CN112738025B - Device control method and apparatus, storage medium, and electronic apparatus - Google Patents

Device control method and apparatus, storage medium, and electronic apparatus Download PDF

Info

Publication number
CN112738025B
CN112738025B CN202011429382.1A CN202011429382A CN112738025B CN 112738025 B CN112738025 B CN 112738025B CN 202011429382 A CN202011429382 A CN 202011429382A CN 112738025 B CN112738025 B CN 112738025B
Authority
CN
China
Prior art keywords
authorization
server
control
authorization information
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011429382.1A
Other languages
Chinese (zh)
Other versions
CN112738025A (en
Inventor
余少晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao Haier Technology Co Ltd
Haier Smart Home Co Ltd
Original Assignee
Qingdao Haier Technology Co Ltd
Haier Smart Home Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao Haier Technology Co Ltd, Haier Smart Home Co Ltd filed Critical Qingdao Haier Technology Co Ltd
Priority to CN202011429382.1A priority Critical patent/CN112738025B/en
Publication of CN112738025A publication Critical patent/CN112738025A/en
Application granted granted Critical
Publication of CN112738025B publication Critical patent/CN112738025B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Abstract

The invention provides a device control method and device, a storage medium and an electronic device, wherein the method comprises the following steps: confirming that the target object authorized by the authorization server respectively controls the first equipment and the second equipment; sending an extended permission request to the authorization server, wherein the extended permission request carries indication information for indicating that the authorization server authorizes a target object to respectively control a first device and a second device, and the extended permission request is used for requesting to allow the first device to control the second device; and receiving an authorization certificate sent by the authorization server based on the extended authority request, and indicating the first equipment to control the second equipment based on the authorization certificate. By adopting the technical scheme, the problems that in the related technology, only the control of the target object to different equipment can be realized, the control of one equipment to another equipment cannot be realized and the like are solved.

Description

Device control method and apparatus, storage medium, and electronic apparatus
Technical Field
The present invention relates to the field of communications, and in particular, to a device control method and apparatus, a storage medium, and an electronic apparatus.
Background
With the progress of technology and the demand that a user wants to experience more intelligence, for an access device inside an internet of things platform, especially in a complex use scenario, when a plurality of devices operate simultaneously, one device is required to control the other device, at this time, the devices are not single independent operating individuals, and the device controlling the other device needs to share resources with the other device of the user. However, the prior art does not flexibly authorize the service server of a certain node from the perspective of users, and has a misuse of user rights. Some technologies adopt a simple message broadcasting mechanism, and have inextensible and security risks.
In the related art, an effective solution is not provided for the problems that the control of the target object to different devices can only be realized, the control of one device to another device cannot be realized, and the like.
Disclosure of Invention
The embodiment of the invention provides a device control method and device, a storage medium and an electronic device, and aims to solve the problems that in the related art, only a target object can be controlled on different devices respectively, and one device cannot be controlled on the other device.
According to an embodiment of the present invention, there is provided an apparatus control method including: confirming that the target object authorized by the authorization server respectively controls the first equipment and the second equipment; sending an extended permission request to the authorization server, wherein the extended permission request carries indication information for indicating that the authorization server authorizes a target object to respectively control a first device and a second device, and the extended permission request is used for requesting to allow the first device to control the second device; and receiving an authorization certificate sent by the authorization server based on the extended authority request, and indicating the first device to control the second device based on the authorization certificate.
Optionally, instructing, based on the authorization credential, the first device to control the second device includes: sending, by the first device, a control instruction to the second device to instruct the second device to respond to the control instruction, in a case where the authorization credential indicates that the first device has been allowed to control the second device.
Optionally, after the first device is instructed to control the second device based on the authorization credential, the method further includes: acquiring a control result of the first equipment to the second equipment; and sending the control result to a client corresponding to the target object so as to display the control result on the client.
Optionally, after confirming that the target object is authorized by the authorization server to respectively control the first device and the second device, the method further includes: the method comprises the steps of pushing first authorization information and second authorization information to a message server, wherein the first authorization information is used for indicating an authorization server to authorize a target object to control a first device, and the second authorization information is used for indicating the authorization server to authorize the target object to control a second device, so that the message server stores the first authorization information and the second authorization information.
Optionally, in a case that the first device corresponds to multiple service servers, before sending the extended permission request to the authorization server, the method further includes: subscribing, by a second service server, the first authorization information and the second authorization information to the message server, wherein the plurality of service servers include: the first service server is used for pushing first authorization information and second authorization information to the message server; and sending the extended permission request carrying the first authorization information and the second authorization information to the authorization server.
Optionally, before the second service server subscribes to the first authorization information and the second authorization information from the message server, the method further includes: sending, by the second service server, a subscription request permission to an authorization server to instruct the authorization server to determine whether to allow the second service server to subscribe to the first authorization information and the second authorization information from the message server; and receiving a subscription license sent by the authorization server, wherein the subscription license is used for indicating that the second service server is allowed to subscribe the first authorization information and the second authorization information from the message server.
According to still another embodiment of the present invention, there is also provided an apparatus control device including: the confirming module is used for confirming that the target object authorized by the authorization server respectively controls the first equipment and the second equipment; a sending module, configured to send an extended permission request to the authorization server, where the extended permission request carries indication information used to indicate that the authorization server authorizes a target object to respectively control a first device and a second device, and the extended permission request is used to request that the first device is allowed to control the second device; and the processing module is used for receiving an authorization certificate sent by the authorization server based on the extended permission request and indicating the first equipment to control the second equipment based on the authorization certificate.
Optionally, the processing module is further configured to, when the authorization credential indicates that the first device is allowed to control the second device, send a control instruction to the second device through the first device, so as to instruct the second device to respond to the control instruction.
According to yet another embodiment of the invention, there is also provided a computer-readable storage medium comprising a stored program, wherein the program when executed performs the method described in any of the above.
According to yet another embodiment of the present invention, there is also provided an electronic apparatus comprising a memory having a computer program stored therein and a processor arranged to perform the method described in any one of the above by means of the computer program.
According to the invention, the authorized target object of the authorization server is confirmed to respectively control the first equipment and the second equipment; sending an extended permission request to the authorization server, wherein the extended permission request carries indication information for indicating that the authorization server authorizes a target object to respectively control a first device and a second device, and the extended permission request is used for requesting to allow the first device to control the second device; and receiving an authorization certificate sent by the authorization server based on the extended authority request, and indicating the first device to control the second device based on the authorization certificate. That is to say, in order to realize that the first device controls the second device, when the target object respectively controls the first device and the second device, the service server of the first device sends an extended permission request to the authorization server, and the authorization server sends an authorization credential to the service server based on the extended permission request, so that the first device realizes the control of the second device by virtue of the authorization credential received by the service server. By adopting the technical scheme, the problems that the control of a target object to different equipment can only be realized, the control of one equipment to another equipment cannot be realized and the like in the related technology are solved, so that one equipment controls the other equipment, and one equipment can obtain the resource of the other equipment.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
fig. 1 is a block diagram of a hardware configuration of a computer terminal of an apparatus control method according to an embodiment of the present invention;
fig. 2 is a flowchart of a device control method according to an embodiment of the present invention;
FIG. 3 is a flow chart diagram of a method of controlling a device according to an embodiment of the invention;
fig. 4 is a block diagram of a device control apparatus according to an embodiment of the present invention.
Detailed Description
The invention will be described in detail hereinafter with reference to the drawings and embodiments. It should be noted that, in the present application, the embodiments and features of the embodiments may be combined with each other without conflict.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
The method provided by the embodiment of the application can be executed in a computer terminal or a similar operation device. Taking an example of the present invention running on a computer terminal, fig. 1 is a block diagram of a hardware structure of a computer terminal of an apparatus control method according to an embodiment of the present invention. As shown in fig. 1, the computer terminal may include one or more processors 102 (only one is shown in fig. 1), wherein the processors 102 may include, but are not limited to, a Microprocessor (MPU) or a Programmable Logic Device (PLD), and a memory 104 for storing data, and in an exemplary embodiment, the computer terminal may further include a transmission device 106 for communication function and an input/output device 108. It will be understood by those skilled in the art that the structure shown in fig. 1 is only an illustration and is not intended to limit the structure of the computer terminal. For example, the computer terminal may also include more or fewer components than shown in FIG. 1, or have a different configuration with equivalent functionality to that shown in FIG. 1 or with more functionality than that shown in FIG. 1.
The memory 104 may be used to store computer programs, for example, software programs and modules of application software, such as computer programs corresponding to the device control method in the embodiment of the present invention, and the processor 102 executes various functional applications and data processing by running the computer programs stored in the memory 104, so as to implement the method described above. The memory 104 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor 102, which may be connected to a computer terminal over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 106 is used for receiving or transmitting data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the computer terminal. In one example, the transmission device 106 includes a Network adapter (NIC), which can be connected to other Network devices through a base station so as to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
In this embodiment, an apparatus control method is provided, which is applied to the computer terminal, and fig. 2 is a flowchart of an apparatus control method according to an embodiment of the present invention, where the flowchart includes the following steps:
step S202: confirming that the target object authorized by the authorization server respectively controls the first equipment and the second equipment;
step S204: sending an extended permission request to the authorization server, wherein the extended permission request carries indication information for indicating that the authorization server authorizes a target object to respectively control a first device and a second device, and the extended permission request is used for requesting to allow the first device to control the second device;
step S206: receiving an authorization credential sent by the authorization server based on the extended permission request, and instructing the first device to control the second device based on the authorization credential
According to the invention, the authorized target object of the authorization server is confirmed to respectively control the first equipment and the second equipment; sending an extended permission request to the authorization server, wherein the extended permission request carries indication information for indicating that the authorization server authorizes a target object to respectively control a first device and a second device, and the extended permission request is used for requesting to allow the first device to control the second device; and receiving an authorization certificate sent by the authorization server based on the extended authority request, and indicating the first device to control the second device based on the authorization certificate. That is to say, in order to enable the first device to control the second device, when the target object respectively controls the first device and the second device, the service server of the first device sends an extended permission request to the authorization server, and the authorization server sends an authorization credential to the service server based on the extended permission request, so that the first device controls the second device by using the authorization credential received by the service server. By adopting the technical scheme, the problems that the control of the target object to different devices can only be realized, the control of one device to another device cannot be realized and the like in the related technology are solved, so that one device controls another device, and one device can obtain the resource of the other device.
Instructing the first device to control the second device based on the authorization credential in step S206, including: sending, by the first device, a control instruction to the second device to instruct the second device to respond to the control instruction, in a case where the authorization credential indicates that the first device has been allowed to control the second device.
It should be noted that, when a manufacturer accesses a device of a certain type to the internet of things platform, the first device provides the right of the device of the type to acquire the extension protocol, interface, configuration or other necessary conditions of other device resources while following the internet of things platform protocol and specification. A second device: such devices may not belong to the same vendor, but may respond to the first device as long as the definition of the first device vendor for the first device is met, and the extended protocol, interface, configuration, or other requirements are met; while the other devices should be devices for which the user has gained full control. The authorization server is used for providing the credentials for accessing the user equipment to the business server and providing the credentials for allowing the subscription message to the business server. The business server is used for carrying the certificate issued by the authorization server, communicating with the client and the equipment, processing business logic and assembling a response result.
It should be noted that the authorization credential is a credential that the authorization server grants the first device to control the second device, and the first device controls the second device by using the authorization credential, where the authorization server is a set of all authorization servers, and the authorization server may include: and the authorization server corresponds to the first equipment and the authorization server corresponds to the second equipment. The authorization server of the credential granting the first device the right to control the second device actually refers to an authorization server corresponding to the second device in the set of all authorization servers. If the second device controls the first device, the authorization server at this time is actually the authorization server corresponding to the first device in the set of all authorization servers. It should be noted that, for how many devices, there are corresponding authorization servers.
It should be noted that, after the first device controls the second device by means of the authorization credential, the user sends a control instruction to the second device through the first device to instruct the second device to respond to the control instruction. Through the technical means, a user can control another device by using one device.
In an optional embodiment, after instructing the first device to control the second device based on the authorization credential, the method further comprises: acquiring a control result of the first equipment to the second equipment; and sending the control result to a client corresponding to the target object so as to display the control result on the client.
It should be noted that, the control result of the first device to the second device is obtained; and sending the control result to a client corresponding to the target object so as to display the control result on the client. If the second device is considered a resource, the first device controlling the second device is that the first device has acquired the resource of the second device. The final result of the control of the second device by the first device is informed to the user by the client of the result of the first device accessing the resource of the second device. From the user perspective, the user has access to the resources of the second device while controlling the first device. Through the technical means, one device can control the other device, and one device can obtain the resource of the other device.
In an optional embodiment, after confirming that the authorization server has authorized the target object to control the first device and the second device, respectively, the method further includes: and pushing the first authorization information and the second authorization information to a message server, wherein the message server is used for receiving the message pushed by the service server, storing the user authorization information and supporting other service server nodes to subscribe the message. It should be noted that, since the devices in the internet belong to a plurality of vendors, from the viewpoint of protecting the privacy data of the user, the authorization message of the user is stored and pushed only when the user authorizes and the authorization is successfully performed and the user has obtained the actual right. The first authorization information is used for indicating an authorization server to authorize a target object to control a first device, and the second authorization information is used for indicating the authorization server to authorize the target object to control a second device, so that the message server stores the first authorization information and the second authorization information.
It should be noted that the first authorization information may be a credential for the target object to control the first device, or may be related information of the first device, where the related information of the first device may be information of the online time, the running duration, and the like of the first device. The user may subscribe to the details of the first device through the message server. It should be noted that the user can obtain the subscription right of the first device only after confirming that the authorization server has authorized the target object to control the first device. That is, the user obtains the control right of the device before and obtains the subscription right of the device after. It should be noted that, the user does not need to operate the device to obtain the subscription right of the device, and after the user obtains the control right of the device, the service server automatically sends a subscription right request to the right server. The second authorization information is similar to the first authorization information.
It should be noted that, the pushing and subscribing of the message are not physical transmission between devices, but controlled by the cloud service server, so as to implement the security of physical isolation of the message, and at the same time, the architecture level is not coupled with the authorization server and the service server, and is independently stored, independently operated, subscribed as required, and in a non-broadcast manner, so as to ensure that the right of the user is expanded within a certain range
It should be noted that, besides pushing the credential for the target object to control the device and the related information of the device, the message server may also implement interaction between different servers. In an alternative embodiment, the components within the first device are from different vendors and the components from different vendors have their own respective service servers, in which case the interaction of the components from different vendors is difficult, and it may be simple if the components from different vendors interact via the message server.
In an optional embodiment, the first device corresponds to a plurality of service servers, and before sending the extended right request to the authorization server, the method further includes: subscribing, by a second service server, the first authorization information and the second authorization information to the message server, wherein the plurality of service servers include: the first service server is used for pushing first authorization information and second authorization information to the message server; and sending the extended permission request carrying the first authorization information and the second authorization information to the authorization server.
It should be noted that, two components in the first device are from different manufacturers, and both the two components from different manufacturers have their own corresponding service servers, where the plurality of service servers include: a first service server and the second service server. In this scenario, the first service server is configured to push first authorization information to the message server, where the message server stores the first authorization information, and then the service processor requests an extended permission to use the first authorization information as a credential. Through the technical means, the first device and the second device can be determined to belong to the same target object. It should be noted that only the first device and the second device belonging to one target object may control one device to control the other device. And sending the extended permission request carrying the first authorization information and the second authorization information to the authorization server. And the authorization server responds to the first authorization information carried by the extended authority request of the first authorization information.
It should be noted that, the second service server subscribes the first authorization information to the message server. The message server subscribes to store the first authorization information pushed by the first service server, and the first service server can obtain the first authorization information pushed by the message server after obtaining the subscription authority.
The above explanation is given by taking the first authorization information as an example, and the second authorization information is similar to the first authorization information.
It should be noted that, when the first device has only one service server, the operations performed by the first service server and the second service server are operations performed by one service server. The difference is that the service server subscribes the authorization information to the message server, and only the second authorization information is needed.
In an optional embodiment, before subscribing to the first authorization information and the second authorization information from the message server through the second service server, the method further includes: sending, by the second service server, a subscription request permission to an authorization server to instruct the authorization server to determine whether to allow the second service server to subscribe to the first authorization information and the second authorization information from the message server; and receiving a subscription license sent by the authorization server, wherein the subscription license is used for indicating that the second service server is allowed to subscribe the first authorization information and the second authorization information from the message server.
It should be noted that, the step of subscribing the first authorization information and the second authorization information to the message server through the second service server may specifically be that 1, the second service server sends a subscription request right to an authorization server; 2. the second service server receives the subscription permission sent by the authorization server; 3. the second service server sends the first authorization information and the second authorization information subscription request to a message server; 4. and the second service server receives the first authorization information and the second authorization information returned by the message server. It should be noted that, when the first device has only one service server, the operation performed by the second service server is the operation performed by the first service server.
The invention can achieve the following technical effects;
a universal authorization system, an independent message server and distributed service server nodes are used, all the services are decoupled and asynchronously called, and strong correlation is not generated in service;
the message server is used as a channel of upstream and downstream messages, the messages are internally subscribed for use, physical isolation is achieved, the service server needs to subscribe as required, and subscription permission is issued by the authority server;
after the user is successfully authorized, the business server can push a message, other business server nodes can acquire a user authorization certificate and can request other expansion authorities of the user equipment, and the whole process is carried out in the authority range of the user, so that the safety of user data is guaranteed, and the compliance of the user data is met;
the service server subscribes the user authorization message, the agent user executes other extension authorities, and the user does not need to repeatedly carry out authorization operation on the equipment from the experience of the client, so that the experience degree of the user is improved;
in order to better understand the above technical solution, the following alternative flow charts are used for explaining specific steps of the device control.
Fig. 3 is a schematic flowchart of a device control method according to an embodiment of the present invention, as shown in fig. 3:
s302: the user authorization, wherein the user obtains the proof of the control right of the first device through the software client;
s304: and the user requests the control right of the first equipment to realize the complete control result of the user on the first equipment. Generally, a user allows a software client to perform complete authority control on first equipment through a service server, and the service server needs to carry a first equipment control authority certificate to complete the process;
s306: the method comprises the steps that authorization information is pushed and stored, a service server sends control right information of a user to first equipment to a message server, and the message server stores authorization information data;
s308: the method comprises the steps that message subscription is carried out, namely a client receives a control result of first equipment after the first equipment is controlled by a service server, the control result can be regarded as a resource of the first equipment, other required nodes of the service server ask for authorization from an authority server at the same time, and the service server subscribes control authority information of a user on the first equipment after authorization is obtained;
s310: the service server requests the extended authority, the service server carries the information of the first device control authority of the user to request the extended authority from the authorization server, and special credentials are obtained;
s312: the business server carries the special certificate to access other equipment, other specific resources are obtained, the result is returned to the client, and the client informs the user of the result that the first equipment accesses the resources of other equipment. From the user perspective, the user has access to the resources of the other devices while controlling the first device.
According to the invention, the authorized target object of the authorization server is confirmed to respectively control the first equipment and the second equipment; sending an extended permission request to the authorization server, wherein the extended permission request carries indication information for indicating that the authorization server authorizes a target object to respectively control a first device and a second device, and the extended permission request is used for requesting to allow the first device to control the second device; and receiving an authorization certificate sent by the authorization server based on the extended authority request, and indicating the first device to control the second device based on the authorization certificate. That is to say, in order to realize that the first device controls the second device, when the target object respectively controls the first device and the second device, the service server of the first device sends an extended permission request to the authorization server, and the authorization server sends an authorization credential to the service server based on the extended permission request, so that the first device realizes the control of the second device by virtue of the authorization credential received by the service server. By adopting the technical scheme, the problems that the control of a target object to different equipment can only be realized, the control of one equipment to another equipment cannot be realized and the like in the related technology are solved, so that one equipment controls the other equipment, and one equipment can obtain the other equipment
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
In this embodiment, an apparatus control device is further provided, which is used to implement the foregoing embodiments and preferred embodiments, and the description of which is already given is omitted. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
Fig. 4 is a block diagram of a configuration of an apparatus control device according to an embodiment of the present invention; as shown in fig. 4, includes:
a confirming module 40, configured to confirm that the target object authorized by the authorization server respectively controls the first device and the second device;
a sending module 42, configured to send an extended permission request to the authorization server, where the extended permission request carries indication information used to indicate that the authorization server authorizes a target object to respectively control a first device and a second device, and the extended permission request is used to request that the first device is allowed to control the second device;
a processing module 44, configured to receive an authorization credential sent by the authorization server based on the extended permission request, and instruct the first device to control the second device based on the authorization credential.
According to the invention, the authorized target object of the authorization server is confirmed to respectively control the first equipment and the second equipment; sending an extended permission request to the authorization server, wherein the extended permission request carries indication information for indicating that the authorization server authorizes a target object to respectively control a first device and a second device, and the extended permission request is used for requesting to allow the first device to control the second device; and receiving an authorization certificate sent by the authorization server based on the extended authority request, and indicating the first equipment to control the second equipment based on the authorization certificate. That is to say, in order to realize that the first device controls the second device, when the target object respectively controls the first device and the second device, the service server of the first device sends an extended permission request to the authorization server, and the authorization server sends an authorization credential to the service server based on the extended permission request, so that the first device realizes the control of the second device by virtue of the authorization credential received by the service server. By adopting the technical scheme, the problems that the control of a target object to different equipment can only be realized, the control of one equipment to another equipment cannot be realized and the like in the related technology are solved, so that one equipment controls the other equipment, and one equipment can obtain the resource of the other equipment.
Optionally, the processing module 44 is further configured to, in a case that the authorization credential indicates that the first device is allowed to control the second device, send a control instruction to the second device through the first device, so as to instruct the second device to respond to the control instruction.
It should be noted that the above modules may be implemented by software or hardware, and for the latter, the following may be implemented, but not limited to: the modules are all positioned in the same processor; alternatively, the modules are respectively located in different processors in any combination.
It should be noted that the authorization credential is a credential that the authorization server grants the first device to control the second device, and the first device controls the second device by using the authorization credential, where the authorization server is a set of all authorization servers, and the authorization server may include: and the authorization server corresponds to the first equipment and the authorization server corresponds to the second equipment. The authorization server of the credential granting the first device the right to control the second device actually refers to an authorization server corresponding to the second device in the set of all authorization servers. If the second device controls the first device, the authorization server at this time refers to the authorization server corresponding to the first device in the set of all authorization servers. It should be noted that there are many devices and there are many authorization servers corresponding to the devices.
It should be noted that, after the first device controls the second device by means of the authorization credential, the user sends a control instruction to the second device through the first device to instruct the second device to respond to the control instruction. Through the technical means, a user can control another device by using one device.
Optionally, the processing module 44 is further configured to obtain a control result of the second device by the first device; and sending the control result to a client corresponding to the target object so as to display the control result on the client.
It should be noted that, the control result of the first device to the second device is obtained; and sending the control result to a client corresponding to the target object so as to display the control result on the client. If the second device is considered a resource, the first device controlling the second device is that the first device has acquired the resource of the second device. The final result of the first device controlling the second device is that the client informs the user of the result of the first device accessing the resource of the second device. From the user perspective, the user controls the first device while accessing the resources of the second device. By the technical means, one device can control the other device, and one device can obtain the resource of the other device.
Optionally, the confirmation module 40 is further configured to push first authorization information and second authorization information to the message server, where the first authorization information is used to indicate that the authorization server authorizes the target object to control the first device, and the second authorization information is used to indicate that the authorization server authorizes the target object to control the second device, so that the message server stores the first authorization information and the second authorization information.
It should be noted that the first authorization information may be a credential for the target object to control the first device, or may be related information of the first device, where the related information of the first device may be information of the first device, such as an online time and an operation duration. The user may subscribe to the details of the first device through the message server. It should be noted that the user can obtain the subscription right of the first device only after confirming that the authorization server has authorized the target object to control the first device. That is, the user obtains the control right of the device before and obtains the subscription right of the device after. It should be noted that, the user does not need to operate the device to obtain the subscription right of the device, and after the user obtains the control right of the device, the service server automatically sends a subscription right request to the right server. The second authorization information is similar to the first authorization information.
It should be noted that, besides pushing the certificate of the target object controlling the device and the related information of the device, the message server may also implement interaction between different servers. In an alternative embodiment, the components within the first device are from different vendors and the components from different vendors have their own respective service servers, in which case the interaction of the components from different vendors is difficult, and it may be simple if the components from different vendors interact via the message server.
Optionally, the sending module 42 is further configured to subscribe to the first authorization information and the second authorization information from the message server through a second service server, where the service servers include: the first service server is used for pushing first authorization information and second authorization information to the message server; and sending the extended permission request carrying the first authorization information and the second authorization information to the authorization server.
It should be noted that, two components in the first device are from different manufacturers, and both the two components from different manufacturers have their own corresponding service servers, where the plurality of service servers include: a first service server and the second service server. In this scenario, the first service server is configured to push first authorization information to the message server, where the message server stores the first authorization information, and then the service processor requests the extended right to use the first authorization information as a credential. Through the technical means, the first device and the second device can be determined to belong to the same target object. It should be noted that only the first device and the second device belonging to one target object may control one device to control the other device. And sending the extended permission request carrying the first authorization information and the second authorization information to the authorization server. And the authorization server responds to the first authorization information carried by the extended authority request of the first authorization information.
It should be noted that, the second service server subscribes the first authorization information and the second authorization information to the message server. The message server subscribes to store the first authorization information pushed by the first service server, and the first authorization information pushed by the message server can be obtained after the first service server obtains the subscription authority.
The above explanation is given by taking the first authorization information as an example, and the second authorization information is similar to the first authorization information.
It should be noted that, when the first device has only one service server, the operations performed by the first service server and the second service server are operations performed by one service server. The difference is that the service server subscribes to the authorization information from the message server and only the authorization information of the second device.
Optionally, the sending module 42 is further configured to send a subscription request right to an authorization server through the second service server to instruct the authorization server to determine whether to allow the second service server to subscribe to the first authorization information and the second authorization information from the message server; and receiving a subscription license sent by the authorization server, wherein the subscription license is used for indicating that the second service server is allowed to subscribe the first authorization information and the second authorization information from the message server.
It should be noted that, the step of subscribing the first authorization information and the second authorization information to the message server through the second service server may specifically be that 1, the second service server sends a subscription request right to an authorization server; 2. the second business server receives the subscription permission sent by the authorization server; 3. the second service server sends the first authorization information and the second authorization information subscription request to a message server; 4. and the second service server receives the first authorization information and the second authorization information returned by the message server. It should be noted that, when the first device has only one service server, the operation performed by the second service server is the operation performed by the first service server.
Embodiments of the present invention also provide a storage medium having a computer program stored therein, wherein the computer program is arranged to perform the steps of any of the above method embodiments when executed.
Alternatively, in the present embodiment, the storage medium may be configured to store a computer program for executing the steps of:
s1, confirming that an authorized target object of an authorization server respectively controls a first device and a second device;
s2, sending an extended permission request to the authorization server, wherein the extended permission request carries indication information for indicating that the authorization server authorizes a target object to respectively control a first device and a second device, and the extended permission request is used for requesting to allow the first device to control the second device;
and S3, receiving an authorization certificate sent by the authorization server based on the extended permission request, and indicating the first equipment to control the second equipment based on the authorization certificate.
Optionally, in this embodiment, the storage medium may include, but is not limited to: various media capable of storing computer programs, such as a usb disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk.
Embodiments of the present invention further provide an electronic device, comprising a memory in which a computer program is stored and a processor configured to execute the computer program to perform the steps in any of the above method embodiments.
Optionally, the electronic apparatus may further include a transmission device and an input/output device, wherein the transmission device is connected to the processor, and the input/output device is connected to the processor.
Optionally, in this embodiment, the processor may be configured to execute the following steps by a computer program:
s1, confirming that an authorized target object of an authorization server respectively controls first equipment and second equipment;
s2, sending an extended permission request to the authorization server, wherein the extended permission request carries indication information for indicating that the authorization server authorizes a target object to respectively control a first device and a second device, and the extended permission request is used for requesting to allow the first device to control the second device;
and S3, receiving an authorization certificate sent by the authorization server based on the extended permission request, and indicating the first equipment to control the second equipment based on the authorization certificate.
Optionally, in this option, the specific examples in this embodiment may refer to the examples described in the foregoing embodiment and optional implementation, and this embodiment is not described herein again.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized in a single computing device or distributed across a network of multiple computing devices, and alternatively, they may be implemented by program code executable by a computing device, such that they may be stored in a memory device and executed by a computing device, and in some cases, the steps shown or described may be executed out of order, or separately as individual integrated circuit modules, or multiple modules or steps thereof may be implemented as a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. An apparatus control method characterized by comprising:
confirming that the target object authorized by the authorization server respectively controls the first equipment and the second equipment;
sending an extended permission request to the authorization server, wherein the extended permission request carries indication information for indicating that the authorization server authorizes a target object to respectively control a first device and a second device, and the extended permission request is used for requesting to allow the first device to control the second device;
and receiving an authorization certificate sent by the authorization server based on the extended authority request, and indicating the first device to control the second device based on the authorization certificate.
2. The method of claim 1, wherein instructing the first device to control the second device based on the authorization credential comprises:
if the authorization credential indicates that the first device is allowed to control the second device, sending, by the first device, a control instruction to the second device to instruct the second device to respond to the control instruction.
3. The method of claim 1, wherein after instructing the first device to control the second device based on the authorization credential, the method further comprises:
acquiring a control result of the first device on the second device;
and sending the control result to a client corresponding to the target object so as to display the control result on the client.
4. The method of claim 1, wherein after confirming that the target object is authorized by the authorization server to control the first device and the second device, respectively, the method further comprises:
the method comprises the steps of pushing first authorization information and second authorization information to a message server, wherein the first authorization information is used for indicating an authorization server to authorize a target object to control a first device, and the second authorization information is used for indicating the authorization server to authorize the target object to control a second device, so that the message server stores the first authorization information and the second authorization information.
5. The method according to claim 4, wherein in a case that the first device corresponds to a plurality of service servers, before sending the extended right request to the authorization server, the method further comprises:
subscribing, by a second service server, the first authorization information and the second authorization information to the message server, wherein the plurality of service servers include: the first service server is used for pushing first authorization information and second authorization information to the message server;
and sending the extended permission request carrying the first authorization information and the second authorization information to the authorization server.
6. The method of claim 5, wherein before subscribing to the first authorization information and the second authorization information from the message server through a second service server, the method further comprises:
sending, by the second service server, a subscription request permission to an authorization server to instruct the authorization server to determine whether to allow the second service server to subscribe to the first authorization information and the second authorization information from the message server;
and receiving a subscription license sent by the authorization server, wherein the subscription license is used for indicating that the second service server is allowed to subscribe the first authorization information and the second authorization information from the message server.
7. An apparatus control device, characterized by comprising:
the confirming module is used for confirming that the target object authorized by the authorization server respectively controls the first equipment and the second equipment;
a sending module, configured to send an extended permission request to the authorization server, where the extended permission request carries indication information for indicating that the authorization server authorizes a target object to respectively control a first device and a second device, and the extended permission request is used to request that the first device is allowed to control the second device;
and the processing module is used for receiving an authorization certificate sent by the authorization server based on the extended permission request and indicating the first equipment to control the second equipment based on the authorization certificate.
8. The apparatus of claim 7, wherein the processing module is further configured to send, by the first device, a control instruction to the second device to instruct the second device to respond to the control instruction if the authorization credential indicates that the first device is allowed to control the second device.
9. A computer-readable storage medium, comprising a stored program, wherein the program when executed performs the method of any of claims 1 to 6.
10. An electronic device comprising a memory and a processor, characterized in that the memory has stored therein a computer program, the processor being arranged to execute the method of any of claims 1 to 6 by means of the computer program.
CN202011429382.1A 2020-12-09 2020-12-09 Device control method and apparatus, storage medium, and electronic apparatus Active CN112738025B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011429382.1A CN112738025B (en) 2020-12-09 2020-12-09 Device control method and apparatus, storage medium, and electronic apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011429382.1A CN112738025B (en) 2020-12-09 2020-12-09 Device control method and apparatus, storage medium, and electronic apparatus

Publications (2)

Publication Number Publication Date
CN112738025A CN112738025A (en) 2021-04-30
CN112738025B true CN112738025B (en) 2023-02-03

Family

ID=75598597

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011429382.1A Active CN112738025B (en) 2020-12-09 2020-12-09 Device control method and apparatus, storage medium, and electronic apparatus

Country Status (1)

Country Link
CN (1) CN112738025B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114137843A (en) * 2021-11-15 2022-03-04 青岛海尔科技有限公司 Equipment control method, device, terminal, server and storage medium
CN114500617B (en) * 2021-12-24 2023-11-28 青岛海尔科技有限公司 Internet equipment control method and device, storage medium and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110276184A (en) * 2019-06-28 2019-09-24 北京金山云网络技术有限公司 A kind of cloud computing resources authorization method and device
CN110324276A (en) * 2018-03-28 2019-10-11 腾讯科技(深圳)有限公司 A kind of method, system, terminal and electronic equipment logging in application
CN111866617A (en) * 2019-04-28 2020-10-30 中国移动通信集团上海有限公司 Terminal remote control method, parent terminal, child terminal, server and system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105338023B (en) * 2014-07-11 2019-05-28 北京华为数字技术有限公司 A kind of method, apparatus and system of smart machine control
CN107517208A (en) * 2017-08-22 2017-12-26 努比亚技术有限公司 Apparatus control method, device and computer-readable recording medium
CN109976173A (en) * 2019-03-18 2019-07-05 中国联合网络通信集团有限公司 Control method, device, equipment and the readable storage medium storing program for executing of smart home device
CN111262884B (en) * 2020-03-16 2021-06-11 佛山市诚名信息科技有限公司 Smart home access authorization method and device, smart home system and server

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110324276A (en) * 2018-03-28 2019-10-11 腾讯科技(深圳)有限公司 A kind of method, system, terminal and electronic equipment logging in application
CN111866617A (en) * 2019-04-28 2020-10-30 中国移动通信集团上海有限公司 Terminal remote control method, parent terminal, child terminal, server and system
CN110276184A (en) * 2019-06-28 2019-09-24 北京金山云网络技术有限公司 A kind of cloud computing resources authorization method and device

Also Published As

Publication number Publication date
CN112738025A (en) 2021-04-30

Similar Documents

Publication Publication Date Title
CN110740460B (en) Network access method and device of equipment, network equipment and storage medium
CN112738025B (en) Device control method and apparatus, storage medium, and electronic apparatus
CN110493184B (en) Method and device for processing login page in client and electronic device
MX2007012852A (en) Session key management for public wireless lan supporting multiple virtual operators .
CN105338529B (en) Wireless network connection method and system
CN104054321A (en) Security management for cloud services
CN105099985A (en) Login method and device of multiple applications
US11503474B2 (en) Technique for obtaining a network access profile
KR20160137919A (en) Method and apparatus for providing information
CN102291386A (en) Method of handling server delegation and related communication device
CN113438314B (en) Equipment control method and device, storage medium and electronic device
CN112040484A (en) Password updating method and device, storage medium and electronic device
EP3852414B1 (en) Data processing method and data processing device thereof
CN103246840A (en) Method and device for distributing user permissions
CN112637221B (en) Equipment control method and device
EP4175366A1 (en) Network slice switching method, terminal, storage medium, and electronic device
CN110268730B (en) Techniques for managing subscriptions with operators
EP1637003B1 (en) Databases synchronization
CN113779516B (en) Equipment control method and device, storage medium and electronic device
CN109871220A (en) Electronic device login state update method and system
CN111741514B (en) Network access information configuration method and device
CN114025349B (en) Network service method, device, system and storage medium
KR102358371B1 (en) Platform system for controlling vertical service in mobile network and controlling method thereof
US20220312200A1 (en) Methods and devices for utilizing an exposure function of a wireless communications network
CN111737678A (en) Target equipment binding method and device, storage medium and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant