WO2023071733A1 - 一种设备控制方法与相关设备 - Google Patents

一种设备控制方法与相关设备 Download PDF

Info

Publication number
WO2023071733A1
WO2023071733A1 PCT/CN2022/123965 CN2022123965W WO2023071733A1 WO 2023071733 A1 WO2023071733 A1 WO 2023071733A1 CN 2022123965 W CN2022123965 W CN 2022123965W WO 2023071733 A1 WO2023071733 A1 WO 2023071733A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic device
server
account
authentication information
authentication
Prior art date
Application number
PCT/CN2022/123965
Other languages
English (en)
French (fr)
Inventor
才宇东
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2023071733A1 publication Critical patent/WO2023071733A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Definitions

  • the present application relates to the technical field of terminals, and in particular to a device control method and related devices.
  • multiple home appliances in the home can communicate with each other, such as connecting a TV with a mobile phone, connecting a mobile phone with a smart refrigerator, and so on.
  • the present application provides a device control method and related devices, which are used to improve the convenience of user operations in a multi-device interconnection scenario.
  • a device control method is provided, which is applied to a system including a first electronic device, a second electronic device, and a server.
  • the server provides authentication information to the first electronic device, the authentication information is generated based on the first account; the authentication information is obtained from the first electronic device; the second electronic device authenticates the The information is authenticated, and when the authentication is passed, the following steps are performed:
  • the third electronic device is related to the first account .
  • the second electronic device can obtain authentication information from the first electronic device and perform authentication, and when the authentication is passed, it can automatically enter the working state, and/or, automatically connect with the third electronic device.
  • the user does not need to manually unlock the second electronic device, and performs a series of operations on the second electronic device to realize the connection with the third electronic device, which is convenient to operate and contributes to a better user experience.
  • the authentication information is generated by the server by encrypting the first account based on a first key
  • the second electronic device authenticating the authentication information includes: the first The second electronic device obtains the second key corresponding to the first key from the server; the second electronic device uses the second key to decrypt the authentication information, and if the decryption is successful, the authentication is passed; if If the decryption fails, the authentication fails. That is to say, only the device with the second key capable of decrypting the authentication information can automatically enter the working state, and/or, automatically connect with other devices (devices related to the first account). In this way, the security is higher, and the device without the second key is prevented from being automatically connected to the other device, resulting in leakage of user privacy.
  • the authentication information is generated by the server by encrypting the first account based on a first key
  • the second electronic device authenticating the authentication information includes: the first The second electronic device acquires a second key corresponding to the first key from the server; the second electronic device uses the second key to decrypt the authentication information to obtain the first account; When the second electronic device determines that the first account is related to the first electronic device, the authentication passes; otherwise, the authentication fails. That is to say, only when a device successfully decrypts the authentication information and is associated with the first account, can it automatically enter the working state, and/or automatically connect with other devices (device associated with the first account). In this way, the security is higher, and the device unrelated to the first account that steals the second key can be prevented from being automatically connected to the other device, resulting in leakage of user privacy.
  • the first account is related to the second electronic device, including at least one of the following situations: the current login account of the second electronic device is the first account; the second electronic device The activation account is the first account.
  • the method before the server provides the authentication information to the first electronic device, the method further includes: the server receives application information of a fourth electronic device, and the application information is used to apply for a connection with the first electronic device.
  • Authentication information corresponding to an account wherein, the fourth electronic device is the same device as the second electronic device, or, the fourth electronic device is the same device as the third electronic device; or, the fourth electronic device is the same device as the third electronic device;
  • the fourth electronic device is related to the first account and different from the second electronic device and the third electronic device.
  • the server provides authentication information to the first electronic device as a label authentication service, which needs to be performed upon application by the user. For example, if the user applies for the service using the fourth electronic device, the server provides authentication information to the first electronic device. In this way, it is only carried out when the user has a demand, which can save the workload while meeting the user's demand.
  • the method further includes: the fourth electronic device displays a first interface in response to the first operation, and the first interface includes the first account number and an application button; the fourth electronic device When the electronic device detects the second operation on the application button, it sends the application information to the server.
  • the user can apply for the label authentication service on the mobile phone, and the operation is convenient.
  • the server provides authentication information to the first electronic device, and the devices at the user's home (such as TVs, mobile phones, speakers, etc.) can automatically enter the working state and/or automatically realize multi-device interconnection through the first electronic device .
  • sending the application information to the server includes: the fourth electronic device detects that the When the second operation of the application button is performed, a second interface is displayed, and the second interface includes prompt information of fees to be paid; when the fourth electronic device detects that the fee payment is completed, it sends the application to the server information. That is to say, the label authentication service is a paid service. After the user pays the fee, the server provides authentication information to the first electronic device, and the devices at the user's home (such as TVs, mobile phones, speakers, etc.) can be automatically entered through the first electronic device. Working status and/or automatic multi-device interconnection.
  • the second electronic device queries the server for the connection address of the third electronic device, including: the second electronic device sends indication information to the server, and the indication information is used to indicate The second electronic device passes the authentication of the authentication information; the server verifies the identity of the second electronic device, and after passing the verification, sends the connection link of the third electronic device to the second electronic device address.
  • some devices may steal the second key in the second electronic device, use the second key to decrypt the authentication information, and then send instruction information to the server. If the server sends the connection address of the third electronic device to the device that has embezzled the second key, the privacy of the third electronic device will easily be leaked. Therefore, after receiving the instruction information reported by a device, the server will not actively send the connection address of another device to the device, but will verify the identity of the device that reported the instruction information. If the verification passes, it means that the device is legal. Then send the connection address of another device to the device to ensure that the privacy of the device is not leaked.
  • the authentication of the second electronic device by the server includes: the server judging whether the second electronic device is related to the first account; When the device is related to the first account, the verification passes; otherwise, the verification fails.
  • the server after receiving the instruction information reported by a device, the server will not actively send the connection address of another device to the device, but will verify whether the device that reported the instruction information is related to the first account, for example, the device is currently Whether the login account is the first account and/or whether the activation account is the first account, etc. If so, it means that the device is legal, and then send the connection address of another device to the device to ensure that the privacy of the device is not leaked .
  • the first electronic device is an electronic tag; the second electronic device is provided with a reader; the reader is used to read the authentication information in the electronic tag.
  • the first electronic device can also be other types of devices, such as WIFI devices, Bluetooth devices, etc., so that the second electronic device can obtain the authentication information in the first electronic device through the WIFI module or the Bluetooth module.
  • the non-working state includes a screen-locked state, and the working state includes an unlocked state, or, the non-working state includes a sleep state, and the working state includes a wake-up state.
  • the non-working state is the lock screen state, and the working state is the unlocked state.
  • the non-working state is the sleep state, and the working state is the wake-up state.
  • a device control method applied to a second electronic device including: the second electronic device obtains authentication information from the first electronic device; the authentication information is generated by the server based on the first account; The second electronic device authenticates the authentication information, and when the authentication is passed, executes the following steps:
  • the third electronic device is related to the first account .
  • the authentication information is generated by the server encrypting the first account based on a first key
  • the second electronic device authenticating the authentication information includes:
  • the second electronic device acquires a second key corresponding to the first key from the server;
  • the second key decrypts the authentication information; if the decryption is successful, the authentication is passed; if the decryption fails, the authentication is not passed.
  • the authentication information is generated by the server encrypting the first account based on a first key
  • the second electronic device authenticating the authentication information includes:
  • the second electronic device acquires a second key corresponding to the first key from the server;
  • the second electronic device decrypts the authentication information by using the second key to obtain the first account
  • the authentication passes; otherwise, the authentication fails.
  • the first account is related to the second electronic device, including at least one of the following situations: the current login account of the second electronic device is the first account; The activation account of the device is the first account.
  • the first electronic device is an electronic tag; the second electronic device is provided with a reader; the reader is used to read the authentication information in the electronic tag.
  • the non-working state includes a screen-locked state, and the working state includes an unlocked state, or, the non-working state includes a sleep state, and the working state includes a wake-up state.
  • a device control method applied to a server including: the server generates authentication information based on the first account; the server provides the authentication information to the first electronic device, and the authentication information is used for other The electronic device performs authentication; after the server determines that the second electronic device has passed the authentication of the authentication information, it sends the connection address of the third electronic device to the second electronic device, and the third electronic device is connected to the first account relevant.
  • the authentication information is generated by encrypting the first account based on a first key
  • the method further includes: sending, by the server to the second electronic device, an A second key corresponding to the key, where the second key is used to authenticate the authentication information.
  • the server before the server provides the authentication information to the first electronic device, it further includes: the server receives application information of a fourth electronic device, and the application information is used for applying for and Authentication information corresponding to the first account; wherein, the fourth electronic device is the same device as the second electronic device, or, the fourth electronic device is the same device as the third electronic device; or, The fourth electronic device is related to the first account and different from the second electronic device and the third electronic device.
  • sending the connection address of the third electronic device to the second electronic device includes: the server receiving the first The indication information sent by the second electronic device, the indication information is used to indicate that the second electronic device has passed the authentication of the authentication information; the server verifies the identity of the second electronic device, and after passing the verification, sends The second electronic device sends the connection address of the third electronic device.
  • the authentication of the second electronic device by the server includes: the server judging whether the second electronic device is related to the first account; When the device is related to the first account, the verification passes; otherwise, the verification fails.
  • the first electronic device is an electronic tag; the second electronic device is provided with a reader; the reader is used to read the authentication information in the electronic tag.
  • a communication system including: a first electronic device, a second electronic device, and a server;
  • Authentication information is stored in the first electronic device; the authentication information is used for authentication by other electronic devices;
  • the second electronic device includes: a processor; a memory; wherein the memory stores one or more computer programs, and the one or more computer programs include instructions, and when the instructions are executed by the processor, making the second electronic device perform the method steps described in the second aspect above;
  • the server includes: a processor; a memory; wherein the memory stores one or more computer programs, and the one or more computer programs include instructions that, when executed by the processor, cause the The second electronic device executes the method steps described in the third aspect above.
  • an electronic device including:
  • processor memory, and, one or more programs
  • the one or more programs are stored in the memory, the one or more programs include instructions, and when the instructions are executed by the processor, the electronic device performs the above-mentioned second aspect The method steps described in any one.
  • a computer-readable storage medium the computer-readable storage medium is used to store a computer program, and when the computer program is run on a computer, the computer executes the above-mentioned first aspect and the first aspect.
  • a computer program product including a computer program, which, when the computer program is run on a computer, causes the computer to execute the method as described in the first aspect, the second aspect, or the third aspect.
  • the embodiment of the present application further provides a chip, the chip is coupled with the memory in the electronic device, and is used to call the computer program stored in the memory and execute the first aspect, the second aspect or the third aspect of the embodiment of the present application.
  • "coupling" in the embodiments of the present application means that two components are directly or indirectly combined with each other.
  • FIG. 1 is a schematic diagram of a communication system provided by an embodiment of the present application.
  • FIG. 2 is a schematic diagram of a device connection provided by an embodiment of the present application.
  • FIG. 3 is a schematic diagram of another communication system provided by an embodiment of the present application.
  • FIG. 4 is a schematic diagram of a hardware structure of an electronic device provided by an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of a device control method provided by an embodiment of the present application.
  • FIG. 6A to FIG. 6B are schematic diagrams of applying for label authentication services provided by an embodiment of the present application.
  • FIG. 7 is another schematic diagram of the application label authentication service provided by an embodiment of the present application.
  • FIG. 8 is a schematic structural diagram of an electronic device provided by an embodiment of the present application.
  • the device control method provided in the embodiment of the present application is applicable to a communication system.
  • FIG. 1 it is a schematic diagram of a communication system provided by an embodiment of the present application.
  • the communication system includes a server and N electronic devices (called distributed devices), where N is an integer greater than or equal to 2.
  • the server may be a computing device with relatively strong processing capability and relatively large storage capability, such as various types of servers, such as cloud servers.
  • the electronic device may be a portable electronic device, such as a mobile phone, a tablet computer, a portable computer, a wearable device with a wireless communication function (such as a smart watch, smart glasses, a smart bracelet, or a smart helmet, etc.); or, It can be a vehicle-mounted device; or, it can also be a desktop computer, an all-in-one computer, or other equipment; or, it can also be a smart home device such as a TV, a sound box, etc.
  • the N electronic devices can log in to the server side using accounts respectively.
  • the account may be a system account, such as a mobile phone number, an email address, and the like.
  • the N electronic devices are all Huawei devices, and the server is a Huawei server, such as Huawei Cloud, then the N electronic devices can log in to the Huawei Cloud side using Huawei accounts.
  • the login accounts of the N electronic devices may be the same or different.
  • the N electronic devices may be referred to as distributed devices.
  • distributed household appliances at home such as mobile phones, speakers, and televisions; or distributed office equipment in office scenarios, such as printers, fax machines, projectors, etc.
  • the distributed devices may be located on the same communication network, for example, located on the same Wi-Fi network; or log in to the same account (such as Huawei account), or belong to the same group (such as the same family account), and so on.
  • Connections can be established between distributed devices. It should be noted that the establishment of a connection between distributed devices can be called multi-device interconnection. Of course, it can also have other names, such as hyperterminal, hyperterminal group, multi-device communication, multi-device collaboration, etc., as long as it refers to multiple devices It only needs to be connected with each other, and this application does not limit the name.
  • the account may be called a first account, for example, it may be a Huawei system account, such as Jack.huawei.com.
  • a device list corresponding to the first account may be stored in the server.
  • the device list includes device identifiers and connection addresses of devices corresponding to the first account.
  • the device list is as follows in Table 1:
  • Table 1 Device list corresponding to the first account
  • the device identifier may be a device model, a device type (such as a mobile phone or a tablet computer), a serial number, and the like.
  • the connection address may include an Internet Protocol (Internet Protocol, IP) address, a Media Access Control (Media Access Control, MAC) address, etc., which are not limited in this application.
  • the connection process may include: 1. Unlocking the mobile phone. 2. Perform interactive operations on the mobile phone to realize connection with other devices. It can be understood that step 1 is an optional step. If the phone is currently locked, go to step 1. If the phone is currently unlocked, step 1 is not required.
  • the lock screen state includes: a lock screen and a black screen state or a lock screen and a bright screen state. Step 1 There are many ways to unlock the phone, including password unlocking, fingerprint unlocking, face unlocking, voiceprint unlocking, gesture unlocking and so on. Exemplarily, as shown in (a) in FIG.
  • the mobile phone is in a locked screen state (screen locked and black screen state).
  • a main interface 201 as shown in (b) in FIG. 2 is displayed.
  • the main interface 201 includes icons of various applications.
  • step 2 can be performed.
  • the mobile phone displays a main interface 201 .
  • the control center interface 202 as shown in (c) in FIG. 2 is displayed.
  • the control center interface 202 includes a hyper terminal function card 203 .
  • the name "Hyper Terminal” is just an example, and can be replaced by other names, such as "multi-device interconnection", “multi-device collaboration”, etc., which are not limited in this embodiment of the present application.
  • the identifications of surrounding devices found by the mobile phone are displayed in the hyperterminal function card 203 .
  • TV (Vision) logos sound box (Sound X) logos
  • tablet computer (MatePad) logos tablet computer logos
  • an operation such as a click operation
  • an interface 204 as shown in (d) in FIG. 2 is displayed.
  • the interface 204 includes: a television logo 206 , a tablet computer logo 208 , a mobile phone logo 207 , and a speaker logo 209 .
  • the mobile phone logo 207 is located in the middle, and other marks are located around the mobile phone logo 207, which are used to indicate that the surrounding equipment of the mobile phone includes a TV, a tablet computer, and a speaker.
  • other logos are displayed on the edge of the circular icon 210 , and the mobile phone logo 207 is displayed at the center of the circular icon 211 .
  • the radius R1 of the circular icon 211 is smaller than the radius R2 of the circular icon 210 .
  • the connection between the mobile phone and the TV is established.
  • the connection between the mobile phone and the TV set may be realized through a server.
  • the mobile phone sends a connection request to the server, and the connection request carries the TV ID.
  • the server stores a device list such as Table 1 above, the server can check Table 1 to determine the connection address of the TV, and then send the connection address of the TV to the mobile phone.
  • the mobile phone is connected to the TV based on the connection address of the TV.
  • the TV logo 206 and the mobile phone logo 207 are displayed next to each other (such as being attached to the edge of the mobile phone logo 207), which means that the mobile phone is connected to the TV successfully. It can be understood that if the user still wants to connect the tablet computer to the mobile phone, then drag the tablet computer logo 208 to make it adsorb to the edge of the mobile phone logo 207 .
  • the operation process includes: unlocking the mobile phone (if the mobile phone is in the lock screen state), after unlocking the mobile phone, open the interface 204 shown in (d) in Figure 2 through a series of operations, and then in this interface 204, send the corresponding identification of the target device (such as a TV, a flat panel, a sound box) to the mobile phone
  • the logo dragging realizes the connection between the mobile phone and the target device. If the user wants to connect the mobile phone with multiple target devices, it is necessary to drag and drop the corresponding marks of the multiple target devices to the mobile phone mark one by one.
  • FIG. 3 is a schematic diagram of another communication system provided by an embodiment of the present application.
  • the communication system includes a server, four electronic devices, and a control device.
  • the four electronic devices are respectively exemplified by a TV set, a sound box, a mobile phone and a tablet computer.
  • the difference between the communication system shown in FIG. 3 and the communication system shown in FIG. 1 is that: the communication system shown in FIG. 3 includes not only the device shown in FIG. 1 but also a control device.
  • the control device can be used to control four electronic devices.
  • the control device may control the four electronic devices to enter the second state from the first state.
  • the first state may be a non-working state
  • the second state may be a working state.
  • the first state includes a locked screen state, a screen saver state, an unawakened state (or called an inactive state) and the like. If the first state is a locked screen state, correspondingly, the second state is an unlocked state. If the first state is a screen saver state, correspondingly, the second state is a working state. If the first state is an unawakened state (or called an inactive state), correspondingly, the second state is an awake state (or called an activated state).
  • the mobile phone when the user does not operate the mobile phone for a long time, the mobile phone can automatically lock the screen. If the user wants to continue to operate the phone, they can unlock it first. Therefore, for a mobile phone, the first state may be a locked screen state, including a locked screen with a black screen state and a locked screen with a bright screen state, and the second state is an unlocked state.
  • the notebook computer when the user does not operate the notebook computer for a long time, the notebook computer may automatically enter the screen saver state. When the notebook computer detects an operation (for example, any operation on the keyboard), cancel the screen saver state and enter the working state.
  • the first state may be a screen saver state
  • the second state may be a working state.
  • the speaker when the user does not use the speaker for a long time, the speaker is in a dormant state.
  • the speaker can be woken up by voice commands (for example, Xiaoai Xiaoai). Therefore, for the sound box, the first state may be a non-awake state, and the second state may be a wake-up state.
  • a possible implementation manner is that the four electronic devices in FIG. 3 log in to the same account, that is, the first account.
  • Authentication information is stored in the control device, and the authentication information may be obtained by encrypting the first account with the first key.
  • a second key is stored in the four electronic devices, and the second key corresponds to the first key.
  • the first key is an encryption key and the second key is a decryption key.
  • the four electronic devices can obtain the authentication information in the control device, use the second key to authenticate the authentication information, and enter the second state after the authentication is passed. This method will be introduced in detail later, and it is only briefly described here.
  • the mobile phone uses the second key to authenticate the authentication information, and after passing the authentication, the mobile phone is automatically unlocked. Therefore, if all four electronic devices pass the authentication of the authentication information, all four electronic devices enter the second state.
  • control device can realize the interconnection between four electronic devices. That is to say, the user does not need to perform an interactive operation (as shown in FIG. 2 ) on a certain device (such as a mobile phone) to realize connection with other devices, and the operation is convenient.
  • a possible implementation manner is that the four electronic devices in FIG. 3 log in to the same account, that is, the first account.
  • Authentication information is stored in the control device, and the authentication information may be obtained by encrypting the first account with the first key.
  • a second key is stored in the four electronic devices, and the second key corresponds to the first key.
  • the authentication information in the control device is provided by the server, and the second keys in the four electronic devices are also provided by the server.
  • the server also stores a list of devices related to the first account (as shown in Table 1 above).
  • the mobile phone obtains the authentication information in the control device, and after the authentication information is authenticated using the second key, it queries the server for the interconnection information of other devices (such as TVs, speakers, and tablet computers).
  • the information includes the connection addresses of other devices.
  • the mobile phone can connect with other devices based on the connection address.
  • the speaker obtains the authentication information in the control device, and after using the second key to authenticate the authentication information, it queries the server for the interconnection information of other devices (such as TVs, mobile phones, and tablet computers).
  • the interconnection information includes connection addresses of other devices.
  • the speaker can be connected with other devices based on the connection address. This method will be introduced in detail later, and it is only briefly described here.
  • the four electronic devices only need to obtain the authentication information in the control device and can automatically realize the interconnection after the authentication information is authenticated, and the user does not need to perform a series of operations on a certain device (as shown in Figure 2) to achieve communication with other devices.
  • the connection and operation of the equipment is convenient, which helps to improve the user experience.
  • control device may be various types of short-range communication devices.
  • an electronic tag tag
  • a Bluetooth (bluetooth, BT) device a near field communication (Near Field Communication, NFC) device
  • a wireless fidelity (wireless fidelity, Wi-Fi) device and the like.
  • the bluetooth device can broadcast authentication information
  • the four electronic devices are provided with bluetooth modules, which can be used to receive the authentication information.
  • NFC contact areas can be set on the four electronic devices. The user can touch or approach the NFC contact area on a certain device with the control device, so that the device can obtain the authentication information in the control device.
  • authentication information is stored in the electronic tag.
  • the four electronic devices are provided with readers, and the readers can read the authentication information in the electronic tags.
  • a reader also known as a reader, is a device that can obtain the data of an electronic tag. It can be used as a separate device or embedded in other devices or systems. For example, in Figure 3, readers are embedded in mobile phones, tablet computers, speakers, and televisions. Exemplarily, the reader can send a radio frequency signal to the electronic tag through the antenna on the reader, so as to query the electronic tag for data.
  • the electronic tag is a miniature wireless transceiver device, which mainly includes a built-in electronic tag antenna, a coupling element and a chip.
  • the chip has a storage space that can support the reader to read or write data. Authentication information is stored in the storage space.
  • the electronic tag After the electronic tag receives the radio frequency signal sent by the reader through the electronic tag antenna, it can couple the radio frequency signal through the coupling element, and then in the coupling channel, it can realize the energy supply to the chip of the electronic tag and the data stored in the chip ( That is, the authentication information) is fed back to the reader through the electronic tag antenna.
  • the electronic tag may be a radio frequency identification (Radio Frequency Identification, RFID) tag or other types of tags, which is not limited in this embodiment of the present application.
  • control device as an example of an electronic tag, but it is not limited that the control device must be an electronic tag, and it can also be a Bluetooth device, an NFC device, a WIFI device, and the like.
  • a first switch may be provided on the control device.
  • the first switch can be used to control the control device to be in the on state or in the off state.
  • other devices can read the authentication information in the control device, for example, the control device starts to broadcast the authentication information.
  • the control device is turned off, other electronic devices cannot read the authentication information in the control device, for example, the control device stops broadcasting the authentication information.
  • the first switch may be a physical switch, such as a physical key. If a touch screen is provided on the control device, the first switch may also be a touch key.
  • the control device can be independent of other electronic devices (such as mobile phones, tablet computers, speakers, televisions, etc.), or the control device can also be an electronic device (such as mobile phones, tablet computers, etc.) , speaker or television).
  • the mobile phone has the functions of the above-mentioned control device, such as controlling the four electronic devices in Figure 3 from the first state to the second state, and/or controlling the four electronic devices. electronic devices automatically connect.
  • the control device can be sold alone, or combined with a certain device (such as a mobile phone), or given as a gift, etc., which is not limited in this embodiment of the present application.
  • Fig. 4 shows a schematic structural diagram of an electronic device.
  • the electronic device may be a mobile phone, a tablet computer, a TV, etc. in FIG. 3 .
  • the electronic device may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (universal serial bus, USB) interface 130, a charging management module 140, a power management module 141, a battery 142, Antenna 1, antenna 2, mobile communication module 150, wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, earphone jack 170D, sensor module 180, button 190, motor 191, indicator 192, camera 193, A display screen 194, and a subscriber identification module (subscriber identification module, SIM) card interface 195, etc.
  • SIM subscriber identification module
  • the sensor module 180 may include a pressure sensor 180A, a gyroscope sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, an ambient light sensor 180L, bone conduction sensor 180M, etc.
  • the processor 110 may include one or more processing units, for example: the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processing unit (graphics processing unit, GPU), an image signal processor (image signal processor, ISP), controller, memory, video codec, digital signal processor (digital signal processor, DSP), baseband processor, and/or neural network processor (neural-network processing unit, NPU) wait.
  • application processor application processor
  • AP application processor
  • modem processor graphics processing unit
  • graphics processing unit graphics processing unit
  • ISP image signal processor
  • controller memory
  • video codec digital signal processor
  • DSP digital signal processor
  • baseband processor baseband processor
  • neural network processor neural-network processing unit, NPU
  • different processing units may be independent devices, or may be integrated in one or more processors.
  • the controller may be the nerve center and command center of the electronic equipment. The controller can generate an operation control signal according to the instruction opcode and timing signal, and complete the control of fetching and executing the instruction.
  • a memory may also be provided in the processor 110 for storing instructions and data.
  • the memory in processor 110 is a cache memory.
  • the memory may hold instructions or data that the processor 110 has just used or recycled. If the processor 110 needs to use the instruction or data again, it can be called directly from the memory. Repeated access is avoided, reducing the waiting time of the processor 110, thus improving the efficiency of the system.
  • the USB interface 130 is an interface conforming to the USB standard specification, specifically, it can be a Mini USB interface, a Micro USB interface, a USB Type C interface, and the like.
  • the USB interface 130 can be used to connect a charger to charge the electronic device, and can also be used to transmit data between the electronic device and peripheral devices.
  • the charging management module 140 is configured to receive a charging input from a charger.
  • the power management module 141 is used for connecting the battery 142 , the charging management module 140 and the processor 110 .
  • the power management module 141 receives the input from the battery 142 and/or the charging management module 140 to provide power for the processor 110 , the internal memory 121 , the external memory, the display screen 194 , the camera 193 , and the wireless communication module 160 .
  • the wireless communication function of the electronic device can be realized by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, the modem processor and the baseband processor.
  • Antenna 1 and Antenna 2 are used to transmit and receive electromagnetic wave signals.
  • Each antenna in an electronic device can be used to cover a single or multiple communication frequency bands. Different antennas can also be multiplexed to improve the utilization of the antennas.
  • Antenna 1 can be multiplexed as a diversity antenna of a wireless local area network.
  • the antenna may be used in conjunction with a tuning switch.
  • the mobile communication module 150 can provide wireless communication solutions including 2G/3G/4G/5G applied to electronic devices.
  • the mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (low noise amplifier, LNA) and the like.
  • the mobile communication module 150 can receive electromagnetic waves through the antenna 1, filter and amplify the received electromagnetic waves, and send them to the modem processor for demodulation.
  • the mobile communication module 150 can also amplify the signals modulated by the modem processor, and convert them into electromagnetic waves through the antenna 1 for radiation.
  • at least part of the functional modules of the mobile communication module 150 may be set in the processor 110 .
  • at least part of the functional modules of the mobile communication module 150 and at least part of the modules of the processor 110 may be set in the same device.
  • the wireless communication module 160 can provide wireless local area networks (wireless local area networks, WLAN) (such as wireless fidelity (Wi-Fi) network), bluetooth (bluetooth, BT), global navigation satellite system, etc. (global navigation satellite system, GNSS), frequency modulation (frequency modulation, FM), near field communication technology (near field communication, NFC), infrared technology (infrared, IR) and other wireless communication solutions.
  • the wireless communication module 160 may be one or more devices integrating at least one communication processing module.
  • the wireless communication module 160 receives electromagnetic waves via the antenna 2 , frequency-modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 110 .
  • the wireless communication module 160 can also receive the signal to be sent from the processor 110 , frequency-modulate it, amplify it, and convert it into electromagnetic waves through the antenna 2 for radiation.
  • the antenna 1 of the electronic device is coupled to the mobile communication module 150, and the antenna 2 is coupled to the wireless communication module 160, so that the electronic device can communicate with the network and other devices through wireless communication technology.
  • the wireless communication technology may include global system for mobile communications (GSM), general packet radio service (general packet radio service, GPRS), code division multiple access (code division multiple access, CDMA), broadband Code division multiple access (wideband code division multiple access, WCDMA), time division code division multiple access (time-division code division multiple access, TD-SCDMA), long term evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC , FM, and/or IR techniques, etc.
  • GSM global system for mobile communications
  • general packet radio service general packet radio service
  • CDMA code division multiple access
  • WCDMA broadband Code division multiple access
  • time division code division multiple access time-division code division multiple access
  • TD-SCDMA time-division code division multiple access
  • LTE long term evolution
  • BT GNSS
  • the GNSS may include a global positioning system (global positioning system, GPS), a global navigation satellite system (global navigation satellite system, GLONASS), a Beidou navigation satellite system (beidou navigation satellite system, BDS), a quasi-zenith satellite system (quasi -zenith satellite system (QZSS) and/or satellite based augmentation systems (SBAS).
  • GPS global positioning system
  • GLONASS global navigation satellite system
  • Beidou navigation satellite system beidou navigation satellite system
  • BDS Beidou navigation satellite system
  • QZSS quasi-zenith satellite system
  • SBAS satellite based augmentation systems
  • the display screen 194 is used to display the display interface of the application and the like.
  • the display screen 194 includes a display panel.
  • the display panel can be a liquid crystal display (LCD), an organic light-emitting diode (OLED), an active matrix organic light emitting diode or an active matrix organic light emitting diode (active-matrix organic light emitting diode, AMOLED), flexible light-emitting diode (flex light-emitting diode, FLED), Miniled, MicroLed, Micro-oLed, quantum dot light emitting diodes (quantum dot light emitting diodes, QLED), etc.
  • the electronic device may include 1 or N display screens 194, where N is a positive integer greater than 1.
  • the electronic device 100 can realize the shooting function through the ISP, the camera 193 , the video codec, the GPU, the display screen 194 and the application processor.
  • the ISP is used for processing the data fed back by the camera 193 .
  • the light is transmitted to the photosensitive element of the camera through the lens, and the light signal is converted into an electrical signal, and the photosensitive element of the camera transmits the electrical signal to the ISP for processing, and converts it into an image visible to the naked eye.
  • ISP can also perform algorithm optimization on image noise, brightness, and skin color.
  • ISP can also optimize the exposure, color temperature and other parameters of the shooting scene.
  • the ISP may be located in the camera 193 .
  • Camera 193 is used to capture still images or video.
  • the object generates an optical image through the lens and projects it to the photosensitive element.
  • the photosensitive element may be a charge coupled device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor.
  • CMOS complementary metal-oxide-semiconductor
  • the photosensitive element converts the light signal into an electrical signal, and then transmits the electrical signal to the ISP to convert it into a digital image signal.
  • the ISP outputs the digital image signal to the DSP for processing.
  • DSP converts digital image signals into standard RGB, YUV and other image signals.
  • the electronic device may include 1 or N cameras 193, where N is a positive integer greater than 1.
  • the internal memory 121 may be used to store computer-executable program codes including instructions.
  • the processor 110 executes various functional applications and data processing of the electronic device by executing instructions stored in the internal memory 121 .
  • the internal memory 121 may include an area for storing programs and an area for storing data.
  • the storage program area can store the operating system and software codes of at least one application program (such as iQiyi application, WeChat application, etc.).
  • the data storage area can store data (such as images, videos, etc.) generated during the use of the electronic device.
  • the internal memory 121 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, flash memory device, universal flash storage (universal flash storage, UFS) and the like.
  • the external memory interface 120 can be used to connect an external memory card, such as a Micro SD card, to expand the storage capacity of the electronic device.
  • the external memory card communicates with the processor 110 through the external memory interface 120 to implement a data storage function. For example, save pictures, videos and other files in the external memory card.
  • the electronic device can implement audio functions through the audio module 170, the speaker 170A, the receiver 170B, the microphone 170C, the earphone interface 170D, and the application processor. Such as music playback, recording, etc.
  • the pressure sensor 180A is used to sense the pressure signal and convert the pressure signal into an electrical signal.
  • pressure sensor 180A may be disposed on display screen 194 .
  • the gyro sensor 180B can be used to determine the motion posture of the electronic device.
  • the angular velocity of the electronic device about three axes ie, x, y, and z axes
  • the gyro sensor 180B can be used for image stabilization.
  • the air pressure sensor 180C is used to measure air pressure.
  • the electronic device calculates the altitude through the air pressure value measured by the air pressure sensor 180C to assist in positioning and navigation.
  • the magnetic sensor 180D includes a Hall sensor.
  • the electronic device may detect opening and closing of the flip holster using the magnetic sensor 180D.
  • the electronic device when the electronic device is a flip machine, the electronic device can detect opening and closing of the flip according to the magnetic sensor 180D.
  • the acceleration sensor 180E can detect the acceleration of the electronic device in various directions (generally three axes).
  • the magnitude and direction of gravity can be detected when the electronic device is stationary. It can also be used to identify the posture of electronic devices, and can be used in applications such as horizontal and vertical screen switching, pedometers, etc.
  • the distance sensor 180F is used to measure the distance.
  • Electronic devices can measure distance via infrared or laser light. In some embodiments, when shooting a scene, the electronic device can use the distance sensor 180F to measure the distance to achieve fast focusing.
  • Proximity light sensor 180G may include, for example, light emitting diodes (LEDs) and light detectors, such as photodiodes.
  • the light emitting diodes may be infrared light emitting diodes.
  • Electronic devices emit infrared light outwards through light-emitting diodes.
  • Electronic devices use photodiodes to detect infrared reflected light from nearby objects. When sufficient reflected light is detected, it can be determined that there is an object in the vicinity of the electronic device.
  • the electronic device may determine that there is no object in the vicinity of the electronic device.
  • the electronic device can use the proximity light sensor 180G to detect that the user holds the electronic device close to the ear to make a call, so as to automatically turn off the screen to save power.
  • the proximity light sensor 180G can also be used in leather case mode, automatic unlock and lock screen in pocket mode.
  • the ambient light sensor 180L is used for sensing ambient light brightness.
  • the electronic device can adaptively adjust the brightness of the display screen 194 according to the perceived ambient light brightness.
  • the ambient light sensor 180L can also be used to automatically adjust the white balance when taking pictures.
  • the ambient light sensor 180L can also cooperate with the proximity light sensor 180G to detect whether the electronic device is in the pocket to prevent accidental touch.
  • the fingerprint sensor 180H is used to collect fingerprints. Electronic devices can use the collected fingerprint features to unlock fingerprints, access application locks, take pictures with fingerprints, answer incoming calls with fingerprints, etc.
  • the temperature sensor 180J is used to detect temperature.
  • the electronic device uses the temperature detected by the temperature sensor 180J to implement a temperature treatment strategy. For example, when the temperature reported by the temperature sensor 180J exceeds a threshold, the electronic device may reduce the performance of a processor located near the temperature sensor 180J, so as to reduce power consumption and implement thermal protection.
  • the electronic device when the temperature is lower than another threshold, the electronic device heats the battery 142 to avoid abnormal shutdown of the electronic device caused by low temperature.
  • the electronic device boosts the output voltage of the battery 142 to avoid abnormal shutdown caused by low temperature.
  • Touch sensor 180K also known as "touch panel”.
  • the touch sensor 180K can be disposed on the display screen 194, and the touch sensor 180K and the display screen 194 form a touch screen, also called a “touch screen”.
  • the touch sensor 180K is used to detect a touch operation on or near it.
  • the touch sensor can pass the detected touch operation to the application processor to determine the type of touch event.
  • Visual output related to the touch operation can be provided through the display screen 194 .
  • the touch sensor 180K may also be disposed on the surface of the electronic device, which is different from the position of the display screen 194 .
  • the bone conduction sensor 180M can acquire vibration signals.
  • the bone conduction sensor 180M can acquire the vibration signal of the vibrating bone mass of the human voice.
  • the bone conduction sensor 180M can also contact the human pulse and receive the blood pressure beating signal.
  • the keys 190 include a power key, a volume key and the like.
  • the key 190 may be a mechanical key. It can also be a touch button.
  • the electronic device can receive key input and generate key signal input related to user settings and function control of the electronic device.
  • the motor 191 can generate a vibrating reminder.
  • the motor 191 can be used for incoming call vibration prompts, and can also be used for touch vibration feedback. For example, touch operations applied to different applications (such as taking pictures, playing audio, etc.) may correspond to different vibration feedback effects.
  • the indicator 192 can be an indicator light, and can be used to indicate charging status, power change, and can also be used to indicate messages, missed calls, notifications, and the like.
  • the SIM card interface 195 is used for connecting a SIM card. The SIM card can be inserted into the SIM card interface 195 or pulled out from the SIM card interface 195 to realize contact and separation with the electronic device.
  • Readers are also included in electronic devices.
  • the reader can send a radio frequency signal to the electronic tag through the antenna on the reader to inquire data from the electronic tag.
  • FIG. 4 do not constitute a specific limitation on the electronic device.
  • the electronic device in the embodiment of the present invention may include more or less components than those shown in FIG. 4 .
  • the combination/connection relationship between the components in Fig. 4 can also be adjusted and modified.
  • Fig. 5 is a schematic flowchart of a device control method provided by an embodiment of the present application. This method may be applicable to the application scenario shown in FIG. 3 or similar application scenarios.
  • the scenario includes distributed devices (such as mobile phones, TV sets, tablet computers, speakers, etc.) and servers.
  • the server included in the process shown in FIG. 5 may be the server in FIG. 3
  • the first electronic device and the second electronic device are respectively one of the distributed devices.
  • the first electronic device may be the control device in FIG. 3
  • the second electronic device may be the mobile phone, television, tablet computer or sound box in FIG. 3 .
  • the process includes:
  • the second electronic device is activated through the first account.
  • the first account may be a system account, for example, a mobile phone number, email address, etc. may be used as the system account.
  • the second electronic device as an example of a Huawei device
  • the first account may be Jack@huawei.com
  • the server may be a Huawei server, such as Huawei Cloud. That is to say, the second electronic device is activated on the HUAWEI CLOUD side through the Jack@huawei.com account.
  • the server stores a device list corresponding to the first account.
  • the second electronic device may report its device identification to the server when it is activated or after activation.
  • the device identification of the second electronic device may be included in the device list stored on the server side.
  • the device identification includes device model, product serial number, device type (mobile phone, tablet computer, etc.), etc., which are not limited in this embodiment of the present application.
  • the second electronic device may also report its connection address to the server when activated or after activation.
  • the device list may also include the connection address corresponding to the second electronic device, for example, the address corresponding to the first account.
  • Table 2 The list of equipment is shown in Table 2:
  • Table 2 Device list corresponding to the first account
  • Table 2 above also includes the device identifier and connection address of the third electronic device.
  • the server provides authentication information to the first electronic device.
  • the server generates authentication information based on the first account.
  • the server encrypts the first account to obtain the authentication information, for example, encrypts the first account by using the first key.
  • the first key may be a private key of the server.
  • the first password may be a symmetric key or an asymmetric key, which is not limited in this embodiment of the present application.
  • the authentication information may be an encrypted file such as a digital signature (signature) or a public key infrastructure (public key infrastructure, PKI) certificate.
  • a digital signature as an example, it can be a serial number of various types such as a digital string, a character string, or a combination of numbers and characters.
  • the server uses an encryption algorithm to calculate the first key and the first account to obtain a digital signature, that is, the digital signature is used as an output of the encryption algorithm, and the input of the encryption algorithm includes the first account, the first key, and the like.
  • the encryption algorithm may be, for example, a hash (hash) algorithm, etc., which are not limited in this application.
  • a hash (hash) algorithm etc.
  • a PKI certificate included in a PKI certificate is a signature generated by the signer using the signer's private key, which can be verified by the verifier using the signer's public key.
  • the signer may be a trusted third party, for example, the server in this application, that is, the issuing authority of the PKI certificate.
  • a verifier may be a device that has the signer's public key. That is to say, in this application, the server provides the PKI certificate to the first electronic device, and the verifier (such as the second electronic device) obtains the PKI certificate from the first electronic device for signature verification.
  • the authentication information is a digital signature and KPI certificate as an example. It is understandable that the authentication information can also be other types of encrypted files, as long as the verifier can authenticate the authentication information. This application does not Define its type.
  • the server After the server generates the authentication information, it provides the authentication information to the first electronic device, including at least one of the following manner A or manner B.
  • the server actively provides authentication information to the first electronic device. For example, when two devices (such as a second electronic device and a third electronic device) are activated on the server side using the first account, the server generates authentication information and provides the authentication information to the first electronic device. Because when two devices are activated with the same account, there is a high probability that they are two devices of the same user, and the user may need to connect the two devices, so authentication information is provided to facilitate the connection of the two devices (will be described in introduced later).
  • two devices such as a second electronic device and a third electronic device
  • the server provides authentication information to the first electronic device after receiving the application information.
  • the application information is used to apply for authentication information corresponding to the first account.
  • the application information includes the first account number.
  • the application information may be sent by the second electronic device, may also be sent by the third electronic device, or may be sent by other electronic devices related to the first account, or the user may go to the offline sales platform to manually Enter the application information in the server.
  • the process of sending the application information by the second electronic device includes but is not limited to Figure 6A to Figure 6B below, in Figure 6A to Figure 6B the first
  • the second electronic device is a mobile phone as an example.
  • the mobile phone displays a main interface 201 .
  • the main interface includes a setting icon 601 .
  • a setting interface 602 as shown in (b) of FIG. 6A is displayed.
  • the interface 602 includes an account option 603 .
  • an interface as shown in (c) in FIG. 6A is displayed, and the interface includes a first account such as Jack.huawei.com.
  • an interface as shown in (d) of FIG. 6A is displayed, which includes label authentication services, prompt information of the current state (such as unapplied) and button 606 .
  • buttons 606 When the operation for button 606 is detected, an interface as shown in (e) in Figure 6A is displayed, the first account number is displayed in this interface, and detailed introduction (for introducing the specific content of the label authentication service to the user), also includes Button to submit application.
  • the button for submitting an application When the operation of the button for submitting an application is detected, the application information is sent to the server.
  • the mobile phone displays a font selection interface. Assuming that the user selects a simplified Chinese font, the mobile phone enters the interface shown in Figure 6B (b), which is an account login interface. After the user enters the account number and password, Click to log in, and the mobile phone displays the interface shown in (c) in Figure 6B, which includes the account number already logged in, and the button to submit the application. When the operation of the button for submitting the application is detected, the application information is sent to the server, and then The interface shown in (d) in FIG. 6B is displayed, and the interface displays a prompt message that the activation is completed. It should be noted that, continuing to refer to (c) in FIG.
  • the interface in (d) in FIG. 6B is directly displayed. That is to say, the user can choose to apply for a label during the activation process, or not to apply for a label during the activation process. If the user wants to apply after the activation is completed, he can use the method shown in FIG. 6A to apply in the setting application.
  • FIG. 6A and FIG. 6B are two different application methods, Fig. 6B is to apply when the second electronic device is activated, and Fig. 6A is to apply after the second electronic device is activated (for example, it has been used for a period of time). It should be understood that FIG. 6A and FIG. 6B are examples of the two application processes, and the application may also be performed on other interfaces or key-press methods, which are not limited in this embodiment of the present application.
  • the label authentication service may also be a payment service.
  • (a) in 7, is the application interface for the label authentication service.
  • the mobile phone detects the operation of the button for submitting the application, it will display the interface shown in (b) in Figure 7, which shows Fee information and payment methods, including method 1 and method 2, for example, method 1 is Huawei Wallet, and method 2 is bank card.
  • the mobile phone detects the operation of selecting mode 1
  • the interface shown in (c) in Figure 7 is displayed, and the gesture payment window is displayed in the interface.
  • the mobile phone detects the preset gesture operation the fee payment is completed, as shown in Figure 7
  • the interface shown in (d) which displays prompt information of payment completion or successful application.
  • the first electronic device may be an electronic tag, a Bluetooth device, a WIFI device, or the like.
  • the server may provide authentication information to the electronic tag by manually injecting (or embedding) the authentication information into the electronic tag after the server generates the authentication information.
  • the server may provide authentication information to the electronic tag by sending the authentication information to the WIFI device.
  • the second electronic device acquires authentication information from the first electronic device.
  • the reader in the second electronic device can read the authentication information in the electronic tag.
  • the second electronic device authenticates the authentication information.
  • the second electronic device uses the second key to decrypt the authentication information, if the decryption is successful, the verification is passed, and if the decryption fails, the verification is not passed.
  • the second key may be obtained by the second electronic device from the server.
  • the second key corresponds to the aforementioned first key, and can decrypt the first key.
  • the first key is the private key of the server
  • the second key may be the public key of the server. That is to say, the server provides the second electronic device with the second key, and provides the first electronic device with authentication information encrypted with the first key.
  • the second electronic device can use its second key to decrypt the authentication information.
  • only the electronic device with the second key can successfully decrypt the authentication information. Even if the device without the second key can obtain the authentication information, it cannot decrypt it, so it cannot automatically enter the second state and/or automatically Connection with other devices (such as a third electronic device), so that the privacy of other devices can be guaranteed.
  • the second electronic device uses the second key to decrypt the verification. If the decryption fails, the authentication fails. If the decryption succeeds, the first account in the authentication information is obtained, and the first account is further judged. Whether it is related to the second electronic device, if related, the authentication is passed, otherwise, the authentication is not passed.
  • the first account is related to the second electronic device, including at least one of the following situations: the current login account of the second electronic device is the first account, and the activation account of the second electronic device is the first account. The difference from the previous method is that in this method, even if the device with the second key successfully decrypts the authentication information, it does not necessarily mean that the verification is passed.
  • the verification is passed. In this way, if a device is not related to the first account, even if the device has stolen the second key, it cannot be authenticated and cannot be connected to other devices (such as the third electronic device) corresponding to the first account, ensuring that the third electronic Device information security.
  • S507 may be executed, and/or, S508-S510 may be executed.
  • the second electronic device switches from the first state to the second state.
  • the first state is a non-working state
  • the second state is a working state.
  • the second electronic device queries the server for the connection address of the third electronic device.
  • the server feeds back the connection address of the third electronic device to the second electronic device.
  • the second electronic device establishes a connection with the third electronic device based on the connection address of the third electronic device.
  • one implementable manner of S507 is that the second electronic device sends the first information to the server, and the first information may be indication information used to indicate that the second electronic device passes the authentication of the authentication information, that is, through the first information Prove to the server that the authentication information provided by the second electronic device to the first electronic device has passed the authentication.
  • the first information may also be interconnection information of the second electronic device, and the interconnection information includes the device identifier and connection address of the second device.
  • the server After receiving the first information, the server sends the connection address of the third electronic device to the server. It should be noted that in addition to the second electronic device and the third electronic device, there may be more device information in the device list corresponding to the first account stored in the server (eg, the above Table 1). Therefore, the server may send the connection addresses of all devices except the second electronic device in the device list to the second electronic device. In this way, the second electronic device can be connected to all the remaining devices except the second electronic device among all the devices related to the first account.
  • S505 only S506 may be executed, and S507-S509 may not be executed, that is, when the second electronic device passes the authentication of the authentication information, it enters the second state and does not execute the communication with the third electronic device.
  • the connection process of the device after S505, S508-S510 can also be executed directly without executing S507, that is, when the second electronic device passes the authentication of the authentication information, it directly queries the server for the connection address of the third electronic device so as to communicate with the third electronic device.
  • the electronic device establishes the connection.
  • both S506 and S507-S509 can be executed.
  • S506 and S507-S509 are executed, the order of execution is not limited. For example, after S505, S507-S509 can be executed first, and then Execute S506, or execute S506 first, then execute S507-S509, and so on.
  • the second electronic device may display relevant information of the third electronic device, such as historical playback records and historical operation interfaces of the third electronic device.
  • the second electronic device as a mobile phone and the third electronic device as a TV set as an example
  • the mobile phone passes the authentication of the authentication information, it automatically enters the second state, and at this time, it can display the latest playing records of the TV set (for example, TV dramas, movies, etc. wait).
  • the TV reports historical playback records, historical operation interfaces, etc. to the server, and the second electronic device obtains the third electronic device from the server to obtain these information.
  • the second electronic device is connected to the third electronic device to obtain the historical playback records, historical operation interface, etc.
  • the second electronic device can automatically enter the second state and display the relevant information of the third electronic device, without the user manually controlling the second electronic device to enter the second state, and the user does not need to manually switch the second electronic device to the second state.
  • Connect with the third electronic device and project the relevant information of the third electronic device to the second electronic device for display through manual operation, which is convenient to operate and helps to improve user experience.
  • connection may also be disconnected.
  • the user performs operations on the second electronic device or the third electronic device to interrupt the connection, for example, turning off the wireless connection function of the second electronic device so that it cannot be connected to the third electronic device or the second electronic device
  • a button can be set on the electronic device to interrupt the connection with the third electronic device and the like.
  • the user may interrupt the connection between the second electronic device and the third electronic device through the first electronic device.
  • the first electronic device is provided with a second control, and when the first electronic device detects that the second control is triggered, it can send an instruction to the server, and the instruction is used to indicate that the connection between the second electronic device and the third electronic device is interrupted. .
  • the server sends the instruction to the second electronic device or the third electronic device to instruct it to terminate the connection with the other party.
  • the second control and the above-mentioned first control may be the same control or different controls, and may be physical buttons or touch buttons or the like. In this manner, the user can realize the automatic disconnection of the two devices by operating the controls on the first electronic device, and the operation is relatively convenient.
  • the distributed device includes the second electronic device and the third electronic device as an example.
  • a new device may also be added to the distributed device, for example, a fifth electronic device may be added.
  • One way of adding is that the fifth electronic device uses the first account to activate to the server, so that the server adds the device identifier and connection address of the fifth electronic device to the device list (such as the above table 2) corresponding to the first account.
  • the server may issue a second key to the fifth electronic device, where the second key is used to decrypt the first key. After the fifth electronic device obtains the second key, it can authenticate the authentication information of the first electronic device.
  • a device newly added to the distributed device can obtain the second key used to authenticate the authentication information, so that the newly added device can also realize automatic unlocking or activation, and/or automatically communicate with other devices (for example, the connection of the second electronic device or the third electronic device).
  • the fifth electronic device is disassociated from the first account, for example, the first account is logged out or the fifth electronic device is reactivated with another account after the fifth electronic device is restored to the factory. In this way, the information of the fifth electronic device is deleted from the device list corresponding to the first account recorded in the server (eg, the above-mentioned Table 2). It should be noted that before the fifth electronic device exits the distributed device, in order for the fifth electronic device to authenticate the authentication information, the server sends the second key to the fifth electronic device for authenticating the authentication information.
  • the server may send a third key to other devices that have not been disassociated from the first account, and the third key is different from the second key.
  • other devices that have not been disassociated from the first account can use the third key to authenticate the authentication information, so as to avoid leakage of privacy of the other devices.
  • a possible application scenario related to the device control method provided in this application is that the user purchases a second electronic device (such as a mobile phone) and uses the first account to activate it.
  • the user wants to apply for the label authentication service after using it for a period of time, for example, by applying in the manner shown in FIG. 6A .
  • the server may provide verification information to the first electronic device.
  • the seller knows which user has applied for verification information through the server, and can mail the first electronic device to the user (for example, the application interface can include the user's address and phone number), or can call the user to pick up the first electronic device at a designated place.
  • Electronic equipment for example, the application interface includes the user's mobile phone number), etc.
  • Another possible application scenario is that the first electronic device is sold together with the second electronic device; or, the user buys the second electronic device and gives the first electronic device as a gift. That is to say, the user already owns the second electronic device and the first electronic device at the same time, the second electronic device has not been activated at this time, and there is no verification information in the first electronic device. The user activates the second electronic device by using the first account. After receiving the application information of the second electronic device, the server sends verification information to the first electronic device. In this way, the user can use the first electronic device to control the second electronic device.
  • FIG. 8 is a schematic structural diagram of an electronic device 800 provided by an embodiment of the present application.
  • the electronic device 800 may be the first electronic device, the second electronic device or the server mentioned above.
  • an electronic device 800 may include: one or more processors 801; one or more memories 802; a communication interface 803, and one or more computer programs 804, and each of the above devices may communicate through one or more bus 805 connection.
  • the one or more computer programs 804 are stored in the memory 802 and configured to be executed by the one or more processors 801, the one or more computer programs 804 include instructions.
  • the instruction may be used to execute the relevant steps of the first electronic device in the above corresponding embodiments.
  • the instruction may be used to execute the relevant steps of the second electronic device in the above corresponding embodiments.
  • the instruction may be used to execute the relevant steps of the server in the above corresponding embodiments.
  • the communication interface 803 is used to implement communication between the electronic device 800 and other devices, for example, the communication interface may be a transceiver.
  • the embodiment of the present application also provides a communication system.
  • the communication system includes a first electronic device, a second electronic device and a server.
  • the structures of the first electronic device and the second electronic device can be referred to as shown in FIG. 8 .
  • the electronic device 800 shown in FIG. 8 is the first electronic device, when the instructions of one or more computer programs 804 are executed by the processor, the first electronic device performs the first electronic device as shown in FIG. 5 above. Steps of electronic devices.
  • the electronic device 800 shown in FIG. 8 is a second electronic device, when the instructions of one or more computer programs 804 are executed by the processor, the second electronic device performs the second electronic device as shown in FIG. 5 above. Steps of electronic devices.
  • the electronic device 800 shown in FIG. 8 is a server, when the instructions of one or more computer programs 804 are executed by the processor, the server is made to perform the steps of the server in FIG. 5 above.
  • the methods provided in the embodiments of the present application are introduced from the perspective of an electronic device (such as a mobile phone) as an execution subject.
  • the electronic device may include a hardware structure and/or a software module, and realize the above-mentioned functions in the form of a hardware structure, a software module, or a hardware structure plus a software module. Whether one of the above-mentioned functions is executed in the form of a hardware structure, a software module, or a hardware structure plus a software module depends on the specific application and design constraints of the technical solution.
  • the terms “when” or “after” may be interpreted to mean “if” or “after” or “in response to determining" or “in response to detecting ".
  • the phrases “in determining” or “if detected (a stated condition or event)” may be interpreted to mean “if determining" or “in response to determining" or “on detecting (a stated condition or event)” or “in response to detecting (a stated condition or event)”.
  • relational terms such as first and second are used to distinguish one entity from another, without limiting any actual relationship and order between these entities.
  • references to "one embodiment” or “some embodiments” or the like in this specification means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application.
  • appearances of the phrases “in one embodiment,” “in some embodiments,” “in other embodiments,” “in other embodiments,” etc. in various places in this specification are not necessarily All refer to the same embodiment, but mean “one or more but not all embodiments” unless specifically stated otherwise.
  • the terms “including”, “comprising”, “having” and variations thereof mean “including but not limited to”, unless specifically stated otherwise.
  • all or part of them may be implemented by software, hardware, firmware or any combination thereof.
  • software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present invention will be generated in whole or in part.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server or data center Transmission to another website site, computer, server, or data center by wired (eg, coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media.
  • the available medium may be a magnetic medium (for example, a floppy disk, a hard disk, or a magnetic tape), an optical medium (for example, DVD), or a semiconductor medium (for example, a Solid State Disk (SSD)).
  • a magnetic medium for example, a floppy disk, a hard disk, or a magnetic tape
  • an optical medium for example, DVD
  • a semiconductor medium for example, a Solid State Disk (SSD)

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephonic Communication Services (AREA)

Abstract

一种设备控制方法与相关设备。服务器向第一电子设备提供认证信息,其中,所述认证信息是基于第一账号生成的;所述第二电子设备从所述第一电子设备处获取所述认证信息;所述第二电子设备对所述认证信息进行认证,并在认证通过时,执行如下步骤:从非工作状态切换到工作状态;和/或,向所述服务器查询与所述第一账号相关的第三电子设备的连接地址,并基于查询到的所述第三电子设备的连接地址与所述第三电子设备建立连接。通过这种方式可以实现设备快速进入工作状态和/或与其它设备的连接,操作便捷。

Description

一种设备控制方法与相关设备
相关申请的交叉引用
本申请要求在2021年10月26日提交中国专利局、申请号为202111246648.3、申请名称为“一种设备控制方法与相关设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及终端技术领域,尤其涉及一种设备控制方法与相关设备。
背景技术
随着终端技术的进步,多设备互联互通的场景越来越多。比如,智能家居场景中,家庭中多个家电设备之间可以互联互通,如,电视机与手机连接,手机与智能冰箱连接等等。
一般来说,如果用户想要将多个设备连接,需要执行多个步骤。以设备1、设备2和设备3这三个设备为例,假设这三个设备都是手机,并且均处于锁屏状态,用户需要将这三个设备分别解锁,然后在设备1上执行操作实现与设备2、设备3的连接,而且,还需要在设备2上执行操作实现与设备3的连接。可见,目前的多设备互联互通场景中,用户操作较为繁琐,体验较差。
发明内容
本申请提供了一种设备控制方法以及相关设备,用于提升多设备互联互通场景中用户操作的便捷性。
第一方面,提供一种设备控制方法,应用于包括第一电子设备、第二电子设备以及服务器的系统。服务器向所述第一电子设备提供认证信息,所述认证信息是基于第一账号生成的;所述从所述第一电子设备处获取所述认证信息;所述第二电子设备对所述认证信息进行认证,并在认证通过时,执行如下步骤:
从非工作状态切换到工作状态;和/或,
向所述服务器查询第三电子设备的连接地址,并基于查询到的所述第三电子设备的连接地址与所述第三电子设备建立连接,所述第三电子设备与所述第一账号相关。
也就是说,本申请实施例中,第二电子设备可以从第一电子设备获取认证信息并进行认证,在认证通过时,可以自动进入工作状态,和/或,自动与第三电子设备连接。如此,不需要用户手动的在第二电子设备上解锁,并且在第二电子设备上进行一系列操作实现与第三电子设备的连接,操作便捷,有助于用户体验较好。
一种可能的设计中,所述认证信息是所述服务器基于第一密钥对所述第一账号进行加密生成的,所述第二电子设备对所述认证信息进行认证,包括:所述第二电子设备从所述服务器获取与所述第一密钥对应的第二密钥;第二电子设备使用所述第二密钥对所述认证信息进行解密,若解密成功,则认证通过,若解密失败,则认证不通过。也就是说,只有具有能够对认证信息进行解密的第二密钥的设备才能实现自动进入工作状态,和/或,自动 与其它设备(与第一账号相关的设备)连接。这种方式,安全性较高,避免没有第二密钥的设备自动与所述其它设备连接,造成用户隐私的泄露。
一种可能的设计中,所述认证信息是所述服务器基于第一密钥对所述第一账号进行加密生成的,所述第二电子设备对所述认证信息进行认证,包括:所述第二电子设备从所述服务器获取与所述第一密钥对应的第二密钥;所述第二电子设备使用所述第二密钥对所述认证信息进行解密,获得所述第一账号;所述第二电子设备确定所述第一账号与所述第一电子设备相关时,认证通过,否则,认证不通过。也就是说,一个设备只有对认证信息解密成功并且与第一账号相关,才能实现自动进入工作状态,和/或,自动与其它设备(与第一账号相关的设备)连接。这种方式,安全性较高,可以避免盗用第二密钥的与第一账号无关的设备自动与所述其它设备连接,造成用户隐私的泄露。
一种可能的设计中,所述第一账号与所述第二电子设备相关,包括如下至少一种情况:所述第二电子设备当前登录账号为所述第一账号;所述第二电子设备的激活账号为所述第一账号。
一种可能的设计中,在所述服务器向所述第一电子设备提供认证信息之前,还包括:所述服务器接收到第四电子设备的申请信息,所述申请信息用于申请与所述第一账号对应的认证信息;其中,所述第四电子设备与所述第二电子设备是同一设备,或者,所述第四电子设备与所述第三电子设备是同一设备;或者,所述第四电子设备是与所述第一账号相关且与所述第二电子设备和所述第三电子设备均不同的设备。
举例来说,服务器向第一电子设备提供认证信息作为一种标签认证业务,需要在用户申请的情况下才进行。比如,用户使用第四电子设备申请了该业务,那么服务器向第一电子设备提供认证信息。这种方式,在用户有需求的情况下才进行,在满足用户需求的同时还可以节省工作量。
一种可能的设计中,所述方法还包括:所述第四电子设备响应于第一操作,显示第一界面,所述第一界面中包括所述第一账号以及申请按键;所述第四电子设备检测到针对所述申请按键的第二操作时,向所述服务器发送所述申请信息。
举例来说,以第四电子设备是手机为例,用户可以在手机上申请标签认证业务,操作便捷。当用户申请了该业务,服务器向第一电子设备提供认证信息,用户家里的设备(比如电视机、手机、音箱等)可以通过第一电子设备实现自动进入工作状态和/或自动实现多设备互联。
在一种可能的设计中,所述第四电子设备检测到针对所述申请按键的第二操作时,向所述服务器发送所述申请信息,包括:所述第四电子设备检测到针对所述申请按键的第二操作时,显示第二界面,所述第二界面中包括待支付费用的提示信息;所述第四电子设备检测到所述费用支付完成时,向所述服务器发送所述申请信息。也就是说,标签认证业务是付费业务,在用户支付费用之后,服务器向第一电子设备提供认证信息,用户家里的设备(比如电视机、手机、音箱等)可以通过第一电子设备实现自动进入工作状态和/或自动实现多设备互联。
在一种可能的设计中,所述第二电子设备向所述服务器查询第三电子设备的连接地址,包括:所述第二电子设备向所述服务器发送指示信息,所述指示信息用于指示所述第二电子设备对所述认证信息认证通过;所述服务器对所述第二电子设备进行身份验证,并在验证通过之后,向所述第二电子设备发送所述第三电子设备的连接地址。
需要说明的是,有的设备可能会盗用第二电子设备中的第二密钥,并使用该第二密钥对认证信息进行解密,然后向服务器发送指示信息。如果服务器向该盗用第二密钥的设备发送了第三电子设备的连接地址,容易造成第三电子设备的隐私泄露。因此,服务器接收到一个设备上报的指示信息后,不会主动向该设备发送另一个设备的连接地址,而是验证该上报指示信息的设备的身份,如果验证通过,说明该设备是合法的,则向该设备发送另一个设备的连接地址,以保证设备的隐私不被泄露。
在一种可能的设计中,所述服务器对所述第二电子设备进行身份验证,包括:所述服务器判断所述第二电子设备是否与所述第一账号相关;当确定所述第二电子设备与所述第一账号相关时,验证通过,否则,验证不通过。
举例来说,服务器接收到一个设备上报的指示信息后,不会主动向该设备发送另一个设备的连接地址,而是验证该上报指示信息的设备是否与第一账号相关,比如,该设备当前登录账号是否为第一账号和/或激活账号是否为第一账号等等,如果是,说明该设备是合法的,则向该设备发送另一个设备的连接地址,以保证设备的隐私不被泄露。
在一种可能的设计中,所述第一电子设备是电子标签;所述第二电子设备上设置有阅读器;所述阅读器用于读取所述电子标签中的认证信息。
需要说明的是,第一电子设备还可以是其它类型的设备,比如WIFI设备、蓝牙设备等,这样,第二电子设备可以通过WIFI模块或蓝牙模块获取第一电子设备中的认证信息。
在一种可能的设计中,所述非工作状态包括锁屏状态,所述工作状态包括解锁状态,或者,所述非工作状态包括休眠状态,所述工作状态包括唤醒状态。
以手机为例,非工作状态为锁屏状态,工作状态为解锁状态,以音箱为例,非工作状态为休眠状态,工作状态为唤醒状态。
第二方面,还提供一种设备控制方法,应用于第二电子设备,包括:所述第二电子设备从第一电子设备处获取认证信息;所述认证信息是服务器基于第一账号生成的;所述第二电子设备对所述认证信息进行认证,并在认证通过时,执行如下步骤:
从非工作状态切换到工作状态;和/或,
向所述服务器查询第三电子设备的连接地址,并基于查询到的所述第三电子设备的连接地址与所述第三电子设备建立连接,所述第三电子设备与所述第一账号相关。
在一种可能的设计中,所述认证信息是所述服务器基于第一密钥对所述第一账号进行加密生成的,所述第二电子设备对所述认证信息进行认证,包括:
所述第二电子设备从所述服务器获取与所述第一密钥对应的第二密钥;
所述第二密钥对所述认证信息进行解密;若解密成功,则认证通过,若解密失败,则认证不通过。
在一种可能的设计中,所述认证信息是所述服务器基于第一密钥对所述第一账号进行加密生成的,所述第二电子设备对所述认证信息进行认证,包括:
所述第二电子设备从所述服务器获取与所述第一密钥对应的第二密钥;
所述第二电子设备使用所述第二密钥对所述认证信息进行解密,获得所述第一账号;
所述第二电子设备确定所述第一账号与所述第一电子设备相关时,认证通过,否则,认证不通过。
在一种可能的设计中,所述第一账号与所述第二电子设备相关,包括如下至少一种情况:所述第二电子设备当前登录账号为所述第一账号;所述第二电子设备的激活账号为所 述第一账号。
在一种可能的设计中,所述第一电子设备是电子标签;所述第二电子设备上设置有阅读器;所述阅读器用于读取所述电子标签中的认证信息。
在一种可能的设计中,所述非工作状态包括锁屏状态,所述工作状态包括解锁状态,或者,所述非工作状态包括休眠状态,所述工作状态包括唤醒状态。
第三方面,还提供一种设备控制方法,应用于服务器,包括:所述服务器基于第一账号生成认证信息;所述服务器向第一电子设备提供所述认证信息,所述认证信息用于其它电子设备进行认证;所述服务器确定第二电子设备对所述认证信息认证通过之后,向所述第二电子设备发送第三电子设备的连接地址,所述第三电子设备与所述第一账号相关。
在一种可能的设计中,所述认证信息是基于第一密钥对所述第一账号进行加密生成的,所述方法还包括:所述服务器向所述第二电子设备发送与所述第一密钥对应的第二密钥,所述第二密钥用于对所述认证信息进行认证。
在一种可能的设计中,在所述服务器向所述第一电子设备提供所述认证信息之前,还包括:所述服务器接收到第四电子设备的申请信息,所述申请信息用于申请与所述第一账号对应的认证信息;其中,所述第四电子设备与所述第二电子设备是同一设备,或者,所述第四电子设备与所述第三电子设备是同一设备;或者,所述第四电子设备是与所述第一账号相关且与所述第二电子设备和所述第三电子设备均不同的设备。
在一种可能的设计中,所述服务器确定第二电子设备对所述认证信息认证通过之后,向所述第二电子设备发送第三电子设备的连接地址,包括:所述服务器接收所述第二电子设备发送的指示信息,所述指示信息用于指示所述第二电子设备对所述认证信息认证通过;所述服务器对所述第二电子设备进行身份验证,并在验证通过之后,向所述第二电子设备发送所述第三电子设备的连接地址。
在一种可能的设计中,所述服务器对所述第二电子设备进行身份验证,包括:所述服务器判断所述第二电子设备是否与所述第一账号相关;当确定所述第二电子设备与所述第一账号相关时,验证通过,否则,验证不通过。
在一种可能的设计中,所述第一电子设备是电子标签;所述第二电子设备上设置有阅读器;所述阅读器用于读取所述电子标签中的认证信息。
第四方面,还提供一种通信系统,包括:第一电子设备和第二电子设备以及服务器;
所述第一电子设备中存储有认证信息;所述认证信息用于其它电子设备进行认证;
所述第二电子设备包括:处理器;存储器;其中,所述存储器存储有一个或多个计算机程序,所述一个或多个计算机程序包括指令,当所述指令被所述处理器执行时,使得所述第二电子设备执行如上述第二方面所述的方法步骤;
所述服务器包括:处理器;存储器;其中,所述存储器存储有一个或多个计算机程序,所述一个或多个计算机程序包括指令,当所述指令被所述处理器执行时,使得所述第二电子设备执行如上述第三方面所述的方法步骤。
第五方面,还提供一种电子设备,包括:
处理器,存储器,以及,一个或多个程序;
其中,所述一个或多个程序被存储在所述存储器中,所述一个或多个程序包括指令,当所述指令被所述处理器执行时,使得所述电子设备执行如上述第二方面中任意一项所述的方法步骤。
第六方面,还提供一种计算机可读存储介质,所述计算机可读存储介质用于存储计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行如上述第一方面、第二方面或第三方面中任意一方面所述的方法。
第七方面,还提供一种计算机程序产品,包括计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行如上述第一方面、第二方面或第三方面所述的方法。
第八方面,本申请实施例还提供一种芯片,所述芯片与电子设备中的存储器耦合,用于调用存储器中存储的计算机程序并执行本申请实施例第一方面、第二方面或第三方面的技术方案,本申请实施例中“耦合”是指两个部件彼此直接或间接地结合。
上述第二方面至第八方面的有益效果,参见第一方面的有益效果,不重复赘述。
附图说明
图1为本申请一实施例提供的一种通信系统的示意图;
图2为本申请一实施例提供的一种设备连接的示意图;
图3为本申请一实施例提供的另一种通信系统的示意图;
图4为本申请一实施例提供的电子设备的硬件结构示意图;
图5为本申请一实施例提供的一种设备控制方法的流程示意图;
图6A至图6B为本申请一实施例提供的申请标签认证业务的示意图;
图7为本申请一实施例提供的申请标签认证业务的另一种示意图;
图8为本申请一实施例提供的电子设备的结构示意图。
具体实施方式
本申请实施例提供的设备控制方法适用于通信系统。
示例性的,如图1所示,为本申请实施例提供的一种通信系统的示意图。所述通信系统中包括服务器和N个电子设备(称为分布式设备),N为大于或等于2的整数。服务器可以是具有较强处理能力、较大存储能力的计算设备,比如可以是各种类型的服务器,如,云服务器。所述电子设备可以是便携式电子设备,诸如手机、平板电脑、便携计算机、具备无线通讯功能的可穿戴设备(如智能手表、智能眼镜、智能手环、或智能头盔等)等等;或者,还可以是车载设备;或者,还可以是台式电脑、一体机等设备;或者,还可以是电视机、音箱等智能家居设备,本申请对电子设备的类型不作限定。图1所示的通信系统中以N=4为例,即四个电子设备,所述四个电子设备分别以电视机、音箱、手机和平板电脑为例。
N个电子设备可以分别使用账号登录到服务器侧。所述账户可以是系统账号,比如手机号、邮箱等等。示例性的,N个电子设备都是华为设备,服务器是华为服务器,比如华为云,那么N个电子设备可以分别使用华为账号登录到华为云侧。N个电子设备的登录账号可以相同或不同。
在一些实施例中,N个电子设备可以称为分布式设备。比如,家里的分布式家电设备,如手机、音箱、电视机等;或者,办公场景中的分布式办公设备,如打印机、传真机、投影仪等等。分布式设备可以位于同一通信网络,例如,位于同一个Wi-Fi网络;或者,登录同一账号(如华为账号),或者属于同一群组(如同一家庭账号),等等。
分布式设备之间可以建立连接。需要说明的是,分布式设备建立连接可以称为多设备互联互通,当然还可以有其它名称,比如,超级终端、超级终端组、多设备通信、多设备协同等等,只要是指多个设备之间互相连接即可,本申请对此名称不作限定。
下面介绍分布式设备建立连接的过程。
示例性的,假设图1中四个电子设备通过同一账号登录到服务器,并向服务器上报各自的设备标识以及连接地址。所述账户可以称为第一账号,比如可以是华为系统账号,如,Jack.huawei.com。服务器中可以存储第一账号对应的设备列表。设备列表中包括第一账号对应的设备的设备标识以及连接地址。示例性的,所述设备列表如下表1:
表1:第一账号对应的设备列表
Figure PCTCN2022123965-appb-000001
示例性的,设备标识可以是设备型号、设备类型(手机或平板电脑等)、序列号等等。连接地址可以包括网际协议(Internet Protocol,IP)地址、媒体存取控制(Media Access Control,MAC)地址等等,本申请不作限定。
以图1中的手机为例,当用户想要将手机与其它设备(四个电子设备中除手机之外的其它设备)建立连接时,连接过程可以包括:1、解锁手机。2、在手机上执行交互操作实现与其它设备的连接。可以理解的是,步骤1是可选步骤。如果手机当前处于锁屏状态,需要执行步骤1。如果手机当前处于解锁状态,无需执行步骤1。其中,锁屏状态包括:锁屏且黑屏状态或锁屏且亮屏状态。步骤1解锁手机的方式有多种,包括密码解锁、指纹解锁、面部解锁、声纹解锁、手势解锁等等。示例性的,如图2中的(a),手机处于锁屏状态(锁屏且黑屏状态)。当手机接收到解锁操作(比如,指纹解锁操作、密码解锁操作等等)时,显示如图2中的(b)所示的主界面201。主界面201中包括各种应用的图标。
手机处于解锁状态后,可以执行步骤2。示例性的,继续参见图2中的(b),手机显示主界面201。当手机检测到预设操作(如,从主界面201屏幕上方向下滑的操作)时,显示如图2中的(c)所示的控制中心界面202。控制中心界面202中包括超级终端功能卡片203。需要说明的是,“超级终端”这一名称仅是举例,可以替换为其它名称,比如“多设备互联”、“多设备协同”等名称,本申请实施例不作限定。超级终端功能卡片203中显示手机搜索到的周围的设备的标识。比如,图1中手机周围存在电视机、音箱、平板电脑,那么超级终端功能卡片203中显示电视机(Vision)标识、音箱(Sound X)标识、平板电脑(MatePad)标识。当检测到针对超级终端功能卡片203的操作(比如点击操作)时,显示如图2中的(d)所示的界面204。该界面204中包括:电视机标识206、平板电脑标识208、手机标识207、音箱标识209。示例性的,手机标识207位于中间、其它标记位于手机标识207周围,用于表征手机周围设备有电视机、平板电脑、音箱。比如,其它标识显示在圆形图标210的边缘上,手机标识207显示在圆形图标211的圆心位置处。其中,圆形图标211的半径R1小于圆形图标210的半径R2。
如图2中(e),当手机检测到针对电视机标识206的操作(比如,将电视机标识206拖动到圆形图标211内的操作)时,建立手机与电视机的连接。其中,手机与电视机连接 可以是通过服务器实现连接。比如,手机向服务器发送连接请求,该连接请求中携带电视机标识。由于服务器中存储有设备列表如上述表1,服务器查询表1可以确定电视机的连接地址,然后向手机发送电视机的连接地址。手机基于电视机的连接地址与电视连接。当手机与电视机连接成功时,电视机标识206与手机标识207紧挨着显示(如吸附在手机标识207的边缘上),代表手机与电视机连接成功。可以理解的是,如果用户还想要将平板电脑与手机连接,则拖拽平板电脑标识208使其吸附到手机标识207的边缘上即可。
通过以上描述可知,图1所示的通信系统中,如果用户想要将手机与其它设备(四个电子设备中除去手机以外的其它设备)连接,操作流程包括:解锁手机(如果手机处于锁屏状态),在解锁手机之后,通过一系列操作打开图2中的(d)所示的界面204,然后在该界面204中将目标设备(比如,电视机、平板、音箱)对应的标识向手机标识拖动实现手机与该目标设备的连接。如果用户想要将手机与多个目标设备连接,需要将多个目标设备各自对应的标识一一拖拽到手机标识处。由此可见,手机与其它设备的连接过程中,用户操作较为繁琐。而且,需要说明的是,以上实施例是以图1中手机与其它设备连接为例的,对于其它设备之间的连接,操作流程类似。所以要实现四个电子设备的互联互通,用户操作非常繁琐。如果电子设备的数量更多,操作更加繁琐。
图3为本申请实施例提供的另一种通信系统的示意图。所述通信系统中包括服务器、四个电子设备,以及控制设备。所述四个电子设备分别以电视机、音箱、手机和平板电脑为例。图3所示的通信系统与图1所示的通信系统的区别在于:图3所示的通信系统中,除了包含图1所示的设备之外,还包括控制设备。该控制设备可以用于对四个电子设备进行控制。
在一些实施例中,假设所述四个电子设备均处于第一状态,控制设备可以控制这四个电子设备均由第一状态进入第二状态。其中,第一状态可以是非工作状态,第二状态可以是工作状态。示例性的,第一状态包括锁屏状态、屏保状态、未唤醒状态(或称为未激活状态)等等。如果第一状态是锁屏状态,对应的,第二状态是解锁状态。如果第一状态是屏保状态,对应的,第二状态是工作状态。如果第一状态是未唤醒状态(或称为未激活状态),对应的,第二状态是唤醒状态(或称为激活状态)。
举例来说,以手机为例,当用户长时间未操作手机时,手机可以自动锁屏。如果用户想要继续操作手机,可以先解锁。因此,对于手机而言,第一状态可以是锁屏状态,包括锁屏且黑屏状态以及锁屏且亮屏状态,第二状态是解锁状态。再例如,以笔记本电脑为例,用户长时间未操作笔记本电脑时,笔记本电脑可以自动进入屏保状态。当笔记本电脑检测到操作(比如,键盘上的任意操作)时,取消屏保状态进入工作状态。因此,对于笔记本电脑而言,第一状态可以是屏保状态,第二状态可以是工作状态。再例如,以音箱为例,用户长时间未使用音响时,音响处于休眠状态。当用户想要使用音响时,可以通过语音指令(比如,小爱小爱)唤醒音箱。因此,对于音箱而言,第一状态可以是非唤醒状态,第二状态可以是唤醒状态。
一种可实现方式为,图3中四个电子设备登录同一账号,即第一账号。控制设备中存储有认证信息,认证信息可以是使用第一密钥对第一账号加密得到的。所述四个电子设备中存储有第二密钥,第二密钥与第一密钥对应。比如,第一密钥是加密密钥,第二密钥是解密密钥。所述四个电子设备可以获取控制设备中的认证信息,使用第二密钥对认证信息 进行认证,认证通过之后,进入第二状态。这种方式将在后文进行详细的介绍,此处只是简略描述。以手机为例,手机获取到认证信息之后,使用第二密钥对认证信息进行认证,并在认证通过之后,手机自动解锁。因此,如果四个电子设备均对认证信息认证通过,则四个电子设备均进入第二状态。
通过这种方式,可以快速的解锁或激活多个设备,不需要用户手动的在每个设备上执行解锁操作,操作便捷。
在另一些实施例中,控制设备可以实现四个电子设备之间的互联。也就是说,用户不需要在某个设备(如,手机)上执行交互操作(如图2)实现与其它设备的连接,操作便捷。
一种可实现方式为,图3中四个电子设备登录同一账号,即第一账号。控制设备中存储有认证信息,认证信息可以是使用第一密钥对第一账号加密得到的。所述四个电子设备中存储有第二密钥,第二密钥与第一密钥对应。其中,控制设备中的认证信息由服务器提供,四个电子设备中的第二密钥也是由服务器提供。服务器中还存储有第一账号相关的设备列表(如上述表1)。以手机为例,手机获取控制设备中的认证信息,并使用第二密钥对认证信息认证通过之后,向服务器查询其它设备(比如,电视机、音箱、平板电脑)的互联信息,所述互联信息中包括其它设备的连接地址。手机基于所述连接地址可以与其它设备连接。同理,以音箱为例,音箱获取控制设备中的认证信息,并使用第二密钥对认证信息认证通过之后,向服务器查询其它设备(比如,电视机、手机、平板电脑)的互联信息,所述互联信息中包括其它设备的连接地址。音箱基于所述连接地址可以与其它设备连接。这种方式将在后文进行详细的介绍,此处只是简略描述。
因此,四个电子设备只需要获取控制设备中的认证信息并在对认证信息认证通过后即可自动实现互联,不需要用户在某个设备上执行一系列的操作(如图2)实现与其它设备的连接,操作便捷,有助于提升用户体验。
在一些实施例中,控制设备可以各种类型的短距离通信设备。比如,电子标签(tag)、蓝牙(bluetooth,BT)设备、近场通信(Near Field Communication,NFC)设备、无线保真(wir eless fidelity,Wi-Fi)设备等等。
以控制设备是蓝牙设备为例,蓝牙设备可以广播认证信息,四个电子设备中设置有蓝牙模块,可以用于接收所述认证信息。以控制设备是NFC设备为例,四个电子设备上可以设置NFC接触区域。用户可以将控制设备接触或靠近某个设备上的NFC接触区域,以使该设备获取到控制设备中的认证信息。以控制设备是电子标签为例,电子标签中存储有认证信息。四个电子设备上设置有阅读器(reader),阅读器可以读取电子标签中的认证信息。
下面简单的介绍电子标签和阅读器。
阅读器,又称为读写器,是一种能够获取电子标签的数据的设备,它可以作为单独的设备,也可以嵌入至其它设备或系统中。比如,图3中,手机、平板电脑、音箱、电视机中嵌入阅读器。示例性的,阅读器可以通过阅读器上的天线向电子标签发送射频信号,以便向电子标签查询数据。电子标签是一种微型的无线收发装置,主要包括内置的电子标签天线、耦合元件以及芯片。芯片中具备能够支持阅读器读取或写入数据的存储空间。该存储空间中存储有认证信息。电子标签通过电子标签天线接收到阅读器发送的射频信号后,可以通过耦合元件实现对射频信号的耦合,进而在耦合通道内可以实现对电子标签的芯片 提供能量、以及将芯片中存储的数据(即认证信息)通过电子标签天线反馈给阅读器。所述电子标签可以是射频识别(Radio Frequency Identification,RFID)标签或者其它类型的标签,本申请实施例不作限定。
需要说明的是,本文以下的实施例主要以控制设备是电子标签为例进行描述,但是不限定控制设备一定是电子标签,还可以是蓝牙设备、NFC设备、WIFI设备等等。
在一些实施例中,控制设备上可以设置第一开关。第一开关可以用于控制该控制设备处于开启状态或关闭状态。当控制设备处于开启状态时,其它设备能够读取该控制设备中的认证信息,比如,该控制设备开始广播认证信息。当控制设备处于关闭状态时,其它电子设备无法读取控制设备中的认证信息,比如,该控制设备停止广播认证信息。所述第一开关可以是物理开关,比如物理按键,如果控制设备上设置触摸屏,第一开关也可以是触摸按键。
示例性的,继续参见图3,控制设备可以独立于其它电子设备(比如,手机、平板电脑、音箱、电视机等),或者,控制设备还可以是某个电子设备(比如,手机、平板电脑、音箱或电视机)中的一个部件。以控制设备是手机中的一个部件为例,那么该手机具有上述的控制设备的功能,比如,控制图3中四个电子设备由第一状态进入第二状态,和/或,控制所述四个电子设备自动连接。以控制设备是独立于其它设备的一个单独设备为例,该控制设备可以单独售卖,或者,与某个设备(比如手机)组合售卖,或者,作为赠品赠送等等,本申请实施例不作限定。
下面介绍本申请的相关设备。
图4示出了电子设备的结构示意图。所述电子设备可以是图3中的手机、平板电脑、电视机等等。如图4所示,电子设备可以包括处理器110,外部存储器接口120,内部存储器121,通用串行总线(universal serial bus,USB)接口130,充电管理模块140,电源管理模块141,电池142,天线1,天线2,移动通信模块150,无线通信模块160,音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,传感器模块180,按键190,马达191,指示器192,摄像头193,显示屏194,以及用户标识模块(subscriber identification module,SIM)卡接口195等。其中传感器模块180可以包括压力传感器180A,陀螺仪传感器180B,气压传感器180C,磁传感器180D,加速度传感器180E,距离传感器180F,接近光传感器180G,指纹传感器180H,温度传感器180J,触摸传感器180K,环境光传感器180L,骨传导传感器180M等。
处理器110可以包括一个或多个处理单元,例如:处理器110可以包括应用处理器(application processor,AP),调制解调处理器,图形处理器(graphics processing unit,GPU),图像信号处理器(image signal processor,ISP),控制器,存储器,视频编解码器,数字信号处理器(digital signal processor,DSP),基带处理器,和/或神经网络处理器(neural-network processing unit,NPU)等。其中,不同的处理单元可以是独立的器件,也可以集成在一个或多个处理器中。其中,控制器可以是电子设备的神经中枢和指挥中心。控制器可以根据指令操作码和时序信号,产生操作控制信号,完成取指令和执行指令的控制。处理器110中还可以设置存储器,用于存储指令和数据。在一些实施例中,处理器110中的存储器为高速缓冲存储器。该存储器可以保存处理器110刚用过或循环使用的指令或数据。如果处理器110需要再次使用该指令或数据,可从所述存储器中直接调用。避免了重复存取,减少 了处理器110的等待时间,因而提高了系统的效率。
USB接口130是符合USB标准规范的接口,具体可以是Mini USB接口,Micro USB接口,USB Type C接口等。USB接口130可以用于连接充电器为电子设备充电,也可以用于电子设备与外围设备之间传输数据。充电管理模块140用于从充电器接收充电输入。电源管理模块141用于连接电池142,充电管理模块140与处理器110。电源管理模块141接收电池142和/或充电管理模块140的输入,为处理器110,内部存储器121,外部存储器,显示屏194,摄像头193,和无线通信模块160等供电。
电子设备的无线通信功能可以通过天线1,天线2,移动通信模块150,无线通信模块160,调制解调处理器以及基带处理器等实现。天线1和天线2用于发射和接收电磁波信号。电子设备中的每个天线可用于覆盖单个或多个通信频带。不同的天线还可以复用,以提高天线的利用率。例如:可以将天线1复用为无线局域网的分集天线。在另外一些实施例中,天线可以和调谐开关结合使用。
移动通信模块150可以提供应用在电子设备上的包括2G/3G/4G/5G等无线通信的解决方案。移动通信模块150可以包括至少一个滤波器,开关,功率放大器,低噪声放大器(low noise amplifier,LNA)等。移动通信模块150可以由天线1接收电磁波,并对接收的电磁波进行滤波,放大等处理,传送至调制解调处理器进行解调。移动通信模块150还可以对经调制解调处理器调制后的信号放大,经天线1转为电磁波辐射出去。在一些实施例中,移动通信模块150的至少部分功能模块可以被设置于处理器110中。在一些实施例中,移动通信模块150的至少部分功能模块可以与处理器110的至少部分模块被设置在同一个器件中。
无线通信模块160可以提供应用在电子设备上的包括无线局域网(wireless local area networks,WLAN)(如无线保真(wireless fidelity,Wi-Fi)网络),蓝牙(bluetooth,BT),全球导航卫星系统(global navigation satellite system,GNSS),调频(frequency modulation,FM),近距离无线通信技术(near field communication,NFC),红外技术(infrared,IR)等无线通信的解决方案。无线通信模块160可以是集成至少一个通信处理模块的一个或多个器件。无线通信模块160经由天线2接收电磁波,将电磁波信号调频以及滤波处理,将处理后的信号发送到处理器110。无线通信模块160还可以从处理器110接收待发送的信号,对其进行调频,放大,经天线2转为电磁波辐射出去。
在一些实施例中,电子设备的天线1和移动通信模块150耦合,天线2和无线通信模块160耦合,使得电子设备可以通过无线通信技术与网络以及其他设备通信。所述无线通信技术可以包括全球移动通讯系统(global system for mobile communications,GSM),通用分组无线服务(general packet radio service,GPRS),码分多址接入(code division multiple access,CDMA),宽带码分多址(wideband code division multiple access,WCDMA),时分码分多址(time-division code division multiple access,TD-SCDMA),长期演进(long term evolution,LTE),BT,GNSS,WLAN,NFC,FM,和/或IR技术等。所述GNSS可以包括全球卫星定位系统(global positioning system,GPS),全球导航卫星系统(global navigation satellite system,GLONASS),北斗卫星导航系统(beidou navigation satellite system,BDS),准天顶卫星系统(quasi-zenith satellite system,QZSS)和/或星基增强系统(satellite based augmentation systems,SBAS)。
显示屏194用于显示应用的显示界面等。显示屏194包括显示面板。显示面板可以采 用液晶显示屏(liquid crystal display,LCD),有机发光二极管(organic light-emitting diode,OLED),有源矩阵有机发光二极体或主动矩阵有机发光二极体(active-matrix organic light emitting diode的,AMOLED),柔性发光二极管(flex light-emitting diode,FLED),Miniled,MicroLed,Micro-oLed,量子点发光二极管(quantum dot light emitting diodes,QLED)等。在一些实施例中,电子设备可以包括1个或N个显示屏194,N为大于1的正整数。
电子设备100可以通过ISP,摄像头193,视频编解码器,GPU,显示屏194以及应用处理器等实现拍摄功能。
ISP用于处理摄像头193反馈的数据。例如,拍照时,打开快门,光线通过镜头被传递到摄像头感光元件上,光信号转换为电信号,摄像头感光元件将所述电信号传递给ISP处理,转化为肉眼可见的图像。ISP还可以对图像的噪点,亮度,肤色进行算法优化。ISP还可以对拍摄场景的曝光,色温等参数优化。在一些实施例中,ISP可以设置在摄像头193中。
摄像头193用于捕获静态图像或视频。物体通过镜头生成光学图像投射到感光元件。感光元件可以是电荷耦合器件(charge coupled device,CCD)或互补金属氧化物半导体(complementary metal-oxide-semiconductor,CMOS)光电晶体管。感光元件把光信号转换成电信号,之后将电信号传递给ISP转换成数字图像信号。ISP将数字图像信号输出到DSP加工处理。DSP将数字图像信号转换成标准的RGB,YUV等格式的图像信号。在一些实施例中,电子设备可以包括1个或N个摄像头193,N为大于1的正整数。
内部存储器121可以用于存储计算机可执行程序代码,所述可执行程序代码包括指令。处理器110通过运行存储在内部存储器121的指令,从而执行电子设备的各种功能应用以及数据处理。内部存储器121可以包括存储程序区和存储数据区。其中,存储程序区可存储操作系统,以及至少一个应用程序(例如爱奇艺应用,微信应用等)的软件代码等。存储数据区可存储电子设备使用过程中所产生的数据(例如图像、视频等)等。此外,内部存储器121可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件,闪存器件,通用闪存存储器(universal flash storage,UFS)等。
外部存储器接口120可以用于连接外部存储卡,例如Micro SD卡,实现扩展电子设备的存储能力。外部存储卡通过外部存储器接口120与处理器110通信,实现数据存储功能。例如将图片,视频等文件保存在外部存储卡中。
电子设备可以通过音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,以及应用处理器等实现音频功能。例如音乐播放,录音等。
压力传感器180A用于感受压力信号,可以将压力信号转换成电信号。在一些实施例中,压力传感器180A可以设置于显示屏194。陀螺仪传感器180B可以用于确定电子设备的运动姿态。在一些实施例中,可以通过陀螺仪传感器180B确定电子设备围绕三个轴(即,x,y和z轴)的角速度。
陀螺仪传感器180B可以用于拍摄防抖。气压传感器180C用于测量气压。在一些实施例中,电子设备通过气压传感器180C测得的气压值计算海拔高度,辅助定位和导航。磁传感器180D包括霍尔传感器。电子设备可以利用磁传感器180D检测翻盖皮套的开合。在一些实施例中,当电子设备是翻盖机时,电子设备可以根据磁传感器180D检测翻盖的开合。进而根据检测到的皮套的开合状态或翻盖的开合状态,设置翻盖自动解锁等特性。加速度传感器180E可检测电子设备在各个方向上(一般为三轴)加速度的大小。当电子设备静 止时可检测出重力的大小及方向。还可以用于识别电子设备姿态,应用于横竖屏切换,计步器等应用。
距离传感器180F,用于测量距离。电子设备可以通过红外或激光测量距离。在一些实施例中,拍摄场景,电子设备可以利用距离传感器180F测距以实现快速对焦。接近光传感器180G可以包括例如发光二极管(LED)和光检测器,例如光电二极管。发光二极管可以是红外发光二极管。电子设备通过发光二极管向外发射红外光。电子设备使用光电二极管检测来自附近物体的红外反射光。当检测到充分的反射光时,可以确定电子设备附近有物体。当检测到不充分的反射光时,电子设备可以确定电子设备附近没有物体。电子设备可以利用接近光传感器180G检测用户手持电子设备贴近耳朵通话,以便自动熄灭屏幕达到省电的目的。接近光传感器180G也可用于皮套模式,口袋模式自动解锁与锁屏。
环境光传感器180L用于感知环境光亮度。电子设备可以根据感知的环境光亮度自适应调节显示屏194亮度。环境光传感器180L也可用于拍照时自动调节白平衡。环境光传感器180L还可以与接近光传感器180G配合,检测电子设备是否在口袋里,以防误触。指纹传感器180H用于采集指纹。电子设备可以利用采集的指纹特性实现指纹解锁,访问应用锁,指纹拍照,指纹接听来电等。
温度传感器180J用于检测温度。在一些实施例中,电子设备利用温度传感器180J检测的温度,执行温度处理策略。例如,当温度传感器180J上报的温度超过阈值,电子设备执行降低位于温度传感器180J附近的处理器的性能,以便降低功耗实施热保护。在另一些实施例中,当温度低于另一阈值时,电子设备对电池142加热,以避免低温导致电子设备异常关机。在其他一些实施例中,当温度低于又一阈值时,电子设备对电池142的输出电压执行升压,以避免低温导致的异常关机。
触摸传感器180K,也称“触控面板”。触摸传感器180K可以设置于显示屏194,由触摸传感器180K与显示屏194组成触摸屏,也称“触控屏”。触摸传感器180K用于检测作用于其上或附近的触摸操作。触摸传感器可以将检测到的触摸操作传递给应用处理器,以确定触摸事件类型。可以通过显示屏194提供与触摸操作相关的视觉输出。在另一些实施例中,触摸传感器180K也可以设置于电子设备的表面,与显示屏194所处的位置不同。
骨传导传感器180M可以获取振动信号。在一些实施例中,骨传导传感器180M可以获取人体声部振动骨块的振动信号。骨传导传感器180M也可以接触人体脉搏,接收血压跳动信号。
按键190包括开机键,音量键等。按键190可以是机械按键。也可以是触摸式按键。电子设备可以接收按键输入,产生与电子设备的用户设置以及功能控制有关的键信号输入。马达191可以产生振动提示。马达191可以用于来电振动提示,也可以用于触摸振动反馈。例如,作用于不同应用(例如拍照,音频播放等)的触摸操作,可以对应不同的振动反馈效果。指示器192可以是指示灯,可以用于指示充电状态,电量变化,也可以用于指示消息,未接来电,通知等。SIM卡接口195用于连接SIM卡。SIM卡可以通过插入SIM卡接口195,或从SIM卡接口195拔出,实现和电子设备的接触和分离。
电子设备中还包括阅读器。阅读器可以通过阅读器上的天线向电子标签发送射频信号,以便向电子标签查询数据。
可以理解的是,图4所示的部件并不构成对电子设备的具体限定。本发明实施例中的电子设备可以包括比图4中更多或更少的部件。此外,图4中的部件之间的组合/连接关系 也是可以调整修改的。
下面结合附图介绍本申请实施例提供的技术方案。
图5为本申请一实施例提供的设备控制方法的流程示意图。该方法可以适用于图3所示的应用场景或者类似的应用场景中。以图3所示的应用场景为例,该场景中包括分布式设备(比如手机、电视机、平板电脑、音箱等等)以及服务器。图5所示的流程中包括的服务器可以是图3中的服务器,第一电子设备和第二电子设备分别是分布式设备中的一个。比如,第一电子设备可以是图3中的控制设备,第二电子设备可以是图3中的手机、电视机、平板电脑或音箱。如图5,所述流程包括:
S501,第二电子设备通过第一账号激活。
示例性的,第一账号可以是系统账号,比如手机号码、邮箱等等可以作为系统账号。以第二电子设备是华为设备为例,第一账号比如可以是Jack@huawei.com,对应的,服务器可以是华为服务器,比如华为云。也就是说,第二电子设备通过Jack@huawei.com的账号在华为云侧激活。
S502,服务器存储第一账号对应的设备清单。
示例性的,第二电子设备可以在激活时或激活后向服务器上报其设备标识。这样,服务器侧存储的设备清单中可以包括第二电子设备的设备标识。所述设备标识比如设备型号、产品序列号、设备类型(手机、平板电脑等)等等,本申请实施例不作限定。在另一些实施例中,第二电子设备还可以在激活时或激活后向服务器上报其连接地址,这样,设备清单中还可以包括第二电子设备对应的连接地址,比如,第一账号对应的设备清单如下表2:
表2:第一账号对应的设备清单
Figure PCTCN2022123965-appb-000002
需要说明的是,除了第二电子设备,还可以有其它设备(比如第三电子设备)通过第一账号激活,所以上面表2中还包括第三电子设备的设备标识和连接地址。
S503,服务器向第一电子设备提供认证信息。
可以理解的是,在S503之前,还可以包括步骤:服务器基于第一账号生成认证信息。一种可实现方式为,服务器对第一账号加密得到认证信息,比如,使用第一密钥对第一账号加密得到。示例性的,所述第一密钥可以是服务器的私钥。所述第一密码可以是对称密钥或非对称密钥,本申请实施例不作限定。
示例性的,认证信息可以是数字签名(signature)或者公钥基础设施(public key infrastructure,PKI)证书等加密文件。以数字签名为例,可以是数字串、字符串、或者,数字与字符组合等各种类型的序列号。比如,服务器利用加密算法对第一密钥和第一账号计算得到数字签名,即,数字签名作为加密算法的输出,加密算法的输入包括第一账号,第一密钥等。其中,加密算法例如可以是哈希(hash)算法等等,本申请不作限定。以PKI证书为例,先简单的介绍PKI证书。PKI证书中包括签名,该签名是由签名者使用签名者的私钥生成的,验证者可以使用签名者的公钥验证该签名。其中涉及到两个主体,签名者和验证者。其中,签名者可以是可信第三方,比如,本申请中的服务器,即PKI证书的签发机构。验证者可以是具有签名者的公钥的设备。也就是说,在本申请中,服务器将PKI 证书提供给第一电子设备,验证者(比如第二电子设备)从第一电子设备处获取PKI证书进行验签。
需要说明的是,上面以认证信息是数字签名和KPI证书为例,可以理解的是,认证信息还可以是其它类型的加密文件,只要是验证者能够对认证信息进行认证即可,本申请不限定其类型。
服务器生成认证信息之后,向第一电子设备提供认证信息,包括如下方式A或方式B中的至少一种。
方式A,服务器主动向第一电子设备提供认证信息。比如,当有两个设备(比如第二电子设备和第三电子设备)使用第一账号在服务器侧激活,服务器就生成认证信息并向第一电子设备提供该认证信息。因为当有两个设备使用同一账号激活时,大概率是同一用户的两个设备,该用户可能会有需求将这两个设备连接,所以提供认证信息以方便这两个设备的连接(将在后文介绍)。
方式B,服务器在接收申请信息后,向第一电子设备提供认证信息。所述申请信息用于申请第一账号对应的认证信息。示例性的,所述申请信息中包括第一账号。其中,所述申请信息可以是第二电子设备发送的,也可以是第三电子设备发送的,或者还可以与第一账号相关的其它电子设备发送的,或者是用户去线下销售平台通过人工方式在服务器中输入申请信息。
以方式B为例,且以第二电子设备向服务器发送申请信息为例,第二电子设备发送申请信息的过程包括但不限定于下文的图6A至图6B,图6A至图6B中以第二电子设备是手机为例。
如图6A中(a),手机显示主界面201。主界面中包括设置图标601。当手机检测到针对设置图标601的操作时,显示如图6A中(b)所示的设置界面602。该界面602中包括账号选项603。当检测到针对账号选项603的操作时,显示如图6A中(c)所示的界面,该界面中包括第一账号如Jack.huawei.com。当检测到针对第一账号的操作时,显示如图6A中(d)所示的界面,该界面中包括标签认证业务,以及当前状态的提示信息(比如未申请)以及按键606。当检测到针对按键606的操作时,显示如图6A中(e)所示的界面,该界面中显示第一账号,以及详情介绍(用于向用户介绍标签认证业务的具体内容),还包括提交申请的按键。当检测到提交申请的按键的操作时,向服务器发送申请信息。
如图6B中(a),该手机显示字体选择界面,假设用户选择简体中文字体,手机进入如图6B中(b)所示的界面,该界面为账号登录界面,用户输入账号和密码之后,点击登录,手机显示如图6B中(c)所示的界面,该界面中包括已经登录的账号,以及提交申请按键,当检测到针对提交申请的按键的操作时,向服务器发送申请信息,然后显示如图6B中(d)的界面,该界面显示提示信息激活完成。需要说明的是,继续参见图6B中(c),当手机检测到针对跳过按键的操作时,直接显示如图6B中(d)的界面。也就是说,用户可以选择在激活的过程中申请标签,也可以不在激活的过程中申请标签。倘若激活完成之后,用户想要申请时,可以使用图6A所示的方式,在设置应用中申请。
需要说明的是,图6A和图6B作为两种不同的申请方式,图6B是在第二电子设备激活时申请,图6A是在第二电子设备激活以后(比如已经使用一段时间)申请。应理解,图6A和图6B是两种申请过程的示例,还可以是其它的界面或者按键方式进行申请,本申请实施例不作限定。
在另一些实施例中,标签认证业务还可以是付费业务。示例性的,请参见7中(a),为标签认证业务的申请界面,当手机检测到针对提交申请的按键的操作时,显示如图7中(b)所示的界面,该界面中显示费用信息,以及支付方式,包括方式1和方式2,比如,方式1是华为钱包,方式2是银行卡。当手机检测到选择方式1的操作,显示如图7中(c)所示的界面,该界面中显示手势支付窗口,当手机检测到预设手势操作时,完成费用支付,显示如图7中(d)所示的界面,该界面中显示完成支付或者申请成功的提示信息。
需要说明的是,如前文所述,第一电子设备(即控制设备)可以是电子标签或蓝牙设备、WIFI设备等。以电子标签为例,服务器向电子标签提供认证信息的方式可以是,服务器生成认证信息之后,通过人工注入(或嵌入)的方式将认证信息注入到电子标签中。如果第一电子设备是WIFI设备,服务器向电子标签提供认证信息的方式可以是,向所述WIFI设备发送该认证信息。
S504,第二电子设备从第一电子设备处获取认证信息。
以第一电子设备是电子标签,第二电子设备中设置有阅读器为例,第二电子设备中的阅读器可以读取电子标签中认证信息。
S505,第二电子设备对所述认证信息进行认证。
一种可实现方式为,第二电子设备使用第二密钥对所述认证信息进行解密,如果解密成功,则验证通过,如果解密失败,则验证不通过。其中,第二密钥可以是第二电子设备从服务器获取的。第二密钥与前文所述的第一密钥对应,能够对该第一密钥进行解密。比如,第一密钥是服务器的私钥,第二密钥可以是服务器的公钥。也就是说,服务器向第二电子设备提供了第二密钥,向第一电子设备提供了使用第一密钥加密得到的认证信息。这样,第二电子设备可以使用其第二密钥对认证信息进行解密。换言之,只有具有第二密钥的电子设备才能对认证信息解密成功,不具有第二密钥的设备即便能够获取到认证信息也无法对其解密,就无法实现自动进入第二状态和/或自动与其它设备(比如第三电子设备)的连接,这样可以保证其它设备的隐私性。
另一种可实现方式为,第二电子设备使用第二密钥对所述验证进行解密,如果解密失败,认证不通过,如果解密成功,获取认证信息中的第一账号,进一步判断第一账号与第二电子设备是否相关,如果相关,则认证通过,否则,认证不通过。所述第一账号与第二电子设备相关,包括如下多种情况中的至少一种:第二电子设备当前登录账号为第一账号,第二电子设备的激活账号为第一账号。与上一种方式区别在于,这种方式中,具有第二密钥的设备即便对认证信息解密成功也不一定代表验证通过,只有当解密成功并且与第一账号相关时,才验证通过。如此,如果某个设备与第一账号不相关,即便该设备盗用了第二密钥,也无法认证通过,无法与第一账号对应的其它设备(比如第三电子设备)连接,保证第三电子设备的信息安全。
第二电子设备对认证信息认证通过之后,可以执行S507,和/或,执行S508-S510。
S506,第二电子设备从第一状态切换为第二状态。其中,第一状态为非工作状态,第二状态为工作状态。关于第一状态和第二状态请参见前文描述。
S507,第二电子设备向服务器查询第三电子设备的连接地址。
S508,服务器向第二电子设备反馈第三电子设备的连接地址。
S509,第二电子设备基于第三电子设备的连接地址与第三电子设备建立连接。
其中,S507的一种可实现方式为,第二电子设备向服务器发送第一信息,所述第一信 息可以是用于指示第二电子设备对认证信息认证通过的指示信息,即通过第一信息向服务器证明第二电子设备对其提供给第一电子设备的认证信息认证通过。或者,第一信息也可以是第二电子设备的互联信息,互联信息中包括第二设备的设备标识和连接地址。当服务器接收到第二电子设备的互联信息时,就认为第二电子设备对认证信息认证通过,因为没有认为认证通过的设备不会向服务器上报互联信息。服务器接收到第一信息之后,向服务器发送第三电子设备的连接地址。需要说明的是,服务器中存储的第一账号对应的设备清单(如,上述表1)中除了第二电子设备和第三电子设备之外,可能还有更多设备的信息。因此,服务器可以向第二电子设备发送设备清单中除去第二电子设备以外所有设备的连接地址。这样,第二电子设备可以与第一账号相关的所有设备中除第二电子设备以为的剩余所有设备分别连接。
需要说明的是,继续参见图5,在S505之后,可以只执行S506,不执行S507-S509,即,当第二电子设备对认证信息认证通过时,进入第二状态,不执行与第三电子设备的连接过程。在另一些实施例中,在S505之后,也可以直接执行S508-S510,不执行S507,即第二电子设备对认证信息认证通过时,直接向服务器查询第三电子设备的连接地址以便与第三电子设备建立连接。在又一些实施例中,在S505之后,可以既执行S506,又执行S507-S509,S506与S507-S509都执行的情况下,执行顺序不作限定,比如在S505之后可以先执行S507-S509,后执行S506,或者,先执行S506,后执行S507-S509,等等。
在一些实施例中,第二电子设备切换到第二状态之后,可以显示第三电子设备的相关信息,比如,第三电子设备的历史播放记录、历史操作界面等等。以第二电子设备是手机、第三电子设备是电视机为例,当手机对认证信息认证通过后,自动进入第二状态,此时可以显示电视机的最近播放记录(比如,电视剧、电影等等)。一种可实现方式为,电视机将历史播放记录、历史操作界面等上报给服务器,第二电子设备从服务器获取第三电子设备获取这些信息。另一种可实现方式为,第二电子设备与第三电子设备连接,获取第三电子设备的历史播放记录、历史操作界面等,无需经过服务器获取。通过这种方式,第二电子设备可以自动进入第二状态,并且显示第三电子设备的相关信息,不需要用户手动控制第二电子设备进入第二状态,也不需要用户手动将第二电子设备与第三电子设备连接,并通过手动操作将第三电子设备的相关信息投屏到第二电子设备上显示,操作便捷,有助于提升用户体验。
可以理解的是,第二电子设备与第三电子设备连接之后,还可以断开连接。一种可实现方式为,用户在第二电子设备上或在第三电子设备上进行操作实现连接中断,比如,关闭第二电子设备的无线连接功能使其无法与第三电子设备连接或者第二电子设备上可以设置按键用于中断与第三电子设备的连接等。另一种可实现方式为,用户可以通过第一电子设备实现第二电子设备与第三电子设备之间的连接中断。比如,第一电子设备上设置有第二控件,当第一电子设备检测到第二控件被触发时,可以向服务器发送指令,该指令用于指示第二电子设备与第三电子设备的连接中断。服务器向第二电子设备或第三电子设备发送该指令指示其中断与对方的连接。其中,第二控件与前文所述的第一控件可以是同一控件或不同的控件,可以是物理按键或者触控按键等等。这种方式,用户可以在第一电子设备上通过对控件的操作实现两个设备的自动连接中断,操作比较便捷。
需要说明的是,上面的实施例中,以分布式设备包括第二电子设备和第三电子设备为例。在一些实施例中,分布式设备中还可以增加新的设备,比如,增加第五电子设备。一 种增加方式为,第五电子设备使用第一账号向服务器激活,这样,服务器在第一账号对应的设备列表(比如上述表2)中增加第五电子设备的设备标识以及连接地址。当设备列表中增加了第五电子设备时,服务器可以向第五电子设备下发第二密钥,该第二密钥用于对第一密钥进行解密。第五电子设备获取到第二密钥之后就可以对第一电子设备的认证信息进行认证。也就是说,新加入分布式设备中的设备可以获取到用于对认证信息进行认证的第二密钥,这样,新加入的设备也可以实现自动解锁或激活,和/或自动与其它设备(比如,第二电子设备或第三电子设备)的连接。
在另一些实施例中,分布式设备中还可以减少设备。比如,减少第五电子设备。一种实现方式为,第五电子设备与第一账号解除关联,比如,退出第一账号或者第五电子设备恢复出厂之后使用别的账号重新激活。如此,服务器中记录的第一账号对应的设备列表(如,上述表2)中删除第五电子设备的信息。需要说明的是,在第五电子设备退出分布式设备之前,为了让第五电子设备能够对认证信息进行认证,服务器向第五电子设备发送了第二密钥用于对认证信息作认证。为了避免第五电子设备仍然使用该第二密钥对所述认证信息进行认证,服务器可以向未与第一账号解除关联的其它设备发送第三密钥,第三密钥与第二密钥不同,未与第一账号解除关联的其它设备可以使用该第三密钥对认证信息进行认证,避免所述其它设备的隐私泄露。
与本申请提供的设备控制方法相关的一种可能的应用场景为,用户购买了第二电子设备(如,手机),使用第一账号激活。用户在使用了一段时间之后想要申请标签认证业务,比如通过图6A所示的方式申请。服务器接收到申请信息之后,可以向第一电子设备提供验证信息。销售方通过服务器知道哪个用户申请了验证信息,可以将第一电子设备邮寄给用户(比如,申请界面中可以包括用户地址以及电话号码),或者,也可以电话通知用户去指定地点拿取第一电子设备(比如,申请界面中包括用户的手机号码),等等。另一种可能的应用场景为,第一电子设备与第二电子设备配套出售;或者,用户购买第二电子设备则赠送第一电子设备。也就是说,用户已经同时具有第二电子设备和第一电子设备,此时第二电子设备还未激活,第一电子设备中还没有验证信息。用户使用第一账号激活第二电子设备。服务器确接收到第二电子设备的申请信息后,向第一电子设备发送验证信息。这样,用户就可以使用第一电子设备控制第二电子设备。
图8为本申请实施例提供的电子设备800的结构示意图。电子设备800可以是前文中的第一电子设备、第二电子设备或服务器。如图8所示,电子设备800可以包括:一个或多个处理器801;一个或多个存储器802;通信接口803,以及一个或多个计算机程序804,上述各器件可以通过一个或多个通信总线805连接。其中该一个或多个计算机程序804被存储在上述存储器802中并被配置为被该一个或多个处理器801执行,该一个或多个计算机程序804包括指令。比如,当电子设备800是前文中的第一电子设备时,该指令可以用于执行如上面相应实施例中第一电子设备的相关步骤。当电子设备800是前文所述的第二电子设备时,该指令可以用于执行如上面相应实施例中第二电子设备的相关步骤。当电子设备800是前文所述的服务器时,该指令可以用于执行如上面相应实施例中服务器的相关步骤。通信接口803用于实现电子设备800与其他设备的通信,比如通信接口可以是收发器。
本申请实施例还提供一种通信系统。所述通信系统中包括第一电子设备和第二电子设备以及服务器。其中,第一电子设备和第二电子设备的结构可以参见图8所示。比如,当 图8所示的电子设备800是第一电子设备时,当一个或多个计算机程序804的指令被处理器执行时,使得所述第一电子设备执行如前文中图5中第一电子设备的步骤。当图8所示的电子设备800是第二电子设备时,当一个或多个计算机程序804的指令被所述处理器执行时,使得所述第二电子设备执行如前文中图5中第二电子设备的步骤。当图8所示的电子设备800是服务器时,当一个或多个计算机程序804的指令被所述处理器执行时,使得所述服务器执行如前文中图5中服务器的步骤。
上述本申请提供的实施例中,从电子设备(例如手机)作为执行主体的角度对本申请实施例提供的方法进行了介绍。为了实现上述本申请实施例提供的方法中的各功能,电子设备可以包括硬件结构和/或软件模块,以硬件结构、软件模块、或硬件结构加软件模块的形式来实现上述各功能。上述各功能中的某个功能以硬件结构、软件模块、还是硬件结构加软件模块的方式来执行,取决于技术方案的特定应用和设计约束条件。
以上实施例中所用,根据上下文,术语“当…时”或“当…后”可以被解释为意思是“如果…”或“在…后”或“响应于确定…”或“响应于检测到…”。类似地,根据上下文,短语“在确定…时”或“如果检测到(所陈述的条件或事件)”可以被解释为意思是“如果确定…”或“响应于确定…”或“在检测到(所陈述的条件或事件)时”或“响应于检测到(所陈述的条件或事件)”。另外,在上述实施例中,使用诸如第一、第二之类的关系术语来区份一个实体和另一个实体,而并不限制这些实体之间的任何实际的关系和顺序。
在本说明书中描述的参考“一个实施例”或“一些实施例”等意味着在本申请的一个或多个实施例中包括结合该实施例描述的特定特征、结构或特点。由此,在本说明书中的不同之处出现的语句“在一个实施例中”、“在一些实施例中”、“在其他一些实施例中”、“在另外一些实施例中”等不是必然都参考相同的实施例,而是意味着“一个或多个但不是所有的实施例”,除非是以其他方式另外特别强调。术语“包括”、“包含”、“具有”及它们的变形都意味着“包括但不限于”,除非是以其他方式另外特别强调。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等。在不冲突的情况下,以上各实施例的方案都可以组合使用。
需要指出的是,本专利申请文件的一部分包含受著作权保护的内容。除了对专利局的专利文件或记录的专利文档内容制作副本以外,著作权人保留著作权。

Claims (26)

  1. 一种设备控制方法,其特征在于,应用于包括第一电子设备、第二电子设备以及服务器的系统,所述方法包括:
    所述服务器向所述第一电子设备提供认证信息,所述认证信息是基于第一账号生成的;
    所述第二电子设备从所述第一电子设备处获取所述认证信息;
    所述第二电子设备对所述认证信息进行认证,并在认证通过时,执行如下步骤:
    从非工作状态切换到工作状态;和/或,
    向所述服务器查询第三电子设备的连接地址,并基于查询到的所述第三电子设备的连接地址与所述第三电子设备建立连接,所述第三电子设备与所述第一账号相关。
  2. 根据权利要求1所述的方法,其特征在于,所述认证信息是所述服务器基于第一密钥对所述第一账号进行加密生成的,所述第二电子设备对所述认证信息进行认证,包括:
    所述第二电子设备从所述服务器获取与所述第一密钥对应的第二密钥;
    所述第二电子设备使用所述第二密钥对所述认证信息进行解密,若解密成功,则认证通过,若解密失败,则认证不通过。
  3. 根据权利要求1所述的方法,其特征在于,所述认证信息是所述服务器基于第一密钥对所述第一账号进行加密生成的,所述第二电子设备对所述认证信息进行认证,包括:
    所述第二电子设备从所述服务器获取与所述第一密钥对应的第二密钥;
    所述第二电子设备使用所述第二密钥对所述认证信息进行解密,获得所述第一账号;
    所述第二电子设备确定所述第一账号与所述第一电子设备相关时,认证通过,否则,认证不通过。
  4. 根据权利要求3所述的方法,其特征在于,所述第一账号与所述第二电子设备相关,包括如下至少一种情况:
    所述第二电子设备当前登录账号为所述第一账号;
    所述第二电子设备的激活账号为所述第一账号。
  5. 根据权利要求1-4任一所述的方法,其特征在于,在所述服务器向所述第一电子设备提供认证信息之前,还包括:
    所述服务器接收到第四电子设备的申请信息,所述申请信息用于申请与所述第一账号对应的认证信息;
    其中,所述第四电子设备与所述第二电子设备是同一设备,或者,所述第四电子设备与所述第三电子设备是同一设备;或者,所述第四电子设备是与所述第一账号相关且与所述第二电子设备和所述第三电子设备均不同的设备。
  6. 根据权利要求5所述的方法,其特征在于,所述方法还包括:
    所述第四电子设备响应于第一操作,显示第一界面,所述第一界面中包括所述第一账号以及申请按键;
    所述第四电子设备检测到针对所述申请按键的第二操作时,向所述服务器发送所述申请信息。
  7. 根据权利要求6所述的方法,其特征在于,所述第四电子设备检测到针对所述申请按键的第二操作时,向所述服务器发送所述申请信息,包括:
    所述第四电子设备检测到针对所述申请按键的第二操作时,显示第二界面,所述第二 界面中包括待支付费用的提示信息;
    所述第四电子设备检测到所述费用支付完成时,向所述服务器发送所述申请信息。
  8. 根据权利要求1-7任一所述的方法,其特征在于,所述第二电子设备向所述服务器查询第三电子设备的连接地址,包括:
    所述第二电子设备向所述服务器发送指示信息,所述指示信息用于指示所述第二电子设备对所述认证信息认证通过;
    所述服务器对所述第二电子设备进行身份验证,并在验证通过之后,向所述第二电子设备发送所述第三电子设备的连接地址。
  9. 根据权利要求8所述的方法,其特征在于,所述服务器对所述第二电子设备进行身份验证,包括:
    所述服务器判断所述第二电子设备是否与所述第一账号相关;
    当确定所述第二电子设备与所述第一账号相关时,验证通过,否则,验证不通过。
  10. 根据权利要求1-9任一所述的方法,其特征在于,
    所述第一电子设备是电子标签;
    所述第二电子设备上设置有阅读器;所述阅读器用于读取所述电子标签中的认证信息。
  11. 根据权利要求1-10任一所述的方法,其特征在于,
    所述非工作状态包括锁屏状态,所述工作状态包括解锁状态,或者,
    所述非工作状态包括休眠状态,所述工作状态包括唤醒状态。
  12. 一种设备控制方法,其特征在于,应用于第二电子设备,包括:
    所述第二电子设备从第一电子设备处获取认证信息;所述认证信息是服务器基于第一账号生成的;
    所述第二电子设备对所述认证信息进行认证,并在认证通过时,执行如下步骤:
    从非工作状态切换到工作状态;和/或,
    向所述服务器查询第三电子设备的连接地址,并基于查询到的所述第三电子设备的连接地址与所述第三电子设备建立连接,所述第三电子设备与所述第一账号相关。
  13. 根据权利要求12所述的方法,其特征在于,所述认证信息是所述服务器基于第一密钥对所述第一账号进行加密生成的,所述第二电子设备对所述认证信息进行认证,包括:
    所述第二电子设备从所述服务器获取与所述第一密钥对应的第二密钥;
    所述第二电子设备使用所述第二密钥对所述认证信息进行解密;若解密成功,则认证通过,若解密失败,则认证不通过。
  14. 根据权利要求12所述的方法,其特征在于,所述认证信息是所述服务器基于第一密钥对所述第一账号进行加密生成的,所述第二电子设备对所述认证信息进行认证,包括:
    所述第二电子设备从所述服务器获取与所述第一密钥对应的第二密钥;
    所述第二电子设备使用所述第二密钥对所述认证信息进行解密,获得所述第一账号;
    所述第二电子设备确定所述第一账号与所述第一电子设备相关时,认证通过,否则,认证不通过。
  15. 根据权利要求12-14任一所述的方法,其特征在于,所述第一账号与所述第二电子设备相关,包括如下至少一种情况:
    所述第二电子设备当前登录账号为所述第一账号;
    所述第二电子设备的激活账号为所述第一账号。
  16. 根据权利要求12-15任一所述的方法,其特征在于,
    所述第一电子设备是电子标签;
    所述第二电子设备上设置有阅读器;所述阅读器用于读取所述电子标签中的认证信息。
  17. 根据权利要求12-16任一所述的方法,其特征在于,
    所述非工作状态包括锁屏状态,所述工作状态包括解锁状态,或者,
    所述非工作状态包括休眠状态,所述工作状态包括唤醒状态。
  18. 一种设备控制方法,其特征在于,应用于服务器,包括:
    所述服务器基于第一账号生成认证信息;
    所述服务器向第一电子设备提供所述认证信息,所述认证信息用于其它电子设备进行认证;
    所述服务器确定第二电子设备对所述认证信息认证通过之后,向所述第二电子设备发送第三电子设备的连接地址,所述第三电子设备与所述第一账号相关。
  19. 根据权利要求18所述的方法,其特征在于,所述认证信息是基于第一密钥对所述第一账号进行加密生成的,所述方法还包括:
    所述服务器向所述第二电子设备发送与所述第一密钥对应的第二密钥,所述第二密钥用于对所述认证信息进行认证。
  20. 根据权利要求18或19所述的方法,其特征在于,在所述服务器向所述第一电子设备提供所述认证信息之前,还包括:
    所述服务器接收到第四电子设备的申请信息,所述申请信息用于申请与所述第一账号对应的认证信息;
    其中,所述第四电子设备与所述第二电子设备是同一设备,或者,所述第四电子设备与所述第三电子设备是同一设备;或者,所述第四电子设备是与所述第一账号相关且与所述第二电子设备和所述第三电子设备均不同的设备。
  21. 根据权利要求18-20任一所述的方法,其特征在于,所述服务器确定第二电子设备对所述认证信息认证通过之后,向所述第二电子设备发送第三电子设备的连接地址,包括:
    所述服务器接收所述第二电子设备发送的指示信息,所述指示信息用于指示所述第二电子设备对所述认证信息认证通过;
    所述服务器对所述第二电子设备进行身份验证,并在验证通过之后,向所述第二电子设备发送所述第三电子设备的连接地址。
  22. 根据权利要求21所述的方法,其特征在于,所述服务器对所述第二电子设备进行身份验证,包括:
    所述服务器判断所述第二电子设备是否与所述第一账号相关;
    当确定所述第二电子设备与所述第一账号相关时,验证通过,否则,验证不通过。
  23. 根据权利要求18-22任一所述的方法,其特征在于,
    所述第一电子设备是电子标签;
    所述第二电子设备上设置有阅读器;所述阅读器用于读取所述电子标签中的认证信息。
  24. 一种通信系统,其特征在于,包括:第一电子设备和第二电子设备以及服务器;
    所述第一电子设备中存储有认证信息;所述认证信息用于其它电子设备进行认证;
    所述第二电子设备包括:处理器;存储器;其中,所述存储器存储有一个或多个计算机程序,所述一个或多个计算机程序包括指令,当所述指令被所述处理器执行时,使得所 述第二电子设备执行如权利要求1至11任一项所述的方法中第二电子设备的步骤;
    所述服务器包括:处理器;存储器;其中,所述存储器存储有一个或多个计算机程序,所述一个或多个计算机程序包括指令,当所述指令被所述处理器执行时,使得所述第二电子设备执行如权利要求1至11任一项所述的方法中服务器的步骤。
  25. 一种电子设备,其特征在于,包括:
    处理器,存储器,以及,一个或多个程序;
    其中,所述一个或多个程序被存储在所述存储器中,所述一个或多个程序包括指令,当所述指令被所述处理器执行时,使得所述电子设备执行如权利要求12至17中任意一项或者18至23中任意一项所述的方法步骤。
  26. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质用于存储计算机程序,当所述计算机程序在计算机上运行时,使得所述计算机执行如权利要求1至23中任意一项所述的方法。
PCT/CN2022/123965 2021-10-26 2022-10-09 一种设备控制方法与相关设备 WO2023071733A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111246648.3A CN116028916A (zh) 2021-10-26 2021-10-26 一种设备控制方法与相关设备
CN202111246648.3 2021-10-26

Publications (1)

Publication Number Publication Date
WO2023071733A1 true WO2023071733A1 (zh) 2023-05-04

Family

ID=86080098

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/123965 WO2023071733A1 (zh) 2021-10-26 2022-10-09 一种设备控制方法与相关设备

Country Status (2)

Country Link
CN (1) CN116028916A (zh)
WO (1) WO2023071733A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104661219A (zh) * 2015-01-15 2015-05-27 天地融科技股份有限公司 一种无线设备的通讯方法、无线设备和服务器
WO2020047710A1 (zh) * 2018-09-03 2020-03-12 华为技术有限公司 一种登录方法、令牌发送方法及设备
US20200169886A1 (en) * 2018-11-23 2020-05-28 Samsung Eletrônica da Amazônia Ltda. Secure method for configuring internet of things (iot) devices through wireless technologies
CN113196732A (zh) * 2020-09-30 2021-07-30 华为技术有限公司 一种跨设备认证方法及相关装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104661219A (zh) * 2015-01-15 2015-05-27 天地融科技股份有限公司 一种无线设备的通讯方法、无线设备和服务器
WO2020047710A1 (zh) * 2018-09-03 2020-03-12 华为技术有限公司 一种登录方法、令牌发送方法及设备
US20200169886A1 (en) * 2018-11-23 2020-05-28 Samsung Eletrônica da Amazônia Ltda. Secure method for configuring internet of things (iot) devices through wireless technologies
CN113196732A (zh) * 2020-09-30 2021-07-30 华为技术有限公司 一种跨设备认证方法及相关装置

Also Published As

Publication number Publication date
CN116028916A (zh) 2023-04-28

Similar Documents

Publication Publication Date Title
US20210218725A1 (en) Login Method, Token Sending Method, and Device
WO2021147745A1 (zh) 蓝牙连接方法、系统和电子设备
WO2021052178A1 (zh) 一种Wi-Fi连接方法及设备
WO2020233538A1 (zh) 一种接入无线局域网的方法和终端
CN113609498B (zh) 数据保护方法及电子设备
WO2021135593A1 (zh) 一种分享设备的方法及电子设备
WO2020042119A1 (zh) 一种消息传输方法及设备
WO2021093855A1 (zh) 一种移动设备管理方法及设备
US20240095329A1 (en) Cross-Device Authentication Method and Electronic Device
WO2021147660A1 (zh) 一种数据传输方法及设备
US20240007851A1 (en) Device control right obtaining method and communication system
CN113676879A (zh) 一种分享信息的方法、电子设备和系统
EP4138462A1 (en) Information sharing method, electronic devices and system
CN114692094A (zh) 一种应用程序权限管理方法及电子设备
WO2023071733A1 (zh) 一种设备控制方法与相关设备
WO2022165939A1 (zh) 一种跨设备认证方法及电子设备
CN113709024B (zh) 数据传输方法、介质及其电子设备
CN116340913A (zh) 登录方法、电子设备及计算机可读存储介质
CN113688368A (zh) 一种跨设备认证的方法
CN113645024A (zh) 密钥分发方法、系统、装置及可读存储介质和芯片
WO2023169545A1 (zh) 离线设备控制方法及相关装置
WO2023020497A1 (zh) 一种设备控制方法与电子设备
WO2023040555A1 (zh) 一种跨设备信息展示方法与电子设备
WO2023024887A1 (zh) 跨设备认证方法和装置
CN118102295A (zh) 一种通信方法以及电子设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22885614

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE