WO2021213061A1 - 资源获取方法、系统、服务器及存储介质 - Google Patents
资源获取方法、系统、服务器及存储介质 Download PDFInfo
- Publication number
- WO2021213061A1 WO2021213061A1 PCT/CN2021/080239 CN2021080239W WO2021213061A1 WO 2021213061 A1 WO2021213061 A1 WO 2021213061A1 CN 2021080239 W CN2021080239 W CN 2021080239W WO 2021213061 A1 WO2021213061 A1 WO 2021213061A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal device
- server
- positioning
- resource
- location information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/63—Location-dependent; Proximity-dependent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/025—Services making use of location information using location based information parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/025—Services making use of location information using location based information parameters
- H04W4/027—Services making use of location information using location based information parameters using movement velocity, acceleration information
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/025—Services making use of location information using location based information parameters
- H04W4/026—Services making use of location information using location based information parameters using orientation information, e.g. compass
Definitions
- This application relates to the technical field of access control, and in particular to a resource acquisition method, system, server and storage medium.
- the server or target device When a user uses a terminal device for resource access, if the resource to be accessed is a protected resource, the server or target device generally needs to verify the authority of the terminal device. Only when the verification is passed, the terminal device can obtain the resource to be accessed. For example, when a user uses a mobile phone to open a door lock, he first needs to verify the authority of the mobile phone. Only after the verification is passed, the mobile phone can access the door lock, obtain the status information of the door lock, and realize unlocking.
- Existing authorization verification methods generally verify the user identity or the distance between the terminal device and the target device. If the verification passes, the terminal device can obtain protected resources due to the user identity or the distance between the terminal device and the target device. It is easy to forge or make mistakes. Therefore, it is easy for unrelated devices to obtain protected resources, and the protected resources cannot be reasonably controlled, which affects the security of resource access.
- the embodiments of the present application provide resource acquisition methods, systems, servers, and storage media, which can perform more reasonable management and control on protected resources and improve the security of resource access.
- an embodiment of the present application provides a resource acquisition method, including:
- the terminal device sends the resource access request information for accessing the target device to the server, where the resource access request information carries the user ID and the resource ID to be accessed; the server authenticates the user ID; if the authentication is passed, the server obtains The location information of the terminal device, where the location information includes geographic location information and positioning assistance information; the server verifies the location information of the terminal device; if the verification passes, the server will correspond to the resource identification to be accessed.
- the access token is sent to the terminal device; the terminal device obtains the resource to be accessed corresponding to the resource identification to be accessed from the target device according to the access token.
- the terminal device sends the resource access request information of the access target device to the server.
- the server first authenticates the user identity in the resource access request information. If the authentication is passed, the server obtains the location information of the terminal device, The location information is verified; because the location information includes geographic location information and positioning assistance information, and only when the location information is verified, the server can send the access token to the terminal device, and instruct the terminal device to obtain it from the target device according to the access token.
- the resource to be accessed corresponding to the identifier of the resource to be accessed improves the accuracy of location information verification, reduces the probability of unrelated devices acquiring the resource to be accessed, realizes reasonable management and control of the resource to be accessed, and improves the security of resource access.
- an embodiment of the present application provides a resource acquisition method, including:
- the server obtains the resource access request information of the access target device sent by the terminal device, wherein the resource access request information carries the user identity identifier and the resource identifier to be accessed; the server authenticates the user identity identifier; the server obtains the terminal The location information of the device; the location information includes geographic location information and positioning assistance information; the server verifies the location information of the terminal device to pass; the server sends the access token corresponding to the resource identifier to be accessed to the terminal Device to instruct the terminal device to obtain the resource to be accessed corresponding to the resource identifier to be accessed from the target device according to the access token.
- the server when the server receives the resource access request information sent by the terminal device to access the target device, in addition to authenticating the user's identity, it also verifies the location information of the terminal device, and only the location information of the terminal device Only when the verification is passed, the terminal device is allowed to access the resource to be accessed, which reduces the probability of unrelated devices acquiring the resource to be accessed; and since the location information includes geographic location information and positioning assistance information, the server verifies the geographic location information of the terminal device In addition, the verification of positioning assistance information is added, which improves the accuracy of location information verification, and further reduces the probability of unrelated devices acquiring resources to be accessed, so that resources to be accessed can be more reasonably controlled, and resource access is improved. Security.
- the server since the authentication of the user’s identity, the verification of the location information of the terminal device, and the sending of the access token are all performed by the server, it is convenient for the server to update the authority of the terminal device and the target device synchronously, preventing any party from failing to update in time. The usage situation further improves the security of resource access.
- the positioning assistance information includes positioning accuracy, positioning time delay, positioning mode, moving speed, and/or moving direction.
- the server obtains the geographic location information of the terminal device according to the actual application scenario, and the corresponding location parameter in the positioning assistance information, and verifies the geographic location information and the positioning assistance information. For example, in a scenario, the server checks the geographic location of the terminal device. Information, positioning accuracy, and positioning delay are verified; in another scenario, the server verifies the geographic location information and moving speed of the terminal device, so as to make full use of the location parameters in the location information and improve the location information verification Accuracy.
- the server verifies the location information of the terminal device to pass, including:
- the server determines that the terminal device is in a predetermined area according to the geographic location information, and determines that the positioning assistance information meets a preset condition. That is, if both the geographic location information and the positioning auxiliary information pass the verification, the location information verification is passed, preventing forgery or obtaining erroneous geographic location information, reducing the probability of unrelated devices acquiring the resources to be accessed, and realizing reasonable management and control of the resources to be accessed.
- the resource to be accessed is the phase information of traffic lights
- the positioning assistance information includes the moving direction
- the server determines that the terminal device is in a predetermined position according to the geographic location information.
- determining that the positioning assistance information meets a preset condition includes: the server determines that the terminal device is in a predetermined area according to the geographic location information, and determines that the moving direction of the terminal device is consistent with the preset direction .
- the traffic light phase information corresponding to different moving directions is different. Only when the terminal device is in a predetermined area and the terminal device’s moving direction is consistent with the preset direction, can the corresponding traffic light phase information be obtained to prevent incorrect authorization of irrelevant devices. More reasonable management and control of the resources to be accessed.
- the positioning assistance information further includes a positioning time delay
- the determining that the positioning assistance information meets a preset condition further includes: determining that the positioning time delay is less than a preset time length. If the positioning delay exceeds the preset duration, when the server receives the geographic location information of the terminal device, the terminal device has left the current location, and the geographic location information received by the server cannot reflect the current actual location of the terminal device. By verifying the positioning delay, only the positioning delay is less than the preset duration can the verification pass, which improves the accuracy of the geographic location information obtained by the server.
- the resource to be accessed is a navigation map
- the positioning assistance information includes a moving speed
- the server determines that the terminal device is in a predetermined area according to the geographic location information.
- determining that the positioning assistance information meets a preset condition includes: the server determines that the terminal device is in a predetermined area according to the geographic location information, and determines that the moving speed of the terminal device is less than a preset speed.
- the server verifies the location information of the terminal device to pass, including: the server determines that the terminal device is at a predetermined location according to the geographic location information and the positioning assistance information. Within the area. For example, the server determines that the terminal device is in a predetermined area based on the geographic location information, moving speed, and positioning delay of the terminal device, or determines that the terminal device is within the predetermined area based on the geographic location information and positioning accuracy of the terminal device, thereby improving the location. The accuracy of information verification reduces the probability of unrelated devices passing the location information verification.
- the resource to be accessed is the status information of the door lock
- the positioning assistance information includes positioning accuracy
- the server is based on the geographic location information and the positioning
- the auxiliary information determining that the terminal device is in a predetermined area includes: the server calculates the location range of the terminal device based on the geographic location information and the positioning accuracy, and determining that the location range of the terminal device is located in the predetermined area Inside. Since there is an error in the geographic location information obtained by the server, when the geographic location information is within a predetermined area, the actual location of the terminal device may not be in the predetermined area. According to the geographic location information and positioning accuracy, the location range of the terminal device is calculated. When it is determined that the location range of the terminal device is located in the predetermined area, the probability that the terminal device is located in the predetermined area is greater, which improves the accuracy of location information verification. , Thereby improving the safety of the door lock.
- obtaining the location information of the terminal device by the server includes: obtaining the location information of the terminal device collected by the positioning device by the server; wherein the positioning device includes at least one of the following : A positioning device built in the terminal device, a positioning device built in the target device, a positioning device within a predetermined range from the target device, and a positioning device built in a third-party server.
- an embodiment of the present application provides a resource acquisition device, including:
- the first obtaining module is configured to obtain resource access request information of the access target device sent by the terminal device, wherein the resource access request information carries a user identity identifier and an identifier of the resource to be accessed;
- the authentication module is used to authenticate the user identity identifier
- the second acquisition module is configured to acquire location information of the terminal device, where the location information includes geographic location information and positioning assistance information;
- the verification module is used to verify the location information of the terminal device and pass the verification
- the sending module is configured to send the access token corresponding to the resource identifier to be accessed to the terminal device, so as to instruct the terminal device to obtain from the target device according to the access token the resource identifier corresponding to the resource to be accessed. Resources to be accessed.
- the positioning assistance information includes positioning accuracy, positioning time delay, positioning mode, moving speed, and/or moving direction.
- the verification module is specifically configured to:
- the terminal device It is determined according to the geographic location information that the terminal device is in a predetermined area, and it is determined that the positioning assistance information meets a preset condition.
- the resource to be accessed is phase information of traffic lights, and the positioning assistance information includes a moving direction;
- the verification module is specifically used for:
- the positioning assistance information further includes a positioning delay
- the verification module is further configured to determine that the positioning delay is less than a preset duration.
- the resource to be accessed is a navigation map
- the positioning assistance information includes a moving speed
- the verification module is specifically used for:
- the terminal device It is determined according to the geographic location information that the terminal device is in a predetermined area, and it is determined that the moving speed of the terminal device is less than a preset speed.
- the verification module is specifically configured to determine that the terminal device is in a predetermined area according to the geographic location information and the positioning assistance information.
- the resource to be accessed is state information of a door lock, and the positioning assistance information includes positioning accuracy;
- the verification module is specifically configured to calculate the location range where the terminal device is located according to the geographic location information and the positioning accuracy, and determine that the location range where the terminal device is located is within a predetermined area.
- the second acquisition module is specifically configured to:
- the positioning device includes at least one of the following:
- a positioning device built in the terminal device a positioning device built in the target device, a positioning device within a predetermined range from the target device, and a positioning device built in a third-party server.
- an embodiment of the present application provides a server, including a memory, a processor, and a computer program stored in the memory and capable of running on the processor.
- the processor executes the computer program when the computer program is executed.
- an embodiment of the present application provides a computer-readable storage medium, the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, the resource acquisition as described in the above-mentioned second aspect is realized method.
- embodiments of the present application provide a computer program product, which when the computer program product runs on an electronic device, causes the electronic device to execute the resource acquisition method as described in the second aspect.
- an embodiment of the present application provides a resource acquisition system, including: a terminal device, a target device, and the server described in the fourth aspect.
- the resource acquisition system further includes a positioning device.
- Fig. 1 is a schematic diagram of a resource acquisition system provided by an embodiment of the present application.
- FIG. 2 is a schematic structural diagram of a terminal device provided by an embodiment of the present application.
- FIG. 3 is an application scenario diagram of the resource acquisition method provided by an embodiment of the present application.
- FIG. 4 is an application scenario diagram of the resource acquisition method provided by the embodiment of the present application.
- FIG. 5 is another application scenario diagram of the resource acquisition method provided by the embodiment of the present application.
- FIG. 6 is another application scenario diagram of the resource acquisition method provided by the embodiment of the present application.
- FIG. 7 is another application scenario diagram of the resource acquisition method provided by an embodiment of the present application.
- FIG. 8 is a schematic flowchart of a resource acquisition method provided by an embodiment of the present application.
- FIG. 9 is another schematic flowchart of a resource acquisition method provided by an embodiment of the present application.
- FIG. 10 is another schematic flowchart of a resource acquisition method provided by an embodiment of the present application.
- FIG. 11 is a schematic diagram of the structure of a server provided by an embodiment of the present application.
- the term “if” can be construed as “when” or “once” or “in response to determination” or “in response to detecting “.
- the phrase “if determined” or “if detected [described condition or event]” can be interpreted as meaning “once determined” or “in response to determination” or “once detected [described condition or event]” depending on the context ]” or “in response to detection of [condition or event described]”.
- FIG. 1 is a schematic diagram of a resource acquisition system provided by an embodiment of the present application.
- the resource acquisition system includes a terminal device 100, a server 200, and a target device 300.
- the target device 300 stores resources to be accessed.
- the resources to be accessed may be state information of door locks, phase information of traffic lights, navigation maps, or red envelope links.
- the terminal device 100 sends the resource access request information of the access target device to the server 200.
- the resource access request information includes the user ID and the resource ID to be accessed.
- the server 200 authenticates the user ID, and if the authentication is passed, obtains the location information of the terminal device 100 , Location information includes geographic location information and positioning assistance information.
- the server 200 verifies the location information of the terminal device 100 according to the pre-acquired verification information, and if the verification passes, sends an access token corresponding to the resource identifier to be accessed to the terminal device 100.
- the terminal device 100 sends the acquired access token to the target device 300, and the target device 300 verifies the access token. If the verification passes, the terminal device obtains the resource to be accessed corresponding to the resource identifier to be accessed.
- the terminal device obtains the status information of the door lock corresponding to the identifier of the resource to be accessed, and controls the status information of the door lock to change to the unlocked state to open the door lock; if the resource to be accessed is For the navigation map, the terminal device can download the navigation map corresponding to the identifier of the resource to be accessed.
- the server Before the terminal device obtains the resource to be accessed, the server not only authenticates the user identity, but also verifies the location information of the terminal device. Only when the location information is verified, the terminal device can obtain the resource to be accessed according to the access token.
- the terminal device may be a mobile phone, a tablet computer, a notebook computer, a vehicle-mounted terminal, etc.
- the embodiment of the present application does not impose any limitation on the specific type of the terminal device.
- the resource acquisition system further includes a positioning device 400 for collecting location information of the terminal device.
- the positioning device may be built into the terminal device 100 or independent of the terminal device 100.
- the positioning device is the target.
- the positioning apparatus 400 is a base station, and the server 300 calculates the location information of the terminal device 100 according to the location information of the base station and the coverage area of the base station registered by the terminal device 100.
- the terminal device 100 is provided with a GPS positioning module
- the positioning device 400 is provided with a WIFI positioning module.
- the satellite signal is good
- the GPS positioning module of the terminal device 100 is selected for positioning, and the position information of the terminal device 100 is calculated according to the positioning information of the GPS positioning module.
- the WIFI positioning module of the positioning device 400 is selected for positioning, and the position information of the terminal device 100 is calculated according to the position information of the positioning device 400. Since the corresponding positioning method is selected in combination with different network environments, it is possible to obtain more accurate location information in different scenarios.
- FIG. 2 is a schematic structural diagram of a terminal device 100 according to an embodiment of the present application.
- the terminal device 100 may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, and an antenna 2.
- Mobile communication module 150 wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, earphone jack 170D, sensor module 180, buttons 190, motor 191, indicator 192, camera 193, display screen 194, and Subscriber identification module (subscriber identification module, SIM) card interface 195, etc.
- SIM Subscriber identification module
- the sensor module 180 may include a pressure sensor 180A, a gyroscope sensor 180B, an air pressure sensor 180C, a magnetic sensor 180D, an acceleration sensor 180E, a distance sensor 180F, a proximity light sensor 180G, a fingerprint sensor 180H, a temperature sensor 180J, a touch sensor 180K, and ambient light Sensor 180L, bone conduction sensor 180M, etc.
- the structure illustrated in the embodiment of the present application does not constitute a specific limitation on the terminal device 100.
- the terminal device 100 may include more or fewer components than shown in the figure, or combine certain components, or split certain components, or arrange different components.
- the illustrated components can be implemented in hardware, software, or a combination of software and hardware.
- the processor 110 may include one or more processing units.
- the processor 110 may include an application processor (AP), a modem processor, a graphics processing unit (GPU), and an image signal processor. (image signal processor, ISP), controller, video codec, digital signal processor (digital signal processor, DSP), baseband processor, and/or neural-network processing unit (NPU), etc.
- AP application processor
- modem processor modem processor
- GPU graphics processing unit
- image signal processor image signal processor
- ISP image signal processor
- controller video codec
- digital signal processor digital signal processor
- DSP digital signal processor
- NPU neural-network processing unit
- the different processing units may be independent devices or integrated in one or more processors.
- the controller can generate operation control signals according to the instruction operation code and timing signals to complete the control of fetching instructions and executing instructions.
- a memory may also be provided in the processor 110 to store instructions and data.
- the memory in the processor 110 is a cache memory.
- the memory can store instructions or data that have just been used or recycled by the processor 110. If the processor 110 needs to use the instruction or data again, it can be directly called from the memory. Repeated accesses are avoided, the waiting time of the processor 110 is reduced, and the efficiency of the system is improved.
- the processor 110 may include one or more interfaces.
- the interface may include an integrated circuit (inter-integrated circuit, I2C) interface, an integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, a pulse code modulation (pulse code modulation, PCM) interface, and a universal asynchronous transmitter/receiver (universal asynchronous) interface.
- I2C integrated circuit
- I2S integrated circuit built-in audio
- PCM pulse code modulation
- PCM pulse code modulation
- UART universal asynchronous transmitter/receiver
- MIPI mobile industry processor interface
- GPIO general-purpose input/output
- SIM subscriber identity module
- USB Universal Serial Bus
- the power management module 141 is used to connect the battery 142, the charging management module 140 and the processor 110.
- the power management module 141 receives input from the battery 142 and/or the charge management module 140, and supplies power to the processor 110, the internal memory 121, the display screen 194, the camera 193, and the wireless communication module 160.
- the power management module 141 can also be used to monitor parameters such as battery capacity, battery cycle times, and battery health status (leakage, impedance).
- the power management module 141 may also be provided in the processor 110.
- the power management module 141 and the charging management module 140 may also be provided in the same device.
- the wireless communication function of the terminal device 100 can be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, the modem processor, and the baseband processor.
- the antenna 1 and the antenna 2 are used to transmit and receive electromagnetic wave signals.
- Each antenna in the terminal device 100 can be used to cover a single or multiple communication frequency bands. Different antennas can also be reused to improve antenna utilization.
- Antenna 1 can be multiplexed as a diversity antenna of a wireless local area network.
- the antenna can be used in combination with a tuning switch.
- the mobile communication module 150 may provide a wireless communication solution including 2G/3G/4G/5G and the like applied to the terminal device 100.
- the mobile communication module 150 may include at least one filter, a switch, a power amplifier, a low noise amplifier (LNA), and the like.
- the mobile communication module 150 can receive electromagnetic waves by the antenna 1, and perform processing such as filtering, amplifying and transmitting the received electromagnetic waves to the modem processor for demodulation.
- the mobile communication module 150 can also amplify the signal modulated by the modem processor, and convert it into electromagnetic waves for radiation via the antenna 1.
- at least part of the functional modules of the mobile communication module 150 may be provided in the processor 110.
- at least part of the functional modules of the mobile communication module 150 and at least part of the modules of the processor 110 may be provided in the same device.
- the wireless communication module 160 can provide applications on the terminal device 100 including wireless local area networks (WLAN) (such as wireless fidelity (WIFI) networks), Bluetooth (bluetooth, BT), and global navigation satellite systems ( Global navigation satellite system, GNSS), frequency modulation (FM), near field communication (NFC), infrared technology (infrared, IR) and other wireless communication solutions.
- WLAN wireless local area networks
- WIFI wireless fidelity
- BT Bluetooth
- GNSS global navigation satellite systems
- FM frequency modulation
- NFC near field communication
- infrared technology infrared, IR
- the wireless communication module 160 may be one or more devices integrating at least one communication processing module.
- the wireless communication module 160 receives electromagnetic waves via the antenna 2, frequency modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 110.
- the wireless communication module 160 may also receive a signal to be sent from the processor 110, perform frequency modulation, amplify, and convert it into electromagnetic waves to radiate through the antenna 2.
- the antenna 1 of the terminal device 100 is coupled with the mobile communication module 150, and the antenna 2 is coupled with the wireless communication module 160, so that the terminal device 100 can communicate with the network and other devices through wireless communication technology.
- the wireless communication technology may include global system for mobile communications (GSM), general packet radio service (GPRS), code division multiple access (CDMA), broadband Code division multiple access (wideband code division multiple access, WCDMA), time-division code division multiple access (TD-SCDMA), long term evolution (LTE), BT, GNSS, WLAN, NFC , FM, and/or IR technology, etc.
- the GNSS may include global positioning system (GPS), global navigation satellite system (GLONASS), Beidou navigation satellite system (BDS), quasi-zenith satellite system (quasi -zenith satellite system, QZSS) and/or satellite-based augmentation systems (SBAS).
- GPS global positioning system
- GLONASS global navigation satellite system
- BDS Beidou navigation satellite system
- QZSS quasi-zenith satellite system
- SBAS satellite-based augmentation systems
- the display screen 194 is used to display images, videos, and the like.
- the display screen 194 includes a display panel.
- the display panel can use liquid crystal display (LCD), organic light-emitting diode (OLED), active matrix organic light-emitting diode or active-matrix organic light-emitting diode (active-matrix organic light-emitting diode).
- LCD liquid crystal display
- OLED organic light-emitting diode
- active-matrix organic light-emitting diode active-matrix organic light-emitting diode
- AMOLED flexible light-emitting diode (FLED), Miniled, MicroLed, Micro-oLed, quantum dot light-emitting diode (QLED), etc.
- the terminal device 100 may include one or N display screens 194, and N is a positive integer greater than one.
- the camera 193 is used to capture still images or videos.
- the object generates an optical image through the lens and is projected to the photosensitive element.
- the photosensitive element may be a charge coupled device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor.
- CMOS complementary metal-oxide-semiconductor
- the photosensitive element converts the optical signal into an electrical signal, and then transfers the electrical signal to the ISP to convert it into a digital image signal.
- ISP outputs digital image signals to DSP for processing.
- DSP converts digital image signals into standard RGB, YUV and other formats of image signals.
- the terminal device 100 may include one or N cameras 193, and N is a positive integer greater than one.
- the internal memory 121 may be used to store computer executable program code, where the executable program code includes instructions.
- the internal memory 121 may include a storage program area and a storage data area.
- the storage program area can store an operating system, an application program (such as a sound playback function, an image playback function, etc.) required by at least one function, and the like.
- the data storage area can store data (such as audio data, phone book, etc.) created during the use of the terminal device 100.
- the internal memory 121 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, a universal flash storage (UFS), and the like.
- the processor 110 executes various functional applications and data processing of the terminal device 100 by running instructions stored in the internal memory 121 and/or instructions stored in a memory provided in the processor.
- the fingerprint sensor 180H is used to collect fingerprints.
- the terminal device 100 can use the collected fingerprint characteristics to implement fingerprint unlocking, access application locks, fingerprint photographs, fingerprint answering calls, and so on.
- Touch sensor 180K also called “touch device”.
- the touch sensor 180K may be disposed on the display screen 194, and the touch screen is composed of the touch sensor 180K and the display screen 194, which is also called a “touch screen”.
- the touch sensor 180K is used to detect touch operations acting on or near it.
- the touch sensor can pass the detected touch operation to the application processor to determine the type of touch event.
- the visual output related to the touch operation can be provided through the display screen 194.
- the touch sensor 180K may also be disposed on the surface of the terminal device 100, which is different from the position of the display screen 194.
- the button 190 includes a power-on button, a volume button, and so on.
- the button 190 may be a mechanical button. It can also be a touch button.
- the terminal device 100 may receive key input, and generate key signal input related to user settings and function control of the terminal device 100.
- the SIM card interface 195 is used to connect to the SIM card.
- the terminal device 100 interacts with the network through the SIM card to implement functions such as call and data communication.
- the terminal device 100 adopts an eSIM, that is, an embedded SIM card.
- the eSIM card can be embedded in the terminal device 100 and cannot be separated from the terminal device 100.
- the resource acquisition method provided by the embodiment of the present application is used to open a door lock, as shown in FIG. 3, in this scenario, the target device is a door lock, and the resource to be accessed is the state information of the door lock.
- the terminal device sends the resource access request information to the server according to the user's operation, or the terminal device automatically triggers the sending of the resource access request information when it enters the preset area. For example, as shown in Figure 4, when the terminal device is in the unlocking interface, if a user's touch operation on the "unlocking" icon is detected, the resource access request information is sent to the server.
- the resource access request information includes the user ID at the time of user registration and the ID of the status information of the door lock.
- the user ID can be the user's account information, or the identification code of the terminal device bound to the user's identity, and the door lock
- the identifier of the status information of the door lock may be a storage path of the status information of the door lock, and the identifier of the status information of the door lock corresponds to the door lock identifier.
- the server After the server receives the resource access request information, it authenticates the user identity, for example, it verifies whether the user corresponding to the user identity has the access right to the door lock, and if the user corresponding to the user identity has the access right to the door lock, then authenticate pass through. If the authentication is passed, the server obtains the location information of the terminal device, where the server can obtain the location information of the terminal device through a positioning device, and the positioning device may be a UWB positioning device located near the door lock. Specifically, the server obtains the identification of the terminal device and the identification of the positioning device according to the user identity identification, and sends a positioning instruction to the positioning device corresponding to the identification of the positioning device. The positioning instruction includes the identification of the terminal device.
- the positioning device obtains the relative position of the terminal device and the positioning device according to the identifier of the terminal device, that is, the position information of the terminal device, and sends the position information of the terminal device to the server.
- the location information includes geographic location information and positioning assistance information
- the positioning assistance information includes positioning accuracy.
- the server After obtaining the location information of the terminal device, the server verifies the location information of the terminal device. Specifically, the server obtains the verification information corresponding to the door lock identification.
- the verification information includes the location parameter that needs to be verified and the range corresponding to the location parameter that needs to be verified.
- the location information is verified.
- the location parameters that need to be verified in the verification information include geographic location information and positioning accuracy.
- the geographic location information is the format of distance information and angle information
- the distance information is the distance between the terminal equipment and the positioning device
- the angle information is the angle between the terminal equipment and a preset reference line. Set the geographic location information to the format of distance information and angle information.
- the distance information and angle information are verified separately. The verification can be passed only when it is located outside the door, and the door lock is opened, which improves the accuracy of the position information verification, thereby improving the security of the door lock.
- the set unlocking area is centered on the positioning device M, the radius is 2 meters, and the straight line passing through the positioning device and parallel to the door is taken as the reference line, and the angle is -30° to 30°
- the door lock can be opened, that is, the user can unlock the door only in the set area outside the door.
- the corresponding range of the geographic location information is: an angle of -30° to 30°, and a distance of less than 2 meters.
- the server calculates the location range where the terminal device is located according to the acquired geographic location information and positioning accuracy of the terminal device, and determines whether the location range where the terminal device is located is within a predetermined area.
- the terminal device is located at position A, the angle between position A and the reference line is -10°, the distance from the positioning device is 1.5 meters, and the positioning accuracy is 0.05 meters; The distance of the device is between 1.45-1.55 meters, which is less than 2 meters, and the angle is between -30° and 30°, which is consistent with the range corresponding to the geographic location information. Therefore, the verification is passed. If the terminal device is located at position B, the angle between position B and the reference line is -60°, the distance from the positioning device is 1 meter, and the positioning accuracy is 0.05 meters. Since the angle of position B is not between -30° and 30°, Therefore, the verification failed.
- the angle between position C and the reference line is 0°
- the distance from the positioning device is 1.9 meters
- the positioning accuracy is 0.2 meters.
- the distance from the positioning device is calculated based on the distance from the positioning device and the positioning accuracy It is between 1.7-2.1 meters, and it may be greater than 2 meters. Therefore, it fails the verification.
- the server can also verify the geographic location information and positioning accuracy of the terminal device respectively.
- the calibration is performed.
- the verification is passed, for example, the preset positioning accuracy is 10 cm. If the geographic location information of the terminal device is within a predetermined area and the positioning accuracy is 5 cm, the location information verification is passed.
- the positioning assistance information includes the positioning method, that is, the position parameters that need to be verified in the verification information include the geographic location information and the positioning method.
- the geographic location information of the device determines whether the terminal device is within a predetermined area, and whether the positioning method matches the preset positioning method.
- the preset positioning mode can be set as the UWB positioning mode.
- the server obtains the location information sent by the terminal device and the location information sent by the UWB positioning device.
- the location information sent by the terminal device corresponds to GPS positioning, and the verification is not passed; the location information sent by the UWB positioning device corresponds to the location If the method is UWB positioning, the geographic location information corresponding to the UWB positioning method is used as the geographic location information of the terminal device, and the geographic location information corresponding to the UWB positioning method is further verified. If the geographic location information passes the verification, the location information The verification passed. Since different positioning methods correspond to different positioning accuracy, for example, the positioning accuracy corresponding to the UWB positioning method can reach the centimeter level. If the positioning method in the position information is verified, it indicates that the positioning accuracy meets the preset requirements, thereby improving the position information obtained The accuracy of this reduces the probability of unrelated devices obtaining the status information of the door lock, and improves the security level of door lock access.
- the positioning assistance information includes the positioning method and positioning accuracy.
- the server determines that the current positioning method is consistent with the preset positioning method, it needs to be based on the geographic location.
- the information and positioning accuracy determine whether the terminal device is within a predetermined area. If the terminal device is within the predetermined area, the location information verification passes.
- the server sends the access token corresponding to the identifier of the status information of the door lock to the terminal device.
- the terminal device After obtaining the access token, the terminal device sends the access token to the door lock, and the door lock verifies the access token. If the verification passes, the terminal device obtains the state information of the door lock and changes the state information of the door lock to unlocked state. To open the door lock.
- the server after the user identity authentication is passed, the server also verifies the geographic location information, positioning accuracy, and positioning method of the terminal device.
- the geographic location information, positioning accuracy, and positioning method are all verified, the terminal device Only then can the door lock be opened, thereby improving the accuracy of position information verification, reducing the probability of unrelated equipment obtaining the status information of the door lock, and improving the safety of the door lock.
- the resource acquisition method provided by the embodiment of the present application is used to acquire the phase information of the traffic light.
- the target device is a traffic light
- the resource to be accessed is the phase information of the traffic light.
- the terminal device When the terminal device enters the set range of the traffic light, it sends the resource access request information to the server according to the user's operation, or automatically triggers the sending of the resource access request information. For example, when the vehicle enters the set range of traffic lights, if it is detected that the user selects the traffic light at the current location on the navigation interface of the vehicle, the vehicle sends resource access request information to the server; for another example, when the user scans the traffic light at the current location with a mobile phone When corresponding to the QR code, the mobile phone sends resource access request information to the server.
- the terminal device if a user's touch operation on the "traffic light" icon is detected, the terminal device sends resource access request information to the server.
- the resource access request information includes the user identity identifier and the identifier of the traffic light phase information, where the identifier of the traffic light phase information corresponds to the traffic light identifier of the current location.
- the server After receiving the resource access request information, the server authenticates the user identity. For example, it is verified whether the vehicle corresponding to the vehicle identification has the access authority to the traffic light phase information, and if the vehicle corresponding to the vehicle identification has the access authority to the traffic light phase information, the authentication is passed. If the authentication is passed, the server obtains the location information of the terminal device. For example, if the terminal device is a vehicle, the server obtains the vehicle identification corresponding to the user identification, sends a location information acquisition request to the vehicle corresponding to the vehicle identification, and the vehicle sends the location information To the server.
- the location information includes geographic location information and positioning assistance information
- the positioning assistance information includes movement direction.
- the moving direction may be sent by the vehicle to the server, or may be determined by the server according to the geographic location information of at least two moments sent by the vehicle.
- the server After obtaining the location information of the terminal device, the server verifies the location information of the terminal device. Specifically, the server obtains the verification information corresponding to the traffic light identifier.
- the verification information includes the location parameter that needs to be verified and the range corresponding to the location parameter that needs to be verified.
- the server compares the acquired location according to the range corresponding to the location parameter that needs to be verified. Information is verified.
- the location parameter that needs to be verified in the verification information includes geographic location information and a moving direction, the range corresponding to the geographic location information is a predetermined area, and the range corresponding to the moving direction is a preset direction.
- the server determines that the terminal device is in the predetermined area according to the geographic location information, and the moving direction of the terminal device is consistent with the preset direction, the verification is passed.
- the geographic location information corresponds to the area P in Figure 5, and the moving direction is north to south.
- the verification passes . Since the phases of traffic lights corresponding to vehicles traveling in different directions are inconsistent, for example, the phase information of traffic lights corresponding to vehicles traveling from east to west and from south to north are different. By verifying the geographic location information and moving direction of the terminal device, it can be avoided. Send the wrong traffic light phase information to the terminal device.
- the positioning assistance information also includes the positioning delay.
- the verification is passed. For example, the positioning delay in the verification information is less than 1 second, and if the positioning delay in the location information of the terminal device acquired by the server is less than 1 second, the verification is passed. Due to the fast moving speed of the vehicle, if the positioning delay is too long, when the server obtains the position information of the terminal device, the terminal device has left the current position.
- the server indicates the traffic light according to the current position, the corresponding traffic light phase information is sent to the terminal device , Can no longer meet the actual needs of vehicles.
- the real-time performance of the acquired geographic location information is improved, and the probability of sending wrong traffic light phase information to the terminal device is reduced.
- the positioning assistance information also includes positioning mode and positioning accuracy.
- the geographic location information, moving direction, positioning delay, positioning mode, positioning accuracy of the terminal device and the range corresponding to the position parameters that need to be verified are all When they are consistent, the location information can be verified, which further improves the accuracy of location information verification and reduces the probability of sending traffic light phase information to unrelated devices.
- the vehicle is equipped with a GPS positioning device
- the server obtains the vehicle identification corresponding to the user identity identification, and sends a request for obtaining the location information of the vehicle to the GPS positioning device corresponding to the vehicle identification and the operator base station respectively.
- the GPS positioning device and the operator base station respectively send the acquired position information to the server, and the server verifies the position information corresponding to the two positioning methods, and the position information corresponding to any positioning method corresponds to the range of the position parameter that needs to be verified If they are consistent, the verification is passed.
- the range of the geographic location information is the area P in Figure 5
- the moving direction is north to south
- the positioning delay is less than 1 second
- the positioning method is GPS positioning and operator base station positioning
- the positioning accuracy is 10 Meter.
- the positioning method is GPS positioning
- the accuracy is 5 meters
- the time delay is 100 milliseconds
- the geographic location information is in the area P
- the movement direction calculated based on the geographic location information at least two moments is north to south.
- the positioning method is the operator base station positioning
- the accuracy is 10 meters
- the delay is 2 seconds
- the geographic location information is in area P
- the movement direction is calculated based on the geographic location information at least two moments in time.
- the position information corresponding to the GPS positioning method is consistent with the verification information in the two positioning methods, the position information verification is passed, which improves the flexibility of the position information verification and increases the use range of the product.
- the server sends the vehicle's location information acquisition request to the GPS positioning device of the corresponding vehicle and the operator base station respectively, and then verifies the location information acquired first. If the location information acquired first is the same as If the verification information is consistent, the location information verification is passed. For example, because the positioning delay of GPS positioning method is relatively small, when the satellite signal is good, the server verifies the location information sent by the GPS positioning device acquired first. If the location information is consistent with the verification information, the verification passes . When the satellite signal is not good, the location information sent by the GPS positioning device cannot be obtained in time, and the server verifies the location information sent by the operator base station. If the location information is consistent with the verification information, the verification is passed, thereby satisfying The needs of different scenarios.
- the server sends the access token corresponding to the identifier of the traffic light phase information to the terminal device.
- the terminal device After obtaining the access token, the terminal device sends the access token to the traffic light, and the traffic light verifies the access token. If the verification passes, the traffic light phase information of the corresponding direction is sent to the terminal device.
- the terminal device can calculate the duration of the remaining red light or the remaining green light based on the traffic light phase information, thereby planning the vehicle speed and itinerary, and helping to improve road traffic safety.
- the server after the user identity authentication is passed, the server also verifies the positioning mode, positioning delay, positioning accuracy, geographic location information, and moving direction of the terminal device, thereby improving the verification accuracy of the location information. The probability of sending wrong traffic light phase information to the terminal device is reduced.
- the resource acquisition method provided by the embodiment of the present application is used to acquire a navigation map.
- the target device is a garage management device
- the resource to be accessed is a navigation map.
- the terminal device sends the resource access request information to the server according to the user's operation, or the terminal device automatically triggers the sending of the resource access request information when it enters the preset area.
- the resource access request information includes the user identity identifier and the identifier of the navigation map, and the identifier of the navigation map corresponds to the identifier of the garage management device.
- the server After receiving the resource access request information, the server authenticates the user identity. For example, it is verified whether the vehicle corresponding to the user identity identifier has the navigation map download authority, and if the user corresponding to the user identity identifier has the navigation map download authority, the authentication is passed. If the authentication is passed, the server obtains the location information of the terminal device. Specifically, the server acquires the identification of the terminal device according to the user identity identification, sends a location information acquisition request to the terminal device corresponding to the terminal device identification, and the terminal device sends the location information to the server. In a possible implementation manner, taking the terminal device as a vehicle as an example, since the navigation map is generally set in a garage, it is generally impossible to receive satellite signals in an underground garage.
- the server sends a location information acquisition request to the built-in WIFI positioning module of the vehicle corresponding to the vehicle identification to ensure that the location information can be acquired in time.
- the location information includes geographic location information and positioning assistance information
- the positioning assistance information includes moving speed.
- the server After obtaining the location information of the terminal device, the server verifies the location information of the terminal device. Specifically, the server obtains the verification information corresponding to the identifier of the garage management device. The verification information includes the location parameter that needs to be verified and the range corresponding to the location parameter that needs to be verified. The server compares the range corresponding to the location parameter that needs to be verified The obtained location information is verified.
- the location parameters that need to be verified in the verification information include geographic location information and moving speed. The server determines the moving speed of the terminal device according to the geographic location information acquired at least two moments. If it is determined based on the geographic location information of the terminal device that the terminal device is within a predetermined area and the moving speed of the terminal device is less than the preset speed, the verification passes .
- the terminal device may have left the current location when the server obtains the location information of the terminal device, so that the acquired location information cannot reflect the actual location of the terminal device.
- the accuracy of the geographic location information obtained by the server is improved.
- the positioning assistance information includes not only moving speed, but also positioning accuracy and positioning security.
- the terminal device's geographic location information, moving speed, positioning accuracy, and positioning security The location information can be verified only when the range corresponding to the location parameter that needs to be verified is consistent.
- the range corresponding to the geographic location information is the area P in Fig. 7, the positioning accuracy is sub-meter, the positioning security is medium, and the moving speed is less than 15km/h.
- the corresponding positioning accuracy is sub-meter level
- the positioning security is medium
- the moving speed calculated based on the geographic location information of at least two moments is 10km/ h
- the server sends the access token corresponding to the identification of the navigation map to the terminal device.
- the terminal device After obtaining the access token, the terminal device sends the access token to the garage management device, and the garage management device verifies the access token. If the verification passes, the navigation map is sent to the terminal device to facilitate the user to quickly find the parking space.
- the server after the user identity authentication is passed, the server also verifies the geographic location information, positioning accuracy, positioning security, and moving speed of the terminal device, which improves the accuracy of the acquired location information and avoids navigation maps. Send to unrelated terminal equipment.
- the location information of the terminal device can be in other combinations.
- the location information that the server needs to obtain includes the mobile phone’s geographic location information, positioning accuracy, and positioning.
- the location information that the server needs to obtain includes the geographic location information of the mobile phone and the positioning method.
- the location information is verified, the user can open the link to grab the red envelope through the mobile phone.
- FIG. 8 shows a schematic diagram of a specific flow of a resource acquisition method provided in an embodiment of the present application. As shown in FIG. 8, the method includes:
- the terminal device sends resource access request information for accessing the target device to the server, where the resource access request information carries a user identity identifier and an identifier of the resource to be accessed.
- the user identity can be the user's account information, for example, a user name, mobile phone number, email address, etc., or can be an identification code of a terminal device bound to the user's identity.
- the identifier of the resource to be accessed corresponds to the resource to be accessed.
- the identifier of the resource to be accessed can be the uniform resource identifier (URI), the universally unique identifier (UUID) or other forms of identification of the resource to be accessed.
- the access resources are stored on the target device, which can be the status information of the door lock, the phase information of the traffic light, the navigation map or the red envelope link.
- the terminal device may generate resource access request information according to a user's operation on the terminal device, or may generate resource access request information when entering preset geographic location information or entering a preset state.
- S102 The server authenticates the user identity.
- the server authenticates the user ID according to the pre-stored authentication information, for example, searches for whether there is an ID consistent with the user ID in the authentication information, and if it exists, the authentication is passed.
- the server obtains location information of the terminal device, where the location information includes geographic location information and positioning assistance information.
- the server obtains the identity of the terminal device corresponding to the user identity identity, sends a location information acquisition request to the corresponding terminal device, and the terminal device sends the location information to the server.
- the server obtains the identification of the corresponding positioning device according to the user's identity, and sends a location information acquisition request to the corresponding positioning device, and the positioning device sends the detected location information of the terminal device to the server, where:
- the positioning device can be a built-in positioning device in a terminal device, a built-in positioning device in a target device, a positioning device within a predetermined range from the target device, or a built-in positioning device in a third-party server, so that location information can be obtained in different scenarios and products can be added The scope of use.
- the geographic location information may be in multiple formats such as latitude and longitude, street + house number, room, etc.
- positioning auxiliary information may be positioning accuracy, positioning delay, positioning security, positioning mode, moving speed, and/or moving direction.
- the positioning accuracy can be at the centimeter, submeter, meter, ten meter, or hundred meter level.
- the positioning delay is the delay from initiating positioning to obtaining location information.
- Location security refers to whether the specified bit process may be counterfeited, attacked by a man in the middle, or forged.
- the positioning security is related to the positioning method, which includes GPS positioning, Wi-Fi positioning, Bluetooth positioning, UWB positioning, operator base station positioning, visual positioning, radar positioning, etc. Different positioning methods have different positioning accuracy and positioning security.
- UWB positioning has the highest security
- GPS positioning has lower security
- video and radar-based positioning methods have the lowest security.
- positioning accuracy and positioning safety are also related to environmental factors. If the surrounding environmental factors are different, positioning accuracy and positioning safety are also different.
- the GPS positioning accuracy can reach the meter level in an open environment, but it can only reach the ten meter level when there are many urban buildings.
- the moving speed and moving direction are calculated by the terminal device based on the geographic location information at at least two moments. In other feasible implementation manners, the server calculates the moving speed or the moving direction according to the geographic location information of at least two moments sent by the terminal device.
- the server determines whether location verification is required based on the verification information obtained in advance, and if location verification is required, obtain the location that needs to be verified from the verification information Parameter.
- the verification information is the correspondence table shown in Table 1.
- the correspondence table stores the corresponding relationship between the target device identifier, the resource identifier to be accessed, and the location parameter that needs to be verified.
- the target device identifier and the The resource identifier is stored under the access resource field, and the geographic location, positioning accuracy, positioning delay, positioning mode, moving speed, moving direction, and positioning security are the location parameters that need to be verified.
- the server obtains the location parameters that need to be verified from the corresponding relationship table according to the resource identification to be accessed. For example, in Table 1, for the access resource URI1, the location method and moving speed in the location parameters that need to be verified It is NA. The "NA" means that there is no need to verify the positioning method and moving speed.
- the location parameters that need to be verified include geographic location information, positioning accuracy, positioning delay, moving direction, and mobile security, and the server obtains the terminal device The location information, positioning accuracy, positioning delay, moving direction and positioning security of.
- S104 The server verifies the location information of the terminal device.
- the server determines whether the terminal device is within a predetermined area according to the geographic location information, and determines whether the positioning assistance information meets a preset condition.
- the verification information also includes the range corresponding to the location parameter that needs to be verified.
- the access resource is URI2
- the geographic location that needs to be verified The range corresponding to the information is a predetermined area, namely area 2, the range of positioning accuracy is sub-meter, the range of moving speed is ⁇ 15Km/h, and the positioning security is medium.
- the server verifies the location information of the terminal device according to the range corresponding to the location parameter that needs to be verified, and determines whether the location information of the terminal device is consistent with the range corresponding to the location parameter that needs to be verified. For example, if the location parameters that need to be verified include geographic location information, positioning accuracy, and positioning mode, the server calculates the location range of the terminal device based on the geographic location information and positioning accuracy of the terminal device. If the location range of the terminal device is compared with the verification information If the range corresponding to the geographic location information in is consistent, and the positioning method matches the preset positioning method in the verification information, the location information verification passes.
- the location parameter to be verified includes geographic location information and moving direction
- the geographic location information is consistent with the range corresponding to the geographic location information in the verification information, and the moving direction is consistent with the preset direction in the verification information, then The location information is verified.
- S106 The terminal device sends the access token to the target device.
- the target device verifies the access token, and if the verification passes, the target device sends the resource to be accessed corresponding to the resource identifier to be accessed to the terminal device.
- the target device compares the access token with the preset token. If the access token is consistent with the preset token, the verification passes. If the verification passes, the terminal device obtains the identification of the resource to be accessed from the target device. The corresponding resource to be accessed.
- the server when the terminal device accesses the server for the first time, if the location information is verified, the server sends the access token to the terminal device, the terminal device stores the access token, and sends the access token to the target device;
- the terminal device accesses the server next time, if the location information is verified, the server sends the verification pass information to the terminal device, and the terminal device sends the stored access token to the target device according to the verification pass information to reduce the server sending access
- the number of tokens saves the space occupied by the server's resources.
- the server When the terminal device accesses the server for a preset number of times, the server sends a new access token to the terminal device, and at the same time sends the verification information of the new access token to the target device, and the terminal device obtains the target device according to the new access token To improve the security of resource access.
- the terminal device sends the resource access request information to the server.
- the resource access request information carries the user ID and the resource ID to be accessed.
- the server authenticates the user ID, and if the authentication is passed, obtains the location information of the terminal device.
- the server authenticates the location information of the terminal device, and if the authentication is passed, it sends the access token corresponding to the resource identifier to be accessed to the terminal device, that is, in addition to authenticating the user identity, the server also authenticates the location information of the terminal device.
- the terminal device can obtain the access token, and obtain the resource to be accessed corresponding to the resource identification of the resource to be accessed from the target device according to the access token, thereby reducing the need to send the resource to be accessed to a different phase.
- the location information includes geographic location information and positioning assistance information, the accuracy of location information verification is improved, thereby further reducing the probability of sending resources to be accessed to different devices.
- the authentication of the location information and the sending of the access token are performed by the server, it is convenient to update the permissions of the terminal device and the target device synchronously, and prevent the situation that any party fails to update in time and affects the use.
- FIG. 9 shows a schematic flowchart of a resource acquisition method provided by an embodiment of the present application, and the method is executed by the terminal device 100. As shown in Figure 9, the method includes:
- the terminal device sends resource access request information for accessing the target device to the server, where the resource access request information carries a user identity identifier and an identifier of the resource to be accessed.
- the terminal device receives the location information acquisition request corresponding to the user identity sent by the server, and sends the location information of the terminal device to the server, where the location information includes geographic location information and positioning assistance information.
- the terminal device receives the location information acquisition request, and sends the location information to the server.
- the positioning assistance information includes positioning accuracy, positioning delay, positioning mode, moving speed and/or moving direction.
- the terminal device obtains the access token corresponding to the resource identifier to be accessed sent by the server, and obtains the resource to be accessed corresponding to the resource identifier to be accessed from the target device through the access token.
- the terminal device After obtaining the access token, the terminal device sends the access token to the target device, and the target device verifies the access token. If the verification passes, the terminal device obtains the resource to be accessed from the target device, for example, downloads the resource to be accessed. resource.
- the terminal device when the terminal device sends the resource access request information, it sends the user ID and the resource ID to be accessed to the server, and the server authenticates the user ID. If the authentication is passed, the terminal device obtains the location information sent by the server. Request, send the location information of the terminal device to the server, and the server verifies the location information of the terminal device. If the verification passes, the terminal device receives the access token sent by the server, and obtains the resource to be accessed from the target device through the access token. Because the terminal device not only authenticates the user identity, but also verifies the location information of the terminal device before acquiring the resource to be accessed. Only when the location information is verified, the terminal device can obtain the resource to be accessed based on the access token. Improve the security of resource access. Moreover, because the location information includes geographic location information and positioning assistance information, the accuracy of location information verification is improved, and the probability of sending resources to be accessed to different devices is reduced, making the management and control of resources to be accessed more reasonable.
- FIG. 10 shows a schematic flowchart of a resource acquisition method provided in an embodiment of the present application, and the execution body of the method is the server 200. As shown in Figure 10, the method includes:
- the server obtains the resource access request information of the access target device sent by the terminal device, where the resource access request information carries the user identity identifier and the resource to be accessed identifier.
- S302 The server authenticates the user identity.
- the server authenticates the user ID according to the pre-stored authentication information, for example, searches for whether there is an ID consistent with the user ID in the authentication information, and if it exists, the authentication is passed.
- the server obtains the location information of the terminal device.
- the location information includes geographic location information and positioning assistance information.
- the server obtains the location information sent by the terminal device, or obtains the location information of the terminal device collected by the positioning device.
- the positioning assistance information includes positioning accuracy, positioning time delay, positioning mode, moving speed and/or moving direction.
- S304 The server verifies the location information of the terminal device.
- the server obtains verification information corresponding to the identification of the resource to be accessed.
- the verification information includes the location parameter that needs to be verified and the range corresponding to the location parameter that needs to be verified, and the server according to the range corresponding to the location parameter that needs to be verified Verify the location information of the terminal device.
- the server sends the access token to the terminal device to instruct the terminal device to obtain the resource to be accessed corresponding to the resource identification to be accessed from the target device according to the access token.
- the verification is passed. If the verification is passed, the server sends the access token to the terminal device. After the terminal device obtains the access token, it sends the access token to the target device, and the target device verifies the access token. The target device obtains the resource to be accessed corresponding to the resource identifier to be accessed.
- the server when the server obtains the resource access request information sent by the terminal device, it authenticates the resource access request information. If the authentication is passed, it obtains the location information of the terminal device and verifies the location information. The access token is sent to the terminal device, and the terminal device obtains the resource to be accessed according to the access token. In addition to authenticating the user identity, the server also verifies the location information of the terminal device. Only when the location information is verified, the terminal device is allowed to obtain the resource to be accessed, which reduces the need to send the resource to be accessed to unrelated devices. The probability of access to resources, to achieve reasonable management and control of the resources to be accessed, and to improve the security of resource access.
- the location information includes geographic location information and positioning assistance information
- the accuracy of location information verification is improved, and the probability of sending resources to be accessed to different devices is further reduced.
- the authentication of the location information and the sending of the access token are performed by the server, it is convenient to update the permissions of the terminal device and the target device synchronously, and prevent the situation that any party fails to update in time and affects the use.
- FIG. 11 is a schematic structural diagram of a server provided in an embodiment of the application.
- the server 200 provided in this embodiment may include a processor 210, a memory 220, and a network interface 230.
- the processor 210, the memory 220, and the network interface 230 are connected through a communication bus 240.
- the processor 210 may be a central processing unit (Central Processing Unit, CPU), or other general-purpose processors, digital signal processors (Digital Signal Processors, DSPs), application specific integrated circuits (Application Specific Integrated Circuits, ASICs), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
- the processor 210 may include one or more processing units.
- the storage 220 may be an internal storage unit of the server 200, such as a hard disk or a memory of the server 200.
- the memory 220 may also be an external storage device of the server 200, such as a plug-in hard disk equipped on the server 200, a smart memory card (Smart Media Card, SMC), a Secure Digital (SD) card, and a flash memory card (Flash). Card) and so on.
- the storage 220 may also include both an internal storage unit of the server 200 and an external storage device.
- the memory 220 is used to store computer programs and other programs and data required by the server 200.
- the memory 220 can also be used to temporarily store data that has been output or will be output.
- the network interface 230 may be used to send and receive information, and may include a wired interface and/or a wireless interface, and is generally used to establish a communication connection between the server 200 and other electronic devices.
- the network interface 230 may receive location information sent by the terminal device 100, and send an access token to the terminal device 100.
- the server 200 may further include a user interface 250.
- the user interface 250 may include a display (Display) and an input unit such as a keyboard (Keyboard).
- the optional user interface 250 may also include a standard wired interface and a wireless interface.
- the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode, organic light-emitting diode) touch device, etc.
- the display can also be called a display screen or a display unit as appropriate, and is used to display the information processed in the server 200 and to display a visualized user interface.
- FIG. 11 is only an example of a server, and does not constitute a limitation on the server, and may include more or fewer components than shown in the figure, or combine certain components, or arrange different components.
- the server provided in this embodiment can execute the foregoing method embodiments, and its implementation principles and technical effects are similar, and will not be repeated here.
- the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
- the computer program can be stored in a computer-readable storage medium. When executed by the processor, the steps of the foregoing method embodiments can be implemented.
- the computer program includes computer program code, and the computer program code may be in the form of source code, object code, executable file, or some intermediate forms.
- the computer-readable medium may include at least: any entity or device capable of carrying computer program code to the photographing device/electronic device, recording medium, computer memory, read-only memory (ROM, Read-Only Memory), and random access memory (RAM, Random Access Memory), electric carrier signal, telecommunications signal and software distribution medium.
- ROM read-only memory
- RAM random access memory
- electric carrier signal telecommunications signal and software distribution medium.
- U disk mobile hard disk, floppy disk or CD-ROM, etc.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments.
- the disclosed apparatus/network equipment and method may be implemented in other ways.
- the device/network device embodiments described above are only illustrative.
- the division of the modules or units is only a logical function division, and there may be other divisions in actual implementation, such as multiple units.
- components can be combined or integrated into another system, or some features can be omitted or not implemented.
- the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Databases & Information Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (14)
- 一种资源获取方法,其特征在于,包括:终端设备向服务器发送访问目标设备的资源访问请求信息,其中,所述资源访问请求信息中携带有用户身份标识和待访问资源标识;服务器对所述用户身份标识认证通过;服务器获取所述终端设备的位置信息,所述位置信息包括地理位置信息以及定位辅助信息;服务器对所述终端设备的位置信息校验通过;服务器将与所述待访问资源标识对应的访问令牌发送至所述终端设备;终端设备根据所述访问令牌从所述目标设备获取与所述待访问资源标识对应的待访问资源。
- 一种资源获取方法,其特征在于,包括:服务器获取终端设备发送的访问目标设备的资源访问请求信息,其中,所述资源访问请求信息中携带有用户身份标识和待访问资源标识;服务器对所述用户身份标识认证通过;服务器获取所述终端设备的位置信息,所述位置信息包括地理位置信息以及定位辅助信息;服务器对所述终端设备的位置信息校验通过;服务器将与所述待访问资源标识对应的访问令牌发送至所述终端设备,以指示所述终端设备根据所述访问令牌从目标设备获取与所述待访问资源标识对应的待访问资源。
- 如权利要求1或2所述的资源获取方法,其特征在于,所述定位辅助信息包括定位精度、定位时延、定位方式、移动速度和/或移动方向。
- 如权利要求3所述的资源获取方法,其特征在于,所述服务器对所述终端设备的位置信息校验通过,包括:服务器根据所述地理位置信息确定所述终端设备在预定的区域内,且确定所述定位辅助信息符合预设条件。
- 如权利要求4所述的资源获取方法,其特征在于,所述待访问资源为红绿灯的相位信息,所述定位辅助信息包括移动方向;相应的,所述服务器根据所述地理位置信息确定所述终端设备在预定的区域内,且确定所述定位辅助信息符合预设条件,包括:服务器根据所述地理位置信息确定所述终端设备在预定的区域内,且确定所述终端设备的移动方向与预设方向一致。
- 如权利要求5所述的资源获取方法,其特征在于,所述定位辅助信息还包括定位时延,所述确定所述定位辅助信息符合预设条件,还包括:确定所述定位时延小于预设时长。
- 如权利要求4所述的资源获取方法,其特征在于,所述待访问资源为导航地图,所述定位辅助信息包括移动速度;相应的,所述服务器根据所述地理位置信息确定所述终端设备在预定的区域内, 且确定所述定位辅助信息符合预设条件,包括:服务器根据所述地理位置信息确定所述终端设备在预定的区域内,且确定所述终端设备的移动速度小于预设速度。
- 如权利要求3所述的资源获取方法,其特征在于,所述服务器对所述终端设备的位置信息校验通过,包括:服务器根据所述地理位置信息和所述定位辅助信息确定所述终端设备在预定的区域内。
- 如权利要求8所述的资源获取方法,其特征在于,所述待访问资源为门锁的状态信息,所述定位辅助信息包括定位精度;相应的,所述服务器根据所述地理位置信息和所述定位辅助信息确定所述终端设备在预定的区域内,包括:服务器根据所述地理位置信息和所述定位精度计算所述终端设备所在的位置范围,确定所述终端设备所在的位置范围位于预定的区域内。
- 如权利要求1至9任一项所述的资源获取方法,其特征在于,所述服务器获取所述终端设备的位置信息,包括:服务器获取定位装置采集的所述终端设备的位置信息;其中,所述定位装置包括以下至少一项:所述终端设备内置的定位装置、所述目标设备内置的定位装置、距离所述目标设备预定范围内的定位装置以及第三方服务器中内置的定位装置。
- 一种服务器,其特征在于,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机程序,其特征在于,所述处理器执行所述计算机程序时实现如权利要求2至10任一项所述的资源获取方法。
- 一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现如权利要求2至10任一项所述的资源获取方法。
- 一种资源获取系统,其特征在于,包括终端设备、目标设备以及如权利要求11所述的服务器。
- 如权利要求13所述的资源获取系统,其特征在于,所述资源获取系统还包括定位装置。
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US17/920,473 US12395496B2 (en) | 2020-04-23 | 2021-03-11 | Resource obtaining method and system, server, and storage medium |
| EP21793517.0A EP4131045A4 (en) | 2020-04-23 | 2021-03-11 | RESOURCE COLLECTION METHOD AND SYSTEM, SERVER AND STORAGE MEDIUM |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010327138.8A CN113553600B (zh) | 2020-04-23 | 2020-04-23 | 资源获取方法、系统、服务器及存储介质 |
| CN202010327138.8 | 2020-04-23 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2021213061A1 true WO2021213061A1 (zh) | 2021-10-28 |
Family
ID=78101082
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2021/080239 Ceased WO2021213061A1 (zh) | 2020-04-23 | 2021-03-11 | 资源获取方法、系统、服务器及存储介质 |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US12395496B2 (zh) |
| EP (1) | EP4131045A4 (zh) |
| CN (1) | CN113553600B (zh) |
| WO (1) | WO2021213061A1 (zh) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115242775A (zh) * | 2022-07-04 | 2022-10-25 | 中国银联股份有限公司 | 资源文件获取方法、装置、设备、介质及产品 |
| WO2023151005A1 (en) | 2022-02-11 | 2023-08-17 | Zte Corporation | Systems and methods for location verfication |
Families Citing this family (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11736466B2 (en) * | 2019-09-18 | 2023-08-22 | Bioconnect Inc. | Access control system |
| CN114051249B (zh) * | 2022-01-06 | 2022-04-15 | 杭州筋斗腾云科技有限公司 | 基于移动设备的数字化办公系统及方法 |
| CN114969805B (zh) * | 2022-04-18 | 2023-09-19 | 中移互联网有限公司 | 服务查询方法、装置、电子设备及存储介质 |
| CN115343726A (zh) * | 2022-08-15 | 2022-11-15 | 中国联合网络通信集团有限公司 | 无人机定位方法、无人机机载终端和定位服务器 |
| CN119967033B (zh) * | 2023-10-30 | 2026-01-23 | 荣耀终端股份有限公司 | 管理IoT设备的系统、方法及相关装置 |
| CN118803975B (zh) * | 2024-02-04 | 2025-11-04 | 中国移动通信集团浙江有限公司 | 一种通信哑资源位置校准方法和装置 |
| CN118741428A (zh) * | 2024-06-13 | 2024-10-01 | 中国联合网络通信集团有限公司 | 一种位置校验方法及装置 |
| WO2026063866A1 (en) * | 2024-09-19 | 2026-03-26 | Dyna.Ai Technology Pte. Ltd. | Server apparatus, system and method for processing requests for resources |
| CN119729501B (zh) * | 2024-12-23 | 2025-11-25 | 支付宝(杭州)信息技术有限公司 | 基于近场通信的资源获取、发送及信息发送方法和装置 |
| CN120896794B (zh) * | 2025-09-29 | 2026-01-06 | 贵州省电子认证科技有限公司 | 一种安全的mcp协议认证方法及系统 |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102546648A (zh) * | 2012-01-18 | 2012-07-04 | Ut斯达康通讯有限公司 | 一种资源访问授权的方法 |
| CN107222485A (zh) * | 2017-06-14 | 2017-09-29 | 腾讯科技(深圳)有限公司 | 一种授权方法以及相关设备 |
| US20180198775A1 (en) * | 2007-09-04 | 2018-07-12 | Phillip Volini | Controlled token distribution to protect against malicious data and resource access |
| CN110121873A (zh) * | 2017-10-23 | 2019-08-13 | 华为技术有限公司 | 一种访问令牌管理方法、终端和服务器 |
Family Cites Families (25)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4961224A (en) * | 1989-03-06 | 1990-10-02 | Darby Yung | Controlling access to network resources |
| GB0021067D0 (en) * | 2000-08-25 | 2000-10-11 | Tendotcom Ltd | Data communications |
| WO2010032207A1 (en) | 2008-09-17 | 2010-03-25 | International Business Machines Corporation | Authorization of server operations |
| CN102457507B (zh) * | 2010-10-29 | 2016-06-08 | 中兴通讯股份有限公司 | 云计算资源安全共享方法、装置及系统 |
| CN102457509B (zh) * | 2010-11-02 | 2015-09-16 | 中兴通讯股份有限公司 | 云计算资源安全访问方法、装置及系统 |
| US20120169461A1 (en) | 2010-12-31 | 2012-07-05 | Schneider Electric Buildings Ab | Electronic physical access control with remote authentication |
| EP2642778B1 (en) * | 2012-03-22 | 2016-03-16 | BlackBerry Limited | Authentication server and methods for granting tokens comprising location data |
| US9256722B2 (en) * | 2012-07-20 | 2016-02-09 | Google Inc. | Systems and methods of using a temporary private key between two devices |
| EP2738996A1 (en) * | 2012-11-30 | 2014-06-04 | Gemalto SA | Method, device and system for accessing a server |
| CN104767717B (zh) | 2014-01-03 | 2019-01-29 | 腾讯科技(深圳)有限公司 | 身份验证方法及装置 |
| CN105100007A (zh) * | 2014-05-08 | 2015-11-25 | 国际商业机器公司 | 用于控制资源访问的方法和装置 |
| US9641522B1 (en) * | 2014-11-11 | 2017-05-02 | Amazon Technologies, Inc. | Token management in a managed directory service |
| EP3029960A1 (en) * | 2014-12-05 | 2016-06-08 | Greenspider gmbh | Resource control apparatus, server apparatus and method for controlling a resource |
| CN106921636B (zh) * | 2015-12-28 | 2020-05-08 | 华为技术有限公司 | 身份认证方法及装置 |
| CN107452095B (zh) | 2016-03-18 | 2020-08-11 | 阿里巴巴集团控股有限公司 | 一种用于开启门锁的方法和设备 |
| CN106570421A (zh) * | 2016-10-28 | 2017-04-19 | 努比亚技术有限公司 | 权限控制装置和方法 |
| US10547965B2 (en) * | 2016-11-21 | 2020-01-28 | Beijing DIDI Infinity Technology and Development Co., Ltd | Systems and methods for performing location-based actions |
| GB2558589A (en) * | 2017-01-09 | 2018-07-18 | Jaguar Land Rover Ltd | Vehicle entry system |
| US10148668B2 (en) * | 2017-01-25 | 2018-12-04 | Ca, Inc. | Geolocation-based authentication credentials |
| CN106686538B (zh) | 2017-02-24 | 2020-04-03 | 金华市兴飞机器人有限公司 | 一种基于定位、蓝牙以及网络的验证方法 |
| CN106973082B (zh) * | 2017-03-07 | 2020-02-18 | 广州酷狗计算机科技有限公司 | 资源标识分享方法及装置 |
| KR102383792B1 (ko) * | 2017-03-16 | 2022-04-08 | 삼성전자주식회사 | 도어락 장치 및 도어락 장치의 제어 방법 |
| US20190043359A1 (en) * | 2017-08-03 | 2019-02-07 | Laird Technologies, Inc. | Sensor-equipped traffic safety message systems and related methods |
| KR102499917B1 (ko) | 2017-12-07 | 2023-02-16 | 삼성전자주식회사 | 측위를 수행하는 전자 장치 및 전자 장치의 제어 방법 |
| CN109902499A (zh) * | 2019-03-13 | 2019-06-18 | 广州市网星信息技术有限公司 | 一种资源授权和访问方法、装置、系统、设备和存储介质 |
-
2020
- 2020-04-23 CN CN202010327138.8A patent/CN113553600B/zh active Active
-
2021
- 2021-03-11 EP EP21793517.0A patent/EP4131045A4/en active Pending
- 2021-03-11 US US17/920,473 patent/US12395496B2/en active Active
- 2021-03-11 WO PCT/CN2021/080239 patent/WO2021213061A1/zh not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20180198775A1 (en) * | 2007-09-04 | 2018-07-12 | Phillip Volini | Controlled token distribution to protect against malicious data and resource access |
| CN102546648A (zh) * | 2012-01-18 | 2012-07-04 | Ut斯达康通讯有限公司 | 一种资源访问授权的方法 |
| CN107222485A (zh) * | 2017-06-14 | 2017-09-29 | 腾讯科技(深圳)有限公司 | 一种授权方法以及相关设备 |
| CN110121873A (zh) * | 2017-10-23 | 2019-08-13 | 华为技术有限公司 | 一种访问令牌管理方法、终端和服务器 |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2023151005A1 (en) | 2022-02-11 | 2023-08-17 | Zte Corporation | Systems and methods for location verfication |
| EP4397098A4 (en) * | 2022-02-11 | 2024-10-23 | ZTE Corporation | LOCATION VERIFICATION SYSTEMS AND METHODS |
| CN115242775A (zh) * | 2022-07-04 | 2022-10-25 | 中国银联股份有限公司 | 资源文件获取方法、装置、设备、介质及产品 |
Also Published As
| Publication number | Publication date |
|---|---|
| US20230208850A1 (en) | 2023-06-29 |
| CN113553600B (zh) | 2024-06-14 |
| EP4131045A4 (en) | 2023-09-13 |
| US12395496B2 (en) | 2025-08-19 |
| CN113553600A (zh) | 2021-10-26 |
| EP4131045A1 (en) | 2023-02-08 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN113553600B (zh) | 资源获取方法、系统、服务器及存储介质 | |
| US12052357B2 (en) | Smart lock unlocking method and related device | |
| CN113132962B (zh) | 蓝牙扫描方法和电子设备 | |
| CN113225690B (zh) | 蓝牙连接方法、系统和电子设备 | |
| CN113015161B (zh) | 认证方法及其介质和电子设备 | |
| US9445267B2 (en) | Bump or close proximity triggered wireless technology | |
| CN111465536B (zh) | 一种业务处理方法及设备 | |
| EP4102927B1 (en) | Dual wifi connection | |
| JP2023527408A (ja) | 検証方法および装置 | |
| CN114510178B (zh) | 一种共享数据分发方法及电子设备 | |
| WO2022135196A1 (zh) | 终端定位的方法及终端 | |
| WO2021147419A1 (zh) | 一种数据传输方法、电子设备及存储介质 | |
| CN119452353A (zh) | 共享文件的方法、电子设备及计算机可读存储介质 | |
| US20230400592A1 (en) | Positioning method and related apparatus | |
| CN106028284A (zh) | 识别智能设备之间相对位置的方法及智能设备 | |
| WO2024093857A1 (zh) | 一种定位方法及相关装置 | |
| CN115761938A (zh) | 车辆解锁的方法、装置、设备、存储介质和程序产品 | |
| US11640453B2 (en) | User authentication facilitated by an additional device | |
| CN116486513B (zh) | 开锁方法、电子设备及系统 | |
| US20250016732A1 (en) | Collaborative ranging method and apparatus, communication device and storage medium | |
| CN115884072A (zh) | 一种基于uwb的定位寻车方法和系统 | |
| CN114077732B (zh) | 资源访问控制方法、终端设备及计算机可读存储介质 | |
| CN120234071A (zh) | 设备登录方法、电子设备及车辆 | |
| CN119342137A (zh) | 接续导航的方法和装置 | |
| WO2021135659A1 (zh) | 车辆信息的推送方法、装置、用户账号服务器和用户设备 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21793517 Country of ref document: EP Kind code of ref document: A1 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 202217061229 Country of ref document: IN |
|
| ENP | Entry into the national phase |
Ref document number: 2021793517 Country of ref document: EP Effective date: 20221025 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWG | Wipo information: grant in national office |
Ref document number: 17920473 Country of ref document: US |
|
| WWG | Wipo information: grant in national office |
Ref document number: 202217061229 Country of ref document: IN |
