CN107205094B - Control method and device, electronic equipment, the terminal of equipment - Google Patents

Control method and device, electronic equipment, the terminal of equipment Download PDF

Info

Publication number
CN107205094B
CN107205094B CN201710516170.9A CN201710516170A CN107205094B CN 107205094 B CN107205094 B CN 107205094B CN 201710516170 A CN201710516170 A CN 201710516170A CN 107205094 B CN107205094 B CN 107205094B
Authority
CN
China
Prior art keywords
password
controlled device
terminal
identity information
control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710516170.9A
Other languages
Chinese (zh)
Other versions
CN107205094A (en
Inventor
徐甘来
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201710516170.9A priority Critical patent/CN107205094B/en
Publication of CN107205094A publication Critical patent/CN107205094A/en
Application granted granted Critical
Publication of CN107205094B publication Critical patent/CN107205094B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72415User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Selective Calling Equipment (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of control method and device of equipment, electronic equipment, terminals.Wherein, this method comprises: controlled device receives the control information that terminal is sent;The controlled device sends the identity information of the controlled device to the terminal;The controlled device receives the first password that the terminal is returned according to the identity information;After the first password is verified, the controlled device executes operation corresponding with the control information according to the control information.The present invention solves the technical issues of cannot effectively being managed the control authority of air-conditioning in the related technology.

Description

Control method and device, electronic equipment, the terminal of equipment
Technical field
The present invention relates to equipment control fields, set in particular to a kind of control method and device of equipment, electronics Standby, terminal.
Background technique
As technology of Internet of things is more and more flourishing, intelligent domestic progresses into people's lives, for more convenient control These electronic equipments, mobile phone become the communication apparatus that can replace traditional remote controller for one, such as example can be on mobile phone Corresponding airconditioning control software is installed.Anywhere mobile phone user can pass through airconditioning control software control air-conditioning.But this A problem is brought, the owner of some air-conditionings is not intended to other people to change the setting parameter of oneself air-conditioning, especially exists Public domain as market and dining room, they can sometimes stick on air-conditioning writes " being forbidden to use mobile phone control air-conditioning " etc. The brief note of printed words prevents this kind of event from occurring, not only troublesome, and has an effect on user experience.A lot of other electronics households There is same problem.
For above-mentioned problem, currently no effective solution has been proposed.
Summary of the invention
The embodiment of the invention provides a kind of control method and device of equipment, electronic equipment, terminals, at least to solve phase The technical issues of control authority of air-conditioning cannot effectively being managed in the technology of pass.
According to an aspect of an embodiment of the present invention, a kind of control method of equipment is provided, comprising: controlled device receives The control information that terminal is sent;The controlled device sends the identity information of the controlled device to the terminal;It is described controlled Equipment receives the first password that the terminal is returned according to the identity information;It is described after the first password is verified Controlled device executes operation corresponding with the control information according to the control information.
Optionally, before the controlled device sends the identity information of the controlled device to the terminal, the method Further include: the controlled device judges whether the controlled device needs to carry out password authentification, wherein in judging result for yes In the case of, trigger the identity information that the controlled device sends the controlled device to the terminal.
Optionally, it in the case where the judging result is no, triggers the controlled device and executes and the control information Corresponding operation.
Optionally, the method also includes: when the password authentification does not pass through, the controlled device is returned to the terminal It is back to the prompt information for prompting the first password not verified.
Optionally, the controlled device returns to the prompt for prompting the first password not verified to the terminal After information, the method also includes: the controlled device receives the second password of the terminal feedback, wherein described second Password is the updated password that the terminal is fed back after receiving the prompt information.
Another aspect according to an embodiment of the present invention provides the control method of another equipment, comprising: terminal receives The identity information that controlled device is sent;The terminal obtains password corresponding with the identity information, wherein the password is used for Verify whether the terminal has control authority to the controlled device;The password is sent to described controlled by the terminal Equipment.
Optionally, before terminal receives the identity information that controlled device is sent, the method also includes: the terminals to institute It states controlled device and sends control information;Wherein, the control information is used to indicate the controlled device and executes and believes with the control Cease corresponding operation.
Optionally, it includes: the terminal from local data base that the terminal, which obtains password corresponding with the identity information, It is middle to search password corresponding with the identity information;Alternatively, the terminal receives password currently entered.
Optionally, before the terminal receives password currently entered, the method also includes: described in the terminal determines The corresponding password of the not stored identity information in the local data base of terminal;The terminal generates prompt information, wherein this is mentioned Show that information is used to indicate the corresponding password of the not stored identity information in the local data base of the terminal.
Another aspect according to an embodiment of the present invention, provides a kind of electronic equipment, comprising: communication module, for connecing Receive the control information that terminal is sent;The identity information of the controlled device is sent to the terminal;And receive the terminal according to The first password returned according to the identity information;Controller, for being verified to the first password, and it is close described first After code is verified, operation corresponding with the control information is executed according to the control information.
Another aspect according to an embodiment of the present invention provides a kind of terminal, comprising: communication module, for receiving quilt The identity information that equipment is sent is controlled, and the password that controller obtains is sent to controlled device;Controller, for acquisition and institute State the corresponding password of identity information, wherein the password is used to verify whether the terminal has control to the controlled device Permission processed.
Another aspect according to an embodiment of the present invention, provides a kind of storage medium, and the storage medium includes storage Program, wherein described program operation when control the storage medium where equipment execute the apparatus described above control Method.
Another aspect according to an embodiment of the present invention provides a kind of processor, and the processor is used to run program, Wherein, the control method of the apparatus described above is executed when described program is run.
Another aspect according to an embodiment of the present invention provides a kind of control device of equipment, comprising: first receives mould Block, for receiving the control information of terminal transmission;Sending module, the identity for sending the controlled device to the terminal are believed Breath;Second receiving module, the first password returned for receiving the terminal according to the identity information;Execution module is used for After the first password is verified, the controlled device executes corresponding with the control information according to the control information Operation.
Another aspect according to an embodiment of the present invention provides a kind of control device of equipment, comprising: receiving module, For receiving the identity information of controlled device transmission;Module is obtained, for obtaining password corresponding with the identity information, In, the password is used to verify whether the terminal has control authority to the controlled device;Sending module is used for institute It states password and is sent to the controlled device.
In embodiments of the present invention, it is verified using the password that controlled device sends terminal, and after being verified The mode for executing operation corresponding to the control information that terminal is sent has reached and has been controlled the control authority of controlled device Purpose, to realize the technical effect for guaranteeing the safety in utilization of controlled device, and then solving in the related technology cannot be right The technical issues of control authority of air-conditioning is effectively managed.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes part of this application, this hair Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is the structural schematic diagram according to a kind of electronic equipment of the embodiment of the present application;
Fig. 2 is a kind of flow diagram of the control method of equipment according to an embodiment of the present invention;
Fig. 3 is the flow diagram of the control method of another equipment according to an embodiment of the present invention;
Fig. 4 is the structural schematic diagram according to a kind of control device of equipment of the embodiment of the present invention;
Fig. 5 is the structural schematic diagram according to a kind of terminal of the embodiment of the present invention;
Fig. 6 is the flow chart according to the control method of another equipment of the embodiment of the present invention;And
Fig. 7 is the structural schematic diagram according to the control device of another equipment of the embodiment of the present invention.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people The model that the present invention protects all should belong in member's every other embodiment obtained without making creative work It encloses.
It should be noted that description and claims of this specification and term " first " in above-mentioned attached drawing, " Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way Data be interchangeable under appropriate circumstances, so as to the embodiment of the present invention described herein can in addition to illustrating herein or Sequence other than those of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that cover Cover it is non-exclusive include, for example, the process, method, system, product or equipment for containing a series of steps or units are not necessarily limited to Step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, product Or other step or units that equipment is intrinsic.
Fig. 1 is the structural schematic diagram according to a kind of electronic equipment of the embodiment of the present application.As shown in Figure 1, the electronic equipment, Include:
Communication module 10, for receiving the control information of terminal transmission;The body of above-mentioned controlled device is sent to above-mentioned terminal Part information;And receive the first password that above-mentioned terminal is returned according to above-mentioned identity information.
Optionally, which includes but is not limited to: ethernet communication module, mobile Internet communication module etc. Deng, but not limited to this.Above-mentioned identity information includes but is not limited to the mark of controlled device, such as the IP address of controlled device, quilt The MAC Address etc. of equipment is controlled, but not limited to this.
In one alternate embodiment, above-mentioned terminal can be intelligent terminal, for example, mobile phone, tablet computer etc..
Controller 12, for being verified to above-mentioned first password, and after above-mentioned first password is verified, according to upper It states control information and executes operation corresponding with above-mentioned control information.
As the alternative embodiment of the application, operation corresponding to above-mentioned control information includes but is not limited to open quilt Control equipment, close controlled device, adjust controlled device operating parameter (for example, controlled device be air-conditioning when, adjust its setting Temperature, adjust its operating mode etc.).
According to embodiments of the present invention, a kind of embodiment of the method for the control method of equipment is provided, this method can be run In electronic equipment shown in FIG. 1, but it is not limited to the structure of electronic equipment shown in Fig. 1, such as may include than electronics shown in Fig. 1 The more structure features of equipment.It should be noted that step shown in the flowchart of the accompanying drawings can be in such as one group of computer It is executed in the computer system of executable instruction, although also, logical order is shown in flow charts, in certain situations Under, it can be with the steps shown or described are performed in an order that is different from the one herein.
Fig. 2 is a kind of flow diagram of the control method of equipment according to an embodiment of the present invention, as shown in Fig. 2, the party Method includes the following steps:
Step S202, controlled device receive the control information that terminal is sent;
Wherein, above-mentioned controlled device can be verified before the identity information for sending above-mentioned controlled device to above-mentioned terminal Whether open or be provided with password authentification mode, for example, do not need to be configured airconditioning control permission scene (such as The occasions such as household), password authentification mode can be closed, at this point, directly executing corresponding after controlled device receives control information Operation;In some public places, such as in some megastore places, then above-mentioned password authentification can be set for controlled device Mode.Specifically, following implemented process can be shown as, but not limited to this: controlled device judges whether the controlled device needs Carry out password authentification, wherein in the case where the judgment result is yes, trigger above-mentioned controlled device to above-mentioned terminal and send above-mentioned quilt Control the identity information of equipment;In the case where above-mentioned judging result is no, triggers above-mentioned controlled device and execute and believe with above-mentioned control Cease corresponding operation.
Step S204, controlled device send the identity information of above-mentioned controlled device to above-mentioned terminal;
The identity information includes but is not limited to mark of controlled device, such as the MAC Address of controlled device etc..
Step S206, controlled device receive the first password that above-mentioned terminal is returned according to above-mentioned identity information;
Terminal locally can safeguard the mapping relations of password and controlled device, such as can safeguard a mapping relations Table is utilizing above-mentioned mapping relationship searching password corresponding with above-mentioned identity information after receiving the identity information of controlled device, Then the password return value controlled device that will be found.
Step S208, after above-mentioned first password is verified, above-mentioned controlled device according to above-mentioned control information execute with The corresponding operation of above-mentioned control information.Operation corresponding with above-mentioned control information includes but is not limited to close, restart, adjusting operation Parameter etc..
Optionally, when above-mentioned password authentification does not pass through, above-mentioned controlled device returns above-mentioned for prompting to above-mentioned terminal The not verified prompt information of first password.
Above-mentioned controlled device to above-mentioned terminal return prompt information for prompting above-mentioned first password not verified it Afterwards, above-mentioned controlled device receives the second password of above-mentioned terminal feedback, wherein above-mentioned second password is above-mentioned terminal on receiving State the updated password fed back after prompt information.
In one alternate embodiment, to realize the management to the control authority of controlled device, can to controlled device into Row improves:
Improvement is made on hardware first, needs to increase whether memory ' is arranged for storing on the electronic equipment controlled Password ' and ' password ' two parameters.And the control program of mobile phone mobile terminal is also required to be become both from one-side transmission information The both-way communication of transmittable also accessible information.
The control password of controlled device owner's manual setting equipment: if (1) being not provided with password, ' whether password is set ' Parameter is 0;(2) if setting password, ' whether password being arranged ' parameter is 1, and ' password ' parameter is used to store the password of setting.
In one alternate embodiment, above-mentioned controlled device includes but is not limited to the household electrical appliance such as air-conditioning, TV, refrigerator, It is readily applicable to some commerical appliances.By taking mobile phone controls air-conditioning as an example:
After mobile phone sends control information to equipment, equipment first will judge whether oneself is provided with password, if it is not, It directly receives control information and responds.If be provided with password, will to mobile phone returning equipment identity information and want Mobile phone is asked to send password, whether mobile phone stores the password of the equipment according to the inquiry of the identity information of equipment, if can inquire close Code, directly transmits password and is verified, being proved to be successful air-conditioning will respond.If password mistake or mobile phone do not store The equipment, it is necessary to which controller changes or inputs password and be sent to controlled device, and device authentication can successfully return to control Successful information is made, and saves the newest password of the controlled device.
Control flow is elaborated below in conjunction with Fig. 3, as shown in Figure 3, comprising:
Step S302 receives the instruction of user, starts the mobile phone control software installed in mobile phone, issues control instruction;
Step S304 after controlled device receives order, detects whether to be provided with password;If so, going to step S306, otherwise Go to step S308;
Step S306, controlled device issue response message, include the identity information of the equipment in response message, and to mobile phone Request sends password, goes to step S310;
Step S308, controlled device receives control command, and makes corresponding movement;
Step S310, controlled device find the password of the equipment according to the identity information received;
Step S312, judges whether mobile phone stores the identity information and corresponding password of the equipment, if it is, S314 is gone to step, otherwise, goes to step S322;
Step S314, mobile phone send password to equipment and are verified, and go to step S316;
Step S316, controlled device judge whether password matches, if so, going to step S318, otherwise go to step S320;
Step S318, controlled device make a response according to control command, and return to the successful information of control;
Step S320, controlled device return to password error message, it is desirable that user inputs correct password.User, which inputs, to complete Afterwards, mobile phone sends the password to equipment;
Step S322, mobile phone receives the device password of controller's input, and after the completion of input, mobile phone changes close to equipment transmission Code;
Step S324, controlled device judge whether password matches again;
Step S326, controlled device make a response according to control command, and return to the successful information of control;
Step S328, after the successful information for receiving control, mobile phone saves the equipment identity information and password, Yong Huke With the customized identity information for naming the equipment.
Fig. 4 is the structural schematic diagram according to a kind of control device of equipment of the embodiment of the present invention.The device for realizing Method shown in Fig. 2, as shown in figure 4, the device comprises the following modules:
First receiving module 40, for receiving the control information of terminal transmission;
Sending module 42, for sending the identity information of controlled device to terminal;
Second receiving module 44, the first password returned for receiving terminal according to identity information;
Execution module 46, for after first password is verified, controlled device is executed according to control information and control is believed Cease corresponding operation.
It should be noted that above-mentioned modules can be realized by software or hardware, for the latter, can by with Under type is realized: above-mentioned modules can be located in same processor;Alternatively, the mode of above-mentioned modules in any combination In different processors.
Fig. 5 is the structural schematic diagram according to a kind of terminal of the embodiment of the present invention.As shown in figure 5, the terminal includes:
Communication module 50 is sent for receiving the identity information of controlled device transmission, and by the password of controller acquisition To controlled device;
Controller 52 is connected to communication module 50, for obtaining password corresponding with above-mentioned identity information, wherein above-mentioned Password is used to verify whether above-mentioned terminal has control authority to above-mentioned controlled device.
Fig. 6 is the flow chart according to the control method of another equipment of the embodiment of the present invention.This method can be run on In terminal shown in fig. 5, but not limited to this.As shown in fig. 6, this method comprises:
Step S602, terminal receive the identity information that controlled device is sent;
In one alternate embodiment, before terminal receives the identity information that controlled device is sent, above-mentioned terminal is to above-mentioned Controlled device sends control information;Wherein, above-mentioned control information is used to indicate above-mentioned controlled device and executes and above-mentioned control information Corresponding operation.
Step S604, terminal obtain password corresponding with above-mentioned identity information, wherein above-mentioned password is for verifying above-mentioned end Whether end has the control authority to above-mentioned controlled device;
The step can be accomplished by the following way, but not limited to this: terminal is searched and above-mentioned body from local data base The corresponding password of part information;Alternatively, terminal receives password currently entered.
Above-mentioned password is sent to above-mentioned controlled device by step S606, terminal.
In one alternate embodiment, before above-mentioned terminal receives password currently entered, above-mentioned terminal determines above-mentioned end The corresponding password of not stored above-mentioned identity information in the local data base at end;Above-mentioned terminal generates prompt information, wherein the prompt Information is used to indicate the corresponding password of not stored above-mentioned identity information in the local data base of above-mentioned terminal.
Fig. 7 is the structural schematic diagram according to the control device of another equipment of the embodiment of the present invention.As shown in fig. 7, should Device includes: receiving module 70, for receiving the identity information of controlled device transmission;Module 72 is obtained, for acquisition and identity The corresponding password of information, wherein password is used to verify whether terminal has control authority to controlled device;Sending module 74, For password to be sent to controlled device.
It should be noted that above-mentioned modules can be realized by software or hardware, for the latter, can by with Under type is realized: above-mentioned modules can be located in same processor;Alternatively, the mode of above-mentioned modules in any combination In different processors.
The embodiment of the present application also provides a kind of storage medium, and above-mentioned storage medium includes the program of storage, wherein above-mentioned Equipment program controls above-mentioned storage medium when running where executes the control method of the equipment of Fig. 2 or embodiment illustrated in fig. 6.
Optionally, above-mentioned storage medium is used to store the program for executing following functions: controlled device judges that controlled device is It is no to need to carry out password authentification, wherein in the case where the judgment result is yes, triggering controlled device sends controlled device to terminal Identity information.
Optionally, above-mentioned storage medium is used to store the program for executing following functions: if the determination result is NO, It triggers controlled device and executes operation corresponding with control information.
Optionally, above-mentioned storage medium is used to store the program for executing following functions: when password authentification does not pass through, being controlled Equipment returns to the prompt information for prompting first password not verified to terminal.
Optionally, above-mentioned storage medium is used to store the program for executing following functions: controlled device receives terminal feedback Second password, wherein the second password is the updated password that terminal is fed back after receiving prompt information.
Alternatively,
Above-mentioned storage medium is used to store the program for executing following functions: terminal receives the identity letter that controlled device is sent Breath;Terminal obtains password corresponding to the identity information, wherein password is used to verify whether terminal to have control to controlled device Permission;Password is sent to controlled device by terminal.
Optionally, above-mentioned storage medium is used to store the program for executing following functions: terminal sends to controlled device and controls Information;Wherein, control information is used to indicate controlled device and executes operation corresponding with control information.
Optionally, above-mentioned storage medium is used to store the program for executing following functions: terminal is searched from local data base Password corresponding to the identity information;Alternatively, terminal receives password currently entered.
Optionally, above-mentioned storage medium is used to store the program for executing following functions: terminal determines the local data of terminal The corresponding password of not stored identity information in library;Terminal generates prompt information, wherein the prompt information is used to indicate the sheet of terminal The corresponding password of not stored identity information in ground database.
The embodiment of the present application also provides a kind of processor, and the processor is for running program, wherein when above procedure is run Execute the control method of the equipment of Fig. 2 or embodiment illustrated in fig. 6.
Optionally, above-mentioned processor is used to run the program for realizing following functions: whether controlled device judges controlled device It needs to carry out password authentification, wherein in the case where the judgment result is yes, triggering controlled device sends controlled device to terminal Identity information.
Optionally, above-mentioned processor is used to run the program for realizing following functions: if the determination result is NO, touching It sends out controlled device and executes operation corresponding with control information.
Optionally, above-mentioned processor is used to run the program for realizing following functions: controlled to set when password authentification does not pass through The standby prompt information returned to terminal for prompting first password not verified.
Optionally, above-mentioned processor is used to run the program for realizing following functions: controlled device receives that terminal is fed back Two passwords, wherein the second password is the updated password that terminal is fed back after receiving prompt information.
Alternatively,
Above-mentioned processor is used to run the program for realizing following functions: terminal receives the identity information that controlled device is sent; Terminal obtains password corresponding to the identity information, wherein password is used to verify whether terminal to have control to controlled device Limit;Password is sent to controlled device by terminal.
Optionally, above-mentioned processor is used to run the program for realizing following functions: terminal sends control letter to controlled device Breath;Wherein, control information is used to indicate controlled device and executes operation corresponding with control information.
Optionally, above-mentioned processor be used for run realize following functions program: terminal searched from local data base and The corresponding password of identity information;Alternatively, terminal receives password currently entered.
Optionally, above-mentioned processor is used to run the program for realizing following functions: terminal determines the local data base of terminal In the corresponding password of not stored identity information;Terminal generates prompt information, wherein the prompt information is used to indicate the local of terminal The corresponding password of not stored identity information in database.
Using the embodiment of the present application, it can allow the owner of electronic equipment that password is set for the equipment of oneself, if do not set It sets, can be controlled by owner, to improve the safety that electronic equipment uses.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
In the above embodiment of the invention, it all emphasizes particularly on different fields to the description of each embodiment, does not have in some embodiment The part of detailed description, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed technology contents can pass through others Mode is realized.Wherein, the apparatus embodiments described above are merely exemplary, such as the division of unit, can be one kind Logical function partition, there may be another division manner in actual implementation, such as multiple units or components can combine or can To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of unit or module, It can be electrical or other forms.
Unit may or may not be physically separated as illustrated by the separation member, shown as a unit Component may or may not be physical unit, it can and it is in one place, or may be distributed over multiple units On.It can some or all of the units may be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
It, can if integrated unit is realized in the form of SFU software functional unit and when sold or used as an independent product To be stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention substantially or Say that all or part of the part that contributes to existing technology or the technical solution can embody in the form of software products Out, which is stored in a storage medium, including some instructions are used so that a computer equipment (can be personal computer, server or network equipment etc.) executes all or part of step of each embodiment method of the present invention Suddenly.And storage medium above-mentioned includes: USB flash disk, read-only memory (ROM, Read-Only Memory), random access memory The various media that can store program code such as (RAM, Random Access Memory), mobile hard disk, magnetic or disk.
The above is only the preferred embodiment of the present invention, it is noted that those skilled in the art are come It says, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications also should be regarded as Protection scope of the present invention.

Claims (13)

1. a kind of control method of equipment characterized by comprising
Controlled device receives the control information that terminal is sent;
The controlled device sends the identity information of the controlled device to the terminal;
The controlled device receives the first password that the terminal is returned according to the identity information;
After the first password is verified, the controlled device executes and the control information pair according to the control information The operation answered;
Wherein, before the controlled device sends the identity of the controlled device to the terminal, the method also includes:
The controlled device judges whether the controlled device needs to carry out password authentification, wherein in the feelings that judging result is yes Under condition, the identity information that the controlled device sends the controlled device to the terminal is triggered;
" whether password is set " and " password " two parameters are stored on the controlled device.
2. the method according to claim 1, wherein in the case where the judging result is no, described in triggering Controlled device executes operation corresponding with the control information.
3. method according to any one of claim 1 to 2, which is characterized in that the method also includes:
When the password authentification does not pass through, the controlled device is returned to the terminal for prompting the first password not test Demonstrate,prove the prompt information passed through.
4. according to the method described in claim 3, it is characterized in that, the controlled device is returned to the terminal for prompting After stating the not verified prompt information of first password, the method also includes:
The controlled device receives the second password of the terminal feedback, wherein second password is that the terminal is receiving The updated password fed back after the prompt information.
5. a kind of control method of equipment characterized by comprising
Terminal receives the identity information that controlled device is sent;
The terminal obtains password corresponding with the identity information, wherein the password is for verifying whether the terminal has There is the control authority to the controlled device;
The password is sent to the controlled device by the terminal;
Wherein, terminal acquisition password corresponding with the identity includes:
The terminal searches password corresponding with the identity information from local data base;Alternatively,
The terminal receives password currently entered;
Wherein, " whether password is set " and " password " two parameters are stored on the controlled device.
6. according to the method described in claim 5, it is characterized in that, terminal receive controlled device send identity information before, The method also includes:
The terminal sends control information to the controlled device;Wherein, the control information is used to indicate the controlled device Execute operation corresponding with the control information.
7. described according to the method described in claim 5, it is characterized in that, before the terminal receives password currently entered Method further include:
The terminal determines the corresponding password of the not stored identity information in the local data base of the terminal;
The terminal generates prompt information, wherein the prompt information is used to indicate not stored in the local data base of the terminal The corresponding password of the identity information.
8. a kind of electronic equipment characterized by comprising
Communication module, for receiving the control information of terminal transmission;The identity information of controlled device is sent to the terminal;And Receive the first password that the terminal is returned according to the identity information;
Controller, for being verified to the first password, and after the first password is verified, according to the control Information executes operation corresponding with the control information;
The controller is also used to judge whether the controlled device needs to carry out password authentification, wherein in judging result is yes In the case where, trigger the identity information that the controlled device sends the controlled device to the terminal;
Wherein, the electronic equipment is also used to store " whether password being arranged " and " password " two parameters.
9. a kind of terminal characterized by comprising
Communication module, for receive controlled device transmission identity information, and by controller obtain password be sent to it is controlled Equipment;
Controller, for obtaining password corresponding with the identity information, wherein whether the password is for verifying the terminal With the control authority to the controlled device;
Wherein, the controller for obtaining password corresponding with the identity information in the following manner: from terminal local number According to searching the corresponding password of the identity information in library;Alternatively, receiving password currently entered;
Wherein, " whether password is set " and " password " two parameters are stored on the controlled device.
10. a kind of storage medium, which is characterized in that the storage medium includes the program of storage, wherein run in described program When control the storage medium where equipment perform claim require any one of 1 to 7 described in equipment control method.
11. a kind of processor, which is characterized in that the processor is for running program, wherein right of execution when described program is run Benefit require any one of 1 to 7 described in equipment control method.
12. a kind of control device of equipment characterized by comprising
First receiving module, for receiving the control information of terminal transmission;
Sending module, for sending the identity information of controlled device to the terminal;
Second receiving module, the first password returned for receiving the terminal according to the identity information;
Execution module, for after the first password is verified, the controlled device according to the control information execute with The corresponding operation of the control information;
Wherein, the execution module be also used to the controlled device to the terminal send the controlled device identity it Before, judge whether the controlled device needs to carry out password authentification, wherein in the case where the judgment result is yes, described in triggering Controlled device sends the identity information of the controlled device to the terminal;
Wherein, the control device is also used to store " whether password being arranged " and " password " two ginsengs on the controlled device Number.
13. a kind of control device of equipment characterized by comprising
Receiving module, for receiving the identity information of controlled device transmission;
Module is obtained, for obtaining password corresponding with the identity information, wherein the password is for verifying whether terminal has There is the control authority to the controlled device;
Sending module, for the password to be sent to the controlled device;
Wherein, the acquisition module for obtaining password corresponding with the identity information in the following manner: from terminal local The corresponding password of the identity information is searched in database;Alternatively, receiving password currently entered;
Wherein, " whether password is set " and " password " two parameters are stored on the controlled device.
CN201710516170.9A 2017-06-29 2017-06-29 Control method and device, electronic equipment, the terminal of equipment Active CN107205094B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710516170.9A CN107205094B (en) 2017-06-29 2017-06-29 Control method and device, electronic equipment, the terminal of equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710516170.9A CN107205094B (en) 2017-06-29 2017-06-29 Control method and device, electronic equipment, the terminal of equipment

Publications (2)

Publication Number Publication Date
CN107205094A CN107205094A (en) 2017-09-26
CN107205094B true CN107205094B (en) 2019-05-07

Family

ID=59910407

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710516170.9A Active CN107205094B (en) 2017-06-29 2017-06-29 Control method and device, electronic equipment, the terminal of equipment

Country Status (1)

Country Link
CN (1) CN107205094B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111211898B (en) * 2019-12-31 2022-08-19 歌尔科技有限公司 Method for setting control authority of electronic equipment, electronic equipment and readable storage medium
CN112039738B (en) * 2020-08-31 2022-04-08 深圳创维-Rgb电子有限公司 Intelligent device control method, terminal device and readable storage medium
CN114980093A (en) * 2021-02-18 2022-08-30 Oppo广东移动通信有限公司 Equipment verification method and device, computer equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068430A (en) * 2006-05-05 2007-11-07 联发科技股份有限公司 Methods for remotely controlling mobile device and electronic device for monitoring an object
EP2978162A1 (en) * 2014-07-21 2016-01-27 Xiaomi Inc. Anti-counterfeiting verification method, device and system
CN105516964A (en) * 2014-09-25 2016-04-20 中兴通讯股份有限公司 Method and terminal for realizing remote control
CN105592146A (en) * 2015-12-16 2016-05-18 小米科技有限责任公司 Equipment control method, device and terminal
CN106899634A (en) * 2015-12-18 2017-06-27 北京奇虎科技有限公司 It is a kind of to instruct responding device, the method for control mobile terminal, server and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106658488B (en) * 2016-09-30 2020-09-22 海尔优家智能科技(北京)有限公司 Intelligent household appliance and method and device for safely accessing intelligent household appliance

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068430A (en) * 2006-05-05 2007-11-07 联发科技股份有限公司 Methods for remotely controlling mobile device and electronic device for monitoring an object
EP2978162A1 (en) * 2014-07-21 2016-01-27 Xiaomi Inc. Anti-counterfeiting verification method, device and system
CN105516964A (en) * 2014-09-25 2016-04-20 中兴通讯股份有限公司 Method and terminal for realizing remote control
CN105592146A (en) * 2015-12-16 2016-05-18 小米科技有限责任公司 Equipment control method, device and terminal
CN106899634A (en) * 2015-12-18 2017-06-27 北京奇虎科技有限公司 It is a kind of to instruct responding device, the method for control mobile terminal, server and device

Also Published As

Publication number Publication date
CN107205094A (en) 2017-09-26

Similar Documents

Publication Publication Date Title
CN106992989B (en) Sharing authorization method of smart home, server and readable storage medium
US11888644B2 (en) Network configuration method for home appliance, home appliance, mobile terminal, and storage medium
CN112738805B (en) Device control method and apparatus, storage medium, and electronic device
CN109246604B (en) Intelligent device safety binding method, server, intelligent device and user side device
EP3016318B1 (en) Method and apparatus for customizing scene mode of intelligent device
CN108259643A (en) Smart machine and the binding method of user's operation terminal and device, electronic equipment
WO2016065812A1 (en) Scenario mode setting-based smart device control method and apparatus
US10250712B2 (en) Method and server of configuring scenario mode for smart devices
CN107205094B (en) Control method and device, electronic equipment, the terminal of equipment
CN105376257B (en) Login method, smart home system and the Cloud Server of smart home application program
US20160127145A1 (en) Method and server for controlling smart devices based on predefined scenario mode
CN104809369B (en) Packet sets method, client, server and the system of equipment access rights
WO2015158227A9 (en) Mobile terminal control method, apparatus and system
CN106789470B (en) Terminal resource sharing method, device and system
CN103916855A (en) Method for enabling mobile phone to be connected to WiFi network
CN109979047B (en) Multi-network intelligent door lock control method, storage medium, controller and fingerprint lock
CN105808042B (en) A kind of information processing method and electronic equipment
CN105262823A (en) Method, apparatus and system for controlling terminal
WO2022247373A1 (en) Method and apparatus for controlling home appliance, and appliance
CN105511275B (en) A kind of method and apparatus controlling intelligent electric appliance
CN113433831A (en) Control method and module of intelligent household equipment and storage medium
CN105635215B (en) Synchronous method, device and the Cloud Server of contact information
CN115175152A (en) Intelligent device binding method and device, storage medium and electronic device
CN103345828A (en) Method and system for controlling computer through intelligent terminal
EP4138342A1 (en) Home appliance, networking method therefor, control terminal, and computer storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant