WO2023124567A1 - Procédé et appareil de communication de données, support de stockage et produit-programme - Google Patents

Procédé et appareil de communication de données, support de stockage et produit-programme Download PDF

Info

Publication number
WO2023124567A1
WO2023124567A1 PCT/CN2022/131055 CN2022131055W WO2023124567A1 WO 2023124567 A1 WO2023124567 A1 WO 2023124567A1 CN 2022131055 W CN2022131055 W CN 2022131055W WO 2023124567 A1 WO2023124567 A1 WO 2023124567A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
processor
target application
data
authorized
Prior art date
Application number
PCT/CN2022/131055
Other languages
English (en)
Chinese (zh)
Inventor
马安生
杨玉林
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Publication of WO2023124567A1 publication Critical patent/WO2023124567A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0225Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0261Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/06Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • the present application relates to the technical field of mobile terminals, and more specifically, to a data communication method, device, terminal, storage medium and program product.
  • the large core is usually an intelligent processor with rich functions and strong processing capabilities, and has more linkage functions with external terminal equipment.
  • Communication is larger; small cores usually support relatively simple functions, run on a real-time operating system, have no ecological openness, and controllable data communication.
  • a data communication method is provided, which is applied to a first terminal, and the first terminal includes a first processor and a second processor, the first processor is used to run the first system, and the second a processor for operating a second system; the method comprising:
  • the target application When the first system is in a dormant state, if the target application is authorized in the first terminal, responding to the communication data.
  • a data communication method which is applied to a second terminal; the method includes:
  • the first terminal When the data communication switch of the second terminal is off, if the target application is authorized in the second terminal, send the communication data to the first terminal, so that the first terminal When the first system is in a dormant state and the target application is authorized in the first terminal, responding to the communication data;
  • the first terminal includes a first processor and a second processor, and the first terminal includes a first processor and a second processor, and the first terminal includes A processor is used to run the first system, and the second processor is used to run the second system.
  • a data communication device which is applied to a first terminal, and the first terminal includes a first processor and a second processor, the first processor is used to run the first system, and the second a processor for running a second system; said means comprising:
  • a receiving module configured to receive communication data sent by the second terminal
  • a first determining module configured to determine a target application according to the communication data
  • the second determining module is configured to respond to the communication data if the target application is authorized in the first terminal when the first system is in a dormant state.
  • a data communication device which is applied to a second terminal, and the device includes:
  • an acquisition module configured to acquire communication data of the target application
  • a first determining module configured to send the communication data to the first terminal if the target application is authorized in the second terminal when the data communication switch of the second terminal is off, making the first terminal respond to the communication data when the first system is in a dormant state and the target application is authorized in the first terminal;
  • the first terminal includes a first processor and a second Two processors, the first processor is used to run the first system, and the second processor is used to run the second system.
  • a terminal including a memory, a first processor, and a second processor, the memory stores a computer program, the first processor is used to run the first system, and the second processor is used to Running the second system, when the first processor and the second processor execute the computer program, the terminal implements the data communication method described in the first aspect.
  • a sixth aspect provides a terminal, including a memory and a processor, the memory stores a computer program, and when the processor executes the computer program, the terminal implements the steps of the method described in the second aspect.
  • a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, the steps of the methods described in the first aspect and the second aspect are implemented.
  • a computer program product including a computer program, and when the computer program is executed by a processor, the steps of the methods described in the first aspect and the second aspect are implemented.
  • the data communication method is applied to the first terminal with dual systems, the first terminal receives the communication data sent by the second terminal, and can determine according to the communication data sent by the second terminal output the target application corresponding to the communication data, and then the first terminal can respond to the communication data if the target application is authorized in the first terminal when the first system is in a dormant state, especially if the target application is not authorized in the first terminal When authorized, the first terminal does not respond to the communication data, that is, it will not wake up the first system, thereby avoiding the situation that the first terminal frequently wakes up the first system when receiving communication data, and the first terminal can be activated through the target application Responding to communication data when authorized, further reduces power consumption of the first terminal on the premise of ensuring user experience.
  • Fig. 1 is an application environment diagram of a data communication method in an embodiment
  • Fig. 1a is a schematic diagram of a hardware architecture of a first terminal in an embodiment
  • Fig. 2 is a schematic flow chart of a data communication method in an embodiment
  • Figure 2a is a schematic diagram of interaction between a first terminal and a second terminal in an embodiment
  • Fig. 2b is a schematic diagram of interaction between the first terminal and the second terminal in another embodiment
  • Fig. 2c is a schematic diagram of interaction between the first terminal and the second terminal in another embodiment
  • Fig. 3 is a schematic flow chart of a data communication method in another embodiment
  • Figure 3a is a schematic diagram of interaction between a terminal and a server in an embodiment
  • Figure 3b is a schematic diagram of interaction between a terminal and a server in an embodiment
  • FIG. 4 is a schematic flow diagram of a data communication method in another embodiment
  • FIG. 5 is a schematic flow diagram of a data communication method in an embodiment
  • FIG. 6 is a schematic flow chart of a data communication method in another embodiment
  • FIG. 7 is a schematic flow diagram of a data communication method in another embodiment
  • Fig. 8 is a structural block diagram of a data communication device in an embodiment
  • Fig. 9 is a structural block diagram of a data communication device in an embodiment
  • FIG. 10 is an internal structural diagram of a terminal in an embodiment
  • Fig. 11 is an internal structure diagram of a terminal in another embodiment.
  • first, second and the like used in this application may be used to describe various elements herein, but these elements are not limited by these terms. These terms are only used to distinguish one element from another element.
  • a first client could be termed a second client, and, similarly, a second client could be termed a first client, without departing from the scope of the present application.
  • Both the first client and the second client are clients, but they are not the same client.
  • the data communication method provided in this application can be applied to the application environment shown in FIG. 1 .
  • the first terminal 102 and the second terminal 104 may communicate through Bluetooth or Wi-Fi.
  • the first terminal 102 can be a smart watch with dual systems, but it is not limited to watches and can also be other terminal devices, such as mobile phones, computers, iPads, game consoles, etc., and can also be portable wearable devices with dual systems. , such as wristbands, helmets, earphones, smart glasses, etc.
  • the first terminal 102 includes a first processor and a second processor, the first processor is used to run the first system, the second processor is used to run the second system, and the power consumption of the first processor is greater than that of the second processor. Power consumption.
  • the processing capability of the first processor is better than that of the second processor.
  • the hardware architecture of the first terminal 102 may be an architecture diagram as shown in FIG. 1a, wherein, the first system of the first terminal 102 may be the SDW3300 system; the second system may be the Apollo4 system, or Android system, the second system is Rtos system and so on.
  • the sleep mode of the dual-system terminal refers to the state of the dual-system terminal in which the system with lower power consumption runs in the foreground, and the intelligent system with higher power consumption runs in the background.
  • the first system of the first terminal is the Android system
  • the second The second system is the Rtos system as an example.
  • the Android system of the first terminal When the Android system of the first terminal is in the foreground, it means that the Android system in the dual-core system currently obtains the display right of the LCD screen (Liquid Crystal Display, lcd) of the first terminal, and the LCD screen of the first terminal Display Android system content; when the Rtos system of the first terminal is in the foreground, it means that the Rtos system in the dual-core system currently obtains the right to display the LCD screen lcd of the first terminal, and the LCD screen LCD of the first terminal displays the content of the Rtos system.
  • the Bluetooth chip BT mounted on the second system in FIG. 1a is only an example, and the Bluetooth chip BT may also be mounted on the first system.
  • the second terminal 102 may be, but not limited to, any device among various personal computers, notebook computers, smart phones, tablet computers and portable wearable devices.
  • a data communication method is provided.
  • the method is applied to the first terminal in FIG. 1 as an example for illustration, and the first terminal includes a first processor and a second processor , the first processor is used to run the first system, and the second processor is used to run the second system.
  • the data communication method includes the following steps:
  • S201 Receive communication data sent by a second terminal.
  • the communication data may be communication data generated by an application running on the second terminal, for example, the application may be a voice communication application, and the generated communication data may be voice communication data, etc.; for another example, the application may be an image display Class applications, the generated communication data may be image communication data and the like.
  • the first terminal and the second terminal may establish a communication connection through Bluetooth, or may establish a communication connection through the wireless fidelity technology Wi-Fi, that is, the first terminal may receive information through Bluetooth communication with the second terminal.
  • the communication data sent by the second terminal may also receive the communication data sent by the second terminal through Wi-Fi communication with the second terminal.
  • the Bluetooth chip or the Wi-Fi chip of the first terminal can be mounted on the above-mentioned first system, and can also be mounted on the above-mentioned second system. It is understandable that when the Bluetooth chip or the Wi-Fi chip is mounted on Loaded on the first system, when the first system of the first terminal enters the dormant state, the first terminal can switch the operation right of Bluetooth or Wi-Fi to the second system; when the Bluetooth chip or Wi-Fi chip is mounted on the On the second system, when the second system of the first terminal enters a dormant state, the first terminal may switch the operation right of the Bluetooth chip or the Wi-Fi chip to the first system.
  • the target application refers to a general term for an application with different client interfaces, for example, it may be a communication application in the first terminal or the second terminal, and the target application may have an A client, therefore, can be authorized separately at the first terminal and at the second terminal.
  • the target application may be a communication application running on the first terminal, an entertainment application, or an image display application.
  • the above communication data sent by the second terminal may carry an application identifier, and the first terminal may determine the target application according to the application identifier in the received communication data.
  • the first terminal may analyze the character segment of the received communication data, and determine the target application corresponding to the communication data according to the analysis result of the character segment.
  • the target application may also be determined according to the transmission port of the communication data.
  • the first system of the first terminal may be in a dormant state, or may be in a working state.
  • the target application may be authorized or not authorized in the first terminal.
  • the first terminal may send the voice communication data to the second terminal by making a voice call in response to the above communication data, or it may also be displaying image information corresponding to the above communication data on the first terminal.
  • whether the target application is authorized can be preset for the user.
  • the user can preset a whitelist to authorize all applications in the whitelist, and the first terminal determines the After the target application is applied, it can be determined whether the target application is authorized by checking whether the target application is in the white list; or, the first terminal can also send an application authorization request to the cloud server, requesting the cloud server to authorize the application, and the cloud server to authorize the application Afterwards, the authorization identifier is sent to the first terminal. After the first terminal determines the target application according to the above communication data, it can determine whether the target application is authorized by checking whether the target application has an authorization identifier.
  • the first terminal when the first system of the first terminal is in a dormant state, that is, the second system of the first terminal is running in the foreground, if it is determined that the target application is authorized in the first terminal, as As shown in Figure 2a, the first terminal can determine to respond to the above communication data, and communicate normally with the target application in the second terminal, for example, the first terminal can wake up the first system through the second system, and the first system executes the communication data Perform response operations such as processing, displaying, and sending corresponding data to the second terminal; if it is determined that the target application is not authorized in the first terminal, as shown in Figure 2b, the first terminal may determine not to respond to the above communication data, and the first terminal The target application on the second terminal cannot communicate normally with the target application on the second terminal.
  • the second system of the first terminal will not wake up the first system, so the communication data can be discarded directly, or the communication data can be stored, and wait until the first system
  • the first system When switching from the dormant state to the working state, the first system will process and respond to the communication data, thereby reducing the frequency and duration of waking up the first system, thereby saving power consumption of the first terminal.
  • the first terminal when the first system of the first terminal is in the working state, that is, the first system is running in the foreground, since the first system is open to the outside world at this time, there are more linkage functions with external terminal devices and a larger amount of communication data , as shown in Figure 2c, no matter whether the target application is authorized in the first terminal at this time, the first terminal can respond to the received communication data, and the target application in the first terminal and the target application in the second terminal communicate normally. communication.
  • the above data communication method is applied to the first terminal with dual systems, the first terminal receives the communication data sent by the second terminal, and can determine the target application corresponding to the communication data according to the communication data sent by the second terminal, and then the first terminal can be in When the first system is in a dormant state, if the target application is authorized in the first terminal, it will respond to the communication data, especially when the target application is not authorized in the first terminal, the first terminal will not respond to the communication data, that is, The first system will not be woken up, thereby avoiding the situation that the first terminal frequently wakes up the first system when it receives communication data. By responding to communication data when the target application is authorized in the first terminal, user experience is ensured. On the premise, the power consumption of the first terminal is further reduced.
  • the above method further includes: if the target application is not authorized in the first terminal, not responding to the communication data.
  • the first terminal may send an authorization request to the server to authorize its own application when the first system is in the working state. If the server passes the authorization request of the first terminal, it will authorize the application corresponding to the authorization request. If the server If the authorization request of the first terminal is not passed, the application corresponding to the authorization request is not authorized. After the server authorizes the application corresponding to the authorization request of the first terminal, the authorization code of the application corresponding to the authorization request is sent to the first terminal, and the first terminal Save the authorization code sent by the server.
  • the first terminal may inquire whether the first terminal stores the authorization code of the target application. If the first terminal stores the authorization code of the target application code, the first terminal may determine that the target application is authorized, and if no authorization code for the target application is stored in the first terminal, the first terminal may determine that the target application is not authorized. Further, if the target application is not authorized in the first terminal, the first terminal will not respond to the above communication data. Optionally, the first terminal may directly discard the communication data, or store the communication data, and wait until When the first system switches from the dormant state to the working state, the first system will process and respond to the communication data. Optionally, if the target application is authorized in the first terminal, the first terminal will wake up the first system, so that the first terminal and the first system respond to the communication data.
  • the first terminal when the first system of the first terminal is in a dormant state, if the target application is not authorized in the first terminal, the first terminal will not respond to the received communication data, which avoids frequent The first system is woken up in a timely manner, thereby saving power consumption of the first terminal under the premise of ensuring user experience.
  • the first terminal may query whether the authorization code of the target application is stored in the first terminal to determine whether the target application is authorized , therefore, the first terminal needs to first obtain the authorization code of each application.
  • the above method also includes:
  • the first terminal and the server can communicate through the network.
  • the application in the first terminal An authorization request may be sent to the server through the network, the authorization request includes the application identifier, and the server may authorize the application corresponding to the application identifier included in the authorization request, and send an authorization response to the authorization request to the first terminal.
  • Figure 3a and Figure 3b also illustrate the process of the second terminal sending an authorization request to the server through the network and receiving the authorization response sent by the server to the second terminal; the data center of the first terminal in Figure 3a
  • the module can obtain the system switching information of the first terminal, and control whether the first system enters the sleep mode to control the working mode of the first terminal through the control module in the data center module.
  • the data center module of the first terminal can also pass through the data center
  • the module sends the working mode of the first terminal to the second terminal, so that the second terminal can control the data communication switch state between the first terminal and the second terminal according to the working mode of the first terminal; wherein, the first system of the first terminal It can be connected with the second system through the hardware serial port shown in Figure 3a.
  • the Bluetooth module of the first terminal and the Bluetooth module of the second terminal can include a Bluetooth interface and a Bluetooth protocol stack.
  • the authorization request sent by the first terminal to the server may include the application identifier of one application, or the application identifiers of multiple applications.
  • the applications included in the first terminal may be: application A, application B, and application C
  • the application identification included in the authorization request sent to the server may include the identification of application A, or may include the identification of application B, or may include the application
  • the identifier of C may include at least two application identifiers among the identifier of application A, the identifier of application B, and the identifier of application C.
  • the first terminal may receive an authorization response to the above authorization request sent by the server through network communication with the server, where the authorization response includes the authorization code corresponding to the above application identifier. Further, the first When the terminal receives the authorization code corresponding to the application identifier included in the authorization response sent by the server, the authorization code corresponding to the application identifier can be saved. It can be understood that when the first terminal receives the authorization code corresponding to the application identifier included in the authorization response sent by the server, it means that the server has authorized the application corresponding to the application identifier, and the authorization status of the application with the authorization code is authorized.
  • the first terminal when the first system of the first terminal is in the working state, the first terminal sends an authorization request including the application identifier to the server, enabling the server to authorize the application corresponding to the application identifier, so that the first The terminal receives the authorization response to the authorization request sent by the server, and the authorization response includes the authorization code corresponding to the application identifier, so that the first terminal can accurately obtain the authorization code corresponding to the application identifier included in the authorization request sent,
  • the authorization code is in one-to-one correspondence with the application identification in the sent authorization request, which ensures the accuracy of the authorization code received by the first terminal.
  • the above method further includes: responding to the communication data when the first system is in a working state.
  • the first terminal when the first terminal is in the working state of the first system, because the first system of the first terminal is open to the outside world, there are more linkage functions with external terminal equipment and larger communication data. Whether or not the target application of the terminal is an authorized application, the first terminal can respond to the received communication data and perform normal communication with the second terminal.
  • the first terminal when the first system of the first terminal is in the working state, the first terminal can respond to the communication data sent by the second terminal, so that the first terminal and the second terminal can communicate normally and ensure the communication quality. Meet user needs.
  • the first terminal needs to determine the status of the first system.
  • the first terminal can determine the status of the first system according to the system switching information.
  • the above method also includes:
  • the system switching information refers to the information that the first terminal switches from the first system in the dormant state to the first system in the working state, or refers to the information that the first terminal switches from the first system in the working state to the first system in the dormant state. information.
  • the first system of the first terminal when the first system of the first terminal is switched from the dormant state to the working state, the first system of the first terminal will generate switching information after switching to the working state, and inform the first system of the switching information
  • the data center module Middleware STACK of the terminal or the processor of the first terminal so that the first terminal obtains its own system switching information
  • the first system when the first system needs to switch from the working state to the dormant state, the first system will generate a switching state before switching Information, and inform the Middleware STACK data center module of the first terminal or the processor of the first terminal of the switching information, so that the first terminal obtains its own system switching information.
  • S402. Determine the state of the first system according to the system switching information.
  • the first terminal may determine that the first system is in the working state; if the system switching information indicates that the first system is switching from the working state to the dormant state, Then the first terminal may determine that the first system is in a dormant state.
  • the first terminal may also send the determined state of the first system to the second terminal, so that the second terminal can control the state of the data communication switch of the second terminal according to the state of the first system.
  • the second terminal can control the state of the data communication switch of the second terminal to be off when the first system is in the dormant state.
  • the application of the first terminal and the application of the second terminal will not be able to communicate normally, or the second terminal
  • the state of the data communication switch of the second terminal can be controlled to be turned on.
  • the application of the first terminal and the application of the second terminal can communicate normally, thus ensuring that the first terminal In the case of being able to communicate with the second terminal, the power consumption of the first terminal is further reduced.
  • the first terminal can quickly determine the state of the first system according to its own system switching information, thereby improving the efficiency of determining the state of the first system.
  • a data communication method is provided.
  • the method is applied to the second terminal in FIG. 1 as an example for illustration.
  • the data communication method includes the following steps:
  • the target application refers to a general term for an application with different client interfaces, for example, it may be a communication application in the first terminal or the second terminal, and the target application may have an A client, therefore, can be authorized separately at the first terminal and at the second terminal.
  • the target application may be an application running on the second terminal, and the target application may be a voice communication application or an entertainment application running on the second terminal, or, It is possible to display class applications for images.
  • the communication data of the target application may be communication data generated by a communication application running on the second terminal, or communication data generated by an entertainment application running on the second terminal, or may be The image on the second terminal shows the communication data generated by the application.
  • the second terminal may determine the type of application triggered by the user according to the received trigger instruction, and then determine the communication data generated by the application triggered by the user as the communication data of the target application.
  • the data communication switch of the second terminal When the data communication switch of the second terminal is off, if the target application is authorized in the second terminal, send communication data to the first terminal, so that the first terminal is in a dormant state in the first system and When the target application is authorized in the first terminal, respond to the communication data; the first terminal includes a first processor and a second processor, the first processor is used to run the first system, and the second processor is used to run the second system .
  • the second terminal can control the state of the data communication switch of the second terminal according to the state of the first system of the first terminal. For example, if the first system of the first terminal is in a dormant state, the second terminal can control the state of the second The state of the data communication switch of the terminal is off; if the first system of the first terminal is in working state, the second terminal can control the state of the data communication switch of the second terminal to be on.
  • the target application can be authorized or not authorized in the second terminal. In this embodiment, whether the target application is authorized in the second terminal can be preset for the user.
  • the user can preset a White list, authorize all the applications in the white list, the second terminal can check whether the target application is in the white list to determine whether the target application is authorized; or, the second terminal can also send an application authorization request to the cloud server, requesting The cloud server authorizes the application, and after the cloud server authorizes the application, it sends an authorization identifier to the second terminal, and the second terminal can determine whether the target application is authorized by checking whether the target application has an authorization identifier.
  • the second terminal determines that its own data communication switch is off, and if the target application is authorized in the second terminal, the second terminal will send the obtained target application ID to the first terminal.
  • Communication data further, after the first terminal receives the communication data, if the first system of the first terminal is in a dormant state, the first terminal can determine whether the target application is authorized in the first terminal, if the target application If the target application is authorized in the first terminal, the first terminal may respond to the communication data. If the target application is not authorized in the first terminal, the first terminal does not respond to the communication data.
  • the data communication switch of the second terminal when the data communication switch of the second terminal is turned off, according to whether the target application is authorized in the second terminal, determine whether to send communication data to the first terminal, and then send the communication data to the first terminal.
  • communicating data consider whether the target application is authorized in the second terminal, and send communication data to the first terminal when the target application is authorized in the second terminal, so that the first terminal is in a dormant state in the first system and the target
  • the application is authorized in the first terminal, it responds to the received communication data, which avoids the situation that the second terminal frequently wakes up the first system of the first terminal, and further reduces the need for the first system on the premise of ensuring user experience. Power consumption of a terminal.
  • the above method further includes: if the target application is not authorized in the second terminal, prohibiting sending communication data to the first terminal.
  • the second terminal may send an authorization request to the server to authorize its own application. If the server passes the authorization request of the second terminal, it will authorize the application corresponding to the authorization request. If the server fails to pass the authorization request of the second terminal The authorization request does not authorize the application corresponding to the authorization request. After the server authorizes the application corresponding to the authorization request of the second terminal, it will send the authorization code of the application corresponding to the authorization request to the second terminal, and the second terminal can send the authorization code to the server. to save the authorization code.
  • the second terminal can determine whether the authorization code of the target application is stored in the second terminal to determine whether the target application is in the second terminal.
  • the second terminal can determine that the target application is authorized in the second terminal, if the authorization code of the target application is not stored in the second terminal, the second terminal The second terminal may determine that the target application is not authorized in the second terminal. Further, if the second terminal determines that the target application is not authorized in the second terminal, the second terminal will prohibit itself from sending the communication data to the first terminal.
  • the second terminal determines whether the target application is authorized in the second terminal, and if the target application is not authorized in the second terminal, prohibits sending Sending communication data avoids the situation that the second terminal frequently sends communication data to the first terminal, thereby avoiding the frequent wake-up of the first system of the first terminal by the second terminal, and saving the second terminal on the premise of ensuring user experience. Power consumption of a terminal.
  • the second terminal can query whether the authorization code of the target application is stored in the second terminal, and according to whether the authorization code of the target application is stored in the second terminal The code determines whether the target application is authorized in the second terminal, therefore, the second terminal needs to first obtain the authorization code of each application.
  • the above method also includes:
  • the second terminal and the server can communicate through the network.
  • the application corresponding to the application identifier included in the authorization request may be authorized, and an authorization response to the authorization request may be sent to the second terminal.
  • the authorization request sent by the second terminal to the server may include the application identifier of one application, or the application identifiers of multiple applications.
  • the applications included in the second terminal may be: application D, application E, and application F
  • the application identifier included in the authorization request sent by the second terminal to the server may include the identifier of application D, or may include the identifier of application E, or may include the identifier of application F, or may include the identifier of application D
  • the second terminal may receive an authorization response to the above authorization request sent by the server through network communication with the server, wherein the authorization response includes the authorization code corresponding to the above application identification, further, the second terminal
  • the authorization code corresponding to the application identifier can be saved. It can be understood that when the second terminal receives the authorization code corresponding to the application ID included in the authorization response sent by the server, it means that the server has authorized the application corresponding to the application ID, and the authorization status of the application with the authorization code is authorized.
  • the second terminal sends an authorization request including an application identifier to the server, enabling the server to authorize the application corresponding to the application identifier, so that the second terminal can receive an authorization response to the authorization request sent by the server, and
  • the authorization response includes the authorization code corresponding to the application identifier, so that the second terminal can accurately obtain the authorization code corresponding to the application identifier included in the sent authorization request, and the authorization code and the application identifier in the sent authorization request are identical
  • One-to-one correspondence ensures the accuracy of the authorization code received by the second terminal.
  • the above method further includes: when the data communication switch is turned on, sending communication data to the first terminal, so that the first terminal is in a dormant state in the first system and the target application is in the first terminal If authorized, respond to communication data.
  • the data interaction between the application in the second terminal and the application in the second terminal is not restricted, and the application in the second terminal can send communication to the first terminal.
  • the first terminal determines whether to respond to the received communication data according to whether the target application is authorized in the first terminal when the first system is in a dormant state, further, if the target application is authorized in the first terminal If authorized, the first terminal will respond to the received communication data.
  • the second terminal when the data communication switch of the second terminal is turned on, the second terminal can send communication data to the first terminal, so that when the first system of the first terminal is in a dormant state, the first terminal can use the
  • a terminal is authorized to respond to the communication data, whether to respond to the communication data is determined by whether the target application is authorized in the first terminal, which prevents the second terminal from frequently waking up the first system of the first terminal, thereby reducing the first terminal's power consumption.
  • the second terminal can control the state of its own data communication switch according to the state of the first system of the first terminal.
  • the second terminal needs to obtain the state of the first system of the first terminal first.
  • the above method also includes:
  • the state of the first system of the first terminal includes that the first system is in a dormant state and that the first system is in a working state.
  • the first terminal may determine the status of its own first system according to its own system switching information, where the system switching information refers to the first terminal switching from the first system in a dormant state to the first The information that the system is in the working state, or refers to the information that the first terminal switches from the first system being in the working state to the first system being in the dormant state.
  • the first terminal may determine that the state of the first system is that the first system is in the working state; if the first terminal determines that the system switching If the information indicates that the first system is switched from the working state to the dormant state, the first terminal may determine that the state of the first system is that the first system is in the dormant state.
  • the first terminal can obtain the system switching information of the first terminal through its own Middleware STACK data center module, or the first terminal can also obtain the system switching information of the first terminal through its own processor, and switch according to the system The information determines the state of the first system, and sends the state of the first system to the second terminal through the Bluetooth communication connection or the WIFI communication connection with the second terminal.
  • the second terminal may receive the status of the first system of the first terminal sent by the first terminal through its own Middleware STACK data center module.
  • the second terminal can control its own data communication switch to be off; if the second terminal receives the first terminal's When the state of the first system is in the working state, the second terminal can control its own data communication switch to be in the on state. It can be understood that when the data communication switch of the second terminal is turned on, the application in the second terminal can communicate with the application in the first terminal normally; when the data communication switch of the second terminal is turned off, the second terminal The application in the terminal and the application in the first terminal will not be able to communicate normally.
  • the second terminal can control the state of its own data communication switch according to the state of the first system of the first terminal by receiving the state of the first system of the first terminal sent by the first terminal, so that the state of the second terminal
  • the state of the data communication switch is consistent with the state of the first system of the first terminal, ensuring that the second terminal can accurately control the state of its own data communication switch.
  • the first terminal can determine whether to respond to the received communication data according to whether the target application corresponding to the received communication data is authorized in the first terminal, so as to reduce the power consumption of the first terminal, and also The second terminal may determine whether to send communication data to the first terminal according to whether the target application is authorized in the second terminal when its own data communication switch is turned off, so that the first terminal is in a dormant state in the first system. In some cases, if the target application is authorized in the first terminal, the communication data will be responded to, so as to reduce the power consumption of the first terminal.
  • the data communication method provided by this application is described in detail below in combination with two complete embodiments:
  • the first terminal determines whether to respond to the received communication data according to whether the target application corresponding to the received communication data is authorized in the first terminal, so as to reduce the power consumption of the first terminal.
  • the method can include:
  • the second method is to determine whether to send communication data to the first terminal according to whether the target application is authorized in the second terminal when the data communication switch of the second terminal is turned off so that the first terminal is in the first system.
  • the method may include:
  • FIGS. 2-7 may include multiple steps or stages. These steps or stages are not necessarily executed at the same moment, but may be executed at different moments.
  • the steps or stages The execution sequence is not necessarily performed sequentially, but may be performed alternately or alternately with other steps or at least a part of steps or stages in other steps.
  • a data communication device is provided, which is applied to a first terminal, where the first terminal includes a first processor and a second processor, and the first processor is used to run the first system, The second processor is used to run the second system; the device includes: a receiving module, a first determining module and a second determining module, wherein:
  • the receiving module is configured to receive the communication data sent by the second terminal.
  • the first determining module is configured to determine the target application according to the communication data.
  • the second determination module is configured to respond to the communication data if the target application is authorized in the first terminal when the first system is in a dormant state.
  • the data communication device provided in this embodiment can execute the above-mentioned method embodiment, and its implementation principle and technical effect are similar, and details are not repeated here.
  • the foregoing apparatus further includes: an execution module, wherein:
  • An execution module configured to not respond to communication data if the target application is not authorized in the first terminal.
  • the data communication device provided in this embodiment can execute the above-mentioned method embodiment, and its implementation principle and technical effect are similar, and details are not repeated here.
  • the above second determination module includes: an execution unit, wherein:
  • the execution unit is used for waking up the first system, and the first system responds to the communication data.
  • the data communication device provided in this embodiment can execute the above-mentioned method embodiment, and its implementation principle and technical effect are similar, and details are not repeated here.
  • the above device further includes: a third determining module and a fourth determining module, wherein:
  • the third determining module is configured to determine that the target application is authorized if the authorization code of the target application is stored in the first terminal.
  • a fourth determining module configured to determine that the target application is not authorized if the authorization code of the target application is not stored in the first terminal.
  • the data communication device provided in this embodiment can execute the above-mentioned method embodiment, and its implementation principle and technical effect are similar, and details are not repeated here.
  • the above device further includes: a first sending module and a receiving module, wherein:
  • the first sending module is configured to send an authorization request to the server in the working state of the first system; the authorization request includes the application identification.
  • the receiving module is configured to receive the authorization response sent by the server; the authorization response includes the authorization code corresponding to the application identification.
  • the data communication device provided in this embodiment can execute the above-mentioned method embodiment, and its implementation principle and technical effect are similar, and details are not repeated here.
  • the above device further includes: a response module, wherein:
  • the response module is used for responding to the communication data when the first system is in working state.
  • the data communication device provided in this embodiment can execute the above-mentioned method embodiment, and its implementation principle and technical effect are similar, and will not be repeated here.
  • the above device further includes: an acquisition module and a fifth determination module, wherein:
  • An acquiring module configured to acquire system switching information of the first terminal.
  • the fifth determining module is configured to determine the state of the first system according to the system switching information.
  • the data communication device provided in this embodiment can execute the above-mentioned method embodiment, and its implementation principle and technical effect are similar, and details are not repeated here.
  • the foregoing apparatus further includes: a second sending module, wherein:
  • the second sending module is configured to send the state of the first system to the second terminal, so that the second terminal controls the state of the data communication switch of the second terminal according to the state of the first system.
  • the data communication device provided in this embodiment can execute the above-mentioned method embodiment, and its implementation principle and technical effect are similar, and details are not repeated here.
  • Each module in the above-mentioned data communication device can be fully or partially realized by software, hardware and a combination thereof.
  • the above-mentioned modules can be embedded in or independent of the processor in the computer device in the form of hardware, and can also be stored in the memory of the computer device in the form of software, so that the processor can invoke and execute the corresponding operations of the above-mentioned modules.
  • a data communication device which is applied to a second terminal; the device includes: an acquisition module and a first determination module, wherein:
  • the obtaining module is used to obtain the communication data of the target application.
  • the first determination module is configured to send communication data to the first terminal if the target application is authorized in the second terminal when the data communication switch of the second terminal is off, so that the first terminal When the system is in a dormant state and the target application is authorized in the first terminal, responding to the communication data;
  • the first terminal includes a first processor and a second processor, the first processor is used to run the first system, and the second processor is used to Run the second system.
  • the data communication device provided in this embodiment can execute the above-mentioned method embodiment, and its implementation principle and technical effect are similar, and details are not repeated here.
  • the foregoing apparatus further includes: an execution module, wherein:
  • the execution module is used for prohibiting sending communication data to the first terminal if the target application is not authorized in the second terminal.
  • the data communication device provided in this embodiment can execute the above-mentioned method embodiment, and its implementation principle and technical effect are similar, and details are not repeated here.
  • the above device further includes: a second determination module and a third determination module, wherein:
  • the second determining module is configured to determine that the target application is authorized in the second terminal if the authorization code of the target application is stored in the second terminal.
  • the third determining module is configured to determine that the target application is not authorized in the second terminal if the authorization code of the target application is not stored in the second terminal.
  • the data communication device provided in this embodiment can execute the above-mentioned method embodiment, and its implementation principle and technical effect are similar, and details are not repeated here.
  • the above device further includes: a first sending module and a first receiving module, wherein:
  • the first sending module is configured to send an authorization request to the server; the authorization request includes the application identification.
  • the first receiving module is configured to receive the authorization response sent by the server; the authorization response includes an authorization code corresponding to the application identification.
  • the data communication device provided in this embodiment can execute the above-mentioned method embodiment, and its implementation principle and technical effect are similar, and details are not repeated here.
  • the foregoing apparatus further includes: a second sending module, wherein:
  • the second sending module is configured to send communication data to the first terminal when the data communication switch is turned on, so that when the first system is in a dormant state and the target application is authorized in the first terminal, the first terminal, Respond to communication data.
  • the data communication device provided in this embodiment can execute the above-mentioned method embodiment, and its implementation principle and technical effect are similar, and details are not repeated here.
  • the above device further includes: a second receiving module and a control module, wherein:
  • the second receiving module is configured to receive the state of the first system of the first terminal sent by the first terminal.
  • a control module configured to control the state of the data communication switch according to the state of the first system of the first terminal.
  • the data communication device provided in this embodiment can execute the above-mentioned method embodiment, and its implementation principle and technical effect are similar, and details are not repeated here.
  • control module includes: a first control unit and a second control unit, wherein:
  • the first control unit is configured to control the data communication switch to be turned off if the first system of the first terminal is in a dormant state.
  • the second control unit is configured to control the data communication switch to be turned on if the first system of the first terminal is in the working state.
  • the data communication device provided in this embodiment can execute the above-mentioned method embodiment, and its implementation principle and technical effect are similar, and details are not repeated here.
  • Each module in the above-mentioned data communication device can be fully or partially realized by software, hardware and a combination thereof.
  • the above-mentioned modules can be embedded in or independent of the processor in the computer device in the form of hardware, and can also be stored in the memory of the computer device in the form of software, so that the processor can invoke and execute the corresponding operations of the above-mentioned modules.
  • a terminal including a memory, a first processor and a second processor, a computer program is stored in the memory, the first processor is used to run the first system, and the second The processor is used to run the second system, and when the first processor and the second processor execute the computer program, the terminal implements the following steps:
  • the target application When the first system is in a dormant state, if the target application is authorized in the first terminal, responding to the communication data.
  • a terminal including a memory and a processor.
  • a computer program is stored in the memory.
  • the processor executes the computer program, the terminal implements the following steps:
  • the data communication switch of the second terminal When the data communication switch of the second terminal is off, if the target application is authorized in the second terminal, then send communication data to the first terminal, so that the first terminal is in a dormant state in the first system and the target application In the case of being authorized in the first terminal, respond to the communication data;
  • the first terminal includes a first processor and a second processor, the first processor is used to run the first system, and the second processor is used to run the second system.
  • the embodiment of the present application also provides a computer-readable storage medium.
  • One or more non-transitory computer-readable storage media containing computer-executable instructions that, when executed by one or more processors, cause the processors to perform the steps of the data communication method.
  • the embodiment of the present application also provides a computer program product including instructions, which, when running on a computer, causes the computer to execute the data communication method.
  • the user information including but not limited to user equipment information, user personal information, etc.
  • data including but not limited to data used for analysis, stored data, displayed data, etc.
  • any references to memory, storage, database or other media used in the various embodiments provided in the present application may include at least one of non-volatile memory and volatile memory.
  • Non-volatile memory may include read-only memory (Read-Only Memory, ROM), magnetic tape, floppy disk, flash memory or optical memory, etc.
  • Volatile memory can include Random Access Memory (RAM) or external cache memory.
  • RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Les modes de réalisation de la présente divulgation concernent un procédé et un appareil de communication de données, ainsi qu'un terminal, un support de stockage et un produit-programme. Le procédé est appliqué à un premier terminal. Le premier terminal comprend un premier processeur et un second processeur, le premier processeur servant à exécuter un premier système, et le second processeur servant à exécuter un second système. Le procédé consiste à : recevoir des données de communication envoyées par un second terminal ; déterminer une application cible en fonction des données de communication ; et lorsqu'un premier terminal est dans un état de veille, et si l'application cible est autorisée dans le premier terminal, répondre aux données de communication. Au moyen du procédé, la consommation d'énergie d'un dispositif de communication mobile à l'aide d'une architecture système à double cœur grand-petit peut être réduite.
PCT/CN2022/131055 2021-12-31 2022-11-10 Procédé et appareil de communication de données, support de stockage et produit-programme WO2023124567A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111679525.9A CN116419377A (zh) 2021-12-31 2021-12-31 数据通信方法、装置、终端、存储介质和程序产品
CN202111679525.9 2021-12-31

Publications (1)

Publication Number Publication Date
WO2023124567A1 true WO2023124567A1 (fr) 2023-07-06

Family

ID=86997538

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/131055 WO2023124567A1 (fr) 2021-12-31 2022-11-10 Procédé et appareil de communication de données, support de stockage et produit-programme

Country Status (2)

Country Link
CN (1) CN116419377A (fr)
WO (1) WO2023124567A1 (fr)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105204931A (zh) * 2014-06-11 2015-12-30 联发科技(新加坡)私人有限公司 低功耗可穿戴设备及其多操作系统切换、通信及管理方法
CN105227772A (zh) * 2015-09-30 2016-01-06 努比亚技术有限公司 终端唤醒方法和装置
US20160323823A1 (en) * 2015-04-29 2016-11-03 Samsung Electronics Co., Ltd. Method and apparatus for controlling communication of a portable terminal in a wireless communication system
CN107231679A (zh) * 2017-06-20 2017-10-03 维沃移动通信有限公司 一种数据包处理方法及移动终端
US20180120927A1 (en) * 2014-06-11 2018-05-03 Mediatek Singapore Pte. Ltd. Devices and methods for switching and communication among multiple operating systems and application management methods thereof
CN109479244A (zh) * 2016-08-03 2019-03-15 华为技术有限公司 一种唤醒设备的无线通信模块的系统和方法
CN109803359A (zh) * 2013-11-15 2019-05-24 华为终端有限公司 一种唤醒终端系统的方法及终端

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109803359A (zh) * 2013-11-15 2019-05-24 华为终端有限公司 一种唤醒终端系统的方法及终端
CN105204931A (zh) * 2014-06-11 2015-12-30 联发科技(新加坡)私人有限公司 低功耗可穿戴设备及其多操作系统切换、通信及管理方法
US20180120927A1 (en) * 2014-06-11 2018-05-03 Mediatek Singapore Pte. Ltd. Devices and methods for switching and communication among multiple operating systems and application management methods thereof
US20160323823A1 (en) * 2015-04-29 2016-11-03 Samsung Electronics Co., Ltd. Method and apparatus for controlling communication of a portable terminal in a wireless communication system
CN105227772A (zh) * 2015-09-30 2016-01-06 努比亚技术有限公司 终端唤醒方法和装置
CN109479244A (zh) * 2016-08-03 2019-03-15 华为技术有限公司 一种唤醒设备的无线通信模块的系统和方法
CN107231679A (zh) * 2017-06-20 2017-10-03 维沃移动通信有限公司 一种数据包处理方法及移动终端

Also Published As

Publication number Publication date
CN116419377A (zh) 2023-07-11

Similar Documents

Publication Publication Date Title
JP7389264B2 (ja) 無線通信方法及び無線通信機能を有する装置
US11228970B2 (en) Method for transmitting and receiving signals in proximity network and electronic device thereof
US10299210B2 (en) Method and apparatus for reducing power consumption of electronic device
US10506504B2 (en) Discovery method and an electronic device thereof
KR102490415B1 (ko) 전자 장치 및 전자 장치의 전력 제어 방법
US11314309B2 (en) Electronic device control method and apparatus, and electronic device
US20180261190A1 (en) Method for Controlling Display Refresh Rate and Electronic Device
KR102137097B1 (ko) 소모 전류 저감 방법 및 이를 지원하는 전자 장치
US11252724B2 (en) Electronic device for transmitting or receiving data in wireless communication system and method therefor
US10810927B2 (en) Electronic device and method for controlling display in electronic device
KR102540111B1 (ko) 전자 장치 및 전자 장치의 동작 방법
US20230021994A1 (en) Cross-Device Content Projection Method and Electronic Device
US9137628B2 (en) Systems and methods for establishing a wireless display connection
US10257873B2 (en) Method and electronic device for providing tethering service
US20240086228A1 (en) Resource Configuration Method and Apparatus, Electronic Device, and Computer-Readable Storage Medium
KR20220128237A (ko) 멀티코어 통신방법, 장치, 전자기기 및 저장매체
AU2019256257A1 (en) Processor core scheduling method and apparatus, terminal, and storage medium
KR20200052673A (ko) 무선 네트워크에서 근접한 장치들 간 통신 방법 및 장치
KR102343301B1 (ko) 무선 연결을 위한 방법 및 그 전자 장치
CN115640149A (zh) Rdma事件管理方法、设备及存储介质
WO2023124567A1 (fr) Procédé et appareil de communication de données, support de stockage et produit-programme
US20190089738A1 (en) Establishing a proprietary link layer connection with a proprietary device
WO2022089384A1 (fr) Procédé et dispositif de synchronisation de données
CN112367362B (zh) 一种数据处理方法、装置、设备及计算机存储介质
US9612790B2 (en) Method and electronic device for providing frame information

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22913830

Country of ref document: EP

Kind code of ref document: A1