WO2023165414A1 - 一种接入电子设备的方法、系统以及装置 - Google Patents

一种接入电子设备的方法、系统以及装置 Download PDF

Info

Publication number
WO2023165414A1
WO2023165414A1 PCT/CN2023/078029 CN2023078029W WO2023165414A1 WO 2023165414 A1 WO2023165414 A1 WO 2023165414A1 CN 2023078029 W CN2023078029 W CN 2023078029W WO 2023165414 A1 WO2023165414 A1 WO 2023165414A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic device
application program
information
server
application
Prior art date
Application number
PCT/CN2023/078029
Other languages
English (en)
French (fr)
Inventor
董福琦
徐蓓
符常尧
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2023165414A1 publication Critical patent/WO2023165414A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Definitions

  • the embodiments of the present application relate to the field of electronic equipment, and more specifically relate to a method, system, and device for accessing electronic equipment.
  • an application can detect the user's sleep quality by connecting with a wearable device (such as a smart watch, smart bracelet, etc.), but the process of connecting the wearable device to a third-party application is cumbersome, which may cause the wearable device to fail to communicate with the third-party application.
  • a wearable device such as a smart watch, smart bracelet, etc.
  • Embodiments of the present application provide a method, system, and device for accessing electronic devices.
  • a third-party application needs to access an electronic device, it can request permission from the server for direct access, which improves the functionality of the third-party application and enhances the user experience.
  • a system in a first aspect, includes a first electronic device, a second electronic device and a server, the second electronic device includes a first application program, the first application program is a third-party application program, and the first The application program requests access to the first electronic device, the first electronic device is used to send the identification information of the first electronic device; the second electronic device is used to receive the identification information of the first electronic device; the second electronic device is used to receive the identification information of the first electronic device; The electronic device is further configured to send authentication request information of the first application program to the server, where the authentication request information includes identification information of the first electronic device and application program information of the first application program; the server uses for receiving the authentication request information; the server is also used for determining the authentication result according to the authentication request information; the server is also used for sending the authentication result; the second electronic device is also used for receiving the authentication Result; the second electronic device is further used to determine whether the first application program accesses the first electronic device according to the authentication result.
  • a third-party application when a third-party application needs to access the electronic device, it can directly request the server for permission to access the electronic device. If the server determines that the third-party application can access the electronic device, the third-party application can directly access the electronic device.
  • the electronic device so that the third-party application program can realize various expansion functions by connecting to the electronic device, which improves the functionality of the third-party application program and enhances the user experience.
  • the second electronic device is specifically configured to receive the first electronic device from the first electronic device when the first application program requests access to the first electronic device. Identification information of an electronic device.
  • the second electronic device is specifically configured to When the application program requests to access the first electronic device, the identification information of the first electronic device on the second electronic device is obtained and the authentication request information of the first application program is sent to the server.
  • the authentication request information further includes: identification information of the second electronic device.
  • the identification information of the second electronic device may also be used as the authentication request information, which strengthens the security of authority verification, thereby improving the security of user data.
  • the first electronic device is specifically configured to send the identification information of the first electronic device through short-range wireless communication.
  • the server includes access authority information of the first application, where the access authority information is used to indicate the electronic device that the first application is allowed to access.
  • the model number, the server is specifically used to determine the authentication result according to the authentication request information and the access permission information.
  • the server includes access authority information of the first application, where the access authority information is used to indicate the electronic device that the first application is allowed to access. model and the model of the electronic device on which the first application is installed, and the server is specifically configured to determine an authentication result according to the authentication request information and the access authority information.
  • the second electronic device is further configured to store the message authentication code of the first electronic device when the first application program accesses the first electronic device address.
  • the second electronic device can save the message authentication code address of the first electronic device after the second electronic device is connected to the first electronic device, when the first application program accesses the first electronic device again, it will not
  • the first electronic device can be directly connected to the first electronic device only through the server, which improves the speed of accessing the electronic device and enhances user experience.
  • a method for accessing an electronic device is provided, the method is applied to a second electronic device, the second electronic device includes a first application program, and the first application program is a third-party application program, wherein, The method includes: receiving identification information of the first electronic device; sending authentication request information of the first application program to the server, the authentication request information including the identification information of the first electronic device and the application program of the first application program information; receiving the authentication result sent by the server; determining whether the first application program accesses the first electronic device according to the authentication result.
  • a third-party application when a third-party application needs to access the electronic device, it can directly request the server for permission to access the electronic device. If the server determines that the third-party application can access the electronic device, the third-party application can directly access the electronic device.
  • the electronic device so that the third-party application program can realize various expansion functions by connecting to the electronic device, which improves the functionality of the third-party application program and enhances the user experience.
  • the receiving the identification information of the first electronic device includes: when the first application program requests to access the first electronic device, receiving from the first electronic device Identification information of the first electronic device.
  • the sending the authentication request information of the first application to the server includes: when the first application requests access to the first electronic device, obtaining the The identification information of the first electronic device on the second electronic device and sends the authentication request information of the first application program to the server.
  • the authentication request information further includes: identification information of the second electronic device.
  • the identification information of the second electronic device may also be used as the authentication request information, which strengthens the security of authority verification, thereby improving the security of user data.
  • receiving the identification information of the first electronic device includes: acquiring the identification information of the first electronic device through a short-range wireless communication message.
  • the method further includes: when the first application program accesses the first electronic device, storing the message authentication code address of the first electronic device.
  • the second electronic device can save the message authentication code address of the first electronic device after the second electronic device is connected to the first electronic device, when the first application program accesses the first electronic device again, it will not
  • the first electronic device can be directly connected to the first electronic device only through the server, which improves the speed of accessing the electronic device and enhances user experience.
  • a method for accessing an electronic device the method is applied to a server, and the method includes: receiving authentication request information of a first application program sent by a second electronic device, and the first application program is installed on the The second electronic device is a third-party application program, the first application program requests access to the first electronic device, and the authentication request information includes identification information of the first electronic device and application program information of the first application program, The identification information of the first electronic device is used to indicate the model of the first electronic device; the authentication result is determined according to the authentication request information; and the authentication result is sent to the second electronic device.
  • the authentication request information further includes: identification information of the second electronic device.
  • the server includes access authority information of the first application, where the access authority information is used to indicate the electronic device that the first application is allowed to access.
  • determining the authentication result according to the authentication request information includes: determining the authentication result according to the authentication request information and the access right information.
  • the server includes access authority information of the first application, where the access authority information is used to indicate the electronic device that the first application is allowed to access.
  • the model and the model of the electronic device on which the first application program is installed, and determining the authentication result according to the authentication request information includes: determining the authentication result according to the authentication request information and the access authority information.
  • determining the authentication result according to the authentication request information and the access permission information includes: determining the first electronic device according to the identification information of the first electronic device the model of the first electronic device; determining the authentication result according to the model of the first electronic device, the application program information of the first application program, and the access authority information.
  • an electronic device in a fourth aspect, includes modules/units that execute any of the methods of the second aspect or any possible design of the second aspect; these modules/units can be implemented by hardware, or by The hardware executes the corresponding software implementation.
  • an electronic device in a fifth aspect, includes modules/units that perform any of the methods of the above-mentioned third aspect or any possible design of the third aspect; these modules/units can be implemented by hardware, or by The hardware executes the corresponding software implementation.
  • a chip is coupled with the memory in the electronic device, and is used to call the computer program stored in the memory and execute the technical solution of the second aspect of the embodiment of the present application and any possible design of the second aspect thereof Or the technical solution of the third aspect and any possible design of the third aspect thereof; "coupling" in the embodiment of the present application means that two components are directly or indirectly combined with each other.
  • a computer-readable storage medium includes a computer program, and when the computer program is run on an electronic device, the electronic device is made to execute any of the above-mentioned second aspect and the second aspect thereof.
  • a computer program includes instructions, and when the instructions are run on a computer, the computer executes the technical solution or the third aspect that may be designed in the above second aspect and any one of the second aspect. Aspect and any possible technical solution of its third aspect.
  • FIG. 1 is a schematic structural diagram of an electronic device provided by an embodiment of the present application.
  • Fig. 2 is a software structural block diagram of an electronic device provided by an embodiment of the present application.
  • Fig. 3 is a schematic diagram of a system provided by an embodiment of the present application.
  • Fig. 4 is a schematic diagram of another system provided by the embodiment of the present application.
  • Fig. 5 is a schematic flowchart of a method for accessing an electronic device provided by an embodiment of the present application.
  • Fig. 6 is a schematic flowchart of another method for accessing an electronic device provided by an embodiment of the present application.
  • Fig. 7 is a schematic flowchart of another method for accessing an electronic device provided by an embodiment of the present application.
  • FIG. 8 is a schematic flowchart of a method for installing a third-party application program on an electronic device provided by an embodiment of the present application.
  • FIG. 9 is a schematic composition diagram of a second electronic device provided by an embodiment of the present application.
  • FIG. 10 is a schematic diagram of a server composition provided by an embodiment of the present application.
  • references to "one embodiment” or “some embodiments” or the like in this specification means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application.
  • appearances of the phrases “in one embodiment,” “in some embodiments,” “in other embodiments,” “in other embodiments,” etc. in various places in this specification are not necessarily All refer to the same embodiment, but mean “one or more but not all embodiments” unless specifically stated otherwise.
  • the terms “including”, “comprising”, “having” and variations thereof mean “including but not limited to”, unless specifically stated otherwise.
  • the electronic device may be a portable electronic device that also includes other functions such as a personal digital assistant and/or a music player, such as a mobile phone, a tablet computer, a wearable electronic device with a wireless communication function (such as a smart watch) wait.
  • portable electronic devices include, but are not limited to Portable electronic devices with Harmony OS or other operating systems.
  • the above-mentioned portable electronic equipment may also be other portable electronic equipment, Such as laptop computer (Laptop) and so on. It should also be understood that, in some other embodiments, the above-mentioned electronic device may not be a portable electronic device, but a desktop computer, a smart TV, a smart speaker, and the like.
  • FIG. 1 shows a schematic structural diagram of an electronic device 100 .
  • the electronic device 100 may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (universal serial bus, USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, and an antenna 2 , mobile communication module 150, wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, earphone jack 170D, sensor module 180, compass 190, motor 191, indicator 192, camera 193, display screen 194, and A subscriber identification module (subscriber identification module, SIM) card interface 195 and the like.
  • SIM subscriber identification module
  • the structure illustrated in the embodiment of the present application does not constitute a specific limitation on the electronic device 100 .
  • the electronic device 100 may include more or fewer components than shown in the figure, or combine certain components, or separate certain components, or arrange different components.
  • the illustrated components can be realized in hardware, software or a combination of software and hardware.
  • the processor 110 may include one or more processing units, for example: the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processing unit (graphics processing unit, GPU), an image signal Processor (image signal processor, ISP), controller, video codec, digital signal processor (digital signal processor, DSP), baseband processor, and/or neural network processor (neural-network processing unit, NPU) wait. Wherein, different processing units may be independent components, or may be integrated in one or more processors.
  • the electronic device 101 may also include one or more processors 110 . Wherein, the controller can generate an operation control signal according to the instruction operation code and the timing signal, and complete the control of fetching and executing the instruction.
  • a memory may also be set in the processor 110 for storing instructions and data.
  • the memory in the processor 110 may be a cache memory.
  • the memory may hold instructions or data that the processor 110 has just used or recycled. If the processor 110 needs to use the instruction or data again, it can be directly recalled from the memory. In this way, repeated access is avoided, and the waiting time of the processor 110 is reduced, thereby improving the efficiency of the electronic device 101 in processing data or executing instructions.
  • processor 110 may include one or more interfaces.
  • the interface may include inter-integrated circuit (I2C) interface, inter-integrated circuit sound (I2S) interface, pulse code modulation (pulse code modulation, PCM) interface, universal asynchronous transceiver (universal asynchronous receiver/transmitter (UART) interface, mobile industry processor interface (mobile industry processor interface, MIPI), general-purpose input/output (general-purpose input/output, GPIO) interface, SIM card interface, and/or USB interface, etc.
  • the USB interface 130 is an interface conforming to the USB standard specification, specifically, it may be a Mini USB interface, a Micro USB interface, a USB Type C interface, and the like.
  • the USB interface 130 can be used to connect a charger to charge the electronic device 101 , and can also be used to transmit data between the electronic device 101 and peripheral devices.
  • the USB interface 130 can also be used to connect earphones to play audio through the earphones.
  • the external memory interface 120 can be used to connect an external memory card, such as a Micro SD card, so as to expand the storage capacity of the electronic device 100.
  • the external memory card communicates with the processor 110 through the external memory interface 120 to implement a data storage function. Such as saving music, video and other files in the external memory card.
  • the internal memory 121 may be used to store one or more computer programs including instructions.
  • the processor 110 can execute the above-mentioned instructions stored in the internal memory 121 .
  • the internal memory 121 may include an area for storing programs and an area for storing data.
  • the storage program area can store the operating system; the storage program area can also Store one or more applications (such as gallery, contacts, etc.), etc.
  • the storage data area can store data (such as photos, contacts, etc.) created during the use of the electronic device 101 .
  • the internal memory 121 may include a high-speed random access memory, and may also include a non-volatile memory, such as one or more disk storage components, a flash memory component, a universal flash storage (universal flash storage, UFS), an embedded multimedia card ( Embedded Multi Media Card, eMMC), etc.
  • the processor 110 may execute the instructions stored in the internal memory 121 and/or the instructions stored in the memory provided in the processor 110, so that the electronic device 101 executes the instructions provided in the embodiments of the present application. methods, and other applications and data processing.
  • the electronic device 100 can implement audio functions through the audio module 170 , the speaker 170A, the receiver 170B, the microphone 170C, the earphone interface 170D, and the application processor. Such as music playback, recording, etc.
  • the electronic device 100 can realize the shooting function through the ISP, the camera 193 , the video codec, the GPU, the display screen 194 , and the application processor.
  • the ISP is used for processing the data fed back by the camera 193 .
  • the light is transmitted to the photosensitive element of the camera through the lens, and the light signal is converted into an electrical signal, and the photosensitive element of the camera transmits the electrical signal to the ISP for processing, and converts it into an image visible to the naked eye.
  • ISP can also perform algorithm optimization on image noise, brightness, and skin tone.
  • ISP can also optimize the exposure, color temperature and other parameters of the shooting scene.
  • the ISP may be located in the camera 193 .
  • Camera 193 is used to capture still images or video.
  • the object generates an optical image through the lens and projects it to the photosensitive element.
  • the photosensitive element may be a charge coupled device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor.
  • CMOS complementary metal-oxide-semiconductor
  • the photosensitive element converts the light signal into an electrical signal, and then transmits the electrical signal to the ISP to convert it into a digital image signal.
  • the ISP outputs the digital image signal to the DSP for processing.
  • DSP converts digital image signals into standard RGB, YUV and other image signals.
  • the electronic device 100 may include one or more cameras 193 .
  • Digital signal processors are used to process digital signals. In addition to digital image signals, they can also process other digital signals. For example, when the electronic device 100 selects a frequency point, the digital signal processor is used to perform Fourier transform on the energy of the frequency point.
  • Video codecs are used to compress or decompress digital video.
  • the electronic device 100 may support one or more video codecs.
  • the electronic device 100 can play or record videos in various encoding formats, for example: moving picture experts group (moving picture experts group, MPEG) 1, MPEG2, MPEG3, MPEG4, etc.
  • the NPU is a neural-network (NN) computing processor.
  • NN neural-network
  • Applications such as intelligent cognition of the electronic device 100 can be implemented through the NPU, such as image recognition, face recognition, speech recognition, text understanding, three-dimensional model reconstruction, and the like.
  • FIG. 2 is a block diagram of the software structure of the electronic device 100 according to the embodiment of the present application.
  • the layered architecture divides the software into several layers, and each layer has a clear role and division of labor. Layers communicate through software interfaces.
  • the Android system is divided into four layers, which are respectively the application program layer, the application program framework layer, the Android runtime (Android runtime) and the system library, and the kernel layer from top to bottom.
  • the application layer can consist of a series of application packages.
  • the application package may include application programs such as camera, gallery, calendar, call, map, navigation, WLAN, Bluetooth, music, video, and short message.
  • application programs such as camera, gallery, calendar, call, map, navigation, WLAN, Bluetooth, music, video, and short message.
  • the application framework layer provides an application programming interface (application programming interface) for applications in the application layer. interface, API) and programming framework, the application framework layer includes some pre-defined functions.
  • the application framework layer may include a window manager, a content provider, a view system, a phone manager, a resource manager, a notification manager, and the like.
  • the window manager is used to manage window programs.
  • the window manager can receive the size of the display screen, determine whether there is a status bar, lock the screen, capture the screen, etc.
  • Content providers are used to store and receive data and make these data accessible to applications.
  • the data may include video, images, audio, calls made and received, browsing history and bookmarks, phonebook, and the like.
  • the view system includes visual controls, such as controls for displaying text, controls for displaying pictures, and so on.
  • the view system can be used to build applications.
  • a display interface can consist of one or more views.
  • a display interface including a text message notification icon may include a view for displaying text and a view for displaying pictures.
  • the phone manager is used to provide communication functions of the electronic device 100 . For example, the management of call status (including connected, hung up, etc.).
  • the resource manager provides various resources to the application, such as localized strings, icons, pictures, layout files, video files, and so on.
  • the notification manager enables the application to display notification information in the status bar, which can be used to convey notification-type messages, and can automatically disappear after a short stay without user interaction.
  • the notification manager is used to notify the download completion, message reminder, etc.
  • the notification manager can also be a notification that appears on the top status bar of the system in the form of a chart or scroll bar text, such as a notification of an application running in the background, or a notification that appears on the screen in the form of a dialog window.
  • prompting text information in the status bar issuing a prompt sound, vibrating electronic equipment, and flashing an indicator light, etc.
  • a system library can include multiple function modules. For example: surface manager (surface manager), media library (media libraries), 3D graphics processing library (eg: OpenGL ES), 2D graphics engine (eg: SGL), etc.
  • the surface manager is used to manage the display subsystem and provides the fusion of 2D and 3D layers for multiple applications.
  • the media library supports playback and recording of many commonly used audio and video formats, as well as still image files, etc.
  • the media library can support a variety of audio and video encoding formats, such as: MPEG4, H.264, MP3, AAC, AMR, JPG and PNG.
  • the 3D graphics processing library is used to implement 3D graphics drawing, image rendering, synthesis and layer processing, etc.
  • 2D graphics engine is a drawing engine for 2D drawing.
  • the kernel layer is the layer between hardware and software.
  • the kernel layer includes at least a display driver, a camera driver, an audio driver, and a sensor driver.
  • third-party applications may have the following problems when they are connected to or installed on wearable devices: For example, when a third-party application installed on an electronic device (such as a mobile phone, tablet, etc.) , the access may fail due to the cumbersome access verification mechanism. For another example, when a wearable device installs a third-party application, the installation fails due to the cumbersome authorization verification mechanism.
  • the application program not provided by the electronic equipment manufacturer is referred to as the third-party application program.
  • electronic device #1 is a smart watch
  • the device manufacturer of the smart watch provides a "sports and health” application to support the various sports functions of the smart watch
  • the device manufacturer of the non-smart watch provides "sleep monitoring”
  • the "sleep monitoring” application can be referred to as a third-party application
  • the "sports health” application can be referred to as an official application, a non-third-party application, etc.
  • the embodiment of the present application provides a method for accessing an electronic device.
  • An electronic device can quickly access a third-party application program installed on another electronic device, so that the third-party application program can rely on the accessed electronic device.
  • equipment Implement various functions and improve user experience.
  • Fig. 3 is a schematic diagram of a system applicable to the embodiment of the present application.
  • the system includes a first electronic device, a second electronic device and a server.
  • the first electronic device may be connected to the second electronic device in a wired or wireless manner, and the second electronic device may be connected to the server in a wireless manner.
  • the first electronic device may be connected to the server through the second electronic device.
  • the first electronic device may be a wearable device such as a smart watch, smart glasses, or a smart speaker.
  • Fig. 3 is only a schematic diagram, and the system may also include other electronic devices, which are not shown in Fig. 3 .
  • Fig. 4 is a schematic diagram of another system applicable to the embodiment of the present application.
  • the system includes a first electronic device and a server.
  • the first electronic device can be connected to the server in a wireless manner.
  • the first electronic device may be a wearable device such as a smart watch, smart glasses, or a smart speaker.
  • Fig. 4 is only a schematic diagram, and the system may also include other electronic devices, which are not shown in Fig. 4 .
  • FIG. 5 shows a schematic flowchart of a method 500 for accessing an electronic device provided by an embodiment of the present application.
  • the method is executed by a first electronic device, a second electronic device, and a server, wherein the first The electronic device and the server are provided by the same device vendor, the second electronic device includes a first application program, the first application program is a third-party application program, and the first application program includes a first module provided by the device vendor of the first electronic device, The first module includes one or more software interfaces, the one or more software interfaces are used to communicate with the server, the first electronic device and the second electronic device, the server stores the access authority information of the first application program, the method 500 includes:
  • the first electronic device sends identification information to the second electronic device.
  • the second electronic device receives the identification information of the first electronic device.
  • the first electronic device sends identification information to the second electronic device, and when the second electronic device requests access to the first electronic device by the first application program, the second electronic device can receive the identification information of the first electronic device , that is, the first application program can acquire the identification information of the first electronic device through the first module.
  • the second electronic device may receive the identification information of the first electronic device.
  • the second electronic device can also receive the identification information of the first electronic device when the first application program does not request to access the first electronic device, and then the first application program can obtain the identification information of the first electronic device through the first module. Identification information of the first electronic device.
  • the first electronic device may send identification information through a short-range wireless communication technology, so that the second electronic device may receive the identification information of the first electronic device.
  • the short-range wireless communication technology in the embodiment of the present application includes but is not limited to Wi-Fi, Bluetooth (bluetooth, BT), and ZigBee.
  • the first electronic device may broadcast identification information through Bluetooth, so that the second electronic device may receive the identification information of the first electronic device.
  • the first electronic device may broadcast identification information through Bluetooth, so that the second electronic device receives the identification information of the first electronic device when the first application program requests to access the first electronic device.
  • the identification information in this embodiment of the present application is used to indicate the device model of the first electronic device.
  • the identification information may be a Bluetooth name, a Wi-Fi name, and an identity document (ID) of the electronic device.
  • the bluetooth name of the first electronic device is "smart watch 6"
  • the bluetooth name indicates that the device model of the first electronic device is "smart watch 6”.
  • the Wi-Fi name of the first electronic device is "smart watch 6"
  • the Wi-Fi name indicates that the first electronic device
  • the device model of an electronic device is "smart watch 6".
  • the device ID of the first electronic device is "ABCD".
  • the first electronic device can send identification information through a wired connection, so that the second electronic device can receive the identification information of the first electronic device.
  • the wired connection in the embodiment of the present application includes but not limited to USB Type-A, USB Type-B, and USB Type-C.
  • the identification information may be a device ID, a USB name, and the like of the electronic device.
  • the second electronic device sends authentication request information of the first application program to the server.
  • the server receives the authentication request information of the third-party application sent by the second electronic device.
  • the second electronic device receives the identification information sent by the first electronic device, and when the first application program in the second electronic device requests to access the first electronic device, the first application program may The first module communicates with the second electronic device to obtain authentication request information, so that the second electronic device can send the first application's authentication request information to the server through the first application.
  • the first application program can communicate with the second electronic device through the first module.
  • the electronic device communicates to obtain the authentication request information, so that the second electronic device can send the authentication request information of the first application program to the server through the first application program.
  • the authentication request information may include the identification information of the first electronic device and the application program information of the first application program, and the application program information is used to indicate the name of the first application program, wherein the first application program for third-party applications.
  • the application information may be a package name (packagename) of the first application.
  • packagename package name of the application.
  • the package name of the application is "abcd”.
  • the application information may also directly be the name of the first application.
  • the authentication request information further includes the certificate of the first application program and/or the identification information of the second electronic device and/or the operating system information of the second electronic device, wherein the first application program may Communicating with the second electronic device through the first module to obtain identification information of the second electronic device and/or operating system information of the second electronic device.
  • the certificate of the first application program can be preset in the first application program, or the second electronic device can obtain the certificate through the server corresponding to the first application program, and the certificate of the first application program is used to verify the first application program, specifically For instructions, see the description below.
  • the operating system information of the second electronic device may include the type of the operating system of the second electronic device, and may also include a version of the operating system of the second electronic device.
  • the type of the operating system of the second electronic device is "Hongmeng”.
  • the version of the operating system of the second electronic device is "Hongmeng 2.0".
  • the server determines an authentication result according to the authentication request information.
  • the server may determine the authority of the first application program according to the authentication request information to generate an authentication result.
  • the authentication request information includes the identification information of the first electronic device and the application program of the first application program.
  • program information the server can determine whether the first application program has the right to access the first electronic device according to the identification information of the first electronic device and the application program information of the first application program, wherein the server can store the access information of the first application program Permission information, where the access permission information is used to indicate the model of the electronic device accessed by the first application program.
  • the server may The authority determines whether the first application program has the authority to access the first electronic device.
  • the identification information of the first electronic device is a Bluetooth name
  • the Bluetooth name is "smart watch 6”
  • the application information of the first application program is an application name
  • the application name is "sleep monitoring”
  • the The stored access authority of "sleep monitoring” is to allow access to "smart watch 5".
  • the second electronic device sent the identification information of the first electronic device and the application program information of the first application program to the server.
  • the server can determine that the authority of the "sleep monitoring" stored in the server is different from that stored in the server, that is, If the "sleep monitoring" cannot access the "smart watch 6", an authentication result may be generated to indicate that the first application program does not access the first electronic device.
  • the identification information of the first electronic device is a bluetooth name
  • the bluetooth name is "smart watch 5"
  • the application information of the first application is an application name
  • the application name is "sleep monitoring”
  • the server The access authority of "sleep monitoring” stored on the device is to allow access to "smart watch 5".
  • the second electronic device sends the identification information of the first electronic device and the application program information of the first application program to the server.
  • the server can determine that the authority of the "sleep monitoring" stored in the server is the same as that of the "sleep monitoring” stored in the server.
  • the "sleep monitoring” can be connected to the "smart watch 5", and an authentication result can be generated to indicate that the first application program is connected to the first electronic device.
  • the identification information of the first electronic device is the device ID and the application information of the first application directly indicates the name of the first application, and the server can determine the Whether the first application program has permission to access the first electronic device.
  • the identification information of the first electronic device is the device ID, and the device ID is "ABCD”
  • the application information of the first application program is the application program name
  • the application program name is "sleep monitoring”
  • the access authority of "sleep monitoring” is to allow access to the electronic device whose device ID is "ABCD”.
  • the second electronic device sends the identification information of the first electronic device and the application program information of the first application program to the server.
  • the server can determine that the authority of the "sleep monitoring” stored in the server is the same as that of the "sleep monitoring” stored in the server.
  • “Sleep monitoring” can access the electronic device whose device ID is "ABCD", and an authentication result can be generated to instruct the first application program to access the first electronic device.
  • the identification information of the first electronic device is the device ID and the application information of the first application program directly indicates the name of the first application program
  • the server may determine the model of the first electronic device according to the device ID, And judge whether the first application program has permission to access the first electronic device according to the model of the first electronic device and the name of the first application program.
  • the identification information of the first electronic device is a device ID
  • the device ID is "ABCD”
  • the application information of the first application is an application name
  • the application name is "sleep monitoring”
  • the second electronic device sends The server sent the identification information of the first electronic device and the application program information of the first application program.
  • the server can analyze the device ID to obtain that the device model corresponding to the device ID is "smart watch 5", and the server The access permission of "sleep monitoring" stored on the device is to allow "smart watch 5", then the server can generate an authentication result to instruct the first application program to access the first electronic device.
  • the identification information of the first electronic device is a device ID and an application of the first application
  • the program information is a package name, indirectly indicating the name of the first application program
  • the server can determine the model of the first electronic device according to the device ID, and determine the name of the first electronic device according to the package name of the first application program, and According to the model of the first electronic device and the name of the first application program, it is judged whether the first application program has permission to access the first electronic device.
  • the identification information of the first electronic device is a device ID
  • the device ID is "ABCD”
  • the application information of the first application is a package name
  • the package name is "abcd”
  • the second electronic device sends a The identification information of the first electronic device and the application program information of the first application program.
  • the server can analyze the device ID according to the device ID to obtain that the device model corresponding to the device ID is "smart watch 5". If the name of the application program corresponding to the package name is "sleep monitoring", and the access authority of "sleep monitoring” stored on the server is to allow "smart watch 5", then the server can generate an authentication result to indicate that the first application program accepts into the first electronic device.
  • the authentication request information includes the identification information of the first electronic device, the application information of the first application program, and the certificate of the first application program
  • the server may use the identification information of the first electronic device, the first application program
  • the application program information and the certificate of the first application program determine whether the first application program has the authority to access the first electronic device, wherein the server can store the access authority information of the first application program.
  • the access authority The information is used to indicate the model of the electronic device accessed by the first application program.
  • the identification information of the first electronic device indicates that the device model of the first electronic device is "smart watch 5"
  • the application information of the first application indicates that the name of the first application is "sleep monitoring”
  • the The stored access authority of "sleep monitoring” is to allow access to "smart watch 5".
  • the second electronic device sends the identification information of the first electronic device, the application information of the first application, and the certificate of the first application to the server.
  • the server can first verify whether the certificate of the first application is correct , when the server verifies the certificate, it can be determined according to the above information that it has the same authority as the "sleep monitoring" stored in the server, that is, "sleep monitoring” can access the "smart watch 5", and an authentication result can be generated to indicate that the first application
  • the program accesses the first electronic device.
  • identification information of the first electronic device indicates the device model of the first electronic device and the application information of the first application indicates the name of the first application
  • identification information of the first electronic device indicates the device model of the first electronic device
  • application information of the first application indicates the name of the first application
  • the authentication request information includes the identification information of the first electronic device, the application program information of the first application program, and the identification information of the second electronic device
  • the server may The application program information of the program and the identification information of the second electronic device determine whether the first application program has the authority to access the first electronic device, wherein the server can store the access authority information of the first application program.
  • the connection The access permission information is used to indicate the model of the electronic device accessed by the first application program, and is also used to indicate the model of the electronic device installed with the first application program.
  • the identification information of the first electronic device indicates that the device model of the first electronic device is "smart watch 5"
  • the application information of the first application indicates that the first application is "sleep monitoring”
  • the The identification information is the device ID
  • the device ID is "BCDE”
  • the access authority of "sleep monitoring” stored on the server is to allow access to "smart watch 5"
  • the device ID of the electronic device installed with "sleep monitoring” requires is "BCDE”.
  • the second electronic device sent the identification information of the first electronic device, the application program information of the first application program, and the identification information of the second electronic device to the server.
  • the server can determine the ""SleepMonitoring" has the same authority, that is, "Sleep Monitoring” can access "smart watch 5", then an authentication result can be generated to indicate that the first application program accesses the first electronic device.
  • identification information of the first electronic device indicates the device model of the first electronic device and the application information of the first application indicates the name of the first application, reference may be made to the above description. Let me repeat.
  • the identification information of the first electronic device indicates that the device model of the first electronic device is "smart watch 5"
  • the application information of the first application indicates that the first application is "sleep monitoring”
  • the second electronic device The identification information of the device is the device ID, and the device ID is "BCDE”.
  • the second electronic device sends the identification information of the first electronic device, the application information of the first application program and the identification information of the second electronic device to the server, and the server receives After obtaining the above information, it can be determined according to the identification information of the first electronic device that the model of the first electronic device is "smart watch 5", and according to the application information of the first application program, it can be determined that the name of the first application program is "sleep monitoring", According to the device ID "BCDE”, it is determined that the model corresponding to the device ID is "smart phone A”, and the access authority of "sleep monitoring” stored on the server is to allow “smart watch 5" and the electronic device installed with “sleep monitoring” The model needs to be "smart phone A", then the server can generate an authentication result to instruct the first application to access the first electronic device.
  • identification information of the first electronic device indicates the device model of the first electronic device and the application information of the first application indicates the name of the first application, reference may be made to the above description. Let me repeat.
  • the authentication request information includes the identification information of the first electronic device, the application program information of the first application program, and the operating system information of the second electronic device
  • the server may use the identification information of the first electronic device, the first The application program information of the application program and the operating system information of the second electronic device determine whether the first application program has the authority to access the first electronic device, wherein the server can store the access authority information of the first application program.
  • the access authority information is used to indicate the model of the electronic device accessed by the first application program, and is also used to indicate the operating system information of the electronic device on which the first application program is installed.
  • the identification information of the first electronic device indicates that the device model of the first electronic device is "smart watch 5"
  • the application information of the first application indicates that the first application is "sleep monitoring”
  • the The operating system information indicates that the operating system of the second electronic device is "Hongmeng”
  • the access authority of "sleep monitoring” stored on the server is the operating system of the electronic device that allows access to "smart watch 5" and installs "sleep monitoring” It needs to be "Hongmeng”.
  • the second electronic device sent the identification information of the first electronic device, the application program information of the first application program, and the operating system information of the second electronic device to the server.
  • the server After receiving the above information, the server can determine the The rights of "sleep monitoring" are the same, that is, “sleep monitoring” can access "smart watch 5", then an authentication result can be generated to instruct the first application program to access the first electronic device.
  • identification information of the first electronic device indicates the device model of the first electronic device and the application information of the first application indicates the name of the first application, reference may be made to the above description. Let me repeat.
  • the identification information of the first electronic device indicates that the device model of the first electronic device is "smart watch 5"
  • the application information of the first application indicates that the first application is “sleep monitoring”
  • the second electronic device The operating system information of the second electronic device indicates that the operating system version of the second electronic device is "Hongmeng 3.0", and the access authority of "sleep monitoring” stored on the server is to allow access to "smart watch 5", and the electronic device with “sleep monitoring” is installed.
  • the operating system version of the device needs to be "Hongmeng 3.0".
  • the second electronic device sent the identification information of the first electronic device, the application program information of the first application program, and the operating system information of the second electronic device to the server. After receiving the above information, the server can determine the "Sleep Monitoring” has the same permissions, that is, "Sleep Monitoring” can access
  • the "smart watch 5" can generate an authentication result to instruct the first application program to access the first electronic device.
  • identification information of the first electronic device indicates the device model of the first electronic device and the application information of the first application indicates the name of the first application, reference may be made to the above description. Let me repeat.
  • the authentication request information includes the identification information of the first electronic device, the application program information of the first application program, the identification information of the second electronic device, and the certificate
  • the server may The application information of an application, the identification information of the second electronic device and the certificate determine whether the first application has the right to access the first electronic device.
  • the authentication request information includes the identification information of the first electronic device, the application program information of the first application program, the operating system information and the certificate of the second electronic device, and the server may, according to the identification information of the first electronic device, The application information of the first application, the identification information of the second electronic device, and the certificate determine whether the first application has permission to access the first electronic device.
  • the authentication request information includes the identification information of the first electronic device, the application program information of the first application program, the identification information of the second electronic device, the operating system information and the certificate of the second electronic device, and the server may according to The identification information of the first electronic device, the application program information of the first application program, the identification information of the second electronic device and the certificate determine whether the first application program has the right to access the first electronic device.
  • the access permission information of the first application program stored in the server also includes authorization duration information.
  • the access authority of "sleep monitoring” stored in the server is: allow “sleep monitoring” to access “smart watch 5", and the authorization time is from February 28, 2022 to February 28, 2023, that is, allowing “sleep monitoring” “Monitoring” is connected to "Smart Watch 5" during the above time period, and cannot be connected to "Smart Watch 5" during other time periods.
  • the server may not store the access authority information indicating the model of the electronic device accessed by the first application program, and the server may, after receiving the authentication request information, use artificial intelligence ( Artificial Intelligence (AI) method to determine the authority of the first application program and generate an authentication result.
  • AI Artificial Intelligence
  • the server may input the received authentication request information into a pre-trained neural network model to obtain an authentication result.
  • the server sends an authentication result to the second electronic device.
  • the second electronic device receives the authentication result sent by the server.
  • the server may send the authentication result to the second electronic device to instruct the first application program to determine whether to access the first electronic device.
  • the authentication result can be indicated by 1 bit, "0" indicates that the first application program has no permission to access the first electronic device, and "1" indicates that the first application program has permission to access the first electronic device, which directly indicates that the first application program has permission to access the first electronic device. Whether an application has permission to access the first electronic device.
  • the authentication result can be indicated by 1 bit, "0" indicates that the authentication request information does not correspond to the access authority of the first application program stored in the server, and "1" indicates that the authentication request information does not correspond to the access authority of the first application program stored in the server.
  • the access permission of the first application program that is, indirectly indicating whether the first application program has permission to access the first electronic device.
  • the second electronic device determines whether the first application is connected to the first electronic device according to the authentication result.
  • the second electronic device may determine according to the authentication result that the first application program is No access to the first electronic device.
  • the first application program does not access the first electronic device.
  • the first application program accesses the first electronic device.
  • a third-party application when a third-party application needs to access the electronic device, it can directly request the server for permission to access the electronic device. If the server determines that the third-party application can access the electronic device, the third-party application can directly access the electronic device. , so that the third-party application program can realize various extended functions by connecting to the electronic device, which improves the functionality of the third-party application program and enhances user experience.
  • the second electronic device may save the message authentication code of the first electronic device (messageauthenticationcode, MAC) address.
  • the second electronic device can save the MAC address of the first electronic device after the second electronic device is connected to the first electronic device, when the first application program accesses the first electronic device again, it does not need to pass
  • the server can directly access the first electronic device, which increases the speed of accessing the electronic device and enhances user experience.
  • FIG. 6 shows a schematic flowchart of another method 600 for accessing an electronic device provided by an embodiment of the present application. As shown in FIG. 6, the method 600 may be performed by the second electronic device, and the method 600 includes:
  • the second electronic device may receive identification information of the first electronic device.
  • the second electronic device may receive the identification information of the first electronic device.
  • the second electronic device may send the authentication request information of the first application program to the server when the first application program requests to access the first electronic device.
  • the second electronic device when the first application program requests to access the first electronic device, the second electronic device receives the identification information of the first electronic device, and then sends the authentication request information of the first application program to the server.
  • the second electronic device may reject the first application program's request to access the first electronic device.
  • the second electronic device when the authentication result indicates that the first application program has permission to access the first electronic device, the second electronic device allows the first application program to access the first electronic device.
  • the second electronic device when the second electronic device does not receive the authentication result within a preset time, the second electronic device may To reject the request of the first application program to access the first electronic device.
  • a third-party application when a third-party application needs to access the electronic device, it can directly request the server for permission to access the electronic device. If the server determines that the third-party application can access the electronic device, the third-party application can directly access the electronic device. , so that the third-party application program can realize various extended functions by connecting to the electronic device, which improves the functionality of the third-party application program and enhances user experience.
  • the method 600 also includes:
  • the second electronic device when receiving the identification information of the first application program, can also obtain the message authentication code (message authentication code, MAC) address of the first electronic device, so that when the first application program accesses the first electronic device , the second electronic device may save the MAC address of the first electronic device.
  • message authentication code messages authentication code
  • the second electronic device can also obtain the MAC of the first electronic device when receiving the identification information of the first application program, when the first application program accesses the first electronic device, the second electronic device can save MAC address of the first electronic device, when the first application program accesses the first electronic device again, it can directly access the first electronic device without going through the server, which improves the speed of accessing the electronic device and enhances user experience.
  • FIG. 7 shows a schematic flowchart of another method 700 for accessing an electronic device provided by an embodiment of the present application. As shown in FIG. 7, the method 700 may be performed by a server, and the method 700 includes:
  • the server may determine the authentication result corresponding to the first application program.
  • the server when a third-party application program needs to access the electronic device, the server can determine the access authority of the third-party application program to the electronic device, so that the electronic device can be quickly accessed to realize various extended functions, which improves the The functionality of third-party applications enhances the user experience.
  • FIG. 8 shows a schematic flowchart of a method 800 for installing a third-party application on an electronic device according to an embodiment of the present application.
  • the method 800 may be performed by the first electronic device and a server, wherein the first electronic device and the server are provided by the same device manufacturer, and the server stores the permission of the first electronic device to install the application program.
  • the method 800 includes:
  • the first electronic device acquires the installation package of the second application program.
  • the first electronic device acquires the installation package of the second application program, where the second application program is a third-party application program.
  • the first electronic device obtains the installation package of the second application program from the server of the second application program through the mobile communication technology.
  • the first electronic device receives the installation package of the second application sent by other electronic devices.
  • the first electronic device sends first authentication request information to the server.
  • the server receives the first authentication request information sent by the first electronic device.
  • the authentication request information includes the name (or package name) of the second application program and the identification information of the first electronic device.
  • the first electronic device obtains the name (or package name) of the second application program from the installation package of the second application program, and then sends the name (or package name) of the second application program and the identification information of the first electronic device to the server.
  • the server determines a first authentication result according to the first authentication request information.
  • the server may determine the first authentication result according to the stored authority of the first electronic device to install the application program and the first authentication request information.
  • An authentication result is used to indicate whether the first electronic device installs the second application program.
  • the identification information of the first electronic device indicates that the device model of the first electronic device is "smart watch 5"
  • the application information of the application program indicates that the first application program is "sleep monitoring”
  • the "smart watch 5" stored in the server Watch 5" has permission to install "sleep monitoring”.
  • the first electronic device sends the above information to the server.
  • the server can request the first smart device to install the application program consistent with the stored authority, and then generate a first authentication result to instruct the first electronic device to install the second application. program.
  • the server sends the first authentication result to the first electronic device.
  • the first electronic device receives the first authentication result sent by the server.
  • the first electronic device determines whether to install the second application program according to the first authentication result.
  • the first electronic device may determine whether to install the second application program after receiving the first authentication result.
  • the first electronic device when installing a third-party application, may request the server to inquire whether it has the permission to install the third-party application. As a result, the first electronic device can install the third-party application program, which improves the data security of the first electronic device.
  • the electronic device includes hardware structures and/or software modules corresponding to each function.
  • the present application can be implemented in the form of hardware or a combination of hardware and computer software. Whether a certain function is executed by hardware or computer software drives hardware depends on the specific application and design constraints of the technical solution. Skilled artisans may use different methods to implement the described functions for each specific application, but such implementation should not be regarded as exceeding the scope of the present application.
  • the processor in the electronic device can be divided into functional modules according to the above method examples.
  • each functional module can be divided corresponding to each function, or two or more functions can be integrated into one processing module.
  • the above-mentioned integrated modules can be implemented in the form of hardware or in the form of software function modules. It should be noted that the division of modules in the embodiment of the present application is schematic, and is only a logical function division, and there may be other division methods in actual implementation.
  • FIG. 9 shows a schematic composition diagram of a second electronic device 900 provided by the embodiment of the present application.
  • the second electronic device includes: Unit 910 and processing unit 920.
  • the transceiving unit 910 is configured to receive identification information of the first electronic device.
  • the transceiving unit 910 is further configured to send the authentication request information of the first application program to the server.
  • the transceiver unit 910 is also configured to receive the authentication result sent by the server.
  • the processing unit 920 is configured to determine whether to access the first electronic device according to the authentication result.
  • the second electronic device provided in the embodiment of the present application is used to execute the above method for accessing an electronic device, so the same effect as above can be achieved.
  • FIG. 10 shows a schematic composition diagram of a server 1000 provided by an embodiment of the present application.
  • the server includes: a transceiver unit 1010 and a processing unit 1020 .
  • the transceiving unit 1010 is configured to receive the authentication request information of the first application sent by the second electronic device.
  • the processing unit 1020 is configured to determine an authentication result according to the authentication request information.
  • the transceiver unit 1010 is also configured to send the authentication result.
  • the embodiment of the present application also provides an electronic device, including: a processor, a memory, an application program, and a computer program.
  • the various components described above may be connected by one or more communication buses.
  • the one or more computer programs are stored in the above-mentioned memory and are configured to be executed by the one or more processors, the one or more computer programs include instructions, and the above-mentioned instructions can be used to make the electronic device execute the above-mentioned Various steps of the second electronic device in the embodiment.
  • the foregoing processor may specifically be the processor 110 shown in FIG. 1
  • the foregoing memory may specifically be the internal memory 120 shown in FIG. 1 and/or an external memory connected to the electronic device.
  • the embodiment of the present application also provides a chip, the chip includes a processor and a communication interface, the communication interface is used to receive a signal, and transmit the signal to the processor, and the processor processes the signal,
  • the method for accessing an electronic device as described in any one of the foregoing possible implementation manners is executed.
  • This embodiment also provides a computer-readable storage medium, where computer instructions are stored in the computer-readable storage medium, and when the computer instructions are run on the electronic device, the electronic device executes the above-mentioned relevant method steps to realize the steps in the above-mentioned embodiments.
  • a method of accessing an electronic device is also provided.
  • This embodiment also provides a computer program product, which, when running on a computer, causes the computer to execute the above related steps, so as to implement the method for accessing an electronic device in the above embodiment.
  • An embodiment of the present application further provides a system, and the system includes the first electronic device, the second electronic device and the server provided in the foregoing embodiments.
  • the terms “when” or “after” may be interpreted to mean “if” or “after” or “in response to determining" or “in response to detecting ".
  • the phrase “in determining” or “if detected (a stated condition or event)” may be interpreted to mean “if determining" or “in response to determining" or “on detecting (a stated condition or event)” or “in response to detecting (a stated condition or event)”.
  • the disclosed systems, devices and methods may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods.
  • multiple units or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
  • the functions described above are realized in the form of software function units and sold or used as independent products, they can be stored in a computer-readable storage medium.
  • the technical solution of the present application is essentially or the part that contributes to the prior art or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disc and other media that can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephone Function (AREA)
  • Stored Programmes (AREA)

Abstract

一种接入电子设备的方法、系统以及装置,该方法应用于第一电子设备、第二电子设备和服务器,当安装在第二电子设备的第三方应用程序需要接入第一电子设备时,可以向服务器请求权限直接接入第一电子设备,优化了接入电子设备的流程,提高了第三方应用程序的功能性,增强了用户体验,且第二电子设备可以保存第一电子设备的消息认证码地址,则第一应用程序再次接入第一电子设备时,不需要通过服务器就可以直接接入第一电子设备,提高了接入电子设备的速度。

Description

一种接入电子设备的方法、系统以及装置
本申请要求于2022年3月03日提交中国专利局、申请号为202210202804.4、申请名称为“一种接入电子设备的方法、系统以及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请实施例涉及电子设备领域,并且更加具体地涉及一种接入电子设备的方法、系统以及装置。
背景技术
随着技术的进步,越来越多的应用程序可以通过接入不同的电子设备以实现各项功能。例如,应用程序可以通过与可穿戴设备连接(例如智能手表、智能手环等)以检测用户的睡眠质量,但是可穿戴设备与第三方应用程序连接的过程繁琐,可能导致可穿戴设备无法与第三方应用程序连接等问题。
发明内容
本申请实施例提供一种接入电子设备的方法、系统以及装置,当第三方应用程序需要接入电子设备时,可以向服务器请求权限直接接入,提高了第三方应用程序的功能性,增强了用户体验。
第一方面,提供了一种系统,该系统包括第一电子设备、第二电子设备和服务器,该第二电子设备包括第一应用程序,该第一应用程序为第三方应用程序,该第一应用程序请求接入该第一电子设备,该第一电子设备,用于发送该第一电子设备的标识信息;该第二电子设备,用于接收该第一电子设备的标识信息;该第二电子设备,还用于向该服务器发送该第一应用程序的鉴权请求信息,该鉴权请求信息包括该第一电子设备的标识信息和该第一应用程序的应用程序信息;该服务器,用于接收该鉴权请求信息;该服务器,还用于根据该鉴权请求信息确定鉴权结果;该服务器,还用于发送该鉴权结果;该第二电子设备,还用于接收该鉴权结果;该第二电子设备,还用于根据该鉴权结果确定该第一应用程序是否接入该第一电子设备。
本申请实施例中,当第三方应用程序需要接入电子设备时,可以直接向服务器请求接入电子设备的权限,若服务器确定第三方应用程序可以接入时,第三方应用程序可以直接接入电子设备,从而第三方应用程序可以通过接入电子设备以实现各项拓展功能,提高了第三方应用程序的功能性,增强了用户体验。
结合第一方面,在第一方面的某些实现方式中,该第二电子设备,具体用于在该第一应用程序请求接入该第一电子设备时,从该第一电子设备接收该第一电子设备的标识信息。
结合第一方面,在第一方面的某些实现方式中,该第二电子设备,具体用于在该第一 应用程序请求接入该第一电子设备时,获取该第二电子设备上的该第一电子设备的标识信息并向该服务器发送该第一应用程序的鉴权请求信息。
结合第一方面,在第一方面的某些实现方式中,该鉴权请求信息还包括:该第二电子设备的标识信息。
本申请实施例中,还可以将第二电子设备的标识信息作为鉴权请求信息,强化了权限验证的安全性,从而提高了用户数据的安全性。
结合第一方面,在第一方面的某些实现方式中,该第一电子设备,具体用于通过近距离无线通信发送该第一电子设备的标识信息。
结合第一方面,在第一方面的某些实现方式中,该服务器包括该第一应用程序的接入权限信息,该接入权限信息用于指示允许该第一应用程序接入的电子设备的型号,该服务器,具体用于根据该鉴权请求信息和该接入权限信息确定鉴权结果。
结合第一方面,在第一方面的某些实现方式中,该服务器包括该第一应用程序的接入权限信息,该接入权限信息用于指示允许该第一应用程序接入的电子设备的型号和安装该第一应用程序的电子设备的型号,该服务器,具体用于根据该鉴权请求信息和该接入权限信息确定鉴权结果。
结合第一方面,在第一方面的某些实现方式中,该第二电子设备,还用于在该第一应用程序接入该第一电子设备时,存储该第一电子设备的消息认证码地址。
本申请实施例中,由于第二电子设备与第一电子设备连接后,第二电子设备可以保存第一电子设备的消息认证码地址,则第一应用程序再次接入第一电子设备时,不需要通过服务器就可以直接接入第一电子设备,提高了接入电子设备的速度,增强了用户体验。
第二方面,提供了一种接入电子设备的方法,该方法应用于第二电子设备,该第二电子设备包括第一应用程序,该第一应用程序为第三方应用程序,其特征在于,该方法包括:接收第一电子设备的标识信息;向服务器发送该第一应用程序的鉴权请求信息,该鉴权请求信息包括该第一电子设备的标识信息和该第一应用程序的应用程序信息;接收该服务器发送的鉴权结果;根据该鉴权结果确定该第一应用程序是否接入该第一电子设备。
本申请实施例中,当第三方应用程序需要接入电子设备时,可以直接向服务器请求接入电子设备的权限,若服务器确定第三方应用程序可以接入时,第三方应用程序可以直接接入电子设备,从而第三方应用程序可以通过接入电子设备以实现各项拓展功能,提高了第三方应用程序的功能性,增强了用户体验。
结合第二方面,在第二方面的某些实现方式中,该接收第一电子设备的标识信息包括:在该第一应用程序请求接入该第一电子设备时,从该第一电子设备接收该第一电子设备的标识信息。
结合第二方面,在第二方面的某些实现方式中,该向服务器发送该第一应用程序的鉴权请求信息包括:在该第一应用程序请求接入该第一电子设备时,获取该第二电子设备上的该第一电子设备的标识信息并向该服务器发送该第一应用程序的鉴权请求信息。
结合第二方面,在第二方面的某些实现方式中,该鉴权请求信息还包括:该第二电子设备的标识信息。
本申请实施例中,还可以将第二电子设备的标识信息作为鉴权请求信息,强化了权限验证的安全性,从而提高了用户数据的安全性。
结合第二方面,在第二方面的某些实现方式中,该接收第一电子设备的标识信息包括:通过近距离无线通信消息获取该第一电子设备的标识信息。
结合第二方面,在第二方面的某些实现方式中,该方法还包括:在该第一应用程序接入该第一电子设备时,存储该第一电子设备的消息认证码地址。
本申请实施例中,由于第二电子设备与第一电子设备连接后,第二电子设备可以保存第一电子设备的消息认证码地址,则第一应用程序再次接入第一电子设备时,不需要通过服务器就可以直接接入第一电子设备,提高了接入电子设备的速度,增强了用户体验。
第三方面,提供了一种接入电子设备的方法,该方法应用于服务器,该方法包括:接收第二电子设备发送的第一应用程序的鉴权请求信息,该第一应用程序安装在该第二电子设备中,为第三方应用程序,该第一应用程序请求接入第一电子设备,该鉴权请求信息包括该第一电子设备的标识信息和该第一应用程序的应用程序信息,该第一电子设备的标识信息用于指示该第一电子设备的型号;根据该鉴权请求信息确定鉴权结果;向该第二电子设备发送该鉴权结果。
结合第三方面,在第三方面的某些实现方式中,该鉴权请求信息还包括:该第二电子设备的标识信息。
结合第三方面,在第三方面的某些实现方式中,该服务器包括该第一应用程序的接入权限信息,该接入权限信息用于指示允许该第一应用程序接入的电子设备的型号,该根据该鉴权请求信息确定鉴权结果包括:根据该鉴权请求信息和该接入权限信息确定该鉴权结果。
结合第三方面,在第三方面的某些实现方式中,该服务器包括该第一应用程序的接入权限信息,该接入权限信息用于指示允许该第一应用程序接入的电子设备的型号和安装该第一应用程序的电子设备的型号,该根据该鉴权请求信息确定鉴权结果包括:根据该鉴权请求信息和该接入权限信息确定该鉴权结果。
结合第三方面,在第三方面的某些实现方式中,根据该鉴权请求信息和该接入权限信息确定该鉴权结果包括:根据该第一电子设备的标识信息确定该第一电子设备的型号;根据该第一电子设备的型号、该第一应用程序的应用程序信息和该接入权限信息确定该鉴权结果。
第四方面,提供了一种电子设备,该电子设备包括执行上述第二方面或者第二方面的任意一种可能的设计的方法的模块/单元;这些模块/单元可以通过硬件实现,也可以通过硬件执行相应的软件实现。
第五方面,提供了一种电子设备,该电子设备包括执行上述第三方面或者第三方面的任意一种可能的设计的方法的模块/单元;这些模块/单元可以通过硬件实现,也可以通过硬件执行相应的软件实现。
第六方面,提供了一种芯片,该芯片与电子设备中的存储器耦合,用于调用存储器中存储的计算机程序并执行本申请实施例第二方面及其第二方面任一可能设计的技术方案或第三方面及其第三方面任一可能设计的技术方案;本申请实施例中“耦合”是指两个部件彼此直接或间接地结合。
第七方面,提供了一种计算机可读存储介质,该计算机可读存储介质包括计算机程序,当计算机程序在电子设备上运行时,使得该电子设备执行如上述第二方面及其第二方面任 一可能设计的技术方案或第三方面及其第三方面任一可能设计的技术方案。
第八方面,提供了一种计算机程序,该计算机程序包括指令,当该指令在计算机上运行时,使得该计算机执行如上述第二方面及其第二方面任一可能设计的技术方案或第三方面及其第三方面任一可能设计的技术方案。
其中,第四方面至第八方面的有益效果,请参见第二方面、第三方面的有益效果,不重复赘述。
附图说明
图1是本申请实施例提供的一种电子设备的结构示意图。
图2是本申请实施例提供的一种电子设备的软件结构框图。
图3是本申请实施例提供的一种系统示意图。
图4是本申请实施例提供的另一种系统示意图。
图5是本申请实施例提供的接入电子设备的方法的示意性流程图。
图6是本申请实施例提供的另一接入电子设备的方法的示意性流程图。
图7是本申请实施例提供的另一接入电子设备的方法的示意性流程图。
图8是本申请实施例提供的电子设备安装第三方应用程序的方法的示意性流程图。
图9是本申请实施例提供的一种第二电子设备组成示意图。
图10是本申请实施例提供的一种服务器组成示意图。
具体实施方式
以下实施例中所使用的术语只是为了描述特定实施例的目的,而并非旨在作为对本申请的限制。如在本申请的说明书和所附权利要求书中所使用的那样,单数表达形式“一个”、“一种”、“所述”、“上述”、“该”和“这一”旨在也包括例如“一个或多个”这种表达形式,除非其上下文中明确地有相反指示。还应当理解,在本申请以下各实施例中,“至少一个”、“一个或多个”是指一个、两个或两个以上。术语“和/或”,用于描述关联对象的关联关系,表示可以存在三种关系;例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A、B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。
在本说明书中描述的参考“一个实施例”或“一些实施例”等意味着在本申请的一个或多个实施例中包括结合该实施例描述的特定特征、结构或特点。由此,在本说明书中的不同之处出现的语句“在一个实施例中”、“在一些实施例中”、“在其他一些实施例中”、“在另外一些实施例中”等不是必然都参考相同的实施例,而是意味着“一个或多个但不是所有的实施例”,除非是以其他方式另外特别强调。术语“包括”、“包含”、“具有”及它们的变形都意味着“包括但不限于”,除非是以其他方式另外特别强调。
以下介绍电子设备和用于使用这样的电子设备的实施例。在一些实施例中,电子设备可以是还包含其它功能诸如个人数字助理和/或音乐播放器功能的便携式电子设备,诸如手机、平板电脑、具备无线通讯功能的可穿戴电子设备(如智能手表)等。便携式电子设备的示例性实施例包括但不限于搭载鸿蒙(Harmony OS)或者其它操作系统的便携式电子设备。上述便携式电子设备也可以是其它便携式电子设备, 诸如膝上型计算机(Laptop)等。还应当理解的是,在其他一些实施例中,上述电子设备也可以不是便携式电子设备,而是台式计算机、智能电视、智能音箱等。
示例性的,图1示出了电子设备100的结构示意图。电子设备100可以包括处理器110,外部存储器接口120,内部存储器121,通用串行总线(universal serial bus,USB)接口130,充电管理模块140,电源管理模块141,电池142,天线1,天线2,移动通信模块150,无线通信模块160,音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,传感器模块180,指南针190,马达191,指示器192,摄像头193,显示屏194,以及用户标识模块(subscriber identification module,SIM)卡接口195等。
可以理解的是,本申请实施例示意的结构并不构成对电子设备100的具体限定。在本申请另一些实施例中,电子设备100可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。图示的部件可以以硬件,软件或软件和硬件的组合实现。
其中,处理器110可以包括一个或多个处理单元,例如:处理器110可以包括应用处理器(application processor,AP),调制解调处理器,图形处理器(graphics processing unit,GPU),图像信号处理器(image signal processor,ISP),控制器,视频编解码器,数字信号处理器(digital signal processor,DSP),基带处理器,和/或神经网络处理器(neural-network processing unit,NPU)等。其中,不同的处理单元可以是独立的部件,也可以集成在一个或多个处理器中。在一些实施例中,电子设备101也可以包括一个或多个处理器110。其中,控制器可以根据指令操作码和时序信号,产生操作控制信号,完成取指令和执行指令的控制。在其他一些实施例中,处理器110中还可以设置存储器,用于存储指令和数据。示例性地,处理器110中的存储器可以为高速缓冲存储器。该存储器可以保存处理器110刚用过或循环使用的指令或数据。如果处理器110需要再次使用该指令或数据,可从该存储器中直接调用。这样就避免了重复存取,减少了处理器110的等待时间,因而提高了电子设备101处理数据或执行指令的效率。
在一些实施例中,处理器110可以包括一个或多个接口。接口可以包括集成电路间(inter-integrated circuit,I2C)接口,集成电路间音频(inter-integrated circuit sound,I2S)接口,脉冲编码调制(pulse code modulation,PCM)接口,通用异步收发传输器(universal asynchronous receiver/transmitter,UART)接口,移动产业处理器接口(mobile industry processor interface,MIPI),通用输入输出(general-purpose input/output,GPIO)接口,SIM卡接口,和/或USB接口等。其中,USB接口130是符合USB标准规范的接口,具体可以是Mini USB接口,Micro USB接口,USB Type C接口等。USB接口130可以用于连接充电器为电子设备101充电,也可以用于电子设备101与外围设备之间传输数据。该USB接口130也可以用于连接耳机,通过耳机播放音频。
外部存储器接口120可以用于连接外部存储卡,例如Micro SD卡,实现扩展电子设备100的存储能力。外部存储卡通过外部存储器接口120与处理器110通信,实现数据存储功能。例如将音乐,视频等文件保存在外部存储卡中。
内部存储器121可以用于存储一个或多个计算机程序,该一个或多个计算机程序包括指令。处理器110可以通过运行存储在内部存储器121的上述指令。内部存储器121可以包括存储程序区和存储数据区。其中,存储程序区可存储操作系统;该存储程序区还可以 存储一个或多个应用(比如图库、联系人等)等。存储数据区可存储电子设备101使用过程中所创建的数据(比如照片,联系人等)等。此外,内部存储器121可以包括高速随机存取存储器,还可以包括非易失性存储器,例如一个或多个磁盘存储部件,闪存部件,通用闪存存储器(universal flash storage,UFS)、嵌入式多媒体卡(Embedded Multi Media Card,eMMC)等。在一些实施例中,处理器110可以通过运行存储在内部存储器121的指令,和/或存储在设置于处理器110中的存储器的指令,来使得电子设备101执行本申请实施例中所提供的方法,以及其他应用及数据处理。电子设备100可以通过音频模块170、扬声器170A、受话器170B、麦克风170C、耳机接口170D、以及应用处理器等实现音频功能。例如音乐播放、录音等。
电子设备100可以通过ISP、摄像头193、视频编解码器、GPU、显示屏194以及应用处理器等实现拍摄功能。
ISP用于处理摄像头193反馈的数据。例如,拍照时,打开快门,光线通过镜头被传递到摄像头感光元件上,光信号转换为电信号,摄像头感光元件将所述电信号传递给ISP处理,转化为肉眼可见的图像。ISP还可以对图像的噪点、亮度、肤色进行算法优化。ISP还可以对拍摄场景的曝光、色温等参数优化。在一些实施例中,ISP可以设置在摄像头193中。
摄像头193用于捕获静态图像或视频。物体通过镜头生成光学图像投射到感光元件。感光元件可以是电荷耦合器件(charge coupled device,CCD)或互补金属氧化物半导体(complementary metal-oxide-semiconductor,CMOS)光电晶体管。感光元件把光信号转换成电信号,之后将电信号传递给ISP转换成数字图像信号。ISP将数字图像信号输出到DSP加工处理。DSP将数字图像信号转换成标准的RGB,YUV等格式的图像信号。在一些实施例中,电子设备100可以包括1个或多个摄像头193。
数字信号处理器用于处理数字信号,除了可以处理数字图像信号,还可以处理其他数字信号。例如,当电子设备100在频点选择时,数字信号处理器用于对频点能量进行傅里叶变换等。
视频编解码器用于对数字视频压缩或解压缩。电子设备100可以支持一种或多种视频编解码器。这样,电子设备100可以播放或录制多种编码格式的视频,例如:动态图像专家组(moving picture experts group,MPEG)1、MPEG2、MPEG3、MPEG4等。
NPU为神经网络(neural-network,NN)计算处理器,通过借鉴生物神经网络结构,例如借鉴人脑神经元之间传递模式,对输入信息快速处理,还可以不断的自学习。通过NPU可以实现电子设备100的智能认知等应用,例如:图像识别、人脸识别、语音识别、文本理解、三维模型重建等。
图2是本申请实施例的电子设备100的软件结构框图。分层架构将软件分成若干个层,每一层都有清晰的角色和分工。层与层之间通过软件接口通信。在一些实施例中,将Android系统分为四层,从上至下分别为应用程序层,应用程序框架层,安卓运行时(Android runtime)和系统库,以及内核层。应用程序层可以包括一系列应用程序包。
如图2所示,应用程序包可以包括相机、图库、日历、通话、地图、导航、WLAN、蓝牙、音乐、视频、短信息等应用程序。
应用程序框架层为应用程序层的应用程序提供应用编程接口(application programming  interface,API)和编程框架,应用程序框架层包括一些预先定义的函数。
如图2所示,应用程序框架层可以包括窗口管理器、内容提供器、视图系统、电话管理器、资源管理器、通知管理器等。
窗口管理器用于管理窗口程序,窗口管理器可以接收显示屏大小,判断是否有状态栏、锁定屏幕、截取屏幕等。
内容提供器用来存放和接收数据,并使这些数据可以被应用程序访问。所述数据可以包括视频、图像、音频、拨打和接听的电话、浏览历史和书签、电话簿等。
视图系统包括可视控件,例如显示文字的控件,显示图片的控件等。视图系统可用于构建应用程序。显示界面可以由一个或多个视图组成的。例如,包括短信通知图标的显示界面,可以包括显示文字的视图以及显示图片的视图。
电话管理器用于提供电子设备100的通信功能。例如通话状态的管理(包括接通,挂断等)。
资源管理器为应用程序提供各种资源,比如本地化字符串、图标、图片、布局文件、视频文件等等。
通知管理器使应用程序可以在状态栏中显示通知信息,可以用于传达告知类型的消息,可以短暂停留后自动消失,无需用户交互。比如通知管理器被用于告知下载完成,消息提醒等。通知管理器还可以是以图表或者滚动条文本形式出现在系统顶部状态栏的通知,例如后台运行的应用程序的通知,还可以是以对话窗口形式出现在屏幕上的通知。例如在状态栏提示文本信息、发出提示音、电子设备振动、指示灯闪烁等。
系统库可以包括多个功能模块。例如:表面管理器(surface manager)、媒体库(media libraries)、三维图形处理库(例如:OpenGL ES)、2D图形引擎(例如:SGL)等。
表面管理器用于对显示子系统进行管理,并且为多个应用程序提供了2D和3D图层的融合。
媒体库支持多种常用的音频、视频格式回放和录制以及静态图像文件等。媒体库可以支持多种音视频编码格式,例如:MPEG4、H.264、MP3、AAC、AMR、JPG和PNG等。
三维图形处理库用于实现三维图形绘图、图像渲染、合成和图层处理等。
2D图形引擎是2D绘图的绘图引擎。
内核层是硬件和软件之间的层。内核层至少包含显示驱动、摄像头驱动、音频驱动、传感器驱动。
目前第三方应用程序在接入可穿戴设备或安装到可穿戴设备时可能存在以下问题:例如安装在一台电子设备(例如手机、平板电脑等)上的第三方应用程序接入可穿戴设备时,可能由于接入的验证机制繁琐而导致接入失败。再例如,可穿戴设备安装第三方应用程序时,由于权限验证机制繁琐而导致安装失败。本申请实施例中,将非电子设备商提供的应用程序称为第三方应用程序。例如,电子设备#1为智能手表,该智能手表的设备商提供了“运动健康”应用程序以支撑该智能手表的各项运动功能,而非该智能手表的设备生产商提供了“睡眠监测”应用程序以利用该智能手表的睡眠监测功能,则可以将“睡眠监测”应用程序称为第三方应用程序,将“运动健康”称为官方应用、非第三方应用程序等。
基于此,本申请实施例提供了一种接入电子设备的方法,电子设备可以快速的接入安装在另一台电子设备上的第三方应用程序,从而第三方应用程序可以依靠接入的电子设备 实现各项功能,提高了用户体验。
图3是适用于本申请实施例的系统示意图,如图3所示,该系统包括第一电子设备、第二电子设备和服务器。第一电子设备可以通过有线或无线方式与第二电子设备连接,第二电子设备可以通过无线方式与服务器连接。第一电子设备可以通过第二电子设备与服务器连接。第一电子设备可以是智能手表、智能眼镜、智能音箱等可穿戴设备。图3只是示意图,该系统还可以包括其他电子设备,在图3中未画出。
图4是适用于本申请实施例的另一种系统示意图,如图4所示,该系统包括第一电子设备和服务器。第一电子设备可以通过无线方式与服务器连接。第一电子设备可以是智能手表、智能眼镜、智能音箱等可穿戴设备。图4只是示意图,该系统还可以包括其他电子设备,在图4中未画出。
图5示出了本申请实施例提供的接入电子设备的方法500的示意性流程图,如图5所示,该方法由第一电子设备、第二电子设备和服务器执行,其中该第一电子设备和该服务器由同一设备商提供,第二电子设备包括第一应用程序,第一应用程序为第三方应用程序,第一应用程序包括由第一电子设备的设备商提供的第一模块,该第一模块包括一个或多个软件接口,该一个或多个软件接口用于与服务器、第一电子设备和第二电子设备通信,服务器存储有第一应用程序的接入权限信息,该方法500包括:
S501,第一电子设备向第二电子设备发送标识信息。
对应的,第二电子设备接收第一电子设备的标识信息。
一个实施例中,第一电子设备向第二电子设备发送标识信息,该第二电子设备在第一应用程序请求接入第一电子设备时,第二电子设备可以接收第一电子设备的标识信息,即第一应用程序可以通过第一模块获取该第一电子设备的标识信息。
在另一个实施例中,若第二电子设备检测到第一电子设备发送标识信息,则第二电子设备可以接收第一电子设备的标识信息。换句话说,第二电子设备可以在第一应用程序未请求接入第一电子设备时,第二电子设备也可以接收第一电子设备的标识信息,进而第一应用程序可以通过第一模块获取该第一电子设备的标识信息。
一个实施例中,第一电子设备可以通过近距离无线通信技术发送标识信息,从而第二电子设备可以接收该第一电子设备的标识信息。
本申请实施例中的近距离无线通信技术包括但不限于Wi-Fi,蓝牙(bluetooth,BT)、ZigBee。
例如,第一电子设备可以通过蓝牙广播标识信息,从而第二电子设备可以接收该第一电子设备的标识信息。
再例如,第一电子设备可以通过蓝牙广播标识信息,从而第二电子设备在第一应用程序请求接入第一电子设备时,接收该第一电子设备的标识信息。
本申请实施例中的标识信息用于指示该第一电子设备的设备型号。第一电子设备通过近距离无线通信技术发送标识信息时,标识信息可以是蓝牙名称、Wi-Fi名称、电子设备的设备身份标识号(identitydocument,ID)。
例如,第一电子设备的蓝牙名称是“智能手表6”,则该蓝牙名称指示了该第一电子设备的设备型号是“智能手表6”。
再例如,第一电子设备的Wi-Fi名称是“智能手表6”,则该Wi-Fi名称指示了该第 一电子设备的设备型号是“智能手表6”。
再例如,第一电子设备的设备ID是“ABCD”。
一个实施例中,第一电子设备可以通过有线连接发送标识信息,从而第二电子设备可以接收该第一电子设备的标识信息。
本申请实施例中的有线连接包括但不限于USB Type-A、USB Type-B、USB Type-C。
第一电子设备通过近距离无线通信技术发送标识信息时,标识信息可以电子设备的设备ID、USB名称等。
S502,第二电子设备向服务器发送第一应用程序的鉴权请求信息。
对应的,服务器接收第二电子设备发送的第三方应用程序的鉴权请求信息。
一个实施例中,在S501中,第二电子设备接收了第一电子设备发送的标识信息,当第二电子设备中的第一应用程序请求接入该第一电子设备时,第一应用程序可以通过第一模块与第二电子设备通信以得到鉴权请求信息,从而第二电子设备可以通过第一应用程序向服务器发送第一应用程序的鉴权请求信息。
在另一个实施例中,在S501中,若第二电子设备在第一应用程序请求接入第一电子设备时接收第一电子设备的标识信息,第一应用程序可以通过第一模块与第二电子设备通信以得到鉴权请求信息,从而第二电子设备可以通过第一应用程序向服务器发送第一应用程序的鉴权请求信息。
在上述实施例中,鉴权请求信息可以包括第一电子设备的标识信息和第一应用程序的应用程序信息,该应用程序信息用于指示该第一应用程序的名称,其中该第一应用程序为第三方应用程序。
示例性的,该应用程序信息可以是该第一应用程序的包名(packagename)。例如,应用程序的包名是“abcd”。
示例性的,该应用程序信息也可以直接是该第一应用程序的名称。
可选的,在一些实施例中,鉴权请求信息还包括第一应用程序的证书和/或第二电子设备的标识信息和/或第二电子设备的操作系统信息,其中第一应用程序可以通过第一模块与第二电子设备通信以得到第二电子设备的标识信息和/或第二电子设备的操作系统信息。
第一应用程序的证书可以预置在第一应用程序中,或第二电子设备可以通过第一应用程序对应的服务器获得该证书,第一应用程序的证书用于校验第一应用程序,具体说明请参见后文说明。
第二电子设备的操作系统信息可以包括第二电子设备的操作系统的类型,还可以包括第二电子设备的操作系统的版本。例如,第二电子设备的操作系统的类型是“鸿蒙”。再例如,第二电子设备的操作系统的版本是“鸿蒙2.0”。
应理解,针对第二电子设备的标识信息的描述可以参见针对第一电子设备的标识信息的描述,为了简洁,在此不再赘述。
S503,服务器根据鉴权请求信息确定鉴权结果。
具体的,服务器在接收第二电子设备发送的鉴权请求信息后,可以根据该鉴权请求信息判断第一应用程序的权限以生成鉴权结果。
一个实施例中,鉴权请求信息包括第一电子设备的标识信息和第一应用程序的应用程 序信息,则服务器可以根据第一电子设备的标识信息和第一应用程序的应用程序信息判断第一应用程序是否有接入第一电子设备的权限,其中服务器可以存储第一应用程序的接入权限信息,该接入权限信息用于指示第一应用程序接入的电子设备的型号。
一种可能的实现形式,第一电子设备的标识信息直接指示了该第一电子设备的型号以及第一应用程序的应用程序信息直接指示了该第一应用程序的名称,则服务器可以根据存储的权限判断第一应用程序是否有权限接入第一电子设备。
例如,假设第一电子设备的标识信息是蓝牙名称,该蓝牙名称为“智能手表6”,第一应用程序的应用程序信息是应用程序名称,该应用程序名称为“睡眠监测”,且服务器上存储的“睡眠监测”的接入权限是允许接入“智能手表5”。第二电子设备向服务器发送了第一电子设备的标识信息和第一应用程序的应用程序信息,服务器接收到上述信息后,可以根据上述信息确定与服务器存储的“睡眠监测”的权限不同,即“睡眠监测”无法接入“智能手表6”,则可以生成鉴权结果以指示第一应用程序不接入第一电子设备。
再例如,假设第一电子设备的标识信息是蓝牙名称,该蓝牙名称为“智能手表5”,第一应用程序的应用程序信息是应用程序名称,该应用程序名称为“睡眠监测”,且服务器上存储的“睡眠监测”的接入权限是允许接入“智能手表5”。第二电子设备向服务器发送了第一电子设备的标识信息和第一应用程序的应用程序信息,服务器接收到上述信息后,可以根据上述信息确定与服务器存储的“睡眠监测”的权限相同,即“睡眠监测”可以接入“智能手表5”,则可以生成鉴权结果以指示第一应用程序接入第一电子设备。
一种可能的实现方式,第一电子设备的标识信息是设备ID以及第一应用程序的应用程序信息直接指示了该第一应用程序的名称,服务器可以根据设备ID和第一应用程序的名称判断第一应用程序是否有权限接入第一电子设备。
例如,假设第一电子设备的标识信息是设备ID,该设备ID为“ABCD”,第一应用程序的应用程序信息是应用程序名称,该应用程序名称为“睡眠监测”,且服务器上存储的“睡眠监测”的接入权限是允许接入设备ID为“ABCD”的电子设备。第二电子设备向服务器发送了第一电子设备的标识信息和第一应用程序的应用程序信息,服务器接收到上述信息后,可以根据上述信息确定与服务器存储的“睡眠监测”的权限相同,即“睡眠监测”可以接入设备ID为“ABCD”的电子设备,则可以生成鉴权结果以指示第一应用程序接入第一电子设备。
一种可能的实现方式,第一电子设备的标识信息是设备ID以及第一应用程序的应用程序信息直接指示了该第一应用程序的名称,服务器可以根据设备ID确定第一电子设备的型号,并根据该第一电子设备的型号和第一应用程序的名称判断第一应用程序是否有权限接入第一电子设备。
例如,假设第一电子设备的标识信息是设备ID,该设备ID为“ABCD”,第一应用程序的应用程序信息是应用程序名称,该应用程序名称为“睡眠监测”,第二电子设备向服务器发送了第一电子设备的标识信息和第一应用程序的应用程序信息,服务器接收到上述信息后,可以根据该设备ID解析得到该设备ID对应的设备型号为“智能手表5”,且服务器上存储的“睡眠监测”的接入权限是允许“智能手表5”,则服务器可以生成鉴权结果以指示第一应用程序接入第一电子设备。
一种可能的实现方式,第一电子设备的标识信息是设备ID以及第一应用程序的应用 程序信息为包名,间接指示了该第一应用程序的名称,服务器可以根据设备ID确定第一电子设备的型号,以及根据该第一应用程序的包名确定该第一电子设备的名称,并根据该第一电子设备的型号和第一应用程序的名称判断第一应用程序是否有权限接入第一电子设备。
例如,假设第一电子设备的标识信息是设备ID,该设备ID为“ABCD”,第一应用程序的应用程序信息是包名,该包名为“abcd”,第二电子设备向服务器发送了第一电子设备的标识信息和第一应用程序的应用程序信息,服务器接收到上述信息后,可以根据该设备ID解析得到该设备ID对应的设备型号为“智能手表5”,根据该包名解析得到该包名对应的应用程序名称为“睡眠监测”,且服务器上存储的“睡眠监测”的接入权限是允许“智能手表5”,则服务器可以生成鉴权结果以指示第一应用程序接入第一电子设备。
一个实施例中,鉴权请求信息包括第一电子设备的标识信息、第一应用程序的应用程序信息和第一应用程序的证书,则服务器可以根据第一电子设备的标识信息、第一应用程序的应用程序信息和第一应用程序的证书判断第一应用程序是否有接入第一电子设备的权限,其中服务器可以存储第一应用程序的接入权限信息,在该实施例中,接入权限信息用于指示第一应用程序接入的电子设备的型号。
例如,假设第一电子设备的标识信息指示第一电子设备的设备型号是“智能手表5”,第一应用程序的应用程序信息指示了第一应用程序的名称是“睡眠监测”,且服务器上存储的“睡眠监测”的接入权限是允许接入“智能手表5”。第二电子设备向服务器发送了第一电子设备的标识信息、第一应用程序的应用程序信息和第一应用程序的证书,服务器接收到上述信息后,可以先验证第一应用程序的证书是否正确,当服务器验证证书通过后,可以根据上述信息确定与服务器存储的“睡眠监测”的权限相同,即“睡眠监测”可以接入“智能手表5”,则可以生成鉴权结果以指示第一应用程序接入第一电子设备。
应理解,针对第一电子设备的标识信息指示第一电子设备的设备型号和第一应用程序的应用程序信息指示第一应用程序的名称的描述可以参见上文描述,为了简洁,在此不再赘述。
一个实施例中,鉴权请求信息包括第一电子设备的标识信息、第一应用程序的应用程序信息和第二电子设备的标识信息,则服务器可以根据第一电子设备的标识信息、第一应用程序的应用程序信息和第二电子设备的标识信息判断第一应用程序是否有接入第一电子设备的权限,其中服务器可以存储第一应用程序的接入权限信息,在该实施例中,接入权限信息用于指示第一应用程序接入的电子设备的型号,还用于指示安装第一应用程序的电子设备的型号。
例如,假设第一电子设备的标识信息指示第一电子设备的设备型号是“智能手表5”,第一应用程序的应用程序信息指示了第一应用程序是“睡眠监测”,第二电子设备的标识信息是设备ID,该设备ID为“BCDE”,且服务器上存储的“睡眠监测”的接入权限是允许接入“智能手表5”,且安装“睡眠监测”的电子设备的设备ID需要是“BCDE”。第二电子设备向服务器发送了第一电子设备的标识信息、第一应用程序的应用程序信息和第二电子设备的标识信息,服务器接收到上述信息后,可以根据上述信息确定与服务器存储的“睡眠监测”的权限相同,即“睡眠监测”可以接入“智能手表5”,则可以生成鉴权结果以指示第一应用程序接入第一电子设备。
应理解,针对第一电子设备的标识信息指示第一电子设备的设备型号和第一应用程序的应用程序信息指示了第一应用程序的名称的描述可以参见上文描述,为了简洁,在此不再赘述。
再例如,假设第一电子设备的标识信息指示第一电子设备的设备型号是“智能手表5”,第一应用程序的应用程序信息指示了第一应用程序是“睡眠监测”,第二电子设备的标识信息是设备ID,该设备ID为“BCDE”,第二电子设备向服务器发送了第一电子设备的标识信息、第一应用程序的应用程序信息和第二电子设备的标识信息,服务器接收到上述信息后,可以根据第一电子设备的标识信息确定第一电子设备的型号是“智能手表5”,根据第一应用程序的应用程序信息确定第一应用程序的名称是“睡眠监测”,根据设备ID“BCDE”确定该设备ID对应的型号为“智能手机A”,且服务器上存储的“睡眠监测”的接入权限是允许“智能手表5”和安装“睡眠监测”的电子设备的型号需要是“智能手手机A”,则服务器可以生成鉴权结果以指示第一应用程序接入第一电子设备。
应理解,针对第一电子设备的标识信息指示第一电子设备的设备型号和第一应用程序的应用程序信息指示了第一应用程序的名称的描述可以参见上文描述,为了简洁,在此不再赘述。
一个实施例中,鉴权请求信息包括第一电子设备的标识信息、第一应用程序的应用程序信息和第二电子设备的操作系统信息,则服务器可以根据第一电子设备的标识信息、第一应用程序的应用程序信息和第二电子设备的操作系统信息判断第一应用程序是否有接入第一电子设备的权限,其中服务器可以存储第一应用程序的接入权限信息,该实施例中,接入权限信息用于指示第一应用程序接入的电子设备的型号,还用于指示安装第一应用程序的电子设备的操作系统信息。
例如,假设第一电子设备的标识信息指示第一电子设备的设备型号是“智能手表5”,第一应用程序的应用程序信息指示了第一应用程序是“睡眠监测”,第二电子设备的操作系统信息指示第二电子设备操作系统是“鸿蒙”,且服务器上存储的“睡眠监测”的接入权限是允许接入“智能手表5”,且安装“睡眠监测”的电子设备的操作系统需要是“鸿蒙”。第二电子设备向服务器发送了第一电子设备的标识信息、第一应用程序的应用程序信息和第二电子设备的操作系统信息,服务器接收到上述信息后,可以根据上述信息确定与服务器存储的“睡眠监测”的权限相同,即“睡眠监测”可以接入“智能手表5”,则可以生成鉴权结果以指示第一应用程序接入第一电子设备。
应理解,针对第一电子设备的标识信息指示第一电子设备的设备型号和第一应用程序的应用程序信息指示了第一应用程序的名称的描述可以参见上文描述,为了简洁,在此不再赘述。
再例如,假设第一电子设备的标识信息指示第一电子设备的设备型号是“智能手表5”,第一应用程序的应用程序信息指示了第一应用程序是“睡眠监测”,第二电子设备的操作系统信息指示第二电子设备的操作系统版本是“鸿蒙3.0”,且服务器上存储的“睡眠监测”的接入权限是允许接入“智能手表5”,且安装“睡眠监测”的电子设备的操作系统版本需要是“鸿蒙3.0”。第二电子设备向服务器发送了第一电子设备的标识信息、第一应用程序的应用程序信息和第二电子设备的操作系统信息,服务器接收到上述信息后,可以根据上述信息确定与服务器存储的“睡眠监测”的权限相同,即“睡眠监测”可以接入 “智能手表5”,则可以生成鉴权结果以指示第一应用程序接入第一电子设备。
应理解,针对第一电子设备的标识信息指示第一电子设备的设备型号和第一应用程序的应用程序信息指示了第一应用程序的名称的描述可以参见上文描述,为了简洁,在此不再赘述。
一个实施例中,鉴权请求信息包括第一电子设备的标识信息、第一应用程序的应用程序信息、第二电子设备的标识信息、证书,则服务器可以根据第一电子设备的标识信息、第一应用程序的应用程序信息、第二电子设备的标识信息和证书判断第一应用程序是否有接入第一电子设备的权限。
应理解,针对该实施例的描述类似于上文描述,为了简洁,在此不再赘述。
一个实施例中,鉴权请求信息包括第一电子设备的标识信息、第一应用程序的应用程序信息、第二电子设备的操作系统信息和证书,则服务器可以根据第一电子设备的标识信息、第一应用程序的应用程序信息、第二电子设备的标识信息和证书判断第一应用程序是否有接入第一电子设备的权限。
应理解,针对该实施例的描述类似于上文描述,为了简洁,在此不再赘述。
一个实施例中,鉴权请求信息包括第一电子设备的标识信息、第一应用程序的应用程序信息、第二电子设备的标识信息、第二电子设备的操作系统信息和证书,则服务器可以根据第一电子设备的标识信息、第一应用程序的应用程序信息、第二电子设备的标识信息和证书判断第一应用程序是否有接入第一电子设备的权限。
应理解,针对该实施例的描述类似于上文描述,为了简洁,在此不再赘述。
进一步的,在上述实施例中,服务器存储的第一应用程序的接入权限信息还包括授权时长信息。例如,服务器存储的“睡眠监测”的接入权限是:允许“睡眠监测”接入“智能手表5”,且授权时间为2022年2月28日-2023年2月28日,即允许“睡眠监测”在上述时间段内接入“智能手表5”,在其他时间段内无法接入“智能手表5”。
替代性的,在上述实施例中,服务器也可以不存储用于指示第一应用程序接入的电子设备的型号的接入权限信息,服务器在接收到鉴权请求信息后,可以通过人工智能(Artificial Intelligence,AI)的方式判断第一应用程序的权限并生成鉴权结果。例如,服务器可以将接收到的鉴权请求信息输入到预先训练好的神经网络模型中以得到鉴权结果。
S504,服务器向第二电子设备发送鉴权结果。
对应的,第二电子设备接收服务器发送的鉴权结果。
具体的,服务器在根据鉴权请求信息生成鉴权结果后,可以向第二电子设备发送鉴权结果,以指示第一应用程序判断是否接入第一电子设备。
例如,鉴权结果可以用1比特指示,“0”表示第一应用程序无权限接入第一电子设备,“1”表示第一应用程序有权限接入第一电子设备,即直接指示了第一应用程序有无权限接入第一电子设备。
再例如,鉴权结果可以用1比特指示,“0”表示鉴权请求信息与服务器存储的第一应用程序的接入权限不对应,“1”鉴权请求信息与服务器存储的第一应用程序的接入权限对应,即间接指示了第一应用程序有无权限接入第一电子设备。
S505,第二电子设备根据鉴权结果确定第一应用程序是否接入第一电子设备。
具体的,第二电子设备接收到鉴权结果后,可以根据该鉴权结果确定第一应用程序是 否接入第一电子设备。
例如,当鉴权结果指示第一应用程序无权限接入第一电子设备时,第一应用程序不接入第一电子设备。
再例如,当鉴权结果指示第一应用程序有权限接入第一电子设备时,第一应用程序接入第一电子设备。
本申请实施例中,当第三方应用程序需要接入电子设备时,可以直接向服务器请求接入电子设备的权限,若服务器确定第三方应用程序可以接入时,第三方应用程序可以直接接入,从而第三方应用程序可以通过接入电子设备以实现各项拓展功能,提高了第三方应用程序的功能性,增强了用户体验。
可选的,在一些实施例中,当第一电子设备与第二电子设备连接后,即第一应用程序接入第一电子设备后,第二电子设备可以保存第一电子设备的消息认证码(messageauthenticationcode,MAC)地址。
本申请实施例中,由于第二电子设备与第一电子设备连接后,第二电子设备可以保存第一电子设备的MAC地址,则第一应用程序再次接入第一电子设备时,不需要通过服务器就可以直接接入第一电子设备,提高了接入电子设备的速度,增强了用户体验。
图6示出了本申请实施例提供的另一接入电子设备的方法600的示意性流程图。如图6所示,该方法600可以由第二电子设备执行,该方法600包括:
S601,接收第一电子设备的标识信息。
一个实施例中,第二电子设备可以接收第一电子设备的标识信息。
另一个实施例中,第二电子设备的第一应用程序请求接入第一电子设备时,第二电子设备可以接收第一电子设备的标识信息。
应理解,第二电子设备接收第一电子设备的标识信息的过程可以参考上述方法500中的S501,为了简洁,在此不再赘述。
S602,向服务器发送第一应用程序的鉴权请求信息。
一个实施例中,第二电子设备在接收第一电子设备的标识信息后,在第一应用程序请求接入第一电子设备时,可以向服务器发送第一应用程序的鉴权请求信息。
一个实施例中,第二电子设备在第一应用程序请求接入第一电子设备时,接收第一电子设备的标识信息,然后向服务器发送第一应用程序的鉴权请求信息。
应理解,第二电子设备向服务器发送第一程序的鉴权请求信息的过程可以参考上述方法500中的S502,为了简洁,在此不再赘述。
S603,接收服务器发送的鉴权结果。
应理解,第二电子设备接收服务器发送的鉴权结果的过程可以参考上述方法500中的S504,为了简洁,在此不再赘述。
S604,根据鉴权结果确定是否接入第一电子设备。
一个实施例中,当鉴权结果指示第一应用程序无权限接入第一电子设备时,第二电子设备可以拒绝第一应用程序的接入第一电子设备的请求。
一个实施例中,当鉴权结果指示第一应用程序有权限接入第一电子设备时,第二电子设备允许第一应用程序接入第一电子设备。
一个实施例中,当第二电子设备在预设时间内未接收到鉴权结果时,第二电子设备可 以拒绝第一应用程序的接入第一电子设备的请求。
本申请实施例中,当第三方应用程序需要接入电子设备时,可以直接向服务器请求接入电子设备的权限,若服务器确定第三方应用程序可以接入时,第三方应用程序可以直接接入,从而第三方应用程序可以通过接入电子设备以实现各项拓展功能,提高了第三方应用程序的功能性,增强了用户体验。
可选的,在一些实施例中,该方法600还包括:
S605,当第一应用程序接入第一电子设备时,存储第一电子设备的消息认证码地址。
具体的,第二电子设备在接收第一应用程序的标识信息时还可以获取第一电子设备的消息认证码(message authentication code,MAC)地址,从而当第一应用程序接入第一电子设备时,第二电子设备可以保存第一电子设备的MAC地址。
本申请实施例中,由于第二电子设备在接收第一应用程序的标识信息时还可以获取第一电子设备的MAC,当第一应用程序接入第一电子设备时,第二电子设备可以保存第一电子设备的MAC地址,则第一应用程序再次接入第一电子设备时,不需要通过服务器就可以直接接入第一电子设备,提高了接入电子设备的速度,增强了用户体验。
图7示出了本申请实施例提供的另一接入电子设备的方法700的示意性流程图。如图7所示,该方法700可以由服务器执行,该方法700包括:
S701,接收第二电子设备发送的第一应用程序的鉴权请求信息。
应理解,服务器接收第二电子设备发送的第一应用程序的鉴权请求信息的过程可以参考上述方法500中的S502,为了简洁,在此不再赘述。
S702,根据鉴权请求信息确定鉴权结果。
具体的,服务器在接收第二电子设备发送的第一应用程序的鉴权请求信息后,可以确定第一应用程序对应的鉴权结果。
应理解,服务器根据鉴权请求信息确定鉴权结果的过程可以参考上述方法500中的S503,为了简洁,在此不再赘述。
S703,发送鉴权结果。
应理解,服务器发送鉴权结果的过程可以参考上述方法500中的S504,为了简洁,在此不再赘述。
本申请实施例中,当第三方应用程序需要接入电子设备时,服务器可以确定该第三方应用程序的接入电子设备的权限,从而可以快速接入电子设备以实现各项拓展功能,提高了第三方应用程序的功能性,增强了用户体验。
图8示出了本申请实施例提供的电子设备安装第三方应用程序的方法800的示意性流程图。如图8所示,该方法800可以由第一电子设备和服务器执行,其中第一电子设备和服务器由同一设备商提供,服务器存储有第一电子设备安装应用程序的权限,该方法800包括:
S801,第一电子设备获取第二应用程序的安装包。
具体的,第一电子设备获取第二应用程序的安装包,该第二应用程序为第三方应用程序。
示例性的,第一电子设备通过移动通信技术从第二应用程序的服务器获取第二应用程序的安装包。
示例性的,第一电子设备接收其他电子设备发送的第二应用程序的安装包。
S802,第一电子设备向服务器发送第一鉴权请求信息。
对应的,服务器接收第一电子设备发送的第一鉴权请求信息。
具体的,鉴权请求信息包括第二应用程序的名称(或包名)和第一电子设备的标识信息。第一电子设备从第二应用程序的安装包获取第二应用程序的名称(或包名),然后将第二应用程序的名称(或包名)和第一电子设备的标识信息发送至服务器。
应理解,针对第二应用程序的名称(或包名)和第一电子设备的标识信息的描述,可以参见上文说明,为了简洁,在此不再赘述。
S803,服务器根据第一鉴权请求信息确定第一鉴权结果。
具体的,服务器接收到第一电子设备发送的第一鉴权请求信息后,可以根据存储的第一电子设备的安装应用程序的权限和第一鉴权请求信息确定第一鉴权结果,该第一鉴权结果用于指示第一电子设备是否安装第二应用程序。
例如,假设第一电子设备的标识信息指示第一电子设备的设备型号是“智能手表5”,第应用程序的应用程序信息指示了第一应用程序是“睡眠监测”,且服务器存储的“智能手表5”有权限安装“睡眠监测”。第一电子设备向服务器上述信息,服务器接收到上述信息后,服务器可以第一智能设备请求安装的应用程序与存储的权限一致,则生成第一鉴权结果以指示第一电子设备安装第二应用程序。
S804,服务器向第一电子设备发送第一鉴权结果。
对应的,第一电子设备接收服务器发送的第一鉴权结果。
S805,第一电子设备根据第一鉴权结果确定是否安装第二应用程序。
具体的,第一电子设备在接收到第一鉴权结果后可以确定是否安装第二应用程序。
本申请实施例中,第一电子设备在安装第三方应用程序时,可以向服务器请求查询是否有安装该第三方应用程序的权限,当有安装该第三方应用程序的权限时,服务器可以生成鉴权结果,从而第一电子设备可以安装该第三方应用程序,提高了第一电子设备的数据安全性。
上述主要从电子设备的角度对本申请实施例提供的一种接入电子设备的方法进行了介绍。可以理解的是,电子设备为了实现上述功能,其包含了执行各个功能相应的硬件结构和/或软件模块。本领域技术人员应该很容易意识到,结合本文中所公开的实施例描述的各示例的算法步骤,本申请能够以硬件或硬件和计算机软件的结合形式来实现。某个功能究竟以硬件还是计算机软件驱动硬件的方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
本申请实施例可以根据上述方法示例对电子设备中的处理器进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
在采用了对应各个功能的划分各个功能模块的情况下,图9示出了本申请实施例提供的一种第二电子设备900组成示意图,如图9所示,该第二电子设备包括:收发单元910 和处理单元920。
其中,收发单元910,用于接收第一电子设备的标识信息。
收发单元910,还用于向服务器发送第一应用程序的鉴权请求信息。
收发单元910,还用于接收服务器发送的鉴权结果。
处理单元920,用于根据鉴权结果确定是否接入第一电子设备。
需要说明的是,上述方法实施例涉及的各步骤的所有相关内容均可以援引到对应功能模块的功能描述,在此不再赘述。本申请实施例提供的第二电子设备,用于执行上述接入电子设备的方法,因此可以达到与上述相同的效果。
图10示出了本申请实施例提供的一种服务器1000组成示意图,如图10所示,该服务器包括:收发单元1010和处理单元1020。
其中,收发单元1010,用于接收第二电子设备发送的第一应用程序的鉴权请求信息。
处理单元1020,用于根据鉴权请求信息确定鉴权结果。
收发单元1010,还用于发送鉴权结果。
需要说明的是,上述方法实施例涉及的各步骤的所有相关内容均可以援引到对应功能模块的功能描述,在此不再赘述。本申请实施例提供的服务器,用于执行上述接入电子设备的方法,因此可以达到与上述相同的效果。
本申请实施例还提供了一种电子设备,包括:处理器、存储器、应用程序以及计算机程序。上述各器件可以通过一个或多个通信总线连接。其中,该一个或多个计算机程序被存储在上述存储器中并被配置为被该一个或多个处理器执行,该一个或多个计算机程序包括指令,上述指令可以用于使电子设备执行上述各实施例中第二电子设备的各个步骤。
示例性地,上述处理器具体可以为图1所示的处理器110,上述存储器具体可以为图1所示的内部存储器120和/或与电子设备连接的外部存储器。
本申请实施例还提供一种芯片,所述芯片包括处理器和通信接口,所述通信接口用于接收信号,并将所述信号传输至所述处理器,所述处理器处理所述信号,使得如前文中任一种可能的实现方式中所述的接入电子设备的方法被执行。
本实施例还提供一种计算机可读存储介质,该计算机可读存储介质中存储有计算机指令,当该计算机指令在电子设备上运行时,使得电子设备执行上述相关方法步骤实现上述实施例中的接入电子设备的方法。
本实施例还提供了一种计算机程序产品,当该计算机程序产品在计算机上运行时,使得计算机执行上述相关步骤,以实现上述实施例中的接入电子设备的方法。
本申请实施例还提供一种系统,该系统包括上述实施例提供的第一电子设备、第二电子设备和服务器。
以上实施例中所用,根据上下文,术语“当…时”或“当…后”可以被解释为意思是“如果…”或“在…后”或“响应于确定…”或“响应于检测到…”。类似地,根据上下文,短语“在确定…时”或“如果检测到(所陈述的条件或事件)”可以被解释为意思是“如果确定…”或“响应于确定…”或“在检测到(所陈述的条件或事件)时”或“响应于检测到(所陈述的条件或事件)”。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以 硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (22)

  1. 一种系统,所述系统包括第一电子设备、第二电子设备和服务器,所述第二电子设备包括第一应用程序,所述第一应用程序为第三方应用程序,所述第一应用程序请求接入所述第一电子设备,其特征在于,
    所述第一电子设备,用于发送所述第一电子设备的标识信息;
    所述第二电子设备,用于接收所述第一电子设备的标识信息;
    所述第二电子设备,还用于向所述服务器发送所述第一应用程序的鉴权请求信息,所述鉴权请求信息包括所述第一电子设备的标识信息和所述第一应用程序的应用程序信息;
    所述服务器,用于接收所述鉴权请求信息;
    所述服务器,还用于根据所述鉴权请求信息确定鉴权结果;
    所述服务器,还用于发送所述鉴权结果;
    所述第二电子设备,还用于接收所述鉴权结果;
    所述第二电子设备,还用于根据所述鉴权结果确定所述第一应用程序是否接入所述第一电子设备。
  2. 根据权利要求1所述的系统,其特征在于,所述第二电子设备,具体用于在所述第一应用程序请求接入所述第一电子设备时,从所述第一电子设备接收所述第一电子设备的标识信息。
  3. 根据权利要求1所述的系统,其特征在于,所述第二电子设备,具体用于在所述第一应用程序请求接入所述第一电子设备时,获取所述第二电子设备上的所述第一电子设备的标识信息并向所述服务器发送所述第一应用程序的鉴权请求信息。
  4. 根据权利要求1至3中任一项所述的系统,其特征在于,所述鉴权请求信息还包括:所述第二电子设备的标识信息。
  5. 根据权利要求1至4中任一项所述的系统,其特征在于,所述第一电子设备,具体用于通过近距离无线通信发送所述第一电子设备的标识信息。
  6. 根据权利要求1至3中任一项所述的系统,其特征在于,所述服务器包括所述第一应用程序的接入权限信息,所述接入权限信息用于指示允许所述第一应用程序接入的电子设备的型号,所述服务器,具体用于根据所述鉴权请求信息和所述接入权限信息确定鉴权结果。
  7. 根据权利要求4所述的系统,其特征在于,所述服务器包括所述第一应用程序的接入权限信息,所述接入权限信息用于指示允许所述第一应用程序接入的电子设备的型号和安装所述第一应用程序的电子设备的型号,所述服务器,具体用于根据所述鉴权请求信息和所述接入权限信息确定鉴权结果。
  8. 根据权利要求1至7中任一项所述的系统,其特征在于,所述第二电子设备,还用于在所述第一应用程序接入所述第一电子设备时,存储所述第一电子设备的消息认证码地址。
  9. 一种接入电子设备的方法,所述方法应用于第二电子设备,所述第二电子设备包括第一应用程序,所述第一应用程序为第三方应用程序,其特征在于,所述方法包括:
    接收第一电子设备的标识信息;
    向服务器发送所述第一应用程序的鉴权请求信息,所述鉴权请求信息包括所述第一电子设备的标识信息和所述第一应用程序的应用程序信息;
    接收所述服务器发送的鉴权结果;
    根据所述鉴权结果确定所述第一应用程序是否接入所述第一电子设备。
  10. 根据权利要求9所述的方法,其特征在于,所述接收第一电子设备的标识信息包括:
    在所述第一应用程序请求接入所述第一电子设备时,从所述第一电子设备接收所述第一电子设备的标识信息。
  11. 根据权利要求9所述的方法,其特征在于,所述向服务器发送所述第一应用程序的鉴权请求信息包括:
    在所述第一应用程序请求接入所述第一电子设备时,获取所述第二电子设备上的所述第一电子设备的标识信息并向所述服务器发送所述第一应用程序的鉴权请求信息。
  12. 根据权利要求9至11中任一项所述的方法,其特征在于,所述鉴权请求信息还包括:所述第二电子设备的标识信息。
  13. 根据权利要求9至12中任一项所述的方法,其特征在于,所述接收第一电子设备的标识信息包括:
    通过近距离无线通信消息获取所述第一电子设备的标识信息。
  14. 根据权利要求9至13中任一项所述的方法,其特征在于,所述方法还包括:
    在所述第一应用程序接入所述第一电子设备时,存储所述第一电子设备的消息认证码地址。
  15. 一种接入电子设备的方法,所述方法应用于服务器,其特征在于,所述方法包括:
    接收第二电子设备发送的第一应用程序的鉴权请求信息,所述第一应用程序安装在所述第二电子设备中,为第三方应用程序,所述第一应用程序请求接入第一电子设备,所述鉴权请求信息包括所述第一电子设备的标识信息和所述第一应用程序的应用程序信息,所述第一电子设备的标识信息用于指示所述第一电子设备的型号;
    根据所述鉴权请求信息确定鉴权结果;
    向所述第二电子设备发送所述鉴权结果。
  16. 根据权利要求15所述的方法,其特征在于,所述鉴权请求信息还包括:所述第二电子设备的标识信息。
  17. 根据权利要求15所述的方法,其特征在于,所述服务器包括所述第一应用程序的接入权限信息,所述接入权限信息用于指示允许所述第一应用程序接入的电子设备的型号,所述根据所述鉴权请求信息确定鉴权结果包括:
    根据所述鉴权请求信息和所述接入权限信息确定所述鉴权结果。
  18. 根据权利要求15所述的方法,其特征在于,所述服务器包括所述第一应用程序的接入权限信息,所述接入权限信息用于指示允许所述第一应用程序接入的电子设备的型号和安装所述第一应用程序的电子设备的型号,所述根据所述鉴权请求信息确定鉴权结果包括:
    根据所述鉴权请求信息和所述接入权限信息确定所述鉴权结果。
  19. 根据权利要求17或18所述的方法,其特征在于,根据所述鉴权请求信息和所述接入权限信息确定所述鉴权结果包括:
    根据所述第一电子设备的标识信息确定所述第一电子设备的型号;
    根据所述第一电子设备的型号、所述第一应用程序的应用程序信息和所述接入权限信息确定所述鉴权结果。
  20. 一种电子设备,其特征在于,所述电子设备包括:
    一个或多个处理器;
    一个或多个存储器;
    所述一个或多个存储器中存储有一个或多个计算机程序,所述一个或多个计算机程序包括指令,当所述指令被所述一个或多个处理器执行时,使得所述电子设备执行如权利要求9至14中任一项所述的方法。
  21. 一种服务器,其特征在于,所述电子设备包括:
    一个或多个处理器;
    一个或多个存储器;
    所述一个或多个存储器中存储有一个或多个计算机程序,所述一个或多个计算机程序包括指令,当所述指令被所述一个或多个处理器执行时,使得所述服务器执行如权利要求15至19中任一项所述的方法。
  22. 一种计算机可读存储介质,其特征在于,包括计算机指令,
    当所述计算机指令在电子设备上运行时,使得所述电子设备执行如权利要求9至14中任一项所述的方法;或者,
    当所述计算机指令在服务器上运行时,使得所述服务器执行如权利要求15至19中任一项所述的方法。
PCT/CN2023/078029 2022-03-03 2023-02-24 一种接入电子设备的方法、系统以及装置 WO2023165414A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210202804.4A CN116738402A (zh) 2022-03-03 2022-03-03 一种接入电子设备的方法、系统以及装置
CN202210202804.4 2022-03-03

Publications (1)

Publication Number Publication Date
WO2023165414A1 true WO2023165414A1 (zh) 2023-09-07

Family

ID=87882943

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/078029 WO2023165414A1 (zh) 2022-03-03 2023-02-24 一种接入电子设备的方法、系统以及装置

Country Status (2)

Country Link
CN (1) CN116738402A (zh)
WO (1) WO2023165414A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080318564A1 (en) * 2007-06-19 2008-12-25 At&T Intellectual Property, Inc. Methods, apparatuses, and computer program products for implementing remote control processes
CN105553798A (zh) * 2016-01-29 2016-05-04 青岛海尔智能家电科技有限公司 验证设备的方法、设备与即时通讯app绑定方法及相关装置
CN105635174A (zh) * 2016-02-03 2016-06-01 武汉天梯极客网络科技有限公司 一种智能设备分享方法
CN108768970A (zh) * 2018-05-15 2018-11-06 腾讯科技(北京)有限公司 一种智能设备的绑定方法、身份认证平台及存储介质
CN111859359A (zh) * 2020-06-04 2020-10-30 青岛海信智慧家居系统股份有限公司 一种智能设备授权系统、方法、装置、设备及介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080318564A1 (en) * 2007-06-19 2008-12-25 At&T Intellectual Property, Inc. Methods, apparatuses, and computer program products for implementing remote control processes
CN105553798A (zh) * 2016-01-29 2016-05-04 青岛海尔智能家电科技有限公司 验证设备的方法、设备与即时通讯app绑定方法及相关装置
CN105635174A (zh) * 2016-02-03 2016-06-01 武汉天梯极客网络科技有限公司 一种智能设备分享方法
CN108768970A (zh) * 2018-05-15 2018-11-06 腾讯科技(北京)有限公司 一种智能设备的绑定方法、身份认证平台及存储介质
CN111859359A (zh) * 2020-06-04 2020-10-30 青岛海信智慧家居系统股份有限公司 一种智能设备授权系统、方法、装置、设备及介质

Also Published As

Publication number Publication date
CN116738402A (zh) 2023-09-12

Similar Documents

Publication Publication Date Title
WO2021129253A1 (zh) 显示多窗口的方法、电子设备和系统
WO2020238728A1 (zh) 智能终端的登录方法及电子设备
WO2022100304A1 (zh) 应用内容跨设备流转方法与装置、电子设备
KR20150082940A (ko) 화면의 회전을 컨트롤할 수 있는 전자 장치 및 방법
WO2021159746A1 (zh) 文件共享方法、系统及相关设备
WO2020150917A1 (zh) 一种应用权限的管理方法及电子设备
WO2022105445A1 (zh) 基于浏览器的应用投屏方法及相关装置
WO2021052204A1 (zh) 基于通讯录的设备发现方法、音视频通信方法及电子设备
WO2021093595A1 (zh) 验证用户身份的方法以及电子设备
WO2022089121A1 (zh) 处理推送消息的方法和装置
CN113553130A (zh) 应用执行绘制操作的方法及电子设备
WO2022083465A1 (zh) 电子设备的投屏方法及其介质和电子设备
WO2021104259A1 (zh) 一种快应用与原生应用间数据共享的方法及终端
WO2023051355A1 (zh) 权限检查的方法和电子设备
WO2022160991A1 (zh) 权限控制方法和电子设备
CN113986369B (zh) 物联网设备控制方法、系统、电子设备及存储介质
WO2022135157A1 (zh) 页面显示的方法、装置、电子设备以及可读存储介质
WO2023165414A1 (zh) 一种接入电子设备的方法、系统以及装置
WO2022057663A1 (zh) 一种生成文件的方法及电子设备
WO2023029916A1 (zh) 批注展示方法、装置、终端设备及可读存储介质
WO2022111469A1 (zh) 一种文件共享方法、装置及电子设备
CN113590346B (zh) 处理业务请求的方法和电子设备
CN116828100A (zh) 蓝牙音频播放方法、电子设备及存储介质
CN116939559A (zh) 蓝牙音频编码数据分发方法、电子设备及存储介质
CN112783418B (zh) 一种存储应用程序数据的方法及移动终端

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23762814

Country of ref document: EP

Kind code of ref document: A1