CN108920919A - Control method, the device and system of interactive intelligence equipment - Google Patents

Control method, the device and system of interactive intelligence equipment Download PDF

Info

Publication number
CN108920919A
CN108920919A CN201810784003.7A CN201810784003A CN108920919A CN 108920919 A CN108920919 A CN 108920919A CN 201810784003 A CN201810784003 A CN 201810784003A CN 108920919 A CN108920919 A CN 108920919A
Authority
CN
China
Prior art keywords
control
equipment
information
interactive intelligence
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810784003.7A
Other languages
Chinese (zh)
Inventor
蒋波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Shiyuan Electronics Thecnology Co Ltd
Guangzhou Shirui Electronics Co Ltd
Original Assignee
Guangzhou Shiyuan Electronics Thecnology Co Ltd
Guangzhou Shirui Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Shiyuan Electronics Thecnology Co Ltd, Guangzhou Shirui Electronics Co Ltd filed Critical Guangzhou Shiyuan Electronics Thecnology Co Ltd
Priority to CN201810784003.7A priority Critical patent/CN108920919A/en
Publication of CN108920919A publication Critical patent/CN108920919A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Abstract

The invention discloses control method, the device and system of a kind of interactive intelligence equipment.Wherein, this method includes:Server receives control request, wherein includes at least in control request:It controls the identity information of main body and control main body sends the facility information that used equipment is requested in control, control main body is the object of request unlock target interactive intelligence equipment;Server verifies identity information and facility information;For server in the case where verifying successful situation, control target interactive intelligence equipment is according to control request unlock or locks.The present invention, which solves, to be inputted password in the prior art in interactive intelligent tablet computer and could unlock, and interactive intelligent tablet computer cumbersome technical problem when in use is caused.

Description

Control method, the device and system of interactive intelligence equipment
Technical field
The present invention relates to the control fields of interactive intelligence equipment, in particular to a kind of control of interactive intelligence equipment Methods, devices and systems.
Background technique
Interactive intelligence equipment is commonly used in the scene required to security level, and needing to input correct password could be complete The unlock of forming apparatus could be obtained after unlock and be operated to equipment.
And the product that interactive intelligence equipment is used as high frequency, it is used when plate every time and needs to input correct password, this The operation of sample is relatively complicated, and user is also easy to forget Password, or obscures the password of more interactive intelligence equipment.In addition, interaction Smart machine if after forgetting locking, be easy to cause the leakage of data in equipment after use.
It could be unlocked for password is inputted in interactive intelligent tablet computer in the prior art, interactive intelligent tablet computer is caused to use When cumbersome problem, currently no effective solution has been proposed.
Summary of the invention
The embodiment of the invention provides control method, the device and system of a kind of interactive intelligence equipment, existing at least to solve Have in technology and to input password in interactive intelligent tablet computer and could unlock, leads to interactive intelligent tablet computer cumbersome skill when in use Art problem.
According to an aspect of an embodiment of the present invention, a kind of control method of interactive intelligence equipment is provided, including:Service Device receives control request, wherein includes at least in control request:The identity information and control main body for controlling main body, which send control, asks The facility information of equipment used in asking, control main body are the object of request unlock target interactive intelligence equipment;Server verification Identity information and facility information;Server in the case where verifying successful situation, request according to control by control target interactive intelligence equipment Unlock locks.
Further, before server receives control request, server receives the mesh that target interactive intelligence equipment is sent The identification information and the corresponding equipment authority information of target interactive intelligence equipment and identity authority letter of mark interactive intelligence equipment Breath, wherein equipment authority information is the facility information for having permission the equipment for sending control request, and identity authority information is to have permission Control the identity information of the unlock of target interactive intelligence equipment or the control main body locked.
Further, before server receives control request, server reception is imported by preset account executive The corresponding equipment authority information of identification information and target interactive intelligence equipment and identity authority of target interactive intelligence equipment are believed Breath, wherein equipment authority information is the facility information for having permission the equipment for sending control request, and identity authority information is to have permission Control the identity information of the unlock of target interactive intelligence equipment or the control main body locked.
Further, server verifies whether equipment there is permission to send control request according to facility information, wherein if It include the corresponding facility information of control main body in the equipment authority information prestored, it is determined that equipment has permission transmission control request; In the case where equipment has permission transmission control request, whether server has permission control according to identity information access control main body The unlock of target interactive intelligence equipment locks, wherein if in the identity authority information prestored including the identity letter of control main body Breath, it is determined that control main body has permission the unlock of control target interactive intelligence equipment or locks.
Further, in the case where verifying successful situation, server requests to generate control instruction according to control, wherein control Instruction includes unlock control instruction or locking control instruction;After server encrypts control instruction, it is sent to target interactive intelligence Equipment.
Further, server is requested in control target interactive intelligence equipment according to control in the case where verifying successful situation After unlock or locking, server receives the implementing result of the execution control request of interactive intelligence equipment;Server will execute knot Fruit feeds back to equipment used in control main body.
According to an aspect of an embodiment of the present invention, a kind of control system of interactive intelligence equipment is provided, including:Target Interactive intelligence equipment;Controlling terminal sends control request to server, wherein include at least in control request:Control main body The facility information of equipment used in identity information and control main body transmission control request, control main body unlock target for request and hand over The object of mutual smart machine;Server communicates respectively with target interactive intelligence equipment and controlling terminal, for verifying identity information And facility information, and in the case where verifying successful situation, control target interactive intelligence equipment is according to control request unlock or locks.
Further, target interactive intelligence equipment is also used to send the mark letter of target interactive intelligence equipment to server Breath and the corresponding equipment authority information of target interactive intelligence equipment and identity authority information, wherein equipment authority information is to have Permission sends the facility information of the equipment of control request, and identity authority information is to have permission control target interactive intelligence equipment unlock Or the identity information of the control main body locked.
Further, controlling terminal is also used to import the identification information and mesh of target interactive intelligence equipment to server Mark the corresponding equipment authority information of interactive intelligence equipment and identity authority information, wherein equipment authority information is to have permission transmission The facility information of the equipment of request is controlled, identity authority information is to have permission the unlock of control target interactive intelligence equipment or lock Control the identity information of main body.
According to an aspect of an embodiment of the present invention, a kind of control device of interactive intelligence equipment is provided, including:It receives Module receives control request for server, wherein include at least in control request:Control identity information and the control of main body Main body sends the facility information that used equipment is requested in control, and control main body is pair of request unlock target interactive intelligence equipment As;Correction verification module, for server verification identity information and facility information;Control module is successful in verification for server In the case of, control target interactive intelligence equipment is according to control request unlock or locks.
According to an aspect of an embodiment of the present invention, a kind of storage medium is provided, storage medium includes the program of storage, Wherein, when program is run, equipment where control storage medium executes following steps:Server receives control request, wherein control It is included at least in system request:The identity information and control main body for controlling main body send the equipment letter that used equipment is requested in control Breath, control main body are the object of request unlock target interactive intelligence equipment;Server verifies identity information and facility information;Service For device in the case where verifying successful situation, control target interactive intelligence equipment is according to control request unlock or locks.
According to an aspect of an embodiment of the present invention, a kind of processor is provided, processor is for running program, wherein Program executes following steps when running:Server receives control request, wherein includes at least in control request:Control main body The facility information of equipment used in identity information and control main body transmission control request, control main body unlock target for request and hand over The object of mutual smart machine;Server verifies identity information and facility information;Server controls mesh in the case where verifying successful situation Interactive intelligence equipment is marked according to control request unlock or is locked.
In embodiments of the present invention, server receives control request, verifies to identity information and facility information, in school It tests in successful situation, control interactive intelligence equipment is according to control request unlock or locks.Above scheme is by server to control The identity of main body processed and the equipment for sending control request are verified, to hand over when using intelligent interaction device without user Password is inputted on mutual smart machine, could unlock, lead to solve and input password in interactive intelligent tablet computer in the prior art Cause interactive intelligent tablet computer cumbersome technical problem when in use.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes part of this application, this hair Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of the control method of interactive intelligence equipment according to an embodiment of the present invention;
Fig. 2 is a kind of flow chart of the control method for interactive intelligence equipment that the embodiment of the present invention 2 provides;
Fig. 3 is a kind of flow chart of the control method for interactive intelligence equipment that the embodiment of the present invention 3 provides;
Fig. 4 is a kind of control system of interactive intelligence equipment according to an embodiment of the present invention;
Fig. 5 is a kind of schematic diagram of the control system of according to embodiments of the present invention 4 optional interactive intelligence equipment;
Fig. 6 is the flow chart according to a kind of control method of interactive intelligence equipment of inventive embodiments 1;And
Fig. 7 is a kind of schematic diagram of the control device of according to embodiments of the present invention 5 interactive intelligence equipment.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people The model that the present invention protects all should belong in member's every other embodiment obtained without making creative work It encloses.
It should be noted that description and claims of this specification and term " first " in above-mentioned attached drawing, " Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way Data be interchangeable under appropriate circumstances, so as to the embodiment of the present invention described herein can in addition to illustrating herein or Sequence other than those of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that cover Cover it is non-exclusive include, for example, the process, method, system, product or equipment for containing a series of steps or units are not necessarily limited to Step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, product Or other step or units that equipment is intrinsic.
Embodiment 1
According to embodiments of the present invention, a kind of embodiment of the control method of interactive intelligence equipment is provided, needs to illustrate It is that step shown in the flowchart of the accompanying drawings can execute in a computer system such as a set of computer executable instructions, Also, although logical order is shown in flow charts, and it in some cases, can be to be different from sequence execution herein Shown or described step.
Fig. 1 is the flow chart of the control method of interactive intelligence equipment according to an embodiment of the present invention, it should be noted that should Following step in embodiment 1 can be by being arranged server beyond the clouds, and the Cloud Server communicated with target interactive intelligence equipment Or server cluster executes.As shown in Figure 1, this method comprises the following steps:
Step S102 receives control request, wherein includes at least in control request:Control identity information and the control of main body Main body processed sends the facility information that used equipment is requested in control, and control main body is request unlock target interactive intelligence equipment Object.
Specifically, above-mentioned control request is initiated by the intelligent terminal of user, for request server to target interactive intelligence The control that equipment is unlocked and/or locks.Intelligent terminal can pass through url, wechat public platform, wechat small routine, installation pair The modes access server such as application end app answered.Above equipment information can be MAC Address, the implementor name, sequence of intelligent terminal Number etc., and without being limited thereto, identity information can be identification card number, telephone number, social account, fingerprint, head portrait, sound etc., and It is also not necessarily limited to this.
In an alternative embodiment, above equipment information can be the MAC Address of intelligent terminal, and identity information can be with For the work number of user.The smart phone access server of user, server to smart phone return allow carry out remote de-locking or Lock the list of devices of the interactive intelligence equipment of control.Smart phone selects the target for needing to unlock interaction intelligence from list of devices Energy equipment, for sending the control request of unlock to target interactive device, the control that server receives smart phone transmission is asked After asking, the MAC Address of smart phone is read, and returns to prompt information, user is prompted to input work number by smart phone, user is defeated After entering work number, server receives the facility information and identity information in control information.
In an alternative embodiment, above equipment information can be the MAC Address of intelligent terminal, and identity information can Think account information when user login services device.User is by logging in the account registered on the server in advance come access service Device.Server is returned to smart phone allows to carry out remote de-locking or lock the list of devices of the interactive intelligence equipment controlled.Intelligence Energy mobile phone selects the target interactive intelligence equipment for needing to unlock from list of devices, for sending unlock to target interactive device Control request, after server receives the control request of smart phone transmission, the MAC Address and user for reading smart phone are logged in Account information used in server, and using the MAC Address of reading and account information as facility information and identity information.
Step S104, server verify identity information and facility information.
In above-mentioned steps S104, identity information is verified, verifies for the identity to control main body, is worked as with determination The preceding verification main body for sending control request has permission the control for being unlocked and/or locking to target interactive device;Equipment is believed Breath is verified, external to prevent the control main body having permission from using for verifying to equipment used in control main body Situations such as equipment (i.e. the equipment of lack of competence), caused information leakage, occurs.
Specifically, above-mentioned verification mode can be identity information and facility information respectively, handed over control target is had permission The identity information of mutual smart machine and the facility information for having permission sending control request are compared, and this method can specifically include Following steps:
Step S1041, server verify whether equipment there is permission to send control request according to facility information, wherein such as It include the corresponding facility information of control main body in the equipment authority information that fruit prestores, it is determined that equipment, which has permission transmission control, asks It asks.
Specifically, the above-mentioned equipment authority information prestored is the facility information for having permission the equipment for sending control request. If in the equipment authority information prestored including the corresponding facility information of control main body, illustrate that controlling the corresponding equipment of main body has Permission sends control request to target interactive intelligence equipment, if not including that control main body is corresponding in preset equipment authority information Facility information, then illustrate that controlling the corresponding equipment of main body does not have permission to send control request to target interactive intelligence equipment.
There is no permission to issue control request in the corresponding equipment of control main body, then regardless of the identity for controlling main body, all Forbid to the unlock of control target interactive intelligence equipment and/or screen locking, and can be to the prompt information of equipment back-checking failure.
Step S1043, in the case where equipment has permission transmission control request, server is according to identity information access control Whether main body has permission the unlock of control target interactive intelligence equipment or locks, wherein if wrapped in the identity authority information prestored Include the identity information of control main body, it is determined that control main body has permission the unlock of control target interactive intelligence equipment or locks.
Specifically, the above-mentioned identity authority prestored is the control for having permission control and target interactive intelligence equipment unlock or locking The identity information of main body.
In the case where the bodily movement of practising Wushu Information Authentication failure to control main body, prompt information can be returned to equipment, with prompt User's checking failure is unable to control the unlock of target interactive intelligence equipment and/or locks.
It follows that the application above scheme has carried out two layers of authentication of equipment permission and identity authority, thus from control The two dimensions of equipment used in main body and control main body ensure the information security of target interactive intelligence equipment.
Step S106, in the case where verifying successful situation, control target interactive intelligence equipment please solve server according to control Lock locks.
Target interactive intelligence equipment can install the preset application program for being used to unlock locking, and the application program is for ringing The locking control instruction or unlock control instruction for answering server to send.
In an alternative embodiment, server is in the case where being all proved to be successful identity information and facility information, Control is sent to target interactive intelligence equipment and requests corresponding instruction, wherein control request may include unlocking request and locking Request, unlocking request correspond to unlock instruction, and locking request is corresponding to lock instruction.Target interactive intelligence equipment receives server It is executed after instruction, to realize by the unlock and/or locking of the target interactive intelligence equipment of intelligent terminal.
As an alternative embodiment, control interactive intelligence equipment is asked according to control in the case where verifying successful situation It solves lock or locks, including:
Step S1061, server request to generate control instruction according to control, wherein control instruction includes that solution lock control refers to Enable or lock control instruction.
Specifically, may include the identification information etc. of target interactive device in above-mentioned control instruction, for target interaction The control that equipment is unlocked or locks, to execute control in the case where facility information and identity information all pass through and ask.
Step S1063 after server encrypts control instruction, is sent to target interactive intelligence equipment.
Specifically, AES (Advanced Encryption Standard, superencipherment mark can be carried out to control instruction It is quasi-) algorithm for encryption, to guarantee control instruction safe transmission in the channel.
It can be seen that needing to realize unlock by the password that user inputs by interactive intelligence equipment itself in the prior art Authentication, in the above embodiments of the present application, only server, which has permission, is unlocked and/or locks control to interactive intelligence equipment System, and intelligent terminal used by a user is used to send to server to request, request server controls interactive intelligence equipment System, to realize the long-range control for locking and unlocking to interactive intelligence equipment.And interactive intelligence equipment is carried out by server Before locking and/or solving lock control, equipment used in the identity and control main body for controlling main body can be verified, to protect Control could be unlocked and/or lock to interactive intelligence equipment using the equipment having permission by demonstrate,proving the user only having permission.This The scheme of application, to the authentication for unlocking and/or locking interactive intelligence equipment, not only ensure that interactive intelligence equipment by server Using safe, it is thus also avoided that need to input the troublesome operation that unlocking pin could unlock to interactive intelligence equipment, solve existing Inputting password in technology in interactive intelligent tablet computer could unlock, and lead to interactive intelligent tablet computer cumbersome technology when in use Problem.
From the foregoing, it will be observed that the above embodiments of the present application server receives control request, identity information and facility information are carried out Verification, in the case where verifying successful situation, control interactive intelligence equipment is according to control request unlock or locks.Above scheme passes through clothes Business device verifies the identity of control main body and the equipment of transmission control request, to be not necessarily to when using intelligent interaction device User inputs password in interactive intelligence equipment, inputs password ability in interactive intelligent tablet computer in the prior art to solve Unlock leads to interactive intelligent tablet computer cumbersome technical problem when in use.
Embodiment 2
Fig. 2 is a kind of flow chart of the control method for interactive intelligence equipment that the embodiment of the present invention 2 provides.The present embodiment is It is embodied on the basis of above-described embodiment 2.This method comprises the following steps:
Step S21, server receive the identification information for the target interactive intelligence equipment that target interactive intelligence equipment is sent, with And the corresponding equipment authority information of target interactive intelligence equipment and identity authority information, wherein equipment authority information is to have permission The facility information of the equipment of control request is sent, identity authority information is to have permission the unlock of control target interactive intelligence equipment or add The identity information of the control main body of lock.
Specifically, above-mentioned steps are when target interactive intelligence equipment first time access server by executing, or when needing to change It is executed when equipment authority information, identity information.Identification information may include the MAC Address of target interactive intelligence equipment, sequence number And type number etc., equipment authority information may include the MAC Address for having permission the equipment for sending control request, implementor name, sequence Row number etc., part authority information are the identity information for having permission the unlock of control target interactive intelligence equipment or the control main body locked, Identity authority information can be identification card number, telephone number, social account, fingerprint, head portrait, sound etc..
In an alternative embodiment, the wireless network in current environment is automatically accessed after the starting of target interactive intelligence equipment Network, target interactive intelligence equipment search server in the wireless network of access, and detect whether the logged service found Device executes above-mentioned steps if it is the logged server found, otherwise without executing above-mentioned steps.
Step S23, server receive control request, wherein include at least in control request:Control the identity information of main body The facility information that used equipment is requested in control is sent with control main body, control main body is that request unlock target interactive intelligence is set Standby object.
Step S25, server verify identity information and facility information;
Step S27, server is in the case where verifying successful situation, and control target interactive intelligence equipment is according to control request unlock Or it locks.
Step S29, server receive the implementing result of the execution control request of interactive intelligence equipment.
Specifically, above-mentioned implementing result may include running succeeded and executing failure, when there is target interactive intelligence equipment When communicating with server disconnection, implementing result may be failure.
Implementing result is fed back to equipment used in control main body by step S211, server.
In above-mentioned steps, implementing result is fed back to equipment used in control main body by server, is used for response control Request, and prompt whether ownership goal interactive intelligence equipment unlocks or lock successfully.
Embodiment 3
Fig. 3 is a kind of flow chart of the control method for interactive intelligence equipment that the embodiment of the present invention 3 provides.The present embodiment is It is embodied on the basis of above-described embodiment 1.This method comprises the following steps:
Step S31, server receive the identification information of the target interactive intelligence equipment imported by preset account executive, And the corresponding equipment authority information of target interactive intelligence equipment and identity authority information, wherein equipment authority information is to have the right Limit send control request equipment facility information, identity authority information be have permission control target interactive intelligence equipment unlock or The identity information of the control main body of locking.
Above-mentioned steps after target interactive intelligence equipment for the first time access server, or when need to change equipment authority information, It executes when identity information, is executed by the controlling terminal of login account executive.
Specifically, above-mentioned account executive can be the super account with highest permission, the account executive is from permission to clothes The corresponding identity authority of device write-in target interactive intelligence equipment of being engaged in.
In an alternative embodiment, after target interactive intelligence equipment logs in access server, user passes through intelligent terminal Account executive is logged in, and imports the mark of equipment authority information, identity authority information and target interactive intelligence equipment to server Information.
Step S33, server receive control request, wherein include at least in control request:Control the identity information of main body The facility information that used equipment is requested in control is sent with control main body, control main body is that request unlock target interactive intelligence is set Standby object.
Step S35, server verify identity information and facility information.
Step S37, server control target interactive intelligence equipment in the case where verifying successful situation are unlocked according to control request Or it locks.
Embodiment 4
According to embodiments of the present invention, a kind of embodiment of the control system of interactive intelligence equipment is provided, Fig. 4 is according to this A kind of control system of interactive intelligence equipment of inventive embodiments, as shown in connection with fig. 4, which includes:
Target interactive intelligence equipment 40.
Controlling terminal 41 sends control request to server, wherein include at least in control request:Control the body of main body Part information and control main body send the facility information of equipment used in control request, and control main body is that request unlocks target interaction The object of smart machine.
Specifically, above-mentioned control request is initiated by the intelligent terminal (i.e. above-mentioned controlling terminal) of user, for requesting service The control that device is unlocked and/or locks to target interactive intelligence equipment.Intelligent terminal can be by url, wechat public platform, micro- Believe small routine, the corresponding application end APP of installation etc. mode access server.Above equipment information can be intelligent terminal MAC Address, implementor name, sequence number etc., and without being limited thereto, identity information can for identification card number, telephone number, social account, Fingerprint, head portrait, sound etc., and it is also not necessarily limited to this.
Server 42 communicates respectively with target interactive intelligence equipment and controlling terminal, for verifying identity information and equipment Information, and in the case where verifying successful situation, control target interactive intelligence equipment is according to control request unlock or locks.
Specifically, above-mentioned verification mode can be respectively by identity information with have permission control target interactive intelligence equipment Identity information and the facility information for having permission sending control request are compared.In an alternative embodiment, server exists In the case where being all proved to be successful to identity information and facility information, control is sent to target interactive intelligence equipment and requests corresponding finger It enables, wherein unlocking request corresponds to unlock instruction, and locking request is corresponding to lock instruction.Target interactive intelligence equipment receives service It is executed after the instruction of device, to realize by the unlock and/or locking of the target interactive intelligence equipment of intelligent terminal.
Herein it should also be noted that, above-mentioned server can execute other steps that server executes in embodiment 1, this Place repeats no more.
As a kind of optional embodiment, target interactive intelligence equipment is also used to send target interactive intelligence to server and set The standby corresponding equipment authority information of identification information and target interactive intelligence equipment and identity authority information, wherein equipment power Limit information is the facility information for having permission the equipment for sending control request, and identity authority information is to have permission control target interaction intelligence The identity information of the unlock of energy equipment or the control main body locked.
As a kind of optional embodiment, controlling terminal is also used to import the mark of target interactive intelligence equipment to server Information and the corresponding equipment authority information of target interactive intelligence equipment and identity authority information, wherein equipment authority information is The facility information for sending the equipment of control request is had permission, identity authority information is to have permission control target interactive intelligence equipment solution The identity information of lock or the control main body locked.
Fig. 5 is a kind of schematic diagram of the control system of according to embodiments of the present invention 4 optional interactive intelligence equipment, Fig. 6 It is that method according to a kind of flow chart of the control method of interactive intelligence equipment of inventive embodiments 1, in Fig. 6 can be applied and Fig. 5 In system above-described embodiment is further described below with reference to Fig. 5 and Fig. 6:
In the present embodiment, target interactive intelligence equipment is equipped with the client of application program (client is used for cloud End server sending and receiving data processes and executes unlock dependent instruction), which starts automatically after starting with plate, and passes through net Network is automatically associated to the server of cloud server, and controlling terminal (PC or smart phone) is sent out after server is accessed by network The control request sent solution, lock target interactive intelligence equipment, the server of cloud server is according to presetting database to these controls After terminal processed is verified, corresponding instruction is transferred to client process.
Each part in Fig. 5 is described in detail separately below:
It is mounted on client in target interactive intelligence equipment:
For sending following data to server:Target interactive intelligence equipment identification information (such as:The address Mac, sequence Number, type number etc.);Possess solution, lock target interactive intelligence equipment permission controlling terminal facility information (such as:Mac Location, implementor name, sequence number etc.;And possess solution, lock target interactive intelligence equipment permission personnel identity information (such as: Identity card, telephone number, social account, fingerprint, head portrait, sound etc.).
According to the solution received from cloud server server, locks instruction and execute in target interactive intelligence equipment Solution, the relevant operation locked.
It returns to the solution for executing cloud server server and sending, lock the implementing result data after instruction.
Cloud server server:
Receive data:It receives target interactive intelligence equipment (passing through client), the data that controlling terminal is sent.
Data storage and association:Store the data that send from target interactive intelligence equipment by client, and by these The identification information of data and target interactive intelligence equipment is associated.Storage (possesses control from the data that controlling terminal imports The facility information of the personnel identity relevant information of plate permission and controlling terminal that they use, and by these data and target Interactive intelligence equipment is associated.
Data check:According to the database prestored, to information and control request progress legitimacy from controlling terminal Verification.
Data processing:Request of data from controlling terminal is subjected to processing and is converted into relevant unlock instruction, and is passed through Client is sent to after aes algorithm encryption;Then client is corresponded into implementing result data back to controlling terminal.
Following above-mentioned process is described in detail:
S61 receives the end PC, the request of data that mobile terminal is sent.
Specifically, the end PC, mobile terminal are controlling terminal, above-mentioned request of data is above-mentioned control request, and target is handed over Mutual smart machine is equipped with client, and client is connected automatically to cloud server service after starting with target interactive intelligence equipment Device waits the solution to be received from cloud server server, locks instruction, then according to instruction to target interactive intelligence equipment into Row response solution, locking operation.
Herein it should be noted that in use, or importing is needed to gather around after target interactive intelligence equipment initializes for the first time Have control plate permission personnel identity information and their common ends PC, mobile end equipment facility information when, client Cloud server, which is sent, by these data carries out binding registration and association.
User can be used the equipment such as the end PC, mobile terminal and be corresponded to by url, wechat public platform, wechat small routine, installation Application end APP etc. mode, connected reference to cloud server initiates request of data to target interactive intelligence equipment, i.e., solution, Locking request.
Herein it should be noted that the end PC, mobile terminal can be connected by super management account into cloud server, into Row imports the equipment letter of the identity information for possessing the personnel of plate control authority and their common ends PC, mobile end equipment Breath, and will be associated on these facility informations beyond the clouds server with the identification information of plate.
Whether in the preset database S62 judges the end PC, mobile terminal device information, if it is judged that be it is yes, then into Enter step S63, otherwise enters step S67.
Specifically, above-mentioned steps are used to verify the facility information of controlling terminal, if the end PC, mobile terminal device Information in the preset database, as verifies successfully, is otherwise verification failure.
S63 carries out the verifying of identity information, if identity information is verified, enters step S64, otherwise enters step Rapid S67.
S64, response data request, generates control instruction.
In the case where facility information and facility information are all verified, response data request generates control and refers to server It enables.
S65 carries out AES encryption to control instruction.
Encrypted control instruction is sent to client by S66.
Specifically, executing control instruction after target interactive intelligence equipment receives control instruction by client and being solved Lock locks.
S67, client refuse to respond.
In the case where facility information or identity information authentication failed, illustrate that equipment does not have permission, or the use of operation equipment Family does not have permission to be solved to target interactive intelligence equipment, lock control, and cloud server refuses to respond request of data.
S68, client return processing result.
In above-mentioned steps, processing result is back to cloud server by client, and cloud server returns processing result It is back to the end PC, mobile terminal.
Embodiment 5
According to embodiments of the present invention, a kind of embodiment of the control device of interactive intelligence equipment is provided, Fig. 7 is according to this A kind of schematic diagram of the control device of interactive intelligence equipment of inventive embodiments 5, as shown in connection with fig. 7, which includes:
Receiving module 70 receives control request for server, wherein include at least in control request:Control main body The facility information of equipment used in identity information and control main body transmission control request, control main body unlock target for request and hand over The object of mutual smart machine.
Correction verification module 72, for server verification identity information and facility information.
Control module 74 controls target interactive intelligence equipment according to control for server in the case where verifying successful situation Request unlock locks.
As a kind of optional embodiment, above-mentioned apparatus further includes:First receiving module is controlled for receiving in server Before request, server receives the identification information and target for the target interactive intelligence equipment that target interactive intelligence equipment is sent The corresponding equipment authority information of interactive intelligence equipment and identity authority information, wherein equipment authority information is to have permission transmission control The facility information of the equipment of request is made, identity authority information is the control for having permission control and target interactive intelligence equipment unlock or locking The identity information of main body processed.
As a kind of optional embodiment, above-mentioned apparatus further includes:Second receiving module is controlled for receiving in server Before request, server receives the identification information and mesh of the target interactive intelligence equipment imported by preset account executive Mark the corresponding equipment authority information of interactive intelligence equipment and identity authority information, wherein equipment authority information is to have permission transmission The facility information of the equipment of request is controlled, identity authority information is to have permission the unlock of control target interactive intelligence equipment or lock Control the identity information of main body.
As a kind of optional embodiment, correction verification module includes:First verifying submodule, believes for server according to equipment Whether breath verifying equipment there is permission to send control request, wherein if in the equipment authority information prestored including control main body Corresponding facility information, it is determined that equipment has permission transmission control request;Second verifying submodule, for having permission hair in equipment In the case where sending control to request, server is set according to whether identity information access control main body has permission control target interactive intelligence Standby unlock locks, wherein if in the identity authority information prestored including the identity information of control main body, it is determined that control master Body has permission the unlock of control target interactive intelligence equipment or locks.
As a kind of optional embodiment, in the case where verifying successful situation, control module includes:Submodule is generated, is used for Server requests to generate control instruction according to control, wherein control instruction is including unlock control instruction or locks control instruction;Hair Submodule is sent, after encrypting control instruction for server, is sent to target interactive intelligence equipment.
As a kind of optional embodiment, above-mentioned apparatus further includes:Third receiving module is being verified for son in server In successful situation, after control target interactive intelligence equipment is according to control request unlock or locking, server receives interaction The implementing result of the execution control request of smart machine;Implementing result is fed back to control main body for server by feedback module Used equipment.
Embodiment 6
According to embodiments of the present invention, a kind of storage medium is provided, storage medium includes the program of storage, wherein in journey Equipment executes following steps where controlling storage medium when sort run:Server receives control request, wherein in control request extremely Include less:It controls the identity information of main body and control main body sends the facility information that used equipment is requested in control, control master Body is the object of request unlock target interactive intelligence equipment;Server verifies identity information and facility information;Server is verifying In successful situation, control target interactive intelligence equipment is according to control request unlock or locks.
In addition, also controlling other steps where storage medium in equipment execution embodiment 1 in program operation, herein not It repeats again.
Embodiment 7
According to embodiments of the present invention, a kind of processor is provided, processor is for running program, wherein when program is run Execute following steps:Server receives control request, wherein includes at least in control request:Control main body identity information and It controls main body and sends the facility information that used equipment is requested in control, control main body is request unlock target interactive intelligence equipment Object;Server verifies identity information and facility information;Server controls target interactive intelligence in the case where verifying successful situation Equipment is according to control request unlock or locks.
In addition, also executing other steps in embodiment 1 when program is run, details are not described herein again.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
In the above embodiment of the invention, it all emphasizes particularly on different fields to the description of each embodiment, does not have in some embodiment The part of detailed description, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed technology contents can pass through others Mode is realized.Wherein, the apparatus embodiments described above are merely exemplary, such as the division of the unit, Ke Yiwei A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of unit or module It connects, can be electrical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple On unit.It can some or all of the units may be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can for personal computer, server or network equipment etc.) execute each embodiment the method for the present invention whole or Part steps.And storage medium above-mentioned includes:USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic or disk etc. be various to can store program code Medium.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (12)

1. a kind of control method of interactive intelligence equipment, which is characterized in that including:
Server receives control request, wherein includes at least in the control request:The identity information of control main body and the control Main body processed sends the facility information that used equipment is requested in the control, and the control main body is request unlock target interaction intelligence The object of energy equipment;
The server verifies the identity information and the facility information;
The server controls the target interactive intelligence equipment and requests to unlock according to the control in the case where verifying successful situation Or it locks.
2. the method according to claim 1, wherein the method is also before server receives control request Including:
The server receives the identification information for the target interactive intelligence equipment that the target interactive intelligence equipment is sent, with And the corresponding equipment authority information of the target interactive intelligence equipment and identity authority information, wherein the equipment authority information For the facility information for having permission the equipment for sending the control request, the identity authority information is to have permission the control target The identity information of the unlock of interactive intelligence equipment or the control main body locked.
3. the method according to claim 1, wherein the method is also before server receives control request Including:
The server receives the identification information of the target interactive intelligence equipment imported by preset account executive, and The corresponding equipment authority information of the target interactive intelligence equipment and identity authority information, wherein the equipment authority information is The facility information for sending the equipment of the control request is had permission, the identity authority information is to have permission the control target to hand over The identity information of mutual smart machine unlock or the control main body locked.
4. the method according to claim 1, which is characterized in that the server verifies the identity Information and the facility information, including:
The server verifies whether the equipment there is permission to send the control request according to the facility information, wherein If in the equipment authority information prestored including the corresponding facility information of the control main body, it is determined that the equipment has permission hair The control is sent to request;
In the case where the equipment has permission and sends control request, the server verifies institute according to the identity information State whether control main body has permission the control target interactive intelligence equipment unlock or lock, wherein if the rights relating the person prestored It include the identity information of the control main body in limit information, it is determined that the control main body has permission the control target interaction intelligence It can equipment unlock or locking.
5. the method according to claim 1, wherein controlling the interactive intelligence in the case where verifying successful situation Equipment is requested unlock according to the control or is locked, including:
The server requests to generate control instruction according to the control, wherein the control instruction includes unlock control instruction Or lock control instruction;
After the server encrypts the control instruction, it is sent to the target interactive intelligence equipment.
6. the method according to claim 1, wherein the server is being controlled in the case where verifying successful situation After the target interactive intelligence equipment is requested unlock or is locked according to the control, the method also includes:
The server receives the implementing result of the execution control request of the interactive intelligence equipment;
The implementing result is fed back to equipment used in the control main body by the server.
7. a kind of control system of interactive intelligence equipment, which is characterized in that including:
Target interactive intelligence equipment;
Controlling terminal sends control request to server, wherein includes at least in the control request:Control the identity of main body Information and the control main body send the facility information that used equipment is requested in the control, and the control main body is that please solve Lock the object of the target interactive intelligence equipment;
Server communicates respectively with the target interactive intelligence equipment and the controlling terminal, for verifying the identity information It controls the target interactive intelligence equipment with the facility information and is requested according to the control and in the case where verifying successful situation Unlock locks.
8. system according to claim 7, which is characterized in that the target interactive intelligence equipment is also used to the service Device sends the identification information and the corresponding equipment permission letter of the target interactive intelligence equipment of the target interactive intelligence equipment Breath and identity authority information, wherein the equipment authority information is the equipment letter for having permission the equipment for sending the control request Breath, the identity authority information are to have permission the identity for controlling the target interactive intelligence equipment unlock or the control main body locked Information.
9. system according to claim 7, which is characterized in that the controlling terminal is also used to import institute to the server State the identification information and the corresponding equipment authority information of the target interactive intelligence equipment and identity of target interactive intelligence equipment Authority information, wherein the equipment authority information is the facility information for having permission the equipment for sending the control request, the body Part authority information is to have permission the identity information for controlling the target interactive intelligence equipment unlock or the control main body locked.
10. a kind of control device of interactive intelligence equipment, which is characterized in that including:
Receiving module receives control request for server, wherein includes at least in the control request:Control the body of main body Part information and the control main body send the facility information that used equipment is requested in the control, and the control main body is request Unlock the object of target interactive intelligence equipment;
Correction verification module verifies the identity information and the facility information for the server;
Control module controls the target interactive intelligence equipment according to institute for the server in the case where verifying successful situation It states control request unlock or locks.
11. a kind of storage medium, which is characterized in that the storage medium includes the program of storage, wherein run in described program When control the storage medium where equipment execute following steps:Server receives control request, wherein in the control request It includes at least:The identity information and the control main body for controlling main body send the equipment letter that used equipment is requested in the control Breath, the control main body are the object of request unlock target interactive intelligence equipment;The server verify the identity information and The facility information;The server controls the target interactive intelligence equipment according to the control in the case where verifying successful situation System request unlock locks.
12. a kind of processor, which is characterized in that the processor is for running program, wherein executed such as when described program is run Lower step:Server receives control request, wherein includes at least in the control request:Control identity information and the institute of main body It states control main body and sends the facility information that used equipment is requested in the control, the control main body is that request unlock target is handed over The object of mutual smart machine;The server verifies the identity information and the facility information;The server verification at In the case where function, controls the target interactive intelligence equipment and unlock is requested according to the control or is locked.
CN201810784003.7A 2018-07-17 2018-07-17 Control method, the device and system of interactive intelligence equipment Pending CN108920919A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810784003.7A CN108920919A (en) 2018-07-17 2018-07-17 Control method, the device and system of interactive intelligence equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810784003.7A CN108920919A (en) 2018-07-17 2018-07-17 Control method, the device and system of interactive intelligence equipment

Publications (1)

Publication Number Publication Date
CN108920919A true CN108920919A (en) 2018-11-30

Family

ID=64415601

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810784003.7A Pending CN108920919A (en) 2018-07-17 2018-07-17 Control method, the device and system of interactive intelligence equipment

Country Status (1)

Country Link
CN (1) CN108920919A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109947031A (en) * 2019-04-15 2019-06-28 美的集团股份有限公司 A kind of intelligent home equipment control method, medium, mobile terminal and device
CN111092856A (en) * 2019-11-18 2020-05-01 北京小米移动软件有限公司 Network distribution method, network distribution device and computer readable storage medium
CN112491813A (en) * 2020-11-10 2021-03-12 深圳市中博科创信息技术有限公司 Instruction transmission control method, instruction transmission control device and computer-readable storage medium
CN113098964A (en) * 2021-04-01 2021-07-09 中天光伏技术有限公司 Communication connection establishing method and device, storage medium and electronic equipment
CN114553620A (en) * 2022-01-14 2022-05-27 青岛海尔科技有限公司 Equipment disturbance-free setting method, equipment control method and device corresponding to method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106992956A (en) * 2016-01-21 2017-07-28 阿里巴巴集团控股有限公司 A kind of methods, devices and systems for realizing inter-device authentication
CN107367946A (en) * 2016-05-11 2017-11-21 珠海格力电器股份有限公司 The method and device of control device
CN108038983A (en) * 2017-12-06 2018-05-15 广州小明科技有限公司 Tablet computer automatically provides method, unit and system
CN108234586A (en) * 2016-12-22 2018-06-29 深圳市中兴微电子技术有限公司 Control method, first terminal, second terminal, server and the system of terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106992956A (en) * 2016-01-21 2017-07-28 阿里巴巴集团控股有限公司 A kind of methods, devices and systems for realizing inter-device authentication
CN107367946A (en) * 2016-05-11 2017-11-21 珠海格力电器股份有限公司 The method and device of control device
CN108234586A (en) * 2016-12-22 2018-06-29 深圳市中兴微电子技术有限公司 Control method, first terminal, second terminal, server and the system of terminal
CN108038983A (en) * 2017-12-06 2018-05-15 广州小明科技有限公司 Tablet computer automatically provides method, unit and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
W.RICHARD STEVENS著: "《UNIX环境高级编程》", 28 February 2001, 机械工业出版社 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109947031A (en) * 2019-04-15 2019-06-28 美的集团股份有限公司 A kind of intelligent home equipment control method, medium, mobile terminal and device
CN109947031B (en) * 2019-04-15 2020-07-28 美的集团股份有限公司 Intelligent household equipment control method, medium, mobile terminal and device
CN111092856A (en) * 2019-11-18 2020-05-01 北京小米移动软件有限公司 Network distribution method, network distribution device and computer readable storage medium
CN112491813A (en) * 2020-11-10 2021-03-12 深圳市中博科创信息技术有限公司 Instruction transmission control method, instruction transmission control device and computer-readable storage medium
CN112491813B (en) * 2020-11-10 2022-09-06 深圳市中博科创信息技术有限公司 Instruction transmission control method and device and computer readable storage medium
CN113098964A (en) * 2021-04-01 2021-07-09 中天光伏技术有限公司 Communication connection establishing method and device, storage medium and electronic equipment
CN114553620A (en) * 2022-01-14 2022-05-27 青岛海尔科技有限公司 Equipment disturbance-free setting method, equipment control method and device corresponding to method

Similar Documents

Publication Publication Date Title
CN110012015B (en) Block chain-based Internet of things data sharing method and system
CN108920919A (en) Control method, the device and system of interactive intelligence equipment
CN100438421C (en) Method and system for conducting user verification to sub position of network position
DE60223129T2 (en) METHOD AND SYSTEM FOR SECURING A COMPUTER NETWORK AND PERSONAL IDENTIFICATION DEVICE USED FOR CONTROLLING NETWORK COMPONENT ACCESS
CN101931613B (en) Centralized authenticating method and centralized authenticating system
CN100583114C (en) System and method for remote security enablement
US9256723B2 (en) Security key using multi-OTP, security service apparatus, security system
CN105847247A (en) Authentication system and working method thereof
CN103489233A (en) Electronic door control system with dynamic password
CN106652109A (en) Intelligent lock control method, device and lock management server
CN107113613B (en) Server, mobile terminal, network real-name authentication system and method
CN101816140A (en) Token-based management system for PKI personalization process
CN103888255A (en) Identity authentication method, device and system
CN106127888B (en) Intelligent lock operation method and smart lock operating system
CN108259502A (en) For obtaining the identification method of interface access rights, server-side and storage medium
CN100365974C (en) Device and method for controlling computer access
CN105915338A (en) Key generation method and key generation system
CN108010150A (en) Intelligent Checking on Work Attendance recording method, electric terminal and computer-readable recording medium
CN104469736B (en) A kind of data processing method, server and terminal
CN107819766B (en) Security authentication method, system and computer readable storage medium
CN101594615B (en) Method, system and equipment for network management of terminal triple information security
CN105187417B (en) Authority acquiring method and apparatus
DE102017121648B3 (en) METHOD FOR REGISTERING A USER AT A TERMINAL DEVICE
CN109495514A (en) Mutual role help system and method based on edge termination
CN107645474A (en) Log in the method for open platform and log in the device of open platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181130