CN116467696A - Remote unlocking method and remote unlocking device - Google Patents

Remote unlocking method and remote unlocking device Download PDF

Info

Publication number
CN116467696A
CN116467696A CN202310341855.XA CN202310341855A CN116467696A CN 116467696 A CN116467696 A CN 116467696A CN 202310341855 A CN202310341855 A CN 202310341855A CN 116467696 A CN116467696 A CN 116467696A
Authority
CN
China
Prior art keywords
equipment
circulation
information
verification
legitimacy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310341855.XA
Other languages
Chinese (zh)
Inventor
李京涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao Haier Technology Co Ltd
Haier Smart Home Co Ltd
Haier Uplus Intelligent Technology Beijing Co Ltd
Original Assignee
Qingdao Haier Technology Co Ltd
Haier Smart Home Co Ltd
Haier Uplus Intelligent Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao Haier Technology Co Ltd, Haier Smart Home Co Ltd, Haier Uplus Intelligent Technology Beijing Co Ltd filed Critical Qingdao Haier Technology Co Ltd
Priority to CN202310341855.XA priority Critical patent/CN116467696A/en
Publication of CN116467696A publication Critical patent/CN116467696A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Computer Hardware Design (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Software Systems (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The application relates to the technical field of the Internet of things and discloses a remote unlocking method. The method includes determining a first device in a locked state, and a device type of the first device; according to the equipment type of the first equipment, carrying out circulation legitimacy verification on the first equipment; and unlocking the first device under the condition that the first device passes the verification of the circulation legitimacy. According to the method, when the first equipment is in a locking state, circulation legitimacy verification is conducted on the first equipment based on the equipment type of the first equipment, and under the condition that the first equipment passes the circulation legitimacy verification, the first equipment is unlocked; by executing the steps, the locking problem of different types of equipment is solved, the equipment in a locked state is subjected to remote circulation validity verification operation, remote unlocking control of the locked equipment is realized, and the problem of increase of after-sales service cost caused by a manual door-on unlocking mode is effectively solved. The application also discloses a remote unlocking device.

Description

Remote unlocking method and remote unlocking device
Technical Field
The application relates to the technical field of the internet of things, for example, to a remote unlocking method and a remote unlocking device.
Background
With rapid development of industrial economy, new energy technology is attracting attention, and heat pumps are also becoming more popular as a new energy device capable of transferring heat energy from a low-level heat source to a high-level heat source. Because the heat pump product is different from other electrical equipment, the heat pump product has higher requirements on after-sales service in the aspects of transportation, installation, use and the like; therefore, in the field of heat pumps, in order to prevent unauthorized circulation of the heat pump product in the market, technicians set the heat pump product before leaving the factory, so that the heat pump product automatically enters a locked state after running for a preset period of time.
At present, after the heat pump product enters a locking state, after-sales service personnel are required to go on the door to perform manual judgment to determine whether unauthorized circulation conditions exist in the heat pump equipment, and after-sales service personnel disassemble the heat pump product and execute corresponding unlocking operation after determining that the heat pump equipment is legal for circulation, so that the heat pump product can continue to be normally used. However, in the actual execution process, the after-sales service personnel can occupy a large amount of time for the after-sales service personnel due to complicated unlocking steps in an unlocking mode by the manual operation of going to the gate of the after-sales service personnel, so that the after-sales service cost is increased.
It should be noted that the information disclosed in the foregoing background section is only for enhancing understanding of the background of the present application and thus may include information that does not form the prior art that is already known to those of ordinary skill in the art.
Disclosure of Invention
The following presents a simplified summary in order to provide a basic understanding of some aspects of the disclosed embodiments. This summary is not an extensive overview, and is intended to neither identify key/critical elements nor delineate the scope of such embodiments, but is intended as a prelude to the more detailed description that follows.
The embodiment of the disclosure provides a remote unlocking method and a remote unlocking device, which are used for solving the problem of increased after-sales service cost caused by a manual unlocking mode of a current heat pump product.
In some embodiments, the remote unlocking method includes: determining a first device in a locked state and a device type of the first device; according to the equipment type of the first equipment, carrying out circulation legitimacy verification on the first equipment; and unlocking the first device under the condition that the first device passes the verification of the circulation legitimacy.
In some embodiments, the verifying the flow-through legitimacy of the first device according to the device type of the first device includes: determining a target verification mode matched with the equipment type of the first equipment; and verifying the circulation legitimacy of the first equipment according to the target verification mode.
In some embodiments, the target verification means is determined by: obtaining an equipment information base, wherein the equipment information base stores a plurality of equipment types and verification modes corresponding to different equipment types; and taking the verification mode corresponding to the equipment type of the first equipment in the equipment information base as a target verification mode.
In some embodiments, in the case where the first device is a heat pump device, the target verification means includes: acquiring identification information and installation information of a first device; determining circulation limiting information of the first equipment according to the identification information; and verifying the circulation legitimacy of the first equipment according to the installation information and the circulation limiting information.
In some embodiments, performing the flow verification of the first device according to the installation information and the flow restriction information includes: and under the condition that the installation information accords with the circulation limiting information, determining that the first equipment passes the verification of circulation legitimacy.
In some embodiments, the installation information of the first device is determined by: determining current location information of a second device associated with the first device; and taking the current positioning information as the installation information of the first equipment.
In some embodiments, determining the circulation-defining information of the first device based on the identification information includes: analyzing the equipment codes in the identification information, and determining a preset circulation area of the first equipment; and determining the circulation limiting information as a preset circulation area of the first equipment.
In some embodiments, unlocking the first device includes: sending an after-sales mode starting instruction to the first equipment; and sending an unlocking instruction to the first device when the first device operates in the after-sale mode.
In some embodiments, before sending the after-market mode initiation instruction to the first device, the remote unlocking method further comprises: sending an authentication request to a first device; and generating a start instruction of the after-sales mode when the received authentication result indicates that the authentication is passed.
In some embodiments, the remote unlocking device includes a processor and a memory storing program instructions, wherein the processor, when executing the program instructions, performs the remote unlocking method described above.
The remote unlocking method and the remote unlocking device provided by the embodiment of the disclosure can realize the following technical effects:
when the first equipment is in a locking state, carrying out circulation legitimacy verification on the first equipment based on the equipment type of the first equipment, and unlocking the first equipment under the condition that the first equipment passes the circulation legitimacy verification; by executing the steps, the locking problem of different types of equipment is solved, the equipment in a locked state is subjected to remote circulation validity verification operation, remote unlocking control of the locked equipment is realized, and the problem of increase of after-sales service cost caused by a manual door-on unlocking mode is effectively solved.
The foregoing general description and the following description are exemplary and explanatory only and are not restrictive of the application.
Drawings
One or more embodiments are illustrated by way of example and not limitation in the figures of the accompanying drawings, in which like references indicate similar elements, and in which like reference numerals refer to similar elements, and in which:
FIG. 1 is a schematic diagram of a remote unlocking method provided by an embodiment of the present disclosure;
FIG. 2 is a schematic diagram of another remote unlocking method provided by an embodiment of the present disclosure;
FIG. 3 is a schematic diagram of another remote unlocking method provided by an embodiment of the present disclosure;
FIG. 4 is a schematic diagram of another remote unlocking method provided by an embodiment of the present disclosure;
FIG. 5 is a schematic diagram of another remote unlocking method provided by an embodiment of the present disclosure;
FIG. 6 is a schematic diagram of another remote unlocking method provided by an embodiment of the present disclosure;
FIG. 7 is an interactive schematic diagram of a remote unlocking process provided by an embodiment of the present disclosure;
FIG. 8 is an interactive schematic diagram of another remote unlocking process provided by an embodiment of the present disclosure;
fig. 9 is a schematic diagram of a remote unlocking device provided by an embodiment of the present disclosure.
Detailed Description
So that the manner in which the features and techniques of the disclosed embodiments can be understood in more detail, a more particular description of the embodiments of the disclosure, briefly summarized below, may be had by reference to the appended drawings, which are not intended to be limiting of the embodiments of the disclosure. In the following description of the technology, for purposes of explanation, numerous details are set forth in order to provide a thorough understanding of the disclosed embodiments. However, one or more embodiments may still be practiced without these details. In other instances, well-known structures and devices may be shown simplified in order to simplify the drawing.
The terms first, second and the like in the description and in the claims of the embodiments of the disclosure and in the above-described figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate in order to describe embodiments of the present disclosure. Furthermore, the terms "comprise" and "have," as well as any variations thereof, are intended to cover a non-exclusive inclusion.
In actual production and life, after the electric equipment such as a heat pump is sold, the electric equipment runs for a period of time to enter a locking state, and at the moment, whether the locked equipment has unauthorized circulation or not is required to be judged. According to one aspect of the disclosed embodiments, the present application provides a remote unlocking method. The remote unlocking method comprises the following steps: determining a first device in a locked state and a device type of the first device; according to the equipment type of the first equipment, carrying out circulation legitimacy verification on the first equipment; and unlocking the first device under the condition that the first device passes the verification of the circulation legitimacy. As an optional implementation manner, the remote unlocking method may be applied to, but not limited to, a server side.
The remote unlocking method provided by the embodiment of the disclosure can be executed through a server, and the server can be a server associated with electrical equipment or an application program associated with electrical equipment information registered.
The remote unlocking method provided by the embodiment of the disclosure solves the locking problem of different types of equipment based on the internet of things technology, performs remote circulation validity verification operation on equipment in a locked state, and realizes remote unlocking control on the locked equipment, thereby effectively solving the problem of increased after-sales service cost caused by a manual door-on unlocking mode. Thus, the automatic verification and unlocking operation can be remotely executed by the control server, and the waiting time of the user after the equipment is locked can be shortened, so that the use experience of the user is improved, and the after-sale satisfaction of the user is improved.
As shown in connection with fig. 1, in some embodiments, the remote unlocking method may specifically include the following steps:
s100, the server determines the first equipment in the locking state and the equipment type of the first equipment.
And S200, the server side performs circulation legitimacy verification on the first equipment according to the equipment type of the first equipment.
S300, the server side unlocks the first device under the condition that the first device passes through the circulation legitimacy verification.
By adopting the remote unlocking method provided by the embodiment of the disclosure, when the first equipment is in a locked state, the circulation legitimacy of the first equipment is verified based on the equipment type of the first equipment, and the first equipment is unlocked under the condition that the first equipment passes the circulation legitimacy verification; the steps are executed by the control server to solve the locking problem of different types of equipment, the equipment in a locked state is subjected to remote circulation validity verification operation, and remote unlocking control of the locked equipment is realized, so that the problem of increased after-sales service cost caused by a manual door-opening unlocking mode is effectively solved.
In the embodiment of the present disclosure, the first device may refer to an electronic device having a wireless connection function, and the terminal device may communicate with the service provider through connection to the internet. The specific communication mode is not limited herein, and may be bluetooth, wifi, or the like. Specifically, the first device may be a heat pump device, and the first device may also be another electrical device that sets a locking program in order to prevent unauthorized circulation.
In step S100, to determine the first device in the locked state, the server may periodically send a request to each electrical device associated therewith to obtain operation state information of each electrical device. Specifically, the server sends an information acquisition request to an electrical device, and when the electrical device does not respond yet for more than a first preset time period, the electrical device can be determined to be in a locked state, and the electrical device is determined to be the first device.
Optionally, each electrical device associated with the server may be configured with a self-checking sensor, where the self-checking sensor is configured to detect operation status information of the electrical device, and the server may determine the first device by: the method comprises the steps that a server obtains running state information of certain electrical equipment; and under the condition that the running state information indicates that the electrical equipment is in a locking state currently, the electrical equipment actively reports the current state information to the server, so that the server knows that the electrical equipment is in the locking state, and the server determines the electrical equipment in the locking state as first equipment.
Optionally, the first device has a second device associated therewith, which may be a portable device of the user. In some embodiments, the second device may be a user's cell phone, tablet computer, smart watch, smart bracelet, or the like. In other embodiments, the second device may be another electrical device connected to the same local area network as the first device. The user may feed back the condition that the first device has a locked state by operating an application of the second device.
Taking a mobile phone with the second device as a user as an example, the user can feed back that the first device in the home is in a locked state by operating on a WeChat applet. The server receives feedback information of the user through the WeChat applet, and can determine the first equipment in the locking state.
Optionally, after determining the first device, the server may obtain the device type of the first device by: the server acquires the equipment description information of the first equipment, and determines the equipment type of the first equipment from the equipment description information of the first equipment.
Optionally, performing flow verification on the first device according to the device type of the first device, including: determining a target verification mode matched with the equipment type of the first equipment; and verifying the circulation legitimacy of the first equipment according to the target verification mode.
In the embodiment of the disclosure, the circulation validity verification manner of one electrical device may have an association relationship with the device type thereof. In practical application, the server may obtain a verification information table, where multiple types of electrical devices and circulation legitimacy verification modes corresponding to different types of electrical devices are stored in the verification information table. Thus, after determining the device type of the first device, the server may determine, from the verification information table, a target verification manner corresponding to the device type of the first device.
As an alternative embodiment, as shown in fig. 2, step S200 may further specifically include the following steps:
s210, the server determines a target verification mode matched with the equipment type of the first equipment.
S220, the server performs circulation validity verification on the first device according to the target verification mode.
By adopting the remote unlocking method provided by the embodiment of the disclosure, the server side firstly determines the target verification mode of the first device, and then performs circulation legitimacy verification on the first device according to the target verification mode, so as to determine whether the first device accords with the circulation legitimacy, and further determine whether the first device has unauthorized circulation. Thus, the server side automatically executes the circulation legitimacy verification process, so that the locking problem of different types of equipment can be solved, and the accuracy of the circulation legitimacy verification of the equipment can be improved. Compared with the possible fraud and misjudgment phenomena of manual inspection, the server side remotely and automatically executes the verification operation, so that the verification operation can be ensured to strictly execute the judgment of the preset verification conditions, and the accuracy of the verification of the circulation legitimacy is ensured to a certain extent.
Optionally, the target verification means is determined by: obtaining an equipment information base, wherein the equipment information base stores a plurality of equipment types and verification modes corresponding to different equipment types; and taking the verification mode corresponding to the equipment type of the first equipment in the equipment information base as a target verification mode. The device information base here may contain the contents stored in the aforementioned authentication information table.
In the embodiment of the disclosure, the device information base may be locally stored at the server, so that the server can directly retrieve the device information base from the local memory, so as to determine the target verification mode of the first device from the device information base.
As an alternative embodiment, as shown in fig. 3, step S210 may further specifically include the following steps:
s211, the server side obtains an equipment information base, and a plurality of equipment types and verification modes corresponding to different equipment types are stored in the equipment information base.
S212, the server takes a verification mode corresponding to the equipment type of the first equipment in the equipment information base as a target verification mode.
By adopting the remote unlocking method provided by the embodiment of the disclosure, the server determines the target verification mode of the first device based on the corresponding relation between the device type and the verification mode in the device information base, so that the locking problem of different types of devices can be effectively and pertinently solved; and the target verification mode corresponding to the first equipment is rapidly determined, and the unlocking operation is remotely executed by the control server, so that the problem of increased after-sales service cost caused by the manual door-opening unlocking mode is effectively solved, the waiting time of the user after equipment locking can be shortened, the use experience of the user is improved, and the after-sales satisfaction of the user is improved.
In the embodiment of the disclosure, taking the first device as the heat pump device as an example, when the server determines that the device type of the first device is the heat pump device, the server may determine, from the device information base, a verification manner corresponding to the heat pump device as a target verification manner.
Optionally, the target verification manner corresponding to the heat pump device may include: acquiring identification information and installation information of a first device; determining circulation limiting information of the first equipment according to the identification information; and verifying the circulation legitimacy of the first equipment according to the installation information and the circulation limiting information.
In the embodiments of the present disclosure, the circulation limiting information of the first device may be used to characterize an authorized sales area of the first device, an authorized sales channel of the first device, after-sales service information of the first device, and the like.
Optionally, the identification information of the first device may include a device code, and/or a device serial number. Wherein the device code, which may also be referred to as a device ID, is used for device management and device usage traceability. The device serial number is used to track and manage the lifecycle of the product.
Alternatively, the installation information of the first device may include installation location information of the first device. Specifically, the installation location information may include geographic coordinates of the installation of the device; the mounting location information may also include the relative mounting location of the device and the reference.
As an alternative embodiment, as shown in fig. 4, step S220 may further specifically include the following steps:
s221, the server acquires the identification information and the installation information of the first device.
S222, the server determines circulation limiting information of the first equipment according to the identification information.
S223, the server performs circulation legitimacy verification on the first device according to the installation information and the circulation limiting information.
By adopting the remote unlocking method provided by the embodiment of the disclosure, the server verifies the circulation legitimacy of the first equipment based on the installation information and the circulation limiting information of the first equipment; unlocking the first device under the condition that the first device passes through the verification of the circulation legitimacy; the steps are executed by the control server to solve the locking problem of different types of equipment, the equipment in a locked state is subjected to remote circulation validity verification operation, and remote unlocking control of the locked equipment is realized, so that the problem of increased after-sales service cost caused by a manual door-opening unlocking mode is effectively solved.
In some embodiments, the verifying the flow-through legitimacy of the first device may include: determining after-market service information of the first device based on the identification information of the first device; comparing the relative installation position of the first equipment with after-sales service information; and under the condition that the comparison result shows that the installation information of the first equipment accords with the circulation limiting information, determining that the first equipment passes the verification of circulation legitimacy.
As an alternative embodiment, as shown in fig. 5, step S220 may further specifically include the following steps:
s224, the server determines the current positioning information of the second device associated with the first device, and takes the current positioning information as the installation information of the first device.
S225, the server analyzes the equipment codes in the identification information and determines that the circulation limiting information is a preset circulation area of the first equipment.
And S226, the server determines that the first equipment passes the verification of circulation legitimacy under the condition that the installation information is matched with the preset circulation area of the first equipment.
By adopting the remote unlocking method provided by the embodiment of the disclosure, the server side firstly determines the installation information of the first equipment based on the current positioning information of the second equipment, then determines the circulation limiting information of the first equipment based on the equipment code of the identification information, and further verifies the circulation legitimacy of the first equipment based on the installation information and the circulation limiting information of the first equipment; unlocking the first device under the condition that the first device passes through the verification of the circulation legitimacy; the steps are executed by the control server to solve the locking problem of different types of equipment, the equipment in a locked state is subjected to remote circulation validity verification operation, and remote unlocking control of the locked equipment is realized, so that the problem of increased after-sales service cost caused by a manual door-opening unlocking mode is effectively solved.
In step S224, the installation information of the first device is determined by: determining current location information of a second device associated with the first device; and taking the current positioning information as the installation information of the first equipment. Taking a mobile phone with a second device as a user as an example, the mobile phone needs to have a bluetooth communication function and a positioning function, wherein the bluetooth communication function of the mobile phone is used for carrying out bluetooth communication with a bluetooth module of the first device. Thus, the server side can receive the current positioning information of the mobile phone so as to determine the current positioning information as the installation information of the first device. The installation information of the first device refers to geographical coordinates of the installation of the first device.
In step S225, determining circulation limiting information of the first device according to the identification information, including: analyzing the equipment codes in the identification information, and determining a preset circulation area of the first equipment; and determining the circulation limiting information as a preset circulation area of the first equipment. Wherein the device code includes a plurality of fields; in particular, the device code may include a field representing a vendor code, a field representing a device type, a field representing production information, a field representing a circulation area, and the like. The server identifies a field representing the circulation area based on the device code, and determines an authorized sales area of the first device based on the field, wherein the authorized sales area can be used as a preset circulation area of the first device.
In step S226, in some embodiments, performing a circulation legitimacy verification on the first device according to the installation information and the circulation defining information, including: and under the condition that the installation information accords with the circulation limiting information, determining that the first equipment passes the verification of circulation legitimacy. Matching the geographical coordinates of the installation of the first equipment with the authorized sales areas of the first equipment; if the installed geographic coordinates accord with the authorized sales region, the representative installation information accords with circulation limiting information; at this point it may be determined that the first device passes the flow-through legitimacy verification.
The server side can determine whether the installation information of the first device accords with preset circulation limiting information through the execution of the steps; under the condition that the geographic coordinates of the first equipment do not accord with the authorized sales region, the server side considers that the first equipment has unauthorized circulation conditions, and the unlocking condition of the first equipment is not met. Under the condition that the geographic coordinates of the first equipment accord with the authorized sales region, the server side considers that the first equipment belongs to legal circulation, and then determines that the first equipment accords with the unlocking condition, and can execute the subsequent unlocking related steps.
Optionally, unlocking the first device includes: sending an after-sales mode starting instruction to the first equipment; and sending an unlocking instruction to the first device when the first device operates in the after-sale mode. Thus, the first device receives the unlocking instruction, so that the first device can execute the unlocking instruction, and the remote unlocking control of the first device is realized.
In the embodiment of the disclosure, when the first device is in the after-sale mode, the first device may enable a transparent transmission channel directly leading to the device backplane, so that the service end performs unlocking control on the first device. The transparent transmission channel can be used for representing the information transmission channel of the first device, which directly transmits the data to the device bottom plate without any processing or analysis of the data when the Bluetooth module of the first device transmits the data with the server. In this way, when the first device operates in the after-sales mode, the control command sent by the received server can be safely transmitted to the device bottom plate, so that the device bottom plate can quickly make a corresponding response action.
Specifically, the server may generate an after-sales mode start instruction under the condition that the first device passes through the verification of the circulation legitimacy, and send the after-sales mode start instruction to the first device, so that the first device operates the after-sales mode in response to the after-sales mode start instruction.
Further, the server generates an unlocking instruction under the condition that the first device is determined to operate in an after-sale mode, and sends the unlocking instruction to the first device, so that the first device responds to the unlocking instruction to execute unlocking operation. The server side can determine the running state information of the first equipment by acquiring the detection information of the self-checking sensor of the first equipment; and the server determines that the first equipment operates in the after-sales mode under the condition that the operation state information of the first equipment is determined to indicate that the first equipment is in the after-sales mode.
In some embodiments, before sending the after-market mode initiation instruction to the first device, the remote unlocking method further comprises: sending an authentication request to a first device; and generating a start instruction of the after-sales mode when the received authentication result indicates that the authentication is passed. The first device may be configured with a bluetooth module, and the server may establish bluetooth connection with the bluetooth module of the first device, so as to implement communication between the server and the first device.
Specifically, the authentication request sent by the server side to the first device may be an identity authentication request; the server side can determine whether the server side passes the identity authentication of the first device by receiving the authentication result fed back by the first device. The authentication result indicates that the authentication is passed, and indicates that the server passes the identity authentication of the first device.
Specifically, the identity authentication may include the steps of: the server establishes bluetooth connection with the bluetooth module of the first device, and the server sends an identity authentication request to the first device, where the identity authentication request sent by the server may include a request to the first device to disclose a bluetooth address, a device name, a service list, and the like to the first device.
In other embodiments, each electrical device associated with the server needs to perform a registration operation before leaving the factory, so that basic information of the electrical device and the device authentication key are associated with the server; the server may authenticate with the first device by: the method comprises the steps that a server sends authentication information carrying an equipment authentication key to first equipment when a Bluetooth module of the first equipment is in a Bluetooth connection state; and under the condition that the authentication fed back by the first equipment is received, determining the authentication passing through the first equipment, and sending an after-sales mode starting instruction to the first equipment so as to enable the first equipment to start the after-sales mode.
As an alternative embodiment, as shown in fig. 6, step S300 may further specifically include the following steps:
s310, the server side sends an authentication request to the first device.
S320, the server generates a start instruction of the after-sales mode when the received authentication result indicates that the authentication is passed.
S330, the server side sends an after-sales mode starting instruction to the first device.
And S340, the server side sends an unlocking instruction to the first equipment under the condition that the first equipment operates in an after-sale mode.
By adopting the remote unlocking method provided by the embodiment of the disclosure, the server increases the authentication operation of sending the authentication request to the first device under the condition that the first device passes through the verification of the circulation legitimacy, so as to ensure that the server has unlocking authority to the first device, and then sends an unlocking instruction to the first device under the condition that the first device is in an after-sale mode so as to unlock the first device. Therefore, the validity of the unlocking operation is guaranteed through the bidirectional verification between the server side and the first equipment, so that the remote unlocking control of the locked first equipment is realized, the problem of the increase of after-sales service cost caused by a manual door-on unlocking mode is effectively solved, and the waiting time of a user after the first equipment is locked is shortened.
In practical application, as shown in fig. 7, in order to determine whether there is a device in a locked state, the server executes step S110 to obtain current state information of the first device, and when the current state information of the first device indicates that the first device is in the locked state, executes step S100 to determine the first device in the locked state and the device type thereof. Then, the server executes step S210 to determine a target verification manner matched with the device type of the first device; and verifying the circulation legitimacy of the first device in a target verification mode. Specifically, the server executes step S224 to obtain current positioning information of the second device, and determines the current positioning information as the installed geographic coordinates of the first device; the server executes step S225 to obtain the device code of the first device, and determines the preset circulation area of the first device according to the device code. Further, the server executes step S226 to determine that the first device passes the circulation validity verification when the installed geographic coordinates of the first device conform to the preset circulation area of the first device. And finally, the server executes step S300 to unlock the first equipment under the condition that the first equipment passes the verification of the circulation legitimacy.
As shown in connection with fig. 8, the process of unlocking the first device may specifically include the following processes: in the case that the server determines that the first device passes the flow verification, step S310 is executed to send an authentication request to the first device. After receiving the authentication request, the first device performs step S321 to feed back the result of passing the authentication to the server. Then, the server continues to execute S320 to generate a start instruction of the after-sales mode; and performs step S330 of transmitting an after-sales mode start instruction to the first device. After receiving the after-sale mode starting instruction, the first device executes step S331 to run the after-sale mode, and the server executes step S340 to send an unlocking instruction to the first device when determining that the first device is in the after-sale mode. Finally, the first device responds to the unlocking instruction, and step S341 is executed to execute the unlocking instruction, so that the server side realizes remote unlocking control for the first device.
According to another aspect of the embodiments of the present disclosure, there is also provided a remote unlocking device. The remote unlocking device includes: the device comprises an acquisition module, a verification module and an unlocking module; the acquisition module is configured to determine a first device in a locked state and a device type of the first device; the verification module is configured to verify the circulation legitimacy of the first device according to the device type of the first device; the unlocking module is configured to unlock the first device if the first device passes the flow-through legitimacy verification.
By adopting the remote unlocking device provided by the embodiment of the disclosure, when the first equipment is in a locked state, the remote unlocking device performs circulation legitimacy verification on the first equipment based on the equipment type of the first equipment, and unlocks the first equipment under the condition that the first equipment passes the circulation legitimacy verification; by executing the steps, the locking problem of different types of equipment is solved, the equipment in a locked state is subjected to remote circulation validity verification operation, remote unlocking control of the locked equipment is realized, and the problem of increase of after-sales service cost caused by a manual door-on unlocking mode is effectively solved.
In some embodiments, the verification module is further configured to determine a target verification style that matches the device type of the first device; and verifying the circulation legitimacy of the first equipment according to the target verification mode. Specifically, the target verification method may include: obtaining an equipment information base, wherein the equipment information base stores a plurality of equipment types and verification modes corresponding to different equipment types; and taking the verification mode corresponding to the equipment type of the first equipment in the equipment information base as a target verification mode.
Optionally, the verification module is further configured to obtain the identification information and the installation information of the first device if it is determined that the first device is a heat pump device; determining circulation limiting information of the first equipment according to the identification information; and verifying the circulation legitimacy of the first equipment according to the installation information and the circulation limiting information. In particular, the verification module may be further configured to determine that the first device is verified by the circulation legitimacy if the installation information corresponds to the circulation limit information.
Optionally, the verification module comprises a positioning unit configured to determine current positioning information of a second device associated with the first device; and taking the current positioning information as the installation information of the first equipment.
Optionally, the verification module further includes a defining unit configured to parse the device code in the identification information and determine a preset circulation area of the first device; and determining the circulation limiting information as a preset circulation area of the first equipment.
In some embodiments, the unlocking module is further configured to send an authentication request to the first device; generating a start instruction of an after-sales mode under the condition that the received authentication result indicates that the authentication is passed; sending an after-sales mode starting instruction to the first equipment; and sending an unlocking instruction to the first device when the first device operates in the after-sale mode.
As shown in connection with fig. 9, an embodiment of the present disclosure provides a remote unlocking apparatus 400 including a processor (processor) 401 and a memory (memory) 402. Optionally, the apparatus may further comprise a communication interface (Communication Interface) 403 and a bus 404. The processor 401, the communication interface 403, and the memory 402 may communicate with each other via the bus 404. The communication interface 403 may be used for information transfer. The processor 401 may call logic instructions in the memory 402 to perform the remote unlocking method of the above-described embodiment.
Further, the logic instructions in memory 402 described above may be implemented in the form of software functional units and stored in a computer readable storage medium when sold or used as a stand alone product.
The memory 402 is used as a computer readable storage medium for storing a software program, a computer executable program, such as program instructions/modules corresponding to the methods in the embodiments of the present disclosure. The processor 401 executes the functional application and remote unlocking by running the program instructions/modules stored in the memory 402, i.e. implements the remote unlocking method in the above-described embodiments.
Memory 402 may include a storage program area that may store an operating system, at least one application program required for functionality, and a storage data area; the storage data area may store data created according to the use of the terminal device, etc. In addition, memory 402 may include high-speed random access memory, and may also include non-volatile memory.
Embodiments of the present disclosure provide a computer-readable storage medium storing computer-executable instructions configured to perform the above-described remote unlocking method.
The computer readable storage medium may be a transitory computer readable storage medium or a non-transitory computer readable storage medium.
Embodiments of the present disclosure may be embodied in a software product stored on a storage medium, including one or more instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of a method according to embodiments of the present disclosure. And the aforementioned storage medium may be a non-transitory storage medium including: a plurality of media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or a transitory storage medium.
The above description and the drawings illustrate embodiments of the disclosure sufficiently to enable those skilled in the art to practice them. Other embodiments may involve structural, logical, electrical, process, and other changes. The embodiments represent only possible variations. Individual components and functions are optional unless explicitly required, and the sequence of operations may vary. Portions and features of some embodiments may be included in, or substituted for, those of others. Moreover, the terminology used in the present application is for the purpose of describing embodiments only and is not intended to limit the claims. As used in the description of the embodiments and the claims, the singular forms "a," "an," and "the" (the) are intended to include the plural forms as well, unless the context clearly indicates otherwise. Similarly, the term "and/or" as used in this application is meant to encompass any and all possible combinations of one or more of the associated listed. Furthermore, when used in this application, the terms "comprises," "comprising," and/or "includes," and variations thereof, mean that the stated features, integers, steps, operations, elements, and/or components are present, but that the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof is not precluded. Without further limitation, an element defined by the phrase "comprising one …" does not exclude the presence of other like elements in a process, method or apparatus comprising such elements. In this context, each embodiment may be described with emphasis on the differences from the other embodiments, and the same similar parts between the various embodiments may be referred to each other. For the methods, products, etc. disclosed in the embodiments, if they correspond to the method sections disclosed in the embodiments, the description of the method sections may be referred to for relevance.
Those of skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. The skilled artisan may use different methods for each particular application to achieve the described functionality, but such implementation should not be considered to be beyond the scope of the embodiments of the present disclosure. It will be clearly understood by those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
In the embodiments disclosed herein, the disclosed methods, articles of manufacture (including but not limited to devices, apparatuses, etc.) may be practiced in other ways. For example, the apparatus embodiments described above are merely illustrative, and for example, the division of the units may be merely a logical function division, and there may be additional divisions when actually implemented, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. In addition, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interface, device or unit indirect coupling or communication connection, which may be in electrical, mechanical or other form. The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to implement the present embodiment. In addition, each functional unit in the embodiments of the present disclosure may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. In the description corresponding to the flowcharts and block diagrams in the figures, operations or steps corresponding to different blocks may also occur in different orders than that disclosed in the description, and sometimes no specific order exists between different operations or steps. For example, two consecutive operations or steps may actually be performed substantially in parallel, they may sometimes be performed in reverse order, which may be dependent on the functions involved. Each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.

Claims (10)

1. A method of remote unlocking comprising:
determining a first device in a locked state and a device type of the first device;
according to the equipment type of the first equipment, carrying out circulation legitimacy verification on the first equipment;
and unlocking the first equipment under the condition that the first equipment passes the circulation legitimacy verification.
2. The remote unlocking method according to claim 1, wherein the verifying the circulation legitimacy of the first device according to the device type of the first device includes:
determining a target verification mode matched with the equipment type of the first equipment;
and verifying the circulation legitimacy of the first equipment according to the target verification mode.
3. The remote unlocking method according to claim 2, wherein the target authentication means is determined by:
obtaining an equipment information base, wherein the equipment information base stores a plurality of equipment types and verification modes corresponding to different equipment types;
and taking the verification mode corresponding to the equipment type of the first equipment in the equipment information base as a target verification mode.
4. The remote unlocking method according to claim 2, wherein, in the case where the first device is a heat pump device, the target verification method includes:
acquiring identification information and installation information of the first equipment;
determining circulation limiting information of the first equipment according to the identification information;
and verifying the circulation legitimacy of the first equipment according to the installation information and the circulation limiting information.
5. The remote unlocking method according to claim 4, wherein the verifying the circulation legitimacy of the first device according to the installation information and the circulation limiting information includes:
and under the condition that the installation information accords with the circulation limiting information, determining that the first equipment passes the circulation legitimacy verification.
6. The remote unlocking method according to claim 4, wherein the installation information of the first device is determined by:
determining current location information of a second device associated with the first device;
and taking the current positioning information as the installation information of the first equipment.
7. The method of claim 4, wherein determining the circulation limit information of the first device based on the identification information comprises:
analyzing the equipment codes in the identification information and determining a preset circulation area of the first equipment;
and determining the circulation limiting information as a preset circulation area of the first equipment.
8. The remote unlocking method according to any one of claims 1 to 7, wherein the unlocking the first device comprises:
sending an after-sales mode starting instruction to the first equipment;
and sending an unlocking instruction to the first equipment under the condition that the first equipment operates in the after-sale mode.
9. The remote unlocking method of claim 8, wherein prior to sending an after-market mode initiation instruction to the first device, the remote unlocking method further comprises:
sending an authentication request to the first device;
and generating a start instruction of the after-sales mode when the received authentication result indicates that the authentication is passed.
10. A remote unlocking apparatus comprising a processor and a memory storing program instructions, wherein the processor is configured to perform the remote unlocking method of any one of claims 1 to 9 when the program instructions are run.
CN202310341855.XA 2023-03-31 2023-03-31 Remote unlocking method and remote unlocking device Pending CN116467696A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310341855.XA CN116467696A (en) 2023-03-31 2023-03-31 Remote unlocking method and remote unlocking device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310341855.XA CN116467696A (en) 2023-03-31 2023-03-31 Remote unlocking method and remote unlocking device

Publications (1)

Publication Number Publication Date
CN116467696A true CN116467696A (en) 2023-07-21

Family

ID=87176359

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310341855.XA Pending CN116467696A (en) 2023-03-31 2023-03-31 Remote unlocking method and remote unlocking device

Country Status (1)

Country Link
CN (1) CN116467696A (en)

Similar Documents

Publication Publication Date Title
DK3272705T3 (en) System and method for controlling fuel dispensing by means of a distribution device
CN105934912B (en) Authentication system and method
EP3534584B1 (en) Service implementation method and apparatus
CN108932424B (en) Equipment registration system and method
CN104570823A (en) Information processing method and information processing apparatus
EP2803045B1 (en) Method and system for certifying the presence of an operator
CN104021333A (en) Mobile security fob
CN103679005A (en) Method to enable development mode of a secure electronic control unit
CN110009776B (en) Identity authentication method and device
CN107369234B (en) Unlocking method and system
US20130238536A1 (en) System and Method for Secure Addition of Machine Readable Identification to an Off-line Database
CN112124321B (en) Vehicle control method, device, equipment and storage medium
US20120306613A1 (en) Sensor allocation
CN107682376B (en) Wind control data interaction method and device
CN108540335B (en) Management method and management device for equipment analysis report
CN103581883A (en) Communication terminal and method for acquiring application data thereof
CN102841843A (en) Method and device for judging compatibility
CN116467696A (en) Remote unlocking method and remote unlocking device
US10788809B2 (en) Method for the enabling of machine functions on a spinning-mill machine
CN108885651B (en) Credential licensing services
CN113436378B (en) Self-service visitor management method and system, storage medium and cloud platform
CN101257519B (en) Method and system for preventing lawless order without WAP gateway
CN104899732A (en) Information interaction method and device
CN114493565A (en) Account association method and account association management system
CN102088354B (en) Software licensing authentication method based on digital mobile communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination