CN120434629A - Data processing method, electronic device, chip system and storage medium - Google Patents
Data processing method, electronic device, chip system and storage mediumInfo
- Publication number
- CN120434629A CN120434629A CN202411708370.0A CN202411708370A CN120434629A CN 120434629 A CN120434629 A CN 120434629A CN 202411708370 A CN202411708370 A CN 202411708370A CN 120434629 A CN120434629 A CN 120434629A
- Authority
- CN
- China
- Prior art keywords
- accessory
- equipment
- key
- accessory device
- electronic device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The application provides a data processing method, an electronic device, a chip system and a storage medium, wherein the method can comprise the steps of establishing short-distance communication connection between the electronic device and accessory equipment; the electronic equipment authenticates the accessory equipment based on equipment authentication data sent by the accessory equipment, generates key data and sends the key data to the accessory equipment when the accessory equipment passes the authentication, and generates a broadcast message based on the key data and the position information of the accessory equipment when the accessory equipment detects that the communication connection with the electronic equipment is disconnected, wherein the broadcast message is used for reporting the position information of the accessory equipment. By adopting the application, the key data required by the off-line equipment search can be generated in advance by means of the calculation force of the electronic equipment and transmitted to the accessory equipment, so that the accessory equipment does not need to adapt to the protocol requirements of manufacturers of the electronic equipment, and can report the position information based on the key data transmitted by the electronic equipment.
Description
Technical Field
The present application relates to the field of electronic devices, and in particular, to a data processing method, an electronic device, a chip system, and a storage medium.
Background
Many accessory devices of mobile phone manufacturers, such as Bluetooth headphones and smart bracelets, support the capability of searching for offline devices. Even if the accessory devices cannot be connected with a network, the position information of the accessory devices can be reported by a relay device (such as a smart phone) with networking capability, so that a user can find out the lost accessory device.
However, at present, mobile phone manufacturers can only support offline equipment searching of self-grinding accessory equipment, and for accessory equipment produced by third party manufacturers (such as branding manufacturers), the accessory equipment can be called as three-party accessory equipment, non-self-grinding accessory equipment and the like, the capability of offline equipment searching cannot be realized, so that the three-party accessory equipment is difficult to recover when lost. The reason is that if the accessory equipment of the third party manufacturer needs to realize the capability of searching the offline equipment, the corresponding password or key algorithm needs to be realized according to the protocol requirements of the mobile phone manufacturer to ensure compliance, so that the development and adaptation workload is large, time consumption and cost are high, the computing power of part of accessory equipment at the low end is low, the computing power requirement of adapting the password or key algorithm cannot be met, and the method cannot be applied to the method.
Disclosure of Invention
The embodiment of the application provides a data processing method, electronic equipment, a chip system and a storage medium, key data required by searching offline equipment can be generated in advance by means of computing power of the electronic equipment and transmitted to accessory equipment, so that the accessory equipment can report position information based on the key data transmitted by the electronic equipment without adapting to protocol requirements of manufacturers of the electronic equipment, namely the capability of realizing the searching offline equipment.
In a first aspect, an embodiment of the present application provides a data processing method, which may be applied to an electronic device, where the method includes displaying an application interface of a short-range communication application in response to an opening operation for the short-range communication application, where the application interface of the short-range communication application includes first identification information of a first accessory device, establishing a short-range communication connection with the first accessory device in response to a selection operation for the first identification information in the application interface, receiving device authentication data from the first accessory device based on the short-range communication connection, where the device authentication data is used to indicate that the first accessory device is authorized to join a network of seeking devices, authenticating the first accessory device based on the device authentication data, generating key data in response to passing of authentication of the first accessory device, sending the key data to the first accessory device, where the key data is used to generate a first broadcast message when the first accessory device is disconnected from the electronic device, and where the first broadcast message is used to report location information of the first accessory device.
Therefore, in the technical scheme, key data required by the off-line equipment searching can be generated in advance by means of the computing power of the electronic equipment and transmitted to the accessory equipment, so that the accessory equipment does not need to adapt to the protocol requirements of manufacturers of the electronic equipment (such as passwords or key algorithms required by the adaptation protocol), and can report the position information based on the key data transmitted by the electronic equipment, namely the capability of realizing the off-line equipment searching. By adopting the method, the three-party accessory equipment can also realize the capability of searching the offline equipment, and development and adaptation work of third-party manufacturers can be saved, so that the method is also applicable to accessory equipment with low calculation power. In addition, under the condition that the accessory equipment passes authentication, namely that the accessory equipment is authorized to join the network of the searching equipment, key data required by the off-line equipment searching is generated and transmitted to the accessory equipment, so that the authorized accessory equipment can only realize the capability of the off-line equipment searching, and the compliance is ensured.
With reference to the first aspect, in one possible manner, in response to the first accessory device passing through the authentication, the key data may be generated by outputting, in response to the first accessory device passing through the authentication, a prompt message on a display interface of the electronic device, where the prompt message is used to prompt whether to confirm that the first accessory device is added to the network of the lookup device, and in response to detecting a confirmation instruction for the prompt message input, generating the key data. Therefore, in the technical scheme, under the condition that the accessory equipment is authorized to be added into the searching equipment network and is permitted to be added into the searching equipment network by the user, key data required by the off-line equipment searching is generated and transmitted to the accessory equipment, so that the accessory equipment which is authorized and permitted by the user can only realize the capability of the off-line equipment searching, thereby ensuring compliance and meeting the requirements of the user.
In combination with the first aspect, in one possible manner, the key data may be generated by generating a base key, generating key data including M derivative keys based on the base key, where M is a positive integer, where the base key is further used to bind with second identification information of the first accessory device, the first broadcast message is generated based on location information of the first accessory device and a derivative key selected from the key data, and the first broadcast message is used to instruct to store the location information in association with the second identification information of the first accessory device based on the derivative key carried by the first broadcast message. It can be seen that the derived key generated based on the base key can be used for identifying the accessory device, so that the reported position information and the identification information of the correct accessory device can be stored in a correlated manner, and the accuracy of the recorded position information of the accessory device is ensured. In addition, the broadcast message is generated based on the derivative key selected from M derivative keys, so that the key used for generating the broadcast message has variability, and the security of the position report can be improved.
In combination with the first aspect, in one possible manner, the method further includes displaying an application interface of the search device application in response to a start operation of the search device application, wherein the application interface of the search device application includes third identification information of the first accessory device, acquiring, in response to a selection operation of the third identification information, location information of the first accessory device from a server, the location information of the first accessory device being carried in a first broadcast message, the first broadcast message being reported to the server through a search device network, and displaying the location information of the first accessory device in the application interface of the search device application. Therefore, when the accessory equipment needs to be found, the position information reported by the accessory equipment can be obtained from the server, and the obtained position information of the accessory equipment is displayed in the application interface, so that a user can intuitively see the position information of the accessory equipment, and the user is helped to find the accessory equipment.
With reference to the first aspect, in a possible manner, the electronic device is in the network of the search device, and the method further includes receiving a second broadcast message broadcast by the second accessory device, where the second broadcast message is generated by the second accessory device based on key data and location information corresponding to the second accessory device when the communication connection is disconnected, reporting the second broadcast message to the server, where the second broadcast message is used to indicate a key associated with the second broadcast message, and storing the location information of the second accessory device in association with identification information of the second accessory device. It can be seen that the electronic device can receive the broadcast message of the accessory device and report the broadcast message of the accessory device to the server, that is, report the position information of the accessory device to the server, which is beneficial to realizing offline searching of the accessory device, that is, helping the user of the accessory device find the accessory device.
With reference to the first aspect, in a possible manner, the method further includes establishing an encryption channel with the first accessory device based on the short-range communication connection, and sending the key data to the first accessory device may be by encrypting the key data to the first accessory device through the encryption channel. Therefore, the key data required by the off-line equipment searching is transmitted to the accessory equipment in an encrypted manner, so that the transmission safety of the key data can be ensured, and the situation that the position information of the accessory equipment cannot be successfully reported to a server due to malicious tampering of the key data can be avoided, and the accessory equipment searching cannot be realized.
In a second aspect, an embodiment of the present application provides another data processing method, which may be applied to a first accessory device, where the method includes determining, in response to detecting that a communication connection between the first accessory device and an electronic device is broken, location information in which the first accessory device is currently located, generating a first broadcast message based on key data and the location information, the key data being received from the electronic device based on the communication connection between the first accessory device and the electronic device, the key data being generated by the electronic device, broadcasting the first broadcast message, the first broadcast message being used to report the location information of the first accessory device.
Therefore, in the technical scheme, the key data is generated by the electronic equipment and transmitted to the accessory equipment, namely, the key data required by the off-line equipment searching is generated in advance by means of the computing power of the electronic equipment and transmitted to the accessory equipment, so that the accessory equipment can report the position information based on the key data transmitted by the electronic equipment without adapting the protocol requirements of manufacturers of the electronic equipment (such as a password or a key algorithm required by the adapting protocol), namely, the capability of realizing the off-line equipment searching. By adopting the method, the three-party accessory equipment can also realize the capability of searching the offline equipment, and development and adaptation work of third-party manufacturers can be saved, so that the method is also applicable to accessory equipment with low calculation power.
With reference to the second aspect, in a possible manner, the method further includes sending device authentication data to the electronic device based on the communication connection between the first accessory device and the electronic device, the device authentication data being used by the electronic device to authenticate the first accessory device, wherein the key data is received from the electronic device based on the communication connection between the first accessory device and the electronic device if the first accessory device is authenticated. Therefore, only when the accessory equipment passes the authentication, key data required by the off-line equipment searching can be received from the electronic equipment, so that the capability of the off-line equipment searching can be realized by the accessory equipment passing the authentication, and the compliance is ensured.
With reference to the second aspect, in one possible manner, the key data includes M derivative keys, M derivative keys are generated based on a base key, M is a positive integer, and the manner of generating the first broadcast message based on the key data and the location information may be that the derivative key is selected from the M derivative keys included in the key data, and the first broadcast message is generated based on the selected derivative key and the location information, where the base key is used to bind with the second identification information of the first accessory device, and the first broadcast message is used to indicate the derivative key associated with the first broadcast message, and the location information is stored in association with the second identification information of the first accessory device. It can be seen that the derived key generated based on the base key can be used for identifying the accessory device, so that the reported position information and the identification information of the correct accessory device can be stored in a correlated manner, and the accuracy of the recorded position information of the accessory device is ensured. In addition, the broadcast message is generated based on the derivative key selected from M derivative keys, so that the key used for generating the broadcast message has variability, and the security of the position report can be improved.
With reference to the second aspect, in a possible manner, the method further includes receiving a writing instruction input by the first object, writing device authentication data into the first accessory device based on the writing instruction, wherein the first object and the second object have an authorized relationship for the first accessory device, the first object is a production object of the first accessory device, and the second object is a production object of the electronic device. Therefore, the equipment authentication data can be written into the accessory equipment under the condition of obtaining the authorization of the production object of the electronic equipment, so that the authorized accessory equipment can only realize the capability of searching the offline equipment, and the compliance is ensured.
In a third aspect, the application provides an electronic device comprising one or more processors, a memory coupled to the one or more processors for storing computer program code comprising computer instructions for causing the electronic device to execute, in response to a start-up operation for a short-range communication application, displaying an application interface for the short-range communication application, the application interface for the short-range communication application including first identification information of a first accessory device, establishing a short-range communication connection with the first accessory device in response to a select operation for the first identification information, receiving device authentication data from the first accessory device based on the short-range communication connection, the device authentication data being used to indicate that the first accessory device is authorized to join a network of lookup devices, authenticating the first accessory device based on the device authentication data, generating key data in response to the first accessory device authentication pass, sending the key data to the first accessory device, the key data being used to broadcast a message on the first accessory device in the first accessory device disconnected from the electronic device, generating a message for broadcasting the first accessory device in the first accessory device.
With reference to the third aspect, in a possible manner, the one or more processors call the computer instructions to cause the electronic device to execute, in response to the first accessory device authentication passing, outputting a prompt message at the display interface, the prompt message being used to prompt whether to confirm that the first accessory device is added to the network of the lookup device, and in response to detecting a confirmation instruction for prompt input, generating key data.
With reference to the third aspect, in a possible manner, the one or more processors call the computer instructions to cause the electronic device to perform generating a base key, generating key data based on the base key, the key data including M derivative keys, M being a positive integer, wherein the base key is further used to bind with second identification information of the first accessory device, the first broadcast message is generated based on location information of the first accessory device and a derivative key selected from the key data, and the first broadcast message is used to indicate the derivative key associated based on the first broadcast message, and storing the location information in association with the second identification information of the first accessory device.
With reference to the third aspect, in a possible manner, the one or more processors call the computer instructions to cause the electronic device to execute, in response to a start operation for the search device application, displaying an application interface of the search device application, where the application interface of the search device application includes third identification information of the first accessory device, in response to a select operation for the third identification information, acquiring, from a server, location information of the first accessory device, where the location information of the first accessory device is carried in a first broadcast message, where the first broadcast message is reported to the server through a search device network, and displaying, in the application interface of the search device application, the location information of the first accessory device.
With reference to the third aspect, in a possible manner, the one or more processors call the computer instructions to cause the electronic device to execute receiving a second broadcast message broadcast by the second accessory device, the second broadcast message being generated by the second accessory device based on key data and location information corresponding to the second accessory device if the communication connection is disconnected, reporting the second broadcast message to the server, the second broadcast message being used for indicating that the location information of the second accessory device is stored in association with the identification information of the second accessory device based on a key associated with the second broadcast message.
With reference to the third aspect, in one possible manner, the one or more processors invoke the computer instructions to cause the electronic device to perform establishing an encrypted channel with the first accessory device based on the short-range communication connection, and cryptographically transmitting key data to the first accessory device over the encrypted channel.
In a fourth aspect, the present application provides another electronic device comprising one or more processors, a memory coupled to the one or more processors for storing computer program code, and a communication interface for information interaction with other devices, the computer program code comprising computer instructions that cause the one or more processors to invoke the computer instructions to cause the electronic device to perform determining location information where a first accessory device is currently located in response to detecting a disconnection of a communication connection between the first accessory device and the electronic device, generating a first broadcast message based on key data and the location information, the key data being received from the electronic device based on the communication connection between the first accessory device and the electronic device, the key data being generated by the electronic device, broadcasting the first broadcast message, the first broadcast message being for reporting the location information of the first accessory device.
With reference to the fourth aspect, in one possible manner, the one or more processors invoke the computer instructions to cause the electronic device to perform sending device authentication data to the electronic device based on a communication connection between the first accessory device and the electronic device, the device authentication data being used by the electronic device to authenticate the first accessory device, wherein the key data is received from the electronic device based on the communication connection between the first accessory device and the electronic device if the first accessory device is authenticated.
With reference to the fourth aspect, in a possible manner, the key data includes M derivative keys, M being a positive integer, generated based on a base key, and the one or more processors call the computer instructions to cause the electronic device to execute selecting a derivative key from the M derivative keys included in the key data, and generating a first broadcast message based on the selected derivative key and the location information, wherein the base key is used for binding with second identification information of the first accessory device, and the first broadcast message is used for indicating the derivative key associated with the first broadcast message, and storing the location information in association with the second identification information of the first accessory device.
With reference to the fourth aspect, in a possible manner, the one or more processors call the computer instructions to cause the electronic device to execute, receive a write instruction input by a first object, write device authentication data to an accessory device based on the write instruction, wherein the first object and a second object have an authorized relationship with respect to the first accessory device, the first object is a production object of the first accessory device, and the second object is a production object of the electronic device.
In a fifth aspect, the present application provides a chip system comprising one or more processors, a memory and interface circuitry, the memory, interface circuitry and the one or more processors being interconnected by wires, the memory having stored therein program instructions which, when executed by the processor, cause the chip system to carry out a method as described in the first aspect or to carry out a method as described in the second aspect.
In a sixth aspect, the present application provides a computer readable storage medium storing a computer program which, when executed by a processor, implements a method as described in the first aspect or implements a method as described in the second aspect.
In a seventh aspect, the application provides a computer program product comprising instructions which, when run on an electronic device, cause the electronic device to implement a method as described in the first aspect above, or to implement a method as described in the second aspect above.
Drawings
FIG. 1 is a schematic diagram of an architecture of a data processing system according to an exemplary embodiment of the present application;
FIGS. 2A-2D are schematic diagrams illustrating an interface for a manually triggered communication connection according to an exemplary embodiment of the present application;
Fig. 3A is a data interaction flow between an electronic device and an accessory device according to an exemplary embodiment of the present application;
fig. 3B is a flowchart illustrating a reporting procedure of a position of an accessory device according to an embodiment of the present application;
Fig. 4A and fig. 4B are schematic views of an application interface of a search device application according to an embodiment of the present application;
FIG. 5 is a flowchart illustrating a data processing method according to an exemplary embodiment of the present application;
FIG. 6 is a process flow for obtaining authorization for an accessory device, which is exemplary provided by an embodiment of the present application;
FIG. 7 is a flowchart illustrating another exemplary data processing method according to an embodiment of the present application;
FIG. 8 is a flowchart illustrating yet another data processing method according to an exemplary embodiment of the present application;
FIG. 9 is a flowchart illustrating yet another data processing method according to an exemplary embodiment of the present application;
fig. 10 is a schematic software structure of an electronic device according to an exemplary embodiment of the present application;
fig. 11 is a schematic hardware structure of an electronic device according to an exemplary embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The terms "first," "second," "third," and the like in embodiments of the present application are used for distinguishing between different objects and not for describing a particular sequential order. Furthermore, the terms "comprising," "including," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion. For example, a series of steps or elements may be included, or alternatively, steps or elements not listed or, alternatively, other steps or elements inherent to such process, method, article, or apparatus may be included. The terms "one embodiment" or "some embodiments" and the like mean that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," and the like in various places are not necessarily all referring to the same embodiment, but mean "one or more, but not all, of the embodiments" unless expressly specified otherwise.
In embodiments of the application, words such as "exemplary," "such as," or "for example," are used to mean serving as an example, instance, or illustration. Any embodiment or design described as "exemplary" such as "or" for example "in embodiments of the application should not be construed as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary," "such as," or "for example," etc., is intended to present related concepts in a concrete fashion.
Furthermore, "at least one" means one or more, and "a plurality" means two or more. "and/or" describes an association of associated objects, meaning that there may be three relationships, e.g., A and/or B, and that there may be A alone, while A and B are present, and B alone, where A, B may be singular or plural. The character "/" generally indicates that the context-dependent object is an "or" relationship. "at least one of" or the like means any combination of these items, including any combination of single item(s) or plural items(s). For example, at least one of a, b and c may represent a, or b, or c, or a and b, or a and c, or b and c, or a, b and c, wherein a, b, c may be single or plural.
The term "accessory device" in the following embodiments of the present application may refer to various additional smart devices for enhancing or extending the functionality of an electronic device, such as a smart phone. The accessory device may include a wearable device, which refers to a portable smart device that may be worn directly on the body or integrated into the user's clothing or accessory. The following are some common accessory devices:
the Bluetooth headset is connected with equipment such as a smart phone, a tablet personal computer, a computer and the like through a Bluetooth technology, and wireless audio transmission is realized. One or more of the following functions of wirelessly listening to music, answering a call, watching video and the like, noise reduction, touch operation, voice assistant and the like can be realized.
Smart watches, which are portable smart devices that integrate multiple functions, are typically worn on the wrist, and some smart watches may have independent operating systems and networking capabilities. One or more of the functions of displaying notifications (e.g., messages, calls, mails, etc.), weather forecast, calendar reminders, etc., health monitoring (e.g., heart rate, number of steps, sleep quality, etc.), navigation, mobile payment, music control, etc. may be implemented.
The intelligent bracelet is a simplified version of intelligent watch, is usually worn on the wrist and is focused on health monitoring and sports monitoring. The device can realize the following functions of recording exercise data (steps, running track, calorie consumption and the like), monitoring heart rate and sleep quality, and daily functions of message reminding, alarm clock, sedentary reminding and the like.
Smart glasses, a wearable device integrated with augmented Reality (Augmented Reality, AR) or Virtual Reality (VR) technology, exhibit Virtual information through head-wearing or glasses. One or more of the functions of augmented reality display, superimposing virtual information in a real scene, head following, adjusting display content according to a user's line of sight, voice assistant, taking a photograph or video, navigation, etc. may be implemented.
The three-part accessory equipment is usually an unofficially produced product for replacing or supplementing the original accessory of the electronic equipment, and can be accessory equipment produced by a third party manufacturer (such as a branding partner manufacturer), and can also be called as non-self-grinding accessory equipment and the like.
Bluetooth (Bluetooth), also known as classical Bluetooth, is a low cost, low power, short range wireless communication technology that allows devices to transmit data and voice without the need for cables. The rapid pairing and data transmission between the devices can be realized by wireless connection and communication through a point-to-point mode network.
BLE (Bluetooth Low Energy), namely low-power consumption Bluetooth, is a wireless technology with short distance, low cost and interoperability and is specially designed for expanding the classical Bluetooth technology.
ZigBee is a short-distance wireless communication technology with low power consumption, low cost and low data rate. ZigBe is a wireless communication protocol based on the ieee802.15.4 standard, focusing on low data rate, short range wireless sensor network applications.
The Key (Key) is a string or value used to encrypt and decrypt data.
A User Interface (UI) is a media interface for interaction and information exchange between an application or operating system and a user, which enables conversion between an internal form of information and a form acceptable to the user. The user interface is a source code written in a specific computer language such as java, extensible markup language (extensible markup language, XML) and the like, and the interface source code is analyzed and rendered on the electronic equipment to finally be presented as content which can be identified by a user. A commonly used presentation form of a user interface is a graphical user interface (graphic user interface, GUI), which refers to a graphically displayed user interface that is related to computer operations. It may be a visual interface element of text, icons, buttons, menus, tabs, text boxes, dialog boxes, status bars, navigation bars, widgets, etc., displayed in a display of the electronic device.
The data processing method provided by the embodiment of the application can be applied to searching the scene of the accessory equipment offline. The data processing method provided by the embodiment of the application can generate key data required by searching the offline equipment in advance by means of the computing power of the electronic equipment (such as a smart phone) and transmit the key data to the accessory equipment, so that the accessory equipment does not need to adapt to the protocol requirements of manufacturers of the electronic equipment (such as passwords or key algorithms required by the adaptation protocol), and can report the position information based on the key data transmitted by the electronic equipment, namely the capability of realizing the searching of the offline equipment. The data processing method provided by the embodiment of the application can enable the three-party accessory equipment to realize the capability of searching the off-line equipment, can save development and adaptation work of third-party manufacturers, and is also applicable to accessory equipment with low calculation power.
First, a system architecture to which the present application relates will be explained.
The data processing method provided by the embodiment of the application can be applied to the data processing system shown in fig. 1. The data processing system shown in fig. 1 may include, but is not limited to, a first electronic device 101, one or more first accessory devices 102, a server 103, and a network of lookup devices 10, one or more second electronic devices 104, one or more second accessory devices 105 may be included in the network of lookup devices 10. The first electronic device 101 and the second electronic device 104 may be devices having network connection capabilities, and may establish a communication connection with the server 103 through a network. The first accessory device 102 and the second accessory device 105 may be wearable devices with short-range communication capabilities. For example, the first accessory device 102 and the second accessory device 105 may be in bluetooth communication. In one possible approach, one or more of the first electronic device 101, the first accessory device 102, and the server 103 may also be included in the network of lookup devices.
The number and configuration of the devices in fig. 1 are for example and are not meant to limit embodiments of the present application. For example, the first electronic device 101 and the second electronic device 104 in fig. 1 are illustrated as smartphones. In one possible manner, the first electronic device 101 and the second electronic device 104 may also be, but are not limited to, devices that can establish a connection with accessory devices, such as a tablet computer, a palm top computer, a notebook computer, and the like. As another example, the second accessory device 105 in fig. 1 is illustratively a bluetooth headset, a smart band. In one possible manner, the second accessory device 105, like the first accessory device 102, may also be, but is not limited to, smart glasses, smart watches, head mounted displays, and other wearable devices. The server 103 may provide an offline device search service for electronic devices and accessory devices, and in one possible manner, the server 103 may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server that provides services such as cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, and the like.
In one possible implementation, the network of lookup devices 10 is a network of lookup devices of a second object (e.g., an X handset vendor). The production objects of the first electronic device 101 and the second electronic device 104 are both second objects, that is, the first electronic device 101 and the second electronic device 104 belong to devices produced by the same manufacturer. The production object of the first accessory device 102 is a first object, and the first object and the second object are different, i.e. the first accessory device 102 and the first electronic device 101 belong to devices produced by different manufacturers. For example, the first accessory device 102 can be a three-way accessory device. The second accessory device 105 in the network of lookup devices 10 may be an accessory device produced by the second object or may be an accessory device generated by a non-second object, for example, the second accessory device 105 may be a three-way accessory device. If the second accessory device 105 is a non-second object generated accessory device, the second accessory device 105 joins (or accesses) the network of lookup devices 10 after the authorization of the second object is obtained, the second accessory device that obtained the authorization of the second object is configured with the device authentication data issued by the second object.
In another possible implementation, the production object of the first accessory device 102 may also be the same as the production object of the first electronic device 101, i.e. the first electronic device 101 and the first accessory device 102 belong to devices produced by the same manufacturer.
In the following, in conjunction with the data processing system shown in fig. 1, taking the first electronic device 101 as a smart phone and the distance communication capability of the first accessory device 102 as bluetooth communication as an example, an application scenario of the embodiment of the present application and a data processing method provided by the embodiment of the present application are exemplarily described.
As shown in fig. 2A, the first electronic device 101 may display an interface of a home screen including a plurality of application icons, such as a live broadcast application icon, a gallery application icon, a weather application icon, a stock application icon, a calculator application icon, a setup application icon 21, a mail application icon, a facebook application icon, a browser application icon, a music application icon, a video application icon, an application store icon, and the like. The page indicator is further included below the plurality of application icons to indicate the positional relationship of the currently displayed page with other pages. The first electronic device 101 may detect a selection operation 22 (e.g., a click operation) by the user for the setting application icon 21, and in response to the selection operation 22, the first electronic device 101 may display a user interface of the setting application shown in fig. 2B.
As shown in fig. 2B, the user interface of the setup application includes a plurality of interface objects including, for example, a search box, a "WLAN (wireless local area network)" option, a "bluetooth" option 23, a "mobile network" option, and the like. The first electronic device 101 may detect a selection operation 24 (e.g., a click operation) by the user for the "bluetooth" option 23, and in response to the selection operation 24, the first electronic device 101 may display the bluetooth application interface shown in fig. 2C. As shown in fig. 2C, the bluetooth application interface includes a plurality of interface objects, for example, "bluetooth switch 25", "device name Y1 of the first electronic device 101", and the like. In the case where the "bluetooth switch 25" is placed in the off state, the first electronic device 101 may detect a trigger operation 26 (e.g., a click operation) of the user on the "bluetooth switch 25", and in response to the trigger operation 26, the first electronic device 101 may place the "bluetooth switch 25" in the on state and turn on the bluetooth search peripheral devices that may perform bluetooth pairing, and based on the search result, may update the bluetooth application interface shown in fig. 2C to the bluetooth application interface shown in fig. 2D.
As shown in fig. 2D, the updated bluetooth application interface displays name options of surrounding devices capable of bluetooth pairing, including, for example, a "mobile phone 1" name option, a "mobile phone 2" name option, an "accessory 1" name option 27, an "accessory 2" name option, and the like. In the case where the accessory device corresponding to the name "accessory 1" is an accessory device (i.e., the first accessory device 102) that needs to establish a bluetooth connection with the first electronic device 101, the first electronic device 101 may detect a selection operation 28 (e.g., a click operation) of the user for the "accessory 1" name option 27, and in response to the selection operation 28, the first electronic device 101 may establish a bluetooth communication connection with the first accessory device 102 (i.e., the accessory device corresponding to the name "accessory 1"). As shown in fig. 3A, the first electronic device 101 may receive device authentication data from the first accessory device 102 indicating that the first accessory device 102 is authorized to join the network of lookup devices 10 of the second object based on the established bluetooth communication connection. The first electronic device 101 may authenticate the first accessory device 102 based on the device authentication data. In the case that the authentication of the first accessory device 102 passes, it may be confirmed that the first accessory device 102 is authorized to join the network 10 of the second object, that is, it may be confirmed that the first accessory device 102 reports the location information based on the network 10 of the lookup device, so as to implement the capability of offline device lookup, where the first electronic device 101 may generate key data required for offline device lookup, and send the key data to the first accessory device 102. Accordingly, the first accessory device 102 receives key data from the first electronic device 101 and stores the key data.
In the event that the bluetooth communication connection between the first accessory device 102 and the first electronic device 101 is broken, the first accessory device 102 may determine location information where it is currently located, generate a first broadcast message based on the key data and the location information, and the first accessory device 102 broadcasts the first broadcast message, as shown in fig. 3B. The second electronic device 104 in the network of search devices 10 may report the first broadcast message to the server 103 if it is received. The server 103 records the location information reported by the first accessory device 102 based on the first broadcast message. In one possible implementation, if the second accessory device 105 in the network of lookup devices 10 also has network connection capabilities, the second accessory device 105 may also receive the first broadcast message broadcast by the first accessory device 102 and report the first broadcast message to the server 103.
Therefore, the key required by the offline device search in the embodiment of the application is generated by leading the electronic device (such as a smart phone), so that the key can be better ensured to be in line with the protocol implementation of the manufacturer (such as a mobile phone manufacturer) of the electronic device, the accessory manufacturer has no great burden, and the hardware requirement on the accessory device is lower.
In a case where the first accessory device 102 is lost, for example, the first electronic device 101 and the user of the first accessory device 102 need to find the first accessory device 102, the first electronic device 101 may display an application interface (application interface may also be referred to as a user interface) of the find device application shown in fig. 4A in response to an opening operation of the find device application by the user. As shown in fig. 4A, the first application interface displays name options of the device capable of searching for the location, including, for example, a "Y1" name option, a "fitting 1" name option 41, a "fitting 2" name option, and the like. In the case where the accessory device corresponding to the name "accessory 1" is an accessory device (i.e., the first accessory device 102) that needs to find a location, the first electronic device 101 may detect a selection operation 42 (e.g., a click operation) by the user for the "accessory 1" name option 41, and in response to the selection operation 42, the first electronic device 101 may acquire the location information of the first accessory device 102 from the server 103. Based on the acquired location information of the first accessory device 102, the first electronic device 101 may update the application interface shown in fig. 4A to an application interface as shown in fig. 4B. As shown in FIG. 4B, the updated application interface may include location information of the first accessory device 102 displayed in text form, such as "X1 city X2 area X3 street X4 cell" shown at 43 in FIG. 4B, and location information of the first accessory device 102 displayed in graphical form, such as a location icon located in an electronic map shown at 44 in FIG. 4B. Looking up the location information of the first accessory device 102 displayed in the application interface of the device application may help the user successfully locate the location of the first accessory device 102, thereby helping the user find the first accessory device 102.
In one possible implementation, the first electronic device 101 may also display a bluetooth application interface as shown in fig. 2C in the case that a triggering operation of the user for the bluetooth application icon is detected. For example, a long press operation of the user against the bluetooth application icon in the drop-down menu bar is detected, and a bluetooth application interface as shown in fig. 2C is displayed. The first electronic device 101 may also be a device capable of bluetooth pairing around bluetooth search when detecting that a user inputs a voice command for indicating to start bluetooth, and directly display a bluetooth application interface as shown in fig. 2D based on the search result. The voice instruction is, for example, "bluetooth on".
In one possible implementation, the first electronic device 101 may be an application interface that displays the find device application shown in fig. 4A in the case where a trigger operation by the user for the find device application icon is detected. The first electronic device 101 may be configured to display a find device application icon in a user interface of the setup application. The first electronic device 101 may display an application interface of the search device application as shown in fig. 4A when detecting that the user inputs a voice command for indicating the search device, or acquire location information of a corresponding device from the server 103 according to the voice command, and directly display the application interface of the search device application as shown in fig. 4B based on the acquired location information.
The data processing method provided by the embodiment of the application is described in detail below.
Referring to fig. 5, fig. 5 is a flowchart of a data processing method according to an embodiment of the present application, where the method may include, but is not limited to, the following steps:
501, the first electronic device displays an application interface of the short-range communication application in response to an opening operation for the short-range communication application, where the application interface of the short-range communication application includes first identification information of the first accessory device.
The short-range communication application may be a communication application based on a short-range wireless communication technology, which may be classical bluetooth, bluetooth low energy BLE, zigBee, etc.
In some embodiments, the opening operation of the user for the short-range communication application may be for opening a short-range communication function corresponding to the short-range communication application, for example, opening bluetooth. The first electronic device may start the short-range communication function to search for devices around which a short-range communication connection (e.g., a bluetooth connection) may be established in response to the start operation, and display an application interface of the short-range communication application based on the search result. The application interface may display identification information of surrounding devices that may establish a short-range communication connection. The application interface may be, for example, a user interface as shown in fig. 2D.
In the case where the device that can establish the short-range communication connection includes the first accessory device, the application interface may include therein first identification information of the first accessory device. In one possible implementation, the first identification information may be a device model number, a device name, and the like. The first accessory device may be an accessory device that requires a short-range communication connection to be established with the first electronic device.
Alternatively, the opening manipulation may be a voice command or a gesture operation. For example, the voice command may be "turn on bluetooth" and the gesture operation may be a click operation for a bluetooth switch in the application interface.
In some embodiments, the first accessory device and the production object (or manufacturer) to which the first electronic device belongs may be different. For example, the first accessory device may be a three-way accessory device. The first accessory device, unlike the production object to which the first electronic device belongs, generally cannot realize the capability of searching for the corresponding password or key algorithm by the offline device according to the protocol requirement of the production object of the first electronic device, so that the capability of searching for the offline device cannot be realized. The data processing method provided by the embodiment of the application can enable the first accessory equipment to realize the capability of searching the offline equipment.
The first electronic device establishes 502 a short-range communication connection with the first accessory device in response to a selection operation for the first identification information.
The first identification information of the first accessory device is displayed in an application interface of the short-range communication application, the first electronic device can detect selection operation of a user for the first identification information, and short-range communication connection is established with the first accessory device in response to the selection operation. For example, the first electronic device establishes a bluetooth low energy BLE connection with the first accessory device.
In one possible implementation, the selection operation may be a gesture operation, a voice command, or the like. For example, the first identification information is "accessory 1", and the voice instruction may be "pairing with accessory 1", "connecting accessory 1", or the like. The gesture operation may be, for example, a click operation or the like.
503, The first accessory device sends device authentication data to the first electronic device based on the short-range communication connection.
The first accessory device sends device authentication data to the first electronic device based on a short-range communication connection between the first accessory device and the first electronic device. The device authentication data is used to indicate that the first accessory device is authorized to join a network of lookup devices of a second object, such as network of lookup devices 10 in the data processing system shown in fig. 1, which may be a production object of the first electronic device. The device authentication data is also used by the first electronic device to authenticate the first accessory device to determine whether the first accessory device is authorized to join the network of lookup devices of the second object. Only when the first accessory equipment is authorized to join the searching equipment network of the second object, the method provided by the embodiment of the application can be adopted to enable the first accessory equipment to report the position information of the first accessory equipment based on the searching equipment network of the second object so as to realize the capability of searching the offline equipment.
In some embodiments, the first accessory device may be a write instruction to receive the first object input, the device authentication data of the first accessory device being written to the first accessory device based on the write instruction. The first object and the second object are in authorized relation to the first accessory equipment, the first object is a production object of the first accessory equipment, and the second object is a production object of the first electronic equipment.
In one possible implementation manner, as shown in fig. 6, the first object may submit a request for adding the search device network to the second object, where the request for adding the first accessory device to the search device network of the second object may be applied, and only through the application, the capability of the first accessory device to implement offline device search may be subsequently enabled based on the manner provided by the embodiment of the present application. In the case where the second object applies for, i.e. authorizes, the first accessory device to join the second object's network of lookup devices through the joining network of lookup devices, the second object may generate device authentication data for the first accessory device and issue the device authentication data to the first object. The first object receives device authentication data issued by the second object and writes the device authentication data to the first accessory device. The device authentication data may be a key, digital certificate, etc., which may be generated in accordance with a first key algorithm.
In one possible implementation, the joining lookup device network application may be a lookup device network for applying to join the one accessory device of the first accessory device to the second object, where the joining lookup device network application may carry a device type (e.g., bluetooth headset, smart watch, etc.) of the first accessory device, unique identification information (e.g., device serial number) of the first accessory device, etc. In this manner, the device authentication data issued by the second object is used only to indicate that the first accessory device is authorized to join the network of seeking devices of the second object. In another possible implementation manner, the joining search device network application may be a search device network for applying to join all accessory devices under the target device model to the second object, where the target device model is the device model of the first accessory device, and the joining search device network application may carry a device type (such as a bluetooth headset, a smart watch, etc.), a target device model, and so on. In this manner, the device authentication data issued by the second object is used to indicate that all accessory devices (including the first accessory device) under the target device model are authorized to join the network of lookup devices of the second object.
In some embodiments, after the first electronic device successfully establishes the short-range communication connection with the first accessory device, the first electronic device may send a device authentication instruction to the first accessory device based on the communication connection, and the first accessory device may send device authentication data to the first electronic device based on the communication connection in response to the device authentication instruction.
The first electronic device receives device authentication data from the first accessory device based on the short-range communication connection 504.
The first electronic device may receive device authentication data sent by the first accessory device based on a short-range communication connection between the first accessory device and the first electronic device.
505, The first electronic device authenticates the first accessory device based on the device authentication data.
The first electronic device authenticates the device authentication data, and if the device authentication data is authenticated, the step 506 and the subsequent related steps can be executed if the device authentication data is determined to be authenticated, and if the device authentication data is not authenticated, the step of determining that the device authentication data is not authenticated indicates that the first accessory device cannot be determined to be authorized to join the network of the search device, and the process can be directly ended at this time.
In some embodiments, in the case where the device authentication data is a key generated according to a first key algorithm, the first electronic device may generate a key for the first accessory device according to the corresponding key algorithm, and if the key generated by the first electronic device matches the key indicated by the device authentication data, it may be confirmed that the device authentication data is authenticated, i.e., that the first accessory device is authenticated. For example, the key indicated by the device authentication data is generated based on the device serial number of the first electronic device according to a first key algorithm, the first key algorithm is also written in the first electronic device, the first key algorithm can be used by the second object authorization device to join the network of the searching device, the first accessory device can send the device serial number and the device authentication data to the first electronic device together, the first electronic device generates a key according to the first key algorithm based on the received device serial number, the key generated by the first electronic device is compared with the key indicated by the device authentication data, and if the two keys are consistent, the device authentication data can be confirmed to pass the authentication.
In other embodiments, where the device authentication data is a digital certificate, the digital certificate may contain a digital signature of the second object, which may be a digital certificate issued when the second object authorizes the device to join the network of seeking devices. The first electronic device may verify a digital signature on the digital certificate, and in case the digital signature verification passes, may confirm that the device authentication data authentication passes, i.e. that the first accessory device authentication passes.
The first electronic device generates 506 key data in response to the first accessory device authenticating.
In the event that the first accessory device is authenticated, i.e., it is determined that the first accessory device is authorized to join the network of lookup devices, key data required for offline device lookup is generated for the first accessory device. The key data may be generated based on a second key algorithm, which may be implemented based on protocol requirements of the second object, the off-line device looking up the corresponding key algorithm.
In some embodiments, the first electronic device may generate a base key, and generate M derivative keys based on the base key, where M is a positive integer, and the M derivative keys are key data.
In one possible implementation, the base key may be a randomly generated key and the M derivative keys may be iteratively generated based on the base key and the second key algorithm. Alternatively, the M derivative keys may be iteratively generated based on the base key, time (or clock) information, and a second key algorithm. For example, the key used by the reporting position of the accessory device needs to be updated every day, the electric quantity of the accessory device can support to be used for 3 days at most, and 3 derivative keys can be generated to meet the key updating requirement of the accessory device. Assuming that the basic key is K and the current time is 2024/11/1, combining (e.g. splicing) the basic key K and the time 2024/11/1, and adopting a second key algorithm to process the combined result to obtain a first derivative key, wherein the first derivative key can be a key which should be used by the accessory equipment at the 2024/11/1 reporting position, combining the first derivative key and the time 2024/11/2, adopting the second key algorithm to process the combined result to obtain a second derivative key, wherein the second derivative key can be a key which should be used by the accessory equipment at the 2024/11/2 reporting position, combining the second derivative key and the time 2024/11/3, adopting the second key algorithm to process the combined result to obtain a third derivative key, and the third derivative key can be a key which should be used by the accessory equipment at the 2024/11/3 reporting position.
In one possible implementation, the base key may be used to bind with second identification information of the first accessory device, which may be unique identification information of the first accessory device, such as a device serial number, a device MAC address, and the like. The first electronic device may report the base key to the server, and the server binds the base key with the second identification information of the first accessory device, so that the server may identify, based on the base key, that the broadcast message is for reporting the location information of the first accessory device.
In some embodiments, the key data may include only one key that may be used to bind with the second identification information of the first accessory device. The first electronic device may report the key to the server, and the server binds the key with the second identification information of the first accessory device, so that the server may identify, based on the key, that the broadcast message is for reporting the location information of the first accessory device.
In some embodiments, in the event that the first accessory device is authenticated, the first electronic device may output a prompt at a display interface (also referred to as a user interface) that may be used to prompt a user whether to confirm that the first accessory device is joined to the network of lookup devices of the second object. The first electronic device detects an instruction input by a user aiming at the prompt information, generates key data required by off-line device searching under the condition that a confirmation instruction is detected, namely, the user agrees to add the first accessory device into the searching device network, and sends the key data to the first accessory device. Conversely, in the case of detecting that the cancellation instruction, i.e. the user does not agree to join the first accessory device to the network of the lookup device, the flow may be ended directly. Thus, the user selectivity is given, and the capability of enabling the first accessory equipment to realize offline equipment searching can be selected by the user.
Optionally, the prompting information may be further used to prompt the user that the first accessory device is authorized to join the network of the lookup device of the second object, so that the user is aware of the authentication result of the first accessory device.
507, The first electronic device sends key data to the first accessory device.
The first electronic device may send key data to the first accessory device based on the short-range communication connection between the first accessory device and the first electronic device. The key data is used for generating a first broadcast message by the first accessory device under the condition that the first accessory device is disconnected from communication with the first electronic device, and the first broadcast message is used for reporting the position information of the first accessory device.
In some embodiments, the first electronic device may establish an encrypted channel with the first accessory device based on the established short-range communication connection if the first accessory device is authenticated. After generating the key data, the first electronic device may encrypt the transmission key data to the first accessory device through the encrypted channel, so that transmission security of the key data may be ensured.
Accordingly, the first accessory device receives key data from the first electronic device based on the short-range communication connection between the first accessory device and the first electronic device.
508, The first accessory device stores the key data.
In some embodiments, upon completion of the key data storage, the first accessory device may send feedback information to the first electronic device indicating that the first accessory device joined the network of the second object's lookup device was successful based on the established short-range communication connection. The first electronic device receives the feedback information, and the feedback information can be displayed on a display interface to prompt a user of a result of joining the first accessory device to the network of the search device.
The first accessory device can report the position information of the first accessory device through the searching device network of the second object based on the key data sent by the first electronic device only under the condition of successfully joining the searching device network of the second object, thereby realizing the capability of searching the offline device.
509, The first accessory device determines location information where the first accessory device is currently located in response to detecting that the communication connection between the first accessory device and the electronic device is broken.
In some embodiments, the first accessory device may determine location information of its current location via the configured locating means upon detecting a disconnection of the communication between the first accessory device and the electronic device.
The first accessory device generates 510 a first broadcast message based on the key data and the location information. The first broadcast message may be used to report location information of the first accessory device.
In some embodiments, the first accessory device may generate the first broadcast message in a message format required by the second object based on the key data and the location information. Such that only the second object-generated or authorized device can receive and report the first broadcast message.
In one possible implementation, the key data may include M derivative keys, which are generated based on the base key, as described above. The first accessory device may select a derivative key from the M derivative keys included in the key data, and generate a first broadcast message based on the selected derivative key and the location information.
Alternatively, in the case where the M derivative keys have no selection requirement, the derivative key may be randomly selected from the M derivative keys. In the case where the M derivative keys are selectively required, it is necessary to select a derivative key satisfying the requirement from the M derivative keys. For example, the corresponding derivative key needs to be selected according to time, and in combination with the foregoing examples, the key data includes the first derivative key, the second derivative key, and the third derivative key, which are the keys that should be used by the accessory device at 2024/11/1, 2024/11/2, and 2024/11/3 reporting locations, respectively, and the third derivative key should be selected assuming that the time required to generate the broadcast message is 2024/11/3.
Alternatively, the selected derivative key and the location information may be used as a data body to generate the first broadcast message according to the message format required by the second object. The first broadcast message may be used to indicate that the location information is stored in association with the second identification information of the first accessory device based on a derivative key associated with the first broadcast message, i.e., a derivative key in a data body of the first broadcast message.
In one possible implementation, when the key data includes only one key, the location information may be encrypted by using the key to obtain encrypted location information, and the encrypted location information is used as a data body to generate the first broadcast message according to the message format required by the second object. Therefore, the safety of the position information can be improved, and the position information can be prevented from being tampered maliciously. The first broadcast message may be used to indicate that location information is stored in association with second identification information of the first accessory device based on a key associated with the first broadcast message, i.e., a key used to encrypt the location information.
511, The first accessory device broadcasts a first broadcast message.
In some embodiments, the first accessory device may broadcast the first broadcast message to the outside based on its short-range communication function (e.g., bluetooth low energy BLE) in order for the devices in the network of seeking devices to report the first broadcast message to the server if the first broadcast message is received.
512, The second electronic device receives the first broadcast message.
In some embodiments, it may be that the short-range communication function of the second electronic device is in an on state, and the second electronic device receives the first broadcast message broadcast by the first accessory device based on the short-range communication function without establishing a communication connection (or pairing) with the first accessory device. The second electronic device may be an electronic device in the network of search devices that is in proximity to the first accessory device.
The second electronic device reports 513 the first broadcast message to the server.
In some embodiments, the second electronic device may report the first broadcast message to the server over the network.
Correspondingly, the server receives a first broadcast message reported by the second electronic equipment.
In one possible implementation, if the second accessory device in the network of the lookup device also has network connection capabilities, a first broadcast message broadcast by the first accessory device may also be received by the second accessory device and reported to the server.
The server records 514 location information of the first accessory device based on the first broadcast message.
In some embodiments, the server obtains information in the data body of the first broadcast message, and in the case where the obtained information includes the derivative key and the location information, the derivative key may be processed based on a corresponding anti-key algorithm to extract a base key used to generate the derivative key. For example, in combination with the foregoing example, assuming that the derived key obtained from the first broadcast message is a first derived key obtained by combining the base key and the time 2024/11/2 and processing the combined result by using the second key algorithm, the first derived key may be processed by using an anti-key algorithm corresponding to the second key algorithm to obtain the base key and the time 2024/11/2. When the server binds the basic key corresponding to the first accessory device with the second identification information of the first accessory device in advance, the server may determine, based on the extracted basic key, that the location information acquired from the first broadcast message is the location information reported by the first accessory device, and may store the location information acquired from the first broadcast message in association with the second identification information of the first accessory device.
In some embodiments, the server obtains information in the data body of the first broadcast message, and in the case that the obtained information includes encrypted location information, the server may decrypt the encrypted location information using a key corresponding to each accessory device stored in advance until the encrypted location information is successfully decrypted, to obtain the location information. When the server binds the key corresponding to the first accessory device with the second identification information of the first accessory device in advance, the server can determine that the decrypted position information is the position information reported by the first accessory device based on the key for successfully decrypting the encrypted position information, and at the moment, the decrypted position information can be stored in association with the second identification information of the first accessory device.
Therefore, in the embodiment of the application, the key data required by the off-line equipment searching can be generated in advance by means of the computing power of the electronic equipment and transmitted to the accessory equipment, so that the accessory equipment does not need to adapt to the protocol requirements of manufacturers of the electronic equipment (such as passwords or key algorithms required by the adaptation protocol), and can also report the position information through the searching equipment network based on the key data transmitted by the electronic equipment, namely the capability of realizing the off-line equipment searching. The method can enable the three-party accessory equipment to realize the capability of searching the offline equipment, can save development and adaptation work of third-party manufacturers, and is also applicable to accessory equipment with low calculation power. In addition, under the condition that the accessory equipment passes authentication, namely that the accessory equipment is authorized to join the network of the searching equipment, key data required by the off-line equipment searching is generated and transmitted to the accessory equipment, so that the authorized accessory equipment can only realize the capability of the off-line equipment searching, and the compliance is ensured.
The above describes the process of generating key data required by searching the offline device, reporting position information by the accessory device, and the like by the electronic device, and the following describes the process of searching the accessory device.
Referring to fig. 7, fig. 7 is a flowchart of another data processing method according to an embodiment of the present application, where the method may include, but is not limited to, the following steps:
701, the first electronic device displays an application interface of the search device application in response to a start operation for the search device application, wherein the application interface of the search device application comprises third identification information of the first accessory device.
In a case where the first accessory device is lost, for example, the first electronic device and the user of the first accessory device need to find the first accessory device, the first electronic device may detect an opening operation of the user for the find device application, and in response to the opening operation, display an application interface of the find device application, where identification information of the device that can find the location is displayed, where the identification information may include third identification information of the first accessory device. For example, the application interface is the user interface shown in fig. 4A, and "accessory 1" in the user interface shown in fig. 4A is the third identification information of the first accessory device. Optionally, the third identification information of the first accessory device may be the same as or different from the first identification information of the first accessory device described above.
The first electronic device sends a device lookup request for the first electronic device to the server in response to the selection operation for the third identification information 702.
The device lookup request may be used to request a query for location information of the first accessory device. The device lookup request may carry second identification information of the first accessory device, such as a device serial number or the like.
Accordingly, the server receives a device lookup request from the first electronic device.
The server queries 703 the location information of the first accessory device in response to the device lookup request.
The server may query, based on the second identification information of the first accessory device carried by the device search request, location information stored in association with the second identification information, where the location information stored in association is location information of the first accessory device that needs to be acquired. The relevant process of reporting the location information of the first accessory device may refer to the foregoing description, and will not be described herein.
The server returns 704 location information of the first accessory device to the first electronic device.
Accordingly, the first electronic device receives the position information of the first accessory device returned by the server.
705, The first electronic device displays the location information of the first accessory device in an application interface of the find device application.
Under the condition that the position information of the first accessory equipment is acquired from the server, the first electronic equipment can display the position information of the first accessory equipment in a text form in an application interface of the search equipment application, and can also display the position information of the first accessory equipment in a graph (such as a map) form in the application interface of the search equipment application.
For example, based on the location information of the first accessory device acquired from the server, the first electronic device may update the application interface shown in fig. 4A to the application interface shown in fig. 4B. As shown in fig. 4B, the updated application interface may include the location information of the first accessory device displayed in text form, i.e. "X1 city X2 area X3 street X4 cell" shown in fig. 4B 43, and may also include the location information of the first accessory device displayed in graphic form, i.e. the location icon located in the electronic map shown in fig. 4B 44. The locating information of the first accessory device displayed in the application interface of the device application can help the user successfully locate the location of the first accessory device, thereby helping the user find the first accessory device.
In some embodiments, the first accessory device may generate the first broadcast message based on the key data, the location information, and other specific information. Other specific information includes, but is not limited to, power information, location acquisition time information, and the like. Thus, after the first broadcast message is reported to the server through the network of search devices, the server may store the location information and other specific information (e.g., power information) of the first accessory device. Upon receiving the device lookup request for the first accessory device, the server may return location information of the first accessory device to the first electronic device along with other specific information. The first electronic device may display location information and other specific information of the first accessory device in an application interface of the find device application. For example, as shown in fig. 4B, the application interface may include the power information of the first accessory device displayed in a graphic form, i.e., the power icon shown at 45 in fig. 4B, and may also include the power information of the first accessory device displayed in a text form, i.e., the text "60%" beside the power icon 45.
Optionally, the location update time of the first accessory device may also be displayed in the application interface of the find device application, such as location update time "2024/10/1-12:00" shown at 47 in FIG. 4B. The location update time may be returned to the first electronic device along with information such as location information. The location update time may be a location acquisition time reported by the first accessory device, or may be a time when the server records location information of the first accessory device.
Optionally, a navigation control (e.g., the navigation control shown at 46 in fig. 4B), a sound playing control, a notification control, etc. may be displayed in the application interface of the find device application. And under the condition that the triggering operation for the navigation control is detected, the first electronic equipment can jump to the map application and conduct path planning based on the position information of the first accessory equipment so as to guide the user to reach the position of the first accessory equipment.
In some embodiments, the first electronic device is in the network of search devices, that is, the first electronic device is an electronic device in the network of search devices, and the first electronic device may also implement the function of the second electronic device, that is, report a broadcast message of the accessory device to the server.
In one possible implementation, the first electronic device receives a second broadcast message broadcast by a second accessory device, which may be an accessory device that successfully joins the network of lookup devices of the second object, the second broadcast message being generated by the second accessory device based on key data and location information corresponding to the second accessory device if the short-range communication connection with the respective electronic device (which may be an electronic device produced by the second object) is broken. The key data may be generated by the respective electronic device and communicated to the second accessory device. The series of processes involved in this process may be described with reference to the relevant steps 501-512, and will not be described in detail herein. And under the condition that the second broadcast message is received, the first electronic equipment reports the second broadcast message to the server, the second broadcast message is used for indicating a key associated with the second broadcast message, and the position information of the second accessory equipment and the identification information of the second accessory equipment are stored in an associated mode so that a subsequent user can conveniently find the second accessory equipment. The series of processes involved therein may be described with reference to steps 513-514 and steps 701-705, and are not repeated here.
Next, one possible flow of performing data processing by the electronic device is described in connection with the interaction of the internal modules of the electronic device. In some embodiments, the electronic device may be the first electronic device corresponding to the previous embodiments. As shown in fig. 8, the following steps may be included, but are not limited to:
801, a detection module detects a user's opening operation for a short-range communication function.
The short-range communication function may be implemented based on a short-range wireless communication technology, for example, may be a bluetooth communication function.
Alternatively, the opening operation may be a voice instruction or a gesture operation. For example, the voice command may be "turn on bluetooth" and the gesture operation may be a click operation for a bluetooth switch in the user interface.
802, The detection module sends a first message to the short-range communication module.
The first message may be used to notify the short-range communication module to perform a device search.
803, The short-range communication module performs a device search in response to the first message.
The short-range communication module may be a device around which a short-range communication connection may be established, including an electronic device (e.g., a cell phone, a tablet computer), an accessory device (e.g., a bluetooth headset, a smart watch), etc.
The short-range communication module sends 804 the search results to the display module.
The search results may include identification information of devices around which a short-range communication connection may be established, such as a device name or a device model number. And under the condition that the accessory equipment needing to establish the communication connection is in a connectable range, the search result comprises target identification information of the accessory equipment needing to establish the communication connection.
805, The display module displays content on a user interface based on the search result, wherein target identification information of the accessory device that needs to establish a communication connection is displayed in the user interface.
806, The detection module detects a selection operation of the user for the target identification information in the user interface.
Alternatively, the selection operation may be a gesture operation, a voice instruction, or the like. For example, the target identification information is "accessory 1", and the voice instruction may be "pairing with accessory 1", "connecting accessory 1", or the like. The gesture operation may be, for example, a click operation or the like.
The detection module sends 807 a second message to the short-range communication module.
The second message may be used to notify the short-range communication module, and establish a short-range communication connection with the accessory device corresponding to the target identification information.
808, The short-range communication module establishes a short-range communication connection with the accessory device corresponding to the target identification information in response to the second message.
Alternatively, a bluetooth low energy BLE connection may be established for the accessory device corresponding to the target identification information.
The short-range communication module sends 809 a third message to the authentication module.
After the accessory device corresponding to the target identification information successfully establishes the short-range communication connection, the short-range communication module may send a third message to the authentication module. The third message may be used to indicate that the short-range communication connection was established successfully, and may also be used to inform the authentication module to generate device authentication instructions.
The authentication module generates 810 a device authentication instruction in response to the third message.
The device authentication instructions may be used to instruct the accessory device to report device authentication data.
811, The authentication module sends a fourth message to the short-range communication module, the fourth message carrying a device authentication instruction.
Wherein the fourth message may be used to notify the short-range communication module to send a device authentication instruction to the accessory device based on the short-range communication connection.
812, The short-range communication module sends a device authentication instruction to the accessory device based on the short-range communication connection in response to the fourth message.
813, The short-range communication module receives device authentication data sent by the accessory device based on the short-range communication connection.
The device authentication data may be used to indicate that the accessory device is authorized to join a network of lookup devices of a second object, which may be a production object of the first electronic device. The relevant process of obtaining device authentication data by the accessory device may be referred to in the foregoing description, and will not be described in detail herein.
The short-range communication module sends 814 device authentication data to the authentication module.
815, The authentication module authenticates the device authentication data.
Optionally, correctness, compliance, etc. of the device authentication data may be authenticated.
816, The authentication module sends a fifth message to the short-range communication module.
The authentication module may send a fifth message to the short-range communication module in case the device authentication data is authenticated. The fifth message may be used to inform the short-range communication module to establish an encrypted channel with the accessory device based on the short-range communication connection.
817, The short-range communication module establishes an encrypted channel with the accessory device based on the short-range communication connection in response to the fifth message.
818, The authentication module sends a sixth message to the display module.
The authentication module may send a sixth message to the display module in case the device authentication data is authenticated. The sixth message may be used to inform the display module to output a prompt message on the display interface.
819, The display module outputs a prompt at the user interface in response to the sixth message.
The prompt may be used to prompt the user that the accessory device may join the device-lookup network, and may be used to query the user as to whether the accessory device agrees to join the device-lookup network.
820, The detection module detects a confirmation instruction entered by the user for the prompt in the user interface.
The confirmation instructions may be used to instruct the user to agree that the accessory device joins the device-lookup network.
821, The detection module sends a seventh message to the key processing module.
The detection module may send a seventh message to the key processing module upon detecting that the user agrees that the accessory device joins the device-lookup network. The seventh message may be used to inform the key processing module to generate key data.
The key processing module generates 822 key data in response to the seventh message.
In the event that the device authentication data is authenticated, i.e., it is determined that the accessory device establishing the short-range communication connection is authorized to join the network of lookup devices, and the user agrees that the accessory device joins the network of lookup devices, key data required for the offline device lookup may be generated for the accessory device.
In some embodiments, the key data may be generated based on a second key algorithm, which may be implemented based on protocol requirements of the second object, the offline device looking up the corresponding key algorithm. Optionally, the first electronic device may generate a base key, and generate M derivative keys based on the base key, where the M derivative keys are key data. The base key may be used to bind with the second identification information of the accessory device.
In one possible implementation, the base key may be a randomly generated key and the M derivative keys may be iteratively generated based on the base key and the second key algorithm.
823, The key processing module sends an eighth message to the short-range communication module, where the eighth message carries key data.
Wherein the eighth message may be used to notify the short-range communication module to send the key data to the accessory device.
824, The short-range communication module encrypts the transmission key data over the encrypted channel to the accessory device in response to the eighth message.
Optionally, the short-distance communication module may encrypt the encrypted key data to the accessory device after decrypting and encrypting the key data based on an encryption algorithm agreed in the encryption channel establishment process.
The key data may be used by the accessory device to generate a first broadcast message in the event of a disconnection of the accessory device from communication with the first electronic device, the first broadcast message may be used to report location information of the accessory device. The first broadcast message may be received by a device in the network of lookup devices and then reported to the server, and the server may record location information reported by the accessory device based on the first broadcast message. The key data required by the off-line equipment searching is transmitted to the accessory equipment in an encrypted mode, so that the transmission safety of the key data can be guaranteed, and the position information of the accessory equipment can be successfully reported to the server.
In some embodiments, the detection module detects an opening operation of a user for the search device application, sends a message to the display module, and the display module responds to the message to display an application interface of the search device application, wherein the application interface of the search device application comprises identification information of the accessory device. The device searching module responds to the message to generate a device searching request, and sends the device searching request to the network communication module, wherein the device searching request can be used for requesting to inquire the position information of the accessory device. The network communication module sends a device searching request to the server, and receives the position information of the accessory device returned by the server aiming at the device searching request. The network communication module sends the position information of the accessory equipment to the display module, and the display module displays the position information of the accessory equipment in an application interface of the equipment searching application.
In some embodiments, the short-range communication module receives a second broadcast message broadcast by a second accessory device. The second broadcast message may be generated based on key data and location information corresponding to the second accessory device, which may be generated by the corresponding electronic device and communicated to the second accessory device, in case the second accessory device disconnects from the corresponding electronic device (which may be an electronic device produced by the second object). The short-distance communication module sends a second broadcast message to the network communication module, and the network communication module reports the second broadcast message to the server. The second broadcast message may be used to indicate that location information of the second accessory device is stored in association with identification information of the second accessory device based on a key associated with the second broadcast message to facilitate a subsequent user to find the second accessory device.
For implementation of the above steps, reference may be made to the related description in the foregoing method embodiments, which is not repeated here.
In some embodiments, the electronic device may correspond to the first accessory device of the previous embodiments. As shown in fig. 9, the following steps may be included, but are not limited to:
901, the short-range communication module establishes short-range communication connection with the electronic device.
Alternatively, a bluetooth low energy BLE connection may be established with the electronic device.
The short-range communication module receives 902 a device authentication instruction from the electronic device based on the short-range communication connection.
903, The short-range communication module sends a device authentication instruction to the authentication module.
The authentication module obtains device authentication data from the storage module in response to the device authentication instruction 904.
The device authentication data may be used to indicate that the accessory device is authorized to join a network of lookup devices of a second object, which may be a production object of the electronic device. The relevant process of the first accessory device obtaining the device authentication data may be referred to the foregoing description, and will not be described herein.
In some embodiments, the input module receives a write instruction input by the first object, and sends the write instruction to the data processing module, where the write instruction carries the device authentication data. The data processing module analyzes the writing instruction to obtain equipment authentication data, and the equipment authentication data is sent to the storage module. The storage module stores the device authentication data. Wherein the first object and the second object have established an authorized relationship for the first accessory device, the first object may be a production object of the first accessory device. Specific implementations of the first object and the second object establishing an authorization relationship for the first accessory device may be referred to the foregoing related description.
905, The authentication module sends a first notification message to the short-range communication module, the first notification message carrying device authentication data.
The first notification message may be used to notify the short-range communication module to send device authentication data to the electronic device. The device authentication data may be used by the electronic device to authenticate the first accessory device.
The short-range communication module sends 906 device authentication data to the electronic device based on the short-range communication connection.
907, The short-range communication module establishes an encrypted channel with the electronic device based on the short-range communication connection.
The short-range communication module receives 908 the key data transmitted by the electronic device via the encryption channel.
The key data may include a key required for the offline device lookup, and the key data may be generated by the electronic device when the device authentication data is authenticated, that is, when it is determined that the accessory device establishing the short-range communication connection is authorized to join the network of the lookup device, and the user agrees that the accessory device joins the network of the lookup device.
909, The short-range communication module transmits the encrypted key data to the data processing module.
The data processing module decrypts 910 the encrypted key data to obtain the key data.
Optionally, the data processing module may decrypt the encrypted key data based on a decryption algorithm agreed in the encryption channel establishment process to obtain the key data.
911, The data processing module sends the key data to the storage module.
912, The storage module stores the key data.
913, The location module determines location information where the first accessory device is currently located in the event that the communication connection with the electronic device is broken.
914, The positioning module sends the location information to the data processing module.
915, The data processing module obtains the key data from the storage module.
The data processing module obtains key data from the storage module in the event that the communication connection with the electronic device is broken.
The data processing module generates 916 a broadcast message based on the key data and the location information.
Optionally, the key data includes M derivative keys, the M derivative keys being generated based on the base key. The data processing module may select a derivative key from M derivative keys included in the key data, and generate the broadcast message based on the selected derivative key and the location information. The base key may be bound to the identification information of the first accessory device, and the broadcast message may be used to indicate that the location information is stored in association with the identification information of the first accessory device based on a derivative key associated with the broadcast message.
917, The data processing module sends a second notification message to the short-range communication module, the second notification message carrying a broadcast message.
Wherein the second notification message may be used to notify the short-range communication module to broadcast the broadcast message.
918, The short-range communication module broadcasts the broadcast message.
The short-range communication module broadcasts the broadcast message to the outside so that the device in the searching device network can report the first broadcast message to the server under the condition that the device receives the first broadcast message, and the server records the position information of the first accessory device based on the first broadcast message.
For implementation of the above steps, reference may be made to the related description in the foregoing method embodiments, which is not repeated here.
Exemplary, the following describes a software structure of an electronic device in an embodiment of the present application. The electronic device may be a device corresponding to the first electronic device or the second electronic device in the foregoing embodiment, or may be an accessory device corresponding to the first accessory device or the second accessory device in the foregoing embodiment.
Alternatively, the software architecture of the electronic device may employ a layered architecture, an event driven architecture, a microkernel architecture, a microservice architecture, or a cloud architecture. The software structure of the electronic device is described below by taking an Android system with a layered architecture as an example.
As shown in fig. 10, the layered architecture of the electronic device may divide the software into several layers, each with a clear role and division of effort. The layers communicate with each other through a software interface. In some embodiments, the Android system is an application layer, an application framework layer, a kernel layer, and the like from top to bottom.
The application layer may include a series of application packages that may include applications for cameras, gallery, video playback, system settings, maps, talk, etc. In the embodiment of the present application, in the case where the electronic device is a device corresponding to the first electronic device or the second electronic device in the foregoing embodiment, the application layer may further include a display module, a short-distance communication application, a search device application, and the like. The display module can be used for controlling the user interface to output content, such as outputting identification information of equipment capable of establishing short-distance communication connection, outputting prompt information, outputting identification information of equipment capable of searching equipment, and the like. Short-range communication applications are associated with short-range communication functions, and may be used to enable short-range communication connections with other devices, data interactions based on short-range communication connections, and the like. The find device application is associated with a device find function, may be used to interact with a user regarding device find, etc.
In the embodiment of the present application, in the case where the electronic device is an accessory device such as the first accessory device or the second accessory device in the foregoing embodiment, the application layer may further include a short-distance communication application or the like. Short-range communication applications, associated with short-range communication functions, may be used to enable short-range communication connections with other devices, and data interactions based on short-range communication connections, may also be used to broadcast messages to the outside, etc.
The application framework layer provides an application programming interface (application programming interface, API) and programming framework for the application of the application layer. The application framework layer includes a number of predefined functions.
The application framework layer may include a window manager. The window manager is used for managing window programs. The window manager can acquire the size of the display screen, judge whether a status bar exists, lock the screen, intercept the screen and the like.
The application framework layer may also include a view system, notification manager, and the like.
The view system includes visual controls, such as controls to display text, controls to display pictures, and the like. The view system may be used to build applications. The display interface may be composed of one or more views. For example, a display interface including a text message notification icon may include a view displaying text and a view displaying a picture.
The notification manager allows the application to display notification information in a status bar, can be used to communicate notification type messages, can automatically disappear after a short dwell, and does not require user interaction.
In the embodiment of the present application, in the case where the electronic device is a device corresponding to the first electronic device or the second electronic device in the foregoing embodiment, the application framework layer may further include a detection module, a storage module, an authentication module, a short-distance communication module, a key processing module, and the like. The detection module may be configured to detect an on operation for the short-range communication function, detect a selection operation of the user for device identification information displayed on the user interface, and so on. The storage module may be used to store data, including key algorithms, key data, and the like. The authentication module may be used to authenticate device authentication data of the accessory device, and the like. The short-range communication module may be used to implement short-range communication functions and may include establishing a short-range communication connection with the accessory device, sending data to the accessory device based on the short-range communication connection, receiving data from the accessory device based on the short-range communication connection, and so forth. The short-range communication module may be a bluetooth module. The key processing module may be used to generate key data required for the lookup device, etc.
In the case where the electronic device is an accessory device such as the first accessory device or the second accessory device in the foregoing embodiments, the application framework layer may further include a storage module, an authentication module, a short-range communication module, a positioning module, a message generation module, and the like. The storage module may be used to store data, including device authentication data, key data, and the like. The authentication module may be used for processing associated with the device authentication data, e.g., verifying the validity of the device authentication data, retrieving the device authentication data from a storage module, etc. The short-range communication module may be used to implement a short-range communication function and may include establishing a short-range communication connection with an electronic device, transmitting data to the electronic device (e.g., a first electronic device) based on the short-range communication connection, receiving data from the electronic device based on the short-range communication connection, broadcasting a message to the outside, and so on. The short-range communication module may be a bluetooth module. The location module may be used for location determination to determine location information of the device. The message generation module may be used to generate a broadcast message or the like, for example, based on the key data and the location information.
In some embodiments, the application framework layer may also include network communication modules, internal communication modules, and the like. In the case that the electronic device is a device corresponding to the first electronic device or the second electronic device in the foregoing embodiment, the network communication module may be configured to perform communication interaction with the server, for example, send a device search request to the server, receive location information of the accessory device sent by the server, and so on. The internal communication module can be used for realizing information interaction between the internal modules of the electronic equipment.
The kernel layer is a layer between hardware and software. The kernel layer at least comprises a display driver, a camera driver, an audio driver, a storage driver, a processor driver, a communication driver and the like.
It should be noted that, the above-mentioned software structures include only functional modules, which are merely exemplary, and do not limit the software architecture of the electronic device of the present application, and in other embodiments, the above-mentioned software structures may include more or fewer functional modules, which are not limited by the present application. Although the embodiment of the application is described by taking an Android system as an example, the basic principle of the embodiment of the application is also applicable to electronic equipment based on an iOS or Windows and other operating systems.
It should be understood that in the embodiment of the present application, the electronic device may be a mobile phone (mobile phone), a tablet computer, a notebook computer, a palm computer, a Mobile Internet Device (MID), a wearable device, a Virtual Reality (VR) device, an augmented reality (augmented reality, AR) device, a wireless terminal in industrial control (industrial control), a wireless terminal in unmanned (SELF DRIVING), a wireless terminal in teleoperation (remote medical surgery), a wireless terminal in smart grid (SMART GRID), a wireless terminal in transportation security (transportation safety), a wireless terminal in smart city (SMART CITY), a wireless terminal in smart home (smart home), a Personal Digital Assistant (PDA), or the like, which is not limited in this embodiment of the present application.
The following describes a hardware structure of an electronic device in an embodiment of the present application. The electronic device may be a device corresponding to the first electronic device or the second electronic device in the foregoing embodiment, or may be an accessory device corresponding to the first accessory device or the second accessory device in the foregoing embodiment.
As shown in fig. 11, the electronic device may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (universal serial bus, USB) interface 130, a charge management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, a mobile communication module 150, a wireless communication module 160, an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, a sensor module 180, keys 190, a motor 191, an indicator 192, a camera 193, a display 194, and a subscriber identity module (subscriber identification module, SIM) card interface 195, etc. The sensor module 180 may include a pressure sensor 180A, a gyroscope sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, an ambient light sensor 180L, a bone conduction sensor 180M, and the like.
The processor 110 may include one or more processing units, for example, the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processor (graphics processing unit, GPU), an image signal processor (IMAGE SIGNAL processor, ISP), a controller, a memory, a video codec, a digital signal processor (DIGITAL SIGNAL processor, DSP), a baseband processor, and/or a neural network processor (neural network processing unit, NPU), etc. Wherein the different processing units may be separate devices or may be integrated in one or more processors. In the embodiment of the present application, when the electronic device is a device corresponding to the first electronic device or the second electronic device in the previous embodiment, the processor may be used to generate key data, verify the device authentication data, and so on. In the case where the electronic device is an accessory device such as the first accessory device or the second accessory device in the foregoing embodiments, a broadcast message may be generated by the processor based on the key data and the location information, and so on.
The NPU is a neural network computing processor, and can rapidly process input information by referencing a biological neural network structure, such as referencing a transmission mode among human brain neurons, and can continuously perform self-learning. The NPU can realize intelligent cognition and other applications of the electronic equipment, such as image recognition, face recognition, voice recognition, text understanding and the like.
A memory may also be provided in the processor 110 for storing instructions and data. In some embodiments, the memory in the processor 110 is a cache memory. The memory may hold instructions or data that the processor 110 has just used or recycled. If the processor 110 needs to reuse the instruction or data, it can be called directly from the memory. Repeated accesses are avoided and the latency of the processor 110 is reduced, thereby improving the efficiency of the system.
The wireless communication function of the electronic device may be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, a modem processor, a baseband processor, and the like. In the embodiment of the application, in the case that the electronic device is a device corresponding to the first electronic device or the second electronic device in the previous embodiment, communication interaction can be performed with the server based on the mobile communication or wireless communication function, for example, the position information of the accessory device is acquired from the server, the broadcast information of the accessory device is reported to the server, and the like. A short-range communication connection may also be established with the accessory device based on a short-range communication function (e.g., bluetooth) included with the wireless communication function of the electronic device, data sent to the accessory device based on the short-range communication connection, data received from the accessory device based on the short-range communication connection, and so forth. In the case where the electronic device is an accessory device such as the first accessory device or the second accessory device corresponding to the foregoing embodiment, a short-range communication connection may be established with the electronic device (such as the first electronic device) based on a short-range communication function (such as bluetooth) included in the wireless communication function, data may be transmitted to the electronic device based on the short-range communication connection, data may be received from the electronic device based on the short-range communication connection, and the like. The message may be broadcast based on a short-range communication function (e.g., bluetooth) included with the wireless communication function.
The antennas 1 and 2 are used for transmitting and receiving electromagnetic wave signals. Each antenna in the electronic device may be used to cover a single or multiple communication bands. Different antennas may also be multiplexed to improve the utilization of the antennas. For example, the antenna 1 may be multiplexed into a diversity antenna of a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
The mobile communication module 150 may provide a solution for wireless communication including 2G/3G/4G/5G, etc. applied on an electronic device. The mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (low noise amplifier, LNA), etc. The mobile communication module 150 may receive electromagnetic waves from the antenna 1, perform processes such as filtering, amplifying, and the like on the received electromagnetic waves, and transmit the processed electromagnetic waves to the modem processor for demodulation. The mobile communication module 150 can amplify the signal modulated by the modem processor, and convert the signal into electromagnetic waves through the antenna 1 to radiate. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be disposed in the processor 110. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be provided in the same device as at least some of the modules of the processor 110.
The wireless communication module 160 may provide solutions for wireless communication including wireless local area network (wireless local area networks, WLAN) (e.g., wiFi network), bluetooth (BT), BLE broadcast, global navigation satellite system (global navigation SATELLITE SYSTEM, GNSS), frequency modulation (frequency modulation, FM), near field communication technology (NEAR FIELD communication, NFC), infrared technology (IR), zigBee, etc., applied on an electronic device. The wireless communication module 160 may be one or more devices that integrate at least one communication processing module. The wireless communication module 160 receives electromagnetic waves via the antenna 2, modulates the electromagnetic wave signals, filters the electromagnetic wave signals, and transmits the processed signals to the processor 110. The wireless communication module 160 may also receive a signal to be transmitted from the processor 110, frequency modulate it, amplify it, and convert it to electromagnetic waves for radiation via the antenna 2.
The electronic device implements display functions via a GPU, a display screen 194, an application processor, and the like. The GPU is a microprocessor for image processing, and is connected to the display 194 and the application processor. The GPU is used to perform mathematical and geometric calculations for graphics rendering. Processor 110 may include one or more GPUs that execute program instructions to generate or change display information.
The display screen 194 is used to display images, videos, and the like. The display 194 includes a display panel. The display panel may employ a Liquid Crystal Display (LCD) CRYSTAL DISPLAY, an Organic LIGHT EMITTING Diode (OLED), an Active Matrix Organic Light Emitting Diode (AMOLED) or an active matrix organic light emitting diode (active matrix organic LIGHT EMITTING diode), a Flex LIGHT EMITTING Diode (FLED), miniled, microLed, microoLed, a quantum dot LIGHT EMITTING diode (QLED), or the like. In some embodiments, the electronic device may include 1 or N display screens 194, N being a positive integer greater than 1. In the embodiment of the present application, in the case where the electronic device is a device corresponding to the first electronic device or the second electronic device in the previous embodiment, the display screen 194 may be used to display the user interfaces shown in fig. 2A to 2D and the user interfaces shown in fig. 4A to 4B.
The touch sensor 180K, also referred to as a "touch panel". The touch sensor 180K may be disposed on the display screen 194, and the touch sensor 180K and the display screen 194 form a touch screen, which is also called a "touch screen". The touch sensor 180K is for detecting a touch operation acting thereon or thereabout. The touch sensor 180K may communicate the detected touch operation to the application processor to determine the touch event type. Visual output related to touch operations may be provided through the display 194. In other embodiments, the touch sensor 180K may also be disposed on the surface of the electronic device at a different location than the display 194. In the embodiment of the present application, in the case where the electronic device is a device corresponding to the first electronic device or the second electronic device in the foregoing embodiment, the touch sensor 180K may be used to detect an opening operation of the user for the short-range communication function, a selection operation of the user for the device identification information displayed on the user interface, and so on.
It is to be understood that the configuration illustrated in this embodiment does not constitute a specific limitation on the electronic apparatus. In other embodiments, the electronic device may include more or fewer components than shown, or certain components may be combined, or certain components may be split, or different arrangements of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions in accordance with the present application are produced in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital subscriber line), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid state disk Solid STATE DISK), etc.
It should be noted that, for simplicity of description, the foregoing method embodiments are all expressed as a series of action combinations, but it should be understood by those skilled in the art that the present application is not limited by the order of action described, as some steps may be performed in other order or simultaneously according to the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily required for the present application.
The steps in the method of the embodiment of the application can be sequentially adjusted, combined and deleted according to actual needs.
The modules in the device of the embodiment of the application can be combined, divided and deleted according to actual needs.
Those of ordinary skill in the art will appreciate that all or a portion of the steps of the various methods of the above embodiments may be implemented by a program that instructs associated hardware, and the program may be stored in a computer readable storage medium, which may include a flash disk, a ROM, a RAM, a magnetic disk, an optical disk, or the like.
The foregoing disclosure is merely a preferred embodiment of the present application, but is not intended to limit the scope of the claims.
Claims (13)
1. A data processing method, wherein the method is applied to an electronic device, the method comprising:
responding to an opening operation for a short-distance communication application, and displaying an application interface of the short-distance communication application, wherein the application interface of the short-distance communication application comprises first identification information of first accessory equipment;
Establishing a short-range communication connection with the first accessory device in response to a selection operation for the first identification information;
Receiving device authentication data from the first accessory device based on the short-range communication connection, the device authentication data being for indicating that the first accessory device is authorized to join a network of lookup devices;
authenticating the first accessory device based on the device authentication data;
Generating key data in response to the first accessory device authentication passing;
the key data is used for generating a first broadcast message by the first accessory equipment under the condition that the first accessory equipment is disconnected with the electronic equipment, and the first broadcast message is used for reporting the position information of the first accessory equipment.
2. The method of claim 1, wherein the generating key data in response to the first accessory device authenticating, comprises:
Responding to the authentication of the first accessory equipment, and outputting prompt information on a display interface, wherein the prompt information is used for prompting whether to confirm whether to join the first accessory equipment into the network of the searching equipment;
And generating key data in response to detecting a confirmation instruction input for the prompt information.
3. The method of claim 1 or 2, wherein the generating key data comprises:
generating a basic key;
Generating key data based on the basic key, wherein the key data comprises M derivative keys, and M is a positive integer;
The base key is further used for binding with second identification information of the first accessory equipment, the first broadcast message is generated based on the position information of the first accessory equipment and a derivative key selected from the key data, and the first broadcast message is used for indicating the derivative key associated with the first broadcast message and storing the position information and the second identification information of the first accessory equipment in an associated mode.
4. The method of claim 1 or 2, wherein the method further comprises:
Responding to an opening operation aiming at a searching equipment application, displaying an application interface of the searching equipment application, wherein the application interface of the searching equipment application comprises third identification information of the first accessory equipment;
Acquiring location information of the first accessory device from a server in response to a selection operation for the third identification information; the position information of the first accessory equipment is carried in the first broadcast message, and the first broadcast message is reported to the server through the searching equipment network;
and displaying the position information of the first accessory equipment in an application interface of the search equipment application.
5. The method of claim 1, wherein the electronic device is in the network of lookup devices, the method further comprising:
Receiving a second broadcast message broadcast by a second accessory device, wherein the second broadcast message is generated based on key data and position information corresponding to the second accessory device when the second accessory device is disconnected from communication;
And the second broadcast message is used for indicating a key associated with the second broadcast message and storing the position information of the second accessory equipment and the identification information of the second accessory equipment in an associated mode.
6. The method of claim 1, wherein the method further comprises:
Establishing an encrypted channel with the first accessory device based on the short-range communication connection;
The transmitting the key data to the first accessory device includes:
and encrypting and transmitting the key data to the first accessory equipment through the encryption channel.
7. A data processing method, the method being applied to a first accessory device, the method comprising:
in response to detecting that the communication connection between the first accessory device and the electronic device is broken, determining location information where the first accessory device is currently located;
Generating a first broadcast message based on key data received from the electronic device based on a communication connection between the first accessory device and the electronic device;
and broadcasting the first broadcast message, wherein the first broadcast message is used for reporting the position information of the first accessory equipment.
8. The method of claim 7, wherein the method further comprises:
Transmitting device authentication data to the electronic device based on the communication connection between the first accessory device and the electronic device, wherein the device authentication data is used for authenticating the first accessory device by the electronic device;
Wherein the key data is received from the electronic device based on a communication connection between the first accessory device and the electronic device if the first accessory device is authenticated.
9. The method of claim 7 or 8, wherein the key data includes M derivative keys, M derivative keys being generated based on a base key, M being a positive integer, and wherein generating the first broadcast message based on the key data and the location information comprises:
Selecting a derivative key from M derivative keys included in the key data;
Generating a first broadcast message based on the selected derivative key and the location information;
The base key is used for binding with second identification information of the first accessory equipment, the first broadcast message is used for indicating a derivative key associated with the first broadcast message, and the position information and the second identification information of the first accessory equipment are stored in an associated mode.
10. The method of claim 7 or 8, wherein the method further comprises:
Receiving a writing instruction input by a first object;
And writing the equipment authentication data into the first accessory equipment based on the writing instruction, wherein the first object and the second object have an authorized relation for the first accessory equipment, the first object is a production object of the first accessory equipment, and the second object is a production object of the electronic equipment.
11. An electronic device comprising one or more processors, a memory and a communication interface for information interaction with other devices, the memory for storing program code, the processor for executing the program code to cause the electronic device to implement the method of any one of claims 1-6 or to implement the method of any one of claims 7-10.
12. A chip system comprising one or more processors, a memory and an interface circuit, the memory, the interface circuit and the one or more processors being interconnected by a circuit, the memory having stored therein program instructions that when executed by the processor cause the chip system to perform the method of any one of claims 1-6 or the method of any one of claims 7-10.
13. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program which, when executed by a processor, implements the method according to any one of claims 1-6 or implements the method according to any one of claims 7-10.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202411708370.0A CN120434629A (en) | 2024-11-26 | 2024-11-26 | Data processing method, electronic device, chip system and storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202411708370.0A CN120434629A (en) | 2024-11-26 | 2024-11-26 | Data processing method, electronic device, chip system and storage medium |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN120434629A true CN120434629A (en) | 2025-08-05 |
Family
ID=96562566
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202411708370.0A Pending CN120434629A (en) | 2024-11-26 | 2024-11-26 | Data processing method, electronic device, chip system and storage medium |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN120434629A (en) |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2022164048A1 (en) * | 2021-01-28 | 2022-08-04 | 삼성전자 주식회사 | Electronic device and method for transmitting location information on basis of privacy protection in electronic device |
| CN115499782A (en) * | 2022-09-09 | 2022-12-20 | 安克创新科技股份有限公司 | Anti-lost method of earphone, earphone and storage medium |
| CN115914985A (en) * | 2021-09-30 | 2023-04-04 | 花瓣云科技有限公司 | Device searching method, electronic device and system |
| CN116614806A (en) * | 2023-07-18 | 2023-08-18 | 荣耀终端有限公司 | Bluetooth pairing method and device, electronic equipment and storage medium |
| WO2024076209A1 (en) * | 2022-10-06 | 2024-04-11 | 삼성전자 주식회사 | Method and device for remote control of electronic device |
-
2024
- 2024-11-26 CN CN202411708370.0A patent/CN120434629A/en active Pending
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2022164048A1 (en) * | 2021-01-28 | 2022-08-04 | 삼성전자 주식회사 | Electronic device and method for transmitting location information on basis of privacy protection in electronic device |
| CN115914985A (en) * | 2021-09-30 | 2023-04-04 | 花瓣云科技有限公司 | Device searching method, electronic device and system |
| CN115499782A (en) * | 2022-09-09 | 2022-12-20 | 安克创新科技股份有限公司 | Anti-lost method of earphone, earphone and storage medium |
| WO2024076209A1 (en) * | 2022-10-06 | 2024-04-11 | 삼성전자 주식회사 | Method and device for remote control of electronic device |
| CN116614806A (en) * | 2023-07-18 | 2023-08-18 | 荣耀终端有限公司 | Bluetooth pairing method and device, electronic equipment and storage medium |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP4080834B1 (en) | Notification processing system and method, and electronic device | |
| CN111954283B (en) | A method and terminal for accessing wireless local area network | |
| EP2754263B1 (en) | Mobile terminal, image display device mounted on vehicle and data processing method using the same | |
| CN115039378B (en) | Audio output method and terminal equipment | |
| KR20160000330A (en) | Mobile terminal | |
| WO2021135593A1 (en) | Device sharing method and electronic device | |
| CN113676879B (en) | Information sharing method, electronic equipment and system | |
| US20220343747A1 (en) | Method and apparatus for providing location alarm service of electronic device | |
| CN114980048B (en) | NFC communication method, electronic device and system | |
| WO2023020393A1 (en) | Method for sharing remote controller between devices, and sending end device and receiving end device | |
| JP2024502320A (en) | Method and device for managing wireless connections of electronic devices | |
| KR102904528B1 (en) | Method and apparatus for providing location alarm service of electronic device | |
| EP4138462A1 (en) | Information sharing method, electronic devices and system | |
| CN115001667A (en) | Key agreement method, system, electronic device, and computer-readable storage medium | |
| CN112966297B (en) | Data protection method, system, medium and electronic device | |
| CN116996611A (en) | Notification message processing system, method and device | |
| KR102880885B1 (en) | Method and apparatus for managing wireless connection of electronic device | |
| EP4465667A1 (en) | Offline device control method and related apparatus | |
| CN120434629A (en) | Data processing method, electronic device, chip system and storage medium | |
| WO2023071733A1 (en) | Device control method and related device | |
| CN117332398A (en) | Methods, devices and systems for issuing device certificates | |
| RU2847011C1 (en) | Method and apparatus for managing wireless connection of electronic device | |
| CN116782186A (en) | Offline equipment control method and related devices | |
| US20250280277A1 (en) | Vehicle unlocking method and digital key | |
| CN118102295A (en) | A communication method and electronic device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |