WO2023169545A1 - 离线设备控制方法及相关装置 - Google Patents
离线设备控制方法及相关装置 Download PDFInfo
- Publication number
- WO2023169545A1 WO2023169545A1 PCT/CN2023/080697 CN2023080697W WO2023169545A1 WO 2023169545 A1 WO2023169545 A1 WO 2023169545A1 CN 2023080697 W CN2023080697 W CN 2023080697W WO 2023169545 A1 WO2023169545 A1 WO 2023169545A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- electronic device
- message
- offline
- key
- instruction
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 139
- 230000006854 communication Effects 0.000 claims abstract description 150
- 238000004891 communication Methods 0.000 claims abstract description 149
- 230000004044 response Effects 0.000 claims abstract description 36
- 238000012790 confirmation Methods 0.000 claims description 105
- 230000006870 function Effects 0.000 claims description 49
- 230000008569 process Effects 0.000 claims description 41
- 230000015654 memory Effects 0.000 claims description 38
- 230000002093 peripheral effect Effects 0.000 description 121
- 238000005516 engineering process Methods 0.000 description 37
- 238000004422 calculation algorithm Methods 0.000 description 29
- 238000007726 management method Methods 0.000 description 21
- 238000012545 processing Methods 0.000 description 15
- 238000010295 mobile communication Methods 0.000 description 14
- 230000005540 biological transmission Effects 0.000 description 12
- 238000010586 diagram Methods 0.000 description 10
- 230000005236 sound signal Effects 0.000 description 10
- 238000005242 forging Methods 0.000 description 9
- 230000001960 triggered effect Effects 0.000 description 9
- 238000004590 computer program Methods 0.000 description 8
- 230000003287 optical effect Effects 0.000 description 5
- 229920001621 AMOLED Polymers 0.000 description 4
- 238000013528 artificial neural network Methods 0.000 description 4
- 210000004027 cell Anatomy 0.000 description 4
- 238000009795 derivation Methods 0.000 description 4
- 230000003993 interaction Effects 0.000 description 4
- 230000006855 networking Effects 0.000 description 4
- 230000001360 synchronised effect Effects 0.000 description 4
- 101100406385 Caenorhabditis elegans ola-1 gene Proteins 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 3
- 230000007774 longterm Effects 0.000 description 3
- 230000000007 visual effect Effects 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 210000000988 bone and bone Anatomy 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 230000005855 radiation Effects 0.000 description 2
- 238000009877 rendering Methods 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 210000000352 storage cell Anatomy 0.000 description 2
- 101100270992 Caenorhabditis elegans asna-1 gene Proteins 0.000 description 1
- 230000003321 amplification Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000003416 augmentation Effects 0.000 description 1
- 230000003190 augmentative effect Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000007175 bidirectional communication Effects 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 238000013529 biological neural network Methods 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000001149 cognitive effect Effects 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 230000003862 health status Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000001939 inductive effect Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 210000002569 neuron Anatomy 0.000 description 1
- 238000003199 nucleic acid amplification method Methods 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 239000002096 quantum dot Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000008093 supporting effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/50—Service provisioning or reconfiguring
Definitions
- the present application relates to the field of electronic technology, and in particular to offline equipment control methods and related devices.
- the lost device only when the lost device is online (for example, connected to the Internet), can it receive instructions from other devices logged into the same account; if the lost device remains offline (for example, disconnected from the Internet), the user cannot control the lost device to execute instructions. Especially for devices such as laptops that cannot connect to cellular networks, they may remain offline after the device is lost.
- This application provides offline device control methods and related devices, which can control offline devices to execute offline instructions to avoid data leakage and data loss, and protect user privacy and security.
- this application provides an offline device control method, which is applied to an offline device control system.
- the above system includes a second electronic device, a third electronic device and a server.
- the second electronic device is in an offline state; the above method includes: server Obtain the first message, the first message is used to instruct the second electronic device to execute the first instruction; the second electronic device broadcasts the first offline message through the near field communication module; the third electronic device obtains the first offline message; in response to the first offline message message, the third electronic device sends a second message to the server; after receiving the second message, the server sends a third message to the third electronic device, and the third message is used to instruct the second electronic device to execute the first instruction; the third electronic device The device sends a third message to the second electronic device; the second electronic device executes the first instruction based on the third message.
- the device when the device is offline, it can broadcast an offline message; after receiving the above-mentioned offline message, an online peripheral device near the offline device can report a message to the server to indicate that the peripheral device can assist the offline device and the server in transmitting messages.
- the server can send messages to offline devices through peripheral devices to control the offline devices to perform specific tasks, thus avoiding data loss and data leakage of lost offline devices and protecting user privacy.
- the above system further includes a first electronic device.
- the above method further includes: the first electronic device receives a first input operation from the user; in response to the first input operation, the first electronic device The device sends the first message to the server.
- the user can also use other electronic devices to trigger offline instructions for the offline device to control the offline device to perform specific tasks.
- the method before the first electronic device receives the user's first input operation, the method further includes: the first electronic device displays a first interface of the first application, the first interface includes a first function control, and the first Function controls for touch The first electronic device generates a first instruction for controlling the second electronic device; the above-mentioned first electronic device receives the user's first input operation, including: the first electronic device receives the user's first input operation for the first function control, The first input operation includes one or more operations.
- the user when the device is offline, the user can also use specific applications installed on other electronic devices (such as finding device applications) to send offline instructions for the offline device to the server to control the offline device to perform specific tasks, effectively improving the user experience. experience.
- the first interface further includes a first identification of the second electronic device, and the first identification is used to indicate that the second electronic device is currently offline.
- the second message is used to indicate that the third electronic device can assist the offline second electronic device in transmitting the message.
- the server can determine based on the message uploaded by the peripheral device of the offline device that an offline instruction can be sent to the offline device through the peripheral device, so as to realize offline control of the offline device.
- the second message is used to indicate the offline location of the second electronic device obtained by the third electronic device.
- the above-mentioned offline location can be the location of the device obtained by the positioning module of the peripheral device. Since the peripheral device is near the offline device, the location of the peripheral device can be regarded as the current offline location of the offline device.
- the above-mentioned offline position may also be the current position of the offline device obtained by the peripheral device using short-range positioning technology using the position of the own device as a reference position.
- the above method further includes: after the second electronic device executes the first instruction, sending a fourth message through the short-range communication module, the fourth message being used to indicate that the second electronic device has executed the first instruction; third The electronic device receives the fourth message; the third electronic device sends a fifth message to the server, the fifth message is used to indicate that the second electronic device has executed the first instruction; the server sends a sixth message to the first electronic device, the sixth message is used to Indicate that the second electronic device has executed the first instruction.
- the offline device after the offline device executes the offline command, it can feedback a confirmation message to the first electronic device that triggered the offline command, so that the first electronic device can know in a timely manner whether the control of the offline device has been successfully achieved.
- the above method further includes: in response to the first input operation, the first electronic device displays first prompt information, and the first prompt information is used to prompt the second electronic device that is instructing to go offline to execute the first instruction.
- the above method further includes: after receiving the sixth message, the first electronic device displays second prompt information based on the sixth message; the second prompt information is used to prompt the second electronic device that the first instruction has been executed.
- the first instruction is used to implement one or more of the following operations: data erasure, data encryption, data backup, screen lock, display of preset lock screen information, and play of preset audio.
- data erasure data encryption
- data backup data backup
- screen lock display of preset lock screen information
- play of preset audio play of preset audio.
- the first input operation includes a second input operation, a third input operation and a fourth input operation;
- the above-mentioned first electronic device receiving the user's first input operation includes: the first electronic device receiving an action on the first A second input operation of a function control; in response to the second input operation, the first electronic device displays a confirmation control and at least two file type options, and the at least two file type options include the first option; the first electronic device receives an action on the first A third input operation of an option; the first electronic device receives a fourth input operation acting on the confirmation control; the first instruction is used to implement one or more of data protection operations such as data erasure, data encryption, and data backup,
- the first directive also includes files against which data protection operations are directed Type, the file type targeted by the data protection operation includes the file type corresponding to the first option.
- the first instruction is used to implement one or more data protection operations such as data erasure, data encryption, and data backup.
- the second electronic device executes the first instruction based on the third message
- the above-mentioned The method also includes: the second electronic device displays third prompt information, and the third prompt information is used to prompt the second electronic device that the first instruction has been executed.
- prompt information can be displayed to remind the user that data erasure, data encryption or data backup has been performed, effectively improving user experience.
- the above-mentioned third electronic device sends a third message to the second electronic device, including: after receiving the third message, the third electronic device scans the second offline message broadcast by the second electronic device through The near field communication module sends a third message to the second electronic device.
- the peripheral device when the peripheral device is close to the offline device again, it can send a message corresponding to the offline command to the offline device; in this way, as long as there is an online peripheral device near the offline device, the offline device can be controlled to execute the offline command.
- the method before the first electronic device receives the user's first input operation, the method further includes: the first electronic device logs in to the first account of the first application; the second electronic device logs in to the first account of the first application; The first electronic device and the second electronic device establish a binding relationship based on the first account of the first application.
- the user can bind one or more other devices in advance through a specific application (such as a device search application) on the first electronic device. In this way, even when other devices are offline, the offline instruction can be triggered by the first electronic device to control the bound offline device.
- the first electronic device and the second electronic device hold a first key
- the first key is used for the first electronic device and the second electronic device to authenticate each other's identities
- the second electronic device and the server hold The second key is used for the second electronic device and the server to authenticate each other's identities
- the first electronic device and the server hold the third key
- the third key is used for the first electronic device and the server to authenticate each other's identities
- the first message includes a second ciphertext, and the second ciphertext is generated by the first electronic device using the first key and the third key to sequentially encrypt the first instruction
- the third message includes a third ciphertext
- the third ciphertext is The ciphertext is generated by the server after decrypting the second ciphertext using the third key and then encrypting it using the second key;
- the first instruction is that the second electronic device uses the second key and the first key to decrypt the third ciphertext.
- the fourth message and the fifth message include a fourth ciphertext of the confirmation message, the fourth ciphertext is generated by the second electronic device using the second key to encrypt the confirmation message, and the confirmation message is used to indicate The second electronic device has executed the first instruction; the sixth message includes a confirmation message, which is obtained by the server after decrypting the fourth ciphertext using the second key.
- specific keys are used to encrypt and transmit confirmation messages between devices to authenticate each other's identities. In this way, malicious devices can be prevented from forging and tampering with confirmation messages, and the security of offline device control can be ensured.
- the fourth message and the fifth message include a fourth ciphertext of the confirmation message, and the fourth ciphertext is generated by the second electronic device using the first key and the second key to sequentially encrypt the confirmation message.
- the confirmation message is used to indicate that the second electronic device has executed the first instruction;
- the sixth message includes the fifth ciphertext of the confirmation message, and the fifth ciphertext is the server using the second key to decrypt the fourth ciphertext, and then using the third ciphertext.
- Generated after three-key encryption; the above method also includes: after receiving the sixth message sent by the server, the first electronic device uses the third key and the first key to sequentially decrypt the fifth ciphertext to obtain the confirmation message.
- the first electronic device and the second electronic device before receiving the user's first input operation, establish In the binding relationship, the first key, the second key and the third key are generated during the binding process of the first electronic device and the second electronic device; the server stores the second device identification and the third key of the second electronic device. The first corresponding relationship between the two keys, and the second corresponding relationship between the first device identification of the first electronic device and the third key.
- the first electronic device, the second electronic device and the server can negotiate in advance the key to authenticate each other's identity, so as to facilitate subsequent offline instructions and/or Or confirm the message for encrypted transmission to ensure the security of offline device control.
- a fourth key is also generated during the binding process of the first electronic device and the second electronic device, and both the first electronic device and the second electronic device hold the fourth key; the first message also including the first indication information of the derived key of the fourth key and the second device identification of the second electronic device; after the server receives the first message, the server stores the second ciphertext, the first indication information and the third information based on the first message.
- the text generates the third ciphertext.
- the indication information of the derived key can be the derived key itself, or the Hash value of the derived key.
- the message transmission with the peripheral device may not carry the device information (such as device identification) of the offline device, but alludes to the offline device through the indication information of the derived key; in this way, It can prevent offline devices from being tracked, prevent malicious devices from using device information to forge and tamper with messages from offline devices, and ensure the security of offline control.
- device information such as device identification
- the above-mentioned server generates a third ciphertext based on the second ciphertext corresponding to the first indication information, including: determining the device identification of the target device corresponding to the first indication information as the second electronic device based on the third correspondence relationship.
- the second device identification determine the third key for authenticating the identity of the first electronic device based on the first correspondence, and determine the second key for authenticating the identity of the second electronic device based on the second correspondence;
- the server uses The third key decrypts the second ciphertext to obtain the decrypted first ciphertext; and then uses the second key to encrypt the first ciphertext to obtain the encrypted third ciphertext.
- the third message further includes first indication information of the derived key of the fourth key; after the third electronic device receives the third message, the method further includes: the third electronic device scans the second The second offline message broadcast by the electronic device, the second offline message includes the derived key of the fourth key; the above-mentioned third electronic device sends the third message to the second electronic device, including: if the fourth key in the second offline message If the indication information of the derived key matches the first indication information successfully, the third electronic device sends the third message to the second electronic device through the short-range communication module.
- the first electronic device and the second electronic device respectively generate the first key based on the preset algorithm
- the second electronic device and the server generate the first key based on the preset algorithm.
- the algorithm generates the second key respectively
- the first electronic device and the server respectively generate the third key based on the preset algorithm.
- the present application provides an offline device control method, applied to a server, which is characterized by including: the server obtains a first message, the first message is used to instruct the second electronic device to execute the first instruction; the server receives a third The second message sent by the electronic device.
- the second message is sent by the third electronic device after scanning the first offline message broadcast by the second electronic device through the short-range communication module.
- the first offline message is sent when the second electronic device is offline. Broadcast; after receiving the second message, the server sends a third message to the offline second electronic device via the third electronic device, where the third message is used to instruct the second electronic device to execute the first instruction.
- the device when the device is offline, it can broadcast an offline message; after receiving the above-mentioned offline message, an online peripheral device near the offline device can report a message to the server to indicate that the peripheral device can assist the offline device and the server in transmitting messages.
- the server can send messages to offline devices through peripheral devices to control the offline devices to perform specific tasks, thus avoiding data loss and data leakage of lost offline devices and protecting user privacy.
- the above-mentioned server obtaining the first message includes: the server receiving the first message sent by the first electronic device.
- the user when the device is offline, the user can also use other electronic devices to trigger offline instructions for the offline device to control the offline device to perform specific tasks.
- the second message is used to indicate that the third electronic device can assist the offline second electronic device in transmitting the message.
- the server can determine based on the message uploaded by the peripheral device of the offline device that an offline instruction can be sent to the offline device through the peripheral device, so as to realize offline control of the offline device.
- the second message is used to indicate the offline location of the second electronic device obtained by the third electronic device.
- the above-mentioned offline location can be the location of the device obtained by the positioning module of the peripheral device. Since the peripheral device is near the offline device, the location of the peripheral device can be regarded as the current offline location of the offline device.
- the above-mentioned offline position may also be the current position of the offline device obtained by the peripheral device using short-range positioning technology using the position of the own device as a reference position.
- the first instruction is used to implement one or more of the following operations: data erasure, data encryption, data backup, screen lock, display of preset lock screen information, and play of preset audio.
- data erasure data encryption
- data backup data backup
- screen lock display of preset lock screen information
- play of preset audio play of preset audio.
- the first instruction when the first instruction is used to implement one or more of data protection operations such as data erasure, data encryption, and data backup, the first instruction includes the file type targeted by the data protection operation.
- the server before the above-mentioned server obtains the first message, it further includes: the server receives a binding request from the first electronic device and/or the second electronic device, and the binding request is used to request a binding request for the first electronic device and the second electronic device.
- the electronic device establishes a binding relationship based on the first account of the first application, and both the first electronic device and the second electronic device are logged in to the first account.
- the user can bind one or more other devices in advance through a specific application (such as a device search application) on the first electronic device. In this way, even when other devices are offline, the offline instruction can be triggered by the first electronic device to control the bound offline device.
- the first electronic device and the second electronic device hold a first key
- the first key is used for the first electronic device and the second electronic device to authenticate each other's identities
- the second electronic device and the server hold The second key is used for the second electronic device and the server to authenticate each other's identities
- the first electronic device and the server hold the third key
- the third key is used for the first electronic device and the server to authenticate each other's identities
- the first message includes a second ciphertext, and the second ciphertext is generated by the first electronic device using the first key and the third key to sequentially encrypt the first instruction
- the third message includes a third ciphertext
- the third ciphertext is The ciphertext is generated by the server after decrypting the second ciphertext using the third key and then encrypting it using the second key; the first instruction is for the second electronic device to use the second key and the first key to decrypt the third ciphertext.
- the ciphertext is obtained after decryption.
- two devices use specific keys to encrypt and transmit offline instructions to authenticate each other's identities; in this way, malicious devices can be prevented from forging and tampering with offline instructions, and the security of offline device control can be ensured. sex.
- the above method further includes: the server receives a fifth message sent by the third electronic device, and the fifth message is sent by the third electronic device after receiving the fourth message sent by the second electronic device through the short-range communication module. , the fourth message and the fifth message are used to indicate that the second electronic device has executed the first instruction; the server sends a sixth message to the first electronic device, and the sixth message is used to indicate that the second electronic device has executed the first instruction.
- the offline device after the offline device executes the offline command, it can feedback a confirmation message to the first electronic device that triggered the offline command, so that the first electronic device can know in a timely manner whether the control of the offline device has been successfully achieved.
- the fourth message and the fifth message include a fourth ciphertext of the confirmation message, and the fourth ciphertext is the second electronic message.
- the sub-device uses the second key to encrypt the confirmation message, and the confirmation message is used to indicate that the second electronic device has executed the first instruction; the sixth message includes a confirmation message, and the confirmation message is the server using the second key to encrypt the fourth key. Obtained after decrypting the text.
- specific keys are used to encrypt and transmit confirmation messages between devices to authenticate each other's identities. In this way, malicious devices can be prevented from forging and tampering with confirmation messages, and the security of offline device control can be ensured.
- the fourth message and the fifth message include a fourth ciphertext of the confirmation message, and the fourth ciphertext is generated by the second electronic device using the first key and the second key to sequentially encrypt the confirmation message.
- the confirmation message is used to indicate that the second electronic device has executed the first instruction;
- the sixth message includes the fifth ciphertext of the confirmation message, and the fifth ciphertext is the server using the second key to decrypt the fourth ciphertext, and then using the third ciphertext.
- the confirmation message obtained by the first electronic device is obtained by the first electronic device using the third key and the first key to decrypt the fifth ciphertext.
- the first electronic device and the second electronic device before the server obtains the first message, the first electronic device and the second electronic device establish a binding relationship, and the first key, the second key and the third key are the first electronic device and the third key. Generated during the binding process of two electronic devices; the server stores the first correspondence between the device identification of the second electronic device and the second key, and the second correspondence between the device identification of the first electronic device and the third key. .
- the first electronic device, the second electronic device and the server can negotiate in advance the key to authenticate each other's identity, so as to facilitate subsequent offline instructions and/or Or confirm the message for encrypted transmission to ensure the security of offline device control.
- a fourth key is also generated during the binding process of the first electronic device and the second electronic device, and both the first electronic device and the second electronic device hold the fourth key; the first message also The first indication information including the derived key of the fourth key and the second device identification of the second electronic device; after the server obtains the first message, the server stores the second ciphertext, the first indication information and the third information based on the first message.
- the indication information of the derived key can be the derived key itself, or the Hash value of the derived key.
- the message transmission with the peripheral device may not carry the device information (such as device identification) of the offline device, but alludes to the offline device through the indication information of the derived key; in this way, It can prevent offline devices from being tracked, prevent malicious devices from using device information to forge and tamper with messages from offline devices, and ensure the security of offline control.
- device information such as device identification
- the above-mentioned server generates a third ciphertext based on the second ciphertext corresponding to the first indication information, including: determining the device identification of the target device corresponding to the first indication information as the second electronic device based on the third correspondence relationship.
- the second device identification determine the third key for authenticating the identity of the first electronic device based on the first correspondence, and determine the second key for authenticating the identity of the second electronic device based on the second correspondence;
- the server uses The third key decrypts the second ciphertext to obtain the decrypted first ciphertext; and then uses the second key to encrypt the first ciphertext to obtain the encrypted third ciphertext.
- the present application provides an offline device control method, which is applied to a second electronic device in an offline state. It is characterized in that the above method includes: when the second electronic device is in an offline state, broadcasting the second electronic device through a short-range communication module. An offline message; the second electronic device receives a third message sent by the server via a nearby online third electronic device; the third message is sent by the server after obtaining the first message and the second message of the third electronic device, and the second message is The third electronic device sends the first offline message after receiving the first offline message, and the first message and the third message are used to instruct the second electronic device to execute the first instruction; The two electronic devices execute the first instruction based on the third message.
- the device when the device is offline, it can broadcast an offline message; after receiving the above-mentioned offline message, an online peripheral device near the offline device can report a message to the server to indicate that the peripheral device can assist the offline device and the server in transmitting messages.
- the server can send messages to offline devices through peripheral devices to control the offline devices to perform specific tasks, thus avoiding data loss and data leakage of lost offline devices and protecting user privacy.
- the first message is sent by the first electronic device to the server.
- the user when the device is offline, the user can also use other electronic devices to trigger offline instructions for the offline device to control the offline device to perform specific tasks.
- the second message is used to indicate that the third electronic device can assist the offline second electronic device in transmitting the message.
- the server can determine based on the message uploaded by the peripheral device of the offline device that an offline instruction can be sent to the offline device through the peripheral device, so as to realize offline control of the offline device.
- the second message is used to indicate the offline location of the second electronic device obtained by the third electronic device.
- the above method further includes: after the second electronic device executes the first instruction, sending a seventh message to the server via the third electronic device, where the seventh message is used to indicate that the second electronic device has executed the first instruction.
- the offline device after the offline device executes the offline command, it can feedback a confirmation message to the first electronic device that triggered the offline command, so that the first electronic device can know in a timely manner whether the control of the offline device has been successfully achieved.
- the first instruction is used to implement one or more of the following operations: data erasure, data encryption, data backup, screen lock, display of preset lock screen information, and play of preset audio.
- data erasure data encryption
- data backup data backup
- screen lock display of preset lock screen information
- play of preset audio play of preset audio.
- the first instruction when the first instruction is used to implement one or more of data protection operations such as data erasure, data encryption, and data backup, the first instruction includes the file type targeted by the data protection operation.
- the first instruction is used to implement one or more data protection operations such as data erasure, data encryption, and data backup.
- the second electronic device executes the first instruction based on the third message, the above-mentioned The method also includes: the second electronic device displays third prompt information, and the third prompt information is used to prompt the second electronic device that the first instruction has been executed.
- the method before broadcasting the first offline message through the near field communication module, the method further includes: the second electronic device logs in to the first account of the first application; the second electronic device and the first electronic device are based on the first application's first account.
- the first account establishes a binding relationship.
- the user can bind one or more other devices in advance through a specific application (such as a device search application) on the first electronic device. In this way, even when other devices are offline, the offline instruction can be triggered by the first electronic device to control the bound offline device.
- the first electronic device and the second electronic device hold a first key
- the first key is used for the first electronic device and the second electronic device to authenticate each other's identities
- the second electronic device and the server hold The second key is used for the second electronic device and the server to authenticate each other's identities
- the first electronic device and the server hold the third key
- the third key is used for the first electronic device and the server to authenticate each other's identities
- the first message includes a second ciphertext, and the second ciphertext is generated by the first electronic device using the first key and the third key to sequentially encrypt the first instruction
- the third message includes a third ciphertext
- the third ciphertext is The ciphertext is generated by the server after decrypting the second ciphertext using the third key and then encrypting it using the second key; the first instruction is for the second electronic device to use the second key and the first key to decrypt the third ciphertext.
- the seventh message includes a fourth ciphertext of the confirmation message; the fourth ciphertext is encrypted and generated by the second electronic device using the second key, or the fourth ciphertext is generated by the second electronic device using the second key.
- the second key is generated by encryption with the first key.
- the second key is used by the server to verify that the ciphertext of the confirmation message comes from the second electronic device.
- the first key is used by the first electronic device to verify that the ciphertext of the confirmation message comes from the second electronic device.
- Electronic equipment When implementing the embodiments of this application, during the offline device control process, specific keys are used to encrypt and transmit confirmation messages between devices to authenticate each other's identities. In this way, malicious devices can be prevented from forging and tampering with confirmation messages, and the security of offline device control can be ensured.
- the first electronic device and the second electronic device before broadcasting the first offline message through the near field communication module, the first electronic device and the second electronic device establish a binding relationship, and the first key, the second key and the third key It is generated during the binding process of the first electronic device and the second electronic device.
- the first electronic device, the second electronic device and the server can negotiate in advance the key to authenticate each other's identity, so as to facilitate subsequent offline instructions and/or Or confirm the message for encrypted transmission to ensure the security of offline device control.
- the present application provides an electronic device, including one or more processors and one or more memories.
- the one or more memories are coupled to one or more processors.
- the one or more memories are used to store computer program codes.
- the computer program codes include computer instructions.
- the electronic device causes the electronic device to execute The offline device control method in any possible implementation of the first aspect, the second aspect or the third aspect.
- embodiments of the present application provide a computer storage medium, including computer instructions.
- the computer instructions When the computer instructions are run on an electronic device, it is possible for the electronic device to execute any one of the first aspect, the second aspect or the third aspect. Offline device control method in the implementation.
- embodiments of the present application provide a computer program product.
- the computer program product When the computer program product is run on a computer, it causes the computer to execute any of the possible implementations of the first aspect, the second aspect, or the third aspect. Offline device control methods.
- Figure 1 is a schematic system architecture diagram of a communication system provided by an embodiment of the present application.
- Figure 2 is a schematic structural diagram of an electronic device provided by an embodiment of the present application.
- Figure 3 is a schematic structural diagram of a cloud server provided by an embodiment of the present application.
- Figures 4A to 4D are relevant user interfaces of the search device APP provided by the embodiment of the present application.
- Figures 5A to 5H are user interfaces related to searching for pairing and binding of devices provided by embodiments of the present application.
- Figures 6A to 6E are relevant user interfaces for controlling offline devices provided by embodiments of the present application.
- Figures 7A to 7L are relevant user interfaces for controlling offline devices provided by embodiments of the present application.
- Figure 8A is a schematic flowchart of an offline device control method provided by an embodiment of the present application.
- Figure 8B is a schematic flowchart of an offline device control method provided by an embodiment of the present application.
- Figure 8C is a schematic diagram of information transmission provided by an embodiment of the present application.
- Figure 9A is a schematic diagram of the software structure of the electronic device provided by the embodiment of the present application.
- FIG. 9B is a schematic system architecture diagram of an offline device control system provided by an embodiment of the present application.
- first and second are used for descriptive purposes only and shall not be understood as implying or implying relative importance or implicitly specifying the quantity of indicated technical features. Therefore, the features defined as “first” and “second” may explicitly or implicitly include one or more of the features. In the description of the embodiments of this application, unless otherwise specified, “plurality” The meaning is two or more.
- GUI graphical user interface
- Figure 1 exemplarily shows a schematic diagram of a communication system 10 provided in an embodiment of the present application.
- the communication system 10 includes an electronic device 100 , one or more electronic devices (for example, an electronic device 200 ) that establishes a binding relationship with the electronic device 100 , and one or more online devices near the electronic device 200 .
- peripheral devices such as peripheral device 300
- cloud devices such as cloud server 400).
- the electronic device 100, the electronic device 200 and the peripheral device 300 may be a mobile phone, a tablet computer, a desktop computer, a laptop computer, a handheld computer, a notebook computer, an ultra-mobile personal computer (UMPC), a netbook, or It can be a cellular phone, personal digital assistant (PDA), augmented reality (AR) device, virtual reality (VR) device, artificial intelligence (AI) device, wearable device (smart bracelets), vehicle-mounted devices, smart home devices (smart TVs, smart screens, large-screen devices, etc.) and/or smart city devices.
- PDA personal digital assistant
- AR augmented reality
- VR virtual reality
- AI artificial intelligence
- wearable device smart bracelets
- vehicle-mounted devices smart home devices (smart TVs, smart screens, large-screen devices, etc.) and/or smart city devices.
- the electronic device 200 may also be a digital device without a display screen, such as a speaker or a Bluetooth headset.
- the embodiment of the present application does not place any special restrictions on the specific types of the electronic device 100, the electronic device 200, and the peripheral device 300.
- the electronic device 100 and the electronic device 200 may be equipped with the same operating system, or may be equipped with different operating systems, such as iOS, Android, Microsoft, Hongmeng and other operating systems.
- the cloud server 400 may be a server, a server cluster composed of multiple servers, or a cloud computing center.
- the electronic device 100, the electronic device 200 and the peripheral device 300 can communicate with the cloud server 400 through one or more communication networks 500.
- the communication network 500 may be a local area network (LAN) or a wide area network (WAN), such as the Internet.
- the communication network 500 can be implemented using any known network communication protocol, which can be various wired or wireless communication protocols, such as Ethernet, universal serial bus (USB), FireWire (FIREWIRE) , global system for mobile communications (GSM), general packet radio service (GPRS), code division multiple access (CDMA), wideband code division multiple access (wideband code division multiple access (WCDMA), time-division code division multiple access (TD-SCDMA), long term evolution (LTE), Bluetooth (bluetooth, BT), wireless fidelity (wireless fidelity) , Wi-Fi), near field communication (NFC), voice over Internet protocol, VoIP), ultra wide band (UWB), ZigBee communication, communication protocols supporting network slicing architecture, or any other suitable communication protocol.
- USB universal serial bus
- the electronic device online refers to: the electronic device is connected to the communication network 500 (ie, local area network and/or wide area network) and can communicate with the cloud server 400 through the communication network 500; the electronic device offline refers to: the electronic device is not connected to the above-mentioned communication network 500.
- the communication network 500 cannot communicate with the cloud server 400.
- the electronic device online refers to: the electronic device is connected to the communication network 500, can communicate with the cloud server 400 through the communication network 500, and the electronic device is connected to a SIM card.
- the electronic device is offline means: the electronic device is not connected to the above communication network 500, and/or the electronic device is not connected to the SIM card.
- the above-mentioned SIM card can be a physical SIM card, and the electronic device has a SIM card interface, and the physical SIM card can be connected through the above-mentioned SIM card interface; or the above-mentioned SIM card can also be a virtual SIM card, and the electronic device can be connected to the virtual SIM card. , that is, access the operator's network.
- the electronic device 100 is configured with a display screen, and after being bound to the electronic device 200, it can provide the electronic device 200 with related functions of searching for the device.
- the user can also send offline instructions to the cloud server 400 through the electronic device 100; the offline instructions are used to control the offline electronic device 200 to implement related functions of finding the device, such as performing data erasure, data encryption, data backup, Screen lock or play sound etc.
- the electronic device 200 can also provide the electronic device 100 with the related function of searching for the device.
- the electronic device 100 and the electronic device 200 are equipped with end-side search network services.
- the end-side search network services are used to provide offline control-related services, such as the sending, encryption and decryption of offline instructions; the electronic device 100 and the electronic device Finding the binding relationship between 200 devices can also be called searching for the binding relationship of the network.
- the electronic device 100 and the electronic device 200 can establish a binding relationship to find the device through short-range communication technology, or they can establish a binding relationship to find the device by logging in to the same account.
- the electronic device 100 and the The manner in which the electronic device 200 establishes the binding relationship of the search device is not specifically limited.
- the above-mentioned short-range communication technology can be Bluetooth communication technology, or it can also be NFC technology, UWB communication technology, ZigBee communication technology, etc., and is not specifically limited in comparison with the embodiments of this application.
- the electronic device 200 may be configured with a display screen, or may not be configured with a display screen.
- the electronic device 200 determines that the device is offline, it can send an offline broadcast through a specific short-range communication technology (such as low-power Bluetooth (Bluetooth Low Energy, BLE) communication technology).
- BLE communication technology is a personal area network technology. Compared with traditional Bluetooth communication technology, BLE communication technology aims to significantly reduce power consumption and cost while maintaining the same communication range.
- the peripheral device 300 is equipped with a terminal-side search network service and can monitor offline broadcasts sent through a specific short-range communication technology (such as BLE communication technology). After monitoring the offline broadcast of the electronic device 200, the online peripheral device 300 can send an assistance instruction message for the electronic device 200 to the cloud server 400.
- a specific short-range communication technology such as BLE communication technology
- the short-range communication technology such as Wi-Fi communication technology
- Wi-Fi communication technology used to pair and bind the electronic device 100 and the electronic device 200
- Wi-Fi communication technology used to send and receive data between the peripheral device 300 and the electronic device 200
- BLE communication technology BLE communication technology
- the cloud server 400 may store offline instructions sent by the electronic device 100 .
- the offline instruction of the electronic device 100 can be forwarded to the offline electronic device 200 through the online peripheral device 300 to control the offline electronic device 200 to execute the above offline instruction (such as data erasure or data erasure). encryption, etc.) to ensure the data security of the lost electronic device 200.
- the electronic device 200 can also be controlled to execute the offline instructions of the electronic device 100 to avoid data leakage and data loss and protect user privacy and security.
- the electronic device 100, the electronic device 200, the peripheral device 300 and the cloud server 400 can be deployed on land, including indoors, outdoors, handheld or vehicle-mounted, can also be deployed on water, and can also be deployed on aircraft and artificial satellites in the air.
- the application examples do not limit this.
- FIG. 1 is only a schematic system structure diagram of the communication system provided by the embodiment of the present application, and does not constitute a specific limitation on the communication system 10.
- the communication system 10 may include more or less devices than shown in the figure, for example, It may include wireless relay equipment and wireless backhaul equipment (not shown in Figure 1), which is not limited here.
- FIG. 2 shows a schematic structural diagram of the electronic device 100.
- the electronic device 100 may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2 , mobile communication module 150, wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, headphone interface 170D, sensor module 180, button 190, motor 191, indicator 192, camera 193, display screen 194, and Subscriber identification module (SIM) card interface 195, etc.
- SIM Subscriber identification module
- the sensor module 180 may include a pressure sensor 180A, a gyro sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, and ambient light. Sensor 180L, bone conduction sensor 180M, etc.
- the structure illustrated in the embodiment of the present invention does not constitute a specific limitation on the electronic device 100 .
- the electronic device 100 may include more or fewer components than shown in the figures, or some components may be combined, some components may be separated, or some components may be arranged differently.
- the components illustrated may be implemented in hardware, software, or a combination of software and hardware.
- the processor 110 may include one or more processing units.
- the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processing unit (GPU), and an image signal processor. (image signal processor, ISP), controller, video codec, digital signal processor (digital signal processor, DSP), baseband processor, and/or neural network processor (neural-network processing unit, NPU), etc.
- application processor application processor, AP
- modem processor graphics processing unit
- GPU graphics processing unit
- image signal processor image signal processor
- ISP image signal processor
- controller video codec
- digital signal processor digital signal processor
- DSP digital signal processor
- baseband processor baseband processor
- neural network processor neural-network processing unit
- the controller can generate operation control signals based on the instruction operation code and timing signals to complete the control of fetching and executing instructions.
- the processor 110 may also be provided with a memory for storing instructions and data.
- the memory in processor 110 is cache memory. This memory may hold instructions or data that have been recently used or recycled by processor 110 . If the processor 110 needs to use the instructions or data again, it can be called directly from the memory. Repeated access is avoided and the waiting time of the processor 110 is reduced, thus improving the efficiency of the system.
- processor 110 may include one or more interfaces.
- Interfaces may include integrated circuit (inter-integrated circuit, I2C) interface, integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, pulse code modulation (pulse code modulation, PCM) interface, universal asynchronous receiver and transmitter (universal asynchronous receiver/transmitter (UART) interface, mobile industry processor interface (MIPI), general-purpose input/output (GPIO) interface, subscriber identity module (SIM) interface, and /or universal serial bus (USB) interface, etc.
- I2C integrated circuit
- I2S integrated circuit built-in audio
- PCM pulse code modulation
- UART universal asynchronous receiver and transmitter
- MIPI mobile industry processor interface
- GPIO general-purpose input/output
- SIM subscriber identity module
- USB universal serial bus
- the I2C interface is a bidirectional synchronous serial bus, including a serial data line (SDA) and a serial clock line (derail clock line, SCL).
- processor 110 may include multiple sets of I2C buses.
- the processor 110 can couple the touch sensor 180K, charger, flash, and camera respectively through different I2C bus interfaces. 193 etc.
- the processor 110 can be coupled to the touch sensor 180K through an I2C interface, so that the processor 110 and the touch sensor 180K communicate through the I2C bus interface to implement the touch function of the electronic device 100 .
- the I2S interface can be used for audio communication.
- processor 110 may include multiple sets of I2S buses.
- the processor 110 can be coupled with the audio module 170 through the I2S bus to implement communication between the processor 110 and the audio module 170 .
- the audio module 170 can transmit audio signals to the wireless communication module 160 through the I2S interface to implement the function of answering calls through a Bluetooth headset.
- the PCM interface can also be used for audio communications to sample, quantize and encode analog signals.
- the audio module 170 and the wireless communication module 160 may be coupled through a PCM bus interface.
- the audio module 170 can also transmit audio signals to the wireless communication module 160 through the PCM interface to implement the function of answering calls through a Bluetooth headset. Both the I2S interface and the PCM interface can be used for audio communication.
- the UART interface is a universal serial data bus used for asynchronous communication.
- the bus can be a bidirectional communication bus. It converts the data to be transmitted between serial communication and parallel communication.
- a UART interface is generally used to connect the processor 110 and the wireless communication module 160 .
- the processor 110 communicates with the Bluetooth module in the wireless communication module 160 through the UART interface to implement the Bluetooth function.
- the audio module 170 can transmit audio signals to the wireless communication module 160 through the UART interface to implement the function of playing music through a Bluetooth headset.
- the MIPI interface can be used to connect the processor 110 with peripheral devices such as the display screen 194 and the camera 193 .
- MIPI interfaces include camera serial interface (CSI), display serial interface (DSI), etc.
- the processor 110 and the camera 193 communicate through the CSI interface to implement the shooting function of the electronic device 100 .
- the processor 110 and the display screen 194 communicate through the DSI interface to implement the display function of the electronic device 100 .
- the GPIO interface can be configured through software.
- the GPIO interface can be configured as a control signal or as a data signal.
- the GPIO interface can be used to connect the processor 110 with the camera 193, display screen 194, wireless communication module 160, audio module 170, sensor module 180, etc.
- the GPIO interface can also be configured as an I2C interface, I2S interface, UART interface, MIPI interface, etc.
- the USB interface 130 is an interface that complies with the USB standard specification, and may be a Mini USB interface, a Micro USB interface, a USB Type C interface, etc.
- the USB interface 130 can be used to connect a charger to charge the electronic device 100, and can also be used to transmit data between the electronic device 100 and peripheral devices. It can also be used to connect headphones to play audio through them. This interface can also be used to connect other electronic devices, such as AR devices, etc.
- the interface connection relationships between the modules illustrated in the embodiment of the present invention are only schematic illustrations and do not constitute a structural limitation of the electronic device 100 .
- the electronic device 100 may also adopt different interface connection methods in the above embodiments, or a combination of multiple interface connection methods.
- the charging management module 140 is used to receive charging input from the charger.
- the charger can be a wireless charger or a wired charger.
- the charging management module 140 may receive charging input from the wired charger through the USB interface 130 .
- the charging management module 140 may receive wireless charging input through the wireless charging coil of the electronic device 100 . While the charging management module 140 charges the battery 142, it can also provide power to the electronic device through the power management module 141.
- the power management module 141 is used to connect the battery 142, the charging management module 140 and the processor 110.
- the power management module 141 receives input from the battery 142 and/or the charging management module 140, and supplies power to the processor 110, the internal memory 121, the display screen 194, the camera 193, the wireless communication module 160, and the like.
- the power management module 141 can also be used to monitor battery capacity, battery cycle times, battery health status (leakage, impedance) and other parameters.
- the power management module 141 may also be provided in the processor 110 .
- the power management module 141 and the charging management module 140 also Can be set in the same device.
- the wireless communication function of the electronic device 100 can be implemented through the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, the modem processor and the baseband processor.
- Antenna 1 and Antenna 2 are used to transmit and receive electromagnetic wave signals.
- Each antenna in electronic device 100 may be used to cover a single or multiple communication frequency bands. Different antennas can also be reused to improve antenna utilization. For example: Antenna 1 can be reused as a diversity antenna for a wireless LAN. In other embodiments, antennas may be used in conjunction with tuning switches.
- the mobile communication module 150 can provide solutions for wireless communication including 2G/3G/4G/5G applied on the electronic device 100 .
- the mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (LNA), etc.
- the mobile communication module 150 can receive electromagnetic waves through the antenna 1, perform filtering, amplification and other processing on the received electromagnetic waves, and transmit them to the modem processor for demodulation.
- the mobile communication module 150 can also amplify the signal modulated by the modem processor and convert it into electromagnetic waves through the antenna 1 for radiation.
- at least part of the functional modules of the mobile communication module 150 may be disposed in the processor 110 .
- at least part of the functional modules of the mobile communication module 150 and at least part of the modules of the processor 110 may be provided in the same device.
- a modem processor may include a modulator and a demodulator.
- the modulator is used to modulate the low-frequency baseband signal to be sent into a medium-high frequency signal.
- the demodulator is used to demodulate the received electromagnetic wave signal into a low-frequency baseband signal.
- the demodulator then transmits the demodulated low-frequency baseband signal to the baseband processor for processing.
- the application processor outputs sound signals through audio devices (not limited to speaker 170A, receiver 170B, etc.), or displays images or videos through display screen 194.
- the modem processor may be a stand-alone device.
- the modem processor may be independent of the processor 110 and may be provided in the same device as the mobile communication module 150 or other functional modules.
- the wireless communication module 160 can provide applications on the electronic device 100 including wireless local area networks (WLAN) (such as wireless fidelity (Wi-Fi) network), Bluetooth (bluetooth, BT), and global navigation satellites.
- WLAN wireless local area networks
- System global navigation satellite system, GNSS
- frequency modulation frequency modulation, FM
- near field communication technology near field communication, NFC
- infrared technology infrared, IR
- the wireless communication module 160 may be one or more devices integrating at least one communication processing module.
- the wireless communication module 160 receives electromagnetic waves via the antenna 2 , demodulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 110 .
- the wireless communication module 160 can also receive the signal to be sent from the processor 110, frequency modulate it, amplify it, and convert it into electromagnetic waves through the antenna 2 for radiation.
- the antenna 1 of the electronic device 100 is coupled to the mobile communication module 150, and the antenna 2 is coupled to the wireless communication module 160, so that the electronic device 100 can communicate with the network and other devices through wireless communication technology.
- the wireless communication technology may include global system for mobile communications (GSM), general packet radio service (GPRS), code division multiple access (CDMA), broadband Code division multiple access (wideband code division multiple access, WCDMA), time division code division multiple access (time-division code division multiple access, TD-SCDMA), long term evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC , FM, and/or IR technology, etc.
- the GNSS may include global positioning system (GPS), global navigation satellite system (GLONASS), Beidou navigation satellite system (BDS), quasi-zenith satellite system (quasi) -zenith satellite system (QZSS) and/or satellite based augmentation systems (SBAS).
- GPS global positioning system
- GLONASS global navigation satellite system
- BDS Beidou navigation satellite system
- QZSS quasi-zenith satellite system
- SBAS satellite based augmentation systems
- the electronic device 100 implements display functions through a GPU, a display screen 194, an application processor, and the like.
- GPU is the graphics processing unit
- the processing microprocessor is connected to the display screen 194 and the application processor.
- GPUs are used to perform mathematical and geometric calculations for graphics rendering.
- Processor 110 may include one or more GPUs that execute program instructions to generate or alter display information.
- the display screen 194 is used to display images, videos, etc.
- Display 194 includes a display panel.
- the display panel can use a liquid crystal display (LCD), an organic light-emitting diode (OLED), an active matrix organic light emitting diode or an active matrix organic light emitting diode (active-matrix organic light emitting diode).
- LCD liquid crystal display
- OLED organic light-emitting diode
- AMOLED organic light-emitting diode
- FLED flexible light-emitting diode
- Miniled MicroLed, Micro-oLed, quantum dot light emitting diode (QLED), etc.
- the electronic device 100 may include 1 or N display screens 194, where N is a positive integer greater than 1.
- the electronic device 100 can implement the shooting function through an ISP, a camera 193, a video codec, a GPU, a display screen 194, an application processor, and the like.
- the ISP is used to process the data fed back by the camera 193. For example, when taking a photo, the shutter is opened, the light is transmitted to the camera sensor through the lens, the optical signal is converted into an electrical signal, and the camera sensor passes the electrical signal to the ISP for processing, and converts it into an image visible to the naked eye. ISP can also perform algorithm optimization on image noise and brightness. ISP can also optimize the exposure, color temperature and other parameters of the shooting scene. In some embodiments, the ISP may be provided in the camera 193.
- Camera 193 is used to capture still images or video.
- the object passes through the lens to produce an optical image that is projected onto the photosensitive element.
- the photosensitive element can be a charge coupled device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor.
- CMOS complementary metal-oxide-semiconductor
- the photosensitive element converts the optical signal into an electrical signal, and then passes the electrical signal to the ISP to convert it into a digital image signal.
- ISP outputs digital image signals to DSP for processing.
- DSP converts digital image signals into standard RGB, YUV and other format image signals.
- the electronic device 100 may include 1 or N cameras 193, where N is a positive integer greater than 1.
- Digital signal processors are used to process digital signals. In addition to digital image signals, they can also process other digital signals. For example, when the electronic device 100 selects a frequency point, the digital signal processor is used to perform Fourier transform on the frequency point energy.
- Video codecs are used to compress or decompress digital video.
- Electronic device 100 may support one or more video codecs. In this way, the electronic device 100 can play or record videos in multiple encoding formats, such as moving picture experts group (MPEG) 1, MPEG2, MPEG3, MPEG4, etc.
- MPEG moving picture experts group
- MPEG2 MPEG2, MPEG3, MPEG4, etc.
- NPU is a neural network (NN) computing processor.
- NN neural network
- Intelligent cognitive applications of the electronic device 100 can be implemented through the NPU, such as image recognition, face recognition, speech recognition, text understanding, etc.
- the internal memory 121 may include one or more random access memories (RAM) and one or more non-volatile memories (NVM).
- RAM random access memories
- NVM non-volatile memories
- Random access memory can include static random-access memory (SRAM), dynamic random-access memory (DRAM), synchronous dynamic random-access memory (SDRAM), double data rate synchronous Dynamic random access memory (double data rate synchronous dynamic random access memory, DDR SDRAM, for example, the fifth generation DDR SDRAM is generally called DDR5SDRAM), etc.; non-volatile memory can include disk storage devices and flash memory (flash memory).
- SRAM static random-access memory
- DRAM dynamic random-access memory
- SDRAM synchronous dynamic random-access memory
- DDR SDRAM double data rate synchronous Dynamic random access memory
- non-volatile memory can include disk storage devices and flash memory (flash memory).
- Flash memory can be divided according to the operating principle to include NOR FLASH, NAND FLASH, 3D NAND FLASH, etc.
- the storage unit potential level it can include single-level storage cells (single-level cell, SLC), multi-level storage cells (multi-level cell (MLC), triple-level cell (TLC), quad-level cell, QLC), etc.
- SLC single-level storage cells
- MLC multi-level storage cells
- TLC triple-level cell
- QLC quad-level cell
- universal flash storage English: universal flash storage, UFS
- embedded multi media card embedded multi media Card, eMMC
- the random access memory can be directly read and written by the processor 110, can be used to store executable programs (such as machine instructions) of the operating system or other running programs, and can also be used to store user and application data, etc.
- the non-volatile memory can also store executable programs and user and application program data, etc., and can be loaded into the random access memory in advance for direct reading and writing by the processor 110.
- the external memory interface 120 can be used to connect an external non-volatile memory to expand the storage capacity of the electronic device 100 .
- the external non-volatile memory communicates with the processor 110 through the external memory interface 120 to implement the data storage function. For example, save music, video and other files in external non-volatile memory.
- the electronic device 100 can implement audio functions through the audio module 170, the speaker 170A, the receiver 170B, the microphone 170C, the headphone interface 170D, and the application processor. Such as music playback, recording, etc.
- the audio module 170 is used to convert digital audio information into analog audio signal output, and is also used to convert analog audio input into digital audio signals. Audio module 170 may also be used to encode and decode audio signals. In some embodiments, the audio module 170 may be provided in the processor 110 , or some functional modules of the audio module 170 may be provided in the processor 110 .
- Speaker 170A also called “speaker” is used to convert audio electrical signals into sound signals.
- Receiver 170B also called “earpiece” is used to convert audio electrical signals into sound signals.
- Microphone 170C also called “microphone” or “microphone”, is used to convert sound signals into electrical signals.
- the headphone interface 170D is used to connect wired headphones.
- the pressure sensor 180A is used to sense pressure signals and can convert the pressure signals into electrical signals.
- pressure sensor 180A may be disposed on display screen 194 .
- the gyro sensor 180B may be used to determine the motion posture of the electronic device 100 .
- the angular velocity of electronic device 100 about three axes ie, x, y, and z axes
- Air pressure sensor 180C is used to measure air pressure.
- Magnetic sensor 180D includes a Hall sensor.
- the acceleration sensor 180E can detect the acceleration of the electronic device 100 in various directions (generally three axes). When the electronic device 100 is stationary, the magnitude and direction of gravity can be detected. It can also be used to identify the posture of electronic devices.
- Distance sensor 180F for measuring distance.
- Electronic device 100 can measure distance via infrared or laser.
- Proximity light sensor 180G may include, for example, a light emitting diode (LED) and a light detector, such as a photodiode.
- LED light emitting diode
- a light detector such as a photodiode
- the ambient light sensor 180L is used to sense ambient light brightness.
- the electronic device 100 can adaptively adjust the brightness of the display screen 194 according to the perceived ambient light brightness.
- Fingerprint sensor 180H is used to collect fingerprints.
- Temperature sensor 180J is used to detect temperature. In some embodiments, the electronic device 100 utilizes the temperature detected by the temperature sensor 180J to execute the temperature processing strategy.
- Touch sensor 180K also known as "touch device”.
- the touch sensor 180K can be disposed on the display screen 194.
- the touch sensor 180K and the display screen 194 form a touch screen, which is also called a "touch screen”.
- the touch sensor 180K is used to detect a touch operation on or near the touch sensor 180K.
- the touch sensor can pass the detected touch operation to the application processor to determine the touch event type.
- Visual output related to the touch operation may be provided through display screen 194 .
- the touch sensor 180K may also be disposed on the surface of the electronic device 100 at a location different from that of the display screen 194 .
- Bone conduction sensor 180M can acquire vibration signals.
- the buttons 190 include a power button, a volume button, etc.
- Key 190 may be a mechanical key. It can also be a touch button.
- the electronic device 100 may receive key inputs and generate key signal inputs related to user settings and function control of the electronic device 100 .
- Figure 3 schematically shows the structure of a cloud server 400 provided by an embodiment of the present application.
- the cloud server 400 may include: one or more server processors 201, memory 202, communication interface 203, receiver 205, transmitter 206, coupler 207, antenna 208, and server interface 209. These components can be connected through the bus 204 or other ways.
- Figure 3 takes the connection through the bus as an example. in:
- the communication interface 203 can be used for the cloud server 400 to communicate with other communication devices, such as terminal devices.
- the terminal device may be the electronic device 100 shown in FIG. 3 .
- the communication interface 203 may be a 5G communication interface or a future new air interface communication interface.
- the cloud server 400 can also be configured with a wired communication interface 203, such as a local access network (local access network, LAN) interface.
- the transmitter 206 may be used to transmit the signal output by the server processor 201.
- the receiver 205 may be used to receive and process mobile communication signals received by the antenna 208.
- transmitter 206 and receiver 205 may be viewed as a wireless modem.
- the number of the transmitter 206 and the receiver 205 may be one or more.
- Antenna 208 may be used to convert electromagnetic energy in the transmission line into electromagnetic waves in free space, or to convert electromagnetic waves in free space into electromagnetic energy in the transmission line.
- the coupler 207 is used to divide the mobile communication signals received by the antenna 208 into multiple channels and distribute them to multiple receivers 205 .
- Memory 202 is coupled to server processor 201 for storing various software programs and/or sets of instructions.
- memory 202 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic disk storage devices, flash memory devices, or other non-volatile solid-state storage devices.
- the memory 202 may store a network communication program, which may be used to communicate with one or more additional devices, one or more terminal devices, and one or more network devices.
- the memory 202 may be used to store the implementation program on the cloud server 400 side of the method for handling web page access exceptions provided by one or more embodiments of the present application.
- Server processor 201 may be used to read and execute computer readable instructions. Specifically, the server processor 201 can be used to call a program stored in the memory 202, such as the implementation program on the cloud server 400 side of the web page access exception processing method provided by one or more embodiments of the present application, and execute the program including instructions.
- the cloud server 400 shown in Figure 3 is only an implementation manner of the embodiment of the present application. In actual applications, the cloud server 400 may also include more or fewer components, which is not limited here.
- the electronic device 100 is installed with a device-finding application (application, APP).
- APP device-finding application
- the device-finding APP Through the device-finding APP, all bound electronic devices can be viewed, and the networking status, device status and status of the bound devices can be viewed. Based on the location information, you can also control the bound device to perform functions related to finding the device, such as data erasure, data encryption, data backup, screen lock or sound playback, etc.
- FIG. 4A to FIG. 4D show related user interfaces for viewing bound electronic devices.
- FIG. 4A shows a main interface on the electronic device 100 for displaying installed applications (applications, APPs).
- the main interface 11 may include: a status bar 101, a tray 102 with commonly used application icons, and other application icons 103. in:
- the tray 102 with commonly used application icons can display: phone icon, contact icon, text message icon, camera icon.
- Other application icons 103 may display: browser icon, gallery icon, music icon, settings icon, and search device APP icon 103A.
- the main interface 11 may also include a page indicator 104 .
- Other application icons may be distributed on multiple pages, and the page indicator 104 may be used to indicate which application program in which page the user is currently viewing. Users can slide the area of other application icons left and right to view application icons in other pages.
- the icon 103A of the search device APP can receive the user's input operation (such as a click operation); if the search device APP is not currently logged into the account, in response to the above input operation, the electronic device 100 can display the search device APP Login interface 12.
- the login interface 12 includes a login control 201 .
- the login control 201 can receive the user's input operation (such as a click operation).
- the electronic device 100 displays the login option 202 and login of an existing account (such as account 1) in the login system. Login options for other accounts 203.
- the login option 202 can receive the user's input operation (such as a click operation).
- the electronic device 100 displays that the search device APP has logged in to the system.
- User interface behind the account 13 The user interface 13 includes a map display area 204 and a device list.
- the device list may include a device tag 205 of the electronic device 100, and a device tag of at least one electronic device bound to the electronic device 100, such as a device tag 206 of a smart bracelet and a device tag 207 of an earphone.
- the device label 206 of a smart bracelet may include a device icon 206A and/or a device model 206B.
- the device list also includes the networking identifier of each device, which is used to indicate whether the device is online or offline. For example, the network identification 208 of the smart bracelet indicates that the smart bracelet is currently online.
- the map display area 204 may display the location of each device in the device list on the map. Taking a smart bracelet as an example, a device label 209 of the smart bracelet is displayed at the position of the smart bracelet on the map.
- the electronic device 100 can directly display the user interface 13 shown in Figure 4D.
- the electronic device 100 can be bound to a new electronic device (for example, the electronic device 200).
- the electronic device 100 and the electronic device 200 can pair the search devices through short-range communication technology to establish a binding relationship of the search devices.
- the above-mentioned short-range communication technology may be Bluetooth communication technology, or may be NFC communication, UWB communication and other communication technologies.
- the electronic device 100 and the electronic device 200 are automatically triggered to search for device pairing; the electronic device 100 and the electronic device 200 use the above near field communication technology.
- the user can also manually trigger the electronic device 100 and the electronic device 200 to search for device pairing, which is not specifically limited here.
- FIG. 5A to FIG. 5H show the relevant user interface for pairing the electronic device 100 and the electronic device 200 .
- the electronic device 100 and the electronic device 200 are automatically triggered to search for device pairing.
- the electronic device 100 displays a pop-up window 310 .
- the pop-up window 310 includes prompt information 311, cancel control 312 and login account control 313.
- Prompt information 311 is used to prompt the user to log in to the account.
- the cancel control 312 is used to cancel this pairing and stop displaying the pop-up window 310.
- the login account control 313 can receive the user's input operation (such as a click operation), In response to the above input operation, the electronic device 100 displays a pop-up window 320 .
- the pop-up window 320 includes a login option 321 for logging into an existing account in the system (for example, account 1), a login option 322 for logging into other accounts, and a cancel control 323.
- the login options 321 and 322 are used to log in to the account; the cancel control 323 is used to cancel this pairing and stop displaying the pop-up window 320.
- the login option 321 can receive a user's input operation (such as a click operation), and in response to the above input operation, the electronic device 100 displays a pop-up window 330 .
- the pop-up window 330 includes the account number and avatar 331 of account 1, prompt information 332, cancel control 333 and confirmation control 334.
- the prompt information 332 is used to prompt to associate the electronic device 200 with the currently logged-in account.
- the cancel control 333 is used to cancel this pairing and stop displaying the pop-up window 330.
- the electronic device 100 can also directly display the pop-up window 330 without displaying the pop-up windows shown in Figures 5B and 5C.
- the search device APP of electronic device 100 and the search device APP of electronic device 200 log in to the same account (for example, account 1), or both log in
- the electronic device 100 and the electronic device 200 can complete pairing and binding only if their accounts have a preset relationship (that is, the accounts they log in to are associated accounts). It can be understood that when account 1 and account 2 have a preset relationship, account 1 can obtain authorization for the binding relationship of account 2's search device, and the electronic device logged in account 1 and the electronic device logged in account 2 can pair the search device. Binding.
- the above-mentioned default relationship may mean that account 2 is a family account bound to account 1, or that a specific group of account 1 (such as a location sharing group, a family group) includes account 2.
- a specific group of account 1 such as a location sharing group, a family group
- the embodiments of this application do not specifically limit the above preset relationship.
- the confirmation control 334 can receive a user's input operation (such as a click operation), and in response to the above input operation, the electronic device 100 displays a pop-up window 340 .
- the pop-up window 340 includes a pairing progress bar 341 and a cancellation control 342 .
- the pairing progress bar 341 is used to indicate the pairing progress of the electronic device 100 and the electronic device 200 .
- the cancel control 342 is used to cancel this pairing and stop displaying the pop-up window 340.
- the electronic device 100 and the electronic device 200 establish a binding relationship to find the device.
- the electronic device 100 displays a pop-up window 350, which includes prompt information 351 and view information.
- the prompt information 351 is used to prompt the functions that the search device APP can provide for the electronic device 200 (such as viewing positioning, setting to lost mode, playing sound, and data protection) and viewing controls 352 .
- the view control 352 may receive a user's input operation (such as a click operation), and in response to the above input operation, the electronic device 100 displays the user interface 13 of the search device APP.
- the device list of the user interface 13 is newly added with the device tag 401 of the successfully paired electronic device 200 and the network identification 402 of the electronic device 200 .
- the network identification 402 indicates that the electronic device 200 is in an online state.
- the device label 210 of the electronic device 200 is added to the map display area 204 of the user interface 13 .
- the device tag 401 of the electronic device 200 can receive the user's input operation (such as a click operation). In response to the above input operation, the electronic device 100 displays the address 403 of the electronic device 200 and the acquisition time of the address 403 404.
- Device information 405 of the electronic device 200 (such as battery level indicator, network symbol, etc.) and function controls.
- the above function controls may include positioning device control 406, lost mode control 407, play sound control 408 and data protection control 409.
- the positioning device control 406 can be used to query the current location of the electronic device 200 to update the address 403 and the display location of the device tag 210 of the electronic device 200 in the map display area 204 .
- Lost mode control 407 may be used to place electronic device 200 into lost mode. For example, in the lost mode, the electronic device 200 will lock the screen so that other users cannot use the electronic device 200 .
- the play sound control 408 can be used to control the electronic device 200 to play specified audio (such as ringtones) to facilitate the owner to find the sound. Find lost electronic devices 200.
- specified audio such as ringtones
- the data protection control 409 can be used to control the electronic device 200 to perform data encryption, data erasure, or data backup, so as to protect the data of the electronic device 200 .
- the electronic device 100 and the electronic device 200 can also establish a binding relationship to find the device by logging into the trust ring of the same account.
- the embodiment of the present application does not specifically limit the manner in which the electronic device 100 and the electronic device 200 establish a binding relationship for searching devices.
- FIG. 6A to FIG. 6E show the relevant user interface of the electronic device 100 controlling the offline electronic device 200 after the electronic device 100 and the electronic device 200 are bound.
- the networking identifier 402 indicates that the electronic device 200 is in an offline state, and the address displayed in address 403 is the last address obtained before the electronic device 200 went offline.
- any one of the functional controls shown in Figure 6A ie, the positioning device control 406, the lost mode control 407, the play sound control 408 and the data protection control 409) can receive user input.
- the electronic device 100 can send offline instructions to the offline electronic device 200 through the peripheral device 300 near the electronic device 200 to control the electronic device 200 to perform operations corresponding to the above function controls.
- the lost mode control 407 can receive a user's input operation (such as a click operation), and in response to the above input operation, the electronic device 100 displays a pop-up window 410 .
- the pop-up window 410 is used to set the lock screen information and/or the lock screen password of the electronic device 200 .
- the pop-up window 410 includes a contact information input box 411, a message input box 412, a password input box 420, a password input box 421, a cancel control 413, a skip control 414, and a confirmation control 415.
- the cancel control 413 is used to cancel setting the electronic device 200 to the lost mode and trigger the electronic device 100 to stop displaying the pop-up window 410 .
- the skip control 414 is used to skip setting the lock screen information and/or lock screen password of the electronic device 200 and directly set the electronic device 200 to the lost mode.
- the user inputs contact information in the contact information input box 411, and after entering a message in the message input box 412, the confirmation control 415 receives the user's input operation (such as a click operation); in response to the above input operation, the electronic The device 100 generates an offline instruction and displays prompt information 416.
- the prompt information 416 is used to indicate that the electronic device 200 is setting the lost mode, that is, locking the screen and displaying the lock screen information set by the user (such as contact information and messages entered by the user). .
- the electronic device 100 sends the above-mentioned offline command to the offline electronic device 200 through the online peripheral device 300 .
- the user can also enter a new lock screen password in the password input box 420 and the password input box 421; the above offline command is also used to instruct the electronic device 200 to set a new lock screen password.
- the electronic device 100 can display a prompt message to prompt the user that the password input is inconsistent.
- the password input box 421 is used to ensure the correctness of the password entered by the user.
- the pop-up window 410 may also display only a password input box for the lock screen password, which is not specifically limited here.
- the lock screen information may or may not be set, and/or a new lock screen password may or may not be set.
- the lost device itself has a lock screen password set, and the user sets a new lock screen password through the pop-up window 410, the lost device can only be unlocked through the new lock screen password.
- the offline electronic device 200 can feedback a confirmation message through the nearby online peripheral device 300; the electronic device 100 Based on the confirmation message fed back by the peripheral device 300, prompt information 417 may be displayed.
- the prompt information 417 is used to prompt the offline electronic device 200 that the lost mode has been successfully set.
- the offline electronic device 200 is controlled to display the lock screen information input by the user (such as the contact information input by the user), so that other users can contact the owner of the electronic device 200 after picking up the lost electronic device 200 .
- the data protection control 409 can receive a user's input operation (such as a click operation), and in response to the above input operation, the electronic device 100 displays a pop-up window 501 .
- the pop-up window 501 may include multiple data protection options, such as data erasure option 502, data encryption option 503, and data backup option 504; it may also include file type options, such as all options 505, multimedia options 506, document options 507, application data Option 508, contact data option 509; Cancel control 510 and Confirmation control 511 may also be included.
- options 506 to 509 are exemplary options provided by the embodiment of the present application and should not be limited to the embodiment of the present application. Other file type options may also be used in the embodiment of the present application.
- the user can select the required data protection option (i.e., one of the multiple data protection options mentioned above), and then select the file type that needs to be protected (i.e., all options 505, or at least one of the options 506 to 509).
- the user can operate the confirmation control 511; in response to the user's input operation (such as a click operation) on the confirmation control 511, the electronic device 100 can generate an offline instruction, the offline instruction is used to indicate the file type selected by the user Perform the data protection operation corresponding to the above data protection option, such as the data erasure operation corresponding to the data erasure option 502, the data encryption operation corresponding to the data encryption option 503, and the data backup operation corresponding to the data backup option 504.
- the confirmation control 511 receives the user's input operation (such as a click operation); in response to the above input operation, the electronic device 100 generates an offline instruction, and Prompt information 513 is displayed; this offline instruction is used to perform data erasure on the file type selected by the user, and prompt information 513 is used to indicate that the electronic device 200 is being instructed to perform data erasure.
- the offline electronic device 200 can feedback a confirmation message through the nearby online peripheral device 300; the electronic device 100 Based on the confirmation message fed back by the electronic device 200, prompt information 514 may be displayed.
- the prompt information 514 is used to prompt that the data of the electronic device 200 has been erased.
- the prompt information 514 is also used to prompt the erased file type.
- the electronic device 200 displays prompt information, and the prompt information is used to remind the electronic device 200 that the above offline instruction has been executed.
- the above offline instructions are used to implement one or more data protection operations such as data erasure, data encryption, and data backup.
- the prompt information 515 may be displayed.
- the prompt information 515 is used to prompt the electronic device 200 that the data erasure has been performed.
- the prompt information 515 is also used to prompt the erased file type.
- the electronic device 100 displays the password input box 516 and the password input box 517 in the pop-up window 501 .
- the password input box 516 and the password input box 517 are used to set the password for data encryption.
- the pop-up window 501 may also display only a data-encrypted password input box, which is not specifically limited here.
- the confirmation control 511 receives the user's input operation (such as a click operation); in response to the above input operation , the electronic device 100 generates an offline instruction and displays prompt information 518; the offline instruction is used to perform data erasure on the file type selected by the user, and the prompt information 518 is used to prompt that the electronic device 200 is being instructed to perform data encryption.
- the electronic device 100 can display prompt information 519 according to the confirmation message fed back by the electronic device 200.
- the prompt information 519 is used to prompt the electronic device 200 that data encryption has been performed.
- the prompt information 519 is also used to prompt the encrypted file type.
- the prompt information 520 may be displayed.
- the prompt information 520 is used to prompt the electronic device 200 that data encryption has been performed.
- the prompt information 520 is also used to prompt the encrypted file type.
- the electronic device 100 can also obtain and display the offline location of the electronic device 200 uploaded by the peripheral device.
- the positioning device control 406 can receive the user's input operation (such as a click operation).
- the electronic device 100 obtains and displays the offline information uploaded by the peripheral device 300.
- the location generates an address 521, and the location of the device tag 210 of the electronic device 200 in the map display area 204 can be updated according to the address.
- the electronic device 100 can also obtain and display the address 521, and update the position of the device tag 210 of the electronic device 200 in the map display area 204 according to the address 521.
- the electronic device 100 may not have an independent search device APP installed.
- the functions provided by the search device APP involved in Figures 5G to 7L can also be implemented in the system settings of the system application of the electronic device 100, or they can It is implemented in the web version of the search device APP, which is not specifically limited in the embodiment of the present application.
- the electronic device 100 and the lost device can be paired and bound to find the device in advance; when the lost device is offline, the user can use the electronic device 100 bound to the lost device to send a message to the cloud server.
- Offline instructions for the lost device when the cloud server receives the assistance instruction message for the lost device uploaded by an online peripheral device near the lost device, it sends the offline instructions of the electronic device 100 to the lost device through the peripheral device so that the lost device can execute it Offline instructions.
- the electronic device 100 can still control the lost device to perform specific tasks, so as to avoid data loss and data leakage of the lost device and protect user privacy.
- FIG. 8A shows a schematic flowchart of an offline device control method.
- the offline device control method includes but is not limited to steps S101 to S113.
- the electronic device 100 and the electronic device 200 perform pairing and binding of search devices.
- the electronic device 100 can install the search device APP.
- the electronic device 100 and the electronic device 200 can pair and bind the search devices, which will not be described again here.
- the electronic device 100 sends a pairing request to an application server (for example, the cloud server 400 ) that searches for the device APP.
- the pairing request is used to request a connection with the electronic device 200 . Pairing and binding; after the cloud server 400 interacts with the electronic device 100 and the electronic device 200, and determines that the electronic device 100 and the electronic device 200 are logged in to the same account (for example, account 1), the cloud server 400 forwards the pairing request from the electronic device 100 to the electronic device 200. and forwarding the pairing response from the electronic device 200 to the electronic device 100 .
- the electronic device 100 receives the input operation 1 and generates an offline instruction in response to the input operation 1.
- the user when the user confirms that the electronic device 200 is lost and the electronic device 200 is offline, in order to avoid data loss or leakage of the electronic device 200, the user can search for the function corresponding to the electronic device 200 provided by the device APP.
- Controls (such as the lost mode control 407, the play sound control 408 and the data protection control 409 shown in Figure 6A) trigger the electronic device 100 to send offline instructions.
- the offline instructions are used to instruct the electronic device 200 to perform one or more of the following operations: data erasure , data encryption, data backup, playing sound, setting loss mode, etc.
- the function controls corresponding to the electronic device 200 provided by the search device APP include function controls 1.
- the electronic device 100 receives input operation 1 for the function control 1, and the input operation 1 includes one or more operations; in response to the input operation 1, if the electronic device 100 determines that the electronic device 200 is in an offline state, then Get the offline command corresponding to function control 1.
- message 1 includes offline instructions.
- message 1 includes the encrypted ciphertext of the offline instruction.
- the function control 1 may be the lost mode control 407
- the input operation 1 may include a click operation acting on the lost mode control 407
- the offline instruction is used to instruct the electronic device to be lost. model.
- the offline instruction is specifically used to instruct the screen of the electronic device to be locked.
- input operation 1 may also include an input operation in which the user enters contact information in the contact information input box 411, an input operation in which a message is entered in the message input box 412, and an input operation acting on the confirmation control 415.
- the offline command is also used for Instructs to display the above contact information and message on the lock screen of the electronic device.
- the input operation 1 may also include an input operation in which the user enters the lock screen password in the password input box 420 and the password input box 421.
- the offline instruction is also used to instruct the electronic device to set a new lock screen password.
- the function control 1 is a sound playback control 408
- the input operation 1 includes a click operation on the sound playback control 408
- the offline instruction is used to instruct the electronic device to play sound.
- the function control 1 is a data protection control 409
- the input operation 1 may include a click operation on the playback data protection control 409 , and a data protection option 1 (such as data erasure).
- the input operation 1 may also include the user inputting the encryption password in the password input box 516 and the password input box 517 .
- the electronic device 100 sends message 1 to the cloud server 400.
- the message 1 is used to instruct the electronic device 200 to execute the above offline instruction.
- the above-mentioned short-range communication module is a BLE communication module.
- the electronic device 200 has the device search function turned on; when the electronic device 200 is offline, the BLE communication module regularly sends offline broadcast 1 based on a preset period.
- the electronic device 200 can query the network connection status of the device. When it is determined that the device is disconnected based on the network connection status, the electronic device 200 determines that the device is offline; conversely, when it is determined that the device is offline based on the network connection status. When connected to the Internet, the electronic device 200 determines that the device is online.
- the electronic device 200 determines that the device is offline; when it is determined based on the network connection status that the device is online and When the electronic device 200 is connected to a SIM card, the electronic device 200 determines that the device is online.
- the electronic device 200 can broadcast a heartbeat packet through the aforementioned communication network 500.
- the electronic device 200 determines that the device is offline; conversely, when the heartbeat packet is successfully sent, or response information based on the heartbeat packet feedback from other devices is received within a preset time, the electronic device 200 determines that the device is online.
- the electronic device 200 may be a smart home device, or a wearable device (such as a headset, a sports bracelet), etc.
- the online peripheral device 300 scans offline broadcasts through the above-mentioned short-range communication module.
- the peripheral device 300 has the device search function turned on, and the online peripheral device 300 can communicate with the cloud server 400; when the peripheral device 300 is online, the BLE communication module scans the nearby devices based on the preset scanning strategy. Offline broadcast.
- the BLE communication module when the peripheral device 300 is in the online state, the BLE communication module regularly scans offline broadcasts with a preset scan cycle and scan duration.
- the above scan period is 600ms
- the above scan duration is 100ms.
- the peripheral device 300 After scanning the offline broadcast 1 from the electronic device 200, the peripheral device 300 sends the message 2 to the cloud server 400.
- message 2 is used to indicate that peripheral device 300 can assist electronic device 200 in transmitting messages.
- the peripheral device 300 after scanning the offline broadcast 1 from the electronic device 200, the peripheral device 300 displays prompt information, and the prompt information is used to prompt the user whether to assist other devices in offline control. After receiving the user's confirmation operation, the peripheral device 300 sends message 2 to the cloud server 400.
- all online peripheral devices near the electronic device 200 can scan the offline broadcast 1 through the above-mentioned near field communication module, and send an assistance instruction message (ie, the above-mentioned message 2) to the cloud server 400.
- an assistance instruction message ie, the above-mentioned message 2
- the cloud server 400 determines that the offline instruction indicated by message 1 is used to control the offline device indicated by message 2.
- message 1 may carry indication information 1 for instructing the target device of the offline instruction
- message 2 may also carry indication information 2 for instructing the offline device.
- the cloud server 400 matches the instruction information 1 and the instruction information 2. If the matching is successful, the cloud server 400 determines that the offline instruction is used to control the offline device indicated by the message 2.
- the online peripheral device 300 can assist the offline device in transmitting data.
- the above instruction information 1 and instruction information 2 are the derived public key of the public key generated when the electronic device 100 binds the electronic device 200 or the Hash value of the derived public key.
- the above instruction information 1 and instruction information 2 are device identifiers that can indicate offline devices.
- the device identifier is a universal device identifier (unique device identifier description, UUID) or a unique device identifier (UDID). )wait.
- the cloud server 400 sends message 3 to the peripheral device 300.
- the message 3 is used to instruct the electronic device 200 to execute the above offline instruction.
- the cloud server 400 After the cloud server 400 receives the message 2 sent by the peripheral device 300, if it is determined based on the message 2 that the peripheral device 300 can assist in forwarding offline instructions for the electronic device 200, it sends message 3 to the peripheral device 300, hoping to send messages offline through the peripheral device 300.
- the electronic device 200 forwards the message 3 to instruct the electronic device 200 to execute the offline instruction from the electronic device 100 .
- the peripheral device 300 sends message 3 to the electronic device 200 through the above-mentioned short-range communication module.
- the peripheral device 300 after the peripheral device 300 receives the message 3, when the offline broadcast 1 of the electronic device 200 is scanned again, the peripheral device 300 establishes a communication connection with the electronic device 200 through the BLE communication module, and then sends a message to the electronic device 200 based on the communication connection.
- Device 200 sends message 3. It can be understood that when the peripheral device 300 of a good Samaritan approaches the offline electronic device 200 again, the message 3 can be forwarded to the electronic device 200 .
- the electronic device 200 executes the above offline instruction based on message 3.
- the electronic device 200 After executing the offline command, the electronic device 200 broadcasts message 4 through the short-range communication module. Message 4 is used to indicate that the above offline command has been executed.
- the peripheral device 300 After scanning the message 4 through the near field communication module, the peripheral device 300 sends the message 4 to the cloud server 400.
- the electronic device 200 can also directly send the message 4 to the peripheral device 300 through the communication connection.
- the cloud server 400 sends message 5 to the electronic device 100.
- the message 5 is used to indicate that the above offline instruction has been executed.
- the above message 4 may be a SCAN_RSP message.
- the above message 4 and message 5 may be the same message or different messages, and are not specifically limited here.
- the electronic device 100 can display prompt information based on the confirmation message to remind the user that the electronic device 200 has executed the offline command.
- message 4 and message 5 may be the aforementioned confirmation messages.
- the user triggers the electronic device 100 to send an offline instruction through the lost mode control 407 .
- the offline instruction is used to instruct the electronic device 200 to be set to Lost mode; in response to the confirmation message fed back by the electronic device 200, the electronic device 100 displays prompt information 417.
- the prompt information 417 is used to prompt the electronic device 200 that the lost mode has been set.
- the user triggers the electronic device 100 to send an offline instruction through the data protection control 409 .
- the offline instruction is used to instruct data erasure on a specific file type; in response to a confirmation feedback from the electronic device 200 message, the electronic device 100 displays prompt information 514.
- the prompt information 514 is used to prompt the electronic device 200 that data erasure has been completed.
- the offline instruction is used to instruct to perform data encryption on a specific file type; in response to the confirmation message fed back by the electronic device 200 , the electronic device 100 displays prompt information 518 , and the prompt information 518 is used to It is prompted that the electronic device 200 has completed data encryption.
- step S106 in response to the offline broadcast 1 of the electronic device 200, the peripheral device also obtains the offline location of the electronic device 200.
- Message 2 may be an offline positioning message, and Message 2 also indicates the above-mentioned offline location.
- S114 and S115 may also be executed.
- the above-mentioned offline location is actually the location of the device obtained by the positioning module of the peripheral device 300. Since the peripheral device 300 is near the electronic device 200, the location of the peripheral device 300 can be regarded as the current location of the electronic device 200. Offline location.
- the peripheral device 300 obtains the offline location of the electronic device 200, which specifically includes: the peripheral device 300 calls the positioning module of the device to obtain the current location of the device, which is the above-mentioned offline location.
- the peripheral device 300 obtains the offline location of the electronic device 200, which specifically includes: the peripheral device 300 uses the location of the device recently acquired by the positioning module of the device as the above-mentioned offline location.
- the above-mentioned offline position is that the peripheral device 300 uses the position of its own device as a reference position and uses short-range positioning technology to obtain the position of the electronic device 200 .
- the peripheral device 300 obtains the offline location of the electronic device 200, which specifically includes: the peripheral device 300 uses short-range positioning technology (such as Bluetooth positioning technology) to obtain the orientation of the electronic device 200 and the distance to the electronic device 200; Use the positioning module to obtain the location information of the device; then use the location information of the device as a reference to obtain the current offline location of the electronic device 200 based on the orientation and distance of the electronic device 200 .
- short-range positioning technology such as Bluetooth positioning technology
- the cloud server 400 sends message 6 to the electronic device 100.
- the message 6 is used to indicate the offline location of the electronic device 200.
- the electronic device 100 displays the offline location of the electronic device 200 based on the message 6.
- the offline location of the electronic device 200 can be displayed in the user interface 11 , and the electronic device 200 can be updated according to the offline location of the electronic device 200 .
- the electronic device 100, the lost device and the cloud server can negotiate in advance the key to authenticate each other's identity; during the offline control process, a specific key pair is used between the two devices to go offline.
- the instructions are encrypted and transmitted to authenticate the identity of the other party; in this way, malicious devices can be prevented from forging and tampering with offline instructions, and the security of offline control can be ensured.
- the message transmission with peripheral devices does not carry the device information (such as device identification) of the lost device and the searching device (ie, the electronic device 100); in this way, the lost device and the searching device can be avoided from being tracked, and Malicious devices use device information to forge and tamper with messages from lost and found devices, ensuring Offline control security.
- device information such as device identification
- the searching device ie, the electronic device 100
- FIG. 8B shows a schematic flowchart of an offline device control method.
- step S101 may specifically include: the electronic device 100 and the electronic device 200 perform pairing and binding of the search device.
- the key K1, the key K2, the key O1, and the public key P are generated. and the corresponding private key d, the key K1 is used for mutual authentication between the electronic device 200 and the electronic device 100, the key K2 is used for the mutual authentication between the electronic device 200 and the cloud server 400, and the key O1 is used for the electronic device 100 and cloud server 400 authenticate each other's identities.
- the electronic device 100 and the electronic device 200 generate data based on the preset algorithm respectively.
- the electronic device 200 and the electronic device 100 hold the same key K1.
- the key K1 is used for the electronic device 200 and the electronic device 100 to authenticate each other's identities; the electronic device 100 and the cloud server 400 respectively generate the same key based on the preset algorithm.
- the electronic device 100 and the cloud server 400 hold the key O1, which is used by the electronic device 100 and the cloud server 400 to authenticate each other's identities; the electronic device 200 and the cloud server 400 respectively generate the same key K2 based on the preset algorithm.
- the device 200 and the cloud server 400 hold the key K2, and the key K2 is used for the electronic device 200 and the cloud server 400 to authenticate each other's identities.
- the above-mentioned default algorithm is the Elliptic Curve Diffie–Hellman key Exchange (ECDH) algorithm.
- ECDH Elliptic Curve Diffie–Hellman key Exchange
- two devices can negotiate the same key without sharing any private information.
- the key generated by the ECDH algorithm can transmit secure encrypted materials in an unsecured channel.
- the electronic device 100 during the pairing process of the electronic device 100 and the electronic device 200, the electronic device 100 also generates a public key P and a corresponding private key d; the electronic device 200 may hold the public key P, and the electronic device 100 may hold the private key P. Key d and public key P. Private key d and public key P can be used for encrypted transmission of information.
- the public key and private key are a key pair (that is, a public key and a private key) obtained through an encryption algorithm.
- the encryption algorithm can be Elliptic Curve Cryptography (ECC), Rivest-Shamir-Adleman (RSA) or Digital Signature Algorithm (DSA) and other non-standard encryption algorithms.
- Symmetric encryption algorithm The key pair obtained through the encryption algorithm is unique; the public key is the public part of the key pair and is disclosed to the outside world; the private key is the non-public part and is not disclosed to the outside world and needs to be saved by this device. If the data is encrypted with a public key, it must be decrypted with the corresponding private key; if it is encrypted with a private key, it must be decrypted with the corresponding public key.
- Step S102 may specifically include: when the electronic device 200 is offline, the electronic device 100 receives the input operation 1, and in response to the input operation 1, generates the encrypted authentication information C2 corresponding to the offline instruction and the Hash value 1 of the derived public key Pi of the public key P, and encrypts Authentication information C2 is generated by sequentially encrypting the offline instructions using key K1 and key O1.
- the electronic device 100 may also upload the derived public key Pi or the Hash value of the derived public key Pi in advance. For example, during the binding process of the search device of the electronic device 100 and the electronic device 200, after the electronic device 100 obtains the public key P, it uploads the hash value of the public key Pi or the derived public key Pi to the server.
- the electronic device 100 uses the key K1 and the key O1 to sequentially encrypt the offline instruction and generates the encrypted authentication information C2, which specifically includes: the electronic device 100 uses the key K1 to encrypt the offline instruction X and generates the encryption authentication. Information C1; the electronic device 100 encrypts the encrypted authentication information C1 using the key O1 to generate encrypted authentication information C2.
- the authenticated encryption with associated data (AEAD) algorithm is used for encryption.
- the AEAD algorithm is an encryption method with an authentication function and has confidentiality, integrity, and authentication at the same time.
- C1 AEAD(K1,X)
- AD additional data
- SN serial number
- offline instruction X is used to perform data erasure
- the Hash value of the derived public key Pi is a Hash value obtained by calculating the derived public key Pi according to a preset Hash algorithm.
- the Hash algorithm is a function used to compress messages of any length into a fixed-length message digest (i.e., Hash value).
- the Hash value can be used to check the integrity of the message and avoid message tampering.
- the electronic device 100 and the electronic device 200 obtain the public key P, they both derive the public key P at a fixed period and generate multiple derived public keys Pi with time as the dimension. It can be understood that the derived public key Pi generated by the electronic device 100 and the electronic device 200 at the same time is the same.
- the cloud server 400 can also obtain the public key P; in step S103, the cloud server 400 can generate the Hash of the derived public key Pi of the public key P. Value 1; that is, there is no need for the electronic device 100 to upload the derived public key Pi or the Hash value 1 to the cloud server 400.
- Step S103 may specifically include: the electronic device 100 sends message 1 to the cloud server 400, where message 1 includes encrypted authentication information C2 and Hash value 1.
- the electronic device 100 uses the key K1 and the key O1 to sequentially encrypt the offline instruction X, and then sends the encrypted ciphertext C2 to the cloud server 400 .
- the encrypted authentication information may also be called ciphertext.
- message 1 includes the Hash value 1 of the derived public key Pi of the public key P held by the electronic device 200.
- the hash value 1 in the message 1 can be used to imply that the offline instruction indicated by the message 1 is for the electronic device 200. of.
- the above-mentioned encrypted authentication information C2 and Hash value 1 can also be distributed separately, and there is no specific limitation here.
- the cloud server 400 can store the corresponding relationship between the device identification of each searching device, the device identification of the lost device, the encrypted authentication information of the uploaded offline instructions, and the Hash value of the derived public key in the offline instruction database. For example, after receiving the message 1 sent by the electronic device 100 in step S103, the cloud server 400 stores the device identification of the electronic device 100, the device identification of the electronic device 200, the encrypted authentication information C2 and the Hash value of the derived public key Pi in the offline instruction database. 1 correspondence.
- the device identification of the electronic device 200 may be carried in the message 1, or may be uploaded by the electronic device 100 to the cloud server 400 before step S103, which is not specifically limited here.
- the electronic device 100 can pre-obtain Hash values of multiple derived public keys within a preset time period in the future (eg, one week) and upload them to the cloud server 400 .
- the above Hash value 1 includes the Hash values of multiple derived public keys within the above preset time period.
- Step S104 may specifically include: when the electronic device 200 determines that the device is offline, broadcast offline broadcast 1 through the short-range communication module, and offline broadcast 1 includes the derived public key Pi of the public key P.
- the BLE offline broadcast can be broadcast through the BLE communication module.
- Step S106 may specifically include: after scanning the offline broadcast 1 from the electronic device 200, the peripheral device 300 sends a message 2 to the cloud server 400, where the message 2 includes the Hash value 2 of the derived public key Pi.
- message 2 includes the hash value 2 of the derived public key Pi of the public key P held by the electronic device 200.
- the hash value 2 in the message 2 can be used to imply that the message 2 is for the electronic device 200.
- the electronic device 200 can also directly broadcast the Hash value 2 of the derived public key Pi through offline broadcast 1, without the need for the peripheral device 300 to calculate the Hash value.
- Step S107 may specifically include: the cloud server 400 combines the Hash value 2 in message 2 and the Hash value 1 in message 1. Matching is performed; if the match is successful, cloud server 400 obtains encrypted authentication information C3. Encrypted authentication information C3 is generated by using key O1 to decrypt C2 and then using key K2 to encrypt.
- Step S108 may specifically include: the cloud server 400 sends a message 3 to the peripheral device 300, where the message 3 includes the encrypted authentication information C3 and the Hash value 2 from which the public key Pi is derived.
- the cloud server 400 stores the encrypted authentication information of the offline instructions sent by each electronic device and the corresponding Hash value of the derived public key in the offline instruction database. After receiving the message 2, the cloud server 400 matches the Hash value 2 in the message 2 with the Hash value (for example, Hsh value 1) corresponding to the encrypted authentication information of each offline instruction in the offline instruction database; obtains the successfully matched Hash value 1, Then, the device identification of the lost device corresponding to the Hash value 1 (that is, the device identification of the electronic device 100) and the encrypted authentication information C2 can be obtained.
- the Hash value for example, Hsh value 1
- the cloud server 400 also stores the corresponding relationship of the key O1 corresponding to the device identification of the electronic device 100, and the corresponding relationship of the key K2 corresponding to the device identification of the electronic device 200; referring to FIG. 8C, the device based on the electronic device 100 Identification, the cloud server 400 obtains the key O1, decrypts the encrypted authentication information C2, and generates the encrypted authentication information C1; based on the device identification of the electronic device 200, the cloud server 400 obtains the key K2, encrypts the encrypted authentication information C2, and generates encrypted authentication. Information C3.
- the above successful matching means that Hash value 1 and Hash value 2 are equal.
- the above Hash value 1 includes the Hash values of multiple derived public keys within the above preset time period, and the successful matching means that the Hash value 2 is equal to one of the Hash values of the multiple derived public keys.
- both the electronic device 100 and the electronic device 200 hold the public key P and can obtain the same derived public key Pi corresponding to the public key P.
- the hash value 1 of the derived public key Pi in message 1 implies that message 1 is for the electronic device 200
- the hash value 2 of the derived public key Pi in message 2 implies that message 2 is for the electronic device 200 . If the Hash value 1 matches the Hash value 2, it can be determined that the offline instruction indicated by the electronic device 100 in the message 1 is for the device assisted by the peripheral device 300, that is, the electronic device 200 implied by the Hash value 2.
- the key O1 is used by the cloud server 400 to verify the identity of the electronic device 100 and determine that the encrypted authentication information C2 comes from a legitimate user. All peripheral devices that assist the electronic device 200 in reporting can receive the encrypted authentication information of the offline command issued by the cloud server 400 .
- Step S109 may specifically include: based on the Hash value 2 of the derived public key Pi in the message 3, the peripheral device 300 sends the message 3 to the electronic device 200 through the above-mentioned short-range communication module.
- message 3 includes the Hash value 2 of the derived public key Pi; after receiving the message 3, the peripheral device 300 scans the offline broadcast 1 of the electronic device 200 again and obtains the derived public key Pi in the offline broadcast 1; The peripheral device 300 matches the Hash value in the message 3 with the Hash value of the derived public key Pi in the offline broadcast 1. If the match is successful, the peripheral device 300 sends the message 3 to the electronic device 200.
- the cloud server 400 sends the ciphertext C3 to the electronic device 200 via the peripheral device 300 .
- Step S110 may specifically include S110A and S110B.
- the electronic device 200 uses the key K2 and the key K1 to decrypt the encrypted authentication information C3 in the message 3, and obtains the offline instruction.
- the electronic device 200 uses the key K2 to decrypt the encrypted authentication information C3 corresponding to the offline command Offline InstructionsX.
- the key K2 is used by the electronic device 200 to verify the identity of the cloud server 400
- the key K1 is used by the electronic device 200 to verify the identity of the electronic device 100.
- the electronic device 200 executes offline instructions.
- Step S111 may specifically include: after the electronic device 200 executes the offline instruction, broadcast message 4 through the above-mentioned near-field communication module.
- Message 4 includes the encrypted confirmation ciphertext of the confirmation message and the derived public key Pi.
- the confirmation message is used to indicate that the above-mentioned offline instruction has been executed. instruction.
- the above confirmation message may be a SCAN_RSP message.
- Step S112 may specifically include: after the peripheral device 300 scans the message 4 through the short-range communication module, the peripheral device 300 sends the message 4 to the cloud server 400.
- the message 4 includes the Hash value 3 of the derived public key Pi.
- Step S113 may specifically include S113A and S113B.
- S113A The cloud server 400 matches the Hash value 3 in the message 4 with the Hash value 1 in the message 1. If the match is successful, S113B is executed.
- the cloud server 400 determines to send the message 5 to the electronic device 100 based on the message 4.
- message 4 includes a confirmation ciphertext that is encrypted using key K2.
- the server 400 uses the key K2 to decrypt the confirmation ciphertext and obtains the confirmation message.
- the message 5 includes the confirmation message.
- message 4 includes confirmation ciphertext D2, which is sequentially encrypted using key K1 and key K2.
- the cloud server 400 decrypts the confirmation ciphertext D2 using the key K2, and obtains the confirmation ciphertext D1 of the confirmation message encrypted by the key K1; the message 5 includes the confirmation ciphertext D1.
- the electronic device 100 decrypts the confirmation ciphertext D2 using the key K1, and obtains the confirmation message.
- message 4 includes confirmation ciphertext D2, which is sequentially encrypted using key K1 and key K2.
- the cloud server 400 uses the key K2 to decrypt the confirmation ciphertext D2, and obtains the confirmation ciphertext D1 of the confirmation message encrypted by the key K1; the cloud server 400 uses the key O1 to confirm the ciphertext D1 Encryption is performed to obtain the confirmation ciphertext D3 that is sequentially encrypted by the key K1 and the key O1; the message 5 includes the confirmation ciphertext D3.
- the electronic device 100 After receiving the message 5, the electronic device 100 uses the key O1 to decrypt the confirmation ciphertext D3, and obtains the confirmation ciphertext D3 encrypted by the key K1; the electronic device 100 uses the key K1 to decrypt the confirmation ciphertext D2, and obtains the confirmation. information.
- the cloud server 400 can use the key K2 to authenticate the identity of the electronic device 200; the electronic device 100 can use the key O1 to authenticate the identity of the cloud server 400, and the electronic device 100 can use the key K1 to authenticate the identity of the electronic device 200.
- the confirmation ciphertext included in the message 4 is encrypted using the derived public key Pi of the public key P, and the message 5 also includes the above-mentioned confirmation ciphertext; the electronic device 200 uses the derived private key di of the private key d to confirm the ciphertext. After the text is decrypted, a confirmation message is obtained.
- the electronic device 100 can also upload the derived public key Pi to the cloud server 400 through message 1, instead of the hash of the derived public key Pi; in step S106, the peripheral device 300 can also upload the derived public key Pi to the cloud server 400 through message 2.
- the cloud server 400 uploads the derived public key Pi instead of the hash of the derived public key Pi; in step S107, the cloud server 400 matches the derived public key in message 1 and the derived public key in message 2. If the match is successful, obtain Encrypted authentication information C3.
- message 2 may be an offline positioning message.
- step S106 the message sent by the peripheral device 300
- the information 2 may include the location ciphertext of the offline location of the electronic device 200, and the location ciphertext is generated by encrypting the offline location using the derived public key Pi and an encryption algorithm.
- step S114 and S115 may also be executed.
- step S114 the message 6 sent by the cloud server 400 to the electronic device 100 includes the location ciphertext of the offline location of the electronic device 200.
- step S115 the electronic device 100 decrypts the location ciphertext using the derived private key di of the private key d, and obtains and displays the offline location of the electronic device 200.
- the above-mentioned offline control method may also not use the relevant information of the aforementioned public key P (such as the derived public key of the public key P, the Hash value of the derived public key, etc.) to allude to the electronic device 200; the electronic device 100,
- the message interaction between the electronic device 200, the peripheral device 300 and the cloud server 400 can be directed to the electronic device 200 through the device identification of the electronic device 200, and to the electronic device 100 through the device identification of the electronic device 100.
- the embodiments of the present application do not specifically limit this. An exemplary explanation is provided below. By way of example,
- the message 1 includes the encrypted authentication information C2 and the device identification 1 of the lost device (ie, the device identification of the electronic device 200).
- the device identification 1 is used to indicate that the offline instruction indicated by the message 1 is for the electronic device 200.
- step S104 the offline broadcast 1 includes the device identification 1 of the electronic device 200.
- the message 2 includes the device identification 1 of the lost device (ie, the device identification of the electronic device 200).
- the device identification 1 is used to indicate that the message 2 is for the electronic device 200.
- the message 2 is used to indicate that the peripheral device 300 can assist the electronic device. 200 transfer message.
- step S107 based on the device identification 1 in the message 2 and the device identification 1 in the message 1, the encrypted authentication information C2 of the offline instruction corresponding to the device identification 1 (that is, the device identification of the electronic device 200) is obtained. Based on the encrypted authentication of the offline instruction Information C2 obtains encrypted authentication information C3.
- message 3 includes the device identification 1 of the lost device and the encrypted authentication information C3.
- Device identification 1 is used to indicate that the offline instruction indicated by message 3 is for the electronic device 200 .
- step S109 the peripheral device 300 sends the message 3 to the electronic device 200 through the short-range communication module based on the device identification 1 in the message 3.
- the message 4 includes the device identification 2 of the search device (that is, the device identification of the electronic device 100).
- the device identification 2 is used to indicate that the confirmation message indicated by the message 4 is sent to the electronic device 100.
- step S113 the cloud server 400 sends the message 5 to the electronic device 100 based on the device identifier 2 in the message 4.
- the software structure of the electronic device 100 is introduced below.
- the software structure of the electronic device 100 and the peripheral device 200 reference can be made to the software structure of the electronic device 100, which will not be described again.
- the software system of the electronic device 100 may adopt a layered architecture, an event-driven architecture, a microkernel architecture, a microservice architecture, or a cloud architecture.
- This embodiment of the present invention takes the Android system with a layered architecture as an example to illustrate the software structure of the electronic device 100 .
- FIG. 9A is a software structure block diagram of the electronic device 100 according to the embodiment of the present application.
- the layered architecture divides the software into several layers, and each layer has clear roles and division of labor.
- the layers are connected through software oral communication.
- the Android system is divided into four layers, from top to bottom: application layer, application framework layer, Android runtime (Android runtime) and system libraries, and kernel layer.
- the application layer can include a series of application packages.
- the application package can include applications such as camera, gallery, calendar, call, map, navigation, WLAN, Bluetooth, music, video, short message, etc.
- the application framework layer provides an application programming interface (API) and programming framework for applications in the application layer.
- the application framework layer includes some predefined functions. As shown in Figure 9A, the application framework layer may include a window manager, content provider, view system, phone manager, resource manager, notification manager, etc.
- a window manager is used to manage window programs.
- the window manager can obtain the display size, determine whether there is a status bar, lock the screen, capture the screen, etc.
- Content providers are used to store and retrieve data and make this data accessible to applications.
- Said data can include videos, images, audio, calls made and received, browsing history and bookmarks, phone books, etc.
- the view system includes visual controls, such as controls that display text, controls that display pictures, etc.
- a view system can be used to build applications.
- the display interface can be composed of one or more views.
- a display interface including a text message notification icon may include a view for displaying text and a view for displaying pictures.
- the phone manager is used to provide communication functions of the electronic device 100 .
- call status management including connected, hung up, etc.
- the resource manager provides various resources to applications, such as localized strings, icons, pictures, layout files, video files, etc.
- the notification manager allows applications to display notification information in the status bar, which can be used to convey notification-type messages and can automatically disappear after a short stay without user interaction.
- the notification manager is used to notify download completion, message reminders, etc.
- the notification manager can also be notifications that appear in the status bar at the top of the system in the form of charts or scroll bar text, such as notifications for applications running in the background, or notifications that appear on the screen in the form of conversation windows. For example, text information is prompted in the status bar, a prompt sound is emitted, the terminal vibrates, and the indicator light flashes, etc.
- Android Runtime includes core libraries and virtual machines. Android runtime is responsible for the scheduling and management of the Android system.
- the core library contains two parts: one is the functional functions that need to be called by the Java language, and the other is the core library of Android.
- the application layer and application framework layer run in virtual machines.
- the virtual machine executes the java files of the application layer and application framework layer into binary files.
- the virtual machine is used to perform object life cycle management, stack management, thread management, security and exception management, and garbage collection and other functions.
- System libraries can include multiple functional modules. For example: surface manager (surface manager), media libraries (Media Libraries), 3D graphics processing libraries (for example: OpenGL ES), 2D graphics engines (for example: SGL), etc.
- the surface manager is used to manage the display subsystem and provides the fusion of 2D and 3D layers for multiple applications.
- the media library supports playback and recording of a variety of commonly used audio and video formats, as well as static image files, etc.
- the media library can support a variety of audio and video encoding formats, such as: MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc.
- the 3D graphics processing library is used to implement 3D graphics drawing, image rendering, composition, and layer processing.
- 2D Graphics Engine is a drawing engine for 2D drawing.
- the kernel layer is the layer between hardware and software.
- the kernel layer contains at least display driver, camera driver, audio driver, and sensor driver.
- Figure 9B shows an offline control system provided by an embodiment of the present application.
- the offline control system includes an electronic device 100, an electronic device 200, a peripheral device 300 and a cloud server 400.
- the application layer of the electronic device 100, the electronic device 200, and the peripheral device 300 all include the device search APP, the application framework layer includes the terminal-side search network service, and the system module includes the network module and the short-range communication module (such as the BLE communication module) .
- the electronic device 200 and the peripheral device 300 are provided with the terminal-side search network service.
- the electronic device 200 and the peripheral device 300 do not need to install the search device APP; the electronic device 200 and the peripheral device 300 use the terminal-side search network service.
- the cloud server 400 includes a cloud-side search network service.
- the Find Device APP is used to receive user input operations to achieve pairing and binding of search network services between devices, trigger the device to query the offline location of the lost device, and trigger the device to issue offline instructions to control the lost device; offline Instructions are used to instruct the lost device to perform one or more of the following: data erasure, data encryption, data backup, playing sound, and setting loss mode.
- the device-side search network service is used to provide services such as pairing and binding of the search network, encryption and decryption of offline instructions and offline locations, assisting offline devices in reporting messages, storing offline instructions issued by the cloud, and forwarding offline instructions from the cloud to lost devices.
- the network module may be a network module corresponding to the aforementioned communication network 500, and is responsible for providing network connection services to realize communication between the device and the cloud server 400.
- Near field communication module such as BLE communication module
- BLE communication module is used to provide services such as low-power offline broadcast, scanning offline broadcast, and Generic Attribute Profile (GATT) connection.
- GATT is the service interface protocol of BLE.
- the cloud-side search network service is used to implement services such as encryption and decryption of offline instructions, storing offline instructions, issuing offline instructions, storing location ciphertext, issuing location ciphertext, and querying offline locations.
- the offline control method according to the embodiment of the present application is exemplarily described based on the offline control system shown in FIG. 9B.
- the device search APP of the electronic device 100 calls the end-side search network service to trigger the pairing process with the electronic device 200 .
- the above-mentioned pairing process includes the terminal-side search network service of the electronic device 100 calling the network module to send a pairing request to the cloud server 400.
- the pairing request is used to request to establish a binding relationship with the electronic device 200 to find the network service.
- the above pairing process also includes: the electronic device 100 and the electronic device 200 respectively generate the same key K1 based on the preset algorithm, the electronic device 100 and the cloud server 400 respectively generate the same key O1 based on the preset algorithm. 200 and cloud server 400 respectively generate the same key K2 based on the preset algorithm.
- the search device APP of the electronic device 100 receives the user's input operation 1; in response to the input operation 1, the above search device APP generates an offline instruction for the offline electronic device 200; the search device APP calls the end-side search network service through the network module Report the offline instruction to cloud server 400. After receiving the above offline instruction, the cloud side search network service of the cloud server 400 stores the offline instruction.
- the terminal-side search network service of the electronic device 100 is also used to encrypt the offline instructions through the key K1 and the key O1, and calls the network module to report the encrypted offline instructions to the cloud server 400.
- the terminal side of the electronic device 200 searches for network services and determines that the electronic device 200 is offline, it calls the BLE communication module to broadcast offline broadcast 1.
- the end-side search network service of the peripheral device 300 calls the BLE communication module to scan the offline broadcasts of other devices based on the preset scanning strategy, and scans for offline broadcast 1.
- the BLE communication module of the peripheral device 300 reports offline broadcast 1 to the end-side search network service of the device.
- the end-side search network service calls the network module of the device to send an assistance instruction message (i.e., the aforementioned message 2) to the cloud server 400.
- Association The assistance instruction message is used to indicate that the peripheral device 300 can assist the electronic device 200 in transmitting data.
- the cloud-side search network service of the cloud server 400 After receiving the assistance instruction message, the cloud-side search network service of the cloud server 400 issues the above-mentioned offline command to the peripheral device 300 .
- the cloud-side search network service of the cloud server 400 is also used to decrypt the offline instructions reported by the electronic device 100 through the key O1, and then encrypt them using the key K2; and then sends them to the peripheral device 300. Offline instructions encrypted by key K1 and key K2.
- the network module of the peripheral device 300 receives the above offline command and sends the above offline command to the end-side search network service of the peripheral device 300; the end-side search network service calls the BLE communication module of the peripheral device 300 to send the above offline command to the electronic device 200 instruction.
- the BLE communication module of the electronic device 200 After receiving the above offline command, the BLE communication module of the electronic device 200 sends the above offline command to the end-side search network service of the electronic device 200; the end-side search network service sends the above offline command to the search device APP of the electronic device 200; Find the device APP to execute the above offline instructions.
- the end-side search network service of the electronic device 200 is also used to decrypt the offline instructions sent by the peripheral device 300 through the key K2 and the key K1 to obtain the decrypted original offline instructions.
- the first electronic device may also be the aforementioned electronic device 100
- the second electronic device may be the aforementioned electronic device 200
- the third electronic device may be the aforementioned electronic device 300
- the server may be the aforementioned cloud server 400.
- the first identification may be the networking identification of the aforementioned electronic device 200 .
- the first message may be the aforementioned message 1
- the first offline message may be the aforementioned offline broadcast 1
- the second offline message may be the aforementioned offline broadcast 2
- the first instruction may be the aforementioned offline instruction
- the second message may be the aforementioned message 2.
- the third message may be the foregoing message 3
- the fourth message and the fifth message may be the foregoing message 4
- the sixth message may be the foregoing message 5.
- the first input operation may be the aforementioned input operation 1
- the first function control may be the function control shown in FIG. 6A, such as the lost mode control 407, the play sound control 408 and the data protection control 409.
- the first account may be the aforementioned account 1.
- the first function control is the lost mode control 407
- the first instruction is used to set the lost mode
- the first prompt information can be the prompt information 416 shown in Figure 6D
- the second prompt information can be the prompt shown in Figure 6E Information 417.
- the first functional control is the data protection control 409
- the first instruction is used to implement data erasure
- the first prompt information can be the prompt information 513 shown in Figure 7C
- the second prompt information can be the prompt information shown in Figure 7D Prompt information 514
- the third prompt information may be prompt information 515 shown in Figure 7E.
- the first functional control is the data protection control 409
- the first instruction is used to implement data encryption
- the first prompt information can be the prompt information 518 shown in Figure 7I
- the second prompt information can be the prompt shown in Figure 7J Information 519
- the third prompt information may be prompt information 520 shown in FIG. 7K
- the first option may be all options 505, or at least one of options 506 to 509
- the confirmation control may be confirmation control 511.
- the first key may be the aforementioned key K1, the second key may be the aforementioned key K2, and the third key may be the aforementioned key O1.
- the first ciphertext may be the aforementioned encrypted authentication information C1
- the second ciphertext may be the aforementioned encrypted authentication information C2
- the third ciphertext may be the aforementioned encrypted authentication information C3.
- the fourth ciphertext may be the aforementioned confirmation ciphertext.
- the fourth ciphertext may be the aforementioned confirmation ciphertext D2
- the fifth ciphertext may be the aforementioned confirmation ciphertext D3.
- the fourth key may be the aforementioned public key P
- the indication information of the derived public key may be the derived public key itself, or may be the Hash value of the derived public key.
- the first indication information may be the aforementioned indication information 1 (for example, derived public key Pi or Hash value 1)
- the second indication information may be the aforementioned indication information 2 (for example, derived public key Pi or Hash value 2).
- the computer program product includes one or more computer instructions.
- the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable device.
- the computer instructions may be stored in or transmitted from one computer-readable storage medium to another, e.g., the computer instructions may be transferred from a website, computer, server, or data center Transmission to another website, computer, server or data center through wired (such as coaxial cable, optical fiber, digital subscriber line) or wireless (such as infrared, wireless, microwave, etc.) means.
- the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains one or more available media integrated.
- the available media may be magnetic media (eg, floppy disk, hard disk, magnetic tape), optical media (eg, DVD), or semiconductor media (eg, solid state disk (SSD)), etc.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本申请公开了离线设备控制方法及相关装置,应用于离线设备控制系统,上述系统包括第二电子设备、第三电子设备和服务器,第二电子设备为离线状态;上述方法包括:服务器获取第一消息,第一消息用于指示第二电子设备执行第一指令;第二电子设备通过近距离通信模块广播第一离线消息;第三电子设备获取第一离线消息;响应于第一离线消息,第三电子设备向服务器发送第二消息;在接收到第二消息后,服务器向第三电子设备发送第三消息,第三消息用于指示第二电子设备执行第一指令;第三电子设备向第二电子设备发送第三消息;第二电子设备基于第三消息执行第一指令。这样,可以控制离线设备执行离线指令,以避免数据泄露和数据丢失,保护用户隐私安全。
Description
本申请要求于2022年3月11日提交中国专利局、申请号为202210238563.9、申请名称为“一种关机后多业务可用的方法”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。本申请要求于2022年6月1日提交中国专利局、申请号为202210618803.8、申请名称为“离线设备控制方法及相关装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请涉及电子技术领域,尤其涉及离线设备控制方法及相关装置。
笔记本电脑、平板或手机等移动设备丢失后,如果上述移动设备中存储有用户的重要数据,则有隐私泄露的风险。目前,为应对设备丢失,电子设备可以配置查找设备功能,针对登录同一账号的两个设备,用户可以在一个设备上查看另一个设备的定位,并可以控制另一个设备执行屏幕锁定等指令,以避免重要数据泄露,保护用户隐私安全。
然而,丢失设备在线(例如联网)的情况下,才能接收登录同一账号的其他设备的指令;若丢失设备一直离线(例如断网),用户无法控制丢失设备执行指令。尤其对于笔记本电脑等这类不能连接蜂窝网络的设备,在设备丢失后可能一直处于离线状态。
发明内容
本申请提供了离线设备控制方法及相关装置,可以控制离线设备执行离线指令,以避免数据泄露和数据丢失,保护用户隐私安全。
第一方面,本申请提供了一种离线设备控制方法,应用于离线设备控制系统,上述系统包括第二电子设备、第三电子设备和服务器,第二电子设备为离线状态;上述方法包括:服务器获取第一消息,第一消息用于指示第二电子设备执行第一指令;第二电子设备通过近距离通信模块广播第一离线消息;第三电子设备获取第一离线消息;响应于第一离线消息,第三电子设备向服务器发送第二消息;在接收到第二消息后,服务器向第三电子设备发送第三消息,第三消息用于指示第二电子设备执行第一指令;第三电子设备向第二电子设备发送第三消息;第二电子设备基于第三消息执行第一指令。
实施本申请实施例,设备离线时,可以广播离线消息;离线设备附近在线的周边设备收到上述离线消息后,可以向服务器上报消息,以指示该周边设备可以协助离线设备和服务器传输消息。这样,服务器可以经周边设备向离线设备发送消息,来控制离线设备执行特定任务,进而可以避免丢失的离线设备的数据丢失和数据泄露,保护用户隐私。
在一种实现方式中,上述系统还包括第一电子设备,服务器获取第一消息前,上述方法还包括:第一电子设备接收用户的第一输入操作;响应于第一输入操作,第一电子设备向服务器发送第一消息。实施本申请实施例,在设备离线时,用户也可以利用其他电子设备触发针对离线设备的离线指令,以控制离线设备执行特定任务。
在一种实现方式中,上述第一电子设备接收用户的第一输入操作前,上述方法还包括:第一电子设备显示第一应用的第一界面,第一界面包括第一功能控件,第一功能控件用于触
发第一电子设备生成用于控制第二电子设备的第一指令;上述第一电子设备接收用户的第一输入操作,包括:第一电子设备接收用户针对第一功能控件的第一输入操作,第一输入操作包括一或多个操作。实施本申请实施例,在设备离线时,用户也可以利用其他电子设备安装的特定应用(例如查找设备应用),向服务器发送针对离线设备的离线指令,以控制离线设备执行特定任务,有效提高用户体验。
在一种实现方式中,第一界面还包括第二电子设备的第一标识,第一标识用于指示第二电子设备当前处于离线状态。实施本申请实施例,通过电子设备安装的特定应用(例如查找设备应用),用户可以查看其他设备是否处于离线状态;这样,可以便于用户及时获取其他设备的离线状态,进而及时通过离线指令对离线设备进行离线控制,以避免离线设备的数据丢失和数据泄露,有效提高用户体验。
在一种实现方式中,第二消息用于指示第三电子设备可以协助离线的第二电子设备传输消息。实施本申请实施例,服务器可以基于离线设备的周边设备上传的消息,确定可以通过该周边设备向离线设备发送离线指令,以实现对离线设备的离线控制。
在一种实现方式中,第二消息用于指示第三电子设备获取的第二电子设备的离线位置。可选的,上述离线位置可以是周边设备的定位模块获取的本设备的位置,由于周边设备在离线设备附近,因此可以将周边设备的位置视为离线设备当前的离线位置。可选的,上述离线位置也可以是周边设备以本设备的位置为参考位置,利用近距离定位技术获取的离线设备的当前位置。实施本申请实施例,即使设备离线,服务器和触发离线指令的第一电子设备也可以获知离线设备的位置。
在一种实现方式中,上述方法还包括:第二电子设备执行第一指令后,通过近距离通信模块发送第四消息,第四消息用于指示第二电子设备已执行第一指令;第三电子设备接收第四消息;第三电子设备向服务器发送第五消息,第五消息用于指示第二电子设备已执行第一指令;服务器向第一电子设备发送第六消息,第六消息用于指示第二电子设备已执行第一指令。实施本申请实施例,离线设备执行离线指令后,可以向触发离线指令的第一电子设备反馈确认消息,以便于第一电子设备及时了解是否成功实现对离线设备的控制。
在一种实现方式中,上述方法还包括:响应于第一输入操作,第一电子设备显示第一提示信息,第一提示信息用于提示正在指示离线的第二电子设备执行第一指令。实施本申请实施例,通过上述提示信息,用户可以及时了解对离线设备的控制进度,有效提高用户体验。
在一种实现方式中,上述方法还包括:第一电子设备接收到第六消息后,基于第六消息显示第二提示信息;第二提示信息用于提示第二电子设备已执行第一指令。实施本申请实施例,通过上述提示信息,用户可以及时了解对离线设备的控制结果,有效提高用户体验。
在一种实现方式中,第一指令用于实现以下一项或多项操作:数据擦除、数据加密、数据备份、屏幕锁定、显示预设的锁屏信息和播放预设音频。本申请实施例对第一指令可以实现的操作不做具体限定。
在一种实现方式中,第一输入操作包括第二输入操作、第三输入操作和第四输入操作;上述第一电子设备接收用户的第一输入操作,包括:第一电子设备接收作用于第一功能控件的第二输入操作;响应于第二输入操作,第一电子设备显示确认控件和至少两个文件类型选项,至少两个文件类型选项包括第一选项;第一电子设备接收作用于第一选项的第三输入操作;第一电子设备接收作用于确认控件的第四输入操作;第一指令用于实现数据擦除、数据加密、数据备份等数据保护操作中的一项或多项,第一指令还包括数据保护操作针对的文件
类型,数据保护操作针对的文件类型包括第一选项对应的文件类型。实施本申请实施例,用户可以选择要进行数据保护的文件类型,满足用户的多样化需求,有效提高用户体验。
在一种实现方式中,第一指令用于实现数据擦除、数据加密、数据备份等数据保护操作中的一项或多项,上述第二电子设备基于第三消息执行第一指令后,上述方法还包括:第二电子设备显示第三提示信息,第三提示信息用于提示第二电子设备已执行第一指令。实施本申请实施例,离线设备执行来自其他设备的离线指令后,可以显示提示信息提示用户已进行数据擦除、数据加密或数据备份,有效提高用户体验。
在一种实现方式中,上述第三电子设备向第二电子设备发送第三消息,包括:第三电子设备接收第三消息后,当扫描到第二电子设备广播的第二离线消息时,通过近距离通信模块向第二电子设备发送第三消息。实施本申请实施例,周边设备再次靠近离线设备时,可以向离线设备发送离线指令对应的消息;这样,只要离线设备附近有在线的周边设备,就可以控制离线设备执行离线指令。
在一种实现方式中,上述第一电子设备接收用户的第一输入操作前,还包括:第一电子设备登录第一应用的第一账号;第二电子设备登录第一应用的第一账号;第一电子设备和第二电子设备基于第一应用的第一账号建立绑定关系。实施本申请实施例,用户可以通过第一电子设备上的特定应用(例如查找设备应用)提前绑定一或多个其他设备。这样,即使在其他设备离线时,也可以通过第一电子设备触发离线指令,以控制已绑定的离线设备。
在一种实现方式中,第一电子设备和第二电子设备持有第一密钥,第一密钥用于第一电子设备和第二电子设备互相认证身份;第二电子设备和服务器持有第二密钥,第二密钥用于第二电子设备和服务器互相认证身份;第一电子设备和服务器持有第三密钥,第三密钥用于第一电子设备和服务器互相认证身份;第一消息包括第二密文,第二密文是第一电子设备利用第一密钥和第三密钥依序对第一指令加密后生成的;第三消息包括第三密文,第三密文是服务器利用第三密钥对第二密文解密后,再利用第二密钥加密后生成的;第一指令是第二电子设备利用第二密钥和第一密钥对第三密文解密后获取的。实施本申请实施例,离线设备控制过程中,两两设备间利用特定密钥对离线指令进行加密传输,以认证对方身份;这样,可以避免恶意设备伪造和篡改离线指令,保障离线设备控制的安全性。
在一种实现方式中,第四消息和第五消息包括确认消息的第四密文,第四密文是第二电子设备利用第二密钥对确认消息加密后生成的,确认消息用于指示第二电子设备已执行第一指令;第六消息包括确认消息,确认消息是服务器利用第二密钥对第四密文解密后获取的。实施本申请实施例,离线设备控制过程中,设备间利用特定密钥对确认消息进行加密传输,以认证对方身份;这样,可以避免恶意设备伪造和篡改确认消息,保障离线设备控制的安全性。
在一种实现方式中,第四消息和第五消息包括确认消息的第四密文,第四密文是第二电子设备利用第一密钥和第二密钥对确认消息依序加密后生成的,确认消息用于指示第二电子设备已执行第一指令;第六消息包括确认消息的第五密文,第五密文是服务器利用第二密钥对第四密文解密,再利用第三密钥加密后生成的;上述方法还包括:第一电子设备接收到服务器发送的第六消息后,利用第三密钥和第一密钥依序对第五密文解密,获取确认消息。实施本申请实施例,离线设备控制过程中,设备间利用特定密钥对确认消息进行加密传输,以认证对方身份;这样,可以避免恶意设备伪造和篡改确认消息,保障离线设备控制的安全性。
在一种实现方式中,接收用户的第一输入操作前,第一电子设备和第二电子设备建立了
绑定关系,第一密钥、第二密钥和第三密钥是第一电子设备和第二电子设备的绑定过程中生成的;服务器存储有第二电子设备的第二设备标识和第二密钥的第一对应关系,以及第一电子设备的第一设备标识和第三密钥的第二对应关系。实施本申请实施例,第一电子设备和第二电子设备进行绑定时,第一电子设备、第二电子设备和服务器可以预先协商认证对方身份的密钥,以便于对后续的离线指令和/或确认消息进行加密传输,保障离线设备控制的安全性。
在一种实现方式中,第一电子设备和第二电子设备的绑定过程中还生成了第四密钥,第一电子设备和第二电子设备均持有第四密钥;第一消息还包括第四密钥的派生密钥的第一指示信息和第二电子设备的第二设备标识;服务器接收第一消息后,服务器基于第一消息存储有第二密文、第一指示信息和第二设备标识的第三对应关系;第一离线消息还包括第四密钥的派生密钥;第二消息还包括第四密钥的派生密钥的第二指示信息;上述服务器向第三电子设备发送第三消息之前,上述方法还包括:服务器将第一指示信息和第二指示信息进行匹配;当第一指示信息和第二指示信息匹配成功时,服务器基于第一指示信息对应的第二密文生成第三密文。可选的,派生密钥的指示信息可以为派生密钥本身,或派生密钥的Hash值。实施本申请实施例,离线控制过程中,与周边设备间的消息传输可以均未携带离线设备的设备信息(例如设备标识),而是通过派生密钥的指示信息来暗指离线设备;这样,可以避免离线设备被追踪,避免恶意设备利用设备信息伪造和篡改来自离线设备的消息,保障离线控制的安全性。
在一种实现方式中,上述服务器基于第一指示信息对应的第二密文生成第三密文,包括:基于第三对应关系确定第一指示信息对应的目标设备的设备标识为第二电子设备的第二设备标识;基于第一对应关系确定用于认证第一电子设备的身份的第三密钥,基于第二对应关系确定用于认证第二电子设备的身份的第二密钥;服务器利用第三密钥对第二密文进行解密,获取解密后的第一密文;再利用第二密钥对第一密文进行加密,获取加密后第三密文。
在一种实现方式中,第三消息还包括第四密钥的派生密钥的第一指示信息;上述第三电子设备接收第三消息后,上述方法还包括:第三电子设备扫描到第二电子设备广播的第二离线消息,第二离线消息包括第四密钥的派生密钥;上述第三电子设备向第二电子设备发送第三消息,包括:若第二离线消息中第四密钥的派生密钥的指示信息和第一指示信息匹配成功,则第三电子设备通过近距离通信模块向第二电子设备发送第三消息。
在一种实现方式中,第一电子设备和第二电子设备的绑定过程中,第一电子设备和第二电子设备基于预设算法分别生成第一密钥,第二电子设备和服务器基于预设算法分别生成第二密钥,第一电子设备和服务器基于预设算法分别生成第三密钥。
第二方面,本申请提供了一种离线设备控制方法,应用于服务器,其特征在于,包括:服务器获取第一消息,第一消息用于指示第二电子设备执行第一指令;服务器接收第三电子设备发送的第二消息,第二消息是第三电子设备通过近距离通信模块扫描到第二电子设备广播的第一离线消息后发送的,第一离线消息是第二电子设备处于离线状态时广播的;在接收到第二消息后,服务器经第三电子设备向离线的第二电子设备发送第三消息,第三消息用于指示第二电子设备执行第一指令。
实施本申请实施例,设备离线时,可以广播离线消息;离线设备附近在线的周边设备收到上述离线消息后,可以向服务器上报消息,以指示该周边设备可以协助离线设备和服务器传输消息。这样,服务器可以经周边设备向离线设备发送消息,来控制离线设备执行特定任务,进而可以避免丢失的离线设备的数据丢失和数据泄露,保护用户隐私。
在一种实现方式中,上述服务器获取第一消息,包括:服务器接收第一电子设备发送的第一消息。实施本申请实施例,在设备离线时,用户也可以利用其他电子设备触发针对离线设备的离线指令,以控制离线设备执行特定任务。
在一种实现方式中,第二消息用于指示第三电子设备可以协助离线的第二电子设备传输消息。实施本申请实施例,服务器可以基于离线设备的周边设备上传的消息,确定可以通过该周边设备向离线设备发送离线指令,以实现对离线设备的离线控制。
在一种实现方式中,第二消息用于指示第三电子设备获取的第二电子设备的离线位置。可选的,上述离线位置可以是周边设备的定位模块获取的本设备的位置,由于周边设备在离线设备附近,因此可以将周边设备的位置视为离线设备当前的离线位置。可选的,上述离线位置也可以是周边设备以本设备的位置为参考位置,利用近距离定位技术获取的离线设备的当前位置。实施本申请实施例,即使设备离线,服务器和触发离线指令的第一电子设备也可以获知离线设备的位置。
在一种实现方式中,第一指令用于实现以下一项或多项操作:数据擦除、数据加密、数据备份、屏幕锁定、显示预设的锁屏信息和播放预设音频。本申请实施例对第一指令可以实现的操作不做具体限定。
在一种实现方式中,第一指令用于实现数据擦除、数据加密、数据备份等数据保护操作中的一项或多项时,第一指令包括数据保护操作针对的文件类型。实施本申请实施例,用户可以选择要进行数据保护的文件类型,满足用户的多样化需求,有效提高用户体验。
在一种实现方式中,上述服务器获取第一消息前,还包括:服务器接收第一电子设备和/或第二电子设备的绑定请求,绑定请求用于请求为第一电子设备和第二电子设备基于第一应用的第一账号建立绑定关系,第一电子设备和第二电子设备均登录了第一账号。实施本申请实施例,用户可以通过第一电子设备上的特定应用(例如查找设备应用)提前绑定一或多个其他设备。这样,即使在其他设备离线时,也可以通过第一电子设备触发离线指令,以控制已绑定的离线设备。
在一种实现方式中,第一电子设备和第二电子设备持有第一密钥,第一密钥用于第一电子设备和第二电子设备互相认证身份;第二电子设备和服务器持有第二密钥,第二密钥用于第二电子设备和服务器互相认证身份;第一电子设备和服务器持有第三密钥,第三密钥用于第一电子设备和服务器互相认证身份;第一消息包括第二密文,第二密文是第一电子设备利用第一密钥和第三密钥依序对第一指令加密后生成的;第三消息包括第三密文,第三密文是服务器利用第三密钥对第二密文解密后,再利用第二密钥加密后生成的;第一指令,是第二电子设备利用第二密钥和第一密钥对第三密文解密后获取的。实施本申请实施例,离线设备控制过程中,两两设备间利用特定密钥对离线指令进行加密传输,以认证对方身份;这样,可以避免恶意设备伪造和篡改离线指令,保障离线设备控制的安全性。
在一种实现方式中,上述方法还包括:服务器接收第三电子设备发送的第五消息,第五消息是第三电子设备通过近距离通信模块接收第二电子设备发送的第四消息后发送的,第四消息和第五消息用于指示第二电子设备已执行第一指令;服务器向第一电子设备发送第六消息,第六消息用于指示第二电子设备已执行第一指令。实施本申请实施例,离线设备执行离线指令后,可以向触发离线指令的第一电子设备反馈确认消息,以便于第一电子设备及时了解是否成功实现对离线设备的控制。
在一种实现方式中,第四消息和第五消息包括确认消息的第四密文,第四密文是第二电
子设备利用第二密钥对确认消息加密后生成的,确认消息用于指示第二电子设备已执行第一指令;第六消息包括确认消息,确认消息是服务器利用第二密钥对第四密文解密后获取的。实施本申请实施例,离线设备控制过程中,设备间利用特定密钥对确认消息进行加密传输,以认证对方身份;这样,可以避免恶意设备伪造和篡改确认消息,保障离线设备控制的安全性。
在一种实现方式中,第四消息和第五消息包括确认消息的第四密文,第四密文是第二电子设备利用第一密钥和第二密钥对确认消息依序加密后生成的,确认消息用于指示第二电子设备已执行第一指令;第六消息包括确认消息的第五密文,第五密文是服务器利用第二密钥对第四密文解密,再利用第三密钥加密后生成的;第一电子设备获取的确认消息,是第一电子设备利用第三密钥和第一密钥对第五密文解密后获取的。实施本申请实施例,离线设备控制过程中,设备间利用特定密钥对确认消息进行加密传输,以认证对方身份;这样,可以避免恶意设备伪造和篡改确认消息,保障离线设备控制的安全性。
在一种实现方式中,服务器获取第一消息前,第一电子设备和第二电子设备建立了绑定关系,第一密钥、第二密钥和第三密钥是第一电子设备和第二电子设备的绑定过程中生成的;服务器存储有第二电子设备的设备标识和第二密钥的第一对应关系,以及第一电子设备的设备标识和第三密钥的第二对应关系。实施本申请实施例,第一电子设备和第二电子设备进行绑定时,第一电子设备、第二电子设备和服务器可以预先协商认证对方身份的密钥,以便于对后续的离线指令和/或确认消息进行加密传输,保障离线设备控制的安全性。
在一种实现方式中,第一电子设备和第二电子设备的绑定过程中还生成了第四密钥,第一电子设备和第二电子设备均持有第四密钥;第一消息还包括第四密钥的派生密钥的第一指示信息和第二电子设备的第二设备标识;服务器获取第一消息后,服务器基于第一消息存储有第二密文、第一指示信息和第二电子设备的设备标识的第三对应关系;第一离线消息还包括第四密钥的派生密钥;第二消息还包括第四密钥的派生密钥的第二指示信息;上述服务器经第三电子设备向离线的第二电子设备发送第三消息之前,上述方法还包括:服务器将第一指示信息和第二指示信息进行匹配;当第一指示信息和第二指示信息匹配成功时,服务器基于第一指示信息对应的第二密文生成第三密文。可选的,派生密钥的指示信息可以为派生密钥本身,或派生密钥的Hash值。实施本申请实施例,离线控制过程中,与周边设备间的消息传输可以均未携带离线设备的设备信息(例如设备标识),而是通过派生密钥的指示信息来暗指离线设备;这样,可以避免离线设备被追踪,避免恶意设备利用设备信息伪造和篡改来自离线设备的消息,保障离线控制的安全性。
在一种实现方式中,上述服务器基于第一指示信息对应的第二密文生成第三密文,包括:基于第三对应关系确定第一指示信息对应的目标设备的设备标识为第二电子设备的第二设备标识;基于第一对应关系确定用于认证第一电子设备的身份的第三密钥,基于第二对应关系确定用于认证第二电子设备的身份的第二密钥;服务器利用第三密钥对第二密文进行解密,获取解密后的第一密文;再利用第二密钥对第一密文进行加密,获取加密后第三密文。
第三方面,本申请提供了一种离线设备控制方法,应用于处于离线状态的第二电子设备,其特征在于,上述方法包括:第二电子设备处于离线状态时,通过近距离通信模块广播第一离线消息;第二电子设备接收服务器经附近在线的第三电子设备发送的第三消息;第三消息是服务器获取第一消息和第三电子设备的第二消息后发送的,第二消息是第三电子设备在接收到第一离线消息后发送的,第一消息和第三消息用于指示第二电子设备执行第一指令;第
二电子设备基于第三消息执行第一指令。
实施本申请实施例,设备离线时,可以广播离线消息;离线设备附近在线的周边设备收到上述离线消息后,可以向服务器上报消息,以指示该周边设备可以协助离线设备和服务器传输消息。这样,服务器可以经周边设备向离线设备发送消息,来控制离线设备执行特定任务,进而可以避免丢失的离线设备的数据丢失和数据泄露,保护用户隐私。
在一种实现方式中,第一消息是第一电子设备发送给服务器的。实施本申请实施例,在设备离线时,用户也可以利用其他电子设备触发针对离线设备的离线指令,以控制离线设备执行特定任务。
在一种实现方式中,第二消息用于指示第三电子设备可以协助离线的第二电子设备传输消息。实施本申请实施例,服务器可以基于离线设备的周边设备上传的消息,确定可以通过该周边设备向离线设备发送离线指令,以实现对离线设备的离线控制。
在一种实现方式中,第二消息用于指示第三电子设备获取的第二电子设备的离线位置。实施本申请实施例,即使设备离线,服务器和触发离线指令的第一电子设备也可以获知离线设备的位置。
在一种实现方式中,上述方法还包括:第二电子设备执行第一指令后,经第三电子设备向服务器发送第七消息,第七消息用于指示第二电子设备已执行第一指令。实施本申请实施例,离线设备执行离线指令后,可以向触发离线指令的第一电子设备反馈确认消息,以便于第一电子设备及时了解是否成功实现对离线设备的控制。
在一种实现方式中,第一指令用于实现以下一项或多项操作:数据擦除、数据加密、数据备份、屏幕锁定、显示预设的锁屏信息和播放预设音频。本申请实施例对第一指令可以实现的操作不做具体限定。
在一种实现方式中,第一指令用于实现数据擦除、数据加密、数据备份等数据保护操作中的一项或多项时,第一指令包括数据保护操作针对的文件类型。实施本申请实施例,用户可以选择要进行数据保护的文件类型,满足用户的多样化需求,有效提高用户体验。
在一种实现方式中,第一指令用于实现数据擦除、数据加密、数据备份等数据保护操作中的一项或多项,上述第二电子设备基于第三消息执行第一指令后,上述方法还包括:第二电子设备显示第三提示信息,第三提示信息用于提示第二电子设备已执行第一指令。
在一种实现方式中,上述通过近距离通信模块广播第一离线消息前,还包括:第二电子设备登录第一应用的第一账号;第二电子设备和第一电子设备基于第一应用的第一账号建立绑定关系。实施本申请实施例,用户可以通过第一电子设备上的特定应用(例如查找设备应用)提前绑定一或多个其他设备。这样,即使在其他设备离线时,也可以通过第一电子设备触发离线指令,以控制已绑定的离线设备。
在一种实现方式中,第一电子设备和第二电子设备持有第一密钥,第一密钥用于第一电子设备和第二电子设备互相认证身份;第二电子设备和服务器持有第二密钥,第二密钥用于第二电子设备和服务器互相认证身份;第一电子设备和服务器持有第三密钥,第三密钥用于第一电子设备和服务器互相认证身份;第一消息包括第二密文,第二密文是第一电子设备利用第一密钥和第三密钥依序对第一指令加密后生成的;第三消息包括第三密文,第三密文是服务器利用第三密钥对第二密文解密后,再利用第二密钥加密后生成的;第一指令,是第二电子设备利用第二密钥和第一密钥对第三密文解密后获取的。实施本申请实施例,离线设备控制过程中,两两设备间利用特定密钥对离线指令进行加密传输,以认证对方身份;这样,
可以避免恶意设备伪造和篡改离线指令,保障离线设备控制的安全性。
在一种实现方式中,第七消息包括确认消息的第四密文;第四密文是第二电子设备利用第二密钥加密生成的,或者,第四密文是第二电子设备利用第二密钥和第一密钥加密生成的,第二密钥用于服务器验证确认消息的密文来自第二电子设备,第一密钥用于第一电子设备验证确认消息的密文来自第二电子设备。实施本申请实施例,离线设备控制过程中,设备间利用特定密钥对确认消息进行加密传输,以认证对方身份;这样,可以避免恶意设备伪造和篡改确认消息,保障离线设备控制的安全性。
在一种实现方式中,通过近距离通信模块广播第一离线消息前,第一电子设备和第二电子设备建立了绑定关系,所述第一密钥、第二密钥和第三密钥是第一电子设备和第二电子设备的绑定过程中生成的。实施本申请实施例,第一电子设备和第二电子设备进行绑定时,第一电子设备、第二电子设备和服务器可以预先协商认证对方身份的密钥,以便于对后续的离线指令和/或确认消息进行加密传输,保障离线设备控制的安全性。
第四方面,本申请提供了一种电子设备,包括一个或多个处理器和一个或多个存储器。该一个或多个存储器与一个或多个处理器耦合,一个或多个存储器用于存储计算机程序代码,计算机程序代码包括计算机指令,当一个或多个处理器执行计算机指令时,使得电子设备执行上述第一方面、第二方面或第三方面任一项可能的实现方式中的离线设备控制方法。
第五方面,本申请实施例提供了一种计算机存储介质,包括计算机指令,当计算机指令在电子设备上运行时,使得电子设备执行上述第一方面、第二方面或第三方面任一项可能的实现方式中的离线设备控制方法。
第六方面,本申请实施例提供了一种计算机程序产品,当计算机程序产品在计算机上运行时,使得计算机执行上述第一方面、第二方面或第三方面任一项可能的实现方式中的离线设备控制方法。
图1为本申请实施例提供的通信系统的系统架构示意图;
图2为本申请实施例提供的电子设备的结构示意图;
图3为本申请实施例提供的云服务器的结构示意图;
图4A至图4D为本申请实施例提供的查找设备APP的相关用户界面;
图5A至图5H为本申请实施例提供的查找设备的配对绑定的相关用户界面;
图6A至图6E为本申请实施例提供的控制离线设备的相关用户界面;
图7A至图7L为本申请实施例提供的控制离线设备的相关用户界面;
图8A为本申请实施例提供的离线设备控制方法的流程示意图;
图8B为本申请实施例提供的离线设备控制方法的流程示意图;
图8C为本申请实施例提供的信息传输示意图;
图9A为本申请实施例提供的电子设备的软件结构示意图;
图9B为本申请实施例提供的离线设备控制系统的系统架构示意图。
下面将结合附图对本申请实施例中的技术方案进行清楚、详尽地描述。其中,在本申请实施例的描述中,除非另有说明,“/”表示或的意思,例如,A/B可以表示A或B;文本中的“和/或”仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可
以表示:单独存在A,同时存在A和B,单独存在B这三种情况,另外,在本申请实施例的描述中,“多个”是指两个或多于两个。
以下,术语“第一”、“第二”仅用于描述目的,而不能理解为暗示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括一个或者更多个该特征,在本申请实施例的描述中,除非另有说明,“多个”的含义是两个或两个以上。
本申请以下实施例中的术语“用户界面(user interface,UI)”,是应用程序或操作系统与用户之间进行交互和信息交换的介质接口,它实现信息的内部形式与用户可以接受形式之间的转换。用户界面是通过java、可扩展标记语言(extensible markup language,XML)等特定计算机语言编写的源代码,界面源代码在电子设备上经过解析,渲染,最终呈现为用户可以识别的内容。用户界面常用的表现形式是图形用户界面(graphic user interface,GUI),是指采用图形方式显示的与计算机操作相关的用户界面。它可以是在电子设备的显示屏中显示的文本、图标、按钮、菜单、选项卡、文本框、对话框、状态栏、导航栏、Widget等可视的界面元素。
首先介绍本申请实施例提供涉及的通信系统10。
图1示例性地示出了本申请实施例中提供的一种通信系统10示意图。如图1所示,该通信系统10包括电子设备100,与电子设备100建立查找设备的绑定关系的一或多个电子设备(例如电子设备200),电子设备200附近的一或多个在线的周边设备(例如周边设备300),以及云端设备(例如云服务器400)。
电子设备100、电子设备200和周边设备300可以是手机、平板电脑、桌面型计算机、膝上型计算机、手持计算机、笔记本电脑、超级移动个人计算机(ultra-mobile personal computer,UMPC)、上网本,还可以是蜂窝电话、个人数字助理(personal digital assistant,PDA)、增强现实(augmented reality,AR)设备、虚拟现实(virtual reality,VR)设备、人工智能(artificial intelligence,AI)设备、可穿戴式设备(智能手环)、车载设备、智能家居设备(智能电视机、智慧屏、大屏设备等)和/或智慧城市设备。电子设备200还可以是音箱、蓝牙耳机等未配置显示屏的数码设备。本申请实施例对电子设备100、电子设备200和周边设备300的具体类型不作特殊限制。电子设备100和电子设备200可以搭载相同的操作系统,也可以搭载不同的操作系统,例如iOS、Android、Microsoft、鸿蒙等操作系统。
云服务器400可以是一台服务器,或者由多台服务器组成的服务器集群,或者是一个云端计算中心。
电子设备100、电子设备200和周边设备300,可以通过一个或多个通信网络500与云服务器400进行通信。通信网络500可以是局域网(local area networks,LAN),也可以是广域网(wide area networks,WAN),例如互联网。该通信网络500可使用任何已知的网络通信协议来实现,上述网络通信协议可以是各种有线或无线通信协议,诸如以太网、通用串行总线(universal serial bus,USB)、火线(FIREWIRE)、全球移动通讯系统(global system for mobile communications,GSM)、通用分组无线服务(general packet radio service,GPRS)、码分多址接入(code division multiple access,CDMA)、宽带码分多址(wideband code division multiple access,WCDMA),时分码分多址(time-division code division multiple access,TD-SCDMA),长期演进(long term evolution,LTE)、蓝牙(bluetooth,BT)、无线保真(wireless fidelity,Wi-Fi)、近场通信(near field communication,NFC)、基于互联网协议的语音通话(voice over Internet protocol,
VoIP)、超宽带(ultra wide band,UWB)、ZigBee通信、支持网络切片架构的通信协议或任何其他合适的通信协议。
在一些实现方案中,电子设备在线指:电子设备接入通信网络500(即局域网和/或广域网),可以通过上述通信网络500和云服务器400通信;电子设备离线指:电子设备未接入上述通信网络500,不能和云服务器400通信。在一些实现方案中,电子设备在线指:电子设备接入通信网络500,可以通过上述通信网络500和云服务器400通信,且电子设备连接有SIM卡。电子设备离线指:电子设备未接入上述通信网络500,和/或电子设备未连接SIM卡。
需要说明的是,上述SIM卡可以为实体SIM卡,电子设备具备SIM卡接口,通过上述SIM卡接口可以连接实体SIM卡;或者,上述SIM卡也可以为虚拟SIM卡,电子设备连接虚拟SIM卡,即接入运营商网络。
电子设备100配置显示屏,与电子设备200绑定后,可以为电子设备200提供查找设备的相关功能。电子设备200离线时,用户也可通过电子设备100向云服务器400发送离线指令;离线指令用于控制离线的电子设备200实现查找设备的相关功能,例如执行数据擦除、数据加密、数据备份、屏幕锁定或播放声音等。可选的,电子设备100和电子设备200绑定后,电子设备200也可以为电子设备100提供查找设备的相关功能。
本申请实施例中,电子设备100和电子设备200具备端侧查找网络服务,端侧查找网络服务用于提供离线控制的相关服务,例如离线指令的发送、加密和解密;电子设备100和电子设备200间的查找设备的绑定关系,也可以称为查找网络的绑定关系。本申请实施例中,电子设备100和电子设备200可以通过近距离通信技术建立查找设备的绑定关系,也可以通过登录同一账号建立查找设备的绑定关系,本申请实施例对电子设备100和电子设备200建立查找设备的绑定关系的方式不做具体限定。上述近距离通信技术可以是蓝牙通信技术,还可以是NFC技术、UWB通信技术、ZigBee通信技术等,本申请实施例对比也不做具体限定。
电子设备200可以配置有显示屏,也可以未配置显示屏。电子设备200判断本设备离线时,可以通过特定的近距离通信技术(例如低功耗的蓝牙(Bluetooth Low Energy,BLE)通信技术)发送离线广播。BLE通信技术是一种个人局域网技术,相较传统的蓝牙通信技术,BLE通信技术旨在保持同等通信范围的同时显著降低功耗和成本。
周边设备300具备端侧查找网络服务,可以监听通过特定的近距离通信技术(例如BLE通信技术)发送的离线广播。在线的周边设备300监听到电子设备200的离线广播后,可以向云服务器400发送针对电子设备200的协助指示消息。
需要说明的是,电子设备100与电子设备200间配对绑定采用的近距离通信技术(例如Wi-Fi通信技术),和,周边设备300与电子设备200间收发数据采用的近距离通信技术(例如BLE通信技术),可以相同,也可以不同,此处不做具体限定。
云服务器400可以存储电子设备100发送的离线指令。接收周边设备300发送的协助指示消息后,可以通过在线的周边设备300向离线的电子设备200转发电子设备100的离线指令,以控制离线的电子设备200执行上述离线指令(例如数据擦除或数据加密等),保证丢失的电子设备200的数据安全。
基于本申请实施例提供的通信系统10,在丢失的电子设备200离线时,也可以控制电子设备200执行电子设备100的离线指令,以避免数据泄露和数据丢失,保护用户隐私安全。
电子设备100、电子设备200、周边设备300和云服务器400可以部署在陆地上,包括室内、室外、手持或车载,也可以部署在水面上,还可以部署在空中的飞机和人造卫星上,本
申请实施例对此均不做限定。
应当理解,图1仅仅为本申请实施例提供的通信系统的系统结构示意图,并不构成对通信系统10的具体限定,通信系统10可以包括比图示更多或更少的设备,例如,还可以包括无线中继设备和无线回传设备(图1中未示出),在此不做限定。
下面介绍本申请实施例提供的一种电子设备100的结构。本申请实施例涉及的电子设备200和周边设备300的结构可以参考电子设备200的相关描述,后续不再赘述。
图2示出了电子设备100的结构示意图。电子设备100可以包括处理器110,外部存储器接口120,内部存储器121,通用串行总线(universal serial bus,USB)接口130,充电管理模块140,电源管理模块141,电池142,天线1,天线2,移动通信模块150,无线通信模块160,音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,传感器模块180,按键190,马达191,指示器192,摄像头193,显示屏194,以及用户标识模块(subscriber identification module,SIM)卡接口195等。其中传感器模块180可以包括压力传感器180A,陀螺仪传感器180B,气压传感器180C,磁传感器180D,加速度传感器180E,距离传感器180F,接近光传感器180G,指纹传感器180H,温度传感器180J,触摸传感器180K,环境光传感器180L,骨传导传感器180M等。
可以理解的是,本发明实施例示意的结构并不构成对电子设备100的具体限定。在本申请另一些实施例中,电子设备100可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。图示的部件可以以硬件,软件或软件和硬件的组合实现。
处理器110可以包括一个或多个处理单元,例如:处理器110可以包括应用处理器(application processor,AP),调制解调处理器,图形处理器(graphics processing unit,GPU),图像信号处理器(image signal processor,ISP),控制器,视频编解码器,数字信号处理器(digital signal processor,DSP),基带处理器,和/或神经网络处理器(neural-network processing unit,NPU)等。其中,不同的处理单元可以是独立的器件,也可以集成在一个或多个处理器中。
控制器可以根据指令操作码和时序信号,产生操作控制信号,完成取指令和执行指令的控制。
处理器110中还可以设置存储器,用于存储指令和数据。在一些实施例中,处理器110中的存储器为高速缓冲存储器。该存储器可以保存处理器110刚用过或循环使用的指令或数据。如果处理器110需要再次使用该指令或数据,可从所述存储器中直接调用。避免了重复存取,减少了处理器110的等待时间,因而提高了系统的效率。
在一些实施例中,处理器110可以包括一个或多个接口。接口可以包括集成电路(inter-integrated circuit,I2C)接口,集成电路内置音频(inter-integrated circuit sound,I2S)接口,脉冲编码调制(pulse code modulation,PCM)接口,通用异步收发传输器(universal asynchronous receiver/transmitter,UART)接口,移动产业处理器接口(mobile industry processor interface,MIPI),通用输入输出(general-purpose input/output,GPIO)接口,用户标识模块(subscriber identity module,SIM)接口,和/或通用串行总线(universal serial bus,USB)接口等。
I2C接口是一种双向同步串行总线,包括一根串行数据线(serial data line,SDA)和一根串行时钟线(derail clock line,SCL)。在一些实施例中,处理器110可以包含多组I2C总线。处理器110可以通过不同的I2C总线接口分别耦合触摸传感器180K,充电器,闪光灯,摄像头
193等。例如:处理器110可以通过I2C接口耦合触摸传感器180K,使处理器110与触摸传感器180K通过I2C总线接口通信,实现电子设备100的触摸功能。
I2S接口可以用于音频通信。在一些实施例中,处理器110可以包含多组I2S总线。处理器110可以通过I2S总线与音频模块170耦合,实现处理器110与音频模块170之间的通信。在一些实施例中,音频模块170可以通过I2S接口向无线通信模块160传递音频信号,实现通过蓝牙耳机接听电话的功能。
PCM接口也可以用于音频通信,将模拟信号抽样,量化和编码。在一些实施例中,音频模块170与无线通信模块160可以通过PCM总线接口耦合。在一些实施例中,音频模块170也可以通过PCM接口向无线通信模块160传递音频信号,实现通过蓝牙耳机接听电话的功能。所述I2S接口和所述PCM接口都可以用于音频通信。
UART接口是一种通用串行数据总线,用于异步通信。该总线可以为双向通信总线。它将要传输的数据在串行通信与并行通信之间转换。在一些实施例中,UART接口通常被用于连接处理器110与无线通信模块160。例如:处理器110通过UART接口与无线通信模块160中的蓝牙模块通信,实现蓝牙功能。在一些实施例中,音频模块170可以通过UART接口向无线通信模块160传递音频信号,实现通过蓝牙耳机播放音乐的功能。
MIPI接口可以被用于连接处理器110与显示屏194,摄像头193等外围器件。MIPI接口包括摄像头串行接口(camera serial interface,CSI),显示屏串行接口(display serial interface,DSI)等。在一些实施例中,处理器110和摄像头193通过CSI接口通信,实现电子设备100的拍摄功能。处理器110和显示屏194通过DSI接口通信,实现电子设备100的显示功能。
GPIO接口可以通过软件配置。GPIO接口可以被配置为控制信号,也可被配置为数据信号。在一些实施例中,GPIO接口可以用于连接处理器110与摄像头193,显示屏194,无线通信模块160,音频模块170,传感器模块180等。GPIO接口还可以被配置为I2C接口,I2S接口,UART接口,MIPI接口等。
USB接口130是符合USB标准规范的接口,具体可以是Mini USB接口,Micro USB接口,USB Type C接口等。USB接口130可以用于连接充电器为电子设备100充电,也可以用于电子设备100与外围设备之间传输数据。也可以用于连接耳机,通过耳机播放音频。该接口还可以用于连接其他电子设备,例如AR设备等。
可以理解的是,本发明实施例示意的各模块间的接口连接关系,只是示意性说明,并不构成对电子设备100的结构限定。在本申请另一些实施例中,电子设备100也可以采用上述实施例中不同的接口连接方式,或多种接口连接方式的组合。
充电管理模块140用于从充电器接收充电输入。其中,充电器可以是无线充电器,也可以是有线充电器。在一些有线充电的实施例中,充电管理模块140可以通过USB接口130接收有线充电器的充电输入。在一些无线充电的实施例中,充电管理模块140可以通过电子设备100的无线充电线圈接收无线充电输入。充电管理模块140为电池142充电的同时,还可以通过电源管理模块141为电子设备供电。
电源管理模块141用于连接电池142,充电管理模块140与处理器110。电源管理模块141接收电池142和/或充电管理模块140的输入,为处理器110,内部存储器121,显示屏194,摄像头193,和无线通信模块160等供电。电源管理模块141还可以用于监测电池容量,电池循环次数,电池健康状态(漏电,阻抗)等参数。在其他一些实施例中,电源管理模块141也可以设置于处理器110中。在另一些实施例中,电源管理模块141和充电管理模块140也
可以设置于同一个器件中。
电子设备100的无线通信功能可以通过天线1,天线2,移动通信模块150,无线通信模块160,调制解调处理器以及基带处理器等实现。
天线1和天线2用于发射和接收电磁波信号。电子设备100中的每个天线可用于覆盖单个或多个通信频带。不同的天线还可以复用,以提高天线的利用率。例如:可以将天线1复用为无线局域网的分集天线。在另外一些实施例中,天线可以和调谐开关结合使用。
移动通信模块150可以提供应用在电子设备100上的包括2G/3G/4G/5G等无线通信的解决方案。移动通信模块150可以包括至少一个滤波器,开关,功率放大器,低噪声放大器(low noise amplifier,LNA)等。移动通信模块150可以由天线1接收电磁波,并对接收的电磁波进行滤波,放大等处理,传送至调制解调处理器进行解调。移动通信模块150还可以对经调制解调处理器调制后的信号放大,经天线1转为电磁波辐射出去。在一些实施例中,移动通信模块150的至少部分功能模块可以被设置于处理器110中。在一些实施例中,移动通信模块150的至少部分功能模块可以与处理器110的至少部分模块被设置在同一个器件中。
调制解调处理器可以包括调制器和解调器。其中,调制器用于将待发送的低频基带信号调制成中高频信号。解调器用于将接收的电磁波信号解调为低频基带信号。随后解调器将解调得到的低频基带信号传送至基带处理器处理。低频基带信号经基带处理器处理后,被传递给应用处理器。应用处理器通过音频设备(不限于扬声器170A,受话器170B等)输出声音信号,或通过显示屏194显示图像或视频。在一些实施例中,调制解调处理器可以是独立的器件。在另一些实施例中,调制解调处理器可以独立于处理器110,与移动通信模块150或其他功能模块设置在同一个器件中。
无线通信模块160可以提供应用在电子设备100上的包括无线局域网(wireless local area networks,WLAN)(如无线保真(wireless fidelity,Wi-Fi)网络),蓝牙(bluetooth,BT),全球导航卫星系统(global navigation satellite system,GNSS),调频(frequency modulation,FM),近距离无线通信技术(near field communication,NFC),红外技术(infrared,IR)等无线通信的解决方案。无线通信模块160可以是集成至少一个通信处理模块的一个或多个器件。无线通信模块160经由天线2接收电磁波,将电磁波信号解调以及滤波处理,将处理后的信号发送到处理器110。无线通信模块160还可以从处理器110接收待发送的信号,对其进行调频,放大,经天线2转为电磁波辐射出去。
在一些实施例中,电子设备100的天线1和移动通信模块150耦合,天线2和无线通信模块160耦合,使得电子设备100可以通过无线通信技术与网络以及其他设备通信。所述无线通信技术可以包括全球移动通讯系统(global system for mobile communications,GSM),通用分组无线服务(general packet radio service,GPRS),码分多址接入(code division multiple access,CDMA),宽带码分多址(wideband code division multiple access,WCDMA),时分码分多址(time-division code division multiple access,TD-SCDMA),长期演进(long term evolution,LTE),BT,GNSS,WLAN,NFC,FM,和/或IR技术等。所述GNSS可以包括全球卫星定位系统(global positioning system,GPS),全球导航卫星系统(global navigation satellite system,GLONASS),北斗卫星导航系统(beidou navigation satellite system,BDS),准天顶卫星系统(quasi-zenith satellite system,QZSS)和/或星基增强系统(satellite based augmentation systems,SBAS)。
电子设备100通过GPU,显示屏194,以及应用处理器等实现显示功能。GPU为图像处
理的微处理器,连接显示屏194和应用处理器。GPU用于执行数学和几何计算,用于图形渲染。处理器110可包括一个或多个GPU,其执行程序指令以生成或改变显示信息。
显示屏194用于显示图像,视频等。显示屏194包括显示面板。显示面板可以采用液晶显示屏(liquid crystal display,LCD),有机发光二极管(organic light-emitting diode,OLED),有源矩阵有机发光二极体或主动矩阵有机发光二极体(active-matrix organic light emitting diode的,AMOLED),柔性发光二极管(flex light-emitting diode,FLED),Miniled,MicroLed,Micro-oLed,量子点发光二极管(quantum dot light emitting diodes,QLED)等。在一些实施例中,电子设备100可以包括1个或N个显示屏194,N为大于1的正整数。
电子设备100可以通过ISP,摄像头193,视频编解码器,GPU,显示屏194以及应用处理器等实现拍摄功能。
ISP用于处理摄像头193反馈的数据。例如,拍照时,打开快门,光线通过镜头被传递到摄像头感光元件上,光信号转换为电信号,摄像头感光元件将所述电信号传递给ISP处理,转化为肉眼可见的图像。ISP还可以对图像的噪点,亮度进行算法优化。ISP还可以对拍摄场景的曝光,色温等参数优化。在一些实施例中,ISP可以设置在摄像头193中。
摄像头193用于捕获静态图像或视频。物体通过镜头生成光学图像投射到感光元件。感光元件可以是电荷耦合器件(charge coupled device,CCD)或互补金属氧化物半导体(complementary metal-oxide-semiconductor,CMOS)光电晶体管。感光元件把光信号转换成电信号,之后将电信号传递给ISP转换成数字图像信号。ISP将数字图像信号输出到DSP加工处理。DSP将数字图像信号转换成标准的RGB,YUV等格式的图像信号。在一些实施例中,电子设备100可以包括1个或N个摄像头193,N为大于1的正整数。
数字信号处理器用于处理数字信号,除了可以处理数字图像信号,还可以处理其他数字信号。例如,当电子设备100在频点选择时,数字信号处理器用于对频点能量进行傅里叶变换等。
视频编解码器用于对数字视频压缩或解压缩。电子设备100可以支持一种或多种视频编解码器。这样,电子设备100可以播放或录制多种编码格式的视频,例如:动态图像专家组(moving picture experts group,MPEG)1,MPEG2,MPEG3,MPEG4等。
NPU为神经网络(neural-network,NN)计算处理器,通过借鉴生物神经网络结构,例如借鉴人脑神经元之间传递模式,对输入信息快速处理,还可以不断的自学习。通过NPU可以实现电子设备100的智能认知等应用,例如:图像识别,人脸识别,语音识别,文本理解等。
内部存储器121可以包括一个或多个随机存取存储器(random access memory,RAM)和一个或多个非易失性存储器(non-volatile memory,NVM)。
随机存取存储器可以包括静态随机存储器(static random-access memory,SRAM)、动态随机存储器(dynamic random access memory,DRAM)、同步动态随机存储器(synchronous dynamic random access memory,SDRAM)、双倍资料率同步动态随机存取存储器(double data rate synchronous dynamic random access memory,DDR SDRAM,例如第五代DDR SDRAM一般称为DDR5SDRAM)等;非易失性存储器可以包括磁盘存储器件、快闪存储器(flash memory)。
快闪存储器按照运作原理划分可以包括NOR FLASH、NAND FLASH、3D NAND FLASH等,按照存储单元电位阶数划分可以包括单阶存储单元(single-level cell,SLC)、多阶存储单元(multi-level cell,MLC)、三阶储存单元(triple-level cell,TLC)、四阶储存单元(quad-level
cell,QLC)等,按照存储规范划分可以包括通用闪存存储(英文:universal flash storage,UFS)、嵌入式多媒体存储卡(embedded multi media Card,eMMC)等。
随机存取存储器可以由处理器110直接进行读写,可以用于存储操作系统或其他正在运行中的程序的可执行程序(例如机器指令),还可以用于存储用户及应用程序的数据等。
非易失性存储器也可以存储可执行程序和存储用户及应用程序的数据等,可以提前加载到随机存取存储器中,用于处理器110直接进行读写。
外部存储器接口120可以用于连接外部的非易失性存储器,实现扩展电子设备100的存储能力。外部的非易失性存储器通过外部存储器接口120与处理器110通信,实现数据存储功能。例如将音乐,视频等文件保存在外部的非易失性存储器中。
电子设备100可以通过音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,以及应用处理器等实现音频功能。例如音乐播放,录音等。
音频模块170用于将数字音频信息转换成模拟音频信号输出,也用于将模拟音频输入转换为数字音频信号。音频模块170还可以用于对音频信号编码和解码。在一些实施例中,音频模块170可以设置于处理器110中,或将音频模块170的部分功能模块设置于处理器110中。
扬声器170A,也称“喇叭”,用于将音频电信号转换为声音信号。
受话器170B,也称“听筒”,用于将音频电信号转换成声音信号。
麦克风170C,也称“话筒”,“传声器”,用于将声音信号转换为电信号。
耳机接口170D用于连接有线耳机。
压力传感器180A用于感受压力信号,可以将压力信号转换成电信号。在一些实施例中,压力传感器180A可以设置于显示屏194。压力传感器180A的种类很多,如电阻式压力传感器,电感式压力传感器,电容式压力传感器等。
陀螺仪传感器180B可以用于确定电子设备100的运动姿态。在一些实施例中,可以通过陀螺仪传感器180B确定电子设备100围绕三个轴(即,x,y和z轴)的角速度。
气压传感器180C用于测量气压。
磁传感器180D包括霍尔传感器。
加速度传感器180E可检测电子设备100在各个方向上(一般为三轴)加速度的大小。当电子设备100静止时可检测出重力的大小及方向。还可以用于识别电子设备的姿态。
距离传感器180F,用于测量距离。电子设备100可以通过红外或激光测量距离。
接近光传感器180G可以包括例如发光二极管(LED)和光检测器,例如光电二极管。
环境光传感器180L用于感知环境光亮度。电子设备100可以根据感知的环境光亮度自适应调节显示屏194亮度。
指纹传感器180H用于采集指纹。
温度传感器180J用于检测温度。在一些实施例中,电子设备100利用温度传感器180J检测的温度,执行温度处理策略。
触摸传感器180K,也称“触控器件”。触摸传感器180K可以设置于显示屏194,由触摸传感器180K与显示屏194组成触摸屏,也称“触控屏”。触摸传感器180K用于检测作用于其上或附近的触摸操作。触摸传感器可以将检测到的触摸操作传递给应用处理器,以确定触摸事件类型。可以通过显示屏194提供与触摸操作相关的视觉输出。在另一些实施例中,触摸传感器180K也可以设置于电子设备100的表面,与显示屏194所处的位置不同。
骨传导传感器180M可以获取振动信号。
按键190包括开机键,音量键等。按键190可以是机械按键。也可以是触摸式按键。电子设备100可以接收按键输入,产生与电子设备100的用户设置以及功能控制有关的键信号输入。
下面介绍本申请实施例提供的一种云服务器400的结构。
图3示例性示出了本申请实施例提供的一种云服务器400的结构。如图3所示,云服务器400可包括:一个或多个服务器处理器201、存储器202、通信接口203、接收器205、发射器206、耦合器207、天线208、服务器接口209。这些部件可通过总线204或者其他方式连接,图3以通过总线连接为例。其中:
通信接口203可用于云服务器400与其他通信设备,例如终端设备,进行通信。具体地,终端设备可以是图3所示的电子设备100。具体地,通信接口203可以是5G通信接口,也可以是未来新空口的通信接口。不限于无线通信接口,云服务器400还可以配置有有线的通信接口203,例如局域接入网(local access network,LAN)接口。发射器206可用于对服务器处理器201输出的信号进行发射处理。接收器205可用于对天线208接收的移动通信信号进行接收处理。
在本申请的一些实施例中,发射器206和接收器205可看作一个无线调制解调器。在云服务器400中,发射器206和接收器205的数量均可以是一个或者多个。天线208可用于将传输线中的电磁能转换成自由空间中的电磁波,或者将自由空间中的电磁波转换成传输线中的电磁能。耦合器207用于将天线208接收到的移动通信信号分成多路,分配给多个的接收器205。
存储器202与服务器处理器201耦合,用于存储各种软件程序和/或多组指令。具体地,存储器202可包括高速随机存取的存储器,并且也可包括非易失性存储器,例如一个或多个磁盘存储设备、闪存设备或其他非易失性固态存储设备。存储器202可以存储网络通信程序,该网络通信程序可用于与一个或多个附加设备,一个或多个终端设备,一个或多个网络设备进行通信。
在本申请的一些实施例中,存储器202可用于存储本申请的一个或多个实施例提供的网页访问异常的处理方法在云服务器400侧的实现程序。
服务器处理器201可用于读取和执行计算机可读指令。具体地,服务器处理器201可用于调用存储于存储器202中的程序,例如本申请的一个或多个实施例提供的网页访问异常的处理方法在云服务器400侧的实现程序,并执行该程序包含的指令。
需要说明的是,图3所示的云服务器400仅仅是本申请实施例的一种实现方式,实际应用中,云服务器400还可以包括更多或更少的部件,在此不做限定。
下面介绍本申请实施例提供的离线设备控制方法的一种应用场景。
在一些实施方案中,电子设备100安装有查找设备应用程序(application,APP),通过查找设备APP可以查看已绑定的所有电子设备,并可以查看已绑定的设备的联网状态、设备状态和定位信息,还可以控制已绑定的设备执行查找设备的相关功能,例如数据擦除、数据加密、数据备份、屏幕锁定或播放声音等。
示例性的,图4A至图4D示出了查看已绑定的电子设备的相关用户界面。
图4A示出了电子设备100上的用于展示安装的应用程序(application,APP)的主界面
11。主界面11可以包括:状态栏101,具有常用应用程序图标的托盘102,以及其他应用程序图标103。其中:
具有常用应用程序图标的托盘102可展示:电话图标、联系人图标、短信图标、相机图标。其他应用程序图标103可展示:浏览器图标、图库图标、音乐图标、设置图标、查找设备APP的图标103A。主界面11还可包括页面指示符104。其他应用程序图标可分布在多个页面,页面指示符104可用于指示用户当前查看的是哪一个页面中的应用程序。用户可以左右滑动其他应用程序图标的区域,来查看其他页面中的应用程序图标。
如图4A和图4B所示,查找设备APP的图标103A可以接收用户的输入操作(例如点击操作);若查找设备APP当前未登录账号,响应于上述输入操作,电子设备100可以显示查找设备APP的登录界面12。登录界面12包括登录控件201。
如图4B和图4C所示,登录控件201可以接收用户的输入操作(例如点击操作),响应于上述输入操作,电子设备100显示登录系统已有账号(例如账号1)的登录选项202和登录其他账号的登录选项203。
以登录选项202为例进行说明,如图4C和图4D所示,登录选项202可以接收用户的输入操作(例如点击操作),响应于上述输入操作,电子设备100显示查找设备APP登录系统已有账号后的用户界面13。用户界面13包括地图显示区204和设备列表。
设备列表可以包括电子设备100的设备标签205,以及与电子设备100绑定的至少一个电子设备的设备标签,例如智能手环的设备标签206和耳机的设备标签207。以智能手环的设备标签206为例,设备标签206可以包括设备图标206A和/或设备型号206B。设备列表还包括各设备的联网标识,联网标识用于指示该设备处于在线状态或离线状态。例如智能手环的联网标识208指示智能手环当前处于在线状态。
地图显示区204可以显示设备列表中的各设备在地图中的位置。以智能手环为例,智能手环在地图中的位置处显示有智能手环的设备标签209。
可以理解,若查找设备APP当前已登录账号,用户点击查找设备APP的图标103A后,电子设备100可以直接显示图4D所示的用户界面13。
本申请实施例中,电子设备100可以绑定新的电子设备(例如电子设备200)。
在一些实施方案中,电子设备100和电子设备200可以通过近距离通信技术进行查找设备的配对,以建立查找设备的绑定关系。上述近距离通信技术可以是蓝牙通信技术,还可以是NFC通信、UWB通信等通信技术。在一种实现方式中,电子设备100和电子设备200通过近距离通信技术首次建立通信连接时,自动触发电子设备100和电子设备200进行查找设备的配对;电子设备100和电子设备200通过上述近距离通信技术非首次建立通信连接时,用户也可以手动触发电子设备100和电子设备200进行查找设备的配对,此处不做具体限定。
示例性的,以电子设备200是笔记本电脑为例,图5A至图5H示出了电子设备100和电子设备200进行配对的相关用户界面。
如图5A所示,电子设备100和电子设备200首次建立蓝牙通信连接时,自动触发电子设备100和电子设备200进行查找设备的配对。可选的,如图5B所示,在配对过程中,若电子设备100的查找设备APP未登录账号,则电子设备100显示弹窗310。弹窗310包括提示信息311、取消控件312和登录账号控件313。提示信息311用于提示用户登录账号。取消控件312用于取消本次的配对,并停止显示弹窗310。
如图5B和图5C所示,登录账号控件313可以接收用户的输入操作(例如点击操作),
响应于上述输入操作,电子设备100显示弹窗320。弹窗320包括登录系统已有账号(例如账号1)的登录选项321、登录其他账号的登录选项322和取消控件323。登录选项321和登录选项322用于登录账号;取消控件323用于取消本次的配对,并停止显示弹窗320。
如图5C和图5D所示,登录选项321可以接收用户的输入操作(例如点击操作),响应于上述输入操作,电子设备100显示弹窗330。弹窗330包括账号1的账号和头像331、提示信息332、取消控件333和确认控件334。提示信息332用于提示将电子设备200关联至当前登录的账号。取消控件333用于取消本次的配对,并停止显示弹窗330。
需要说明的是,若触发配对时,电子设备100的查找设备APP已登录账号1,则电子设备100也可以直接显示弹窗330,无需显示图5B和图5C所示的弹窗。
在一些实现方案中,电子设备100和电子设备200的配对绑定过程中,当电子设备100的查找设备APP和电子设备200的查找设备APP登录同一账号(例如账号1),或者,两者登录的账号具备预设关系(即两者登录的账号为关联账号),电子设备100和电子设备200才能完成配对绑定。可以理解,账号1和账号2为预设关系时,账号1可以获取对账号2的查找设备的绑定关系的授权,登录账号1的电子设备和登录账号2的电子设备可以进行查找设备的配对绑定。例如,上述预设关系可以指账号2为账号1绑定的亲情账号,或者,账号1的特定群组(例如位置共享群、家庭群)包括账号2。本申请实施例对上述预设关系不做具体限定。
如图5D和图5E所示,确认控件334可以接收用户的输入操作(例如点击操作),响应于上述输入操作,电子设备100显示弹窗340。弹窗340包括配对进度条341和取消控件342。配对进度条341用于指示电子设备100与电子设备200的配对进度。取消控件342用于取消本次的配对,并停止显示弹窗340。
如图5F所示,电子设备100与电子设备200配对成功后,电子设备100与电子设备200建立了查找设备的绑定关系,电子设备100显示弹窗350,弹窗350包括提示信息351和查看控件352。提示信息351用于提示查找设备APP可以为电子设备200提供的功能(例如查看定位、设为丢失模式、播放声音和数据保护)和查看控件352。
如图5F和图5G所示,查看控件352可以接收用户的输入操作(例如点击操作),响应于上述输入操作,电子设备100显示查找设备APP的用户界面13。用户界面13的设备列表新增了配对成功的电子设备200的设备标签401和电子设备200的联网标识402。此时,联网标识402指示电子设备200处于在线状态。用户界面13的地图显示区204新增了电子设备200的设备标签210。
如图5G和图5H所示,电子设备200的设备标签401可以接收用户的输入操作(例如点击操作),响应于上述输入操作,电子设备100显示电子设备200的地址403、地址403的获取时间404、电子设备200的设备信息405(例如电池量指示符、网络符号等)和功能控件,上述功能控件可以包括定位设备控件406、丢失模式控件407、播放声音控件408和数据保护控件409。
定位设备控件406可以用于查询电子设备200当前的位置,以更新地址403和电子设备200的设备标签210在地图显示区204中的显示位置。
丢失模式控件407可以用于将电子设备200设为丢失模式。例如,丢失模式下电子设备200会锁定屏幕,以便于其他用户不能使用电子设备200。
播放声音控件408可以用于控制电子设备200播放指定音频(例如铃声),以便于机主寻
找丢失的电子设备200。
数据保护控件409可以用于控制电子设备200进行数据加密、数据擦除或数据备份,以便于保护电子设备200的数据。
在一些实施方案中,无需图5B至图5F的配对环节,电子设备100和电子设备200也可以通过登录同一账号的信任环建立查找设备的绑定关系。本申请实施例对电子设备100和电子设备200建立查找设备的绑定关系的方式不做具体限定。
示例性的,以电子设备200是笔记本电脑为例,图6A至图6E示出了电子设备100和电子设备200绑定后,电子设备100控制离线的电子设备200的相关用户界面。
如图6A所示,电子设备200离线后,联网标识402指示电子设备200处于离线状态,地址403显示的地址为电子设备200离线前最后获取的地址。
本申请实施例中,电子设备200离线时,图6A所示的功能控件(即定位设备控件406、丢失模式控件407、播放声音控件408和数据保护控件409)中的任一个可以接收用户的输入操作,响应于上述输入操作,电子设备100可以通过电子设备200附近的周边设备300向离线的电子设备200发送离线指令,以控制电子设备200执行上述功能控件对应的操作。
示例性的,如图6A和图6B所示,丢失模式控件407可以接收用户的输入操作(例如点击操作),响应于上述输入操作,电子设备100显示弹窗410。弹窗410用于设置电子设备200的锁屏信息和/或锁屏密码。弹窗410包括联系方式输入框411、留言输入框412、密码输入框420、密码输入框421、取消控件413、跳过控件414、确认控件415。取消控件413用于取消将电子设备200设为丢失模式,并触发电子设备100停止显示弹窗410。跳过控件414用于跳过设置电子设备200的锁屏信息和/或锁屏密码,直接将电子设备200设为丢失模式。
如图6C和图6D所示,用户在联系方式输入框411输入联系方式,在留言输入框412输入留言后,确认控件415接收用户的输入操作(例如点击操作);响应于上述输入操作,电子设备100生成离线指令,并显示提示信息416,该提示信息416用于指示电子设备200正在设置丢失模式,即进行屏幕所锁定并显示用户设置的锁屏信息(例如用户输入的联系方式和留言)。电子设备100通过在线的周边设备300向离线的电子设备200发送上述离线指令。
如图6C所示,用户还可以在密码输入框420和密码输入框421输入新的锁屏密码;上述离线指令还用于指示电子设备200设置新的锁屏密码。设置新的锁屏密码时,用户需要在密码输入框420和密码输入框421输入相同的密码;当输入不同密码时,电子设备100可以显示提示信息,提示用户密码输入不一致。可以理解,密码输入框421用于保障用户输入的密码的正确性。可选的,弹窗410中也可以只显示一个锁屏密码的密码输入框,此处不做具体限定。
可以理解,本申请实施例中,通过丢失模式控件407将丢失设备锁屏时,可以设置或未设置锁屏信息,也可以设置/或未设置新的锁屏密码。丢失设备本身设置有锁屏密码时,用户通过弹窗410设置新的锁屏密码后,丢失设备仅能通过新的锁屏密码解锁。
在一些实施方案中,如图6E所示,电子设备100通过上述离线指令控制离线的电子设备200设置丢失模式后,离线的电子设备200可以通过附近在线的周边设备300反馈确认消息;电子设备100基于周边设备300反馈的确认消息,可以显示提示信息417。提示信息417用于提示离线的电子设备200已成功设置丢失模式。
可以理解,控制离线的电子设备200显示用户输入的锁屏信息(例如用户输入的联系方式),便于其他用户捡到丢失的电子设备200后,与电子设备200的机主联系。
示例性的,如图6E和图7A所示,数据保护控件409可以接收用户的输入操作(例如点击操作),响应于上述输入操作,电子设备100显示弹窗501。弹窗501可以包括多个数据保护选项,例如数据擦除选项502、数据加密选项503和数据备份选项504;还可以包括文件类型选项,例如全部选项505、多媒体选项506、文档选项507、应用数据选项508、联系人数据选项509;还可以包括取消控件510和确认控件511。
需要说明的是,选项506至选项509是本申请实施例提供的示例性选项,不应对本申请实施例构成限定,本申请实施例还可以使用其他文件类型选项。
本申请实施例中,用户可以选择所需的数据保护选项(即上述多个数据保护选项中一个),然后,选择需要保护的文件类型(即全部选项505,或选项506至选项509中的至少一种);然后,用户可以操作确认控件511;响应于用户对确认控件511的输入操作(例如点击操作),电子设备100可以生成离线指令,该离线指令用于指示针对用户所选的文件类型执行上述数据保护选项对应的数据保护操作,例如数据擦除选项502对应的数据擦除操作,数据加密选项503对应的数据加密操作,数据备份选项504对应的数据备份操作。
如图7B和图7C所示,用户选中数据擦除选项502以及全部选项505后,确认控件511接收用户的输入操作(例如点击操作);响应于上述输入操作,电子设备100生成离线指令,并显示提示信息513;该离线指令用于对用户选中的文件类型执行数据擦除,提示信息513用于提示正在指示电子设备200进行数据擦除。
在一些实施方案中,如图7D所示,电子设备100通过上述离线指令控制离线的电子设备200完成数据擦除后,离线的电子设备200可以通过附近在线的周边设备300反馈确认消息;电子设备100基于电子设备200反馈的确认消息,可以显示提示信息514。提示信息514用于提示电子设备200的数据已擦除。可选的,提示信息514还用于提示已擦除的文件类型。
在一些实施方案中,离线的电子设备200执行离线指令后,电子设备200显示提示信息,该提示信息用于提示电子设备200已执行上述离线指令。可选的,上述离线指令用于实现数据擦除、数据加密和数据备份等数据保护操作中的一项或多项。
示例性的,如图7E所示,电子设备200根据离线指令完成数据擦除后,可以显示提示信息515,提示信息515用于提示电子设备200已执行数据擦除。可选的,提示信息515还用于提示已擦除的文件类型。
如图7F和图7G所示,用户选中数据加密选项503后,电子设备100在弹窗501中显示密码输入框516和密码输入框517。密码输入框516和密码输入框517用于设置数据加密的密码。可选的,弹窗501中也可以只显示一个数据加密的密码输入框,此处不做具体限定。
如图7H和图7I所示,用户在密码输入框516和密码输入框517输入加密密码,以及选中全部选项505后,确认控件511接收用户的输入操作(例如点击操作);响应于上述输入操作,电子设备100生成离线指令,并显示提示信息518;该离线指令用于对用户选中的文件类型执行数据擦除,提示信息518用于提示正在指示电子设备200进行数据加密。如图7J所示,电子设备200根据离线指令完成数据加密后,电子设备100可以根据电子设备200反馈的确认消息显示提示信息519,提示信息519用于提示电子设备200已执行数据加密。可选的,提示信息519还用于提示已加密的文件类型。
如图7K所示,电子设备200根据离线指令完成数据加密后,可以显示提示信息520,提示信息520用于提示电子设备200已执行数据加密。可选的,提示信息520还用于提示已加密的文件类型。
在一些实施方案中,电子设备200离线时,若电子设备200附近存在在线的周边设备,电子设备100还可以获取并显示周边设备上传的电子设备200的离线位置。
如图7J和图7L所示,电子设备200离线时,定位设备控件406可以接收用户的输入操作(例如点击操作),响应于上述输入操作,电子设备100获取并显示基于周边设备300上传的离线位置生成的地址521,并可以根据该地址更新电子设备200的设备标签210在地图显示区204中的位置。
在一些实施方案中,无需用户操作定位设备控件406,电子设备100也可以获取并显示地址521,并根据地址521更新电子设备200的设备标签210在地图显示区204中的位置。
在一些实施方案中,电子设备100也可以未安装独立的查找设备APP,图5G至图7L涉及的查找设备APP提供的功能,也可以在电子设备100的系统应用的系统设置中实现,也可以在网页版的查找设备APP中实现,本申请实施例对此不做具体限定。
基于前述通信系统、硬件结构和应用场景,下面对本申请实施例提供的离线设备控制方法进行详细介绍。
本申请实施例提供的离线设备控制方法中,电子设备100和丢失设备可以预先进行查找设备的配对绑定;丢失设备离线时,用户可以利用与丢失设备绑定的电子设备100,向云服务器发送针对丢失设备的离线指令;云服务器收到丢失设备附近在线的周边设备上传的针对丢失设备的协助指示消息时,通过该周边设备向丢失设备发送电子设备100的离线指令,以使丢失设备可以执行离线指令。这样,在丢失设备离线时,电子设备100依然能够控制丢失设备执行特定任务,以避免丢失设备的数据丢失和数据泄露,保护用户隐私。
示例性的,图8A示出了一种离线设备控制方法的流程示意图,该离线设备控制方法包括但不限于步骤S101至步骤S113。
S101、电子设备100和电子设备200进行查找设备的配对绑定。
示例性的,参考图5A至图5H的相关描述,电子设备100可以安装查找设备APP,通过查找设备APP,电子设备100和电子设备200可以进行查找设备的配对绑定,此处不再赘述。
在一些实施方案中,电子设备100和电子设备200的配对绑定过程中,电子设备100向查找设备APP的应用服务器(例如云服务器400)发送配对请求,配对请求用于请求与电子设备200进行配对绑定;云服务器400与电子设备100、电子设备200交互后,确定电子设备100和电子设备200登录同一账号(例如账号1)时,才向电子设备200转发来自电子设备100的配对请求,以及向电子设备100转发来自电子设备200的配对响应。
S102、电子设备200离线时,电子设备100接收输入操作1,响应于输入操作1,生成离线指令。
参考图6A至图7L的相关描述,用户确认电子设备200丢失且电子设备200处于离线状态时,为避免电子设备200的数据丢失或泄露,用户可以通过查找设备APP提供的电子设备200对应的功能控件(例如图6A所示丢失模式控件407、播放声音控件408和数据保护控件409),触发电子设备100发送离线指令,离线指令用于指示电子设备200执行以下一或多项操作:数据擦除、数据加密、数据备份、播放声音、设置丢失模式等。
示例性的,查找设备APP提供的电子设备200对应的功能控件包括功能控件1。
在一些实施方案中,电子设备100接收针对功能控件1的输入操作1,输入操作1包括一或多个操作;响应于输入操作1,若电子设备100确定电子设备200处于离线状态,则生
成功能控件1对应的离线指令。可选的,消息1包括离线指令。可选的,消息1包括离线指令加密后的密文。
示例性的,参考图6A至图6E的相关描述,功能控件1可以为丢失模式控件407,输入操作1可以包括作用于丢失模式控件407的点击操作,离线指令用于指示将电子设备设为丢失模式。可选的,离线指令具体用于指示将电子设备的屏幕锁定。可选的,输入操作1还可以包括用户在联系方式输入框411输入联系方式的输入操作,在留言输入框412输入留言的输入操作,以及作用于确认控件415的输入操作,离线指令还用于指示在电子设备的锁屏界面上显示上述联系方式和留言。可选的,输入操作1还可以包括用户在密码输入框420和密码输入框421输入锁屏密码的输入操作,离线指令还用于指示电子设备设置新的锁屏密码。
示例性的,参考图6A,功能控件1为播放声音控件408,输入操作1包括作用于播放声音控件408的点击操作,离线指令用于指示电子设备播放声音。
示例性的,参考图6E至图7K的相关描述,功能控件1为数据保护控件409,输入操作1可以包括作用于播放数据保护控件409的点击操作,作用于一个数据保护选项1(例如数据擦除选项502)的输入操作,作用于至少一个文件类型选项(例如全部选项505,或选项506至选项509中的至少一个)的输入操作,以及作用于确认控件511的输入操作;离线指令用于指示对用户选择的文件类型选项执行数据保护选项1对应的数据保护操作(例如数据擦除)。
示例性的,参考图7F至图7K的相关描述,数据保护选项1为数据加密选项503时,输入操作1还可以包括用户在密码输入框516和密码输入框517输入加密密码的操作。
S103、电子设备100向云服务器400发送消息1,消息1用于指示电子设备200执行上述离线指令。
S104、电子设备200确定本设备离线时,通过近距离通信模块广播离线广播1。
在一些实现方案中,上述近距离通信模块为BLE通信模块。电子设备200开启了查找设备功能;电子设备200离线时,通过BLE通信模块基于预设周期定时发送离线广播1。
在一些实现方案中,电子设备200可以查询本设备的网络连接状态,当基于网络连接状态确定本设备断网时,电子设备200确定本设备处于离线状态;反之,当基于网络连接状态确定本设备联网时,电子设备200确定本设备处于在线状态。
在一些实现方案中,当基于本身的网络连接状态确定本设备断网和/或电子设备200未连接SIM卡时,电子设备200确定本设备处于离线状态;当基于网络连接状态确定本设备联网且电子设备200连接有SIM卡时,电子设备200确定本设备处于在线状态。
在一些实现方案中,电子设备200可以通过前述通信网络500广播心跳包,当心跳包发送失败,或者在预设时长内未接收到其他设备(例如云服务器400)基于该心跳包反馈的响应信息时,电子设备200确定本设备处于离线状态;反之,当心跳包发送成功,或者在预设时长内接收到其他设备基于该心跳包反馈的响应信息时,判定本设备处于在线状态。可选的,电子设备200可以为智能家居设备,或可穿戴设备(例如头戴式耳机、运动手环)等。
S105、在线的周边设备300通过上述近距离通信模块扫描离线广播。
本申请实施例中,周边设备300开启了查找设备功能,在线的周边设备300可以与云服务器400进行通信;周边设备300处于在线状态时,通过BLE通信模块基于预设的扫描策略扫描附近设备的离线广播。
在一些实现方案中,周边设备300处于在线状态时,通过BLE通信模块以预设的扫描周期和扫描时长定时扫描离线广播。例如,上述扫描周期为600ms,上述扫描时长为100ms。
S106、周边设备300扫描到来自电子设备200的离线广播1后,向云服务器400发送消息2。
在一些实现方案中,消息2用于指示周边设备300可以协助电子设备200传输消息。
在一些实现方案中,周边设备300扫描到来自电子设备200的离线广播1后,显示提示信息,提示信息用于提示用户是否协助其他设备进行离线控制。周边设备300接收到用户的确认操作后,才向云服务器400发送消息2。
可以理解,电子设备200附近在线的周边设备均可以通过上述近距离通信模块扫描到离线广播1,并向云服务器400发送协助指示消息(即上述消息2)。
S107、云服务器400基于消息1和消息2,确定消息1指示的离线指令用于控制消息2指示的离线设备。
本申请实施例中,消息1可以携带用于指示离线指令的目标设备的指示信息1,消息2也可以携带指示离线设备的指示信息2。云服务器400将指示信息1和指示信息2进行匹配,若匹配成功,则云服务器400确定离线指令用于控制消息2指示的离线设备,在线的周边设备300可以协助该离线设备传输数据。
可选的,上述指示信息1和指示信息2,为电子设备100绑定电子设备200时生成的公钥的派生公钥或该派生公钥的Hash值。可选的,上述指示信息1和指示信息2,为可以指示离线设备的设备标识,例如,设备标识为通用设备识别码(unique device identifier description,UUID)、唯一设备标识码(Unique Device Identifier,UDID)等。
具体实现方式在后续实施例有详细介绍,此处不再赘述。
S108、云服务器400向周边设备300发送消息3,消息3用于指示电子设备200执行上述离线指令。
云服务器400接收到周边设备300发送的消息2后,若基于消息2确定周边设备300可以协助转发针对电子设备200的离线指令,则向周边设备300发送消息3,希望能通过周边设备300向离线的电子设备200转发消息3,以指示电子设备200执行来自电子设备100的离线指令。
S109、周边设备300通过上述近距离通信模块向电子设备200发送消息3。
在一些实现方案中,周边设备300收到消息3后,当再次扫描到电子设备200的离线广播1时,周边设备300通过BLE通信模块与电子设备200建立通信连接,然后基于该通信连接向电子设备200发送消息3。可以理解,好心人的周边设备300再次靠近离线的电子设备200时,可以将消息3转发给电子设备200。
S110、电子设备200基于消息3执行上述离线指令。
S111、电子设备200执行离线指令后,通过上述近距离通信模块广播消息4,消息4用于指示已执行上述离线指令。
S112、周边设备300通过上述近距离通信模块扫描到消息4后,向云服务器400发送消息4。
在一些实现方案中,电子设备200执行离线指令后,若电子设备200和周边设备300的上述通信连接未断开,电子设备200也可以通过该通信连接直接向周边设备300发送消息4。
S113、云服务器400向电子设备100发送消息5,消息5用于指示已执行上述离线指令。
在一些实现方案中,上述消息4可以为SCAN_RSP消息。上述消息4和消息5可以是相同消息,也可以是不同消息,此处不做具体限定。
参考图6A至图7K的相关描述,电子设备200执行离线指令并反馈确认消息后,电子设备100可以基于该确认消息显示提示信息,以提示用户电子设备200已执行离线指令。
示例性的,消息4和消息5可以为前述确认消息,参考图6A至图6E的相关描述,用户通过丢失模式控件407触发电子设备100发送离线指令,离线指令用于指示将电子设备200设置为丢失模式;响应于电子设备200反馈的确认消息,电子设备100显示提示信息417,提示信息417用于提示电子设备200已设置丢失模式。示例性的,参考图7A至图7E的相关描述,用户通过数据保护控件409触发电子设备100发送离线指令,离线指令用于指示对特定文件类型执行数据擦除;响应于电子设备200反馈的确认消息,电子设备100显示提示信息514,提示信息514用于提示电子设备200已完成数据擦除。示例性的,参考图7F至图7K的相关描述,离线指令用于指示对特定文件类型执行数据加密;响应于电子设备200反馈的确认消息,电子设备100显示提示信息518,提示信息518用于提示电子设备200已完成数据加密。
在一些实现方案中,步骤S106中,响应于电子设备200的离线广播1,周边设备还获取电子设备200的离线位置。消息2可以为离线定位消息,消息2还指示了上述离线位置。步骤S106之后还可执行S114和S115。
在一些实现方案中,上述离线位置实际为周边设备300的定位模块获取的本设备的位置,由于周边设备300在电子设备200的附近,因此可以将周边设备300的位置视为电子设备200当前的离线位置。可选的,周边设备300获取电子设备200的离线位置,具体包括:周边设备300调用本设备的定位模块获取本设备当前的位置,该位置即为上述离线位置。可选的,周边设备300获取电子设备200的离线位置,具体包括:周边设备300将本设备的定位模块最近获取的本设备的位置作为上述离线位置。
在一些实现方案中,上述离线位置,是周边设备300以本设备的位置为参考位置,利用近距离定位技术获取电子设备200的位置。可选的,周边设备300获取电子设备200的离线位置,具体包括:周边设备300利用近距离定位技术(例如蓝牙定位技术)获取电子设备200的方位以及与电子设备200的距离;周边设备300获取利用定位模块获取本设备的位置信息;然后以本设备的位置信息为参考,基于电子设备200的方位和距离获取电子设备200当前的离线位置。
S114、云服务器400向电子设备100发送消息6,消息6用于指示电子设备200的离线位置。
S115、电子设备100基于消息6显示电子设备200的离线位置。
参考图7J和图7L的相关描述,电子设备100获取电子设备200的离线位置后,可以在用户界面11中显示电子设备200的离线位置,并可以根据电子设备200的离线位置更新电子设备200的设备标签在地图显示区204中的显示位置。
本申请实施例提供的离线设备控制方法的一些实现方案中,电子设备100、丢失设备和云服务器可以预先协商认证对方身份的密钥;离线控制过程中,两两设备间利用特定密钥对离线指令进行加密传输,以认证对方身份;这样,避免恶意设备伪造和篡改离线指令,保障离线控制的安全性。此外,离线控制过程中,与周边设备间的消息传输均未携带丢失设备和查找设备(即电子设备100)的设备信息(例如设备标识);这样,可以避免丢失设备和查找设备被追踪,避免恶意设备利用设备信息伪造和篡改来自丢失设备和查找设备的消息,保障
离线控制的安全性。
示例性的,图8B示出了一种离线设备控制方法的流程示意图。
如图8B所示,步骤S101具体可以包括:电子设备100和电子设备200进行查找设备的配对绑定,配对绑定过程中,生成密钥K1、密钥K2和密钥O1,以及公钥P和相应的私钥d,密钥K1用于电子设备200和电子设备100之间互相认证身份,密钥K2用于电子设备200和云服务器400之间互相认证身份,密钥O1用于电子设备100和云服务器400之间互相认证身份。
在一些实施方案中,参考图8C,电子设备100和电子设备200配对过程中,通过电子设备100、电子设备200和云服务器400的三方交互,电子设备100和电子设备200分别基于预设算法生成同一密钥K1,电子设备200和电子设备100持有密钥K1,密钥K1用于电子设备200和电子设备100互相认证身份;电子设备100和云服务器400分别基于预设算法生成同一密钥O1,电子设备100和云服务器400持有密钥O1,密钥O1用于电子设备100和云服务器400互相认证身份;电子设备200和云服务器400分别基于预设算法生成同一密钥K2,电子设备200和云服务器400持有密钥K2,密钥K2用于电子设备200和云服务器400互相认证身份。
例如,上述预设算法为椭圆曲线迪菲-赫尔曼秘钥交换(Elliptic Curve Diffie–Hellman key Exchange,ECDH)算法。利用ECDH算法,两个设备可以在不共享任何隐私信息的情况下协商出相同的密钥,利用ECDH算法生成的密钥可以在不安全的通道中传输安全的加密资料。
在一些实施方案中,电子设备100和电子设备200配对过程中,电子设备100还生成了公钥P和相应的私钥d;电子设备200可以持有公钥P,电子设备100可以持有私钥d和公钥P。私钥d和公钥P可用于信息的加密传输。
需要说明的是,公钥(public key)与私钥(private key)是通过加密算法得到的一个密钥对(即一个公钥和一个私钥)。例如:加密算法可以为椭圆曲线加密法(EllipticCurveCryptography,ECC)、李维斯特-萨莫尔-阿德曼(Rivest-Shamir-Adleman,简称RSA)或数字签名算法(Digital Signature Algorithm,简称DSA)等非对称加密算法。通过加密算法得到的密钥对具有唯一性;公钥是密钥对中公开的部分,是对外公开的;私钥则是非公开的部分,是不对外公开的,需要由本设备保存的。如果用公钥加密数据则必须用相应的私钥解密,如果用私钥加密则必须用相应的公钥解密。
步骤S102具体可以包括:电子设备200离线时,电子设备100接收输入操作1,响应于输入操作1,生成离线指令对应的加密认证信息C2和公钥P的派生公钥Pi的Hash值1,加密认证信息C2是利用密钥K1和密钥O1依序对离线指令加密后生成的。
在一些实施方案中,电子设备100也可以提前上传派生公钥Pi或派生公钥Pi的Hash值。例如,电子设备100和电子设备200的查找设备的绑定过程中,电子设备100获取公钥P后,即向服务器上传公钥Pi或派生公钥Pi的Hash值。
在一些实施方案中,电子设备100利用密钥K1和密钥O1依序对离线指令加密,生成加密认证信息C2,具体包括:电子设备100利用密钥K1对离线指令X进行加密,生成加密认证信息C1;电子设备100利用密钥O1对加密认证信息C1进行加密,生成加密认证信息C2。
在一些实施方案中,利用关联数据的认证加密(authenticated encryption with associated data,AEAD)算法进行加密,AEAD算法是一种带有认证功能的加密方式,同时具备保密性、完整性和可认证性。示例性的,C1=AEAD(K1,X),C2=AEAD(O1,C1,AD=SN)。其中字段
“AD=SN”是AEAD算法的一个加密字段,AD(additional data)指AEAD算法中的附加信息,SN(serial number)指AEAD算法中的序列号。
示例性的,离线指令X用于执行数据擦除;X=文件类型||擦除||新鲜值T,X中的第一字段指示了擦除的文件类型,X中的第二个字段用于指示X执行的操作,新鲜值T为随机数,新鲜值T用于加密;C1=AEAD(K1,文件类型||擦除||新鲜值T)。
本申请实施例中,派生公钥Pi的Hash值,是根据预设的Hash算法对派生公钥Pi进行运算得到的Hash值。Hash算法是用于将任意长度的消息压缩到某一固定长度的消息摘要(即Hash值)的函数,Hash值可以用于检查消息的完整性,避免消息被篡改。
需要说明的是,电子设备100和电子设备200获取公钥P后,均以固定周期对公钥P进行派生,生成以时间为维度的多个派生公钥Pi。可以理解,电子设备100和电子设备200针对同一时刻生成的派生公钥Pi是相同的。
在一些实现方案,步骤S101中,电子设备100和电子设备200绑定过程中,云服务器400也可以获取公钥P;步骤S103中,云服务器400可以生成公钥P的派生公钥Pi的Hash值1;即无需电子设备100向云服务器400上传派生公钥Pi或Hash值1。
步骤S103具体可以包括:电子设备100向云服务器400发送消息1,消息1包括加密认证信息C2和Hash值1。
示例性的,参考图8C,电子设备100利用密钥K1和密钥O1依序对离线指令X加密后,向云服务器400发送加密后的密文C2。本申请实施例中,加密认证信息也可以称为密文。
需要说明的是,消息1包括电子设备200持有的公钥P的派生公钥Pi的Hash值1,消息1中的Hash值1可以用于暗指消息1指示的离线指令是针对电子设备200的。上述加密认证信息C2和Hash值1也可以是分开分送的,此处不做具体限定。
在一些实现方案中,云服务器400可以在离线指令数据库可以存储各查找设备的设备标识、丢失设备的设备标识、上传的离线指令的加密认证信息以及派生公钥的Hash值的对应关系。例如,步骤S103中云服务器400接收到电子设备100发送的消息1之后,在离线指令数据库存储电子设备100的设备标识、电子设备200的设备标识、加密认证信息C2以及派生公钥Pi的Hash值1的对应关系。上述电子设备200的设备标识可以是在消息1中携带的,也可以是在步骤S103之前,电子设备100上传给云服务器400的,此处不做具体限定。
在一些实施方案中,电子设备100可以预先获取未来预设时长(例如一周)内的多个派生公钥的Hash值,并上传给云服务器400。上述Hash值1包括上述预设时长内的多个派生公钥的Hash值。
步骤S104具体可以包括:电子设备200确定本设备离线时,通过近距离通信模块广播离线广播1,离线广播1包括公钥P的派生公钥Pi。
参考图8C,电子设备200离线时,可以通过BLE通信模块广播BLE离线广播。
步骤S106具体可以包括:周边设备300扫描到来自电子设备200的离线广播1后,向云服务器400发送消息2,消息2包括派生公钥Pi的Hash值2。
需要说明的是,消息2包括电子设备200持有的公钥P的派生公钥Pi的Hash值2,消息2中的Hash值2可以用于暗指消息2是针对电子设备200的。
在一些实现方案中,电子设备200也可以通过离线广播1直接广播派生公钥Pi的Hash值2,无需周边设备300计算Hash值。
步骤S107具体可以包括:云服务器400将消息2中的Hash值2和消息1中Hash值1
进行匹配;若匹配成功,云服务器400获取加密认证信息C3,加密认证信息C3是利用密钥O1解密C2,再利用密钥K2加密生成的。
步骤S108具体可以包括:云服务器400向周边设备300发送消息3,消息3包括加密认证信息C3和派生公钥Pi的Hash值2。
在一些实现方案中,云服务器400在离线指令数据库存储各电子设备发送的离线指令的加密认证信息以及对应的派生公钥的Hash值。云服务器400接收到消息2之后,将消息2中的Hash值2与离线指令数据库中各离线指令的加密认证信息对应的Hash值(例如Hsh值1)进行匹配;获取匹配成功的Hash值1,进而可以获取Hash值1对应的丢失设备的设备标识(即电子设备100的设备标识)和加密认证信息C2。
此外,云服务器400中还存储有电子设备100的设备标识对应的密钥O1的对应关系,以及电子设备200的设备标识对应的密钥K2的对应关系;参考图8C,基于电子设备100的设备标识,云服务器400获密钥取O1对加密认证信息C2进行解密,生成加密认证信息C1;基于电子设备200的设备标识,云服务器400获取密钥K2对加密认证信息C2进行加密,生成加密认证信息C3。
在一些实现方案中,上述匹配成功指Hash值1与Hash值2相等。在一些实现方案中,上述Hash值1包括上述预设时长内的多个派生公钥的Hash值,上述匹配成功指Hash值2与上述多个派生公钥的Hash值中的一个Hash值相等。
需要说明的是,电子设备100和电子设备200绑定后,电子设备100和电子设备200均持有公钥P,并可以获取公钥P对应的同一派生公钥Pi。消息1中的派生公钥Pi的Hash值1暗指了消息1是针对电子设备200的,消息2中的派生公钥Pi的Hash值2暗指了消息2是针对电子设备200的。若Hash值1与Hash值2匹配,则可以确定电子设备100在消息1中指示的离线指令是针对周边设备300所协助的设备,即Hash值2暗指的电子设备200。
示例性的,C2=AEAD(O1,C1,AD=SN)。云服务器400利用密钥O1解密C2获取C1,O1-1·C2=C1;云服务器400再利用密钥K2加密C1获取C3,C3=AEAD(K2,C1,AD=SN)。
可以理解,密钥O1用于云服务器400验证电子设备100的身份,确定加密认证信息C2来自合法用户。所有协助电子设备200上报的周边设备均可以收到云服务器400下发的离线指令的加密认证信息。
步骤S109具体可以包括:基于消息3中的派生公钥Pi的Hash值2,周边设备300通过上述近距离通信模块向电子设备200发送消息3。
在一些实现方案中,消息3包括派生公钥Pi的Hash值2;周边设备300收到消息3后,当再次扫描到电子设备200的离线广播1,获取离线广播1中的派生公钥Pi;周边设备300将消息3中的Hash值与离线广播1中派生公钥Pi的Hash值进行匹配,若匹配成功,则向电子设备200发送消息3。
参考图8C,云服务器400经周边设备300向电子设备200发送密文C3。
步骤S110具体可以包括S110A和S110B。
S110A、电子设备200利用密钥K2和密钥K1对消息3中的加密认证信息C3进行解密,获取离线指令。
具体的,参考图8C,电子设备200利用密钥K2对离线指令X对应的加密认证信息C3进行解密,获取加密认证信息C1;周边设备300在利用密钥K1对加密认证信息C1进行解密,获取离线指令X。
示例性的,C3=AEAD(K2,C1,AD=SN),C1=AEAD(K1,X)。电子设备200利用密钥O1解密K2获取C1,K2-1·C2=C1;电子设备200再利用密钥K2解密C1获取X,K2-1·C1=X。
可以理解,密钥K2用于电子设备200验证云服务器400的身份,密钥K1用于电子设备200验证电子设备100的身份。
S110B、电子设备200执行离线指令。
步骤S111具体可以包括、电子设备200执行离线指令后,通过上述近距离通信模块广播消息4,消息4包括确认消息加密后的确认密文和派生公钥Pi,确认消息用于指示已执行上述离线指令。
可选的,参考图8C,上述确认消息可以为SCAN_RSP消息。
步骤S112具体可以包括:周边设备300通过上述近距离通信模块扫描到消息4后,周边设备300向云服务器400发送上述消息4,消息4包括派生公钥Pi的Hash值3。
步骤S113具体可以包括S113A和S113B。
S113A、云服务器400将消息4中的Hash值3和消息1中的Hash值1进行匹配,若匹配成功,则执行S113B。
S113B、云服务器400基于消息4确定向电子设备100发送消息5。
在一些实现方案中,参考图8C,消息4包括的确认密文是利用密钥K2加密。云服务器400发送消息5之前,服务器400利用密钥K2对确认密文解密后获取确认消息,消息5包括确认消息。
在一些实现方案中,消息4包括确认密文D2,确认密文D2是利用密钥K1和密钥K2依序加密的。云服务器400发送消息5之前,云服务器400利用密钥K2对确认密文D2解密后,获取经密钥K1加密的确认消息的确认密文D1;消息5包括确认密文D1。电子设备100接收到消息5后,利用密钥K1对确认密文D2解密后,获取确认消息。
在一些实现方案中,消息4包括确认密文D2,确认密文D2是利用密钥K1和密钥K2依序加密的。云服务器400发送消息5之前,云服务器400利用密钥K2对确认密文D2解密后,获取经密钥K1加密的确认消息的确认密文D1;云服务器400利用密钥O1对确认密文D1进行加密,获取经密钥K1和密钥O1依序加密的确认密文D3;消息5包括确认密文D3。电子设备100接收到消息5后,利用密钥O1对确认密文D3解密后,获取经密钥K1加密的确认密文D3;电子设备100利用密钥K1对确认密文D2解密后,获取确认消息。
可以理解,云服务器400可以利用密钥K2认证电子设备200的身份;电子设备100可以利用密钥O1认证云服务器400的身份,电子设备100利用密钥K1可以认证电子设备200的身份。
在一些实现方案中,消息4包括的确认密文是利用公钥P的派生公钥Pi加密的,消息5也包括上述确认密文;电子设备200利用私钥d的派生私钥di对确认密文解密后,获取确认消息。
在一些实现方案中,步骤S102中,电子设备100也可以通过消息1向云服务器400上传派生公钥Pi,而非派生公钥Pi的hash;步骤S106中,周边设备300也可以通过消息2向云服务器400上传派生公钥Pi,而非派生公钥Pi的hash;步骤S107中,云服务器400将消息1中的派生公钥和消息2中的派生公钥进行匹配,若匹配成功,则获取加密认证信息C3。
在一些实现方案中,消息2可以为离线定位消息,步骤S106中,周边设备300发送的消
息2中可以包括电子设备200的离线位置的位置密文,位置密文是利用派生公钥Pi和加密算法对离线位置加密生成的。步骤S106之后还可执行S114和S115。
步骤S114中,云服务器400向电子设备100下发的消息6包括电子设备200的离线位置的位置密文。
步骤S115中,电子设备100利用私钥d的派生私钥di解密位置密文,获取并显示电子设备200的离线位置。
综上可知,在与周边设备300交互的离线广播1、消息2和消息3中均未携带电子设备100的设备标识的情况下,利用派生公钥Pi的匹配,或派生公钥Pi的hash值的匹配,可以获取针对电子设备200的离线指令的加密认证信息,并通过周边设备300转发给电子设备200。
在一些实施方案中,上述离线控制方法也可以不使用前述公钥P的相关信息(例如公钥P的派生公钥、派生公钥的Hash值等)去暗指电子设备200;电子设备100、电子设备200、周边设备300和云服务器400之间的消息交互,可以通过电子设备200的设备标识指示电子设备200,通过电子设备100的设备标识指示电子设备100。本申请实施例对此不作具体限定。下面进行示例性说明。示例性的,
步骤S103中,消息1包括加密认证信息C2和丢失设备的设备标识1(即电子设备200的设备标识),设备标识1用于指示消息1所指示的离线指令是针对电子设备200的。
步骤S104中,离线广播1包括电子设备200的设备标识1。
步骤S106中,消息2包括丢失设备的设备标识1(即电子设备200的设备标识),设备标识1用于指示消息2是针对电子设备200的,消息2用于指示周边设备300可以协助电子设备200传输消息。
步骤S107中,基于消息2中的设备标识1和消息1中的设备标识1,获取设备标识1(即电子设备200的设备标识)对应的离线指令的加密认证信息C2,基于离线指令的加密认证信息C2获取加密认证信息C3。
步骤S108中,消息3包括丢失设备的设备标识1和加密认证信息C3。设备标识1用于指示消息3所指示的离线指令是针对电子设备200的。
步骤S109中,周边设备300基于消息3中的设备标识1,通过近距离通信模块向电子设备200发送消息3。
步骤S111中,消息4包括查找设备的设备标识2(即电子设备100的设备标识),设备标识2用于指示消息4所指示的确认消息是发送给电子设备100的。
步骤S113中,云服务器400基于消息4中的设备标识2,向电子设备100发送消息5。
具体的实施方式,可以参考图8A和图8B所示的离线设备控制方法的相关描述,此处不再赘述。
下面介绍电子设备100的软件结构,电子设备100和周边设备200的软件结构可以参考电子设备100的软件结构,后续不再赘述。
示例性的,电子设备100的软件系统可以采用分层架构,事件驱动架构,微核架构,微服务架构,或云架构。本发明实施例以分层架构的Android系统为例,示例性说明电子设备100的软件结构。图9A是本申请实施例的电子设备100的软件结构框图。
分层架构将软件分成若干个层,每一层都有清晰的角色和分工。层与层之间通过软件接
口通信。在一些实施例中,将Android系统分为四层,从上至下分别为应用程序层,应用程序框架层,安卓运行时(Android runtime)和系统库,以及内核层。
应用程序层可以包括一系列应用程序包。如图9A所示,应用程序包可以包括相机,图库,日历,通话,地图,导航,WLAN,蓝牙,音乐,视频,短信息等应用程序。
应用程序框架层为应用程序层的应用程序提供应用编程接口(application programming interface,API)和编程框架。应用程序框架层包括一些预先定义的函数。如图9A所示,应用程序框架层可以包括窗口管理器,内容提供器,视图系统,电话管理器,资源管理器,通知管理器等。
窗口管理器用于管理窗口程序。窗口管理器可以获取显示屏大小,判断是否有状态栏,锁定屏幕,截取屏幕等。
内容提供器用来存放和获取数据,并使这些数据可以被应用程序访问。所述数据可以包括视频,图像,音频,拨打和接听的电话,浏览历史和书签,电话簿等。
视图系统包括可视控件,例如显示文字的控件,显示图片的控件等。视图系统可用于构建应用程序。显示界面可以由一个或多个视图组成的。例如,包括短信通知图标的显示界面,可以包括显示文字的视图以及显示图片的视图。
电话管理器用于提供电子设备100的通信功能。例如通话状态的管理(包括接通,挂断等)。
资源管理器为应用程序提供各种资源,比如本地化字符串,图标,图片,布局文件,视频文件等等。
通知管理器使应用程序可以在状态栏中显示通知信息,可以用于传达告知类型的消息,可以短暂停留后自动消失,无需用户交互。比如通知管理器被用于告知下载完成,消息提醒等。通知管理器还可以是以图表或者滚动条文本形式出现在系统顶部状态栏的通知,例如后台运行的应用程序的通知,还可以是以对话窗口形式出现在屏幕上的通知。例如在状态栏提示文本信息,发出提示音,终端振动,指示灯闪烁等。
Android Runtime包括核心库和虚拟机。Android runtime负责安卓系统的调度和管理。
核心库包含两部分:一部分是java语言需要调用的功能函数,另一部分是安卓的核心库。
应用程序层和应用程序框架层运行在虚拟机中。虚拟机将应用程序层和应用程序框架层的java文件执行为二进制文件。虚拟机用于执行对象生命周期的管理,堆栈管理,线程管理,安全和异常的管理,以及垃圾回收等功能。
系统库可以包括多个功能模块。例如:表面管理器(surface manager),媒体库(Media Libraries),三维图形处理库(例如:OpenGL ES),2D图形引擎(例如:SGL)等。
表面管理器用于对显示子系统进行管理,并且为多个应用程序提供了2D和3D图层的融合。
媒体库支持多种常用的音频,视频格式回放和录制,以及静态图像文件等。媒体库可以支持多种音视频编码格式,例如:MPEG4,H.264,MP3,AAC,AMR,JPG,PNG等。
三维图形处理库用于实现三维图形绘图,图像渲染,合成,和图层处理等。
2D图形引擎是2D绘图的绘图引擎。
内核层是硬件和软件之间的层。内核层至少包含显示驱动,摄像头驱动,音频驱动,传感器驱动。
下面对本申请实施例提供的离线控制系统进行介绍。
示例性的,图9B示出了本申请实施例提供的一种离线控制系统,如图9B所示,离线控制系统包括电子设备100、电子设备200、周边设备300和云服务器400。
其中,电子设备100、电子设备200、周边设备300的应用程序层均包括查找设备APP,应用程序框架层包括端侧查找网络服务,系统模块包括网络模块以及近距离通信模块(例如BLE通信模块)。在一种实现方式中,电子设备200和周边设备300具备端侧查找网络服务,电子设备200和周边设备300也可以不安装查找设备APP;电子设备200和周边设备300,通过端侧查找网络服务与云服务器400进行通信。云服务器400包括云侧查找网络服务。
其中,查找设备APP,用于接收用户的输入操作,以实现设备间的查找网络服务的配对绑定,触发本设备查询丢失设备的离线位置,触发本设备下发控制丢失设备的离线指令;离线指令用于指示丢失设备执行以下一或多项:数据擦除、数据加密、数据备份、播放声音和设置丢失模式等。
端侧查找网络服务,用于提供查找网络的配对绑定、离线指令和离线位置的加密解密、协助离线设备上报消息、存储云端下发的离线指令、向丢失设备转发云端的离线指令等服务。
网络模块可以为前述通信网络500对应的网络模块,负责提供网络连接服务,以实现本设备和云服务器400的通信。
近距离通信模块(例如BLE通信模块),用于提供低功耗的离线广播、扫描离线广播、通用属性配置文件(Generic Attribute Profile,GATT)连接等服务,GATT为BLE的服务接口协议。
云侧查找网络服务,用于实现离线指令加密解密、存储离线指令、下发离线指令、存储位置密文、下发位置密文和查询离线位置等服务。
基于图9B所示的离线控制系统对本申请实施例的离线控制方法进行示例性说明。
(1)电子设备100和电子设备200通过BLE通信模块建立通信连接后,电子设备100的查找设备APP调用端侧查找网络服务触发与电子设备200的配对流程。上述配对流程包括电子设备100的端侧查找网络服务调用网络模块向云服务器400发送配对请求,该配对请求用于请求与电子设备200建立查找网络服务的绑定关系。
在一些实现方案中,上述配对流程还包括:电子设备100和电子设备200分别基于预设算法生成同一密钥K1,电子设备100和云服务器400分别基于预设算法生成同一密钥O1,电子设备200和云服务器400分别基于预设算法生成同一密钥K2。
(2)电子设备100的查找设备APP接收用户的输入操作1;响应于输入操作1,上述查找设备APP生成针对离线的电子设备200的离线指令;查找设备APP调用端侧查找网络服务通过网络模块向云服务器400上报该离线指令。云服务器400的云侧查找网络服务接收到上述离线指令后,存储该离线指令。
在一些实现方案中,电子设备100的端侧查找网络服务还用于通过密钥K1和密钥O1对离线指令进行加密,调用网络模块向云服务器400上报加密后的离线指令。
(3)电子设备200的端侧查找网络服务确定电子设备200离线时,调用BLE通信模块广播离线广播1。周边设备300在线时,周边设备300的端侧查找网络服务调用BLE通信模块基于预设的扫描策略扫描其他设备的离线广播,扫描到离线广播1。
(4)周边设备300的BLE通信模块向本设备的端侧查找网络服务上报离线广播1,端侧查找网络服务调用本设备的网络模块向云服务器400发送协助指示消息(即前述消息2),协
助指示消息用于指示周边设备300可以协助电子设备200传输数据。
(5)云服务器400的云侧查找网络服务接收到协助指示消息后,向周边设备300下发上述离线指令。
在一些实现方案中,云服务器400的云侧查找网络服务还用于通过密钥O1对电子设备100上报的离线指令进行解密,再利用密钥K2进行加密;然后再向周边设备300下发经密钥K1和密钥K2加密后的离线指令。
(6)周边设备300的网络模块收到上述离线指令,向周边设备300的端侧查找网络服务发送上述离线指令;端侧查找网络服务调用周边设备300的BLE通信模块向电子设备200发送上述离线指令。
(7)电子设备200的BLE通信模块接收到上述离线指令后,向电子设备200的端侧查找网络服务发送上述离线指令;端侧查找网络服务向电子设备200的查找设备APP发送上述离线指令;查找设备APP执行上述离线指令。
在一些实现方案中,电子设备200的端侧查找网络服务还用于通过密钥K2和密钥K1对周边设备300发送的离线指令进行解密,以获取解密后的原始的离线指令。
本申请实施例中,第一电子设备也可以为前述电子设备100,第二电子设备可以为前述电子设备200,第三电子设备可以为前述电子设备300,服务器可以为前述云服务器400。第一标识可以为前述电子设备200的联网标识。
第一消息可以为前述消息1,第一离线消息可以为前述离线广播1,第二离线消息可以为前述离线广播2,第一指令可以为前述离线指令,第二消息可以为前述消息2,第三消息可以为前述消息3,第四消息和第五消息可以为前述消息4,第六消息可以为前述消息5。
第一输入操作可以为前述输入操作1,第一功能控件可以为图6A所示的功能控件,例如丢失模式控件407、播放声音控件408和数据保护控件409。第一账号可以为前述账号1。
示例性的,第一功能控件为丢失模式控件407,第一指令用于设置丢失模式,第一提示信息可以为图6D所示的提示信息416,第二提示信息可以为图6E所示的提示信息417。
示例性的,第一功能控件为数据保护控件409,第一指令用于实现数据擦除,第一提示信息可以为图7C所示的提示信息513,第二提示信息可以为图7D所示的提示信息514,第三提示信息可以为图7E所示的提示信息515。
示例性的,第一功能控件为数据保护控件409,第一指令用于实现数据加密,第一提示信息可以为图7I所示的提示信息518,第二提示信息可以为图7J所示的提示信息519,第三提示信息可以为图7K所示的提示信息520;第一选项可以为全部选项505,或选项506至选项509中的至少一个;确认控件可以为确认控件511。
第一密钥可以为前述密钥K1,第二密钥可以为前述密钥K2,第三密钥可以为前述密钥O1。第一密文可以为前述加密认证信息C1,第二密文可以为前述加密认证信息C2,第三密文可以为前述加密认证信息C3。示例性的,第四密文可以为前述确认密文。示例性的,第四密文可以为前述确认密文D2,第五密文可以为前述确认密文D3。
示例性的,第四密钥可以为前述公钥P,派生公钥的指示信息可以为派生公钥本身,也可以为派生公钥的Hash值。示例性的,第一指示信息可以为前述指示信息1(例如派生公钥Pi或Hash值1),第二指示信息可以为前述指示信息2(例如派生公钥Pi或Hash值2)。
本申请的各实施方式可以任意进行组合,以实现不同的技术效果。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线)或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘(solid state disk,SSD))等。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,该流程可以由计算机程序来指令相关的硬件完成,该程序可存储于计算机可读取存储介质中,该程序在执行时,可包括如上述各方法实施例的流程。而前述的存储介质包括:ROM或随机存储记忆体RAM、磁碟或者光盘等各种可存储程序代码的介质。
总之,以上所述仅为本发明技术方案的实施例而已,并非用于限定本发明的保护范围。凡根据本发明的揭露,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。
Claims (39)
- 一种离线设备控制方法,其特征在于,应用于离线设备控制系统,所述系统包括第二电子设备、第三电子设备和服务器,所述第二电子设备为离线状态;所述方法包括:服务器获取第一消息,所述第一消息用于指示所述第二电子设备执行第一指令;所述第二电子设备通过近距离通信模块广播第一离线消息;所述第三电子设备获取所述第一离线消息;响应于所述第一离线消息,所述第三电子设备向所述服务器发送第二消息;在接收到所述第二消息后,所述服务器向所述第三电子设备发送第三消息,所述第三消息用于指示所述第二电子设备执行所述第一指令;所述第三电子设备向所述第二电子设备发送所述第三消息;所述第二电子设备基于所述第三消息执行所述第一指令。
- 根据权利要求1所述的方法,其特征在于,所述系统还包括第一电子设备,所述服务器获取第一消息前,所述方法还包括:所述第一电子设备接收用户的第一输入操作;响应于所述第一输入操作,所述第一电子设备向所述服务器发送第一消息。
- 根据权利要求2所述的方法,其特征在于,所述第一电子设备接收用户的第一输入操作前,所述方法还包括:所述第一电子设备显示第一应用的第一界面,所述第一界面包括第一功能控件,所述第一功能控件用于触发所述第一电子设备生成用于控制所述第二电子设备的所述第一指令;所述第一电子设备接收用户的第一输入操作,包括:所述第一电子设备接收用户针对所述第一功能控件的第一输入操作,所述第一输入操作包括一或多个操作。
- 根据权利要求3所述的方法,其特征在于,所述第一界面还包括所述第二电子设备的第一标识,所述第一标识用于指示所述第二电子设备当前处于离线状态。
- 根据权利要求1所述的方法,其特征在于,所述第二消息用于指示所述第三电子设备可以协助离线的所述第二电子设备传输消息。
- 根据权利要求1或5所述的方法,其特征在于,所述第二消息用于指示所述第三电子设备获取的所述第二电子设备的离线位置。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:所述第二电子设备执行所述第一指令后,通过所述近距离通信模块发送第四消息,所述第四消息用于指示所述第二电子设备已执行所述第一指令;所述第三电子设备接收所述第四消息;所述第三电子设备向所述服务器发送所述第五消息,所述第五消息用于指示所述第二电 子设备已执行所述第一指令;所述服务器向所述第一电子设备发送第六消息,所述第六消息用于指示所述第二电子设备已执行所述第一指令。
- 根据权利要求3所述的方法,其特征在于,所述方法还包括:响应于所述第一输入操作,所述第一电子设备显示第一提示信息,所述第一提示信息用于提示正在指示离线的所述第二电子设备执行所述第一指令。
- 根据权利要求3所述的方法,其特征在于,所述方法还包括:所述第一电子设备接收到所述第六消息后,基于所述第六消息显示第二提示信息;所述第二提示信息用于提示所述第二电子设备已执行所述第一指令。
- 根据权利要求1所述的方法,其特征在于,所述第一指令用于实现以下一项或多项操作:数据擦除、数据加密、数据备份、屏幕锁定、显示预设的锁屏信息和播放预设音频。
- 根据权利要求3所述的方法,其特征在于,所述第一输入操作包括第二输入操作、第三输入操作和第四输入操作;所述第一电子设备接收用户的第一输入操作,包括:所述第一电子设备接收作用于所述第一功能控件的所述第二输入操作;响应于所述第二输入操作,所述第一电子设备显示确认控件和至少两个文件类型选项,所述至少两个文件类型选项包括第一选项;所述第一电子设备接收作用于所述第一选项的所述第三输入操作;所述第一电子设备接收作用于所述确认控件的所述第四输入操作;所述第一指令用于实现数据擦除、数据加密、数据备份等数据保护操作中的一项或多项,所述第一指令还包括所述数据保护操作针对的文件类型,所述数据保护操作针对的文件类型包括所述第一选项对应的文件类型。
- 根据权利要求10或11所述的方法,其特征在于,所述第一指令用于实现数据擦除、数据加密、数据备份等数据保护操作中的一项或多项,所述第二电子设备基于所述第三消息执行所述第一指令后,所述方法还包括:所述第二电子设备显示第三提示信息,所述第三提示信息用于提示所述第二电子设备已执行所述第一指令。
- 根据权利要求1所述的方法,其特征在于,所述第三电子设备向所述第二电子设备发送所述第三消息,包括:所述第三电子设备接收所述第三消息后,当扫描到所述第二电子设备广播的第二离线消息时,通过所述近距离通信模块向所述第二电子设备发送所述第三消息。
- 根据权利要求2所述的方法,其特征在于,所述第一电子设备接收用户的第一输入操作前,还包括:所述第一电子设备登录第一应用的第一账号;所述第二电子设备登录所述第一应用的所述第一账号;所述第一电子设备和所述第二电子设备基于所述第一应用的所述第一账号建立绑定关系。
- 根据权利要求2至14任一项所述的方法,其特征在于,所述第一电子设备和所述第二电子设备持有第一密钥,所述第一密钥用于所述第一电子设备和所述第二电子设备互相认证身份;所述第二电子设备和所述服务器持有第二密钥,所述第二密钥用于所述第二电子设备和所述服务器互相认证身份;所述第一电子设备和所述服务器持有第三密钥,所述第三密钥用于所述第一电子设备和所述服务器互相认证身份;所述第一消息包括第二密文,所述第二密文是所述第一电子设备利用所述第一密钥和所述第三密钥依序对所述第一指令加密后生成的;所述第三消息包括第三密文,所述第三密文是所述服务器利用所述第三密钥对所述第二密文解密后,再利用所述第二密钥加密后生成的;所述第一指令是所述第二电子设备利用所述第二密钥和所述第一密钥对所述第三密文解密后获取的。
- 根据权利要求15所述的方法,其特征在于,所述第四消息和所述第五消息包括确认消息的第四密文,所述第四密文是所述第二电子设备利用所述第二密钥对所述确认消息加密后生成的,所述确认消息用于指示所述第二电子设备已执行所述第一指令;所述第六消息包括所述确认消息,所述确认消息是所述服务器利用所述第二密钥对所述第四密文解密后获取的。
- 根据权利要求15所述的方法,其特征在于,所述第四消息和所述第五消息包括确认消息的第四密文,所述第四密文是所述第二电子设备利用所述第一密钥和所述第二密钥对所述确认消息依序加密后生成的,所述确认消息用于指示所述第二电子设备已执行所述第一指令;所述第六消息包括所述确认消息的第五密文,第五密文是所述服务器利用所述第二密钥对所述第四密文解密,再利用所述第三密钥加密后生成的;所述方法还包括:所述第一电子设备接收到所述服务器发送的所述第六消息后,利用所述第三密钥和所述第一密钥依序对所述第五密文解密,获取所述确认消息。
- 根据权利要求15所述的方法,其特征在于,所述接收用户的第一输入操作前,所述第一电子设备和第二电子设备建立了绑定关系,所述第一密钥、所述第二密钥和所述第三密钥是所述第一电子设备和所述第二电子设备的绑定过程中生成的;所述服务器存储有所述第二电子设备的第二设备标识和所述第二密钥的第一对应关系,以及所述第一电子设备的第一设备标识和所述第三密钥的第二对应关系。
- 根据权利要求18所述的方法,其特征在于,所述第一电子设备和所述第二电子设备 的绑定过程中还生成了第四密钥,所述第一电子设备和所述第二电子设备均持有所述第四密钥;所述第一消息还包括所述第四密钥的派生密钥的第一指示信息和所述第二电子设备的第二设备标识;所述服务器接收所述第一消息后,所述服务器基于所述第一消息存储有所述第二密文、所述第一指示信息和所述第二设备标识的第三对应关系;所述第一离线消息还包括所述第四密钥的派生密钥;所述第二消息还包括所述第四密钥的派生密钥的第二指示信息;所述服务器向所述第三电子设备发送第三消息之前,所述方法还包括:所述服务器将所述第一指示信息和所述第二指示信息进行匹配;当所述第一指示信息和所述第二指示信息匹配成功时,所述服务器基于所述第一指示信息对应的所述第二密文生成所述第三密文。
- 根据权利要求19所述的方法,其特征在于,所述服务器基于所述第一指示信息对应的所述第二密文生成所述第三密文,包括:基于第三对应关系确定第一指示信息对应的目标设备的设备标识为所述第二电子设备的所述第二设备标识;基于所述第一对应关系确定用于认证所述第一电子设备的身份的所述第三密钥,基于所述第二对应关系确定用于认证所述第二电子设备的身份的所述第二密钥;所述服务器利用所述第三密钥对所述第二密文进行解密,获取解密后的第一密文;再利用所述第二密钥对所述第一密文进行加密,获取加密后所述第三密文。
- 根据权利要求19所述的方法,其特征在于,所述第三消息还包括所述第四密钥的派生密钥的所述第一指示信息;所述第三电子设备接收所述第三消息后,所述方法还包括:所述第三电子设备扫描到所述第二电子设备广播的第二离线消息,所述第二离线消息包括所述第四密钥的派生密钥;所述第三电子设备向所述第二电子设备发送所述第三消息,包括:若所述第二离线消息中所述第四密钥的派生密钥的指示信息和所述第一指示信息匹配成功,则所述第三电子设备通过近距离通信模块向所述第二电子设备发送所述第三消息。
- 一种离线设备控制方法,应用于服务器,其特征在于,包括:所述服务器获取第一消息,所述第一消息用于指示第二电子设备执行第一指令;所述服务器接收所述第三电子设备发送的第二消息,所述第二消息是所述第三电子设备通过近距离通信模块扫描到所述第二电子设备广播的第一离线消息后发送的,所述第一离线消息是所述第二电子设备处于离线状态时广播的;在接收到所述第二消息后,所述服务器经所述第三电子设备向离线的所述第二电子设备发送所述第三消息,所述第三消息用于指示所述第二电子设备执行所述第一指令。
- 根据权利要求22所述的方法,其特征在于,所述服务器获取第一消息,包括:所述服务器接收第一电子设备发送的第一消息。
- 根据权利要求22所述的方法,其特征在于,所述第二消息用于指示所述第三电子设 备可以协助离线的所述第二电子设备传输消息。
- 根据权利要求22或24所述的方法,其特征在于,所述第二消息用于指示所述第三电子设备获取的所述第二电子设备的离线位置。
- 根据权利要求22所述的方法,其特征在于,所述第一指令用于实现以下一项或多项操作:数据擦除、数据加密、数据备份、屏幕锁定、显示预设的锁屏信息和播放预设音频。
- 根据权利要求26所述的方法,其特征在于,所述第一指令用于实现数据擦除、数据加密、数据备份等数据保护操作中的一项或多项时,所述第一指令包括所述数据保护操作针对的文件类型。
- 根据权利要求23所述的方法,其特征在于,所述服务器获取第一消息前,还包括:所述服务器接收所述第一电子设备和/或所述第二电子设备的绑定请求,所述绑定请求用于请求为所述第一电子设备和所述第二电子设备基于所述第一应用的所述第一账号建立绑定关系,所述第一电子设备和所述第二电子设备均登录了所述第一账号。
- 一种离线设备控制方法,应用于处于离线状态的第二电子设备,其特征在于,所述方法包括:所述第二电子设备处于离线状态时,通过近距离通信模块广播第一离线消息;所述第二电子设备接收服务器经附近在线的第三电子设备发送的所述第三消息;所述第三消息是所述服务器获取第一消息和所述第三电子设备的第二消息后发送的,所述第二消息是所述第三电子设备在接收到所述第一离线消息后发送的,所述第一消息和所述第三消息用于指示所述第二电子设备执行所述第一指令;所述第二电子设备基于所述第三消息执行所述第一指令。
- 根据权利要求29所述的方法,其特征在于,所述第一消息是第一电子设备发送给所述服务器的。
- 根据权利要求29所述的方法,其特征在于,所述第二消息用于指示所述第三电子设备可以协助离线的所述第二电子设备传输消息。
- 根据权利要求29或31所述的方法,其特征在于,所述第二消息用于指示所述第三电子设备获取的所述第二电子设备的离线位置。
- 根据权利要求29所述的方法,其特征在于,所述方法还包括:所述第二电子设备执行所述第一指令后,经所述第三电子设备向所述服务器发送第七消息,所述第七消息用于指示所述第二电子设备已执行所述第一指令。
- 根据权利要求29所述的方法,其特征在于,所述第一指令用于实现以下一项或多项 操作:数据擦除、数据加密、数据备份、屏幕锁定、显示预设的锁屏信息和播放预设音频。
- 根据权利要求34所述的方法,其特征在于,所述第一指令用于实现数据擦除、数据加密、数据备份等数据保护操作中的一项或多项时,所述第一指令包括所述数据保护操作针对的文件类型。
- 根据权利要求29或35所述的方法,其特征在于,所述第一指令用于实现数据擦除、数据加密、数据备份等数据保护操作中的一项或多项,所述第二电子设备基于所述第三消息执行所述第一指令后,所述方法还包括:所述第二电子设备显示第三提示信息,所述第三提示信息用于提示所述第二电子设备已执行所述第一指令。
- 根据权利要求30所述的方法,其特征在于,所述通过近距离通信模块广播第一离线消息前,还包括:所述第二电子设备登录所述第一应用的所述第一账号;所述第二电子设备和所述第一电子设备基于所述第一应用的所述第一账号建立绑定关系。
- 一种电子设备,其特征在于,包括存储器和处理器,所述存储器和所述处理器电偶合,所述存储器用于存储程序指令,所述处理器被配置用于调用所述存储器存储的全部或部分程序指令,执行如权利要求1-21、权利要求22-29或权利要求29-37任一项所述的方法。
- 一种计算机存储介质,其特征在于,包括计算机指令,当所述计算机指令在电子设备上运行时,使得所述电子设备执行如权利要求1-21、权利要求22-29或权利要求29-37任一项所述的方法。
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210238563 | 2022-03-11 | ||
CN202210238563.9 | 2022-03-11 | ||
CN202210618803.8A CN116782186A (zh) | 2022-03-11 | 2022-06-01 | 离线设备控制方法及相关装置 |
CN202210618803.8 | 2022-06-01 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023169545A1 true WO2023169545A1 (zh) | 2023-09-14 |
Family
ID=87936144
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2023/080697 WO2023169545A1 (zh) | 2022-03-11 | 2023-03-10 | 离线设备控制方法及相关装置 |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2023169545A1 (zh) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120244839A1 (en) * | 2010-01-21 | 2012-09-27 | Zte Corporation | Anti-theft mobile terminal and anti-theft method for mobile terminal |
CN105142120A (zh) * | 2015-08-10 | 2015-12-09 | 闻泰通讯股份有限公司 | 一种手机防盗系统 |
CN106413125A (zh) * | 2015-07-31 | 2017-02-15 | 腾讯科技(深圳)有限公司 | 数据传输方法及装置 |
CN106535100A (zh) * | 2016-11-29 | 2017-03-22 | 维沃移动通信有限公司 | 一种定位移动终端的方法和移动终端及服务器 |
CN107483547A (zh) * | 2017-07-20 | 2017-12-15 | 北京珠穆朗玛移动通信有限公司 | 用户终端的防丢失方法、服务器、移动终端及存储介质 |
-
2023
- 2023-03-10 WO PCT/CN2023/080697 patent/WO2023169545A1/zh active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120244839A1 (en) * | 2010-01-21 | 2012-09-27 | Zte Corporation | Anti-theft mobile terminal and anti-theft method for mobile terminal |
CN106413125A (zh) * | 2015-07-31 | 2017-02-15 | 腾讯科技(深圳)有限公司 | 数据传输方法及装置 |
CN105142120A (zh) * | 2015-08-10 | 2015-12-09 | 闻泰通讯股份有限公司 | 一种手机防盗系统 |
CN106535100A (zh) * | 2016-11-29 | 2017-03-22 | 维沃移动通信有限公司 | 一种定位移动终端的方法和移动终端及服务器 |
CN107483547A (zh) * | 2017-07-20 | 2017-12-15 | 北京珠穆朗玛移动通信有限公司 | 用户终端的防丢失方法、服务器、移动终端及存储介质 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3820077A1 (en) | Login method, token sending method, and device | |
US10275581B2 (en) | Method and apparatus for sharing content between electronic devices | |
CN113609498B (zh) | 数据保护方法及电子设备 | |
US20230140946A1 (en) | Method for Recommending Service, Electronic Device, and System | |
WO2020155014A1 (zh) | 智能家居设备分享系统、方法及电子设备 | |
US20230422154A1 (en) | Method for using cellular communication function, and related apparatus and system | |
US20230254143A1 (en) | Method for Saving Ciphertext and Apparatus | |
WO2021135593A1 (zh) | 一种分享设备的方法及电子设备 | |
WO2022179443A1 (zh) | Nfc通信方法、电子设备及系统 | |
WO2022089121A1 (zh) | 处理推送消息的方法和装置 | |
US20220335107A1 (en) | Method for Processing Application Program and Related Product | |
US20240095329A1 (en) | Cross-Device Authentication Method and Electronic Device | |
WO2023088459A1 (zh) | 设备协同方法及相关装置 | |
CN112966297B (zh) | 数据保护方法、系统、介质及电子设备 | |
WO2023169545A1 (zh) | 离线设备控制方法及相关装置 | |
CN114117367A (zh) | 一种数据保护方法及电子设备 | |
CN116782186A (zh) | 离线设备控制方法及相关装置 | |
WO2023071733A1 (zh) | 一种设备控制方法与相关设备 | |
WO2024002137A1 (zh) | 通信方法、通信系统及电子设备 | |
CN116049826B (zh) | 基于tpm的数据保护方法、电子设备及存储介质 | |
WO2024046418A1 (zh) | 一种数据保护方法及电子设备 | |
RU2809740C2 (ru) | Способ обработки файла, хранящегося во внешней памяти | |
WO2023207758A1 (zh) | 数据处理方法及装置 | |
WO2023155588A1 (zh) | 耳温数据的处理方法和电子设备 | |
WO2023020393A1 (zh) | 设备之间分享遥控器的方法、发送端设备和接收端设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23766122 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2023766122 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2023766122 Country of ref document: EP Effective date: 20240814 |