CN114419763A - Remote control method, terminal, server and storage medium - Google Patents

Remote control method, terminal, server and storage medium Download PDF

Info

Publication number
CN114419763A
CN114419763A CN202111654106.XA CN202111654106A CN114419763A CN 114419763 A CN114419763 A CN 114419763A CN 202111654106 A CN202111654106 A CN 202111654106A CN 114419763 A CN114419763 A CN 114419763A
Authority
CN
China
Prior art keywords
user
server
intelligent
key
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111654106.XA
Other languages
Chinese (zh)
Inventor
孙吉平
练美英
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Senseshield Technology Co Ltd
Original Assignee
Beijing Senseshield Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Senseshield Technology Co Ltd filed Critical Beijing Senseshield Technology Co Ltd
Priority to CN202111654106.XA priority Critical patent/CN114419763A/en
Publication of CN114419763A publication Critical patent/CN114419763A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The application provides a remote control method, a terminal, a server and a storage medium, wherein the method comprises the following steps: adding a first intelligent device; obtaining at least a device user list stored in a first smart device, the device user list comprising at least one device user of the first smart device; establishing a relation table based on a cloud user and equipment user list established on a server, wherein the relation table stores correspondingly matched equipment users and cloud users; sending a relation table to the server, and enabling the server to establish association between the first intelligent device and the relation table based on the relation table; obtaining a user instruction, wherein the user instruction is at least used for instructing and managing the equipment user; interacting with the server at least based on the user instruction so as to remotely control at least one intelligent device associated with the cloud user to respond to the user instruction through the server. The remote control method can safely and effectively carry out remote control on the intelligent equipment.

Description

Remote control method, terminal, server and storage medium
Technical Field
The embodiment of the invention relates to the field of safety management of Internet of things equipment, in particular to a remote control method, a terminal, a server and a storage medium.
Background
In the current market, most of Internet of things equipment such as terminal door locks are only managed by equipment keys and equipment keys. Therefore, on the device end of the internet of things, if a device user enters a plurality of device keys, when the device user wants to perform overall management (for example, delete the whole user in operation), the corresponding relationship between each device key and the actual device user needs to be known, and the device can be implemented only by operating the device of the internet of things for many times. For example, a babysitter needs to be replaced at home, two device keys of a password and a fingerprint are input into an original babysitter, and then which two device keys correspond to the babysitter needs to be known first, and the two device keys need to be deleted on the internet of things device, so that the unlocking authority of the original babysitter can be completely removed.
Disclosure of Invention
The embodiment of the application provides a remote control method capable of safely and effectively carrying out remote control on intelligent equipment, and a terminal, a server and a storage medium applying the remote control method.
In order to solve the above technical problem, an embodiment of the present invention provides a remote control method, which is applied to a terminal, and the method includes:
adding a first intelligent device;
obtaining at least a device user list stored in the first smart device, the device user list including at least one device user of the first smart device;
establishing a relation table based on the cloud end users established on the server and the equipment user list, wherein the corresponding matched equipment users and the cloud end users are stored in the relation table;
sending the relation table to the server, and enabling the server to establish association between the first intelligent device and the relation table based on the relation table;
obtaining a user instruction, wherein the user instruction is at least used for instructing and managing the equipment user;
interacting with the server at least based on the user instruction so as to remotely control at least one intelligent device associated with the cloud user to respond to the user instruction through the server.
As an optional embodiment, the obtaining at least a device user list stored in the first smart device includes:
and obtaining an equipment user list and an equipment key list stored in the first intelligent equipment, wherein the equipment key list comprises at least one equipment key of at least one equipment user of the first intelligent equipment, and the equipment users in the equipment user list are correspondingly matched with the equipment keys in the equipment key list.
As an optional embodiment, the server stores the device user list and the device key list uploaded by the first smart device;
sending the relation table to the server, so that the server establishes association between the first intelligent device and the relation table based on the relation table, including:
and sending the relation table to the server, so that the server establishes association among the first intelligent device, the device user, the cloud user and the device key correspondingly matched with the device user based on the relation table.
As an alternative embodiment, the obtaining the user instruction includes:
obtaining first user instructions for at least deleting, adding, disabling, enabling the device user and/or device key; or
Obtaining a second user instruction at least for remotely controlling the first intelligent device to execute a specified operation.
As an optional embodiment, interacting with the server based on at least the user instruction to remotely control at least one smart device associated with the cloud user through the server in response to the user instruction, includes:
sending a third user instruction for indicating that the target device key of the first intelligent device is simultaneously used as the device key of a second intelligent device to the server, so that the server sends the target device key to the second intelligent device, and the target device key is stored by the second intelligent device; wherein the second smart device is associated with the cloud user.
As an optional embodiment, a first private key and a first public key for encrypting and decrypting the interactive data are respectively and correspondingly stored between the terminal and the server, a second private key and a second public key for encrypting and decrypting the interactive data are respectively and correspondingly stored between the first intelligent device and the server, and a third private key and a third public key for encrypting and decrypting the interactive data are respectively and correspondingly stored between the second intelligent device and the server.
Another embodiment of the present invention also provides a remote control method, which is applied to a server, and the method includes:
determining a corresponding cloud user based on a logged-in terminal;
obtaining a relation table sent by the terminal, wherein the relation table stores correspondingly matched device users and cloud end users created on a server, and the device users are from a device user list of first intelligent devices added to the terminal;
establishing association between at least the first intelligent device and the relation table;
obtaining instruction information sent by the terminal, wherein the instruction information is formed based on a user instruction obtained by the terminal, and the user instruction is at least used for instructing and managing the equipment user;
and remotely controlling at least one intelligent device associated with the cloud user to execute a corresponding instruction based on the instruction information.
As an alternative embodiment, the method further comprises the following steps:
obtaining the device user list and a device key list uploaded by the first smart device, wherein the device key list comprises at least one device key of at least one device user of the first smart device, and the device users in the device user list are correspondingly matched with the device keys in the device key list;
the establishing of the association between at least the first intelligent device and the relation table comprises:
and establishing association among the first intelligent device, the device user, the cloud user and the device key correspondingly matched with the device user.
As an optional embodiment, the user instruction includes a third user instruction, where the third user instruction is used to instruct that a target device key of the first smart device is simultaneously used as a device key of a second smart device, and the second smart device is associated with the cloud user;
remotely controlling at least one intelligent device associated with the cloud user to execute corresponding instructions based on the instruction information, wherein the instructions comprise:
determining the target equipment key according to instruction information formed based on the third user instruction;
and sending the target device key to the second intelligent device, so that the second intelligent device stores the target device key.
As an alternative embodiment, the method further comprises the following steps:
generating a first public key and a first private key which correspond to the terminal and are used for encrypting and decrypting interactive data between the terminal and the terminal, and issuing the first private key to the terminal in an encryption reliable mode;
generating a second public key and a second private key which correspond to the first intelligent device and are used for encrypting and decrypting interactive data between the first intelligent device and the second intelligent device, and issuing the second private key to the first intelligent device in a non-network transmission mode;
and generating a third public key and a third private key which correspond to the second intelligent device and are used for encrypting and decrypting the interactive data between the second intelligent device and the third public key, and issuing the third private key to the second intelligent device in a non-network transmission mode.
Another embodiment of the present application further provides a terminal, including:
the system comprises a first processor, a second processor and a third processor, wherein the first processor is used for adding first intelligent equipment, at least obtaining an equipment user list of at least one equipment user including the first intelligent equipment, which is stored in the first intelligent equipment, establishing a relation table storing correspondingly matched equipment users and cloud users on the basis of the cloud users and the equipment user list which are established on a server, and sending the relation table to the server so that the server establishes association between the first intelligent equipment and the relation table on the basis of the relation table; and the cloud terminal is further used for obtaining a user instruction at least used for instructing management of the device user, and interacting with the server at least based on the user instruction so as to remotely control at least one intelligent device associated with the cloud terminal user to respond to the user instruction through the server.
Another embodiment of the present application further provides a server, including:
the second processor is used for determining a corresponding cloud user according to a logged-in terminal, obtaining a relation table which is sent by the terminal and stores correspondingly matched equipment users and cloud users which are established on a server, at least establishing association between the first intelligent equipment and the relation table, obtaining instruction information sent by the terminal, and remotely controlling at least one intelligent equipment associated with the cloud user to execute a corresponding instruction based on the instruction information; wherein the instruction information is formed based on a user instruction obtained by the terminal, the user instruction at least indicating to manage the device user from a list of device users from a first smart device that has been added to the terminal.
Another embodiment of the present application further provides a storage medium including a stored program, wherein when the program runs, a device including the storage medium is controlled to execute the remote control method according to any one of the above embodiments.
Based on the disclosure of the embodiment, the embodiment of the invention has the advantages that the intelligent device and the terminal interact with the server, data is uploaded, the server at least has a relation table between the device user and the cloud user, and based on the relation table, when the user instructs the server to manage the device user through the terminal, the server can manage the device user on at least one intelligent device associated with the specified cloud user based on the user instruction. The user can remotely control part or all of the intelligent devices associated with the cloud user through the server, so that the management operation of the user on the device users of the associated intelligent devices is greatly simplified, the management efficiency is improved, and the use experience of the user on the intelligent devices is also improved.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
fig. 1 is a flowchart of a remote control method according to an embodiment of the present invention.
Fig. 2 is a flowchart of a remote control method according to another embodiment of the present invention.
Fig. 3 is a flowchart of a remote control method according to another embodiment of the present invention.
Fig. 4 is a diagram illustrating a relationship among a terminal, a server, and an intelligent device according to an embodiment of the present invention.
Fig. 5 is an interaction diagram among a terminal, a server, and an intelligent device in an embodiment of the present invention.
Fig. 6 is a block diagram of a terminal in an embodiment of the present invention.
Fig. 7 is a block diagram of a server in the embodiment of the present invention.
Detailed Description
The following detailed description of specific embodiments of the present invention is provided in connection with the accompanying drawings, which are not intended to limit the invention.
It will be understood that various modifications may be made to the embodiments disclosed herein. The following description is, therefore, not to be taken in a limiting sense, but is made merely as an exemplification of embodiments. Other modifications will occur to those skilled in the art within the scope and spirit of the disclosure.
The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate embodiments of the disclosure and, together with a general description of the disclosure given above, and the detailed description of the embodiments given below, serve to explain the principles of the disclosure.
These and other characteristics of the invention will become apparent from the following description of a preferred form of embodiment, given as a non-limiting example, with reference to the accompanying drawings.
It should also be understood that, although the invention has been described with reference to some specific examples, a person of skill in the art shall certainly be able to achieve many other equivalent forms of the invention, having the characteristics as set forth in the claims and hence all coming within the field of protection defined thereby.
The above and other aspects, features and advantages of the present disclosure will become more apparent in view of the following detailed description when taken in conjunction with the accompanying drawings.
Specific embodiments of the present disclosure are described hereinafter with reference to the accompanying drawings; however, it is to be understood that the disclosed embodiments are merely examples of the disclosure that may be embodied in various forms. Well-known and/or repeated functions and structures have not been described in detail so as not to obscure the present disclosure with unnecessary or unnecessary detail. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a basis for the claims and as a representative basis for teaching one skilled in the art to variously employ the present disclosure in virtually any appropriately detailed structure.
The specification may use the phrases "in one embodiment," "in another embodiment," "in yet another embodiment," or "in other embodiments," which may each refer to one or more of the same or different embodiments in accordance with the disclosure.
Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
As shown in fig. 1, an embodiment of the present application provides a remote control method, which is applied to a terminal, and the method includes:
adding a first intelligent device;
obtaining at least a device user list stored in a first smart device, the device user list including at least one device user of the first smart device;
establishing a relation table based on a cloud user and equipment user list established on a server, wherein the relation table stores correspondingly matched equipment users and cloud users;
sending the relation table to a server, and enabling the server to establish association between the first intelligent device and the relation table based on the relation table;
obtaining a user instruction, wherein the user instruction is at least used for indicating a management equipment user;
and interacting with the server at least based on the user instruction so as to remotely control at least one intelligent device associated with the cloud end user to respond to the user instruction through the server.
For example, add first smart machine through APP in terminal equipment, this first smart machine can be intelligent door lock, intelligent home devices such as intelligent cat eye, also can be other types of equipment such as intelligent housekeeper, and is specifically not limited. The intelligent device in this embodiment is described by taking an intelligent door lock as an example. After the first intelligent device is added, at least a device user list stored in the first intelligent device is obtained, and taking the first intelligent device as an intelligent door lock as an example, the device user may be a user capable of opening the intelligent door lock. The device user list includes at least one device user corresponding to the first smart device, or may include all device users. And then, the terminal acquires the cloud user information which is established on the server in advance from the server, and establishes a relation table based on the cloud user and the device user list, wherein the relation table stores the device users and the cloud users which are correspondingly matched. The cloud user may be created after logging in a corresponding server on the APP of the terminal with an account. It should be appreciated that one or more cloud users may be created upon logging into the server. In some cases, the account of the corresponding server may also be logged in as a cloud user. Each cloud user can add a plurality of intelligent devices through the APP on the terminal. The intelligent device is added by the cloud end user, the device user is located in the intelligent device, and the cloud end user and the device user also have a matching relation. Based on the created relation table, a local management system (including the equipment user) of the terminal and a cloud management system (including the cloud user) on the server can be combined with each other to form a two-in-one user management system, so that the data management, especially the remote management, such as the management of the equipment user, of the user is facilitated. The user may input a user instruction to the APP through the terminal, where the user instruction is an instruction for instructing to manage the device user, and the user instruction may also be other types of management instructions, and is not limited to the management of the device user. After receiving the user instruction, the APP interacts with the server to remotely control at least one piece of intelligent equipment associated with the cloud end user through the server to respond to the user instruction, and the at least one piece of intelligent equipment can be the first intelligent equipment in the place, and can also be other added intelligent equipment associated with the cloud end user.
Based on the disclosure of the above embodiments, it can be known that the beneficial effects of the present embodiment include: the terminal interacts with the server to upload data, so that the server can at least have equipment users and a relation table among cloud end users, based on the relation table, when the user instructs the server to manage the equipment users through the terminal, the server can manage the equipment users on at least one intelligent device associated with the appointed cloud end users based on user instructions, and the user can remotely control part or all intelligent devices associated with the cloud end users through the server.
Optionally, obtaining at least a device user list stored in the first smart device includes:
the method comprises the steps of obtaining an equipment user list and an equipment key list stored in a first intelligent device, wherein the equipment key list comprises at least one equipment key of at least one equipment user of the first intelligent device, and the equipment users in the equipment user list are correspondingly matched with the equipment keys in the equipment key list.
The first intelligent device in this embodiment is an intelligent door lock, and the device key is a digital password that can be used for unlocking the local device of the intelligent door lock, for example, a series of unlocking modes such as an NFC card, a fingerprint, a human face, and a finger vein, and is called as a device key. It should be understood that when the first smart device is another device, the device key may take other possible forms. Illustratively, when the first smart device is a smart speaker, a smart camera, an air purifier, a smart light fixture, or the like, the device key may illustratively be a voiceprint, a particular gesture, or other possible form of the user. When the method is used, the device users need to be added to the first intelligent device, then the device keys need to be added corresponding to the device users, if the user can input fingerprints into the first intelligent device to form the device keys, the first intelligent device can match the device keys to the corresponding device users. The device key list in this embodiment includes at least one device key of at least one device user in the first smart device as if the device user had entered fingerprints of multiple fingers, so the device user has multiple device keys, each fingerprint forming a device key. The device users in the device user list are correspondingly matched with the device keys in the device key list, for example, the device users include zhang san and lie san, the device key list has 5 device keys, the device keys with the numbers 1,2 and 3 are all matched with zhang san, and the device keys with the numbers 4 and 5 are all matched with lie san.
Optionally, the server stores an equipment user list and an equipment key list uploaded by the first smart device, that is, the first smart device uploads the stored equipment key list and the stored equipment user list to the server, or the server actively interacts with the first smart device to obtain the equipment key list and the equipment user list, and the like. It should be further noted that the server may obtain the device user list and the device key list before receiving the user instruction, or may obtain the foregoing list after receiving the user instruction, which is not limited in this application.
Sending the relation table to a server, so that the server establishes association between the first intelligent device and the relation table based on the relation table, wherein the association comprises the following steps:
and sending the relation table to a server, so that the server establishes association among the first intelligent device, the device user, the cloud user and the device key correspondingly matched with the device user based on the relation table.
When the terminal establishes the relation table based on the APP, the relation table is sent to the server, so that the server is provided with the relation table, the equipment key table and the equipment user table at the same time, and then the server can establish the association among the first intelligent equipment, the equipment users, the cloud end users and the equipment keys correspondingly matched with the equipment users based on the relation table, for example, a first smart device previously associated with the cloud user, a device user located on the first smart device, and a device key corresponding to the device user, thus, an association relationship list including a cloud user, an intelligent device, a device user and a device key can be formed, and certainly, the association relationship list does not need to be in a list form, however, the association relationship is stored in the server, so that the server can determine a responder based on the association relationship when obtaining a user instruction, and instruct the responder to respond.
Optionally, when obtaining the user instruction, the method includes:
obtaining first user instructions for at least deleting, adding, disabling, enabling device users and/or device keys; or
Second user instructions are obtained for at least remotely controlling the first smart device to perform the specified operation.
The user instruction in this embodiment may be specifically used to delete, add, disable, or enable the first user instruction of the device user in the first smart device or in another smart device, or may be a first user instruction to delete, add, disable, or enable one or more device keys, that is, an instruction to manage the device user and the device key. The user instruction may also be a second user instruction for at least remotely controlling a first smart device to perform a specified operation (e.g., unlock, video talk, etc.), or remotely controlling other smart devices to perform a specified operation (e.g., unlock, video talk, etc.). In addition, the first intelligent device or other intelligent devices can be locked so that the first intelligent device or other intelligent devices cannot be unlocked by any user instruction.
Optionally, when the user instruction is a first user instruction, the terminal may perform:
correspondingly processing an equipment user list and/or an equipment key list on the terminal equipment based on the first user instruction to obtain an updated equipment user list and/or an updated equipment key list;
and sending the updated device user list and/or device key list to the server, enabling the server to store and forward the updated device user list and/or device key list to the first intelligent device, further controlling the first intelligent device to update local data based on the new device user list and/or device key list, and performing validation.
For example, the obtained user instruction is a first user instruction, and the APP on the terminal may correspondingly process the user list or the device key list based on the first user instruction, such as deleting, adding, disabling, or enabling the device user or the device key, so as to obtain an updated device user list or device key list. Then, the terminal may send the updated device user list or device key list to the server, so that the server stores the updated local list, and simultaneously sends the updated list to the associated smart device, so that the smart device correspondingly updates the local list based on the obtained updated list, and meanwhile, the implementation is validated.
Alternatively, a portion of the data in the device user list or device key list may be updated based on the first user instruction, such as the addition of a new device user, device key, or a certain device user, or a device key, is disabled, or a certain device user, or a device key, is deleted, only the updated data and/or the first user instruction, i.e., not the entire list, to the server, causing the server to determine how the local corresponding list should be updated based on the updated data and/or the first user instruction, if the updated data is the added new device user and the device key, the added data and the first user instruction can be sent to the server to correspondingly update the local list, and then forwarding the data and the instructions to the corresponding intelligent equipment, so that the intelligent equipment can update the local data based on the obtained data and instructions. If the first user instruction indicates that a certain device user or a device key is deleted or forbidden, the first user instruction can be directly sent to the server, and the server can correspondingly update local list information based on the first user instruction and forward the instruction to the corresponding intelligent device, so that the intelligent device correspondingly updates local list data based on the obtained instruction.
Optionally, interacting with the server based on at least the user instruction to remotely control, through the server, at least one smart device associated with the cloud user to respond to the user instruction, and including:
sending a third user instruction for indicating that the target device key of the first intelligent device is simultaneously used as the device key of the second intelligent device to the server, so that the server sends the target device key to the second intelligent device, and the second intelligent device stores the target device key; the second intelligent device is associated with the cloud user.
For example, the user instructions may also include a third user instruction to indicate that the target device key of the first smart device and/or the device user is to be simultaneously the device key of the second smart device and/or the device user. Assuming that the first intelligent device and the second intelligent device are both intelligent door locks, the first intelligent device is an intelligent door lock of a courtyard door of a user, the second intelligent device is an intelligent door lock of a house door of the user, both the two intelligent devices are associated with a cloud user of the user, at this time, the user adds a family to the first intelligent device as a device user, enters a fingerprint of the family as a device door lock, and then uploads the device user and a device key to a server to complete associated storage, wherein the specific steps are as described above. At the moment, the user can send an instruction to the server through the APP on the terminal to add the equipment user representing the family and the equipment key corresponding to the family in the first intelligent equipment to the second intelligent equipment, so that when the family can start a third user instruction of the second intelligent equipment, the server can send the equipment user serving as the family and the corresponding equipment key to the second intelligent equipment after receiving the third user instruction, the second intelligent equipment stores the equipment user and the equipment key in an associated mode and starts the equipment user and the equipment key, therefore, the user can not need to enter the equipment key for the second intelligent equipment again, the equipment user is added, the efficiency is improved, the user operation is reduced, and convenience is provided for the user. If the user only adds the device key to the family, if a new fingerprint is newly entered as the device key, the fingerprint is uploaded to the server to complete storage and updating. Then, the user can send a third user instruction to the server to instruct the server to send the device key to the second terminal device to serve as the device key of the second terminal device, so that the family of the user does not need to enter a new fingerprint on the second intelligent device to serve as the device key, and user operation is simplified. Of course, for a device key already stored on the first smart device, but not on the second smart device, the user may also instruct the server to send the device key to the second smart terminal and enable it. That is, all with the smart machine that same high in the clouds user is correlated with, this high in the clouds user can instruct the server to send the data on one of them smart machine to another through the APP on the terminal, or on a plurality of smart machine that are correlated with high in the clouds user to supply this data of this one or more smart machine use, also the data of above-mentioned a plurality of smart machine can realize partial or whole data sharing through the server under the instruction effect of high in the clouds user.
Optionally, in order to increase security, a first private key and a first public key for encrypting and decrypting the interactive data are respectively and correspondingly stored between the terminal and the server in this embodiment, for example, the first private key is stored on the terminal, and the first public key is correspondingly stored on the server. A second private key and a second public key for encrypting and decrypting the interactive data are respectively and correspondingly stored between the first intelligent device and the server, and a third private key and a third public key for encrypting and decrypting the interactive data are respectively and correspondingly stored between the second intelligent device and the server. If the first intelligent device stores a second private key, the second intelligent device stores a third private key, and the server stores a second public key and a third public key. When the terminal actively performs data interaction with the server, the data is encrypted based on the first private key and then sent to the server, the server decrypts the data based on the corresponding first public key, when the server feeds back the data to the terminal, the data is encrypted by using the first public key, and the terminal decrypts the data by using the first private key to obtain plaintext data. The same applies to the first intelligent device and the second intelligent device, when the first intelligent device actively sends data to the server, the corresponding second private key or the third private key is needed to encrypt the data, and the server decrypts the data by using the corresponding second public key and the third public key. Based on the method, the data safety when the terminal, the intelligent device and the server interact can be effectively ensured.
As shown in fig. 2, another embodiment of the present application also provides a remote control method applied to a server, where the method includes:
determining a corresponding cloud user based on a logged-in terminal;
obtaining a relation table sent by a terminal, wherein the relation table stores correspondingly matched device users and cloud end users created on a server, and the device users are from a device user list of first intelligent devices added to the terminal;
establishing association between at least the first intelligent device and the relation table;
acquiring instruction information sent by a terminal, wherein the instruction information is formed based on a user instruction acquired by the terminal, and the user instruction is at least used for indicating a management equipment user;
and remotely controlling at least one intelligent device associated with the cloud user to execute a corresponding instruction based on the instruction information.
For example, the user completes registration on the server based on the APP on the terminal, and creates a corresponding cloud user. When a user logs in to the server based on the APP on the terminal, the server may determine the corresponding cloud user based on the login information. And then, receiving a relation table sent by the terminal, wherein the relation table stores correspondingly matched device users and cloud users created on the server, the cloud users include the cloud users created by the user through the terminal, and also include other cloud users, for example, the intelligent device is an intelligent door lock, and the other cloud users can be family members of the user. The device user is from a list of device users of the first smart device that have been added to the terminal. The device user is a user added to the first smart device, and can closely control the first smart device to execute specified operations such as unlocking. Multiple device users may be added to the first smart device and a list of device users may be created. The terminal may obtain the device user list based on the APP and create a relationship table based on the device user list and the cloud user. And after the server obtains the relation table, establishing association between at least the first intelligent device and the relation table. The terminal can send instruction information to the server, the instruction information is formed based on a user instruction obtained by the terminal, and the user instruction is at least used for indicating a management device user and can also be used for managing other data. The server can remotely control at least one intelligent device associated with the cloud user to execute the instruction based on the instruction information, such as managing device users on the intelligent device.
Based on the disclosure of the above embodiments, it can be known that the beneficial effects of the present embodiment include: the terminal is interacted with the server to upload data, so that the server can at least comprise equipment users and a relation table among cloud end users, and based on the relation table, when the user instructs the server to manage the equipment users through the terminal, the server can manage the equipment users on at least one intelligent device associated with the cloud end users based on user instructions, namely, the user can remotely control part or all intelligent devices associated with the cloud end users through the server, so that the management operation of the user on the equipment users of the associated intelligent devices in the past is greatly simplified, the management efficiency is improved, and meanwhile, the use experience of the user on the intelligent devices is also improved.
Optionally, the method in this embodiment further includes:
the method comprises the steps that an equipment user list and an equipment key list uploaded by first intelligent equipment are obtained, the equipment key list comprises at least one equipment key of at least one equipment user of the first intelligent equipment, and equipment users in the equipment user list are correspondingly matched with equipment keys in the equipment key list;
establishing association between at least the first smart device and the relationship table, including:
and establishing association among the first intelligent device, the device user, the cloud user and the device key correspondingly matched with the device user.
The first intelligent device in this embodiment is an intelligent door lock, data interaction can be performed between the server and the first intelligent device, the server can obtain a device user list and a device key list uploaded by the first intelligent device, and the device key is a mode in which a device user can open the intelligent door lock, such as a fingerprint, face recognition, NFC, and the like, and is not specific. The same device user may have multiple device keys or may have only one device key. The device key list in this embodiment includes at least one device key of at least one device user in the first smart device, and the device users in the device user list are correspondingly matched with the device keys in the device key list, where if the user list includes three users' family members, the device key list includes three fingerprint information, and the fingerprint information is the device key. When the server establishes association between the first smart device and the relationship table, the server may associate the first smart device, the device user, the cloud user, and the device key correspondingly matched with the device user based on the relationship table, for example, the first smart device associated with the cloud user in advance, the device user located on the first smart device, and the device key corresponding to the device user are associated, so that an association relationship list including the cloud user, the smart device, the device user, and the device key may be formed, but the association relationship may not be in a list form, but the association relationship is stored in the server, so that the server may determine a responder based on the association relationship when obtaining a user instruction, and instruct the responder to perform a response.
Optionally, obtaining instruction information sent by the terminal, and remotely controlling the first intelligent device to execute a corresponding instruction based on the instruction information, includes:
the method comprises the steps of obtaining an updated equipment user list and/or an equipment key list sent by a terminal, wherein the updated equipment user list and/or the updated equipment key list are formed by processing the equipment user list and/or the equipment key list by the terminal based on a user instruction;
and storing and forwarding the updated device user list and/or device key list to the first intelligent device, further controlling the first intelligent device to update the local list data based on the updated device user list and/or device key list, and performing validation.
For example, the user instructions may include at least first user instructions to delete, add, disable, enable a device user and/or a device key; or at least a second user instruction for remotely controlling the first intelligent device to execute specified operations such as unlocking. When the user instruction is obtained, the APP on the terminal may correspondingly process the user list or the device key list based on the user instruction, such as deleting, adding, disabling or enabling the device user or the device key, and thus an updated device user list or device key list may be obtained. And then, the terminal sends the updated device user list or the updated device key list to the server, the server receives the list sent by the terminal and stores the list, updates the local list, and simultaneously sends the updated list to the associated intelligent device, so that the intelligent device correspondingly updates the local list based on the obtained updated list and simultaneously takes effect.
Alternatively, a portion of the data in the device user list or device key list may be updated based on the first user instruction, such as the addition of a new device user, device key, or a certain device user or a device key is disabled, or a certain device user or a device key is deleted, the terminal can only send the updated data and/or the first user instruction, i.e. not the entire list, to the server, which determines how the local corresponding list should be updated based on the received updated data and/or the first user instruction, if the updated data is the added new device user and the device key, the added data and the first user instruction can be sent to the server to correspondingly update the local list, and then forwarding the data and the instructions to the corresponding intelligent equipment, so that the intelligent equipment can update the local data based on the obtained data and instructions. If the first user instruction indicates that a certain device user or a device key is deleted or forbidden, the terminal can directly send the first user instruction to the server, and the server can correspondingly update local list information based on the received first user instruction and forward the instruction to the corresponding intelligent device, so that the intelligent device correspondingly updates local list data based on the obtained instruction.
Optionally, the user instruction in this embodiment includes a third user instruction, where the third user instruction is used to instruct that the target device key of the first smart device is simultaneously used as a device key of a second smart device, and the second smart device is associated with the cloud user;
based on at least one intelligent device of instruction information remote control and high in the clouds user relevance carries out corresponding instruction, including:
determining a target device key according to instruction information formed based on a third user instruction;
and sending the target device key to the second intelligent device, so that the second intelligent device stores the target device key.
For example, the user instructions may also include a third user instruction to indicate that the target device key of the first smart device and/or the device user is to be simultaneously the device key of the second smart device and/or the device user. Assuming that the first intelligent device and the second intelligent device are both intelligent door locks, the first intelligent device is an intelligent door lock of a courtyard door of a user, the second intelligent device is an intelligent door lock of a house door of the user, both the two intelligent devices are associated with a cloud user of the user, at this time, the user adds a family to the first intelligent device as a device user, enters a fingerprint of the family as a device door lock, and then uploads the device user and a device key to a server to complete associated storage, wherein the specific steps are as described above. At this moment, the user can send an instruction to the server through the APP on the terminal to add the equipment user representing the family in the first intelligent device and the equipment key corresponding to the family to the second intelligent device, so that the family can start a third user instruction of the second intelligent device, after receiving the third user instruction, the server can determine the equipment user and the equipment key indicated by the instruction based on the instruction, and then send the determined equipment user and the corresponding equipment key to the second intelligent device, so that the second intelligent device stores the equipment user and the equipment key in an associated manner and starts the equipment user and the equipment key, therefore, the user can not need to record the equipment key for the second intelligent device again, add the equipment user, the efficiency is improved, the user operation is reduced, and convenience is provided for the user.
If the user only adds the device key to the family, if a new fingerprint is newly entered as the device key, the fingerprint is uploaded to the server to complete storage and updating. Then, the user can send a third user instruction to the server, the server determines the new device key based on the third instruction, and sends the device key to the second terminal device based on the instruction, so that the device key serves as the device key of the second terminal device, and therefore the family of the user does not need to enter a new fingerprint on the second intelligent device as the device key, and user operation is simplified. Of course, for the device key already stored on the first smart device but not stored on the second smart device, the user may also send a third user command with corresponding content to the server, and the server may determine the target device key based on the third user command and send the device key to the second smart terminal.
Optionally, as shown in fig. 3, the method further includes:
generating a first public key and a first private key of a corresponding terminal, wherein the first public key and the first private key are used for encrypting and decrypting interactive data between the terminal and the corresponding terminal, and issuing the first private key to the terminal in an encryption reliable mode;
generating a second public key and a second private key which correspond to the first intelligent equipment and are used for encrypting and decrypting interactive data between the first intelligent equipment and the second intelligent equipment, and issuing the second private key to the first intelligent equipment in a non-network transmission mode;
and generating a third public key and a third private key which correspond to the second intelligent device and are used for encrypting and decrypting the interactive data between the second intelligent device and the third public key, and issuing the third private key to the second intelligent device in a non-network transmission mode.
The above-mentioned setting of the plurality of private keys and public keys is to implement security of data interaction between the intelligent device and the server, or between the terminal and the server, and the private keys and public keys are not limited to being generated and issued by the server, and may be in other manners, for example, the private keys on the intelligent device may be self-carried when leaving a factory, for example, in a digital certificate, and the private keys on the terminal may be set before leaving a factory, or may be set by the user.
According to the method, the safe corresponding relation is established between the local equipment user of the intelligent equipment and the cloud end user on the server, so that a local and cloud end integrated user management system is realized. By adopting the mode, the remote and centralized management of safe equipment users and equipment keys can be conveniently realized on the basis of protecting personal privacy and equipment ownership, and the method is particularly suitable for centralized management occasions such as families, companies, apartments and the like.
To explain in more detail, the following description is further made by way of specific embodiments in conjunction with the above-described remote control method applied to the terminal and the server:
as shown in fig. 4 and 5, in the intelligent device in this embodiment, a security chip is used as a main control module or a trusted module, and each factory has a default factory digital certificate, where the factory digital certificate may be issued for the intelligent device, and different intelligent devices have different factory digital certificates. In some implementations, the factory digital certificate may also be signed by the digital certificate's issuing authority with its own private key (e.g., the smart device vendor's private key). The digital certificate has a private key, and a public key corresponding to the private key can be stored on the server for subsequent use in verifying the identity of the smart device, and the like.
The intelligent Device side comprises a Device User management module and a Device key management module, one intelligent Device can support one or more Device users, and each Device-User comprises one or more Device keys. Therefore, the basic elements of device user management are: Device-User-List (Device User List); the basic elements of the device key management module are as follows: Device-Key-List (Device Key List). And the Device-Key may contain one or more of the following information: password, card number, face or fingerprint and other original information.
The intelligent device comprises the following information:
{DeviceID,Device-User[1~n],Device-Key[1~n]}
2. cloud services, i.e. a service function on a server
The cloud service includes cloud user management (adding, deleting, logging in, logging out an account number and the like of a cloud user of a corresponding service, which is called cloud user management), smart device management, device user management (adding, deleting, forbidding, enabling a device user, which is called device user management), device key management (adding, deleting, forbidding, enabling a device key, which is called device key management), and a cloud user and device user association table. Basic elements of cloud user management are as follows: Server-User-List (cloud User List). One or more intelligent devices are associated under one cloud user. The cloud service can verify the identity of the intelligent equipment through the factory digital certificate of the intelligent equipment, and authentication and anti-counterfeiting are carried out.
The cloud service, i.e. the information contained by the server, includes:
{ Server-User, Device ID [ 1-n ], Device-User [ 1-n ], Device-Key [ 1-n ], R [ Server-User, Device-User ] } (i.e., relationship table).
3.APP (application) bearing on terminal
The APP comprises cloud user management, intelligent device management and cloud user and device user association operation. The APP has the main function that the Server-User and the Device-User are associated, so that a local User of the equipment is associated with a User at the cloud end to form a relation table, and the effect of combining the local User and the cloud end User can be achieved.
Specifically, when performing the operations:
1. the User can finish account login in advance based on the APP, a Server-User can be established, the User can be a mobile phone number or a mailbox, the APP end in the embodiment comprises a DoE SDK, and therefore when the account is established, a corresponding key C1 can be synchronously applied, and the key C1 can also be replaced by an asymmetric key. The Server S may generate a pair of public and private keys C1p and C1v for Server-User based on the key C1 or independently. The public key C1p (namely, the first public key) is stored on the Server S, and the private key C1v (namely, the first private key) is issued to the Server-User in an encryption reliable manner;
2. the user finishes adding the intelligent device through the APP, obtains the DeviceID (device ID), the intelligent device uses the security chip as a main control or trusted module, the factory has a default factory digital certificate C2v, and C2 is a symmetric key negotiated by the server S and the intelligent device in advance.
Key C2 may be replaced with an asymmetric key. In this case, the server S generates a pair of public and private keys C2p and C2v for the device terminal. The public key C2p (namely, a second public key) is stored on the server S, and the private key C2v (namely, the second private key) is issued to the intelligent device in a non-network transmission mode;
and 3, the APP acquires an equipment User list and an equipment Key list corresponding to the Device ID from the intelligent equipment terminal, namely Device-users [ 1-n ], Device-keys [ 1-n ].
4. Entering a User association interface at an APP end, associating Device-User [ 1-n ] with Server-User [ 1-n ] with the remote control authority of the equipment, and generating a relation table of the Server-User and the Device-User, { Server-User-X ═ Device-User-Y }, namely R [ Server-User, Device-User ];
5, the APP end encrypts and transmits the relation table to the server by using a private key C1 v;
6. the Server decrypts the public key C1p of the corresponding Server-User, and stores the corresponding relation table of the Server-User and the Device-User.
7. When the intelligent equipment can be networked, Device-users [ 1-n ] and Device-keys [ 1-n ] corresponding to the equipment are encrypted through C2v and transmitted to the server;
the server side decrypts through C2p to obtain { Device ID, Device-User [ 1-n ], Device-Key [ 1-n }.
8. So far, the Server has been provided with full data { Server-User, Device ID [ 1-n ], Device-User [ 1-n ], Device-Key [ 1-n ], R [ Server-User, Device-User ] }
The Server establishes a safe corresponding relation between the local User Device-User of the intelligent Device and the User Server-User of the cloud based on the obtained data, so that a local and cloud two-in-one User management system is realized, unified management conditions are further provided, and simple and safe remote User management, Device and Device key management can be realized.
In performing remote control management, for example, secure remote user management and key management are taken as examples:
1. the user can delete, add, disable and enable the operation of the equipment user and the equipment key of the intelligent equipment at the APP terminal;
the APP transmits the operation information and the updated information to the server through C1v encryption;
3. the server stores the updated information; meanwhile, the data is encrypted through C2p and is issued to the intelligent equipment;
4. the smart device can update the local information and perform validation by decrypting through C2 v.
When performing secure remote device management based on a server:
1. and remote control, such as remote unlocking, is performed at the APP end, and the operation method is the same as remote user management and key management. For example, the user instruction is encrypted and then sent to the server, and the server decrypts the user instruction and then sends the encrypted user instruction to the intelligent device by using the public key matched with the intelligent device, so that the user instruction is executed after the user instruction is decrypted.
Further, in this embodiment, because the local user and the remote user are integrated, the user information can be acquired, encrypted and uploaded, encrypted and stored, and encrypted and transmitted at one time. And meanwhile, the user owner corresponding to the equipment key can also remotely authorize the key information of the user to be used by other intelligent equipment. When the safe remote key uploading, issuing and authorization management are required to be carried out based on the server:
1. a user A inputs fingerprint information fingerA of the user A into an intelligent device A;
2. the intelligent device A can encrypt FingerA through C2v-A and upload the FingerA to a server based on a user instruction;
3. the user A authorizes the fingerA information at the APP end to be used by the intelligent device B, and equivalently, the server is instructed to add the target device key to the intelligent device B based on the third user instruction;
4. after receiving the instruction, the server decrypts FingerA through C2p-A, encrypts the FingerA through C2p-B (namely, a public key corresponding to the intelligent device B), and sends the encrypted FingerA to the device B;
5. after the device B receives the key, the key is decrypted through the C2v-B (namely, the key corresponds to the private key of the intelligent device B), and the key is injected into the intelligent device B, so that the user A can realize remote authorization of the key even if the user A does not enter a fingerprint key in the local area of the intelligent device B, and the intelligent device B is started.
As shown in fig. 6, another embodiment of the present application further provides a terminal, including:
the system comprises a first processor, a second processor and a third processor, wherein the first processor is used for adding first intelligent equipment, at least obtaining an equipment user list of at least one equipment user including the first intelligent equipment, which is stored in the first intelligent equipment, establishing a relation table storing correspondingly matched equipment users and cloud users on the basis of the cloud users and the equipment user list which are established on a server, and sending the relation table to the server so that the server establishes association between the first intelligent equipment and the relation table on the basis of the relation table; and the cloud terminal is further used for obtaining a user instruction at least used for instructing management of the device user, and interacting with the server at least based on the user instruction so as to remotely control at least one intelligent device associated with the cloud terminal user to respond to the user instruction through the server.
As an alternative embodiment, obtaining at least a device user list stored in the first smart device includes:
the method comprises the steps of obtaining an equipment user list and an equipment key list stored in a first intelligent device, wherein the equipment key list comprises at least one equipment key of at least one equipment user of the first intelligent device, and the equipment users in the equipment user list are correspondingly matched with the equipment keys in the equipment key list.
As an optional embodiment, the server stores an equipment user list and an equipment key list uploaded by the first intelligent equipment;
sending the relation table to a server, so that the server establishes association between the first intelligent device and the relation table based on the relation table, wherein the association comprises the following steps:
and sending the relation table to a server, so that the server establishes association among the first intelligent device, the device user, the cloud user and the device key correspondingly matched with the device user based on the relation table.
As an alternative embodiment, obtaining the user instruction comprises:
obtaining first user instructions for at least deleting, adding, disabling, enabling device users and/or device keys; or
Obtaining a second user instruction at least for remotely controlling unlocking of the first smart device.
As an optional embodiment, interacting with the server based on at least a user instruction to remotely control at least one smart device associated with the cloud user through the server in response to the user instruction, includes:
sending a third user instruction for indicating that the target device key of the first intelligent device is simultaneously used as the device key of the second intelligent device to the server, so that the server sends the target device key to the second intelligent device, and the second intelligent device stores the target device key; the second intelligent device is associated with the cloud user.
As an optional embodiment, a first private key and a first public key for encrypting and decrypting the interactive data are respectively and correspondingly stored between the terminal and the server, a second private key and a second public key for encrypting and decrypting the interactive data are respectively and correspondingly stored between the first intelligent device and the server, and a third private key and a third public key for encrypting and decrypting the interactive data are respectively and correspondingly stored between the second intelligent device and the server.
As shown in fig. 7, another embodiment of the present application further provides a server, including:
the second processor is used for determining a corresponding cloud user according to a logged-in terminal, obtaining a relation table which is sent by the terminal and stores correspondingly matched equipment users and the cloud user which is established on the server, establishing association between at least the first intelligent equipment and the relation table, obtaining instruction information sent by the terminal, and remotely controlling at least one intelligent equipment associated with the cloud user to execute a corresponding instruction based on the instruction information; wherein the instruction information is formed based on a user instruction obtained by the terminal, the user instruction at least being used to instruct a management device user from a list of device users from the first smart device that have been added to the terminal.
As an alternative embodiment, the second processor is further configured to:
the method comprises the steps that an equipment user list and an equipment key list uploaded by first intelligent equipment are obtained, the equipment key list comprises at least one equipment key of at least one equipment user of the first intelligent equipment, and equipment users in the equipment user list are correspondingly matched with equipment keys in the equipment key list;
establishing association between at least the first smart device and the relationship table, including:
and establishing association among the first intelligent device, the device user, the cloud user and the device key correspondingly matched with the device user.
As an optional embodiment, the user instruction includes a third user instruction, where the third user instruction is used to instruct that the target device key of the first smart device is simultaneously used as the device key of the second smart device, and the second smart device is associated with the cloud user;
based on at least one intelligent device of instruction information remote control and high in the clouds user relevance carries out corresponding instruction, including:
determining a target device key according to instruction information formed based on a third user instruction;
and sending the target device key to the second intelligent device, so that the second intelligent device stores the target device key.
As an alternative embodiment, the second processor is further configured to:
generating a first public key and a first private key of a corresponding terminal, wherein the first public key and the first private key are used for encrypting and decrypting interactive data between the terminal and the corresponding terminal, and issuing the first private key to the terminal in an encryption reliable mode;
generating a second public key and a second private key which correspond to the first intelligent equipment and are used for encrypting and decrypting interactive data between the first intelligent equipment and the second intelligent equipment, and issuing the second private key to the first intelligent equipment in a non-network transmission mode;
and generating a third public key and a third private key which correspond to the second intelligent device and are used for encrypting and decrypting the interactive data between the second intelligent device and the third public key, and issuing the third private key to the second intelligent device in a non-network transmission mode.
An embodiment of the present application also provides a storage medium, on which a computer program is stored, which when executed by a processor of a terminal device, implements the method as described above. It should be understood that each solution in this embodiment has a corresponding technical effect in the foregoing method embodiments, and details are not described here.
Embodiments of the present application also provide a computer program product tangibly stored on a computer-readable medium and comprising computer-executable instructions that, when executed, cause at least one processor to perform a processing method such as the embodiments described above. It should be understood that each solution in this embodiment has a corresponding technical effect in the foregoing method embodiments, and details are not described here.
It should be noted that the computer storage media of the present application can be computer readable signal media or computer readable storage media or any combination of the two. The computer readable medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access storage media (RAM), a read-only storage media (ROM), an erasable programmable read-only storage media (EPROM or flash memory), an optical fiber, a portable compact disc read-only storage media (CD-ROM), an optical storage media piece, a magnetic storage media piece, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, antenna, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
It should be understood that although the present application has been described in terms of various embodiments, not every embodiment includes only a single embodiment, and such description is for clarity purposes only, and those skilled in the art will recognize that the embodiments described herein may be combined as suitable to form other embodiments, as will be appreciated by those skilled in the art.
The above embodiments are only exemplary embodiments of the present invention, and are not intended to limit the present invention, and the scope of the present invention is defined by the claims. Various modifications and equivalents may be made by those skilled in the art within the spirit and scope of the present invention, and such modifications and equivalents should also be considered as falling within the scope of the present invention.

Claims (13)

1. A remote control method is applied to a terminal, and comprises the following steps:
adding a first intelligent device;
obtaining at least a device user list stored in the first smart device, the device user list including at least one device user of the first smart device;
establishing a relation table based on the cloud end users established on the server and the equipment user list, wherein the corresponding matched equipment users and the cloud end users are stored in the relation table;
sending the relation table to the server, and enabling the server to establish association between the first intelligent device and the relation table based on the relation table;
obtaining a user instruction, wherein the user instruction is at least used for instructing and managing the equipment user;
interacting with the server at least based on the user instruction so as to remotely control at least one intelligent device associated with the cloud user to respond to the user instruction through the server.
2. The method of claim 1, wherein the obtaining at least a list of device users stored in the first smart device comprises:
and obtaining an equipment user list and an equipment key list stored in the first intelligent equipment, wherein the equipment key list comprises at least one equipment key of at least one equipment user of the first intelligent equipment, and the equipment users in the equipment user list are correspondingly matched with the equipment keys in the equipment key list.
3. The method of claim 2, wherein the server stores the list of device users and the list of device keys uploaded by the first smart device;
sending the relation table to the server, so that the server establishes association between the first intelligent device and the relation table based on the relation table, including:
and sending the relation table to the server, so that the server establishes association among the first intelligent device, the device user, the cloud user and the device key correspondingly matched with the device user based on the relation table.
4. The method of claim 2, wherein the obtaining user instructions comprises:
obtaining first user instructions for at least deleting, adding, disabling, enabling the device user and/or device key; or
Obtaining a second user instruction at least for remotely controlling the first intelligent device to execute a specified operation.
5. The method of claim 2, wherein interacting with the server based at least on the user instruction to remotely control at least one smart device associated with the cloud user through the server in response to the user instruction comprises:
sending a third user instruction for indicating that the target device key of the first intelligent device is simultaneously used as the device key of a second intelligent device to the server, so that the server sends the target device key to the second intelligent device, and the target device key is stored by the second intelligent device; wherein the second smart device is associated with the cloud user.
6. The method according to any one of claims 1 to 5, wherein a first private key and a first public key for encrypting and decrypting the interactive data are respectively and correspondingly stored between the terminal and the server, a second private key and a second public key for encrypting and decrypting the interactive data are respectively and correspondingly stored between the first intelligent device and the server, and a third private key and a third public key for encrypting and decrypting the interactive data are respectively and correspondingly stored between the second intelligent device and the server.
7. A remote control method is applied to a server and comprises the following steps:
determining a corresponding cloud user based on a logged-in terminal;
obtaining a relation table sent by the terminal, wherein the relation table stores correspondingly matched device users and cloud end users created on a server, and the device users are from a device user list of first intelligent devices added to the terminal;
establishing association between at least the first intelligent device and the relation table;
obtaining instruction information sent by the terminal, wherein the instruction information is formed based on a user instruction obtained by the terminal, and the user instruction is at least used for instructing and managing the equipment user;
and remotely controlling at least one intelligent device associated with the cloud user to execute a corresponding instruction based on the instruction information.
8. The method of claim 7, further comprising:
obtaining the device user list and a device key list uploaded by the first smart device, wherein the device key list comprises at least one device key of at least one device user of the first smart device, and the device users in the device user list are correspondingly matched with the device keys in the device key list;
the establishing of the association between at least the first intelligent device and the relation table comprises:
and establishing association among the first intelligent device, the device user, the cloud user and the device key correspondingly matched with the device user.
9. The method of claim 8, wherein the user instruction comprises a third user instruction to instruct simultaneous operation of a target device key of the first smart device as a device key of a second smart device associated with the cloud user;
remotely controlling at least one intelligent device associated with the cloud user to execute corresponding instructions based on the instruction information, wherein the instructions comprise:
determining the target equipment key according to instruction information formed based on the third user instruction;
and sending the target device key to the second intelligent device, so that the second intelligent device stores the target device key.
10. The method of any of claims 7 to 9, further comprising:
generating a first public key and a first private key which correspond to the terminal and are used for encrypting and decrypting interactive data between the terminal and the terminal, and issuing the first private key to the terminal in an encryption reliable mode;
generating a second public key and a second private key which correspond to the first intelligent device and are used for encrypting and decrypting interactive data between the first intelligent device and the second intelligent device, and issuing the second private key to the first intelligent device in a non-network transmission mode;
and generating a third public key and a third private key which correspond to the second intelligent device and are used for encrypting and decrypting the interactive data between the second intelligent device and the third public key, and issuing the third private key to the second intelligent device in a non-network transmission mode.
11. A terminal, comprising:
the system comprises a first processor, a second processor and a third processor, wherein the first processor is used for adding first intelligent equipment, at least obtaining an equipment user list of at least one equipment user including the first intelligent equipment, which is stored in the first intelligent equipment, establishing a relation table storing correspondingly matched equipment users and cloud users on the basis of the cloud users and the equipment user list which are established on a server, and sending the relation table to the server so that the server establishes association between the first intelligent equipment and the relation table on the basis of the relation table; and the cloud terminal is further used for obtaining a user instruction at least used for instructing management of the device user, and interacting with the server at least based on the user instruction so as to remotely control at least one intelligent device associated with the cloud terminal user to respond to the user instruction through the server.
12. A server, comprising:
the second processor is used for determining a corresponding cloud user according to a logged-in terminal, obtaining a relation table which is sent by the terminal and stores correspondingly matched equipment users and cloud users which are established on a server, at least establishing association between the first intelligent equipment and the relation table, obtaining instruction information sent by the terminal, and remotely controlling at least one intelligent equipment associated with the cloud user to execute a corresponding instruction based on the instruction information; wherein the instruction information is formed based on a user instruction obtained by the terminal, the user instruction at least indicating to manage the device user from a list of device users from a first smart device that has been added to the terminal.
13. A storage medium comprising a stored program, wherein a device comprising the storage medium is controlled to perform the remote control method according to any one of claims 1-10 when the program is run.
CN202111654106.XA 2021-12-30 2021-12-30 Remote control method, terminal, server and storage medium Pending CN114419763A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111654106.XA CN114419763A (en) 2021-12-30 2021-12-30 Remote control method, terminal, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111654106.XA CN114419763A (en) 2021-12-30 2021-12-30 Remote control method, terminal, server and storage medium

Publications (1)

Publication Number Publication Date
CN114419763A true CN114419763A (en) 2022-04-29

Family

ID=81270475

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111654106.XA Pending CN114419763A (en) 2021-12-30 2021-12-30 Remote control method, terminal, server and storage medium

Country Status (1)

Country Link
CN (1) CN114419763A (en)

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104581706A (en) * 2015-01-09 2015-04-29 上海华申智能卡应用系统有限公司 Data security interactive method based on asymmetric encryption technology between intelligent mobile terminals
US20150143483A1 (en) * 2012-08-13 2015-05-21 Wwtt Technology China Device and Method for Identity Authentication Management
CN105843067A (en) * 2016-05-29 2016-08-10 上海泛创通信技术有限公司 Intelligent door system
CN106379273A (en) * 2016-08-31 2017-02-08 重庆长安汽车股份有限公司 Account management method for automobile keyless system
CN106652109A (en) * 2015-10-30 2017-05-10 东莞酷派软件技术有限公司 Intelligent lock control method, device and lock management server
CN106960489A (en) * 2017-03-28 2017-07-18 南京物联传感技术有限公司 A kind of smart lock fingerprint sync system based on wireless network
CN108122316A (en) * 2017-12-21 2018-06-05 美的集团股份有限公司 Door lock communication system and method based on safety chip
CN108765649A (en) * 2018-05-14 2018-11-06 吴东辉 Electronic lock control method and device and system
CN109243027A (en) * 2018-09-05 2019-01-18 广州大学 A kind of LoRa cloud intelligent door lock system and its control method
CN109493469A (en) * 2018-10-15 2019-03-19 珠海格力电器股份有限公司 A kind of authority setting method and management equipment of intelligent door lock
CN109544755A (en) * 2018-11-27 2019-03-29 深圳市赛亿科技开发有限公司 A kind of intelligent door lock control method and system
CN110136312A (en) * 2019-05-22 2019-08-16 广东科徕尼智能科技有限公司 A kind of method that mobile terminal interacts the virtual key of realization addition with intelligent door lock
CN110149398A (en) * 2019-05-21 2019-08-20 四川长虹电器股份有限公司 A kind of user management method of the intelligent door lock of smart home
CN110288737A (en) * 2019-06-26 2019-09-27 内蒙古工业大学 A kind of Terminal fingerprints lock management method based on cell phone application
CN111583457A (en) * 2020-04-28 2020-08-25 德施曼机电(中国)有限公司 Intelligent door lock system based on face recognition
CN112700567A (en) * 2020-12-23 2021-04-23 中移(杭州)信息技术有限公司 User management method and system based on door lock and computer readable storage medium
CN214752023U (en) * 2020-12-24 2021-11-16 北京华大智宝电子系统有限公司 Fingerprint acquisition device and fingerprint management system
CN113674455A (en) * 2021-08-13 2021-11-19 京东科技信息技术有限公司 Intelligent door lock remote control method, device, system, equipment and storage medium
CN113781677A (en) * 2021-08-31 2021-12-10 新华三技术有限公司 Method for replacing intelligent door lock and cloud platform

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150143483A1 (en) * 2012-08-13 2015-05-21 Wwtt Technology China Device and Method for Identity Authentication Management
CN104581706A (en) * 2015-01-09 2015-04-29 上海华申智能卡应用系统有限公司 Data security interactive method based on asymmetric encryption technology between intelligent mobile terminals
CN106652109A (en) * 2015-10-30 2017-05-10 东莞酷派软件技术有限公司 Intelligent lock control method, device and lock management server
CN105843067A (en) * 2016-05-29 2016-08-10 上海泛创通信技术有限公司 Intelligent door system
CN106379273A (en) * 2016-08-31 2017-02-08 重庆长安汽车股份有限公司 Account management method for automobile keyless system
CN106960489A (en) * 2017-03-28 2017-07-18 南京物联传感技术有限公司 A kind of smart lock fingerprint sync system based on wireless network
CN108122316A (en) * 2017-12-21 2018-06-05 美的集团股份有限公司 Door lock communication system and method based on safety chip
CN108765649A (en) * 2018-05-14 2018-11-06 吴东辉 Electronic lock control method and device and system
CN109243027A (en) * 2018-09-05 2019-01-18 广州大学 A kind of LoRa cloud intelligent door lock system and its control method
CN109493469A (en) * 2018-10-15 2019-03-19 珠海格力电器股份有限公司 A kind of authority setting method and management equipment of intelligent door lock
CN109544755A (en) * 2018-11-27 2019-03-29 深圳市赛亿科技开发有限公司 A kind of intelligent door lock control method and system
CN110149398A (en) * 2019-05-21 2019-08-20 四川长虹电器股份有限公司 A kind of user management method of the intelligent door lock of smart home
CN110136312A (en) * 2019-05-22 2019-08-16 广东科徕尼智能科技有限公司 A kind of method that mobile terminal interacts the virtual key of realization addition with intelligent door lock
CN110288737A (en) * 2019-06-26 2019-09-27 内蒙古工业大学 A kind of Terminal fingerprints lock management method based on cell phone application
CN111583457A (en) * 2020-04-28 2020-08-25 德施曼机电(中国)有限公司 Intelligent door lock system based on face recognition
CN112700567A (en) * 2020-12-23 2021-04-23 中移(杭州)信息技术有限公司 User management method and system based on door lock and computer readable storage medium
CN214752023U (en) * 2020-12-24 2021-11-16 北京华大智宝电子系统有限公司 Fingerprint acquisition device and fingerprint management system
CN113674455A (en) * 2021-08-13 2021-11-19 京东科技信息技术有限公司 Intelligent door lock remote control method, device, system, equipment and storage medium
CN113781677A (en) * 2021-08-31 2021-12-10 新华三技术有限公司 Method for replacing intelligent door lock and cloud platform

Similar Documents

Publication Publication Date Title
CN107113315B (en) Identity authentication method, terminal and server
CN105389500B (en) The method for unlocking another equipment using an equipment
CN111478917B (en) Background system for providing network service for access control device and user terminal
CN105141584B (en) A kind of equipment authentication method and device of smart home system
CN106330442B (en) Identity authentication method, device and system
EP3293995B1 (en) Locking system and secure token and ownership transfer
CN109448197A (en) A kind of cloud intelligent lock system and key management method based on multi-enciphering mode
WO2015180261A1 (en) Smart home access method, control centre device and wearable terminal
CN105282179B (en) A method of family's Internet of Things security control based on CPK
TW201528022A (en) Distribution of user credentials
TW201528029A (en) Method performed by a controller device and a controller device
CN105100102A (en) Authority configuration method and device as well as information configuration method and device
JP2017216596A (en) Communication system, communication device, communication method, and program
US20190311100A1 (en) System and methods for securing security processes with biometric data
CN103152326A (en) Distributed authentication method and authentication system
KR20210006329A (en) Remote biometric identification
CN112053477B (en) Control system, method and device of intelligent door lock and readable storage medium
KR20220146978A (en) Method of secured sharing of vehicle key
CN110807854B (en) Unlocking strategy configuration method and equipment
CN110505210B (en) Intelligent household data asset safe transaction method and device based on block chain
CN109949457B (en) Intelligent door lock control method and related device
CN112767576B (en) Lockset authorization management method and lockset authorization management system
CN114419763A (en) Remote control method, terminal, server and storage medium
US20240129123A1 (en) Blockchain based access to devices on a network with local token acquisition
US20220407867A1 (en) Proof of authority based access to devices on a network with local token acquisition

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Applicant after: Beijing Shendun Technology Co.,Ltd.

Address before: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing

Applicant before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd.