WO2020020304A1 - 一种设备管理方法和系统 - Google Patents

一种设备管理方法和系统 Download PDF

Info

Publication number
WO2020020304A1
WO2020020304A1 PCT/CN2019/097761 CN2019097761W WO2020020304A1 WO 2020020304 A1 WO2020020304 A1 WO 2020020304A1 CN 2019097761 W CN2019097761 W CN 2019097761W WO 2020020304 A1 WO2020020304 A1 WO 2020020304A1
Authority
WO
WIPO (PCT)
Prior art keywords
password
information
target
device management
management
Prior art date
Application number
PCT/CN2019/097761
Other languages
English (en)
French (fr)
Inventor
黎国梁
张玉虎
唐皓
马华章
郑戴
刘立峰
潘嘉明
Original Assignee
云丁网络技术(北京)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201810824189.4A external-priority patent/CN109087065B/zh
Priority claimed from CN201810824234.6A external-priority patent/CN109064596B/zh
Application filed by 云丁网络技术(北京)有限公司 filed Critical 云丁网络技术(北京)有限公司
Publication of WO2020020304A1 publication Critical patent/WO2020020304A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit

Definitions

  • the present application relates to the field of information processing, and in particular, to a method and system for device management.
  • smart devices have become standard equipment for house renovation.
  • smart devices are usually systematically managed by apartment operators and cannot be used for individual listings.
  • the smart device performs the separation and transfer of management function authority, so that after the entrustment lease contract is cancelled, the owner can only use the smart device simply, but cannot effectively manage the smart door lock.
  • Smart password locks have become the standard configuration of apartment leasing. Smart password locks usually have common functions such as remotely adding passwords and remotely deleting passwords, which provide great benefits for apartment owners or apartment operators in apartment management convenient.
  • the traditional password management scheme for smart password locks is to store the door lock password directly in a specific storage area of the smart password lock.
  • an illegal element cracks the address information of the specific storage area where the door lock password is located, it will directly lead to the door lock password.
  • the disclosure of the security code will even cause the door lock password stored in the smart combination lock to be tampered with by the criminals, and even allow the criminals to add new passwords to the smart combination lock without the knowledge of the residents, which seriously affects the residents.
  • Personal safety and property safety It can be seen that the use of traditional password management schemes to manage passwords makes passwords less secure and cannot effectively meet the user's security needs.
  • the method includes: generating and storing local device management information locally; receiving device management instructions through a network; updating the local device management information according to the device management instructions or performing a specified operation in conjunction with the local device management information.
  • the local device management information includes password information and password data; the password information is stored in a first storage area of the smart device; and the password data is stored in a second storage area of the smart device
  • the password information includes a password identifier and an encryption key associated with the password identifier;
  • the password data includes the password identifier and an encrypted password value associated with the password identifier, and the encrypted password value Is obtained by encrypting the original password value by using the encryption key;
  • the second storage area is different from the first storage area.
  • the password information further includes a password attribute associated with the password identification;
  • the device management instruction includes a password attribute update instruction;
  • the updating the local device management information according to the device management instruction or Performing the specifying operation in combination with the local device management information includes: updating the password attribute according to the password attribute update instruction.
  • the local device management information includes management function ownership information;
  • the device management instruction includes a permission transfer instruction, the permission transfer instruction includes information of a target user; and the updating of the device according to the device management instruction
  • the local device management information or performing the specified operation in combination with the local device management information includes: updating the management function ownership information to an account corresponding to the target user according to the authority transfer instruction.
  • the device includes: an information generating module for generating local device management information locally; a storage module for storing the local device management information; a receiving module for receiving device management instructions through a network; an instruction execution module for The device management instruction updates the local device management information or performs a specified operation in combination with the local device management information.
  • the device includes at least one processor and at least one memory: the at least one memory is configured to store computer instructions; the at least one processor is configured to execute at least part of the computer instructions to perform the smart device management method as described above.
  • the storage medium stores computer instructions.
  • the computer reads the computer instructions in the storage medium, the computer executes the smart device management method as described above.
  • the method is applied to an electronic device and includes: storing password information in a first storage area of the electronic device; storing password data in a second storage area of the electronic device; wherein the password information includes a password identification and a password An encryption key associated with the password identifier; the password data includes the password identifier and an encrypted password value associated with the password identifier, and the encrypted password value is obtained from the original password value using the encryption key Obtained by encryption; the second storage area is different from the first storage area.
  • the generation process of the encryption key associated with the password identifier includes: obtaining the password identifier and preset data in the electronic device; according to the password identifier and the preset data, Generating an encryption key associated with the password identification.
  • the method further includes: acquiring a new password value associated with the first password identifier; and encrypting the new password value using an encryption key associated with the first password identifier to obtain A new encrypted password value; updating the encrypted password value associated with the first password identifier in the password data stored in the second storage area to the new encrypted password value.
  • the password information further includes: a password attribute associated with the password identifier; the method further includes: obtaining a new password attribute associated with a second password identifier; and storing the first storage area In the stored password information, a password attribute associated with the second password identifier is updated to the new password attribute.
  • the password information further includes: a password end time associated with the password identifier; the method further includes: when the password end time associated with the third password identifier is earlier than the current time, from In the password information stored in the first storage area, the third password identification and the encryption key associated with the third password identification are deleted, and from the password data stored in the second storage area, all of the password information are deleted.
  • the third password identifier is described.
  • the method further includes: obtaining a verification password value input by the user; and using an encryption key in the password information stored in the first storage area, the password data stored in the second storage area is encrypted.
  • the encrypted password value is decrypted to obtain the decrypted password value; if the verification password value matches the decrypted password value, it is determined that the password verification is successful; otherwise, it is determined that the password verification has failed.
  • a password management device applied to an electronic device includes: a password information storage unit for storing password information in a first storage area of the electronic device; a password data storage unit for storing password data to A second storage area of the electronic device; wherein the password information includes a password identifier and an encryption key associated with the password identifier; and the password data includes the password identifier and a password identifier associated with the password identifier An encrypted password value obtained by encrypting the original password value by using the encryption key; the second storage area is different from the first storage area.
  • the apparatus further includes a password value update unit, the password value update unit is configured to: obtain a new password value associated with the first password identifier; and utilize the encryption associated with the first password identifier A key to encrypt the new password value to obtain a new encrypted password value; and to update the encrypted password value associated with the first password identifier in the password data stored in the second storage area to the new password value Encrypted password value.
  • the password value update unit is configured to: obtain a new password value associated with the first password identifier; and utilize the encryption associated with the first password identifier A key to encrypt the new password value to obtain a new encrypted password value; and to update the encrypted password value associated with the first password identifier in the password data stored in the second storage area to the new password value Encrypted password value.
  • the password information further includes: a password attribute associated with the password identifier; the device further includes a password attribute update unit; and the password attribute update unit is configured to: obtain a password attribute related to the second password identifier The new password attribute; updating the password attribute associated with the second password identifier in the password information stored in the first storage area to the new password attribute.
  • Another aspect of the present application relates to an electronic device, including: a first storage area for storing password information and a second storage area for storing password data; wherein the password information includes a password identifier and a connection with all The encryption key associated with the password identifier; the password data includes the password identifier and an encrypted password value associated with the password identifier, and the encrypted password value is used to encrypt the original password value using the encryption key Obtained; the second storage area is different from the first storage area.
  • Another aspect of the present application relates to a smart device management method, which is applied to a smart device management system, where the smart device management system stores listing information, and management functions of smart devices corresponding to the listing information Ownership information; the method includes: obtaining target house information and target owner information; receiving a permission transfer instruction corresponding to the target house information; and in response to the permission transfer instruction, creating a phase corresponding to the target owner information The matched target owner account; changing the management function ownership information of the smart device corresponding to the target listing information to the target owner account.
  • the obtaining target house information includes: obtaining expired house information and a target house selection operation; and obtaining the target house from the expired house information according to the target house selection operation. information.
  • the method further includes: when the target owner account creation fails or the management function ownership information of the smart device corresponding to the target house information fails to be changed, re-executing the Describe the steps of obtaining target house information and target owner information.
  • the target listing information includes ownership information of the target listing; after the responding to the permission transfer instruction, creating a target owner account that matches the target owner information, the method The method further includes: changing the ownership information of the target house to the target owner account; when the ownership information of the target house fails to be changed, re-executing the process of obtaining the target house information and the target house information step.
  • the method further includes: When a login request initiated by a target owner account is controlled, the target owner account is controlled to log in to the smart device management system; when a device information viewing request initiated by the target owner account is received, the information associated with the target owner account is displayed Device information of a smart device; when receiving a device information modification request initiated by the target owner account, modify device information of the smart device associated with the target owner account.
  • the smart device includes at least one of a smart door lock, a smart meter, a smart water meter, a smart gateway, and a smart monitoring device.
  • the management functions of the smart door lock include a management password configuration function, a tenant password configuration function, a temporary password configuration function, a Bluetooth authorization management function, and a fingerprint authorization At least one of a management function, an unlocking history viewing function, and a device abnormality viewing function.
  • the smart device management device stores property information, and management function ownership information of the smart device corresponding to the property information;
  • the device It includes: a target acquisition unit for acquiring target listing information and target owner information; an instruction receiving unit for receiving a permission transfer instruction corresponding to the target listing information; an account creation unit for responding to the permission A transfer instruction to create a target owner account that matches the target owner information; a device change unit for changing the management function ownership information of the smart device corresponding to the target house information to the target owner account .
  • the target acquisition unit includes: a first acquisition unit configured to acquire expired listing information and a target selection operation; and a second acquisition unit configured to obtain the target listing selection operation from The target house information is obtained from the expired house information.
  • the apparatus further includes: a process control unit configured to change ownership information of management functions of the smart device corresponding to the target property information when the target owner account fails to be created. When it fails, the steps of obtaining the target house information and the target owner information are re-executed.
  • the target house information includes ownership information of the target house; the device further includes: a house change unit for changing the ownership information of the target house to the target Owner account; the process control unit is further configured to re-execute the step of obtaining the target house information and the target house information when the ownership information of the target house fails to be changed.
  • the apparatus further includes a login control unit for controlling the target owner account to log in to the smart device management system when a login request initiated by the target owner account is received; a device viewing unit For receiving device information viewing request initiated by the target owner account, displaying device information of the smart device associated with the target owner account; and a device modifying unit for receiving a device information received by the target owner When a device information modification request is initiated by an account, the device information of the smart device associated with the target owner account is modified.
  • a login control unit for controlling the target owner account to log in to the smart device management system when a login request initiated by the target owner account is received
  • a device viewing unit For receiving device information viewing request initiated by the target owner account, displaying device information of the smart device associated with the target owner account
  • a device modifying unit for receiving a device information received by the target owner When a device information modification request is initiated by an account, the device information of the smart device associated with the target owner account is modified.
  • Another aspect of the present application relates to a storage medium including a stored program, wherein when the program runs, the device where the storage medium is located is controlled to execute the smart device management method as described above.
  • Another aspect of the present application relates to a processor for running a program, wherein when the program runs, the smart device management method described above is executed.
  • FIG. 1 is an application scenario diagram of a device management system according to some embodiments of the present application.
  • FIG. 2 is an exemplary flowchart of a device management method according to some embodiments of the present application.
  • FIG. 3 is an exemplary block diagram of a local device management system according to some embodiments of the present application.
  • FIG. 4 is an exemplary flowchart of a device management method according to some embodiments of the present application.
  • FIG. 5 is an exemplary flowchart of a smart device management method according to some embodiments of the present application.
  • FIG. 6 is a flowchart of a process of obtaining target house information according to some embodiments of the present application.
  • FIG. 7 is another flowchart of a smart device management method according to some embodiments of the present application.
  • FIG. 8 is another flowchart of a smart device management method according to some embodiments of the present application.
  • FIG. 9 is a flowchart of a smart device management process according to some embodiments of the present application.
  • FIG. 10 is an exemplary flowchart of a smart door lock management service according to some embodiments of the present application.
  • FIG. 11 is a schematic structural diagram of a cloud intelligent device management apparatus according to some embodiments of the present application.
  • FIG. 12 is another schematic structural diagram of a cloud intelligent device management apparatus according to some embodiments of the present application.
  • FIG. 13 is an example application scenario diagram of a cloud smart device management apparatus according to some embodiments of the present application.
  • 15 is a schematic diagram of a password adding process according to some embodiments of the present application.
  • 16 is a flowchart of an encryption key generation process according to some embodiments of the present application.
  • FIG. 17 is a schematic diagram of an encryption key generation process according to some embodiments of the present application.
  • FIG. 19 is a schematic diagram of a password update process according to some embodiments of the present application.
  • FIG. 20 is a schematic diagram of a password invalidation process according to some embodiments of the present application.
  • 21 is a flowchart of a password verification process according to some embodiments of the present application.
  • 22 is a schematic structural diagram of a password management device according to some embodiments of the present application.
  • FIG. 23 is another schematic structural diagram of a password management device according to some embodiments of the present application.
  • FIG. 24 is a schematic structural diagram of an electronic device according to some embodiments of the present application.
  • system means for distinguishing different components, components, parts, parts or assemblies at different levels.
  • apparatus means for distinguishing different components, components, parts, parts or assemblies at different levels.
  • the words may be replaced by other expressions.
  • a flowchart is used in the present application to explain the operations performed by the system according to the embodiments of the present application. It should be understood that the preceding or following operations are not necessarily performed precisely in sequence. Instead, the steps can be processed in reverse order or simultaneously. At the same time, you can add other operations to these processes, or remove a step or steps from these processes.
  • This application provides a device management method and system. Through the technical solution of this application, the user can remotely control or manage the device. For example, you can remotely transfer the device's management ownership information or remotely modify the device's password information.
  • the present application adopts a scheme of storing the encryption key and the encrypted password value in different local areas of the device, so that even if a criminal steals the encrypted password value, the password cannot be cracked because the encryption key is not obtained.
  • FIG. 1 is an application scenario diagram of a device management system according to some embodiments of the present application.
  • the device management system 100 may be used to manage devices.
  • the equipment management system 100 may be used for the management of various equipment in an apartment in the apartment rental industry.
  • the technical solution of this application is not limited to the equipment management in the apartment leasing industry, but can also be used in various other equipment management Scenarios, for example, can be used for device management in enterprises, schools, homes, and so on.
  • the management party (such as an apartment management center) can remotely manage and / or control the equipment in the system through the equipment management system 100, or the local end of the equipment can also realize automatic management according to the set operating parameters.
  • the device management system 100 may include a server 110, a network 120, an electronic device 130, a user terminal 140, and a storage device 150.
  • the server 110 may process data and / or information related to the management of the electronic device 130 to perform one or more functions described in this application. For example, the server 110 may obtain the operating parameters of the electronic device 130, determine the operations that need to be performed on the electronic device 130 after analysis, and generate a reminder to send to the user terminal 140. The server 110 may also process data and / or information related to the user terminal 140 to perform one or more functions described in this application. For example, the server 110 may receive a management operation sent by the user terminal 140, and generate a corresponding management instruction according to the management operation and send the management instruction to the electronic device 130 to implement management of the electronic device 130.
  • the management operation may be of various types. For example, it may be a management right transfer operation.
  • the server 110 generates a corresponding management right transfer instruction according to the management right transfer operation and sends it to the electronic device 130 to complete the management right transfer.
  • the management operation may also be related to password management.
  • the server 110 may generate a corresponding password management instruction according to the password management operation and send it to the electronic device 130 to implement password management, such as modifying the original password, freezing the password, unfreezing the password, and deleting the password. Wait.
  • the server 110 may be a single server or a server group.
  • the server farm may be centralized or distributed (for example, the server 110 may be a distributed system).
  • the server 110 may be local or remote.
  • the server 110 may access the electronic device 130 and / or the user terminal 140 through the network 120.
  • the server 110 may be directly connected to the electronic device 130 and / or the user terminal 140 to access stored information and / or data.
  • the server 110 may be implemented on a cloud platform.
  • the cloud platform may include a private cloud, a public cloud, a hybrid cloud, a community cloud, a distributed cloud, between clouds, multiple clouds, or the like, or any combination of the above examples.
  • the server 110 may be implemented on a computing device.
  • the server 110 may be implemented on a mobile device.
  • the network 120 may be used for the exchange of information and / or data.
  • One or more components (server 110, electronic device 130, user terminal 140) in the system may send information / data to other components through the network 120.
  • the server 110 may obtain data information from the electronic device 130 and / or the user terminal 140 through the network 120.
  • the network 120 may be any one or a combination of a wired network or a wireless network.
  • the network 120 may include a cable network, a wired network, a fiber optic network, a telecommunications network, an intranet, the Internet, a local area network (LAN), a wide area network (WAN), a wireless local area network (WLAN), a metropolitan area network (MAN), and a public switched telephone Network (PSTN), general packet wireless network (GPRS), mobile phone network, Bluetooth network, ZigBee network, near field communication (NFC) network, NB-IoT / LoRa, etc. or any combination of the above examples.
  • the network 120 may include one or more network access points.
  • the network 120 may include wired or wireless network access points, such as base stations and / or Internet exchange points 120-1, 120-2, and so on. Through an access point, one or more components of the system 100 may be connected to the network 120 to exchange data and / or information.
  • the electronic device 130 is a managed device.
  • the electronic device may also be referred to as a smart device.
  • the electronic device 130 needs to be authenticated before it can be used.
  • the user needs to enter the correct password to use the electronic device 130.
  • the electronic device 130 may be a device in a house.
  • the electronic device 130 may include, but is not limited to, electronic door locks, electrical switches, televisions, air conditioners, and other electrical devices.
  • the electronic device 130 may receive instructions from the server 110 and / or the user terminal 140 and execute the instructions.
  • the door lock may receive an instruction from the server 110 to close or open based on the instruction.
  • the electronic device 140 may also feedback its working status to the server 110.
  • the electronic lock may feed back information such as a switch lock state and a password state to the server 110.
  • the electronic device 130 locally stores device information, such as device management information, including but not limited to authentication information (such as password information, password data), management authority information, and device hardware information, including but not limited to Device model, name, manufacturer, production date, warranty record, power information, exception information, etc.
  • a sensor is disposed on the electronic device 130 to collect information. For example, there may be a sensor for collecting user characteristic information, through which the user characteristic information (such as fingerprint information, iris information, palm vein information, face information, sound information, etc.) can be collected at the local end of the electronic device 130.
  • the electronic device 130 may further be provided with an input / output unit, including, but not limited to, a speaker, a display screen, a touch screen, a tablet, a microphone, and the like, and the user may communicate with the electronic device 130 through the input / output unit Interaction.
  • an input / output unit including, but not limited to, a speaker, a display screen, a touch screen, a tablet, a microphone, and the like, and the user may communicate with the electronic device 130 through the input / output unit Interaction.
  • device information, user operation information, processing status / results, monitored environmental information, etc. can be displayed on the display.
  • the user can access the device management system 100 through the user terminal 140.
  • the user can remotely control the electronic device 130 through the user terminal 140.
  • a user may perform a device management operation on the user terminal 140.
  • the user terminal 140 sends the device management operation to the server 110, and the server 110 generates a device management instruction according to the received device management operation and sends the device management instruction to the electronic device 130.
  • the user may transfer the management right of the electronic device 130 through the user terminal 140.
  • the user may perform operations such as adding, deleting, freezing, and thawing the authentication information in the electronic device 130 through the user terminal 140.
  • the user of the user terminal 140 may be a management party.
  • a staff member of the apartment management center may manage the smart devices in the apartment through the user terminal 140.
  • the user of the user terminal 140 may be an individual user.
  • the owner may manage the smart devices in his house through the user terminal 140.
  • the user terminal 140 may include, but is not limited to, a desktop computer, a notebook computer, a smart phone, a Personal Digital Assistant (PDA), a tablet computer, a handheld game console, smart glasses, a smart watch, and a wearable device. , Virtual display devices, display enhancement devices, etc.
  • the storage device 150 may store data and / or instructions. For example, you can store data used for authentication, such as user profile files, password information, and data. In some embodiments, the storage device 150 may store data and / or instructions that the server 110 may execute, and the server 110 may implement or implement the exemplary methods described in this application by executing or using the data and / or instructions. In some embodiments, the storage device 150 may include mass storage, removable memory, volatile read-write memory, read-only memory (ROM), etc., or any combination thereof. Exemplary mass storage may include magnetic disks, optical disks, solid-state disks, and the like. Exemplary removable memories may include flash drives, floppy disks, optical disks, memory cards, compact disks, magnetic tapes, and the like.
  • Exemplary volatile read-write memory may include random access memory (RAM).
  • RAM may include dynamic random access memory (DRAM), double data rate synchronous dynamic random access memory (DDRSDRAM), static random access memory (SRAM), thyristor random access memory (T-RAM), and zero capacitance Random access memory (Z-RAM), etc.
  • Exemplary read-only memories may include mask-type read-only memory (MROM), programmable read-only memory (PROM), erasable programmable read-only memory (PEROM), electrically erasable programmable read-only memory (EEPROM), CD-ROM and CD-ROM.
  • the storage device 150 may be implemented on a cloud platform. It should be noted that, in some embodiments, the storage device may be integrated inside the server 110, the electronic device 130, and the user terminal 140.
  • FIG. 2 is an exemplary flowchart of a device management method according to some embodiments of the present application. In some embodiments, this process may be performed by the electronic device 130. The process includes:
  • the electronic device 130 generates and stores local device management information locally.
  • the local device management information is information that is local to the electronic device 130 and is used to manage the electronic device 130.
  • the local device management information may include password information and password data, and the password may be, for example, a character password, a pattern password, a gesture password, and the like.
  • the password information includes a password identifier and an encryption key associated with the password identifier.
  • the password data includes the password identifier and an encrypted password value associated with the password identifier.
  • the encrypted password value can be obtained by encrypting the original password value by using the encryption key. of.
  • the above-mentioned password information may further include password attributes.
  • the password attributes include, but are not limited to, password status, password validity time, and password period attributes. Password management may be implemented by updating password data.
  • the local device management information may include management authority information to limit the management authority of the electronic device 130.
  • the management authority information may include authorized user information, such as the user identification, account name, etc. of the authorized user, and only the authorized user can manage the electronic device 130.
  • the management authority information may also include the authorization validity period of the authorized user, such as the authorization start time and end time. In some embodiments, the authorized user can manage the electronic device 130 only when the current time is within the authorized validity period of the authorized user.
  • the electronic device 130 may perform information collection locally to generate the local device management information. For example, the user may enter a password on the electronic device 130, and the electronic device 130 generates password information and / or password data according to the collected password. In some embodiments, the electronic device 130 may receive information sent by other devices in the system 100 to generate the local device management information. For example, the user may enter a password on the user terminal 140, and the user terminal 140 sends the password to the electronic device 130, and the electronic device 130 generates password information and / or password data according to the received password.
  • a user may set an authorized user and / or authorization validity period of the electronic device 130 on the user terminal 140, the user terminal 140 sends the authorized user and / or authorization validity period to the server 110, and the server 110 creates the authorization accordingly The corresponding account of the user, and the authorization validity period of the account is marked.
  • the server 110 sends the account and validity period of the authorized user to the electronic device 130, and the electronic device 130 specifically generates device management authority information.
  • the electronic device 130 may be provided with a storage unit for storing the local device management information.
  • the electronic device 130 may store an encrypted password
  • the electronic device 130 may store the encryption key and the encrypted password value in different areas of the storage unit to improve password security.
  • the electronic device 130 may store password information and password data.
  • the password information includes a password identifier and an encryption key associated with the password identifier.
  • the password data includes a password identifier and an encrypted password value associated with the password identifier.
  • the electronic device 130 may store password information in a first storage area and store password data in a second storage area. For more information about the password storage, refer to FIG. 14 to FIG. 24 and descriptions thereof, and details are not described herein again.
  • the electronic device 130 receives a device management instruction through a network.
  • the device management instruction is an instruction for managing the electronic device 130.
  • the password information and / or password data in the electronic device 130 may be managed according to the device management instruction.
  • password attributes can be updated.
  • Password attributes can include password status, password period attributes, password expiration time, etc.
  • Password status updates can include password freeze, unfreeze, etc.
  • Updates of password period attributes can include setting password period flags, password expiration.
  • the time update may include modifying the password expiration time. As another example, you can add new passwords, delete or modify old passwords.
  • the management authority information in the electronic device 130 may be managed according to the device management instruction.
  • the management right of the electronic device 130 may be transferred to a target user.
  • a user may perform a device management operation on the user terminal 140.
  • the user terminal 140 sends the device management operation signal to the server 110 through the network 120, and the server 110 generates a device management instruction according to the device management operation signal.
  • the device management instruction is sent to the electronic device 130 through the network 120.
  • a user performs a password modification operation on the user terminal 140, and the user terminal 140 transmits the operation signal to the server 110.
  • the server 110 After receiving the user's password modification operation signal, the server 110 generates a password modification instruction and sends it to the electronic device 130 through the network 120. .
  • the user performs a permission transfer operation on the user terminal 140, and the user terminal 140 transmits the permission transfer operation signal to the server 110.
  • the server 110 After receiving the signal, the server 110 generates a permission transfer instruction and sends the permission transfer instruction to the electronic device 130 through the network 120.
  • the electronic device 130 may receive a set of device management instructions in batches.
  • the server 110 may also automatically generate a device management instruction to the electronic device 130 according to the data stored by the server 110.
  • the server 110 stores an account of an authorized user and its authorization validity period. When the current time exceeds the authorization validity period, the server 110 may automatically generate a device management instruction for invalidating the authorized user account and send it to the electronic device 130 through the network.
  • the electronic device 130 receiving the device management instruction / automatically generating the device management instruction please refer to other places in this specification, as shown in FIG. 4, FIG. 5, FIG. 7, FIG. 8 and description thereof.
  • Step 203 The electronic device 130 updates the local device management information according to the device management instruction or performs a specified operation in combination with the local device management information.
  • the electronic device 130 may update the local device management information according to the device management instruction. For example, if the device management instruction is a password update instruction, the electronic device 130 may update the password information and / or password data stored locally according to the instruction. As another example, if the device management instruction is a time update instruction, the electronic device 130 may update the local time according to the instruction.
  • the electronic device 130 may perform a specified operation in combination with the local device management information. For example, if the device management instruction is a password deletion instruction, the electronic device 130 may delete the corresponding password information and / or password data stored locally according to this.
  • the electronic device 130 may transfer the management authority according to the instruction.
  • the electronic device 130 may transfer the management authority according to the instruction. For more information about the electronic device 130 updating the local device management information according to the device management instruction or performing a specified operation in combination with the local device management information, please refer to other places in this specification, as shown in FIGS. 4 to 24 and descriptions thereof. .
  • FIG. 3 is an exemplary block diagram of a local device management apparatus according to some embodiments of the present application.
  • the device may include an information generating module 301, a storage module 302, a receiving module 303, and an instruction execution module 304.
  • the information generating module 301 may generate local device management information.
  • the local device management information may include, for example, password information and password data.
  • the password information includes a password identifier and an encryption key associated with the password identifier.
  • the password data includes a password identifier and an encrypted password value associated with the password identifier.
  • the encrypted password value may be obtained through The original password value is encrypted by using the encryption key.
  • the password information may also include password attributes, such as password status, password validity time, and password period attributes.
  • the local device management information may also include management authority information.
  • the information generating module 301 may generate the local device management information according to the information collected locally by the electronic device 130.
  • the information generating module 301 may generate the local device management information according to information sent from other components received by the electronic device 130.
  • the storage module 302 may store information and / or data. In some embodiments, the storage module 302 may store local device management information. The storage module 302 may include different areas. In some embodiments, for the password information and password data generated by the information generating module 301, the storage module 302 may store them in the different areas, thereby achieving separate storage of the encryption key and the encrypted password value, and improving password security.
  • the receiving module 303 can receive information. In some embodiments, the receiving module 303 may receive information sent by the server 110 through the network 120. In some embodiments, the receiving module 303 may receive device information. In some embodiments, the receiving module 303 may receive a device management instruction sent by the server 110 through the network 120.
  • the instruction execution module 304 can execute instructions.
  • the instruction execution module 304 may update the local device management information according to the device management instruction received by the receiving module 303 or perform a specified operation in combination with the local device management information.
  • the local device management apparatus and its modules shown in FIG. 3 may be implemented in various ways.
  • the device and its modules may be implemented by hardware, software, or a combination of software and hardware.
  • the hardware part can be implemented with dedicated logic; the software part can be stored in the memory and executed by a suitable instruction execution system, such as a microprocessor or dedicated design hardware.
  • a suitable instruction execution system such as a microprocessor or dedicated design hardware.
  • the above methods and devices can be implemented using computer-executable instructions and / or included in processor control code, for example, in a carrier medium such as a magnetic disk, CD, or DVD-ROM, such as a read-only memory (firmware Such code is provided on a programmable memory or a data carrier such as an optical or electronic signal carrier.
  • the device and its module of the present application can be implemented not only by hardware circuits such as VLSI or gate arrays, semiconductors such as logic chips, transistors, or programmable hardware devices such as field programmable gate arrays, programmable logic devices, and the like. It can also be implemented by software executed by various types of processors, for example, or by a combination of the above-mentioned hardware circuit and software (for example, firmware).
  • the above description of the local device management device and its modules is for convenience of description only, and cannot limit the present application to the scope of the illustrated embodiments. It can be understood that for those skilled in the art, after understanding the principle of the device, it is possible to arbitrarily combine the various modules or form a sub-device to be connected with other modules without departing from this principle.
  • the information generating module 301, the storage module 302, the receiving module 303, and the instruction execution module 304 disclosed in FIG. 3 may be different modules in a device, or may be a module that implements the two or Features of more than two modules.
  • the device management apparatus may omit one or more of the above modules, or may include other modules.
  • the device management apparatus may further include a collection module for collecting user information and the like.
  • a collection module for collecting user information and the like.
  • Each module in the device management device can share a storage module, and each module can also have its own storage module. Such deformations are all within the protection scope of this application.
  • FIG. 4 is an exemplary flowchart of a device management method according to some embodiments of the present application.
  • this process may be performed by the server 110.
  • This process can transfer device management permissions.
  • the process includes:
  • the server 110 receives a permission transfer instruction, where the permission transfer instruction includes target device information and target user information.
  • the target device is a device whose management authority is to be transferred, and the target user is a user who is to receive management authority of the target device.
  • the target equipment can be of various types, for example, it can be leased equipment, including but not limited to houses, appliances, lockers, and the like.
  • the server 110 may receive a permission transfer instruction sent by the user terminal 140.
  • the manager may input target device information and target user information on the user terminal 140 to transfer the management right of the target device to the target user. Managers can enter target device information / target user information in various ways.
  • the device number can specify the target device
  • Select the target device and select the target user in the user list.
  • Managers can be agency staff, such as the staff of rental apartment management center, which can determine the target equipment and target users according to the contract between the apartment operator and the tenant, and perform authority transfer operations. You can transfer management rights on your own device.
  • the server 110 may also generate a permission transfer instruction by itself.
  • the server 110 stores the authorization validity period for which the user has the right to use the device.
  • the administrator can preset the next authorized user information after the authorization validity period expires and send it to the server 110 for storage.
  • the server 110 may determine whether the current time exceeds the validity period of the user's authorization for the device. If it exceeds, the server 110 may determine the device as the target device by itself, determine the next authorized user stored in advance as the target user, and generate the A permission transfer instruction transferred from the target device to the target user.
  • the server 110 may periodically monitor whether the current time exceeds the validity period of the authorization, and send information of the corresponding users and devices that exceed the validity period of the authorization to the user terminal 140 for the user to view, and the user may determine the target device and / or target user To perform a permission transfer operation, and the user terminal 140 generates a permission transfer instruction according to the operation and sends the permission transfer instruction to the server 110.
  • the server 110 creates a target user account that matches the target user information in response to the permission transfer instruction.
  • the target user is a new user, so a new user account needs to be created for it.
  • the target user already has a corresponding account in the system, there is no need to create a new account for it.
  • the target user account can be expressed in various forms, such as user name, number, mobile phone number, and mailbox.
  • a correspondence between user information and a user account may be established.
  • a user account may correspond to one or more pieces of user information. The corresponding user information can be determined according to the user account.
  • the server 110 changes the management function ownership information of the target device to the target user account.
  • the management device ownership information of the target device is blank, that is, the target device has not been authorized for use by any user, and the target user account can be added directly under the management device ownership of the target device.
  • the management function ownership of the target device originally belongs to a previous user, the account of the previous user may be replaced with the target user account.
  • the method of the present application can be used to transfer management authority of various devices.
  • the method of the present application may be used to transfer management rights of the rented space.
  • Rental space includes, but is not limited to, office space, commercial housing, civilian housing, hotels, apartments, etc.
  • the office space may be a long-rent office, a shared office area, and the like.
  • the commercial / civilian housing may be a long-term rental house, a time-sharing rental house, and the like.
  • the method of the present application may be used to transfer management rights of smart devices in a rented space.
  • Smart devices in the rented space include, but are not limited to, smart door locks, appliances, etc.
  • the following takes the transfer of apartment management authority as an example for detailed description.
  • FIG. 5 is an exemplary flowchart of a smart device management method according to some embodiments of the present application.
  • This process may be a specific application of the device management method shown in FIG. 2.
  • apartment management authority can be transferred through this process.
  • the apartment operator may remotely transfer the management right of the apartment through the user terminal, and transfer the management right of the house to the target user.
  • the server can create the corresponding account of the target user according to the permission transfer instruction sent by the user terminal, and transfer the management authority of the property to the account of the target user, so that the property can be rented to the property when the previous tenant's lease expires The next tenant.
  • this process can be used to realize the transfer of the rights of the owner-occupied house.
  • the management authority of the owner-occupied house can be transferred from the original administrator to the new administrator; for example, when the house sale is completed, the management authority of the house can be transferred from the original owner to the new owner.
  • at least part of the process shown in FIG. 5 may be performed by the server 110. In other embodiments, at least part of the process may also be performed by the electronic device 130. As shown in FIG. 5, the method includes:
  • Step 501 Obtain target house information and target owner information.
  • the apartment operator After the apartment operator (intermediary) signs the entrusted lease contract with the owner, the apartment operator will be responsible for the lease of the owner's house and install intelligent equipment for the owner's house; the apartment operator will cancel the entrusted lease After that, the apartment operator will return the owner ’s property to the owner, and will need to transfer the management function of the smart device to the owner, so that the owner can manage the installed smart device.
  • the target house refers to the house to be returned to the owner
  • the target house refers to the owner of the target house, that is, there is a correlation between the target house information and the target house information, and the system obtains the target house
  • the purpose of the source information and the target owner information is to determine the property information to be returned and the owner information of the property to be returned.
  • the listing information may include information such as the listing number, address, and apartment type; the owner information may include the owner's name, mobile phone number, and ID number.
  • Step 502 Receive a permission transfer instruction corresponding to the target house information.
  • this step may be performed by the receiving module 303 shown in FIG. 3.
  • Corresponding smart devices are installed in the houses recorded in the smart device management system. After confirming that the target house information and the target owner information are entered correctly, the apartment operator will send a corresponding message to the system. A permission transfer instruction is used to transfer the management function permission of the smart device corresponding to the target house to the target owner.
  • Step 503 In response to the authority transfer instruction, create a target owner account that matches the target owner information.
  • the smart device management system responds to the authority transfer instruction, creates a target owner account that matches the target owner information, and uses the target owner account as the management account of the smart device corresponding to the target property information, so that the target owner It has the management function authority of the smart device.
  • the target owner account number may be a mobile phone number, an ID number of the target owner, or another account with a unique identification function.
  • Step 504 Change the management function ownership information of the smart device corresponding to the target house information to the target owner account.
  • step 503 and / or step 504 may be performed by the instruction execution module 304 shown in FIG. 3.
  • the smart device of the owner's house is usually installed and managed by the apartment operator, so in the intelligent device management system, the management of the smart device corresponding to the target house information
  • the functional ownership information is usually the account of the apartment operator or the system preset account.
  • the apartment operator After the apartment operator and the owner cancel the entrusted lease contract, the apartment operator will issue a permission transfer instruction to the smart device management system, and the system will create a target owner account that matches the target owner information in response to the permission transfer instruction And change the management function ownership information of the smart device corresponding to the target house information to the target owner account, so that the target owner can comprehensively and effectively manage the smart device through the target owner account.
  • the management function permission of a smart device refers to the use right of the management function of the smart device. Obtaining the management function permission of the smart device is equivalent to obtaining the full control permission of the smart device, not just the individual use of the smart device. Permissions (such as the right to open the smart door lock using the unlock password).
  • the management function ownership information is the attribution information of the management function authority.
  • the apartment operator After changing the management function ownership information to the target owner account, the apartment operator will lose the management right of the smart device corresponding to the target listing information.
  • the smart device management method provided in this embodiment is applied to a smart device management system, obtains target listing information and target owner information, receives a permission transfer instruction corresponding to the target listing information, and creates a response to the permission transfer instruction.
  • the target owner account matching the target owner information changes the management function ownership information of the smart device corresponding to the target listing information to the target owner account, thereby realizing the smart device based on the dimension of the listing.
  • the separation and transfer of management function authority enables the target owner to also comprehensively and effectively manage smart devices, realizes the refined management and intelligent management of smart devices, and improves the flexibility of smart device management solutions.
  • FIG. 6 is a flowchart of a process of obtaining target house information according to some embodiments of the present application.
  • the apartment manager can determine the expired listing according to the lease term agreed in the lease contract, and select the target listing from it.
  • the process shown in FIG. 6 may be executed by the server 110.
  • the process of obtaining target house information includes:
  • Step 601 Obtain expired listing information and a target listing selection operation.
  • the apartment operator can assign the expired listing information in the smart device management system from the listing information stored in the system and give the listing expiration.
  • the system may also automatically assign a device expiration status to the smart device corresponding to the expired listing information, such as the door lock expiration status of a smart door lock.
  • the apartment operator may use the target house selection operation in the smart device management system to select the target house information from the expired house source information.
  • the cancellation of the entrusted lease contract can be initiated by either the apartment operator or the owner and confirmed by the apartment operator.
  • Step 602 Obtain target house information from the expired house information according to the target house selection operation.
  • the intelligent device management system After the intelligent device management system obtains the target house selection operation, according to the target house selection operation, it can obtain the target house information selected by the apartment operator.
  • the intelligent device management system obtains target listing information from the expired listing information according to the operation of obtaining the expired listing information and the target listing selection operation, thereby achieving the acquisition of the target listing information; and The system also divides expired listings, thereby improving the flexibility of the listing information management process.
  • FIG. 7 is another flowchart of a smart device management method according to some embodiments of the present application.
  • a target owner account needs to be created.
  • the method shown in FIG. 7 can judge whether the target user account is successfully created. If the creation is successful, the permission transfer of the smart device in the apartment can be realized. If the creation fails, the transfer operation needs to be restarted. In some embodiments.
  • the target owner may initiate a login request to the cloud smart device management device by using the target owner account after receiving the prompt message indicating that the permission transfer is successful from the cloud smart device management device.
  • the cloud intelligent device management device After receiving the login request initiated by the target owner account, the cloud intelligent device management device controls the target owner account to log in to the intelligent device management platform.
  • the cloud intelligent device management device may further determine whether the target owner account is incorrect, and whether the target owner account has login authority. When the target owner account is accurate and the target owner account has login permissions, control the target owner account to log in to the smart device management platform; when the target owner account is incorrect or the target owner account does not have login permissions, the target is prohibited The owner account logs in to the platform, and at the same time, it can also feedback the reason for the login failure and return to the login interface.
  • Step 902 When a device information viewing request initiated by the target owner account is received, the device information of the smart device associated with the target owner account is displayed.
  • the smart device is a smart door lock.
  • the target owner can initiate a door lock information viewing request to the platform, and the platform responds to the door lock information viewing request and displays
  • the door lock information of the smart door lock associated with the target owner account such as unlocking records, door lock device abnormality information, etc., where the door lock device abnormality information may include an anti-theft alarm, a password multiple error alarm, Door lock low battery alarm, etc.
  • Step 903 When a device information modification request initiated by the target owner account is received, modify the device information of the smart device associated with the target owner account.
  • the target owner logs in to the platform using the target owner account, he can also initiate a door lock information modification request to the platform, and the platform responds to the door lock information modification request to modify the target
  • the door lock information of the smart door lock associated with the owner account such as the management password, tenant password, temporary password, Bluetooth authorization information, fingerprint authorization information, etc.
  • the modification of Bluetooth authorization information and fingerprint authorization information mainly refers to the issuance, modification, and deletion of Bluetooth authorization and fingerprint authorization.
  • the management function of the smart door lock may include:
  • the target owner account when a request for viewing the listing information initiated by the target owner account is received, displaying the listing information associated with the target owner account; when receiving the listing information initiated by the target owner account When the modification request is made, the property information associated with the target owner account is modified.
  • the smart device management process provided by this embodiment is applied to a cloud-based smart device management device, and when a login request initiated by the target owner account is received, controls the target owner account to log in to the smart device management platform; Displaying the door lock information of the smart device associated with the target owner account when a request for viewing the door lock information initiated by the target owner account is received; when a request for modifying the door lock information initiated by the target owner account is received, The door lock information of the smart device associated with the target owner account is modified to achieve effective management of the smart device by the target owner.
  • FIG. 10 is a flowchart illustrating an example of a smart door lock management service according to some embodiments of the present application.
  • This embodiment describes the process of the smart door lock management service based on the perspective of the apartment operator and the owner, taking the smart door lock as an example.
  • the apartment operator will split the house authority (step 1001), and the expired house in the house information stored in the smart door lock management system The information is sorted out, and the expired status of the listing is assigned. The system automatically assigns the expired status of the smart door lock corresponding to the expired listing.
  • the house right includes the management function right of the smart door lock.
  • the apartment operator selects the target house in the system interface (step 1002), enters the mobile phone number of the target owner (step 1003), and determines that the information entered is correct, and sends it to the cloud intelligent device management device (on which intelligent device management is deployed) Platform) sends a permission transfer instruction (step 1004).
  • the cloud intelligent device management device responds to the permission transfer instruction, creates a target owner account (step 1005), and automatically establishes a listing association (step 1006), that is, changes the ownership information of the target house to the target owner account, and establishes the target. Association between the property and the target owner account; and establish a door lock association (step 1007), that is, change the ownership information of the intelligent door lock of the target house to the target owner account and establish the intelligent door lock of the target house Association with the target owner account.
  • the cloud intelligent device management device determines whether the target owner account is successfully created, and whether the ownership information of the target house has been successfully changed, and whether the management function ownership information has been successfully changed, that is, whether it is consistent with the transfer of authority Success condition (step 1008), if yes, send a prompt message to the target owner (step 1009) to indicate that the transfer of authority is successful, and the target owner account number and management password can be carried in the prompt message, so that the target owner can pass the target owner account Manage the target house and its corresponding smart door lock; if not, the cloud intelligent device management device automatically rolls back to the interface waiting for the apartment operator to select the target house (step 1002) and prompts the cause of the error.
  • the cloud intelligent device management device completes the permission transfer, and the apartment operator will lose all management rights to the target house and the smart door lock corresponding to the target house.
  • the target owner can use the target owner account to log in to the smart device management platform (step 1010).
  • the cloud intelligent device management device determines whether the target owner account entered by the target owner is accurate and has login permissions, that is, determines whether the login conditions are met (step 1011). If so, the cloud intelligent device management device controls the target owner account to log in to the smart device deployed on The device management platform, if not, the target owner account is forbidden to log in to the platform and prompts a login failure, and returns the reason for the failure.
  • the listing information can be viewed in the platform (step 1012) to view the listing information associated with the target owner account, or the door lock information (step 1013) to view the door lock information of the smart door lock corresponding to the listing information associated with the target owner account, and to modify the listing information and the door lock information.
  • the target owner can also modify the management password in a timely manner (step 1014), preventing the apartment operator from continuing to use the management password to operate the smart door lock.
  • the target owner After the target owner has grasped the management function authority of the smart door lock, he can use the mobile device of the smart door lock management system to send unlock instructions to the smart door lock (step 1015) to control the opening of the smart door lock (step 1016), thereby establishing Door lock association (step 1017).
  • the above content provided in this embodiment specifically describes the process of the smart door lock management business from the perspective of the apartment operator and the owner.
  • the smart door lock management method of the present invention the smart door lock management based on the housing dimension is realized.
  • the separation and transfer of functional authority enables the target owner to also comprehensively and effectively manage the smart door lock, realizes the refined management and intelligent management of the smart door lock, and improves the flexibility of the smart door lock management scheme.
  • the management method of smart door locks is described here, this application is not limited to managing door locks, but can also be used to manage various other smart devices, including but not limited to appliances, lockers, Shared items, etc.
  • An embodiment of the present invention further provides a cloud-based smart device management apparatus, which is used to implement the smart device management method provided by the foregoing embodiment of the present invention.
  • the technical content of the smart device management apparatus described below can be described with the above.
  • the technical content of the smart device management method is cross-referenced.
  • the intelligent device management apparatus may be implemented by using a server (such as the server 110 shown in FIG. 1).
  • FIG. 11 is a schematic structural diagram of a cloud intelligent device management apparatus according to some embodiments of the present application.
  • the cloud smart device management device of this embodiment is configured to implement the smart device management method of the foregoing embodiment.
  • the cloud smart device management device stores listing information, and the smart device corresponding to the listing information Management function ownership information.
  • the cloud intelligent device management apparatus includes a target obtaining unit 1110, an instruction receiving unit 1120, an account creation unit 1130, and a device changing unit 1140.
  • a target acquisition unit 1110 configured to acquire target house information and target owner information
  • the instruction receiving unit 1120 is configured to receive a permission transfer instruction corresponding to the target house information.
  • An account creation unit 1130 configured to create a target owner account that matches the target owner information in response to the permission transfer instruction
  • the device changing unit 1140 is configured to change the management function ownership information of the smart device corresponding to the target house information to the target owner account.
  • the intelligent device management apparatus obtains target house information and target owner information, receives a permission transfer instruction corresponding to the target house information, and creates a phase corresponding to the target owner information in response to the permission transfer instruction.
  • the matching target owner account number changes the management function ownership information of the smart device corresponding to the target listing information to the target owner account number, thereby realizing the separation and transfer of the smart device management function authority based on the property dimension. So that the target owner can also comprehensively and effectively manage smart devices, realize the refined management and intelligent management of smart devices, and improve the flexibility of smart device management solutions.
  • FIG. 12 is another schematic structural diagram of a cloud smart device management apparatus according to some embodiments of the present application.
  • the smart device management apparatus of this embodiment may include a process control unit 1210 in addition to the target obtaining unit 1110, the instruction receiving unit 1120, the account creation unit 1130, and the device changing unit 1140 in the foregoing embodiment.
  • At least one of the house change unit 1220, the login control unit 1230, the door lock viewing unit 1240, and the door lock modification unit 1250 Through the device shown in FIG. 12, not only the apartment operator can transfer the ownership information of the house / house equipment, but also the owner can view and / or modify the house equipment information.
  • the target acquisition unit 1110 may include:
  • a first obtaining unit configured to obtain expired listing information and a target listing selection operation
  • a second obtaining unit is configured to obtain target house information from the expired house information according to the target house selection operation.
  • the process control unit 1210 is configured to re-execute the acquisition target when the target owner account creation fails or the management function ownership information of the smart device corresponding to the target listing information fails to be changed. Steps for listing information and target owner information.
  • the target listing information includes ownership information of the target listing, and the listing changing unit 1220 is configured to change the ownership information of the target listing to the target owner account.
  • the process control unit 1210 is further configured to: when the ownership information of the target house fails to be changed, re-execute the step of obtaining the target house information and the target owner information.
  • the login control unit 1230 is configured to control the target owner account to log in to the smart device management system when a login request initiated by the target owner account is received;
  • the device viewing unit 1240 is configured to display device information of a smart device associated with the target owner account when a device information viewing request initiated by the target owner account is received;
  • the device modification unit 1250 is configured to modify device information of a smart device associated with the target owner account when receiving a device information modification request initiated by the target owner account.
  • the device may further include a house viewing unit and a house modification unit.
  • the listing viewing unit is configured to: when a listing information viewing request initiated by the target owner account is received, display the listing information associated with the target owner account; the listing modification unit is configured to: When a request for modifying the listing information initiated by the target owner account is received, the listing information associated with the target owner account is modified.
  • the cloud intelligent device management device realizeds the separation and transfer of the intelligent device management function authority based on the property dimension, so that the target owner can also comprehensively and effectively manage the intelligent device, and realize the refined management of the intelligent device.
  • intelligent management it improves the flexibility of smart device management solutions, improves the automatic rollback operation after system execution failure, improves the robustness of smart device management processes, and achieves the effective management of smart devices by target owners.
  • FIG. 13 is an example application scenario diagram of a cloud smart device management apparatus according to some embodiments of the present application.
  • This embodiment takes the smart door lock as an example, and describes the application scenario of the cloud smart device management device 1310 in combination with the smart door lock 1320, the apartment operator 1330, and the target owner 1340.
  • the application scenario of the cloud intelligent device management device 1310 involves a smart door lock 1320, an apartment operator 1330 and a target owner 1340, and a smart device management device 1310. It can be understood that, in addition to the permission transfer applied to smart door locks, the technical solution of this application can also be applied to the permission transfer of other smart devices, such as the smart devices in various places such as enterprises, schools, and homes mentioned above.
  • any of the apartment operator 1330 and the owner can initiate the termination of the contract. After confirming the termination of the contract, the apartment operator 1330 can perform a permission transfer operation for the target owner 1340 and send a permission transfer instruction to the smart device management device 1310.
  • the target owner 1340 After the target owner 1340 obtains the management function authority of the smart door lock 1320, it can send a device control instruction to the cloud smart device management device 1310 to implement the control and management of the smart door lock 1320.
  • the cloud intelligent device management device 1310 judges whether the target owner account is successfully created, whether the ownership information of the target house is successfully changed, and whether the management function ownership information is successfully changed. If successful, the ownership information of the target house and the management function ownership information are changed to the target owner account number, so that the target owner 1340 can effectively manage the smart door lock 1320 by using the target owner account number.
  • the cloud intelligent device management device 1310 After receiving the device control instruction from the target owner 1340, the cloud intelligent device management device 1310 judges whether the target owner account is accurate and has login privileges. If so, it controls the target owner account login and responds to the target owner 1340 using the target owner Information viewing and information modification operations performed by the account.
  • a data connection is also established between the cloud smart device management device 1310 and the smart door lock 1320.
  • the smart device management device 1310 can send door lock control instructions to the smart door lock 1320, and can also receive door lock usage data uploaded by the smart door lock 1320. (Such as door lock device information, password data, unlocking records, Bluetooth authorization information, etc.).
  • the above-mentioned technical content provided in this embodiment describes an application scenario of a cloud intelligent device management device in combination with an apartment operator, an owner, and a smart door lock.
  • a smart device based on a property dimension is implemented
  • the separation and transfer of management function authority enables the target owner 1340 to also comprehensively and effectively manage smart devices, realizes refined management and intelligent management of smart devices, and improves the flexibility of smart device management solutions.
  • the cloud intelligent device management device includes a processor and a memory.
  • the login control unit 1230, the device viewing unit 1240, the device modification unit 1250, the first acquisition unit, the second acquisition unit, the listing viewing unit, and the listing modification unit are all stored in the memory (for example, the storage device 150) as a program unit.
  • the processor executes the above program unit stored in the memory to achieve the corresponding function.
  • the processor contains a kernel, and the kernel retrieves the corresponding program unit from the memory.
  • the kernel can set one or more, and adjust the kernel parameters to solve the technical problem that the current owner cannot comprehensively and effectively manage the smart device.
  • Memory may include non-persistent memory, random access memory (RAM), and / or non-volatile memory in computer-readable media, such as read-only memory (ROM) or flash memory (RAM).
  • Memory includes at least one Memory chip.
  • the device management method of the present application can also be used to manage passwords of electronic devices.
  • the password of the electronic device 130 may be stored locally after being encrypted, and the encryption key and the encrypted password value may be stored in different areas to improve password security.
  • the administrator can remotely manage the password of the electronic device 130 through the user terminal 140, or the electronic device 130 can automatically implement password management at the local end according to the pre-stored information. The following describes the storage and management of passwords in electronic devices in detail.
  • FIG. 14 is a flowchart of a password management method according to some embodiments of the present application.
  • the method encrypts the password, and stores the encryption key and the encrypted password value in different areas of the electronic device.
  • at least part of the process may be performed by the electronic device 140.
  • the password management method includes:
  • Step 1401 Store the password information in a first storage area of the electronic device.
  • the password information includes a password identification and an encryption key associated with the password identification.
  • the encryption key can be used to encrypt the original password value to obtain the encrypted password value; it can also be used to decrypt the encrypted password value to obtain the decrypted password value.
  • the original password value is a plain text password value that can be input by a user, and the decryption password value is consistent with the original password value.
  • Step 1402 Store the password data in a second storage area of the electronic device.
  • the password data includes the password identifier and an encrypted password value associated with the password identifier.
  • the password identifier may be used to establish a one-to-one correspondence between password information and password data, that is, a one-to-one correspondence between password information and password data having the same password identifier.
  • the encrypted password value is obtained by encrypting the original password value by using the encryption key, that is, the encrypted password value is stored in the electronic device instead of the original password value. Therefore, even if an illegal element obtains the electronic value, The encrypted password value stored in the device also cannot obtain the original password value, thereby preventing criminals from obtaining the original password value by cracking the password storage area.
  • the original password may be encrypted by the information generation module 301 shown in FIG. 3 to obtain an encrypted password value, and the encryption password value and the encryption key are stored in the first storage area and the second by the storage module 302, respectively. Storage area.
  • the second storage area of the electronic device is different from the first storage area, that is, the first storage area and the second storage area respectively correspond to different storage addresses.
  • the encryption password value and the encryption key are respectively stored in different storage areas in the electronic device, so that the encryption password value is separated from the encryption key, making it difficult for a criminal to crack the original password value even if the encryption password value is obtained.
  • the storage format of the password information can be shown in Table 1 below:
  • ID1 Encryption key1 Password attribute 1
  • ID2 Encryption key2 Password attribute 2
  • ID3 Encryption key3 Password attribute 3
  • the password information shown in 1 further includes a password attribute, which is also associated with a password identifier, and the password attribute can be used to set password management parameters.
  • the storage format of the password data can be shown in Table 2 below:
  • ID1 Encrypted password value 1
  • ID2 Encrypted password value 2
  • ID3 Encrypted password value 3 ... ...
  • IDn Encrypted password value n
  • n is a natural number.
  • steps 1401 to 1402 can also be used to implement the password adding process.
  • the password information with the password identification "1000" is added to the password information of the first storage area, and the password identification is "1000 "" Is added to the password data in the second storage area.
  • password addition may be performed by the instruction execution module 304 shown in FIG. 3 in response to the password addition instruction received by the receiving module 303.
  • the first storage area can be automatically traversed to find the vacant positions in the first storage area, and the password information to be added is written in the vacant positions in the first storage area; and, the second path is automatically traversed.
  • the storage area finds an empty position in the second storage area, and writes the password data to be added into the empty position in the second storage area.
  • the password adding process may be performed in response to a password adding instruction issued by a remote server.
  • the password management method provided in this embodiment is applied to an electronic device.
  • the encrypted password value is stored in the electronic device instead of the original password value, so that criminals cannot obtain the original password value by cracking the password storage address;
  • the key and the encrypted password value are respectively stored in different storage areas of the electronic device, which makes it more difficult for criminals to crack the encrypted password value to obtain the original password value; and uses the encryption key and the encrypted password value to manage the password, Prevents criminals from passing password verification by illegally tampering with passwords or adding new passwords. Therefore, the password management scheme of the present invention greatly improves the security of the password.
  • the password information includes a password identifier and an encryption key corresponding to the password identifier.
  • the encryption key may be generated by using a password generation algorithm according to preset data corresponding to the password identifier.
  • FIG. 16 is a flowchart of an encryption key generation process according to some embodiments of the present application.
  • this embodiment further provides a process of generating an encryption key associated with the password identifier.
  • this process may be implemented by the electronic device 140.
  • the encryption key may be generated by the information generation module 301 shown in FIG. 3.
  • the generation process of the encryption key includes:
  • Step 1601 Obtain the password identifier and preset data in the electronic device.
  • the password identification Before generating the encryption key associated with the password identification, the password identification may be automatically generated by the electronic device, or may be set by the user.
  • the preset data in the electronic device may be unique identification data provided by the electronic device, such as a MAC address, a serial number, etc., or may be obtained by encoding the unique identification data of the electronic device by using a preset encoding method.
  • the preset encoding data may also be unique identification data delivered uniformly by the server. Therefore, the preset data of the electronic device may be unique, that is, different electronic devices have different preset data.
  • Step 1602 Generate an encryption key associated with the password identifier according to the password identifier and the preset data.
  • a preset key generation algorithm may be adopted, and a cryptographic key and preset data are used as a cryptographic key generation parameter to generate an encryption key associated with the cryptographic ID, as shown in FIG. 17,
  • the encryptor in 17 has a preset key generation algorithm built in and can be used to implement the encryption key generation process.
  • the encryption key generation process provided in this embodiment generates an encryption key associated with the password identifier according to a previously obtained password identifier and preset data in the electronic device, so that different electronic devices and different passwords
  • the identification can correspond to different encryption keys, ensuring the uniqueness of the encryption key, increasing the difficulty of cracking the encryption password value, and further improving the security of the password.
  • FIG. 18 is a flowchart of a password update process according to some embodiments of the present application. This process may be a specific application of the device management method shown in FIG. 2. Specifically, the flow describes a method for the electronic device to perform a password update in response to a password update instruction. In some embodiments, at least part of the process shown in FIG. 18 may be performed by the electronic device 130.
  • FIG. 19 is a schematic diagram of a password update process according to some embodiments of the present application.
  • the password update process includes:
  • Step 1801 Obtain a new password value associated with the first password identifier.
  • this step may be performed by the receiving module 303 shown in FIG. 3.
  • the first password identifier may be any password identifier (such as the password identifier “1000” in FIG. 19) that is already stored in the password information stored in the first storage area of the electronic device; the new password value associated with the first password identifier may be Is the new original password value associated with the first password identifier set by the user.
  • Step 1802 Use the encryption key associated with the first password identifier to encrypt the new password value to obtain a new encrypted password value.
  • the instruction execution module 304 shown in FIG. 3 may perform encryption in response to the new password value received by the receiving module 303 to obtain the new encrypted password value.
  • Step 1803 Update the encrypted password value associated with the first password identifier in the password data stored in the second storage area to the new encrypted password value.
  • the password update may be performed by the instruction execution module 304 shown in FIG. 3 in response to the password update instruction received by the receiving module 303.
  • the password update process may also update the password attribute associated with the password identifier in the password information.
  • the process of updating the password attribute may include: obtaining a new password attribute associated with the second password identifier; and among the password information stored in the first storage area, the password attribute associated with the second password identifier To update to the new password attribute.
  • the second password identifier may be any password identifier existing in the password information stored in the first storage area of the electronic device; and the new password attribute associated with the second password identifier may be a user-set and the second password. Identifies the associated new password attribute.
  • the password update process may be performed in response to a password update instruction issued by the remote server.
  • the password update process obtained in this embodiment obtains a new password value associated with the first password identifier, and uses the encryption key associated with the first password identifier to encrypt the new password value to obtain a new encryption.
  • the password value, and finally the encrypted password value associated with the first password identifier in the password data stored in the second storage area is updated to the new encrypted password value, thereby realizing the update of the encrypted password value; using type Way, you can also implement the update process of the password attribute.
  • the local device management information is updated according to the received device management instruction or the specified operation is performed in conjunction with the local device management information.
  • the device management instruction may be a password management instruction.
  • the electronic device Local password information can be managed according to password management instructions, including but not limited to invalidating passwords, deleting passwords, marking password status, marking password periodicity, and so on.
  • FIG. 20 is a schematic diagram of a password invalidation process according to some embodiments of the present application.
  • the password invalidation operation may be performed by the instruction execution module 304 shown in FIG. 3 in response to the password invalidation instruction received by the receiving module 303.
  • the electronic device may automatically implement password invalidation according to the pre-stored information.
  • the password attribute in the password information may include at least one of password authority, password status, password start time, password end time, and password cycle flag. That is, the password information may further include a password end time associated with the password identification.
  • the third password identifier is deleted from the password information stored in the first storage area. And an encryption key associated with the third password identifier, and deleting the third password identifier from the password data stored in the second storage area.
  • the current time may be obtained according to a system time of the electronic device, or may be obtained from a network.
  • the above password deletion operation may also be performed in response to a password deletion instruction issued by a remote server.
  • the deletion operation may also be performed by the instruction execution module 304.
  • deletion operation in addition to deleting the third password identifier and the encryption key associated with the third password identifier from the password information stored in the first storage area, and removing the third password identification from the second storage area, other password information and password data associated with the third password identifier may be deleted from the first storage area and the second storage area, that is, Delete all content associated with the third password identification from the first storage area and the second storage area.
  • the password permission is used to mark whether the password has the password management permission. Based on passwords with password management authority, you can perform management operations on other passwords without management authority.
  • the password status is used to mark the current state of the password, such as whether the password is frozen. If the electronic device receives the password freeze instruction carrying the fourth password identifier issued by the remote server, the password state associated with the fourth password identifier in the first storage area is set to the frozen state, so that the password associated with the fourth password identifier is Not available; if the electronic device receives a password unfreezing instruction that carries the fourth password identifier from the remote server, the password state associated with the fourth password identifier in the first storage area is set to the unfrozen state to associate the fourth password identifier
  • the password is available for thawing.
  • the above freezing and thawing operations may be performed by the instruction execution module 304 as shown in FIG. 3 in response to the freezing or thawing instructions received by the receiving module 303.
  • the password start time and password end time are used to mark the aging of the password.
  • the password verification is valid only when the current time is between the password start time and the password end time.
  • the current state of the password can also be automatically maintained according to the age of the password and the current time. For example, if the current time is earlier than the start time of the password associated with the fourth password identifier, the current state of the password associated with the fourth password identifier is set to an unavailable state.
  • the password period flag is used to mark whether the password is a periodic password. If the electronic device receives the periodic setting instruction carrying the fourth password identifier issued by the remote server, the password period flag associated with the fourth password identifier in the first storage area is set to TRUE, and the fourth password identifier is associated. Passwords have a period attribute, which is available for a preset period.
  • a parameter of the password end time in the password information is used in combination with the current time to realize the automatic deletion process after the password expires, which improves the efficiency of password management.
  • parameter configuration in terms of password authority, password status, password periodicity, etc. is achieved, further improving password management efficiency.
  • FIG. 21 is a flowchart of a password verification process according to some embodiments of the present application.
  • the password verification operation may be performed by the instruction execution module 304 shown in FIG. 3 in response to the password verification instruction received by the receiving module 303.
  • this embodiment also provides a corresponding password verification process.
  • the password verification process includes:
  • Step 2101 Obtain the authentication password value entered by the user.
  • the verification password value refers to a password value to be verified, which is usually manually input by a user, or is input by a user through a radio frequency card and obtained by an electronic device through radio frequency identification.
  • the user may enter a password on the user terminal 140 or directly enter the password on the electronic device 130.
  • Step 2102 Use the encryption key in the password information stored in the first storage area to decrypt the encrypted password value in the password data stored in the second storage area to obtain a decrypted password value.
  • the encrypted password value in the second storage area needs to be decrypted by using the encryption key in the first storage area to obtain the decrypted password value.
  • the first storage area includes one or more encryption keys
  • the second storage area includes one or more encryption password values.
  • Decrypting the encrypted password value in the password data stored in the second storage area by using the encryption key in the password information stored in the first storage area includes: using the password information stored in the first storage area All the encryption keys in the decryption method respectively decrypt the corresponding encrypted password values in the password data stored in the second storage area to obtain all the decrypted password values.
  • Step 2103 Determine whether the verification password value and the decryption password value match, and if yes, go to step 2104; otherwise, go to step 2105.
  • the matching of the verification password value with the decryption password value means that the verification password value is the same as the unique decryption password value, and both are original password values;
  • the matching of the verification password value with the decryption password value means that the verification password value is the same as one of the decryption password values, which can be specifically adopted.
  • the verification password value entered by the user is accurate and the encrypted password value stored in the second storage area has not been tampered with, the verification password value and the decryption password value should match; otherwise, the verification password value and the decryption password value will not match.
  • Step 2104 Determine that the password verification is successful.
  • Step 2105 Determine that the password verification has failed.
  • the verification password value matches the decryption password value, it is determined that the password verification is successful; otherwise, it is determined that the password verification has failed.
  • the electronic device is a smart password lock, the password will be opened if the password verification is successful, and the lock will not be unlocked if the password verification fails.
  • the electronic device uses the encryption key of the first storage area to pair the tampered encrypted password.
  • the electronic device can also upload the error type of the password verification failure to the server, and the server forwards it to the legal user of the electronic device, so that the legal user of the electronic device knows the situation in time.
  • the tampered encrypted password value is decrypted by using the encryption key of the first storage area, even if a decrypted password value can be successfully decrypted, the criminal cannot know what the decrypted password value is, and it is also impossible to adopt a valid The password value is decrypted to successfully pass the password verification, thereby preventing a criminal from successfully passing the password verification by tampering with the password value.
  • a preset encryption algorithm can be used. Even if the criminal obtains the encryption key and the encryption password value at the same time, as long as he does not know the encryption algorithm, he cannot obtain it. To a valid decryption password value, it is not possible to use the encryption key to encrypt the custom password value into a valid encrypted password value, thereby further preventing criminals from effectively tampering with and adding the encrypted password value.
  • the password verification process obtained in this embodiment obtains a verification password value input by a user, and uses the encryption key in the password information stored in the first storage area to encrypt the encrypted password value in the password data stored in the second storage area. Decryption is performed to obtain the decryption password value, and the success or failure of password verification is determined according to whether the verification password value matches the decryption password value. Even if the criminals tamper with the encrypted password value stored in the second storage area, they cannot obtain Corresponding decryption password value, it is impossible to input a verification password value that matches the decryption password value, thereby improving the accuracy and security of the password verification process.
  • the embodiment of the present invention further provides a password management device, which is used to implement the password management method provided by the embodiment of the present invention.
  • the technical content of the password management device described below can be compared with the technology of the password management method described above. The contents refer to each other.
  • FIG. 22 is a schematic structural diagram of a password management device according to some embodiments of the present application.
  • the structure may be implemented on the storage module 302 shown in FIG. 3. This structure divides different storage areas in the password management device, and is used to store password information and password data, respectively.
  • the password management device of this embodiment is configured to implement the password management method of the foregoing embodiment. As shown in FIG. 22, the device includes:
  • the password information storage unit 2210 is configured to store password information in a first storage area of the electronic device.
  • the password data storage unit 2220 is configured to store password data in a second storage area of the electronic device.
  • the password information includes a password identifier and an encryption key associated with the password identifier; the password data includes the password identifier and an encrypted password value associated with the password identifier, and the encrypted password value is The original password value is encrypted by using the encryption key; the second storage area is different from the first storage area.
  • the password management device provided in this embodiment is applied to an electronic device.
  • the encrypted password value is stored in the electronic device instead of the original password value, so that criminals cannot obtain the original password value by cracking the password storage address;
  • the key and the encrypted password value are respectively stored in different storage areas of the electronic device, which makes it more difficult for criminals to crack the encrypted password value to obtain the original password value; and uses the encryption key and the encrypted password value to manage the password, Prevents criminals from passing password verification by illegally tampering with passwords or adding new passwords. Therefore, the password management scheme of the present invention greatly improves the security of the password.
  • FIG. 23 is another schematic structural diagram of a password management device according to some embodiments of the present application.
  • the password management device of this embodiment may include, in addition to the password information storage unit 2210 and the password data storage unit 2220 in the foregoing embodiment, an encryption key generation unit 2310, a password value update unit 2320, At least one of the password attribute update unit 2330, the password invalidation processing unit 2340, and the password verification unit 2350.
  • the aforementioned encryption key generation unit 2310 may be a unit in the information generation module 301 shown in FIG. 3, a password value update unit 2320, a password attribute update unit 2330, a password invalidation processing unit 2340, and / or a password verification unit.
  • 2350 may be a unit in the instruction execution module 304.
  • the encryption key generating unit 2310 is configured to:
  • the password value updating unit 2320 is configured to:
  • the password information further includes: a password attribute associated with the password identifier; the password attribute update unit 2330 is configured to:
  • the password information further includes: a password end time associated with the password identifier; and the password invalidation processing unit 2340 is configured to:
  • the third password identifier and the encryption associated with the third password identifier are deleted from the password information stored in the first storage area. And delete the third password identifier from the password data stored in the second storage area.
  • the password verification unit 2350 is configured to:
  • the verification password value matches the decryption password value, it is determined that the password verification is successful; otherwise, it is determined that the password verification has failed.
  • the password management device provided in this embodiment guarantees the uniqueness of the encryption key through the encryption key generation unit, and increases the difficulty of cracking the encrypted password value.
  • the password update process is implemented by the password value update unit and the password attribute update unit. ; Through the password invalidation processing unit, the process of automatic deletion after password invalidation is realized, and the password management efficiency is improved; the password verification unit improves the accuracy and security of the password verification process.
  • the password management device includes a processor and a memory.
  • the processing unit 2340, the password verification unit 2350, and the like are all stored in the memory as program units, and the processor executes the above program units stored in the memory to implement corresponding functions.
  • the processor contains a kernel, and the kernel retrieves the corresponding program unit from the memory.
  • the kernel can set one or more, and adjust the kernel parameters to solve the technical problem of poor password security in the current password management scheme.
  • Memory may include non-persistent memory, random access memory (RAM), and / or non-volatile memory in computer-readable media, such as read-only memory (ROM) or flash memory (RAM).
  • Memory includes at least one Memory chip.
  • FIG. 24 is a schematic structural diagram of an electronic device according to some embodiments of the present application.
  • the electronic device may be a smart combination lock. As shown in FIG. 24, the electronic device includes: a first storage area 2410 for storing password information, and a second storage area 2420 for storing password data; in some embodiments, the first storage area 2410 and The second storage area 2420 may be a different area in the storage module 302 shown in FIG. 3.
  • the password information includes a password identifier and an encryption key associated with the password identifier; the password data includes the password identifier and an encrypted password value associated with the password identifier, and the encrypted password value is The original password value is encrypted by using the encryption key; the second storage area is different from the first storage area.
  • the electronic device provided in this embodiment stores the encrypted password value instead of the original password value, so that criminals cannot obtain the original password value by cracking the password storage address; moreover, the encryption key and the encrypted password value are stored to The different storage areas of the electronic device increase the difficulty for criminals to crack the encrypted password value to obtain the original password value; and the use of the encryption key combined with the encrypted password value to manage the password prevents criminals from illegally tampering with the password or Add a new password to pass password verification. Therefore, the password management scheme of the present invention greatly improves the security of the password.
  • the beneficial effects that the embodiments of the present application may bring include, but are not limited to: (1) remote management of electronic devices can be realized through user terminals; (2) the separation and transfer of the functions of smart device management functions based on the property dimension, Enable the target owner to also comprehensively and effectively manage smart devices, realize the refined management and intelligent management of smart devices, and improve the flexibility of smart device management solutions; (3) encrypted password values are stored in electronic devices, Instead of the original password value, the criminals cannot obtain the original password value by cracking the password storage address; (4) storing the encryption key and the encrypted password value in different storage areas of the electronic device, improving the cracking of the criminals Difficulty in obtaining the original password value by encrypting the password value; (5) using the encryption key in combination with the encrypted password value to manage the password, making it impossible for criminals to pass the password verification by illegally tampering with the password or adding a new password. Increased the security of the password to a certain extent. It should be noted that different embodiments may have different beneficial effects. In different embodiments,
  • aspects of this application can be illustrated and described through several patentable categories or situations, including any new and useful processes, machines, products, or combinations of materials, or their Any new and useful improvements. Accordingly, various aspects of the present application can be executed entirely by hardware, can be executed entirely by software (including firmware, resident software, microcode, etc.), and can also be executed by a combination of hardware and software.
  • the above hardware or software can be called “data block”, “module”, “engine”, “unit”, “component” or “system”.
  • aspects of the present application may manifest as a computer product located in one or more computer-readable media, the product including a computer-readable program code.
  • Computer storage media may contain a transmitted data signal containing a computer program code, such as on baseband or as part of a carrier wave.
  • the propagation signal may have multiple manifestations, including electromagnetic form, optical form, etc., or a suitable combination form.
  • a computer storage medium may be any computer-readable medium other than a computer-readable storage medium, which may be connected to an instruction execution system, apparatus, or device to enable communication, propagation, or transmission of a program for use.
  • Program code on a computer storage medium may be transmitted through any suitable medium, including radio, cable, fiber optic cable, RF, or similar media, or any combination of the foregoing.
  • the computer program code required for the operation of each part of this application can be written in any one or more programming languages, including object-oriented programming languages such as Java, Scala, Smalltalk, Eiffel, JADE, Emerald, C ++, C #, VB.NET, Python Etc., conventional programming languages such as C, Visual Basic, Fortran2003, Perl, COBOL2002, PHP, ABAP, dynamic programming languages such as Python, Ruby and Groovy, or other programming languages.
  • the program code can run entirely on the user's computer, or run as a separate software package on the user's computer, or partly on the user's computer, partly on a remote computer, or entirely on the remote computer or processing device.
  • the remote computer can be connected to the user's computer through any network form, such as a local area network (LAN) or wide area network (WAN), or to an external computer (for example, via the Internet), or in a cloud computing environment, or as a service Uses such as software as a service (SaaS).
  • LAN local area network
  • WAN wide area network
  • SaaS software as a service
  • numbers describing the number of components and attributes are used. It should be understood that, for such numbers used in the description of the embodiments, the modifiers "about”, “approximately” or “substantially” are used in some examples. Modification. Unless stated otherwise, “about”, “approximately” or “substantially” indicates that the number allows for a variation of ⁇ 20%. Accordingly, in some embodiments, the numerical parameters used in the specification and claims are approximate values, and the approximate values may be changed according to the characteristics required by individual embodiments. In some embodiments, the numerical parameter should take the specified significant digits into account and adopt a general digits retention method. Although the numerical ranges and parameters used to confirm the breadth of the range in some embodiments of this application are approximate values, in specific embodiments, the setting of such values is as accurate as possible within the feasible range.

Abstract

一种智能设备管理方法,该方法包括:在本地生成和存储本地设备管理信息;通过网络接收设备管理指令;根据设备管理指令更新本地设备管理信息或者结合本地设备管理信息进行指定操作。

Description

一种设备管理方法和系统
交叉引用
本申请要求2018年7月25日递交的申请号为201810824234.6的中国申请、2018年7月25日递交的申请号为201810824189.4的中国申请的优先权,上述优先权申请的内容以引用方式并入本文。
技术领域
本申请涉及信息处理领域,尤其涉及一种设备管理方法和系统。
背景技术
目前随着公寓租赁行业的高速发展,很多大型公寓运营方(中介方)在与业主签订委托租赁合同后,会对业主房源进行装修改造后再进行出租,并在与业主签订的委托租赁合同中约定,委托租赁合同解除后遗留装修材料及遗留设备归业主所有。
在成规模的公寓运营方给出的遗留设备中,智能设备已成为对房屋改造改造时的标配设备,但是,智能设备通常是由公寓运营方来进行系统化管理,无法对单个房源的智能设备进行管理功能权限的分拆转移,使得在委托租赁合同解除后,业主也只能对智能设备进行简单使用,而无法对智能门锁进行有效管理。
此外,在公寓租赁行业中,智能密码锁已经成为公寓租赁的标准配置,智能密码锁通常具备远程添加密码、远程删除密码等常用功能,为房主或公寓运营方的公寓管理提供了极大的便利。
智能密码锁的传统密码管理方案,是将门锁密码直接存储在智能密码锁的特定存储区域,但是,若有不法分子破解了门锁密码所在特定存储区域的地址信息,则会直接导致门锁密码的泄露,甚至还会导致智能密码锁中存储的门锁密码被不法分子随意篡改,甚至使不法分子可以在住户不知情的情况下在智能密码锁中随意添加新密码,从而严重影响了住户的人身安全和财产安全。由此可见,采用传统的密码管理方案来管理密码,使得密码的安全性较差,并不能有效满足用户的安全性需求。
因此,目前迫切需要一种切实有效的设备管理方案,提升用户对设备的安全有效管理。
发明内容
本申请的一方面涉及一种智能设备管理方法。该方法包括:在本地生成和存储本地设备管理信息;通过网络接收设备管理指令;根据所述设备管理指令更新所述本地设备管理信 息或者结合所述本地设备管理信息进行指定操作。
在一些实施例中,所述本地设备管理信息包括密码信息和密码数据;所述密码信息存储在所述智能设备的第一存储区域;所述密码数据存储在所述智能设备的第二存储区域;其中,所述密码信息包括密码标识以及与所述密码标识相关联的加密密钥;所述密码数据包括所述密码标识以及与所述密码标识相关联的加密密码值,所述加密密码值是利用所述加密密钥对原始密码值进行加密得到的;所述第二存储区域与所述第一存储区域不同。
在一些实施例中,所述密码信息还包括与所述密码标识相关联的密码属性;所述设备管理指令包括密码属性更新指令;所述根据所述设备管理指令更新所述本地设备管理信息或者结合所述本地设备管理信息进行指定操作,包括:根据所述密码属性更新指令更新所述密码属性。
在一些实施例中,所述本地设备管理信息包括管理功能权属信息;所述设备管理指令包括权限转移指令,所述权限转移指令包括目标用户的信息;所述根据所述设备管理指令更新所述本地设备管理信息或者结合本地设备管理信息进行指定操作,包括:根据所述权限转移指令将所述管理功能权属信息更新为所述目标用户对应的账户。
本申请的另一方面涉及一种智能设备管理装置。该装置包括:信息生成模块,用于在本地生成本地设备管理信息;存储模块,用于存储所述本地设备管理信息;接收模块,用于通过网络接收设备管理指令;指令执行模块,用于根据所述设备管理指令更新所述本地设备管理信息或者结合所述本地设备管理信息进行指定操作。
本申请的另一方面涉及一种智能设备管理设备。该设备包括至少一个处理器以及至少一个存储器:所述至少一个存储器用于存储计算机指令;所述至少一个处理器用于执行所述计算机指令中的至少部分指令以如上所述的智能设备管理方法。
本申请的另一方面涉及一种计算机可读介质,所述存储介质存储计算机指令,当计算机读取存储介质中的计算机指令后,计算机执行如上所述的智能设备管理方法。
本申请的另一方面涉及一种密码管理方法。该方法应用于电子设备,包括:将密码信息存储至所述电子设备的第一存储区域;将密码数据存储至所述电子设备的第二存储区域;其中,所述密码信息包括密码标识以及与所述密码标识相关联的加密密钥;所述密码数据包括所述密码标识以及与所述密码标识相关联的加密密码值,所述加密密码值是利用所述加密密钥对原始密码值进行加密得到的;所述第二存储区域与所述第一存储区域不同。
在一些实施例中,与所述密码标识相关联的加密密钥的生成过程包括:获取所述密码标识与所述电子设备中的预设数据;根据所述密码标识与所述预设数据,生成与所述密码标 识相关联的加密密钥。
在一些实施例中,所述方法还包括:获取与第一密码标识相关联的新密码值;利用与所述第一密码标识相关联的加密密钥,对所述新密码值进行加密,得到新加密密码值;将所述第二存储区域存储的密码数据中,与所述第一密码标识相关联的加密密码值,更新为所述新加密密码值。
在一些实施例中,所述密码信息还包括:与所述密码标识相关联的密码属性;所述方法还包括:获取与第二密码标识相关联的新密码属性;将所述第一存储区域存储的密码信息中,与所述第二密码标识相关联的密码属性,更新为所述新密码属性。
在一些实施例中,所述密码信息还包括:与所述密码标识相关联的密码结束时刻;所述方法还包括:当与第三密码标识相关联的密码结束时刻早于当前时刻时,从所述第一存储区域存储的密码信息中,删除所述第三密码标识以及与所述第三密码标识相关联的加密密钥,并从所述第二存储区域存储的密码数据中,删除所述第三密码标识。
在一些实施例中,所述方法还包括:获取用户输入的验证密码值;利用所述第一存储区域存储的密码信息中的加密密钥,对所述第二存储区域存储的密码数据中的加密密码值进行解密,得到解密密码值;若所述验证密码值与所述解密密码值相匹配,则确定密码验证成功;否则,确定密码验证失败。
一种密码管理装置,应用于电子设备,所述装置包括:密码信息存储单元,用于将密码信息存储至所述电子设备的第一存储区域;密码数据存储单元,用于将密码数据存储至所述电子设备的第二存储区域;其中,所述密码信息包括密码标识以及与所述密码标识相关联的加密密钥;所述密码数据包括所述密码标识以及与所述密码标识相关联的加密密码值,所述加密密码值是利用所述加密密钥对原始密码值进行加密得到的;所述第二存储区域与所述第一存储区域不同。
在一些实施例中,所述装置还包括密码值更新单元,所述密码值更新单元用于:获取与第一密码标识相关联的新密码值;利用与所述第一密码标识相关联的加密密钥,对所述新密码值进行加密,得到新加密密码值;将所述第二存储区域存储的密码数据中,与所述第一密码标识相关联的加密密码值,更新为所述新加密密码值。
在一些实施例中,所述密码信息还包括:与所述密码标识相关联的密码属性;所述装置还包括密码属性更新单元;所述密码属性更新单元用于:获取与第二密码标识相关联的新密码属性;将所述第一存储区域存储的密码信息中,与所述第二密码标识相关联的密码属性,更新为所述新密码属性。
本申请的另一方面涉及一种电子设备,包括:用于存储密码信息的第一存储区域,与,用于存储密码数据的第二存储区域;其中,所述密码信息包括密码标识以及与所述密码标识相关联的加密密钥;所述密码数据包括所述密码标识以及与所述密码标识相关联的加密密码值,所述加密密码值是利用所述加密密钥对原始密码值进行加密得到的;所述第二存储区域与所述第一存储区域不同。
本申请的另一方面涉及一种智能设备管理方法,应用于智能设备管理系统,所述智能设备管理系统中存储有房源信息,以及,与所述房源信息相对应的智能设备的管理功能权属信息;所述方法包括:获取目标房源信息与目标业主信息;接收与所述目标房源信息相对应的权限转移指令;响应于所述权限转移指令,创建与所述目标业主信息相匹配的目标业主账号;将与所述目标房源信息相对应的智能设备的管理功能权属信息,变更为所述目标业主账号。
在一些实施例中,所述获取目标房源信息包括:获取到期房源信息与目标房源选择操作;根据所述目标房源选择操作,从所述到期房源信息中获取目标房源信息。
在一些实施例中,所述方法还包括:当所述目标业主账号创建失败,或者,所述与所述目标房源信息相对应的智能设备的管理功能权属信息变更失败时,重新执行所述获取目标房源信息与目标业主信息的步骤。
在一些实施例中,所述目标房源信息包括目标房源的权属信息;在所述响应于所述权限转移指令,创建与所述目标业主信息相匹配的目标业主账号之后,所述方法还包括:将所述目标房源的权属信息,变更为所述目标业主账号;当所述目标房源的权属信息变更失败时,重新执行所述获取目标房源信息与目标业主信息的步骤。
在一些实施例中,在所述将与所述目标房源信息相对应的智能设备的管理功能权属信息,变更为所述目标业主账号之后,所述方法还包括:当接收到由所述目标业主账号发起的登入请求时,控制所述目标业主账号登入所述智能设备管理系统;当接收到由所述目标业主账号发起的设备信息查看请求时,展示与所述目标业主账号相关联的智能设备的设备信息;当接收到由所述目标业主账号发起的设备信息修改请求时,修改与所述目标业主账号相关联的智能设备的设备信息。
在一些实施例中,所述智能设备包括智能门锁、智能电表、智能水表、智能网关与智能监控设备中的至少一种。
在一些实施例中,当所述智能设备包括智能门锁时,所述智能门锁的管理功能包括:管理密码配置功能、租客密码配置功能、临时密码配置功能、蓝牙授权管理功能、指纹授权 管理功能、开锁记录查看功能、设备异常查看功能中的至少一项。
本申请的另一方面涉及一种智能设备管理装置,所述智能设备管理装置中存储有房源信息,以及,与所述房源信息相对应的智能设备的管理功能权属信息;所述装置包括:目标获取单元,用于获取目标房源信息与目标业主信息;指令接收单元,用于接收与所述目标房源信息相对应的权限转移指令;账号创建单元,用于响应于所述权限转移指令,创建与所述目标业主信息相匹配的目标业主账号;设备变更单元,用于将与所述目标房源信息相对应的智能设备的管理功能权属信息,变更为所述目标业主账号。
在一些实施例中,所述目标获取单元包括:第一获取单元,用于获取到期房源信息与目标房源选择操作;第二获取单元,用于根据所述目标房源选择操作,从所述到期房源信息中获取目标房源信息。
在一些实施例中,所述装置还包括:流程控制单元,用于当所述目标业主账号创建失败,或者,所述与所述目标房源信息相对应的智能设备的管理功能权属信息变更失败时,重新执行所述获取目标房源信息与目标业主信息的步骤。
在一些实施例中,所述目标房源信息包括目标房源的权属信息;所述装置还包括:房源变更单元,用于将所述目标房源的权属信息,变更为所述目标业主账号;所述流程控制单元,还用于当所述目标房源的权属信息变更失败时,重新执行所述获取目标房源信息与目标业主信息的步骤。
在一些实施例中,所述装置还包括:登入控制单元,用于当接收到由所述目标业主账号发起的登入请求时,控制所述目标业主账号登入所述智能设备管理系统;设备查看单元,用于当接收到由所述目标业主账号发起的设备信息查看请求时,展示与所述目标业主账号相关联的智能设备的设备信息;设备修改单元,用于当接收到由所述目标业主账号发起的设备信息修改请求时,修改与所述目标业主账号相关联的智能设备的设备信息。
本申请的另一方面涉及一种存储介质,所述存储介质包括存储的程序,其中,在所述程序运行时控制所述存储介质所在设备执行如前述所述的智能设备管理方法。
本申请的另一方面涉及一种处理器,所述处理器用于运行程序,其中,所述程序运行时执行如前述所述的智能设备管理方法。
附图说明
本申请将以示例性实施例的方式进一步说明,这些示例性实施例将通过附图进行详细描述。这些实施例并非限制性的,在这些实施例中,相同的编号表示相同的结构,其中:
图1为根据本申请一些实施例所示的设备管理系统的应用场景图;
图2为根据本申请一些实施例所示的设备管理方法的示例性流程图;
图3为根据本申请一些实施例所示的本地设备管理系统的示例性框图;
图4为根据本申请一些实施例所示的设备管理方法的示例性流程图;
图5为根据本申请一些实施例所示的智能设备管理方法的示例性流程图;
图6为根据本申请一些实施例所示的获取目标房源信息的过程的流程图;
图7为根据本申请一些实施例所示的智能设备管理方法的另一种流程图;
图8为根据本申请一些实施例所示的智能设备管理方法的又一种流程图;
图9为根据本申请一些实施例所示的智能设备管理过程的流程图;
图10为根据本申请一些实施例所示的智能门锁管理业务的流程示例图;
图11为根据本申请一些实施例所示的云端智能设备管理装置的一种结构示意图;
图12为根据本申请一些实施例所示的云端智能设备管理装置的另一种结构示意图;
图13为根据本申请一些实施例所示的云端智能设备管理装置的应用场景示例图;
图14为根据本申请一些实施例所示的密码管理方法的流程图;
图15为根据本申请一些实施例所示的密码添加过程的示意图;
图16为根据本申请一些实施例所示的加密密钥的生成过程的流程图;
图17为根据本申请一些实施例所示的加密密钥的生成过程的示意图;
图18为根据本申请一些实施例所示的密码更新过程的流程图;
图19为根据本申请一些实施例所示的密码更新过程的示意图;
图20为根据本申请一些实施例所示的密码失效过程的示意图;
图21为根据本申请一些实施例所示的密码验证过程的流程图;
图22为根据本申请一些实施例所示的密码管理装置的一种结构示意图;
图23为根据本申请一些实施例所示的密码管理装置的另一种结构示意图;以及
图24为根据本申请一些实施例所示的电子设备的结构示意图。
具体实施方式
为了更清楚地说明本申请实施例的技术方案,下面将对实施例描述中所需要使用的附图作简单的介绍。显而易见地,下面描述中的附图仅仅是本申请的一些示例或实施例,对于本领域的普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图将本申请应用于其它类似情景。除非从语言环境中显而易见或另做说明,图中相同标号代表相同结构或操作。
应当理解,本文使用的“系统”、“装置”、“单元”和/或“模组”是用于区分不同级别的不 同组件、元件、部件、部分或装配的一种方法。然而,如果其他词语可实现相同的目的,则可通过其他表达来替换所述词语。
如本申请和权利要求书中所示,除非上下文明确提示例外情形,“一”、“一个”、“一种”和/或“该”等词并非特指单数,也可包括复数。一般说来,术语“包括”与“包含”仅提示包括已明确标识的步骤和元素,而这些步骤和元素不构成一个排它性的罗列,方法或者设备也可能包含其它的步骤或元素。
本申请中使用了流程图用来说明根据本申请的实施例的系统所执行的操作。应当理解的是,前面或后面操作不一定按照顺序来精确地执行。相反,可以按照倒序或同时处理各个步骤。同时,也可以将其他操作添加到这些过程中,或从这些过程移除某一步或数步操作。
本申请提供了一种设备管理方法和系统。通过本申请的技术方案,用户可以对设备进行远程操控或管理。例如,可以远程转移设备的管理权属信息,或者远程修改设备的密码信息。为了加强密码的安全性,本申请采用了将加密密钥与加密密码值存储在设备本地不同区域的方案,这样即便不法分子窃取了加密密码值,也由于没有得到加密密钥而无法破解密码。
图1为根据本申请一些实施例所示的设备管理系统的应用场景图。
设备管理系统100可以用于管理设备。在一些实施例中,设备管理系统100可以用于公寓租赁行业中对公寓中各种设备的管理。需要注意的是,尽管本申请中主要以公寓租赁行业的设备管理为例进行描述,但是本申请的技术方案并不仅限于用于公寓租赁行业的设备管理,也可用于其他各种涉及设备管理的场景,例如,可以用于企业、学校、家庭等的设备管理。管理方(如公寓管理中心)通过设备管理系统100可以远程管理和/或控制系统中的设备,或者设备本地端也可以根据设置的运行参数实现自动管理。该设备管理系统100可以包括服务器110、网络120、电子设备130、用户终端140以及存储设备150。
服务器110可以处理与电子设备130的管理有关的数据和/或信息以执行本申请中描述的一种或多种功能。例如,服务器110可以获取电子设备130的运行参数,分析后确定需要对电子设备130进行的操作,生成提醒发送给用户终端140。服务器110还可以处理与用户终端140有关的数据和/或信息以执行本申请中描述的一种或多种功能。例如,服务器110可以接收用户终端140发送的管理操作,并根据管理操作生成相应管理指令发送给电子设备130,以实现对电子设备130的管理。管理操作可以为各种类型,例如可以是管理权限转移操作,服务器110根据管理权限转移操作生成相应的管理权限转移指令发送给电子设备130,完成管理权限转移。又例如管理操作还可以是与密码管理相关的操作,服务器110可以根据密码管理操作生成相应的密码管理指令发送给电子设备130,实现密码管理,如修改原密码、 冻结密码、解冻密码、删除密码等。在一些实施例中,服务器110可以是一个单个的服务器或者一个服务器群组。所述服务器群可以是集中式的或分布式的(例如,服务器110可以是一个分布式的系统)。在一些实施例中,服务器110可以是本地的或远程的。例如,服务器110可以通过网络120访问电子设备130和/或用户终端140。再例如,服务器110可以直接连接到电子设备130和/或用户终端140以访问存储的信息和/或数据。在一些实施例中,服务器110可以在一个云平台上实现。仅仅举个例子,所述云平台可以包括私有云、公共云、混合云、社区云、分布云、云之间、多重云等或上述举例的任意组合。在一些实施例中,服务器110可以在计算设备上实现。在一些实施例中,服务器110可以在移动设备上实现。
网络120可以用于信息和/或数据的交换。系统中的一个或多个部件(服务器110、电子设备130、用户终端140)之间可以通过网络120向其他部件发送信息/数据。例如,服务器110可以通过网络120从电子设备130和/或用户终端140获取数据信息。在一些实施例中,网络120可以是有线网络或无线网络中的任意一种或其组合。例如,网络120可以包括电缆网络、有线网络、光纤网络、远程通信网络、内联网、互联网、局域网(LAN)、广域网(WAN)、无线局域网(WLAN)、城域网(MAN)、公共开关电话网络(PSTN)、通用封包无线网络(GPRS)、移动电话网络、蓝牙网络、ZigBee网络、近场通讯(NFC)网络、窄带物联网NB-IoT/LoRa等或上述举例的任意组合。在一些实施例中,网络120可以包括一个或多个网络接入点。例如,网络120可能包括有线或无线网络接入点,如基站和/或互联网交换点120-1、120-2等等。通过接入点,系统100的一个或多个部件可能连接到网络120以交换数据和/或信息。
电子设备130为被管理的设备。下文中,电子设备也可被称为智能设备。在一些实施例中,电子设备130需要通过身份验证才能使用。例如,用户需要输入正确的密码才能使用电子设备130。在一些实施例中,电子设备130可以为房屋内的设备。在一些实施例中,电子设备130可以包括但不限于电子门锁、电器开关、电视、空调等电器设备。电子设备130可以接收服务器110和/或用户终端140的指令,并执行指令。例如,门锁可以接收服务器110的指令,基于指令关闭或开启。在一些实施例中,电子设备140还可以将本身的工作状态反馈给服务器110。例如,电子锁可以将开关锁状态、密码状态等信息反馈给服务器110。在一些实施例中,电子设备130本地存储有设备信息,如设备管理信息,包括但不限于身份验证信息(如密码信息、密码数据)、管理权限信息,又如设备硬件信息,包括但不限于设备型号、名称、厂商、生产日期、保修记录、电量信息、异常信息等。在一些实施例中,电子设备130上设置有传感器,用来采集信息。例如,可以有用来采集用户特征信息的传感器,通过所 述传感器可以在电子设备130本地端实现用户特征信息(如指纹信息、虹膜信息、掌静脉信息、人脸信息、声音信息等)的采集。又例如,可以有用来采集环境信息(如温度、湿度等)的传感器,通过所述传感器可以监测周围环境信息。在一些实施例中,电子设备130上还可以设置有输入/输出单元,包括但不限于扬声器、显示屏、触摸屏、手写板、话筒等,用户通过所述输入/输出单元可以与电子设备130进行交互。例如,可以在显示屏上显示设备信息、用户操作信息、处理状态/结果、监测到的环境信息等。
用户可通过用户终端140接入设备管理系统100。用户可以通过用户终端140对电子设备130进行远程操控。在一些实施例中,用户可以在用户终端140上执行设备管理操作,用户终端140将所述设备管理操作发送至服务器110,服务器110根据接收到的设备管理操作生成设备管理指令发送给电子设备130,使电子设备130根据所述设备管理指令执行相应操作。例如,用户可以通过用户终端140转移电子设备130的管理权属。又例如,用户可以通过用户终端140对电子设备130中的身份验证信息进行添加、删除、冻结、解冻等操作。在一些实施例中,用户终端140的使用者可以是管理方,如公寓管理中心的工作人员可以通过用户终端140对公寓中的智能设备进行管理。在一些实施例中,用户终端140的使用者可以是个人用户,如业主可以通过用户终端140对自己房屋中的智能设备进行管理。在一些实施例中,用户终端140可以包括但不限于台式电脑、笔记本电脑、智能手机、个人数码助理(Personal Digital Assistance,PDA)、平板电脑、掌上游戏机、智能眼镜、智能手表、可穿戴设备、虚拟显示设备、显示增强设备等。
存储设备150可以储存数据和/或指令。例如,可以存储用于身份验证的数据,如用户特征文件、密码信息和数据等。在一些实施例中,存储设备150可以存储服务器110可以执行的数据和/或指令,服务器110可以通过执行或使用所述数据和/或指令以实现本申请描述的示例性方法。在一些实施例中,存储设备150可包括大容量存储器、可移动存储器、易失性读写存储器、只读存储器(ROM)等或其任意组合。示例性的大容量存储器可以包括磁盘、光盘、固态磁盘等。示例性可移动存储器可以包括闪存驱动器、软盘、光盘、存储卡、压缩盘、磁带等。示例性易失性读写存储器可以包括随机存取存储器(RAM)。示例性RAM可包括动态随机存取存储器(DRAM)、双倍数据速率同步动态随机存取存储器(DDRSDRAM)、静态随机存取存储器(SRAM)、晶闸管随机存取存储器(T-RAM)和零电容随机存取存储器(Z-RAM)等。示例性只读存储器可以包括掩模型只读存储器(MROM)、可编程只读存储器(PROM)、可擦除可编程只读存储器(PEROM)、电可擦除可编程只读存储器(EEPROM)、光盘只读存储器(CD-ROM)和数字多功能磁盘只读存储器等。在一些实施例中,所述存储 设备150可在云平台上实现。需要注意的是,在一些实施例中,存储设备可以集成在服务器110、电子设备130、用户终端140内部。
图2为根据本申请一些实施例所示的设备管理方法的示例性流程图。在一些实施例中,该流程可以由电子设备130执行。该流程包括:
步骤201,电子设备130在本地生成和存储本地设备管理信息。本地设备管理信息是存在于电子设备130本地的、用来对电子设备130进行管理的信息。在一些实施例中,本地设备管理信息可以包括密码信息和密码数据,密码可以为例如字符密码、图案密码、手势密码等。密码信息包括密码标识以及与密码标识相关联的加密密钥,密码数据包括密码标识以及与密码标识相关联的加密密码值,加密密码值可以通过利用所述加密密钥对原始密码值进行加密得到的。在一些实施例中,上述密码信息还可以包括密码属性,密码属性包括但不限于密码状态、密码有效时间、密码周期属性,通过更新密码数据可以实现密码管理。在一些实施例中,本地设备管理信息可以包括管理权限信息,用来限制电子设备130的管理权限。管理权限信息可以包括授权用户信息,例如授权用户的用户标识、账号名称等,只有授权用户才能够对电子设备130进行管理。管理权限信息还可以包括授权用户的授权有效期,如授权起始时间、终止时间等。在一些实施例中,在当前时间在某授权用户的授权有效期内的情况下,该授权用户才能够对电子设备130进行管理。
在一些实施例中,电子设备130可以在本地进行信息采集以生成所述本地设备管理信息。例如,用户可以在电子设备130上录入密码,电子设备130根据采集到的密码生成密码信息和/或密码数据。在一些实施例中,电子设备130可以接收系统100中其他设备发送来的信息以生成所述本地设备管理信息。例如,用户可以在用户终端140上录入密码,用户终端140将所述密码发送给电子设备130,电子设备130根据接收到的所述密码生成密码信息和/或密码数据。又例如,用户可以在用户终端140上设置有权使用电子设备130的授权用户和/或授权有效期,用户终端140将该授权用户和/或授权有效期发送给服务器110,服务器110据此创建该授权用户对应的账号,并标记该账号的授权有效期。服务器110将授权用户的账号和有效期发送给电子设备130,电子设备130具体生成设备管理权限信息。
电子设备130上可设置有存储单元,用来存储所述本地设备管理信息。在一些实施例中,电子设备130可存储有经加密处理的密码,电子设备130可以将加密密钥和加密密码值存储在所述存储单元的不同区域,以提高密码安全性。例如,电子设备130可存储密码信息和密码数据,密码信息包括密码标识以及与密码标识相关联的加密密钥,密码数据包括密码标识以及与密码标识相关联的加密密码值,加密密码值可以通过利用所述加密密钥对原始密 码值进行加密得到的,电子设备130可将密码信息存储在第一存储区域,将密码数据存储在第二存储区域。有关密码存储的更多内容可以参见图14至图24及其描述,此处不再赘述。
步骤202,电子设备130通过网络接收设备管理指令。设备管理指令为用于对电子设备130进行管理的指令。在一些实施例中,根据设备管理指令可以对电子设备130中的密码信息和/或密码数据进行管理。例如,可以更新密码属性,密码属性可以包括密码状态、密码周期属性、密码失效时间等,密码状态的更新可以包括密码的冻结、解冻等,密码周期属性的更新可以包括设置密码周期标记,密码失效时间的更新可以包括修改密码失效时间。又例如,还可以添加新密码、删除或修改旧密码。在一些实施例中,根据设备管理指令可以对电子设备130中的管理权限信息进行管理。例如,可以将电子设备130的管理权属转移给目标用户。在一些实施例中,用户可以在用户终端140上进行设备管理操作,用户终端140通过网络120将所述设备管理操作信号发送给服务器110,服务器110根据所述设备管理操作信号生成设备管理指令,再通过网络120将所述设备管理指令发送给电子设备130。例如,用户在用户终端140上进行密码修改操作,用户终端140将该操作信号传送给服务器110,服务器110收到用户的密码修改操作信号后,生成密码修改指令,通过网络120发送给电子设备130。又例如,用户在用户终端140上进行权限转移操作,用户终端140将该权限转移操作信号传送给服务器110,服务器110收到该信号后生成权限转移指令,通过网络120发送给电子设备130。在一些实施例中,电子设备130可以批量接收一组设备管理指令。在一些实施例中,服务器110也可以根据自身存储的数据自动生成设备管理指令传给电子设备130。例如,服务器110上存储有授权用户的账号及其授权有效期,在当前时间超出该授权有效期时,服务器110可以自动生成使该授权用户账号失效的设备管理指令,通过网络发送给电子设备130。有关电子设备130接收设备管理指令/自动生成设备管理指令的更多内容可以参见本说明书的其他地方,如图4、图5、图7、图8及其描述。
步骤203,电子设备130根据所述设备管理指令更新所述本地设备管理信息或者结合所述本地设备管理信息进行指定操作。在一些实施例中,电子设备130可以根据所述设备管理指令更新所述本地设备管理信息。例如,所述设备管理指令为密码更新指令,则电子设备130可以根据该指令更新本地存储的密码信息和/或密码数据。又例如,所述设备管理指令为时间更新指令,则电子设备130可以根据该指令更新本地时间。在一些实施例中,电子设备130可以结合所述本地设备管理信息进行指定操作。例如,所述设备管理指令为密码删除指令,则电子设备130可以据此删除本地存储的相应密码信息和/或密码数据。又例如,所述设备管理指令为管理权限转移指令,则电子设备130可以根据该指令转移管理权限。有关电子 设备130根据所述设备管理指令更新所述本地设备管理信息或者结合所述本地设备管理信息进行指定操作的更多内容可以参见本说明书中的其他地方,如图4至图24及其描述。
应当注意的是,上述有关流程200的描述仅仅是为了示例和说明,而不限定本申请的适用范围。对于本领域技术人员来说,在本申请的指导下可以对流程200进行各种修正和改变。然而,这些修正和改变仍在本申请的范围之内。
图3为根据本申请一些实施例所示的本地设备管理装置的示例性框图。该装置可以包括信息生成模块301、存储模块302、接收模块303、指令执行模块304。
信息生成模块301可以生成本地设备管理信息。本地设备管理信息可以包括例如密码信息和密码数据,密码信息包括密码标识以及与密码标识相关联的加密密钥,密码数据包括密码标识以及与密码标识相关联的加密密码值,加密密码值可以通过利用所述加密密钥对原始密码值进行加密得到的。密码信息还可以包括密码属性,如密码状态、密码有效时间、密码周期属性等。本地设备管理信息还可以包括管理权限信息。在一些实施例中,信息生成模块301可以根据电子设备130本地采集的信息生成所述本地设备管理信息。在一些实施例中,信息生成模块301可以根据电子设备130接收到的其他部件处发送来的信息生成所述本地设备管理信息。
存储模块302可以存储信息和/或数据。在一些实施例中,存储模块302可以存储本地设备管理信息。存储模块302可以包括不同区域。在一些实施例中,针对信息生成模块301生成的密码信息和密码数据,存储模块302可以将它们存储在所述不同区域,从而实现加密密钥与加密密码值的分开存储,提高密码安全性。
接收模块303可以接收信息。在一些实施例中,接收模块303可以接收服务器110通过网络120发送来的信息。在一些实施例中,接收模块303可以接收设备信息。在一些实施例中,接收模块303可以接收服务器110通过网络120发送来的设备管理指令。
指令执行模块304可以执行指令。在一些实施例中,指令执行模块304可以根据接收模块303接收到的设备管理指令更新本地设备管理信息或者结合本地设备管理信息进行指定操作。
应当理解,图3所示的本地设备管理装置及其模块可以利用各种方式来实现。例如,在一些实施例中,该装置及其模块可以通过硬件、软件或者软件和硬件的结合来实现。其中,硬件部分可以利用专用逻辑来实现;软件部分则可以存储在存储器中,由适当的指令执行系统,例如微处理器或者专用设计硬件来执行。本领域技术人员可以理解上述的方法和装置可以使用计算机可执行指令和/或包含在处理器控制代码中来实现,例如在诸如磁盘、CD或 DVD-ROM的载体介质、诸如只读存储器(固件)的可编程的存储器或者诸如光学或电子信号载体的数据载体上提供了这样的代码。本申请的装置及其模块不仅可以有诸如超大规模集成电路或门阵列、诸如逻辑芯片、晶体管等的半导体、或者诸如现场可编程门阵列、可编程逻辑设备等的可编程硬件设备的硬件电路实现,也可以用例如由各种类型的处理器所执行的软件实现,还可以由上述硬件电路和软件的结合(例如,固件)来实现。
需要注意的是,以上对于本地设备管理装置及其模块的描述,仅为描述方便,并不能把本申请限制在所举实施例范围之内。可以理解,对于本领域的技术人员来说,在了解该装置的原理后,可能在不背离这一原理的情况下,对各个模块进行任意组合,或者构成子装置与其他模块连接。例如,在一些实施例中,图3中披露的信息生成模块301、存储模块302、接收模块303、指令执行模块304可以是一个装置中的不同模块,也可以是一个模块实现上述的两个或两个以上模块的功能。设备管理装置可以省略上述模块中的一个或多个,或者,可以包括其他模块。例如,在一些实施例中,设备管理装置还可以包括采集模块,用来采集用户信息等。设备管理装置中各个模块可以共用一个存储模块,各个模块也可以分别具有各自的存储模块。诸如此类的变形,均在本申请的保护范围之内。
图4为根据本申请一些实施例所示的设备管理方法的示例性流程图。在一些实施例中,该流程可以由服务器110执行。通过该流程可以转移设备管理权限。该流程包括:
步骤401,服务器110接收权限转移指令,所述权限转移指令包括目标设备信息和目标用户信息。目标设备为管理权限待转移的设备,目标用户为待接受目标设备管理权限的用户。目标设备可以为各种类型,例如可以为租赁设备,包括但不限于房屋、电器、储物柜等。在一些实施例中,服务器110可以接收用户终端140发送的权限转移指令。管理人员可以在用户终端140上输入目标设备信息和目标用户信息,以将所述目标设备的管理权限转移给所述目标用户。管理人员可以通过各种方式输入目标设备信息/目标用户信息,例如可以输入设备编号指定目标设备,输入用户编号、姓名、账号名和/或生物特征信息等指定目标用户;又例如可以在设备列表中选择目标设备,在用户列表中选择目标用户。管理人员可以是机构工作人员,如租赁公寓管理中心工作人员,其可以根据公寓运营方与租客订立的合同确定目标设备和目标用户,进行权限转移操作;管理人员也可以是个人用户,如业主可自行对自己的设备进行管理权限转移。
在一些实施例中,服务器110也可以自行生成权限转移指令。例如,服务器110上存储有用户有权使用设备的授权有效期,同时,管理人员可以预先设定授权有效期届满后的下一授权用户信息并发送给服务器110进行存储。服务器110可以判断当前时间是否超出用户 对设备的授权有效期,如果超出,则服务器110可自行将所述设备确定为目标设备,将预先存储的下一授权用户确定为目标用户,并生成将所述目标设备转移给所述目标用户的权限转移指令。在一些实施例中,服务器110可以定期监控当前时间是否超出授权有效期,将超出授权有效期的相应用户和设备的信息发送给用户终端140供用户查看,用户查看后可确定目标设备和/或目标用户,进行权限转移操作,用户终端140根据该操作生成权限转移指令后发送给服务器110。
步骤402,服务器110响应于所述权限转移指令,创建与所述目标用户信息相匹配的目标用户账号。在一些实施例中,所述目标用户为新用户,因此需要为其创建新的用户账号。在一些实施例中,所述目标用户在系统中已有相应账号,则无需为其创建新的账户。目标用户账号可以表现为各种形式,如用户姓名、编号、手机号、邮箱等。在一些实施例中,可以建立用户信息与用户账号的对应关系,例如一个用户账号可以对应一条或多条用户信息。根据用户账号可以确定相应的用户信息。
步骤403,服务器110将所述目标设备的管理功能权属信息,变更为所述目标用户账号。在一些实施例中,所述目标设备的管理功能权属信息为空白,即目标设备还未被授权给任何用户使用,则可以直接在目标设备的管理功能权属下添加所述目标用户账号。在一些实施例中,所述目标设备的管理功能权属原本属于某在先用户,则可以将该在先用户的账户替换为所述目标用户账号。
应当注意的是,上述有关图4所示流程的描述仅仅是为了示例和说明,而不限定本申请的适用范围。对于本领域技术人员来说,在本申请的指导下可以对图4所示流程进行各种修正和改变。然而,这些修正和改变仍在本申请的范围之内。
如上所述,本申请的方法可以用于转移各种设备的管理权限。在一些实施例中,本申请的方法可以用于转移租住空间的管理权限。租住空间包括但不限于办公场地、商用住房、民用住房、酒店、公寓等。例如,办公场地可以是长租办公室、共享办公区域等。又例如,商用住房/民用住房可以是长租房屋、分时出租房屋等。在一些实施例中,本申请的方法可以用于转移租住空间中智能设备的管理权限。租住空间中的智能设备包括但不限于智能门锁、电器等。为方便说明和理解,下面以转移公寓管理权限为例进行详细描述。
图5为根据本申请一些实施例所示的智能设备管理方法的示例性流程图。该流程可以是图2所示设备管理方法的一个具体应用。在一些实施例中,通过该流程可以转移公寓管理权限。在一些实施例中,公寓运营方可以通过用户终端远程实现公寓管理权限的转移,将房源的管理权限转移给目标用户。服务器根据用户终端发送的权限转移指令可以创建目标用户 的相应账号,并将房源的管理权限转移到目标用户的账号下,从而可以实现在前一租客租期到期时将房源租给下一个租客。在另一些实施例中,可以通过该流程实现自住房屋权限的转移。例如,可以将自住房屋的管理权限由原管理员转移给新的管理员;又例如,在达成房屋买卖时,可以将房屋的管理权限由原业主转移给新业主。在一些实施例中,图5所示的流程的至少部分可以由服务器110执行。在另一些实施例中,该流程的至少部分也可以由电子设备130执行。如图5所示,所述方法包括:
步骤501:获取目标房源信息与目标业主信息。
在公寓运营方(中介方)与业主签订委托租赁合同后,会由公寓运营方负责业主房源的租赁事宜,并为业主的房源加装智能设备;在公寓运营方与业主解除委托租赁合同后,公寓运营方会将业主的房源归还给业主,并需要将智能设备的管理功能权限转移给业主所有,使业主能够对加装的智能设备进行管理操作。
其中,目标房源是指待归还给业主的房源,目标业主是指所述目标房源的业主,也就是说,目标业主信息与目标房源信息之间具有关联关系,而系统获取目标房源信息与目标业主信息的目的,就是为了确定出待归还的房源信息与所述待归还的房源的业主信息。
房源信息可以包括房源的编号、地址、户型等信息;业主信息可以包括业主的姓名、手机号、身份证号等信息。
步骤502:接收与所述目标房源信息相对应的权限转移指令。在一些实施例中,该步骤可以由图3所示的接收模块303执行。
智能设备管理系统中记录的房源安装有相对应的智能设备,公寓运营方在确认目标房源信息与目标业主信息输入无误后,会向所述系统发出与所述目标房源信息相对应的权限转移指令,用于将目标房源对应的智能设备的管理功能权限转交给目标业主持有。
步骤503:响应于所述权限转移指令,创建与所述目标业主信息相匹配的目标业主账号。
智能设备管理系统响应于所述权限转移指令,创建与所述目标业主信息相匹配的目标业主账号,将所述目标业主账号作为与目标房源信息相对应的智能设备的管理账号,使目标业主具有所述智能设备的管理功能权限。
所述目标业主账号可以是目标业主的手机号、身份证号或其他具有唯一标识作用的账号。
步骤504:将与所述目标房源信息相对应的智能设备的管理功能权属信息,变更为所述目标业主账号。在一些实施例中,步骤503和/或步骤504可以由图3所示的指令执行模块 304执行。
在公寓运营方与业主签订委托租赁合同后,业主房源的智能设备通常是由公寓运营方安装并管理,所以在智能设备管理系统中,与所述目标房源信息相对应的智能设备的管理功能权属信息,预先记录的通常是公寓运营方的账号或者系统预设账号。
在公寓运营方与业主解除委托租赁合同后,公寓运营方会向智能设备管理系统发出权限转移指令,所述系统响应于所述权限转移指令,创建与所述目标业主信息相匹配的目标业主账号,并将与所述目标房源信息相对应的智能设备的管理功能权属信息,变更为所述目标业主账号,使得目标业主可通过目标业主账号对所述智能设备进行全面有效的管理。
智能设备的管理功能权限,是指对智能设备的管理功能的使用权限,获得了智能设备的管理功能权限,就相当于获得了智能设备的全部控制权限,而并不仅仅是智能设备的个别使用权限(如利用开锁密码打开智能门锁的权限)。所述管理功能权属信息,即为所述管理功能权限的归属信息。
在将所述管理功能权属信息变更为所述目标业主账号后,公寓运营方将失去所述目标房源信息对应的智能设备的管理权限。
本实施例提供的智能设备管理方法,应用于智能设备管理系统,获取目标房源信息与目标业主信息,接收与所述目标房源信息相对应的权限转移指令,响应于所述权限转移指令创建与所述目标业主信息相匹配的目标业主账号,将与所述目标房源信息相对应的智能设备的管理功能权属信息变更为所述目标业主账号,从而实现了基于房源维度的智能设备管理功能权限的分拆转移,使目标业主也能够对智能设备进行全面有效的管理,实现了智能设备的精细化管理与智能化管理,提高了智能设备管理方案的灵活性。
如上所述,在进行公寓管理权限转移操作前需要获取目标房源信息。图6为根据本申请一些实施例所示的获取目标房源信息的过程的流程图。公寓管理方可以根据租赁合同中约定的租期确定已到期房源,并从中选出目标房源。在一些实施例中,图6所示流程可以由服务器110执行。如图6所示,所述获取目标房源信息的过程包括:
步骤601:获取到期房源信息与目标房源选择操作。
在公寓运营方与业主解除委托租赁合同后,公寓运营方可以在智能设备管理系统中将已到期的房源信息从所述系统存储的房源信息中划归出来,并赋予房源到期状态;相应的,所述系统也可以自动对到期房源信息对应的智能设备赋予设备到期状态,如智能门锁的门锁到期状态。
具体地,公寓运营方可以在智能设备管理系统中,利用目标房源选择操作,从到期房 源信息中选择目标房源信息。
其中,委托租赁合同的解除,可由公寓运营方与业主中的任一方来发起,并由公寓运营方来进行确认。
步骤602:根据所述目标房源选择操作,从所述到期房源信息中获取目标房源信息。
智能设备管理系统在获取到目标房源选择操作后,根据所述目标房源选择操作,便可以获取到公寓运营方选择的目标房源信息。
本实施例涉及的智能设备管理系统,根据获取到期房源信息与目标房源选择操作,从所述到期房源信息中获取目标房源信息,从而实现了目标房源信息的获取;并且,所述系统还对到期房源进行了划分,从而提高了房源信息管理过程的灵活性。
图7为本申请一些实施例所示的智能设备管理方法的另一种流程图。如上所述,为实现公寓管理权限的转移,需要创建目标业主账号。图7所示的方法可以判断是否成功创建目标用户账号,如果创建成功则可实现公寓中智能设备的权限转移,如果创建失败则需要重新开始执行转移操作。在一些实施例中。
目标业主可以在接收到云端智能设备管理装置发送的表征权限转移成功的提示信息后,利用目标业主账号向云端智能设备管理装置发起登入请求。
所述云端智能设备管理装置在接收到由所述目标业主账号发起的登入请求后,控制所述目标业主账号登入智能设备管理平台。
一示例中,云端智能设备管理装置在接收到由所述目标业主账号发起的登入请求后,还可以先行判断目标业主账号是否有误,以及,目标业主账号是否具有登入权限。当目标业主账号准确无误,且,目标业主账号具有登入权限时,控制所述目标业主账号登入智能设备管理平台;当目标业主账号有误,或,目标业主账号不具有登入权限时,则禁止目标业主账号登入平台,同时,还可以反馈登入失败原因,并返回到登入界面。
步骤902:当接收到由所述目标业主账号发起的设备信息查看请求时,展示与所述目标业主账号相关联的智能设备的设备信息。
一示例中,所述智能设备为智能门锁,目标业主在利用目标业主账号登入平台后,可以向所述平台发起门锁信息查看请求,所述平台响应于所述门锁信息查看请求,展示与所述目标业主账号相关联的智能门锁的门锁信息,如,开锁记录、门锁设备异常信息等,其中,所述门锁设备异常信息可包括防撬报警、密码多次错误报警、门锁电量低报警等。
步骤903:当接收到由所述目标业主账号发起的设备信息修改请求时,修改与所述目标业主账号相关联的智能设备的设备信息。
仍以智能门锁为例,目标业主在利用目标业主账号登入平台后,还可以向所述平台发起门锁信息修改请求,所述平台响应于所述门锁信息修改请求,修改与所述目标业主账号相关联的智能门锁的门锁信息,如,管理密码、租客密码、临时密码、蓝牙授权信息、指纹授权信息等。其中,蓝牙授权信息与指纹授权信息的修改,主要是指蓝牙授权与指纹授权的发放、修改与删除。
相应的,当所述智能设备包括智能门锁时,所述智能门锁的管理功能可包括:
管理密码配置功能、租客密码配置功能、临时密码配置功能、蓝牙授权管理功能、指纹授权管理功能、开锁记录查看功能、设备异常查看功能中的至少一项。
一示例中,当接收到由所述目标业主账号发起的房源信息查看请求时,展示与所述目标业主账号相关联的房源信息;当接收到由所述目标业主账号发起的房源信息修改请求时,修改与所述目标业主账号相关联的房源信息。
本实施例提供的智能设备管理过程,应用于云端智能设备管理装置,当接收到由所述目标业主账号发起的登入请求时,控制所述目标业主账号登入所述智能设备管理平台;当接收到由所述目标业主账号发起的门锁信息查看请求时,展示与所述目标业主账号相关联的智能设备的门锁信息;当接收到由所述目标业主账号发起的门锁信息修改请求时,修改与所述目标业主账号相关联的智能设备的门锁信息,实现了目标业主对智能设备的有效管理。
图10为根据本申请一些实施例所示的智能门锁管理业务的流程示例图。
本实施例基于公寓运营方与业主的角度,以智能门锁为例,来描述智能门锁管理业务的流程。
如图10中左侧所示流程,在委托租赁合同解除后,由公寓运营方进行房源权限分拆(步骤1001),将智能门锁管理系统中存储的房源信息中的到期房源信息划归出来,并赋予房源到期状态,系统自动为到期房源对应的智能门锁赋予门锁到期状态。所述房源权限,包括智能门锁的管理功能权限。
公寓运营方在系统界面中选择目标房源(步骤1002),输入目标业主手机号(步骤1003),并在确定所输入的信息无误后,向云端智能设备管理装置(其上部署有智能设备管理平台)发送权限转移指令(步骤1004)。
云端智能设备管理装置响应所述权限转移指令,创建目标业主账号(步骤1005),并自动建立房源关联(步骤1006),即,将目标房源的权属信息变更为目标业主账号,建立目标房源与目标业主账号之间的关联关系;并建立门锁关联(步骤1007),即,将目标房源的智能门锁的权属信息变更为目标业主账号,建立目标房源的智能门锁与目标业主账号之间的 关联关系。
云端智能设备管理装置判断所述目标业主账号是否创建成功,且,所述目标房源的权属信息是否变更成功,且,所述管理功能权属信息是否变更成功,即,判断是否符合权限转移成功条件(步骤1008),若是,则向目标业主发送提示信息(步骤1009),以表示权限转移成功的,并可在提示信息中携带目标业主账号及管理密码,使目标业主可以通过目标业主账号对目标房源及其相对应的智能门锁进行管理;若否,则云端智能设备管理装置自动回滚至等待公寓运营方选择目标房源(步骤1002)的界面,并提示错误原因。
在上述流程结束后,云端智能设备管理装置完成权限转移,公寓运营方将失去对目标房源以及目标房源对应的智能门锁的全部管理权限。
如图10右侧所示流程,目标业主可以利用目标业主账号登录智能设备管理平台(步骤1010)。云端智能设备管理装置判断目标业主输入的目标业主账号是否准确无误且具有登入权限,即判断是否符合登录条件(步骤1011),若是,则云端智能设备管理装置控制目标业主账号登入其上部署的智能设备管理平台,若否,则禁止目标业主账号登入平台并提示登入失败,以及返回失败原因。
在目标业主利用目标业主账号成功登入智能门锁管理平台后,可以在平台中查看房源信息(步骤1012),以查看与目标业主账号相关联的房源信息,也可以查看门锁信息(步骤1013),以查看与目标业主账号相关联的房源信息对应的智能门锁的门锁信息,并可以对房源信息与门锁信息进行修改。目标业主还可以及时修改管理密码(步骤1014),防止公寓运营方继续使用管理密码对智能门锁进行操作。
目标业主掌握智能门锁的管理功能权限后,可以利用所述智能门锁管理系统的移动端设备向智能门锁发送开锁指令(步骤1015),以控制智能门锁开启(步骤1016),从而建立门锁关联(步骤1017)。
本实施例提供的上述内容,分别从公寓运营方与业主的角度,具体描述了智能门锁管理业务的流程,通过本发明的智能门锁管理方法,实现了基于房源维度的智能门锁管理功能权限的分拆转移,使目标业主也能够对智能门锁进行全面有效的管理,实现了智能门锁的精细化管理与智能化管理,提高了智能门锁管理方案的灵活性。需要注意的是,尽管此处描述了智能门锁的管理方法,但本申请并不仅限于用于管理门锁,也可以用于管理其他各种智能设备,包括但不限于电器、储物柜、共享物品等。
本发明实施例还提供了云端智能设备管理装置,所述智能设备管理装置用于实施本发明前述实施例提供的智能设备管理方法,下文描述的智能设备管理装置的技术内容,可与上 文描述的智能设备管理方法的技术内容相互对应参照。其中,所述智能设备管理装置可采用服务器(如图1所示服务器110)来实现。
图11为根据本申请一些实施例所示的云端智能设备管理装置的一种结构示意图。
本实施例的云端智能设备管理装置,用于实施前述实施例的智能设备管理方法,所述云端智能设备管理装置中存储有房源信息,以及,与所述房源信息相对应的智能设备的管理功能权属信息。如图11所示,所述云端智能设备管理装置包括目标获取单元1110、指令接收单元1120、账号创建单元1130以及设备变更单元1140。
目标获取单元1110,用于获取目标房源信息与目标业主信息;
指令接收单元1120,用于接收与所述目标房源信息相对应的权限转移指令。
账号创建单元1130,用于响应于所述权限转移指令,创建与所述目标业主信息相匹配的目标业主账号;
设备变更单元1140,用于将与所述目标房源信息相对应的智能设备的管理功能权属信息,变更为所述目标业主账号。
本实施例提供的智能设备管理装置,获取目标房源信息与目标业主信息,接收与所述目标房源信息相对应的权限转移指令,响应于所述权限转移指令创建与所述目标业主信息相匹配的目标业主账号,将与所述目标房源信息相对应的智能设备的管理功能权属信息变更为所述目标业主账号,从而实现了基于房源维度的智能设备管理功能权限的分拆转移,使目标业主也能够对智能设备进行全面有效的管理,实现了智能设备的精细化管理与智能化管理,提高了智能设备管理方案的灵活性。
图12为本申请一些实施例所示的云端智能设备管理装置的另一种结构示意图。如图12所示,本实施例的智能设备管理装置,除了包括前述实施例中的目标获取单元1110、指令接收单元1120、账号创建单元1130与设备变更单元1140外,还可以包括流程控制单元1210、房源变更单元1220、登入控制单元1230、门锁查看单元1240、门锁修改单元1250中的至少一项。通过图12所示的装置,不仅公寓运营方可以转移房屋/房屋设备的权属信息,而且业主可以查看和/或修改房屋设备信息。
所述目标获取单元1110可包括:
第一获取单元,用于获取到期房源信息与目标房源选择操作;
第二获取单元,用于根据所述目标房源选择操作,从所述到期房源信息中获取目标房源信息。
所述流程控制单元1210用于:当所述目标业主账号创建失败,或者,所述与所述目 标房源信息相对应的智能设备的管理功能权属信息变更失败时,重新执行所述获取目标房源信息与目标业主信息的步骤。
所述目标房源信息包括目标房源的权属信息,所述房源变更单元1220,用于将所述目标房源的权属信息,变更为所述目标业主账号。
相应的,所述流程控制单元1210还用于:当所述目标房源的权属信息变更失败时,重新执行所述获取目标房源信息与目标业主信息的步骤。
所述登入控制单元1230,用于当接收到由所述目标业主账号发起的登入请求时,控制所述目标业主账号登入所述智能设备管理系统;
所述设备查看单元1240,用于当接收到由所述目标业主账号发起的设备信息查看请求时,展示与所述目标业主账号相关联的智能设备的设备信息;
所述设备修改单元1250,用于当接收到由所述目标业主账号发起的设备信息修改请求时,修改与所述目标业主账号相关联的智能设备的设备信息。
一示例中,所述装置还可以包括房源查看单元与房源修改单元。所述房源查看单元用于:当接收到由所述目标业主账号发起的房源信息查看请求时,展示与所述目标业主账号相关联的房源信息;所述房源修改单元用于:当接收到由所述目标业主账号发起的房源信息修改请求时,修改与所述目标业主账号相关联的房源信息。
本实施例提供的云端智能设备管理装置,实现了基于房源维度的智能设备管理功能权限的分拆转移,使目标业主也能够对智能设备进行全面有效的管理,实现了智能设备的精细化管理与智能化管理,提高了智能设备管理方案的灵活性,完善了系统执行失败后的自动回滚操作,提高了智能设备管理流程的健壮性,并且实现了目标业主对智能设备的有效管理。
图13为根据本申请一些实施例所示的云端智能设备管理装置的应用场景示例图。
本实施例以智能门锁为例,结合智能门锁1320、公寓运营方1330与目标业主1340,来描述云端智能设备管理装置1310的应用场景。所述云端智能设备管理装置1310的应用场景涉及智能门锁1320、公寓运营方1330与目标业主1340以及智能设备管理装置1310。可以理解,除应用于智能门锁的权限转移外,本申请的技术方案也可应用于其他智能设备的权限转移,如上文提到企业、学校、家庭等各种场所中的智能设备。
公寓运营方1330与业主中任一方都可以发起合同解除,公寓运营方1330在确认合同解除后,可以针对目标业主1340执行权限转移操作,并向智能设备管理装置1310发送权限转移指令。
目标业主1340在获得智能门锁1320的管理功能权限后,可以向云端智能设备管理装 置1310发送装置控制指令以实现对智能门锁1320的控制管理。
云端智能设备管理装置1310在响应所述权限转移指令后,会判断目标业主账号是否创建成功、目标房源的权属信息是否变更成功以及所述管理功能权属信息是否变更成功,若三者均成功,则将目标房源的权属信息以及所述管理功能权属信息均变更为目标业主账号,使目标业主1340利用目标业主账号可对智能门锁1320进行有效管理。
云端智能设备管理装置1310在接收到目标业主1340发出的装置控制指令后,判断目标业主账号是否准确无误且具有登入权限,若是,则控制目标业主账号登入,并响应目标业主1340利用所述目标业主账号执行的信息查看与信息修改等操作。
云端智能设备管理装置1310与智能门锁1320之间也建立有数据连接,智能设备管理装置1310可以向智能门锁1320发送门锁控制指令,也可以接收由智能门锁1320上传的门锁使用数据(如门锁设备信息、密码数据、开锁记录、蓝牙授权信息等)。
本实施例提供的上述技术内容,结合公寓运营方、业主与智能门锁,来描述云端智能设备管理装置的应用场景,利用本发明的云端智能设备管理装置,实现了基于房源维度的智能设备管理功能权限的分拆转移,使目标业主1340也能够对智能设备进行全面有效的管理,实现了智能设备的精细化管理与智能化管理,提高了智能设备管理方案的灵活性。
本发明实施例提供的云端智能设备管理装置,包括处理器和存储器,上述目标获取单元1110、指令接收单元1120、账号创建单元1130、设备变更单元1140、流程控制单元1210、房源变更单元1220、登入控制单元1230、设备查看单元1240、设备修改单元1250、第一获取单元、第二获取单元、房源查看单元与房源修改单元等均作为程序单元存储在存储器(例如,存储设备150)中,由处理器执行存储在存储器中的上述程序单元来实现相应的功能。
处理器中包含内核,由内核去存储器中调取相应的程序单元。内核可以设置一个或以上,通过调整内核参数来解决目前业主无法针对智能设备进行全面有效管理的技术问题。
存储器可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM),存储器包括至少一个存储芯片。
本申请的设备管理方法还可以用于管理电子设备的密码。电子设备130的密码可以经过加密后存储在本地,并且可以将加密密钥与加密密码值存储在不同区域以提高密码安全性。管理人员可以通过用户终端140对电子设备130的密码进行远程管理,或者电子设备130可以根据预存的信息在本地端自动实现密码管理。下面详细描述电子设备中密码的存储与管理。
图14为根据本申请一些实施例所示的密码管理方法的流程图。为了提高密码安全性, 该方法对密码进行加密,并将加密密钥和加密密码值存储在电子设备的不同区域。在一些实施例中,该流程的至少部分可以由电子设备140执行。如图14所示,所述密码管理方法包括:
步骤1401:将密码信息存储至所述电子设备的第一存储区域。
所述密码信息包括密码标识以及与所述密码标识相关联的加密密钥。
所述加密密钥可以用于对原始密码值进行加密,得到加密密码值;也可以用于对加密密码值进行解密,得到解密密码值。
其中,原始密码值是可供用户输入的明文密码值,所述解密密码值与所述原始密码值相一致。
步骤1402:将密码数据存储至所述电子设备的第二存储区域。
所述密码数据包括所述密码标识以及与所述密码标识相关联的加密密码值。其中,密码标识可用于建立密码信息与密码数据之间一一对应关系,即,具有相同密码标识的密码信息与密码数据之间一一对应。
所述加密密码值是利用所述加密密钥对原始密码值进行加密得到的,也就是说,电子设备中存储的是加密密码值,而并非原始密码值,所以,即使有不法分子获取到了电子设备中存储的加密密码值,也无法得到原始密码值,从而避免不法分子通过破解密码存储区域的方式来获取到原始密码值。
在一些实施例中,可以由图3所示的信息生成模块301对原始密码进行加密,得到加密密码值,由存储模块302将加密密码值以及加密密钥分别存储在第一存储区域和第二存储区域。
所述电子设备的第二存储区域与第一存储区域不同,即第一存储区域与第二存储区域分别对应不同的存储地址。将加密密码值与加密密钥分别存储在电子设备中的不同存储区域中,使加密密码值与加密密钥相分离,使得不法分子即使获取到了加密密码值也难以破解出原始密码值。
一示例中,密码信息的存储格式可如下表1所示:
表1密码信息
ID1 加密key1 密码属性1
ID2 加密key2 密码属性2
ID3 加密key3 密码属性3
…… …… ……
IDn 加密keyn 密码属性n
表1中,“ID1、ID2、ID3……”为密码标识,“加密key1、加密key2、加密key3……”为与“ID1、ID2、ID3……”分别相关联的加密密钥,在表1所示的密码信息中,还增加了密码属性,所述密码属性也与密码标识相关联,而且,所述密码属性可用于设定密码管理参数。
一示例中,密码数据的存储格式可如下表2所示:
表2密码数据
ID1 加密密码值1
ID2 加密密码值2
ID3 加密密码值3
…… ……
IDn 加密密码值n
表2中的加密密码值与表1中的加密密钥、密码属性等内容之间,可通过各自表格中的密码标识来建立一一对应关系。其中,表1、2中,n为自然数。
一示例中,步骤1401~1402也可以用来实现密码添加过程,如图15所示,将密码标识为“1000”的密码信息添加到第一存储区域的密码信息中,将密码标识为“1000”的密码数据添加到第二存储区域的密码数据中。在一些实施例中,可以由图3所示的指令执行模块304响应于接收模块303接收到的密码添加指令执行密码添加。
在密码添加过程中,可以通过自动遍历第一存储区域来寻找第一存储区域中的空余位置,在所述第一存储区域中的空余位置写入待添加的密码信息;并且,自动遍历第二存储区域,寻找到第二存储区域中的空余位置,在所述第二存储区域中的空余位置中写入待添加的密码数据。
其中,密码添加过程可以是响应于远程服务器下发的密码添加指令而执行的。
本实施例提供的密码管理方法,应用于电子设备,电子设备中存储的是加密密码值,而不是原始密码值,使不法分子无法通过破解密码存储地址来获取到原始密码值;而且,将加密密钥与加密密码值分别存储至所述电子设备的不同存储区域,提高了不法分子破解加密密码值来获取原始密码值的难度;并且,利用加密密钥结合加密密码值的方式来管理密码,使不法分子无法通过非法篡改密码或添加新密码的方式来通过密码验证。所以,本发明的密 码管理方案,从极大程度上提高了密码的安全性。
如上所述,密码信息包括密码标识和与密码标识对应的加密密钥,加密密钥可以根据与密码标识对应的预设数据、采用密码生成算法生成。图16为根据本申请一些实施例所示的加密密钥的生成过程的流程图。
在本发明的密码管理方案中,本实施例还提供了与所述密码标识相关联的加密密钥的生成过程。在一些实施例中,该过程可以由电子设备140实现。例如,可以由图3所示的信息生成模块301生成加密密钥。
如图16所示,所述加密密钥的生成过程包括:
步骤1601:获取所述密码标识与所述电子设备中的预设数据。
在生成与密码标识相关联的加密密钥之前,所述密码标识可以是由电子设备自动生成的,也可以是由用户自行设定的。
电子设备中的预设数据,可以是电子设备自带的唯一标识数据,如MAC地址、序列号等,也可以是利用预设编码方式对所述电子设备的唯一标识数据进行编码处理后得到的预设编码数据,还可以是由服务器统一下发的唯一标识数据。所以,电子设备的预设数据可以是唯一的,即不同的电子设备具有不同的预设数据。
步骤1602:根据所述密码标识与所述预设数据,生成与所述密码标识相关联的加密密钥。
一示例中,可采用预设的密钥生成算法,将密码标识与预设数据作为加密密钥的生成参数,来生成与所述密码标识相关联的加密密钥,如图17所示,图17中的加密器内置有预设的密钥生成算法,并可用于实现加密密钥的生成过程。
本实施例提供的加密密钥的生成过程,根据预先获取到的密码标识与电子设备中的预设数据,生成与所述密码标识相关联的加密密钥,使得不同的电子设备、不同的密码标识,均可对应有不同的加密密钥,保证了加密密钥的唯一性,提高了加密密码值的破解难度,进一步提高了密码的安全性。
如上所述,本申请中电子设备可以根据接收到的设备管理指令更新本地设备管理信息或者结合本地设备管理信息进行指定操作。本地设备管理信息可以包括密码信息,相应地,设备管理指令可以包括密码更新指令,电子设备可以根据接收到的密码更新指令更新本地密码信息。图18为根据本申请一些实施例所示的密码更新过程的流程图。该流程可以是图2所示设备管理方法的一个具体应用。具体的,该流程描述了电子设备响应于密码更新指令进行密码更新的方法。在一些实施例中,图18所示流程的至少部分可以由电子设备130执行。图 19为根据本申请一些实施例所示的密码更新过程的示意图。
如图18所示,所述密码更新过程包括:
步骤1801:获取与第一密码标识相关联的新密码值。在一些实施例中,该步骤可以由图3所示的接收模块303执行。
第一密码标识可以为电子设备第一存储区域存储的密码信息中已有的任一密码标识(如图19中的密码标识“1000”);与第一密码标识相关联的新密码值,可以是用户设定的与第一密码标识相关联的新的原始密码值。
步骤1802:利用与所述第一密码标识相关联的加密密钥,对所述新密码值进行加密,得到新加密密码值。在一些实施例中,可以由图3所示的指令执行模块304响应于接收模块303接收到的新密码值进行加密,得到所述新加密密码值。
步骤1803:将所述第二存储区域存储的密码数据中,与所述第一密码标识相关联的加密密码值,更新为所述新加密密码值。在一些实施例中,可以由图3所示的指令执行模块304响应于接收模块303接收到的密码更新指令进行密码更新。
一示例中,所述密码更新过程,除了可以对密码数据中的加密密码值进行更新之外,还可以对密码信息中与所述密码标识相关联的密码属性进行更新。例如,所述密码属性更新的过程可包括:获取与第二密码标识相关联的新密码属性;将所述第一存储区域存储的密码信息中,与所述第二密码标识相关联的密码属性,更新为所述新密码属性。
其中,第二密码标识可以是电子设备第一存储区域存储的密码信息中存在的任一密码标识;与第二密码标识相关联的新密码属性,可以是用户设定的与所述第二密码标识相关联的新的密码属性。
密码更新过程可以是响应于远程服务器下发的密码更新指令执行的。
本实施例提供的密码更新过程,获取与第一密码标识相关联的新密码值,并利用与所述第一密码标识相关联的加密密钥,对所述新密码值进行加密,得到新加密密码值,最后将所述第二存储区域存储的密码数据中,与所述第一密码标识相关联的加密密码值,更新为所述新加密密码值,实现了加密密码值的更新;采用类型的方式,还可以实现密码属性的更新过程。
对于上文提到的电子设备根据接收到的设备管理指令更新本地设备管理信息或者结合本地设备管理信息进行指定操作,在一些实施例中,设备管理指令可以是密码管理指令,相应地,电子设备可以根据密码管理指令对本地的密码信息进行管理,包括但不限于使密码失效、删除密码、标记密码状态、标记密码周期性等。图20为根据本申请一些实施例所示的 密码失效过程的示意图。在一些实施例中,可以由图3所示的指令执行模块304响应于接收模块303接收到的密码失效指令执行密码失效操作。在另一些实施例中,电子设备可以根据预存信息自动实现密码失效。
如图20所示,在本发明的密码管理方案中,密码信息中的密码属性可以包括密码权限、密码状态、密码起始时刻、密码结束时刻与密码周期标记中的至少一项。也就是说,所述密码信息还可以包括与所述密码标识相关联的密码结束时刻。
当与第三密码标识(如图20中的密码标识“10”)相关联的密码结束时刻早于当前时刻时,从所述第一存储区域存储的密码信息中,删除所述第三密码标识以及与所述第三密码标识相关联的加密密钥,并从所述第二存储区域存储的密码数据中,删除所述第三密码标识。
所述当前时刻,可以是根据电子设备的系统时间获取到的,也可以是从网络中获取到的。
除了在密码失效后可以执行密码删除操作之外,还可以响应于远程服务器下发的密码删除指令,来执行上述密码删除操作。该删除操作也可以由指令执行模块304执行。
在上述删除操作中,除了可以从所述第一存储区域存储的密码信息中删除所述第三密码标识以及与所述第三密码标识相关联的加密密钥,并从所述第二存储区域存储的密码数据中删除所述第三密码标识之外,还可以从第一存储区域中与第二存储区域中删除与所述第三密码标识相关联的其他密码信息及密码数据,即,可以从第一存储区域中与第二存储区域中删除与所述第三密码标识相关联的全部内容。
在密码属性的各项内容中,密码权限用于标记密码是否具有密码管理权限。基于具有密码管理权限的密码,可以对其它不具有管理权限的密码执行管理操作。
密码状态用于标记密码的当前状态,例如密码是否处于冻结状态。若电子设备接收到远程服务器下发的携带有第四密码标识的密码冻结指令,则将第一存储区域中与第四密码标识关联的密码状态设置为冻结状态,使第四密码标识关联的密码不可用;若电子设备接收到远程服务器下发携带有第四密码标识的密码解冻指令,则将第一存储区域中与第四密码标识关联的密码状态设置为解冻状态,使第四密码标识关联的密码对解冻方可用。在一些实施例中,以上冻结和解冻操作可以由如图3所示的指令执行模块304响应于接收模块303接收到的冻结或解冻指令执行。
密码起始时刻与密码结束时刻用于标记密码的时效,只有在当前时刻位于密码起始时刻与密码结束时刻之间时,密码验证才有效。其中,根据密码的时效与当前时刻,也可以自 动维护密码的当前状态。例如,若当前时刻早于第四密码标识关联的密码起始时刻时,将第四密码标识关联的密码的当前状态设置为不可用状态。
密码周期标记用于标记密码是否为周期性密码。若电子设备接收到远程服务器下发的携带有第四密码标识的周期性设置指令,则将第一存储区域中与第四密码标识关联的密码周期标记置为TRUE,并使第四密码标识关联的密码具有周期属性,即在预设周期内可用。
本实施例提供的密码失效过程,利用密码信息中密码结束时刻这一参数,结合当前时刻实现了密码失效后自动删除的过程,提高了密码管理效率。并且,结合丰富的密码属性,实现了密码权限、密码状态、密码周期性等方面的参数配置,进一步提高了密码管理效率。
图21为根据本申请一些实施例所示的密码验证过程的流程图。在一些实施例中,可以由图3所示的指令执行模块304响应于接收模块303接收到的密码验证指令执行密码验证操作。
基于本发明的密码管理方案,本实施例还提供了相应的密码验证过程。
如图21所示,所述密码验证过程包括:
步骤2101:获取用户输入的验证密码值。
所述验证密码值是指待验证的密码值,通常是由用户手动输入的,或是由用户通过射频卡输入并由电子设备通过射频识别的方式获取到的。在一些实施例中,用户可以在用户终端140上输入密码,或者也可以直接在电子设备130上输入密码。
步骤2102:利用所述第一存储区域存储的密码信息中的加密密钥,对所述第二存储区域存储的密码数据中的加密密码值进行解密,得到解密密码值。
在每一次验证密码时,都需要利用第一存储区域中加密密钥对第二存储区域中的加密密码值进行解密,得到解密密码值。
一示例中,所述第一存储区域中包括一个或多个加密密钥,相应的,第二存储区域中包括一个或多个加密密码值。所述利用所述第一存储区域存储的密码信息中的加密密钥,对所述第二存储区域存储的密码数据中的加密密码值进行解密包括:利用所述第一存储区域存储的密码信息中的所有加密密钥,分别对所述第二存储区域存储的密码数据中相对应的加密密码值进行解密,得到所有的解密密码值。
步骤2103:判断所述验证密码值与所述解密密码值是否相匹配,若是,则执行步骤2104;否则,执行步骤2105。
若解密得到的是唯一解密密码值,则所述验证密码值与所述解密密码值相匹配是指,所述验证密码值与所述唯一解密密码值相同,均为原始密码值;若解密得到的是多个解密密 码值时,则所述验证密码值与所述解密密码值相匹配是指,所述验证密码值与所述多个解密密码值中的一个解密密码值相同,具体可采用遍历所述多个解密密码值的方式,将多个解密密码值与所述验证密码值进行一一比对,以确定所述多个解密密码值中是否存在一个解密密码值与所述验证密码值相同。
若用户输入的验证密码值准确,且第二存储区域存储的加密密码值未被篡改,则验证密码值与解密密码值应当相匹配;否则,验证密码值与解密密码值将不匹配。
步骤2104:确定密码验证成功。
步骤2105:确定密码验证失败。
若所述验证密码值与所述解密密码值相匹配,则确定密码验证成功;否则,确定密码验证失败。当电子设备为智能密码锁时,密码验证成功则开所,密码验证失败则不开锁。
如果不法分子破解了存储加密密码值的第二存储区域的地址信息,并篡改了第二存储区域中的加密密码值,则电子设备在利用第一存储区域的加密密钥对篡改后的加密密码值进行解密时,便会出现解密错误,导致密码验证失败。同时,电子设备还可以将密码验证失败的错误类型上传至服务器,并由服务器转发给电子设备的合法用户,以便电子设备的合法用户及时知晓该情况。
并且,在利用第一存储区域的加密密钥对篡改后的加密密码值进行解密时,即使能够成功解密出一个解密密码值,不法分子也无法获知该解密密码值是什么,同样无法采用有效的解密密码值来成功通过密码验证,从而防止了不法分子通过篡改密码值的方式来成功通过密码验证。
如果不法分子在破解了加密密码值的第二存储区域后,将自定义的密码值添加到第二存储区域中,会由于第一存储区域中并未存储有该自定义密码值的加密密钥,所以必然会导致该自定义的密码值的解密失败,导致密码验证失败,防止了不法分子通过添加密码值的方式来成功通过密码验证。
一示例中,采用加密密钥对原始密码值进行加密时,可采用预设的加密算法,即使不法分子同时获取到了加密密钥与加密密码值,但只要他不知道加密算法,就同样无法获取到有效的解密密码值,也无法利用加密密钥来将自定义的密码值加密成有效的加密密码值,从而进一步避免了不法分子对加密密码值的有效篡改与添加。
本实施例提供的密码验证过程,获取用户输入的验证密码值,利用所述第一存储区域存储的密码信息中的加密密钥,对所述第二存储区域存储的密码数据中的加密密码值进行解密,得到解密密码值,并根据所述验证密码值与所述解密密码值是否相匹配来确定密码验证 成功与失败,即使不法分子篡改了第二存储区域存储的加密密码值,也无法获得相应的解密密码值,也就无法输入与解密密码值相匹配的验证密码值,从而提高了密码验证过程的准确性与安全性。
本发明实施例还提供了密码管理装置,所述密码管理装置用于实现本发明实施例提供的密码管理方法,下文描述的密码管理装置的技术内容,可与上文描述的密码管理方法的技术内容相互对应参照。
图22为根据本申请一些实施例所示的密码管理装置的一种结构示意图。在一些实施例中,该结构可以在图3所示的存储模块302上实现。该结构在密码管理装置中划分出不同的存储区域,分别用来存储密码信息和密码数据。
本实施例的密码管理装置,用于实施前述实施例的密码管理方法,如图22所示,所述装置包括:
密码信息存储单元2210,用于将密码信息存储至所述电子设备的第一存储区域。
密码数据存储单元2220,用于将密码数据存储至所述电子设备的第二存储区域。
其中,所述密码信息包括密码标识以及与所述密码标识相关联的加密密钥;所述密码数据包括所述密码标识以及与所述密码标识相关联的加密密码值,所述加密密码值是利用所述加密密钥对原始密码值进行加密得到的;所述第二存储区域与所述第一存储区域不同。
本实施例提供的密码管理装置,应用于电子设备,电子设备中存储的是加密密码值,而不是原始密码值,使不法分子无法通过破解密码存储地址来获取到原始密码值;而且,将加密密钥与加密密码值分别存储至所述电子设备的不同存储区域,提高了不法分子破解加密密码值来获取原始密码值的难度;并且,利用加密密钥结合加密密码值的方式来管理密码,使不法分子无法通过非法篡改密码或添加新密码的方式来通过密码验证。所以,本发明的密码管理方案,从极大程度上提高了密码的安全性。
图23为根据本申请一些实施例所示的密码管理装置的另一种结构示意图。
如图23所示,本实施例的密码管理装置,除了包括前述实施例中的密码信息存储单元2210、密码数据存储单元2220外,还可以包括加密密钥生成单元2310、密码值更新单元2320、密码属性更新单元2330、密码失效处理单元2340、密码验证单元2350中的至少一项。在一些实施例中,上述加密密钥生成单元2310可以为图3所示信息生成模块301中的单元,密码值更新单元2320、密码属性更新单元2330、密码失效处理单元2340和/或密码验证单元2350可以为指令执行模块304中的单元。
所述加密密钥生成单元2310用于:
获取所述密码标识与所述电子设备中的预设数据;
根据所述密码标识与所述预设数据,生成与所述密码标识相关联的加密密钥。
所述密码值更新单元2320用于:
获取与第一密码标识相关联的新密码值;
利用与所述第一密码标识相关联的加密密钥,对所述新密码值进行加密,得到新加密密码值;
将所述第二存储区域存储的密码数据中,与所述第一密码标识相关联的加密密码值,更新为所述新加密密码值。
所述密码信息还包括:与所述密码标识相关联的密码属性;所述密码属性更新单元2330用于:
获取与第二密码标识相关联的新密码属性;
将所述第一存储区域存储的密码信息中,与所述第二密码标识相关联的密码属性,更新为所述新密码属性。
所述密码信息还包括:与所述密码标识相关联的密码结束时刻;所述密码失效处理单元2340用于:
当与第三密码标识相关联的密码结束时刻早于当前时刻时,从所述第一存储区域存储的密码信息中,删除所述第三密码标识以及与所述第三密码标识相关联的加密密钥,并从所述第二存储区域存储的密码数据中,删除所述第三密码标识。
所述密码验证单元2350用于:
获取用户输入的验证密码值;
利用所述第一存储区域存储的密码信息中的加密密钥,对所述第二存储区域存储的密码数据中的加密密码值进行解密,得到解密密码值;
若所述验证密码值与所述解密密码值相匹配,则确定密码验证成功;否则,确定密码验证失败。
本实施例提供的密码管理装置,通过加密密钥生成单元保证了加密密钥的唯一性,提高了加密密码值的破解难度;通过所述密码值更新单元与密码属性更新单元实现了密码更新过程;通过密码失效处理单元,实现了密码失效后自动删除的过程,提高了密码管理效率;通过密码验证单元提高了密码验证过程的准确性与安全性。
本发明实施例提供的密码管理装置,包括处理器和存储器,上述密码信息存储单元2210、密码数据存储单元2220、加密密钥生成单元2310、密码值更新单元2320、密码属性更 新单元2330、密码失效处理单元2340、密码验证单元2350等均作为程序单元存储在存储器中,由处理器执行存储在存储器中的上述程序单元来实现相应的功能。
处理器中包含内核,由内核去存储器中调取相应的程序单元。内核可以设置一个或以上,通过调整内核参数来解决目前密码管理方案中密码安全性较差的技术问题。
存储器可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM),存储器包括至少一个存储芯片。
图24为根据本申请一些实施例所示的电子设备的结构示意图。
所述电子设备可以是智能密码锁。如图24所示,所述电子设备包括:用于存储密码信息的第一存储区域2410,与,用于存储密码数据的第二存储区域2420;在一些实施例中,第一存储区域2410和第二存储区域2420可以为图3中所示存储模块302中的不同区域。其中,所述密码信息包括密码标识以及与所述密码标识相关联的加密密钥;所述密码数据包括所述密码标识以及与所述密码标识相关联的加密密码值,所述加密密码值是利用所述加密密钥对原始密码值进行加密得到的;所述第二存储区域与所述第一存储区域不同。
本实施例提供的电子设备中存储的是加密密码值,而不是原始密码值,使不法分子无法通过破解密码存储地址来获取到原始密码值;而且,将加密密钥与加密密码值分别存储至所述电子设备的不同存储区域,提高了不法分子破解加密密码值来获取原始密码值的难度;并且,利用加密密钥结合加密密码值的方式来管理密码,使不法分子无法通过非法篡改密码或添加新密码的方式来通过密码验证。所以,本发明的密码管理方案,从极大程度上提高了密码的安全性。
本申请实施例可能带来的有益效果包括但不限于:(1)通过用户终端可实现对电子设备的远程管理;(2)实现了基于房源维度的智能设备管理功能权限的分拆转移,使目标业主也能够对智能设备进行全面有效的管理,实现了智能设备的精细化管理与智能化管理,提高了智能设备管理方案的灵活性;(3)电子设备中存储的是加密密码值,而不是原始密码值,使不法分子无法通过破解密码存储地址来获取到原始密码值;(4)将加密密钥与加密密码值分别存储至所述电子设备的不同存储区域,提高了不法分子破解加密密码值来获取原始密码值的难度;(5)利用加密密钥结合加密密码值的方式来管理密码,使不法分子无法通过非法篡改密码或添加新密码的方式来通过密码验证,从极大程度上提高了密码的安全性。需要说明的是,不同实施例可能产生的有益效果不同,在不同的实施例里,可能产生的有益效果可以是以上任意一种或几种的组合,也可以是其他任何可能获得的有益效果。
上文已对基本概念做了描述,显然,对于本领域技术人员来说,上述详细披露仅仅作为示例,而并不构成对本申请的限定。虽然此处并没有明确说明,本领域技术人员可能会对本申请进行各种修改、改进和修正。该类修改、改进和修正在本申请中被建议,所以该类修改、改进、修正仍属于本申请示范实施例的精神和范围。
同时,本申请使用了特定词语来描述本申请的实施例。如“一个实施例”、“一实施例”、和/或“一些实施例”意指与本申请至少一个实施例相关的某一特征、结构或特点。因此,应强调并注意的是,本说明书中在不同位置两次或多次提及的“一实施例”或“一个实施例”或“一个替代性实施例”并不一定是指同一实施例。此外,本申请的一个或多个实施例中的某些特征、结构或特点可以进行适当的组合。
此外,本领域技术人员可以理解,本申请的各方面可以通过若干具有可专利性的种类或情况进行说明和描述,包括任何新的和有用的工序、机器、产品或物质的组合,或对他们的任何新的和有用的改进。相应地,本申请的各个方面可以完全由硬件执行、可以完全由软件(包括固件、常驻软件、微码等)执行、也可以由硬件和软件组合执行。以上硬件或软件均可被称为“数据块”、“模块”、“引擎”、“单元”、“组件”或“系统”。此外,本申请的各方面可能表现为位于一个或多个计算机可读介质中的计算机产品,该产品包括计算机可读程序编码。
计算机存储介质可能包含一个内含有计算机程序编码的传播数据信号,例如在基带上或作为载波的一部分。该传播信号可能有多种表现形式,包括电磁形式、光形式等,或合适的组合形式。计算机存储介质可以是除计算机可读存储介质之外的任何计算机可读介质,该介质可以通过连接至一个指令执行系统、装置或设备以实现通讯、传播或传输供使用的程序。位于计算机存储介质上的程序编码可以通过任何合适的介质进行传播,包括无线电、电缆、光纤电缆、RF、或类似介质,或任何上述介质的组合。
本申请各部分操作所需的计算机程序编码可以用任意一种或多种程序语言编写,包括面向对象编程语言如Java、Scala、Smalltalk、Eiffel、JADE、Emerald、C++、C#、VB.NET、Python等,常规程序化编程语言如C语言、VisualBasic、Fortran2003、Perl、COBOL2002、PHP、ABAP,动态编程语言如Python、Ruby和Groovy,或其他编程语言等。该程序编码可以完全在用户计算机上运行、或作为独立的软件包在用户计算机上运行、或部分在用户计算机上运行部分在远程计算机运行、或完全在远程计算机或处理设备上运行。在后种情况下,远程计算机可以通过任何网络形式与用户计算机连接,比如局域网(LAN)或广域网(WAN),或连接至外部计算机(例如通过因特网),或在云计算环境中,或作为服务使用如软件即服务(SaaS)。
此外,除非权利要求中明确说明,本申请所述处理元素和序列的顺序、数字字母的使用、或其他名称的使用,并非用于限定本申请流程和方法的顺序。尽管上述披露中通过各种示例讨论了一些目前认为有用的发明实施例,但应当理解的是,该类细节仅起到说明的目的,附加的权利要求并不仅限于披露的实施例,相反,权利要求旨在覆盖所有符合本申请实施例实质和范围的修正和等价组合。例如,虽然以上所描述的系统组件可以通过硬件设备实现,但是也可以只通过软件的解决方案得以实现,如在现有的处理设备或移动设备上安装所描述的系统。
同理,应当注意的是,为了简化本申请披露的表述,从而帮助对一个或多个发明实施例的理解,前文对本申请实施例的描述中,有时会将多种特征归并至一个实施例、附图或对其的描述中。但是,这种披露方法并不意味着本申请对象所需要的特征比权利要求中提及的特征多。实际上,实施例的特征要少于上述披露的单个实施例的全部特征。
一些实施例中使用了描述成分、属性数量的数字,应当理解的是,此类用于实施例描述的数字,在一些示例中使用了修饰词“大约”、“近似”或“大体上”来修饰。除非另外说明,“大约”、“近似”或“大体上”表明所述数字允许有±20%的变化。相应地,在一些实施例中,说明书和权利要求中使用的数值参数均为近似值,该近似值根据个别实施例所需特点可以发生改变。在一些实施例中,数值参数应考虑规定的有效数位并采用一般位数保留的方法。尽管本申请一些实施例中用于确认其范围广度的数值域和参数为近似值,在具体实施例中,此类数值的设定在可行范围内尽可能精确。
针对本申请引用的每个专利、专利申请、专利申请公开物和其他材料,如文章、书籍、说明书、出版物、文档等,特此将其全部内容并入本申请作为参考。与本申请内容不一致或产生冲突的申请历史文件除外,对本申请权利要求最广范围有限制的文件(当前或之后附加于本申请中的)也除外。需要说明的是,如果本申请附属材料中的描述、定义、和/或术语的使用与本申请所述内容有不一致或冲突的地方,以本申请的描述、定义和/或术语的使用为准。最后,应当理解的是,本申请中所述实施例仅用以说明本申请实施例的原则。其他的变形也可能属于本申请的范围。因此,作为示例而非限制,本申请实施例的替代配置可视为与本申请的教导一致。相应地,本申请的实施例不仅限于本申请明确介绍和描述的实施例。

Claims (42)

  1. 一种智能设备管理方法,其特征在于,包括:
    在本地生成和存储本地设备管理信息;
    通过网络接收设备管理指令;
    根据所述设备管理指令更新所述本地设备管理信息或者结合所述本地设备管理信息进行指定操作。
  2. 根据权利要求1所述的智能设备管理方法,其特征在于,
    所述本地设备管理信息包括密码信息和密码数据;
    所述密码信息存储在所述智能设备的第一存储区域;
    所述密码数据存储在所述智能设备的第二存储区域;
    其中,所述密码信息包括密码标识以及与所述密码标识相关联的加密密钥;所述密码数据包括所述密码标识以及与所述密码标识相关联的加密密码值,所述加密密码值是利用所述加密密钥对原始密码值进行加密得到的;所述第二存储区域与所述第一存储区域不同。
  3. 根据权利要求2所述的智能设备管理方法,其特征在于,
    所述密码信息还包括与所述密码标识相关联的密码属性,所述密码属性包括密码失效时间;
    所述方法还包括:
    获取当前时间;
    判断所述当前时间是否超出所述密码失效时间,如果超出,则删除所述密码信息和/或密码数据。
  4. 根据权利要求2所述的智能设备管理方法,其特征在于,
    所述设备管理指令包括密码添加指令;
    所述根据所述设备管理指令更新所述本地设备管理信息或者结合所述本地设备管理信息进行指定操作,包括:
    根据所述密码添加指令在所述第一存储区域添加新的密码信息,以及在所述第二存储区域添加新的密码数据。
  5. 根据权利要求2所述的智能设备管理方法,其特征在于,
    所述设备管理指令包括密码修改指令;
    所述根据所述设备管理指令更新所述本地设备管理信息或者结合所述本地设备管理信息进行指定操作,包括:
    根据所述密码修改指令以及所述加密密钥生成新加密密码值,替代原加密密码值存储在所述第二存储区域。
  6. 根据权利要求2所述的智能设备管理方法,其特征在于,
    所述设备管理指令包括密码删除指令;
    所述根据所述设备管理指令更新所述本地设备管理信息或者结合所述本地设备管理信息进行指定操作,包括:
    根据所述密码删除指令删除所述密码信息和/或所述密码数据。
  7. 根据权利要求1所述的智能设备管理方法,其特征在于,
    所述本地设备管理信息包括密码属性;
    所述设备管理指令包括密码属性更新指令;
    所述根据所述设备管理指令更新所述本地设备管理信息或者结合所述本地设备管理信息进行指定操作,包括:
    根据所述密码属性更新指令更新所述密码属性。
  8. 根据权利要求7所述的智能设备管理方法,其特征在于,
    所述密码属性包括密码状态;
    所述密码属性更新指令包括密码冻结指令或密码解冻指令;
    所述根据所述密码属性更新指令更新所述密码属性包括:
    根据所述密码冻结指令将所述密码状态更新为冻结状态,或者根据所述密码解冻指令将所述密码状态更新为解冻状态。
  9. 根据权利要求7所述的智能设备管理方法,其特征在于,
    所述密码属性包括密码周期属性;
    所述密码属性更新指令包括密码周期属性更新指令;
    所述根据所述密码属性更新指令更新所述密码属性包括:
    根据所述密码周期属性更新指令更新所述密码周期属性。
  10. 根据权利要求1所述的智能设备管理方法,其特征在于,
    所述本地设备管理信息包括管理功能权属信息;
    所述设备管理指令包括权限转移指令,所述权限转移指令包括目标用户的信息;
    所述根据所述设备管理指令更新所述本地设备管理信息或者结合本地设备管理信息进行指定操作,包括:
    根据所述权限转移指令将所述管理功能权属信息更新为所述目标用户对应的账户。
  11. 根据权利要求10所述的智能设备管理方法,其特征在于,在根据所述权限转移指令将所述管理功能权属信息更新为所述目标用户的账户后,所述方法还包括:
    响应于接收到与所述目标用户的账户相匹配的用户登录信息,接收所述用户的操作请求;
    处理所述用户的操作请求。
  12. 根据权利要求11所述的智能设备管理方法,其特征在于,
    所述用户的操作请求包括请求查看所述智能设备的查看请求;
    所述处理所述用户的操作请求包括:
    根据所述查看请求显示所述智能设备的信息。
  13. 根据权利要求12所述的智能设备管理方法,其特征在于,所述根据所述查看请求显示所述智能设备的信息包括显示以下信息中的至少一种:
    所述智能设备的密码、电量、保修情况或异常情况。
  14. 根据权利要求11所述的智能设备管理方法,其特征在于,
    所述用户的操作请求包括请求修改所述智能设备密码的密码修改请求;
    所述处理所述用户的操作请求包括:
    根据所述密码修改请求,修改所述智能设备的密码。
  15. 根据权利要求1所述的智能设备管理方法,其特征在于,所述智能设备为门锁。
  16. 一种智能设备管理装置,其特征在于,包括:
    信息生成模块,用于在本地生成本地设备管理信息;
    存储模块,用于存储所述本地设备管理信息;
    接收模块,用于通过网络接收设备管理指令;
    指令执行模块,用于根据所述设备管理指令更新所述本地设备管理信息或者结合所述本地设备管理信息进行指定操作。
  17. 一种智能设备管理设备,其特征在于,所述设备包括至少一个处理器以及至少一个存储器:
    所述至少一个存储器用于存储计算机指令;
    所述至少一个处理器用于执行所述计算机指令中的至少部分指令以实现权利要求1~15任一项所述的智能设备管理方法。
  18. 一种计算机可读存储介质,所述存储介质存储计算机指令,当计算机读取存储介质中的计算机指令后,计算机执行如权利要求1~15任一项所述的智能设备管理方法。
  19. 一种密码管理方法,其特征在于,应用于电子设备,所述方法包括:
    将密码信息存储至所述电子设备的第一存储区域;
    将密码数据存储至所述电子设备的第二存储区域;
    其中,所述密码信息包括密码标识以及与所述密码标识相关联的加密密钥;所述密码数据包括所述密码标识以及与所述密码标识相关联的加密密码值,所述加密密码值是利用所述加密密钥对原始密码值进行加密得到的;所述第二存储区域与所述第一存储区域不同。
  20. 如权利要求19所述的方法,其特征在于,与所述密码标识相关联的加密密钥的生成过程包括:
    获取所述密码标识与所述电子设备中的预设数据;
    根据所述密码标识与所述预设数据,生成与所述密码标识相关联的加密密钥。
  21. 如权利要求19所述的方法,其特征在于,所述方法还包括:
    获取与第一密码标识相关联的新密码值;
    利用与所述第一密码标识相关联的加密密钥,对所述新密码值进行加密,得到新加密密码 值;
    将所述第二存储区域存储的密码数据中,与所述第一密码标识相关联的加密密码值,更新为所述新加密密码值。
  22. 如权利要求19所述的方法,其特征在于,所述密码信息还包括:与所述密码标识相关联的密码属性;所述方法还包括:
    获取与第二密码标识相关联的新密码属性;
    将所述第一存储区域存储的密码信息中,与所述第二密码标识相关联的密码属性,更新为所述新密码属性。
  23. 如权利要求19所述的方法,其特征在于,所述密码信息还包括:与所述密码标识相关联的密码结束时刻;所述方法还包括:
    当与第三密码标识相关联的密码结束时刻早于当前时刻时,从所述第一存储区域存储的密码信息中,删除所述第三密码标识以及与所述第三密码标识相关联的加密密钥,并从所述第二存储区域存储的密码数据中,删除所述第三密码标识。
  24. 如权利要求19所述的方法,其特征在于,所述方法还包括:
    获取用户输入的验证密码值;
    利用所述第一存储区域存储的密码信息中的加密密钥,对所述第二存储区域存储的密码数据中的加密密码值进行解密,得到解密密码值;
    若所述验证密码值与所述解密密码值相匹配,则确定密码验证成功;否则,确定密码验证失败。
  25. 一种密码管理装置,其特征在于,应用于电子设备,所述装置包括:
    密码信息存储单元,用于将密码信息存储至所述电子设备的第一存储区域;
    密码数据存储单元,用于将密码数据存储至所述电子设备的第二存储区域;
    其中,所述密码信息包括密码标识以及与所述密码标识相关联的加密密钥;所述密码数据包括所述密码标识以及与所述密码标识相关联的加密密码值,所述加密密码值是利用所述加密密钥对原始密码值进行加密得到的;所述第二存储区域与所述第一存储区域不同。
  26. 如权利要求25所述的装置,其特征在于,所述装置还包括密码值更新单元,所述密码值更新单元用于:
    获取与第一密码标识相关联的新密码值;
    利用与所述第一密码标识相关联的加密密钥,对所述新密码值进行加密,得到新加密密码值;
    将所述第二存储区域存储的密码数据中,与所述第一密码标识相关联的加密密码值,更新为所述新加密密码值。
  27. 如权利要求25所述的装置,其特征在于,所述密码信息还包括:与所述密码标识相关联的密码属性;所述装置还包括密码属性更新单元;所述密码属性更新单元用于:
    获取与第二密码标识相关联的新密码属性;
    将所述第一存储区域存储的密码信息中,与所述第二密码标识相关联的密码属性,更新为所述新密码属性。
  28. 一种电子设备,其特征在于,包括:用于存储密码信息的第一存储区域,与,用于存储密码数据的第二存储区域;
    其中,所述密码信息包括密码标识以及与所述密码标识相关联的加密密钥;所述密码数据包括所述密码标识以及与所述密码标识相关联的加密密码值,所述加密密码值是利用所述加密密钥对原始密码值进行加密得到的;所述第二存储区域与所述第一存储区域不同。
  29. 一种智能设备管理方法,其特征在于,应用于智能设备管理系统,所述智能设备管理系统中存储有房源信息,以及,与所述房源信息相对应的智能设备的管理功能权属信息;所述方法包括:
    获取目标房源信息与目标业主信息;
    接收与所述目标房源信息相对应的权限转移指令;
    响应于所述权限转移指令,创建与所述目标业主信息相匹配的目标业主账号;
    将与所述目标房源信息相对应的智能设备的管理功能权属信息,变更为所述目标业主账号。
  30. 如权利要求29所述的方法,其特征在于,所述获取目标房源信息包括:
    获取到期房源信息与目标房源选择操作;
    根据所述目标房源选择操作,从所述到期房源信息中获取目标房源信息。
  31. 如权利要求29所述的方法,其特征在于,所述方法还包括:
    当所述目标业主账号创建失败,或者,所述与所述目标房源信息相对应的智能设备的管理功能权属信息变更失败时,重新执行所述获取目标房源信息与目标业主信息的步骤。
  32. 如权利要求29所述的方法,其特征在于,所述目标房源信息包括目标房源的权属信息;在所述响应于所述权限转移指令,创建与所述目标业主信息相匹配的目标业主账号之后,所述方法还包括:
    将所述目标房源的权属信息,变更为所述目标业主账号;
    当所述目标房源的权属信息变更失败时,重新执行所述获取目标房源信息与目标业主信息的步骤。
  33. 如权利要求29所述的方法,其特征在于,在所述将与所述目标房源信息相对应的智能设备的管理功能权属信息,变更为所述目标业主账号之后,所述方法还包括:
    当接收到由所述目标业主账号发起的登入请求时,控制所述目标业主账号登入所述智能设备管理系统;
    当接收到由所述目标业主账号发起的设备信息查看请求时,展示与所述目标业主账号相关联的智能设备的设备信息;
    当接收到由所述目标业主账号发起的设备信息修改请求时,修改与所述目标业主账号相关联的智能设备的设备信息。
  34. 如权利要求29~33中任一项所述的方法,其特征在于,所述智能设备包括智能门锁、智能电表、智能水表、智能网关与智能监控设备中的至少一种。
  35. 如权利要求34所述的方法,其特征在于,当所述智能设备包括智能门锁时,所述智能 门锁的管理功能包括:
    管理密码配置功能、租客密码配置功能、临时密码配置功能、蓝牙授权管理功能、指纹授权管理功能、开锁记录查看功能、设备异常查看功能中的至少一项。
  36. 一种智能设备管理装置,其特征在于,所述智能设备管理装置中存储有房源信息,以及,与所述房源信息相对应的智能设备的管理功能权属信息;所述装置包括:
    目标获取单元,用于获取目标房源信息与目标业主信息;
    指令接收单元,用于接收与所述目标房源信息相对应的权限转移指令;
    账号创建单元,用于响应于所述权限转移指令,创建与所述目标业主信息相匹配的目标业主账号;
    设备变更单元,用于将与所述目标房源信息相对应的智能设备的管理功能权属信息,变更为所述目标业主账号。
  37. 如权利要求36所述的装置,其特征在于,所述目标获取单元包括:
    第一获取单元,用于获取到期房源信息与目标房源选择操作;
    第二获取单元,用于根据所述目标房源选择操作,从所述到期房源信息中获取目标房源信息。
  38. 如权利要求36所述的装置,其特征在于,所述装置还包括:
    流程控制单元,用于当所述目标业主账号创建失败,或者,所述与所述目标房源信息相对应的智能设备的管理功能权属信息变更失败时,重新执行所述获取目标房源信息与目标业主信息的步骤。
  39. 如权利要求36所述的装置,其特征在于,所述目标房源信息包括目标房源的权属信息;所述装置还包括:
    房源变更单元,用于将所述目标房源的权属信息,变更为所述目标业主账号;
    所述流程控制单元,还用于当所述目标房源的权属信息变更失败时,重新执行所述获取目标房源信息与目标业主信息的步骤。
  40. 如权利要求36所述的装置,其特征在于,所述装置还包括:
    登入控制单元,用于当接收到由所述目标业主账号发起的登入请求时,控制所述目标业主账号登入所述智能设备管理装置;
    设备查看单元,用于当接收到由所述目标业主账号发起的设备信息查看请求时,展示与所述目标业主账号相关联的智能设备的设备信息;
    设备修改单元,用于当接收到由所述目标业主账号发起的设备信息修改请求时,修改与所述目标业主账号相关联的智能设备的设备信息。
  41. 一种存储介质,其特征在于,所述存储介质包括存储的程序,其中,在所述程序运行时控制所述存储介质所在设备执行如权利要求29~35中任一项所述的智能设备管理方法。
  42. 一种处理器,其特征在于,所述处理器用于运行程序,其中,所述程序运行时执行如权利要求29~35中任一项所述的智能设备管理方法。
PCT/CN2019/097761 2018-07-25 2019-07-25 一种设备管理方法和系统 WO2020020304A1 (zh)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201810824189.4 2018-07-25
CN201810824189.4A CN109087065B (zh) 2018-07-25 2018-07-25 智能设备管理方法及系统
CN201810824234.6A CN109064596B (zh) 2018-07-25 2018-07-25 密码管理方法、装置及电子设备
CN201810824234.6 2018-07-25

Publications (1)

Publication Number Publication Date
WO2020020304A1 true WO2020020304A1 (zh) 2020-01-30

Family

ID=69181318

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/097761 WO2020020304A1 (zh) 2018-07-25 2019-07-25 一种设备管理方法和系统

Country Status (1)

Country Link
WO (1) WO2020020304A1 (zh)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101938461A (zh) * 2009-06-29 2011-01-05 索尼公司 信息处理服务器、信息处理设备、以及信息处理方法
CN104157029A (zh) * 2014-05-12 2014-11-19 惠州Tcl移动通信有限公司 基于移动终端的门禁系统控制方法、控制系统及移动终端
CN104966340A (zh) * 2015-06-19 2015-10-07 深圳市幸福立方科技有限公司 门禁控制系统、方法及云服务平台
WO2016169424A1 (zh) * 2015-04-24 2016-10-27 胡飞虎 社区联网门禁系统及基于该系统的社区进入方法
CN207473698U (zh) * 2017-04-19 2018-06-08 天津微梦无界科技有限公司 一种安全可追溯的智能门锁装置
CN109064596A (zh) * 2018-07-25 2018-12-21 云丁智能科技(北京)有限公司 密码管理方法、装置及电子设备
CN109087065A (zh) * 2018-07-25 2018-12-25 云丁智能科技(北京)有限公司 智能设备管理方法及系统

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101938461A (zh) * 2009-06-29 2011-01-05 索尼公司 信息处理服务器、信息处理设备、以及信息处理方法
CN104157029A (zh) * 2014-05-12 2014-11-19 惠州Tcl移动通信有限公司 基于移动终端的门禁系统控制方法、控制系统及移动终端
WO2016169424A1 (zh) * 2015-04-24 2016-10-27 胡飞虎 社区联网门禁系统及基于该系统的社区进入方法
CN104966340A (zh) * 2015-06-19 2015-10-07 深圳市幸福立方科技有限公司 门禁控制系统、方法及云服务平台
CN207473698U (zh) * 2017-04-19 2018-06-08 天津微梦无界科技有限公司 一种安全可追溯的智能门锁装置
CN109064596A (zh) * 2018-07-25 2018-12-21 云丁智能科技(北京)有限公司 密码管理方法、装置及电子设备
CN109087065A (zh) * 2018-07-25 2018-12-25 云丁智能科技(北京)有限公司 智能设备管理方法及系统

Similar Documents

Publication Publication Date Title
US11928904B2 (en) Methods and systems for controlling a smart lock
US11887705B2 (en) Apparatus, system and method for patient-authorized secure and time-limited access to patient medical records utilizing key encryption
US10868815B2 (en) Leveraging flexible distributed tokens in an access control system
US11030297B2 (en) Systems and methods for device and user authorization
CN104919775B (zh) 用于密钥链同步的系统和方法
CN104754582B (zh) 维护byod安全的客户端及方法
WO2019079928A1 (zh) 一种访问令牌管理方法、终端和服务器
US20140136840A1 (en) Computer system for storing and retrieval of encrypted data items using a tablet computer and computer-implemented method
EP3518495A1 (en) Blockchain for the connected home
US10841286B1 (en) Apparatus, system and method for secure universal exchange of patient medical records utilizing key encryption technology
CN108961475A (zh) 一种门禁部署方法及门禁部署服务器
US11729175B2 (en) Blockchain folding
US11481509B1 (en) Device management and security through a distributed ledger system
WO2019204954A1 (zh) 一种智能锁系统
JP2011012511A (ja) 電気錠制御システム
US20230412400A1 (en) Method for suspending protection of an object achieved by a protection device
CN113037736B (zh) 一种认证鉴权方法、装置、系统及计算机存储介质
CN114241631A (zh) 一种智能门锁的管控方法、注册方法及相关装置
WO2019037594A1 (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
WO2020020304A1 (zh) 一种设备管理方法和系统
WO2022193615A1 (zh) 数字钥匙删除方法、装置、设备、系统及存储介质
JP2014158222A (ja) 鍵配信システム
CN108665592B (zh) 一种远程门锁控制系统
CN109284622A (zh) 联系人信息处理方法、装置及存储介质
CN108345801B (zh) 一种面向密文数据库的中间件动态用户认证方法及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19840689

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19840689

Country of ref document: EP

Kind code of ref document: A1