CN108920919A - Control method, the device and system of interactive intelligence equipment - Google Patents
Control method, the device and system of interactive intelligence equipment Download PDFInfo
- Publication number
- CN108920919A CN108920919A CN201810784003.7A CN201810784003A CN108920919A CN 108920919 A CN108920919 A CN 108920919A CN 201810784003 A CN201810784003 A CN 201810784003A CN 108920919 A CN108920919 A CN 108920919A
- Authority
- CN
- China
- Prior art keywords
- control
- equipment
- information
- interactive intelligence
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
Abstract
The invention discloses control method, the device and system of a kind of interactive intelligence equipment.Wherein, this method includes:Server receives control request, wherein includes at least in control request:It controls the identity information of main body and control main body sends the facility information that used equipment is requested in control, control main body is the object of request unlock target interactive intelligence equipment;Server verifies identity information and facility information;For server in the case where verifying successful situation, control target interactive intelligence equipment is according to control request unlock or locks.The present invention, which solves, to be inputted password in the prior art in interactive intelligent tablet computer and could unlock, and interactive intelligent tablet computer cumbersome technical problem when in use is caused.
Description
Technical field
The present invention relates to the control fields of interactive intelligence equipment, in particular to a kind of control of interactive intelligence equipment
Methods, devices and systems.
Background technique
Interactive intelligence equipment is commonly used in the scene required to security level, and needing to input correct password could be complete
The unlock of forming apparatus could be obtained after unlock and be operated to equipment.
And the product that interactive intelligence equipment is used as high frequency, it is used when plate every time and needs to input correct password, this
The operation of sample is relatively complicated, and user is also easy to forget Password, or obscures the password of more interactive intelligence equipment.In addition, interaction
Smart machine if after forgetting locking, be easy to cause the leakage of data in equipment after use.
It could be unlocked for password is inputted in interactive intelligent tablet computer in the prior art, interactive intelligent tablet computer is caused to use
When cumbersome problem, currently no effective solution has been proposed.
Summary of the invention
The embodiment of the invention provides control method, the device and system of a kind of interactive intelligence equipment, existing at least to solve
Have in technology and to input password in interactive intelligent tablet computer and could unlock, leads to interactive intelligent tablet computer cumbersome skill when in use
Art problem.
According to an aspect of an embodiment of the present invention, a kind of control method of interactive intelligence equipment is provided, including:Service
Device receives control request, wherein includes at least in control request:The identity information and control main body for controlling main body, which send control, asks
The facility information of equipment used in asking, control main body are the object of request unlock target interactive intelligence equipment;Server verification
Identity information and facility information;Server in the case where verifying successful situation, request according to control by control target interactive intelligence equipment
Unlock locks.
Further, before server receives control request, server receives the mesh that target interactive intelligence equipment is sent
The identification information and the corresponding equipment authority information of target interactive intelligence equipment and identity authority letter of mark interactive intelligence equipment
Breath, wherein equipment authority information is the facility information for having permission the equipment for sending control request, and identity authority information is to have permission
Control the identity information of the unlock of target interactive intelligence equipment or the control main body locked.
Further, before server receives control request, server reception is imported by preset account executive
The corresponding equipment authority information of identification information and target interactive intelligence equipment and identity authority of target interactive intelligence equipment are believed
Breath, wherein equipment authority information is the facility information for having permission the equipment for sending control request, and identity authority information is to have permission
Control the identity information of the unlock of target interactive intelligence equipment or the control main body locked.
Further, server verifies whether equipment there is permission to send control request according to facility information, wherein if
It include the corresponding facility information of control main body in the equipment authority information prestored, it is determined that equipment has permission transmission control request;
In the case where equipment has permission transmission control request, whether server has permission control according to identity information access control main body
The unlock of target interactive intelligence equipment locks, wherein if in the identity authority information prestored including the identity letter of control main body
Breath, it is determined that control main body has permission the unlock of control target interactive intelligence equipment or locks.
Further, in the case where verifying successful situation, server requests to generate control instruction according to control, wherein control
Instruction includes unlock control instruction or locking control instruction;After server encrypts control instruction, it is sent to target interactive intelligence
Equipment.
Further, server is requested in control target interactive intelligence equipment according to control in the case where verifying successful situation
After unlock or locking, server receives the implementing result of the execution control request of interactive intelligence equipment;Server will execute knot
Fruit feeds back to equipment used in control main body.
According to an aspect of an embodiment of the present invention, a kind of control system of interactive intelligence equipment is provided, including:Target
Interactive intelligence equipment;Controlling terminal sends control request to server, wherein include at least in control request:Control main body
The facility information of equipment used in identity information and control main body transmission control request, control main body unlock target for request and hand over
The object of mutual smart machine;Server communicates respectively with target interactive intelligence equipment and controlling terminal, for verifying identity information
And facility information, and in the case where verifying successful situation, control target interactive intelligence equipment is according to control request unlock or locks.
Further, target interactive intelligence equipment is also used to send the mark letter of target interactive intelligence equipment to server
Breath and the corresponding equipment authority information of target interactive intelligence equipment and identity authority information, wherein equipment authority information is to have
Permission sends the facility information of the equipment of control request, and identity authority information is to have permission control target interactive intelligence equipment unlock
Or the identity information of the control main body locked.
Further, controlling terminal is also used to import the identification information and mesh of target interactive intelligence equipment to server
Mark the corresponding equipment authority information of interactive intelligence equipment and identity authority information, wherein equipment authority information is to have permission transmission
The facility information of the equipment of request is controlled, identity authority information is to have permission the unlock of control target interactive intelligence equipment or lock
Control the identity information of main body.
According to an aspect of an embodiment of the present invention, a kind of control device of interactive intelligence equipment is provided, including:It receives
Module receives control request for server, wherein include at least in control request:Control identity information and the control of main body
Main body sends the facility information that used equipment is requested in control, and control main body is pair of request unlock target interactive intelligence equipment
As;Correction verification module, for server verification identity information and facility information;Control module is successful in verification for server
In the case of, control target interactive intelligence equipment is according to control request unlock or locks.
According to an aspect of an embodiment of the present invention, a kind of storage medium is provided, storage medium includes the program of storage,
Wherein, when program is run, equipment where control storage medium executes following steps:Server receives control request, wherein control
It is included at least in system request:The identity information and control main body for controlling main body send the equipment letter that used equipment is requested in control
Breath, control main body are the object of request unlock target interactive intelligence equipment;Server verifies identity information and facility information;Service
For device in the case where verifying successful situation, control target interactive intelligence equipment is according to control request unlock or locks.
According to an aspect of an embodiment of the present invention, a kind of processor is provided, processor is for running program, wherein
Program executes following steps when running:Server receives control request, wherein includes at least in control request:Control main body
The facility information of equipment used in identity information and control main body transmission control request, control main body unlock target for request and hand over
The object of mutual smart machine;Server verifies identity information and facility information;Server controls mesh in the case where verifying successful situation
Interactive intelligence equipment is marked according to control request unlock or is locked.
In embodiments of the present invention, server receives control request, verifies to identity information and facility information, in school
It tests in successful situation, control interactive intelligence equipment is according to control request unlock or locks.Above scheme is by server to control
The identity of main body processed and the equipment for sending control request are verified, to hand over when using intelligent interaction device without user
Password is inputted on mutual smart machine, could unlock, lead to solve and input password in interactive intelligent tablet computer in the prior art
Cause interactive intelligent tablet computer cumbersome technical problem when in use.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes part of this application, this hair
Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of the control method of interactive intelligence equipment according to an embodiment of the present invention;
Fig. 2 is a kind of flow chart of the control method for interactive intelligence equipment that the embodiment of the present invention 2 provides;
Fig. 3 is a kind of flow chart of the control method for interactive intelligence equipment that the embodiment of the present invention 3 provides;
Fig. 4 is a kind of control system of interactive intelligence equipment according to an embodiment of the present invention;
Fig. 5 is a kind of schematic diagram of the control system of according to embodiments of the present invention 4 optional interactive intelligence equipment;
Fig. 6 is the flow chart according to a kind of control method of interactive intelligence equipment of inventive embodiments 1;And
Fig. 7 is a kind of schematic diagram of the control device of according to embodiments of the present invention 5 interactive intelligence equipment.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention
Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only
The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people
The model that the present invention protects all should belong in member's every other embodiment obtained without making creative work
It encloses.
It should be noted that description and claims of this specification and term " first " in above-mentioned attached drawing, "
Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way
Data be interchangeable under appropriate circumstances, so as to the embodiment of the present invention described herein can in addition to illustrating herein or
Sequence other than those of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that cover
Cover it is non-exclusive include, for example, the process, method, system, product or equipment for containing a series of steps or units are not necessarily limited to
Step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, product
Or other step or units that equipment is intrinsic.
Embodiment 1
According to embodiments of the present invention, a kind of embodiment of the control method of interactive intelligence equipment is provided, needs to illustrate
It is that step shown in the flowchart of the accompanying drawings can execute in a computer system such as a set of computer executable instructions,
Also, although logical order is shown in flow charts, and it in some cases, can be to be different from sequence execution herein
Shown or described step.
Fig. 1 is the flow chart of the control method of interactive intelligence equipment according to an embodiment of the present invention, it should be noted that should
Following step in embodiment 1 can be by being arranged server beyond the clouds, and the Cloud Server communicated with target interactive intelligence equipment
Or server cluster executes.As shown in Figure 1, this method comprises the following steps:
Step S102 receives control request, wherein includes at least in control request:Control identity information and the control of main body
Main body processed sends the facility information that used equipment is requested in control, and control main body is request unlock target interactive intelligence equipment
Object.
Specifically, above-mentioned control request is initiated by the intelligent terminal of user, for request server to target interactive intelligence
The control that equipment is unlocked and/or locks.Intelligent terminal can pass through url, wechat public platform, wechat small routine, installation pair
The modes access server such as application end app answered.Above equipment information can be MAC Address, the implementor name, sequence of intelligent terminal
Number etc., and without being limited thereto, identity information can be identification card number, telephone number, social account, fingerprint, head portrait, sound etc., and
It is also not necessarily limited to this.
In an alternative embodiment, above equipment information can be the MAC Address of intelligent terminal, and identity information can be with
For the work number of user.The smart phone access server of user, server to smart phone return allow carry out remote de-locking or
Lock the list of devices of the interactive intelligence equipment of control.Smart phone selects the target for needing to unlock interaction intelligence from list of devices
Energy equipment, for sending the control request of unlock to target interactive device, the control that server receives smart phone transmission is asked
After asking, the MAC Address of smart phone is read, and returns to prompt information, user is prompted to input work number by smart phone, user is defeated
After entering work number, server receives the facility information and identity information in control information.
In an alternative embodiment, above equipment information can be the MAC Address of intelligent terminal, and identity information can
Think account information when user login services device.User is by logging in the account registered on the server in advance come access service
Device.Server is returned to smart phone allows to carry out remote de-locking or lock the list of devices of the interactive intelligence equipment controlled.Intelligence
Energy mobile phone selects the target interactive intelligence equipment for needing to unlock from list of devices, for sending unlock to target interactive device
Control request, after server receives the control request of smart phone transmission, the MAC Address and user for reading smart phone are logged in
Account information used in server, and using the MAC Address of reading and account information as facility information and identity information.
Step S104, server verify identity information and facility information.
In above-mentioned steps S104, identity information is verified, verifies for the identity to control main body, is worked as with determination
The preceding verification main body for sending control request has permission the control for being unlocked and/or locking to target interactive device;Equipment is believed
Breath is verified, external to prevent the control main body having permission from using for verifying to equipment used in control main body
Situations such as equipment (i.e. the equipment of lack of competence), caused information leakage, occurs.
Specifically, above-mentioned verification mode can be identity information and facility information respectively, handed over control target is had permission
The identity information of mutual smart machine and the facility information for having permission sending control request are compared, and this method can specifically include
Following steps:
Step S1041, server verify whether equipment there is permission to send control request according to facility information, wherein such as
It include the corresponding facility information of control main body in the equipment authority information that fruit prestores, it is determined that equipment, which has permission transmission control, asks
It asks.
Specifically, the above-mentioned equipment authority information prestored is the facility information for having permission the equipment for sending control request.
If in the equipment authority information prestored including the corresponding facility information of control main body, illustrate that controlling the corresponding equipment of main body has
Permission sends control request to target interactive intelligence equipment, if not including that control main body is corresponding in preset equipment authority information
Facility information, then illustrate that controlling the corresponding equipment of main body does not have permission to send control request to target interactive intelligence equipment.
There is no permission to issue control request in the corresponding equipment of control main body, then regardless of the identity for controlling main body, all
Forbid to the unlock of control target interactive intelligence equipment and/or screen locking, and can be to the prompt information of equipment back-checking failure.
Step S1043, in the case where equipment has permission transmission control request, server is according to identity information access control
Whether main body has permission the unlock of control target interactive intelligence equipment or locks, wherein if wrapped in the identity authority information prestored
Include the identity information of control main body, it is determined that control main body has permission the unlock of control target interactive intelligence equipment or locks.
Specifically, the above-mentioned identity authority prestored is the control for having permission control and target interactive intelligence equipment unlock or locking
The identity information of main body.
In the case where the bodily movement of practising Wushu Information Authentication failure to control main body, prompt information can be returned to equipment, with prompt
User's checking failure is unable to control the unlock of target interactive intelligence equipment and/or locks.
It follows that the application above scheme has carried out two layers of authentication of equipment permission and identity authority, thus from control
The two dimensions of equipment used in main body and control main body ensure the information security of target interactive intelligence equipment.
Step S106, in the case where verifying successful situation, control target interactive intelligence equipment please solve server according to control
Lock locks.
Target interactive intelligence equipment can install the preset application program for being used to unlock locking, and the application program is for ringing
The locking control instruction or unlock control instruction for answering server to send.
In an alternative embodiment, server is in the case where being all proved to be successful identity information and facility information,
Control is sent to target interactive intelligence equipment and requests corresponding instruction, wherein control request may include unlocking request and locking
Request, unlocking request correspond to unlock instruction, and locking request is corresponding to lock instruction.Target interactive intelligence equipment receives server
It is executed after instruction, to realize by the unlock and/or locking of the target interactive intelligence equipment of intelligent terminal.
As an alternative embodiment, control interactive intelligence equipment is asked according to control in the case where verifying successful situation
It solves lock or locks, including:
Step S1061, server request to generate control instruction according to control, wherein control instruction includes that solution lock control refers to
Enable or lock control instruction.
Specifically, may include the identification information etc. of target interactive device in above-mentioned control instruction, for target interaction
The control that equipment is unlocked or locks, to execute control in the case where facility information and identity information all pass through and ask.
Step S1063 after server encrypts control instruction, is sent to target interactive intelligence equipment.
Specifically, AES (Advanced Encryption Standard, superencipherment mark can be carried out to control instruction
It is quasi-) algorithm for encryption, to guarantee control instruction safe transmission in the channel.
It can be seen that needing to realize unlock by the password that user inputs by interactive intelligence equipment itself in the prior art
Authentication, in the above embodiments of the present application, only server, which has permission, is unlocked and/or locks control to interactive intelligence equipment
System, and intelligent terminal used by a user is used to send to server to request, request server controls interactive intelligence equipment
System, to realize the long-range control for locking and unlocking to interactive intelligence equipment.And interactive intelligence equipment is carried out by server
Before locking and/or solving lock control, equipment used in the identity and control main body for controlling main body can be verified, to protect
Control could be unlocked and/or lock to interactive intelligence equipment using the equipment having permission by demonstrate,proving the user only having permission.This
The scheme of application, to the authentication for unlocking and/or locking interactive intelligence equipment, not only ensure that interactive intelligence equipment by server
Using safe, it is thus also avoided that need to input the troublesome operation that unlocking pin could unlock to interactive intelligence equipment, solve existing
Inputting password in technology in interactive intelligent tablet computer could unlock, and lead to interactive intelligent tablet computer cumbersome technology when in use
Problem.
From the foregoing, it will be observed that the above embodiments of the present application server receives control request, identity information and facility information are carried out
Verification, in the case where verifying successful situation, control interactive intelligence equipment is according to control request unlock or locks.Above scheme passes through clothes
Business device verifies the identity of control main body and the equipment of transmission control request, to be not necessarily to when using intelligent interaction device
User inputs password in interactive intelligence equipment, inputs password ability in interactive intelligent tablet computer in the prior art to solve
Unlock leads to interactive intelligent tablet computer cumbersome technical problem when in use.
Embodiment 2
Fig. 2 is a kind of flow chart of the control method for interactive intelligence equipment that the embodiment of the present invention 2 provides.The present embodiment is
It is embodied on the basis of above-described embodiment 2.This method comprises the following steps:
Step S21, server receive the identification information for the target interactive intelligence equipment that target interactive intelligence equipment is sent, with
And the corresponding equipment authority information of target interactive intelligence equipment and identity authority information, wherein equipment authority information is to have permission
The facility information of the equipment of control request is sent, identity authority information is to have permission the unlock of control target interactive intelligence equipment or add
The identity information of the control main body of lock.
Specifically, above-mentioned steps are when target interactive intelligence equipment first time access server by executing, or when needing to change
It is executed when equipment authority information, identity information.Identification information may include the MAC Address of target interactive intelligence equipment, sequence number
And type number etc., equipment authority information may include the MAC Address for having permission the equipment for sending control request, implementor name, sequence
Row number etc., part authority information are the identity information for having permission the unlock of control target interactive intelligence equipment or the control main body locked,
Identity authority information can be identification card number, telephone number, social account, fingerprint, head portrait, sound etc..
In an alternative embodiment, the wireless network in current environment is automatically accessed after the starting of target interactive intelligence equipment
Network, target interactive intelligence equipment search server in the wireless network of access, and detect whether the logged service found
Device executes above-mentioned steps if it is the logged server found, otherwise without executing above-mentioned steps.
Step S23, server receive control request, wherein include at least in control request:Control the identity information of main body
The facility information that used equipment is requested in control is sent with control main body, control main body is that request unlock target interactive intelligence is set
Standby object.
Step S25, server verify identity information and facility information;
Step S27, server is in the case where verifying successful situation, and control target interactive intelligence equipment is according to control request unlock
Or it locks.
Step S29, server receive the implementing result of the execution control request of interactive intelligence equipment.
Specifically, above-mentioned implementing result may include running succeeded and executing failure, when there is target interactive intelligence equipment
When communicating with server disconnection, implementing result may be failure.
Implementing result is fed back to equipment used in control main body by step S211, server.
In above-mentioned steps, implementing result is fed back to equipment used in control main body by server, is used for response control
Request, and prompt whether ownership goal interactive intelligence equipment unlocks or lock successfully.
Embodiment 3
Fig. 3 is a kind of flow chart of the control method for interactive intelligence equipment that the embodiment of the present invention 3 provides.The present embodiment is
It is embodied on the basis of above-described embodiment 1.This method comprises the following steps:
Step S31, server receive the identification information of the target interactive intelligence equipment imported by preset account executive,
And the corresponding equipment authority information of target interactive intelligence equipment and identity authority information, wherein equipment authority information is to have the right
Limit send control request equipment facility information, identity authority information be have permission control target interactive intelligence equipment unlock or
The identity information of the control main body of locking.
Above-mentioned steps after target interactive intelligence equipment for the first time access server, or when need to change equipment authority information,
It executes when identity information, is executed by the controlling terminal of login account executive.
Specifically, above-mentioned account executive can be the super account with highest permission, the account executive is from permission to clothes
The corresponding identity authority of device write-in target interactive intelligence equipment of being engaged in.
In an alternative embodiment, after target interactive intelligence equipment logs in access server, user passes through intelligent terminal
Account executive is logged in, and imports the mark of equipment authority information, identity authority information and target interactive intelligence equipment to server
Information.
Step S33, server receive control request, wherein include at least in control request:Control the identity information of main body
The facility information that used equipment is requested in control is sent with control main body, control main body is that request unlock target interactive intelligence is set
Standby object.
Step S35, server verify identity information and facility information.
Step S37, server control target interactive intelligence equipment in the case where verifying successful situation are unlocked according to control request
Or it locks.
Embodiment 4
According to embodiments of the present invention, a kind of embodiment of the control system of interactive intelligence equipment is provided, Fig. 4 is according to this
A kind of control system of interactive intelligence equipment of inventive embodiments, as shown in connection with fig. 4, which includes:
Target interactive intelligence equipment 40.
Controlling terminal 41 sends control request to server, wherein include at least in control request:Control the body of main body
Part information and control main body send the facility information of equipment used in control request, and control main body is that request unlocks target interaction
The object of smart machine.
Specifically, above-mentioned control request is initiated by the intelligent terminal (i.e. above-mentioned controlling terminal) of user, for requesting service
The control that device is unlocked and/or locks to target interactive intelligence equipment.Intelligent terminal can be by url, wechat public platform, micro-
Believe small routine, the corresponding application end APP of installation etc. mode access server.Above equipment information can be intelligent terminal
MAC Address, implementor name, sequence number etc., and without being limited thereto, identity information can for identification card number, telephone number, social account,
Fingerprint, head portrait, sound etc., and it is also not necessarily limited to this.
Server 42 communicates respectively with target interactive intelligence equipment and controlling terminal, for verifying identity information and equipment
Information, and in the case where verifying successful situation, control target interactive intelligence equipment is according to control request unlock or locks.
Specifically, above-mentioned verification mode can be respectively by identity information with have permission control target interactive intelligence equipment
Identity information and the facility information for having permission sending control request are compared.In an alternative embodiment, server exists
In the case where being all proved to be successful to identity information and facility information, control is sent to target interactive intelligence equipment and requests corresponding finger
It enables, wherein unlocking request corresponds to unlock instruction, and locking request is corresponding to lock instruction.Target interactive intelligence equipment receives service
It is executed after the instruction of device, to realize by the unlock and/or locking of the target interactive intelligence equipment of intelligent terminal.
Herein it should also be noted that, above-mentioned server can execute other steps that server executes in embodiment 1, this
Place repeats no more.
As a kind of optional embodiment, target interactive intelligence equipment is also used to send target interactive intelligence to server and set
The standby corresponding equipment authority information of identification information and target interactive intelligence equipment and identity authority information, wherein equipment power
Limit information is the facility information for having permission the equipment for sending control request, and identity authority information is to have permission control target interaction intelligence
The identity information of the unlock of energy equipment or the control main body locked.
As a kind of optional embodiment, controlling terminal is also used to import the mark of target interactive intelligence equipment to server
Information and the corresponding equipment authority information of target interactive intelligence equipment and identity authority information, wherein equipment authority information is
The facility information for sending the equipment of control request is had permission, identity authority information is to have permission control target interactive intelligence equipment solution
The identity information of lock or the control main body locked.
Fig. 5 is a kind of schematic diagram of the control system of according to embodiments of the present invention 4 optional interactive intelligence equipment, Fig. 6
It is that method according to a kind of flow chart of the control method of interactive intelligence equipment of inventive embodiments 1, in Fig. 6 can be applied and Fig. 5
In system above-described embodiment is further described below with reference to Fig. 5 and Fig. 6:
In the present embodiment, target interactive intelligence equipment is equipped with the client of application program (client is used for cloud
End server sending and receiving data processes and executes unlock dependent instruction), which starts automatically after starting with plate, and passes through net
Network is automatically associated to the server of cloud server, and controlling terminal (PC or smart phone) is sent out after server is accessed by network
The control request sent solution, lock target interactive intelligence equipment, the server of cloud server is according to presetting database to these controls
After terminal processed is verified, corresponding instruction is transferred to client process.
Each part in Fig. 5 is described in detail separately below:
It is mounted on client in target interactive intelligence equipment:
For sending following data to server:Target interactive intelligence equipment identification information (such as:The address Mac, sequence
Number, type number etc.);Possess solution, lock target interactive intelligence equipment permission controlling terminal facility information (such as:Mac
Location, implementor name, sequence number etc.;And possess solution, lock target interactive intelligence equipment permission personnel identity information (such as:
Identity card, telephone number, social account, fingerprint, head portrait, sound etc.).
According to the solution received from cloud server server, locks instruction and execute in target interactive intelligence equipment
Solution, the relevant operation locked.
It returns to the solution for executing cloud server server and sending, lock the implementing result data after instruction.
Cloud server server:
Receive data:It receives target interactive intelligence equipment (passing through client), the data that controlling terminal is sent.
Data storage and association:Store the data that send from target interactive intelligence equipment by client, and by these
The identification information of data and target interactive intelligence equipment is associated.Storage (possesses control from the data that controlling terminal imports
The facility information of the personnel identity relevant information of plate permission and controlling terminal that they use, and by these data and target
Interactive intelligence equipment is associated.
Data check:According to the database prestored, to information and control request progress legitimacy from controlling terminal
Verification.
Data processing:Request of data from controlling terminal is subjected to processing and is converted into relevant unlock instruction, and is passed through
Client is sent to after aes algorithm encryption;Then client is corresponded into implementing result data back to controlling terminal.
Following above-mentioned process is described in detail:
S61 receives the end PC, the request of data that mobile terminal is sent.
Specifically, the end PC, mobile terminal are controlling terminal, above-mentioned request of data is above-mentioned control request, and target is handed over
Mutual smart machine is equipped with client, and client is connected automatically to cloud server service after starting with target interactive intelligence equipment
Device waits the solution to be received from cloud server server, locks instruction, then according to instruction to target interactive intelligence equipment into
Row response solution, locking operation.
Herein it should be noted that in use, or importing is needed to gather around after target interactive intelligence equipment initializes for the first time
Have control plate permission personnel identity information and their common ends PC, mobile end equipment facility information when, client
Cloud server, which is sent, by these data carries out binding registration and association.
User can be used the equipment such as the end PC, mobile terminal and be corresponded to by url, wechat public platform, wechat small routine, installation
Application end APP etc. mode, connected reference to cloud server initiates request of data to target interactive intelligence equipment, i.e., solution,
Locking request.
Herein it should be noted that the end PC, mobile terminal can be connected by super management account into cloud server, into
Row imports the equipment letter of the identity information for possessing the personnel of plate control authority and their common ends PC, mobile end equipment
Breath, and will be associated on these facility informations beyond the clouds server with the identification information of plate.
Whether in the preset database S62 judges the end PC, mobile terminal device information, if it is judged that be it is yes, then into
Enter step S63, otherwise enters step S67.
Specifically, above-mentioned steps are used to verify the facility information of controlling terminal, if the end PC, mobile terminal device
Information in the preset database, as verifies successfully, is otherwise verification failure.
S63 carries out the verifying of identity information, if identity information is verified, enters step S64, otherwise enters step
Rapid S67.
S64, response data request, generates control instruction.
In the case where facility information and facility information are all verified, response data request generates control and refers to server
It enables.
S65 carries out AES encryption to control instruction.
Encrypted control instruction is sent to client by S66.
Specifically, executing control instruction after target interactive intelligence equipment receives control instruction by client and being solved
Lock locks.
S67, client refuse to respond.
In the case where facility information or identity information authentication failed, illustrate that equipment does not have permission, or the use of operation equipment
Family does not have permission to be solved to target interactive intelligence equipment, lock control, and cloud server refuses to respond request of data.
S68, client return processing result.
In above-mentioned steps, processing result is back to cloud server by client, and cloud server returns processing result
It is back to the end PC, mobile terminal.
Embodiment 5
According to embodiments of the present invention, a kind of embodiment of the control device of interactive intelligence equipment is provided, Fig. 7 is according to this
A kind of schematic diagram of the control device of interactive intelligence equipment of inventive embodiments 5, as shown in connection with fig. 7, which includes:
Receiving module 70 receives control request for server, wherein include at least in control request:Control main body
The facility information of equipment used in identity information and control main body transmission control request, control main body unlock target for request and hand over
The object of mutual smart machine.
Correction verification module 72, for server verification identity information and facility information.
Control module 74 controls target interactive intelligence equipment according to control for server in the case where verifying successful situation
Request unlock locks.
As a kind of optional embodiment, above-mentioned apparatus further includes:First receiving module is controlled for receiving in server
Before request, server receives the identification information and target for the target interactive intelligence equipment that target interactive intelligence equipment is sent
The corresponding equipment authority information of interactive intelligence equipment and identity authority information, wherein equipment authority information is to have permission transmission control
The facility information of the equipment of request is made, identity authority information is the control for having permission control and target interactive intelligence equipment unlock or locking
The identity information of main body processed.
As a kind of optional embodiment, above-mentioned apparatus further includes:Second receiving module is controlled for receiving in server
Before request, server receives the identification information and mesh of the target interactive intelligence equipment imported by preset account executive
Mark the corresponding equipment authority information of interactive intelligence equipment and identity authority information, wherein equipment authority information is to have permission transmission
The facility information of the equipment of request is controlled, identity authority information is to have permission the unlock of control target interactive intelligence equipment or lock
Control the identity information of main body.
As a kind of optional embodiment, correction verification module includes:First verifying submodule, believes for server according to equipment
Whether breath verifying equipment there is permission to send control request, wherein if in the equipment authority information prestored including control main body
Corresponding facility information, it is determined that equipment has permission transmission control request;Second verifying submodule, for having permission hair in equipment
In the case where sending control to request, server is set according to whether identity information access control main body has permission control target interactive intelligence
Standby unlock locks, wherein if in the identity authority information prestored including the identity information of control main body, it is determined that control master
Body has permission the unlock of control target interactive intelligence equipment or locks.
As a kind of optional embodiment, in the case where verifying successful situation, control module includes:Submodule is generated, is used for
Server requests to generate control instruction according to control, wherein control instruction is including unlock control instruction or locks control instruction;Hair
Submodule is sent, after encrypting control instruction for server, is sent to target interactive intelligence equipment.
As a kind of optional embodiment, above-mentioned apparatus further includes:Third receiving module is being verified for son in server
In successful situation, after control target interactive intelligence equipment is according to control request unlock or locking, server receives interaction
The implementing result of the execution control request of smart machine;Implementing result is fed back to control main body for server by feedback module
Used equipment.
Embodiment 6
According to embodiments of the present invention, a kind of storage medium is provided, storage medium includes the program of storage, wherein in journey
Equipment executes following steps where controlling storage medium when sort run:Server receives control request, wherein in control request extremely
Include less:It controls the identity information of main body and control main body sends the facility information that used equipment is requested in control, control master
Body is the object of request unlock target interactive intelligence equipment;Server verifies identity information and facility information;Server is verifying
In successful situation, control target interactive intelligence equipment is according to control request unlock or locks.
In addition, also controlling other steps where storage medium in equipment execution embodiment 1 in program operation, herein not
It repeats again.
Embodiment 7
According to embodiments of the present invention, a kind of processor is provided, processor is for running program, wherein when program is run
Execute following steps:Server receives control request, wherein includes at least in control request:Control main body identity information and
It controls main body and sends the facility information that used equipment is requested in control, control main body is request unlock target interactive intelligence equipment
Object;Server verifies identity information and facility information;Server controls target interactive intelligence in the case where verifying successful situation
Equipment is according to control request unlock or locks.
In addition, also executing other steps in embodiment 1 when program is run, details are not described herein again.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
In the above embodiment of the invention, it all emphasizes particularly on different fields to the description of each embodiment, does not have in some embodiment
The part of detailed description, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed technology contents can pass through others
Mode is realized.Wherein, the apparatus embodiments described above are merely exemplary, such as the division of the unit, Ke Yiwei
A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or
Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of unit or module
It connects, can be electrical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
On unit.It can some or all of the units may be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
Equipment (can for personal computer, server or network equipment etc.) execute each embodiment the method for the present invention whole or
Part steps.And storage medium above-mentioned includes:USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic or disk etc. be various to can store program code
Medium.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered
It is considered as protection scope of the present invention.
Claims (12)
1. a kind of control method of interactive intelligence equipment, which is characterized in that including:
Server receives control request, wherein includes at least in the control request:The identity information of control main body and the control
Main body processed sends the facility information that used equipment is requested in the control, and the control main body is request unlock target interaction intelligence
The object of energy equipment;
The server verifies the identity information and the facility information;
The server controls the target interactive intelligence equipment and requests to unlock according to the control in the case where verifying successful situation
Or it locks.
2. the method according to claim 1, wherein the method is also before server receives control request
Including:
The server receives the identification information for the target interactive intelligence equipment that the target interactive intelligence equipment is sent, with
And the corresponding equipment authority information of the target interactive intelligence equipment and identity authority information, wherein the equipment authority information
For the facility information for having permission the equipment for sending the control request, the identity authority information is to have permission the control target
The identity information of the unlock of interactive intelligence equipment or the control main body locked.
3. the method according to claim 1, wherein the method is also before server receives control request
Including:
The server receives the identification information of the target interactive intelligence equipment imported by preset account executive, and
The corresponding equipment authority information of the target interactive intelligence equipment and identity authority information, wherein the equipment authority information is
The facility information for sending the equipment of the control request is had permission, the identity authority information is to have permission the control target to hand over
The identity information of mutual smart machine unlock or the control main body locked.
4. the method according to claim 1, which is characterized in that the server verifies the identity
Information and the facility information, including:
The server verifies whether the equipment there is permission to send the control request according to the facility information, wherein
If in the equipment authority information prestored including the corresponding facility information of the control main body, it is determined that the equipment has permission hair
The control is sent to request;
In the case where the equipment has permission and sends control request, the server verifies institute according to the identity information
State whether control main body has permission the control target interactive intelligence equipment unlock or lock, wherein if the rights relating the person prestored
It include the identity information of the control main body in limit information, it is determined that the control main body has permission the control target interaction intelligence
It can equipment unlock or locking.
5. the method according to claim 1, wherein controlling the interactive intelligence in the case where verifying successful situation
Equipment is requested unlock according to the control or is locked, including:
The server requests to generate control instruction according to the control, wherein the control instruction includes unlock control instruction
Or lock control instruction;
After the server encrypts the control instruction, it is sent to the target interactive intelligence equipment.
6. the method according to claim 1, wherein the server is being controlled in the case where verifying successful situation
After the target interactive intelligence equipment is requested unlock or is locked according to the control, the method also includes:
The server receives the implementing result of the execution control request of the interactive intelligence equipment;
The implementing result is fed back to equipment used in the control main body by the server.
7. a kind of control system of interactive intelligence equipment, which is characterized in that including:
Target interactive intelligence equipment;
Controlling terminal sends control request to server, wherein includes at least in the control request:Control the identity of main body
Information and the control main body send the facility information that used equipment is requested in the control, and the control main body is that please solve
Lock the object of the target interactive intelligence equipment;
Server communicates respectively with the target interactive intelligence equipment and the controlling terminal, for verifying the identity information
It controls the target interactive intelligence equipment with the facility information and is requested according to the control and in the case where verifying successful situation
Unlock locks.
8. system according to claim 7, which is characterized in that the target interactive intelligence equipment is also used to the service
Device sends the identification information and the corresponding equipment permission letter of the target interactive intelligence equipment of the target interactive intelligence equipment
Breath and identity authority information, wherein the equipment authority information is the equipment letter for having permission the equipment for sending the control request
Breath, the identity authority information are to have permission the identity for controlling the target interactive intelligence equipment unlock or the control main body locked
Information.
9. system according to claim 7, which is characterized in that the controlling terminal is also used to import institute to the server
State the identification information and the corresponding equipment authority information of the target interactive intelligence equipment and identity of target interactive intelligence equipment
Authority information, wherein the equipment authority information is the facility information for having permission the equipment for sending the control request, the body
Part authority information is to have permission the identity information for controlling the target interactive intelligence equipment unlock or the control main body locked.
10. a kind of control device of interactive intelligence equipment, which is characterized in that including:
Receiving module receives control request for server, wherein includes at least in the control request:Control the body of main body
Part information and the control main body send the facility information that used equipment is requested in the control, and the control main body is request
Unlock the object of target interactive intelligence equipment;
Correction verification module verifies the identity information and the facility information for the server;
Control module controls the target interactive intelligence equipment according to institute for the server in the case where verifying successful situation
It states control request unlock or locks.
11. a kind of storage medium, which is characterized in that the storage medium includes the program of storage, wherein run in described program
When control the storage medium where equipment execute following steps:Server receives control request, wherein in the control request
It includes at least:The identity information and the control main body for controlling main body send the equipment letter that used equipment is requested in the control
Breath, the control main body are the object of request unlock target interactive intelligence equipment;The server verify the identity information and
The facility information;The server controls the target interactive intelligence equipment according to the control in the case where verifying successful situation
System request unlock locks.
12. a kind of processor, which is characterized in that the processor is for running program, wherein executed such as when described program is run
Lower step:Server receives control request, wherein includes at least in the control request:Control identity information and the institute of main body
It states control main body and sends the facility information that used equipment is requested in the control, the control main body is that request unlock target is handed over
The object of mutual smart machine;The server verifies the identity information and the facility information;The server verification at
In the case where function, controls the target interactive intelligence equipment and unlock is requested according to the control or is locked.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810784003.7A CN108920919A (en) | 2018-07-17 | 2018-07-17 | Control method, the device and system of interactive intelligence equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810784003.7A CN108920919A (en) | 2018-07-17 | 2018-07-17 | Control method, the device and system of interactive intelligence equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108920919A true CN108920919A (en) | 2018-11-30 |
Family
ID=64415601
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810784003.7A Pending CN108920919A (en) | 2018-07-17 | 2018-07-17 | Control method, the device and system of interactive intelligence equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108920919A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109947031A (en) * | 2019-04-15 | 2019-06-28 | 美的集团股份有限公司 | A kind of intelligent home equipment control method, medium, mobile terminal and device |
CN111092856A (en) * | 2019-11-18 | 2020-05-01 | 北京小米移动软件有限公司 | Network distribution method, network distribution device and computer readable storage medium |
CN112491813A (en) * | 2020-11-10 | 2021-03-12 | 深圳市中博科创信息技术有限公司 | Instruction transmission control method, instruction transmission control device and computer-readable storage medium |
CN113098964A (en) * | 2021-04-01 | 2021-07-09 | 中天光伏技术有限公司 | Communication connection establishing method and device, storage medium and electronic equipment |
CN114553620A (en) * | 2022-01-14 | 2022-05-27 | 青岛海尔科技有限公司 | Equipment disturbance-free setting method, equipment control method and device corresponding to method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106992956A (en) * | 2016-01-21 | 2017-07-28 | 阿里巴巴集团控股有限公司 | A kind of methods, devices and systems for realizing inter-device authentication |
CN107367946A (en) * | 2016-05-11 | 2017-11-21 | 珠海格力电器股份有限公司 | The method and device of control device |
CN108038983A (en) * | 2017-12-06 | 2018-05-15 | 广州小明科技有限公司 | Tablet computer automatically provides method, unit and system |
CN108234586A (en) * | 2016-12-22 | 2018-06-29 | 深圳市中兴微电子技术有限公司 | Control method, first terminal, second terminal, server and the system of terminal |
-
2018
- 2018-07-17 CN CN201810784003.7A patent/CN108920919A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106992956A (en) * | 2016-01-21 | 2017-07-28 | 阿里巴巴集团控股有限公司 | A kind of methods, devices and systems for realizing inter-device authentication |
CN107367946A (en) * | 2016-05-11 | 2017-11-21 | 珠海格力电器股份有限公司 | The method and device of control device |
CN108234586A (en) * | 2016-12-22 | 2018-06-29 | 深圳市中兴微电子技术有限公司 | Control method, first terminal, second terminal, server and the system of terminal |
CN108038983A (en) * | 2017-12-06 | 2018-05-15 | 广州小明科技有限公司 | Tablet computer automatically provides method, unit and system |
Non-Patent Citations (1)
Title |
---|
W.RICHARD STEVENS著: "《UNIX环境高级编程》", 28 February 2001, 机械工业出版社 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109947031A (en) * | 2019-04-15 | 2019-06-28 | 美的集团股份有限公司 | A kind of intelligent home equipment control method, medium, mobile terminal and device |
CN109947031B (en) * | 2019-04-15 | 2020-07-28 | 美的集团股份有限公司 | Intelligent household equipment control method, medium, mobile terminal and device |
CN111092856A (en) * | 2019-11-18 | 2020-05-01 | 北京小米移动软件有限公司 | Network distribution method, network distribution device and computer readable storage medium |
CN112491813A (en) * | 2020-11-10 | 2021-03-12 | 深圳市中博科创信息技术有限公司 | Instruction transmission control method, instruction transmission control device and computer-readable storage medium |
CN112491813B (en) * | 2020-11-10 | 2022-09-06 | 深圳市中博科创信息技术有限公司 | Instruction transmission control method and device and computer readable storage medium |
CN113098964A (en) * | 2021-04-01 | 2021-07-09 | 中天光伏技术有限公司 | Communication connection establishing method and device, storage medium and electronic equipment |
CN114553620A (en) * | 2022-01-14 | 2022-05-27 | 青岛海尔科技有限公司 | Equipment disturbance-free setting method, equipment control method and device corresponding to method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110012015B (en) | Block chain-based Internet of things data sharing method and system | |
CN108920919A (en) | Control method, the device and system of interactive intelligence equipment | |
CN100438421C (en) | Method and system for conducting user verification to sub position of network position | |
DE60223129T2 (en) | METHOD AND SYSTEM FOR SECURING A COMPUTER NETWORK AND PERSONAL IDENTIFICATION DEVICE USED FOR CONTROLLING NETWORK COMPONENT ACCESS | |
CN101931613B (en) | Centralized authenticating method and centralized authenticating system | |
CN100583114C (en) | System and method for remote security enablement | |
US9256723B2 (en) | Security key using multi-OTP, security service apparatus, security system | |
CN105847247A (en) | Authentication system and working method thereof | |
CN103489233A (en) | Electronic door control system with dynamic password | |
CN106652109A (en) | Intelligent lock control method, device and lock management server | |
CN107113613B (en) | Server, mobile terminal, network real-name authentication system and method | |
CN101816140A (en) | Token-based management system for PKI personalization process | |
CN103888255A (en) | Identity authentication method, device and system | |
CN106127888B (en) | Intelligent lock operation method and smart lock operating system | |
CN108259502A (en) | For obtaining the identification method of interface access rights, server-side and storage medium | |
CN100365974C (en) | Device and method for controlling computer access | |
CN105915338A (en) | Key generation method and key generation system | |
CN108010150A (en) | Intelligent Checking on Work Attendance recording method, electric terminal and computer-readable recording medium | |
CN104469736B (en) | A kind of data processing method, server and terminal | |
CN107819766B (en) | Security authentication method, system and computer readable storage medium | |
CN101594615B (en) | Method, system and equipment for network management of terminal triple information security | |
CN105187417B (en) | Authority acquiring method and apparatus | |
DE102017121648B3 (en) | METHOD FOR REGISTERING A USER AT A TERMINAL DEVICE | |
CN109495514A (en) | Mutual role help system and method based on edge termination | |
CN107645474A (en) | Log in the method for open platform and log in the device of open platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181130 |