CN111586579B - Equipment control method and device, electronic equipment and readable storage medium - Google Patents

Equipment control method and device, electronic equipment and readable storage medium Download PDF

Info

Publication number
CN111586579B
CN111586579B CN202010350475.9A CN202010350475A CN111586579B CN 111586579 B CN111586579 B CN 111586579B CN 202010350475 A CN202010350475 A CN 202010350475A CN 111586579 B CN111586579 B CN 111586579B
Authority
CN
China
Prior art keywords
terminal
distance
identity authentication
current equipment
control command
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010350475.9A
Other languages
Chinese (zh)
Other versions
CN111586579A (en
Inventor
张崇兴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Goertek Techology Co Ltd
Original Assignee
Goertek Techology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Goertek Techology Co Ltd filed Critical Goertek Techology Co Ltd
Priority to CN202010350475.9A priority Critical patent/CN111586579B/en
Publication of CN111586579A publication Critical patent/CN111586579A/en
Application granted granted Critical
Publication of CN111586579B publication Critical patent/CN111586579B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephone Function (AREA)

Abstract

The application discloses a method for controlling equipment, which comprises the following steps: when receiving a control command, detecting whether a terminal in wireless connection with the current equipment exists; when a terminal in wireless connection with the current equipment exists, performing identity authentication on the terminal; if the terminal passes the identity authentication, acquiring the distance between the current equipment and the terminal, and judging whether the distance is an effective distance; if yes, executing the control command. According to the method and the device, the control command is executed only when the terminal passes through identity authentication and the distance between the current device and the terminal is the effective distance, so that the situation that an illegal user controls the device under the condition that a legal user is not aware of is avoided, the user identity of the control device is limited, and great convenience is brought to the user. The application also provides a device for controlling the equipment, the electronic equipment and the readable storage medium, and the beneficial effects are achieved.

Description

Equipment control method and device, electronic equipment and readable storage medium
Technical Field
The present application relates to the field of device control, and in particular, to a device control method, apparatus, electronic device, and readable storage medium.
Background
With the development of science and technology, in the production life, a mobile terminal (such as a mobile phone and a tablet personal computer) is generally used for controlling smart homes and smart devices, that is, as the use of the internet of things technology in the field of smart devices is more and more popular, a living mode of controlling devices through a network is also accepted by more and more users.
However, in the actual use process, the user sometimes does not want others to change the setting or control the device through voice or key pressing, but there is no method for limiting the user identity of the control device in the prior art, which brings great inconvenience to the user.
Therefore, how to limit the user identity of the control device is a technical problem that needs to be solved by those skilled in the art.
Disclosure of Invention
The application aims to provide a device control method, a device, an electronic device and a readable storage medium, which are used for limiting the identity of a user of a control device.
In order to solve the above technical problem, the present application provides a method for controlling a device, including:
when receiving a control command, detecting whether a terminal in wireless connection with the current equipment exists;
when a terminal in wireless connection with the current equipment exists, performing identity authentication on the terminal;
if the terminal passes the identity authentication, acquiring the distance between the current equipment and the terminal, and judging whether the distance is an effective distance;
and if so, executing the control command.
Optionally, the obtaining the distance between the current device and the terminal includes:
measuring the signal strength of the wireless connection between the current equipment and the terminal;
and determining the distance between the current equipment and the terminal according to the signal strength.
Optionally, the obtaining the distance between the current device and the terminal includes:
and measuring the distance between the current equipment and the terminal through a distance sensor.
Optionally, the authenticating the terminal includes:
outputting first prompt information of password verification;
judging whether an input password is received within preset time;
if not, determining that the terminal does not pass the identity authentication;
if yes, checking whether the password is correct;
if the password is correct, determining that the terminal passes the identity authentication;
and if the password is incorrect, determining that the terminal fails the identity authentication.
Optionally, the wireless connection comprises a bluetooth connection;
and performing identity verification on the terminal, including:
checking whether the Bluetooth ID of the terminal is consistent with a preset Bluetooth ID;
if so, determining that the terminal passes the identity authentication;
if not, determining that the terminal does not pass the identity authentication.
Optionally, the method further includes:
receiving a preset Bluetooth ID modification request;
and executing the preset Bluetooth ID modification request to modify the preset Bluetooth ID.
Optionally, when the distance is not the effective distance, the method further includes:
and outputting second prompt information which cannot be executed by the control command.
The present application also provides an apparatus for device control, the apparatus comprising:
the detection module is used for detecting whether a terminal in wireless connection with the current equipment exists or not when the control command is received;
the identity authentication module is used for authenticating the terminal when the terminal wirelessly connected with the current equipment exists;
the judging module is used for acquiring the distance between the current equipment and the terminal if the terminal passes the identity authentication and judging whether the distance is an effective distance;
and the execution module is used for executing the control command when the distance is the effective distance.
The present application also provides an electronic device, including:
a memory for storing a computer program;
a processor for implementing the steps of the method of device control as claimed in any preceding claim when executing said computer program.
The present application also provides a readable storage medium having stored thereon a computer program which, when executed by a processor, carries out the steps of the method of controlling a device as claimed in any one of the preceding claims.
The device control method provided by the application comprises the following steps: when receiving a control command, detecting whether a terminal in wireless connection with the current equipment exists; when a terminal in wireless connection with the current equipment exists, performing identity authentication on the terminal; if the terminal passes the identity authentication, acquiring the distance between the current equipment and the terminal, and judging whether the distance is an effective distance; if yes, executing the control command.
The technical scheme that this application provided, through when receiving control command, carry out authentication to the terminal that carries out wireless connection with current equipment, then when the terminal passes through authentication, acquire the distance between current equipment and the terminal, and judge whether the distance is effective distance, only pass through authentication at the terminal and the distance between current equipment and the terminal just carries out this control command for effective distance, avoided illegal user to control equipment under the condition that legal user is unknown, realized restricting control device's user identity, brought very big facility for the user. The application also provides a device for controlling the equipment, the electronic equipment and the readable storage medium, which have the beneficial effects and are not repeated herein.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of a method for controlling a device according to an embodiment of the present disclosure;
FIG. 2 is a flow chart of an actual representation of S102 of a method of plant control as provided in FIG. 1;
fig. 3 is a block diagram of an apparatus for controlling a device according to an embodiment of the present disclosure;
FIG. 4 is a block diagram of another apparatus for controlling a device according to an embodiment of the present disclosure;
fig. 5 is a block diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The core of the application is to provide a method and a device for controlling equipment, electronic equipment and a readable storage medium, which are used for limiting the user identity of the control equipment.
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, fig. 1 is a flowchart of a method for controlling a device according to an embodiment of the present disclosure.
The method specifically comprises the following steps:
s101: when receiving a control command, detecting whether a terminal in wireless connection with the current equipment exists;
with the increasing popularization of the internet of things technology in the field of intelligent equipment, a living mode of controlling equipment through a network is accepted by more and more users, however, in the actual use process, the user sometimes does not want other people to randomly change settings or control the equipment through voice or keys, but a method for limiting the user identity of the control equipment is not available in the prior art, and great inconvenience is brought to the user;
by taking the intelligent sound box as an example, a user can conveniently inquire required information through the intelligent sound box, play online music and be used as central control equipment of household appliances, so that the user can conveniently control and set the household appliances. However, sometimes a user does not want others to change the setting of the smart sound box randomly through voice or key pressing, or does not want the smart sound box to be wondered by a child, in this case, the application provides a device control method for solving the above problems;
when a control command is received, whether a terminal in wireless connection with the current equipment exists is detected, whether the equipment is connected with the terminal is judged, if yes, the probability that the control command received by the equipment is sent by a legal user is proved to be high, and the step S102 is carried out to verify the identity of the terminal;
optionally, when there is no terminal wirelessly connected to the current device, it is proved that the probability that the control command received by the device is sent by a legitimate user is low, and at this time, a prompt message requesting to connect the terminal may be output, so as to perform identity authentication on the terminal when the terminal is wirelessly connected to the current device.
S102: when a terminal in wireless connection with the current equipment exists, performing identity authentication on the terminal;
the purpose of authenticating the terminal here is to determine whether the control command received by the current device is a control command issued by a valid user.
Optionally, the wireless connection referred to herein includes a bluetooth connection; on this basis, in order to reduce the complexity of the authentication, the authentication of the terminal may be completed by checking the bluetooth ID, that is, the authentication of the terminal mentioned here may specifically be:
checking whether the Bluetooth ID of the terminal is consistent with a preset Bluetooth ID;
if so, determining that the terminal passes the identity authentication;
if not, determining that the terminal does not pass the identity authentication.
Further, in order to modify the valid user of the current device, the modification of the preset bluetooth ID may be implemented by performing the following steps:
receiving a preset Bluetooth ID modification request;
and executing the preset Bluetooth ID modification request to modify the preset Bluetooth ID.
S103: if the terminal passes the identity authentication, acquiring the distance between the current equipment and the terminal, and judging whether the distance is an effective distance;
if yes, go to step S104;
when the terminal passes the identity authentication, the probability that the control command received by the equipment is sent by a legal user is proved to be higher, the distance between the current equipment and the terminal is obtained at the moment, whether the distance is an effective distance or not is judged, if the distance is the effective distance, the control command is considered to be sent by the legal user, and the step S104 is entered to execute the control command at the moment to complete the control on the equipment at the moment.
Optionally, in order to reduce the difficulty in obtaining the distance between the current device and the terminal and improve the obtaining speed, the obtaining of the distance between the current device and the terminal mentioned herein may specifically be:
measuring the signal strength of wireless connection between the current equipment and the terminal;
and determining the distance between the current equipment and the terminal according to the signal strength.
Optionally, the distance may be determined by measuring an RSSI Strength of a wireless Signal between the current device and the terminal, where RSSI (received Signal Strength indicator) is an indication of the Strength of the received Signal, and then determining whether the distance between the device and the speaker is an effective distance according to the RSSI Strength, and if the RSSI Strength is greater than a preset Strength, determining that the distance is an effective distance;
optionally, to improve the accuracy of obtaining the distance between the current device and the terminal, the obtaining of the distance between the current device and the terminal mentioned herein may specifically be:
and measuring the distance between the current equipment and the terminal through a distance sensor.
Optionally, the obtaining manner of the effective distance mentioned here may be input by a user, or obtained by downloading the device connected to a designated location of the server, which is not specifically limited in this application;
optionally, the size of the effective distance may be modified by executing the received effective distance change command.
S104: and executing the control command.
Based on the technical scheme, the method for controlling the equipment provided by the application carries out identity authentication on the terminal which is in wireless connection with the current equipment when the control command is received, then obtains the distance between the current equipment and the terminal when the terminal passes through the identity authentication, judges whether the distance is an effective distance or not, executes the control command only when the terminal passes through the identity authentication and the distance between the current equipment and the terminal is the effective distance, avoids that an illegal user controls the equipment under the condition that the legal user does not know, realizes the limitation on the user identity of the control equipment, and brings great convenience to the user.
With respect to step S102 of the previous embodiment, as described herein, it can be realized by performing the steps shown in fig. 2, and the following description is made with reference to fig. 2.
Referring to fig. 2, fig. 2 is a flowchart illustrating an actual representation of S102 in the method for controlling the device of fig. 1.
The method specifically comprises the following steps:
s201: outputting first prompt information of password verification;
s202: judging whether an input password is received within preset time;
if not, go to step S203; if yes, the process proceeds to step S204.
S203: determining that the terminal fails to pass identity authentication;
s204: checking whether the password is correct;
if yes, go to step S205; if not, the process proceeds to step S206.
S205: determining that the terminal passes identity authentication;
s206: and determining that the terminal fails to pass the authentication.
Based on the technical scheme, the terminal can be authenticated by requiring the user to input the password, namely, the first prompt message of password authentication is output, and whether the input password is received within the preset time is judged; if not, determining that the terminal does not pass the identity authentication; if yes, checking whether the password is correct; if the password is correct, the terminal is determined to pass the identity authentication; if the password is incorrect, determining that the terminal fails to pass the identity authentication; the terminal is authenticated by requiring the user to input the password, so that the accuracy of authentication is further improved, and the probability that the equipment is controlled by an illegal user is further reduced.
Referring to fig. 3, fig. 3 is a structural diagram of an apparatus for controlling a device according to an embodiment of the present disclosure.
The apparatus may include:
a detection module 100, configured to detect whether a terminal wirelessly connected to a current device exists when a control command is received;
the identity authentication module 200 is configured to authenticate a terminal when the terminal wirelessly connected to the current device exists;
the determining module 300 is configured to obtain a distance between the current device and the terminal if the terminal passes the identity authentication, and determine whether the distance is an effective distance;
and an executing module 400, configured to execute the control command when the distance is the effective distance.
Referring to fig. 4, fig. 4 is a structural diagram of another apparatus for controlling a device according to an embodiment of the present disclosure.
The determining module 300 may include:
the first measuring submodule is used for measuring the signal strength of wireless connection between the current equipment and the terminal;
and the first determining submodule is used for determining the distance between the current equipment and the terminal according to the signal strength.
The determining module 300 may include:
and the second measuring submodule is used for measuring the distance between the current equipment and the terminal through the distance sensor.
The identity verification module 200 may include:
the output submodule is used for outputting first prompt information of password verification;
the judgment submodule is used for judging whether the input password is received within the preset time;
the second determining submodule is used for determining that the terminal fails to pass the identity authentication when the input password is not received within the preset time;
the first checking submodule is used for checking whether the password is correct or not when the input password is received within the preset time;
the third determining submodule is used for determining that the terminal passes the identity authentication when the password is correct;
and the fourth determining submodule is used for determining that the terminal fails to pass the authentication when the password is incorrect.
The identity verification module 200 may include:
the second checking submodule is used for checking whether the Bluetooth ID of the terminal is consistent with the preset Bluetooth ID;
the fifth determining submodule is used for determining that the terminal passes the identity authentication when the Bluetooth ID of the terminal is consistent with the preset Bluetooth ID;
and the sixth determining submodule is used for determining that the terminal does not pass the identity authentication when the Bluetooth ID of the terminal is inconsistent with the preset Bluetooth ID.
The identity verification module 200 may further include:
the receiving submodule is used for receiving a preset Bluetooth ID modification request;
and the modification submodule is used for executing the preset Bluetooth ID modification request to modify the preset Bluetooth ID.
The system may further comprise:
and the output module is used for outputting second prompt information which cannot be executed by the control command when the distance is not the effective distance.
Since the embodiments of the apparatus portion and the method portion correspond to each other, please refer to the description of the embodiments of the method portion for the embodiments of the apparatus portion, which is not repeated here.
Referring to fig. 5, fig. 5 is a structural diagram of an electronic device according to an embodiment of the present disclosure.
The electronic device 500 may vary widely in configuration or performance and may include one or more processors (CPUs) 522 (e.g., one or more processors) and memory 532, one or more storage media 530 (e.g., one or more mass storage devices) storing applications 542 or data 544. Memory 532 and storage media 530 may be, among other things, transient storage or persistent storage. The program stored on the storage medium 530 may include one or more modules (not shown), each of which may include a sequence of instruction operations for the device. Further, the processor 522 may be configured to communicate with the storage medium 530 to execute a series of instruction operations in the storage medium 530 on the electronic device 500.
The electronic device 500 may also include one or more power supplies 525, one or more wired or wireless network interfaces 550, one or more input-output interfaces 558, and/or one or more operating devices 541, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, etc.
The steps in the method of device control described above with reference to fig. 1 to 2 are implemented by the electronic device based on the structure shown in fig. 5.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described apparatuses, apparatuses and modules may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus, device and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of modules is merely a division of logical functions, and an actual implementation may have another division, for example, a plurality of modules or components may be combined or integrated into another apparatus, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or modules, and may be in an electrical, mechanical or other form.
Modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
The integrated module, if implemented in the form of a software functional module and sold or used as a separate product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a function calling device, or a network device) to execute all or part of the steps of the method of the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The method, the apparatus, the electronic device and the readable storage medium for controlling the device provided by the present application are described in detail above. The principles and embodiments of the present application are explained herein using specific examples, which are provided only to help understand the method and the core idea of the present application. It should be noted that, for those skilled in the art, it is possible to make several improvements and modifications to the present application without departing from the principle of the present application, and such improvements and modifications also fall within the scope of the claims of the present application.
It is further noted that, in the present specification, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.

Claims (10)

1. A method of device control, comprising:
when receiving a control command, detecting whether a terminal in wireless connection with the current equipment exists;
when a terminal in wireless connection with the current equipment exists, performing identity authentication on the terminal;
if the terminal passes the identity authentication, acquiring the distance between the current equipment and the terminal, and judging whether the distance is an effective distance;
and if so, executing the control command.
2. The method of claim 1, wherein obtaining the distance between the current device and the terminal comprises:
measuring the signal strength of the wireless connection between the current equipment and the terminal;
and determining the distance between the current equipment and the terminal according to the signal strength.
3. The method of claim 1, wherein obtaining the distance between the current device and the terminal comprises:
and measuring the distance between the current equipment and the terminal through a distance sensor.
4. The method of claim 1, wherein authenticating the terminal comprises:
outputting first prompt information of password verification;
judging whether an input password is received within preset time;
if not, determining that the terminal does not pass the identity authentication;
if yes, checking whether the password is correct;
if the password is correct, determining that the terminal passes the identity authentication;
and if the password is incorrect, determining that the terminal fails the identity authentication.
5. The method of claim 1, wherein the wireless connection comprises a bluetooth connection;
and performing identity verification on the terminal, including:
checking whether the Bluetooth ID of the terminal is consistent with a preset Bluetooth ID;
if so, determining that the terminal passes the identity authentication;
if not, determining that the terminal does not pass the identity authentication.
6. The method of claim 5, further comprising:
receiving a preset Bluetooth ID modification request;
and executing the preset Bluetooth ID modification request to modify the preset Bluetooth ID.
7. The method of claim 1, further comprising, when the distance is not the effective distance:
and outputting second prompt information which cannot be executed by the control command.
8. An apparatus for device control, comprising:
the detection module is used for detecting whether a terminal in wireless connection with the current equipment exists or not when the control command is received;
the identity authentication module is used for authenticating the terminal when the terminal wirelessly connected with the current equipment exists;
the judging module is used for acquiring the distance between the current equipment and the terminal if the terminal passes the identity authentication and judging whether the distance is an effective distance;
and the execution module is used for executing the control command when the distance is the effective distance.
9. An electronic device, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the method of controlling the apparatus of any one of claims 1 to 7 when executing the computer program.
10. A readable storage medium, characterized in that the readable storage medium has stored thereon a computer program which, when being executed by a processor, carries out the steps of a method of controlling a device according to any one of claims 1 to 7.
CN202010350475.9A 2020-04-28 2020-04-28 Equipment control method and device, electronic equipment and readable storage medium Active CN111586579B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010350475.9A CN111586579B (en) 2020-04-28 2020-04-28 Equipment control method and device, electronic equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010350475.9A CN111586579B (en) 2020-04-28 2020-04-28 Equipment control method and device, electronic equipment and readable storage medium

Publications (2)

Publication Number Publication Date
CN111586579A CN111586579A (en) 2020-08-25
CN111586579B true CN111586579B (en) 2021-10-26

Family

ID=72126191

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010350475.9A Active CN111586579B (en) 2020-04-28 2020-04-28 Equipment control method and device, electronic equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN111586579B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114980093A (en) * 2021-02-18 2022-08-30 Oppo广东移动通信有限公司 Equipment verification method and device, computer equipment and storage medium
CN113783992B (en) * 2021-08-11 2022-08-12 珠海格力电器股份有限公司 Control method and device of electronic equipment, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102789682A (en) * 2012-07-13 2012-11-21 惠州Tcl移动通信有限公司 Method and system for remote control of household appliances
CN105848091A (en) * 2016-03-31 2016-08-10 乐视控股(北京)有限公司 Vehicle control method and device without keys
CN107644483A (en) * 2017-09-30 2018-01-30 河南职业技术学院 A kind of automatic lock for bicycle locking control method
CN108735205A (en) * 2018-04-17 2018-11-02 上海康斐信息技术有限公司 A kind of control method and intelligent sound box of intelligent sound box
CN110310637A (en) * 2019-06-25 2019-10-08 重庆信络威科技有限公司 A kind of sound control method and system based on distributed multi-microphone and bluetooth Mesh

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7503489B2 (en) * 2005-04-26 2009-03-17 Bpriv, Llc Method and system for monitoring electronic purchases and cash-withdrawals
US9788204B2 (en) * 2015-10-31 2017-10-10 Verizon Patent And Licensing Inc. User authentication systems and methods

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102789682A (en) * 2012-07-13 2012-11-21 惠州Tcl移动通信有限公司 Method and system for remote control of household appliances
CN105848091A (en) * 2016-03-31 2016-08-10 乐视控股(北京)有限公司 Vehicle control method and device without keys
CN107644483A (en) * 2017-09-30 2018-01-30 河南职业技术学院 A kind of automatic lock for bicycle locking control method
CN108735205A (en) * 2018-04-17 2018-11-02 上海康斐信息技术有限公司 A kind of control method and intelligent sound box of intelligent sound box
CN110310637A (en) * 2019-06-25 2019-10-08 重庆信络威科技有限公司 A kind of sound control method and system based on distributed multi-microphone and bluetooth Mesh

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
智能家居无线控制解决方案;《电脑知识与技术(学术交流)》;20060128(第03期);全文 *

Also Published As

Publication number Publication date
CN111586579A (en) 2020-08-25

Similar Documents

Publication Publication Date Title
US11031011B2 (en) Electronic device and method for determining electronic device to perform speech recognition
CN111586579B (en) Equipment control method and device, electronic equipment and readable storage medium
CN112053161B (en) Binding processing method, device and equipment
WO2015187505A1 (en) Geo-location and biometric presence security
US10896268B2 (en) Security adjustments in mobile devices
CN103761463A (en) Information processing method and electronic device
US20120200391A1 (en) Method to identify user with security
US20220005046A1 (en) Payment method using biometric authentication and electronic device therefor
CN113468515A (en) User identity authentication method and device, electronic equipment and storage medium
KR20200031275A (en) Electronic device for performing authorization using accessory and method for the same
CN111757314A (en) Method for installing user configuration file and electronic device thereof
WO2017088745A1 (en) Information processing method and apparatus, and electronic device
CN105354459A (en) Information processing method and device and electronic equipment
KR20200100481A (en) Electronic device for authenticating biometric information and operating method thereof
US20210099526A1 (en) Electronic device for controlling registration session, and operation method therefor; and server, and operation method therefor
CN107371160B (en) Method and equipment for carrying out wireless connection pre-authorization on user equipment
CN104468616A (en) Picture verification code generation method and client side
CN105491153A (en) Sharing method and device and mobile terminal
CN110121174B (en) Implicit identity authentication method of mobile intelligent terminal
WO2017185683A1 (en) Authentication method and authentication system based on biological identification information, and electronic device
US20200401724A1 (en) Apparatus and method for transmitting personal information using automatic response system
KR20200097100A (en) Electronic device and method for veryfying integrity of application
CN111784355B (en) Transaction security verification method and device based on edge calculation
US11843947B2 (en) Electronic device and authentication method in electronic device
WO2014079292A1 (en) A method for controlling web application through a smart terminal and a smart terminal for controlling web application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant