂断会议A,使得电子设备100退出会议A。例如,用户可以通过点击“挂断”控件来退出会议应用。用户还可以通过语音输入“退出会议”等其他方式退出该会议。本申请实施例对电子设备退出会议的方式不作限定。
可选地,电子设备100可以在S1005a之后,切换为第一天线,也可以在S1007a中切换为第一天线,本申请实施例对此不作限定。
上述图15A所示的方法中,电子设备100和电子设备200分别包括两个天线,通过不同的天线实现不同的发射距离。
在一些实施例中,电子设备100在会议接入过程中可以仅使用第一天线和第二天线中的一个天线,通过调节该天线的发射功率,实现不同的发射距离。同样,电子设备200也可以仅使用第三天线和第四天线中的一个天线,通过调节该天线的发射功率,实现不同的发射距离。
在另一些实施例中,电子设备100和电子设备200分别可以仅具有一个天线,通过调节该天线的发射功率,实现不同的发射距离。例如,电子设备100仅包括第一天线,电子设备200仅包括第三天线。
下面参见图15B,描述本申请实施例提供的另一种会议接入方法。其中,电子设备100为欲接入方,电子设备200为会议中的会议成员,电子设备200参加的当前会议记为会议A。由于不存在会议主席,电子设备200可以是会议A中的任一个电子设备。
在图15B所示的方法中,电子设备100仅包括第一天线,可以通过调节第一天线的发射功率,实现不同的发射距离。例如,第一天线的发射功率包括第一发射功率和第二发射功率,第一发射功率大于第二发射功率。这样,可以认为,第一发射功率下的第一天线为强天线,第二发射功率下的第一天线为弱天线。类似的,电子设备200仅包括第三天线,第三天线的发射功率包括第三发射功率和第四发射功率,第三发射功率大于第四发射功率。这样,可以认为,第三发射功率下的第三天线为强天线,第四发射功率下的第三天线为弱天线。
如图15B所示,该方法包括:
S1001b、电子设备100接收到第一输入,生成随机密钥。
S1002b、电子设备100通过第二发射功率下的第一天线,广播第一消息,第一消息包括会议加入请求、电子设备100的ID和随机密钥。
S1003b、在位于第二发射功率下的第一天线的发射距离内,电子设备200接收到第一消息,获取到会议加入请求、电子设备100的ID和随机密钥,使用随机密钥加密会议ID和会议密码。
S1004b、电子设备200通过第四发射功率下的第三天线,发送第一响应消息,第一响应消息包括电子设备100的ID,以及随机密钥加密会议ID和会议密码后的信息。
S1005b、在位于第四发射功率下的第三天线的发射距离内,电子设备100接收到第一响应消息,使用随机密钥解密,获取到会议ID和会议密码。
S1006b、电子设备200经过预设时长后,将第三天线的第四发射功率切换至第三发射功率。
S1007b、电子设备100通过第一发射功率下的第一天线,通过会议应用为该会议提供 的加密机制,发送第二消息,第二消息包括会议ID、会议密码和电子设备100在会议应用上的帐号。
S1008b、服务器400接收到第二消息,通过会议应用为该会议提供的解密机制,获取到会议ID、会议密码和电子设备100在会议应用上的帐号。
S1009b、服务器400确定会议密码是否正确。
S1010b、若服务器400确定会议密码正确,则电子设备100接通,通过第一发射功率下的第一天线加入会议。
上述图15B所示的方法与图15A所述的方法类似。其中,将图15A中的第一天线替换为图15B中的第一发射功率下的第一天线,将图15A中的第二天线替换为图15B中的第二发射功率下的第一天线,将图15A中的第三天线替换为图15B中的第三发射功率下的第三天线,将图15A中的第四天线替换为图15B中的第四发射功率下的第三天线。在图15A所示的方法中,通过切换不同天线实现不同的发射距离,在图15B所示的方法中,通过调节同一个天线的发射功率实现不同的发射距离。
因此,S1000b-S1010b的内容可以参照S1000a-S1010a的描述,此处不再赘述。
类似的,上述方法可以任意组合。例如,电子设备100可以包括强天线和弱天线(第一天线和第二天线),电子设备200仅包括第三天线,通过第三天线的调节发射功率,实现不同的发射距离。再例如,电子设备200可以包括强天线和弱天线(第三天线和第四天线),电子设备100仅包括第一天线,通过调节第一天线的发射功率,实现不同的发射距离。本申请实施例对此不作限定。
需要说明的是,上述电子设备100仅为示意性举例,并非限定只有1个电子设备接入电子设备200作为会议主席的会议A。本申请对接入会议A的电子设备的个数不作限定。
在一些实施例中,会议A的参与成员除了电子设备200之外,还可以有其他一个或多个电子设备,本申请对此不作限定。
通过图15A和图15B所示的方法,欲接入方的电子设备能够基于超短距通信方式,与会议中的任一个电子设备通过相靠近或碰一碰这样的自然交互方式,加入当前会议中。
本申请实施例提供的会议接入方法能够在无会议主席的会议场景下,降低在会议进行中添加新的会议参与成员时操作的复杂度,方便欲接入方的电子设备快速方便地接入当前会议。
根据该方法,电子设备之间能够通过靠近或碰一碰之类的自然交互方式,接入会议。本申请实施例提供的会议接入方法操作简单,耗时较短,用户体验较佳。另外,该方法能够降低在会议创建和会议进行中添加会议成员时操作的复杂度,降低误触的可能性。同时,由于超短距通信方式的通信距离很短,因此通信双方能够建立安全可靠的数据交互,保证数据传输的安全性。
此外,超短距通信方式是基于传统无线通信方式,例如传统Wi-Fi或传统蓝牙技术的一种通信方式,因此,在传统Wi-Fi或传统蓝牙通信方式的基础上进行较小的改动即可实现超短距通信。电子设备的超短距通信能力可以作为基础能力,并提供API接口,第三方应用调用该接口来使用超短距通信能力。也就是说,超短距通信方式无需新增芯片或器件等硬件或者大幅度改造现有硬件。
需要说明的是,本申请上述各个实施例的全部或部分,均可以自由地、任意地组合。 组合后的技术方案也在本申请的范围之内。
可以理解的是,为了实现上述功能,电子设备包含了执行各个功能相应的硬件和/或软件模块。结合本文中所公开的实施例描述的各示例的算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。本领域技术人员可以结合实施例对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
本实施例可以根据上述方法示例对电子设备进行功能模块的划分。例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块可以采用硬件的形式实现。需要说明的是,本实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
例如,在采用对应各个功能划分各个功能模块的情况下,图16是除了上述实施例中涉及的电子设备1600的一种可能的组成示意图。如图所示,该电子设备1600可以包括收发模块1601和处理模块1602。
在一些实施例中,该电子设备可以为电子设备200。其中,收发模块1601可以用于支持电子设备1600执行上述实施例中图8A-图8C中的S803a-S804a、S808a-S810a、S803b-S804b、S808b-S810b、S803c-S804c和S808c-S810c;图13A-图13C中的912a-S914a、S912b-S914b、S912c-S914c;图15A-图15B中的S1003a-S1004a、S1003b-S1004b;和/或上述方法实施例中电子设备200执行的其他动作或功能。处理模块1602可以用于支持电子设备1600执行上述实施例中图8A-图8C中的S803a、S803b和S803c;图13A-图13C中的912a、S912b、S912c;图15A-图15B中的S1006a、S1006b;和/或上述方法实施例中电子设备200执行的其他动作或功能。
在另一些实施例中,该电子设备可以为电子设备100。其中,收发模块1601可以用于支持电子设备1600执行上述实施例中图8A-图8C中的S801a-S802a、S805a-S807a、S801b-S802b、S805b-S807b、S801c-S802c、S805c-S807c;图13A-图13C中的901a-S902a、S905a-S907a、S901b-S902b、S905b-S907b、S901c-S902c、S905c-S907c;图15A-图15B中的S1001a-S1002a、S1005a、S1007a、S1001b-S1002b、S1005b、S1007b;和/或上述方法实施例中电子设备100执行的其他动作或功能。处理模块1602可以用于支持电子设备1600执行上述实施例中图8A-图8C中的S805a-S806a、S814a、S805b-S806b、S814b、S805c-S806c、S814c;图13A-图13C中的S905a-S906a、S916a、S905b-S906b、S916b、S905c-S906c、S916c;和/或上述方法实施例中电子设备100执行的其他动作或功能。
在另一些实施例中,该电子设备可以为电子设备300。其中,收发模块1601可以用于支持电子设备1600执行上述实施例中图13A-图13C中的S903a-S904a、S908a-S909a、S903b-S904b、S908b-S909b、S903c-S904c、S908c-S909c;和/或上述方法实施例中电子设备300执行的其他动作或功能。处理模块1602可以用于支持电子设备1600执行上述实施例中图13A-图13C中的S908a-S909a、S908b-S909b、S908c-S909c;和/或上述方法实施例中电子设备300执行的其他动作或功能。
其中,上述方法实施例涉及的各步骤的所有相关内容均可以援引到对应功能模块的功能描述,在此不再赘述。
在本申请实施例中,该电子设备1600以采用集成的方式划分各个功能模块的形式来呈现。这里的“模块”可以指特定ASIC,电路,执行一个或多个软件或固件程序的处理器和存储器,继承逻辑电路,和/或其他可以提供上述功能的器件。在一个简单的实施例中,本领域的技术人员可以想到该电子设备1600可以采用图3所示的形式。
比如,图3中的处理器210可以通过调用内部存储器221中存储的计算机指令,使得电子设备1600执行上述方法实施例中的电子设备执行的动作。
可选地,本申请的实施例还提供了一种计算机可读存储介质,该计算机可读存储介质中存储有计算机指令,当该计算机指令在电子设备上运行时,使得电子设备执行上述相关方法步骤实现上述实施例中的会议接入方法。例如,该电子设备可以是上述方法实施例中的电子设备100。或者,该电子设备可以是上述方法实施例中的电子设备200。或者,该电子设备可以是上述方法实施例中的电子设备300。
可选地,本申请的实施例还提供了一种计算机程序产品,当该计算机程序产品在计算机上运行时,使得计算机执行上述相关步骤,以实现上述实施例中电子设备执行的会议接入方法。例如,该电子设备可以是上述方法实施例中的电子设备100。或者,该电子设备可以是上述方法实施例中的电子设备200。或者,该电子设备可以是上述方法实施例中的电子设备300。
可选地,本申请的实施例还提供了一种电子设备,这个电子设备具体可以是芯片,组件,模块,或片上系统。该电子设备可包括相连的处理器和存储器;其中,存储器用于存储计算机指令,当装置运行时,处理器可执行存储器存储的计算机指令,以使芯片执行上述各方法实施例中电子设备执行的会议接入方法。例如,该电子设备可以是上述方法实施例中的电子设备100。或者,该电子设备可以是上述方法实施例中的电子设备200。或者,该电子设备可以是上述方法实施例中的电子设备300。
可选地,本申请的实施例还提供了一种会议接入系统,该会议接入系统包括电子设备100、电子设备200和电子设备300。该会议接入系统中的电子设备100、电子设备200和电子设备300可以分别执行上述各实施例中电子设备100、电子设备200和电子设备300所执行的会议接入方法。例如,该会议接入系统的架构示意图可以参见图1。
其中,本申请实施例提供的电子设备、计算机可读存储介质、计算机程序产品、芯片或片上系统均用于执行上文所提供的对应的方法,因此,其所能达到的有益效果可参考上文所提供的对应的方法中的有益效果,此处不再赘述。
通过以上实施方式的描述,所属领域的技术人员可以了解到,为描述的方便和简洁,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将装置的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。
在本申请所提供的几个实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个装置,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是一个物理单元或多个物理单元,即可以位于一个地方,或者也可以分布到多个不同地方。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个可读取存储介质中。基于这样的理解,本申请实施例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该软件产品存储在一个存储介质中,包括若干指令用以使得一个设备(可以是单片机,芯片等)或处理器(processor)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上内容,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。
Claims (44)
- 一种第一电子设备,所述第一电子设备安装有第一会议应用,所述第一电子设备未通过所述第一会议应用接入会议,其特征在于,所述第一电子设备包括:SIM卡;处理器;存储器;第一天线,所述第一天线的发射距离为第一距离,所述第一距离大于预设的第一安全距离;第二天线,所述第二天线的发射距离为第二距离,所述第二距离小于或等于所述预设的第一安全距离;以及计算机程序,其中所述计算机程序存储在所述存储器上,当所述计算机程序被所述处理器执行时,使得所述第一电子设备执行以下步骤:接收到第一输入;响应于所述第一输入,通过所述第一天线,广播第一消息;所述第一消息包括会议加入请求和所述第一电子设备的标识;在距离第二电子设备的第四距离内,接收到第一响应消息;所述第一响应消息包括随机密钥和所述第二电子设备的标识;所述第一响应消息与所述第一消息相关联;所述第二电子设备通过所述第一会议应用接入所述会议,所述第二电子设备在所述第一会议应用上的帐号在所述会议中为会议主席;接收到用于指示加入所述会议的第二输入;响应于所述第二输入,使用所述随机密钥加密所述第一电子设备的SIM卡号码以及所述第一电子设备在所述第一会议应用上的帐号,得到加密信息;通过所述第二天线,发送第二消息;所述第二消息包括所述第二电子设备的标识以及所述加密信息;接收到所述第一会议应用的呼叫电话;在接通所述呼叫电话后,加入所述第二电子设备参加的会议;其中,所述第四距离小于或等于预设的第二安全距离;所述预设的第二安全距离为所述第二电子设备与所述第一电子设备交换秘密信息的一个安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 根据权利要求1所述的第一电子设备,其特征在于,所述第一输入为一个用户输入,所述第二输入为一个用户输入。
- 根据权利要求1或2所述的第一电子设备,其特征在于,所述第一电子设备还包括一个无线通信模块,所述第一天线和所述第二天线都连接所述无线通信模块。
- 根据权利要求3所述的第一电子设备,其特征在于,所述无线通信模块包括一个Wi-Fi芯片、一个蓝牙芯片或一个Zigbee芯片;所述第一天线和所述第二天线都连接所述Wi-Fi芯片、所述蓝牙芯片和所述Zigbee芯片中的一个。
- 一种第一电子设备,所述第一电子设备安装有第一会议应用,所述第一电子设备未通过所述第一会议应用接入会议,其特征在于,所述第一电子设备包括:SIM卡;处理器;存储器;第一天线,所述第一天线的发射距离为第一距离,所述第一距离大于预设的第一安全距离;第二天线,所述第二天线的发射距离为第二距离,所述第二距离小于或等于所述预设的第一安全距离;以及计算机程序,其中所述计算机程序存储在所述存储器上,当所述计算机程序被所述处理器执行时,使得所述第一电子设备执行以下步骤:接收到第一输入;响应于所述第一输入,通过所述第二天线,广播第一消息;所述第一消息包括会议加入请求和所述第一电子设备的标识;在距离第二电子设备的第四距离内,接收到第一响应消息;所述第一响应消息包括随机密钥和所述第二电子设备的标识;所述第一响应消息与所述第一消息相关联;所述第二电子设备通过所述第一会议应用接入所述会议,所述第二电子设备在所述第一会议应用上的帐号在所述会议中为会议主席;响应于所述第一响应消息,使用所述随机密钥加密所述第一电子设备的SIM卡号码以及所述第一电子设备在所述第一会议应用上的帐号,得到加密信息;通过所述第一天线,发送第二消息;所述第二消息包括所述第二电子设备的标识以及所述加密信息;接收到所述第一会议应用的呼叫电话;在接通所述呼叫电话后,加入所述第二电子设备参加的会议;其中,所述第四距离小于或等于预设的第二安全距离;所述预设的第二安全距离为所述第二电子设备与所述第一电子设备交换秘密信息的一个安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 根据权利要求5所述的第一电子设备,其特征在于,所述SIM卡包括嵌入式SIM卡、卡片式SIM卡和eSIM卡中的至少一种。
- 一种第一电子设备,所述第一电子设备安装有第一会议应用,所述第一电子设备未通过所述第一会议应用接入会议,其特征在于,所述第一电子设备包括:SIM卡;处理器;存储器;第一天线,所述第一天线在第一发射功率下的发射距离为第一距离,所述第一距离大于预设的第一安全距离;所述第一天线在第二发射功率下的发射距离为第二距离,所述第二距离小于或等于所述预设的第一安全距离;所述第一发射功率大于所述第二发射功率;以及计算机程序,其中所述计算机程序存储在所述存储器上,当所述计算机程序被所述处理器执行时,使得所述第一电子设备执行以下步骤:接收到第一输入;响应于所述第一输入,通过所述第一发射功率下的所述第一天线,广播第一消息;所述第一消息包括会议加入请求和所述第一电子设备的标识;在距离第二电子设备的第四距离内,接收到第一响应消息;所述第一响应消息包括随机密钥和所述第二电子设备的标识;所述第一响应消息与所述第一消息相关联;所述第二电子设备通过所述第一会议应用接入所述会议,所述第二电子设备在所述第一会议应用上的帐号在所述会议中为会议主席;接收到用于指示加入所述会议的第二输入;响应于所述第二输入,使用所述随机密钥加密所述第一电子设备的SIM卡号码以及所述第一电子设备在所述第一会议应用上的帐号,得到加密信息;通过所述第二发射功率下的所述第一天线,发送第二消息;所述第二消息包括所述第二电子设备的标识以及所述加密信息;接收到所述第一会议应用的呼叫电话;在接通所述呼叫电话后,加入所述第二电子设备参加的会议;其中,所述第四距离小于或等于预设的第二安全距离;所述预设的第二安全距离为所述第二电子设备与所述第一电子设备交换秘密信息的一个安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 根据权利要求7所述的第一电子设备,其特征在于,所述第一电子设备还包括一个无线通信模块,所述无线通信模块包括一个Wi-Fi芯片、一个蓝牙芯片或一个Zigbee芯片;所述第一天线连接所述Wi-Fi芯片、所述蓝牙芯片和所述Zigbee芯片中的一个。
- 一种第一电子设备,所述第一电子设备安装有第一会议应用,所述第一电子设备未通过所述第一会议应用接入会议,其特征在于,所述第一电子设备包括:SIM卡;处理器;存储器;第一天线,所述第一天线在第一发射功率下的发射距离为第一距离,所述第一距离大于预设的第一安全距离;所述第一天线在第二发射功率下的发射距离为第二距离,所述第二距离小于或等于所述预设的第一安全距离;所述第一发射功率大于所述第二发射功率;以及计算机程序,其中所述计算机程序存储在所述存储器上,当所述计算机程序被所述处理器执行时,使得所述第一电子设备执行以下步骤:接收到第一输入;响应于所述第一输入,通过所述第二发射功率下的所述第一天线,广播第一消息;所述第一消息包括会议加入请求和所述第一电子设备的标识;在距离第二电子设备的第四距离内,接收到第一响应消息;所述第一响应消息包括随机密钥和所述第二电子设备的标识;所述第一响应消息与所述第一消息相关联;所述第二电子设备通过所述第一会议应用接入所述会议,所述第二电子设备在所述第一会议应用上的帐号在所述会议中为会议主席;响应于所述第一响应消息,使用所述随机密钥加密所述第一电子设备的SIM卡号码以及所述第一电子设备在所述第一会议应用上的帐号,得到加密信息;通过所述第一发射功率下的所述第一天线,发送第二消息;所述第二消息包括所述第二电子设备的标识以及所述加密信息;接收到所述第一会议应用的呼叫电话;在接通所述呼叫电话后,加入所述第二电子设备参加的会议;其中,所述第四距离小于或等于预设的第二安全距离;所述预设的第二安全距离为所述第二电子设备与所述第一电子设备交换秘密信息的一个安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 一种第一电子设备,所述第一电子设备安装有第一会议应用,所述第一电子设备未通过所述第一会议应用接入会议,其特征在于,所述第一电子设备包括:SIM卡;处理器;存储器;第一天线,所述第一天线的发射距离为第一距离,所述第一距离大于预设的第一安全距离;第二天线,所述第二天线的发射距离为第二距离,所述第二距离小于或等于所述预设的第一安全距离;以及计算机程序,其中所述计算机程序存储在所述存储器上,当所述计算机程序被所述处理器执行时,使得所述第一电子设备执行以下步骤:接收到第一输入;响应于所述第一输入,生成随机密钥,通过所述第二天线,广播第一消息;所述第一消息包括会议加入请求、所述第一电子设备的标识和所述随机密钥;在距离第二电子设备的第四距离内,接收到第一响应消息;所述第一响应消息包括加密信息;所述第一响应消息与所述第一消息相关联;所述第二电子设备通过所述第一会议应用接入所述会议;使用所述随机密钥解密所述加密信息,获取到所述会议的会议标识和会议密码;通过所述第一天线,向所述第一会议应用的服务器发送第二消息;所述第二消息包括通过所述第一会议应用的加密机制,加密所述会议标识、所述会议密码和所述第一电子设备在所述第一会议应用上的帐号后的信息;接收到所述第一会议应用的呼叫电话;在接通所述呼叫电话后,加入所述会议;其中,所述第四距离小于或等于预设的第二安全距离;所述预设的第二安全距离为所述第二电子设备与所述第一电子设备交换秘密信息的一个安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 一种第一电子设备,所述第一电子设备安装有第一会议应用,所述第一电子设备未通过所述第一会议应用接入会议,其特征在于,所述第一电子设备包括:SIM卡;处理器;存储器;第一天线,所述第一天线在第一发射功率下的发射距离为第一距离,所述第一距离大于预设的第一安全距离;所述第一天线在第二发射功率下的发射距离为第二距离,所述第二距离小于或等于所述预设的第一安全距离;所述第一发射功率大于所述第二发射功率;以及计算机程序,其中所述计算机程序存储在所述存储器上,当所述计算机程序被所 述处理器执行时,使得所述第一电子设备执行以下步骤:接收到第一输入;响应于所述第一输入,生成随机密钥,通过所述第二发射功率下的所述第一天线,广播第一消息;所述第一消息包括会议加入请求、所述第一电子设备的标识和所述随机密钥;在距离第二电子设备的第四距离内,接收到第一响应消息;所述第一响应消息包括加密信息;所述第一响应消息与所述第一消息相关联;所述第二电子设备通过所述第一会议应用接入所述会议;使用所述随机密钥解密所述加密信息,获取到所述会议的会议标识和会议密码;通过所述第一发射功率下的所述第一天线,向所述第一会议应用的服务器发送第二消息;所述第二消息包括通过所述第一会议应用的加密机制,加密所述会议标识、所述会议密码和所述第一电子设备在所述第一会议应用上的帐号后的信息;接收到所述第一会议应用的呼叫电话;在接通所述呼叫电话后,加入所述会议;其中,所述第四距离小于或等于预设的第二安全距离;所述预设的第二安全距离为所述第二电子设备与所述第一电子设备交换秘密信息的一个安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 一种第二电子设备,所述第二电子设备安装有第一会议应用,所述第二电子设备通过所述第一会议应用接入会议,所述第二电子设备在所述第一会议应用上的帐号在所述会议中为会议主席;其特征在于,所述第二电子设备包括:处理器;存储器;第三天线,所述第三天线的发射距离为第三距离,所述第三距离大于预设的第二安全距离;第四天线,所述第四天线的发射距离为第四距离,所述第四距离小于或等于所述预设的第二安全距离;以及计算机程序,其中所述计算机程序存储在所述存储器上,当所述计算机程序被所述处理器执行时,使得所述第二电子设备执行以下步骤:在距离第一电子设备的第一距离内,接收到来自所述第一电子设备的第一消息;所述第一消息包括会议加入请求和所述第一电子设备的标识;响应于所述第一消息,生成随机密钥;通过所述第四天线,发送第一响应消息;所述第一响应消息包括所述随机密钥和所述第二电子设备的标识;在距离所述第一电子设备的第二距离内,接收到来自所述第一电子设备的第二消息;所述第二消息包括所述第二电子设备的标识以及加密信息;使用所述随机密钥解密所述加密信息,获取到所述第一电子设备的SIM卡号码以及所述第一电子设备在所述第一会议应用上的帐号;接收到用于指示同意加入所述会议的第三输入;通过所述第三天线,向所述第一会议应用的服务器发送第三消息;所述第三消息包括通过所述第一会议应用的加密机制,加密所述第一电子设备的SIM卡号码、所述第一电子 设备在所述第一会议应用上的帐号、所述第二电子设备在所述第一会议应用上的帐号和所述会议的会议标识后的信息;其中,所述第二距离小于或等于预设的第一安全距离;所述第一距离大于所述预设的第一安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离;所述预设的第二安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 根据权利要求12所述的第二电子设备,其特征在于,所述第三输入为一个用户输入。
- 根据权利要求12或13所述的第二电子设备,其特征在于,所述第二电子设备还包括一个无线通信模块,所述第三天线和所述第四天线都连接所述无线通信模块。
- 根据权利要求14所述的第二电子设备,其特征在于,所述无线通信模块包括一个Wi-Fi芯片、一个蓝牙芯片或一个Zigbee芯片;所述第三天线和所述第四天线都连接所述Wi-Fi芯片、所述蓝牙芯片和所述Zigbee芯片中的一个。
- 一种第二电子设备,所述第二电子设备安装有第一会议应用,所述第二电子设备通过所述第一会议应用接入会议,所述第二电子设备在所述第一会议应用上的帐号在所述会议中为会议主席;其特征在于,所述第二电子设备包括:处理器;存储器;第三天线,所述第三天线的发射距离为第三距离,所述第三距离大于预设的第二安全距离;第四天线,所述第四天线的发射距离为第四距离,所述第四距离小于或等于所述预设的第二安全距离;以及计算机程序,其中所述计算机程序存储在所述存储器上,当所述计算机程序被所述处理器执行时,使得所述第二电子设备执行以下步骤:在距离第一电子设备的第二距离内,接收到来自所述第一电子设备的第一消息;所述第一消息包括会议加入请求和所述第一电子设备的标识;响应于所述第一消息,生成随机密钥;通过所述第四天线,发送第一响应消息;所述第一响应消息包括所述随机密钥和所述第二电子设备的标识;在距离第一电子设备的第一距离内,接收到来自所述第一电子设备的第二消息;所述第二消息包括所述第二电子设备的标识以及加密信息;使用所述随机密钥解密所述加密信息,获取到所述第一电子设备的SIM卡号码以及所述第一电子设备在所述第一会议应用上的帐号;接收到用于指示同意加入所述会议的第三输入;通过所述第三天线,向所述第一会议应用的服务器发送第三消息;所述第三消息包括通过所述第一会议应用的加密机制,加密所述第一电子设备的SIM卡号码、所述第一电子设备在所述第一会议应用上的帐号、所述第二电子设备在所述第一会议应用上的帐号和所述会议的会议标识后的信息;其中,所述第二距离小于或等于预设的第一安全距离;所述第一距离大于所述预设的 第一安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离;所述预设的第二安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 一种第二电子设备,所述第二电子设备安装有第一会议应用,所述第二电子设备通过所述第一会议应用接入会议,所述第二电子设备在所述第一会议应用上的帐号在所述会议中为会议主席;其特征在于,所述第二电子设备包括:处理器;存储器;第三天线,所述第三天线在第三发射功率下的发射距离为第三距离,所述第三距离大于预设的第二安全距离;所述第三天线在第四发射功率下的发射距离为第四距离,所述第四距离小于或等于所述预设的第二安全距离;所述第三发射功率大于所述第四发射功率;以及计算机程序,其中所述计算机程序存储在所述存储器上,当所述计算机程序被所述处理器执行时,使得所述第二电子设备执行以下步骤:在距离第一电子设备的第一距离内,接收到来自所述第一电子设备的第一消息;所述第一消息包括会议加入请求和所述第一电子设备的标识;响应于所述第一消息,生成随机密钥;通过所述第四发射功率下的所述第三天线,发送第一响应消息;所述第一响应消息包括所述随机密钥和所述第二电子设备的标识;在距离所述第一电子设备的第二距离内,接收到来自所述第一电子设备的第二消息;所述第二消息包括所述第二电子设备的标识以及加密信息;使用所述随机密钥解密所述加密信息,获取到所述第一电子设备的SIM卡号码以及所述第一电子设备在所述第一会议应用上的帐号;接收到用于指示同意加入所述会议的第三输入;通过所述第三发射功率下的所述第三天线,向所述第一会议应用的服务器发送第三消息;所述第三消息包括通过所述第一会议应用的加密机制,加密所述第一电子设备的SIM卡号码、所述第一电子设备在所述第一会议应用上的帐号、所述第二电子设备在所述第一会议应用上的帐号和所述会议的会议标识后的信息;其中,所述第二距离小于或等于预设的第一安全距离;所述第一距离大于所述预设的第一安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离;所述预设的第二安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 根据权利要求17所述的第二电子设备,其特征在于,所述第二电子设备还包括一个无线通信模块,所述无线通信模块包括一个Wi-Fi芯片、一个蓝牙芯片或一个Zigbee芯片;所述第三天线连接所述Wi-Fi芯片、所述蓝牙芯片和所述Zigbee芯片中的一个。
- 一种第二电子设备,所述第二电子设备安装有第一会议应用,所述第二电子设备通过所述第一会议应用接入会议,所述第二电子设备在所述第一会议应用上的帐号在所述会议中为会议主席;其特征在于,所述第二电子设备包括:处理器;存储器;第三天线,所述第三天线在第三发射功率下的发射距离为第三距离,所述第三距离大于预设的第二安全距离;所述第三天线在第四发射功率下的发射距离为第四距离,所述第四距离小于或等于所述预设的第二安全距离;所述第三发射功率大于所述第四发射功率;以及计算机程序,其中所述计算机程序存储在所述存储器上,当所述计算机程序被所述处理器执行时,使得所述第二电子设备执行以下步骤:在距离第一电子设备的第二距离内,接收到来自所述第一电子设备的第一消息;所述第一消息包括会议加入请求和所述第一电子设备的标识;响应于所述第一消息,生成随机密钥;通过所述第四发射功率下的所述第三天线,发送第一响应消息;所述第一响应消息包括所述随机密钥和所述第二电子设备的标识;在距离所述第一电子设备的第一距离内,接收到来自所述第一电子设备的第二消息;所述第二消息包括所述第二电子设备的标识以及加密信息;使用所述随机密钥解密所述加密信息,获取到所述第一电子设备的SIM卡号码以及所述第一电子设备在所述第一会议应用上的帐号;接收到用于指示同意加入所述会议的第三输入;通过所述第三发射功率下的所述第三天线,向所述第一会议应用的服务器发送第三消息;所述第三消息包括通过所述第一会议应用的加密机制,加密所述第一电子设备的SIM卡号码、所述第一电子设备在所述第一会议应用上的帐号、所述第二电子设备在所述第一会议应用上的帐号和所述会议的会议标识后的信息;其中,所述第二距离小于或等于预设的第一安全距离;所述第一距离大于所述预设的第一安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离;所述预设的第二安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 一种第二电子设备,所述第二电子设备安装有第一会议应用,所述第二电子设备通过所述第一会议应用接入会议,所述第二电子设备在所述第一会议应用上的帐号在所述会议中为非会议主席的会议成员;其特征在于,所述第二电子设备包括:处理器;存储器;第三天线,所述第三天线的发射距离为第三距离,所述第三距离大于预设的第二安全距离;第四天线,所述第四天线的发射距离为第四距离,所述第四距离小于或等于所述预设的第二安全距离;以及计算机程序,其中所述计算机程序存储在所述存储器上,当所述计算机程序被所述处理器执行时,使得所述第二电子设备执行以下步骤:在距离第一电子设备的第一距离内,接收到来自所述第一电子设备的第一消息;所述第一消息包括会议加入请求和所述第一电子设备的标识;响应于所述第一消息,生成随机密钥;通过所述第四天线,发送第一响应消息;所述第一响应消息包括所述随机密钥和所述第二电子设备的标识;在距离所述第一电子设备的第二距离内,接收到来自所述第一电子设备的第二消息;所述第二消息包括所述第二电子设备的标识以及加密信息;使用所述随机密钥解密所述加密信息,获取到所述第一电子设备的SIM卡号码以及所述第一电子设备在所述第一会议应用上的帐号;通过所述第三天线,向所述第一会议应用的服务器发送第三消息;所述第三消息包括通过所述第一会议应用的加密机制,加密所述第一电子设备的SIM卡号码、所述第一电子设备在所述第一会议应用上的帐号、所述第二电子设备在所述第一会议应用上的帐号和所述会议的会议标识后的信息;其中,所述第二距离小于或等于预设的第一安全距离;所述第一距离大于所述预设的第一安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离;所述预设的第二安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 一种第二电子设备,所述第二电子设备安装有第一会议应用,所述第二电子设备通过所述第一会议应用接入会议,所述第二电子设备在所述第一会议应用上的帐号在所述会议中为非会议主席的会议成员;其特征在于,所述第二电子设备包括:处理器;存储器;第三天线,所述第三天线的发射距离为第三距离,所述第三距离大于预设的第二安全距离;第四天线,所述第四天线的发射距离为第四距离,所述第四距离小于或等于所述预设的第二安全距离;以及计算机程序,其中所述计算机程序存储在所述存储器上,当所述计算机程序被所述处理器执行时,使得所述第二电子设备执行以下步骤:在距离第一电子设备的第二距离内,接收到来自所述第一电子设备的第一消息;所述第一消息包括会议加入请求和所述第一电子设备的标识;响应于所述第一消息,生成随机密钥;通过所述第四天线,发送第一响应消息;所述第一响应消息包括所述随机密钥和所述第二电子设备的标识;在距离所述第一电子设备的第一距离内,接收到来自所述第一电子设备的第二消息;所述第二消息包括所述第二电子设备的标识以及加密信息;使用所述随机密钥解密所述加密信息,获取到所述第一电子设备的SIM卡号码以及所述第一电子设备在所述第一会议应用上的帐号;通过所述第三天线,向所述第一会议应用的服务器发送第三消息;所述第三消息包括通过所述第一会议应用的加密机制,加密所述第一电子设备的SIM卡号码、所述第一电子设备在所述第一会议应用上的帐号、所述第二电子设备在所述第一会议应用上的帐号和所述会议的会议标识后的信息;其中,所述第二距离小于或等于预设的第一安全距离;所述第一距离大于所述预设的第一安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离;所述预设的第二安全距离为所述第一电子设备与所述第二电子设 备交换秘密信息的一个安全距离。
- 一种第二电子设备,所述第二电子设备安装有第一会议应用,所述第二电子设备通过所述第一会议应用接入会议,所述第二电子设备在所述第一会议应用上的帐号在所述会议中为非会议主席的会议成员;其特征在于,所述第二电子设备包括:处理器;存储器;第三天线,所述第三天线在第三发射功率下的发射距离为第三距离,所述第三距离大于预设的第二安全距离;所述第三天线在第四发射功率下的发射距离为第四距离,所述第四距离小于或等于所述预设的第二安全距离;所述第三发射功率大于所述第四发射功率;以及计算机程序,其中所述计算机程序存储在所述存储器上,当所述计算机程序被所述处理器执行时,使得所述第二电子设备执行以下步骤:在距离第一电子设备的第一距离内,接收到来自所述第一电子设备的第一消息;所述第一消息包括会议加入请求和所述第一电子设备的标识;响应于所述第一消息,生成随机密钥;通过所述第四发射功率下的第三天线,发送第一响应消息;所述第一响应消息包括所述随机密钥和所述第二电子设备的标识;在距离所述第一电子设备的第二距离内,接收到来自所述第一电子设备的第二消息;所述第二消息包括所述第二电子设备的标识以及加密信息;使用所述随机密钥解密所述加密信息,获取到所述第一电子设备的SIM卡号码以及所述第一电子设备在所述第一会议应用上的帐号;通过所述第三发射功率下的第三天线,向所述第一会议应用的服务器发送第三消息;所述第三消息包括通过所述第一会议应用的加密机制,加密所述第一电子设备的SIM卡号码、所述第一电子设备在所述第一会议应用上的帐号、所述第二电子设备在所述第一会议应用上的帐号和所述会议的会议标识后的信息;其中,所述第二距离小于或等于预设的第一安全距离;所述第一距离大于所述预设的第一安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离;所述预设的第二安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 一种第二电子设备,所述第二电子设备安装有第一会议应用,所述第二电子设备通过所述第一会议应用接入会议,所述第二电子设备在所述第一会议应用上的帐号在所述会议中为非会议主席的会议成员;其特征在于,所述第二电子设备包括:处理器;存储器;第三天线,所述第三天线在第三发射功率下的发射距离为第三距离,所述第三距离大于预设的第二安全距离;所述第三天线在第四发射功率下的发射距离为第四距离,所述第四距离小于或等于所述预设的第二安全距离;所述第三发射功率大于所述第四发射功率;以及计算机程序,其中所述计算机程序存储在所述存储器上,当所述计算机程序被所述处理器执行时,使得所述第二电子设备执行以下步骤:在距离第一电子设备的第二距离内,接收到来自所述第一电子设备的第一消息;所述 第一消息包括会议加入请求和所述第一电子设备的标识;响应于所述第一消息,生成随机密钥;通过所述第四发射功率下的第三天线,发送第一响应消息;所述第一响应消息包括所述随机密钥和所述第二电子设备的标识;在距离所述第一电子设备的第一距离内,接收到来自所述第一电子设备的第二消息;所述第二消息包括所述第二电子设备的标识以及加密信息;使用所述随机密钥解密所述加密信息,获取到所述第一电子设备的SIM卡号码以及所述第一电子设备在所述第一会议应用上的帐号;通过所述第三发射功率下的第三天线,向所述第一会议应用的服务器发送第三消息;所述第三消息包括通过所述第一会议应用的加密机制,加密所述第一电子设备的SIM卡号码、所述第一电子设备在所述第一会议应用上的帐号、所述第二电子设备在所述第一会议应用上的帐号和所述会议的会议标识后的信息;其中,所述第二距离小于或等于预设的第一安全距离;所述第一距离大于所述预设的第一安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离;所述预设的第二安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 一种第二电子设备,所述第二电子设备安装有第一会议应用,所述第二电子设备通过所述第一会议应用接入会议;其特征在于,所述第二电子设备包括:处理器;存储器;第三天线,所述第三天线的发射距离为第三距离,所述第三距离大于预设的第二安全距离;第四天线,所述第四天线的发射距离为第四距离,所述第四距离小于或等于所述预设的第二安全距离;以及计算机程序,其中所述计算机程序存储在所述存储器上,当所述计算机程序被所述处理器执行时,使得所述第二电子设备执行以下步骤:在距离第一电子设备的第二距离内,接收到来自所述第一电子设备的第一消息;所述第一消息包括会议加入请求、所述第一电子设备的标识和随机密钥;通过所述第四天线,发送第一响应消息;所述第一响应消息包括加密信息;所述加密信息为使用所述随机密钥对所述会议的会议标识和会议密码加密后的信息,或者所述加密信息为使用所述随机密钥对所述会议的会议标识加密后的信息;在经过预设时长后,切换至所述第三天线;其中,所述第二距离小于或等于预设的第一安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离;所述预设的第二安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 一种第二电子设备,所述第二电子设备安装有第一会议应用,所述第二电子设备通过所述第一会议应用接入会议;其特征在于,所述第二电子设备包括:处理器;存储器;第三天线,所述第三天线在第三发射功率下的发射距离为第三距离,所述第三距离大于预设的第二安全距离;所述第三天线在第四发射功率下的发射距离为第四距离,所述第四距离小于或等于所述预设的第二安全距离;所述第三发射功率大于所述第四发射功率;以及计算机程序,其中所述计算机程序存储在所述存储器上,当所述计算机程序被所述处理器执行时,使得所述第二电子设备执行以下步骤:在距离第一电子设备的第二距离内,接收到来自所述第一电子设备的第一消息;所述第一消息包括会议加入请求、所述第一电子设备的标识和随机密钥;通过所述第四发射功率下的所述第三天线,发送第一响应消息;所述第一响应消息包括加密信息;所述加密信息为使用所述随机密钥对所述会议的会议标识和会议密码加密后的信息,或者所述加密信息为使用所述随机密钥对所述会议的会议标识加密后的信息;在经过预设时长后,将所述第三天线的发射功率调整为所述第三发射功率;其中,所述第二距离小于或等于预设的第一安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离;所述预设的第二安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 一种会议接入方法,应用于第一电子设备,所述第一电子设备安装有第一会议应用,所述第一电子设备未通过所述第一会议应用接入会议,所述第一电子设备包括:SIM卡;第一天线,所述第一天线的发射距离为第一距离,所述第一距离大于预设的第一安全距离;第二天线,所述第二天线的发射距离为第二距离,所述第二距离小于或等于所述预设的第一安全距离;所述方法包括:接收到第一输入;响应于所述第一输入,通过所述第一天线,广播第一消息;所述第一消息包括会议加入请求和所述第一电子设备的标识;在距离第二电子设备的第四距离内,接收到第一响应消息;所述第一响应消息包括随机密钥和所述第二电子设备的标识;所述第一响应消息与所述第一消息相关联;所述第二电子设备通过所述第一会议应用接入所述会议,所述第二电子设备在所述第一会议应用上的帐号在所述会议中为会议主席;接收到用于指示加入所述会议的第二输入;响应于所述第二输入,使用所述随机密钥加密所述第一电子设备的SIM卡号码以及所述第一电子设备在所述第一会议应用上的帐号,得到加密信息;通过所述第二天线,发送第二消息;所述第二消息包括所述第二电子设备的标识以及所述加密信息;接收到所述第一会议应用的呼叫电话;在接通所述呼叫电话后,加入所述第二电子设备参加的会议;其中,所述第四距离小于或等于预设的第二安全距离;所述预设的第二安全距离为所述第二电子设备与所述第一电子设备交换秘密信息的一个安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 一种会议接入方法,应用于第一电子设备,所述第一电子设备安装有第一会议应用,所述第一电子设备未通过所述第一会议应用接入会议,所述第一电子设备包括:SIM卡;第一天线,所述第一天线的发射距离为第一距离,所述第一距离大于预设的第一安全距离; 第二天线,所述第二天线的发射距离为第二距离,所述第二距离小于或等于所述预设的第一安全距离;所述方法包括:接收到第一输入;响应于所述第一输入,通过所述第二天线,广播第一消息;所述第一消息包括会议加入请求和所述第一电子设备的标识;在距离第二电子设备的第四距离内,接收到第一响应消息;所述第一响应消息包括随机密钥和所述第二电子设备的标识;所述第一响应消息与所述第一消息相关联;所述第二电子设备通过所述第一会议应用接入所述会议,所述第二电子设备在所述第一会议应用上的帐号在所述会议中为会议主席;响应于所述第一响应消息,使用所述随机密钥加密所述第一电子设备的SIM卡号码以及所述第一电子设备在所述第一会议应用上的帐号,得到加密信息;通过所述第一天线,发送第二消息;所述第二消息包括所述第二电子设备的标识以及所述加密信息;接收到所述第一会议应用的呼叫电话;在接通所述呼叫电话后,加入所述第二电子设备参加的会议;其中,所述第四距离小于或等于预设的第二安全距离;所述预设的第二安全距离为所述第二电子设备与所述第一电子设备交换秘密信息的一个安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 一种会议接入方法,应用于第一电子设备,所述第一电子设备安装有第一会议应用,所述第一电子设备未通过所述第一会议应用接入会议,所述第一电子设备包括:SIM卡;第一天线,所述第一天线在第一发射功率下的发射距离为第一距离,所述第一距离大于预设的第一安全距离;所述第一天线在第二发射功率下的发射距离为第二距离,所述第二距离小于或等于所述预设的第一安全距离;所述第一发射功率大于所述第二发射功率;所述方法包括:接收到第一输入;响应于所述第一输入,通过所述第一发射功率下的所述第一天线,广播第一消息;所述第一消息包括会议加入请求和所述第一电子设备的标识;在距离第二电子设备的第四距离内,接收到第一响应消息;所述第一响应消息包括随机密钥和所述第二电子设备的标识;所述第一响应消息与所述第一消息相关联;所述第二电子设备通过所述第一会议应用接入所述会议,所述第二电子设备在所述第一会议应用上的帐号在所述会议中为会议主席;接收到用于指示加入所述会议的第二输入;响应于所述第二输入,使用所述随机密钥加密所述第一电子设备的SIM卡号码以及所述第一电子设备在所述第一会议应用上的帐号,得到加密信息;通过所述第二发射功率下的所述第一天线,发送第二消息;所述第二消息包括所述第二电子设备的标识以及所述加密信息;接收到所述第一会议应用的呼叫电话;在接通所述呼叫电话后,加入所述第二电子设备参加的会议;其中,所述第四距离小于或等于预设的第二安全距离;所述预设的第二安全距离为所 述第二电子设备与所述第一电子设备交换秘密信息的一个安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 一种会议接入方法,应用于第一电子设备,所述第一电子设备安装有第一会议应用,所述第一电子设备未通过所述第一会议应用接入会议,所述第一电子设备包括:SIM卡;第一天线,所述第一天线在第一发射功率下的发射距离为第一距离,所述第一距离大于预设的第一安全距离;所述第一天线在第二发射功率下的发射距离为第二距离,所述第二距离小于或等于所述预设的第一安全距离;所述第一发射功率大于所述第二发射功率;所述方法包括:接收到第一输入;响应于所述第一输入,通过所述第二发射功率下的所述第一天线,广播第一消息;所述第一消息包括会议加入请求和所述第一电子设备的标识;在距离第二电子设备的第四距离内,接收到第一响应消息;所述第一响应消息包括随机密钥和所述第二电子设备的标识;所述第一响应消息与所述第一消息相关联;所述第二电子设备通过所述第一会议应用接入所述会议,所述第二电子设备在所述第一会议应用上的帐号在所述会议中为会议主席;响应于所述第一响应消息,使用所述随机密钥加密所述第一电子设备的SIM卡号码以及所述第一电子设备在所述第一会议应用上的帐号,得到加密信息;通过所述第一发射功率下的所述第一天线,发送第二消息;所述第二消息包括所述第二电子设备的标识以及所述加密信息;接收到所述第一会议应用的呼叫电话;在接通所述呼叫电话后,加入所述第二电子设备参加的会议;其中,所述第四距离小于或等于预设的第二安全距离;所述预设的第二安全距离为所述第二电子设备与所述第一电子设备交换秘密信息的一个安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 一种会议接入方法,应用于第一电子设备,所述第一电子设备安装有第一会议应用,所述第一电子设备未通过所述第一会议应用接入会议,所述第一电子设备包括:SIM卡;第一天线,所述第一天线的发射距离为第一距离,所述第一距离大于预设的第一安全距离;第二天线,所述第二天线的发射距离为第二距离,所述第二距离小于或等于所述预设的第一安全距离;所述方法包括:接收到第一输入;响应于所述第一输入,生成随机密钥,通过所述第二天线,广播第一消息;所述第一消息包括会议加入请求、所述第一电子设备的标识和所述随机密钥;在距离第二电子设备的第四距离内,接收到第一响应消息;所述第一响应消息包括加密信息;所述第一响应消息与所述第一消息相关联;所述第二电子设备通过所述第一会议应用接入所述会议;使用所述随机密钥解密所述加密信息,获取到所述会议的会议标识和会议密码;通过所述第一天线,向所述第一会议应用的服务器发送第二消息;所述第二消息包括通过所述第一会议应用的加密机制,加密所述会议标识、所述会议密码和所述第一电子设备在所述第一会议应用上的帐号后的信息;接收到所述第一会议应用的呼叫电话;在接通所述呼叫电话后,加入所述会议;其中,所述第四距离小于或等于预设的第二安全距离;所述预设的第二安全距离为所述第二电子设备与所述第一电子设备交换秘密信息的一个安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 一种会议接入方法,应用于第一电子设备,所述第一电子设备安装有第一会议应用,所述第一电子设备未通过所述第一会议应用接入会议,所述第一电子设备包括:SIM卡;第一天线,所述第一天线在第一发射功率下的发射距离为第一距离,所述第一距离大于预设的第一安全距离;所述第一天线在第二发射功率下的发射距离为第二距离,所述第二距离小于或等于所述预设的第一安全距离;所述第一发射功率大于所述第二发射功率;所述方法包括:接收到第一输入;响应于所述第一输入,生成随机密钥,通过所述第二发射功率下的所述第一天线,广播第一消息;所述第一消息包括会议加入请求、所述第一电子设备的标识和所述随机密钥;在距离第二电子设备的第四距离内,接收到第一响应消息;所述第一响应消息包括加密信息;所述第一响应消息与所述第一消息相关联;所述第二电子设备通过所述第一会议应用接入所述会议;使用所述随机密钥解密所述加密信息,获取到所述会议的会议标识和会议密码;通过所述第一发射功率下的所述第一天线,向所述第一会议应用的服务器发送第二消息;所述第二消息包括通过所述第一会议应用的加密机制,加密所述会议标识、所述会议密码和所述第一电子设备在所述第一会议应用上的帐号后的信息;接收到所述第一会议应用的呼叫电话;在接通所述呼叫电话后,加入所述会议;其中,所述第四距离小于或等于预设的第二安全距离;所述预设的第二安全距离为所述第二电子设备与所述第一电子设备交换秘密信息的一个安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 一种会议接入方法,应用于第二电子设备,所述第二电子设备安装有第一会议应用,所述第二电子设备通过所述第一会议应用接入会议,所述第二电子设备在所述第一会议应用上的帐号在所述会议中为会议主席;其特征在于,所述第二电子设备包括:第三天线,所述第三天线的发射距离为第三距离,所述第三距离大于预设的第二安全距离;第四天线,所述第四天线的发射距离为第四距离,所述第四距离小于或等于所述预设的第二安全距离;所述方法包括:在距离第一电子设备的第一距离内,接收到来自所述第一电子设备的第一消息;所述第一消息包括会议加入请求和所述第一电子设备的标识;响应于所述第一消息,生成随机密钥;通过所述第四天线,发送第一响应消息;所述第一响应消息包括所述随机密钥和所述第二电子设备的标识;在距离所述第一电子设备的第二距离内,接收到来自所述第一电子设备的第二消息;所述第二消息包括所述第二电子设备的标识以及加密信息;使用所述随机密钥解密所述加密信息,获取到所述第一电子设备的SIM卡号码以及所述第一电子设备在所述第一会议应用上的帐号;接收到用于指示同意加入所述会议的第三输入;通过所述第三天线,向所述第一会议应用的服务器发送第三消息;所述第三消息包括通过所述第一会议应用的加密机制,加密所述第一电子设备的SIM卡号码、所述第一电子设备在所述第一会议应用上的帐号、所述第二电子设备在所述第一会议应用上的帐号和所述会议的会议标识后的信息;其中,所述第二距离小于或等于预设的第一安全距离;所述第一距离大于所述预设的第一安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离;所述预设的第二安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 一种会议接入方法,应用于第二电子设备,所述第二电子设备安装有第一会议应用,所述第二电子设备通过所述第一会议应用接入会议,所述第二电子设备在所述第一会议应用上的帐号在所述会议中为会议主席;其特征在于,所述第二电子设备包括:第三天线,所述第三天线的发射距离为第三距离,所述第三距离大于预设的第二安全距离;第四天线,所述第四天线的发射距离为第四距离,所述第四距离小于或等于所述预设的第二安全距离;所述方法包括:在距离第一电子设备的第二距离内,接收到来自所述第一电子设备的第一消息;所述第一消息包括会议加入请求和所述第一电子设备的标识;响应于所述第一消息,生成随机密钥;通过所述第四天线,发送第一响应消息;所述第一响应消息包括所述随机密钥和所述第二电子设备的标识;在距离第一电子设备的第一距离内,接收到来自所述第一电子设备的第二消息;所述第二消息包括所述第二电子设备的标识以及加密信息;使用所述随机密钥解密所述加密信息,获取到所述第一电子设备的SIM卡号码以及所述第一电子设备在所述第一会议应用上的帐号;接收到用于指示同意加入所述会议的第三输入;通过所述第三天线,向所述第一会议应用的服务器发送第三消息;所述第三消息包括通过所述第一会议应用的加密机制,加密所述第一电子设备的SIM卡号码、所述第一电子设备在所述第一会议应用上的帐号、所述第二电子设备在所述第一会议应用上的帐号和所述会议的会议标识后的信息;其中,所述第二距离小于或等于预设的第一安全距离;所述第一距离大于所述预设的第一安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离;所述预设的第二安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 一种会议接入方法,应用于第二电子设备,所述第二电子设备安装有第一会议应用,所述第二电子设备通过所述第一会议应用接入会议,所述第二电子设备在所述第一会议应用上的帐号在所述会议中为会议主席;其特征在于,所述第二电子设备包括:第三天线,所述第三天线在第三发射功率下的发射距离为第三距离,所述第三距离大于预设的第二安 全距离;所述第三天线在第四发射功率下的发射距离为第四距离,所述第四距离小于或等于所述预设的第二安全距离;所述第三发射功率大于所述第四发射功率;所述方法包括:在距离第一电子设备的第一距离内,接收到来自所述第一电子设备的第一消息;所述第一消息包括会议加入请求和所述第一电子设备的标识;响应于所述第一消息,生成随机密钥;通过所述第四发射功率下的所述第三天线,发送第一响应消息;所述第一响应消息包括所述随机密钥和所述第二电子设备的标识;在距离所述第一电子设备的第二距离内,接收到来自所述第一电子设备的第二消息;所述第二消息包括所述第二电子设备的标识以及加密信息;使用所述随机密钥解密所述加密信息,获取到所述第一电子设备的SIM卡号码以及所述第一电子设备在所述第一会议应用上的帐号;接收到用于指示同意加入所述会议的第三输入;通过所述第三发射功率下的所述第三天线,向所述第一会议应用的服务器发送第三消息;所述第三消息包括通过所述第一会议应用的加密机制,加密所述第一电子设备的SIM卡号码、所述第一电子设备在所述第一会议应用上的帐号、所述第二电子设备在所述第一会议应用上的帐号和所述会议的会议标识后的信息;其中,所述第二距离小于或等于预设的第一安全距离;所述第一距离大于所述预设的第一安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离;所述预设的第二安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 一种会议接入方法,应用于第二电子设备,所述第二电子设备安装有第一会议应用,所述第二电子设备通过所述第一会议应用接入会议,所述第二电子设备在所述第一会议应用上的帐号在所述会议中为会议主席;其特征在于,所述第二电子设备包括:第三天线,所述第三天线在第三发射功率下的发射距离为第三距离,所述第三距离大于预设的第二安全距离;所述第三天线在第四发射功率下的发射距离为第四距离,所述第四距离小于或等于所述预设的第二安全距离;所述第三发射功率大于所述第四发射功率;所述方法包括:在距离第一电子设备的第二距离内,接收到来自所述第一电子设备的第一消息;所述第一消息包括会议加入请求和所述第一电子设备的标识;响应于所述第一消息,生成随机密钥;通过所述第四发射功率下的所述第三天线,发送第一响应消息;所述第一响应消息包括所述随机密钥和所述第二电子设备的标识;在距离所述第一电子设备的第一距离内,接收到来自所述第一电子设备的第二消息;所述第二消息包括所述第二电子设备的标识以及加密信息;使用所述随机密钥解密所述加密信息,获取到所述第一电子设备的SIM卡号码以及所述第一电子设备在所述第一会议应用上的帐号;接收到用于指示同意加入所述会议的第三输入;通过所述第三发射功率下的所述第三天线,向所述第一会议应用的服务器发送第三消息;所述第三消息包括通过所述第一会议应用的加密机制,加密所述第一电子设备的SIM卡号码、所述第一电子设备在所述第一会议应用上的帐号、所述第二电子设备在所述第一 会议应用上的帐号和所述会议的会议标识后的信息;其中,所述第二距离小于或等于预设的第一安全距离;所述第一距离大于所述预设的第一安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离;所述预设的第二安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 一种会议接入方法,应用于第二电子设备,所述第二电子设备安装有第一会议应用,所述第二电子设备通过所述第一会议应用接入会议,所述第二电子设备在所述第一会议应用上的帐号在所述会议中为非会议主席的会议成员;其特征在于,所述第二电子设备包括:第三天线,所述第三天线的发射距离为第三距离,所述第三距离大于预设的第二安全距离;第四天线,所述第四天线的发射距离为第四距离,所述第四距离小于或等于所述预设的第二安全距离;所述方法包括:在距离第一电子设备的第一距离内,接收到来自所述第一电子设备的第一消息;所述第一消息包括会议加入请求和所述第一电子设备的标识;响应于所述第一消息,生成随机密钥;通过所述第四天线,发送第一响应消息;所述第一响应消息包括所述随机密钥和所述第二电子设备的标识;在距离所述第一电子设备的第二距离内,接收到来自所述第一电子设备的第二消息;所述第二消息包括所述第二电子设备的标识以及加密信息;使用所述随机密钥解密所述加密信息,获取到所述第一电子设备的SIM卡号码以及所述第一电子设备在所述第一会议应用上的帐号;通过所述第三天线,向所述第一会议应用的服务器发送第三消息;所述第三消息包括通过所述第一会议应用的加密机制,加密所述第一电子设备的SIM卡号码、所述第一电子设备在所述第一会议应用上的帐号、所述第二电子设备在所述第一会议应用上的帐号和所述会议的会议标识后的信息;其中,所述第二距离小于或等于预设的第一安全距离;所述第一距离大于所述预设的第一安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离;所述预设的第二安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 一种会议接入方法,应用于第二电子设备,所述第二电子设备安装有第一会议应用,所述第二电子设备通过所述第一会议应用接入会议,所述第二电子设备在所述第一会议应用上的帐号在所述会议中为非会议主席的会议成员;其特征在于,所述第二电子设备包括:第三天线,所述第三天线的发射距离为第三距离,所述第三距离大于预设的第二安全距离;第四天线,所述第四天线的发射距离为第四距离,所述第四距离小于或等于所述预设的第二安全距离;所述方法包括:在距离第一电子设备的第二距离内,接收到来自所述第一电子设备的第一消息;所述第一消息包括会议加入请求和所述第一电子设备的标识;响应于所述第一消息,生成随机密钥;通过所述第四天线,发送第一响应消息;所述第一响应消息包括所述随机密钥和所述第二电子设备的标识;在距离所述第一电子设备的第一距离内,接收到来自所述第一电子设备的第二消息;所述第二消息包括所述第二电子设备的标识以及加密信息;使用所述随机密钥解密所述加密信息,获取到所述第一电子设备的SIM卡号码以及所述第一电子设备在所述第一会议应用上的帐号;通过所述第三天线,向所述第一会议应用的服务器发送第三消息;所述第三消息包括通过所述第一会议应用的加密机制,加密所述第一电子设备的SIM卡号码、所述第一电子设备在所述第一会议应用上的帐号、所述第二电子设备在所述第一会议应用上的帐号和所述会议的会议标识后的信息;其中,所述第二距离小于或等于预设的第一安全距离;所述第一距离大于所述预设的第一安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离;所述预设的第二安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 一种会议接入方法,应用于第二电子设备,所述第二电子设备安装有第一会议应用,所述第二电子设备通过所述第一会议应用接入会议,所述第二电子设备在所述第一会议应用上的帐号在所述会议中为非会议主席的会议成员;其特征在于,所述第二电子设备包括:第三天线,所述第三天线在第三发射功率下的发射距离为第三距离,所述第三距离大于预设的第二安全距离;所述第三天线在第四发射功率下的发射距离为第四距离,所述第四距离小于或等于所述预设的第二安全距离;所述第三发射功率大于所述第四发射功率;所述方法包括:在距离第一电子设备的第一距离内,接收到来自所述第一电子设备的第一消息;所述第一消息包括会议加入请求和所述第一电子设备的标识;响应于所述第一消息,生成随机密钥;通过所述第四发射功率下的第三天线,发送第一响应消息;所述第一响应消息包括所述随机密钥和所述第二电子设备的标识;在距离所述第一电子设备的第二距离内,接收到来自所述第一电子设备的第二消息;所述第二消息包括所述第二电子设备的标识以及加密信息;使用所述随机密钥解密所述加密信息,获取到所述第一电子设备的SIM卡号码以及所述第一电子设备在所述第一会议应用上的帐号;通过所述第三发射功率下的第三天线,向所述第一会议应用的服务器发送第三消息;所述第三消息包括通过所述第一会议应用的加密机制,加密所述第一电子设备的SIM卡号码、所述第一电子设备在所述第一会议应用上的帐号、所述第二电子设备在所述第一会议应用上的帐号和所述会议的会议标识后的信息;其中,所述第二距离小于或等于预设的第一安全距离;所述第一距离大于所述预设的第一安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离;所述预设的第二安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 一种会议接入方法,应用于第二电子设备,所述第二电子设备安装有第一会议应用,所述第二电子设备通过所述第一会议应用接入会议,所述第二电子设备在所述第一会议应用上的帐号在所述会议中为非会议主席的会议成员;其特征在于,所述第二电子设备包括: 第三天线,所述第三天线在第三发射功率下的发射距离为第三距离,所述第三距离大于预设的第二安全距离;所述第三天线在第四发射功率下的发射距离为第四距离,所述第四距离小于或等于所述预设的第二安全距离;所述第三发射功率大于所述第四发射功率;所述方法包括:在距离第一电子设备的第二距离内,接收到来自所述第一电子设备的第一消息;所述第一消息包括会议加入请求和所述第一电子设备的标识;响应于所述第一消息,生成随机密钥;通过所述第四发射功率下的第三天线,发送第一响应消息;所述第一响应消息包括所述随机密钥和所述第二电子设备的标识;在距离所述第一电子设备的第一距离内,接收到来自所述第一电子设备的第二消息;所述第二消息包括所述第二电子设备的标识以及加密信息;使用所述随机密钥解密所述加密信息,获取到所述第一电子设备的SIM卡号码以及所述第一电子设备在所述第一会议应用上的帐号;通过所述第三发射功率下的第三天线,向所述第一会议应用的服务器发送第三消息;所述第三消息包括通过所述第一会议应用的加密机制,加密所述第一电子设备的SIM卡号码、所述第一电子设备在所述第一会议应用上的帐号、所述第二电子设备在所述第一会议应用上的帐号和所述会议的会议标识后的信息;其中,所述第二距离小于或等于预设的第一安全距离;所述第一距离大于所述预设的第一安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离;所述预设的第二安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 一种会议接入方法,应用于第二电子设备,所述第二电子设备安装有第一会议应用,所述第二电子设备通过所述第一会议应用接入会议;其特征在于,所述第二电子设备包括:第三天线,所述第三天线的发射距离为第三距离,所述第三距离大于预设的第二安全距离;第四天线,所述第四天线的发射距离为第四距离,所述第四距离小于或等于所述预设的第二安全距离;所述方法包括:在距离第一电子设备的第二距离内,接收到来自所述第一电子设备的第一消息;所述第一消息包括会议加入请求、所述第一电子设备的标识和随机密钥;通过所述第四天线,发送第一响应消息;所述第一响应消息包括加密信息;所述加密信息为使用所述随机密钥对所述会议的会议标识和会议密码加密后的信息,或者所述加密信息为使用所述随机密钥对所述会议的会议标识加密后的信息;在经过预设时长后,切换至所述第三天线;其中,所述第二距离小于或等于预设的第一安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离;所述预设的第二安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 一种会议接入方法,应用于第二电子设备,所述第二电子设备安装有第一会议应用,所述第二电子设备通过所述第一会议应用接入会议;其特征在于,所述第二电子设备包括:第三天线,所述第三天线在第三发射功率下的发射距离为第三距离,所述第三距离大于预设的第二安全距离;所述第三天线在第四发射功率下的发射距离为第四距离,所述第四距 离小于或等于所述预设的第二安全距离;所述第三发射功率大于所述第四发射功率;所述方法包括:在距离第一电子设备的第二距离内,接收到来自所述第一电子设备的第一消息;所述第一消息包括会议加入请求、所述第一电子设备的标识和随机密钥;通过所述第四发射功率下的所述第三天线,发送第一响应消息;所述第一响应消息包括加密信息;所述加密信息为使用所述随机密钥对所述会议的会议标识和会议密码加密后的信息,或者所述加密信息为使用所述随机密钥对所述会议的会议标识加密后的信息;在经过预设时长后,将所述第三天线的发射功率调整为所述第三发射功率;其中,所述第二距离小于或等于预设的第一安全距离;所述预设的第一安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离;所述预设的第二安全距离为所述第一电子设备与所述第二电子设备交换秘密信息的一个安全距离。
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质包括计算机程序,当所述计算机程序在第一电子设备上运行时,使得所述第一电子设备执行如权利要求26-31中任意一项所述的方法。
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质包括计算机程序,当所述计算机程序在第二电子设备上运行时,使得所述第二电子设备执行如权利要求32-41中任意一项所述的方法。
- 一种计算机程序产品,当所述计算机程序产品在计算机上运行时,使得所述计算机执行如权利要求26-41中任意一项所述的方法。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP21922567.9A EP4266630A4 (en) | 2021-01-30 | 2021-12-13 | CONFERENCE ACCESS METHOD AND ELECTRONIC DEVICE |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110131858.1 | 2021-01-30 | ||
CN202110131858.1A CN114844732B (zh) | 2021-01-30 | 2021-01-30 | 一种会议接入方法及电子设备 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022160977A1 true WO2022160977A1 (zh) | 2022-08-04 |
Family
ID=82561153
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/137534 WO2022160977A1 (zh) | 2021-01-30 | 2021-12-13 | 一种会议接入方法及电子设备 |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP4266630A4 (zh) |
CN (1) | CN114844732B (zh) |
WO (1) | WO2022160977A1 (zh) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2081372A1 (en) * | 2008-01-16 | 2009-07-22 | British Telecmmunications public limited campany | Audio conferencing |
CN103929553A (zh) * | 2013-01-15 | 2014-07-16 | 中国电信股份有限公司 | 电话会议的实现方法和系统 |
CN105072126A (zh) * | 2015-08-26 | 2015-11-18 | 华为技术有限公司 | 会议终端的接入方法、装置及系统 |
CN109302411A (zh) * | 2018-11-06 | 2019-02-01 | 苏州科达科技股份有限公司 | 视频会议认证系统、方法、装置及存储介质 |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8422654B1 (en) * | 2010-06-24 | 2013-04-16 | Sprint Communications Company L.P. | Increasing the likelihood that a conference call will occur |
CN102761833A (zh) * | 2011-04-29 | 2012-10-31 | 无锡江南计算技术研究所 | 一种计算机集群系统的无线组播及点对点通信方法 |
US9344174B2 (en) * | 2012-05-21 | 2016-05-17 | Qualcomm Incorporated | Systems, apparatus, and methods for antenna selection |
US20160253629A1 (en) * | 2015-02-26 | 2016-09-01 | Salesforce.Com, Inc. | Meeting initiation based on physical proximity |
US10091811B2 (en) * | 2015-04-20 | 2018-10-02 | Intel IP Corporation | Apparatus, system and method of communicating over a data path |
KR102355966B1 (ko) * | 2017-05-16 | 2022-02-08 | 애플 인크. | 디지털 어시스턴트 서비스의 원거리 확장 |
CN109842878B (zh) * | 2017-11-27 | 2020-10-02 | 大唐移动通信设备有限公司 | 一种会议出席业务处理方法及装置 |
CN109005044B (zh) * | 2018-08-02 | 2020-10-30 | Oppo广东移动通信有限公司 | 数据传输控制方法及相关装置 |
CN114285682A (zh) * | 2020-09-17 | 2022-04-05 | 华为技术有限公司 | 一种家居设备的控制方法及设备 |
-
2021
- 2021-01-30 CN CN202110131858.1A patent/CN114844732B/zh active Active
- 2021-12-13 WO PCT/CN2021/137534 patent/WO2022160977A1/zh unknown
- 2021-12-13 EP EP21922567.9A patent/EP4266630A4/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2081372A1 (en) * | 2008-01-16 | 2009-07-22 | British Telecmmunications public limited campany | Audio conferencing |
CN103929553A (zh) * | 2013-01-15 | 2014-07-16 | 中国电信股份有限公司 | 电话会议的实现方法和系统 |
CN105072126A (zh) * | 2015-08-26 | 2015-11-18 | 华为技术有限公司 | 会议终端的接入方法、装置及系统 |
CN109302411A (zh) * | 2018-11-06 | 2019-02-01 | 苏州科达科技股份有限公司 | 视频会议认证系统、方法、装置及存储介质 |
Non-Patent Citations (1)
Title |
---|
See also references of EP4266630A4 |
Also Published As
Publication number | Publication date |
---|---|
EP4266630A4 (en) | 2024-05-29 |
EP4266630A1 (en) | 2023-10-25 |
CN114844732B (zh) | 2023-06-20 |
CN114844732A (zh) | 2022-08-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11979251B2 (en) | Home device control method and device | |
EP3641366B1 (en) | Wireless local area network configuration method and apparatus | |
WO2019090726A1 (zh) | 选择蓝牙设备的方法、终端和系统 | |
WO2019080008A1 (zh) | 增补上行载波配置方法及装置和调度资源分配方法及装置 | |
US10698652B2 (en) | Intermediary device for establishing wireless services | |
WO2022143031A1 (zh) | 一种身份认证方法、电子设备及计算机可读存储介质 | |
JP2018501746A (ja) | 接続確立方法、装置、プログラム、及び記録媒体 | |
WO2019041152A1 (zh) | 寻呼消息发送和接收方法及装置、基站、用户设备 | |
WO2018141165A1 (zh) | 数据传输方法及装置 | |
TW202205908A (zh) | 雙網雙系統行動裝置 | |
CN107809437B (zh) | 一种融合通信登录方法、装置和计算机可读存储介质 | |
WO2022052760A1 (zh) | 一种组合音箱的配置方法、音箱和电子设备 | |
WO2022028333A1 (zh) | 一种自动控制方法、电子设备及计算机可读存储介质 | |
WO2022160977A1 (zh) | 一种会议接入方法及电子设备 | |
WO2020087348A1 (zh) | 信息反馈方法及装置 | |
WO2023071993A1 (zh) | 蓝牙配对方法、设备、系统和存储介质 | |
WO2024168908A1 (zh) | 一种通信方法、装置及存储介质 | |
WO2022161071A1 (zh) | 一种群组成员或好友的添加方法、电子设备 | |
WO2022258016A1 (zh) | 数据流传输方法、设备、通信装置及存储介质 | |
WO2019109311A1 (zh) | 信道协调方法及装置 | |
KR20150104128A (ko) | 그룹 통신에서 동적 화자 id 기반 미디어 처리를 위한 프레임워크 및 방법 | |
WO2019080105A1 (zh) | 网络接入方法及装置 | |
WO2022161143A1 (zh) | 一种共享通信录的方法、移动设备、电子设备和通信系统 | |
WO2024152262A1 (zh) | 基于侧链路的通信方法、装置及存储介质 | |
WO2024130590A1 (zh) | 一种传输配置指示状态的确定方法、装置及存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21922567 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2021922567 Country of ref document: EP Effective date: 20230717 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |