CN112947096B - Equipment control method and system - Google Patents

Equipment control method and system Download PDF

Info

Publication number
CN112947096B
CN112947096B CN202110128832.1A CN202110128832A CN112947096B CN 112947096 B CN112947096 B CN 112947096B CN 202110128832 A CN202110128832 A CN 202110128832A CN 112947096 B CN112947096 B CN 112947096B
Authority
CN
China
Prior art keywords
instruction
control instruction
auditing
authorized
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110128832.1A
Other languages
Chinese (zh)
Other versions
CN112947096A (en
Inventor
欧阳耀锦
杨丰玮
宋德超
王沅召
葛春光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN202110128832.1A priority Critical patent/CN112947096B/en
Publication of CN112947096A publication Critical patent/CN112947096A/en
Application granted granted Critical
Publication of CN112947096B publication Critical patent/CN112947096B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B15/00Systems controlled by a computer
    • G05B15/02Systems controlled by a computer electric
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/418Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS], computer integrated manufacturing [CIM]
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/20Pc systems
    • G05B2219/26Pc applications
    • G05B2219/2642Domotique, domestic, home control, automation, smart house
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Abstract

The application relates to a device control method and a system, wherein the method comprises the following steps: acquiring information to be checked; the information to be checked comprises: the auditing system comprises a control instruction for controlling the intelligent equipment and an auditing instruction for enabling an auditing terminal corresponding to the intelligent equipment to audit the control instruction; transmitting the information to be checked to a checking terminal; receiving an authorized instruction sent by an audit terminal; the authorized instruction is generated after the auditing terminal authorizes the control instruction by executing the auditing instruction; and sending the authorized instruction to the intelligent device. According to the scheme, the control instruction is controlled to audit, so that on one hand, the running condition of the intelligent household equipment can be controlled; on the other hand, the problem that the safety of the intelligent household equipment is affected after the intelligent household equipment receives the malicious control instruction and runs the malicious control instruction can be avoided, and the safety of the intelligent household equipment is further effectively improved.

Description

Equipment control method and system
Technical Field
The application relates to the field of smart home, in particular to a device control method and a device control system.
Background
Along with the progress of the internet of things technology, the intelligent home industry is continuously developed and perfected, more intelligent home equipment enters common families, and the intelligent home equipment is connected to intelligent home management platforms developed by different manufacturers, so that an intelligent home system is realized, and the intelligent equipment is uniformly managed. Among them, the security problem about smart home is a point where smart home industry and even internet of things industry are all very important.
In the related art, the intelligent home equipment can execute the control instruction received in real time, the remote equipment cannot manage and control the execution condition of the control instruction, and when the intelligent home equipment receives the malicious control instruction, the safety of the intelligent home equipment can be influenced.
In view of the technical problems existing in the related art, no effective solution is provided at present.
Disclosure of Invention
In order to solve the technical problem that the safety of a control instruction cannot be checked, the application provides a device control method and a system.
In a first aspect, an embodiment of the present application provides an apparatus control method, including:
acquiring information to be checked; the information to be checked comprises: the system comprises a control instruction for controlling the intelligent equipment and an auditing instruction for enabling an auditing terminal corresponding to the intelligent equipment to audit the control instruction;
Transmitting the information to be checked to the checking terminal;
receiving and obtaining an authorized instruction sent by the auditing terminal; the authorized instruction is generated after the auditing terminal authorizes the control instruction by executing the auditing instruction;
and sending the authorized instruction to the intelligent device.
Optionally, the method as described above further comprises:
receiving and obtaining confirmation execution information sent by the intelligent equipment; the confirmation execution information is used for representing that the intelligent equipment can execute the control instruction; and the confirmation execution information is generated when the intelligent equipment judges that the control instruction does not need to be checked.
Optionally, in the foregoing method, the obtaining information to be audited includes:
receiving the information to be checked; the information to be checked is generated by the intelligent equipment when the control instruction is judged to need to be checked; the information to be checked comprises: and the auditing terminal is used for auditing the control instruction and serving as a first auditing instruction of the auditing instruction, and the control instruction.
Optionally, in the foregoing method, the obtaining information to be audited includes:
Acquiring the control instruction;
generating the information to be checked when judging that the control instruction needs to be checked; the information to be checked comprises: and the auditing terminal is used for auditing the control instruction, and is used as a second auditing instruction of the auditing instruction and the control instruction.
Optionally, in the foregoing method, the authorized instruction is generated by the auditing terminal by executing the auditing instruction, and encrypting the control instruction according to a preset key; and the intelligent equipment determines that the authorized instruction is authorized by judging that the received authorized instruction is the instruction encrypted by the key, so that the authorized instruction is decrypted by the key.
In a second aspect, an embodiment of the present application provides an apparatus control method, including:
acquiring a control instruction; the control instruction is used for controlling the intelligent equipment;
generating information to be audited when the control instruction needs to be audited; the information to be checked comprises: the control instruction and a first checking instruction for enabling the checking terminal to check the control instruction;
Transmitting the information to be checked to a checking terminal;
receiving and obtaining an authorized instruction sent by the auditing terminal; the authorized instruction is generated after the auditing terminal authorizes the control instruction by executing the first auditing instruction;
executing the authorized instruction.
Optionally, the method further includes, after the acquiring the control instruction:
executing the control instruction when the control instruction does not need to be audited;
generating confirmation execution information; the confirmation execution information is used for representing that actions corresponding to the control instruction can be executed without auditing the control instruction;
and sending the confirmation execution information to the auditing terminal.
Optionally, the executing the authorized instruction as described above includes:
decrypting the authorized instruction through a preset secret key to obtain a decrypted control instruction; the authorized instruction is generated by the auditing terminal after the control instruction is encrypted according to the secret key by executing the first auditing instruction;
and executing the decrypted control instruction when the decrypted control instruction is an executable instruction.
Optionally, the method as described above further comprises:
pre-acquiring the key generated by the auditing terminal;
and storing the secret key.
Optionally, in the foregoing method, when the control instruction needs to be audited, generating information to be audited according to the control instruction, further includes:
when the control instruction is judged not to be encrypted by a preset key, generating the information to be checked according to the control instruction;
and executing the control instruction when the control instruction does not need to be audited, wherein the method comprises the following steps:
and executing the control instruction when the control instruction is judged to be encrypted by the key.
Optionally, the method as described above further comprises:
receiving and obtaining an authorized instruction sent by the auditing terminal; the authorized instruction is generated after the auditing terminal authorizes the control instruction by executing a second auditing instruction; the second auditing instruction is generated when the server acquires the control instruction and judges that the control instruction needs auditing; and the control instruction and the second auditing instruction are sent to the auditing terminal by the server.
In a third aspect, an embodiment of the present application provides an apparatus control method, including:
Acquiring information to be checked; the information to be checked comprises: control instructions for controlling the intelligent device and auditing instructions for auditing the control instructions;
after authorizing the control instruction by executing the auditing instruction, generating an authorized instruction;
and sending the authorized instruction to the intelligent device.
Optionally, in the foregoing method, the generating an authorized instruction after authorizing the control instruction by executing the audit instruction includes:
acquiring user identity information in the control instruction;
determining authority information corresponding to the control instruction;
and when the user identity information meets the authority information, generating the authorized instruction according to the control instruction.
Optionally, in the foregoing method, the generating the authorized instruction according to the control instruction includes:
acquiring a key for authorizing the control instruction;
encrypting the control instruction through the key to obtain the authorized instruction; and the intelligent equipment determines that the authorized instruction is authorized by judging that the received authorized instruction is the instruction encrypted by the key.
Optionally, the method as described above further comprises:
generating in advance the key for performing authorization;
storing the secret key;
and sending the secret key to the intelligent equipment so that the intelligent equipment can store the secret key.
In a fourth aspect, embodiments of the present application provide a server, including:
the acquisition module is used for acquiring information to be checked; the information to be checked comprises: the system comprises a control instruction for controlling the intelligent equipment and an auditing instruction for enabling an auditing terminal corresponding to the intelligent equipment to audit the control instruction;
the first sending module is used for sending the information to be checked to the checking terminal;
the receiving module is used for receiving and obtaining an authorized instruction sent by the auditing terminal; the authorized instruction is generated after the auditing terminal authorizes the control instruction by executing the auditing instruction;
and the second sending module is used for sending the authorized instruction to the intelligent equipment.
In a fifth aspect, an embodiment of the present application provides an intelligent device, including:
the acquisition module is used for acquiring the control instruction;
the generation module is used for generating information to be audited when the control instruction needs to be audited; the information to be checked comprises: the control instruction and a first checking instruction for enabling the checking terminal to check the control instruction;
The sending module is used for sending the information to be checked to the checking terminal;
the receiving module is used for receiving and obtaining an authorized instruction sent by the auditing terminal; the authorized instruction is generated after the auditing terminal authorizes the control instruction by executing the first auditing instruction;
and the execution module is used for executing the authorized instruction.
In a sixth aspect, an embodiment of the present application provides a terminal, including:
the acquisition module is used for acquiring information to be checked; the information to be checked comprises: control instructions for controlling the intelligent device and auditing instructions for auditing the control instructions;
the generation module is used for generating an authorized instruction after authorizing the control instruction by executing the auditing instruction;
and the sending module is used for sending the authorized instruction to the intelligent equipment.
In a seventh aspect, an embodiment of the present application provides an apparatus control system, including: the server as described above, the smart device as described above and the terminal as described above.
In an eighth aspect, an embodiment of the present application provides an electronic device, including: the device comprises a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory are communicated with each other through the communication bus;
The memory is used for storing a computer program;
the processor is configured to implement a method as claimed in any one of the preceding claims when executing the computer program.
In a ninth aspect, embodiments of the present application provide a storage medium comprising a stored program, wherein the program when run performs a method according to any one of the preceding claims.
The embodiment of the application provides a device control method and a system, wherein the method comprises the following steps: acquiring information to be checked; the information to be checked comprises: the system comprises a control instruction for controlling the intelligent equipment and an auditing instruction for enabling an auditing terminal corresponding to the intelligent equipment to audit the control instruction; transmitting the information to be checked to the checking terminal; receiving and obtaining an authorized instruction sent by the auditing terminal; the authorized instruction is generated after the auditing terminal authorizes the control instruction by executing the auditing instruction; and sending the authorized instruction to the intelligent device. According to the scheme, the control instruction is controlled to audit, so that on one hand, the running condition of the intelligent household equipment can be controlled; on the other hand, the problem that the safety of the intelligent household equipment is affected after the intelligent household equipment receives the malicious control instruction and runs the malicious control instruction can be avoided, and the safety of the intelligent household equipment is further effectively improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
In order to more clearly illustrate the embodiments of the invention or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, and it will be obvious to a person skilled in the art that other drawings can be obtained from these drawings without inventive effort.
Fig. 1 is a schematic flow chart of a device control method according to an embodiment of the present application;
fig. 2 is a schematic flow chart of a device control method according to another embodiment of the present application;
fig. 3 is a schematic flow chart of a device control method according to another embodiment of the present application;
fig. 4 is a block diagram of a server according to an embodiment of the present application;
fig. 5 is a block diagram of an intelligent device according to an embodiment of the present application;
fig. 6 is a block diagram of a terminal according to an embodiment of the present application;
FIG. 7 is a block diagram of a system provided by an embodiment of the present application;
fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present application based on the embodiments herein.
Fig. 1 is a schematic diagram of a device control method according to an embodiment of the present application, including the following steps A1 to A4:
step A1, obtaining information to be checked; the information to be checked comprises: and the auditing instruction is used for enabling the auditing terminal corresponding to the intelligent equipment to audit the control instruction.
Specifically, the intelligent device refers to any device, apparatus or machine with computing processing capability, which may be: intelligent televisions, intelligent speakers, intelligent refrigerators, and the like.
Therefore, the control instruction may be an instruction that is directly received by the smart device and is used for controlling the smart device, for example: the user directly controls the intelligent television to try to open the instruction of the intelligent television; the instructions for achieving the control of the target smart device by controlling another smart device may also be, for example: the user controls the intelligent television in the home to be opened through the intelligent sound box, so that a control instruction is issued to the intelligent television by the intelligent sound box; it is also possible that the user, by means of an instruction for remote control of the smart device, for example: the user sends the control instruction to the server, and then the server sends the control instruction to the designated intelligent device so as to complete remote control.
The control instruction which needs to be checked can be an instruction which can be executed by the intelligent terminal after the control operation corresponding to the control instruction is checked by the checking party. Optionally, whether the control instruction needs to be audited or not may be preset by an auditor.
The information to be checked can comprise control instructions and checking instructions for enabling the checking terminal to recognize that the control instructions are to be checked.
In one alternative implementation, the obtaining the information to be checked includes, as in the foregoing method: acquiring a control instruction; generating information to be checked when judging that the control instruction needs to be checked; the information to be checked comprises: and the second audit instruction is used for enabling the audit terminal corresponding to the intelligent equipment to audit the control instruction and serve as the audit instruction, and the control instruction.
That is, the information to be checked may be generated by the server according to the received control instruction.
In one alternative implementation, the obtaining the information to be checked includes, as in the foregoing method: receiving information to be checked; the information to be audited is generated by the intelligent equipment when the control instruction is judged to be audited; the information to be checked comprises: the auditing terminal is used for auditing the control instruction by the auditing terminal corresponding to the intelligent equipment, and is used as a first auditing instruction of the auditing instruction and the control instruction.
That is, the information to be checked may be generated by the smart device after receiving the control instruction and when it is determined that the control instruction needs to be checked.
Thus, when the information to be checked is generated by the smart device: after receiving the control instruction to be audited, the intelligent device can firstly generate an audit instruction according to the device identifier of the intelligent device, then generate information to be audited according to the audit instruction and the control instruction, send the information to be audited to the server, then send the information to be audited to the audit terminal by the server, and the audit terminal can determine that the control instruction is required to be audited when the control instruction is obtained from the intelligent device according to the device identifier in the audit instruction.
Further, when the information to be checked is generated by the server: the server can judge whether the control instruction needs to be audited or not, and can generate an audit instruction for enabling an audit terminal corresponding to the intelligent equipment to audit the control instruction when the control instruction needs to be audited, and then generate information to be audited according to the audit instruction and the control instruction.
The auditing terminal can be a terminal which is bound with the intelligent equipment and used for auditing the control instruction; the auditing terminal can be provided with a specific APP or applet so as to display the information to be audited which needs to be audited and acquire the auditing result of the information to be audited by the auditing personnel.
And step A2, sending the information to be checked to a checking terminal.
Specifically, when obtaining information to be checked sent by the intelligent device, the server implementing the method of the embodiment can obtain information (such as an IP address and the like) of the checking terminal carried in the information to be checked through identification, and in addition, when the intelligent device is only bound with one checking terminal, the server can also directly obtain information of the checking terminal corresponding to the checking terminal; and then accurately transmitting the information to be checked to the checking terminal according to the information of the checking terminal.
A3, receiving and obtaining an authorized instruction sent by the auditing terminal; the authorized instruction is generated after the auditing terminal authorizes the control instruction by executing the auditing instruction.
Specifically, the authorized instruction may be an instruction that is generated by the audit terminal according to the control instruction, and can enable the intelligent device to determine that the instruction is authorized and executable; in addition, in general, in order for the smart device to perform actions consistent with the control instructions, the same control logic as the control instructions may be included in the authorized instructions.
The authorized instruction is generated by the auditing terminal through executing the auditing instruction and encrypting the control instruction through a preset key; and the intelligent device determines that the authorized instruction is authorized by judging that the received authorized instruction is the instruction encrypted by the key, so that the authorized instruction is decrypted by the key.
When the information to be checked includes the control instruction, the method for generating the authorized instruction can be realized by the checking terminal through the processing modes such as encryption and the like on the control instruction.
And step A4, transmitting the authorized instruction to the intelligent device.
Specifically, after the server receives the authorized instruction, the server forwards the authorized instruction to the intelligent device, and the intelligent device can execute the authorized instruction after receiving the authorized instruction, so as to fulfill the aim of executing the control instruction.
In the embodiment, the control of the control instruction is audited, so that on one hand, the running condition of the intelligent household equipment can be controlled; on the other hand, the problem that the safety of the intelligent household equipment is affected after the intelligent household equipment receives the malicious control instruction and runs the malicious control instruction can be avoided, and the safety of the intelligent household equipment is further effectively improved.
In some embodiments, the method further includes, after the control instruction is sent to the smart device, the following step A5:
a5, receiving and obtaining confirmation execution information sent by the intelligent equipment; the confirmation execution information is used for representing that the intelligent equipment can execute the control instruction; and the confirmation execution information is generated when the intelligent device judges that the control instruction does not need to be checked.
Specifically, a manner in which the intelligent device determines whether the control instruction needs to be audited may be: the intelligent equipment matches the control instructions in a pre-stored control instruction table (a plurality of preset control instructions and authority information corresponding to each preset control instruction are stored (the authority information is used for determining whether the preset control instruction needs to be checked) so as to obtain corresponding preset control instructions, and then corresponding authority information is determined; and when the authority information obtained by matching is required to be checked, generating the information to be checked according to the steps in the embodiment, and when the authority information obtained by matching is not required to be checked, the intelligent equipment can execute the control instruction.
The confirmation execution information may be information generated when it is determined that the control instruction can be executed without being checked.
By the method in the embodiment, the user who sends the control instruction can know whether the instruction sent by the user is executed or not, repeated instruction sending actions by the user can be avoided, and user experience can be improved.
As shown in fig. 2, according to an embodiment of another aspect of the present application, there is further provided a device control method applied to an intelligent device, including steps B1 to B5 as follows:
step B1, obtaining a control instruction; the control instruction is used for controlling the intelligent device.
Specifically, the control instruction may be an instruction for controlling the intelligent device itself, which is directly received by the intelligent device, for example: the user directly controls the intelligent television to try to open the instruction of the intelligent television; the instructions for achieving the control of the target smart device by controlling another smart device may also be, for example: the user controls the intelligent television in the home to be opened through the intelligent sound box, so that a control instruction is issued to the intelligent television by the intelligent sound box; it is also possible that the user, by means of an instruction for remote control of the smart device, for example: the user sends the control instruction to the server, and then the server sends the control instruction to the designated intelligent device so as to complete remote control.
B2, when the control instruction needs to be audited, generating information to be audited; the information to be checked comprises: and the first checking instruction is used for enabling the checking terminal to check the control instruction.
Specifically, a manner in which the intelligent device determines whether the control instruction needs to be audited may be: the intelligent equipment matches the control instructions in a pre-stored control instruction table (a plurality of preset control instructions and authority information corresponding to each preset control instruction are stored (the authority information is used for determining whether the preset control instruction needs to be checked) so as to obtain corresponding preset control instructions, and then corresponding authority information is determined; and when the authority information obtained by matching is to be checked, generating information to be checked according to the control instruction. In addition, whether the control instruction needs to be checked or not can also be judged by the server side.
The information to be checked can comprise control instructions and related information used for enabling the checking terminal to recognize that the control instructions are needed to be checked. By way of example: after receiving the control instruction to be checked, the intelligent device can generate a first check instruction according to the device identifier of the intelligent device, and then generate information to be checked according to the first check instruction and the control instruction. In addition, other implementations may be employed, not listed here.
B3, sending the information to be checked to a checking terminal;
specifically, after the information to be audited is generated, if the auditing terminal and the intelligent equipment are in the same local area network environment, the information to be audited can be directly sent to the auditing terminal through the local area network; when the auditing terminal is not in the local area network environment, the information to be audited can be sent to the server first, and then the server sends the information to the auditing terminal.
Step B4., receiving an authorized instruction sent by the auditing terminal; the authorized instruction is generated after the auditing terminal authorizes the control instruction by executing the first auditing instruction.
Specifically, the authorized instruction may be an instruction that is generated by the audit terminal after executing the first audit instruction and authorizing the control instruction, and meanwhile, the intelligent device can determine that the instruction is authorized and can be executed; in addition, in general, in order for the smart device to perform actions consistent with the control instructions, and because the information to be checked is generated from the control instructions, the same control logic as the information to be checked may be included in the authorized instructions.
Therefore, when the to-be-checked information includes the control instruction, the method for generating the authorized instruction may be that the checking terminal generates the authorized instruction according to the control instruction.
In another alternative implementation, the method further includes:
receiving an authorized instruction sent by an audit terminal; the authorized instruction is generated when the auditing terminal authorizes the control instruction by executing a second auditing instruction, and then generates the second auditing instruction as a control instruction acquired by the server and judges that the control instruction needs auditing; and the control instruction and the second auditing instruction are sent to the auditing terminal by the server.
That is, the control instruction is verified by the server, and when the server determines that the control instruction needs to be checked, the server generates a second checking instruction, further, the server may generate information to be checked according to the second checking instruction and the control instruction, and finally send the information to be checked to the checking terminal, so that the checking terminal can perform the authorized instruction generated after the control instruction is authorized by executing the second checking instruction.
Step B5. executes the authorized instruction.
Specifically, after receiving the authorized instruction, the intelligent device may determine whether the authorized instruction is an instruction sent by the audit terminal, and if the authorized instruction is sent by the audit terminal, execute the authorized instruction.
In some embodiments, as the method described above, after the step B1 of obtaining the control instruction, steps B6 to B8 are further included as follows:
Step B6. executing the control instruction when the control instruction does not need to be audited;
specifically, when it is known that the authority information obtained by matching is that auditing is not required according to the method described in the previous embodiment, the intelligent device may execute the control instruction.
Step B7. generates confirmation execution information; the confirmation execution information is used for representing actions corresponding to the control instructions without auditing the control instructions;
the confirmation execution information may be information generated when it is determined that the control instruction can be executed without being checked.
Step B8. sends the confirmation execution information to the auditing terminal.
Specifically, when the auditing terminal and the intelligent equipment are in the same local area network, the confirmation execution information can be directly sent to the auditing terminal; when the auditing terminal and the intelligent equipment are not in the same local area network, the auditing terminal can know the current running condition of the intelligent equipment by sending the confirmation execution information to a server for interacting with the auditing terminal and sending the confirmation execution information to the auditing terminal by the server, so that the auditing terminal is convenient for managing and controlling the intelligent equipment.
Further, in some optional implementation manners, when the execution instruction is sent to the intelligent device by the third-party intelligent terminal through the server, confirmation execution information can be sent to the third-party intelligent terminal, so that a user who sends the control instruction knows whether the instruction sent by the user is executed or not, repeated instruction sending actions by the user can be avoided, and user experience can be improved.
Through the method in the embodiment, the user of the auditing terminal can know the running condition of the current intelligent equipment in real time, the control is convenient, and the use experience of the user can be effectively improved.
In some embodiments, the step B4 executes authorized instructions as described above, including steps B41 and B42 as described below:
b41, decrypting the authorized instruction through a preset key to obtain a decrypted control instruction; the authorized instruction is generated by the auditing terminal through executing the first auditing instruction and encrypting the control instruction according to the secret key.
Specifically, when the intelligent device determines that the authorized instruction is an instruction encrypted by the key, the intelligent device can confirm that the authorized instruction is generated after the authorized terminal authorizes a certain control instruction, so that the authorized instruction can be executed after being decrypted by the key. When the authorized instruction is obtained through symmetric encryption, the secret key stored in the intelligent equipment end can be the same as the secret key stored in the auditing terminal, so that the authorized instruction can be obtained through encryption of the secret key by the auditing terminal.
The decrypted control instruction may be an instruction obtained by decrypting an authorized instruction with a key. Optionally, the decrypted control instruction includes the same control logic as the control instruction.
Further, the intelligent device side can judge whether the authorization instruction is from the auditing terminal by judging whether the received instruction is encrypted or not. When the control instruction is from the auditing terminal, the control instruction after decryption can be executed by default.
Step B42, executing the decrypted control instruction when the decrypted control instruction is an executable instruction.
Specifically, errors exist in the control instruction or errors are caused in the data transmission process and the encryption process; therefore, the decrypted control instruction has a probability of being unable to be executed. Thus, the executable instructions in this embodiment are instructions that can be executed by the smart device.
When the decrypted control instruction is an executable instruction, the control instruction is executed to complete the action corresponding to the control instruction.
The method for authorizing the command in the encryption and decryption mode can enable the intelligent device to quickly know whether the control command is authorized or not, and meanwhile, the situation that data is leaked or tampered in an effective mode can be achieved, and therefore safety of the intelligent device can be guaranteed.
In some embodiments, the method as described above, further comprising steps B8 and B9 as follows:
Step B8., obtaining a key generated by the auditing terminal in advance;
step B9. saves the key.
Specifically, the key is generated by the auditing terminal, further, the key can be generated by an APP used for auditing on the auditing terminal, and after the key is generated, the key can be directly sent to the device; and the secret key is stored on the auditing terminal and the intelligent equipment.
As shown in fig. 3, according to an embodiment of another aspect of the present application, there is also provided an apparatus control method including steps C1 to C3 as follows:
step C1, obtaining information to be checked; the information to be checked comprises: control instructions for controlling the intelligent device, and auditing instructions for auditing the control instructions.
Specifically, the information to be checked may include a control instruction and an audit instruction for enabling the audit terminal to identify that the control instruction is required to be audited. When the information to be checked is generated by the intelligent device: after receiving the control instruction to be audited, the intelligent device can firstly generate an audit instruction according to the device identifier of the intelligent device, and then generate information to be audited according to the audit instruction and the control instruction; when the auditing terminal and the intelligent equipment are not under the same local area network, the information to be audited can be sent to the server, then the server sends the information to be audited to the auditing terminal, and when the auditing terminal and the intelligent equipment are under the same local area network, the information to be audited can be directly sent to the auditing terminal; when the auditing terminal identifies that the control instruction is from the intelligent device according to the device identifier in the auditing instruction, the auditing terminal can determine that the control instruction is required to be audited, and other implementation modes can be adopted, which are not listed here.
Further, when the information to be checked is generated by the server: the server can judge whether the control instruction needs to be audited or not, and can generate an audit instruction for enabling an audit terminal corresponding to the intelligent equipment to audit the control instruction when the control instruction needs to be audited, and then generate information to be audited according to the audit instruction and the control instruction.
Step C2. generates an authorized instruction after authorizing the control instruction by executing the audit instruction.
Specifically, the authorized instruction may be an instruction that is generated after the audit terminal authorizes the control instruction according to the audit instruction, and can enable the intelligent device to determine that the control instruction is authorized and can be executed; further, in general, in order for the smart device to perform actions consistent with the control instructions, and because the information to be audited is generated from the control instructions, the same control logic as the audit instructions may be included in the authorized instructions.
Step C3. sends the authorized instruction to the smart device.
Specifically, when the auditing terminal and the intelligent equipment are under the same local area network, the authorized instruction can be directly sent to the intelligent equipment; when the auditing terminal and the intelligent equipment are not in the same local area network, an authorized instruction is required to be sent to the intelligent equipment through a server; after receiving the authorized instruction, the intelligent device can judge whether the authorized instruction is an instruction sent by the auditing terminal, and if the authorized instruction is sent by the auditing terminal, the intelligent device can execute the authorized instruction.
In some embodiments, the step C2, after authorizing the control command by executing the audit command, generates an authorized command, including the following steps C21 to C23:
and step C21, acquiring user identity information in the control instruction.
In particular, the control instructions are typically generated by a third party user, and thus may include user identity information of the third party user.
And step C22, determining authority information corresponding to the control instruction.
Specifically, the auditing terminal may match the control instruction in a pre-stored control instruction table (a plurality of preset control instructions and authority information corresponding to each preset control instruction (the authority information is used for determining whether the preset control instruction needs to be audited) so as to obtain a corresponding preset control instruction, and then determine the corresponding authority information.
And step C23, generating an authorized instruction according to the control instruction when the user identity information meets the authority information.
Specifically, determining whether the user identity information satisfies the authority information may be performed in the following two ways:
1. judging by personnel of the authorized terminal;
2. pre-configuring pre-stored authority information corresponding to different pre-stored user identity information at an authorized terminal, storing the pre-stored authority information in an authority data table, and then inquiring the user identity information in the authority data table to judge whether the user identity information meets the authority information or not;
For example, taking control over the smart tv as an example:
the authority information of the smart television may include: starting up, watching network video and watching television live broadcast. When the authority information of a third party user (the user corresponding to the unauthorized terminal) does not include startup (in the authority data table, the identity information of the user does not include startup, or the personnel of the authorized terminal does not perform startup authorization on the user), and the sent control instruction is startup, the user identity information of the user does not meet the authority information, so that the authorized instruction cannot be generated according to the control instruction. When the user identity information satisfies the authority information, an authorized instruction can be generated according to the control instruction.
By the method in the embodiment, whether the authorized instruction is generated or not can be judged according to the user, and further the control instruction can be controlled in a targeted mode, so that the accuracy of controlling the intelligent equipment can be effectively improved, and the safety can be further improved.
In some embodiments, as the method described above, the step C23 generates the authorized instruction according to the control instruction, including steps C231 and C232 as follows:
step c231. Obtain the key used for authorizing the control instruction.
Step C232, encrypting the control instruction through a secret key to obtain an authorized instruction; and the intelligent equipment determines that the authorized instruction is authorized by judging that the received authorized instruction is the instruction encrypted by the key.
Specifically, the key may be stored in the authorization terminal in advance, and the control instruction is encrypted by the key, so that the purpose of authorizing the control instruction can be achieved.
When the intelligent device judges that the authorized instruction is an instruction encrypted by the key, the intelligent device can confirm that the authorized instruction is generated after the authorization terminal authorizes the authorized instruction, so that the authorized instruction is decrypted by the key, and when the decrypted control instruction is an executable instruction, the intelligent device can execute the decrypted control instruction to complete actions corresponding to the control instruction.
The method for authorizing the command in the encryption and decryption mode can enable the intelligent device to quickly know whether the control command is authorized or not, and meanwhile, the situation that data is leaked or tampered in an effective mode can be achieved, and therefore safety of the intelligent device can be guaranteed.
In some embodiments, the method as previously described further comprises steps C4 to C6 as follows:
Step c4. A key for performing authorization is generated in advance.
Step C5. saves the key.
Step C6. sends the key to the smart device to cause the smart device to save the key.
Specifically, when the authorized instruction is obtained through symmetric encryption, the key stored in the intelligent device end may be the same as the key stored in the audit terminal.
Therefore, after the authorization terminal generates the key for authorization, the key is stored on the authorization terminal, and meanwhile, the secret key is sent to the intelligent device, and the intelligent device stores the key, so that the intelligent terminal can decrypt the authorized instruction through the key, and obtain the executable decrypted control instruction.
As shown in fig. 4, according to an embodiment of another aspect of the present application, there is also provided a server, including:
an acquisition module 11, configured to acquire information to be checked; the information to be checked comprises: the auditing system comprises a control instruction for controlling the intelligent equipment and an auditing instruction for enabling an auditing terminal corresponding to the intelligent equipment to audit the control instruction;
the first sending module 12 is configured to send information to be checked to a checking terminal;
the receiving module 13 is used for receiving the authorized instruction sent by the auditing terminal; the authorized instruction is generated after the auditing terminal authorizes the control instruction by executing the auditing instruction;
A second sending module 14, configured to send the authorized instruction to the smart device.
In particular, the specific process of implementing the functions of each module in the apparatus of the embodiment of the present invention may be referred to the related description in the method embodiment, which is not repeated herein.
As shown in fig. 5, according to an embodiment of another aspect of the present application, there is further provided an intelligent device, including:
an acquisition module 21 for acquiring a control instruction;
the generating module 22 is configured to generate information to be audited when the control instruction needs to be audited; the information to be checked comprises: the control instruction and a first checking instruction for enabling the checking terminal to check the control instruction;
a sending module 23, configured to send the information to be audited to an audit terminal;
a receiving module 24, configured to receive an authorized instruction sent by the audit terminal; the authorized instruction is generated after the auditing terminal authorizes the control instruction by executing the first auditing instruction;
an execution module 25 for executing the authorized instruction.
In particular, the specific process of implementing the functions of each module in the apparatus of the embodiment of the present invention may be referred to the related description in the method embodiment, which is not repeated herein.
As shown in fig. 6, according to an embodiment of another aspect of the present application, there is also provided a terminal, including:
An obtaining module 31, configured to obtain information to be checked; the information to be checked comprises: the control instruction is used for controlling the intelligent equipment, and the auditing instruction is used for auditing the control instruction;
the generating module 32 is configured to generate an authorized instruction after authorizing the control instruction by executing the audit instruction;
and the sending module 33 is used for sending the authorized instruction to the intelligent device.
In particular, the specific process of implementing the functions of each module in the apparatus of the embodiment of the present invention may be referred to the related description in the method embodiment, which is not repeated herein.
As shown in fig. 7, according to an embodiment of another aspect of the present application, there is also provided an apparatus control system, including: the server 1 as described in the previous embodiment, the smart device 2 as described in the previous embodiment and the terminal 3 as described in the previous embodiment.
In particular, the specific process of implementing the functions of each module in the apparatus of the embodiment of the present invention may be referred to the related description in the method embodiment, which is not repeated herein.
According to another embodiment of the present application, there is also provided an electronic apparatus including: as shown in fig. 8, the electronic device may include: the device comprises a processor 1501, a communication interface 1502, a memory 1503 and a communication bus 1504, wherein the processor 1501, the communication interface 1502 and the memory 1503 are in communication with each other through the communication bus 1504.
A memory 1503 for storing a computer program;
the processor 1501 is configured to execute the program stored in the memory 1503, thereby implementing the steps of the method embodiment described above.
The buses mentioned for the above electronic devices may be peripheral component interconnect standard (Peripheral Component Interconnect, PCI) buses or extended industry standard architecture (Extended Industry Standard Architecture, EISA) buses, etc. The bus may be classified as an address bus, a data bus, a control bus, etc. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
The communication interface is used for communication between the electronic device and other devices.
The Memory may include random access Memory (Random Access Memory, RAM) or may include Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the aforementioned processor.
The processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; but also Digital signal processors (Digital SignalProcessing, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field-programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
The embodiment of the application also provides a storage medium, which comprises a stored program, wherein the program executes the method steps of the method embodiment.
It should be noted that in this document, relational terms such as "first" and "second" and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing is only a specific embodiment of the invention to enable those skilled in the art to understand or practice the invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (16)

1. A device control method, characterized by comprising:
acquiring information to be checked; the information to be checked comprises: the system comprises a control instruction for controlling the intelligent equipment and an auditing instruction for enabling an auditing terminal corresponding to the intelligent equipment to audit the control instruction;
transmitting the information to be checked to the checking terminal;
receiving and obtaining an authorized instruction sent by the auditing terminal; the authorized instruction is generated after the auditing terminal authorizes the control instruction by executing the auditing instruction, and the authorized instruction comprises control logic identical to the control instruction;
sending the authorized instruction to the intelligent device;
the method further comprises the following steps:
receiving and obtaining confirmation execution information sent by the intelligent equipment; the confirmation execution information is used for representing that the intelligent equipment can execute the control instruction; and the confirmation execution information is generated when the intelligent equipment judges that the control instruction does not need to be checked.
2. The method of claim 1, wherein the obtaining the information to be checked comprises:
receiving the information to be checked; the information to be checked is generated by the intelligent equipment when the control instruction is judged to need to be checked; the information to be checked comprises: and the auditing terminal is used for auditing the control instruction and serving as a first auditing instruction of the auditing instruction, and the control instruction.
3. The method of claim 1, wherein the obtaining the information to be checked comprises:
acquiring the control instruction;
generating the information to be checked when judging that the control instruction needs to be checked; the information to be checked comprises: and the auditing terminal is used for auditing the control instruction, and is used as a second auditing instruction of the auditing instruction and the control instruction.
4. The method according to claim 1, wherein the authorized instruction is generated by the auditing terminal by executing the auditing instruction, encrypting the control instruction according to a preset key; and the intelligent equipment determines that the authorized instruction is authorized by judging that the received authorized instruction is the instruction encrypted by the key, so that the authorized instruction is decrypted by the key.
5. A device control method, characterized by comprising:
acquiring a control instruction; the control instruction is used for controlling the intelligent equipment;
generating information to be audited when the control instruction needs to be audited; the information to be checked comprises: the control instruction and a first checking instruction for enabling the checking terminal to check the control instruction;
Transmitting the information to be checked to the checking terminal;
receiving and obtaining an authorized instruction sent by the auditing terminal; the authorized instruction is generated after the auditing terminal authorizes the control instruction by executing the first auditing instruction, and the authorized instruction comprises control logic identical to the control instruction;
executing the authorized instruction;
wherein after the control instruction is acquired, the method further comprises:
executing the control instruction when the control instruction does not need to be audited;
generating confirmation execution information; the confirmation execution information is used for representing that actions corresponding to the control instruction can be executed without auditing the control instruction;
and sending the confirmation execution information to the auditing terminal.
6. The method of claim 5, wherein the executing the authorized instruction comprises:
decrypting the authorized instruction through a preset secret key to obtain a decrypted control instruction; the authorized instruction is generated by the auditing terminal after the control instruction is encrypted according to the secret key by executing the first auditing instruction;
And executing the decrypted control instruction when the decrypted control instruction is an executable instruction.
7. The method as recited in claim 6, further comprising:
pre-acquiring the key generated by the auditing terminal;
and storing the secret key.
8. The method as recited in claim 5, further comprising:
receiving and obtaining an authorized instruction sent by the auditing terminal; the authorized instruction is generated after the auditing terminal authorizes the control instruction by executing a second auditing instruction; the second auditing instruction is generated when the server acquires the control instruction and judges that the control instruction needs auditing; and the control instruction and the second auditing instruction are sent to the auditing terminal by the server.
9. A device control method, characterized by comprising:
acquiring information to be checked; the information to be checked comprises: control instructions for controlling the intelligent device and auditing instructions for auditing the control instructions;
after the control instruction is authorized by executing the auditing instruction, an authorized instruction is generated, wherein the authorized instruction comprises control logic identical to the control instruction;
Sending the authorized instruction to the intelligent device;
the method further comprises the following steps:
receiving and obtaining confirmation execution information sent by the intelligent equipment; the confirmation execution information is used for representing that the intelligent equipment can execute the control instruction; and the confirmation execution information is generated when the intelligent equipment judges that the control instruction does not need to be checked.
10. The method of claim 9, wherein generating the authorized instruction after authorizing the control instruction by executing the audit instruction comprises:
acquiring user identity information in the control instruction;
determining authority information corresponding to the control instruction;
and when the user identity information meets the authority information, generating the authorized instruction according to the control instruction.
11. The method of claim 10, wherein the generating the authorized instruction from the control instruction comprises:
acquiring a key for authorizing the control instruction;
encrypting the control instruction through the key to obtain the authorized instruction; and the intelligent equipment determines that the authorized instruction is authorized by judging that the received authorized instruction is the instruction encrypted by the key.
12. The method as recited in claim 11, further comprising:
generating in advance the key for performing authorization;
storing the secret key;
and sending the secret key to the intelligent equipment so that the intelligent equipment can store the secret key.
13. A server, comprising:
the acquisition module is used for acquiring information to be checked; the information to be checked comprises: the system comprises a control instruction for controlling the intelligent equipment and an auditing instruction for enabling an auditing terminal corresponding to the intelligent equipment to audit the control instruction;
the first sending module is used for sending the information to be checked to the checking terminal;
the receiving module is used for receiving and obtaining an authorized instruction sent by the auditing terminal; the authorized instruction is generated after the auditing terminal authorizes the control instruction by executing the auditing instruction, and the authorized instruction comprises control logic identical to the control instruction;
the second sending module is used for sending the authorized instruction to the intelligent equipment; receiving and obtaining confirmation execution information sent by the intelligent equipment; the confirmation execution information is used for representing that the intelligent equipment can execute the control instruction; and the confirmation execution information is generated when the intelligent equipment judges that the control instruction does not need to be checked.
14. An intelligent device, comprising:
the acquisition module is used for acquiring the control instruction; the control instruction is used for controlling the intelligent equipment;
the generation module is used for generating information to be audited when the control instruction needs to be audited; the information to be checked comprises: the control instruction and a first checking instruction for enabling the checking terminal to check the control instruction;
the sending module is used for sending the information to be checked to the checking terminal;
the receiving module is used for receiving and obtaining an authorized instruction sent by the auditing terminal; the authorized instruction is generated after the auditing terminal authorizes the control instruction by executing the first auditing instruction, and the authorized instruction comprises control logic identical to the control instruction;
the execution module is used for executing the authorized instruction;
wherein after the control instruction is acquired, the method further comprises:
executing the control instruction when the control instruction does not need to be audited;
generating confirmation execution information; the confirmation execution information is used for representing that actions corresponding to the control instruction can be executed without auditing the control instruction;
And sending the confirmation execution information to the auditing terminal.
15. A terminal, comprising:
the acquisition module is used for acquiring information to be checked; the information to be checked comprises: control instructions for controlling the intelligent device and auditing instructions for auditing the control instructions;
the generation module is used for generating an authorized instruction after authorizing the control instruction by executing the audit instruction, wherein the authorized instruction comprises control logic identical to the control instruction;
the sending module is used for sending the authorized instruction to the intelligent equipment; receiving and obtaining confirmation execution information sent by the intelligent equipment; the confirmation execution information is used for representing that the intelligent equipment can execute the control instruction; and the confirmation execution information is generated when the intelligent equipment judges that the control instruction does not need to be checked.
16. A device control system, comprising: the server of claim 13, the smart device of claim 14 and the terminal of claim 15.
CN202110128832.1A 2021-01-29 2021-01-29 Equipment control method and system Active CN112947096B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110128832.1A CN112947096B (en) 2021-01-29 2021-01-29 Equipment control method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110128832.1A CN112947096B (en) 2021-01-29 2021-01-29 Equipment control method and system

Publications (2)

Publication Number Publication Date
CN112947096A CN112947096A (en) 2021-06-11
CN112947096B true CN112947096B (en) 2024-04-05

Family

ID=76240003

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110128832.1A Active CN112947096B (en) 2021-01-29 2021-01-29 Equipment control method and system

Country Status (1)

Country Link
CN (1) CN112947096B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2014016659A (en) * 2012-07-05 2014-01-30 Nec Soft Ltd Electronic authentication system, terminal, server, and electronic authentication program
CN107171912A (en) * 2017-06-30 2017-09-15 广东欧珀移动通信有限公司 A kind of method of intelligent domestic system, terminal and Internet of Things connection
CN108600183A (en) * 2018-03-28 2018-09-28 湖南东方华龙信息科技有限公司 Target device control method
CN109491261A (en) * 2018-11-26 2019-03-19 深圳市赛亿科技开发有限公司 A kind of intelligent home furnishing control method, control system, terminal
CN112261058A (en) * 2020-03-16 2021-01-22 陈力 Smart home access authorization method, smart home system and server

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2014016659A (en) * 2012-07-05 2014-01-30 Nec Soft Ltd Electronic authentication system, terminal, server, and electronic authentication program
CN107171912A (en) * 2017-06-30 2017-09-15 广东欧珀移动通信有限公司 A kind of method of intelligent domestic system, terminal and Internet of Things connection
CN108600183A (en) * 2018-03-28 2018-09-28 湖南东方华龙信息科技有限公司 Target device control method
CN109491261A (en) * 2018-11-26 2019-03-19 深圳市赛亿科技开发有限公司 A kind of intelligent home furnishing control method, control system, terminal
CN112261058A (en) * 2020-03-16 2021-01-22 陈力 Smart home access authorization method, smart home system and server

Also Published As

Publication number Publication date
CN112947096A (en) 2021-06-11

Similar Documents

Publication Publication Date Title
CN107483509B (en) A kind of auth method, server and readable storage medium storing program for executing
CN108512846B (en) Bidirectional authentication method and device between terminal and server
CN107689870B (en) Client authentication method and system
US9774595B2 (en) Method of authentication by token
US8392722B2 (en) Digital cable system and method for protection of secure micro program
CN111726224A (en) Quantum secret communication-based data integrity rapid authentication method, system, terminal and storage medium
CN106789986B (en) Monitoring equipment authentication method and device
CN108875316A (en) Licensing generation and verification method and server based on block chain
CN110446075A (en) Encryption method and device, decryption method and device, electronic equipment
CN112398824A (en) Authority verification method, storage medium and electronic equipment
CN114040411B (en) Equipment binding method and device, electronic equipment and storage medium
CN108667800B (en) Access authority authentication method and device
CN110740448A (en) Shared household appliance lease authorization control method and device
CN112947096B (en) Equipment control method and system
CN113114610B (en) Stream taking method, device and equipment
CN112632481A (en) Method for authorizing software, terminal device and storage medium
CN112380501A (en) Equipment operation method, device, equipment and storage medium
CN108429621B (en) Identity verification method and device
US20090210719A1 (en) Communication control method of determining whether communication is permitted/not permitted, and computer-readable recording medium recording communication control program
CN113127818A (en) Block chain-based data authorization method and device and readable storage medium
KR101912403B1 (en) Method for security authentication between equipment
CN107241341B (en) Access control method and device
CN112487455A (en) Data processing method and device and data interaction system
CN114465835A (en) Household appliance equipment, application terminal, Bluetooth network distribution method and system
KR101853786B1 (en) Security device unit for checking firmware verification code of CCTV

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant