WO2023051229A1 - Method and apparatus for identifying device, and electronic device and medium - Google Patents

Method and apparatus for identifying device, and electronic device and medium Download PDF

Info

Publication number
WO2023051229A1
WO2023051229A1 PCT/CN2022/118459 CN2022118459W WO2023051229A1 WO 2023051229 A1 WO2023051229 A1 WO 2023051229A1 CN 2022118459 W CN2022118459 W CN 2022118459W WO 2023051229 A1 WO2023051229 A1 WO 2023051229A1
Authority
WO
WIPO (PCT)
Prior art keywords
trusted
electronic device
devices
identity key
information
Prior art date
Application number
PCT/CN2022/118459
Other languages
French (fr)
Chinese (zh)
Inventor
王春风
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2023051229A1 publication Critical patent/WO2023051229A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/04Protocols specially adapted for terminals or networks with limited capabilities; specially adapted for terminal portability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/54Presence management, e.g. monitoring or registration for receipt of user log-on information, or the connection status of the users
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • Embodiments of the present disclosure mainly relate to the technical field of communication. More specifically, the embodiments of the present disclosure relate to a method for identifying a device, an apparatus, an electronic device, a computer-readable storage medium, and a computer program product.
  • broadcasting messages may cause users to leak identity credentials, leading to the risk of users being monitored. This risk exists on devices with various operating systems. In view of this, there is a need for a secure method of identifying devices to reduce the risk of users being identified and tracked.
  • Embodiments of the present application provide a solution for identifying devices.
  • a method for identifying a device comprising: in response to receiving a broadcast message from a second device, a first device based on an identity key of a set of trusted devices of the first device a key and a source address of the broadcast message to determine that the second device is an active trusted device; and the first device provides information about the second device.
  • the first device and the second device are devices capable of broadcasting communication (sending broadcasts and receiving broadcasts), and when they are trusted with each other, a connection between them can be further established for service transmission.
  • trusted devices refer to devices that trust each other and can send personal data, for example, devices with the same user account or devices that have been authenticated by other means.
  • the first device has the identity keys of one or more other devices with which it has a trusted relationship, and can use these identity keys to check whether a particular device is its trusted device.
  • a device sends a broadcast message (for example, a heartbeat message) when it is active.
  • the broadcast message does not carry a device identifier, and its address is generated via the device's identity key, and is variable to ensure that the device does not will be monitored and tracked.
  • the first device may use the identity key of a trusted device in its trusted device set to verify the address of the broadcast message, Active trusted devices are thus discovered.
  • the first device can identify the second device in an active state through the address information of the broadcast system of the second device. Therefore, the second device can be identified without broadcasting its identification information, which reduces the risk of the second device being monitored and tracked.
  • determining that the second device is an active trusted device may include: authenticating the broadcast message using a first identity key of the identity keys of the set of trusted devices and the source address ; and if the broadcast message is verified, the first device determines the second device as an active trusted device. In this manner, the first device can verify whether the source of the broadcast message is a trusted device according to the pre-stored identity key of the trusted device.
  • verifying the broadcast message may include: generating a hash value based on the first identity key and the first part of the source address; combining the hash value with the second part of the source address Parts are compared; if the hash value matches the second part, it is determined that the broadcast message passes the verification. In this way, a way to reliably authenticate broadcast messages with identity keys is provided.
  • providing the information of the second device may include: in response to receiving a search request about a trusted device from the user, the first device providing the information of the second device to the user.
  • the first device providing the information of the second device to the user.
  • a user may operate a first device, request to discover active trusted devices related to the first device, and information about the second device (such as graphical elements displayed on a user interface) is provided to the user for the user's convenience. Trusted devices for further manipulation of discovered activity.
  • the method according to the first aspect of the present application may further include: in response to receiving the user's operation on the information of the second device, establishing the connection between the first device and the second device Device connection.
  • the first device can be connected to the found active trusted device according to user operations to meet specific business needs without going through authentication, pairing, etc., thereby speeding up the connection speed and having a good user experience.
  • the identity key of the set of trusted devices is stored at the first device, and wherein the method may further comprise: in response to determining a target trusted device in the set of trusted devices exiting the trusted relationship with the first device, the first device deleting the identity key of the target trusted device from the stored identity keys of the set of trusted devices. In this way, the trusted relationship between the first device and other devices can be persisted and updated dynamically, so that an active trusted device can be quickly detected.
  • the identity key may be an identity resolution key.
  • the broadcast message may be a Bluetooth broadcast message. In this way, the identity key can be adapted to a randomized broadcast address conforming to the Bluetooth communication protocol.
  • a communication method including: a first device determines that the second device is a trusted device of the first device based on the information used for authentication received from the second device ; the first device sends the identity key of the first device to the second device; the first device receives the identity key of the second device from the second device, wherein the second the identity key of the device is used to generate a source address of the broadcast message of the second device; and the first device adds the identity key of the second device to the set of trusted devices of the first device in the identity key.
  • the first device can exchange their identity keys with other devices certified as trusted devices to form a trusted device network.
  • devices will be able to pass the address of the broadcast message Information is used for device identification, instead of carrying identification information in broadcast messages, which prevents devices from being monitored and tracked.
  • determining that the second device is a trusted device of the first device may include: sending the account information of the first device to the second device; receiving the account information of the first device from the second device; information for authentication of the account information of the first device; and if the information for authentication indicates that the first device and the electronic device have the same or an associated account, determining that the second The second device is a trusted device. In this way, when multiple devices have the same or associated account information, these devices are considered to be trusted to each other, thereby providing a convenient and fast networking method of trusted device networks.
  • determining that the second device is a trusted device of the first device may include: obtaining binding information from the information used for authentication; determining the second device based on the binding information Whether a device and the second device have been bound; and if it is determined that the first device and the second device have been bound, determining that the second device is a trusted device of the first device.
  • the binding information indicates that the two devices are bound through at least one of two-dimensional code, PIN code and physical contact. In this manner, when multiple devices are bound, these devices are considered to be trusted to each other, thereby providing a flexible and widely applicable trusted device network networking method.
  • the method according to the second aspect of the present application may further include: the first device sending the identity key of the second device to a trusted device in the set of trusted devices; and the The first device sends the identity key of the one trusted device in the trusted device set to the second device.
  • the identity keys of multiple mutually trusted devices can be quickly disseminated and shared, thereby providing a convenient and fast networking method for trusted device networks.
  • the method according to the second aspect of the present application may further include: if the second device is determined to be a trusted device of the first device, establishing the first device and the second device the connection between. In this way, the first device and the second device authenticated as trusted devices can be facilitated to exchange each other's identity keys.
  • the method according to the second aspect of the present disclosure may further include: in response to determining that the second device has exited the trusted relationship with the first device, the first device from the first device Delete the identity key of the second device from the identity keys of the trusted device set. In this way, the first device can manage and dynamically maintain its own set of trusted devices.
  • the method according to the second aspect of the present application may further include: updating the identity key of the first device if it is determined that the first device exits the trusted relationship with the set of trusted devices. In this way, the first device can conveniently release the trusted relationship with other devices.
  • the identity key may be an identity resolution key.
  • the broadcast message may be a Bluetooth broadcast message. In this way, the identity key can be adapted to a randomized broadcast address conforming to the Bluetooth communication protocol.
  • a communication apparatus including: an active trusted device determining unit configured to, in response to receiving a broadcast message from a second device, based on the identity of the trusted device set of the first device The key and the source address of the broadcast message determine that the second device is an active trusted device; and an information providing unit is configured to provide information of the second device.
  • the active trusted device determination unit may be further configured to: use the first identity key in the identity keys of the set of trusted devices and the source address to verify the broadcast message ; and if the broadcast message passes verification, determining the second device as an active trusted device.
  • the active trusted device determination unit may be further configured to: generate a hash value based on the first identity key and the first part of the source address; combine the hash value and the comparing the second part of the source address; if the hash value matches the second part, it is determined that the broadcast message passes the verification.
  • the information providing unit may be further configured to: provide the user with the information of the second device in response to receiving a search request about the trusted device from the user.
  • the apparatus according to the third aspect of the present application may further include: a connection establishment unit configured to, in response to receiving the user's operation on the information of the second device, establish a connection with the Connection of a second device.
  • the apparatus according to the third aspect of the present application may further include an identity key storage unit configured to: store the identity key of the set of trusted devices; and respond to determining that the trusted device The target trusted device in the set quits the trusted relationship with the first device, and the identity key of the target trusted device is deleted from the identity keys of the set of trusted devices.
  • an identity key storage unit configured to: store the identity key of the set of trusted devices; and respond to determining that the trusted device The target trusted device in the set quits the trusted relationship with the first device, and the identity key of the target trusted device is deleted from the identity keys of the set of trusted devices.
  • the identity key may be an identity resolution key.
  • the broadcast message may be a Bluetooth broadcast message.
  • a communication device including: an authentication unit configured to determine that the second device is a possible authentication of the first device based on the information for authentication received from the second device.
  • an identity key exchange unit configured to send the identity key of the first device to the second device, and receive the identity key of the second device from the second device, wherein the The identity key of the second device is used to generate the source address of the broadcast message of the second device, and an identity key adding unit is configured to add the identity key of the second device to the first In the identity key of the trusted device set of the device.
  • the authentication unit may be further configured to: send the account information of the first device to the second device; receive the account information for the first device from the second device information for authentication of account information; and if the information for authentication indicates that the first device and the second device have the same or associated accounts, determining that the second device is the first device trusted devices.
  • the authentication unit may be further configured to obtain binding information from the information used for authentication; based on the binding information, determine whether the first device and the second device have bound; and if it is determined that the first device and the second device have been bound, determining that the second device is a trusted device of the first device.
  • the binding information indicates that the two devices are bound through at least one of two-dimensional code, PIN code and physical contact.
  • the identity key exchange unit may also be configured to: send the identity key of the second device to a trusted device in the set of trusted devices; and send the identity key of the second device to the second device Sending the identity key of the one trusted device in the set of trusted devices.
  • the apparatus according to the fourth aspect of the present application may further include: a connection establishment unit configured to establish a connection between the first device and the second device.
  • the apparatus according to the fourth aspect of the present application, wherein the identity key storage unit is further configured to, in response to determining that the second device exits the trusted relationship with the first device, from the deleting the identity key of the second device from the identity keys of the trusted device set of the first device.
  • the apparatus according to the fourth aspect of the present application may further include: an identity key update unit configured to update the The identity key of the first device.
  • the identity key may be an identity resolution key.
  • the broadcast message may be a Bluetooth broadcast message.
  • an electronic device including: a processing unit and a memory; the processing unit executes instructions in the memory, so that the electronic device executes the electronic device according to the first aspect or the first aspect of the present application.
  • the processing unit executes instructions in the memory, so that the electronic device executes the electronic device according to the first aspect or the first aspect of the present application. The method described in the two aspects.
  • a computer-readable storage medium on which one or more computer instructions are stored, wherein one or more computer instructions are executed by a processor to cause the processor to perform the The method described in the first aspect or the second aspect.
  • a computer program product comprising machine-executable instructions which, when executed by a device, cause the device to perform the first or second aspect of the present application. the method described.
  • Fig. 1 schematically shows a system diagram provided by the present application
  • FIGS. 2a to 2b are schematic diagrams showing a set of application interfaces provided by the embodiments of the present application.
  • FIG. 3a shows a schematic diagram of a hardware structure of an electronic device provided by an embodiment of the present application
  • FIG. 3b is a schematic diagram of a software structure of an electronic device provided in an embodiment of the present application.
  • 4a to 4c are schematic diagrams of a set of application interfaces provided by the embodiments of the present application.
  • Fig. 5 shows a schematic diagram of interaction between devices according to some embodiments of the present application.
  • FIGS. 6a to 6d are schematic diagrams of another set of application interfaces provided by the embodiments of the present application.
  • Fig. 7 shows a schematic diagram of interaction between devices according to some embodiments of the present application.
  • Fig. 8 shows a schematic flowchart of a communication method according to some embodiments of the present application.
  • Fig. 9 shows a schematic flowchart of a communication method according to some embodiments of the present application.
  • Fig. 10 shows a schematic block diagram of a communication device according to some embodiments of the present application.
  • Fig. 11 shows a schematic block diagram of a communication device according to some embodiments of the present application.
  • Electronic devices in the Internet of Things often notify surrounding devices of their existence through broadcast messages (for example, Bluetooth broadcasts for heartbeat), and may also carry service data in these broadcast messages.
  • broadcast messages for example, Bluetooth broadcasts for heartbeat
  • electronic devices In order to identify itself, electronic devices often carry identification information in broadcast messages, making them easy to be identified and tracked. Some users with ulterior motives may monitor users through broadcast messages of the device.
  • the payload (AdvData field) of the Bluetooth broadcast message includes the company identifier (for example, 0x004c), the nearby field and the handoff field of the device as device identification information;
  • the payload of the broadcast message includes the company identifier (0x0006) and a 27-byte character string used as identification information.
  • these devices employ randomized MAC addresses (ie, source addresses), since broadcast messages are generally unencrypted and cannot be used for authentication. Therefore, it is easy for an attacker to obtain these characteristic information through monitoring for a period of time to track the device.
  • a secure connection for example, pairing
  • the number of connections that can be maintained by each device is limited (for example, generally a maximum of 7 devices can be connected at the same time), and there may be more devices that can be discovered around, and it is impossible to maintain an active connection with all devices.
  • some lightweight devices for example, smart water cups, smart toothbrushes, etc.
  • these lightweight devices can still be used when replacing rich devices such as mobile phones and tablet computers, or that other trusted devices with the same account or different accounts can also use them.
  • the trusted device when the device sends a broadcast message, the trusted device can identify the device.
  • the broadcast message of the electronic device may be randomized using its own identity key, only the device with the identity key can identify the source of the broadcast message.
  • the identity keys of devices can only be exchanged through pairing, which also brings inconvenience to the reception of broadcast messages and device identification.
  • the present application provides a solution for identifying a device by using a broadcast message for an application scenario of the Internet of Things.
  • trusted relationships are established between devices and mutual identity keys are exchanged, and then identity keys can be used to generate addresses for broadcast messages, so that devices can be identified by other devices without carrying identification information in their broadcast messages.
  • trusted devices when a first device (for example, a mobile phone, a tablet, etc.) receives a broadcast message from a second device (for example, a lightweight device), it can use its known identity key of a trusted device to verify The address of the broadcast message.
  • the verification indicates that the second device is its trusted device, and the corresponding identity key used also implies or corresponds to the identification information of the device, thereby realizing the security identification of the second device, and the second device
  • the second device does not need to carry identification information that may bring a risk of being tracked in its broadcast message.
  • Fig. 1 schematically shows a system diagram provided in this application.
  • the system includes a plurality of electronic devices, such as electronic device 200 , electronic device 201 , electronic device 202 , electronic device 203 , and electronic device 204 , which are exemplarily shown.
  • Each electronic device in the system can form a network (that is, a network) according to a certain communication protocol and networking strategy, so that each electronic device in the system can communicate with each other.
  • various electronic devices in the system may be connected through wireless communication.
  • At least one of the following wireless connection methods can be used to establish a connection: Bluetooth (blue tooth, BT) or low power Bluetooth (blue tooth low energy, BLE), near field communication (near field communication, NFC), wireless fidelity (wireless fidelity, Wi-Fi), or Wi-Fi Direct.
  • Bluetooth blue tooth
  • BLE Bluetooth low energy
  • NFC near field communication
  • Wi-Fi wireless fidelity
  • Wi-Fi Direct Wi-Fi Direct
  • the embodiment of the present application does not specifically limit the type of electronic device (such as electronic device 200, electronic device 201, electronic device 202, electronic device 203, or electronic device 204).
  • the electronic device in the embodiment of the present application It can be a mobile phone, wearable device (such as smart bracelet, smart watch, earphone, etc.), tablet computer, laptop computer (laptop), handheld computer, notebook computer, ultra-mobile personal computer (UMPC) , cellular phone, personal digital assistant (personal digital assistant, PDA), augmented reality (Augmented reality, AR) ⁇ virtual reality (virtual reality, VR) equipment and other equipment, it can also be TV, large screen, speaker, TV, refrigerator , air conditioners, car equipment, printers, projectors and other equipment.
  • Exemplary embodiments of electronic devices include, but are not limited to Electronic devices with Harmony or other operating systems.
  • the electronic device 200, the electronic device 201, the electronic device 202, the electronic device 203 and the electronic device 204 may be connected to a local area network (local area network, LAN) through a wired or wireless fidelity connection.
  • the electronic device 200, the electronic device 201, the electronic device 202, the electronic device 203, and the electronic device 204 communicate with each other through a local area network.
  • the electronic device 200 , the electronic device 201 , the electronic device 202 , the electronic device 203 and the electronic device 204 can also communicate with each other through third-party devices in the local area network, such as routers, gateways, and smart device controllers.
  • the electronic device 200 , the electronic device 201 , the electronic device 202 , the electronic device 203 and the electronic device 204 may have a distributed operating system. With this distributed operating system, the electronic device 200, the electronic device 201, the electronic device 202, the electronic device 203, and the electronic device 204 form trusted devices that have a trusted relationship with each other, forming a seemingly integrated system from the user's point of view.
  • HyperTerminal The hyper terminal function allows users to automatically connect all nearby smart devices equipped with the distributed operating system to form a collaborative work scene, for example, to identify other trusted devices that are currently active, establish connections with trusted devices and transfer data.
  • the electronic device 200, the electronic device 201, the electronic device 202, the electronic device 203, and the electronic device 204 when in the active state, send a broadcast message indicating a heartbeat to the surrounding environment, so that they can be covered by the HyperTerminal Other devices are recognized, and a secure connection between devices can be established according to the user's instructions.
  • system architecture does not constitute a specific limitation on the system architecture.
  • system architecture may include more or less devices than shown.
  • the electronic device 200 when the electronic device 200, the electronic device 201, the electronic device 202, the electronic device 203, and the electronic device 204 perform identification or communication, between the electronic devices It is necessary to verify or establish a trusted relationship to provide support for subsequent data synchronization.
  • the electronic device 200 can discover that one or more accounts logged in by other devices are the accounts of the electronic device 200 through the mobile network or the Internet, or that the accounts logged in by the one or more other devices are the accounts logged in by the electronic device 200 If the account is associated, the one or more other devices have a trust relationship with the electronic device 200 .
  • the one or more other devices include the electronic device 201 , the electronic device 202 , the electronic device 203 or the electronic device 204 . Devices logged into the same account or associated accounts can obtain each other's device information and realize data communication. Wherein, the associated account may be an account authorized by the same account.
  • the above-mentioned account may be an account provided by the cloud server provider for the user, such as a Huawei account, or an account used to log in to an application program, such as an account of various communication software, an account of payment software, and the like.
  • a trusted relationship can be established between electronic devices through manual addition, including, for example, touch and scan.
  • the user may enter the device management interface 310 from the setting application, and the device management interface 310 may include a list named "My Devices".
  • My Devices includes the machine and speakers.
  • the unit and the speaker can be devices with the same account (for example, sharing a Huawei account).
  • the unit and the audio system can be devices with different accounts but authenticated bindings.
  • the device management interface 310 may include a bind other device button 311 .
  • binding refers to the establishment of a trusted relationship between two devices, so that operations such as device identification and data synchronization between devices can be performed.
  • the device binding interface 320 shown in Figure 2b is entered. Select the device you want to bind in the addable device list. For example, room TV 321, tablet 322, and smart watch 323 shown in FIG. Binding button 321A or the binding button 322A corresponding to the tablet 322 or the binding button 323A corresponding to the smart watch 323 realizes binding to the room TV 321 or the tablet 322 or smart watch 323 .
  • the device binding interface 320 also includes a tap to add button 324 and a scan to add button 325, which can be bound to electronic devices that have not been scanned by the electronic device.
  • the electronic device in response to the user's operation on the touch add button 324, the electronic device turns on NFC, touches the ontag label on other devices with the back, and can realize the binding to other devices; The user operates the button 325, and the electronic device scans the two-dimensional code of other devices, which can realize the binding to other devices.
  • buttons, icons, text, etc. are not fixed, and can be freely combined or designed according to requirements .
  • button 311 in FIG. 2a may be replaced with button 324 and button 325 in FIG. 2b.
  • the identification and mutual communication between devices to implement the solution of the embodiment of the present application can be based on the same network (such as a hyper terminal); it can also be established on the basis of a trust relationship between the devices For example, a common account, an associated account, a binding relationship, etc.; it can also be based on the same network and the establishment of a trust relationship, which is not limited in this application.
  • the electronic device 100 is taken as an example below to introduce the electronic devices involved in the embodiment of the present application (the electronic device 100 includes the electronic device 200, the electronic device 201, the electronic device 202, the electronic device 203, the electronic device 204, etc.).
  • FIG. 3a shows a schematic structural diagram of an exemplary electronic device 100 provided by an embodiment of the present application.
  • the electronic device 100 may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (universal serial bus, USB) interface 130, a charging management module 140, a power management module 141, and a battery 142 , antenna 1, antenna 2, mobile communication module 150, wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, earphone jack 170D, sensor module 180, button 190, motor 191, indicator 192, camera 193 , a display screen 194, and a subscriber identification module (subscriber identification module, SIM) card interface 195, etc.
  • SIM subscriber identification module
  • the sensor module 180 may include a pressure sensor 180A, a gyroscope sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, an ambient light sensor 180L, bone conduction sensor 180M, etc.
  • the structure illustrated in the embodiment of the present application does not constitute a specific limitation on the electronic device 100 .
  • the electronic device 100 may include more or fewer components than shown in the figure, or combine certain components, or separate certain components, or arrange different components.
  • the illustrated components can be realized in hardware, software or a combination of software and hardware.
  • the processor 110 may include one or more processing units, for example: the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processing unit (graphics processing unit, GPU), an image signal processor (image signal processor, ISP), controller, memory, video codec, digital signal processor (digital signal processor, DSP), baseband processor, and/or neural network processor (neural-network processing unit, NPU) wait. Wherein, different processing units may be independent devices, or may be integrated in one or more processors.
  • application processor application processor, AP
  • modem processor graphics processing unit
  • GPU graphics processing unit
  • image signal processor image signal processor
  • ISP image signal processor
  • controller memory
  • video codec digital signal processor
  • DSP digital signal processor
  • baseband processor baseband processor
  • neural network processor neural-network processing unit, NPU
  • the controller may be the nerve center and command center of the electronic device 100 .
  • the controller can generate an operation control signal according to the instruction opcode and timing signal, and complete the control of fetching and executing the instruction.
  • a memory may also be provided in the processor 110 for storing instructions and data.
  • the memory in processor 110 is a cache memory.
  • the memory may hold instructions or data that the processor 110 has just used or recycled. If the processor 110 needs to use the instruction or data again, it can be called directly from the memory. Repeated access is avoided, and the waiting time of the processor 110 is reduced, thus improving the efficiency of the system.
  • processor 110 may include one or more interfaces.
  • the interface may include an integrated circuit (inter-integrated circuit, I2C) interface, an integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, a pulse code modulation (pulse code modulation, PCM) interface, a universal asynchronous transmitter (universal asynchronous receiver/transmitter, UART) interface, mobile industry processor interface (mobile industry processor interface, MIPI), general-purpose input and output (general-purpose input/output, GPIO) interface, subscriber identity module (subscriber identity module, SIM) interface, and /or universal serial bus (universal serial bus, USB) interface, etc.
  • I2C integrated circuit
  • I2S integrated circuit built-in audio
  • PCM pulse code modulation
  • PCM pulse code modulation
  • UART universal asynchronous transmitter
  • MIPI mobile industry processor interface
  • GPIO general-purpose input and output
  • subscriber identity module subscriber identity module
  • SIM subscriber identity module
  • USB universal serial bus
  • the I2C interface is a bidirectional synchronous serial bus, including a serial data line (serial data line, SDA) and a serial clock line (derail clock line, SCL).
  • processor 110 may include multiple sets of I2C buses.
  • the processor 110 can be respectively coupled to the touch sensor 180K, the charger, the flashlight, the camera 193, etc. through different I2C bus interfaces.
  • the processor 110 may be coupled to the touch sensor 180K through the I2C interface, so that the processor 110 and the touch sensor 180K communicate through the I2C bus interface to realize the touch function of the electronic device 100 .
  • the I2S interface can be used for audio communication.
  • processor 110 may include multiple sets of I2S buses.
  • the processor 110 may be coupled to the audio module 170 through an I2S bus to implement communication between the processor 110 and the audio module 170 .
  • the audio module 170 can transmit audio signals to the wireless communication module 160 through the I2S interface, so as to realize the function of answering calls through the Bluetooth headset.
  • the PCM interface can also be used for audio communication, sampling, quantizing and encoding the analog signal.
  • the audio module 170 and the wireless communication module 160 may be coupled through a PCM bus interface.
  • the audio module 170 can also transmit audio signals to the wireless communication module 160 through the PCM interface, so as to realize the function of answering calls through the Bluetooth headset. Both the I2S interface and the PCM interface can be used for audio communication.
  • the UART interface is a universal serial data bus used for asynchronous communication.
  • the bus can be a bidirectional communication bus. It converts the data to be transmitted between serial communication and parallel communication.
  • a UART interface is generally used to connect the processor 110 and the wireless communication module 160 .
  • the processor 110 communicates with the Bluetooth module in the wireless communication module 160 through the UART interface to realize the Bluetooth function.
  • the audio module 170 can transmit audio signals to the wireless communication module 160 through the UART interface, so as to realize the function of playing music through the Bluetooth headset.
  • the MIPI interface can be used to connect the processor 110 with peripheral devices such as the display screen 194 and the camera 193 .
  • MIPI interface includes camera serial interface (camera serial interface, CSI), display serial interface (display serial interface, DSI), etc.
  • the processor 110 communicates with the camera 193 through the CSI interface to realize the shooting function of the electronic device 100 .
  • the processor 110 communicates with the display screen 194 through the DSI interface to realize the display function of the electronic device 100 .
  • the GPIO interface can be configured by software.
  • the GPIO interface can be configured as a control signal or as a data signal.
  • the GPIO interface can be used to connect the processor 110 with the camera 193 , the display screen 194 , the wireless communication module 160 , the audio module 170 , the sensor module 180 and so on.
  • the GPIO interface can also be configured as an I2C interface, I2S interface, UART interface, MIPI interface, etc.
  • the USB interface 130 is an interface conforming to the USB standard specification, specifically, it can be a Mini USB interface, a Micro USB interface, a USB Type C interface, and the like.
  • the USB interface 130 can be used to connect a charger to charge the electronic device 100 , and can also be used to transmit data between the electronic device 100 and peripheral devices. It can also be used to connect headphones and play audio through them. This interface can also be used to connect other electronic devices, such as AR devices.
  • the interface connection relationship between the modules shown in the embodiment of the present application is only a schematic illustration, and does not constitute a structural limitation of the electronic device 100 .
  • the electronic device 100 may also adopt different interface connection manners in the foregoing embodiments, or a combination of multiple interface connection manners.
  • the charging management module 140 is configured to receive a charging input from a charger.
  • the charger may be a wireless charger or a wired charger.
  • the charging management module 140 can receive charging input from the wired charger through the USB interface 130 .
  • the charging management module 140 may receive a wireless charging input through a wireless charging coil of the electronic device 100 . While the charging management module 140 is charging the battery 142 , it can also provide power for electronic devices through the power management module 141 .
  • the power management module 141 is used for connecting the battery 142 , the charging management module 140 and the processor 110 .
  • the power management module 141 receives the input from the battery 142 and/or the charging management module 140 to provide power for the processor 110 , the internal memory 121 , the external memory, the display screen 194 , the camera 193 , and the wireless communication module 160 .
  • the power management module 141 can also be used to monitor parameters such as battery capacity, battery cycle times, battery health status (leakage, impedance).
  • the power management module 141 may also be disposed in the processor 110 .
  • the power management module 141 and the charging management module 140 may also be set in the same device.
  • the wireless communication function of the electronic device 100 can be realized by the antenna 1 , the antenna 2 , the mobile communication module 150 , the wireless communication module 160 , a modem processor, a baseband processor, and the like.
  • Antenna 1 and Antenna 2 are used to transmit and receive electromagnetic wave signals.
  • Each antenna in electronic device 100 may be used to cover single or multiple communication frequency bands. Different antennas can also be multiplexed to improve the utilization of the antennas.
  • Antenna 1 can be multiplexed as a diversity antenna of a wireless local area network.
  • the antenna may be used in conjunction with a tuning switch.
  • the mobile communication module 150 can provide wireless communication solutions including 2G/3G/4G/5G applied on the electronic device 100 .
  • the mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (low noise amplifier, LNA) and the like.
  • the mobile communication module 150 can receive electromagnetic waves through the antenna 1, filter and amplify the received electromagnetic waves, and send them to the modem processor for demodulation.
  • the mobile communication module 150 can also amplify the signals modulated by the modem processor, and convert them into electromagnetic waves through the antenna 1 for radiation.
  • at least part of the functional modules of the mobile communication module 150 may be set in the processor 110 .
  • at least part of the functional modules of the mobile communication module 150 and at least part of the modules of the processor 110 may be set in the same device.
  • a modem processor may include a modulator and a demodulator.
  • the modulator is used for modulating the low-frequency baseband signal to be transmitted into a medium-high frequency signal.
  • the demodulator is used to demodulate the received electromagnetic wave signal into a low frequency baseband signal. Then the demodulator sends the demodulated low-frequency baseband signal to the baseband processor for processing.
  • the low-frequency baseband signal is passed to the application processor after being processed by the baseband processor.
  • the application processor outputs sound signals through audio equipment (not limited to speaker 170A, receiver 170B, etc.), or displays images or videos through display screen 194 .
  • the modem processor may be a stand-alone device.
  • the modem processor may be independent from the processor 110, and be set in the same device as the mobile communication module 150 or other functional modules.
  • the wireless communication module 160 can provide applications on the electronic device 100 including UWB, wireless local area networks (wireless local area networks, WLAN) (such as wireless fidelity (wireless fidelity, Wi-Fi) network), bluetooth (bluetooth, BT), global Wireless communication solutions such as global navigation satellite system (GNSS), frequency modulation (FM), near field communication (NFC), and infrared (IR).
  • the wireless communication module 160 may be one or more devices integrating at least one communication processing module.
  • the wireless communication module 160 receives electromagnetic waves via the antenna 2 , frequency-modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 110 .
  • the wireless communication module 160 can also receive the signal to be sent from the processor 110 , frequency-modulate it, amplify it, and convert it into electromagnetic waves through the antenna 2 for radiation.
  • the antenna 1 of the electronic device 100 is coupled to the mobile communication module 150, and the antenna 2 is coupled to the wireless communication module 160, so that the electronic device 100 can communicate with the network and other devices through wireless communication technology.
  • the wireless communication technology may include global system for mobile communications (GSM), general packet radio service (general packet radio service, GPRS), code division multiple access (code division multiple access, CDMA), broadband Code division multiple access (wideband code division multiple access, WCDMA), time division code division multiple access (time-division code division multiple access, TD-SCDMA), long term evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC , FM, and/or IR techniques, etc.
  • GSM global system for mobile communications
  • GPRS general packet radio service
  • code division multiple access code division multiple access
  • CDMA broadband Code division multiple access
  • WCDMA wideband code division multiple access
  • time division code division multiple access time-division code division multiple access
  • TD-SCDMA time-division code division multiple access
  • the GNSS may include a global positioning system (global positioning system, GPS), a global navigation satellite system (global navigation satellite system, GLONASS), a Beidou navigation satellite system (beidou navigation satellite system, BDS), a quasi-zenith satellite system (quasi -zenith satellite system (QZSS) and/or satellite based augmentation systems (SBAS).
  • GPS global positioning system
  • GLONASS global navigation satellite system
  • Beidou navigation satellite system beidou navigation satellite system
  • BDS Beidou navigation satellite system
  • QZSS quasi-zenith satellite system
  • SBAS satellite based augmentation systems
  • the electronic device 100 realizes the display function through the GPU, the display screen 194 , and the application processor.
  • the GPU is a microprocessor for image processing, and is connected to the display screen 194 and the application processor. GPUs are used to perform mathematical and geometric calculations for graphics rendering.
  • Processor 110 may include one or more GPUs that execute program instructions to generate or change display information.
  • the display screen 194 is used to display images, videos and the like.
  • the display screen 194 includes a display panel.
  • the display panel can be a liquid crystal display (LCD), an organic light-emitting diode (OLED), an active matrix organic light emitting diode or an active matrix organic light emitting diode (active-matrix organic light emitting diode, AMOLED), flexible light-emitting diode (flex light-emitting diode, FLED), Miniled, MicroLed, Micro-oLed, quantum dot light emitting diodes (quantum dot light emitting diodes, QLED), etc.
  • the electronic device 100 may include 1 or N display screens 194 , where N is a positive integer greater than 1.
  • the display screen 194 displays interface content currently output by the system.
  • the interface content is an interface provided by an instant messaging application.
  • the electronic device 100 can realize the shooting function through the ISP, the camera 193 , the video codec, the GPU, the display screen 194 and the application processor.
  • the ISP is used for processing the data fed back by the camera 193 .
  • the light is transmitted to the photosensitive element of the camera through the lens, and the light signal is converted into an electrical signal, and the photosensitive element of the camera transmits the electrical signal to the ISP for processing, and converts it into an image visible to the naked eye.
  • ISP can also perform algorithm optimization on image noise, brightness, and skin color.
  • ISP can also optimize the exposure, color temperature and other parameters of the shooting scene.
  • the ISP may be located in the camera 193 .
  • Camera 193 is used to capture still images or video.
  • the object generates an optical image through the lens and projects it to the photosensitive element.
  • the photosensitive element may be a charge coupled device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor.
  • CMOS complementary metal-oxide-semiconductor
  • the photosensitive element converts the light signal into an electrical signal, and then transmits the electrical signal to the ISP to convert it into a digital image signal.
  • the ISP outputs the digital image signal to the DSP for processing.
  • DSP converts digital image signals into standard RGB, YUV and other image signals.
  • the electronic device 100 may include 1 or N cameras 193 , where N is a positive integer greater than 1.
  • Digital signal processors are used to process digital signals. In addition to digital image signals, they can also process other digital signals. For example, when the electronic device 100 selects a frequency point, the digital signal processor is used to perform Fourier transform on the energy of the frequency point.
  • Video codecs are used to compress or decompress digital video.
  • the electronic device 100 may support one or more video codecs.
  • the electronic device 100 can play or record videos in various encoding formats, for example: moving picture experts group (moving picture experts group, MPEG) 1, MPEG2, MPEG3, MPEG4 and so on.
  • MPEG moving picture experts group
  • the NPU is a neural-network (NN) computing processor.
  • NN neural-network
  • Applications such as intelligent cognition of the electronic device 100 can be realized through the NPU, such as image recognition, face recognition, speech recognition, text understanding, and the like.
  • the external memory interface 120 can be used to connect an external memory card, such as a Micro SD card, so as to expand the storage capacity of the electronic device 100.
  • the external memory card communicates with the processor 110 through the external memory interface 120 to implement a data storage function. Such as saving music, video and other files in the external memory card.
  • the internal memory 121 may be used to store computer-executable program codes including instructions.
  • the processor 110 executes various functional applications and data processing of the electronic device 100 by executing instructions stored in the internal memory 121 .
  • the internal memory 121 may include an area for storing programs and an area for storing data.
  • the stored program area can store an operating system, at least one application program required by a function (such as a sound playing function, an image playing function, etc.) and the like.
  • the storage data area can store data created during the use of the electronic device 100 (such as audio data, phonebook, etc.) and the like.
  • the internal memory 121 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, flash memory device, universal flash storage (universal flash storage, UFS) and the like.
  • the electronic device 100 can implement audio functions through the audio module 170 , the speaker 170A, the receiver 170B, the microphone 170C, the earphone interface 170D, and the application processor. Such as music playback, recording, etc.
  • the audio module 170 is used to convert digital audio information into analog audio signal output, and is also used to convert analog audio input into digital audio signal.
  • the audio module 170 may also be used to encode and decode audio signals.
  • the audio module 170 may be set in the processor 110 , or some functional modules of the audio module 170 may be set in the processor 110 .
  • Speaker 170A also referred to as a "horn" is used to convert audio electrical signals into sound signals.
  • Electronic device 100 can listen to music through speaker 170A, or listen to hands-free calls.
  • Receiver 170B also called “earpiece” is used to convert audio electrical signals into sound signals.
  • the receiver 170B can be placed close to the human ear to receive the voice.
  • the microphone 170C also called “microphone” or “microphone” is used to convert sound signals into electrical signals. When making a phone call or sending a voice message, the user can put his mouth close to the microphone 170C to make a sound, and input the sound signal to the microphone 170C.
  • the electronic device 100 may be provided with at least one microphone 170C. In some other embodiments, the electronic device 100 may be provided with two microphones 170C, which may also implement a noise reduction function in addition to collecting sound signals. In some other embodiments, the electronic device 100 can also be provided with three, four or more microphones 170C to collect sound signals, reduce noise, identify sound sources, and realize directional recording functions, etc.
  • the earphone interface 170D is used for connecting wired earphones.
  • the earphone interface 170D can be a USB interface 130, or a 3.5mm open mobile terminal platform (OMTP) standard interface, or a cellular telecommunications industry association of the USA (CTIA) standard interface.
  • OMTP open mobile terminal platform
  • CTIA cellular telecommunications industry association of the USA
  • the keys 190 include a power key, a volume key and the like.
  • the key 190 may be a mechanical key. It can also be a touch button.
  • the electronic device 100 can receive key input and generate key signal input related to user settings and function control of the electronic device 100 .
  • the motor 191 can generate a vibrating reminder.
  • the motor 191 can be used for incoming call vibration prompts, and can also be used for touch vibration feedback.
  • touch operations applied to different applications may correspond to different vibration feedback effects.
  • the motor 191 may also correspond to different vibration feedback effects for touch operations acting on different areas of the display screen 194 .
  • Different application scenarios for example: time reminder, receiving information, alarm clock, games, etc.
  • the touch vibration feedback effect can also support customization.
  • the indicator 192 can be an indicator light, and can be used to indicate charging status, power change, and can also be used to indicate messages, missed calls, notifications, and the like.
  • the SIM card interface 195 is used for connecting a SIM card.
  • the SIM card can be connected and separated from the electronic device 100 by inserting it into the SIM card interface 195 or pulling it out from the SIM card interface 195 .
  • the above specific description of the hardware structure of the electronic device 100 is applicable to the description of the hardware structure of the electronic device 200 , the electronic device 201 , the electronic device 202 , the electronic device 203 , and the electronic device 204 .
  • Fig. 3b shows a software structural block diagram of the electronic device 100 according to the embodiment of the present application.
  • the layered architecture divides the software into several layers, and each layer has a clear role and division of labor. Layers communicate through software interfaces.
  • the Android system is divided into five layers, from top to bottom are application program layer, application program framework layer, Android runtime (Android runtime) and system library, hardware abstraction layer (hard abstraction layer, HAL) (not shown in Figure 3b), and the inner core layer.
  • the application layer can consist of a series of application packages.
  • the application package can include camera, gallery, calendar, call, map, navigation, WLAN, Bluetooth, music, video, game, shopping, travel, instant messaging (such as short message) and other applications.
  • the application package may also include: system applications such as a main screen (that is, a desktop), a negative screen, a control center, and a notification center.
  • the application program package may further include a hyper terminal application, and the hyper terminal application may be a system application or a third-party application.
  • the application package may also include an application program of the task flow manager, which is used to invoke and manage the task flow manager.
  • the HyperTerminal application provides a service or function that can support the electronic device 100 to establish a trusted device network with other electronic devices, and can support the electronic device 100 to identify the activity of the electronic device 100 by receiving the broadcast heartbeat message of the trusted device. trusted device.
  • the application framework layer provides an application programming interface (application programming interface, API) and a programming framework for applications in the application layer.
  • the application framework layer includes some predefined functions.
  • the application framework layer can include task flow manager, database management system DBMS, local task flow database, distributed database, input manager, window manager (window manager), content provider, view system, Phone Manager, Explorer, Notification Manager, Display Manager, Activity Manager, etc.
  • the trusted device manager is used to manage a trusted device collection of the electronic device.
  • the trusted device set includes the identity key, current address, state information, etc. of the trusted device.
  • the trusted device manager adds, updates, and deletes trusted devices based on information that can authenticate the system. Trusted device management can also generate and update the identity key of the electronic device 100 itself.
  • Database management system is a kind of software for manipulating and managing databases. It is used to establish, use and maintain databases, including the interface for calling databases. DBMS conducts unified management and control on the database to ensure the security and integrity of the database.
  • the authentication system is used to determine whether the device is a trusted device of the electronic device 100 based on authentication information from other devices.
  • the authentication information may be account information, binding information, and the like.
  • the account management system is configured to record and manage the information of the user account of the first electronic device 100 .
  • User accounts include, for example, Huawei accounts, payment accounts, instant messaging accounts, etc., and account associations in these different systems.
  • the super collection application of the electronic device 100 calls the client of the task flow manager (the application program of the task flow manager) to register the task monitoring service with the local task flow database.
  • the client of the task flow manager calls the interface of the database management system DBMS, and registers the task monitoring service with the task flow manager.
  • the task monitoring service is used to synchronize the changed task data to the super collection application when the task flow manager detects that task data in the local task flow database has changed (such as adding, deleting, changing).
  • the input manager is used to receive instructions or requests reported by lower layers such as the kernel layer and the hardware abstraction layer.
  • a window manager is used to manage window programs.
  • the window manager can get the size of the display screen, determine whether there is a status bar, lock the screen, capture the screen, etc.
  • Content providers are used to store and retrieve data and make it accessible to applications.
  • Said data may include video, images, audio, calls made and received, browsing history and bookmarks, phonebook, etc.
  • the view system includes visual controls, such as controls for displaying text, controls for displaying pictures, and so on.
  • the view system can be used to build applications.
  • An application's display interface can consist of one or more views.
  • a display interface including a text message notification icon may include a view for displaying text and a view for displaying pictures.
  • the view system can provide views of hyperterminal applications, such as an interface for building a hyperterminal, an interface for discovering active trusted devices, and the like.
  • the display manager is used to transfer display content to the kernel layer.
  • the phone manager is used to provide communication functions of the electronic device 100 . For example, the management of call status (including connected, hung up, etc.).
  • the resource manager provides various resources for the application, such as localized strings, icons, pictures, layout files, video files, and so on.
  • the notification manager enables the application to display notification information in the status bar, which can be used to convey notification-type messages, and can automatically disappear after a short stay without user interaction.
  • the notification manager is used to notify the download completion, message reminder, etc.
  • the notification manager can also be a notification that appears on the top status bar of the system in the form of a chart or scroll bar text, such as a notification of an application running in the background, or a notification that appears on the screen in the form of a dialog window.
  • prompting text information in the status bar issuing a prompt sound, vibrating the electronic device, and flashing the indicator light, etc.
  • the Android Runtime includes core library and virtual machine. The Android runtime is responsible for the scheduling and management of the Android system.
  • the core library consists of two parts: one part is the function function that the java language needs to call, and the other part is the core library of Android.
  • the application layer and the application framework layer run in virtual machines.
  • the virtual machine executes the java files of the application program layer and the application program framework layer as binary files.
  • the virtual machine is used to perform functions such as object life cycle management, stack management, thread management, security and exception management, and garbage collection.
  • a system library can include multiple function modules. For example: surface manager (surface manager), media library (media libraries), 3D graphics processing library (eg: OpenGL ES), 2D graphics engine (eg: SGL), etc.
  • the surface manager is used to manage the display subsystem and provides the fusion of 2D and 3D layers for multiple applications.
  • the media library supports playback and recording of various commonly used audio and video formats, as well as still image files, etc.
  • the media library can support a variety of audio and video encoding formats, such as: MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc.
  • the 3D graphics processing library is used to implement 3D graphics drawing, image rendering, compositing, and layer processing, etc.
  • 2D graphics engine is a drawing engine for 2D drawing.
  • the hardware abstraction layer HAL layer is the interface layer between operating system software and hardware components, which provides an interface for the interaction between the upper layer software and the lower layer hardware.
  • the HAL layer abstracts the underlying hardware into software that contains the corresponding hardware interface. By accessing the HAL layer, the underlying hardware device settings can be realized, for example, related hardware components can be enabled or disabled at the HAL layer.
  • the core architecture of the HAL layer is composed of at least one of C++ or C.
  • the kernel layer is the layer between hardware and software.
  • the kernel layer includes at least a display driver, a camera driver, an audio driver, a sensor driver, a touch chip driver and an input system, etc.
  • the kernel layer includes an input system, a driver of a touch chip, a display driver and a storage driver as examples.
  • the display driver and the storage driver can be jointly arranged in the driver module.
  • the structure illustrated in this application does not constitute a specific limitation on the electronic device 100 .
  • the electronic device 100 may include more or fewer components than shown, or combine certain components, or separate certain components, or arrange different components.
  • the illustrated components can be realized in hardware, software or a combination of software and hardware.
  • the implementation form of a method for identifying a device provided in this application on a display interface is introduced below in combination with application scenarios.
  • the method for identifying a device may be implemented in, for example, a HyperTerminal application. It should be understood that the method may also be implemented in other application software of the electronic device, or in a system program of the electronic device, which is not limited in the present application.
  • FIG. 4a shows an exemplary user interface 410 on the electronic device 100 for presenting a list of application programs.
  • the user interface 410 includes a status bar 402 and a plurality of application icons 404 on the upper part of the user interface.
  • Status bar 402 may include: one or more signal strength indicators for mobile communication signals (also may be referred to as cellular signals), one or more signal strength indicators for wireless fidelity (Wi-Fi) signals, battery Status indicator, time indicator.
  • signal strength indicators for mobile communication signals also may be referred to as cellular signals
  • Wi-Fi wireless fidelity
  • battery Status indicator battery Status indicator
  • time indicator time indicator
  • the display interface 410 displays a plurality of application icons, for example, including application icons corresponding to application programs such as cloud sharing, mailbox, gallery, and settings.
  • the user interface 410 also includes an area 406 for entering the control center interface of the electronic device, and the area 406 may be set at the top area of the display interface 410 .
  • the display interface 410 may switch to the control center interface 420, as shown in FIG. 4b.
  • an interface of the hyperterminal application 413 is shown, whereby the hyperterminal application can be started.
  • the display form of the hyperterminal application 413 may be an application icon, or may be a card, a window, a floating component, and the like.
  • FIG. 4b exemplarily shows an application interface 420 of a hyperterminal application.
  • the application interface 420 includes a shortcut control bar 411 , a media application 412 , and a hyper terminal application 413 .
  • the shortcut control bar 411 includes icons for controlling common configurations of electronic devices, such as wireless local area network, bluetooth, mobile data, mute, auto-rotate, and brightness control (auto-brightness check box).
  • Media applications 412 include, for example, video applications, music applications, etc., and associated controls.
  • One or more device information areas 414 are displayed in the display area of the HyperTerminal application 413 , and each device information area 414 corresponds to a trusted device of the electronic device 100 .
  • a trusted device for example, as shown in the figure, four trusted devices are listed in the hyperterminal 413, including a smart switch, a water dispenser, a smart camera, and a watch.
  • the device information area 414 displays information such as the device name, the status of the device, the location of the device, and the control keys of the device, so that the user can easily and intuitively understand the status of the currently available device, and communicate with it through the electronic device 100. interact.
  • the hyperterminal application 413 does not necessarily display all trusted devices of the electronic device 100, in this case, more devices of trusted devices can be displayed in a scrolling manner by clicking the more device control 415 operating area.
  • the devices displayed in the hyperterminal application 413 include trusted devices that are currently active.
  • the electronic device 100 may discover active trusted devices in response to receiving a broadcast message (for example, a heartbeat message) of the trusted device, and present the discovered active trusted devices on the control center interface 410 in the display area of the hyper terminal application 413.
  • a broadcast message for example, a heartbeat message
  • the currently inactive trusted devices may also be displayed.
  • Active trusted devices and inactive trusted devices can be represented in different displays, for example, active trusted devices can be displayed as a color map, while inactive devices can be displayed as a grayscale map.
  • the device information area 414 can display service data related to the device.
  • the service data is not necessarily transmitted through the connection between the electronic device 100 and the device, and is carried in a broadcast message sent by the device.
  • a smart water dispenser may include information such as the current remaining water volume and temperature of the water dispenser in the payload portion of its broadcast message (for example, heartbeat information). This information changes frequently and therefore cannot be easily tracked.
  • the electronic device 100 can obtain business data such as the state of active trusted devices without additionally establishing a connection between devices.
  • the hyperterminal application 413 also includes an icon 416 for establishing a connection between the electronic device 100 and the active trusted device.
  • the electronic device 100 can switch to the cooperative operation interface shown in FIGS. 6a to 6d to realize the collaboration of the hyperterminal, which will be described in detail below with reference to FIGS. 6a to 6d and FIG. 7 .
  • the hyperterminal application 413 also includes an icon 417 for discovering trusted devices to form a hyperterminal.
  • the electronic device 100 may switch to the hyperterminal networking interface 430 shown in FIG. 4c.
  • the process of building a HyperTerminal will be described with reference to FIG. 5 .
  • a device network is formed by forming a hyper terminal.
  • the HyperTerminal application is only an exemplary application for realizing the embodiment of the present application, and therefore, a device network may also be established in other application software or system software.
  • the user manually operates the electronic device 100 to trigger the process of forming a device network, but the electronic device 100 may also trigger the process of establishing a device network spontaneously.
  • Fig. 5 shows a schematic diagram of interaction between devices and between a user and a device according to some embodiments of the present application.
  • the first electronic device 100 presents the control center interface as shown in FIG. 4 b , including a hyper terminal application 413 .
  • the user 10 wishes to find more trusted devices, such as the second electronic device 101 , to form a hyperterminal with the first electronic device 100 .
  • the second electronic device 101 may have similar functions and structures as the first electronic device 100 as shown in FIG. 3 .
  • the second electronic device 101 may have fewer functions and structures than the electronic device 100 shown in FIG. Lightweight devices for computing and storage resources.
  • the user 10 expects the electronic device 100 to discover the surrounding electronic devices and check the information of these electronic devices, so as to choose whether to add these electronic devices to the HyperTerminal.
  • the user 10 can click the icon 417 to generate a networking request 502 .
  • the user can also issue a networking request 502 through a voice command.
  • the first electronic device 100 displays the interface 430 described in FIG. 4c.
  • the interface 430 may include a device information area 421 similar to the device information area 414 shown in FIG. 4 b , and the device information area 421 presents information of trusted devices of the first electronic device 100 that are currently active.
  • the first electronic device 100 may function as a master device (eg, Bluetooth communication mode) to scan whether there is a broadcast message on a specific frequency.
  • a master device eg, Bluetooth communication mode
  • the user can manually adjust the second electronic device 101 to the discoverable mode.
  • the second electronic device 101 may send a broadcast message 504 on a specific frequency band, so that the second electronic device 101 can be discovered as a slave device.
  • the address of the broadcast message may be completely randomized, and some device model information and the like may be carried in the payload part of the broadcast message. This broadcast message cannot be monitored and tracked.
  • the first electronic device 100 may present 506 the discovered device list 422 including the second electronic device 101 on the interface 430 .
  • the second electronic device 101 is only discovered by the first electronic device 100, but the first electronic device 100 does not know whether it is a trusted device, and has not established a connection with the second electronic device 101, so it cannot exchange respective identity keys.
  • the device is discovered by scanning and the discovered device is displayed on the application interface of the hyper terminal. It should be understood that the device can also be discovered and presented to the user in other ways, which is not limited in this application. For example, the process of scanning and discovering devices can also be enabled from a connection setting interface (eg, a Bluetooth connection setting interface) of the electronic device 100 .
  • a connection setting interface eg, a Bluetooth connection setting interface
  • the user selects a device of interest (for example, the second electronic device 101) to join the HyperTerminal.
  • a device of interest for example, the second electronic device 101
  • the user 10 may click on the add icon 423 corresponding to the second electronic device 101 on the interface 430 to request 508 to add the second electronic device 101 to the trusted device network of the HyperTerminal. Adding the icon 423 may trigger an authentication process for the electronic device 101 .
  • the first electronic device 100 may send an authentication request 510 to the second electronic device 101 , eg, broadcast using the fully randomized address in the broadcast message 504 .
  • the trusted relationship can be established through the device's account information.
  • the authentication request 510 may include the account information of the first electronic device 100, and accordingly, the second electronic device 101 may send information 512 for authentication to the first electronic device according to the account information of the first electronic device 100, for example , the information indicates that the first electronic device 100 and the second electronic device 101 have the same or associated accounts.
  • the same or associated accounts may include, for example, the accounts on the first electronic device 100 and the second electronic device 102 are the same Huawei account or other service provider accounts, or the first electronic device 100 and the second electronic device
  • the accounts on 101 are different accounts, but are associated with the same identity, for example, associated with the same mobile phone number, communication software account, payment software account, etc.
  • the second electronic device 101 does not need to transmit or broadcast its account information to the first electronic device, but the first electronic device 100 transmits the account information to the second electronic device. In this case, the second electronic device 101 only needs to verify whether the two account information are the same or related, and then transmit the verification result as authentication information 510 to the first electronic device.
  • the first electronic device 100 and the second electronic device 101 may establish a trusted relationship manually.
  • the first electronic device 100 and the second electronic device 101 may be bound, for example, in the manner described with reference to Fig. 2a and Fig. 2b.
  • the second electronic device 101 can feed back the binding information to the first electronic device 100 authentication information 512.
  • the first electronic device 100 determines whether it has been bound with the second electronic device 101, that is, the two have a trusted relationship with each other.
  • the binding information may also indicate how the first electronic device 100 and the second electronic device 101 are bound, for example, a PIN code, a two-dimensional code, physical contact, and the like.
  • the first electronic device 100 may determine 514 that the second electronic device 101 is its trusted device. It is described here that the trusted relationship is determined through the account signal and binding information. It should be understood that other methods may also be used to determine whether the second electronic device 101 is a trusted device, which is not limited in this application.
  • the devices included in the HyperTerminal can share their respective identity keys.
  • the identity key of the device is used to generate the randomized address of the broadcast message. Other devices are thus able to identify the source device of the broadcast message based on the shared identity key.
  • the identity key and its exchange process are described in more detail below.
  • the identity key is that the electronic device generates a password (for example, a character string of a certain length), and keeps the identity key unchanged within a period of time.
  • the identity key of the electronic device can be shared with the trusted device of the electronic device through a secure communication connection. Compared with the fixed address, the electronic device can use the identity key to generate a variable randomized address as the source address of the broadcast message, so as to reduce the risk of information leakage.
  • the address of a broadcast message consists of 6 bytes (48 bits).
  • the electronic device can generate a randomized address by using the changed random number and its own identity key, where the identity key can be an identity resolution key conforming to the Bluetooth communication protocol.
  • the random number may be regenerated, for example, each time the device is rebooted, or at any suitable time.
  • a randomized address may consist of two parts, one of which is a random number part, e.g., the upper 24 bits (most significant bit MSB), wherein the upper two bits may be in a specified format (e.g., binary "10") for Identifies the type of address.
  • the randomized address may also include a value obtained through operation (for example, hash operation) of the random number and the identity key, such as the lower 24 bits. It should be understood that the format of the randomized address is not limited thereto,
  • the peer device receiving the broadcast message scans this type of address, it can use the identity key of the trusted device set owned by the device to verify the randomized address. That is to say, the device uses the high-order random number in the randomized address and the identity key sequentially obtained from the trusted device set to perform the same hash operation, and compares the operation result with the low-order 24 bits. If the two match, the peer device can identify the source device of the broadcast message. In this way, no matter how a device changes its randomized address by changing its nonce, only the peer device holding the identity key (i.e., the peer device and the device have a trusted relationship with each other) can identify the device. If none of the identity keys in the trusted device set match the randomized address, the device cannot be identified.
  • randomized address can also be generated from the identity key in other ways than this.
  • another part of the randomized address for matching can also be obtained from the random number and the identity key in other ways, not limited to hashing.
  • the exchange process of the identity key is described.
  • the first electronic device 100 After the trusted relationship between the first electronic device 100 and the second electronic device 101 is determined, the first electronic device 100 establishes a secure connection 516 with the second electronic device 101 . Then, the first electronic device 100 may send the identity key 517 of the first electronic device to the second electronic device 101 via the secure connection, and receive the identity key 518 of the second electronic device 101 from the second electronic device 101 .
  • the first electronic device 100 stores 520 the received identity key of the second electronic device 101 in its trusted device set.
  • the second electronic device 101 also stores 522 the received identity key of the first electronic device 100 in its trusted device set.
  • the second electronic device 101 is a light-weight device and thus has only limited storage space and computing power (for example, a smart socket, a smart water dispenser, etc.)
  • the first electronic device 100 may not send the second electronic device 101
  • the second electronic device 101 sends its identity key, and the second electronic device 101 does not store the identity key of the first electronic device 100 either.
  • the identity keys may also be forwarded and further shared in the device network of the hyperterminal.
  • the first electronic device 100 may also spread the identity key of the second electronic device 101 newly added to the hyper terminal in the hyper terminal.
  • the first electronic device 100 has a set of trusted devices, and the first electronic device 100 may send the identity key of the second electronic device 101 to a trusted device in the set of trusted devices.
  • the second electronic device 100 may send the identity key of the second electronic device 101 to a rich device with more processing capability and storage space, for example, a connected watch 424 as shown in FIG. 4c.
  • the first electronic device 100 and the watch 424 have a trusted relationship, and when the first electronic device 100 and the second electronic device 101 have been determined to have a trusted relationship, the watch 424 and the second electronic device 101 also have trusted relationship.
  • the first electronic device 100 may also send the identity keys of trusted devices in its trusted device set to the second electronic device 101, so that the second electronic device 101 does not need to perform additional authentication and exchange identity keys with these devices. key. Therefore, by forwarding the identity key to other hyperterminals, that is, other trusted devices in the trusted device network, it is unnecessary to establish a secure connection between the devices to exchange identity keys after pairing or verifying the trusted relationship.
  • the operation speeds up the process of establishing a trusted device network.
  • the second electronic device 101 can also log out of the HyperTerminal. You can log out of the network in the following ways.
  • the user 10 of the first electronic device 100 has administrator authority, he can operate on the electronic device 100 to operate the second electronic device 101 to exit the HyperTerminal.
  • the user 10 can also operate the second electronic device 101, for example, restore the second electronic device 101 to factory settings. Restoring factory settings means that the second electronic device 101 will generate a new identity key, which needs to be re-authenticated to join the HyperTerminal.
  • the second electronic device 101 logs out of the original user account (that is, an account that is the same as or associated with the first electronic device), the second electronic device 101 can also generate a new identity key, and the new identity key It can be used to build a new HyperTerminal or re-authenticate.
  • the second electronic device 101 may also be manually unbound from the trusted device.
  • the second electronic device 101 may send a message to its trusted device, such as the first electronic device 100, to exit the trusted relationship.
  • the second electronic device 101 may send a message of quitting the trusted relationship to a trusted module (such as an account center, an authentication center) in the hyperterminal, and then the trusted module sends the message to the device in the hyperterminal. information.
  • the first electronic device 100 may receive a message from the trusted module indicating that the second electronic device 101 exits the HyperTerminal.
  • the first electronic device 100 can delete the identity key of the second electronic device 101 from its set of trusted devices.
  • the second electronic device 101 when the second electronic device 101 goes offline, for example, it is turned off, its identity key may not be deleted, so as to facilitate the quick re-online of the device.
  • the electronic device 101 When the electronic device 101 is online, it can periodically send a heartbeat broadcast message, so that devices in the hyperterminal that have a trusted relationship with it (for example, hold its identity key) can identify that it is in an active state.
  • the first electronic device 100 can exchange their identity keys with other devices certified as trusted devices to form a trusted device network.
  • devices will be able to broadcast messages
  • the address information of the device is used to identify the device without carrying the identification information in the broadcast message, which prevents the device from being monitored and tracked.
  • hyperterminal networking with reference to exemplary user interfaces and interaction diagrams. It should be understood that the positions, names, and shapes of the elements (such as buttons, icons, text, etc.) in the UI interfaces corresponding to Figures 4a to 4c are not fixed, and can be freely combined or designed according to requirements .
  • the process of hyperterminal networking can be implemented in a manner different from the interaction diagram shown in Figure 5, for example, it can include more or fewer actions, and some actions can be performed in a manner different from the order shown in Figure 5 , or may be executed in parallel to realize various functions of the HyperTerminal application as described above.
  • FIGS. 6 a to 6 d and FIG. 7 are schematic diagrams of another set of application interfaces provided by the embodiments of the present application.
  • Fig. 7 shows a schematic diagram of interaction between devices according to some embodiments of the present application.
  • the first electronic device 100 displays the control center interface 420 including the HyperTerminal application 413 as shown in FIG. 6a.
  • the hyperterminal application 413 includes a device information area 414 for one or more trusted devices.
  • the first electronic device 100 may provide the user 10 with information related to active trusted devices in response to the query request 702 of the user 10 .
  • a query request 702 is generated, so that the first electronic device 100 can query active trusted devices, thereby presenting in the device information area 414 of the hyperterminal application 413 The current state of one or more trusted devices and their control elements.
  • the first electronic device 100 may not display the device information area 414, but list a list of trusted devices in the hyperterminal application display area, for example, only display the device name and corresponding icons to save display space; then, when the user wishes to inquire about active trusted devices, the user performs a specific operation on the first electronic device 100 to generate a query request 702, for example, by clicking the icon 416 to trigger the first electronic device 100.
  • the device 100 queries active trusted devices.
  • the first electronic device 100 may periodically query active trusted devices in the background without user interaction.
  • a device in the Internet of Things such as the second electronic device 101, can periodically send a heartbeat broadcast message 704 when going online.
  • the first electronic device 100 may receive the broadcast message 704 of the second electronic device 101 based on the query request 702 or periodically through scanning.
  • the first electronic device 100 determines whether the second electronic device 101 is as a trusted device.
  • the first electronic device 100 may determine that the source address of the broadcast message 704 is the second A randomized address generated by the identity key of the electronic device 101 . Based on this, the first electronic device 100 may use the identity key of the trusted device set to verify the source address in a traversal manner. If the identity key of a certain trusted device enables the source address of the broadcast message to be verified, the first electronic device 100 may determine the second electronic device 101 as an active trusted device. In other words, the trusted device corresponding to the identity key is the second electronic device, thereby identifying the second electronic device 101 as an active trusted device.
  • the manner of verifying the source address of the broadcast message may correspond to the manner in which the second electronic device 101 generates the randomized source address.
  • the first electronic device 100 generates a hash value based on the first identity key from the set of trusted devices and a part of the randomized address (for example, a random number included in the upper 24 bits). Then, the first electronic device 100 compares the hash value with another part (for example, lower 24 bits) of the randomized address. If the generated hash matches another part of the randomized address, the broadcast message is verified. This indicates that the first identity key used to calculate the hash value is the identity key of the second electronic device 101 .
  • the first electronic device 100 may continue to scan to find the next broadcast message, and repeat the above process, so as to obtain all currently active trusted devices of the first electronic device 100 .
  • the first electronic device 100 may provide 708 information of the device.
  • device information may be provided in a list or graphical manner.
  • the first electronic device 100 discovers and identifies other active devices in the HyperTerminal.
  • the specific way of providing device information may be: when the user 10 performs an operation to enter the interface 420 and the first electronic device 100 is triggered to inquire about the active trusted device, the trusted device related to the active device may be presented in the hyperterminal application 413 of the user interface 420. Information 414 of the device.
  • the specific way of providing device information may also be: when the first electronic device 101 enters the cooperative operation interface 440 shown in FIG.
  • Information related to active trusted devices may be displayed in user interface 440 .
  • the exemplary user interface 440 shown in FIG. 6 b includes an icon 442 corresponding to the first electronic device 110 at the center of the interface and at least one active trusted device icon 444 arranged around the icon 442 .
  • the information of electronic devices determined to be active trusted devices is provided in such a graphical or animated manner.
  • the device information may also be transmitted to other electronic devices other than the first electronic device 100, for example, a device that performs a collaborative task with the electronic device 100, for example, a smart TV.
  • the user 10 may operate 710 the icon 444 of the second electronic device to initiate task collaboration.
  • the user 10 can select the icon 444 corresponding to the smart water dispenser, drag it to the vicinity of the icon 442 of the first electronic device 100, and establish the smart water dispenser and the first electronic device in this intuitive operation mode. Synergy between 100's of missions.
  • the first electronic device 100 may establish 712 a connection with the corresponding second electronic device 101 .
  • the first electronic device 100 can send control commands to the smart water dispenser via the established connection, such as shutting down, heating, etc. If the second electronic device 101 is a smart speaker, the first electronic device 100 may transmit audio data to the smart speaker through the established connection.
  • the embodiment of the present application does not limit the type and associated service of the second electronic device.
  • the first electronic device 100 and the second electronic device 101 have a trusted relationship, the first electronic device can identify the second electronic device in an active state through the address information of the broadcast system of the second device. Therefore, the second electronic device can be identified without broadcasting its identification information, which reduces the risk of the second electronic device being monitored and tracked.
  • the first electronic device 100 can manage the hyperterminal, for example, add and delete the identity key of the target device in the set of trusted devices. Adding an identity key in the process of building a device network has been described above with reference to 4a to 4c and FIG. 5 .
  • the electronic device 100 may also delete the identity key of the target electronic device from the trusted device set.
  • the target electronic device may be the second electronic device 101 or other active trusted devices.
  • the following describes an exemplary operation for the user 10 to delete the identity key in the hyper terminal application. It should be understood that the operation of deleting the identity key can also be implemented in other applications or system software, which is not limited in this application.
  • the user 10 can also operate on the task collaboration interface 440 shown in FIG. 6b to release the trusted relationship of one or more active electronic devices.
  • the lower part of the interface 440 includes an icon 446 , and the user 10 drags the icon 448 of the target electronic device to overlap with the icon 446 to release the trusted relationship in an intuitive operation manner.
  • the first electronic device 100 deletes the identity key of the target electronic device 448 from its set of trusted devices.
  • the first electronic device 100 may determine the target electronic device to exit the trusted relationship by receiving a message that the target electronic device exits the trusted relationship. For example, if the target electronic device is restored to factory settings, or logs out of the original user account (that is, an account that is the same as or associated with the first electronic device 100), or manually releases the binding relationship with any trusted device, the second electronic device 101 can send a message of exiting the trusted relationship to its trusted device or trusted module (such as account center, authentication center) in the hyper terminal, and generate a new identity key, which can be used to form a new identity key.
  • the first electronic device 100 may receive the message indicating that the target electronic device exits the HyperTerminal, and delete the identity key of the target electronic device from its trusted device set.
  • the positions, names, and shapes of the elements (such as buttons, icons, text, etc.) in the UI interfaces corresponding to FIGS. 6a to 6d are not fixed, and can be freely combined or designed according to requirements. .
  • the user may interact with the electronic device in different ways than the interface shown in Figures 6a to 6d.
  • the process of identifying an electronic device may be implemented in a manner different from the interaction diagram shown in FIG. 7 , for example, may include more or fewer actions, and some actions may be performed in a manner different from the order shown in FIG. 5 , Or they can be executed in parallel to realize various functions of the HyperTerminal application as described above.
  • the devices involved in the flow chart of the method 800 include a first device and a second device, and both the first device and the second device are installed with a HyperTerminal application.
  • the first device may be the above-mentioned first electronic device 100
  • the second device may be the above-mentioned second electronic device 101 .
  • the first device and the second device may also be any type of devices in the electronic device 200 , the electronic device 201 , the electronic device 202 , the electronic device 203 , and the electronic device 204 .
  • the first device may be an electronic device with bluetooth communication capability, which discovers the second device by scanning broadcast messages sent by nearby devices.
  • the second device may also be an electronic device with bluetooth communication capability, which may be triggered to send a broadcast message, hoping to be discovered by other devices.
  • the first device may send an authentication request to the second device, so as to receive feedback authentication information from the second device and authenticate the second device.
  • the first device determines that the second device is an authentic device of the first device based on the authentication information received from the second device.
  • the authentication request sent by the first device to the second device may include the account information of the first device, and accordingly, the first device receives information for authentication of the account information of the first device from the second device .
  • the authentication information may indicate that the first device and the second device have the same or associated accounts, and it is determined that the second device is a trusted device. That is to say, if the first device and the second device have the same or associated account information, they are mutually trustworthy, so that a network of trusted devices can be conveniently and quickly formed to form a hyperterminal.
  • the authentication request sent by the first device to the second device is a binding request
  • the binding method may be, for example, scanning a QR code, inputting a PIN code, or physical contact.
  • the authentication information fed back by the second device to the first device may include binding information.
  • the first device may determine whether the first device and the second device have been bound based on the binding information. If it is determined that the first device and the second device have been bound, the first device may consider the second device to be a trusted device of the first device. Therefore, when devices are bound, these devices are considered to be trusted to each other, thereby providing a flexible and widely applicable trusted device network networking method.
  • the first device sends the identity key of the first device to the second device, and at block 830, the first device may also receive the identity key of the second device from the second device. That is, devices that are trusted with each other exchange their identity keys. According to the embodiment of the present application, the identity key is used to generate the source address of the device's broadcast message. Additionally, in block 840, the first device also adds the identity key of the second device to the identity keys of the first device's set of trusted devices. Since the second device uses its identity key to generate the source address of its broadcast message, the first device can use the second device's identity key to verify the source address of the second device's broadcast message. Thereby, the first device can recognize the second device.
  • the first device can exchange their identity keys with other devices (second devices) certified as trusted devices to form a trusted device network.
  • second devices certified as trusted devices
  • the trusted device network devices will be able to The device identification is performed through the address information of the broadcast message.
  • the second device can be identified by the first device without carrying identification information in the broadcast message, avoiding being monitored and tracked.
  • the first device may also send the identity key of the second device to one or more trusted devices in its trusted device set.
  • the first device may also send the identity keys of one or more trusted devices in the trusted device set to the second device.
  • the identity keys of multiple trusted devices can be quickly propagated and shared, which speeds up the networking speed and saves user operations.
  • a connection between the first device and the second device is established for exchanging each other's identity keys.
  • the first device and the second device may disassociate each other from a trusted relationship.
  • the first device When it is determined that the second device exits the trusted relationship with the first device (for example, restoring factory settings, logging out of a user account, manually unbinding, etc.), the first device deletes the second device from the identity key of the trusted device set. The identity key of the second device. If it is determined that the first device exits the trusted relationship with the set of trusted devices (for example, restore factory settings, log out of user accounts, manually unbind the relationship, etc.), update the identity key of the first device. In this manner, the first device can conveniently manage and dynamically maintain its own set of trusted devices, or release trusted relationships with other devices.
  • the identity key may be an identity resolution key
  • the broadcast message may be a Bluetooth broadcast message.
  • the identity key can be adapted to a randomized broadcast address conforming to the Bluetooth communication protocol.
  • FIG. 9 shows a schematic flowchart of another communication method 900 according to an embodiment of the present application.
  • the devices involved in the flowchart of the method 900 include a first device and a second device, and both the first device and the second device are installed with a HyperTerminal application.
  • the first device may be the above-mentioned first electronic device 100
  • the second device may be the above-mentioned second electronic device 101 .
  • the first device and the second device may also be any type of devices in the electronic device 200 , the electronic device 201 , the electronic device 202 , the electronic device 203 , and the electronic device 204 .
  • the first device queries active trusted devices in the vicinity of the first device in response to a user query request or periodically. To this end, the first device scans for nearby devices to receive broadcast messages sent by the nearby devices.
  • the first device determines that the second device is an active trusted device based on the identity key of its set of trusted devices and the source address of the broadcast message.
  • Trusted device networking of HyperTerminal for example, with reference to the method described in FIG. 8
  • the first device has the identity keys of one or more devices with which it has a trusted relationship, and can use these identity keys to check specific Whether the device (eg, the second device) is its trusted device.
  • a device for example, a second device sends out a broadcast message when it is active.
  • the broadcast message does not carry a device identifier, and its address is generated via the device's identity key, and is variable to ensure that the device Will not be monitored and tracked.
  • the first device when receiving a broadcast message from another device, the first device may use the identity key of a trusted device in its trusted device set to verify the address of the broadcast message, Active trusted devices are thus discovered. Specifically, the first device generates a hash value based on the first identity key and the first part of the source address, and compares the generated hash value with the second part of the source address. If the hash value matches the second part, the first device determines that the broadcast message is authenticated. The broadcast message shows through verification that the first device holds the identity key of the second device. That is to say, the second device is a trusted device of the first device, thus, the first device can determine the second device as an active trusted device. In this manner, the first device can verify whether the source of the broadcast message is a trusted device according to the pre-stored identity key of the trusted device.
  • the first device provides information of the second device.
  • the first device in response to a user's request to find an active trusted device, for example, the user operates a graphical element on the interface of the first device, the first device provides the user with information about the second device.
  • the first device may present information of the second device on the user interface, such as device status or service data, and present the information in a graphical manner.
  • the user can further operate on the information of the second device.
  • the user desires that the first device and the second device operate in cooperation, and manipulate information (eg, graphical elements corresponding to the second device) of the second device.
  • the first device establishes a connection with the second device.
  • the first device can be connected to the found active trusted device according to the user operation to meet specific business needs, thereby saving connection resources of the device and providing a good user experience.
  • the identity keys for the set of trusted devices are stored at the first device. If it is determined that the target trusted device in the set of trusted devices exits the trusted relationship with the first device, the first device deletes the identity key of the target trusted device from the stored identity keys of the set of trusted devices. In this way, the trusted relationship between the first device and other devices can be persisted and updated dynamically, so that an active trusted device can be quickly detected.
  • the identity key may be an identity resolution key; the broadcast message may be a Bluetooth broadcast message. In this way, the identity key can be adapted to a randomized broadcast address conforming to the Bluetooth communication protocol.
  • the first device can identify the second device in an active state through the address information of the broadcast system of the second device. Therefore, the second device can be identified without broadcasting its identification information, which reduces the risk of the second device being monitored and tracked.
  • Fig. 10 shows a schematic block diagram of a communication device 1000 according to an embodiment of the present application.
  • the apparatus 1000 may be implemented at the first electronic device 100, for example.
  • the device 1000 includes an authentication unit 1010 and an identity key exchange unit 1020 .
  • the authentication unit 1010 is configured to determine whether the second device is an authentic device of the first device based on information for authentication received from the second device.
  • the identity key exchange unit 1020 is configured to send the identity key of the first device to the second device if the second device is determined to be a trusted device of the first device, and receive the identity key of the second device from the second device. key, wherein the identity key of the second device is used to generate the source address of the broadcast message of the second device.
  • the identity key adding unit 1030 is configured to add the identity key of the second device to the identity keys of the trusted device set of the first device.
  • Fig. 11 shows a schematic block diagram of a communication device 1100 according to an embodiment of the present application.
  • the apparatus 1100 may be implemented at the first electronic device 100, for example.
  • the apparatus 1100 includes an active trusted device determining unit 1110 and an information providing unit 1020 .
  • the active trusted device determining unit 1110 is configured to determine that the second device is an active device based on the identity key of the trusted device set of the first device and the source address of the broadcast message in response to receiving the broadcast message from the second device. trusted devices.
  • the information providing unit 1120 is configured to provide information of the second device if the second device is determined to be an active trusted device.
  • the solution of the present application may be a method, an apparatus, a system and/or a computer program product.
  • a computer program product may include a computer-readable storage medium having computer-readable program instructions thereon for carrying out various aspects of the present disclosure.
  • a computer readable storage medium may be a tangible device that can retain and store instructions for use by an instruction execution device.
  • a computer readable storage medium may be, for example, but is not limited to, an electrical storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing.
  • Computer-readable storage media include: portable computer diskettes, hard disks, random access memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM), or flash memory), static random access memory (SRAM), compact disc read only memory (CD-ROM), digital versatile disc (DVD), memory stick, floppy disk, mechanically encoded device, such as a printer with instructions stored thereon A hole card or a raised structure in a groove, and any suitable combination of the above.
  • RAM random access memory
  • ROM read-only memory
  • EPROM erasable programmable read-only memory
  • flash memory static random access memory
  • SRAM static random access memory
  • CD-ROM compact disc read only memory
  • DVD digital versatile disc
  • memory stick floppy disk
  • mechanically encoded device such as a printer with instructions stored thereon
  • a hole card or a raised structure in a groove and any suitable combination of the above.
  • computer-readable storage media are not to be construed as transient signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through waveguides or other transmission media (e.g., pulses of light through fiber optic cables), or transmitted electrical signals.
  • Computer readable program instructions described herein may be downloaded from a computer readable storage medium to a respective computing/processing device, or downloaded to an external computer or external storage device over a network, such as the Internet, a local area network, a wide area network, and/or a wireless network.
  • the network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers, and/or edge servers.
  • a network adapter card or a network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in each computing/processing device .
  • Computer program instructions for performing the operations of the present disclosure may be assembly instructions, instruction set architecture (ISA) instructions, machine instructions, machine-dependent instructions, microcode, firmware instructions, state setting data, or Source or object code written in any combination, including object-oriented programming languages—such as Smalltalk, C++, etc., and conventional procedural programming languages—such as “C” or similar programming languages.
  • Computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server implement.
  • the remote computer can be connected to the user computer through any kind of network, including a local area network (LAN) or a wide area network (WAN), or it can be connected to an external computer (such as via the Internet using an Internet service provider). connect).
  • LAN local area network
  • WAN wide area network
  • an electronic circuit such as a programmable logic circuit, field programmable gate array (FPGA), or programmable logic array (PLA)
  • FPGA field programmable gate array
  • PDA programmable logic array
  • These computer readable program instructions may be provided to a processing unit of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine such that when executed by the processing unit of the computer or other programmable data processing apparatus , producing an apparatus for realizing the functions/actions specified in one or more blocks in the flowchart and/or block diagram.
  • These computer-readable program instructions can also be stored in a computer-readable storage medium, and these instructions cause computers, programmable data processing devices and/or other devices to work in a specific way, so that the computer-readable medium storing instructions includes An article of manufacture comprising instructions for implementing various aspects of the functions/acts specified in one or more blocks in flowcharts and/or block diagrams.
  • each block in a flowchart or block diagram may represent a module, a program segment, or a portion of an instruction that contains one or more executable instruction.
  • the functions noted in the block may occur out of the order noted in the figures. For example, two blocks in succession may, in fact, be executed substantially concurrently, or they may sometimes be executed in the reverse order, depending upon the functionality involved.
  • each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations can be implemented by a dedicated hardware-based system that performs the specified function or action , or may be implemented by a combination of dedicated hardware and computer instructions.

Abstract

Provided in the embodiments of the present application are a method and apparatus for identifying a device, and an electronic device and a medium. The method comprises: in response to receiving a broadcast message from a second device, a first device determining, on the basis of an identity key of a trusted device set of the first device and a source address of the broadcast message, that the second device is an active trusted device, and then providing information relating to the second device. In this way, when a first device has a trusted relationship with a second device, the first device can identify, by means of address information of a broadcast system of the second device, the second device, which is in an active state. Therefore, the second device can be identified without it being necessary for same to broadcast the identification information thereof, thereby reducing the risk of the second device being monitored and tracked.

Description

用于标识设备的方法、装置、电子设备和介质Method, device, electronic device and medium for marking a device 技术领域technical field
本公开的实施例主要涉及通信技术领域。更具体地,本公开的实施例涉及一种用于标识设备的方法、装置、电子设备、计算机可读存储介质以及计算机程序产品。Embodiments of the present disclosure mainly relate to the technical field of communication. More specifically, the embodiments of the present disclosure relate to a method for identifying a device, an apparatus, an electronic device, a computer-readable storage medium, and a computer program product.
背景技术Background technique
随着物联网时代的到来,越来越多的电子设备出现在用户的生活之中,一个用户大概率同时拥有许多电子设备,不同的电子设备在硬件能力上具有不同的优势,所提供的功能也不尽相同,用户往往会在多个电子设备上进行娱乐、通信、工作等不同的任务。With the advent of the Internet of Things era, more and more electronic devices appear in the lives of users. A user has a high probability of owning many electronic devices at the same time. Different electronic devices have different advantages in hardware capabilities, and the functions they provide are also different. Not all are the same, and users often perform different tasks such as entertainment, communication, and work on multiple electronic devices.
为了方便地访问这些电子设备或者从它们获取有用的信息,电子设备会发送广播消息。然而,广播消息可能导致用户泄露身份凭证,导致用户被监视的风险。该风险在各种操作系统的设备上均存在。有鉴于此,需要一种安全的标识设备方法来减少用户被识别和跟踪的风险。In order to access these electronic devices conveniently or obtain useful information from them, the electronic devices will send broadcast messages. However, broadcasting messages may cause users to leak identity credentials, leading to the risk of users being monitored. This risk exists on devices with various operating systems. In view of this, there is a need for a secure method of identifying devices to reduce the risk of users being identified and tracked.
发明内容Contents of the invention
本申请的实施例提供了一种用于标识设备的方案。Embodiments of the present application provide a solution for identifying devices.
根据本申请的第一方面,提供了一种用于标识设备的方法,包括:响应于接收到来自第二设备的广播消息,第一设备基于所述第一设备的可信设备集合的身份密钥和所述广播消息的源地址,确定所述第二设备为活动的可信设备;以及所述第一设备提供所述第二设备的信息。According to a first aspect of the present application, there is provided a method for identifying a device, comprising: in response to receiving a broadcast message from a second device, a first device based on an identity key of a set of trusted devices of the first device a key and a source address of the broadcast message to determine that the second device is an active trusted device; and the first device provides information about the second device.
在本申请中,第一设备和第二设备是具有广播通信能力(发出广播、接收广播)的设备,并且当彼此可信时可以进一步建立二者之间的连接用于业务传输。在本申请中,可信设备指的是在设备之间相互信任、可以发送个人数据,例如,具有相同用户账号的设备或者通过其他方式认证过的设备。In this application, the first device and the second device are devices capable of broadcasting communication (sending broadcasts and receiving broadcasts), and when they are trusted with each other, a connection between them can be further established for service transmission. In this application, trusted devices refer to devices that trust each other and can send personal data, for example, devices with the same user account or devices that have been authenticated by other means.
第一设备具有与其具有可信关系的一个或更多个其他设备的身份密钥,并且可以使用这些身份密钥来检查特定设备是否为其可信设备。根据本申请的实施例,设备在活动时发出广播消息(例如,心跳消息),广播消息不携带设备标识,其地址经由该设备的身份密钥而生成,并且是可变的以确保该设备不会被监视和跟踪。根据本申请的实施例,当接收到来自其他设备的广播消息时,第一设备可以使用其拥有的可信设备集合中的可信设备的身份密钥来对这条广播消息的地址进行验证,由此发现活动的可信设备。The first device has the identity keys of one or more other devices with which it has a trusted relationship, and can use these identity keys to check whether a particular device is its trusted device. According to the embodiment of the application, a device sends a broadcast message (for example, a heartbeat message) when it is active. The broadcast message does not carry a device identifier, and its address is generated via the device's identity key, and is variable to ensure that the device does not will be monitored and tracked. According to an embodiment of the present application, when receiving a broadcast message from another device, the first device may use the identity key of a trusted device in its trusted device set to verify the address of the broadcast message, Active trusted devices are thus discovered.
通过这种方式,当第一设备和第二设备具有可信关系时,第一设备能够通过第二设备的广播系统的地址信息来标识处于活动状态的第二设备。因此,第二设备不需要广播其标识信息就能够被标识,减少了第二设备被监视和跟踪的风险。In this way, when the first device and the second device have a trusted relationship, the first device can identify the second device in an active state through the address information of the broadcast system of the second device. Therefore, the second device can be identified without broadcasting its identification information, which reduces the risk of the second device being monitored and tracked.
在一些实施例中,确定所述第二设备为活动的可信设备可以包括:使用所述可信设备集合的身份密钥中的第一身份密钥和所述源地址来验证所述广播消息;以及如果所述广播消息通过验证,所述第一设备将所述第二设备确定为活动的可信设备。以此方式,第一设备能够根据预先存储的可信设备的身份密钥来验证广播消息的来源是否为可信设备。In some embodiments, determining that the second device is an active trusted device may include: authenticating the broadcast message using a first identity key of the identity keys of the set of trusted devices and the source address ; and if the broadcast message is verified, the first device determines the second device as an active trusted device. In this manner, the first device can verify whether the source of the broadcast message is a trusted device according to the pre-stored identity key of the trusted device.
在一些实施例中,验证所述广播消息可以包括:基于所述第一身份密钥和所述源地址的第一部分来生成哈希值;将所述哈希值和所述源地址的第二部分进行比较;如果所述哈希值 和所述第二部分匹配,确定所述广播消息通过验证。以此方式,提供了一种可靠地利用身份密钥来验证广播消息的方式。In some embodiments, verifying the broadcast message may include: generating a hash value based on the first identity key and the first part of the source address; combining the hash value with the second part of the source address Parts are compared; if the hash value matches the second part, it is determined that the broadcast message passes the verification. In this way, a way to reliably authenticate broadcast messages with identity keys is provided.
在一些实施例中,提供所述第二设备的信息可以包括:响应于接收到来自用户的关于可信设备的查找请求,所述第一设备向所述用户提供所述第二设备的信息。以此方式,用户可以操作第一设备,请求发现与第一设备有关的活动的可信设备,并且第二设备的信息(例如在用户界面上显示的图形元素)被提供给用户,以便于用户进一步操作所发现的活动的可信设备。In some embodiments, providing the information of the second device may include: in response to receiving a search request about a trusted device from the user, the first device providing the information of the second device to the user. In this manner, a user may operate a first device, request to discover active trusted devices related to the first device, and information about the second device (such as graphical elements displayed on a user interface) is provided to the user for the user's convenience. Trusted devices for further manipulation of discovered activity.
在一些实施例中,根据本申请的第一方面的方法还可以包括:响应于接收到所述用户对所述所述第二设备的信息的操作,所述第一设备建立与所述第二设备的连接。以此方式,可以根据用户操作来将第一设备连接到所发现的活动的可信设备,以满足具体的业务需要,而不需要经过验证、配对等过程,从而加快了连接速度并且具有良好的用户体验。In some embodiments, the method according to the first aspect of the present application may further include: in response to receiving the user's operation on the information of the second device, establishing the connection between the first device and the second device Device connection. In this way, the first device can be connected to the found active trusted device according to user operations to meet specific business needs without going through authentication, pairing, etc., thereby speeding up the connection speed and having a good user experience.
在一些实施例中,所述可信设备集合的身份密钥被存储在所述第一设备处,并且其中所述方法还可以包括:响应于确定所述可信设备集合中的目标可信设备退出与所述第一设备的可信关系,所述第一设备从存储的所述可信设备集合的身份密钥中删除所述目标可信设备的所述身份密钥。以此方式,第一设备与其他设备的可信关系被可以被持久保存,并且可以被动态更新,从而能够快速地检测到活动的可信设备。In some embodiments, the identity key of the set of trusted devices is stored at the first device, and wherein the method may further comprise: in response to determining a target trusted device in the set of trusted devices exiting the trusted relationship with the first device, the first device deleting the identity key of the target trusted device from the stored identity keys of the set of trusted devices. In this way, the trusted relationship between the first device and other devices can be persisted and updated dynamically, so that an active trusted device can be quickly detected.
在一些实施例中,所述身份密钥可以是身份解析密钥。在一些实施例中,所述广播消息可以是蓝牙广播消息。以此方式,身份密钥可以适用于符合蓝牙通信协议的随机化广播地址。In some embodiments, the identity key may be an identity resolution key. In some embodiments, the broadcast message may be a Bluetooth broadcast message. In this way, the identity key can be adapted to a randomized broadcast address conforming to the Bluetooth communication protocol.
根据本申请的第二方面,提供了一种通信方法,包括:第一设备基于从第二设备接收到的用于认证的信息,确定所述第二设备为所述第一设备的可信设备;所述第一设备向所述第二设备发送所述第一设备的身份密钥;所述第一设备从所述第二设备接收所述第二设备的身份密钥,其中所述第二设备的身份密钥用于生成所述第二设备的广播消息的源地址;以及所述第一设备将所述第二设备的所述身份密钥添加到所述第一设备的可信设备集合的身份密钥中。According to the second aspect of the present application, there is provided a communication method, including: a first device determines that the second device is a trusted device of the first device based on the information used for authentication received from the second device ; the first device sends the identity key of the first device to the second device; the first device receives the identity key of the second device from the second device, wherein the second the identity key of the device is used to generate a source address of the broadcast message of the second device; and the first device adds the identity key of the second device to the set of trusted devices of the first device in the identity key.
通过这种方式,第一设备可以与经认证为可信设备的其他设备交换各自的身份密钥,以组建可信设备网络,在可信设备网络中,设备之间将能够通过广播消息的地址信息来进行设备标识,而不需要在广播消息中携带标识信息,避免了设备被监视和跟踪。In this way, the first device can exchange their identity keys with other devices certified as trusted devices to form a trusted device network. In the trusted device network, devices will be able to pass the address of the broadcast message Information is used for device identification, instead of carrying identification information in broadcast messages, which prevents devices from being monitored and tracked.
在一些实施例中,确定所述第二设备为所述第一设备的可信设备可以包括:向所述第二设备发送所述第一设备的账户信息;从所述第二设备接收所述针对所述第一设备的所述账户信息的用于认证的信息;以及如果所述用于认证的信息指示所述第一设备和所述电子设备具有相同或相关联的账户,确定所述第二设备为可信设备。以此方式,当多个设备具有相同或相关联账户信息时,这些设备被认为是彼此可信的,从而提供了一种方便快捷的可信设备网络的组网方式。In some embodiments, determining that the second device is a trusted device of the first device may include: sending the account information of the first device to the second device; receiving the account information of the first device from the second device; information for authentication of the account information of the first device; and if the information for authentication indicates that the first device and the electronic device have the same or an associated account, determining that the second The second device is a trusted device. In this way, when multiple devices have the same or associated account information, these devices are considered to be trusted to each other, thereby providing a convenient and fast networking method of trusted device networks.
在一些实施例中,确定所述第二设备为所述第一设备的可信设备可以包括:从所述用于认证的信息中获取绑定信息;基于所述绑定信息,确定所述第一设备和所述第二设备是否已被绑定;以及如果确定所述第一设备和所述第二设备已被绑定,确定所述第二设备为所述第一设备的可信设备。在一些实施例中,所述绑定信息指示两个设备之间通过二维码、PIN码和实体接触中的至少一项而被绑定。以此方式,当多个设备被绑定时,这些设备被认为是彼此可信的,从而提供了一种灵活的、适用性广的可信设备网络的组网方式。In some embodiments, determining that the second device is a trusted device of the first device may include: obtaining binding information from the information used for authentication; determining the second device based on the binding information Whether a device and the second device have been bound; and if it is determined that the first device and the second device have been bound, determining that the second device is a trusted device of the first device. In some embodiments, the binding information indicates that the two devices are bound through at least one of two-dimensional code, PIN code and physical contact. In this manner, when multiple devices are bound, these devices are considered to be trusted to each other, thereby providing a flexible and widely applicable trusted device network networking method.
在一些实施例中,根据本申请的第二方面的方法还可以包括:所述第一设备向所述可信设备集合中的一个可信设备发送所述第二设备的身份密钥;以及所述第一设备向所述第二设备发送所述可信设备集合中的所述一个可信设备的身份密钥。以此方式,多个彼此可信的设备的身份密钥可以被快速传播和分享,从而提供了一种方便快捷的可信设备网络的组网方式。In some embodiments, the method according to the second aspect of the present application may further include: the first device sending the identity key of the second device to a trusted device in the set of trusted devices; and the The first device sends the identity key of the one trusted device in the trusted device set to the second device. In this way, the identity keys of multiple mutually trusted devices can be quickly disseminated and shared, thereby providing a convenient and fast networking method for trusted device networks.
在一些实施例中,根据本申请的第二方面的方法还可以包括:如果所述第二设备被确定为所述第一设备的可信设备,建立所述第一设备和所述第二设备之间的连接。以此方式,能够促进第一设备与被认证为可信设备的第二设备交换彼此的身份密钥。In some embodiments, the method according to the second aspect of the present application may further include: if the second device is determined to be a trusted device of the first device, establishing the first device and the second device the connection between. In this way, the first device and the second device authenticated as trusted devices can be facilitated to exchange each other's identity keys.
在一些实施例中,根据本公开的第二方面的方法还可以包括:响应于确定所述第二设备退出与所述第一设备的可信关系,所述第一设备从所述第一设备的可信设备集合的身份密钥中删除所述第二设备的所述身份密钥。以此方式,第一设备可以管理和动态维持自身的可信设备集合。In some embodiments, the method according to the second aspect of the present disclosure may further include: in response to determining that the second device has exited the trusted relationship with the first device, the first device from the first device Delete the identity key of the second device from the identity keys of the trusted device set. In this way, the first device can manage and dynamically maintain its own set of trusted devices.
在一些实施例中,根据本申请的第二方面的方法还可以包括:如果确定所述第一设备退出与所述可信设备集合的可信关系,更新所述第一设备的身份密钥。以此方式,第一设备能够方便地解除和其他设备的可信关系。In some embodiments, the method according to the second aspect of the present application may further include: updating the identity key of the first device if it is determined that the first device exits the trusted relationship with the set of trusted devices. In this way, the first device can conveniently release the trusted relationship with other devices.
在一些实施例中,所述身份密钥可以是身份解析密钥。在一些实施例中,所述广播消息可以是蓝牙广播消息。以此方式,身份密钥可以适用于符合蓝牙通信协议的随机化广播地址。In some embodiments, the identity key may be an identity resolution key. In some embodiments, the broadcast message may be a Bluetooth broadcast message. In this way, the identity key can be adapted to a randomized broadcast address conforming to the Bluetooth communication protocol.
根据本申请的第三方面,提供了一种通信装置,包括:活动可信设备确定单元,被配置为响应于接收到来自第二设备的广播消息,基于第一设备的可信设备集合的身份密钥和所述广播消息的源地址,确定所述第二设备为活动的可信设备;以及信息提供单元,被配置为提供所述第二设备的信息。According to a third aspect of the present application, there is provided a communication apparatus, including: an active trusted device determining unit configured to, in response to receiving a broadcast message from a second device, based on the identity of the trusted device set of the first device The key and the source address of the broadcast message determine that the second device is an active trusted device; and an information providing unit is configured to provide information of the second device.
在一些实施例中,其中所述活动可信设备确定单元还可以被配置为:使用所述可信设备集合的身份密钥中的第一身份密钥和所述源地址来验证所述广播消息;以及如果所述广播消息通过验证,将所述第二设备确定为活动的可信设备。In some embodiments, the active trusted device determination unit may be further configured to: use the first identity key in the identity keys of the set of trusted devices and the source address to verify the broadcast message ; and if the broadcast message passes verification, determining the second device as an active trusted device.
在一些实施例中,所述活动可信设备确定单元还可以被配置为:基于所述第一身份密钥和所述源地址的第一部分来生成哈希值;将所述哈希值和所述源地址的第二部分进行比较;如果所述哈希值和所述第二部分匹配,确定所述广播消息通过验证。In some embodiments, the active trusted device determination unit may be further configured to: generate a hash value based on the first identity key and the first part of the source address; combine the hash value and the comparing the second part of the source address; if the hash value matches the second part, it is determined that the broadcast message passes the verification.
在一些实施例中,所述信息提供单元还可以被配置为:响应于接收到来自用户的关于可信设备的查找请求,向所述用户提供所述第二设备的信息。In some embodiments, the information providing unit may be further configured to: provide the user with the information of the second device in response to receiving a search request about the trusted device from the user.
在一些实施例中,根据本申请的第三方面的装置还可以包括:连接建立单元,被配置为响应于接收到所述用户对所述所述第二设备的信息的操作,建立与所述第二设备的连接。In some embodiments, the apparatus according to the third aspect of the present application may further include: a connection establishment unit configured to, in response to receiving the user's operation on the information of the second device, establish a connection with the Connection of a second device.
在一些实施例中,根据本申请的第三方面的装置还可以包括身份密钥存储单元,被配置用于:存储所述可信设备集合的身份密钥;以及响应于确定所述可信设备集合中的目标可信设备退出与所述第一设备的可信关系,从所述可信设备集合的身份密钥中删除所述目标可信设备的所述身份密钥。In some embodiments, the apparatus according to the third aspect of the present application may further include an identity key storage unit configured to: store the identity key of the set of trusted devices; and respond to determining that the trusted device The target trusted device in the set quits the trusted relationship with the first device, and the identity key of the target trusted device is deleted from the identity keys of the set of trusted devices.
在一些实施例中,所述身份密钥可以是身份解析密钥。在一些实施例中,所述广播消息可以是蓝牙广播消息。In some embodiments, the identity key may be an identity resolution key. In some embodiments, the broadcast message may be a Bluetooth broadcast message.
根据本申请的第四方面,还提供了一种通信装置,包括:认证单元,被配置为基于从第二设备接收到的用于认证的信息,确定所述第二设备为第一设备的可信设备;身份密钥交换单元,被配置为向所述第二设备发送所述第一设备的身份密钥,并且从所述第二设备接收所 述第二设备的身份密钥,其中所述第二设备的身份密钥用于生成所述第二设备的广播消息的源地址,以及身份密钥添加单元,被配置为将所述第二设备的所述身份密钥添加到所述第一设备的可信设备集合的身份密钥中。According to the fourth aspect of the present application, there is also provided a communication device, including: an authentication unit configured to determine that the second device is a possible authentication of the first device based on the information for authentication received from the second device. an identity key exchange unit, configured to send the identity key of the first device to the second device, and receive the identity key of the second device from the second device, wherein the The identity key of the second device is used to generate the source address of the broadcast message of the second device, and an identity key adding unit is configured to add the identity key of the second device to the first In the identity key of the trusted device set of the device.
在一些实施例中,所述认证单元还可以被配置为:向所述第二设备发送所述第一设备的账户信息;从所述第二设备接收所述针对所述第一设备的所述账户信息的用于认证的信息;以及如果所述用于认证的信息指示所述第一设备和所述第二设备具有相同或相关联的账户,确定所述第二设备为所述第一设备的可信设备。In some embodiments, the authentication unit may be further configured to: send the account information of the first device to the second device; receive the account information for the first device from the second device information for authentication of account information; and if the information for authentication indicates that the first device and the second device have the same or associated accounts, determining that the second device is the first device trusted devices.
在一些实施例中,所述认证单元还可以被配置为从所述用于认证的信息中获取绑定信息;基于所述绑定信息,确定所述第一设备和所述第二设备是否已被绑定;以及如果确定所述第一设备和所述第二设备已被绑定,确定所述第二设备为所述第一设备的可信设备。In some embodiments, the authentication unit may be further configured to obtain binding information from the information used for authentication; based on the binding information, determine whether the first device and the second device have bound; and if it is determined that the first device and the second device have been bound, determining that the second device is a trusted device of the first device.
在一些实施例中,所述绑定信息指示两个设备之间通过二维码、PIN码和实体接触中的至少一项而被绑定。In some embodiments, the binding information indicates that the two devices are bound through at least one of two-dimensional code, PIN code and physical contact.
在一些实施例中,所述身份密钥交换单元还可以被配置为:向所述可信设备集合中的一个可信设备发送所述第二设备的身份密钥;以及向所述第二设备发送所述可信设备集合中的所述一个可信设备的身份密钥。In some embodiments, the identity key exchange unit may also be configured to: send the identity key of the second device to a trusted device in the set of trusted devices; and send the identity key of the second device to the second device Sending the identity key of the one trusted device in the set of trusted devices.
在一些实施例中,根据本申请的第四方面的装置还可以包括:连接建立单元,被配置为建立所述第一设备和所述第二设备之间的连接。In some embodiments, the apparatus according to the fourth aspect of the present application may further include: a connection establishment unit configured to establish a connection between the first device and the second device.
在一些实施例中,根据本申请的第四方面的装置,其中所述身份密钥存储单元还被配置为响应于确定所述第二设备退出与所述第一设备的可信关系,从所述第一设备的可信设备集合的身份密钥中删除所述第二设备的所述身份密钥。In some embodiments, the apparatus according to the fourth aspect of the present application, wherein the identity key storage unit is further configured to, in response to determining that the second device exits the trusted relationship with the first device, from the deleting the identity key of the second device from the identity keys of the trusted device set of the first device.
在一些实施例中,根据本申请的第四方面的装置还可以包括:身份密钥更新单元,被配置为如果确定所述第一设备退出与所述可信设备集合的可信关系,更新所述第一设备的身份密钥。In some embodiments, the apparatus according to the fourth aspect of the present application may further include: an identity key update unit configured to update the The identity key of the first device.
在一些实施例中,所述身份密钥可以是身份解析密钥。在一些实施例中,所述广播消息可以是蓝牙广播消息。In some embodiments, the identity key may be an identity resolution key. In some embodiments, the broadcast message may be a Bluetooth broadcast message.
根据本申请的第五方面,还提供了一种电子设备,包括:处理单元和存储器;所述处理单元执行所述存储器中的指令,使得所述电子设备执行根据本申请的第一方面或第二方面所述的方法。According to the fifth aspect of the present application, there is also provided an electronic device, including: a processing unit and a memory; the processing unit executes instructions in the memory, so that the electronic device executes the electronic device according to the first aspect or the first aspect of the present application. The method described in the two aspects.
根据本申请的第六方面,还提供了一种计算机可读存储介质,其上存储有一条或多条计算机指令,其中一条或多条计算机指令被处理器执行使所述处理器执行根据本申请的第一方面或第二方面所述的方法。According to a sixth aspect of the present application, there is also provided a computer-readable storage medium, on which one or more computer instructions are stored, wherein one or more computer instructions are executed by a processor to cause the processor to perform the The method described in the first aspect or the second aspect.
根据本申请的第六方面,还提供了一种计算机程序产品,包括机器可执行指令,所述机器可执行指令在由设备执行时使所述设备执行根据本申请的第一方面或第二方面所述的方法。According to a sixth aspect of the present application, there is also provided a computer program product comprising machine-executable instructions which, when executed by a device, cause the device to perform the first or second aspect of the present application. the method described.
附图说明Description of drawings
结合附图并参考以下详细说明,本公开各实施例的上述和其他特征、优点及方面将变得更加明显。在附图中,相同或相似的附图标注表示相同或相似的元素,其中:The above and other features, advantages and aspects of the various embodiments of the present disclosure will become more apparent with reference to the following detailed description when taken in conjunction with the accompanying drawings. In the drawings, the same or similar reference numerals indicate the same or similar elements, wherein:
图1示例性示出了本申请提供的一种系统图;Fig. 1 schematically shows a system diagram provided by the present application;
图2a至图2b是示出了本申请的实施例提供的一组应用界面的示意图;2a to 2b are schematic diagrams showing a set of application interfaces provided by the embodiments of the present application;
图3a示出了本申请的实施例提供的一种电子设备的硬件结构示意图;FIG. 3a shows a schematic diagram of a hardware structure of an electronic device provided by an embodiment of the present application;
图3b为本申请实施例提供的一种电子设备的软件结构示意图;FIG. 3b is a schematic diagram of a software structure of an electronic device provided in an embodiment of the present application;
图4a至图4c是本申请的实施例提供的一组应用界面示意图;4a to 4c are schematic diagrams of a set of application interfaces provided by the embodiments of the present application;
图5示出了根据本申请的一些实施例的设备之间的交互的示意图;Fig. 5 shows a schematic diagram of interaction between devices according to some embodiments of the present application;
图6a至图6d是本申请的实施例提供的另一组应用界面示意图;6a to 6d are schematic diagrams of another set of application interfaces provided by the embodiments of the present application;
图7示出了根据本申请的一些实施例的设备之间的交互的示意图;Fig. 7 shows a schematic diagram of interaction between devices according to some embodiments of the present application;
图8示出了根据本申请的一些实施例的通信方法的示意流程图;Fig. 8 shows a schematic flowchart of a communication method according to some embodiments of the present application;
图9示出了根据本申请的一些实施例的通信方法的示意流程图;Fig. 9 shows a schematic flowchart of a communication method according to some embodiments of the present application;
图10示出了根据本申请的一些实施例的通信装置的示意框图;Fig. 10 shows a schematic block diagram of a communication device according to some embodiments of the present application;
图11示出了根据本申请的一些实施例的通信装置的示意框图。Fig. 11 shows a schematic block diagram of a communication device according to some embodiments of the present application.
具体实施方式Detailed ways
下面将参照附图更详细地描述本公开的实施例。虽然附图中显示了本公开的某些实施例,然而应当理解的是,本公开可以通过各种形式来实现,而且不应该被解释为限于这里阐述的实施例,相反提供这些实施例是为了更加透彻和完整地理解本公开。应当理解的是,本公开的附图及实施例仅用于示例性作用,并非用于限制本公开的保护范围。Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although certain embodiments of the present disclosure are shown in the drawings, it should be understood that the disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein; A more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the present disclosure are for exemplary purposes only, and are not intended to limit the protection scope of the present disclosure.
在本公开的实施例的描述中,术语“包括”及其类似用语应当理解为开放性包含,即“包括但不限于”。术语“基于”应当理解为“至少部分地基于”。术语“一个实施例”或“该实施例”应当理解为“至少一个实施例”。术语“第一”、“第二”等等可以指代不同的或相同的对象。下文还可能包括其他明确的和隐含的定义。In the description of the embodiments of the present disclosure, the term "comprising" and its similar expressions should be interpreted as an open inclusion, that is, "including but not limited to". The term "based on" should be understood as "based at least in part on". The term "one embodiment" or "the embodiment" should be read as "at least one embodiment". The terms "first", "second", etc. may refer to different or the same object. Other definitions, both express and implied, may also be included below.
物联网中的电子设备常常通过广播消息(例如,用于心跳的蓝牙广播)向周围的设备通知自身的存在,并且还可以在这些广播消息中携带业务数据。为了标识自身,电子设备往往会在广播消息中携带标识信息,导致其容易被识别和跟踪。一些别有用心的用户可能通过设备的广播消息来监视用户。这种风险在Windows
Figure PCTCN2022118459-appb-000001
等操作系统的设备中均存在。例如,对于苹果设备,蓝牙广播消息的有效载荷(AdvData字段)包括公司标识符(例如,0x004c)、该设备的nearby字段和handoff字段,作为设备标识信息;对于Windows
Figure PCTCN2022118459-appb-000002
设备,广播消息的有效载荷包括公司标识符(0x0006)和一个27字节长度的字符串来用作标识信息。虽然这些设备采用随机化的MAC地址(即,源地址),但是由于广播消息一般是不加密的且无法用于认证。因此,攻击者容易通过一段时间的监听来获得这些特征信息来跟踪设备。
Electronic devices in the Internet of Things often notify surrounding devices of their existence through broadcast messages (for example, Bluetooth broadcasts for heartbeat), and may also carry service data in these broadcast messages. In order to identify itself, electronic devices often carry identification information in broadcast messages, making them easy to be identified and tracked. Some users with ulterior motives may monitor users through broadcast messages of the device. This risk in Windows
Figure PCTCN2022118459-appb-000001
It exists in devices with other operating systems. For example, for Apple devices, the payload (AdvData field) of the Bluetooth broadcast message includes the company identifier (for example, 0x004c), the nearby field and the handoff field of the device as device identification information;
Figure PCTCN2022118459-appb-000002
For devices, the payload of the broadcast message includes the company identifier (0x0006) and a 27-byte character string used as identification information. Although these devices employ randomized MAC addresses (ie, source addresses), since broadcast messages are generally unencrypted and cannot be used for authentication. Therefore, it is easy for an attacker to obtain these characteristic information through monitoring for a period of time to track the device.
尽管可以通过设备之间的安全连接(例如,配对)来接收心跳消息或传输业务数据。然而,每个设备能够维持的连接的数量是有限的(例如,一般最多同时连接7个设备),而周边可发现的设备可能更多,无法和所有设备都保持活跃的连接状态。并且,一些轻量化的设备(例如,智能水杯、智能牙刷等)出于电量考虑,其不一定经过配对、也不太可能长期保持连接状态。另外,即使经过配对,仍然希望在更换手机、平板电脑等富设备时依然能够使用这些轻量化设备,或者希望同账号、或者非相同账号的其他可信设备也能使用它们。也就是说,在设备发送广播消息的时候,可信设备均能够识别到设备。另外,由于电子设备的广播消息可能使用自身身份密钥进行随机化,使得只有拥有该身份密钥的设备才能够识别广播消息的来源。但是,传统上只能通过配对方式来交换设备的身份密钥,这也给广播消息的接收 和设备识别带来了不便。Although it is possible to receive heartbeat messages or transmit business data through a secure connection (for example, pairing) between devices. However, the number of connections that can be maintained by each device is limited (for example, generally a maximum of 7 devices can be connected at the same time), and there may be more devices that can be discovered around, and it is impossible to maintain an active connection with all devices. Moreover, some lightweight devices (for example, smart water cups, smart toothbrushes, etc.) may not necessarily be paired and may not be kept connected for a long time due to power considerations. In addition, even after pairing, it is still hoped that these lightweight devices can still be used when replacing rich devices such as mobile phones and tablet computers, or that other trusted devices with the same account or different accounts can also use them. That is to say, when the device sends a broadcast message, the trusted device can identify the device. In addition, since the broadcast message of the electronic device may be randomized using its own identity key, only the device with the identity key can identify the source of the broadcast message. However, traditionally, the identity keys of devices can only be exchanged through pairing, which also brings inconvenience to the reception of broadcast messages and device identification.
因此,需要一种能够安全地标识设备的方法,以减少设备监视和跟踪的风险。本申请针对物联网应用场景,提供了一种能够利用广播消息标识设备的方案。在该方案中,设备之间建立可信关系并交换彼此的身份密钥,随后可以使用身份密钥来生成广播消息的地址,由此设备不需要在其广播消息中携带标识信息就能够被其可信设备所识别。根据本公开的实施例,第一设备(例如,手机、平板等)可以接收到第二设备(例如,轻量化设备)的广播消息时,使用其已知的可信设备的身份密钥来验证广播消息的地址。如果验证通过,表明该第二设备是其可信设备,并且所使用的相应的身份密钥也隐含或对应于该设备的标识信息,由此实现了对第二设备的安全标识,而且第二设备不需要在其广播消息中携带可能带来被跟踪风险的标识信息。Therefore, there is a need for a method that can securely identify devices to reduce the risk of device surveillance and tracking. The present application provides a solution for identifying a device by using a broadcast message for an application scenario of the Internet of Things. In this scheme, trusted relationships are established between devices and mutual identity keys are exchanged, and then identity keys can be used to generate addresses for broadcast messages, so that devices can be identified by other devices without carrying identification information in their broadcast messages. recognized by trusted devices. According to an embodiment of the present disclosure, when a first device (for example, a mobile phone, a tablet, etc.) receives a broadcast message from a second device (for example, a lightweight device), it can use its known identity key of a trusted device to verify The address of the broadcast message. If the verification is passed, it indicates that the second device is its trusted device, and the corresponding identity key used also implies or corresponds to the identification information of the device, thereby realizing the security identification of the second device, and the second device The second device does not need to carry identification information that may bring a risk of being tracked in its broadcast message.
下面首先介绍本申请实施例中涉及的系统架构。The following first introduces the system architecture involved in the embodiment of the present application.
图1示例性示出了本申请提供的一种系统图。如图1所示,该系统包括多个电子设备,例如示例性示出的电子设备200、电子设备201、电子设备202、电子设备203、电子设备204等。系统内的各个电子设备可按照一定的通信协议和组网策略组建网络(即组网),使得系统内的各个电子设备之间可以互相通信。例如,该系统中的各个电子设备之间可以通过无线通信方式连接。例如至少可以通过以下至少一种无线连接方式建立连接:蓝牙(blue tooth,BT)或低功率蓝牙(blue tooth low energy,BLE)、近场通信(near field communication,NFC)、无线保真(wireless fidelity,Wi-Fi)、或Wi-Fi直连。其中,Fig. 1 schematically shows a system diagram provided in this application. As shown in FIG. 1 , the system includes a plurality of electronic devices, such as electronic device 200 , electronic device 201 , electronic device 202 , electronic device 203 , and electronic device 204 , which are exemplarily shown. Each electronic device in the system can form a network (that is, a network) according to a certain communication protocol and networking strategy, so that each electronic device in the system can communicate with each other. For example, various electronic devices in the system may be connected through wireless communication. For example, at least one of the following wireless connection methods can be used to establish a connection: Bluetooth (blue tooth, BT) or low power Bluetooth (blue tooth low energy, BLE), near field communication (near field communication, NFC), wireless fidelity (wireless fidelity, Wi-Fi), or Wi-Fi Direct. in,
本申请实施例对电子设备(例如电子设备200、电子设备201、电子设备202、电子设备203或电子设备204)的类型不做具体限定,在一些实施例中,本申请实施例中的电子设备可以是手机、可穿戴设备(例如智能手环、智能手表、耳机等)、平板电脑、膝上型计算机(laptop)、手持计算机、笔记本电脑、超级移动个人计算机(ultra-mobile personal computer,UMPC)、蜂窝电话、个人数字助理(personal digital assistant,PDA)、增强现实(Augmented reality,AR)\虚拟现实(virtual reality,VR)设备等设备,还可以是电视、大屏、音箱、电视机、冰箱、空调、车载设备、打印机、投影仪等设备。电子设备的示例性实施例包括但不限于搭载
Figure PCTCN2022118459-appb-000003
Harmony或者其它操作系统的电子设备。
The embodiment of the present application does not specifically limit the type of electronic device (such as electronic device 200, electronic device 201, electronic device 202, electronic device 203, or electronic device 204). In some embodiments, the electronic device in the embodiment of the present application It can be a mobile phone, wearable device (such as smart bracelet, smart watch, earphone, etc.), tablet computer, laptop computer (laptop), handheld computer, notebook computer, ultra-mobile personal computer (UMPC) , cellular phone, personal digital assistant (personal digital assistant, PDA), augmented reality (Augmented reality, AR)\virtual reality (virtual reality, VR) equipment and other equipment, it can also be TV, large screen, speaker, TV, refrigerator , air conditioners, car equipment, printers, projectors and other equipment. Exemplary embodiments of electronic devices include, but are not limited to
Figure PCTCN2022118459-appb-000003
Electronic devices with Harmony or other operating systems.
在一些实施例中,电子设备200、电子设备201、电子设备202、电子设备203和电子设备204可以通过有线或无线保真连接的方式连接至局域网(local area network,LAN)。电子设备200、电子设备201、电子设备202、电子设备203和电子设备204通过局域网进行互相通信。其中电子设备200、电子设备201、电子设备202、电子设备203和电子设备204还可以通过局域网中的第三方设备进行互相通信,第三方设备例如是路由器、网关、智能设备控制器等。In some embodiments, the electronic device 200, the electronic device 201, the electronic device 202, the electronic device 203 and the electronic device 204 may be connected to a local area network (local area network, LAN) through a wired or wireless fidelity connection. The electronic device 200, the electronic device 201, the electronic device 202, the electronic device 203, and the electronic device 204 communicate with each other through a local area network. The electronic device 200 , the electronic device 201 , the electronic device 202 , the electronic device 203 and the electronic device 204 can also communicate with each other through third-party devices in the local area network, such as routers, gateways, and smart device controllers.
在一些实施例中,电子设备200、电子设备201、电子设备202、电子设备203和电子设备204中可以具有分布式操作系统。借助该分布式操作系统,电子设备200、电子设备201、电子设备202、电子设备203和电子设备204形成彼此具有可信关系的可信设备,构成了一个在用户角度看来似乎融为一体的超级终端。超级终端功能以让用户将附近的所有搭载该分布式操作系统的智能设备自动连接起来,形成相互协同的工作场景,例如,识别当前处于活动的其他可信设备,建立与可信设备的连接和传输数据。根据本申请的实施例,当处于活动 状态时,电子设备200、电子设备201、电子设备202、电子设备203和电子设备204向周围环境发出指示心跳的广播消息,以便能够被超级终端所覆盖的其他设备识别到,并且可以根据用户的指示建立设备之间的安全连接。In some embodiments, the electronic device 200 , the electronic device 201 , the electronic device 202 , the electronic device 203 and the electronic device 204 may have a distributed operating system. With this distributed operating system, the electronic device 200, the electronic device 201, the electronic device 202, the electronic device 203, and the electronic device 204 form trusted devices that have a trusted relationship with each other, forming a seemingly integrated system from the user's point of view. HyperTerminal. The hyper terminal function allows users to automatically connect all nearby smart devices equipped with the distributed operating system to form a collaborative work scene, for example, to identify other trusted devices that are currently active, establish connections with trusted devices and transfer data. According to the embodiment of the present application, when in the active state, the electronic device 200, the electronic device 201, the electronic device 202, the electronic device 203, and the electronic device 204 send a broadcast message indicating a heartbeat to the surrounding environment, so that they can be covered by the HyperTerminal Other devices are recognized, and a secure connection between devices can be established according to the user's instructions.
可以理解的,本申请实施例示出的结构并不构成对系统架构的具体限定。在本申请另一些实施例中,系统架构可以包括比图示更多或更少的设备。It can be understood that the structure shown in the embodiment of the present application does not constitute a specific limitation on the system architecture. In some other embodiments of the present application, the system architecture may include more or less devices than shown.
基于上述图1示出的系统架构图,在一种可能的实现方式中,当电子设备200、电子设备201、电子设备202、电子设备203和电子设备204进行标识或通信时,电子设备之间需要验证或建立可信关系,以此为前提为后续的数据同步提供支持。Based on the system architecture diagram shown in FIG. 1 above, in a possible implementation, when the electronic device 200, the electronic device 201, the electronic device 202, the electronic device 203, and the electronic device 204 perform identification or communication, between the electronic devices It is necessary to verify or establish a trusted relationship to provide support for subsequent data synchronization.
在一些实施例中,电子设备200通过移动网络或互联网可以发现一个或多个其他设备登录的账户是电子设备200的账户,或者该一个或多个其他设备登录的账户是电子设备200登录账户的关联账户,则该一个或多个其他设备和电子设备200具有信任关系。该一个或多个其他设备中包括电子设备201、电子设备202、电子设备203或电子设备204。登录同一账户或关联账户的设备之间可以获取对方的设备信息,实现数据通信。其中,关联账户可以为被同一账户授权的账户。In some embodiments, the electronic device 200 can discover that one or more accounts logged in by other devices are the accounts of the electronic device 200 through the mobile network or the Internet, or that the accounts logged in by the one or more other devices are the accounts logged in by the electronic device 200 If the account is associated, the one or more other devices have a trust relationship with the electronic device 200 . The one or more other devices include the electronic device 201 , the electronic device 202 , the electronic device 203 or the electronic device 204 . Devices logged into the same account or associated accounts can obtain each other's device information and realize data communication. Wherein, the associated account may be an account authorized by the same account.
上述账户可以为云服务器提供商为用户提供的账户,如华为账户,还可以为用于登录应用程序的账户,如各类通讯软件的账户、支付软件的账户等。The above-mentioned account may be an account provided by the cloud server provider for the user, such as a Huawei account, or an account used to log in to an application program, such as an account of various communication software, an account of payment software, and the like.
在一些实施例中,电子设备之间可以通过手动添加的方式建立可信任关系,包括例如碰一碰和扫一扫的方式。示例性的,如图2a所示,用户可以从设置应用进入设备管理界面310,设备管理界面310可以包括名称为“我的设备”的列表。其中,“我的设备”包括本机和音响。本机和音响可以是同账号(例如,共用一个华为账号)的设备。或者,本机和音响可以是异账号但经过认证绑定的设备。In some embodiments, a trusted relationship can be established between electronic devices through manual addition, including, for example, touch and scan. Exemplarily, as shown in FIG. 2a, the user may enter the device management interface 310 from the setting application, and the device management interface 310 may include a list named "My Devices". Among them, "My Devices" includes the machine and speakers. The unit and the speaker can be devices with the same account (for example, sharing a Huawei account). Alternatively, the unit and the audio system can be devices with different accounts but authenticated bindings.
可选的,设备管理界面310可以包括绑定其他设备按钮311。本申请实施例中,绑定是指两个设备间建立可信关系,从而可以进行设备之间的设备标识和数据同步等操作。响应于用户对绑定其他设备按钮311的操作(例如,点击操作),进入如图2b所示的设备绑定界面320,设备绑定界面320中包括扫描到的可添加设备列表,用户可以在该可添加设备列表中选择想要绑定的设备。例如图2b中示出的房间电视321、平板322和智能手表323,其中,当电子设备想要和房间电视321或平板322或智能手表323建立绑定关系,可以直接点击房间电视321对应的绑定按钮321A或者平板322对应的绑定按钮322A或者智能手表323对应的绑定按钮323A,实现对房间电视321或平板322或智能手表323的绑定。Optionally, the device management interface 310 may include a bind other device button 311 . In this embodiment of the application, binding refers to the establishment of a trusted relationship between two devices, so that operations such as device identification and data synchronization between devices can be performed. In response to the user's operation (for example, click operation) on the button 311 of binding other devices, the device binding interface 320 shown in Figure 2b is entered. Select the device you want to bind in the addable device list. For example, room TV 321, tablet 322, and smart watch 323 shown in FIG. Binding button 321A or the binding button 322A corresponding to the tablet 322 or the binding button 323A corresponding to the smart watch 323 realizes binding to the room TV 321 or the tablet 322 or smart watch 323 .
可选的,设备绑定界面320中还包括碰一碰添加按钮324和扫一扫添加按钮325,可以和电子设备没有扫描到的电子设备进行绑定。示例性的,响应于针对碰一碰添加按钮324的用户操作,电子设备开启NFC,用背面碰一碰其他设备上的ontag标签,可以实现对其他设备的绑定;响应于针对扫一扫添加按钮325的用户操作,电子设备扫描其他设备的二维码,可以实现对其他设备的绑定。Optionally, the device binding interface 320 also includes a tap to add button 324 and a scan to add button 325, which can be bound to electronic devices that have not been scanned by the electronic device. Exemplarily, in response to the user's operation on the touch add button 324, the electronic device turns on NFC, touches the ontag label on other devices with the back, and can realize the binding to other devices; The user operates the button 325, and the electronic device scans the two-dimensional code of other devices, which can realize the binding to other devices.
应该理解的是,图2a和图2b分别对应的UI界面中的各个元素(例如,按钮、图标、文字等)的位置、名称和形状等不是固定不变的,可以根据需求进行自由组合或设计。例如,可以将图2a中的按钮311替换为图2b中的按钮324和按钮325。It should be understood that the positions, names, and shapes of the elements (such as buttons, icons, text, etc.) in the UI interface corresponding to Figure 2a and Figure 2b are not fixed, and can be freely combined or designed according to requirements . For example, button 311 in FIG. 2a may be replaced with button 324 and button 325 in FIG. 2b.
需要指出的是,设备之间的标识和互相通信以实现本申请实施例的方案可以是建立在同一组网(例如超级终端)中的基础上;也可以是建立在设备之前存在信任关系的基础上,例 如共同账号、关联账号、绑定关系等;还可以是在同一组网中并且建立信任关系的基础上,本申请对此不做限制。It should be pointed out that the identification and mutual communication between devices to implement the solution of the embodiment of the present application can be based on the same network (such as a hyper terminal); it can also be established on the basis of a trust relationship between the devices For example, a common account, an associated account, a binding relationship, etc.; it can also be based on the same network and the establishment of a trust relationship, which is not limited in this application.
下面以电子设备100为例介绍本申请实施例中涉及的电子设备(电子设备100包括电子设备200、电子设备201、电子设备202、电子设备203、电子设备204等)。The electronic device 100 is taken as an example below to introduce the electronic devices involved in the embodiment of the present application (the electronic device 100 includes the electronic device 200, the electronic device 201, the electronic device 202, the electronic device 203, the electronic device 204, etc.).
参见图3a,图3a示出了本申请实施例提供的示例性电子设备100的结构示意图。Referring to FIG. 3a, FIG. 3a shows a schematic structural diagram of an exemplary electronic device 100 provided by an embodiment of the present application.
如图3a所示,电子设备100可以包括处理器110,外部存储器接口120,内部存储器121,通用串行总线(universal serial bus,USB)接口130,充电管理模块140,电源管理模块141,电池142,天线1,天线2,移动通信模块150,无线通信模块160,音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,传感器模块180,按键190,马达191,指示器192,摄像头193,显示屏194,以及用户标识模块(subscriber identification module,SIM)卡接口195等。其中传感器模块180可以包括压力传感器180A,陀螺仪传感器180B,气压传感器180C,磁传感器180D,加速度传感器180E,距离传感器180F,接近光传感器180G,指纹传感器180H,温度传感器180J,触摸传感器180K,环境光传感器180L,骨传导传感器180M等。As shown in Figure 3a, the electronic device 100 may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (universal serial bus, USB) interface 130, a charging management module 140, a power management module 141, and a battery 142 , antenna 1, antenna 2, mobile communication module 150, wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, earphone jack 170D, sensor module 180, button 190, motor 191, indicator 192, camera 193 , a display screen 194, and a subscriber identification module (subscriber identification module, SIM) card interface 195, etc. The sensor module 180 may include a pressure sensor 180A, a gyroscope sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, an ambient light sensor 180L, bone conduction sensor 180M, etc.
可以理解的是,本申请实施例示意的结构并不构成对电子设备100的具体限定。在本申请另一些实施例中,电子设备100可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。图示的部件可以以硬件,软件或软件和硬件的组合实现。It can be understood that, the structure illustrated in the embodiment of the present application does not constitute a specific limitation on the electronic device 100 . In other embodiments of the present application, the electronic device 100 may include more or fewer components than shown in the figure, or combine certain components, or separate certain components, or arrange different components. The illustrated components can be realized in hardware, software or a combination of software and hardware.
处理器110可以包括一个或多个处理单元,例如:处理器110可以包括应用处理器(application processor,AP),调制解调处理器,图形处理器(graphics processing unit,GPU),图像信号处理器(image signal processor,ISP),控制器,存储器,视频编解码器,数字信号处理器(digital signal processor,DSP),基带处理器,和/或神经网络处理器(neural-network processing unit,NPU)等。其中,不同的处理单元可以是独立的器件,也可以集成在一个或多个处理器中。The processor 110 may include one or more processing units, for example: the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processing unit (graphics processing unit, GPU), an image signal processor (image signal processor, ISP), controller, memory, video codec, digital signal processor (digital signal processor, DSP), baseband processor, and/or neural network processor (neural-network processing unit, NPU) wait. Wherein, different processing units may be independent devices, or may be integrated in one or more processors.
其中,控制器可以是电子设备100的神经中枢和指挥中心。控制器可以根据指令操作码和时序信号,产生操作控制信号,完成取指令和执行指令的控制。Wherein, the controller may be the nerve center and command center of the electronic device 100 . The controller can generate an operation control signal according to the instruction opcode and timing signal, and complete the control of fetching and executing the instruction.
处理器110中还可以设置存储器,用于存储指令和数据。在一些实施例中,处理器110中的存储器为高速缓冲存储器。该存储器可以保存处理器110刚用过或循环使用的指令或数据。如果处理器110需要再次使用该指令或数据,可从所述存储器中直接调用。避免了重复存取,减少了处理器110的等待时间,因而提高了系统的效率。A memory may also be provided in the processor 110 for storing instructions and data. In some embodiments, the memory in processor 110 is a cache memory. The memory may hold instructions or data that the processor 110 has just used or recycled. If the processor 110 needs to use the instruction or data again, it can be called directly from the memory. Repeated access is avoided, and the waiting time of the processor 110 is reduced, thus improving the efficiency of the system.
在一些实施例中,处理器110可以包括一个或多个接口。接口可以包括集成电路(inter-integrated circuit,I2C)接口,集成电路内置音频(inter-integrated circuit sound,I2S)接口,脉冲编码调制(pulse code modulation,PCM)接口,通用异步收发传输器(universal asynchronous receiver/transmitter,UART)接口,移动产业处理器接口(mobile industry processor interface,MIPI),通用输入输出(general-purpose input/output,GPIO)接口,用户标识模块(subscriber identity module,SIM)接口,和/或通用串行总线(universal serial bus,USB)接口等。In some embodiments, processor 110 may include one or more interfaces. The interface may include an integrated circuit (inter-integrated circuit, I2C) interface, an integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, a pulse code modulation (pulse code modulation, PCM) interface, a universal asynchronous transmitter (universal asynchronous receiver/transmitter, UART) interface, mobile industry processor interface (mobile industry processor interface, MIPI), general-purpose input and output (general-purpose input/output, GPIO) interface, subscriber identity module (subscriber identity module, SIM) interface, and /or universal serial bus (universal serial bus, USB) interface, etc.
I2C接口是一种双向同步串行总线,包括一根串行数据线(serial data line,SDA)和一根串行时钟线(derail clock line,SCL)。在一些实施例中,处理器110可以包含多组I2C总线。处 理器110可以通过不同的I2C总线接口分别耦合触摸传感器180K,充电器,闪光灯,摄像头193等。例如:处理器110可以通过I2C接口耦合触摸传感器180K,使处理器110与触摸传感器180K通过I2C总线接口通信,实现电子设备100的触摸功能。The I2C interface is a bidirectional synchronous serial bus, including a serial data line (serial data line, SDA) and a serial clock line (derail clock line, SCL). In some embodiments, processor 110 may include multiple sets of I2C buses. The processor 110 can be respectively coupled to the touch sensor 180K, the charger, the flashlight, the camera 193, etc. through different I2C bus interfaces. For example, the processor 110 may be coupled to the touch sensor 180K through the I2C interface, so that the processor 110 and the touch sensor 180K communicate through the I2C bus interface to realize the touch function of the electronic device 100 .
I2S接口可以用于音频通信。在一些实施例中,处理器110可以包含多组I2S总线。处理器110可以通过I2S总线与音频模块170耦合,实现处理器110与音频模块170之间的通信。在一些实施例中,音频模块170可以通过I2S接口向无线通信模块160传递音频信号,实现通过蓝牙耳机接听电话的功能。The I2S interface can be used for audio communication. In some embodiments, processor 110 may include multiple sets of I2S buses. The processor 110 may be coupled to the audio module 170 through an I2S bus to implement communication between the processor 110 and the audio module 170 . In some embodiments, the audio module 170 can transmit audio signals to the wireless communication module 160 through the I2S interface, so as to realize the function of answering calls through the Bluetooth headset.
PCM接口也可以用于音频通信,将模拟信号抽样,量化和编码。在一些实施例中,音频模块170与无线通信模块160可以通过PCM总线接口耦合。在一些实施例中,音频模块170也可以通过PCM接口向无线通信模块160传递音频信号,实现通过蓝牙耳机接听电话的功能。所述I2S接口和所述PCM接口都可以用于音频通信。The PCM interface can also be used for audio communication, sampling, quantizing and encoding the analog signal. In some embodiments, the audio module 170 and the wireless communication module 160 may be coupled through a PCM bus interface. In some embodiments, the audio module 170 can also transmit audio signals to the wireless communication module 160 through the PCM interface, so as to realize the function of answering calls through the Bluetooth headset. Both the I2S interface and the PCM interface can be used for audio communication.
UART接口是一种通用串行数据总线,用于异步通信。该总线可以为双向通信总线。它将要传输的数据在串行通信与并行通信之间转换。在一些实施例中,UART接口通常被用于连接处理器110与无线通信模块160。例如:处理器110通过UART接口与无线通信模块160中的蓝牙模块通信,实现蓝牙功能。在一些实施例中,音频模块170可以通过UART接口向无线通信模块160传递音频信号,实现通过蓝牙耳机播放音乐的功能。The UART interface is a universal serial data bus used for asynchronous communication. The bus can be a bidirectional communication bus. It converts the data to be transmitted between serial communication and parallel communication. In some embodiments, a UART interface is generally used to connect the processor 110 and the wireless communication module 160 . For example: the processor 110 communicates with the Bluetooth module in the wireless communication module 160 through the UART interface to realize the Bluetooth function. In some embodiments, the audio module 170 can transmit audio signals to the wireless communication module 160 through the UART interface, so as to realize the function of playing music through the Bluetooth headset.
MIPI接口可以被用于连接处理器110与显示屏194,摄像头193等外围器件。MIPI接口包括摄像头串行接口(camera serial interface,CSI),显示屏串行接口(display serial interface,DSI)等。在一些实施例中,处理器110和摄像头193通过CSI接口通信,实现电子设备100的拍摄功能。处理器110和显示屏194通过DSI接口通信,实现电子设备100的显示功能。The MIPI interface can be used to connect the processor 110 with peripheral devices such as the display screen 194 and the camera 193 . MIPI interface includes camera serial interface (camera serial interface, CSI), display serial interface (display serial interface, DSI), etc. In some embodiments, the processor 110 communicates with the camera 193 through the CSI interface to realize the shooting function of the electronic device 100 . The processor 110 communicates with the display screen 194 through the DSI interface to realize the display function of the electronic device 100 .
GPIO接口可以通过软件配置。GPIO接口可以被配置为控制信号,也可被配置为数据信号。在一些实施例中,GPIO接口可以用于连接处理器110与摄像头193,显示屏194,无线通信模块160,音频模块170,传感器模块180等。GPIO接口还可以被配置为I2C接口,I2S接口,UART接口,MIPI接口等。The GPIO interface can be configured by software. The GPIO interface can be configured as a control signal or as a data signal. In some embodiments, the GPIO interface can be used to connect the processor 110 with the camera 193 , the display screen 194 , the wireless communication module 160 , the audio module 170 , the sensor module 180 and so on. The GPIO interface can also be configured as an I2C interface, I2S interface, UART interface, MIPI interface, etc.
USB接口130是符合USB标准规范的接口,具体可以是Mini USB接口,Micro USB接口,USB Type C接口等。USB接口130可以用于连接充电器为电子设备100充电,也可以用于电子设备100与外围设备之间传输数据。也可以用于连接耳机,通过耳机播放音频。该接口还可以用于连接其他电子设备,例如AR设备等。The USB interface 130 is an interface conforming to the USB standard specification, specifically, it can be a Mini USB interface, a Micro USB interface, a USB Type C interface, and the like. The USB interface 130 can be used to connect a charger to charge the electronic device 100 , and can also be used to transmit data between the electronic device 100 and peripheral devices. It can also be used to connect headphones and play audio through them. This interface can also be used to connect other electronic devices, such as AR devices.
可以理解的是,本申请实施例示意的各模块间的接口连接关系,只是示意性说明,并不构成对电子设备100的结构限定。在本申请另一些实施例中,电子设备100也可以采用上述实施例中不同的接口连接方式,或多种接口连接方式的组合。It can be understood that the interface connection relationship between the modules shown in the embodiment of the present application is only a schematic illustration, and does not constitute a structural limitation of the electronic device 100 . In other embodiments of the present application, the electronic device 100 may also adopt different interface connection manners in the foregoing embodiments, or a combination of multiple interface connection manners.
充电管理模块140用于从充电器接收充电输入。其中,充电器可以是无线充电器,也可以是有线充电器。在一些有线充电的实施例中,充电管理模块140可以通过USB接口130接收有线充电器的充电输入。在一些无线充电的实施例中,充电管理模块140可以通过电子设备100的无线充电线圈接收无线充电输入。充电管理模块140为电池142充电的同时,还可以通过电源管理模块141为电子设备供电。The charging management module 140 is configured to receive a charging input from a charger. Wherein, the charger may be a wireless charger or a wired charger. In some wired charging embodiments, the charging management module 140 can receive charging input from the wired charger through the USB interface 130 . In some wireless charging embodiments, the charging management module 140 may receive a wireless charging input through a wireless charging coil of the electronic device 100 . While the charging management module 140 is charging the battery 142 , it can also provide power for electronic devices through the power management module 141 .
电源管理模块141用于连接电池142,充电管理模块140与处理器110。电源管理模块141接收电池142和/或充电管理模块140的输入,为处理器110,内部存储器121,外部存储器,显示屏194,摄像头193,和无线通信模块160等供电。电源管理模块141还可以用于监 测电池容量,电池循环次数,电池健康状态(漏电,阻抗)等参数。在其他一些实施例中,电源管理模块141也可以设置于处理器110中。在另一些实施例中,电源管理模块141和充电管理模块140也可以设置于同一个器件中。The power management module 141 is used for connecting the battery 142 , the charging management module 140 and the processor 110 . The power management module 141 receives the input from the battery 142 and/or the charging management module 140 to provide power for the processor 110 , the internal memory 121 , the external memory, the display screen 194 , the camera 193 , and the wireless communication module 160 . The power management module 141 can also be used to monitor parameters such as battery capacity, battery cycle times, battery health status (leakage, impedance). In some other embodiments, the power management module 141 may also be disposed in the processor 110 . In some other embodiments, the power management module 141 and the charging management module 140 may also be set in the same device.
电子设备100的无线通信功能可以通过天线1,天线2,移动通信模块150,无线通信模块160,调制解调处理器以及基带处理器等实现。The wireless communication function of the electronic device 100 can be realized by the antenna 1 , the antenna 2 , the mobile communication module 150 , the wireless communication module 160 , a modem processor, a baseband processor, and the like.
天线1和天线2用于发射和接收电磁波信号。电子设备100中的每个天线可用于覆盖单个或多个通信频带。不同的天线还可以复用,以提高天线的利用率。例如:可以将天线1复用为无线局域网的分集天线。在另外一些实施例中,天线可以和调谐开关结合使用。 Antenna 1 and Antenna 2 are used to transmit and receive electromagnetic wave signals. Each antenna in electronic device 100 may be used to cover single or multiple communication frequency bands. Different antennas can also be multiplexed to improve the utilization of the antennas. For example: Antenna 1 can be multiplexed as a diversity antenna of a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
移动通信模块150可以提供应用在电子设备100上的包括2G/3G/4G/5G等无线通信的解决方案。移动通信模块150可以包括至少一个滤波器,开关,功率放大器,低噪声放大器(low noise amplifier,LNA)等。移动通信模块150可以由天线1接收电磁波,并对接收的电磁波进行滤波,放大等处理,传送至调制解调处理器进行解调。移动通信模块150还可以对经调制解调处理器调制后的信号放大,经天线1转为电磁波辐射出去。在一些实施例中,移动通信模块150的至少部分功能模块可以被设置于处理器110中。在一些实施例中,移动通信模块150的至少部分功能模块可以与处理器110的至少部分模块被设置在同一个器件中。The mobile communication module 150 can provide wireless communication solutions including 2G/3G/4G/5G applied on the electronic device 100 . The mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (low noise amplifier, LNA) and the like. The mobile communication module 150 can receive electromagnetic waves through the antenna 1, filter and amplify the received electromagnetic waves, and send them to the modem processor for demodulation. The mobile communication module 150 can also amplify the signals modulated by the modem processor, and convert them into electromagnetic waves through the antenna 1 for radiation. In some embodiments, at least part of the functional modules of the mobile communication module 150 may be set in the processor 110 . In some embodiments, at least part of the functional modules of the mobile communication module 150 and at least part of the modules of the processor 110 may be set in the same device.
调制解调处理器可以包括调制器和解调器。其中,调制器用于将待发送的低频基带信号调制成中高频信号。解调器用于将接收的电磁波信号解调为低频基带信号。随后解调器将解调得到的低频基带信号传送至基带处理器处理。低频基带信号经基带处理器处理后,被传递给应用处理器。应用处理器通过音频设备(不限于扬声器170A,受话器170B等)输出声音信号,或通过显示屏194显示图像或视频。在一些实施例中,调制解调处理器可以是独立的器件。在另一些实施例中,调制解调处理器可以独立于处理器110,与移动通信模块150或其他功能模块设置在同一个器件中。A modem processor may include a modulator and a demodulator. Wherein, the modulator is used for modulating the low-frequency baseband signal to be transmitted into a medium-high frequency signal. The demodulator is used to demodulate the received electromagnetic wave signal into a low frequency baseband signal. Then the demodulator sends the demodulated low-frequency baseband signal to the baseband processor for processing. The low-frequency baseband signal is passed to the application processor after being processed by the baseband processor. The application processor outputs sound signals through audio equipment (not limited to speaker 170A, receiver 170B, etc.), or displays images or videos through display screen 194 . In some embodiments, the modem processor may be a stand-alone device. In some other embodiments, the modem processor may be independent from the processor 110, and be set in the same device as the mobile communication module 150 or other functional modules.
无线通信模块160可以提供应用在电子设备100上的包括UWB,无线局域网(wireless local area networks,WLAN)(如无线保真(wireless fidelity,Wi-Fi)网络),蓝牙(bluetooth,BT),全球导航卫星系统(global navigation satellite system,GNSS),调频(frequency modulation,FM),近距离无线通信技术(near field communication,NFC),红外技术(infrared,IR)等无线通信的解决方案。无线通信模块160可以是集成至少一个通信处理模块的一个或多个器件。无线通信模块160经由天线2接收电磁波,将电磁波信号调频以及滤波处理,将处理后的信号发送到处理器110。无线通信模块160还可以从处理器110接收待发送的信号,对其进行调频,放大,经天线2转为电磁波辐射出去。The wireless communication module 160 can provide applications on the electronic device 100 including UWB, wireless local area networks (wireless local area networks, WLAN) (such as wireless fidelity (wireless fidelity, Wi-Fi) network), bluetooth (bluetooth, BT), global Wireless communication solutions such as global navigation satellite system (GNSS), frequency modulation (FM), near field communication (NFC), and infrared (IR). The wireless communication module 160 may be one or more devices integrating at least one communication processing module. The wireless communication module 160 receives electromagnetic waves via the antenna 2 , frequency-modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 110 . The wireless communication module 160 can also receive the signal to be sent from the processor 110 , frequency-modulate it, amplify it, and convert it into electromagnetic waves through the antenna 2 for radiation.
在一些实施例中,电子设备100的天线1和移动通信模块150耦合,天线2和无线通信模块160耦合,使得电子设备100可以通过无线通信技术与网络以及其他设备通信。所述无线通信技术可以包括全球移动通讯系统(global system for mobile communications,GSM),通用分组无线服务(general packet radio service,GPRS),码分多址接入(code division multiple access,CDMA),宽带码分多址(wideband code division multiple access,WCDMA),时分码分多址(time-division code division multiple access,TD-SCDMA),长期演进(long term evolution,LTE),BT,GNSS,WLAN,NFC,FM,和/或IR技术等。所述GNSS可以包括全球卫星定位系统(global positioning system,GPS),全球导航卫星系统(global navigation satellite system,GLONASS),北斗卫星导航系统(beidou navigation satellite system,BDS),准天顶卫星系统 (quasi-zenith satellite system,QZSS)和/或星基增强系统(satellite based augmentation systems,SBAS)。In some embodiments, the antenna 1 of the electronic device 100 is coupled to the mobile communication module 150, and the antenna 2 is coupled to the wireless communication module 160, so that the electronic device 100 can communicate with the network and other devices through wireless communication technology. The wireless communication technology may include global system for mobile communications (GSM), general packet radio service (general packet radio service, GPRS), code division multiple access (code division multiple access, CDMA), broadband Code division multiple access (wideband code division multiple access, WCDMA), time division code division multiple access (time-division code division multiple access, TD-SCDMA), long term evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC , FM, and/or IR techniques, etc. The GNSS may include a global positioning system (global positioning system, GPS), a global navigation satellite system (global navigation satellite system, GLONASS), a Beidou navigation satellite system (beidou navigation satellite system, BDS), a quasi-zenith satellite system (quasi -zenith satellite system (QZSS) and/or satellite based augmentation systems (SBAS).
电子设备100通过GPU、显示屏194、以及应用处理器等实现显示功能。GPU为图像处理的微处理器,连接显示屏194和应用处理器。GPU用于执行数学和几何计算,用于图形渲染。处理器110可包括一个或多个GPU,其执行程序指令以生成或改变显示信息。The electronic device 100 realizes the display function through the GPU, the display screen 194 , and the application processor. The GPU is a microprocessor for image processing, and is connected to the display screen 194 and the application processor. GPUs are used to perform mathematical and geometric calculations for graphics rendering. Processor 110 may include one or more GPUs that execute program instructions to generate or change display information.
显示屏194用于显示图像,视频等。显示屏194包括显示面板。显示面板可以采用液晶显示屏(liquid crystal display,LCD),有机发光二极管(organic light-emitting diode,OLED),有源矩阵有机发光二极体或主动矩阵有机发光二极体(active-matrix organic light emitting diode的,AMOLED),柔性发光二极管(flex light-emitting diode,FLED),Miniled,MicroLed,Micro-oLed,量子点发光二极管(quantum dot light emitting diodes,QLED)等。在一些实施例中,电子设备100可以包括1个或N个显示屏194,N为大于1的正整数。The display screen 194 is used to display images, videos and the like. The display screen 194 includes a display panel. The display panel can be a liquid crystal display (LCD), an organic light-emitting diode (OLED), an active matrix organic light emitting diode or an active matrix organic light emitting diode (active-matrix organic light emitting diode, AMOLED), flexible light-emitting diode (flex light-emitting diode, FLED), Miniled, MicroLed, Micro-oLed, quantum dot light emitting diodes (quantum dot light emitting diodes, QLED), etc. In some embodiments, the electronic device 100 may include 1 or N display screens 194 , where N is a positive integer greater than 1.
在本申请的一些实施例中,显示屏194中显示有系统当前输出的界面内容。例如,界面内容为即时通讯应用提供的界面。In some embodiments of the present application, the display screen 194 displays interface content currently output by the system. For example, the interface content is an interface provided by an instant messaging application.
电子设备100可以通过ISP,摄像头193,视频编解码器,GPU,显示屏194以及应用处理器等实现拍摄功能。The electronic device 100 can realize the shooting function through the ISP, the camera 193 , the video codec, the GPU, the display screen 194 and the application processor.
ISP用于处理摄像头193反馈的数据。例如,拍照时,打开快门,光线通过镜头被传递到摄像头感光元件上,光信号转换为电信号,摄像头感光元件将所述电信号传递给ISP处理,转化为肉眼可见的图像。ISP还可以对图像的噪点,亮度,肤色进行算法优化。ISP还可以对拍摄场景的曝光,色温等参数优化。在一些实施例中,ISP可以设置在摄像头193中。The ISP is used for processing the data fed back by the camera 193 . For example, when taking a picture, open the shutter, the light is transmitted to the photosensitive element of the camera through the lens, and the light signal is converted into an electrical signal, and the photosensitive element of the camera transmits the electrical signal to the ISP for processing, and converts it into an image visible to the naked eye. ISP can also perform algorithm optimization on image noise, brightness, and skin color. ISP can also optimize the exposure, color temperature and other parameters of the shooting scene. In some embodiments, the ISP may be located in the camera 193 .
摄像头193用于捕获静态图像或视频。物体通过镜头生成光学图像投射到感光元件。感光元件可以是电荷耦合器件(charge coupled device,CCD)或互补金属氧化物半导体(complementary metal-oxide-semiconductor,CMOS)光电晶体管。感光元件把光信号转换成电信号,之后将电信号传递给ISP转换成数字图像信号。ISP将数字图像信号输出到DSP加工处理。DSP将数字图像信号转换成标准的RGB,YUV等格式的图像信号。在一些实施例中,电子设备100可以包括1个或N个摄像头193,N为大于1的正整数。Camera 193 is used to capture still images or video. The object generates an optical image through the lens and projects it to the photosensitive element. The photosensitive element may be a charge coupled device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor. The photosensitive element converts the light signal into an electrical signal, and then transmits the electrical signal to the ISP to convert it into a digital image signal. The ISP outputs the digital image signal to the DSP for processing. DSP converts digital image signals into standard RGB, YUV and other image signals. In some embodiments, the electronic device 100 may include 1 or N cameras 193 , where N is a positive integer greater than 1.
数字信号处理器用于处理数字信号,除了可以处理数字图像信号,还可以处理其他数字信号。例如,当电子设备100在频点选择时,数字信号处理器用于对频点能量进行傅里叶变换等。Digital signal processors are used to process digital signals. In addition to digital image signals, they can also process other digital signals. For example, when the electronic device 100 selects a frequency point, the digital signal processor is used to perform Fourier transform on the energy of the frequency point.
视频编解码器用于对数字视频压缩或解压缩。电子设备100可以支持一种或多种视频编解码器。这样,电子设备100可以播放或录制多种编码格式的视频,例如:动态图像专家组(moving picture experts group,MPEG)1,MPEG2,MPEG3,MPEG4等。Video codecs are used to compress or decompress digital video. The electronic device 100 may support one or more video codecs. In this way, the electronic device 100 can play or record videos in various encoding formats, for example: moving picture experts group (moving picture experts group, MPEG) 1, MPEG2, MPEG3, MPEG4 and so on.
NPU为神经网络(neural-network,NN)计算处理器,通过借鉴生物神经网络结构,例如借鉴人脑神经元之间传递模式,对输入信息快速处理,还可以不断的自学习。通过NPU可以实现电子设备100的智能认知等应用,例如:图像识别,人脸识别,语音识别,文本理解等。The NPU is a neural-network (NN) computing processor. By referring to the structure of biological neural networks, such as the transfer mode between neurons in the human brain, it can quickly process input information and continuously learn by itself. Applications such as intelligent cognition of the electronic device 100 can be realized through the NPU, such as image recognition, face recognition, speech recognition, text understanding, and the like.
外部存储器接口120可以用于连接外部存储卡,例如Micro SD卡,实现扩展电子设备100的存储能力。外部存储卡通过外部存储器接口120与处理器110通信,实现数据存储功能。例如将音乐,视频等文件保存在外部存储卡中。The external memory interface 120 can be used to connect an external memory card, such as a Micro SD card, so as to expand the storage capacity of the electronic device 100. The external memory card communicates with the processor 110 through the external memory interface 120 to implement a data storage function. Such as saving music, video and other files in the external memory card.
内部存储器121可以用于存储计算机可执行程序代码,所述可执行程序代码包括指令。处理器110通过运行存储在内部存储器121的指令,从而执行电子设备100的各种功能应用 以及数据处理。内部存储器121可以包括存储程序区和存储数据区。其中,存储程序区可存储操作系统,至少一个功能所需的应用程序(比如声音播放功能,图像播放功能等)等。存储数据区可存储电子设备100使用过程中所创建的数据(比如音频数据,电话本等)等。此外,内部存储器121可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件,闪存器件,通用闪存存储器(universal flash storage,UFS)等。The internal memory 121 may be used to store computer-executable program codes including instructions. The processor 110 executes various functional applications and data processing of the electronic device 100 by executing instructions stored in the internal memory 121 . The internal memory 121 may include an area for storing programs and an area for storing data. Wherein, the stored program area can store an operating system, at least one application program required by a function (such as a sound playing function, an image playing function, etc.) and the like. The storage data area can store data created during the use of the electronic device 100 (such as audio data, phonebook, etc.) and the like. In addition, the internal memory 121 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, flash memory device, universal flash storage (universal flash storage, UFS) and the like.
电子设备100可以通过音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,以及应用处理器等实现音频功能。例如音乐播放,录音等。The electronic device 100 can implement audio functions through the audio module 170 , the speaker 170A, the receiver 170B, the microphone 170C, the earphone interface 170D, and the application processor. Such as music playback, recording, etc.
音频模块170用于将数字音频信息转换成模拟音频信号输出,也用于将模拟音频输入转换为数字音频信号。音频模块170还可以用于对音频信号编码和解码。在一些实施例中,音频模块170可以设置于处理器110中,或将音频模块170的部分功能模块设置于处理器110中。The audio module 170 is used to convert digital audio information into analog audio signal output, and is also used to convert analog audio input into digital audio signal. The audio module 170 may also be used to encode and decode audio signals. In some embodiments, the audio module 170 may be set in the processor 110 , or some functional modules of the audio module 170 may be set in the processor 110 .
扬声器170A,也称“喇叭”,用于将音频电信号转换为声音信号。电子设备100可以通过扬声器170A收听音乐,或收听免提通话。 Speaker 170A, also referred to as a "horn", is used to convert audio electrical signals into sound signals. Electronic device 100 can listen to music through speaker 170A, or listen to hands-free calls.
受话器170B,也称“听筒”,用于将音频电信号转换成声音信号。当电子设备100接听电话或语音信息时,可以通过将受话器170B靠近人耳接听语音。Receiver 170B, also called "earpiece", is used to convert audio electrical signals into sound signals. When the electronic device 100 receives a call or a voice message, the receiver 170B can be placed close to the human ear to receive the voice.
麦克风170C,也称“话筒”,“传声器”,用于将声音信号转换为电信号。当拨打电话或发送语音信息时,用户可以通过人嘴靠近麦克风170C发声,将声音信号输入到麦克风170C。电子设备100可以设置至少一个麦克风170C。在另一些实施例中,电子设备100可以设置两个麦克风170C,除了采集声音信号,还可以实现降噪功能。在另一些实施例中,电子设备100还可以设置三个,四个或更多麦克风170C,实现采集声音信号,降噪,还可以识别声音来源,实现定向录音功能等。The microphone 170C, also called "microphone" or "microphone", is used to convert sound signals into electrical signals. When making a phone call or sending a voice message, the user can put his mouth close to the microphone 170C to make a sound, and input the sound signal to the microphone 170C. The electronic device 100 may be provided with at least one microphone 170C. In some other embodiments, the electronic device 100 may be provided with two microphones 170C, which may also implement a noise reduction function in addition to collecting sound signals. In some other embodiments, the electronic device 100 can also be provided with three, four or more microphones 170C to collect sound signals, reduce noise, identify sound sources, and realize directional recording functions, etc.
耳机接口170D用于连接有线耳机。耳机接口170D可以是USB接口130,也可以是3.5mm的开放移动电子设备平台(open mobile terminal platform,OMTP)标准接口,美国蜂窝电信工业协会(cellular telecommunications industry association of the USA,CTIA)标准接口。The earphone interface 170D is used for connecting wired earphones. The earphone interface 170D can be a USB interface 130, or a 3.5mm open mobile terminal platform (OMTP) standard interface, or a cellular telecommunications industry association of the USA (CTIA) standard interface.
按键190包括开机键,音量键等。按键190可以是机械按键。也可以是触摸式按键。电子设备100可以接收按键输入,产生与电子设备100的用户设置以及功能控制有关的键信号输入。The keys 190 include a power key, a volume key and the like. The key 190 may be a mechanical key. It can also be a touch button. The electronic device 100 can receive key input and generate key signal input related to user settings and function control of the electronic device 100 .
马达191可以产生振动提示。马达191可以用于来电振动提示,也可以用于触摸振动反馈。例如,作用于不同应用(例如拍照,音频播放等)的触摸操作,可以对应不同的振动反馈效果。作用于显示屏194不同区域的触摸操作,马达191也可对应不同的振动反馈效果。不同的应用场景(例如:时间提醒,接收信息,闹钟,游戏等)也可以对应不同的振动反馈效果。触摸振动反馈效果还可以支持自定义。The motor 191 can generate a vibrating reminder. The motor 191 can be used for incoming call vibration prompts, and can also be used for touch vibration feedback. For example, touch operations applied to different applications (such as taking pictures, playing audio, etc.) may correspond to different vibration feedback effects. The motor 191 may also correspond to different vibration feedback effects for touch operations acting on different areas of the display screen 194 . Different application scenarios (for example: time reminder, receiving information, alarm clock, games, etc.) can also correspond to different vibration feedback effects. The touch vibration feedback effect can also support customization.
指示器192可以是指示灯,可以用于指示充电状态,电量变化,也可以用于指示消息,未接来电,通知等。The indicator 192 can be an indicator light, and can be used to indicate charging status, power change, and can also be used to indicate messages, missed calls, notifications, and the like.
SIM卡接口195用于连接SIM卡。SIM卡可以通过插入SIM卡接口195,或从SIM卡接口195拔出,实现和电子设备100的接触和分离。The SIM card interface 195 is used for connecting a SIM card. The SIM card can be connected and separated from the electronic device 100 by inserting it into the SIM card interface 195 or pulling it out from the SIM card interface 195 .
其中,上述对电子设备100的硬件结构的具体描述适用于对电子设备200、电子设备201、电子设备202、电子设备203、电子设备204的硬件结构描述。Wherein, the above specific description of the hardware structure of the electronic device 100 is applicable to the description of the hardware structure of the electronic device 200 , the electronic device 201 , the electronic device 202 , the electronic device 203 , and the electronic device 204 .
图3b示出了本申请实施例的电子设备100的软件结构框图。Fig. 3b shows a software structural block diagram of the electronic device 100 according to the embodiment of the present application.
分层架构将软件分成若干个层,每一层都有清晰的角色和分工。层与层之间通过软件接口通信。在一些实施例中,将Android系统分为五层,从上至下分别为应用程序层,应用程序框架层,安卓运行时(Android runtime)和系统库,硬件抽象层(hard abstraction layer,HAL)(图3b中未进行示意),以及内核层。The layered architecture divides the software into several layers, and each layer has a clear role and division of labor. Layers communicate through software interfaces. In some embodiments, the Android system is divided into five layers, from top to bottom are application program layer, application program framework layer, Android runtime (Android runtime) and system library, hardware abstraction layer (hard abstraction layer, HAL) (not shown in Figure 3b), and the inner core layer.
应用程序层可以包括一系列应用程序包。The application layer can consist of a series of application packages.
如图3b所示,应用程序包可以包括相机,图库,日历,通话,地图,导航,WLAN,蓝牙,音乐,视频,游戏,购物,出行,即时通信(如短信息)等应用程序。另外,应用程序包还可以包括:主屏幕(即桌面),负一屏,控制中心,通知中心等系统应用程序。本申请实施例中,应用程序包还可以包括超级终端应用,该超级终端应用可以是系统应用,也可以是三方应用。应用程序包还可以包括任务流管理器的应用程序,用于对任务流管理器进行调用和管理。As shown in Figure 3b, the application package can include camera, gallery, calendar, call, map, navigation, WLAN, Bluetooth, music, video, game, shopping, travel, instant messaging (such as short message) and other applications. In addition, the application package may also include: system applications such as a main screen (that is, a desktop), a negative screen, a control center, and a notification center. In the embodiment of the present application, the application program package may further include a hyper terminal application, and the hyper terminal application may be a system application or a third-party application. The application package may also include an application program of the task flow manager, which is used to invoke and manage the task flow manager.
超级终端应用提供了一种服务或功能,可以支持电子设备100建立与其他电子设备的可信设备网络,并且可以支持电子设备100通过接收可信设备的广播心跳消息来标识电子设备100的活动的可信设备。The HyperTerminal application provides a service or function that can support the electronic device 100 to establish a trusted device network with other electronic devices, and can support the electronic device 100 to identify the activity of the electronic device 100 by receiving the broadcast heartbeat message of the trusted device. trusted device.
应用程序框架层为应用程序层的应用程序提供应用编程接口(application programming interface,API)和编程框架。应用程序框架层包括一些预先定义的函数。The application framework layer provides an application programming interface (application programming interface, API) and a programming framework for applications in the application layer. The application framework layer includes some predefined functions.
如图3b所示,应用程序框架层可以包括任务流管理器,数据库管理系统DBMS,本地任务流数据库,分布式数据库,输入管理器,窗口管理器(window manager),内容提供器,视图系统,电话管理器,资源管理器,通知管理器,显示管理器,活动管理器(activity manager)等等。As shown in Figure 3b, the application framework layer can include task flow manager, database management system DBMS, local task flow database, distributed database, input manager, window manager (window manager), content provider, view system, Phone Manager, Explorer, Notification Manager, Display Manager, Activity Manager, etc.
可信设备管理器,用于管理电子设备的可信设备集合。可信设备集合包括可信设备的身份密钥、当前地址、状态信息等。可信设备管理器根据可以认证系统的信息添加、更新以及删除可信设备。可信设备管理还可以生成和更新电子设备100自身的身份密钥。The trusted device manager is used to manage a trusted device collection of the electronic device. The trusted device set includes the identity key, current address, state information, etc. of the trusted device. The trusted device manager adds, updates, and deletes trusted devices based on information that can authenticate the system. Trusted device management can also generate and update the identity key of the electronic device 100 itself.
数据库管理系统DBMS是一种操纵和管理数据库的软件,是用于建立、使用和维护数据库,包括了调用数据库的接口。DBMS对数据库进行统一的管理和控制,以保证数据库的安全性和完整性。Database management system (DBMS) is a kind of software for manipulating and managing databases. It is used to establish, use and maintain databases, including the interface for calling databases. DBMS conducts unified management and control on the database to ensure the security and integrity of the database.
认证系统,用于来其他设备的认证信息确定设备是否为电子设备100的可信设备。认证信息可以是账号信息、绑定信息等。The authentication system is used to determine whether the device is a trusted device of the electronic device 100 based on authentication information from other devices. The authentication information may be account information, binding information, and the like.
账号管理系统,用于记录和管理第一电子设备100的用户账号的信息。用户账号包括例如华为账户、支付账号、即时通信账号等,以及这些不同系统中的账号关联性。The account management system is configured to record and manage the information of the user account of the first electronic device 100 . User accounts include, for example, Huawei accounts, payment accounts, instant messaging accounts, etc., and account associations in these different systems.
本申请实施例,电子设备100的超级收藏应用调用任务流管理器的客户端(任务流管理器的应用程序)对本地任务流数据库注册任务监听服务。该任务流管理器的客户端调用数据库管理系统DBMS的接口,向任务流管理器注册任务监听服务。该任务监听服务用于当任务流管理器中监测到本地任务流数据库中有任务数据发生变更(例如增加、删除、更改),任务流管理器将该变更的任务数据同步到超级收藏应用中。In this embodiment of the present application, the super collection application of the electronic device 100 calls the client of the task flow manager (the application program of the task flow manager) to register the task monitoring service with the local task flow database. The client of the task flow manager calls the interface of the database management system DBMS, and registers the task monitoring service with the task flow manager. The task monitoring service is used to synchronize the changed task data to the super collection application when the task flow manager detects that task data in the local task flow database has changed (such as adding, deleting, changing).
输入管理器用于接收如内核层、硬件抽象层等下层上报的指令或请求。The input manager is used to receive instructions or requests reported by lower layers such as the kernel layer and the hardware abstraction layer.
窗口管理器用于管理窗口程序。窗口管理器可以获取显示屏大小,判断是否有状态栏,锁定屏幕,截取屏幕等。A window manager is used to manage window programs. The window manager can get the size of the display screen, determine whether there is a status bar, lock the screen, capture the screen, etc.
内容提供器用来存放和获取数据,并使这些数据可以被应用程序访问。所述数据可以包 括视频,图像,音频,拨打和接听的电话,浏览历史和书签,电话簿等。Content providers are used to store and retrieve data and make it accessible to applications. Said data may include video, images, audio, calls made and received, browsing history and bookmarks, phonebook, etc.
视图系统包括可视控件,例如显示文字的控件,显示图片的控件等。视图系统可用于构建应用程序。应用程序的显示界面可以由一个或多个视图组成的。例如,包括短信通知图标的显示界面,可以包括显示文字的视图以及显示图片的视图。视图系统可以提供超级终端应用的视图,例如组建超级终端的界面、发现活动的可信设备的界面等。The view system includes visual controls, such as controls for displaying text, controls for displaying pictures, and so on. The view system can be used to build applications. An application's display interface can consist of one or more views. For example, a display interface including a text message notification icon may include a view for displaying text and a view for displaying pictures. The view system can provide views of hyperterminal applications, such as an interface for building a hyperterminal, an interface for discovering active trusted devices, and the like.
显示管理器用于向内核层传输显示内容。The display manager is used to transfer display content to the kernel layer.
电话管理器用于提供电子设备100的通信功能。例如通话状态的管理(包括接通,挂断等)。The phone manager is used to provide communication functions of the electronic device 100 . For example, the management of call status (including connected, hung up, etc.).
资源管理器为应用程序提供各种资源,比如本地化字符串,图标,图片,布局文件,视频文件等等。The resource manager provides various resources for the application, such as localized strings, icons, pictures, layout files, video files, and so on.
通知管理器使应用程序可以在状态栏中显示通知信息,可以用于传达告知类型的消息,可以短暂停留后自动消失,无需用户交互。比如通知管理器被用于告知下载完成,消息提醒等。通知管理器还可以是以图表或者滚动条文本形式出现在系统顶部状态栏的通知,例如后台运行的应用程序的通知,还可以是以对话窗口形式出现在屏幕上的通知。例如在状态栏提示文本信息,发出提示音,电子设备振动,指示灯闪烁等。The notification manager enables the application to display notification information in the status bar, which can be used to convey notification-type messages, and can automatically disappear after a short stay without user interaction. For example, the notification manager is used to notify the download completion, message reminder, etc. The notification manager can also be a notification that appears on the top status bar of the system in the form of a chart or scroll bar text, such as a notification of an application running in the background, or a notification that appears on the screen in the form of a dialog window. For example, prompting text information in the status bar, issuing a prompt sound, vibrating the electronic device, and flashing the indicator light, etc.
Android Runtime包括核心库和虚拟机。Android runtime负责安卓系统的调度和管理。Android Runtime includes core library and virtual machine. The Android runtime is responsible for the scheduling and management of the Android system.
核心库包含两部分:一部分是java语言需要调用的功能函数,另一部分是安卓的核心库。The core library consists of two parts: one part is the function function that the java language needs to call, and the other part is the core library of Android.
应用程序层和应用程序框架层运行在虚拟机中。虚拟机将应用程序层和应用程序框架层的java文件执行为二进制文件。虚拟机用于执行对象生命周期的管理,堆栈管理,线程管理,安全和异常的管理,以及垃圾回收等功能。The application layer and the application framework layer run in virtual machines. The virtual machine executes the java files of the application program layer and the application program framework layer as binary files. The virtual machine is used to perform functions such as object life cycle management, stack management, thread management, security and exception management, and garbage collection.
系统库可以包括多个功能模块。例如:表面管理器(surface manager),媒体库(media libraries),三维图形处理库(例如:OpenGL ES),2D图形引擎(例如:SGL)等。A system library can include multiple function modules. For example: surface manager (surface manager), media library (media libraries), 3D graphics processing library (eg: OpenGL ES), 2D graphics engine (eg: SGL), etc.
表面管理器用于对显示子系统进行管理,并且为多个应用程序提供了2D和3D图层的融合。The surface manager is used to manage the display subsystem and provides the fusion of 2D and 3D layers for multiple applications.
媒体库支持多种常用的音频,视频格式回放和录制,以及静态图像文件等。媒体库可以支持多种音视频编码格式,例如:MPEG4,H.264,MP3,AAC,AMR,JPG,PNG等。The media library supports playback and recording of various commonly used audio and video formats, as well as still image files, etc. The media library can support a variety of audio and video encoding formats, such as: MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc.
三维图形处理库用于实现三维图形绘图,图像渲染,合成,和图层处理等。The 3D graphics processing library is used to implement 3D graphics drawing, image rendering, compositing, and layer processing, etc.
2D图形引擎是2D绘图的绘图引擎。2D graphics engine is a drawing engine for 2D drawing.
硬件抽象层HAL层为操作系统软件与硬件组件的接口层,其为上层软件和下层硬件之间的交互提供接口。HAL层将底层硬件抽象为包含相应硬件接口的软件,通过访问HAL层就可以实现对底层硬件设备的设置,例如可以在HAL层使能或禁用相关硬件组件。在一些实施例中,HAL层的核心架构由C++或者C中的至少一项构成。The hardware abstraction layer HAL layer is the interface layer between operating system software and hardware components, which provides an interface for the interaction between the upper layer software and the lower layer hardware. The HAL layer abstracts the underlying hardware into software that contains the corresponding hardware interface. By accessing the HAL layer, the underlying hardware device settings can be realized, for example, related hardware components can be enabled or disabled at the HAL layer. In some embodiments, the core architecture of the HAL layer is composed of at least one of C++ or C.
内核层是硬件和软件之间的层。内核层至少包含显示驱动,摄像头驱动,音频驱动,传感器驱动,触控芯片的驱动和输入(input)系统等。为了便于说明,图3b中,内核层以包括输入系统、触控芯片的驱动、显示驱动以及存储驱动为例进行示意。其中,显示驱动以及存储驱动可共同设置在驱动模块中。The kernel layer is the layer between hardware and software. The kernel layer includes at least a display driver, a camera driver, an audio driver, a sensor driver, a touch chip driver and an input system, etc. For the convenience of description, in FIG. 3 b , the kernel layer includes an input system, a driver of a touch chip, a display driver and a storage driver as examples. Wherein, the display driver and the storage driver can be jointly arranged in the driver module.
可以理解的是,本申请示意的结构并不构成对电子设备100的具体限定。在另一些实施例中,电子设备100可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。图示的部件可以以硬件,软件或软件和硬件的组合实现。It can be understood that the structure illustrated in this application does not constitute a specific limitation on the electronic device 100 . In other embodiments, the electronic device 100 may include more or fewer components than shown, or combine certain components, or separate certain components, or arrange different components. The illustrated components can be realized in hardware, software or a combination of software and hardware.
下面结合应用场景,介绍本申请中提供的一种用于标识设备的方法在显示界面上的实现形式。作为示例,用于标识设备的方法可以在例如超级终端应用中实现。应理解,该方法还可以在电子设备的其他应用软件中实现,或者在电子设备的系统程序中实现,本申请对此不做限制。The implementation form of a method for identifying a device provided in this application on a display interface is introduced below in combination with application scenarios. As an example, the method for identifying a device may be implemented in, for example, a HyperTerminal application. It should be understood that the method may also be implemented in other application software of the electronic device, or in a system program of the electronic device, which is not limited in the present application.
首先以电子设备100为智能手机为例,介绍超级终端应用在电子设备100上显示的示例性应用界面。First, taking the electronic device 100 as a smart phone as an example, an exemplary application interface displayed by the hyper terminal application on the electronic device 100 is introduced.
如图4a所示,图4a示出了电子设备100上用于陈列应用程序列表的示例性用户界面410。该用户界面410中包括位于用户界面上部的状态栏402以及多个应用图标404。As shown in FIG. 4a, FIG. 4a shows an exemplary user interface 410 on the electronic device 100 for presenting a list of application programs. The user interface 410 includes a status bar 402 and a plurality of application icons 404 on the upper part of the user interface.
状态栏402可包括:移动通信信号(又可称为蜂窝信号)的一个或多个信号强度指示符、无线保真(wireless fidelity,Wi-Fi)信号的一个或多个信号强度指示符、电池状态指示符、时间指示符。 Status bar 402 may include: one or more signal strength indicators for mobile communication signals (also may be referred to as cellular signals), one or more signal strength indicators for wireless fidelity (Wi-Fi) signals, battery Status indicator, time indicator.
显示界面410陈列了多个应用图标,例如包括云共享、邮箱、图库、设置等应用程序对应的应用图标。其中,用户界面410中还包括用来进入电子设备的控制中心界面的区域406,区域406可以被设在在显示界面410的顶部区域。响应于用户对该区域的操作,例如下滑操作,显示界面410可以切换到控制中心界面420,如图4b所示。在图4b所示的控制中心界面420中,示出了超级终端应用413的界面,由此可以启动超级终端应用。可选的,超级终端应用413的显示形式可以是一个应用图标,也可以是卡片、窗口、悬浮组件等等。The display interface 410 displays a plurality of application icons, for example, including application icons corresponding to application programs such as cloud sharing, mailbox, gallery, and settings. Wherein, the user interface 410 also includes an area 406 for entering the control center interface of the electronic device, and the area 406 may be set at the top area of the display interface 410 . In response to the user's operation on the area, such as a sliding operation, the display interface 410 may switch to the control center interface 420, as shown in FIG. 4b. In the control center interface 420 shown in FIG. 4b, an interface of the hyperterminal application 413 is shown, whereby the hyperterminal application can be started. Optionally, the display form of the hyperterminal application 413 may be an application icon, or may be a card, a window, a floating component, and the like.
如图4b所示,图4b示例性示出了一种超级终端应用的应用界面420。该应用界面420中包括快捷控制栏411、媒体应用412、超级终端应用413。快捷控制栏411包括用于控制电子设备的常用配置的图标,例如,无线局域网、蓝牙、移动数据、静音、自动旋转、亮度控制(自动亮度勾选栏)。媒体应用412包括例如视频应用、音乐应用等以及相关联的控件。As shown in FIG. 4b, FIG. 4b exemplarily shows an application interface 420 of a hyperterminal application. The application interface 420 includes a shortcut control bar 411 , a media application 412 , and a hyper terminal application 413 . The shortcut control bar 411 includes icons for controlling common configurations of electronic devices, such as wireless local area network, bluetooth, mobile data, mute, auto-rotate, and brightness control (auto-brightness check box). Media applications 412 include, for example, video applications, music applications, etc., and associated controls.
超级终端应用413的显示区域中陈列了一个或多个设备信息区414,每个设备信息区414对应于电子设备100的一个可信设备。例如,如图所示,超级终端413中列出了四个可信设备,包括智能开关、饮水机、智能摄像头、手表。作为示例,设备信息区414显示了设备名称、设备的状态、设备的位置、设备的控制键等信息,由此用户可以方便和直观地了解当前可用的设备的状态,并且通过电子设备100与其进行交互。One or more device information areas 414 are displayed in the display area of the HyperTerminal application 413 , and each device information area 414 corresponds to a trusted device of the electronic device 100 . For example, as shown in the figure, four trusted devices are listed in the hyperterminal 413, including a smart switch, a water dispenser, a smart camera, and a watch. As an example, the device information area 414 displays information such as the device name, the status of the device, the location of the device, and the control keys of the device, so that the user can easily and intuitively understand the status of the currently available device, and communicate with it through the electronic device 100. interact.
由于显示区域的有限,超级终端应用413不一定显示出电子设备100的所有可信设备,在这种情况下,可以通过点击更多设备控件415来以滚动方式显示更多的可信设备的设备操作区。Due to the limited display area, the hyperterminal application 413 does not necessarily display all trusted devices of the electronic device 100, in this case, more devices of trusted devices can be displayed in a scrolling manner by clicking the more device control 415 operating area.
在图4b所示的界面中,超级终端应用413中显示的设备包括当前处于活动状态的可信设备。根据本申请的实施例,电子设备100可以响应于接收到到可信设备的广播消息(例如,心跳消息)来发现活动的可信设备,并将所发现的活动可信设备呈现在控制中心界面410的超级终端应用413的显示区域中。备选地,如果超级终端应用413的显示区域没有被活动的设备完全填充,则还可以显示当前不活动的可信设备。活动的可信设备和不活动的可信设备可以用不同的显示方式来呈现,例如,活动的可信设备可以被显示为彩色图,而不活动的设备可以别显示为灰度图。In the interface shown in FIG. 4b, the devices displayed in the hyperterminal application 413 include trusted devices that are currently active. According to the embodiment of the present application, the electronic device 100 may discover active trusted devices in response to receiving a broadcast message (for example, a heartbeat message) of the trusted device, and present the discovered active trusted devices on the control center interface 410 in the display area of the hyper terminal application 413. Alternatively, if the display area of the hyperterminal application 413 is not completely filled by active devices, the currently inactive trusted devices may also be displayed. Active trusted devices and inactive trusted devices can be represented in different displays, for example, active trusted devices can be displayed as a color map, while inactive devices can be displayed as a grayscale map.
设备信息区414可以显示与该设备有关的业务数据。根据本公开的实施例,该业务数据不一定是通过电子设备100和该设备之间的连接来传输的,而且被携带在设备发出的广播消息中。例如,智能饮水机可以在其广播消息(例如,心跳信息)的有效载荷部分包括该饮水 机的当前剩余水量、温度等信息。这些信息是频繁变化的,因此不易被跟踪。通过这种方式,不需要额外地建立设备间的连接,电子设备100可以获取到例如活动可信设备的状态等业务数据。The device information area 414 can display service data related to the device. According to an embodiment of the present disclosure, the service data is not necessarily transmitted through the connection between the electronic device 100 and the device, and is carried in a broadcast message sent by the device. For example, a smart water dispenser may include information such as the current remaining water volume and temperature of the water dispenser in the payload portion of its broadcast message (for example, heartbeat information). This information changes frequently and therefore cannot be easily tracked. In this way, the electronic device 100 can obtain business data such as the state of active trusted devices without additionally establishing a connection between devices.
在图4b所示的界面中,超级终端应用413还包括用于建立电子设备100和活动的可信设备之间的连接的图标416。响应于用户点击图标416,电子设备100可以切换到图6a至6d所示的协同操作界面,实现超级终端的协同,下文将结合图6a至图6d、图7详细描述。In the interface shown in FIG. 4 b , the hyperterminal application 413 also includes an icon 416 for establishing a connection between the electronic device 100 and the active trusted device. In response to the user clicking the icon 416, the electronic device 100 can switch to the cooperative operation interface shown in FIGS. 6a to 6d to realize the collaboration of the hyperterminal, which will be described in detail below with reference to FIGS. 6a to 6d and FIG. 7 .
在图4b所示的界面中,超级终端应用413还包括用于发现可信设备以组建超级终端的图标417。响应于用户点击图标417,电子设备100可以切换到图4c所示的超级终端的组网界面430。将结合图5描述组建超级终端的过程。需要说明的是,作为示例,通过组建超级终端的方式来组建设备网络。应理解,超级终端应用仅为实现本申请实施例的示例性应用,因此还可以在其他应用软件或者系统软件中组建设备网络。此外,这里描述了用户手动操作电子设备100的方式来触发组建设备网络的过程,但是电子设备100也可以自发地触发设备设备的过程。In the interface shown in FIG. 4b, the hyperterminal application 413 also includes an icon 417 for discovering trusted devices to form a hyperterminal. In response to the user clicking the icon 417, the electronic device 100 may switch to the hyperterminal networking interface 430 shown in FIG. 4c. The process of building a HyperTerminal will be described with reference to FIG. 5 . It should be noted that, as an example, a device network is formed by forming a hyper terminal. It should be understood that the HyperTerminal application is only an exemplary application for realizing the embodiment of the present application, and therefore, a device network may also be established in other application software or system software. In addition, it is described here that the user manually operates the electronic device 100 to trigger the process of forming a device network, but the electronic device 100 may also trigger the process of establishing a device network spontaneously.
图5示出了根据本申请的一些实施例的设备之间以及用户和设备之间的交互的示意图。第一电子设备100呈现如图4b所述的控制中心界面,包括超级终端应用413。用户10希望发现更多的可信设备,例如第二电子设备101,与第一电子设备100组建超级终端。这里,第二电子设备101可以具有第一电子设备100类似的如图3所示的功能和结构。可选地,第二电子设备101可以具有比如图3所示的电子设备100的更少的功能和结构,例如,第一电子设备101是富设备,而第二电子设备102具有相对较小的计算资源和存储资源的轻量化设备。Fig. 5 shows a schematic diagram of interaction between devices and between a user and a device according to some embodiments of the present application. The first electronic device 100 presents the control center interface as shown in FIG. 4 b , including a hyper terminal application 413 . The user 10 wishes to find more trusted devices, such as the second electronic device 101 , to form a hyperterminal with the first electronic device 100 . Here, the second electronic device 101 may have similar functions and structures as the first electronic device 100 as shown in FIG. 3 . Optionally, the second electronic device 101 may have fewer functions and structures than the electronic device 100 shown in FIG. Lightweight devices for computing and storage resources.
首先,用户10期望电子设备100发现周围的电子设备,并查看这些电子设备的信息,以便选择是否要将这些电子设备加入到超级终端。根据本申请的实施例,用户10可以点击图标417来产生组网请求502。可选地,用户还可以通过语音命令来发出组网请求502。响应于此操作,第一电子设备100显示图4c所述的界面430。界面430可以包括与图4b所示的设备信息区414类似的设备信息区421,设备信息区421呈现第一电子设备100的当前处于活动状态的可信设备的信息。与此同时,第一电子设备100可以作为主设备(例如,蓝牙通信模式)来扫描特定频率上是否存在广播消息。Firstly, the user 10 expects the electronic device 100 to discover the surrounding electronic devices and check the information of these electronic devices, so as to choose whether to add these electronic devices to the HyperTerminal. According to the embodiment of the present application, the user 10 can click the icon 417 to generate a networking request 502 . Optionally, the user can also issue a networking request 502 through a voice command. In response to this operation, the first electronic device 100 displays the interface 430 described in FIG. 4c. The interface 430 may include a device information area 421 similar to the device information area 414 shown in FIG. 4 b , and the device information area 421 presents information of trusted devices of the first electronic device 100 that are currently active. At the same time, the first electronic device 100 may function as a master device (eg, Bluetooth communication mode) to scan whether there is a broadcast message on a specific frequency.
在一些实施例中,用户可以手动调整第二电子设备101到待发现模式。在待发现模式下,第二电子设备101可以在特定频段上发出广播消息504,使得第二电子设备101能够作为从设备被发现。该广播消息的地址可以是完全随机化的,并在广播消息的有效载荷部分携带一些设备型号信息等。该广播消息是无法被监视和跟踪的。In some embodiments, the user can manually adjust the second electronic device 101 to the discoverable mode. In the standby mode, the second electronic device 101 may send a broadcast message 504 on a specific frequency band, so that the second electronic device 101 can be discovered as a slave device. The address of the broadcast message may be completely randomized, and some device model information and the like may be carried in the payload part of the broadcast message. This broadcast message cannot be monitored and tracked.
然后,第一电子设备100可以在界面430上呈现506所发现的包括第二电子设备101的设备列表422。应理解,第二电子设备101只是被第一电子设备100发现,但是第一电子设备100尚不清楚其是否为可信设备,也没有建立与该第二电子设备101的连接,因此也无法交换各自的身份密钥。这里描述了通过扫描方式发现设备并且在超级终端应用界面上显示所发现的设备,应理解,还可以通过其他方式来发现和向用户呈现设备,本申请对此不做限制。例如,还可以从电子设备100的连接设置界面(例如,蓝牙连接设置界面)启用扫描和发现设备的过程。Then, the first electronic device 100 may present 506 the discovered device list 422 including the second electronic device 101 on the interface 430 . It should be understood that the second electronic device 101 is only discovered by the first electronic device 100, but the first electronic device 100 does not know whether it is a trusted device, and has not established a connection with the second electronic device 101, so it cannot exchange respective identity keys. It is described here that the device is discovered by scanning and the discovered device is displayed on the application interface of the hyper terminal. It should be understood that the device can also be discovered and presented to the user in other ways, which is not limited in this application. For example, the process of scanning and discovering devices can also be enabled from a connection setting interface (eg, a Bluetooth connection setting interface) of the electronic device 100 .
接下来,用户选择感兴趣的设备(例如,第二电子设备101)加入到超级终端。根据本 申请的实施例,需要对第二电子设备101进行认证,即,建立第一电子设备100和第二电子设备101之间的可信关系。Next, the user selects a device of interest (for example, the second electronic device 101) to join the HyperTerminal. According to the embodiment of the present application, it is necessary to authenticate the second electronic device 101, that is, to establish a trusted relationship between the first electronic device 100 and the second electronic device 101.
为此,作为示例,用户10可以在界面430上点击与第二电子设备101对应的添加图标423,请求508将第二电子设备101添加到超级终端的可信设备网络中。添加图标423可以触发针对电子设备101的认证过程。响应于此,第一电子设备100可以向第二电子设备101发送认证请求510,例如,使用广播消息504中的完全随机化地址进行广播。To this end, as an example, the user 10 may click on the add icon 423 corresponding to the second electronic device 101 on the interface 430 to request 508 to add the second electronic device 101 to the trusted device network of the HyperTerminal. Adding the icon 423 may trigger an authentication process for the electronic device 101 . In response thereto, the first electronic device 100 may send an authentication request 510 to the second electronic device 101 , eg, broadcast using the fully randomized address in the broadcast message 504 .
在一些实施例中,可以通过设备的账户信息来建立可信关系。为此,认证请求510可以包括第一电子设备100的账户信息,相应地,第二电子设备101可以根据第一迪电子设备100的账户信息向第一电子设备发送用于认证的信息512,例如,该信息指示指示第一电子设备100和第二电子设备101具有相同或相关联的账户。这里,相同或相关联的账户可以包括,例如,第一电子设备100和第二电子设备102上的账户均为相同的华为账户或其他服务商账户,或者第一电子设备100和第二电子设备101上的账户是不同的账户,但是关联到相同身份,例如关联到相同的手机号码、通信软件账户、支付软件账户等。为了保护第二电子设备101的隐私,第二电子设备101不需要向第一电子设备传输或广播其账户信息,而是由第一电子设备100向第二电子设备传输账户信息。在这种情况下,第二电子设备101只需要验证二者的账户信息是否相同或相关联,然后将验证结果作为认证信息510传输给第一电子设备。In some embodiments, the trusted relationship can be established through the device's account information. To this end, the authentication request 510 may include the account information of the first electronic device 100, and accordingly, the second electronic device 101 may send information 512 for authentication to the first electronic device according to the account information of the first electronic device 100, for example , the information indicates that the first electronic device 100 and the second electronic device 101 have the same or associated accounts. Here, the same or associated accounts may include, for example, the accounts on the first electronic device 100 and the second electronic device 102 are the same Huawei account or other service provider accounts, or the first electronic device 100 and the second electronic device The accounts on 101 are different accounts, but are associated with the same identity, for example, associated with the same mobile phone number, communication software account, payment software account, etc. In order to protect the privacy of the second electronic device 101, the second electronic device 101 does not need to transmit or broadcast its account information to the first electronic device, but the first electronic device 100 transmits the account information to the second electronic device. In this case, the second electronic device 101 only needs to verify whether the two account information are the same or related, and then transmit the verification result as authentication information 510 to the first electronic device.
附加地或备选地,第一电子设备100和第二电子设备101可以通过手动方式建立可信关系。可以通过例如参照图2a和图2b描述的方式来绑定第一电子设备100和第二电子设备101。在用户10操作第一电子设备100和第二电子设备101完成了例如PIN码输入、碰一碰、扫一扫等操作之后,第二电子设备101可以向第一电子设备100反馈包括绑定信息的认证信息512。由此,第一电子设备100确定其与第二电子设备101是否已经绑定,也就是说,二者彼此具有可信关系。在一些实施例中,绑定信息还可以指示第一电子设备100和第二电子设备101是通过何种方式绑定的,例如,PIN码、二维码、实体接触等。Additionally or alternatively, the first electronic device 100 and the second electronic device 101 may establish a trusted relationship manually. The first electronic device 100 and the second electronic device 101 may be bound, for example, in the manner described with reference to Fig. 2a and Fig. 2b. After the user 10 operates the first electronic device 100 and the second electronic device 101 to complete operations such as PIN code input, touch, scan, etc., the second electronic device 101 can feed back the binding information to the first electronic device 100 authentication information 512. Thus, the first electronic device 100 determines whether it has been bound with the second electronic device 101, that is, the two have a trusted relationship with each other. In some embodiments, the binding information may also indicate how the first electronic device 100 and the second electronic device 101 are bound, for example, a PIN code, a two-dimensional code, physical contact, and the like.
通过上述方式,第一电子设备100可以确定514第二电子设备101是其可信设备。这里描述了通过账号信号和绑定信息来确定可信关系,应理解,还可以通过其他方式来确定第二电子设备101是否为可信设备,本申请对此不做限制。Through the above manner, the first electronic device 100 may determine 514 that the second electronic device 101 is its trusted device. It is described here that the trusted relationship is determined through the account signal and binding information. It should be understood that other methods may also be used to determine whether the second electronic device 101 is a trusted device, which is not limited in this application.
接下来,超级终端所包括的设备之间可以共享各自的身份密钥。根据本申请的实施例,设备的身份密钥用于生成广播消息的随机化地址。由此其他设备能够根据该共享的身份密钥来标识广播消息的源设备。以下更详细地说明身份密钥及其交换过程。Next, the devices included in the HyperTerminal can share their respective identity keys. According to an embodiment of the present application, the identity key of the device is used to generate the randomized address of the broadcast message. Other devices are thus able to identify the source device of the broadcast message based on the shared identity key. The identity key and its exchange process are described in more detail below.
根据本申请的实施例,身份密钥是电子设备生成一个密码(例如,某个长度的字符串),并在一个时间段内保持该身份密钥不变。电子设备的身份密钥可以通过安全的通信连接分享给该电子设备的可信设备。相比于固定地址,电子设备可以使用身份密钥来生成变化的随机化地址作为广播消息的源地址,以此减少信息泄露的风险。According to the embodiment of the present application, the identity key is that the electronic device generates a password (for example, a character string of a certain length), and keeps the identity key unchanged within a period of time. The identity key of the electronic device can be shared with the trusted device of the electronic device through a secure communication connection. Compared with the fixed address, the electronic device can use the identity key to generate a variable randomized address as the source address of the broadcast message, so as to reduce the risk of information leakage.
例如,在蓝牙通信协议中,广播消息的地址由6个字节(48位)组成。电子设备可以使用变化的随机数和自身的身份密钥生成随机化地址,其中身份密钥可以是符合蓝牙通信协议的身份解析密钥。随机数可以在例如设备每次重新启动时或者在任何适合的时间重新生成。For example, in the Bluetooth communication protocol, the address of a broadcast message consists of 6 bytes (48 bits). The electronic device can generate a randomized address by using the changed random number and its own identity key, where the identity key can be an identity resolution key conforming to the Bluetooth communication protocol. The random number may be regenerated, for example, each time the device is rebooted, or at any suitable time.
作为示例,随机化地址可以由两部分组成,其中一部分为随机数部分,例如,高24位(最高有效位MSB),其中最高两位可以为指定的格式(例如二进制“10”),用于标识地址的类型。随机化地址还可以包括由随机数和身份密钥经过运算(例如,哈希运算)得到的值,例 如低24位部分。应理解,随机化地址的格式不限于此,As an example, a randomized address may consist of two parts, one of which is a random number part, e.g., the upper 24 bits (most significant bit MSB), wherein the upper two bits may be in a specified format (e.g., binary "10") for Identifies the type of address. The randomized address may also include a value obtained through operation (for example, hash operation) of the random number and the identity key, such as the lower 24 bits. It should be understood that the format of the randomized address is not limited thereto,
接收到广播消息的对端设备扫描到这一类型的地址之后,可以使用该设备拥有的可信设备集合的身份密钥来验证该随机化地址。也就是说,设备使用随机化地址中的高位的随机数和依次从可信设备集合中获取的身份密钥进行相同的哈希运算,将运算的结果与低位24位进行比较。如果二者匹配,对端设备就可以识别出广播消息的源设备。以此方式,无论设备以何种方式通过改变其随机数来改变其随机化地址,只有持有身份密钥的对端设备(即,对端设备和该设备彼此具有可信关系)才能够识别该设备。如果可信设备集合中的所有身份密钥都无法匹配随机化地址,则无法识别设备。After the peer device receiving the broadcast message scans this type of address, it can use the identity key of the trusted device set owned by the device to verify the randomized address. That is to say, the device uses the high-order random number in the randomized address and the identity key sequentially obtained from the trusted device set to perform the same hash operation, and compares the operation result with the low-order 24 bits. If the two match, the peer device can identify the source device of the broadcast message. In this way, no matter how a device changes its randomized address by changing its nonce, only the peer device holding the identity key (i.e., the peer device and the device have a trusted relationship with each other) can identify the device. If none of the identity keys in the trusted device set match the randomized address, the device cannot be identified.
以上描述了从身份密钥生成随机化地址的示例实现方式。应理解,还可以与此不同的其他方式从身份密钥生成随机化地址。例如,还可以使用其他方式从随机数和身份密钥得到用于匹配的随机化地址的另一部分,而不限于哈希运算。An example implementation of generating a randomized address from an identity key is described above. It should be understood that the randomized address can also be generated from the identity key in other ways than this. For example, another part of the randomized address for matching can also be obtained from the random number and the identity key in other ways, not limited to hashing.
继续参考图5,描述身份密钥的交换过程。在第一电子设备100和第二电子设备101的可信关系被确定之后,第一电子设备100建立与第二电子设备101的安全连接516。然后,第一电子设备100可以经由安全连接向第二电子设备101发送第一电子设备的身份密钥517,并且从第二电子设备101接收第二电子设备101的身份密钥518。Continuing to refer to FIG. 5 , the exchange process of the identity key is described. After the trusted relationship between the first electronic device 100 and the second electronic device 101 is determined, the first electronic device 100 establishes a secure connection 516 with the second electronic device 101 . Then, the first electronic device 100 may send the identity key 517 of the first electronic device to the second electronic device 101 via the secure connection, and receive the identity key 518 of the second electronic device 101 from the second electronic device 101 .
相应地,第一电子设备100将接收到的第二电子设备101的身份密钥存储520到其可信设备集合之中。第二电子设备101也将接收到的第一电子设备100的身份密钥存储522在其可信设备集合之中。Correspondingly, the first electronic device 100 stores 520 the received identity key of the second electronic device 101 in its trusted device set. The second electronic device 101 also stores 522 the received identity key of the first electronic device 100 in its trusted device set.
需要说明的是,在第二电子设备101是轻量化设备、因此仅具有有限的存储空间和计算能力的情况下(例如,智能插座、智能饮水机等),第一电子设备100可以不向第二电子设备101发送其身份密钥,第二电子设备101也不存储第一电子设备100的身份密钥。It should be noted that, in the case that the second electronic device 101 is a light-weight device and thus has only limited storage space and computing power (for example, a smart socket, a smart water dispenser, etc.), the first electronic device 100 may not send the second electronic device 101 The second electronic device 101 sends its identity key, and the second electronic device 101 does not store the identity key of the first electronic device 100 either.
可选地,在第一电子设备100和第二电子设备101交换彼此的身份密钥之后,该身份密钥还可以在超级终端的设备网络中被转发、进一步共享。Optionally, after the first electronic device 100 and the second electronic device 101 exchange each other's identity keys, the identity keys may also be forwarded and further shared in the device network of the hyperterminal.
例如,第一电子设备100还可以在超级终端内传播新加入该超级终端的第二电子设备101的身份密钥。在一些实施例中,如上所述,第一电子设备100具有可信设备集合,第一电子设备100可以向可信设备集合中的一个可信设备发送第二电子设备101的身份密钥。例如,第二电子设备100可以向具有较多处理能力和存储空间的富设备,例如,如图4c所示的已连接的手表424发送第二电子设备101的身份密钥。For example, the first electronic device 100 may also spread the identity key of the second electronic device 101 newly added to the hyper terminal in the hyper terminal. In some embodiments, as mentioned above, the first electronic device 100 has a set of trusted devices, and the first electronic device 100 may send the identity key of the second electronic device 101 to a trusted device in the set of trusted devices. For example, the second electronic device 100 may send the identity key of the second electronic device 101 to a rich device with more processing capability and storage space, for example, a connected watch 424 as shown in FIG. 4c.
应理解,第一电子设备100和手表424具有可信关系,当第一电子设备100和第二电子设备101已经被确定为具有可信关系的设备时,手表424和第二电子设备101也具有可信关系。类似地,第一电子设备100还可以向第二电子设备101发送其可信设备集合中的可信设备的身份密钥,使得第二电子设备101不必额外在与这些设备进行认证和交换身份密钥。因此,通过向其他超级终端,也就是可信设备网络中的其他可信设备转发身份密钥,免去了设备之间必须在两两配对或验证可信关系之后建立安全连接来交换身份密钥的操作,加快了可信设备网络的组建过程。It should be understood that the first electronic device 100 and the watch 424 have a trusted relationship, and when the first electronic device 100 and the second electronic device 101 have been determined to have a trusted relationship, the watch 424 and the second electronic device 101 also have trusted relationship. Similarly, the first electronic device 100 may also send the identity keys of trusted devices in its trusted device set to the second electronic device 101, so that the second electronic device 101 does not need to perform additional authentication and exchange identity keys with these devices. key. Therefore, by forwarding the identity key to other hyperterminals, that is, other trusted devices in the trusted device network, it is unnecessary to establish a secure connection between the devices to exchange identity keys after pairing or verifying the trusted relationship. The operation speeds up the process of establishing a trusted device network.
由此完成了将第二电子设备101加入到超级终端,形成可信设备网络的过程。Thus, the process of adding the second electronic device 101 to the HyperTerminal to form a trusted device network is completed.
根据本申请的实施例,第二电子设备101还可以退出超级终端。可以通过如下方式退出网络。According to the embodiment of the present application, the second electronic device 101 can also log out of the HyperTerminal. You can log out of the network in the following ways.
例如,在第一电子设备100的用户10具有管理员权限的情况下,可以在电子设备100上 操作,以操作第二电子设备101退出超级终端。备选地,用户10还可以操作第二电子设备101,例如使第二电子设备101恢复到出厂设置。恢复出厂设置意味着第二电子设备101将生成新的身份密钥,其需要重新进行认证以加入超级终端。备选地,当第二电子设备101登出原用户账号(即,与第一电子设备相同或关联的账号)时,第二电子设备101也可以生成新的身份密钥,新的身份密钥可以用于组建新的超级终端,或重新进行认证。备选地,第二电子设备101还可以被手动解除与其可信设备的绑定关系。For example, in the case that the user 10 of the first electronic device 100 has administrator authority, he can operate on the electronic device 100 to operate the second electronic device 101 to exit the HyperTerminal. Alternatively, the user 10 can also operate the second electronic device 101, for example, restore the second electronic device 101 to factory settings. Restoring factory settings means that the second electronic device 101 will generate a new identity key, which needs to be re-authenticated to join the HyperTerminal. Alternatively, when the second electronic device 101 logs out of the original user account (that is, an account that is the same as or associated with the first electronic device), the second electronic device 101 can also generate a new identity key, and the new identity key It can be used to build a new HyperTerminal or re-authenticate. Alternatively, the second electronic device 101 may also be manually unbound from the trusted device.
在这些情况下,第二电子设备101可以向其可信设备,例如第一电子设备100发送退出可信关系的消息。备选地,第二电子设备101可以向超级终端中的可信模块(例如账户中心、鉴权中心)发送其退出可信关系的消息,继而由可信模块向超级终端中的设备下发该消息。第一电子设备100可以从可信模块接收到指示第二电子设备101退出超级终端的消息。由此,第一电子设备100可以从其可信设备集合中删除该第二电子设备101的身份密钥。In these cases, the second electronic device 101 may send a message to its trusted device, such as the first electronic device 100, to exit the trusted relationship. Alternatively, the second electronic device 101 may send a message of quitting the trusted relationship to a trusted module (such as an account center, an authentication center) in the hyperterminal, and then the trusted module sends the message to the device in the hyperterminal. information. The first electronic device 100 may receive a message from the trusted module indicating that the second electronic device 101 exits the HyperTerminal. Thus, the first electronic device 100 can delete the identity key of the second electronic device 101 from its set of trusted devices.
需要说明的是,第二电子设备101下线时,例如关机,其身份密钥可以不被删除,以便于设备的重新快速上线。当电子设备101在线上时,可以定期发送心跳广播消息,以便于超级终端中与其具有可信关系(例如,持有其身份密钥)的设备识别其处于活动状态。It should be noted that when the second electronic device 101 goes offline, for example, it is turned off, its identity key may not be deleted, so as to facilitate the quick re-online of the device. When the electronic device 101 is online, it can periodically send a heartbeat broadcast message, so that devices in the hyperterminal that have a trusted relationship with it (for example, hold its identity key) can identify that it is in an active state.
通过这种方式,第一电子设备100可以与经认证为可信设备的其他设备交换各自的身份密钥,以组建可信设备网络,在可信设备网络中,设备之间将能够通过广播消息的地址信息来进行设备标识,而不需要在广播消息中携带标识信息,避免了设备被监视和跟踪。In this way, the first electronic device 100 can exchange their identity keys with other devices certified as trusted devices to form a trusted device network. In the trusted device network, devices will be able to broadcast messages The address information of the device is used to identify the device without carrying the identification information in the broadcast message, which prevents the device from being monitored and tracked.
以上参照示例性的用户界面和交互图描述了超级终端组网的过程。应该理解的是,图4a至图4c分别对应的UI界面中的各个元素(例如,按钮、图标、文字等)的位置、名称和形状等不是固定不变的,可以根据需求进行自由组合或设计。超级终端组网的过程可以通过和图5所示的交互图不同的方式来实现,例如,可以包括更多或更少的动作,一些动作可以通过与图5所示的顺序不同的方式来执行,或者可以并行地执行,以实现如上描述的超级终端应用各种功能。The above describes the hyperterminal networking process with reference to exemplary user interfaces and interaction diagrams. It should be understood that the positions, names, and shapes of the elements (such as buttons, icons, text, etc.) in the UI interfaces corresponding to Figures 4a to 4c are not fixed, and can be freely combined or designed according to requirements . The process of hyperterminal networking can be implemented in a manner different from the interaction diagram shown in Figure 5, for example, it can include more or fewer actions, and some actions can be performed in a manner different from the order shown in Figure 5 , or may be executed in parallel to realize various functions of the HyperTerminal application as described above.
下文参照图6a至6d、图7描述超级终端中的第一电子设备100识别活动的可信设备的过程。图6a至图6d是本申请的实施例提供的另一组应用界面示意图。图7示出了根据本申请的一些实施例的设备之间的交互的示意图。The process of identifying an active trusted device by the first electronic device 100 in the HyperTerminal is described below with reference to FIGS. 6 a to 6 d and FIG. 7 . 6a to 6d are schematic diagrams of another set of application interfaces provided by the embodiments of the present application. Fig. 7 shows a schematic diagram of interaction between devices according to some embodiments of the present application.
如上所述,响应于用户10在第一电子设备100的右上角区域406执行下滑操作,第一电子设备100显示如图6a所示的包括超级终端应用413的控制中心界面420。超级终端应用413包括一个或多个可信设备的设备信息区414。As mentioned above, in response to the user 10 performing a swipe operation on the upper right corner area 406 of the first electronic device 100, the first electronic device 100 displays the control center interface 420 including the HyperTerminal application 413 as shown in FIG. 6a. The hyperterminal application 413 includes a device information area 414 for one or more trusted devices.
根据本申请的实施例,第一电子设备100可以响应于用户10的查询请求702来向用户10提供与活动的可信设备有关的信息。在一些实施例中,响应于切换到控制中心界面420的用户操作,生成查询请求702,以使第一电子设备100查询活动的可信设备,由此在超级终端应用413的设备信息区414呈现一个或多个可信设备的当前状态及其控制元件。According to an embodiment of the present application, the first electronic device 100 may provide the user 10 with information related to active trusted devices in response to the query request 702 of the user 10 . In some embodiments, in response to the user operation of switching to the control center interface 420, a query request 702 is generated, so that the first electronic device 100 can query active trusted devices, thereby presenting in the device information area 414 of the hyperterminal application 413 The current state of one or more trusted devices and their control elements.
备选地,当切换到控制中心界面420时,第一电子设备100可以不显示设备信息区414,而是在超级终端应用显示区域中列出可信设备的列表,例如,仅显示设备名称和对应的图标,以节省显示空间;然后,当用户希望查询活动的可信设备时,用户在第一电子设备100上执行特定操作,产生查询请求702,例如,通过点击图标416来触发第一电子设备100查询活动的可信设备。备选地,第一电子设备100可以在后台定期查询活动的可信设备,而不需要 用户交互。Alternatively, when switching to the control center interface 420, the first electronic device 100 may not display the device information area 414, but list a list of trusted devices in the hyperterminal application display area, for example, only display the device name and corresponding icons to save display space; then, when the user wishes to inquire about active trusted devices, the user performs a specific operation on the first electronic device 100 to generate a query request 702, for example, by clicking the icon 416 to trigger the first electronic device 100. The device 100 queries active trusted devices. Alternatively, the first electronic device 100 may periodically query active trusted devices in the background without user interaction.
如上所述,物联网中的设备,例如第二电子设备101可以在上线时定期发送心跳广播消息704。第一电子设备100可以基于查询请求702或定期地通过扫描方式接收到第二电子设备101的广播消息704。As mentioned above, a device in the Internet of Things, such as the second electronic device 101, can periodically send a heartbeat broadcast message 704 when going online. The first electronic device 100 may receive the broadcast message 704 of the second electronic device 101 based on the query request 702 or periodically through scanning.
响应于接收到的来自第二电子设备101的广播消息704,第一电子设备100基于其持有的可信设备集合的身份密钥和该广播消息704的源地址,确定第二电子设备101是否为其可信设备。In response to receiving the broadcast message 704 from the second electronic device 101, the first electronic device 100 determines whether the second electronic device 101 is as a trusted device.
在一些实施例中,第一电子设备100可以根据广播消息704的源地址的地址类型,例如48位地址的最高两位(例如二进制“10”)确定该广播消息704的源地址是使用第二电子设备101的身份密钥生成的随机化地址。基于此,第一电子设备100可以以遍历方式,使用可信设备集合的身份密钥来验证该源地址。如果某一个可信设备的身份密钥能够使广播消息的源地址被验证通过,则第一电子设备100可以将第二电子设备101确定为活动的可信设备。换句话说,与该身份密钥对应的可信设备即为该第二电子设备,由此识别出该第二电子设备101作为活动的可信设备。In some embodiments, the first electronic device 100 may determine that the source address of the broadcast message 704 is the second A randomized address generated by the identity key of the electronic device 101 . Based on this, the first electronic device 100 may use the identity key of the trusted device set to verify the source address in a traversal manner. If the identity key of a certain trusted device enables the source address of the broadcast message to be verified, the first electronic device 100 may determine the second electronic device 101 as an active trusted device. In other words, the trusted device corresponding to the identity key is the second electronic device, thereby identifying the second electronic device 101 as an active trusted device.
验证广播消息的源地址的方式可以对应于第二电子设备101生成随机化的源地址的方式。在一些实施例中,第一电子设备100基于来自可信设备集合中的第一身份密钥和随机化地址的一部分(例如高位24位部分包含的随机数)来生成哈希值。然后,第一电子设备100将该哈希值与随机化地址的另一部分(例如,低位24位)进行比较。如果生成的哈希值和随机化地址的另一部分匹配,则广播消息通过验证。这表明用来计算哈希值的第一身份密钥是第二电子设备101的身份密钥。The manner of verifying the source address of the broadcast message may correspond to the manner in which the second electronic device 101 generates the randomized source address. In some embodiments, the first electronic device 100 generates a hash value based on the first identity key from the set of trusted devices and a part of the randomized address (for example, a random number included in the upper 24 bits). Then, the first electronic device 100 compares the hash value with another part (for example, lower 24 bits) of the randomized address. If the generated hash matches another part of the randomized address, the broadcast message is verified. This indicates that the first identity key used to calculate the hash value is the identity key of the second electronic device 101 .
如果第一电子设备100在遍历完可信设备集合中的所有身份密钥之后,仍然不能找到第二电子设备101的身份密钥,则表明该第二电子设备101不是第一电子设备的可信设备。第一电子设备100可以继续扫描,发现下一条广播消息,并重复上述过程,从而获取到第一电子设备100当前所有的活动的可信设备。If the first electronic device 100 still cannot find the identity key of the second electronic device 101 after traversing all the identity keys in the trusted device set, it indicates that the second electronic device 101 is not a trusted member of the first electronic device. equipment. The first electronic device 100 may continue to scan to find the next broadcast message, and repeat the above process, so as to obtain all currently active trusted devices of the first electronic device 100 .
响应于第二电子设备101被确定为第一电子设备100的可信设备,即,活动的可信设备,第一电子设备100可以提供708该设备的信息。在一些实施例中,可以以列表或图形化方式提供设备的信息。由此,第一电子设备100发现并标识超级终端中处于活动状态的其他设备。In response to the second electronic device 101 being determined to be a trusted device of the first electronic device 100, ie, an active trusted device, the first electronic device 100 may provide 708 information of the device. In some embodiments, device information may be provided in a list or graphical manner. Thus, the first electronic device 100 discovers and identifies other active devices in the HyperTerminal.
提供设备信息的具体方式可以是:当用户10进行操作进入界面420并且第一电子设备100被触发查询活动的可信设备时,可以在用户界面420的超级终端应用413中呈现与活动的可信设备的信息414。The specific way of providing device information may be: when the user 10 performs an operation to enter the interface 420 and the first electronic device 100 is triggered to inquire about the active trusted device, the trusted device related to the active device may be presented in the hyperterminal application 413 of the user interface 420. Information 414 of the device.
提供设备信息的具体方式还可以是:当第一电子设备101响应于用户点击图标416进入如图6b所示的协同操作界面440,并且第一电子设备100被触发查询活动的可信设备时,可以在用户界面440中显示与活动的可信设备有关的信息。在图6b所示的示例性用户界面440包括位于界面中心的对应于第一电子设备110的图标442以及围绕图标442布置的至少一个活动的可信设备的图标444。在一些实施例中,被确定为活动的可信设备的电子设备的信息以这种图形化、或者带有动画效果的方式被提供。The specific way of providing device information may also be: when the first electronic device 101 enters the cooperative operation interface 440 shown in FIG. Information related to active trusted devices may be displayed in user interface 440 . The exemplary user interface 440 shown in FIG. 6 b includes an icon 442 corresponding to the first electronic device 110 at the center of the interface and at least one active trusted device icon 444 arranged around the icon 442 . In some embodiments, the information of electronic devices determined to be active trusted devices is provided in such a graphical or animated manner.
此外,设备信息还可以被传输到不同于第一电子设备100的其他电子设备,例如,与电子设备100进行进行协同任务的设备,例如,智能电视。In addition, the device information may also be transmitted to other electronic devices other than the first electronic device 100, for example, a device that performs a collaborative task with the electronic device 100, for example, a smart TV.
在第二电子设备101被第一电子设备标识和显示给用户10之后,用户10可以对第二电 子设备的图标444进行操作710来发起任务协同。如图6c所示,用户10可以选择对应于智能饮水机的图标444,将其拖曳到第一电子设备100的图标442的附近,以这种直观的操作方式建立智能饮水机和第一电子设备100之间的任务协同。例如,响应于用户10在界面450上的操作710,第一电子设备100可以建立712与对应的第二电子设备101的连接。例如,如果第二电子设备101是智能饮水机,则在连接建立之后,第一电子设备100可以经由所建立的连接向智能饮水机发出控制命令,例如,关机、加热等。如果第二电子设备101是智能音箱,则第一电子设备100可以经建立的连接向智能音箱传输音频数据。本申请的实施例不限制第二电子设备的类型和相关联的业务。After the second electronic device 101 is identified and displayed to the user 10 by the first electronic device, the user 10 may operate 710 the icon 444 of the second electronic device to initiate task collaboration. As shown in Figure 6c, the user 10 can select the icon 444 corresponding to the smart water dispenser, drag it to the vicinity of the icon 442 of the first electronic device 100, and establish the smart water dispenser and the first electronic device in this intuitive operation mode. Synergy between 100's of missions. For example, in response to an operation 710 of the user 10 on the interface 450 , the first electronic device 100 may establish 712 a connection with the corresponding second electronic device 101 . For example, if the second electronic device 101 is a smart water dispenser, after the connection is established, the first electronic device 100 can send control commands to the smart water dispenser via the established connection, such as shutting down, heating, etc. If the second electronic device 101 is a smart speaker, the first electronic device 100 may transmit audio data to the smart speaker through the established connection. The embodiment of the present application does not limit the type and associated service of the second electronic device.
通过这种方式,当第一电子设备100和第二电子设备101具有可信关系时,第一电子设备能够通过第二设备的广播系统的地址信息来标识处于活动状态的第二电子设备。因此,第二电子设备不需要广播其标识信息就能够被标识,减少了第二电子设备被监视和跟踪的风险。In this way, when the first electronic device 100 and the second electronic device 101 have a trusted relationship, the first electronic device can identify the second electronic device in an active state through the address information of the broadcast system of the second device. Therefore, the second electronic device can be identified without broadcasting its identification information, which reduces the risk of the second electronic device being monitored and tracked.
根据本申请的实施例,第一电子设备100可以对超级终端进行管理,例如,在可信设备集合中添加和删除目标设备的身份密钥。上文结合4a至4c和图5描述了在组建设备网络过程中添加身份密钥。在确定可信设备集合中的目标电子设备退出与第一电子设备100的可信关系的情况下,电子设备100还可以从可信设备集合中删除该目标电子设备的身份密钥。目标电子设备可以是第二电子设备101或者其他活动的可信设备。以下描述用户10在超级终端应用中删除身份密钥的示例性操作。应理解,删除身份密钥的操作还可以在其他应用或系统软件中实现,本申请不做限制。According to the embodiment of the present application, the first electronic device 100 can manage the hyperterminal, for example, add and delete the identity key of the target device in the set of trusted devices. Adding an identity key in the process of building a device network has been described above with reference to 4a to 4c and FIG. 5 . When it is determined that the target electronic device in the trusted device set quits the trust relationship with the first electronic device 100, the electronic device 100 may also delete the identity key of the target electronic device from the trusted device set. The target electronic device may be the second electronic device 101 or other active trusted devices. The following describes an exemplary operation for the user 10 to delete the identity key in the hyper terminal application. It should be understood that the operation of deleting the identity key can also be implemented in other applications or system software, which is not limited in this application.
在一些实施例中,用户10还可以在图6b所示的任务协同界面440操作,以解除一个或多个活动的电子设备的可信关系。如图6d所示,界面440的下部包括图标446,用户10将要解除可信关系的目标电子设备的图标448拖曳到与图标446重叠,以这种直观的操作方式解除可信关系。相应地,第一电子设备100从其可信设备集合中删除该目标电子设备448的身份密钥。In some embodiments, the user 10 can also operate on the task collaboration interface 440 shown in FIG. 6b to release the trusted relationship of one or more active electronic devices. As shown in FIG. 6 d , the lower part of the interface 440 includes an icon 446 , and the user 10 drags the icon 448 of the target electronic device to overlap with the icon 446 to release the trusted relationship in an intuitive operation manner. Correspondingly, the first electronic device 100 deletes the identity key of the target electronic device 448 from its set of trusted devices.
在一些实施例中,第一电子设备100可以通过接收到目标电子设备退出可信关系的消息来确定要退出可信关系的目标电子设备。例如,如果目标电子设备恢复到出厂设置,或者登出原用户账号(即,与第一电子设备100相同或关联的账号)、或者手动解除与任何可信设备的绑定关系,第二电子设备101可以向其可信设备或超级终端中的可信模块(例如账户中心、鉴权中心)发送退出可信关系的消息,并且生成新的身份密钥,新的身份密钥可以用于组建新的超级终端。已经退出超级终端的电子设备需要重新认证才能再次加入到超级终端的可信关系网络。由此,第一电子设备100可以接收到指示目标电子设备退出超级终端的消息,并且从其可信设备集合中删除目标电子设备的身份密钥。In some embodiments, the first electronic device 100 may determine the target electronic device to exit the trusted relationship by receiving a message that the target electronic device exits the trusted relationship. For example, if the target electronic device is restored to factory settings, or logs out of the original user account (that is, an account that is the same as or associated with the first electronic device 100), or manually releases the binding relationship with any trusted device, the second electronic device 101 can send a message of exiting the trusted relationship to its trusted device or trusted module (such as account center, authentication center) in the hyper terminal, and generate a new identity key, which can be used to form a new identity key. of HyperTerminal. Electronic devices that have exited the hyperterminal need to be re-authenticated before they can join the trusted relationship network of the hyperterminal again. Thus, the first electronic device 100 may receive the message indicating that the target electronic device exits the HyperTerminal, and delete the identity key of the target electronic device from its trusted device set.
应该理解的是,图6a至图6d分别对应的UI界面中的各个元素(例如,按钮、图标、文字等)的位置、名称和形状等不是固定不变的,可以根据需求进行自由组合或设计。用户可以通过与图6a至6d所示界面不同的方式来与电子设备进行交互。识别电子设备的过程可以通过和图7所示的交互图不同的方式来实现,例如,可以包括更多或更少的动作,一些动作可以通过与图5所示的顺序不同的方式来执行,或者可以并行地执行,以实现如上描述的超级终端应用各种功能。It should be understood that the positions, names, and shapes of the elements (such as buttons, icons, text, etc.) in the UI interfaces corresponding to FIGS. 6a to 6d are not fixed, and can be freely combined or designed according to requirements. . The user may interact with the electronic device in different ways than the interface shown in Figures 6a to 6d. The process of identifying an electronic device may be implemented in a manner different from the interaction diagram shown in FIG. 7 , for example, may include more or fewer actions, and some actions may be performed in a manner different from the order shown in FIG. 5 , Or they can be executed in parallel to realize various functions of the HyperTerminal application as described above.
基于上述应用场景,下面结合示例介绍根据本申请的实施例的通信方法800的示意流程 图。方法800的流程图中涉及的设备包括第一设备和第二设备,第一设备和第二设备均安装有超级终端应用。参照图4至图7的描述,第一设备可以是上述第一电子设备100,第二设备可以是上述第二电子设备101。此外,第一设备和第二设备也可以是上述电子设备200、电子设备201、电子设备202、电子设备203、电子设备204中的任意类型的设备。Based on the above application scenarios, a schematic flowchart of a communication method 800 according to an embodiment of the present application is introduced below with reference to examples. The devices involved in the flow chart of the method 800 include a first device and a second device, and both the first device and the second device are installed with a HyperTerminal application. Referring to the description of FIGS. 4 to 7 , the first device may be the above-mentioned first electronic device 100 , and the second device may be the above-mentioned second electronic device 101 . In addition, the first device and the second device may also be any type of devices in the electronic device 200 , the electronic device 201 , the electronic device 202 , the electronic device 203 , and the electronic device 204 .
第一设备可以是具有蓝牙通信能力的电子设备,其通过扫描附近设备发出的广播消息来发现第二设备。第二设备也可以是具有蓝牙通信能力的电子设备,其可以被触发而发出广播消息,以期望被其他设备发现。当第一设备发现第二设备的存在时,第一设备可以向第二设备发出认证请求,以用于从第二设备接收反馈的认证信息,并且对第二设备进行认证。The first device may be an electronic device with bluetooth communication capability, which discovers the second device by scanning broadcast messages sent by nearby devices. The second device may also be an electronic device with bluetooth communication capability, which may be triggered to send a broadcast message, hoping to be discovered by other devices. When the first device discovers the existence of the second device, the first device may send an authentication request to the second device, so as to receive feedback authentication information from the second device and authenticate the second device.
在框810,第一设备基于从第二设备接收到的认证信息,确定第二设备为第一设备的可信设备。At block 810, the first device determines that the second device is an authentic device of the first device based on the authentication information received from the second device.
在一些实施例中,第一设备向第二设备发送的认证请求可以包括第一设备的账户信息,相应地,第一设备从第二设备接收针对第一设备的账户信息的用于认证的信息。该认证信息可以指示第一设备和所述第二设备具有相同或相关联的账户,确定所述第二设备为可信设备。也就是说,如果第一设备和第二设备具有相同或相关联账户信息,那么它们是彼此可信的,由此可以方便快捷地组建可信设备网络,形成超级终端。In some embodiments, the authentication request sent by the first device to the second device may include the account information of the first device, and accordingly, the first device receives information for authentication of the account information of the first device from the second device . The authentication information may indicate that the first device and the second device have the same or associated accounts, and it is determined that the second device is a trusted device. That is to say, if the first device and the second device have the same or associated account information, they are mutually trustworthy, so that a network of trusted devices can be conveniently and quickly formed to form a hyperterminal.
在一些实施例中,第一设备向第二设备发送的认证请求是绑定请求,绑定方式可以例如扫描二维码、输入PIN码、或者实体接触。相应地,第二设备反馈给第一设备的认证信息中可以包括绑定信息。第一设备可以基于绑定信息来确定所述第一设备和所述第二设备是否已被绑定。如果确定第一设备和第二设备已被绑定,第一设备可以认为第二设备是第一设备的可信设备。因此,当设备被绑定时,这些设备被认为是彼此可信的,从而可以提供了一种灵活的、适用性广的可信设备网络的组网方式。In some embodiments, the authentication request sent by the first device to the second device is a binding request, and the binding method may be, for example, scanning a QR code, inputting a PIN code, or physical contact. Correspondingly, the authentication information fed back by the second device to the first device may include binding information. The first device may determine whether the first device and the second device have been bound based on the binding information. If it is determined that the first device and the second device have been bound, the first device may consider the second device to be a trusted device of the first device. Therefore, when devices are bound, these devices are considered to be trusted to each other, thereby providing a flexible and widely applicable trusted device network networking method.
在框820,第一设备向第二设备发送第一设备的身份密钥,并且在框830,第一设备还可以从第二设备接收第二设备的身份密钥。也就是说,彼此可信的设备交换各自的身份密钥。根据本申请的实施例,身份密钥用于生成该设备的广播消息的源地址。此外,在框840中,第一设备还将第二设备的身份密钥添加到第一设备的可信设备集合的身份密钥中。因为第二设备使其身份密钥来生成其广播消息的源地址,所以第一设备可以使用第二设备的身份密钥来验证第二设备的广播消息的源地址。由此,第一设备能够识别第二设备。At block 820, the first device sends the identity key of the first device to the second device, and at block 830, the first device may also receive the identity key of the second device from the second device. That is, devices that are trusted with each other exchange their identity keys. According to the embodiment of the present application, the identity key is used to generate the source address of the device's broadcast message. Additionally, in block 840, the first device also adds the identity key of the second device to the identity keys of the first device's set of trusted devices. Since the second device uses its identity key to generate the source address of its broadcast message, the first device can use the second device's identity key to verify the source address of the second device's broadcast message. Thereby, the first device can recognize the second device.
通过这种方式,第一设备可以与经认证为可信设备的其他设备(第二设备)交换各自的身份密钥,以组建可信设备网络,在可信设备网络中,设备之间将能够通过广播消息的地址信息来进行设备标识。第二设备不需要在广播消息中携带标识信息就能够被第一设备识别,避免了被监视和跟踪。In this way, the first device can exchange their identity keys with other devices (second devices) certified as trusted devices to form a trusted device network. In the trusted device network, devices will be able to The device identification is performed through the address information of the broadcast message. The second device can be identified by the first device without carrying identification information in the broadcast message, avoiding being monitored and tracked.
在一些实施例中,在接收到第二设备的身份密钥之后,第一设备还可以向其可信设备集合中的一个或多个可信设备发送第二设备的身份密钥。第一设备还可以向第二设备发送可信设备集合中的一个或多个可信设备的身份密钥。以此方式,在超级终端的可信设备网络中,多个彼此可信的设备的身份密钥可以被快速传播和分享,加快了组网速度并且节省了用户的操作。In some embodiments, after receiving the identity key of the second device, the first device may also send the identity key of the second device to one or more trusted devices in its trusted device set. The first device may also send the identity keys of one or more trusted devices in the trusted device set to the second device. In this way, in the trusted device network of the HyperTerminal, the identity keys of multiple trusted devices can be quickly propagated and shared, which speeds up the networking speed and saves user operations.
在一些实施例中,为了交换彼此的身份密钥,建立第一设备和所述第二设备之间的连接。In some embodiments, a connection between the first device and the second device is established for exchanging each other's identity keys.
在一些实施例中,第一设备和第二设备可以解除彼此的可信关系。当确定第二设备退出与第一设备的可信关系时(例如,恢复出厂设置,登出用户账号、手动解除绑定关系等),第 一设备从可信设备集合的身份密钥中删除第二设备的身份密钥。如果确定第一设备退出与可信设备集合的可信关系(例如,恢复出厂设置,登出用户账号、手动解除绑定关系等),更新第一设备的身份密钥。以此方式,第一设备能够方便地管理和动态维持自身的可信设备集合,或者解除和其他设备的可信关系。In some embodiments, the first device and the second device may disassociate each other from a trusted relationship. When it is determined that the second device exits the trusted relationship with the first device (for example, restoring factory settings, logging out of a user account, manually unbinding, etc.), the first device deletes the second device from the identity key of the trusted device set. The identity key of the second device. If it is determined that the first device exits the trusted relationship with the set of trusted devices (for example, restore factory settings, log out of user accounts, manually unbind the relationship, etc.), update the identity key of the first device. In this manner, the first device can conveniently manage and dynamically maintain its own set of trusted devices, or release trusted relationships with other devices.
在一些实施例中,所述身份密钥可以是身份解析密钥,并且广播消息可以是蓝牙广播消息。以此方式,身份密钥可以适用于符合蓝牙通信协议的随机化广播地址。In some embodiments, the identity key may be an identity resolution key, and the broadcast message may be a Bluetooth broadcast message. In this way, the identity key can be adapted to a randomized broadcast address conforming to the Bluetooth communication protocol.
图9示出了根据本申请的实施例的另一通信方法900的示意流程图。方法900的流程图中涉及的设备包括第一设备和第二设备,第一设备和第二设备均安装有超级终端应用。参照图4至图7的描述,第一设备可以是上述第一电子设备100,第二设备可以上述第二电子设备101。此外,第一设备和第二设备也可以是上述电子设备200、电子设备201、电子设备202、电子设备203、电子设备204中的任意类型的设备。FIG. 9 shows a schematic flowchart of another communication method 900 according to an embodiment of the present application. The devices involved in the flowchart of the method 900 include a first device and a second device, and both the first device and the second device are installed with a HyperTerminal application. Referring to the description of FIGS. 4 to 7 , the first device may be the above-mentioned first electronic device 100 , and the second device may be the above-mentioned second electronic device 101 . In addition, the first device and the second device may also be any type of devices in the electronic device 200 , the electronic device 201 , the electronic device 202 , the electronic device 203 , and the electronic device 204 .
第一设备响应于用户查询请求或者定期地查询在第一设备附近的活动的可信设备。为此,第一设备扫描附近的设备以接收附近设备发出的广播消息。The first device queries active trusted devices in the vicinity of the first device in response to a user query request or periodically. To this end, the first device scans for nearby devices to receive broadcast messages sent by the nearby devices.
在框910,响应于接收到来自第二设备的广播消息,第一设备基于其可信设备集合的身份密钥和广播消息的源地址,确定第二设备为活动的可信设备。超级终端的可信设备组网(例如,参照图8描述的方法),第一设备具有与其具有可信关系的一个或更多个设备的身份密钥,并且可以使用这些身份密钥来检查特定设备(例如,第二设备)是否为其可信设备。At block 910, in response to receiving the broadcast message from the second device, the first device determines that the second device is an active trusted device based on the identity key of its set of trusted devices and the source address of the broadcast message. Trusted device networking of HyperTerminal (for example, with reference to the method described in FIG. 8 ), the first device has the identity keys of one or more devices with which it has a trusted relationship, and can use these identity keys to check specific Whether the device (eg, the second device) is its trusted device.
根据本申请的实施例,设备(例如,第二设备)在活动时发出广播消息,广播消息不携带设备标识,其地址经由该设备的身份密钥而生成,并且是可变的以确保该设备不会被监视和跟踪。According to the embodiment of the present application, a device (for example, a second device) sends out a broadcast message when it is active. The broadcast message does not carry a device identifier, and its address is generated via the device's identity key, and is variable to ensure that the device Will not be monitored and tracked.
根据本申请的实施例,当接收到来自其他设备的广播消息时,第一设备可以使用其拥有的可信设备集合中的可信设备的身份密钥来对这条广播消息的地址进行验证,由此发现活动的可信设备。具体地,第一设备基于第一身份密钥和源地址的第一部分来生成哈希值,并且将所生成的哈希值和源地址的第二部分进行比较。如果哈希值和第二部分匹配,第一设备确定广播消息通过验证。广播消息通过验证表明第一设备持有第二设备的身份密钥。也就是说第二设备是第一设备的可信设备,由此,第一设备可以将第二设备确定为活动的可信设备。通过这种方式,第一设备能够根据预先存储的可信设备的身份密钥来验证广播消息的来源是否为可信设备。According to an embodiment of the present application, when receiving a broadcast message from another device, the first device may use the identity key of a trusted device in its trusted device set to verify the address of the broadcast message, Active trusted devices are thus discovered. Specifically, the first device generates a hash value based on the first identity key and the first part of the source address, and compares the generated hash value with the second part of the source address. If the hash value matches the second part, the first device determines that the broadcast message is authenticated. The broadcast message shows through verification that the first device holds the identity key of the second device. That is to say, the second device is a trusted device of the first device, thus, the first device can determine the second device as an active trusted device. In this manner, the first device can verify whether the source of the broadcast message is a trusted device according to the pre-stored identity key of the trusted device.
在框920,第一设备提供第二设备的信息。在一些实施例中,响应于用户查找活动的可信设备的请求,例如,用户操作第一设备界面上图形元素,第一设备向用户提供第二设备的信息。例如,第一设备可以在用户界面上呈现第二设备的信息,例如设备状态或业务数据,并且可以用图形化的方式来呈现。At block 920, the first device provides information of the second device. In some embodiments, in response to a user's request to find an active trusted device, for example, the user operates a graphical element on the interface of the first device, the first device provides the user with information about the second device. For example, the first device may present information of the second device on the user interface, such as device status or service data, and present the information in a graphical manner.
在一些实施例中,用户还可以进一步对第二设备的信息进行操作。例如,用户希望第一设备和第二设备协同操作,并且操作第二设备的信息(例如,对应于第二设备的图形元素)。由此,第一设备建立与第二设备的连接。以此方式,可以根据用户操作来将第一设备连接到所发现的活动的可信设备,以满足具体的业务需要,从而节省设备的连接资源并且具有良好的用户体验。In some embodiments, the user can further operate on the information of the second device. For example, the user desires that the first device and the second device operate in cooperation, and manipulate information (eg, graphical elements corresponding to the second device) of the second device. Thereby, the first device establishes a connection with the second device. In this way, the first device can be connected to the found active trusted device according to the user operation to meet specific business needs, thereby saving connection resources of the device and providing a good user experience.
在一些实施例中,可信设备集合的身份密钥被存储在第一设备处。如果确定可信设备集合中的目标可信设备退出与第一设备的可信关系,则第一设备从存储的可信设备集合的身份 密钥中删除目标可信设备的身份密钥。以此方式,第一设备与其他设备的可信关系被可以被持久保存,并且可以被动态更新,从而能够快速地检测到活动的可信设备。In some embodiments, the identity keys for the set of trusted devices are stored at the first device. If it is determined that the target trusted device in the set of trusted devices exits the trusted relationship with the first device, the first device deletes the identity key of the target trusted device from the stored identity keys of the set of trusted devices. In this way, the trusted relationship between the first device and other devices can be persisted and updated dynamically, so that an active trusted device can be quickly detected.
在一些实施例中,身份密钥可以是身份解析密钥;广播消息可以是蓝牙广播消息。以此方式,身份密钥可以适用于符合蓝牙通信协议的随机化广播地址。In some embodiments, the identity key may be an identity resolution key; the broadcast message may be a Bluetooth broadcast message. In this way, the identity key can be adapted to a randomized broadcast address conforming to the Bluetooth communication protocol.
通过这种方式,当第一设备和第二设备具有可信关系时,第一设备能够通过第二设备的广播系统的地址信息来标识处于活动状态的第二设备。因此,第二设备不需要广播其标识信息就能够被标识,减少了第二设备被监视和跟踪的风险。In this way, when the first device and the second device have a trusted relationship, the first device can identify the second device in an active state through the address information of the broadcast system of the second device. Therefore, the second device can be identified without broadcasting its identification information, which reduces the risk of the second device being monitored and tracked.
图10示出了根据本申请的实施例的通信装置1000的示意框图。装置1000可以被实现在例如第一电子设备100处。装置1000包括认证单元1010和身份密钥交换单元1020。Fig. 10 shows a schematic block diagram of a communication device 1000 according to an embodiment of the present application. The apparatus 1000 may be implemented at the first electronic device 100, for example. The device 1000 includes an authentication unit 1010 and an identity key exchange unit 1020 .
认证单元1010被配置为基于从第二设备接收到的用于认证的信息,确定第二设备是否为第一设备的可信设备。The authentication unit 1010 is configured to determine whether the second device is an authentic device of the first device based on information for authentication received from the second device.
身份密钥交换单元1020被配置为如果第二设备被确定为所述第一设备的可信设备,向第二设备发送第一设备的身份密钥,从第二设备接收第二设备的身份密钥,其中第二设备的身份密钥用于生成所述第二设备的广播消息的源地址。The identity key exchange unit 1020 is configured to send the identity key of the first device to the second device if the second device is determined to be a trusted device of the first device, and receive the identity key of the second device from the second device. key, wherein the identity key of the second device is used to generate the source address of the broadcast message of the second device.
身份密钥添加单元1030被配置为将第二设备的身份密钥添加到第一设备的可信设备集合的身份密钥中。The identity key adding unit 1030 is configured to add the identity key of the second device to the identity keys of the trusted device set of the first device.
关于装置1000的更多细节与参照图8描述的方法800类似,这里不再赘述。More details about the device 1000 are similar to the method 800 described with reference to FIG. 8 , and will not be repeated here.
图11示出了根据本申请的实施例的通信装置1100的示意框图。装置1100可以被实现在例如第一电子设备100处。装置1100包括活动可信设备确定单元1110和信息提供单元1020。Fig. 11 shows a schematic block diagram of a communication device 1100 according to an embodiment of the present application. The apparatus 1100 may be implemented at the first electronic device 100, for example. The apparatus 1100 includes an active trusted device determining unit 1110 and an information providing unit 1020 .
活动可信设备确定单元1110被配置为响应于接收到来自第二设备的广播消息,基于第一设备的可信设备集合的身份密钥和所述广播消息的源地址,确定第二设备为活动的可信设备。The active trusted device determining unit 1110 is configured to determine that the second device is an active device based on the identity key of the trusted device set of the first device and the source address of the broadcast message in response to receiving the broadcast message from the second device. trusted devices.
信息提供单元1120被配置为如果第二设备被确定为活动的可信设备,提供第二设备的信息。The information providing unit 1120 is configured to provide information of the second device if the second device is determined to be an active trusted device.
关于装置1100的更多细节与参照图9描述的方法900类似,这里不再赘述。More details about the device 1100 are similar to the method 900 described with reference to FIG. 9 , and will not be repeated here.
本申请的方案可以是方法、装置、系统和/或计算机程序产品。计算机程序产品可以包括计算机可读存储介质,其上载有用于执行本公开的各个方面的计算机可读程序指令。The solution of the present application may be a method, an apparatus, a system and/or a computer program product. A computer program product may include a computer-readable storage medium having computer-readable program instructions thereon for carrying out various aspects of the present disclosure.
计算机可读存储介质可以是可以保持和存储由指令执行设备使用的指令的有形设备。计算机可读存储介质例如可以是――但不限于――电存储设备、磁存储设备、光存储设备、电磁存储设备、半导体存储设备或者上述的任意合适的组合。计算机可读存储介质的更具体的例子(非穷举的列表)包括:便携式计算机盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、静态随机存取存储器(SRAM)、便携式压缩盘只读存储器(CD-ROM)、数字多功能盘(DVD)、记忆棒、软盘、机械编码设备、例如其上存储有指令的打孔卡或凹槽内凸起结构、以及上述的任意合适的组合。这里所使用的计算机可读存储介质不被解释为瞬时信号本身,诸如无线电波或者其他自由传播的电磁波、通过波导或其他传输媒介传播的电磁波(例如,通过光纤电缆的光脉冲)、或者通过电线传输的电信号。A computer readable storage medium may be a tangible device that can retain and store instructions for use by an instruction execution device. A computer readable storage medium may be, for example, but is not limited to, an electrical storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of computer-readable storage media include: portable computer diskettes, hard disks, random access memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM), or flash memory), static random access memory (SRAM), compact disc read only memory (CD-ROM), digital versatile disc (DVD), memory stick, floppy disk, mechanically encoded device, such as a printer with instructions stored thereon A hole card or a raised structure in a groove, and any suitable combination of the above. As used herein, computer-readable storage media are not to be construed as transient signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through waveguides or other transmission media (e.g., pulses of light through fiber optic cables), or transmitted electrical signals.
这里所描述的计算机可读程序指令可以从计算机可读存储介质下载到各个计算/处理设备,或者通过网络、例如因特网、局域网、广域网和/或无线网下载到外部计算机或外部存储 设备。网络可以包括铜传输电缆、光纤传输、无线传输、路由器、防火墙、交换机、网关计算机和/或边缘服务器。每个计算/处理设备中的网络适配卡或者网络接口从网络接收计算机可读程序指令,并转发该计算机可读程序指令,以供存储在各个计算/处理设备中的计算机可读存储介质中。Computer readable program instructions described herein may be downloaded from a computer readable storage medium to a respective computing/processing device, or downloaded to an external computer or external storage device over a network, such as the Internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers, and/or edge servers. A network adapter card or a network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in each computing/processing device .
用于执行本公开操作的计算机程序指令可以是汇编指令、指令集架构(ISA)指令、机器指令、机器相关指令、微代码、固件指令、状态设置数据、或者以一种或多种编程语言的任意组合编写的源代码或目标代码,编程语言包括面向对象的编程语言—诸如Smalltalk、C++等,以及常规的过程式编程语言—诸如“C”语言或类似的编程语言。计算机可读程序指令可以完全地在用户计算机上执行、部分地在用户计算机上执行、作为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行、或者完全在远程计算机或服务器上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络—包括局域网(LAN)或广域网(WAN)—连接到用户计算机,或者,可以连接到外部计算机(例如利用因特网服务提供商来通过因特网连接)。在一些实施例中,通过利用计算机可读程序指令的状态信息来个性化定制电子电路,例如可编程逻辑电路、现场可编程门阵列(FPGA)或可编程逻辑阵列(PLA),该电子电路可以执行计算机可读程序指令,从而实现本公开的各个方面。Computer program instructions for performing the operations of the present disclosure may be assembly instructions, instruction set architecture (ISA) instructions, machine instructions, machine-dependent instructions, microcode, firmware instructions, state setting data, or Source or object code written in any combination, including object-oriented programming languages—such as Smalltalk, C++, etc., and conventional procedural programming languages—such as “C” or similar programming languages. Computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server implement. In cases involving a remote computer, the remote computer can be connected to the user computer through any kind of network, including a local area network (LAN) or a wide area network (WAN), or it can be connected to an external computer (such as via the Internet using an Internet service provider). connect). In some embodiments, an electronic circuit, such as a programmable logic circuit, field programmable gate array (FPGA), or programmable logic array (PLA), can be customized by utilizing state information of computer-readable program instructions, which can Various aspects of the present disclosure are implemented by executing computer readable program instructions.
这里参照根据本公开实施例的方法、装置(系统)和计算机程序产品的流程图和/或框图描述了本公开的各个方面。应当理解,流程图和/或框图的每个方框以及流程图和/或框图中各方框的组合,都可以由计算机可读程序指令实现。Aspects of the present disclosure are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the disclosure. It should be understood that each block of the flowcharts and/or block diagrams, and combinations of blocks in the flowcharts and/or block diagrams, can be implemented by computer-readable program instructions.
这些计算机可读程序指令可以提供给通用计算机、专用计算机或其它可编程数据处理装置的处理单元,从而生产出一种机器,使得这些指令在通过计算机或其它可编程数据处理装置的处理单元执行时,产生了实现流程图和/或框图中的一个或多个方框中规定的功能/动作的装置。也可以把这些计算机可读程序指令存储在计算机可读存储介质中,这些指令使得计算机、可编程数据处理装置和/或其他设备以特定方式工作,从而,存储有指令的计算机可读介质则包括一个制造品,其包括实现流程图和/或框图中的一个或多个方框中规定的功能/动作的各个方面的指令。These computer readable program instructions may be provided to a processing unit of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine such that when executed by the processing unit of the computer or other programmable data processing apparatus , producing an apparatus for realizing the functions/actions specified in one or more blocks in the flowchart and/or block diagram. These computer-readable program instructions can also be stored in a computer-readable storage medium, and these instructions cause computers, programmable data processing devices and/or other devices to work in a specific way, so that the computer-readable medium storing instructions includes An article of manufacture comprising instructions for implementing various aspects of the functions/acts specified in one or more blocks in flowcharts and/or block diagrams.
也可以把计算机可读程序指令加载到计算机、其它可编程数据处理装置、或其它设备上,使得在计算机、其它可编程数据处理装置或其它设备上执行一系列操作步骤,以产生计算机实现的过程,从而使得在计算机、其它可编程数据处理装置、或其它设备上执行的指令实现流程图和/或框图中的一个或多个方框中规定的功能/动作。It is also possible to load computer-readable program instructions into a computer, other programmable data processing device, or other equipment, so that a series of operational steps are performed on the computer, other programmable data processing device, or other equipment to produce a computer-implemented process , so that instructions executed on computers, other programmable data processing devices, or other devices implement the functions/actions specified in one or more blocks in the flowcharts and/or block diagrams.
附图中的流程图和框图显示了根据本公开的多个实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段或指令的一部分,模块、程序段或指令的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个连续的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或动作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in a flowchart or block diagram may represent a module, a program segment, or a portion of an instruction that contains one or more executable instruction. In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks in succession may, in fact, be executed substantially concurrently, or they may sometimes be executed in the reverse order, depending upon the functionality involved. It should also be noted that each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by a dedicated hardware-based system that performs the specified function or action , or may be implemented by a combination of dedicated hardware and computer instructions.
以上已经描述了本公开的各实施方式,上述说明是示例性的,并非穷尽性的,并且也不限于所披露的各实施方式。在不偏离所说明的各实施方式的范围和精神的情况下,对于本技 术领域的普通技术人员来说许多修改和变更都是显而易见的。本文中所用术语的选择,旨在最好地解释各实施方式的原理、实际应用或对市场中的技术的改进,或者使本技术领域的其他普通技术人员能理解本文披露的各实施方式。While various embodiments of the present disclosure have been described above, the foregoing description is illustrative, not exhaustive, and is not limited to the disclosed embodiments. Many modifications and alterations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The choice of terminology used herein aims to best explain the principle of each embodiment, practical application or improvement of technology in the market, or to enable other ordinary skilled in the art to understand each embodiment disclosed herein.

Claims (20)

  1. 一种用于标识可信设备的方法,其特征在于,包括:A method for identifying a trusted device, comprising:
    响应于接收到来自第二设备的广播消息,第一设备基于所述第一设备的可信设备集合的身份密钥和所述广播消息的源地址,确定所述第二设备为活动的可信设备;以及In response to receiving the broadcast message from the second device, the first device determines that the second device is an active trusted device based on the identity key of the trusted device set of the first device and the source address of the broadcast message. equipment; and
    所述第一设备提供所述第二设备的信息。The first device provides information of the second device.
  2. 根据权利要求1所述的方法,其特征在于,其中确定所述第二设备为活动的可信设备包括:The method according to claim 1, wherein determining that the second device is an active trusted device comprises:
    使用所述可信设备集合的身份密钥中的第一身份密钥和所述源地址来验证所述广播消息;以及authenticating the broadcast message using a first of the identity keys of the set of trusted devices and the source address; and
    如果所述广播消息通过验证,所述第一设备将所述第二设备确定为活动的可信设备。If the broadcast message is verified, the first device determines the second device as an active trusted device.
  3. 根据权利要求2所述的方法,其特征在于,其中验证所述广播消息包括:The method according to claim 2, wherein verifying the broadcast message comprises:
    基于所述第一身份密钥和所述源地址的第一部分来生成哈希值;generating a hash value based on the first identity key and the first portion of the source address;
    将所述哈希值和所述源地址的第二部分进行比较;comparing said hash value with a second portion of said source address;
    如果所述哈希值和所述第二部分匹配,确定所述广播消息通过验证。If the hash value matches the second part, it is determined that the broadcast message passes the verification.
  4. 根据权利要求1至3中任一项所述的方法,其特征在于,其中提供所述第二设备的信息包括:The method according to any one of claims 1 to 3, wherein providing the information of the second device comprises:
    响应于接收到来自用户的关于可信设备的查找请求,所述第一设备向所述用户提供所述第二设备的信息。In response to receiving a lookup request from a user for a trusted device, the first device provides information of the second device to the user.
  5. 根据权利要求1至4中任一项所述的方法,其特征在于,还包括:The method according to any one of claims 1 to 4, further comprising:
    响应于接收到所述用户对所述第二设备的信息的操作,所述第一设备建立与所述第二设备的连接。In response to receiving the user's operation on the information of the second device, the first device establishes a connection with the second device.
  6. 根据权利要求1至5中任一项所述的方法,其特征在于,其中所述可信设备集合的身份密钥被存储在所述第一设备处,并且其中所述方法还包括:The method according to any one of claims 1 to 5, wherein the identity key of the set of trusted devices is stored at the first device, and wherein the method further comprises:
    响应于确定所述可信设备集合中的目标可信设备退出与所述第一设备的可信关系,所述第一设备从存储的所述可信设备集合的身份密钥中删除所述目标可信设备的所述身份密钥。In response to determining that a target trusted device in the set of trusted devices exits a trusted relationship with the first device, the first device deletes the target trusted device from the stored identity key of the set of trusted devices. The identity key of the trusted device.
  7. 根据权利要求1至6中任一项所述的方法,其特征在于,其中所述身份密钥是身份解析密钥。The method according to any one of claims 1 to 6, wherein the identity key is an identity resolution key.
  8. 根据权利要求1至7中任一项所述的方法,其特征在于,其中所述广播消息是蓝牙广播消息。The method according to any one of claims 1 to 7, wherein the broadcast message is a Bluetooth broadcast message.
  9. 一种用于标识可信设备的方法,其特征在于,包括:A method for identifying a trusted device, comprising:
    第一设备基于从第二设备接收到的用于认证的信息,确定所述第二设备为所述第一设备的可信设备;determining, by the first device, that the second device is a trusted device of the first device based on information received from the second device for authentication;
    所述第一设备向所述第二设备发送所述第一设备的身份密钥,the first device sends the identity key of the first device to the second device,
    所述第一设备从所述第二设备接收所述第二设备的身份密钥,其中所述第二设备的身份密钥用于生成所述第二设备的广播消息的源地址,以及receiving, by the first device, an identity key of the second device from the second device, wherein the identity key of the second device is used to generate a source address of broadcast messages of the second device, and
    所述第一设备将所述第二设备的所述身份密钥添加到所述第一设备的可信设备集合的身份密钥中。The first device adds the identity key of the second device to the identity keys of the trusted device set of the first device.
  10. 根据权利要求9所述的方法,其特征在于,其中确定所述第二设备为所述第一设备的可信设备包括:The method according to claim 9, wherein determining that the second device is a trusted device of the first device comprises:
    向所述第二设备发送所述第一设备的账户信息;sending account information of the first device to the second device;
    从所述第二设备接收所述针对所述第一设备的所述账户信息的用于认证的信息;以及receiving said information for authentication of said account information for said first device from said second device; and
    如果所述用于认证的信息指示所述第一设备和所述第二设备具有相同或相关联的账户,确定所述第二设备为可信设备。If the information for authentication indicates that the first device and the second device have the same or associated accounts, determine that the second device is an authentic device.
  11. 根据权利要求9所述的方法,其特征在于,确定所述第二设备为所述第一设备的可信设备包括:The method according to claim 9, wherein determining that the second device is a trusted device of the first device comprises:
    从所述用于认证的信息中获取绑定信息;Obtain binding information from the information used for authentication;
    基于所述绑定信息,确定所述第一设备和所述第二设备是否已被绑定;以及determining whether the first device and the second device have been bound based on the binding information; and
    如果确定所述第一设备和所述第二设备已被绑定,确定所述第二设备为所述第一设备的可信设备。If it is determined that the first device and the second device have been bound, determine that the second device is a trusted device of the first device.
  12. 根据权利要求9至11中任一项所述的方法,其特征在于,其中所述绑定信息指示两个设备之间通过二维码、PIN码和实体接触中的至少一项而被绑定。The method according to any one of claims 9 to 11, wherein the binding information indicates that two devices are bound through at least one of two-dimensional code, PIN code and physical contact .
  13. 根据权利要求9-12中任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 9-12, wherein the method further comprises:
    所述第一设备向所述可信设备集合中的一个可信设备发送所述第二设备的身份密钥;以及sending, by the first device, the identity key of the second device to a trusted device in the set of trusted devices; and
    所述第一设备向所述第二设备发送所述可信设备集合中的所述一个可信设备的身份密钥。The first device sends the identity key of the one trusted device in the set of trusted devices to the second device.
  14. 根据权利要求9至13中任一项所述的方法,其特征在于,还包括:The method according to any one of claims 9 to 13, further comprising:
    建立所述第一设备和所述第二设备之间的连接。A connection is established between the first device and the second device.
  15. 根据权利要求9至14中任一项所述的方法,其特征在于,还包括:The method according to any one of claims 9 to 14, further comprising:
    响应于确定所述第二设备退出与所述第一设备的可信关系,所述第一设备从所述第一设备的可信设备集合的身份密钥中删除所述第二设备的所述身份密钥。In response to determining that the second device has exited the trusted relationship with the first device, the first device deletes the second device's identity key from the set of trusted devices of the first device. identity key.
  16. 根据权利要求9至15中任一项所述的方法,其特征在于,还包括:The method according to any one of claims 9 to 15, further comprising:
    如果确定所述第一设备退出与所述可信设备集合的可信关系,更新所述第一设备的身份密钥。If it is determined that the first device exits the trusted relationship with the set of trusted devices, updating the identity key of the first device.
  17. 根据权利要求9至16中任一项所述的方法,其特征在于,其中所述身份密钥是身份解析密钥。The method according to any one of claims 9 to 16, wherein the identity key is an identity resolution key.
  18. 根据权利要求9至17中任一项所述的方法,其特征在于,其中所述广播消息是蓝牙广播消息。The method according to any one of claims 9 to 17, wherein the broadcast message is a Bluetooth broadcast message.
  19. 一种电子设备,其特征在于,包括:An electronic device, characterized in that it comprises:
    处理单元和存储器;processing unit and memory;
    所述处理单元执行所述存储器中的指令,使得所述电子设备执行根据权利要求1至8中任一项所述的方法或根据权利要求9至18中任一项所述的方法。The processing unit executes the instructions in the memory, so that the electronic device executes the method according to any one of claims 1-8 or the method according to any one of claims 9-18.
  20. 一种计算机可读存储介质,其特征在于,其上存储有一条或多条计算机指令,其中一条或多条计算机指令被处理器执行使所述处理器执行根据权利要求1至8中任一项所述的方法或根据权利要求9至18中任一项所述的方法。A computer-readable storage medium, characterized in that one or more computer instructions are stored thereon, wherein one or more computer instructions are executed by a processor to cause the processor to perform any one of claims 1 to 8 The method or a method according to any one of claims 9 to 18.
PCT/CN2022/118459 2021-09-30 2022-09-13 Method and apparatus for identifying device, and electronic device and medium WO2023051229A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111165779.9A CN115913600A (en) 2021-09-30 2021-09-30 Method, apparatus, electronic device and medium for identifying device
CN202111165779.9 2021-09-30

Publications (1)

Publication Number Publication Date
WO2023051229A1 true WO2023051229A1 (en) 2023-04-06

Family

ID=85750363

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/118459 WO2023051229A1 (en) 2021-09-30 2022-09-13 Method and apparatus for identifying device, and electronic device and medium

Country Status (2)

Country Link
CN (1) CN115913600A (en)
WO (1) WO2023051229A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017007719A1 (en) * 2015-07-09 2017-01-12 Google, Inc. Security for wireless broadcasts
CN107317606A (en) * 2017-07-03 2017-11-03 飞天诚信科技股份有限公司 A kind of method and apparatus of bluetooth anti-tracking
CN110489958A (en) * 2019-08-27 2019-11-22 上海银基信息安全技术股份有限公司 A kind of identity identifying method, positioning device and lock end to be solved
CN111405082A (en) * 2020-03-23 2020-07-10 Oppo(重庆)智能科技有限公司 Device connection method, electronic device, terminal and storage medium
CN112351390A (en) * 2019-08-09 2021-02-09 华为技术有限公司 Method for mutual identification or mutual communication of Bluetooth devices

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017007719A1 (en) * 2015-07-09 2017-01-12 Google, Inc. Security for wireless broadcasts
CN107317606A (en) * 2017-07-03 2017-11-03 飞天诚信科技股份有限公司 A kind of method and apparatus of bluetooth anti-tracking
CN112351390A (en) * 2019-08-09 2021-02-09 华为技术有限公司 Method for mutual identification or mutual communication of Bluetooth devices
CN110489958A (en) * 2019-08-27 2019-11-22 上海银基信息安全技术股份有限公司 A kind of identity identifying method, positioning device and lock end to be solved
CN111405082A (en) * 2020-03-23 2020-07-10 Oppo(重庆)智能科技有限公司 Device connection method, electronic device, terminal and storage medium

Also Published As

Publication number Publication date
CN115913600A (en) 2023-04-04

Similar Documents

Publication Publication Date Title
WO2021164554A1 (en) Notification processing system and method, and electronic device
WO2021000808A1 (en) Device control method and device
WO2020155014A1 (en) Smart home device sharing system and method, and electronic device
WO2020233538A1 (en) Method for accessing wireless local area network and terminal
US20230021994A1 (en) Cross-Device Content Projection Method and Electronic Device
WO2021175214A1 (en) Projection screen connection control method and electronic device
WO2021147406A1 (en) Audio output method and terminal device
WO2020224447A1 (en) Method and system for adding smart home device to contacts
WO2020173375A1 (en) Multi-intelligent device linkage control method, device and system
US20230422154A1 (en) Method for using cellular communication function, and related apparatus and system
WO2022100304A1 (en) Method and apparatus for transferring application content across devices, and electronic device
US20240069850A1 (en) Application Sharing Method, Electronic Device, and Storage Medium
WO2021135734A1 (en) Method for transmitting file in application, and electronic device and system
WO2022037480A1 (en) Task processing method and related electronic device
WO2022179443A1 (en) Nfc method and system, and electronic device
WO2023051229A1 (en) Method and apparatus for identifying device, and electronic device and medium
WO2022174746A1 (en) Event notification method, bluetooth device and bluetooth system
WO2021227942A1 (en) Information sharing method, electronic devices and system
CN114741008A (en) Distributed cross-device cooperation method, electronic device and communication system
WO2021218544A1 (en) Wireless connection providing system, method, and electronic apparatus
WO2023231963A1 (en) Device control method, and electronic device
WO2023025059A1 (en) Communication system and communication method
WO2023142993A1 (en) Detection method, related electronic device and system
WO2023051204A1 (en) Cross-device connection method, electronic device and storage medium
WO2023236939A1 (en) Application component interaction method and related device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22874616

Country of ref document: EP

Kind code of ref document: A1