CN114024779B - Method and apparatus for managing smart devices - Google Patents

Method and apparatus for managing smart devices Download PDF

Info

Publication number
CN114024779B
CN114024779B CN202210008167.7A CN202210008167A CN114024779B CN 114024779 B CN114024779 B CN 114024779B CN 202210008167 A CN202210008167 A CN 202210008167A CN 114024779 B CN114024779 B CN 114024779B
Authority
CN
China
Prior art keywords
data
service life
intelligent device
server
intelligent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210008167.7A
Other languages
Chinese (zh)
Other versions
CN114024779A (en
Inventor
全境娣
吴用
陈彬
于海波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yunding Network Technology Beijing Co Ltd
Original Assignee
Yunding Network Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yunding Network Technology Beijing Co Ltd filed Critical Yunding Network Technology Beijing Co Ltd
Priority to CN202210008167.7A priority Critical patent/CN114024779B/en
Publication of CN114024779A publication Critical patent/CN114024779A/en
Application granted granted Critical
Publication of CN114024779B publication Critical patent/CN114024779B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles

Abstract

The embodiment of the application discloses a method and a device for managing intelligent equipment. One embodiment of the method comprises: acquiring the service life of the first intelligent device, wherein the service life is provided by a second server; and responding to the fact that the current time exceeds the service life, intercepting a first instruction sent by the client and used for managing the first intelligent device, and keeping communication with the first intelligent device during the first instruction interception period so as to receive and store first data sent by the first intelligent device. According to the implementation method, the flexible control of the intelligent device by a device provider outside the privatization system is realized in the privatization deployment scene.

Description

Method and apparatus for managing smart devices
Technical Field
The embodiment of the application relates to the field of Internet of things, in particular to a method and a device for managing intelligent equipment.
Background
With the continuous development of the internet of things technology, in order to meet the requirements of users on data security and privacy, intelligent devices and cloud services are privatized and deployed from a server of a device provider to a client server. In this case, the device provider has very limited administrative rights for the smart device. Currently, the use of smart devices by a portion of users may be restricted by freezing the smart devices.
Disclosure of Invention
The embodiment of the application provides a method and a device for managing intelligent equipment.
In a first aspect, an embodiment of the present application provides a method for managing an intelligent device, where the method is applied to a first server and includes: acquiring the service life of the first intelligent device, wherein the service life is provided by a second server; and responding to the fact that the current time exceeds the service life, intercepting a first instruction sent by the client and used for managing the first intelligent device, and keeping communication with the first intelligent device during the first instruction interception period so as to receive and store first data sent by the first intelligent device.
In some embodiments, the above method further comprises: and processing the received first data during the period of intercepting the first instruction, and storing a processing result.
In some embodiments, the above method further comprises: receiving a service life prolonging instruction; updating the service life according to the life prolonging instruction; and after the service life is updated, restoring the first data and the processing result stored in the period of intercepting the first instruction, and sending the restored first data and/or the processing result to the client.
In some embodiments, the method further comprises: receiving service life data sent by a second server, wherein the service life data comprise identification information and a service life of the first intelligent device, and the service life data are sent after the second server successfully verifies the first intelligent device; analyzing the service life data to acquire identification information and a service life of the first intelligent device; and storing the identification information and the service life of the first intelligent device.
In some embodiments, the lifetime data further includes a user identifier, the lifetime data includes identification information of a plurality of first smart devices corresponding to the user identifier, and the lifetimes corresponding to the plurality of first smart devices are the same; in response to the current time exceeding the lifespan, intercepting a first instruction sent by the client for managing the first smart device, including: in response to the current time exceeding the lifespan, a first instruction sent by the client for managing any of the plurality of first smart devices is intercepted.
In some embodiments, the first smart device includes an imaging apparatus, and the method further includes: receiving second data which are sent by the first intelligent equipment and collected after the service life of the camera device is exceeded; analyzing the second data to identify abnormal use information of the first intelligent equipment from the second data; and sending the abnormal use information to the second server.
In some embodiments, the above method further comprises: responding to the second intelligent device entering a first state, controlling the first intelligent device to execute a first operation, and determining a first duration corresponding to the first operation; and controlling the first intelligent device to execute the second operation in response to the duration of the first operation executed by the first intelligent device reaching the first duration and/or in response to the second intelligent device entering the second state.
In a second aspect, an embodiment of the present application provides an apparatus for managing an intelligent device, where the apparatus is applied to a first server, and includes: the acquisition module is used for acquiring the service life of the first intelligent device, and the service life is provided by the second server; the intercepting module is used for responding to the fact that the current time exceeds the service life, and intercepting a first instruction which is sent by the client and used for managing the first intelligent equipment; and the storage module is used for keeping communication with the first intelligent device during the interception of the first instruction so as to receive and store the first data transmitted by the first intelligent device.
In some embodiments, the apparatus for managing smart devices further comprises: and the processing module is configured to process the received first data during the period of intercepting the first instruction. Wherein the storage module is further configured to store the processing result.
In some embodiments, the apparatus for managing smart devices further comprises: a first receiving module configured to receive a lifetime extension instruction; an update module configured to update the lifetime according to the lifetime extension instruction; and the management module is configured to restore the first data and the processing result stored in the first instruction intercepting period after the service life is updated, and send the restored first data and/or the processing result to the client.
In some embodiments, the apparatus for managing smart devices further comprises: the second receiving module is configured to receive service life data sent by the second server, wherein the service life data comprise identification information and a service life of the first intelligent device, and the service life data are sent after the second server successfully verifies the first intelligent device; and the analysis module is configured to analyze the service life data to acquire the identification information and the service life of the first intelligent device. Wherein the storage module is configured to store identification information and a lifetime of the first smart device.
In some embodiments, the age data further includes a user identification. The service life data comprises a plurality of first intelligent devices corresponding to the user identifications, and the service lives of the first intelligent devices are the same. The intercept module 602 is further configured to intercept a first instruction sent by the client for managing any of the plurality of first smart devices in response to the current time exceeding the lifespan.
In some embodiments, the first smart device includes a camera, and the apparatus for managing smart devices further includes: the third receiving module is configured to receive second data which are sent by the first intelligent equipment and acquired by the camera after the service life is exceeded; the analysis module is configured to analyze the second data to identify abnormal use information of the first intelligent device from the second data; and a sending module configured to send the abnormal use information to the second server.
In some embodiments, the apparatus for managing a smart device further includes: a control module configured to: responding to the second intelligent device entering a first state, controlling the first intelligent device to execute a first operation, and determining a first duration corresponding to the first operation; and controlling the first intelligent device to execute the second operation in response to the duration of the first operation executed by the first intelligent device reaching the first duration and/or in response to the second intelligent device entering the second state.
In a third aspect, the present application provides a computer readable medium, on which a computer program is stored, where the program, when executed by a processor, implements the method as described in any implementation manner of the first aspect.
In a fourth aspect, the present application provides a processor, where the processor is configured to execute a program, where the program executes to perform the method described in any implementation manner of the first aspect.
In a fifth aspect, an embodiment of the present application provides an electronic device, including: one or more processors; a storage device having one or more programs stored thereon; the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method as described in any implementation of the first aspect.
The method and the device for managing the intelligent equipment, provided by the embodiment of the application, have the advantages that the service life of the first intelligent equipment provided by the second server is obtained, when the current time exceeds the service life, the first instruction sent by the client for managing the first intelligent equipment is intercepted, the communication with the first intelligent equipment is kept during the process of intercepting the first instruction, the first data sent by the first intelligent equipment is received and stored, and the received data is not provided for a user, so that the second server can flexibly control the use of the first intelligent equipment through the setting of the service life, namely, the user of the client can freely control and use the first intelligent equipment in the service life, the control of the user of the client on the first intelligent equipment is limited through the instruction intercepted by the client when the service life exceeds the service life, and the data of the intelligent equipment is only stored and not provided for the user, and the flexible control of the intelligent equipment by the equipment provider outside the privatization system under the privatization deployment scene is realized. In addition, by only receiving and storing the data sent by the first intelligent device during the process of intercepting the client instruction, the data can be conveniently recovered subsequently, so that the integrity of the data of the first intelligent device can be ensured.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It is obvious that the drawings in the following description are only some examples or embodiments of the present application, and that for a person skilled in the art, other drawings can be obtained from the provided drawings without inventive effort, and that the present application can also be applied to other similar scenarios from the provided drawings. Unless otherwise apparent from the context, or otherwise indicated, like reference numbers in the figures refer to the same structure or operation.
FIG. 1 is an exemplary system architecture diagram to which some embodiments of the present application may be applied.
FIG. 2 is a flow diagram of one embodiment of a method for managing smart devices according to the present application.
FIG. 3 is a flow diagram of yet another embodiment of a method for managing smart devices according to the present application.
FIG. 4 is a flow diagram of yet another embodiment of a method for managing smart devices according to the present application.
FIG. 5 is a flow diagram of yet another embodiment of a method for managing smart devices according to the present application.
FIG. 6 is a block diagram illustrating an embodiment of an apparatus for managing smart devices according to the present application.
FIG. 7 is a schematic diagram of an electronic device suitable for use in implementing some embodiments of the present application.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. The described embodiments are only some embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings. The embodiments and features of the embodiments in the present application may be combined with each other without conflict.
It should be understood that "system", "apparatus", "unit" and/or "module" as used herein is a method for distinguishing different components, elements, parts or assemblies at different levels. However, other words may be substituted by other expressions if they accomplish the same purpose.
As used in this application and the appended claims, the terms "a," "an," "the," and/or "the" are not intended to be inclusive in the singular, but rather are intended to be inclusive in the plural unless the context clearly dictates otherwise. In general, the terms "comprises" and "comprising" merely indicate that steps and elements are included which are explicitly identified, that the steps and elements do not form an exclusive list, and that a method or apparatus may include other steps or elements. An element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
In the description of the embodiments herein, "/" means "or" unless otherwise specified, for example, a/B may mean a or B; "and/or" herein is merely an association describing an associated object, and means that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, in the description of the embodiments of the present application, "a plurality" means two or more than two.
In the following, the terms "first", "second" are used for descriptive purposes only and are not to be understood as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature.
Flow charts are used herein to illustrate operations performed by systems according to embodiments of the present application. It should be understood that the preceding or following operations are not necessarily performed in the exact order in which they are performed. Rather, the various steps may be processed in reverse order or simultaneously. Meanwhile, other operations may be added to the processes, or a certain step or several steps of operations may be removed from the processes.
Fig. 1 illustrates an exemplary system architecture 100 to which some embodiments of the present method for managing smart devices or apparatus for managing smart devices may be applied.
As shown in fig. 1, the system architecture 100 may include servers 101 and 102, a smart device 103, and a terminal device 104.
The medium of the communication link between the servers 101 and 102, between the server 101 and the smart device 103, and between the server 101 and the terminal device 104 may be provided through a network (not shown in the figure). The network may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
For the sake of convenience of differentiation, in the embodiment of the present application, the servers 101 and 102 may also be referred to as a first server 101 and a second server 102, respectively.
The system architecture 100 shown in fig. 1 is applicable to a privatized deployment scenario of smart devices and cloud services. The private deployment may also be referred to as localized deployment, and refers to that a Platform As A Service (PAAS) for controlling the smart device and a code of a client are encrypted and deployed from an original device provider server (i.e., the second server 102 in this application) to a client server (i.e., a server trusted by a user, i.e., the first server 101 in this application), and a fixed deployment machine is bound, and a link address of a gateway cooperating with the smart device 103 is changed to an address of the client server, which is equivalent to that both data and the smart device are deployed at the user. The code is prevented from being transferred to other deployment machines through encrypted deployment and binding to a fixed deployment machine, so that the security problem caused by code and data leakage is avoided.
In a privatized deployment scenario based on the system architecture shown in fig. 1, the privatized deployment system may include a platform service controlling the smart device and a device management system located in the first server 101. The device management system may be a client for the user to manage the smart device 103, and may be deployed in the terminal device 104 of the user. The user may manage and control the smart device 103 through the device management system. The device provider server may import the lifetime of the smart device to the privatization deployment system to authorize the privatization deployment system to privatize the smart device 103 during the lifetime.
The server 101 may be a server providing various intelligent device management services, for example, a privatization deployment server providing privatization deployment for the intelligent device 103 and the services. The privatization deployment server may respond to the received device control request sent by the terminal device 104, perform processing such as analysis on the request, obtain a processing result, and control the intelligent device 103 according to the processing result. The background server may also perform processing such as storage and analysis on the data in response to receiving the data sent by the smart device 103, and send the processing result to the terminal device 104.
The server 102 may provide various services, such as a server that provides lifetime management for the smart device 103 and a server that provides a device access authentication service for the server 101. The server can manage the service life of each intelligent device 103, respond to the request of the server 105 when the intelligent device 103 accesses the server 103, authenticate the intelligent device, and send the service life of the intelligent device 103 to the server 101 after the authentication is passed.
The servers 101 and 102 may be hardware or software. When the servers 101 and 102 are hardware, they may be implemented as a distributed server cluster composed of multiple servers, or may be implemented as a single server. When servers 101 and 102 are software, they may be implemented as multiple pieces of software or software modules (e.g., to provide distributed services) or as a single piece of software or software module. And is not particularly limited herein.
During the corresponding service life of the intelligent device 103, the intelligent device 103 may maintain communication with the PAAS deployed on the server 101, thereby ensuring that the local data of the intelligent device 103 may be effectively collected and uploaded to the PAAS. The PAAS can perform operation or processing on the received local data, and feed back the operation or processing result to the equipment management system, so as to present the operation or processing result to the client through the client. When a user inputs an instruction for controlling or managing the smart device 103 through the client, the client may issue the instruction to the PAAS. If the PAAS determines that the current time is within the service life of the intelligent device 103, the PAAS may issue the instruction to the intelligent device to control the intelligent device 103 to execute the corresponding operation.
When the service life of the intelligent device 103 is exceeded, the PAAS intercepts or discards the instruction sent by the client to the intelligent device 103, and the instruction of the user cannot be processed and forwarded to the intelligent device 103 at the PAAS layer. But at this time, the smart device 103 may still maintain communication with the PAAS, so as to ensure that the local data of the smart device 103 can still maintain effective collection, uploading and operation processing, but the processing result is no longer fed back to the device management system, but is only stored in the server 101. In some embodiments, the data uploaded by the smart device 103 and the corresponding processing results may be stored in the database in the server 101 encrypted during a time period exceeding the lifetime of the smart device 103.
Through the privatization deployment, the requirement of a user on the safety of the data of the intelligent device can be met, meanwhile, in order to avoid the loss of the control authority of the device supplier on the intelligent device, through the method for managing the intelligent device, the device supplier can provide the service life of the trial period to the privatization deployment server through a device supplier server (such as a second server in the method), so that the privatization deployment server can freeze the intelligent device after the trial period, still receive and store the data uploaded by the intelligent device during the process of freezing the intelligent device, and then the use of the device can be recovered and the data during the process of freezing the device can be recovered after the follow-up user prolongs the service life through operation. Therefore, the requirements of the user on data safety and privacy can be met, the equipment supplier can have certain use control authority for the intelligent equipment, if the user does not agree to pay after the trial period of the intelligent equipment (for example, the user can freely try the service life of the intelligent equipment), the equipment is frozen to pay, and therefore the equipment supplier losing the control authority for the intelligent equipment can be prevented from causing great loss. In addition, even if the intelligent device is frozen, the use of the intelligent device can be recovered when the use of the device is recovered, for example, the user can recover the use of the intelligent device by paying within a required time limit, the data during the freezing period is recovered, the integrity experience of the user on the data uploaded by the intelligent device is ensured, and the seamless connection of the use of the user is realized.
The smart device 103 may be hardware or software. When the smart device 103 is hardware, it can be various smart electronic devices, including but not limited to smart meters, smart water meters, smart cats' eyes, smart locks, gateways, and other electronic devices. When the smart device 103 is software, it can be installed in the electronic devices listed above. It may be implemented as multiple pieces of software or software modules (e.g., to provide distributed services) or as a single piece of software or software module. The embodiment of the present application does not set any limit to the specific type of the electronic device.
A user may interact with the server 101 over a network using the terminal device 104 to receive or send messages or data or the like. Various client applications, such as shopping applications, search applications, social platform software, device management software, etc., may be installed on the end device 104.
The terminal device 104 may be hardware or software. When the terminal device 104 is hardware, it may be various electronic devices, including but not limited to a smart phone, a tablet computer, a wearable device, an in-vehicle device, an Augmented Reality (AR)/Virtual Reality (VR) device, an ultra-mobile personal computer (UMPC), a netbook, a Personal Digital Assistant (PDA), a laptop portable computer, a desktop computer, and other electronic devices. When the terminal device 104 is software, it can be installed in the electronic devices listed above. It may be implemented as multiple pieces of software or software modules (e.g., to provide distributed services) or as a single piece of software or software module. The embodiment of the present application does not set any limit to the specific type of the electronic device.
It should be noted that the method for managing the smart device provided in the embodiment of the present application is generally performed by the server 101, and accordingly, the apparatus for managing the smart device is generally disposed in the server 101.
It should be understood that the number of smart devices, terminal devices, and servers in fig. 1 is merely illustrative. There may be any number of intelligent devices, terminal devices, networks, and servers, as desired for implementation.
With continued reference to FIG. 2, a flow 200 of one embodiment of a method for managing smart devices in accordance with the present application is shown. The method for managing the intelligent device comprises the following steps:
in step 201, the lifetime of the first smart device is obtained, and the lifetime is provided by the second server.
In this embodiment, the execution subject of the method for managing the smart device may be a first server,
for example, the first server may be the server 101 shown in fig. 1. The second server may be, for example, the server 102 shown in fig. 1. The first smart device may be, for example, the smart device 103 shown in fig. 1.
In some embodiments of the present application, the execution subject may receive the lifetime of the first smart device sent by the second server.
In some embodiments of the application, the execution subject may store the lifetime of the first smart device after receiving the lifetime, so that the lifetime of the first smart device may be directly read during subsequent use.
In some embodiments of the present application, the execution body may store a lifetime corresponding to each of the plurality of smart devices.
In an embodiment of the application, the execution body may encrypt the lifetime and store the encrypted lifetime.
Step 202, responding to the fact that the current time exceeds the service life, intercepting a first instruction sent by a client for managing the first intelligent device, and maintaining communication with the first intelligent device during the first instruction interception period so as to receive and store first data sent by the first intelligent device.
In some embodiments of the present application, when a user needs to operate and manage the first smart device, a corresponding instruction, i.e., the first instruction, may be output in a client (e.g., a client installed in the terminal device 104 shown in fig. 1). The client may send the instruction to the execution subject. After receiving the instruction sent by the client, if it is determined that the current time exceeds the service life corresponding to the first intelligent device, the execution main body may intercept a first instruction sent by the client for managing the first intelligent device. For example, after receiving the first instruction, the execution subject may directly discard the first instruction, or may not perform corresponding processing on the instruction, or may not forward the instruction to the first intelligent device.
In some embodiments of the present application, the first instruction may be an instruction for managing or controlling the smart device. For example, for the smart lock, the first instruction may be a password modification instruction, a state switching instruction, a service upgrading instruction, and the like; for the video monitoring device, the first instruction may be an operation instruction for viewing, downloading, real-time calling, and the like of data collected by the video monitoring device. For the intelligent electric meter or the intelligent water meter and the like, the first instruction can be an electric quantity or water quantity checking instruction, a remote state control instruction and the like.
During intercepting a first instruction, the execution main body keeps communication with a first intelligent device so as to receive and store first data sent by the first intelligent device. The first data may be data generated during the use of the first intelligent device, data collected by the first intelligent device, and the like. For example, when the first smart device is a smart lock, the first data may be data information such as a smart lock switch record and power information. When the first smart device is a smart meter, the first data may be a power-on state, a power consumption amount, and the like provided by the smart meter. When the first intelligent device is a video monitoring device, the first data may be images or video information collected by the video monitoring device.
In an embodiment of the present application, the first data uploaded by the smart device may be encrypted according to a certain encryption algorithm and then stored, and the specific algorithm used for encryption is not limited in the present application.
In some embodiments of the present application, after the service life is exceeded, the execution subject may only execute an instruction for intercepting an operation of the smart device by the user, and does not limit normal operation of the smart device. For example, for the smart lock, a service life may be preset for the smart lock, and if the trial period of the smart lock ends and the service life of the smart lock is not extended by the user, and the user does not extend the service life, the first server may intercept a password modification instruction sent by the user through the client, so that the user cannot modify the lock password outside the service life, but the password set before the smart lock may still be used, that is, the set password may still be used to unlock the smart lock, but the password cannot be modified. For the video monitoring equipment, if the trial period of the video monitoring equipment is over and the service life of the user is not prolonged, the video monitoring equipment can normally collect data and upload the data to the server, but the first server can intercept operations of viewing, downloading, deleting and the like of the data by the user, so that the user cannot perform the operations on the video monitoring equipment outside the service life.
The method for managing the smart device provided by the above embodiment of the present application, by obtaining the lifetime of the first smart device provided by the second server, and when the current time exceeds the lifetime, intercepting the first instruction sent by the client for managing the first smart device, and maintaining communication with the first smart device during intercepting the first instruction, to receive and store the first data sent by the first smart device, and not provide the received data to the user, thereby enabling the second server to flexibly control the use of the first smart device through the setting of the lifetime, that is, to enable the user of the client to freely control and use the first smart device during the lifetime, to limit the control of the first smart device by the user of the client through the instruction intercepted by the client when the lifetime exceeds, and to only store the data of the smart device without providing the data to the user, and the flexible control of the intelligent equipment by the equipment provider outside the privatization system under the privatization deployment scene is realized. In addition, by only receiving and storing the data sent by the first intelligent device during the process of intercepting the client instruction, the data can be conveniently recovered subsequently, so that the integrity of the data of the first intelligent device can be ensured.
With further reference to FIG. 3, a flow 300 of yet another embodiment of a method for managing smart devices is shown. The execution subject of the method for managing smart devices may be, for example, the server 101 shown in fig. 1. The method for managing the intelligent device comprises the following steps.
Step 301, obtaining the service life of the first intelligent device, wherein the service life is provided by the second server.
Step 302, responding to the fact that the current time exceeds the service life, intercepting a first instruction which is sent by a client and used for managing the first intelligent device, and maintaining communication with the first intelligent device during the first instruction interception period, so as to receive and store first data sent by the first intelligent device, process the received first data, and store the processing result.
For the steps 301-302, reference can be made to the step 201-202 shown in fig. 2, which is not described herein again.
In this embodiment, during the period of intercepting the first instruction, the execution main body further processes the received first data, and stores the processing result.
In an embodiment of the present application, the first data uploaded by the smart device and the corresponding processing result may be encrypted according to a certain encryption algorithm and then stored, and the specific algorithm used for encryption is not limited in the present application.
In some embodiments of the application, if the current time is within the lifetime, the execution main body may normally receive and forward an instruction sent by the client, so as to implement management of the smart device by the user, and after receiving data uploaded by the smart device, the execution main body may store and process the data, and feed back a processing result to the client to provide the user with the processing result.
Step 303, receiving a lifetime extension instruction.
In some embodiments of the present application, the time limit extension instruction may be transmitted by the second server in response to a preset operation of the user. In some embodiments, the preset operation of the user may be a payment operation of the user, an operation of extending a preset service life, or the like.
For example, when the user confirms that the quality and usage experience of the smart device is expected after a period of trial use, and decides to pay by agreement, the user may initiate a payment request to the second server. The second server may send a corresponding time limit extension instruction to the execution main body according to a corresponding time corresponding to the payment request.
For another example, after a period of trial use, the user thinks that more time is needed to experience the use of the smart device, so as to determine whether the use experience meets the user's requirements. At this time, the user may initiate a request for extending the preset lifetime to the second server, and the second server may send a corresponding lifetime extension instruction to the execution main body according to a corresponding time corresponding to the request for extending the preset lifetime.
Step 304, updating the service life according to the life prolonging instruction.
For example, if a user purchases a year of use, the lifetime may be extended by one year. Alternatively, if the user wishes to extend the trial period by one week, the lifetime may be extended by one week.
Step 305, after updating the lifetime, restoring the first data and the processing result stored during the intercepting of the first instruction, and sending the restored first data and/or the processing result to the client.
In some embodiments of the present application, after the lifetime is updated, for example, after the original lifetime is extended, the user may recover the access right to the data and the processing result stored during the interception of the first instruction within the updated lifetime, so that the user may select the required data or result as needed.
In one embodiment of the application, the data and/or processing results stored during the interception of the first instruction may be decrypted according to a decryption algorithm corresponding to the encryption algorithm used at the time of storage and provided to the user of the client.
For example, when the user rotates to pay for using the smart lock or applies for prolonging the trial period of the video monitoring device, the service life is prolonged, and the access and the use authority of the use data and the acquired image data of the video monitoring device are opened to the user again during the previous freezing period of the device, so that the user can view or download the relevant data as required.
The method for managing the smart device, provided by the above embodiment of the application, includes acquiring a lifetime of the first smart device provided by the second server, intercepting a first instruction sent by the client for managing the first smart device when a current time exceeds the lifetime to limit a user from operating the smart device, and maintaining communication with the first smart device during intercepting the first instruction to receive and store first data sent by the first smart device, process the received data, and store a processing result, and after the lifetime is updated, recovering data and a processing result stored during intercepting the instruction, and sending the recovered data and result to the client, so that the usage and management freezing permissions of the smart device can be flexibly controlled by setting the lifetime, and after the lifetime is updated, the data and the processing result during the freezing period can be recovered, so that the integrity of the data of the first intelligent device can be ensured, and a seamless use experience is provided for a user.
In some possible implementations of the foregoing embodiment of the present application, the lifetime may be provided by the second server when the first smart device accesses the first server. Reference may be further made to fig. 4, which illustrates a flow 400 of yet another embodiment of a method for managing smart devices. The execution subject of the method for managing the intelligent device is a first server, and for example, the server 101 shown in fig. 1 may be used. The method for managing the intelligent device can further comprise the following steps.
Step 401, receiving the lifetime data sent by the second server, where the lifetime data includes identification information and a lifetime of the first intelligent device, and the lifetime data is sent after the second server successfully verifies the first intelligent device.
In some embodiments of the present application, before privatizing deployment of the intelligent device, the validity of the intelligent device may be verified by the device provider, and only after the verification is passed, the intelligent device is allowed to access the privatizing deployment system.
For example, after the first server receives an access request of the first smart device, the first server may send the identification information of the device in the access request to the second server for verification. The second server can judge whether the first intelligent device is provided by a legal device provider or not according to the identification information. If so, the second server determines that the authentication is passed, determines a corresponding lifetime based on the identification information, and provides the device identification and the lifetime encryption to the first server.
If the first intelligent device is judged to be illegal, for example, the first intelligent device is not an intelligent device provided by a client side, or the first intelligent device is recorded as an intelligent device with potential safety hazard, the second server does not send the service life data to the second intelligent device. Or the second server can also send prompt information or authentication failure information to the first server to inform that the intelligent device which is currently requested to be accessed by the first server is not authenticated.
The device identification includes, but is not limited to, a device serial number, etc.
In some embodiments of the present application, the second server may query the lifetime set by the smart device from the database according to the flag information of the device. The database can be updated according to the related operation of the service life setting instruction performed by the user. For example, when a user applies for trial use or temporary use of a certain intelligent device, a corresponding relationship between the intelligent device and a service life corresponding to a trial period may be generated in the database according to the trial period or preset temporary use duration applied by the user. After a user pays for a certain intelligent device, the service life corresponding to the intelligent device can be generated or updated in the database according to the service life corresponding to the payment request of the user.
Step 402, analyzing the lifetime data to obtain the identification information and the lifetime of the first smart device.
In one embodiment of the present application, the first server may decrypt the received lifetime data using a decryption algorithm agreed with the second server to obtain the lifetime of the first smart device.
Step 403, storing the identification information and the lifetime of the first intelligent device, and completing the process of accessing the first server by the first intelligent device.
When the first server successfully stores the service life corresponding to the first intelligent device, the process that the first intelligent device accesses the first server is completed, that is, the first intelligent device successfully accesses the privatization system is completed, and the service life of the first intelligent device is bound.
In the process of completing the access of the first intelligent device to the first server, the first server may manage the first intelligent device according to the lifetime of the storage according to the method shown in fig. 2 or fig. 3. For a specific implementation process, reference may be made to fig. 2 and fig. 3, which are not described herein again.
Therefore, when the intelligent device is accessed to the first server, the first intelligent device is verified by the second server, the service life of the intelligent device is provided by the second intelligent device after the intelligent device passes the verification, the validity of the intelligent device accessed to the first server can be ensured, and the system safety is improved. In addition, the intelligent devices accessed to the first server can be ensured to have the service life set by the second server, so that the first server can manage the intelligent devices according to the service life.
In some embodiments of the present application, the lifetime data may further include a user identifier. The service life data includes identification information of a plurality of first intelligent devices corresponding to the user identification, and the service lives corresponding to the plurality of first intelligent devices are the same.
In this scenario, if the current time exceeds the lifetime, a first instruction sent by the client for managing any one of the plurality of first smart devices may be intercepted. For example, an instruction for some or all of the plurality of first smart devices may be intercepted to freeze some or all of the smart devices corresponding to the user identification.
Therefore, batch management of the intelligent equipment under the user name can be realized based on the management of the user identity, and the management efficiency of the intelligent equipment is improved.
In some embodiments of the present application, the first smart device may include a camera. With further reference to fig. 5, a flow 500 of yet another embodiment of a method for managing smart devices is illustrated. The execution subject of the method for managing a smart device may be a first server, for example, the server 101 shown in fig. 1. The method for managing the intelligent device can further comprise the following steps on the basis of the steps shown in fig. 2 or fig. 3.
Step 501, receiving second data, which is sent by the first intelligent device and acquired by the camera after the service life is exceeded.
The second data may include, but is not limited to, image, video, and the like. In some embodiments of the present application, the camera device configured to the first smart device may continue to capture data information such as images and videos while the first smart device is frozen, and send the captured data to the first server.
Step 502, analyzing the second data to identify abnormal use information of the first intelligent device from the second data.
The abnormal use information can comprise use information such as violent disassembly, password cracking and the like.
In some embodiments of the present application, the first server may identify, by means of image identification or the like, the image frame with the actions of violent disassembly, password cracking, or the like from the second data, and record and store the image frame. In addition, the first server can also identify the face image of the user who is abnormally used from the second data through face recognition, and record and store the face image.
Step 503, sending the abnormal use information to the second server.
Therefore, data are collected during the freezing period of the equipment through the camera device and are sent to the first server for analysis processing, abnormal use information of the first intelligent equipment is identified, the abnormal use information is provided for the second server, abnormal use evidence during the freezing period of the intelligent equipment can be kept, and corresponding measures can be taken by the second server side according to the abnormal use information to prevent subsequent abnormal use.
In some embodiments of the present application, the method for managing a smart device may further include: responding to the second intelligent device entering a first state, controlling the first intelligent device to execute a first operation, and determining a first duration corresponding to the first operation; and responding to the first intelligent device executing the first operation for a first time length and/or responding to the second intelligent device entering the second state, and controlling the first intelligent device to execute the second operation.
The embodiment can be applied to a scene that a room with an intelligent lock is temporarily watched. Wherein the second smart device may be a smart lock. The first preset state of the intelligent lock can be that the intelligent lock is opened from the outside, and the second preset state of the intelligent lock can be that the intelligent lock is closed from the outside. The first intelligent device can be an intelligent water meter or an intelligent electric meter. The first operation of the intelligent water meter can be to control the water supply of the room where the intelligent lock is located, and the second operation of the intelligent water meter can be to control the water supply of the room where the intelligent lock is located to be cut off. The first operation of the intelligent electric meter can be to control the power-on of the room where the intelligent lock is located, and the second operation of the intelligent electric meter can be to control the power-off of the room where the intelligent lock is located.
Under this scene, when the intelligence lock was opened from the outsider, the server can receive the intelligence lock notice that gets into the first state that the intelligence lock sent, and then steerable intelligence water gauge and the smart electric meter in this intelligence lock place room control room lead to water and circular telegram to the user uses is seen in the convenient area. Meanwhile, the server can also set a corresponding first time length of the current watch, so that when the water passing and power-on time length reaches the first time length, the current watch can be considered to be finished, and the intelligent water meter and the intelligent electric meter in the room where the intelligent lock is located are controlled to control the room to be interrupted with water and power off.
Of course, if the intelligent lock is closed from the outside before the first time period is reached, the server can receive the notification that the intelligent lock enters the second state, and then the intelligent water meter and the intelligent electric meter in the room where the intelligent lock is located can be directly controlled to control the room to be interrupted and powered off.
Therefore, the power on/off and water on/off of the vacant room can be automatically controlled according to the state of the intelligent lock, the temporary power on under the scene with a watch is realized, and the power on/off, the water on/off and the water off/off of the house can be realized. In addition, except controlling the water and electricity state of the room according to the lock state, a time with the watch can be further set when the water is electrified, so that the water is cut off at the automatic power-off point when the time with the watch is reached, and the double guarantee of the automatic control of the water and electricity is realized.
With further reference to fig. 6, as an implementation of the methods shown in some of the above figures, the present application provides an embodiment of an apparatus for managing smart devices, where the embodiment of the apparatus corresponds to the embodiment of the method shown in fig. 2, and the apparatus may be applied to various electronic devices.
As shown in fig. 6, the apparatus 600 for managing smart devices of the present embodiment includes: an acquisition module 601, an interception module 602, and a storage module 603.
Wherein, the obtaining module 601 is configured to obtain a lifetime of the first smart device, and the lifetime is provided by the second server.
An intercepting module 602 configured to intercept a first instruction sent by a client for managing the first smart device in response to the current time exceeding the lifespan.
A storage module 603 configured to maintain communication with the first smart device during the intercepting of the first instruction to receive and store first data transmitted by the first smart device.
In this embodiment, for specific processing of the obtaining module 601, the intercepting module 602, and the storing module 603 and technical effects brought by the processing, reference may be made to the related description of the embodiment corresponding to step 201 and step 202 in the embodiment of fig. 2, and no further description is given here.
In some optional implementations of this embodiment, the apparatus 600 for managing smart devices further includes a processing module. The processing module processes the received first data during the period of intercepting the first instruction. Wherein the storage module 603 is further configured to store the processing result.
In some optional implementations of this embodiment, the apparatus 600 for managing a smart device further includes: a first receiving module configured to receive a lifetime extension instruction; an update module configured to update the lifetime according to the lifetime extension instruction; and the management module is configured to restore the first data and the processing result stored in the first instruction intercepting period after the service life is updated, and send the restored first data and/or the processing result to the client.
In some optional implementations of the embodiment, the time limit extension instruction is sent by the second server in response to a preset operation of the user.
In some optional implementations of this embodiment, the lifetime is provided by the second server when the first smart device accesses the first server.
In some optional implementations of this embodiment, the apparatus 600 for managing a smart device further includes: the second receiving module is configured to receive service life data sent by the second server, wherein the service life data comprise identification information and a service life of the first intelligent device, and the service life data are sent after the second server successfully verifies the first intelligent device; and the analysis module is configured to analyze the service life data to acquire the identification information and the service life of the first intelligent device. The storage module 603 is configured to store the identification information and the lifetime of the first smart device, and complete the process of accessing the first server by the first smart device.
In some optional implementations of this embodiment, the lifetime data further includes a user identifier. The service life data comprises a plurality of first intelligent devices corresponding to the user identifications, and the service lives of the first intelligent devices are the same. The intercept module 602 is further configured to intercept a first instruction sent by the client for managing any of the plurality of first smart devices in response to the current time exceeding the lifespan.
In some optional implementations of this embodiment, the first smart device includes an image capturing apparatus, and the apparatus for managing the smart device further includes: the third receiving module is configured to receive second data which are sent by the first intelligent equipment and acquired by the camera after the service life is exceeded; the analysis module is configured to analyze the second data to identify abnormal use information of the first intelligent device from the second data; and a sending module configured to send the abnormal use information to the second server.
In some optional implementations of this embodiment, the apparatus for managing an intelligent device further includes: a control module configured to: responding to the second intelligent device entering a first state, controlling the first intelligent device to execute a first operation, and determining a first duration corresponding to the first operation; and controlling the first intelligent device to execute the second operation in response to the duration of the first operation executed by the first intelligent device reaching the first duration and/or in response to the second intelligent device entering the second state.
It should be noted that the apparatus 600 for managing an intelligent device may be a chip, a component or a module, and the apparatus 600 for managing an intelligent device may include a processor and a memory, where the obtaining module 601, the intercepting module 602, the storage module 603, and the like are all stored as program units in the memory, and the processor executes the program units stored in the memory to implement corresponding functions.
The processor may include a kernel, which calls the corresponding program unit from the memory. The kernel can be provided with one or more of intercepting a first instruction sent by the client for managing the first intelligent device when the service life provided by the second server is exceeded by adjusting the kernel parameters, and maintaining communication with the first intelligent device during interception of the first instruction so as to receive and store first data sent by the first intelligent device.
The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip.
The apparatus for managing smart devices provided by the above-mentioned embodiment of the present application, by obtaining the lifetime of the first smart device provided by the second server, and when the current time exceeds the lifetime, intercepting the first instruction sent by the client for managing the first smart device, and maintaining communication with the first smart device during intercepting the first instruction, to receive and store the first data sent by the first smart device, and not provide the received data to the user, thereby enabling the second server to flexibly control the use of the first smart device through the setting of the lifetime, that is, to enable the user of the client to freely control and use the first smart device during the lifetime, to limit the control of the first smart device by the user of the client through the instruction intercepted by the client when the lifetime exceeds, and to store the data of the smart device only without providing the data to the user, and the flexible control of the intelligent equipment by the equipment provider outside the privatization system under the privatization deployment scene is realized. In addition, by only receiving and storing the data sent by the first intelligent device during the process of intercepting the client instruction, the data can be conveniently recovered subsequently, so that the integrity of the data of the first intelligent device can be ensured.
Referring now to FIG. 7, shown is a schematic diagram of an electronic device 700 suitable for use in implementing some embodiments of the present application. The electronic device shown in fig. 7 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 7, the electronic device 700 may include a processor 701, a memory 702, a communication interface 703, an input unit 704, an output unit 705, and a communication bus 706. Wherein the processor 701 and the memory 702 are connected to each other via a communication bus 706. A communication interface 703, an input unit 704 and an output unit 705 are also connected to the communication bus 706.
The communication interface 703 may be an interface of a communication module, such as an interface of a GSM module. The communication interface 703 may be configured to obtain a lifetime provided by the second server, obtain first data of the first smart device, obtain a first instruction sent by the client for managing the first smart device, send the first instruction to the first smart device within the lifetime, and send the first data and a processing result of the first data to the client.
In the embodiment of the present application, the processor 701 may be a Central Processing Unit (CPU), an application-specific integrated circuit (ASIC), a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA), or other programmable logic devices.
In one possible implementation, the memory 702 may include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data created according to the use of the computer, such as user data, smart device data, processing results of the data, and term data, etc.
Further, the memory 702 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device or other volatile solid state storage device.
The processor 701 may call a program stored in the memory 702, and in particular, the processor 701 may execute the method for managing the smart device as shown in any one of the embodiments of fig. 2 to 5 above.
The memory 702 is used for storing one or more programs, the program may include program codes, the program codes include computer operation instructions, in this embodiment, the memory 702 stores at least the program for realizing the following functions:
acquiring the service life of the first intelligent device, wherein the service life is provided by a second server; and
in response to the current time exceeding the service life, a first instruction sent by the client for managing the first intelligent device is intercepted, and communication with the first intelligent device is kept during the process of intercepting the first instruction, so that first data sent by the first intelligent device is received and stored.
The present application may further include an input unit 705, and the input unit 705 may include at least one of a touch sensing unit that senses a touch event on the touch display panel, a keyboard, a mouse, a camera, a microphone, and the like.
The output unit 704 may include: at least one of a display, a speaker, a vibration mechanism, a light, and the like. The display may comprise a display panel, such as a touch display panel or the like. In one possible case, the Display panel may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. The vibration mechanism may displace the electronic device 700 during operation, and in one possible implementation, the vibration mechanism includes a motor and an eccentric vibrator, and the motor drives the eccentric vibrator to rotate so as to generate vibration. The brightness and/or color of the lamp can be adjusted, in a possible implementation manner, different information can be embodied through at least one of the on-off, brightness and color of the lamp, for example, the alarm information can be embodied through red light emitted by the lamp.
Of course, the structure of the electronic device 700 shown in fig. 7 does not limit the electronic device in the embodiment of the present application, and in practical applications, the electronic device may include more or less components than those shown in fig. 7, or some components may be combined.
The present application provides a computer readable medium, on which a computer program is stored, wherein the program, when executed by a processor, implements the method for managing a smart device described in the above method embodiments.
The embodiment of the present application provides a processor, where the processor is configured to execute a program, where the program executes to implement the method for managing an intelligent device described in the above method embodiments.
The present application further provides a computer program product which, when executed on a data processing device, causes the data processing device to implement the method for managing a smart device described in the above method embodiments.
In addition, the electronic device, the processor, the computer-readable medium, or the computer program product provided in the foregoing embodiments of the present application may be all used for executing the corresponding method provided above, and therefore, the beneficial effects achieved by the electronic device, the processor, the computer-readable medium, or the computer program product may refer to the beneficial effects in the corresponding method provided above, and are not described herein again.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, which include both non-transitory and non-transitory, removable and non-removable media, may implement the information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above description is only for the purpose of illustrating the preferred embodiments of the present application and the technical principles applied, and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. The scope of the invention according to the present application is not limited to the specific combinations of the above-described features, and may also cover other embodiments in which the above-described features or their equivalents are arbitrarily combined without departing from the spirit of the invention. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (11)

1. A method for managing smart devices, applied to a first server, the method comprising:
acquiring the service life of the first intelligent device, wherein the service life is provided by a second server; and
responding to the current time exceeding the service life, intercepting a first instruction sent by a client for managing the first intelligent device, and maintaining communication with the first intelligent device during the interception of the first instruction so as to receive and store first data sent by the first intelligent device.
2. The method of claim 1, further comprising:
and processing the received first data during the period of intercepting the first instruction, and storing a processing result.
3. The method of claim 2, further comprising:
receiving a service life prolonging instruction;
updating the service life according to the life prolonging instruction; and
after the service life is updated, the first data and the processing result stored in the period of intercepting the first instruction are recovered, and the recovered first data and/or the processing result are/is sent to the client.
4. The method of claim 1, further comprising:
receiving the service life data sent by the second server, wherein the service life data comprise the identification information of the first intelligent device and the service life, and the service life data are sent after the second server successfully verifies the first intelligent device;
analyzing the service life data to acquire the identification information and the service life of the first intelligent device; and
storing the identification information and the lifetime of the first smart device.
5. The method of claim 4, wherein the lifetime data further comprises a user identification, the lifetime data comprising identification information of a plurality of first smart devices corresponding to the user identification, the plurality of first smart devices corresponding to the same lifetime;
the intercepting of the first instruction sent by the client for managing the first smart device in response to the current time exceeding the lifespan includes:
in response to the current time exceeding the lifespan, intercepting a first instruction sent by the client for managing any of the plurality of first smart devices.
6. The method of claim 1, wherein the first smart device comprises a camera, the method further comprising:
receiving second data which are sent by the first intelligent equipment and collected by the camera device after the service life is exceeded;
analyzing the second data to identify abnormal use information of the first intelligent device from the second data; and
and sending the abnormal use information to the second server.
7. The method of claim 1, further comprising:
responding to a second intelligent device entering a first state, controlling the first intelligent device to execute a first operation, and determining a first duration corresponding to the first operation; and
and controlling the first intelligent device to execute a second operation in response to the time length of the first intelligent device executing the first operation reaching the first time length and/or in response to the second intelligent device entering a second state.
8. An apparatus for managing smart devices, applied to a first server, the apparatus comprising:
the acquisition module is used for acquiring the service life of the first intelligent device, and the service life is provided by the second server;
the intercepting module is used for responding to the fact that the current time exceeds the service life, and intercepting a first instruction which is sent by a client and used for managing the first intelligent equipment;
and the storage module is used for keeping communication with the first intelligent device during the interception of the first instruction so as to receive and store the first data sent by the first intelligent device.
9. A computer-readable medium, on which a computer program is stored, wherein the program, when executed by a processor, implements the method of any one of claims 1-7.
10. A processor for running a program, wherein the program when running implements the method of any one of claims 1-7.
11. A server, comprising:
one or more processors;
a storage device having one or more programs stored thereon;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method recited in any of claims 1-7.
CN202210008167.7A 2022-01-06 2022-01-06 Method and apparatus for managing smart devices Active CN114024779B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210008167.7A CN114024779B (en) 2022-01-06 2022-01-06 Method and apparatus for managing smart devices

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210008167.7A CN114024779B (en) 2022-01-06 2022-01-06 Method and apparatus for managing smart devices

Publications (2)

Publication Number Publication Date
CN114024779A CN114024779A (en) 2022-02-08
CN114024779B true CN114024779B (en) 2022-04-29

Family

ID=80069870

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210008167.7A Active CN114024779B (en) 2022-01-06 2022-01-06 Method and apparatus for managing smart devices

Country Status (1)

Country Link
CN (1) CN114024779B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102566531A (en) * 2011-05-19 2012-07-11 广东迅通科技股份有限公司 Monitoring and early warning system for service life of equipment
CA2954498A1 (en) * 2014-07-07 2016-01-14 Ascensia Diabetes Care Holdings Ag Methods and apparatus for improved low energy data communications
WO2016192387A1 (en) * 2015-05-29 2016-12-08 乐鑫信息科技(上海)有限公司 Internet of things configuration method and system for secure low-power-consumption proxy device
CN108292238A (en) * 2015-12-18 2018-07-17 想象技术有限公司 Control the scheduling of GPU
CN109088872A (en) * 2018-08-15 2018-12-25 广州市保伦电子有限公司 Application method, device, electronic equipment and the medium of cloud platform with service life
CN111132138A (en) * 2019-12-06 2020-05-08 中国电子科技集团公司电子科学研究院 Transparent communication protection method and device for mobile application program
CN111421374A (en) * 2020-04-07 2020-07-17 大连毅无链信息技术有限公司 Shared use system and method of machining center

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017218993A1 (en) * 2016-06-17 2017-12-21 Predictive Safety Srp, Inc. Interlock control system and method
US20200112555A1 (en) * 2018-10-05 2020-04-09 Averon Us, Inc. Apparatuses, methods, and computer program products for secure access credential management

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102566531A (en) * 2011-05-19 2012-07-11 广东迅通科技股份有限公司 Monitoring and early warning system for service life of equipment
CA2954498A1 (en) * 2014-07-07 2016-01-14 Ascensia Diabetes Care Holdings Ag Methods and apparatus for improved low energy data communications
WO2016192387A1 (en) * 2015-05-29 2016-12-08 乐鑫信息科技(上海)有限公司 Internet of things configuration method and system for secure low-power-consumption proxy device
CN108292238A (en) * 2015-12-18 2018-07-17 想象技术有限公司 Control the scheduling of GPU
CN109088872A (en) * 2018-08-15 2018-12-25 广州市保伦电子有限公司 Application method, device, electronic equipment and the medium of cloud platform with service life
CN111132138A (en) * 2019-12-06 2020-05-08 中国电子科技集团公司电子科学研究院 Transparent communication protection method and device for mobile application program
CN111421374A (en) * 2020-04-07 2020-07-17 大连毅无链信息技术有限公司 Shared use system and method of machining center

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
基于USBKey认证技术的文档安全防护系统;施明泰;《电力信息化》;20110915(第09期);全文 *
基于使用控制的数字版权管理系统安全性分析;王昌达等;《计算机应用》;20121001(第10期);全文 *
基于物联网架构的车务设备智能追踪管理系统;陈立春;《中国铁路》;20150215(第02期);全文 *

Also Published As

Publication number Publication date
CN114024779A (en) 2022-02-08

Similar Documents

Publication Publication Date Title
US11451392B2 (en) Token-based secure data management
US9813241B2 (en) Encrypted file storage
US11308461B2 (en) Systems and methods for tracking and transferring ownership of connected devices using blockchain ledgers
US20180183606A1 (en) Verifying authenticity of computer readable information using the blockchain
CN106161629B (en) Business object synchronization method, client and server
US8700898B1 (en) System and method for multi-layered sensitive data protection in a virtual computing environment
CN111708991A (en) Service authorization method, service authorization device, computer equipment and storage medium
US20160321664A1 (en) System and method for secure transactions using images
US20220103532A1 (en) Consensus service for blockchain networks
CN105027096A (en) Securing results of privileged computing operations
CN110866261A (en) Data processing method and device based on block chain and storage medium
US11258601B1 (en) Systems and methods for distributed digital rights management with decentralized key management
CN111654375A (en) Block chain-based edge calculation security encryption method, device and system
US11463250B2 (en) Sharing data among different service providers at edge level through collaboration channels
CN114024779B (en) Method and apparatus for managing smart devices
CN113505260A (en) Face recognition method and device, computer readable medium and electronic equipment
CA2948229C (en) Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers
CN110825815A (en) Cloud note system information processing method, equipment and medium based on block chain
CN114120498B (en) Method and related device for migrating data
CN115174602B (en) Data processing method and system applied to fishery management
EP3975015B1 (en) Applet package sending method and device and computer readable medium
CN113869901B (en) Key generation method, key generation device, computer-readable storage medium and computer equipment
WO2022252356A1 (en) Data processing method and apparatus, electronic device, and medium
CN110874455A (en) Authorization management method and system
CN114529385A (en) Enterprise credit data cooperative processing method and system based on intelligent contract

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100094 room 1101, 11 / F, building 1, zone 2, 81 Beiqing Road, Haidian District, Beijing

Patentee after: Yunding Network Technology (Beijing) Co.,Ltd.

Address before: 100094 room 1101, 11 / F, building 1, zone 2, 81 Beiqing Road, Haidian District, Beijing

Patentee before: YUN DING NETWORK TECHNOLOGY (BEIJING) Co.,Ltd.