SMART HOME CONTROL METHOD
    1.
    发明申请

    公开(公告)号:US20240385595A1

    公开(公告)日:2024-11-21

    申请号:US18692614

    申请日:2022-09-13

    Abstract: A central control device identifies an identity of a user, and determines, based on the identity of the user, a smart home linkage solution associated with the identity of the user. Then, the central control device controls, based on the smart home linkage solution associated with the identity of the user, a public smart home device to enter a corresponding operating mode. When receiving a first operation of the user, the central control device controls, based on the smart home linkage solution associated with the identity of the user, the public smart home device to enter the corresponding operating mode.

    Application Management Method and Related Apparatus

    公开(公告)号:US20240414261A1

    公开(公告)日:2024-12-12

    申请号:US18768576

    申请日:2024-07-10

    Abstract: In an application management method, where when an application (APP) requests to invoke a system capability, an electronic device may determine whether a user is informed that the APP requests to invoke the system capability. If the user is informed that the APP requests to invoke the system capability, the electronic device may allow the APP to invoke the system capability. Otherwise, the electronic device may ask the user whether to agree with the APP to invoke the system capability, and allow the APP to invoke the system capability if the user agrees, or refuse to allow the APP to invoke the system capability if the user does not agree.

    Identity Authentication Method and Vehicle

    公开(公告)号:US20240386083A1

    公开(公告)日:2024-11-21

    申请号:US18687627

    申请日:2022-08-15

    Abstract: An identity authentication method and a vehicle provide authentication of a user identity in a first authentication manner enabling permission to use a first function of the vehicle when the first authentication succeeds. The first authentication manner may include at least one of vehicle key authentication, password authentication, biological feature authentication, or connected device authentication. First driving data is collected and a second authentication is performed based on the first driving data. Permission to use the first function is disabled when the second authentication fails and is continued when the second authentication succeeds.

Patent Agency Ranking