WO2023201835A1 - 一种应用控制方法、装置、终端设备及存储介质 - Google Patents

一种应用控制方法、装置、终端设备及存储介质 Download PDF

Info

Publication number
WO2023201835A1
WO2023201835A1 PCT/CN2022/094777 CN2022094777W WO2023201835A1 WO 2023201835 A1 WO2023201835 A1 WO 2023201835A1 CN 2022094777 W CN2022094777 W CN 2022094777W WO 2023201835 A1 WO2023201835 A1 WO 2023201835A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
target
connection
control
information
Prior art date
Application number
PCT/CN2022/094777
Other languages
English (en)
French (fr)
Inventor
李辉
Original Assignee
深圳Tcl新技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳Tcl新技术有限公司 filed Critical 深圳Tcl新技术有限公司
Publication of WO2023201835A1 publication Critical patent/WO2023201835A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/542Event management; Broadcasting; Multicasting; Notifications

Definitions

  • This application relates to the technical field of the Internet of Things, and specifically relates to an application control method, device, electronic equipment and storage medium.
  • IoT devices such as smart TVs
  • their core functions such as video playback, audio playback, etc.
  • IoT devices such as smart TVs
  • their core functions such as video playback, audio playback, etc.
  • IoT devices are to integrate data or functions from some applications in the market into IoT devices.
  • many applications do not support integrating functions or data into the device, resulting in users being unable to experience these applications by directly controlling IoT devices. functions, affecting user experience.
  • Embodiments of the present application provide an application control method, device, electronic device and storage medium, which can bind the functions of various application programs of the Internet of Things device through the control application in the Internet of Things device, thereby facilitating users to control the Internet of Things device. operation to improve user experience.
  • the embodiment of the present application provides an application control method, including:
  • the target connection application is controlled based on the secure communication connection.
  • an application control device including:
  • An information acquisition unit used to acquire control application information of a control application to be connected to the target connection application locally in the terminal;
  • An application determination unit configured to determine a target control application based on the control application information
  • An information sending unit configured to send the security authentication information of the target connection application to the target control application through the target connection application
  • a connection establishment unit configured to establish a secure communication connection between the target connection application and the target control application based on the security authentication information
  • An application control unit is configured to control the target connection application based on the secure communication connection through the target control application.
  • the security authentication information includes the target connection application identification and security authentication identification of the target connection application
  • connection establishment unit is configured to obtain connection application information of connection applications that can be connected to the target control application locally in the terminal, where the connection application information includes connection application identifiers of each of the connection applications;
  • a secure communication connection between the target connection application and the target control application is established.
  • connection establishment unit is configured to send the security verification information of the target control application to the target connection application through the target control application based on the security authentication information;
  • connection establishment unit is configured to establish a connection to be verified between the target connection application and the target control application based on the security authentication information
  • connection verification request of the target connection application and send the security verification information of the target control application to the target connection application through the target control application according to the connection verification request;
  • connection establishment unit includes a credibility verification unit and a connection establishment subunit
  • the credibility verification unit is configured to trigger the target connection application to perform credibility verification on the security verification information based on the security verification information;
  • connection establishment subunit is configured to establish a secure communication connection between the target connection application and the target control application if the security verification information passes the credibility check.
  • the credibility verification unit is configured to trigger the target connection application to send credibility verification information to the target control application based on the security verification information;
  • the target control application performs credibility verification on the security verification information based on the credibility verification information.
  • an application control unit is configured to receive control instructions sent by the control device through the target control application
  • embodiments of the present application also provide an electronic device, including a memory and a processor; the memory stores application programs, and the processor is used to run the application programs in the memory to execute the tasks provided by the embodiments of the present application. Any of the steps in the application control method.
  • embodiments of the present application also provide a computer-readable storage medium that stores a plurality of instructions, and the instructions are suitable for loading by the processor to execute any of the instructions provided by the embodiments of the present application. Steps in a method of application control.
  • embodiments of the present application also provide a computer program product, which includes a computer program or instructions.
  • a computer program product which includes a computer program or instructions.
  • the steps in any application control method provided by the embodiments of the present application are implemented.
  • the control application information of the control application to be connected to the target connection application in the terminal can be obtained; the target control application is determined based on the control application information; and the target control application is sent to the target control application through the target connection application.
  • Security authentication information of the target connection application based on the security authentication information, establish a secure communication connection between the target connection application and the target control application; through the target control application, control the target connection application based on the secure communication connection; Since in the embodiment of the present application, based on the control application information of the target control application, the interconnected target connection application and the target control application are determined, and the security authentication information for establishing a secure communication connection is obtained, therefore, the Internet of Things device can be The target control application is connected to the target connection application in the Internet of Things device, and the target connection application is controlled through the target control application, which facilitates the user to control the Internet of Things device and improves the user experience.
  • the Internet of Things device can be The target control application in the IoT device is connected to the target connection application in the IoT device, and the target connection application is controlled through the target control application, which facilitates the user to control the IoT device and improves the user experience.
  • Figure 1 is a schematic diagram of a scenario of an application control method provided by an embodiment of the present application
  • Figure 2 is a flow chart of an application control method provided by an embodiment of the present application.
  • Figure 3 is a schematic diagram of the connection relationship between the target control application and the connection application provided by the embodiment of the present application;
  • Figure 4 is a schematic diagram of the technical implementation of the application control method provided by the embodiment of the present application.
  • Figure 5 is a schematic structural diagram of an application control device provided by an embodiment of the present application.
  • Figure 6 is another structural schematic diagram of an application control device provided by an embodiment of the present application.
  • FIG. 7 is a schematic structural diagram of an electronic device provided by an embodiment of the present application.
  • Embodiments of the present application provide an application control method, device, electronic device, and computer-readable storage medium. Specifically, embodiments of the present application provide an application control method suitable for an application control device, and the application control device can be integrated in an electronic device.
  • the electronic device may be a terminal or other equipment, including but not limited to mobile terminals and fixed terminals.
  • mobile terminals include but are not limited to smartphones, smart watches, tablets, laptops, smart vehicles, etc.
  • fixed terminals include but are not limited to Desktop computers, smart TVs, etc.
  • the electronic device can also be a server or other equipment.
  • the server can be an independent physical server, or a server cluster or distributed system composed of multiple physical servers. It can also provide cloud services, cloud databases, cloud computing, and cloud functions. , cloud storage, network services, cloud communications, middleware services, domain name services, security services, CDN (Content Delivery Network, content distribution network), and cloud servers for basic cloud computing services such as big data and artificial intelligence platforms, but not Limited to this.
  • the application control method in the embodiment of the present application can be implemented by the terminal, or can be implemented by the terminal and the server jointly.
  • the application control system provided by the embodiment of the present application includes a terminal 10, a server 20, etc.; the terminal 10 and the server 20 are connected through a network, for example, through a wired or wireless network connection.
  • the terminal 10 may be a terminal that performs application control, and is used to obtain control application information of a control application to be connected to a target connection application locally in the terminal, determine the target control application based on the control application information, and use the target connection application Send the security authentication information of the target connection application to the target control application, and establish a secure communication connection between the target connection application and the target control application based on the security authentication information.
  • the server 20 may be configured to receive control instructions input by the user and send the control instructions to the terminal 10 .
  • the terminal 10 may receive the control instruction, and control the target connection application based on the secure communication connection through the target control application.
  • the user can also directly input control instructions to the terminal 10, which is not limited in the embodiments of the present application.
  • the embodiments of this application will be described from the perspective of an application control device.
  • the application control device may be integrated in a terminal.
  • the target connection application is an application that needs to connect with the control application.
  • the application type of the target connection application may be a video application, a communication application, a music application, etc.
  • the embodiment of this application does not limit the application type of the target connection application.
  • the target connection application can be determined by automatically selecting the non-control application as the target connection application when detecting the startup of any non-control application in the terminal; or, the target connection application can also be based on the user's request in the terminal.
  • the selection operation applied is OK.
  • the target connection application and the control application are located in the same terminal, so that after the target control application is connected to the target connection application, the target connection application can be controlled through the target control application.
  • the local control application can be determined through the information in the local broadcast to obtain the control application information of the control application. That is, before step 201, the application control method provided by the embodiment of the present application can also be include:
  • the local broadcast message is parsed to determine the control application to be connected to the target connection application locally in the terminal.
  • local broadcast messages can also be called localhost broadcasts, that is, broadcasts performed locally on the terminal.
  • localhost broadcasts that is, broadcasts performed locally on the terminal.
  • some applications in the terminal can send local broadcast messages, and other applications can receive local broadcast messages sent by the application, etc.
  • local broadcast messages can be received through the target connection application, and each control application can be discovered in the local broadcast messages through the target connection application.
  • the control application information may be information used to describe the control application.
  • the control application information may include but is not limited to the manufacturer identification number, application identification number and/or application name of the control application.
  • target control applications can be determined automatically.
  • the target connection application can be set to connect only to the control application corresponding to a certain application identification number through the preset connection information. Then the target control application can be determined based on the control application information and the preset connection information in the target connection application. .
  • target control applications may be selected by the user.
  • a selection page may be displayed on the terminal for the user to select a target control application to connect with the target connection application. That is to say, the step "determining the target control application based on the control application information" may specifically include:
  • a control application selection instruction input by the user is received, and a target control application connected to the target connection application is determined according to the control application selection instruction.
  • control application selection instruction can be automatically generated through the user's touch operation or other operations, or can be input by the user through voice, text, etc., which is not limited in the embodiments of the present application.
  • the target connection application can list all control applications corresponding to the control application information on the application page according to the control application information, and prompt the user to select which control application to connect to. In response to the user's control application selection operation, the control application selected by the user is used as the target control application.
  • the target control application is a control application connected to the target connection application. It can be understood that there can be several control applications in the same terminal, as shown in Figure 3, and each control application can also be connected to several applications.
  • step 203 may include:
  • security authentication information of the target connection application is sent to the target control application through the target connection application.
  • the security authentication information may include but is not limited to the target connection application identification and security authentication identification of the target connection application, and so on.
  • the target connection application identification may be the unique identification of the target connection application
  • the security authentication identification may be the unique password of the target connection application.
  • the security authentication identification may be the PIN code of the target connection application, etc.
  • the secure communication connection is a connection for communication between the target connection application and the target control application.
  • the target connection application can forward control instructions to the target control application through a secure communication connection, and so on.
  • a secure communication connection can be established directly through the target connection application based on the security authentication information.
  • the target connection application can directly try to establish a connection with each connection application based on the PIN code in the security authentication information, and use the successfully established connection as a secure communication connection between the target connection application and the target control application.
  • the security authentication information may include the target connection application identification and the security authentication identification of the target connection application.
  • the target control application may, based on the target connection application identification, obtain the information from several connection applications received. Obtain the application information of the target connection application from the application information. That is to say, the step "based on the security authentication information, establishing a secure communication connection between the target connection application and the target control application" may specifically include:
  • connection application information of the connection application that can connect with the target control application locally in the terminal, where the connection application information includes the connection application identification of each of the connection applications;
  • a secure communication connection between the target connection application and the target control application is established.
  • connection application information is used to describe the connection application.
  • the connection application information may include but is not limited to the manufacturer identification number, application identification number, application name and/or application unique identification of the connection application.
  • the local connection application that can connect to the target control application can be determined through the information in the local broadcast to obtain the control application information of the control application, that is, before step 201, the application control provided by the embodiment of the present application Methods can also include:
  • the local broadcast message is parsed to determine the connection application to be connected to the target control application locally in the terminal.
  • local broadcast messages can be received through the target control application, and each connected application can be discovered in the local broadcast message through the target control application.
  • connection application information of the target connection application can be determined from the connection application information of several connection applications through matching between the identifications, that is, step "determine based on each of the connection application identifications and the target connection application identification.
  • the "connection application information of the target connection application” may include:
  • Matching is performed based on each of the connection application identifiers and the target connection application identifier, and the connection application information corresponding to the connection application identifier that successfully matches the target connection application identifier is used as the connection application information of the target connection application.
  • the two identifiers when the identifiers are matched, the two identifiers may be identical as a condition for successful matching, or due to the difference in the identifier sending time, the identifier sent by the target connection application each time may change the identifier according to some mapping rules. This When the two identifiers meet the preset mapping rules, it can be used as a condition for successful matching, and so on.
  • the user may confirm whether to establish a secure communication connection between the target connection application and the target control application.
  • a confirmation page can be provided on the terminal for the user to confirm the establishment of a secure communication connection between the target connection application and the target control application. That is to say, the step "establishing a secure communication connection between the target connection application and the target control application based on the security authentication identification and connection application information of the target connection application" may include:
  • connection application information of the target connection application Based on the connection application information of the target connection application, display a connection application confirmation control in the application page of the target control application for the user to confirm the establishment of the connection between the target control application and the target connection application;
  • control application selection instruction can be automatically generated through the user's touch operation or other operations, or can be input by the user through voice, text, etc., which is not limited in the embodiments of the present application.
  • the target control application can display the connection application information of the target connection application on the application page, and prompt the user to confirm the connection with the target connection application.
  • a secure communication connection between the target connection application and the target control application is established.
  • the target connection application when establishing a connection, if the target connection application reads the vendor ID, application ID and other public information of the target control application without verifying the legality of the information, the established communication connection It may not be secure for the target connection application, so combining it with the target control application provides more secure information for the target connection application to verify. That is, the step "based on the security authentication information, establishing a secure communication connection between the target connection application and the target control application" may specifically include:
  • the security verification information may be private information of the target control application, which can prove that the target control application is indeed the initiator of the connection establishment process.
  • the security verification information may include the public key of the device certificate of the target control application, or the security verification information may include other information of the target control application in addition to the public key of the device certificate of the target control application.
  • the embodiments of this application provide This is not limited.
  • the security verification information can be directly sent by the target control application to the target connection application during the process of establishing a secure communication connection.
  • the security verification information can be sent only when the target connection application requests to verify the validity of the information. That is to say, the step "based on the security authentication information, sending the security verification information of the target control application to the target connection application through the target control application" may specifically include:
  • connection verification request of the target connection application and send the security verification information of the target control application to the target connection application through the target control application according to the connection verification request;
  • the step "based on the security verification information, establishing a secure communication connection between the target connection application and the target control application" may specifically include:
  • the connection to be verified may be marked by the target connection application.
  • the target connection application can detect the currently established connection, and if the connection does not undergo credibility verification, mark the connection as a connection to be verified.
  • the step "based on the security verification information, establishing a secure communication connection between the target connection application and the target control application" may specifically include:
  • the credibility check may include but is not limited to: whether the certificate is trustworthy, such as the issuance of a trusted root certificate; whether the signature is correct; whether the random number is correct, etc.
  • connection to be verified can be marked as a trusted connection through the target connection application as a secure communication connection between the target connection application and the target control application.
  • the step "based on the security verification information, triggering the target connection application to perform credibility verification on the security verification information" may specifically include:
  • the target control application performs credibility verification on the security verification information based on the credibility verification information.
  • the credibility verification information may be a secret key of the target connection application, or the credibility verification information may be a random number provided by the target connection application, or the like.
  • the step "using the target control application to perform credibility verification on the security verification information based on the credibility verification information” may include:
  • the target control application generates credibility feedback information based on the credibility verification information and control application information, and sends the credibility feedback information to the target connection application;
  • the target connection application performs credibility verification on the credibility feedback information based on the credibility verification information.
  • the credibility feedback information may be obtained by mapping credibility verification information and control application information through preset feedback mapping rules by the target control application.
  • the target control application can encrypt its device information, such as manufacturer ID, application ID, application name, and random number, using the device certificate private key signature to obtain credibility feedback information.
  • device information such as manufacturer ID, application ID, application name, and random number
  • the target connection application may verify whether the vendor ID, application ID, application name and other information in the credibility feedback information are consistent with the control application information of the target control application.
  • the IoT control terminal sends control commands to the target control application.
  • the target control application can wake up the target connection application, forward the command, and achieve control.
  • control the target connection application based on the secure communication connection through the target control application may specifically include:
  • the content providing application (target connection application) and target control application in the smart TV can establish a secure communication connection through the technical schematic diagram shown in Figure 4.
  • the establishment of a secure communication connection between the content providing application and the target control application in the smart TV can be achieved through the following code.
  • cast -> tv Send content to provide basic information and PIN code of the application
  • the embodiments of the present application can obtain the control application information of the control application to be connected to the target connection application in the local terminal; determine the target control application based on the control application information; and control the target through the target connection application.
  • the application sends the security authentication information of the target connection application; based on the security authentication information, establishes a secure communication connection between the target connection application and the target control application; through the target control application, based on the secure communication
  • the connection controls the target connection application; because in the embodiment of the present application, based on the control application information of the target control application, the mutually connected target connection application and the target control application are determined, and the security authentication information for establishing a secure communication connection is obtained.
  • the target control application in the Internet of Things device can be connected with the target connection application in the Internet of Things device, and the target connection application can be controlled through the target control application, which facilitates the user to control the Internet of Things device and improves the user experience.
  • embodiments of the present application also provide an application control device.
  • the device may include:
  • the information acquisition unit 501 may be used to acquire the control application information of the control application to be connected to the target connection application locally in the terminal;
  • the application determining unit 502 may be configured to determine a target control application based on the control application information
  • the information sending unit 503 may be configured to send the security authentication information of the target connection application to the target control application through the target connection application;
  • the connection establishment unit 504 may be configured to establish a secure communication connection between the target connection application and the target control application based on the security authentication information;
  • the application control unit 505 may be configured to control the target connection application based on the secure communication connection through the target control application.
  • the security authentication information may include the target connection application identification and security authentication identification of the target connection application
  • connection establishment unit 504 may be used to obtain connection application information of connection applications that can connect with the target control application locally in the terminal.
  • the connection application information may include connection application identification of each connection application. ;
  • a secure communication connection between the target connection application and the target control application is established.
  • connection establishment unit 504 may be configured to send the security verification information of the target control application to the target connection application through the target control application based on the security authentication information;
  • connection establishment unit 504 may be configured to establish a connection to be verified between the target connection application and the target control application based on the security authentication information
  • connection verification request of the target connection application and send the security verification information of the target control application to the target connection application through the target control application according to the connection verification request;
  • connection establishment unit 504 may include a credibility verification unit 5041 and a connection establishment subunit 5042;
  • the credibility verification unit 5041 may be configured to trigger the target connection application to perform credibility verification on the security verification information based on the security verification information;
  • connection establishment subunit 5042 may be configured to establish a secure communication connection between the target connection application and the target control application if the security verification information passes the credibility check.
  • the credibility verification unit 5041 may be configured to trigger the target connection application to send credibility verification information to the target control application based on the security verification information;
  • the target control application performs credibility verification on the security verification information based on the credibility verification information.
  • the application control unit 505 may be configured to receive control instructions sent by the control device through the target control application;
  • the control application information of the control application to be connected to the target connection application in the terminal can be obtained; the target control application is determined based on the control application information; and the target connection application is sent to the target through the target connection application.
  • the control application sends the security authentication information of the target connection application; based on the security authentication information, establishes a secure communication connection between the target connection application and the target control application; through the target control application, based on the security
  • the communication connection controls the target connection application; because in the embodiment of the present application, based on the control application information of the target control application, the mutually connected target connection application and the target control application are determined, and the security authentication for establishing a secure communication connection is obtained.
  • the target control application in the IoT device can be connected to the target connection application in the IoT device, and the target connection application can be controlled through the target control application, which facilitates the user to control the IoT device and improves the user experience.
  • the embodiment of the present application also provides an electronic device, which may be a terminal or a server, etc., as shown in Figure 7, which shows a schematic structural diagram of the electronic device involved in the embodiment of the present application. Specifically, :
  • the electronic device may include a radio frequency (RF) circuit 701, a memory 702 including one or more computer-readable storage media, an input unit 703, a display unit 704, a sensor 705, an audio circuit 706, a wireless fidelity (WiFi) ,Wireless Fidelity) module 707, a processor 708 including one or more processing cores, a power supply 709 and other components.
  • RF radio frequency
  • the RF circuit 701 can be used to receive and send information or signals during a call. In particular, after receiving the downlink information of the base station, it is handed over to one or more processors 708 for processing; in addition, the uplink data is sent to the base station. .
  • the RF circuit 701 includes, but is not limited to, an antenna, at least one amplifier, a tuner, one or more oscillators, a Subscriber Identity Module (SIM) card, a transceiver, a coupler, a low noise amplifier (LNA, Low Noise Amplifier), duplexer, etc.
  • SIM Subscriber Identity Module
  • RF circuit 701 can also communicate with networks and other devices through wireless communications.
  • Wireless communication can use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM, Global System of Mobile communication), General Packet Radio Service (GPRS, General Packet Radio Service), Code Division Multiple Access (CDMA, Code Division Multiple Access), Wideband Code Division Multiple Access (WCDMA, Wideband Code Division Multiple Access), Long Term Evolution (LTE, Long Term Evolution), email, Short Messaging Service (SMS, Short Messaging Service), etc.
  • GSM Global System of Mobile communication
  • GPRS General Packet Radio Service
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long Term Evolution
  • SMS Short Messaging Service
  • the memory 702 can be used to store software programs and modules.
  • the processor 708 executes various functional applications and data processing by running the software programs and modules stored in the memory 702 .
  • the memory 702 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function (such as a sound playback function, an image playback function, etc.), etc.; the storage data area may store a program based on Data created by the use of electronic devices (such as audio data, phone books, etc.), etc.
  • memory 702 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device. Accordingly, the memory 702 may also include a memory controller to provide the processor 708 and the input unit 703 with access to the memory 702 .
  • the input unit 703 may be used to receive input numeric or character information, and to generate keyboard, mouse, joystick, optical or trackball signal input related to user settings and function control.
  • the input unit 703 may include a touch-sensitive surface as well as other input devices.
  • a touch-sensitive surface also known as a touch display or trackpad, collects the user's touch operations on or near it (such as the user using a finger, stylus, or any suitable object or accessory on or near the touch-sensitive surface. operations near the surface) and drive the corresponding connection device according to the preset program.
  • the touch-sensitive surface may include two parts: a touch detection device and a touch controller.
  • the touch detection device detects the user's touch orientation, detects the signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts it into contact point coordinates, and then sends it to the touch controller. to the processor 708, and can receive commands sent by the processor 708 and execute them.
  • touch-sensitive surfaces can be implemented using a variety of types including resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 703 may also include other input devices. Specifically, other input devices may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), trackball, mouse, joystick, etc.
  • the display unit 704 may be used to display information input by the user or information provided to the user as well as various graphical user interfaces of the electronic device. These graphical user interfaces may be composed of graphics, text, icons, videos, and any combination thereof.
  • the display unit 704 may include a display panel, and optionally, a liquid crystal display (LCD, Liquid Crystal Display) may be used. Crystal Display), organic light-emitting diode (OLED, Organic Light-Emitting Diode) and other forms to configure the display panel.
  • the touch-sensitive surface can cover the display panel. When the touch-sensitive surface detects a touch operation on or near it, it is sent to the processor 708 to determine the type of the touch event.
  • the processor 708 then displays the display panel according to the type of the touch event. Corresponding visual output is provided on the panel.
  • the touch-sensitive surface and the display panel are used as two independent components to implement the input and input functions, in some embodiments, the touch-sensitive surface and the display panel can be integrated to implement the input and output functions.
  • the electronic device may also include at least one sensor 705, such as a light sensor, a motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor.
  • the ambient light sensor may adjust the brightness of the display panel according to the brightness of the ambient light.
  • the proximity sensor may close the display panel and/or when the electronic device moves to the ear. Backlight.
  • the gravity acceleration sensor can detect the magnitude of acceleration in all directions (usually three axes). It can detect the magnitude and direction of gravity when stationary.
  • the audio circuit 706, speaker, and microphone can provide an audio interface between the user and the electronic device.
  • the audio circuit 706 can transmit the electrical signal converted from the received audio data to the speaker, which converts it into a sound signal and outputs it; on the other hand, the microphone converts the collected sound signal into an electrical signal, which is received and converted by the audio circuit 706
  • the audio data is processed by the audio data output processor 708 and then sent to, for example, another electronic device through the RF circuit 701, or the audio data is output to the memory 702 for further processing.
  • Audio circuitry 706 may also include an earphone jack to provide communication between peripheral earphones and electronic devices.
  • WiFi is a short-distance wireless transmission technology. Electronic devices can help users send and receive emails, browse web pages, and access streaming media through the WiFi module 707. It provides users with wireless broadband Internet access.
  • FIG. 7 shows the WiFi module 707, it can be understood that it is not a necessary component of the electronic device and can be omitted as needed without changing the essence of the application.
  • the processor 708 is the control center of the electronic device, using various interfaces and lines to connect various parts of the entire mobile phone, by running or executing software programs and/or modules stored in the memory 702, and calling data stored in the memory 702, Perform various functions of electronic devices and process data.
  • the processor 708 may include one or more processing cores; preferably, the processor 708 may integrate an application processor and a modem processor, where the application processor mainly processes the operating system, user interface, application programs, etc. , the modem processor mainly handles wireless communications. It can be understood that the above-mentioned modem processor may not be integrated into the processor 708.
  • the electronic device also includes a power supply 709 (such as a battery) that supplies power to various components.
  • a power supply 709 (such as a battery) that supplies power to various components.
  • the power supply can be logically connected to the processor 708 through a power management system, so that functions such as charging, discharging, and power consumption management can be implemented through the power management system.
  • Power supply 709 may also include one or more DC or AC power supplies, recharging systems, power failure detection circuits, power converters or inverters, power status indicators, and other arbitrary components.
  • the electronic device may also include a camera, a Bluetooth module, etc., which will not be described again here.
  • the processor 708 in the electronic device will load the executable files corresponding to the processes of one or more application programs into the memory 702 according to the following instructions, and the processor 708 will run the executable files stored in The application program in the memory 702 implements various functions, as follows:
  • the target connection application is controlled based on the secure communication connection.
  • embodiments of the present application provide a computer-readable storage medium in which a plurality of instructions are stored, and the instructions can be loaded by the processor to execute the steps in any application control method provided by the embodiments of the present application. .
  • this command can perform the following steps:
  • the target connection application is controlled based on the secure communication connection.
  • the computer-readable storage medium may include: read-only memory (ROM, Read Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or optical disk, etc.
  • a computer program product or computer program is also provided.
  • the computer program product or computer program includes computer instructions, and the computer instructions are stored in a computer-readable storage medium.
  • the processor of the electronic device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the electronic device performs the methods provided in various optional implementations in the above embodiments.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Multimedia (AREA)
  • Telephonic Communication Services (AREA)
  • Stored Programmes (AREA)

Abstract

一种应用控制方法、装置、电子设备和存储介质。方法包括:获取终端本地中待与目标连接应用进行连接的控制应用的控制应用信息(201);基于控制应用信息确定目标控制应用(202);通过目标连接应用向目标控制应用发送目标连接应用的安全认证信息(203);基于安全认证信息,建立目标连接应用和目标控制应用之间的安全通信连接(204);通过目标控制应用,基于安全通信连接对目标连接应用进行控制(205)。应用控制方法可以将物联网设备中的目标控制应用与物联网设备中的目标连接应用进行连接,通过目标控制应用对目标连接应用进行控制,便于用户对物联网设备进行控制操作,提升用户体验。

Description

一种应用控制方法、装置、终端设备及存储介质 技术领域
本申请涉及物联网技术领域,具体涉及一种应用控制方法、装置、电子设备和存储介质。
背景技术
随着当前科技的快速发展,人们越来越习惯通过手机等便捷的智能设备控制物联网系统中的家电设备,例如智能电视、智能音箱等。
目前,对于智能电视等物联网设备,其核心功能例如视频播放、音频播放等,是将市场中部分应用程序的数据或功能集成在物联网设备中。但采用这种方案,由于物联网设备厂商的开发能力等因素的限制,有很多应用程序并不支持将功能或数据集成在设备中,导致用户无法通过直接控制物联网设备的方式体验这些应用程序的功能,影响用户体验。
技术问题
现有技术中由于物联网设备厂商的开发能力等因素的限制,有很多应用程序并不支持将功能或数据集成在设备中,导致用户无法通过直接控制物联网设备的方式体验这些应用程序的功能,影响用户体验。
技术解决方案
本申请实施例提供一种应用控制方法、装置、电子设备和存储介质,可以通过物联网设备中的控制应用对物联网设备各类应用程序的功能进行绑定,便于用户对物联网设备进行控制操作,提升用户体验。
本申请实施例提供一种应用控制方法,包括:
获取终端本地中待与目标连接应用进行连接的控制应用的控制应用信息;
基于所述控制应用信息确定目标控制应用;
通过所述目标连接应用向所述目标控制应用发送所述目标连接应用的安全认证信息;
基于所述安全认证信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接;
通过所述目标控制应用,基于所述安全通信连接对所述目标连接应用进行控制。
相应的,本申请实施例提供一种应用控制装置,包括:
信息获取单元,用于获取终端本地中待与目标连接应用进行连接的控制应用的控制应用信息;
应用确定单元,用于基于所述控制应用信息确定目标控制应用;
信息发送单元,用于通过所述目标连接应用向所述目标控制应用发送所述目标连接应用的安全认证信息;
连接建立单元,用于基于所述安全认证信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接;
应用控制单元,用于通过所述目标控制应用,基于所述安全通信连接对所述目标连接应用进行控制。
可选的,所述安全认证信息包括所述目标连接应用的目标连接应用标识和安全认证标识;
所述连接建立单元,用于获取所述终端本地中可与所述目标控制应用进行连接的连接应用的连接应用信息,所述连接应用信息中包括各所述连接应用的连接应用标识;
根据各所述连接应用标识和所述目标连接应用标识,确定所述目标连接应用的连接应用信息;
基于所述目标连接应用的安全认证标识和连接应用信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接。
可选的,所述连接建立单元,用于基于所述安全认证信息,通过所述目标控制应用向所述目标连接应用发送所述目标控制应用的安全校验信息;
基于所述安全校验信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接。
可选的,所述连接建立单元,用于基于所述安全认证信息,建立所述目标连接应用与所述目标控制应用之间的待校验连接;
获取所述目标连接应用的连接验证请求,根据所述连接验证请求,通过所述目标控制应用向所述目标连接应用发送所述目标控制应用的安全校验信息;
基于所述安全校验信息和所述待校验连接,建立所述目标连接应用和所述目标控制应用之间的安全通信连接。
可选的,所述连接建立单元,包括可信性校验单元和连接建立子单元;
所述可信性校验单元,用于基于所述安全校验信息,触发所述目标连接应用对所述安全校验信息进行可信性校验;
所述连接建立子单元,用于若所述安全校验信息通过所述可信性校验,建立所述目标连接应用和所述目标控制应用之间的安全通信连接。
可选的,所述可信性校验单元,用于基于所述安全校验信息,触发所述目标连接应用向所述目标控制应用发送可信性验证信息;
通过所述目标控制应用基于所述可信性验证信息,对所述安全校验信息进行可信性校验。
可选的,应用控制单元,用于通过所述目标控制应用接收控制设备发送的控制指令;
通过所述目标控制应用,根据所述安全连接,将所述控制指令转发给所述目标连接应用;
控制所述目标连接应用执行所述控制指令指示的连接应用操作。
相应的,本申请实施例还提供一种电子设备,包括存储器和处理器;所述存储器存储有应用程序,所述处理器用于运行所述存储器内的应用程序,以执行本申请实施例所提供的任一种应用控制方法中的步骤。
相应的,本申请实施例还提供一种计算机可读存储介质,所述计算机可读存储介质存储有多条指令,所述指令适于处理器进行加载,以执行本申请实施例所提供的任一种应用控制方法中的步骤。
此外,本申请实施例还提供一种计算机程序产品,包括计算机程序或指令,所述计算机程序或指令被处理器执行时实现本申请实施例所提供的任一种应用控制方法中的步骤。
采用本申请实施例的方案,可以获取终端本地中待与目标连接应用进行连接的控制应用的控制应用信息;基于该控制应用信息确定目标控制应用;通过该目标连接应用向该目标控制应用发送该目标连接应用的安全认证信息;基于该安全认证信息,建立该目标连接应用和该目标控制应用之间的安全通信连接;通过该目标控制应用,基于该安全通信连接对该目标连接应用进行控制;由于在本申请实施例中,基于目标控制应用的控制应用信息,确定了相互连接的目标连接应用和目标控制应用,获取了建立安全通信连接的安全认证信息,因此,可以将物联网设备中的目标控制应用与物联网设备中的目标连接应用进行连接,通过目标控制应用对目标连接应用进行控制,便于用户对物联网设备进行控制操作,提升用户体验。
有益效果
有益效果:在本申请实施例中,基于目标控制应用的控制应用信息,确定了相互连接的目标连接应用和目标控制应用,获取了建立安全通信连接的安全认证信息,因此,可以将物联网设备中的目标控制应用与物联网设备中的目标连接应用进行连接,通过目标控制应用对目标连接应用进行控制,便于用户对物联网设备进行控制操作,提升用户体验。
附图说明
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本申请实施例提供的应用控制方法的场景示意图;
图2是本申请实施例提供的应用控制方法的流程图;
图3是本申请实施例提供的目标控制应用与连接应用的连接关系示意图;
图4是本申请实施例提供的应用控制方法的技术实现示意图;
图5是本申请实施例提供的应用控制装置的结构示意图;
图6是本申请实施例提供的应用控制装置的另一结构示意图;
图7是本申请实施例提供的电子设备的结构示意图。
本发明的实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请实施例提供一种应用控制方法、装置、电子设备和计算机可读存储介质。具体地,本申请实施例提供适用于应用控制装置的应用控制方法,该应用控制装置可以集成在电子设备中。
该电子设备可以为终端等设备,包括但不限于移动终端和固定终端,例如移动终端包括但不限于智能手机、智能手表、平板电脑、笔记本电脑、智能车载等,其中,固定终端包括但不限于台式电脑、智能电视等。
该电子设备还可以为服务器等设备,该服务器可以是独立的物理服务器,也可以是多个物理服务器构成的服务器集群或者分布式系统,还可以是提供云服务、云数据库、云计算、云函数、云存储、网络服务、云通信、中间件服务、域名服务、安全服务、CDN(Content Delivery Network,内容分发网络)、以及大数据和人工智能平台等基础云计算服务的云服务器,但并不局限于此。
本申请实施例的应用控制方法,可以由终端实现,也可以由终端和服务器共同实现。
下面以终端和服务器共同实现该应用控制方法为例,对该方法进行说明。
如图1所示,本申请实施例提供的应用控制系统包括终端10和服务器20等;终端10与服务器20之间通过网络连接,比如,通过有线或无线网络连接等。
其中,终端10可以为执行应用控制的终端,用于获取终端本地中待与目标连接应用进行连接的控制应用的控制应用信息,基于所述控制应用信息确定目标控制应用,通过所述目标连接应用向所述目标控制应用发送所述目标连接应用的安全认证信息,基于所述安全认证信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接。
服务器20,可以用于接收用户输入的控制指令,将所述控制指令发送给终端10。
终端10可以接收所述控制指令,通过所述目标控制应用,基于所述安全通信连接对所述目标连接应用进行控制。
可以理解的是,用户也可以直接向终端10输入控制指令,本申请实施例对此不做限定。
以下分别进行详细说明。需要说明的是,以下实施例的描述顺序不作为对实施例优选顺序的限定。
本申请实施例将从应用控制装置的角度进行描述,该应用控制装置具体可以集成在终端中。
如图2所示,本实施例的应用控制方法的具体流程可以如下:
201、获取终端本地中待与目标连接应用进行连接的控制应用的控制应用信息。
其中,目标连接应用为需要与控制应用进行连接的应用程序。目标连接应用的应用类型可以为视频类应用、通讯类应用、音乐类应用等等,本申请实施例对目标连接应用的应用类型不做限定。
具体的,目标连接应用的确定,可以是在检测终端中任一个非控制应用的应用启动时,自动将该非控制应用的应用作为目标连接应用;或者,目标连接应用也可以根据用户对终端中应用的选择操作确定。
在本申请实施例中,目标连接应用与控制应用位于同一终端中,以便于目标控制应用与目标连接应用连接后,通过目标控制应用对目标连接应用进行控制。
在一些可选的实施例中,可以通过本地广播中的信息,确定本地中的控制应用,以获取控制应用的控制应用信息,即,步骤201之前,本申请实施例提供的应用控制方法还可以包括:
获取本地广播消息;
解析所述本地广播消息,确定终端本地中待与目标连接应用进行连接的控制应用。
其中,本地广播消息,又可成为localhost广播,即在终端本地中进行的广播。例如,终端中的某些应用程序可以发送本地广播消息,其他应用程序可以接收到该应用程序发送的本地广播消息等。
比如,可以通过目标连接应用接收本地广播消息,通过目标连接应用在本地广播消息中发现各控制应用。
202、基于所述控制应用信息确定目标控制应用。
其中,控制应用信息可以是用于对控制应用进行描述的信息。例如,控制应用信息可以包括但不限于控制应用的厂商标识号、应用标识号和/或应用名称等。
在一些示例中,目标控制应用可以自动确定。比如,目标连接应用中可以通过预设连接信息设置了只能与某一应用标识号对应的控制应用进行连接,则可以根据控制应用信息以及目标连接应用中的预设连接信息,确定目标控制应用。
在另一些示例中,目标控制应用可以由用户自行选择。例如,当终端具有显示页面时,可以在终端上显示选择页面,以供用户选择与目标连接应用进行连接的目标控制应用。也就是说,步骤“基于所述控制应用信息确定目标控制应用”,具体可以包括:
基于所述控制应用信息,在所述目标连接应用的应用页面中显示控制应用选择控件;
接收用户输入的控制应用选择指令,根据所述控制应用选择指令确定与所述目标连接应用连接的目标控制应用。
其中,控制应用选择指令可以通过用户的触控等操作自动生成,也可以由用户通过语音、文字等方式输入,本申请实施例对此不做限定。
例如,目标连接应用可以在应用页面中根据控制应用信息列出所有控制应用信息对应的控制应用,提示用户选择与哪一个控制应用进行连接。响应于用户的控制应用选择操作,将用户选中的控制应用作为目标控制应用。
203、通过所述目标连接应用向所述目标控制应用发送所述目标连接应用的安全认证信息。
其中,目标控制应用为与目标连接应用进行连接的控制应用。可以理解的是,同一终端中可以有若干个控制应用,如图3所示,每个控制应用也可以与若干个应用进行连接。
例如,可以通过如下的代码实现同一控制应用与多个应用的连接:
@startuml
[IoT控制端] as client
    component 终端 {
        [目标控制应用] as tvapp
        [连接应用1] as cast1
        [连接应用1] as cast2
    }
    client -down-> tvapp
    tvapp  -down-> cast1
    tvapp  -down-> cast2
@enduml
具体的,当目标控制应用是通过用户自行确定的方式确定的时,步骤203可以包括:
响应于所述控制应用选择指令,通过所述目标连接应用向所述目标控制应用发送所述目标连接应用的安全认证信息。
其中,安全认证信息可以包括但不限于目标连接应用的目标连接应用标识和安全认证标识等等。例如,目标连接应用标识可以是目标连接应用的唯一标识,安全认证标识可以是目标连接应用的唯一密码,比如安全认证标识可以是目标连接应用的PIN码等。
204、基于所述安全认证信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接。
其中,安全通信连接为目标连接应用和目标控制应用进行通讯的连接。例如,目标连接应用可以通过安全通信连接向目标控制应用进行控制指令的转发等等。
在一些可选的实施例中,可以直接通过目标连接应用,根据安全认证信息建立安全通信连接。比如,目标连接应用可以直接根据安全认证信息中的PIN码,尝试与各连接应用建立连接,将成功建立的连接作为目标连接应用和目标控制应用之间的安全通信连接。
在另一些可选的实施例中,所述安全认证信息可以包括所述目标连接应用的目标连接应用标识和安全认证标识,目标控制应用可以根据目标连接应用标识,从接收到的若干连接应用的应用信息中得到目标连接应用的应用信息。也就是说,步骤“基于所述安全认证信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接”,具体可以包括:
获取所述终端本地中可与所述目标控制应用进行连接的连接应用的连接应用信息,所述连接应用信息中包括各所述连接应用的连接应用标识;
根据各所述连接应用标识和所述目标连接应用标识,确定所述目标连接应用的连接应用信息;
基于所述目标连接应用的安全认证标识和连接应用信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接。
其中,连接应用信息用于对连接应用进行描述,连接应用信息可以包括但不限于连接应用的厂商标识号、应用标识号、应用名称和/或应用唯一标识等。
其中,可以通过本地广播中的信息,确定本地中的可与所述目标控制应用进行连接的连接应用,以获取控制应用的控制应用信息,即,步骤201之前,本申请实施例提供的应用控制方法还可以包括:
获取本地广播消息;
解析所述本地广播消息,确定终端本地中待与目标控制应用进行连接的连接应用。
比如,可以通过目标控制应用接收本地广播消息,通过目标控制应用在本地广播消息中发现各连接应用。
具体的,可以通过标识之间的匹配,从若干连接应用的连接应用信息中,确定目标连接应用的连接应用信息,即,步骤“根据各所述连接应用标识和所述目标连接应用标识,确定所述目标连接应用的连接应用信息”,可以包括:
根据各所述连接应用标识和所述目标连接应用标识进行匹配,将与所述目标连接应用标识匹配成功的连接应用标识对应的连接应用信息,作为所述目标连接应用的连接应用信息。
其中,在标识匹配时,可以是将两个标识完全相同作为匹配成功的条件,或者,由于标识发送时间的不同,目标连接应用每次发送的标识可能按照某种映射规则对标识进行改变,此时,可以将两个标识符合预设的映射规则作为匹配成功的条件,等等。
在一些可选的实施例中,可以由用户确认是否要建立目标连接应用和目标控制应用之间的安全通信连接。例如,当终端具有显示页面时,可以在终端上确认页面,以供用户确认建立目标连接应用和目标控制应用之间的安全通信连接。也就是说,步骤“基于所述目标连接应用的安全认证标识和连接应用信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接”,可以包括:
基于所述目标连接应用的连接应用信息,在所述目标控制应用的应用页面中显示连接应用确认控件,以供所述用户确认建立所述目标控制应用与所述目标连接应用之间的连接;
接收用户输入的连接确认指令,基于所述目标连接应用的安全认证标识,建立所述目标连接应用和所述目标控制应用之间的安全通信连接。
其中,控制应用选择指令可以通过用户的触控等操作自动生成,也可以由用户通过语音、文字等方式输入,本申请实施例对此不做限定。
例如,目标控制应用可以在应用页面中对目标连接应用的连接应用信息进行显示,提示用户确认与目标连接应用进行连接。响应于用户的连接确认操作,建立所述目标连接应用和所述目标控制应用之间的安全通信连接。
可以理解的是,在建立连接时,若目标连接应用读取了目标控制应用的厂商Id、应用Id等具有一定公开性的信息,而未对其信息的合法性进行校验,建立的通信连接对于目标连接应用来说可能并不安全,因此,结合目标控制应用提供安全性更高的信息供目标连接应用进行校验。即,步骤“基于所述安全认证信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接”,具体可以包括:
基于所述安全认证信息,通过所述目标控制应用向所述目标连接应用发送所述目标控制应用的安全校验信息;
基于所述安全校验信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接。
其中,安全校验信息可以是目标控制应用具有私密性的信息,可以证明目标控制应用确实为建立连接过程的发起方。例如,安全校验信息可以包括目标控制应用的设备证书的公钥,或者,安全校验信息中除了目标控制应用的设备证书的公钥还可以包括目标控制应用的其他信息,本申请实施例对此不做限定。
在一些示例中,安全校验信息可以在建立安全通信连接的过程中,由目标控制应用直接发送给目标连接应用。或者,安全校验信息可以在目标连接应用请求进行信息的合法性校验时才发送。也就是说,步骤“基于所述安全认证信息,通过所述目标控制应用向所述目标连接应用发送所述目标控制应用的安全校验信息”,具体可以包括:
基于所述安全认证信息,建立所述目标连接应用与所述目标控制应用之间的待校验连接;
获取所述目标连接应用的连接验证请求,根据所述连接验证请求,通过所述目标控制应用向所述目标连接应用发送所述目标控制应用的安全校验信息;
此时,步骤“基于所述安全校验信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接”,具体可以包括:
基于所述安全校验信息和所述待校验连接,建立所述目标连接应用和所述目标控制应用之间的安全通信连接。
其中,待校验连接可以是由目标连接应用进行标记得到的。比如,目标连接应用可以检测当前建立的连接,若所述连接未进行可信性校验,则将该连接标记为待校验连接。
在实际应用过程中,由于连接的安全性对于目标连接应用是未知的,因此,一般是由目标连接应用进行可信性校验。即,步骤“基于所述安全校验信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接”,具体可以包括:
基于所述安全校验信息,触发所述目标连接应用对所述安全校验信息进行可信性校验;
若所述安全校验信息通过所述可信性校验,建立所述目标连接应用和所述目标控制应用之间的安全通信连接。
其中,可信性校验可以包括但不限于:证书是否属于可信,如可信的根证书签发;签名是否正确;随机数是否正确等等。
当安全校验信息通过可信性校验时,可以通过目标连接应用将待校验连接标记为可信连接,作为所述目标连接应用和所述目标控制应用之间的安全通信连接。
在一些可选的示例中,步骤“基于所述安全校验信息,触发所述目标连接应用对所述安全校验信息进行可信性校验”,具体可以包括:
基于所述安全校验信息,触发所述目标连接应用向所述目标控制应用发送可信性验证信息;
通过所述目标控制应用基于所述可信性验证信息,对所述安全校验信息进行可信性校验。
其中,可信性验证信息可以是目标连接应用的秘钥,或者,可信性验证信息可以是目标连接应用提供的随机数等等。
具体的,步骤“通过所述目标控制应用基于所述可信性验证信息,对所述安全校验信息进行可信性校验”可以包括:
通过所述目标控制应用基于所述可信性验证信息和控制应用信息,生成可信性回馈信息,向所述目标连接应用发送所述可信性回馈信息;
通过所述目标连接应用基于所述可信性验证信息,对所述可信性回馈信息进行可信性校验。
其中,可信性回馈信息,可以是由目标控制应用通过预设的回馈映射规则,对可信性验证信息和控制应用信息进行映射得到的。
例如,目标控制应用可以将其设备信息,如厂商Id、应用Id、应用名称以及随机数等使用设备证书私钥签名进行加密,得到可信性回馈信息。
在一些实施例中,目标连接应用在进行可信性校验时,可以校验可信性回馈信息中的厂商Id、应用Id、应用名称等信息与目标控制应用的控制应用信息是否一致。
205、通过所述目标控制应用,基于所述安全通信连接对所述目标连接应用进行控制。
在本申请实施例中,目标连接应用完成与目标控制应用的接入认证工作,即可实现后续的控制。
IoT控制端将控制命令发送给目标控制应用,目标控制应用在必要时可以唤醒目标连接应用,转发命令,实现控制。
在一些可选的示例中,步骤“通过所述目标控制应用,基于所述安全通信连接对所述目标连接应用进行控制”,具体可以包括:
通过所述目标控制应用接收控制设备发送的控制指令;
通过所述目标控制应用,根据所述安全连接,将所述控制指令转发给所述目标连接应用;
控制所述目标连接应用执行所述控制指令指示的连接应用操作。
以物联网设备为智能电视为例,智能电视中的内容提供应用(目标连接应用)与目标控制应用可以通过如图4所示的技术示意图建立安全通信连接。
具体的,可以通过如下代码实现智能电视中的内容提供应用与目标控制应用之间安全通信连接的建立。
@startuml
actor "用户" as user
participant "目标控制应用" as tv
participant "内容提供应用" as cast
autonumber 1
tv -> tv : 随电视系统自动启动
user -> cast : 用户启动内容提供应用
cast -> tv : localhost广播发现目标控制应用
tv --> cast : 返回目标控制应用的信息
cast -> user : 提示用户是否与电视配对
user -> cast : 用户确定配对
cast -> tv : 发送内容提供应用的基础信息及PIN码
tv -> cast : localhost广播发现内容提供应用
cast --> tv : 返回内容提供应用的信息
tv -> user : 提示用户是否与内容提供应用进行配对
user -> tv : 用户确定配对
tv -> cast : 使用PIN码建立连接
cast -> cast : 标记连接不可信
tv -> cast : 发送设备证书公钥
tv -> cast : 发送请求校验随机数
cast --> tv : 返回随机数
tv -> cast : 发送使用设备证书私钥签名的设备信息及随机数
cast -> cast : 校验信息及证书,对比目标控制应用的信息
cast -> cast : 标记待校验连接为可信
tv -> cast : 发送控制证书或Token进行后续控制,完成配置
@enduml
由上可知,本申请实施例可以获取终端本地中待与目标连接应用进行连接的控制应用的控制应用信息;基于所述控制应用信息确定目标控制应用;通过所述目标连接应用向所述目标控制应用发送所述目标连接应用的安全认证信息;基于所述安全认证信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接;通过所述目标控制应用,基于所述安全通信连接对所述目标连接应用进行控制;由于在本申请实施例中,基于目标控制应用的控制应用信息,确定了相互连接的目标连接应用和目标控制应用,获取了建立安全通信连接的安全认证信息,因此,可以将物联网设备中的目标控制应用与物联网设备中的目标连接应用进行连接,通过目标控制应用对目标连接应用进行控制,便于用户对物联网设备进行控制操作,提升用户体验。
为了更好地实施以上方法,相应的,本申请实施例还提供一种应用控制装置。
参考图5,该装置可以包括:
信息获取单元501,可以用于获取终端本地中待与目标连接应用进行连接的控制应用的控制应用信息;
应用确定单元502,可以用于基于所述控制应用信息确定目标控制应用;
信息发送单元503,可以用于通过所述目标连接应用向所述目标控制应用发送所述目标连接应用的安全认证信息;
连接建立单元504,可以用于基于所述安全认证信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接;
应用控制单元505,可以用于通过所述目标控制应用,基于所述安全通信连接对所述目标连接应用进行控制。
在一些可选的实施例中,所述安全认证信息可以包括所述目标连接应用的目标连接应用标识和安全认证标识;
所述连接建立单元504,可以用于获取所述终端本地中可与所述目标控制应用进行连接的连接应用的连接应用信息,所述连接应用信息中可以包括各所述连接应用的连接应用标识;
根据各所述连接应用标识和所述目标连接应用标识,确定所述目标连接应用的连接应用信息;
基于所述目标连接应用的安全认证标识和连接应用信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接。
在一些可选的实施例中,所述连接建立单元504,可以用于基于所述安全认证信息,通过所述目标控制应用向所述目标连接应用发送所述目标控制应用的安全校验信息;
基于所述安全校验信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接。
在一些可选的实施例中,所述连接建立单元504,可以用于基于所述安全认证信息,建立所述目标连接应用与所述目标控制应用之间的待校验连接;
获取所述目标连接应用的连接验证请求,根据所述连接验证请求,通过所述目标控制应用向所述目标连接应用发送所述目标控制应用的安全校验信息;
基于所述安全校验信息和所述待校验连接,建立所述目标连接应用和所述目标控制应用之间的安全通信连接。
在一些可选的实施例中,如图6所示,所述连接建立单元504,可以包括可信性校验单元5041和连接建立子单元5042;
所述可信性校验单元5041,可以用于基于所述安全校验信息,触发所述目标连接应用对所述安全校验信息进行可信性校验;
所述连接建立子单元5042,可以用于若所述安全校验信息通过所述可信性校验,建立所述目标连接应用和所述目标控制应用之间的安全通信连接。
在一些可选的实施例中,所述可信性校验单元5041,可以用于基于所述安全校验信息,触发所述目标连接应用向所述目标控制应用发送可信性验证信息;
通过所述目标控制应用基于所述可信性验证信息,对所述安全校验信息进行可信性校验。
在一些可选的实施例中,应用控制单元505,可以用于通过所述目标控制应用接收控制设备发送的控制指令;
通过所述目标控制应用,根据所述安全连接,将所述控制指令转发给所述目标连接应用;
控制所述目标连接应用执行所述控制指令指示的连接应用操作。
由上可知,通过应用控制装置,可以获取终端本地中待与目标连接应用进行连接的控制应用的控制应用信息;基于所述控制应用信息确定目标控制应用;通过所述目标连接应用向所述目标控制应用发送所述目标连接应用的安全认证信息;基于所述安全认证信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接;通过所述目标控制应用,基于所述安全通信连接对所述目标连接应用进行控制;由于在本申请实施例中,基于目标控制应用的控制应用信息,确定了相互连接的目标连接应用和目标控制应用,获取了建立安全通信连接的安全认证信息,因此,可以将物联网设备中的目标控制应用与物联网设备中的目标连接应用进行连接,通过目标控制应用对目标连接应用进行控制,便于用户对物联网设备进行控制操作,提升用户体验。
此外,本申请实施例还提供一种电子设备,该电子设备可以为终端或者服务器等等,如图7所示,其示出了本申请实施例所涉及的电子设备的结构示意图,具体来讲:
该电子设备可以包括射频(RF,Radio Frequency)电路701、包括有一个或一个以上计算机可读存储介质的存储器702、输入单元703、显示单元704、传感器705、音频电路706、无线保真(WiFi,Wireless Fidelity)模块707、包括有一个或者一个以上处理核心的处理器708、以及电源709等部件。本领域技术人员可以理解,图7中示出的电子设备结构并不构成对电子设备的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。其中:
RF电路701可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,交由一个或者一个以上处理器708处理;另外,将涉及上行的数据发送给基站。通常,RF电路701包括但不限于天线、至少一个放大器、调谐器、一个或多个振荡器、用户身份模块(SIM, Subscriber Identity Module)卡、收发信机、耦合器、低噪声放大器(LNA,Low Noise Amplifier)、双工器等。此外,RF电路701还可以通过无线通信与网络和其他设备通信。无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(GSM,Global System of Mobile communication)、通用分组无线服务(GPRS ,General Packet Radio Service)、码分多址(CDMA,Code Division Multiple Access)、宽带码分多址(WCDMA,Wideband Code Division Multiple Access)、长期演进(LTE,Long Term Evolution)、电子邮件、短消息服务(SMS,Short Messaging Service)等。
存储器702可用于存储软件程序以及模块,处理器708通过运行存储在存储器702的软件程序以及模块,从而执行各种功能应用以及数据处理。存储器702可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据电子设备的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器702可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。相应地,存储器702还可以包括存储器控制器,以提供处理器708和输入单元703对存储器702的访问。
输入单元703可用于接收输入的数字或字符信息,以及产生与用户设置以及功能控制有关的键盘、鼠标、操作杆、光学或者轨迹球信号输入。具体地,在一个具体的实施例中,输入单元703可包括触敏表面以及其他输入设备。触敏表面,也称为触摸显示屏或者触控板,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触敏表面上或在触敏表面附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触敏表面可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器708,并能接收处理器708发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触敏表面。除了触敏表面,输入单元703还可以包括其他输入设备。具体地,其他输入设备可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。
显示单元704可用于显示由用户输入的信息或提供给用户的信息以及电子设备的各种图形用户接口,这些图形用户接口可以由图形、文本、图标、视频和其任意组合来构成。显示单元704可包括显示面板,可选的,可以采用液晶显示器(LCD,Liquid Crystal Display)、有机发光二极管(OLED,Organic Light-Emitting Diode)等形式来配置显示面板。进一步的,触敏表面可覆盖显示面板,当触敏表面检测到在其上或附近的触摸操作后,传送给处理器708以确定触摸事件的类型,随后处理器708根据触摸事件的类型在显示面板上提供相应的视觉输出。虽然在图7中,触敏表面与显示面板是作为两个独立的部件来实现输入和输入功能,但是在某些实施例中,可以将触敏表面与显示面板集成而实现输入和输出功能。
电子设备还可包括至少一种传感器705,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板的亮度,接近传感器可在电子设备移动到耳边时,关闭显示面板和/或背光。作为运动传感器的一种,重力加速度传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等; 至于电子设备还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。
音频电路706、扬声器,传声器可提供用户与电子设备之间的音频接口。音频电路706可将接收到的音频数据转换后的电信号,传输到扬声器,由扬声器转换为声音信号输出;另一方面,传声器将收集的声音信号转换为电信号,由音频电路706接收后转换为音频数据,再将音频数据输出处理器708处理后,经RF电路701以发送给比如另一电子设备,或者将音频数据输出至存储器702以便进一步处理。音频电路706还可能包括耳塞插孔,以提供外设耳机与电子设备的通信。
WiFi属于短距离无线传输技术,电子设备通过WiFi模块707可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图7示出了WiFi模块707,但是可以理解的是,其并不属于电子设备的必须构成,完全可以根据需要在不改变申请的本质的范围内而省略。
处理器708是电子设备的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器702内的软件程序和/或模块,以及调用存储在存储器702内的数据,执行电子设备的各种功能和处理数据。可选的,处理器708可包括一个或多个处理核心;优选的,处理器708可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器708中。
电子设备还包括给各个部件供电的电源709(比如电池),优选的,电源可以通过电源管理系统与处理器708逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。电源709还可以包括一个或一个以上的直流或交流电源、再充电系统、电源故障检测电路、电源转换器或者逆变器、电源状态指示器等任意组件。
尽管未示出,电子设备还可以包括摄像头、蓝牙模块等,在此不再赘述。具体在本实施例中,电子设备中的处理器708会按照如下的指令,将一个或一个以上的应用程序的进程对应的可执行文件加载到存储器702中,并由处理器708来运行存储在存储器702中的应用程序,从而实现各种功能,如下:
获取终端本地中待与目标连接应用进行连接的控制应用的控制应用信息;
基于所述控制应用信息确定目标控制应用;
通过所述目标连接应用向所述目标控制应用发送所述目标连接应用的安全认证信息;
基于所述安全认证信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接;
通过所述目标控制应用,基于所述安全通信连接对所述目标连接应用进行控制。
本领域普通技术人员可以理解,上述实施例的各种方法中的全部或部分步骤可以通过指令来完成,或通过指令控制相关的硬件来完成,该指令可以存储于一计算机可读存储介质中,并由处理器进行加载和执行。
为此,本申请实施例提供一种计算机可读存储介质,其中存储有多条指令,该指令能够被处理器进行加载,以执行本申请实施例所提供的任一种应用控制方法中的步骤。例如,该指令可以执行如下步骤:
获取终端本地中待与目标连接应用进行连接的控制应用的控制应用信息;
基于所述控制应用信息确定目标控制应用;
通过所述目标连接应用向所述目标控制应用发送所述目标连接应用的安全认证信息;
基于所述安全认证信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接;
通过所述目标控制应用,基于所述安全通信连接对所述目标连接应用进行控制。
以上各个操作的具体实施可参见前面的实施例,在此不再赘述。
其中,该计算机可读存储介质可以包括:只读存储器(ROM,Read Only Memory)、随机存取记忆体(RAM,Random Access Memory)、磁盘或光盘等。
由于该计算机可读存储介质中所存储的指令,可以执行本申请实施例所提供的任一种应用控制方法中的步骤,因此,可以实现本申请实施例所提供的任一种应用控制方法所能实现的有益效果,详见前面的实施例,在此不再赘述。
根据本申请的一个方面,还提供了一种计算机程序产品或计算机程序,该计算机程序产品或计算机程序包括计算机指令,该计算机指令存储在计算机可读存储介质中。电子设备的处理器从计算机可读存储介质读取该计算机指令,处理器执行该计算机指令,使得该电子设备执行上述实施例中的各种可选实现方式中提供的方法。
以上对本申请实施例所提供的一种应用控制方法、装置、电子设备和存储介质进行了详细介绍,本文中应用了具体个例对本申请的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本申请的方法及其核心思想;同时,对于本领域的技术人员,依据本申请的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本申请的限制。

Claims (20)

  1. 一种应用控制方法,其特征在于,包括:
    获取终端本地中待与目标连接应用进行连接的控制应用的控制应用信息;
    基于所述控制应用信息确定目标控制应用;
    通过所述目标连接应用向所述目标控制应用发送所述目标连接应用的安全认证信息;
    基于所述安全认证信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接;
    通过所述目标控制应用,基于所述安全通信连接对所述目标连接应用进行控制。
  2. 根据权利要求1所述的应用控制方法,其特征在于,所述基于所述控制应用信息确定目标控制应用,包括:
    基于所述控制应用信息,在所述目标连接应用的应用页面中显示控制应用选择控件;
    接收用户输入的控制应用选择指令,根据所述控制应用选择指令确定与所述目标连接应用连接的目标控制应用。
  3. 根据权利要求2所述的应用控制方法,其特征在于,所述通过所述目标连接应用向所述目标控制应用发送所述目标连接应用的安全认证信息,包括:
    响应于所述控制应用选择指令,通过所述目标连接应用向所述目标控制应用发送所述目标连接应用的安全认证信息。
  4. 根据权利要求1所述的应用控制方法,其特征在于,所述安全认证信息包括所述目标连接应用的目标连接应用标识和安全认证标识;
    所述基于所述安全认证信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接,包括:
    获取所述终端本地中可与所述目标控制应用进行连接的连接应用的连接应用信息,所述连接应用信息中包括各所述连接应用的连接应用标识;
    根据各所述连接应用标识和所述目标连接应用标识,确定所述目标连接应用的连接应用信息;
    基于所述目标连接应用的安全认证标识和连接应用信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接。
  5. 根据权利要求4所述的应用控制方法,其特征在于,所述根据各所述连接应用标识和所述目标连接应用标识,确定所述目标连接应用的连接应用信息,包括:
    根据各所述连接应用标识和所述目标连接应用标识进行匹配,将与所述目标连接应用标识匹配成功的连接应用标识对应的连接应用信息,作为所述目标连接应用的连接应用信息。
  6. 根据权利要求4所述的应用控制方法,其特征在于,所述基于所述目标连接应用的安全认证标识和连接应用信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接,包括:
    基于所述目标连接应用的连接应用信息,在所述目标控制应用的应用页面中显示连接应用确认控件,以供所述用户确认建立所述目标控制应用与所述目标连接应用之间的连接;
    接收用户输入的连接确认指令,基于所述目标连接应用的安全认证标识,建立所述目标连接应用和所述目标控制应用之间的安全通信连接。
  7. 根据权利要求4所述的应用控制方法,其特征在于,所述获取所述终端本地中可与所述目标控制应用进行连接的连接应用的连接应用信息之前,所述方法还包括:
    获取本地广播消息;
    解析所述本地广播消息,确定终端本地中可与目标控制应用进行连接的连接应用。
  8. 根据权利要求1或4任一项所述的应用控制方法,其特征在于,所述基于所述安全认证信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接,包括:
    基于所述安全认证信息,通过所述目标控制应用向所述目标连接应用发送所述目标控制应用的安全校验信息;
    基于所述安全校验信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接。
  9. 根据权利要求8所述的应用控制方法,其特征在于,所述基于所述安全认证信息,通过所述目标控制应用向所述目标连接应用发送所述目标控制应用的安全校验信息,包括:
    基于所述安全认证信息,建立所述目标连接应用与所述目标控制应用之间的待校验连接;
    获取所述目标连接应用的连接验证请求,根据所述连接验证请求,通过所述目标控制应用向所述目标连接应用发送所述目标控制应用的安全校验信息;
    所述基于所述安全校验信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接,包括:
    基于所述安全校验信息和所述待校验连接,建立所述目标连接应用和所述目标控制应用之间的安全通信连接。
  10. 根据权利要求8所述的应用控制方法,其特征在于,所述基于所述安全校验信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接,包括:
    基于所述安全校验信息,触发所述目标连接应用对所述安全校验信息进行可信性校验;
    若所述安全校验信息通过所述可信性校验,建立所述目标连接应用和所述目标控制应用之间的安全通信连接。
  11. 根据权利要求10所述的应用控制方法,其特征在于,所述基于所述安全校验信息,触发所述目标连接应用对所述安全校验信息进行可信性校验,包括:
    基于所述安全校验信息,触发所述目标连接应用向所述目标控制应用发送可信性验证信息;
    通过所述目标控制应用基于所述可信性验证信息,对所述安全校验信息进行可信性校验。
  12. 根据权利要求10所述的应用控制方法,其特征在于,所述通过所述目标控制应用基于所述可信性验证信息,对所述安全校验信息进行可信性校验,包括:
    通过所述目标控制应用基于所述可信性验证信息和控制应用信息,生成可信性回馈信息,向所述目标连接应用发送所述可信性回馈信息;
    通过所述目标连接应用基于所述可信性验证信息,对所述可信性回馈信息进行可信性校验。
  13. 根据权利要求1-12任一项所述的应用控制方法,其特征在于,所述通过所述目标控制应用,基于所述安全通信连接对所述目标连接应用进行控制,包括:
    通过所述目标控制应用接收控制设备发送的控制指令;
    通过所述目标控制应用,根据所述安全连接,将所述控制指令转发给所述目标连接应用;
    控制所述目标连接应用执行所述控制指令指示的连接应用操作。
  14. 根据权利要求1所述的应用控制方法,其特征在于,所述获取终端本地中待与目标连接应用进行连接的控制应用的控制应用信息之前,所述方法还包括:
    获取本地广播消息;
    解析所述本地广播消息,确定终端本地中待与目标连接应用进行连接的控制应用。
  15. 一种应用控制装置,其特征在于,包括:
    信息获取单元,用于获取终端本地中待与目标连接应用进行连接的控制应用的控制应用信息;
    应用确定单元,用于基于所述控制应用信息确定目标控制应用;
    信息发送单元,用于通过所述目标连接应用向所述目标控制应用发送所述目标连接应用的安全认证信息;
    连接建立单元,用于基于所述安全认证信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接;
    应用控制单元,用于通过所述目标控制应用,基于所述安全通信连接对所述目标连接应用进行控制。
  16. 根据权利要求15所述的应用控制装置,其特征在于,所述安全认证信息包括所述目标连接应用的目标连接应用标识和安全认证标识;
    所述连接建立单元,用于获取所述终端本地中可与所述目标控制应用进行连接的连接应用的连接应用信息,所述连接应用信息中包括各所述连接应用的连接应用标识;
    根据各所述连接应用标识和所述目标连接应用标识,确定所述目标连接应用的连接应用信息;
    基于所述目标连接应用的安全认证标识和连接应用信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接。
  17. 根据权利要求14-15任一项所述的应用控制装置,其特征在于,所述连接建立单元,用于基于所述安全认证信息,通过所述目标控制应用向所述目标连接应用发送所述目标控制应用的安全校验信息;
    基于所述安全校验信息,建立所述目标连接应用和所述目标控制应用之间的安全通信连接。
  18. 一种电子设备,其特征在于,包括存储器和处理器;所述存储器存储有应用程序,所述处理器用于运行所述存储器内的应用程序,以执行权利要求1至14任一项所述的应用控制方法中的步骤。
  19. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有多条指令,所述指令适于处理器进行加载,以执行权利要求1至14任一项所述的应用控制方法中的步骤。
  20. 一种计算机程序产品,包括计算机程序或指令,其特征在于,所述计算机程序或指令被处理器执行时实现如权利要求1至14中任一项所述的应用控制方法的步骤。
PCT/CN2022/094777 2022-04-22 2022-05-24 一种应用控制方法、装置、终端设备及存储介质 WO2023201835A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210431010.5 2022-04-22
CN202210431010.5A CN116975836A (zh) 2022-04-22 2022-04-22 一种应用控制方法、装置、电子设备和存储介质

Publications (1)

Publication Number Publication Date
WO2023201835A1 true WO2023201835A1 (zh) 2023-10-26

Family

ID=88418993

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/094777 WO2023201835A1 (zh) 2022-04-22 2022-05-24 一种应用控制方法、装置、终端设备及存储介质

Country Status (2)

Country Link
CN (1) CN116975836A (zh)
WO (1) WO2023201835A1 (zh)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7131070B1 (en) * 1999-05-13 2006-10-31 Ricoh Company, Ltd. Application unit monitoring and reporting system and method
CN105487658A (zh) * 2015-11-24 2016-04-13 小米科技有限责任公司 控制应用运行的方法及装置
CN109144383A (zh) * 2018-07-17 2019-01-04 努比亚技术有限公司 一种应用控制方法、终端及计算机可读存储介质
CN111880845A (zh) * 2020-07-24 2020-11-03 西安万像电子科技有限公司 控制目标应用的方法、系统及装置
CN112000258A (zh) * 2019-05-27 2020-11-27 腾讯科技(深圳)有限公司 一种操作控制方法、装置、智能终端及存储介质
CN112181224A (zh) * 2020-09-28 2021-01-05 腾讯科技(深圳)有限公司 目标应用的控制方法和装置、存储介质及电子装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7131070B1 (en) * 1999-05-13 2006-10-31 Ricoh Company, Ltd. Application unit monitoring and reporting system and method
CN105487658A (zh) * 2015-11-24 2016-04-13 小米科技有限责任公司 控制应用运行的方法及装置
CN109144383A (zh) * 2018-07-17 2019-01-04 努比亚技术有限公司 一种应用控制方法、终端及计算机可读存储介质
CN112000258A (zh) * 2019-05-27 2020-11-27 腾讯科技(深圳)有限公司 一种操作控制方法、装置、智能终端及存储介质
CN111880845A (zh) * 2020-07-24 2020-11-03 西安万像电子科技有限公司 控制目标应用的方法、系统及装置
CN112181224A (zh) * 2020-09-28 2021-01-05 腾讯科技(深圳)有限公司 目标应用的控制方法和装置、存储介质及电子装置

Also Published As

Publication number Publication date
CN116975836A (zh) 2023-10-31

Similar Documents

Publication Publication Date Title
US20210336780A1 (en) Key updating method, apparatus, and system
US11057376B2 (en) Method, apparatus, and system for controlling intelligent device, and storage medium
CN111066284B (zh) 一种业务证书管理方法、终端及服务器
US10069818B2 (en) Method, system, device, and terminal for network initialization of multimedia playback device
WO2017118437A1 (zh) 进行业务处理的方法、装置和系统
US10304461B2 (en) Remote electronic service requesting and processing method, server, and terminal
US20170373869A1 (en) Method, apparatus, and system for providing specified communications service, and terminal
WO2016150270A1 (zh) 群组会话消息处理方法和装置
CN106936676B (zh) 家居设备控制方法及装置
WO2018019261A1 (zh) 资源转移方法及装置
WO2015131790A1 (en) Network connection method, application authentication server, terminal and router
CN109039989B (zh) 地址解析协议欺骗检测方法、主机及计算机可读存储介质
CN113986167A (zh) 投屏控制方法、装置、存储介质及显示设备
WO2016078504A1 (zh) 身份鉴权方法和装置
WO2018108123A1 (zh) 身份验证方法、装置与系统
WO2017215661A1 (zh) 一种场景音效的控制方法、及电子设备
CN112585981A (zh) 用于具有连续性的内容回放的方法及其电子装置
WO2023236972A1 (zh) 一种通信环境安全预警方法、装置、终端设备及存储介质
CN110944313B (zh) 一种蓝牙连接方法、装置、存储介质及终端
WO2015062234A1 (zh) 移动终端资源处理方法、装置和设备
US11902774B2 (en) Method for starting vehicle and related device
CN110418311B (zh) 一种基于多个终端的互联方法、装置及终端
CN109600340B (zh) 操作授权方法、装置、终端以及服务器
CN105306244B (zh) 路由器管理方法、系统及设备
US20140344423A1 (en) Method, apparatus and system for switching function mode

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22938067

Country of ref document: EP

Kind code of ref document: A1