CN114488961A - Equipment control method and device - Google Patents

Equipment control method and device Download PDF

Info

Publication number
CN114488961A
CN114488961A CN202011165723.9A CN202011165723A CN114488961A CN 114488961 A CN114488961 A CN 114488961A CN 202011165723 A CN202011165723 A CN 202011165723A CN 114488961 A CN114488961 A CN 114488961A
Authority
CN
China
Prior art keywords
control
target device
target
cloud
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011165723.9A
Other languages
Chinese (zh)
Inventor
李智杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Device Co Ltd
Original Assignee
Huawei Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Device Co Ltd filed Critical Huawei Device Co Ltd
Priority to CN202011165723.9A priority Critical patent/CN114488961A/en
Publication of CN114488961A publication Critical patent/CN114488961A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/418Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B15/00Systems controlled by a computer
    • G05B15/02Systems controlled by a computer electric
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/20Pc systems
    • G05B2219/26Pc applications
    • G05B2219/2642Domotique, domestic, home control, automation, smart house
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Manufacturing & Machinery (AREA)
  • Quality & Reliability (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • Selective Calling Equipment (AREA)

Abstract

A method and apparatus for controlling a device. The method comprises the following steps: the terminal equipment is connected with the first target equipment and controls the first target equipment based on a first control strategy; detecting a first operation, wherein the first operation is used for replacing the control right of the terminal device to the first target device with the control right of other target devices; in response to the first operation, the terminal device connects to a second target device, and the terminal device follows a first control policy of the first target device for the second target device. By the mode, when a user controls the household equipment through the terminal equipment such as the mobile phone, the control strategy of the old equipment can be used as the control strategy of the new equipment, the control strategy of the new equipment cannot be reset by the user, and the operation is convenient and fast.

Description

Equipment control method and device
Technical Field
The present application relates to the field of terminal technologies, and in particular, to a method and an apparatus for controlling a device.
Background
With the development of home intelligence, some original passive stationary home devices in a user's home are changed into devices with "intelligence", such as electric curtains, intelligent lighting systems, and the like. The intelligent household equipment provides a safe, comfortable and convenient living environment for the user. However, these smart home devices can only provide services suitable for users in the control of the users, and how to facilitate the users to control the smart home devices is a problem that needs to be considered.
Disclosure of Invention
The application aims to provide a device control method and terminal equipment.
In a first aspect, a method for controlling a device is provided, which may be performed by a terminal device, the method including: the terminal equipment is connected with the first target equipment and controls the first target equipment based on a first control strategy; detecting a first operation, wherein the first operation is used for replacing the control right of the terminal device to the first target device with the control right of other target devices; in response to the first operation, the terminal device connects to a second target device, and the terminal device follows a first control policy of the first target device for the second target device.
That is to say, a user can control one or more target devices through the terminal device, and the control right of the terminal device to the first target device can be replaced by the control right of the second target device, so that the terminal device continues to control the second target device by using the first control strategy to the first target device, and therefore, the control strategy to the second target device does not need to be reset, and the operation is convenient. For example, a user's mobile phone may control a sound box in a home, and after the sound box fails, the user may purchase a new sound box to replace an old sound box, and then the user's mobile phone may replace the control right for the old sound box with the control right for the new sound box, that is, the control strategy for the new sound box follows the control strategy for the old sound box, and there is no need to set the control strategy repeatedly.
In one possible design, the terminal device connects to a first target device and controls the first target device based on a first control policy, including: the terminal equipment establishes connection with the first target equipment through a cloud end; in response to a second operation, the terminal device sets a first control strategy for the first target device, and sends the first control strategy to the cloud, so that the first target device is controlled through the cloud based on the first control strategy. That is to say, the terminal device may control the first target device through the cloud based on the first control policy, and in this case, when the terminal device is unavailable under the conditions of shutdown, failure, and the like, the control over the target device may also be implemented.
In one possible design, the controlling, by the terminal device, along with the first control policy of the first target device for the second target device includes: the terminal device sends indication information to the cloud, wherein the indication information is used for indicating the cloud to replace the first control strategy with a control strategy for a second target device, so that the cloud controls the second target device according to the first control strategy. That is to say, the terminal device continues to control the new device through the control strategy of the old device through the cloud, and in this way, the user does not need to reset the control strategy of the new device on the terminal device side, so that the operation is convenient and fast.
In one possible design, the first control strategy includes a first control condition and a first control manner, and the first control manner is used for controlling the first target device or the second target device to perform control based on the first control manner when the first control condition is met. That is to say, the terminal device controls the target device (the first target device or the second target device) through the cloud, and specifically, when the cloud determines that the first control condition is satisfied, the terminal device controls the target device through the first control mode.
In one possible design, before the first operation is detected, the method further includes: responding to a third operation, the terminal device displays a control strategy display interface, the control strategy display interface comprises the first control strategy, and the first control strategy is displayed as a control strategy for the first target device; the terminal equipment displays a second interface, wherein the second interface comprises a plurality of control keys aiming at the first target equipment; the control keys comprise a first key, and the first key is used for controlling the terminal equipment to replace the control right of the first target equipment with the control right of other target equipment; a first operation is detected, comprising: detecting a click operation aiming at the first control; responding to the first operation, the terminal device connecting to a second target device, and the method comprises the following steps: responding to the first operation, the terminal equipment displays a third interface, and a device connection method in the third interface of the terminal equipment is connected with a second target device; responding to a fourth operation, the terminal device displays the control strategy display interface, and the first control strategy in the control strategy display interface is displayed as a control strategy for a second target device.
That is, the user can replace the control right of the new device and the old device through the first key on the terminal device side, and after the control right is replaced, the terminal device side updates the displayed control strategy of the old device to the control strategy of the new device. Therefore, the user can see that the target device targeted by the control strategy is replaced on the UI, and the user experience is high.
In a second aspect, a method for controlling a device is provided, where the method is performed by a terminal device, and the method includes: the terminal equipment is connected with the first target equipment and controls the first target equipment based on a first control strategy; in response to a first operation for disconnecting the connection relationship with the first target device, the terminal device stops controlling the first target device based on the first control policy and saves the first control policy; responding to a second operation, and connecting the terminal equipment to a second target equipment; and when the terminal equipment determines that the second characteristic of the second target equipment is the same as or similar to the first characteristic of the first target equipment, the terminal equipment continues to control the second target equipment by using the first control strategy.
That is to say, the terminal device may disconnect the connection relationship with the old device, and when the terminal device is connected to the new device, if the characteristics of the new device are the same as or similar to the characteristics of the old device, the new device may be controlled by using the control policy for the old device, that is, the user does not need to reset the control policy for the new device, and the operation is convenient.
In one possible design, the terminal device connects to a first target device and controls the first target device based on a first control policy, including: the terminal equipment establishes connection with the first target equipment through a cloud end; in response to a third operation, the terminal device sets a first control strategy for the first target device, and sends the first control strategy to the cloud, so that the first target device is controlled through the cloud based on the first control strategy. That is to say, the terminal device may control the first target device through the cloud based on the first control policy, and in this case, when the terminal device is unavailable under the conditions of shutdown, failure, and the like, the control over the target device may also be implemented.
In one possible design, in response to a first operation for disconnecting the connection relationship with the first target device, the terminal device stops controlling the first target device based on the first control policy, including the terminal device sending a first prompt message to the cloud, the first prompt message being used for prompting the cloud to stop controlling the first target device based on the first control policy; the first prompt message also prompts the cloud to store the first control strategy and first characteristics of the first target device, wherein the first characteristics are characteristic information which is sent to the cloud by the terminal device and is used for uniquely identifying the first target device. That is to say, the terminal device may prompt the cloud that the terminal device disconnects from the old device (i.e., the first target device), and may also prompt the cloud to store the control policy and the first feature of the old device.
In one possible design, when the terminal device determines that the second feature of the second target device is the same as or similar to the first feature of the first target device, then controlling the second target device along the first control policy for the first target device includes: the terminal equipment acquires a second characteristic of the second target equipment and sends the second characteristic to the cloud end; so that the cloud determines whether the first characteristic and the second characteristic are the same or similar; the terminal equipment receives second prompt information sent by the cloud end, wherein the second prompt information is used for prompting a user to control the second target equipment by using a first control strategy of the first target equipment; in response to a confirmation operation of a user, the terminal device sends a confirmation instruction to the cloud end, so that the cloud end determines to continue to control the second target device by using the first control strategy based on the confirmation instruction. That is to say, after acquiring the second feature of the new device (i.e., the second target device), the terminal device provides the second feature to the cloud, and if the cloud determines that the first feature and the second feature are the same or similar, the cloud may send second prompt information to the terminal device, so that the user may confirm whether to reuse the control policy of the old device, and if so, the terminal device sends a confirmation instruction to the cloud.
In one possible design, the first feature includes a first name and/or a first location identification of the first target device set by a user; the second characteristic comprises a second command and a second position identification of the second target device set by a user; the first feature is the same as or similar to the second feature and includes: the first name is the same as or similar to the second name and/or the first location identity is the same as or similar to the second location identity.
It should be noted that the naming and the location identification are merely examples of features of the target device, and are not limited, and other features capable of uniquely marking the target device are also possible, and the embodiments of the present application are not limited.
In one possible design, the first control strategy includes a first control condition and a first control manner, and the first control manner is used for controlling the first target device or the second target device to perform control based on the first control manner when the first control condition is met. That is to say, the terminal device controls the target device (the first target device or the second target device) through the cloud, and specifically, when the cloud determines that the first control condition is satisfied, the terminal device controls the target device through the first control mode.
In a third aspect, a method for controlling a device is provided, where the method may be performed by a cloud, and the method includes: the cloud end establishes connection between the terminal equipment and the first target equipment; the cloud end receives a first control strategy aiming at the first target equipment and sent by the terminal equipment, and controls the first target equipment based on the first control strategy; the cloud end establishes connection between the terminal equipment and second target equipment; the cloud end receives prompt information sent by the terminal equipment, wherein the prompt information is used for prompting the cloud end to replace the first control strategy with a control strategy aiming at second target equipment; the cloud continues to control the second target device with the first control policy.
That is to say, the cloud side stores the first control strategy of the first target device, and after the cloud receives the prompt message from the terminal device, the cloud replaces the first control strategy with the control strategy for the second target device, so that the user does not need to reset the control strategy for the second target device, and the operation is convenient.
In one possible design, the first control policy includes a first control condition and a first control manner, and the first control manner is used for the cloud to determine that the first target device or the second target device is controlled based on the first control manner when the first control condition is met. That is to say, when the cloud determines that the first control condition is satisfied, the target device is controlled through the first control mode, the user can set the first control condition and the first control mode according to the self requirement, and the user experience is high.
In a fourth aspect, a method for controlling a device is provided, where the method may be performed by a cloud, and the method includes: the cloud end establishes connection between the terminal equipment and the first target equipment; the cloud end receives a first control strategy aiming at the first target equipment and sent by the terminal equipment, and controls the first target equipment based on the first control strategy; the cloud end receives first prompt information sent by the cloud end, and the first prompt information is used for prompting the cloud end to stop controlling the first target equipment based on the first control strategy; the cloud stores the first control strategy and first characteristics of the first target equipment, wherein the first characteristics are characteristic information which is sent to the cloud by the terminal equipment and is used for uniquely identifying the first target equipment; the cloud end establishes connection between the terminal device and a second target device, and acquires a second characteristic of the second target device from the terminal device; and when the cloud judges whether the first characteristic and the second characteristic are the same or similar, the cloud continues to use the first control strategy of the first target device to control the second target device.
That is to say, the cloud stops controlling the first target device under the effect of the first prompt message of the terminal device, and when the cloud establishes the connection between the terminal device and the second target device, if the second characteristic of the second target device is the same as or similar to the first characteristic of the first target device, the cloud continues to control the second target device by using the first control strategy of the first target device, that is, the user does not need to set a control strategy for the second target device, and the operation is convenient.
In one possible design, before the controlling the second target device using the first control policy of the first target device, the method further includes: the cloud end sends second prompt information to the terminal equipment, wherein the second prompt information is used for prompting a user whether to continue to use the first control strategy to control the second target equipment; after receiving a confirmation operation from the terminal device, the cloud end determines to follow the first control strategy to control the second target device based on the confirmation instruction.
That is to say, the cloud stops controlling the first target device under the effect of the first prompt message of the terminal device, when the cloud establishes the connection between the terminal device and the second target device, if the second characteristic of the second target device is the same as or similar to the first characteristic of the first target device, the cloud can prompt the user whether to reuse the first control strategy of the first target device through the terminal device, and under the condition that the user agrees, the cloud continues to control the second target device with the first control strategy of the first target device, so that the user experience is better.
In one possible design, the first feature includes a first name and/or a first location identification of the first target device set by a user; the second characteristic comprises a second command and a second position identification of the second target device set by a user; the first feature is the same as or similar to the second feature and includes: the first name is the same as or similar to the second name and/or the first location identity is the same as or similar to the second location identity. It should be noted that the naming and the location identification are merely examples of features of the target device, and are not limited, and other features capable of uniquely marking the target device are also possible, and the embodiments of the present application are not limited.
In one possible design, the first control strategy includes a first control condition and a first control manner, and the first control manner is used for controlling the first target device or the second target device to perform control based on the first control manner when the first control condition is met. That is to say, when the cloud determines that the first control condition is satisfied, the target device is controlled through the first control mode, the user can set the first control condition and the first control mode according to the self requirement, and the user experience is high.
In a fifth aspect, there is provided a control apparatus for a device, comprising: one or more processors; one or more memories; wherein the one or more memories store one or more computer programs comprising instructions which, when executed by the one or more processors, cause the terminal device to perform the method steps as provided in the first to fourth aspects above. The device may be a chip, a chip circuit within the device, the device itself, etc. For example, when the control means of the device is a terminal device, the terminal device may perform the method steps as provided in the first or second aspect above. For another example, when the control device of the device is a cloud, the cloud may perform the method steps provided in the third aspect or the fourth aspect.
In a sixth aspect, embodiments of the present application further provide an electronic device, where the electronic device includes a module/unit that performs the method of the first aspect or any one of the possible designs of the first aspect; alternatively, the electronic device comprises a module/unit for performing the method of the second aspect or any one of the possible designs of the second aspect; alternatively, the electronic device comprises means for performing the method of the third aspect or any one of the possible designs of the third aspect; alternatively, the electronic device comprises means/unit for performing the method of any one of the above-mentioned fourth aspect or possible designs of the fourth aspect; these modules/units may be implemented by hardware, or by hardware executing corresponding software.
In a seventh aspect, there is also provided a system comprising: a terminal device; a first target device and a second target device; and a cloud; the terminal device is connected with the first target device and/or the second target device through the cloud end, so that the first target device and/or the second target device are controlled through the cloud end; the terminal device is configured to perform the method steps provided in the first aspect or the second aspect, and the cloud is configured to implement the method provided in the third aspect or the fourth aspect.
In an eighth aspect, embodiments of the present application further provide a chip, the chip being coupled with a memory in an electronic device, for invoking a computer program stored in the memory and executing the solution according to the first aspect of the embodiments of the present application and any of the possible designs of the first aspect thereof, or, for calling a computer program stored in the memory and executing the solution according to the second aspect of the embodiments of the present application and any possible design of the second aspect, or a computer program stored in a memory and adapted to perform any of the solutions of the third aspect of the embodiments of the present application and any of the possible designs of the third aspect of the embodiments of the present application, or, the term "couple" in this application refers to two components directly or indirectly coupled to each other, for invoking a computer program stored in a memory and executing any of the aspects of the present application and any possible design thereof.
In a ninth aspect, there is also provided a computer readable storage medium comprising a computer program which, when run on an electronic device, causes the electronic device to perform the method as provided in the first aspect above; alternatively, the computer program may be adapted to cause an electronic device to perform the method as provided in the second aspect when the computer program runs on the electronic device, or to cause the electronic device to perform the method as provided in the third aspect when the computer program runs on the electronic device, or to cause the electronic device to perform the method as provided in the fourth aspect when the computer program runs on the electronic device.
In a tenth aspect, there is also provided a program product comprising instructions which, when run on a computer, cause the computer to perform the method as provided in the first aspect above; or, when the instructions are run on a computer, cause the computer to perform the method as provided in the second aspect above; or, when the instructions are run on a computer, cause the computer to perform the method as provided in the third aspect above; or, when the instructions are run on a computer, cause the computer to perform the method as provided in the fourth aspect above; .
In an eleventh aspect, there is also provided a graphical user interface on an electronic device, the electronic device having a display screen, one or more memories, and one or more processors to execute one or more computer programs stored in the one or more memories, the graphical user interface comprising a graphical user interface displayed when the electronic device performs a method as provided in the first aspect above or a method as provided in the second aspect above.
For the beneficial effects of the fifth aspect to the eleventh aspect, please refer to the beneficial effects of the first aspect to the fourth aspect, which are not repeated.
Drawings
Fig. 1 is a schematic diagram of an exemplary application scenario provided in an embodiment of the present application;
fig. 2A is a schematic flowchart of a method for controlling a device according to an embodiment of the present disclosure;
FIGS. 2B-2E are schematic diagrams of a GUI of a Wohan Smart Living application provided in an embodiment of the present application;
fig. 3A is a schematic view of another flow chart of a control method of an apparatus according to an embodiment of the present application;
fig. 3B to 4 are schematic diagrams of a GUI of smart life application according to an embodiment of the present application;
fig. 5 is a schematic diagram of a hardware structure of a terminal device according to an embodiment of the present application;
fig. 6 is a schematic diagram of a software structure of a terminal device according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a cloud according to an embodiment of the present application.
Detailed Description
The device control method provided by the embodiment of the application is suitable for controlling one or more scenes of the second terminal device through the first terminal device. Thus, the first terminal device may be referred to as a controlling end and the one or more second terminal devices may be referred to as controlled ends. For example, an Application (APP) may be installed in the control end, and the controlled end may be controlled by the APP.
An exemplary application scenario is a smart home scenario. For example, as shown in fig. 1, the first terminal device may be a mobile phone. The second terminal device can be a television, an air conditioner, a humidifier, a temperature detector, a refrigerator, a socket, a desk lamp, a curtain, a pendant lamp, a sound box and other smart home devices. In this scenario, an application of the smart home, for example, an intelligent life application or another application for controlling home devices, may be installed in the mobile phone, and the smart home devices may be controlled by the application, for example, turned on or turned off, and adjusted in temperature.
Fig. 1 illustrates an example of a smart home scenario, and it is understood that the method is applicable to other application scenarios besides the smart home scenario, for example, a scenario in which a mobile phone controls an in-vehicle system through an application (e.g., an in-vehicle application). The following description will be given by taking an intelligent home scene as an example.
In the following, taking the control end as a mobile phone as an example, an implementation principle that the mobile phone controls a device (e.g., a home device) through an application (e.g., an intelligent life application) is introduced.
Specifically, please refer to fig. 2A, which is a schematic flow chart of a mobile phone controlling a device through an application according to an embodiment of the present application. As shown in fig. 2A, the flow of the mobile phone controlling the device through the application includes S1 to S9.
And S1, the first target device logs in the router account.
For example, the first target device may be a home device in a home, such as a television, a curtain, a refrigerator, a socket, a desk lamp, a curtain, a pendant, a sound box, and the like.
The first target device may log into a home router wireless account. Specifically, S1 may be more detailed, such as including: displaying an account and password input interface on the first target device, and clicking to log in after a user inputs the account and the password; the first target device sends a login request to the cloud, wherein the login request comprises an account and a password. The cloud may verify the account and password in the login request (e.g., compare the account and password with the account and password pre-stored in the cloud). And after the verification is passed, the cloud end determines that the first target device is successfully logged in. The cloud end can also record that the first target device is in an online state.
The cloud may be various types of servers, and the specific type is not limited in this application. Optionally, the cloud may be an application server corresponding to an application in the mobile phone. It is understood that a server is specifically responsible for processing or storing the data of the application. For example, an application server corresponding to a smart life application.
S2, the cell phone receives a first operation for opening an application.
Taking the application as an example of a smart life application, please refer to fig. 2b (a), for example, a home screen (home screen) is displayed on the mobile phone, and the home screen includes a plurality of application icons, including an icon of the smart life application. The first operation may be a click operation, such as a click operation, for an icon of the smart life application.
And S3, opening the application by the mobile phone.
Here, the opening of the application by the mobile phone can be understood as an interface of the foreground display application of the mobile phone. For example, referring to fig. 2b (b), the mobile phone displays an interface of the smart life application (for the purpose of aspect description, the interface may be referred to as a home page of the smart life application).
And S4, the mobile phone controls the application to bind the router account.
For example, referring to fig. 2b (b), the homepage includes a prompt message for indicating that a router is bound, and when the user clicks the prompt message, an interface as shown in fig. 2b (c) may be displayed, where the interface includes an account number input box and a password input box of the router, and the user may input an account number and a password in the corresponding input boxes. And when the mobile phone detects that the user clicks the operation of the binding control, the mobile phone application logs in the account. The process of logging in the router account may refer to the process of logging in the router account by the first target device in the foregoing, which is not repeated herein.
Through the above process, the first target device and the application log in to the same router account. That is, the cloud may communicate with the application and the first target device separately.
In order to distinguish different applications in the cloud, the applications can log in a system account, for example, the user is a system account. It should be noted that the application login system account is different from the binding router account, and the application login system account is for facilitating the identification of the application by other devices, and is equivalent to the identity information of the application. The application binding router account is for binding with a target device accessing the router account.
And S5, the mobile phone application binds the first target device.
After the application binds the router account, the application may establish a binding relationship with a first target device accessing the router account. In short, the application binding the first target device may be understood as that the application and the first target device establish a connection relationship with each other. For example, after the application and the first target device both log in to the router account, the cloud may serve as a communication bridge between the first target device and the mobile phone application.
As an implementable manner, the cloud may actively push the device currently logged in to the router account to the mobile phone. For example, in the foregoing step, the first target device and the application both log in the router account, and the cloud may push the identifier of the first target device to the mobile phone. The identification of the first target device may for example be the device model of the device. For example, referring to fig. 2b (d), after the router account is bound by the application, identifiers of 3 devices currently accessed by the router account, such as an identifier of a television, an identifier of a sound box, and an identifier of a socket, are displayed. In fig. 2b (d), the identifier of the device is a combination of an icon and a text, and it is understood that the identifier of the device may have other manners, which is not limited in the present application.
Besides the cloud actively pushing the device currently accessed to the router account number to the mobile phone, the mobile phone application can also bind the first target device in other modes. For example, a two-dimensional code on a first target device is scanned; or, manually add the device identification of the first target device, etc. Taking scanning the two-dimensional code of the first target device as an example, the mobile phone application may scan the two-dimensional code to obtain the device information of the first target device. The device information may be, for example, the model number, product code, manufacturer, etc. of the first target device.
It is unclear whether the first target device is logged into the router account application. Therefore, after the application obtains the device information of the first target device, the device information of the first target device may be sent to the cloud, and the cloud determines whether the first target device logs in to the router account. If the cloud determines that the first target device is logged in to the router account, the cloud sends indication information 1 to the mobile phone to indicate that the first target device is logged in, and then the mobile phone is bound with the first target device, and then an identifier of the first target device, such as an icon + characters, is displayed in an interface shown in fig. 2b (d). If the cloud determines that the first target device does not log in the router account, the cloud sends indication information 2 to the mobile phone to indicate that the second target device does not log in, and then the mobile phone cannot be bound with the first target device temporarily. At this time, a prompt may be output on the mobile phone to prompt the user that the first target device has not logged in to the router account. The user can control the first target device to log in the router account, and then the first target device is scanned again through the mobile phone application and is bound with the first target device. After the mobile phone application is bound to the first target device, the identifier of the first target device is displayed on the mobile phone, for example, the identifier of the first target device is displayed in fig. 2b (d).
And S6, setting a control strategy for the first target device by the mobile phone. The control strategy may include control conditions and control modes.
The control condition is that the first target equipment is controlled to execute corresponding behaviors in the control mode when the control condition is met. The control condition may be, for example, 10 pm, 8 am, and the like, and the control manner includes: control the first target device to turn on, turn off, adjust operating parameters, and the like. The operating parameters are different for different devices. For example, the operating parameters of the air conditioner include temperature, humidity, wind speed, etc., and the operating parameters of the desk lamp include brightness.
Continuing with the smart life application of fig. 2B as an example, a process of setting a control policy for the first target device on the mobile phone is described.
As shown in fig. 2b (d), when the mobile phone detects that the user clicks the "smart" control, an interface as shown in fig. 2c (a) is displayed, where the interface includes a condition setting input box 201, and the user may input a condition, such as time or other conditions, such as 10 pm; also included in the interface is a control mode input box 202 in which a user can set a control mode. For example, when the mobile phone detects an operation of clicking an add task, the mobile phone displays an interface as shown in fig. 2c (b), where the interface includes an identifier of a currently-accessed device, and the user may select to set an identifier of a certain device, for example, the user clicks a socket icon, and then the mobile phone displays an interface as shown in fig. 2c (c), where the interface includes settings for a control mode of the socket, for example, on and off. Assuming that the user selects "open" and clicks the "ok" button, the control conditions and control modes for the outlet can be set to completion. Specifically, the control condition of the socket is 10 pm, the control mode is that the socket is opened, when the mobile phone detects the operation of the "determine" control in fig. 2c (c), the interface shown in fig. 2c (d) is displayed, and if: at 10 pm, the following steps are carried out: and the socket is opened so that a user can conveniently check the control conditions and the control mode set for the socket. Of course, if the user wants to continue to add other controls to the socket, the user may continue to click the add task button in fig. 2c (d).
It should be noted that fig. 2C only shows an exemplary specific implementation manner for setting the control condition and the control manner of the first target device (such as an outlet), and the mobile phone may also set the control condition and the control manner of the first target device in other manners. For example, a voice button is included in a home page of the smart life application, and when a user presses the voice button for a long time, a voice command for setting a control condition and a control manner of a target device (e.g., a socket) is input, and the mobile phone sets the control condition and the control manner of the target device based on the voice command.
And S7, the mobile phone sends the control strategy of the first target device to the cloud.
S8, the cloud stores the policy of the first target device.
For example, the cloud stores a mapping relationship between the identifier of the first target device and the control policy of the first target device. As an example, please refer to table 1 below, which is an example of the mapping relationship.
TABLE 1
Target device Controlling conditions Control mode
Socket with improved structure 10 o' clock in the evening Starting socket
After the cloud establishes the mapping relationship between the identifier of the first target device and the control policy, the cloud may control the first target device based on the mapping relationship. For example, as follows in step S9.
And S9, when the cloud end determines that the control condition is met, controlling the first target device in a corresponding control mode.
For example, when the cloud determines that the current time is 10 pm, the cloud may send an instruction to the outlet to instruct the outlet to start. The socket is started after receiving the command sent by the cloud.
In the above embodiment, after the mobile phone application sets the control policy for the first target device, the control measurement of the first target device is sent to the cloud for storage, and the cloud performs remote control on the first target device based on the control policy. In this way, the requirement on the mobile phone is low, for example, after the mobile phone application sets a control strategy for the socket, even if the mobile phone is powered off, the first target device can be controlled through the cloud. Moreover, if the cloud controls the first target device, the mobile phone does not need to store the control strategy of the first target device, and the memory of the mobile phone can be saved.
Of course, besides controlling the first target device through the cloud end, the mobile phone may also directly control the first target device. Continuing with the above socket example, when the mobile phone determines that the current time is 10 pm, the mobile phone sends an instruction to the socket to instruct the socket to be started to control the socket to start. Or, the mobile phone may only determine whether the control condition is satisfied, and when the control condition is satisfied, send an instruction to the cloud end, so that the cloud end controls the first target device in a corresponding control mode.
The above embodiments describe a process in which a mobile phone application binds a target device and then sets a control policy of the target device.
Optionally, the mobile phone application may also release the binding relationship with the target device. For example, when the target device fails and cannot be used, the mobile phone may release the binding relationship with the target device. For example, taking fig. 2b (d) as an example, the mobile phone detects the operation of the socket icon, and displays the interface shown in fig. 2d (a), where the interface includes the relevant information of the socket and also includes the "more" button. When the mobile phone detects the operation of the "more" key, the mobile phone displays an interface as shown in fig. 2d (b), where the interface includes a control for deleting the device. And when the mobile phone detects that the user clicks the control of the deleting device, the binding relation with the socket is released. Specifically, the process of unbinding the binding relationship with the first target device (e.g., the old socket) may include: the mobile phone sends a command of deleting the first target device to the cloud, and after the cloud receives the command, the control conditions and the control modes of the first target device stored by the cloud are deleted. For example, the cloud deletes table 1 above. Therefore, the cloud no longer controls the first target device to execute the corresponding control mode.
Generally, when the target device fails and cannot be used, the user can use a new device. Continuing with the example where the first target device is a socket, a user may purchase a new socket to replace an old socket when a socket failure in the home is not available. However, the mobile phone application does not bind to the new socket, and the new socket needs to be bound to realize the control of the new socket. The manner of binding the new socket by the mobile phone application can be referred to the introduction of S5 in the foregoing, and is not repeated here. After the new socket is bound in the mobile phone application, the user may also set a control policy for the new socket, which is specifically described in S6, and will not be repeated here.
That is, when the binding relationship with the old device is released and the binding relationship with the new device is established, the user is required to reset the control policy for the new device. For example, after binding a new outlet, the user is required to reset the control conditions and control strategy for the new outlet in the manner shown in fig. 2C.
Consider one possible scenario: after the user purchases a new device, the control strategy set for the new device may be the same as the control strategy set for the old device, for example, the control condition set for the new socket by the user is still 10 pm, and the control mode is still to start the socket. In this case, it may not be convenient for the user to rebind the new device by unbinding the old device and set the control policy of the new device as described above. Therefore, the mobile phone can bind the new device by directly replacing the old device with the new device, and in brief, the control right of the mobile phone to the old device is replaced with the control right of the new device, so the control strategy of the old device is used for the new device, and the control strategy of the new device does not need to be reset.
The following describes the implementation principle of a new device directly replacing an old device to bind the new device.
Continuing with fig. 2A as an example, in the above steps S1 to S9, the mobile phone application has bound the first target device, and at this time, the mobile phone may replace the first target device with the second target device, that is, the control policy for the first target device is used along with the control policy for the second target device, and the control policy for the second target device does not need to be reset. The specific flow can be seen in steps S10 to S15 in fig. 2A.
And S10, the second target device logs in the router account.
S11, the handset receives a second operation to replace the first target device with a second target device.
For example, please refer to fig. 2d (a), when the mobile phone detects the operation of clicking the "more" button, the mobile phone displays an interface as shown in fig. 2d (b), where the interface includes a "device replacement" button. The second operation may be a click operation for a "device replacement" key.
And S12, the mobile phone is bound with the second target device.
The principle of binding the second target device by the mobile phone is the same as the principle of binding the first target device, and the description is omitted. For example, taking fig. 2d (b) as an example, when the mobile phone detects an operation of clicking a "device replacement" button, an interface as shown in fig. 2d (c) is displayed, and the mobile phone may scan a second target device in the interface to bind the second target device. For example, when the socket 2 is scanned, if the mobile phone detects that the user clicks the "connect" button, the mobile phone application is bound to the socket 2.
And S13, the mobile phone sends the indication information that the first target device is replaced by the second target device to the cloud.
And S14, replacing the first target device in the stored mapping relation with a second target device by the cloud.
In the above S7, the cloud end stores the mapping relationship between the identifier of the first target device and the control policy, for example, table 1, and the cloud end may replace the identifier of the first target device in the mapping relationship with the identifier of the second target device, for example, the above table 1 is updated as the following table 2:
TABLE 2
Target device Controlling conditions Control mode
Socket 2 10 o' clock in the evening Open socket 2
That is, the cloud replaces the first target device with the second target device.
On the mobile phone, taking fig. 2d (b) as an example, when the mobile phone detects an operation for the "device replacement" control, the mobile phone is bound to the socket 2 through the interface shown in fig. 2d (c). Thereafter, if the user views the control strategy for the outlet 2 on the handset, the handset displays the control strategy for the outlet 2, which is the control strategy for the socket 1 that is being carried over. For example, taking fig. 2b (d) as an example, when the mobile phone detects an operation for the "smart" control, the mobile phone displays an interface as shown in fig. 2E, where if: at 10 pm, the following steps are carried out: the outlet 2 is switched on, so that after the outlet 2 is replaced with the outlet 1, the user does not need to manually set the control strategy of the outlet 2.
After the cloud replaces the first target device with the second target device, when it is determined that the control condition is met, the cloud may control the second target device based on the corresponding control mode. Such as performing steps S15-S16.
And S15, when the cloud end determines that the control condition is met, controlling the second target device in a corresponding control mode.
For the cloud end to control the second target device, refer to the foregoing description of the control process of the first target device, and the description is not repeated here.
To summarize, in the above embodiment, the handset application may replace the old device with the new device, rather than delete the old deletion and re-bind the new device. In this way, the user only needs to click the "device replacement" control shown in fig. 2d (b) to bind the second target device, and does not need to reset the control policy for the second target device, so that the operation is convenient and fast, and the user experience is good.
Another embodiment is described below in which the handset can be unbound from the old device, but the cloud can retain the old device's control policy for a period of time. During this time, if the mobile phone is bound to the new device, the cloud end may replace the old device with the new device, that is, the newly applied control policy may defer the control policy of the old device. For example, please refer to fig. 3A, which is a schematic diagram of another flow of an apparatus control method provided in the embodiment of the present application, where the flow includes:
s301, the first target device logs in a router account.
S302, the mobile phone receives a first operation for opening the application.
And S393, the mobile phone opens the application. Such as smart life applications.
S304, the mobile phone controls the application to bind the router account.
S305, the mobile phone controls the application to bind the first target device.
See S1-S4 in fig. 2A for S301-S305, which have the same principle and are not repeated.
S306, the mobile phone sets the first characteristic of the first target device and sends the first characteristic of the first target device to a cloud.
The first characteristic may for example be a first name of the first target device, which first name may be set by the user. For example, please refer to the interface shown in fig. 2d (b), which includes an input box for naming the first target device, and the user inputs the first name of the first target device in the input box. For example, a fish bowl socket.
The first characteristic may also be a first location identification of the first target device, such as a living room, a bedroom, a bathroom, etc. The first location identity may also be a user setting. Continuing with fig. 2d (b), the user may enter a first location identification of the first target device in the location input box. Such as a living room.
Of course, the first feature may be other contents besides the name and the location identifier, as long as it is convenient for the cloud to uniquely determine the target device, which is not limited in the embodiment of the present application. Or, the first feature may be a combination of a location identifier and a name, so as to improve accuracy of determining the target device by the cloud.
S307, the mobile phone sets a control strategy for the first target device.
S308, the mobile phone sends the control strategy of the first target device to the cloud.
S309, the cloud stores a mapping relation, wherein the mapping relation is a mapping relation between the first characteristic of the first target device and the control strategy of the first target device. For example, the mapping relationship may be as shown in table 3:
TABLE 3
Control mode of first characteristic control condition of first target equipment
Socket fish bowl socket, living room 10 o' clock open evening
And S310, when the cloud end determines that the control condition is met, controlling the first target device in a corresponding control mode.
S311, the mobile phone receives a third operation for deleting the first target device.
For example, the third operation may be an operation of clicking a control of "delete device" in fig. 2d (b).
S312, the mobile phone sends, to the cloud, indication information for indicating to delete the first target device.
Optionally, the indication information may include a first characteristic of the first target device.
S313, the cloud maintains the mapping relationship corresponding to the first target device within the preset duration.
Optionally, the cloud may record a first time for receiving the indication information, start a timer to time from the first time, and not delete the mapping relationship of the first target device until the timer reaches a preset time, for example, as in table 3 above. For example, the preset time period may be 1 day, 3 days, 5 days, or 1 week.
On the basis, if the first target device is deleted in the application, but the cloud does not delete the control policy of the first target device, nor does the cloud delete the first feature of the first target device.
And S314, the second target device logs in the router account.
And S315, the mobile phone binds the second target device.
And S316, the mobile phone sets the second characteristic of the second target device and sends the second characteristic of the second target device to the cloud.
The second characteristic may be a second name of the second target device, and/or a second location identification. For example, continuing with the socket example, after purchasing a new socket, the user still names the new socket as "aquarium socket" and sets its location label as "living room", and then the second feature is "aquarium socket" and/or "living room".
S317, the cloud determines that a time difference between a first time of deleting the first target device and a second time of receiving the second feature of the second target device does not exceed the preset duration, and the second feature is the same as or similar to the first feature.
It is assumed that the first feature includes a first name and a first location identity and the second feature includes a second name and a second location identity. The first characteristic and the second characteristic are the same or similar, including the first name and the second name are the same or similar, and the first location identity and the second location identity are the same or similar.
And S318, the cloud sends prompt information to the mobile phone to prompt the user whether to reuse the control strategy of the second target device.
Prompt information can be displayed on the mobile phone, as shown in fig. 3B, and the prompt information is whether to reuse the control strategy of the old fish tank socket. And if the mobile phone detects that the user clicks the operation of the 'yes' key, executing the control strategy for determining the reuse of the old equipment, and otherwise, not reusing the control strategy of the old equipment.
And S319, the mobile phone sends an instruction for determining the multiplexing of the control strategy of the second target device to the cloud.
And S320, the cloud replaces the identifier of the first target device in the stored mapping relation with the identifier of the second target device, and replaces the first characteristic with the second characteristic.
For example, the mapping relationship is, for example, table 3 above, and after the cloud replaces the old socket with the new socket, table 3 above may be updated to table 4 below:
TABLE 4
Second target device Second characteristic Controlling conditions Control mode
Socket 2 Fish bowl socket, sitting room 10 o' clock in the evening Is opened
And after replacing the first target equipment with second target equipment, the cloud end controls the second target equipment based on the control strategy of the first target equipment. Specifically, S320 and S321 are included.
S321, when the cloud determines the determination control condition, controlling the second target device in a corresponding control manner.
In the above embodiments, the control policy for the target device is set by the user. It will be appreciated that the control strategy for the target device may also be set by default. For example, the interface shown in fig. 2c (a) displayed when the "my" option is selected may display the interface shown in fig. 4 when the "auto" option is selected, the interface including the exit mode and the home mode. For example, in the exit mode, the default control mode for all bound target devices is off; in the home mode, the default control mode for all bound target devices is open. Therefore, when the mobile phone detects the operation of selecting the exit mode, the mobile phone sends a command to the cloud, the command is used for indicating that the exit mode is set, and then the cloud controls all the bound target devices to be closed. When the mobile phone detects that the operation of returning home mode is selected, the mobile phone sends an instruction to the cloud, the instruction is used for indicating that the returning home mode is set, and then the cloud controls all the bound target devices to be started.
In this case, if the new device replaces the old device, the control policy for the new application may also follow the control policy for the old device (i.e., the default set control policy). For example, after the socket 1 is replaced with the socket 2, when the mobile phone detects an operation of selecting a home mode, the mobile phone sends a command to the cloud, where the command is used to indicate that the home mode is set, and then the cloud controls all target devices (including the socket 2) bound to be turned on.
The electronic device provided by the embodiment of the application is described below.
Fig. 5 shows a schematic structural diagram of the electronic device. The electronic device may be the above-mentioned control terminal such as a mobile phone, and may also be a controlled terminal such as a home device. As shown in fig. 5, the electronic device may include a processor 110, an external memory interface 120, an internal memory 121, a Universal Serial Bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, a mobile communication module 150, a wireless communication module 160, an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, a sensor module 180, a button 190, a motor 191, an indicator 192, a camera 193, a display screen 194, a Subscriber Identification Module (SIM) card interface 195, and the like. The sensor module 180 may include a pressure sensor 180A, a gyroscope sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, an ambient light sensor 180L, a bone conduction sensor 180M, and the like.
Processor 110 may include one or more processing units, such as: the processor 110 may include an Application Processor (AP), a modem processor, a Graphics Processing Unit (GPU), an Image Signal Processor (ISP), a controller, a memory, a video codec, a Digital Signal Processor (DSP), a baseband processor, and/or a neural-Network Processing Unit (NPU), etc. The different processing units may be separate devices or may be integrated into one or more processors. The controller can be a neural center and a command center of the electronic device. The controller can generate an operation control signal according to the instruction operation code and the timing signal to complete the control of instruction fetching and instruction execution. A memory may also be provided in processor 110 for storing instructions and data. In some embodiments, the memory in the processor 110 is a cache memory. The memory may hold instructions or data that have just been used or recycled by the processor 110. If the processor 110 needs to reuse the instruction or data, it can be called directly from the memory. Avoiding repeated accesses reduces the latency of the processor 110, thereby increasing the efficiency of the system.
The USB interface 130 is an interface conforming to the USB standard specification, and may specifically be a Mini USB interface, a Micro USB interface, a USB Type C interface, or the like. The USB interface 130 may be used to connect a charger to charge the electronic device, and may also be used to transmit data between the electronic device and a peripheral device. The charging management module 140 is configured to receive charging input from a charger. The power management module 141 is used to connect the battery 142, the charging management module 140 and the processor 110. The power management module 141 receives input from the battery 142 and/or the charge management module 140 and provides power to the processor 110, the internal memory 121, the external memory, the display 194, the camera 193, the wireless communication module 160, and the like.
The wireless communication function of the electronic device may be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, the modem processor, the baseband processor, and the like. The antennas 1 and 2 are used for transmitting and receiving electromagnetic wave signals. Each antenna in an electronic device may be used to cover a single or multiple communication bands. Different antennas can also be multiplexed to improve the utilization of the antennas. For example: the antenna 1 may be multiplexed as a diversity antenna of a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
The mobile communication module 150 may provide a solution including 2G/3G/4G/5G wireless communication applied to the electronic device. The mobile communication module 150 may include at least one filter, a switch, a power amplifier, a Low Noise Amplifier (LNA), and the like. The mobile communication module 150 may receive the electromagnetic wave from the antenna 1, filter, amplify, etc. the received electromagnetic wave, and transmit the electromagnetic wave to the modem processor for demodulation. The mobile communication module 150 may also amplify the signal modulated by the modem processor, and convert the signal into electromagnetic wave through the antenna 1 to radiate the electromagnetic wave. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be disposed in the processor 110. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be disposed in the same device as at least some of the modules of the processor 110.
The wireless communication module 160 may provide solutions for wireless communication applied to electronic devices, including Wireless Local Area Networks (WLANs) (such as wireless fidelity (Wi-Fi) networks), Bluetooth (BT), Global Navigation Satellite Systems (GNSS), Frequency Modulation (FM), Near Field Communication (NFC), Infrared (IR), and the like. The wireless communication module 160 may be one or more devices integrating at least one communication processing module. The wireless communication module 160 receives electromagnetic waves via the antenna 2, performs frequency modulation and filtering processing on electromagnetic wave signals, and transmits the processed signals to the processor 110. The wireless communication module 160 may also receive a signal to be transmitted from the processor 110, perform frequency modulation and amplification on the signal, and convert the signal into electromagnetic waves through the antenna 2 to radiate the electromagnetic waves.
In some embodiments, antenna 1 of the electronic device is coupled to the mobile communication module 150 and antenna 2 is coupled to the wireless communication module 160 so that the electronic device can communicate with the network and other devices through wireless communication techniques. The wireless communication technology may include global system for mobile communications (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), time-division code division multiple access (TD-SCDMA), long term evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC, FM, and/or IR technologies, etc. The GNSS may include a Global Positioning System (GPS), a global navigation satellite system (GLONASS), a beidou navigation satellite system (BDS), a quasi-zenith satellite system (QZSS), and/or a Satellite Based Augmentation System (SBAS).
The display screen 194 is used to display a display interface of an application and the like. The display screen 194 includes a display panel. The display panel may adopt a Liquid Crystal Display (LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode (active-matrix organic light-emitting diode, AMOLED), a flexible light-emitting diode (FLED), a miniature, a Micro-oeld, a quantum dot light-emitting diode (QLED), and the like. In some embodiments, the electronic device may include 1 or N display screens 194, with N being a positive integer greater than 1.
The camera 193 is used to capture still images or video. The cameras 193 may include a front camera and a rear camera.
The internal memory 121 may be used to store computer-executable program code, which includes instructions. The processor 110 executes various functional applications of the electronic device and data processing by executing instructions stored in the internal memory 121. The internal memory 121 may include a program storage area and a data storage area. Wherein, the storage program area can store an operating system, software codes of at least one application program (such as an Aichi art application, a WeChat application, etc.), and the like. The data storage area may store data (e.g., images, video, etc.) generated during use of the electronic device, and the like. In addition, the internal memory 121 may include a high-speed random access memory, and may further include a nonvolatile memory, such as at least one magnetic disk storage device, a flash memory device, a universal flash memory (UFS), and the like.
The external memory interface 120 may be used to connect an external memory card, such as a Micro SD card, to extend the memory capability of the electronic device. The external memory card communicates with the processor 110 through the external memory interface 120 to implement a data storage function. For example, files such as pictures, videos, and the like are saved in an external memory card.
The electronic device may implement audio functions via the audio module 170, the speaker 170A, the receiver 170B, the microphone 170C, the headphone interface 170D, and the application processor. Such as music playing, recording, etc.
The pressure sensor 180A is used for sensing a pressure signal, and converting the pressure signal into an electrical signal. In some embodiments, the pressure sensor 180A may be disposed on the display screen 194. The gyro sensor 180B may be used to determine the motion pose of the electronic device. In some embodiments, the angular velocity of the electronic device about three axes (i.e., x, y, and z axes) may be determined by the gyroscope sensor 180B.
The gyro sensor 180B may be used for photographing anti-shake. The air pressure sensor 180C is used to measure air pressure. In some embodiments, the electronic device calculates altitude, aiding in positioning and navigation, from barometric pressure values measured by barometric pressure sensor 180C. The magnetic sensor 180D includes a hall sensor. The electronic device may detect the opening and closing of the flip holster using the magnetic sensor 180D. In some embodiments, when the electronic device is a flip, the electronic device may detect the opening and closing of the flip according to the magnetic sensor 180D. And then according to the opening and closing state of the leather sheath or the opening and closing state of the flip cover, the automatic unlocking of the flip cover is set. The acceleration sensor 180E can detect the magnitude of acceleration of the electronic device in various directions (typically three axes). When the electronic device is at rest, the magnitude and direction of gravity can be detected. The method can also be used for recognizing the posture of the electronic equipment, and is applied to horizontal and vertical screen switching, pedometers and other applications.
A distance sensor 180F for measuring a distance. The electronic device may measure distance by infrared or laser. In some embodiments, taking a picture of a scene, the electronic device may utilize the distance sensor 180F to range to achieve fast focus. The proximity light sensor 180G may include, for example, a Light Emitting Diode (LED) and a light detector, such as a photodiode. The light emitting diode may be an infrared light emitting diode. The electronic device emits infrared light to the outside through the light emitting diode. The electronic device uses a photodiode to detect infrared reflected light from nearby objects. When sufficient reflected light is detected, it can be determined that there is an object near the electronic device. When insufficient reflected light is detected, the electronic device may determine that there are no objects near the electronic device. The electronic device can detect that the electronic device is held by a user and close to the ear for conversation by utilizing the proximity light sensor 180G, so that the screen is automatically extinguished, and the purpose of saving power is achieved. The proximity light sensor 180G may also be used in a holster mode, a pocket mode automatically unlocks and locks the screen.
The ambient light sensor 180L is used to sense the ambient light level. The electronic device may adaptively adjust the brightness of the display screen 194 based on the perceived ambient light level. The ambient light sensor 180L may also be used to automatically adjust the white balance when taking a picture. The ambient light sensor 180L may also cooperate with the proximity light sensor 180G to detect whether the electronic device is in a pocket to prevent accidental touches. The fingerprint sensor 180H is used to collect a fingerprint. The electronic equipment can utilize the collected fingerprint characteristics to realize fingerprint unlocking, access to an application lock, fingerprint photographing, fingerprint incoming call answering and the like.
The temperature sensor 180J is used to detect temperature. In some embodiments, the electronic device implements a temperature processing strategy using the temperature detected by temperature sensor 180J. For example, when the temperature reported by the temperature sensor 180J exceeds a threshold, the electronic device performs a reduction in performance of a processor located near the temperature sensor 180J, so as to reduce power consumption and implement thermal protection. In other embodiments, the electronic device heats the battery 142 when the temperature is below another threshold to avoid an abnormal shutdown of the electronic device due to low temperatures. In other embodiments, the electronic device performs a boost on the output voltage of the battery 142 when the temperature is below a further threshold to avoid abnormal shutdown due to low temperature.
The touch sensor 180K is also referred to as a "touch panel". The touch sensor 180K may be disposed on the display screen 194, and the touch sensor 180K and the display screen 194 form a touch screen, which is also called a "touch screen". The touch sensor 180K is used to detect a touch operation applied thereto or nearby. The touch sensor can communicate the detected touch operation to the application processor to determine the touch event type. Visual output associated with the touch operation may be provided through the display screen 194. In other embodiments, the touch sensor 180K may be disposed on a surface of the electronic device at a different position than the display screen 194.
The bone conduction sensor 180M can acquire a vibration signal. In some embodiments, the bone conduction sensor 180M may acquire a vibration signal of the human vocal part vibrating the bone mass. The bone conduction sensor 180M may also contact the human pulse to receive the blood pressure pulsation signal.
The keys 190 include a power-on key, a volume key, and the like. The keys 190 may be mechanical keys. Or may be touch keys. The electronic device may receive a key input, and generate a key signal input related to user settings and function control of the electronic device. The motor 191 may generate a vibration cue. The motor 191 may be used for incoming call vibration cues, as well as for touch vibration feedback. For example, touch operations applied to different applications (e.g., photographing, audio playing, etc.) may correspond to different vibration feedback effects. Indicator 192 may be an indicator light that may be used to indicate a state of charge, a change in charge, or a message, missed call, notification, etc. The SIM card interface 195 is used to connect a SIM card. The SIM card can be attached to and detached from the electronic device by being inserted into the SIM card interface 195 or being pulled out of the SIM card interface 195.
It is to be understood that the components shown in fig. 5 do not constitute a specific limitation of the electronic device. A handset in an embodiment of the invention may include more or fewer components than those shown in fig. 5. In addition, the combination/connection relationship between the components in fig. 5 may also be modified.
Fig. 6 shows a block diagram of a software structure of an electronic device according to an embodiment of the present application. The electronic device may be, for example, the control terminal mentioned above, such as a mobile phone, or a controlled terminal, such as a home device. As shown in fig. 6, the software structure of the electronic device may be a layered architecture, for example, the software may be divided into several layers, each layer having a clear role and division of labor. The layers communicate with each other through a software interface. In some embodiments, the Android system is divided into four layers, an application layer, an application framework layer (FWK), an Android runtime (Android runtime) and system library, and a kernel layer from top to bottom.
The application layer may include a series of application packages. As shown in fig. 6, the application layer may include a camera, settings, a skin module, a User Interface (UI), a three-party application, and the like. The three-party application program may include WeChat, QQ, gallery, calendar, call, map, navigation, WLAN, Bluetooth, music, video, short message, etc.
The application framework layer provides an Application Programming Interface (API) and a programming framework for the application program of the application layer. The application framework layer may include some predefined functions. As shown in FIG. 6, the application framework layers may include a window manager, content provider, view system, phone manager, resource manager, notification manager, and the like.
The window manager is used for managing window programs. The window manager can obtain the size of the display screen, judge whether a status bar exists, lock the screen, intercept the screen and the like. The content provider is used to store and retrieve data and make it accessible to applications. The data may include video, images, audio, calls made and received, browsing history and bookmarks, phone books, etc.
The view system includes visual controls such as controls to display text, controls to display pictures, and the like. The view system may be used to build applications. The display interface may be composed of one or more views. For example, the display interface including the short message notification icon may include a view for displaying text and a view for displaying pictures.
The phone manager is used to provide communication functions of the electronic device. Such as management of call status (including on, off, etc.).
The resource manager provides various resources for the application, such as localized strings, icons, pictures, layout files, video files, and the like.
The notification manager enables the application to display notification information in the status bar, can be used to convey notification-type messages, can disappear automatically after a short dwell, and does not require user interaction. Such as a notification manager used to inform download completion, message alerts, etc. The notification manager may also be a notification that appears in the form of a chart or scroll bar text at the top status bar of the system, such as a notification of a background running application, or a notification that appears on the screen in the form of a dialog window. For example, prompting text information in the status bar, sounding a prompt tone, vibrating the electronic device, flashing an indicator light, etc.
The Android runtime comprises a core library and a virtual machine. The Android runtime is responsible for scheduling and managing an Android system.
The core library comprises two parts: one part is a function which needs to be called by java language, and the other part is a core library of android. The application layer and the application framework layer run in a virtual machine. The virtual machine executes java files of the application layer and the application framework layer as binary files. The virtual machine is used for performing the functions of object life cycle management, stack management, thread management, safety and exception management, garbage collection and the like.
The system library may include a plurality of functional modules. For example: surface managers (surface managers), media libraries (media libraries), three-dimensional graphics processing libraries (e.g., OpenGL ES), 2D graphics engines (e.g., SGL), and the like.
The surface manager is used to manage the display subsystem and provide fusion of 2D and 3D layers for multiple applications.
The media library supports a variety of commonly used audio, video format playback and recording, and still image files, among others. The media library may support a variety of audio-video encoding formats, such as MPEG4, h.264, MP3, AAC, AMR, JPG, PNG, and the like.
The three-dimensional graphic processing library is used for realizing three-dimensional graphic drawing, image rendering, synthesis, layer processing and the like.
The 2D graphics engine is a drawing engine for 2D drawing.
In addition, the system library may further include a backup determination module for determining whether the file exists in the backed-up list. For example, when a file exists in the backed-up list, the backup judgment module determines that the file does not need to be backed-up; for another example, when the file does not exist in the backed-up list, the backup determination module determines that the file needs to be backed-up.
The kernel layer is a layer between hardware and software. The inner core layer at least comprises a display driver, a camera driver, an audio driver and a sensor driver.
The hardware layer may include various sensors, such as an acceleration sensor, a gyro sensor, a touch sensor, and the like, which are referred to in the embodiments of the present application.
Based on the same concept, fig. 7 illustrates a cloud 700 provided by the present application. The cloud 700 may be various types of servers. For example, cloud 700 may be the cloud in the foregoing. As shown in fig. 7, the cloud 700 may include: one or more processors 701; one or more memories 702; a communications interface 703 and one or more computer programs 704, which may be connected via one or more communications buses 705. Wherein the one or more computer programs 704 are stored in the memory 702 and configured to be executed by the one or more processors 701, the one or more computer programs 704 comprising instructions that can be used to perform the relevant steps as the cloud in the respective embodiments above. The communication interface 703 is used to enable communication with other devices, such as a terminal device, for example, and may be a transceiver.
In the embodiments provided in the present application, the method provided in the embodiments of the present application is introduced from the perspective that an electronic device (for example, a terminal device or a cloud) is used as an execution subject. In order to implement the functions in the method provided by the embodiments of the present application, the electronic device may include a hardware structure and/or a software module, and the functions are implemented in the form of a hardware structure, a software module, or a hardware structure and a software module. Whether any of the above-described functions is implemented as a hardware structure, a software module, or a hardware structure plus a software module depends upon the particular application and design constraints imposed on the technical solution.
As used in the above embodiments, the terms "when …" or "after …" may be interpreted to mean "if …" or "after …" or "in response to determining …" or "in response to detecting …", depending on the context. Similarly, depending on the context, the phrase "at the time of determination …" or "if (a stated condition or event) is detected" may be interpreted to mean "if the determination …" or "in response to the determination …" or "upon detection (a stated condition or event)" or "in response to detection (a stated condition or event)". In addition, in the above-described embodiments, relational terms such as first and second are used to distinguish one entity from another entity without limiting any actual relationship or order between the entities.
Reference throughout this specification to "one embodiment" or "some embodiments," or the like, means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," or the like, in various places throughout this specification are not necessarily all referring to the same embodiment, but rather "one or more but not all embodiments" unless specifically stated otherwise. The terms "comprising," "including," "having," and variations thereof mean "including, but not limited to," unless expressly specified otherwise.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that includes one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others. The aspects of the above embodiments may all be used in combination without conflict.
It is noted that a portion of this patent application contains material which is subject to copyright protection. The copyright owner reserves the copyright rights whatsoever, except for making copies of the patent files or recorded patent document contents of the patent office.

Claims (21)

1. A method of controlling a device, comprising:
the terminal equipment is connected with the first target equipment and controls the first target equipment based on a first control strategy;
detecting a first operation, wherein the first operation is used for replacing the control right of the terminal device to the first target device with the control right of other target devices;
in response to the first operation, the terminal device connects to a second target device, and the terminal device follows a first control policy of the first target device for the second target device.
2. The method of claim 1, wherein the terminal device connecting to and controlling the first target device based on the first control policy comprises:
the terminal equipment establishes connection with the first target equipment through a cloud end;
in response to a second operation, the terminal device sets a first control strategy for the first target device, and sends the first control strategy to the cloud, so that the first target device is controlled through the cloud based on the first control strategy.
3. The method of claim 2, wherein the terminal device follows a first control policy of the first target device for the second target device for control, comprising:
the terminal device sends indication information to the cloud, wherein the indication information is used for indicating the cloud to replace the first control strategy with a control strategy for a second target device, so that the cloud controls the second target device according to the first control strategy.
4. The method according to any one of claims 1 to 3, wherein the first control strategy includes a first control condition and a first control manner for controlling the first target device or the second target device based on the first control manner when the first control condition is satisfied.
5. The method of any of claims 1-3, wherein prior to detecting the first operation, further comprising:
responding to a third operation, the terminal device displays a control strategy display interface, the control strategy display interface comprises the first control strategy, and the first control strategy is displayed as a control strategy for the first target device;
the terminal equipment displays a second interface, wherein the second interface comprises a plurality of control keys aiming at the first target equipment; the control keys comprise a first key, and the first key is used for controlling the terminal equipment to replace the control right of the first target equipment with the control right of other target equipment;
a first operation is detected, comprising: detecting a click operation aiming at the first control;
responding to the first operation, the terminal device connecting to a second target device, and the method comprises the following steps:
responding to the first operation, the terminal equipment displays a third interface, and a device connection method in the third interface of the terminal equipment is connected with a second target device;
responding to a fourth operation, the terminal device displays the control strategy display interface, and the first control strategy in the control strategy display interface is displayed as a control strategy for a second target device.
6. A method of controlling a device, comprising:
the terminal equipment is connected with the first target equipment and controls the first target equipment based on a first control strategy;
in response to a first operation for disconnecting the connection relationship with the first target device, the terminal device stops controlling the first target device based on the first control policy and saves the first control policy;
responding to a second operation, and connecting the terminal equipment to second target equipment;
and when the terminal equipment determines that the second characteristic of the second target equipment is the same as or similar to the first characteristic of the first target equipment, the terminal equipment continues to control the second target equipment by using the first control strategy.
7. The method of claim 6, wherein the terminal device connecting to and controlling the first target device based on the first control policy comprises:
the terminal equipment establishes connection with the first target equipment through a cloud end;
in response to a third operation, the terminal device sets a first control strategy for the first target device, and sends the first control strategy to the cloud, so that the first target device is controlled through the cloud based on the first control strategy.
8. The method of claim 7, wherein the terminal device ceasing to control the first target device based on the first control policy in response to a first operation to disconnect the connection relationship with the first target device, comprises:
the terminal equipment sends first prompt information to the cloud end, wherein the first prompt information is used for prompting the cloud end to stop controlling the first target equipment based on the first control strategy; the first prompt message also prompts the cloud to store the first control strategy and first characteristics of the first target device, wherein the first characteristics are characteristic information which is sent to the cloud by the terminal device and is used for uniquely identifying the first target device.
9. The method of claim 8, wherein when the terminal device determines that the second characteristic of the second target device is the same as or similar to the first characteristic of the first target device, then controlling the second target device along the first control policy for the first target device comprises:
the terminal equipment acquires a second characteristic of the second target equipment and sends the second characteristic to the cloud end; so that the cloud determines whether the first characteristic and the second characteristic are the same or similar;
the terminal equipment receives second prompt information sent by the cloud end, wherein the second prompt information is used for prompting a user to control the second target equipment by using a first control strategy of the first target equipment;
in response to a confirmation operation of a user, the terminal device sends a confirmation instruction to the cloud end, so that the cloud end determines to continue to control the second target device by using the first control strategy based on the confirmation instruction.
10. The method according to any of claims 6-9, wherein the first feature comprises a first name and/or a first location identity of the first target device set by a user; the second characteristic comprises a second command and a second position identification of the second target device set by a user; the first feature is the same as or similar to the second feature and includes: the first name is the same as or similar to the second name and/or the first location identity is the same as or similar to the second location identity.
11. The method according to any one of claims 6 to 10, wherein the first control strategy includes a first control condition and a first control manner for controlling the first target device or the second target device based on the first control manner when the first control condition is satisfied.
12. A method of controlling a device, comprising:
the cloud end establishes connection between the terminal equipment and the first target equipment;
the cloud end receives a first control strategy aiming at the first target equipment and sent by the terminal equipment, and controls the first target equipment based on the first control strategy;
the cloud end establishes connection between the terminal equipment and second target equipment;
the cloud end receives prompt information sent by the terminal equipment, wherein the prompt information is used for prompting the cloud end to replace the first control strategy with a control strategy aiming at second target equipment;
the cloud continues to control the second target device with the first control policy.
13. The method of claim 12, wherein the first control policy includes a first control condition and a first control manner, and the first control manner is used by the cloud to determine whether to control the first target device or the second target device based on the first control manner when the first control condition is satisfied.
14. A method of controlling a device, comprising:
the cloud end establishes connection between the terminal equipment and the first target equipment;
the cloud end receives a first control strategy aiming at the first target equipment and sent by the terminal equipment, and controls the first target equipment based on the first control strategy;
the cloud end receives first prompt information sent by the cloud end, and the first prompt information is used for prompting the cloud end to stop controlling the first target equipment based on the first control strategy;
the cloud stores the first control strategy and first characteristics of the first target equipment, wherein the first characteristics are characteristic information which is sent to the cloud by the terminal equipment and is used for uniquely identifying the first target equipment;
the cloud end establishes connection between the terminal device and a second target device, and acquires a second characteristic of the second target device from the terminal device;
and when the cloud judges whether the first characteristic and the second characteristic are the same or similar, the cloud continues to use the first control strategy of the first target device to control the second target device.
15. The method of claim 14, wherein prior to controlling the second target device along with the first control policy of the first target device, the method further comprises:
the cloud end sends second prompt information to the terminal equipment, wherein the second prompt information is used for prompting a user whether to continue to use the first control strategy to control the second target equipment;
after receiving a confirmation operation from the terminal device, the cloud end determines to follow the first control strategy to control the second target device based on the confirmation instruction.
16. The method of claim 8, wherein the first feature comprises a first name and/or a first location identification of the first target device set by a user; the second characteristic comprises a second command and a second position identification of the second target device set by a user; the first feature is the same as or similar to the second feature and includes: the first name is the same as or similar to the second name and/or the first location identity is the same as or similar to the second location identity.
17. The method of any of claims 14-16, wherein the first control strategy includes a first control condition and a first control mode, the first control mode being used to control the first target device or the second target device based on the first control mode when the first control condition is satisfied.
18. A control apparatus of a device, characterized by comprising:
one or more processors;
one or more memories;
wherein the one or more memories store one or more computer programs comprising instructions which, when executed by the one or more processors, cause the terminal device to perform the method steps of any of claims 1 to 11.
19. A system, comprising:
a terminal device; a first target device and a second target device; and a cloud; the terminal device is connected with the first target device and/or the second target device through the cloud end, so that the first target device and/or the second target device are controlled through the cloud end;
the terminal device is configured to perform the method steps of any one of claims 1 to 5, and the cloud is configured to implement the method of any one of claims 6 to 11.
20. A computer-readable storage medium, characterized in that the computer-readable storage medium comprises a computer program which, when run on a terminal device, causes the terminal device to perform the method according to any one of claims 1 to 11.
21. A program product comprising instructions which, when run on a computer, cause the computer to perform the method of any one of claims 1 to 11.
CN202011165723.9A 2020-10-27 2020-10-27 Equipment control method and device Pending CN114488961A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011165723.9A CN114488961A (en) 2020-10-27 2020-10-27 Equipment control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011165723.9A CN114488961A (en) 2020-10-27 2020-10-27 Equipment control method and device

Publications (1)

Publication Number Publication Date
CN114488961A true CN114488961A (en) 2022-05-13

Family

ID=81470704

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011165723.9A Pending CN114488961A (en) 2020-10-27 2020-10-27 Equipment control method and device

Country Status (1)

Country Link
CN (1) CN114488961A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1655644A (en) * 2004-02-13 2005-08-17 三洋电机株式会社 Controller, program product, and storage medium
CN103116336A (en) * 2013-01-14 2013-05-22 广州从兴电子开发有限公司 Method and device for automatic management of controlled device through intelligent home control terminal
CN103607446A (en) * 2013-11-15 2014-02-26 四川长虹电器股份有限公司 An intelligent household cloud control system
JP2015216588A (en) * 2014-05-13 2015-12-03 日本電信電話株式会社 Access control device, access control method, and program
US20160260320A1 (en) * 2015-03-05 2016-09-08 Google Inc. Smart-home household policy implementations for facilitating occupant progress toward a goal
CN106338922A (en) * 2016-08-22 2017-01-18 海信集团有限公司 Method and device for generating intelligent scene mode

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1655644A (en) * 2004-02-13 2005-08-17 三洋电机株式会社 Controller, program product, and storage medium
CN103116336A (en) * 2013-01-14 2013-05-22 广州从兴电子开发有限公司 Method and device for automatic management of controlled device through intelligent home control terminal
CN103607446A (en) * 2013-11-15 2014-02-26 四川长虹电器股份有限公司 An intelligent household cloud control system
JP2015216588A (en) * 2014-05-13 2015-12-03 日本電信電話株式会社 Access control device, access control method, and program
US20160260320A1 (en) * 2015-03-05 2016-09-08 Google Inc. Smart-home household policy implementations for facilitating occupant progress toward a goal
CN106338922A (en) * 2016-08-22 2017-01-18 海信集团有限公司 Method and device for generating intelligent scene mode

Similar Documents

Publication Publication Date Title
CN110471639B (en) Display method and related device
CN113272745B (en) Smart home equipment sharing system and method and electronic equipment
CN109920240B (en) Method, device and equipment for automatically matching infrared controller and infrared equipment
CN112148400B (en) Display method and device in locking state
CN114327666B (en) Application starting method and device and electronic equipment
WO2020010584A1 (en) Data recovery method for when restoring factory settings of terminal, and terminal
CN111614524A (en) Multi-intelligent-device linkage control method, device and system
CN110839096A (en) Touch method of equipment with folding screen and folding screen equipment
CN113885759A (en) Notification message processing method, device, system and computer readable storage medium
JP2022525284A (en) Device control page display method, related equipment, and system
CN113961157B (en) Display interaction system, display method and equipment
WO2021253975A1 (en) Permission management method and apparatus for application, and electronic device
CN113254409A (en) File sharing method, system and related equipment
US12032938B2 (en) Plug-in installation method, apparatus, and storage medium
CN114500732B (en) Interface display method, electronic equipment and storage medium
CN115657897A (en) Cross-device desktop management method, first electronic device and second electronic device
CN113485709B (en) Application optimization method and device and electronic equipment
CN113467821A (en) Application program repairing method, device, equipment and readable storage medium
CN114488961A (en) Equipment control method and device
CN117009023B (en) Method for displaying notification information and related device
WO2024131823A1 (en) Installation-free application upgrading method and electronic device
CN114244951B (en) Method for opening page by application program, medium and electronic equipment thereof
WO2023142935A1 (en) Application component management method and related device
WO2024012398A1 (en) Message sharing method and related device
WO2023045876A1 (en) Application installation method and related devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination