CN106656995B - Equipment control method and device - Google Patents

Equipment control method and device Download PDF

Info

Publication number
CN106656995B
CN106656995B CN201610979577.0A CN201610979577A CN106656995B CN 106656995 B CN106656995 B CN 106656995B CN 201610979577 A CN201610979577 A CN 201610979577A CN 106656995 B CN106656995 B CN 106656995B
Authority
CN
China
Prior art keywords
account information
preset
cloud platform
platform server
condition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610979577.0A
Other languages
Chinese (zh)
Other versions
CN106656995A (en
Inventor
吴晓东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Midea Group Co Ltd
Midea Smart Home Technology Co Ltd
Original Assignee
Midea Group Co Ltd
Midea Smart Home Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Midea Group Co Ltd, Midea Smart Home Technology Co Ltd filed Critical Midea Group Co Ltd
Priority to CN201610979577.0A priority Critical patent/CN106656995B/en
Publication of CN106656995A publication Critical patent/CN106656995A/en
Application granted granted Critical
Publication of CN106656995B publication Critical patent/CN106656995B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Abstract

The invention discloses a device control method and a device, wherein the method comprises the following steps: receiving a login request sent by a terminal device to a cloud platform server, wherein the login request comprises: account information and IP address; if the account information is verified to be legal, feeding back a login success response to the terminal equipment, and acquiring a first geographic position corresponding to the IP address according to prestored position information; detecting the change condition of the geographic position corresponding to the account information according to the first geographic position, and judging whether the account information meets a preset illegal login condition; and if the acquired account information is judged to meet the preset illegal login condition, the user corresponding to the account information is prohibited from operating the user equipment. The method avoids the illegal terminal equipment from controlling the user equipment, and ensures the safety of the user equipment.

Description

Equipment control method and device
Technical Field
The present invention relates to the field of information security technologies, and in particular, to a device control method and apparatus.
Background
With the progress of internet technology, remote control technology in which a terminal device can control a user device through a cloud platform server is increasingly widely used.
However, with the progress of the remote control technology, security challenges of multiple layers such as network security, privacy security, health security and the like are faced at the same time, for example, some illegal terminal devices may access the cloud platform server to destroy the user equipment by cracking the authentication of the legal device and the cloud platform server, which may harm the security of the user equipment.
Disclosure of Invention
The object of the present invention is to solve at least to some extent one of the above mentioned technical problems.
Therefore, a first object of the present invention is to provide a device control method, which avoids an illegal terminal device from operating a user device, and ensures the security of the user device.
A second object of the present invention is to provide a device control apparatus.
In order to achieve the above object, an embodiment of a first aspect of the present invention provides an apparatus control method, including:
receiving a login request sent by a terminal device to a cloud platform server, wherein the login request comprises: account information and IP address;
if the account information is verified to be legal, feeding back a login success response to the terminal equipment, and acquiring a first geographic position corresponding to the IP address according to prestored position information;
detecting the change condition of the geographical position corresponding to the account information according to the first geographical position, and judging whether the account information meets a preset illegal login condition;
and if the account information is judged to meet the preset illegal login condition, prohibiting a user corresponding to the account information from operating the user equipment.
The device control method of the embodiment of the invention comprises the steps of receiving a login request sent by a terminal device to a cloud platform server, feeding back a login success response to the terminal device if the account information is verified to be legal, acquiring a first geographical position corresponding to an IP address according to prestored position information, detecting the change condition of the geographical position corresponding to the account information according to the first geographical position, judging whether the account information meets a preset illegal login condition or not, and prohibiting a user corresponding to the account information from operating the user device if the account information is judged to meet the preset illegal login condition. Therefore, the user equipment is prevented from being controlled by illegal terminal equipment, and the safety of the user equipment is ensured. In addition, the device control method of the embodiment of the present invention further has the following additional technical features:
in an embodiment of the present invention, the detecting, according to the first geographic location, a change condition of a geographic location corresponding to the account information, and determining whether the account information meets a preset illegal login condition includes:
if the fact that the account information logs in the cloud platform server through a second geographic position is detected, whether the switching times of the account information logging in the cloud platform server through the first geographic position or the second geographic position within preset time meets a preset first threshold value is judged;
and if the switching times meet a preset first threshold value, judging that the account information meets a preset illegal login condition.
In an embodiment of the present invention, the detecting, according to the first geographic location, a change condition of a geographic location corresponding to the account information, and determining whether the account information meets a preset illegal login condition includes:
if the fact that the account information logs in the cloud platform server through other geographic positions is detected, whether the number of the positions, in which the account information logs in the cloud platform server through other geographic positions, in a preset time meets a preset second threshold value is judged;
and if the position number meets a preset second threshold value, judging that the account information meets a preset illegal login condition.
In an embodiment of the present invention, after determining whether the account information satisfies a preset illegal login condition, the method further includes:
and if the account information is judged and acquired to not meet the preset illegal login condition, allowing a user corresponding to the account information to control the user equipment.
In one embodiment of the present invention, further comprising:
and encrypting the information interacted between the user equipment and the terminal equipment through the cloud platform server by using a preset encryption algorithm.
In order to achieve the above object, an embodiment of a second aspect of the present invention provides an apparatus control device, including:
the receiving module is used for receiving a login request sent by a terminal device to a cloud platform server, wherein the login request comprises: account information and IP address;
the feedback module is used for feeding back a login success response to the terminal equipment if the account information is verified to be legal;
the acquisition module is used for acquiring a first geographical position corresponding to the IP address according to prestored position information;
the judging module is used for detecting the change condition of the geographic position corresponding to the account information according to the first geographic position and judging whether the account information meets the preset illegal login condition or not;
and the processing module is used for forbidding a user corresponding to the account information to control the user equipment when judging that the acquired account information meets the preset illegal login condition.
The device control apparatus of the embodiment of the present invention receives a login request sent by a terminal device to a cloud platform server, and if it is verified that account information is legal, feeds back a login success response to the terminal device, and obtains a first geographical location corresponding to an IP address according to prestored location information, and detects a change condition of the geographical location corresponding to the account information according to the first geographical location, and determines whether the account information satisfies a preset illegal login condition, so that if it is determined that the account information satisfies the preset illegal login condition, a user corresponding to the account information is prohibited from operating a user device. Therefore, the user equipment is prevented from being controlled by illegal terminal equipment, and the safety of the user equipment is ensured.
In addition, the device control apparatus according to the embodiment of the present invention further has the following additional technical features:
in an embodiment of the present invention, the determining module includes:
the first judging unit is used for judging whether the switching times of the account information logging in the cloud platform server through the first geographical position or the second geographical position within a preset time meet a preset first threshold value or not when the account information logging in the cloud platform server through the second geographical position is detected;
and the second judging unit is used for judging that the account information meets the preset illegal login condition when the switching times meet a preset first threshold value.
In an embodiment of the present invention, the determining module includes: the third judging unit is used for judging whether the number of the positions of the account information which logs in the cloud platform server through other geographical positions in a preset time meets a preset second threshold value or not when the account information which logs in the cloud platform server through other geographical positions is detected; and the fourth judging unit is used for judging that the account information meets the preset illegal login condition when the position number meets a preset second threshold value.
In an embodiment of the present invention, the processing module is further configured to:
and when judging that the acquired account information does not meet the preset illegal login condition, allowing a user corresponding to the account information to operate user equipment.
In one embodiment of the present invention, further comprising:
and the encryption module is used for encrypting the information interacted between the user equipment and the terminal equipment through the cloud platform server by applying a preset encryption algorithm.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a diagram illustrating a general networking architecture of a smart home in the prior art;
FIG. 2 is a flow chart of a device control method according to one embodiment of the present invention;
fig. 3 is a flowchart of an apparatus control method according to another embodiment of the present invention;
fig. 4 is a flowchart of a device control method in an intelligent home scenario according to an embodiment of the present invention;
fig. 5 is a flowchart of an apparatus control method according to still another embodiment of the present invention;
FIG. 6 is a schematic structural diagram of a device control apparatus according to an embodiment of the present invention;
FIG. 7 is a schematic structural diagram of an apparatus control device according to another embodiment of the present invention;
FIG. 8 is a schematic structural diagram of an apparatus control device according to yet another embodiment of the present invention; and
fig. 9 is a schematic structural diagram of a device control apparatus according to still another embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
An apparatus control method and device of an embodiment of the present invention are described below with reference to the drawings.
Generally, in a remote control technology, a terminal device may control a user device through a cloud platform server.
The intelligent home system is used as a common scene of a remote control technology, and brings convenience to production and life of people.
The intelligent home is characterized in that a home is used as a platform, facilities related to home life are integrated by utilizing a comprehensive wiring technology, a network communication technology, a safety precaution technology, an automatic control technology and an audio and video technology, an efficient management system of home facilities and family schedule affairs is constructed, home safety, convenience, comfortableness and artistry are improved, and an environment-friendly and energy-saving living environment is realized.
Specifically, as shown in fig. 1, in the smart home system, the terminal device is connected to the smart home cloud platform server through a WIFI or the like, wherein the terminal device generally presents as a terminal application program, and then controls the operation of the smart home appliance at the terminal device end through a connection link between the smart home cloud platform server and the smart home appliance.
However, with the continuous deepening of the intelligent degree of the home, the smart home faces security challenges of multiple layers such as network security, privacy security, health security and the like. The current mainstream security model is used for encrypting the connection link, and comprises a link between the user terminal equipment and the smart home cloud platform server, a link between the smart home appliance and the smart home cloud platform server, and relevant authentication for logging in the smart home cloud platform server by the user.
However, the authentication of the smart home cloud platform server to the terminal device may be cracked by an illegal terminal device, and the illegal terminal device may access the smart home cloud platform service after being damaged, so that the intelligent household appliance is illegally controlled, and the safety of the intelligent household appliance is damaged.
In order to avoid the above problem, the present invention provides an apparatus control method, which specifically comprises the following steps:
fig. 2 is a flowchart of an apparatus control method according to an embodiment of the present invention.
As shown in fig. 2, the device control method may include:
s101, receiving a login request sent by a terminal device to a cloud platform server, wherein the login request comprises: account information and IP address.
Specifically, the terminal device sends a login request to the cloud platform server so as to verify the validity of the terminal device according to the account information and the IP address such as the SN code and the MAC code in the login request.
It should be noted that, in different application scenarios, the login request sent by the terminal device to the cloud platform server may be received in different manners, for example, the login request sent by the terminal device to the cloud platform server may be received in manners such as a WIFI link, a bluetooth link, and a Zigbee internet of things.
And S102, if the account information is verified to be legal, feeding back a login success response to the terminal equipment, and acquiring a first geographical position corresponding to the IP address according to the pre-stored position information.
Specifically, the location information is stored in advance, and the location information includes an IP address and a first geographic location corresponding to the IP address, for example, the first geographic location corresponding to the IP address a is beijing or the like.
Therefore, if the verification account information is the registered and authenticated account information, the verification account information is legal, a login success response is fed back to the terminal equipment, the corresponding relation is inquired, and a first geographical position corresponding to the IP address is obtained, wherein the first geographical position is usually a geographical position commonly used for login of the legal terminal equipment and can correspond to a home address of a user and the like.
S103, detecting the change condition of the geographic position corresponding to the account information according to the first geographic position, and judging whether the account information meets the preset illegal login condition.
It can be understood that when the illegal terminal device breaks the authentication of the legal terminal device by the cloud platform server, even when the terminal device accessing the cloud platform server is an illegal terminal device, the geographical location of the terminal device is different from that of the authenticated legal terminal device.
Therefore, the change condition of the geographic position corresponding to the account information can be detected according to the first geographic position information, and whether the account information meets the preset illegal login condition or not can be judged.
It should be noted that the preset illegal login conditions include various conditions of the situation that when an illegal terminal device accesses, the number of access account information is large, and the corresponding geographic location is unreasonable, and the preset illegal login conditions are different according to different specific application scenarios, which is exemplified as follows:
first, when an illegal terminal device accesses, a geographic location corresponding to account information of an access terminal device may swing multiple times within a relatively short time period, for example, within 10 minutes, a geographic location corresponding to account information of an access cloud platform server may switch back and forth multiple times between a place a and a place B, and obviously, within a time period of 10 minutes, a legal terminal device may have difficulty in completing multiple times of switching from the place a to the place B.
Therefore, the preset illegal login condition may include a switching number of times of accessing the geographic location corresponding to the account information in a relatively short time, and when the switching number of times reaches a certain value, it is determined that the account information satisfies the preset illegal login condition.
As a second example, for a terminal device which is authorized to log in a cloud platform server at a limited number of geographic locations within a period of time due to the limitation of the moving distance of the terminal device, the terminal device cannot log in the cloud platform server from a plurality of geographic locations within the period of time.
For example, in one hour, a legal terminal device may log in the cloud platform server at two geographic locations, namely, the beijing sunward area where the family is located and the beijing hai lake area where the company is located, and in 1 hour, it is obvious that the legal terminal device cannot log in the cloud platform server at four different geographic locations, namely, beijing, shanghai, nanjing and hainan.
Therefore, the preset illegal login condition may include the number of different geographic locations corresponding to the account information accessed to the cloud platform server in a relatively short time, and when the number of the geographic locations reaches a certain value, it is determined that the account information satisfies the preset illegal login condition.
For a third example, for a terminal device that is authorized to be legal, the moving distance within a certain period of time is limited, for example, within 1 hour, the geographic location corresponding to the terminal device cannot move from Xinjiang to Hainan, so that the preset illegal login condition may include a change distance of the geographic location corresponding to the account information accessed to the cloud platform server within a relatively short time, and when the change distance is greater than a certain value, it is determined that the account information is full of the preset illegal login condition.
It should be noted that, in practical applications, one of the above preset illegal login conditions may be used to verify whether the account information is illegally logged in, and in order to ensure the accuracy of the verification, a plurality of kinds of the above preset illegal login conditions may be used to verify whether the account information is illegally logged in, which is not illustrated here.
And S104, if the acquired account information is judged to meet the preset illegal login condition, the user corresponding to the account information is prohibited from operating the user equipment.
Specifically, when the acquired account information is judged to meet the preset illegal login condition, in order to protect the user equipment connected with the cloud platform server, the user corresponding to the account information is prohibited from operating the terminal equipment.
According to different application scenarios, the user equipment includes different devices, for example, in an intelligent home application scenario, the user equipment may include a home air conditioner, a refrigerator, and the like.
It should be noted that, according to different application scenarios, different manners may be adopted to prohibit the user corresponding to the account information from operating the user equipment.
For example, the control authority of the user corresponding to the account information may be reduced, and only the corresponding user is allowed to view the user device, but not allowed to control the user device. For another example, the user corresponding to the account information may be directly prohibited from connecting with the cloud platform server, so that the user corresponding to the account information may not operate the user device, nor view the user device.
In summary, in the device control method according to the embodiment of the present invention, a login request sent by a terminal device to a cloud platform server is received, if it is verified that account information is legal, a login success response is fed back to the terminal device, a first geographic location corresponding to an IP address is obtained according to pre-stored location information, and a change condition of the geographic location corresponding to the account information is detected according to the first geographic location, so as to determine whether the account information meets a preset illegal login condition, and if it is determined that the account information meets the preset illegal login condition, a user corresponding to the account information is prohibited from operating a user device. Therefore, the user equipment is prevented from being controlled by illegal terminal equipment, and the safety of the user equipment is ensured.
To more fully describe how to detect a change situation of a geographic location corresponding to account information according to a first geographic location in the device control method according to the embodiment of the present invention, and determine whether the account information satisfies a preset illegal login condition, the following description is given by referring to fig. 3 and 5.
In contrast, the illegal login condition described in fig. 3 is a condition described in the first example in step S103, and the illegal login condition described in fig. 5 is a condition described in the second example in step S103, which are described as follows:
fig. 3 is a flowchart of an apparatus control method according to another embodiment of the present invention, which includes, after the above-described step S102, as shown in fig. 3:
s201, if it is detected that the account information logs in the cloud platform server through the second geographic position, whether the switching times of the account information logging in the cloud platform server through the first geographic position or the second geographic position within the preset time meets a preset first threshold value is judged.
Specifically, if it is detected that the account information logs in the cloud platform server through the second geographic location, whether the degree of the geographic location swing is within a reasonable range is judged.
Specifically, whether the switching times of the account information logging in the cloud platform server through the first geographic position or the second geographic position within the preset time meets a preset first threshold value is judged, wherein the preset first threshold value is calibrated according to a large amount of experimental data, the first threshold value corresponds to the preset time, and the longer the preset time is, the larger the first threshold value is.
For example, if it is detected that the account information logs in the cloud platform server through the second geographic location B, it is determined whether the switching times of the account information logging in the cloud platform server through the first geographic location a or the second geographic location B within 10 minutes satisfy 5 times, so as to determine whether the account information is illegally logged in.
S202, if the switching times meet a preset first threshold value, the account information is judged to meet a preset illegal login condition, and a user corresponding to the account information is prohibited from operating the user equipment.
Specifically, if the switching times meet a preset first threshold, it is determined that the account information meets a preset illegal login condition, and therefore, in order to protect the security of the user equipment, a user corresponding to the account information is prohibited from operating the user equipment.
And S203, if the acquired account information is judged not to meet the preset illegal login condition, allowing a user corresponding to the account information to operate and control the user equipment.
Specifically, if it is determined that the acquired account information does not satisfy the preset illegal login condition, that is, the number of times of switching is smaller than the preset first threshold, in order to satisfy the remote control requirement of the user on the user equipment, the user corresponding to the account information is allowed to operate the user equipment.
In an embodiment of the present invention, in order to implement security of communication interaction, when verifying that account information is legal, a preset encryption algorithm is applied to encrypt information interacted between the user equipment and the terminal equipment through the cloud platform server, for example, a hash algorithm is applied to encrypt information interacted between the user equipment and the terminal equipment through the cloud platform server, and the like.
In order to describe the device control method in the embodiment of the present invention more clearly, the following description is made in conjunction with an implementation process in a specific application scenario, where in this example, the preset time is T, and the first threshold of the number of times of switching is N, and the description is as follows:
fig. 4 is a flowchart of a device control method in an intelligent home scenario according to an embodiment of the present invention, and as shown in fig. 4, when a legal terminal device logs in a system, a cloud platform server receives a login request sent by the legal terminal device, and obtains a first geographical location of the legal terminal device (S301).
If the account information of the legal terminal device is cracked, the illegal terminal device can access the cloud platform server according to the cracked account information, that is, the cloud platform server detects that the account information logs in the cloud platform server through the second geographical position information (S302).
Further, the legitimate terminal device and the illegitimate terminal device repeatedly log in the cloud platform server, and determine the number of times of switching the account information to the cloud platform server through the first geographical location and the second geographical location within time T (S303), and if the number of times of switching satisfies N times within time T, the smart appliance is prohibited from receiving control of the terminal device under the cloud platform server (S304), and thus remote control of all the smart appliances is disabled (S305).
Fig. 5 is a flowchart of an appliance control method according to still another embodiment of the present invention, as shown in fig. 5, after the above-described step S102, the appliance control method includes:
s401, if it is detected that the account information logs in the cloud platform server through other geographic positions, whether the number of the positions of the account information which logs in the cloud platform server through other geographic positions in the preset time meets a preset second threshold value is judged.
Specifically, if it is detected that account information logs in the cloud platform server through other geographic locations, it is determined whether the number of different geographic locations connected to the cloud platform server is within a reasonable range.
Specifically, whether the number of the positions of the account information logged in the cloud platform server through other geographic positions within the preset time meets a preset second threshold value is judged, wherein the preset second threshold value is calibrated according to a large amount of experimental data, the second threshold value corresponds to the preset time, and the longer the preset time is, the larger the second threshold value is.
For example, if it is detected that the account information logs in the cloud platform server through other geographic locations, it is determined whether the number of locations where the account information logs in the cloud platform server through other geographic locations in 10 minutes satisfies 5, so as to determine whether the account information is illegally logged in.
S402, if the number of the positions meets a preset second threshold value, the account information is judged to meet a preset illegal login condition, and a user corresponding to the account information is prohibited from operating the user equipment.
Specifically, if the number of the locations meets a preset second threshold, it is determined that the account information meets a preset illegal login condition, and thus, in order to protect the security of the user equipment, a user corresponding to the account information is prohibited from operating the user equipment.
And S403, if the acquired account information is judged not to meet the preset illegal login condition, allowing a user corresponding to the account information to operate and control the user equipment.
Specifically, if it is determined that the acquired account information does not satisfy the preset illegal login condition, that is, the number of locations that log in to the cloud platform server through other geographic locations is smaller than a preset first threshold, in order to satisfy the remote control requirement of the user on the user equipment, the user corresponding to the account information is allowed to operate the user equipment.
In an embodiment of the present invention, in order to implement security of communication interaction, when verifying that account information is legal, a preset encryption algorithm is applied to encrypt information interacted between the user equipment and the terminal equipment through the cloud platform server, for example, a hash algorithm is applied to encrypt information interacted between the user equipment and the terminal equipment through the cloud platform server, and the like.
In summary, according to the device control method in the embodiment of the present invention, according to different application scenarios, the change condition of the geographic position corresponding to the account information is detected according to the first geographic position, and different preset illegal login conditions are used to determine whether the account information is legal, so that when it is determined that the account information satisfies the preset illegal login conditions, a user corresponding to the account information is prohibited from operating the user device. Therefore, the user equipment is prevented from being controlled by illegal terminal equipment, and the safety of the user equipment is further ensured. In order to achieve the purpose, the invention also provides a device control device.
Fig. 6 is a schematic structural diagram of a device control apparatus according to an embodiment of the present invention.
As shown in fig. 6, the device control apparatus may include: the device comprises a receiving module 10, a feedback module 20, an obtaining module 30, a judging module 40 and a processing module 50.
The receiving module 10 is configured to receive a login request sent by a terminal device to a cloud platform server, where the login request includes: account information and IP address.
And the feedback module 20 is configured to feed back a login success response to the terminal device if the account information is verified to be legal.
The obtaining module 30 is configured to obtain a first geographic location corresponding to the IP address according to the pre-stored location information.
The determining module 40 is configured to determine whether the account information meets a preset illegal login condition according to a change condition of the geographic position corresponding to the account information detected by the first geographic position.
And the processing module 50 is configured to prohibit a user corresponding to the account information from operating the user equipment when it is determined that the acquired account information meets a preset illegal login condition.
In an embodiment of the present invention, the processing module 50 is further configured to allow a user corresponding to the account information to operate and control the user equipment when it is determined that the obtained account information does not satisfy the preset illegal login condition.
In this embodiment, as shown in fig. 7, the device control apparatus further includes an encryption module 60, configured to apply a preset encryption algorithm to perform encryption processing on information interacted between the user equipment and the terminal device through the cloud platform server.
It should be noted that the foregoing explanation of the device control method is also applicable to the device control apparatus according to the embodiment of the present invention, and details that are not disclosed in the description of the device control apparatus according to the embodiment of the present invention are not repeated herein.
In summary, in the device control method according to the embodiment of the present invention, a login request sent by a terminal device to a cloud platform server is received, if it is verified that account information is legal, a login success response is fed back to the terminal device, a first geographic location corresponding to an IP address is obtained according to pre-stored location information, and a change condition of the geographic location corresponding to the account information is detected according to the first geographic location, so as to determine whether the account information meets a preset illegal login condition, and if it is determined that the account information meets the preset illegal login condition, a user corresponding to the account information is prohibited from operating a user device. Therefore, the user equipment is prevented from being controlled by illegal terminal equipment, and the safety of the user equipment is ensured.
Fig. 8 is a schematic structural diagram of a device control apparatus according to another embodiment of the present invention, and as shown in fig. 8, on the basis of fig. 6, the judging module 40 includes a first judging unit 41 and a second judging unit 42.
The first determining unit 41 is configured to determine whether the switching frequency of the account information logging in the cloud platform server through the first geographic location or the second geographic location within a preset time meets a preset first threshold when it is detected that the account information logs in the cloud platform server through the second geographic location.
And a second judging unit 42, configured to judge that the account information satisfies a preset illegal login condition when the switching frequency satisfies a preset first threshold.
Fig. 9 is a schematic structural diagram of a device control apparatus according to still another embodiment of the present invention, and as shown in fig. 9, the judging module 40 includes a third judging unit 43 and a fourth judging unit 44 on the basis of fig. 6.
The third determining unit 43 is configured to determine, when it is detected that the account information logs in the cloud platform server through another geographic location, whether the number of locations where the account information logs in the cloud platform server through another geographic location within a preset time meets a preset second threshold.
And a fourth judging unit 44, configured to judge that the account information satisfies the preset illegal login condition when the number of locations satisfies a preset second threshold.
It should be noted that the foregoing explanation of the device control method is also applicable to the device control apparatus according to the embodiment of the present invention, and details that are not disclosed in the description of the device control apparatus according to the embodiment of the present invention are not repeated herein.
In summary, the device control apparatus according to the embodiment of the present invention detects, according to different application scenarios and according to the first geographic location, a change situation of the geographic location corresponding to the account information, and determines whether the account information is legal or not by using different preset illegal login conditions, so that when it is determined that the account information satisfies the preset illegal login conditions, a user corresponding to the account information is prohibited from operating the user device.
Therefore, the user equipment is prevented from being controlled by illegal terminal equipment, and the safety of the user equipment is further ensured. In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (10)

1. An apparatus control method characterized by comprising the steps of:
receiving a login request sent by a terminal device to a cloud platform server, wherein the login request comprises: account information and IP address; the account information includes: SN code and MAC code of terminal equipment;
if the account information is verified to be legal, feeding back a login success response to the terminal equipment, and acquiring a first geographic position corresponding to the IP address according to prestored position information;
detecting the change condition of the geographical position corresponding to the account information according to the first geographical position, and judging whether the account information meets a preset illegal login condition;
if the account information is judged to meet the preset illegal login condition, the user corresponding to the account information is prohibited from operating the user equipment; the user equipment is equipment which can be controlled by the terminal equipment through a cloud platform server;
the verification that the account information is legal specifically verifies whether the SN code and the MAC code of the terminal equipment are registered and authenticated, and if the SN code and the MAC code are registered and authenticated, the account information is legal;
and detecting the change condition of the geographic position corresponding to the account information according to the first geographic position, and judging whether the account information meets a preset illegal login condition, specifically, detecting the change condition of the geographic position of the SN code and the MAC code of the terminal equipment according to the first geographic position, and judging whether the change condition of the geographic position of the SN code and the MAC code of the terminal equipment meets the preset illegal login condition.
2. The method of claim 1, wherein the detecting a change in the geographic location corresponding to the account information according to the first geographic location and determining whether the account information meets a preset illegal login condition comprises:
if the fact that the account information logs in the cloud platform server through a second geographic position is detected, whether the switching times of the account information logging in the cloud platform server through the first geographic position or the second geographic position within preset time meets a preset first threshold value is judged;
and if the switching times meet a preset first threshold value, judging that the account information meets a preset illegal login condition.
3. The method of claim 1, wherein the detecting a change in the geographic location corresponding to the account information according to the first geographic location and determining whether the account information meets a preset illegal login condition comprises:
if the fact that the account information logs in the cloud platform server through other geographic positions is detected, whether the number of the positions, in which the account information logs in the cloud platform server through other geographic positions, in a preset time meets a preset second threshold value is judged;
and if the position number meets a preset second threshold value, judging that the account information meets a preset illegal login condition.
4. The method of claim 1, wherein after determining whether the account information satisfies a preset illegal login condition, further comprising:
and if the account information is judged and acquired to not meet the preset illegal login condition, allowing a user corresponding to the account information to control the user equipment.
5. The method of any of claims 1-4, further comprising:
and encrypting the information interacted between the user equipment and the terminal equipment through the cloud platform server by using a preset encryption algorithm.
6. An apparatus control device, characterized by comprising:
the receiving module is used for receiving a login request sent by a terminal device to a cloud platform server, wherein the login request comprises: account information and IP address; the account information includes: SN code and MAC code of terminal equipment;
the feedback module is used for feeding back a login success response to the terminal equipment if the account information is verified to be legal;
the acquisition module is used for acquiring a first geographical position corresponding to the IP address according to prestored position information;
the judging module is used for detecting the change condition of the geographic position corresponding to the account information according to the first geographic position and judging whether the account information meets the preset illegal login condition or not;
the processing module is used for forbidding a user corresponding to the account information to control the user equipment when judging and knowing that the account information meets the preset illegal login condition; the user equipment is equipment which can be controlled by the terminal equipment through a cloud platform server;
the verification that the account information is legal specifically verifies whether the SN code and the MAC code of the terminal equipment are registered and authenticated, and if the SN code and the MAC code are registered and authenticated, the account information is legal;
and detecting the change condition of the geographic position corresponding to the account information according to the first geographic position, and judging whether the account information meets a preset illegal login condition, specifically, detecting the change condition of the geographic position of the SN code and the MAC code of the terminal equipment according to the first geographic position, and judging whether the change condition of the geographic position of the SN code and the MAC code of the terminal equipment meets the preset illegal login condition.
7. The apparatus of claim 6, wherein the determining module comprises:
the first judging unit is used for judging whether the switching times of the account information logging in the cloud platform server through the first geographical position or the second geographical position within a preset time meet a preset first threshold value or not when the account information logging in the cloud platform server through the second geographical position is detected;
and the second judging unit is used for judging that the account information meets the preset illegal login condition when the switching times meet a preset first threshold value.
8. The apparatus of claim 6, wherein the determining module comprises:
the third judging unit is used for judging whether the number of the positions of the account information which logs in the cloud platform server through other geographical positions in a preset time meets a preset second threshold value or not when the account information which logs in the cloud platform server through other geographical positions is detected;
and the fourth judging unit is used for judging that the account information meets the preset illegal login condition when the position number meets a preset second threshold value.
9. The apparatus of claim 6, wherein the processing module is further to:
and when judging that the acquired account information does not meet the preset illegal login condition, allowing a user corresponding to the account information to operate user equipment.
10. The apparatus of any of claims 6-9, further comprising:
and the encryption module is used for encrypting the information interacted between the user equipment and the terminal equipment through the cloud platform server by applying a preset encryption algorithm.
CN201610979577.0A 2016-10-28 2016-10-28 Equipment control method and device Active CN106656995B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610979577.0A CN106656995B (en) 2016-10-28 2016-10-28 Equipment control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610979577.0A CN106656995B (en) 2016-10-28 2016-10-28 Equipment control method and device

Publications (2)

Publication Number Publication Date
CN106656995A CN106656995A (en) 2017-05-10
CN106656995B true CN106656995B (en) 2020-03-03

Family

ID=58805859

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610979577.0A Active CN106656995B (en) 2016-10-28 2016-10-28 Equipment control method and device

Country Status (1)

Country Link
CN (1) CN106656995B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112260995B (en) * 2018-03-31 2022-05-24 华为云计算技术有限公司 Access authentication method, device and server
CN108965319A (en) * 2018-08-03 2018-12-07 珠海格力电器股份有限公司 Apparatus control method, system and storage medium
CN110245474B (en) * 2019-04-19 2023-07-14 创新先进技术有限公司 Processing method and system for public account
CN112165493B (en) * 2020-09-30 2023-02-21 惠州市善居电子商务有限公司 Identity login switching method and device, computer equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102594823A (en) * 2012-02-20 2012-07-18 南京邮电大学 Trusted system for remote secure access of intelligent home
CN103532797A (en) * 2013-11-06 2014-01-22 网之易信息技术(北京)有限公司 Abnormity monitoring method and device for user registration
CN104601547A (en) * 2014-12-22 2015-05-06 新浪网技术(中国)有限公司 Illegal operation identification method and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1795440A (en) * 2003-04-07 2006-06-28 艾特拉克斯公司 Network security system based on physical location
CN105119922A (en) * 2015-08-28 2015-12-02 小米科技有限责任公司 Method and device for access control, and server

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102594823A (en) * 2012-02-20 2012-07-18 南京邮电大学 Trusted system for remote secure access of intelligent home
CN103532797A (en) * 2013-11-06 2014-01-22 网之易信息技术(北京)有限公司 Abnormity monitoring method and device for user registration
CN104601547A (en) * 2014-12-22 2015-05-06 新浪网技术(中国)有限公司 Illegal operation identification method and device

Also Published As

Publication number Publication date
CN106656995A (en) 2017-05-10

Similar Documents

Publication Publication Date Title
CN106656995B (en) Equipment control method and device
CN106899547B (en) Equipment operation method based on Internet of things and server
CN108173822B (en) Intelligent door lock control method, intelligent door lock and computer readable storage medium
US9444682B2 (en) Location-aware configuration
US11188636B2 (en) System for controlling access to an account
CN104202338B (en) A kind of safety access method being applicable to enterprise-level Mobile solution
CN107770226B (en) Control method and device for smart home, home gateway and mobile terminal
WO2012019410A1 (en) Method and apparatus for preventing illegal encroachment in internal network of intelligent home
CN105471974A (en) Intelligent equipment capable of realizing remote control, terminal equipment and method
CN106453329B (en) Wireless encrypted intelligent household remote monitoring method and system
CN105553924A (en) Safety protection method and system for smart home, and smart home
CN103796278A (en) Mobile terminal wireless network access control method
US9592793B2 (en) Method and system for preventing telematics remote control vehicle from being externally hacked
CN103874069A (en) MAC authentication device and method of wireless terminal
CN105681360A (en) Smart home communication method and device
EP3094040A1 (en) Communication device
US8107384B2 (en) Information communication system, transmitting apparatus, transmitting method, and computer program
CN104660523A (en) Network access control system
WO2018076368A1 (en) Method and system for safely operating device in local area network, and device therefor
CN106604278B (en) Multi-authority mobile network sharing method
CN107241332B (en) Gateway authority processing method and device
CN104812019A (en) Wireless network access method, wireless access equipment and wireless control equipment
CN114363067B (en) Network access control method, device, computer equipment and storage medium
CN106656480B (en) Key agreement method and device for client of household appliance
CN106325078A (en) Smart household safety control system based on Internet of Things technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant