WO2022267598A1 - 一种智能家居设备控制方法及系统 - Google Patents

一种智能家居设备控制方法及系统 Download PDF

Info

Publication number
WO2022267598A1
WO2022267598A1 PCT/CN2022/084075 CN2022084075W WO2022267598A1 WO 2022267598 A1 WO2022267598 A1 WO 2022267598A1 CN 2022084075 W CN2022084075 W CN 2022084075W WO 2022267598 A1 WO2022267598 A1 WO 2022267598A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic device
message
server
smart
information
Prior art date
Application number
PCT/CN2022/084075
Other languages
English (en)
French (fr)
Inventor
高晓强
陈志利
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP22827103.7A priority Critical patent/EP4332695A1/en
Publication of WO2022267598A1 publication Critical patent/WO2022267598A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/12Arrangements for remote connection or disconnection of substations or of equipment thereof
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B15/00Systems controlled by a computer
    • G05B15/02Systems controlled by a computer electric
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/418Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/20Pc systems
    • G05B2219/26Pc applications
    • G05B2219/2642Domotique, domestic, home control, automation, smart house

Definitions

  • the present application relates to the field of smart home technology, in particular to a smart home control method and system.
  • the present application provides a control method for smart home equipment, a first electronic device, a second electronic device, a server, a computer-readable storage medium, and a computer program product.
  • the technical solution provided by this application can enable the user to automatically complete the device binding of the whole house with only one operation or even no operation, which significantly improves the user experience.
  • a smart home control method is provided, the method is applied to a first electronic device, the first electronic device is provided with a client, the client logs in with a first account, and the client corresponds to a server; the method may include: An electronic device communicates with a second electronic device in a short distance, and obtains first information related to the second electronic device from the second electronic device, where the first information includes a first identification of the second electronic device; wherein, the second electronic device There are n smart devices registered, the second electronic device is in the same local area network as the n smart devices, n is a positive integer greater than or equal to 1; the first electronic device sends a first message to the server, the first message includes the first identifier, The first message is used to obtain a first activation code representing the identity of the second electronic device; the first electronic device receives the first activation code sent by the server; the first electronic device sends a second message to the second electronic device, and the second message contains the first activation code sent by the server.
  • the second message is used to request to bind the first account with the second electronic device; in response to receiving a third message sent by the second electronic device, the third message includes information that the second electronic device agrees to bind,
  • the first electronic device sends a fourth message to the second electronic device, the fourth message includes the first activation code, and the fourth message is used to instruct the second electronic device to register with the server using the first activation code; the first electronic device receives the message sent by the server
  • the seventh message and the twelfth message the seventh message includes the device information of the second electronic device, and the twelfth message includes the device information of n smart devices, wherein the seventh message is that the server registers the second electronic device to the server
  • the twelfth message is sent by the server when n smart devices register to the server in response to the registration instruction sent by the second electronic device; the first electronic device outputs the device information of the second electronic device and the n smart devices.
  • the account logged in on the client can be bound to the second electronic device, so that the user only needs to operate in one step or even does not need to operate, that is, It can automatically complete the device binding of the whole house, which significantly improves the user experience.
  • one-step operation can be understood as the user only needs to bring the first electronic device close to the second electronic device.
  • the second electronic device may be a gateway, or an electronic device integrated with a gateway function, or an electronic device not integrated with a gateway function.
  • the second electronic device may be a central device with a gateway function, such as a smart speaker, a smart screen, a router, and the like.
  • the method may further include: in response to the received device sharing operation, the first electronic device sends the device sharing information to the server , the device sharing information includes the account to be shared, and the device sharing information is used to instruct the server to bind the account to be shared with the second electronic device.
  • the user can share the bound device with the companions, which improves the convenience of sharing, so that the companions can control the second electronic device and/or the smart device.
  • the method further includes: responding to the received information related to the second For an unbinding instruction for unbinding the electronic device, the first electronic device sends a thirteenth message to the server, where the thirteenth message is used to instruct to release the binding relationship between the second electronic device and the first account.
  • the user can unbind the second electronic device with one click on the client terminal, which improves the convenience of user operation and significantly improves user experience.
  • the first electronic device outputs the device information of the second electronic device and n smart devices, including: the first electronic device displays the second electronic device and n smart devices The device information of the device, and/or, the first electronic device plays the device information of the second electronic device and n smart devices by voice.
  • a smart home control method is provided, which is applied to a second electronic device.
  • the second electronic device is registered with n smart devices, the second electronic device and the n smart devices are in the same local area network, n is a positive integer greater than or equal to 1, and the method includes:
  • the second electronic device communicates with the first electronic device in short distance, and sends the first information to the first electronic device, the first information includes the first identification of the second electronic device, wherein the first electronic device is provided with a client, and the client logs in There is a first account, and the client corresponds to a server; the second electronic device receives a second message sent by the first electronic device, the second message contains the first account, and the second message is used to request to bind the first account with the second electronic device the second electronic device stores the first account, and sends a third message to the first electronic device, the third message contains the information that the second electronic device agrees to bind; the second electronic device receives the fourth message sent by the first electronic device , the fourth message includes a first activation code, the fourth message is used to instruct the second electronic device to register with the server using the first activation code, the first activation code is generated when the server receives the first message sent by the first electronic device, the second A message contains a first identification, the first activation code is used to represent the identity of
  • the account logged in on the client can be bound to the second electronic device, so that the user only needs to operate in one step or even does not need to operate, that is, It can automatically complete the device binding of the whole house, which significantly improves the user experience.
  • the second electronic device may be a gateway, or an electronic device integrated with a gateway function, or an electronic device not integrated with a gateway function.
  • the second electronic device may be a central device with a gateway function, such as a smart speaker, a smart screen, a router, and the like.
  • the method further includes: receiving the account number to be shared sent by the server, and storing the account number to be shared.
  • the account shared by the user can be bound to the second electronic device, so that the person accompanying the user can also use the second electronic device and the smart device registered to the second electronic device.
  • the method further includes: the second electronic device receives the fourteenth message sent by the server message, the fourteenth message is used to instruct the second electronic device to unbind the first account; in response to the fourteenth message, the second electronic device clears the stored account information and registration information registered to the server. In this way, the second electronic device can be unbound from the account.
  • the method further includes: the second electronic device sends fifteen messages to the n smart devices respectively, the fifteenth message is used to instruct the smart device to clear the smart device Registered to the registration information on the server.
  • the smart device can clear the information registered on the server, so that after the second electronic device is unbound from the user's account, it does not need to send device status information to the server, thereby improving user experience.
  • a smart home control method is provided, which is applied to a first electronic device.
  • the first electronic device is provided with a client, the client logs in with a first account, and the client corresponds to a server.
  • the method includes: the first electronic device communicates with the second electronic device in a short distance, and obtains the information related to the first electronic device from the second electronic device.
  • the first information related to the second electronic device includes the first identification of the second electronic device; wherein, the second electronic device is registered with n smart devices, the second electronic device is in the same local area network as the n smart devices, and n is a positive integer greater than or equal to 1; the first electronic device sends a first message to the server, the first message includes a first identification, and the first message is used to obtain a first activation code representing the identity of the second electronic device; the first electronic device receiving the first activation code sent by the server; the first electronic device sends a second message to the second electronic device, the second message includes the first account, and the second message is used to request to bind the first account with the second electronic device; An electronic device receives a sixteenth message sent by the second electronic device, the sixteenth message includes information requesting input of a maintenance password, wherein the sixteenth message is that the second electronic device determines that it stores account information related to the user account, and the account information does not include the first account; in response to the received password input operation, the first
  • the second electronic device can be maintained, so that the user can automatically complete the whole house device binding with only one step or even no operation. , significantly improving the user experience.
  • the second electronic device may be a gateway, or an electronic device integrated with a gateway function, or an electronic device not integrated with a gateway function.
  • the second electronic device may be a central device with a gateway function, such as a smart speaker, a smart screen, a router, and the like.
  • the method further includes: in response to the received unbinding instruction, the first electronic device sends the second electronic device to the second electronic device.
  • the twenty-first message, the twenty-first message is used to indicate to release the binding relationship between the second electronic device and the account stored in the second electronic device. In this way, it is possible to unbind the second electronic device instead of the owner of other accounts, which improves the convenience of operation.
  • a smart home control method is provided, which is applied to a second electronic device.
  • the second electronic device is registered with n smart devices, the second electronic device and the n smart devices are in the same local area network, n is a positive integer greater than or equal to 1, and the method includes: the second electronic device and the first electronic device are within a short distance Communication, sending first information to the first electronic device, where the first information includes a first identifier of the second electronic device, wherein the first electronic device is provided with a client, the client logs in with a first account, and the client corresponds to a server;
  • the second electronic device receives the second message sent by the first electronic device, the second message includes the first account, and the second message is used to request to bind the first account with the second electronic device; Account information related to the account, and the account information does not include the first account, send a sixteenth message to the first electronic device, the sixteenth message includes information requesting input of a maintenance password; in response to the seventeenth message sent by the first electronic device message, the
  • the second electronic device can be maintained, so that the user can automatically complete the whole house device binding with only one step or even no operation. , significantly improving the user experience.
  • the second electronic device may be a gateway, or an electronic device integrated with a gateway function, or an electronic device not integrated with a gateway function.
  • the second electronic device may be a central device with a gateway function, such as a smart speaker, a smart screen, a router, and the like.
  • the method further includes: the second electronic device receives the twenty-first electronic device sent by the first electronic device message, the twenty-first message is used to indicate the release of the binding relationship between the second electronic device and the account stored in the second electronic device; in response to the twenty-first message, the second electronic device sends the twenty-second message to the server , the twenty-second message is used to instruct the server to release the binding relationship between the second electronic device and the account stored in the second electronic device; in response to the twenty-third message sent by the server, the twenty-third message includes the unbinding If the message is successful, the second electronic device clears the account information stored in the second electronic device and the registration information registered on the server. In this way, the second electronic device can release the binding relationship with the account.
  • the method further includes: the second electronic device sends a fifteenth message to the n smart devices respectively, and the fifteenth message is used to instruct the smart device to clear the smart device Registered to the registration information on the server.
  • the smart device can clear the information registered on the server, so that after the second electronic device is unbound from the user's account, it does not need to send device status information to the server, thereby improving user experience.
  • a smart home control method is provided, which is applied to a server.
  • the server corresponds to the client, the client logs in with a first account, and the client is set on the first electronic device.
  • the method includes: the server receives a first message sent by the first electronic device, and the first message includes the first message of the second electronic device.
  • the first message is used to obtain the first activation code representing the identity of the second electronic device, wherein the first identification is obtained by the first electronic device through short-distance communication with the second electronic device, and the second electronic device has n registered Smart device, the second electronic device is in the same local area network as n smart devices, n is a positive integer greater than or equal to 1; the server generates a first activation code based on the first identification, and sends the first activation code to the first electronic device equipment. In this way, when the server receives the registration request of the second electronic device, it can judge whether the first activation code carried in the registration request was issued by it. Registration, to improve the security of device registration.
  • the second electronic device may be a gateway, or an electronic device integrated with a gateway function, or an electronic device not integrated with a gateway function.
  • the second electronic device may be a central device with a gateway function, such as a smart speaker, a smart screen, a router, and the like.
  • the method further includes: the server receives a fifth message sent by the second electronic device, the fifth message includes the first identification and the first activation code, The fifth message is used to request to register the second electronic device to the server; the server verifies the first activation code, records the first identification when the verification is passed, and sends the sixth message to the second electronic device, the sixth message Contains successful registration information; the server receives the eighth message sent by the second electronic device, the eighth message contains the second identification of n smart devices, and the eighth message is used to obtain n second activation codes representing the identities of n smart devices ; The server generates n second activation codes based on each of the n second identifications, and sends the n second activation codes to the second electronic device; the server receives n tenth messages sent by n smart devices, Each tenth message contains a second identification and a second activation code of a smart device, and the tenth message is used to request the registration
  • the account logged in on the client can be bound to the second electronic device, so that the user only needs to operate in one step or even does not need to operate, that is, It can automatically complete the device binding of the whole house, which significantly improves the user experience.
  • the method further includes: the server receives the tenth message sent by the first electronic device Three messages, the thirteenth message is used to indicate the release of the binding relationship between the second electronic device and the first account; the server updates the management authority of the second electronic device, and sends the fourteenth message to the second electronic device, the tenth
  • the fourth message is used to instruct the second electronic device to release the binding relationship with the first account. In this way, the second electronic device can release the binding relationship with the first account.
  • the method further includes: the server receives the twenty-second message sent by the second electronic device , the 22nd message is used to indicate to release the binding relationship between the second electronic device and the account stored in the second electronic device; the server updates the management authority of the second electronic device, and sends the 20th electronic device to the second electronic device Three messages, the twenty-third message includes the information that the unbinding is successful. In this way, the second electronic device can release the binding relationship with the account.
  • a first electronic device is provided.
  • the first electronic device is provided with a client, and the client is logged in with a first account, and the first electronic device is used to execute any of the implementation methods of the first aspect and the first aspect. method.
  • the sixth aspect and any implementation manner of the sixth aspect correspond to the first aspect and any implementation manner of the first aspect respectively.
  • the technical effects corresponding to the sixth aspect and any one of the implementation manners in the sixth aspect refer to the above-mentioned first aspect and the technical effects corresponding to any one of the implementation manners in the first aspect, and details are not repeated here.
  • a first electronic device is provided, the first electronic device is provided with a client, and the client is logged in with a first account, and the first electronic device is used to execute the third aspect and any one of the implementation methods of the third aspect. method.
  • the seventh aspect and any implementation manner of the seventh aspect correspond to the third aspect and any implementation manner of the third aspect respectively.
  • the technical effect corresponding to the seventh aspect and any one of the implementation manners in the seventh aspect refer to the above-mentioned third aspect and the technical effect corresponding to any one of the implementation manners in the third aspect, which will not be repeated here.
  • a second electronic device where n smart devices are registered on the second electronic device, the second electronic device and the n smart devices are in the same local area network, n is a positive integer greater than or equal to 1, and the second The electronic device is configured to execute the second aspect and the method in any one implementation manner of the second aspect.
  • the second electronic device may be a gateway, or an electronic device integrated with a gateway function, or an electronic device not integrated with a gateway function.
  • the second electronic device may be a central device with a gateway function, such as a smart speaker, a smart screen, a router, and the like.
  • the eighth aspect and any implementation manner of the eighth aspect correspond to the second aspect and any implementation manner of the second aspect respectively.
  • the technical effects corresponding to the eighth aspect and any one of the implementation manners in the eighth aspect refer to the above-mentioned second aspect and the technical effects corresponding to any one of the implementation manners in the second aspect, and details are not repeated here.
  • a second electronic device where n smart devices are registered on the second electronic device, the second electronic device and the n smart devices are in the same local area network, n is a positive integer greater than or equal to 1, and the second The electronic device is configured to execute the fourth aspect and the method in any one implementation manner of the fourth aspect.
  • the second electronic device may be a gateway, or an electronic device integrated with a gateway function, or an electronic device not integrated with a gateway function.
  • the second electronic device may be a central device with a gateway function, such as a smart speaker, a smart screen, a router, and the like.
  • the ninth aspect and any implementation manner of the ninth aspect correspond to the fourth aspect and any implementation manner of the fourth aspect respectively.
  • the technical effect corresponding to the ninth aspect and any one of the implementation manners in the ninth aspect refer to the above-mentioned fourth aspect and the technical effect corresponding to any one of the implementation manners in the fourth aspect, which will not be repeated here.
  • a server is provided, and the server is configured to execute the method in the fifth aspect and any one of the implementation manners of the fifth aspect.
  • the tenth aspect and any implementation manner of the tenth aspect correspond to the fifth aspect and any implementation manner of the fifth aspect respectively.
  • a smart home control system including the client according to the sixth aspect and any one of the implementation manners of the sixth aspect, and the second electronic device such as the eighth aspect and any one of the implementation manners of the eighth aspect, A server as in the tenth aspect and any one of the implementations of the tenth aspect, and n smart devices, wherein the n smart devices are registered on the second electronic device, and the second electronic device and the n smart devices are in the same local area network, n is a positive integer greater than or equal to 1.
  • the second electronic device may be a gateway, or an electronic device integrated with a gateway function, or an electronic device not integrated with a gateway function.
  • the second electronic device may be a central device with a gateway function, such as a smart speaker, a smart screen, a router, and the like.
  • the eleventh aspect and any one of the implementation methods of the eleventh aspect and the sixth aspect and any one of the implementation methods of the sixth aspect, and the eighth aspect and any one of the implementation methods of the eighth aspect, and the tenth aspect aspect and any implementation manner of the tenth aspect please refer to the sixth aspect and any one of the implementations in the sixth aspect, and the eighth aspect and any one of the implementations in the eighth aspect.
  • the technical effect corresponding to the tenth aspect and any one of the implementation manners of the tenth aspect will not be repeated here.
  • a smart home control system including the client according to any one of the seventh aspect and the seventh aspect, such as the ninth aspect and the second electronic device according to any one of the ninth aspects, A server as in the tenth aspect and any one of the implementations of the tenth aspect, and n smart devices, wherein the n smart devices are registered on the second electronic device, and the second electronic device and the n smart devices are in the same local area network, n is a positive integer greater than or equal to 1.
  • the second electronic device may be a gateway, or an electronic device integrated with a gateway function, or an electronic device not integrated with a gateway function.
  • the second electronic device may be a central device with a gateway function, such as a smart speaker, a smart screen, a router, and the like.
  • the twelfth aspect and any one of the realization ways of the twelfth aspect are respectively with the seventh aspect and any one of the realization ways of the seventh aspect, with the ninth aspect and any one of the realization ways of the ninth aspect, and with the tenth aspect aspect and any implementation manner of the tenth aspect.
  • the technical effects corresponding to the twelfth aspect and any one of the implementations in the twelfth aspect please refer to the seventh aspect and any one of the implementations in the seventh aspect, and the ninth aspect and any one of the ninth aspects.
  • the technical effect corresponding to the tenth aspect and any one of the implementation manners of the tenth aspect will not be repeated here.
  • a computer-readable storage medium stores a computer program, and when the computer program runs on the first electronic device, the client on the first electronic device executes the method according to any one of the first aspect and the first aspect, or, Execute the third aspect and the method in any one of the implementation manners of the third aspect.
  • the thirteenth aspect and any one of the realization ways of the thirteenth aspect correspond to the first aspect and any one of the realization ways of the first aspect, or correspond to the third aspect and any one of the realization ways of the third aspect.
  • the technical effects corresponding to the thirteenth aspect and any one of the implementations in the thirteenth aspect please refer to the above-mentioned first aspect and any one of the implementations in the first aspect, or refer to the third aspect and any one of the third aspects
  • the technical effect corresponding to the implementation manner will not be repeated here.
  • a computer-readable storage medium stores a computer program.
  • the computer program runs on the second electronic device, the second electronic device executes the method according to any one of the second aspect and the second aspect, or executes the method according to the fourth aspect. Aspect and any implementation method of the fourth aspect.
  • the fourteenth aspect and any implementation manner of the fourteenth aspect correspond to the second aspect and any implementation manner of the second aspect, or correspond to the fourth aspect and any implementation manner of the fourth aspect.
  • the technical effects corresponding to the fourteenth aspect and any one of the fourteenth aspects please refer to the above-mentioned second aspect and any one of the second aspects, or refer to the fourth aspect and any one of the fourth aspects The technical effect corresponding to the implementation manner will not be repeated here.
  • a computer-readable storage medium stores a computer program, and when the computer program is run on the server, the server is made to execute the method according to the fifth aspect and any one of the implementation manners of the fifth aspect.
  • the fifteenth aspect and any one implementation manner of the fifteenth aspect correspond to the fifth aspect or any one implementation manner of the fifth aspect.
  • the technical effects corresponding to the fifteenth aspect and any one of the implementations in the fifteenth aspect refer to the fifth aspect and the technical effects corresponding to any one of the implementations in the fifth aspect, which will not be repeated here.
  • a computer program product is provided.
  • the client on the first electronic device executes the method according to any one of the first aspect and the first aspect, or executes the method according to the third aspect and the third aspect Either method of implementation.
  • the sixteenth aspect and any implementation manner of the sixteenth aspect correspond to the first aspect and any implementation manner of the first aspect, or correspond to the third aspect and any implementation manner of the third aspect.
  • the technical effects corresponding to the sixteenth aspect and any one of the sixteenth aspects please refer to the above-mentioned first aspect and any one of the first aspects, or refer to the third aspect and any one of the third aspects The technical effect corresponding to the implementation manner will not be repeated here.
  • a computer program product is provided.
  • the second electronic device is made to execute the method as in the second aspect and any one of the implementations of the second aspect, or to execute the method as in the fourth aspect and any one of the implementations of the fourth aspect way of way.
  • the seventeenth aspect and any implementation manner of the seventeenth aspect correspond to the second aspect and any implementation manner of the second aspect, or correspond to the fourth aspect and any implementation manner of the fourth aspect.
  • the technical effects corresponding to the seventeenth aspect and any one of the implementations of the seventeenth aspect please refer to the above-mentioned second aspect and any one of the implementations of the second aspect, or refer to the fourth aspect and any one of the fourth aspects
  • the technical effect corresponding to the implementation manner will not be repeated here.
  • a computer program product is provided.
  • the server is made to execute the method according to the fifth aspect and any one of the implementation manners of the fifth aspect.
  • the eighteenth aspect and any one of the implementation manners of the eighteenth aspect correspond to the fifth aspect and any one of the implementation manners of the fifth aspect.
  • For the technical effects corresponding to the eighteenth aspect and any one of the implementation manners in the eighteenth aspect refer to the above-mentioned fifth aspect and the technical effects corresponding to any one of the implementation manners in the fifth aspect, which will not be repeated here.
  • FIG. 1 is a schematic diagram of an application scenario provided by an embodiment of the present application
  • FIG. 2 is a schematic diagram of a hardware structure of an electronic device provided by an embodiment of the present application.
  • FIG. 3 is a schematic flowchart of a method for controlling smart home devices provided by an embodiment of the present application
  • Fig. 4 is a schematic flowchart of the steps of initial configuration of the devices in the hotel in the smart home device control method shown in Fig. 3;
  • Fig. 5 is a schematic flow chart of the steps of initial configuration of the gateway among the steps of initial configuration of the equipment in the hotel shown in Fig. 4;
  • FIG. 6 is a schematic diagram of an interface display of an electronic device in the process of configuring a gateway provided by an embodiment of the present application
  • Fig. 7 is a schematic flowchart of the steps of initial configuration of smart devices among the steps of initial configuration of devices in the hotel shown in Fig. 4;
  • FIG. 8 is a schematic diagram of an interface display of an electronic device provided by an embodiment of the present application.
  • Fig. 9 is a schematic flowchart of the step of discovering the smart device by the gateway in the step of initializing the configuration of the device in the hotel shown in Fig. 4;
  • FIG. 10 is a schematic diagram of an interface display of an electronic device provided in an embodiment of the present application.
  • FIG. 11 is a schematic diagram of an interface display of an electronic device provided by an embodiment of the present application.
  • Fig. 12 is a schematic flowchart of the steps of checking in a hotel and binding the device to the customer in the smart home device control method shown in Fig. 3;
  • FIG. 13 is a schematic diagram of an interface display of an electronic device provided in an embodiment of the present application.
  • Fig. 14 is a schematic flow diagram of a client-controlled smart desk lamp provided by an embodiment of the present application.
  • Fig. 15 is a schematic diagram of an interface display of an electronic device provided by an embodiment of the present application.
  • Fig. 16 is a schematic flowchart of the steps of sharing the device with the client to the peers in the smart home device control method shown in Fig. 3;
  • Fig. 17 is a schematic flowchart of the steps of unbinding the device to the customer or the hotel administrator in the smart home device control method shown in Fig. 3;
  • Fig. 18 is a schematic diagram of an interface display of an electronic device in the process of unbinding the device by the client according to the embodiment of the present application;
  • Fig. 19 is a schematic flowchart of a smart home control method provided by an embodiment of the present application.
  • Fig. 20 is a schematic flowchart of another smart home control method provided by the embodiment of the present application.
  • Fig. 21 is a schematic flowchart of another smart home control method provided by the embodiment of the present application.
  • Fig. 22 is a schematic flowchart of another smart home control method provided by the embodiment of the present application.
  • a and/or B may indicate: A exists alone, A and B exist at the same time, and B exists alone, Wherein A and B can be singular or plural.
  • the character "/" generally indicates that the contextual objects are an "or" relationship.
  • references to "one embodiment” or “some embodiments” or the like in this specification means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application.
  • appearances of the phrases “in one embodiment,” “in some embodiments,” “in other embodiments,” “in other embodiments,” etc. in various places in this specification are not necessarily All refer to the same embodiment, but mean “one or more but not all embodiments” unless specifically stated otherwise.
  • the terms “including”, “comprising”, “having” and variations thereof mean “including but not limited to”, unless specifically stated otherwise.
  • the term “connected” includes both direct and indirect connections, unless otherwise stated.
  • first and second are used for descriptive purposes only, and cannot be understood as indicating or implying relative importance or implicitly specifying the quantity of indicated technical features. Thus, a feature defined as “first” and “second” may explicitly or implicitly include one or more of these features.
  • a hotel scenario as an example to illustrate the application scenario of the present application with reference to FIG. 1 .
  • FIG. 1 is a schematic diagram of an application scenario provided by an embodiment of the present application.
  • the gateway 11, the smart speaker 12, the smart desk lamp 13 and the smart TV 14 are all deployed in the same place (for example, in the same room in a hotel), and all belong to the same manager.
  • the mobile phone 15 belongs to a customer, who may be a person staying in a hotel.
  • the gateway 11, the smart speaker 12, the smart desk lamp 13 and the smart TV 14 can be in the same local area network, and the smart speaker 12, the smart desk lamp 13 and the smart TV 14 have all been registered on the gateway 11 (for example, the smart speaker 12 is stored in the gateway 11). , the device information of smart desk lamp 13 and smart TV 14).
  • a smart home management application is installed on the mobile phone 15, and the application can be used to manage devices such as the gateway 11, the smart speaker 12, the smart desk lamp 13 and the smart TV 14.
  • the customer of the mobile phone 15 when the customer of the mobile phone 15 enters the place of the gateway 11, the customer can log in the smart home management application on the mobile phone 15, use the mobile phone 15 to communicate with the gateway 11 in short distance, and build a secure communication channel.
  • the gateway 11 After the gateway 11 receives the binding request of the mobile phone 15, the gateway 11 can agree to the binding if it is not bound by other customers, and register itself to the server 16, and notify the smart speaker 12, smart desk lamp 13 and smart TV 14 are registered to server 16.
  • the customer to which the mobile phone 15 belongs can view the gateway 11, the smart speaker 12, the smart desk lamp 13 and the smart TV 14 in the smart home management application installed on the mobile phone 15, and then can pair the gateway 11, the smart speaker 12, and the smart TV 14 through the mobile phone 15.
  • Desk lamp 13 and smart TV 14 are controlled. Therefore, based on the short-distance secure transmission, the binding of multiple devices provides users with a safe and easy-to-use technical solution for controlling smart home devices.
  • the customer when the customer who belongs to the mobile phone 15 leaves the place where the gateway 11 belongs, the customer can initiate an unbinding instruction to the gateway 15 through the smart home management application on the mobile phone 15 .
  • the server 16 After receiving the unbinding instruction initiated by the client, the server 16 can clear the corresponding relationship between the client and the gateway 15, the smart speaker 12, the smart desk lamp 13 and the smart TV 14, and notify the gateway 15 to unbind the client. Afterwards, after receiving the notification from the server 16, the gateway 15 can clear the client's authority information.
  • the unbinding between the gateway 15 and the client is realized, so that the client no longer has the control authority of the gateway 15 and the devices registered on the gateway 15 after leaving the place where the gateway 11 belongs.
  • the gateway 11 can be the entrance for the mobile phone 15 to access the smart home system to which the gateway 11 belongs. It can be an independent device, or it can be carried on a smart device as a service, such as carried on a smart TV 14 Wait.
  • connections can be established between the server 16 and the gateway 11 , the smart speaker 12 , the smart desk lamp 13 , the smart TV 14 and the mobile phone 15 through a network for long-distance communication.
  • the network may be a local area network (local area networks, LAN), or a wide area network (wide area networks, WAN) (for example, the Internet).
  • Communication between the mobile phone 15 and the gateway 11 can be based on short-distance communication methods such as near field communication (NFC) or proximity aware networking (neighborhood aware networking, NAN) that controls transmission power.
  • NFC near field communication
  • NAN proximity aware networking
  • the gateway 11 and smart speakers 12, smart desk lamps 13 or smart TVs 14 and other smart devices can be connected through power line communication (power line communication, PLC), network cable, wireless fidelity (Wi-Fi), bluetooth (bluetooth) , Zigbee (zigbee) and other technologies to establish connections.
  • PLC power line communication
  • Wi-Fi wireless fidelity
  • Wi-Fi wireless fidelity
  • Wi-Fi wireless fidelity
  • bluetooth blue
  • Zigbee Zigbee
  • each electronic device shown in FIG. 1 can also be replaced with other electronic devices, such as a tablet computer, a wearable device, and the like.
  • the electronic equipment involved in this solution may include but not limited to Or electronic equipment with other operating systems. In this solution, there is no special limitation on the specific type of electronic equipment.
  • FIG. 2 shows a schematic diagram of a hardware structure of an electronic device.
  • the electronic device may be any electronic device shown in FIG. 1 .
  • the electronic device 200 may include: a processor 210 , a memory 220 and a communication module 230 .
  • the processor 210, the memory 220, and the communication module 230 may be connected through a bus or in other ways.
  • the processor 210 is a calculation core and a control core of the electronic device 200 .
  • Processor 210 may include one or more processing units.
  • the processor 210 may include an application processor (application processor, AP), a modem (modem), a graphics processing unit (graphics processing unit, GPU), an image signal processor (image signal processor, ISP), a controller, a video encoder
  • application processor application processor
  • AP application processor
  • modem modem
  • graphics processing unit graphics processing unit
  • image signal processor image signal processor
  • ISP image signal processor
  • controller a video encoder
  • One or more items of decoder digital signal processor (digital signal processor, DSP), baseband processor, and/or neural network processor (neural-network processing unit, NPU), etc.
  • different processing units may be independent devices, or may be integrated in one or more processors.
  • the memory 220 may store a program, and the program may be executed by the processor 210, so that the processor 210 executes the method provided in this application.
  • the memory 220 may also store data.
  • the processor 210 can read data stored in the memory 220 .
  • the memory 220 and the processor 210 may be provided separately.
  • the memory 220 may also be integrated in the processor 210 .
  • the communication module 230 may include at least one of a mobile communication module and a wireless communication module. Wherein, when the communication module 230 includes a mobile communication module, the communication module 230 can provide solutions including 2G/3G/4G/5G wireless communication applied on the electronic device 200 .
  • GSM global system for mobile communications
  • GPRS general packet radio service
  • CDMA code division multiple access
  • WCDMA wideband code division multiple access
  • TD-SCDMA time-division code division multiple access
  • LTE long term evolution
  • NR new radio
  • the communication module 230 may include at least one filter, switch, power amplifier, low noise amplifier (low noise amplifier, LNA) and the like.
  • the communication module 230 can receive electromagnetic waves through at least one antenna, filter and amplify the received electromagnetic waves, and send them to the modem for demodulation.
  • the communication module 230 can also amplify the signal modulated by the modem, convert it into electromagnetic wave and radiate it through the antenna.
  • at least part of the functional modules of the communication module 230 may be disposed in the processor 210 .
  • at least part of the functional modules of the communication module 230 and at least part of the modules of the processor 210 may be disposed in the same device.
  • the communication module 230 can provide applications on the electronic device 200 including wireless local area networks (wireless local area networks, WLAN) (such as wireless fidelity (wireless fidelity, Wi-Fi) network), bluetooth (bluetooth, BT), global navigation satellite system (global navigation satellite system, GNSS), frequency modulation (frequency modulation, FM), near field communication technology (near field communication, NFC), infrared technology (infrared, IR) and other wireless communications s solution.
  • the communication module 230 may be one or more devices integrating at least one communication processing module.
  • the communication module 230 receives electromagnetic waves through the antenna, frequency-modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 210 .
  • the communication module 230 can also receive the signal to be sent from the processor 210, perform frequency modulation on it, amplify it, and convert it into electromagnetic wave and radiate it through the antenna.
  • the structure shown in FIG. 2 of this solution does not constitute a specific limitation on the electronic device 200 .
  • the electronic device 200 may include more or fewer components than shown in the figure, or combine certain components, or separate certain components, or arrange different components.
  • the illustrated components can be realized in hardware, software or a combination of software and hardware.
  • FIG. 3 shows a schematic flow chart of a method for controlling smart home devices provided by an embodiment of the present application. As shown in Figure 3, the method may include the following steps:
  • the step of performing initial configuration on the equipment in the hotel is used to perform initial configuration on the equipment in the hotel.
  • the hotel administrator can log in to the client to initialize the equipment in the hotel, so that subsequent customers staying in the hotel can bind to the equipment in the hotel and use the equipment in the hotel.
  • S1 is not a necessary step of the method. That is, in the execution of this method, S1 does not need to be executed every time.
  • the customer can log in to the client and bind his user account to the equipment in the hotel, so that the customer can log in to the hotel on the client. equipment for manipulation.
  • the customer binds the device, he can share the bound device with the companions, so that the companions can also control the equipment in the hotel on the client.
  • S3 is not a necessary step of the method. That is, in the execution of the method, S3 does not need to be executed every time, and S3 may not be executed every time, or S3 may be executed every time.
  • the customer can actively unbind the device on the client, so that subsequent customers who check in can bind to the device.
  • the hotel administrator can also unbind the device from the client on the client, so that subsequent customers can bind to the device.
  • FIG. 4 is a schematic flowchart of the steps of initial configuration of the devices in the hotel in the smart home device control method provided by the embodiment of the present application.
  • the steps for initial configuration of the equipment in the hotel may include:
  • the administrator of the hotel can initially configure the gateway before the hotel is put into operation. For example, configuring the network for the gateway, etc.
  • S41 is not a necessary step of the method. That is, during execution of the method, S41 does not need to be executed every time.
  • the gateway is borne by a router in the hotel, the gateway has been connected to the network in the hotel through a network cable at this time, therefore, there is no need to configure a network for the gateway at this time, that is, it is not necessary to execute S41.
  • the administrator of the hotel can initially configure the smart device before the hotel is put into operation. For example, configuring the network for smart devices, etc.
  • the gateway discovers the smart device in the local area network.
  • the gateway can discover the smart devices in the same local area network. At this point, the initial configuration of the equipment in the hotel is completed.
  • S41 may include the following steps:
  • the first device used by the administrator accesses the network in the room to which the gateway belongs.
  • the administrator when the administrator initially configures the gateway, he may first connect the first device he uses to the network in the room to which the gateway belongs; wherein, the gateway is not connected to the network at this time.
  • each room in the hotel can be individually configured with a network.
  • a client related to smart home device control is installed on the first device, such as a Huawei smart life client.
  • the client logged in by the administrator acquires the first identification code in the gateway.
  • the administrator can use the management account and password to log in to the client on the first device (such as a mobile phone) on which the client is installed. Afterwards, the client logged in by the administrator can obtain the first identification code in the gateway with the assistance of the administrator.
  • the first device such as a mobile phone
  • a first identification code such as a personal identification number (personal identification number, PIN code), may be preset on the gateway.
  • the first identification code may be preset in an NFC tag on the gateway.
  • the administrator can use the first device to touch the gateway, so that the client logged in by the administrator can obtain the first identification code.
  • the first identification code may also be preset in a graphic code (such as a two-dimensional code) on the gateway.
  • the administrator may use the first device to scan the graphic code, so that the client logged in by the administrator can obtain the first identification code.
  • the first identification code may be preset in the NFC tag on the gateway, and at the same time be preset in the graphic code on the gateway. At this time, the administrator can use any method to enable the client logged in by the administrator to obtain the first identification code.
  • the first identification code may also be randomly generated.
  • the gateway can randomly generate a first identification code through the touch operation, and send the first identification code to the client logged in by the administrator.
  • the gateway is carried on a device with a display screen, the first identification code randomly generated by the gateway can be presented to the administrator in the form of a graphic code on the display screen, so that the administrator can use the first device to scan the graphic code to obtain first identification code.
  • the client logged in by the administrator discovers and logs in the gateway.
  • the administrator can add or search for devices on the client logged in by the administrator, or the client logged in by the administrator can automatically execute the process of discovering devices.
  • the administrator can select the "search device” button in the area 61 to discover the device.
  • the gateway can perform a self-test to determine whether it is configured for the network.
  • the gateway can broadcast its own device information (such as the gateway's identity, etc.) to the outside, so as to be discovered by other devices;
  • the client logged in by the administrator can get the information of the gateway and discover the gateway.
  • the gateway can also broadcast its unconfigured network information to the outside. After the client logged in by the administrator receives the information about the gateway's unconfigured network, it can determine to execute the network configuration process instead of the binding process.
  • the client logged in by the administrator After the client logged in by the administrator searches for devices, it can present the discovered devices to the administrator for selection. Exemplarily, as shown in (b) of FIG. 6 , the client logged in by the administrator may present a device list to the administrator.
  • the administrator can select the gateway to perform initial configuration on the gateway. Exemplarily, continuing to refer to (b) of FIG. 6 , the administrator can select “gateway a” at area 62 .
  • the client logged in by the administrator After the client logged in by the administrator receives the administrator's selection operation, the client logged in by the administrator can display the gateway login interface, on which the administrator needs to enter the login name and password of the gateway. After the administrator enters the login name and password of the gateway, the client logged in by the administrator can access the gateway. At this time, the client logged in by the administrator can perform initial configuration on the gateway. In one example, a login name and password may be reserved on the gateway.
  • the client logged in by the administrator may display a login interface.
  • the administrator can input the login name of gateway a at area 63 and the login password of gateway a at area 64 .
  • the administrator can select the "next step" button in the area 65; after that, the client logged in by the administrator can perform initial configuration on the gateway a.
  • the client logged in by the administrator negotiates with the gateway based on the first identification code, and determines a first shared key required for secure communication between the two.
  • the client logged in by the administrator may negotiate with the gateway based on the first identification code to obtain the first shared key.
  • both can use the first shared key to encrypt communication information, and send the encrypted communication information to the other party, so as to ensure communication security.
  • the client logged in by the administrator can use the first identification code to negotiate with the gateway through a key exchange algorithm (simple password exponential key exchange, SPEKE) based on password authentication, and determine Generate the first shared key.
  • a key exchange algorithm simple password exponential key exchange, SPEKE
  • the process of determining the first shared key is described by taking the client logged in by the administrator as Client, the gateway as Gateway, and the first identification code as p as an example.
  • the process is specifically:
  • Client generates a random public key/private key pair U A /V A , encrypts U A with p to obtain E p (U A ), and sends E p (U A ) to Gateway.
  • Client generates a random challenge number C A , encrypts C A with K to get E k (C A ), and sends it to Gateway.
  • the Gateway decrypts E k (C A ) to obtain C A .
  • Gateway generates a random challenge number C B , encrypts (C A
  • the client decrypts E k (C A
  • Client encrypts C B with K, obtains E k (C B ), and sends it to Gateway.
  • the Gateway decrypts E k (C B ) to obtain C B . If the above steps are successfully completed, the Client and the Gateway successfully negotiate the first shared key K, that is, the first shared key K is determined. Wherein, during the subsequent communication process, the Client and the Gateway may use the first shared key K to encrypt the communication information, and then send the encrypted communication information to the other party.
  • the information sending process is described by taking the client logged in by the administrator as Client, the gateway as Gateway, the first shared key as K, and the data to be sent as f as examples.
  • the process is specifically as follows: 1).
  • the Client encrypts f with K to obtain E k (f), and sends E k (f) to the Gateway.
  • the Gateway uses K to decrypt E k (f) to obtain f.
  • the client logged in by the administrator acquires the first public key of the gateway.
  • the client logged in by the administrator may send a public key acquisition request to the gateway.
  • the gateway may use the first shared key to encrypt its own first public key and send it to the client logged in by the administrator.
  • the client logged in by the administrator decrypts the information sent by the gateway to obtain the first public key.
  • the client that the administrator logs in to obtain the public key of the gateway is mainly to facilitate the key negotiation between the gateway and the smart device when the gateway discovers the smart device.
  • the client logged in by the administrator configures a network for the gateway.
  • this step is mainly to configure the network for the gateway, such as selecting the network to be joined by the gateway and the network joining password, etc., so that the gateway can be connected to the wireless network in the hotel.
  • the client logged in by the administrator can display the network configuration interface, which is shown in (d) of Figure 6 interface, at this point, the administrator can choose the network he wants the gateway to join.
  • the administrator can select "room a" network at area 66, then, the administrator can input the network password of "room a" at area 67, and select "next step” at area 68 "button.
  • the client logged in by the administrator can send the network name and password configured by the administrator to the gateway. This completes configuring the network for the gateway.
  • the gateway accesses the configured network.
  • the gateway After the gateway receives the configuration information sent by the client logged in by the administrator, it can join the configured network according to the network name and password in the configuration information.
  • the initial network configuration of the gateway is completed.
  • the newly configured gateway can be viewed in the client where the administrator logs in.
  • the newly configured gateway a can be seen on the client logged in by the administrator.
  • S42 may include the following steps:
  • the first device used by the administrator accesses the network in the room to which the smart device belongs.
  • the administrator when the administrator initially configures the smart device, he may first connect the first device he uses to the network in the room to which the smart device belongs; wherein, the smart device is not connected to the network at this time.
  • each room in the hotel can be individually configured with a network.
  • a client related to smart home device control is installed on the first device, such as a Huawei smart life client.
  • S420 is not a necessary step of the method. That is, during execution of the method, S420 does not need to be executed every time.
  • S420 may not be performed; if the administrator does not configure the smart device in the room to which the gateway belongs, but configures other gateways The smart device in the room to which it belongs needs to execute S420.
  • the networks in the rooms to which different gateways belong can be different, which facilitates the configuration of the gateway and the smart devices that belong to the same room as the gateway, and avoids the occurrence of configuration in the subsequent process of discovering smart devices by the gateway. Something wrong happened.
  • the client logged in by the administrator acquires the second identification code in the smart device.
  • the administrator can use the management account and password to log in to the client on the first device (such as a mobile phone) on which the client is installed. Afterwards, the client logged in by the administrator can obtain the second identification code in the smart device with the assistance of the administrator.
  • the first device such as a mobile phone
  • the client logged in by the administrator can obtain the second identification code in the smart device with the assistance of the administrator.
  • a second identification code such as a personal identification number (personal identification number, PIN code), may be preset on the smart device.
  • the second identification code can be preset in the NFC tag on the smart device.
  • the administrator can use the first device to touch the smart device, so that the client logged in by the administrator can obtain the second identification code.
  • the second identification code can also be preset in a graphic code (such as a two-dimensional code) on the smart device.
  • the administrator can use the first device to scan the graphic code, so that the administrator logs in The client can obtain the second identification code.
  • the second identification code can be preset in the NFC tag on the smart device, and also preset in the graphic code on the smart device. At this time, the administrator can use any method to make the client that the administrator logs in The second identification code is obtained.
  • the second identification code may also be randomly generated.
  • the smart device can randomly generate a second identification code through the touch operation, and send the second identification code to the client logged in by the administrator.
  • the second identification code randomly generated by the smart device can be presented to the administrator in the form of a graphic code, so that the administrator can use the first device to scan the graphic code to obtain the second identification code.
  • the client logged in by the administrator discovers the smart device.
  • administrators can add or search for devices on their logged-in clients.
  • the administrator can select the "search device" button in area 61 to discover devices.
  • the smart device can perform a self-check to determine whether it is configured with a network.
  • the smart device can broadcast its own device information (such as the identification of the smart device, etc.) to the outside, so as to be discovered by other devices; After the device broadcasts the device information, the client logged in by the administrator can obtain the information of the smart device, thereby discovering the smart device.
  • the client logged in by the administrator After the client logged in by the administrator searches for devices, it can present the discovered devices to the administrator for selection. Exemplarily, continuing to refer to (b) of FIG. 6 , the client logged in by the administrator may present a device list to the administrator.
  • the administrator can select the smart device to perform initial configuration on the smart device. Exemplarily, as shown in FIG. 8 , the administrator can select "smart device a" in area 81 .
  • the client logged in by the administrator negotiates with the smart device based on the second identification code, and determines a second shared key required for secure communication between the two.
  • the client logged in by the administrator may negotiate with the smart device based on the second identification code to obtain the first shared key.
  • both can use the second shared key to encrypt communication information, and send the encrypted communication information to the other party, so as to ensure communication security.
  • the client logged in by the administrator obtains the second identification code, it can use the second identification code to negotiate with the smart device through a key exchange algorithm (simple password exponential key exchange, SPEKE) based on password authentication, A second shared key is determined.
  • SPEKE simple password exponential key exchange
  • the client logged in by the administrator sends the first public key of the gateway to the smart device, and acquires the second public key of the smart device.
  • the client logged in by the administrator can use the second shared key to encrypt the first public key of the gateway and send it to the smart device.
  • the smart device After the smart device receives the encrypted information, it can decrypt it to obtain the first public key of the gateway.
  • the smart device may use the second shared key to encrypt its own second public key and send it to the client logged in by the administrator.
  • the client logged in by the administrator decrypts the information sent by the smart device to obtain the second public key.
  • the client logged in by the administrator obtains the public key of the smart device mainly to inform the gateway of the public key of the smart device later, so that the subsequent gateway can negotiate a key with the smart device during the process of discovering the smart device.
  • the client logged in by the administrator configures the network for the smart device.
  • this step is mainly to configure the network for the smart device, such as selecting the network to be joined by the smart device and the network access password, etc., so that the smart device can be connected to the wireless network in the hotel.
  • the network configured for the smart device may be the same as the network configured for the gateway, so as to ensure that the gateway and the smart device are in the same local area network.
  • the client logged in by the administrator may display a network configuration interface, that is, an interface as shown in (d) of FIG. 6 .
  • a network configuration interface that is, an interface as shown in (d) of FIG. 6 .
  • administrators can choose the networks they want the smart device to join.
  • the administrator may select the "room a" network at area 66 .
  • the administrator can enter the network password for “room a” at field 67 and select the “Next” button at field 68 .
  • the client logged in by the administrator can send the network name and password configured by the administrator to the smart device a. So far, the network configuration for smart device a is completed.
  • the smart device accesses the configured network.
  • the smart device can join the configured network according to the network name and password in the configuration information.
  • S43 may be shown in (A) of FIG. 9 .
  • the step shown in (A) of FIG. 9 is a step in which the administrator actively triggers the gateway to discover the smart device.
  • S43 may include the following steps:
  • the client logged in by the administrator sends a device discovery instruction to the gateway.
  • the administrator configures the gateway and the smart device, he can log in to the gateway from the client he logs in, and choose to let the gateway discover the device.
  • the gateway can select the "discover device" button in area 101, and then, the client logged in by the administrator can send a device discovery instruction to the gateway.
  • the client that the administrator logs in can send device discovery commands to the gateway.
  • the device discovery instruction may include the second public key of the smart device, so that the gateway obtains the public key of the smart device and negotiates with the smart device for a shared key.
  • the gateway multicasts the device discovery request.
  • the gateway can multicast and send the device discovery request in the local area network.
  • the device discovery request may carry device information of the gateway.
  • the device identifier of the gateway may include an identity identifier of the gateway, such as a product serial number, a host address, and the like.
  • the smart device sends the identity identifier to the gateway.
  • the smart device can send its own identity to the gateway.
  • the smart device information of the gateway has been stored in the smart device, it indicates that the smart device has been registered with the gateway, and at this time, the smart device does not need to send the identity to the gateway again.
  • the gateway negotiates with the smart device using its own public key and the public key of the smart device to determine a third shared key required for secure communication between the two.
  • the gateway can query the public key of the smart device based on the identity. Afterwards, the gateway can use its own public key and the public key of the smart device to negotiate with the smart device through a station-to-station key negotiation algorithm (station-to-station, STS), and obtain a first key that both can share. Three shared keys. Afterwards, the two can use the third shared key to encrypt the communication information, and send the encrypted communication information to the other party, thereby realizing communication security between the two.
  • station-to-station key negotiation algorithm station-to-station, STS
  • the smart device registers with the gateway.
  • the gateway can record the device information of the smart device, and at the same time, the device information of the gateway can also be recorded in the smart device.
  • the device identifier of the smart device may include an identity of the smart device, such as a product serial number, a host address, etc.
  • the device identifier of a gateway may include an identity of the gateway, such as a product serial number, a host address, and the like.
  • the gateway discovers the smart devices in the same local area network as it.
  • the specific steps of S43 may also be as shown in (B) of FIG. 9 .
  • the step shown in (B) of FIG. 9 is a step in which the gateway automatically triggers the discovery of the smart device. Since it is difficult for the gateway to broadcast continuously, in order to improve efficiency, when the smart device is online, the smart device can send the broadcast that it has been online. After the gateway receives the broadcast, it can start discovering devices. In addition, when the gateway discovers the smart device, the gateway and the smart device need to negotiate a shared key. The prerequisite for negotiating the shared key is that the gateway needs to know the public key of the smart device in advance, and the smart device needs to know the gateway’s public key in advance.
  • the client logged in by the administrator can actively send the public key of the smart device to the gateway, so that the gateway can obtain the public key of the smart device in time. It can be understood that since the client logged in by the administrator has already sent the public key of the gateway to the smart device when configuring the smart device, the client logged in by the administrator does not need to send the public key of the gateway to the smart device again at this time .
  • S43 may include the following steps:
  • the smart device sends online information.
  • the smart device After the smart device is turned on, it can broadcast information that it is online in the local area network.
  • the online information can be understood as the information that the smart device is turned on.
  • the gateway multicasts the device discovery request.
  • the smart device sends the identity identifier to the gateway.
  • the gateway negotiates with the smart device using its own public key and the public key of the smart device to determine a third shared key required for secure communication between the two.
  • the smart device registers with the gateway.
  • the gateway discovers the smart devices in the same local area network as it.
  • the administrator can view the smart devices discovered by the gateway on the gateway.
  • the gateway can view the smart devices discovered by the gateway, such as smart device a and smart device b.
  • the administrator can set a maintenance password for the gateway to lock the relationship between the gateway and the smart device, preventing people other than the administrator (such as staying in a hotel) customers, etc.) to change the relationship between the gateway and the smart device at will.
  • the client through which the administrator logs in may guide the administrator to set a maintenance password.
  • the customer can check in the hotel; wherein, after the customer checks in the hotel, he can bind the gateway in the room where he is staying to control the smart devices registered in the gateway.
  • the second device used by the customer can perform short-distance communication with the gateway, and the second device can perform long-distance communication with the server corresponding to the client installed on the second device.
  • long-distance communication is possible between the gateway and the server.
  • FIG. 12 is a schematic flowchart of the steps of checking in a hotel and binding a device to a customer in the smart home device control method provided by the embodiment of the present application.
  • the steps for the customer to check in the hotel and bind the device may include:
  • the client logged in by the customer acquires the identity of the gateway and the third identification code in the gateway.
  • the customer can log in to the client by using the registered user account and password on the second device (such as a mobile phone) on which the client is installed.
  • the client logged in by the customer can obtain the identity of the gateway and the third identification code in the gateway with the assistance of the customer.
  • the gateway may send its own identity at the same time or time-divisionally when sending the third identification code to the client logged in by the customer.
  • the client logged in by the client requests the first activation code from the server.
  • the client logged in by the customer After the client logged in by the customer obtains the identity of the gateway, it can send the identity of the gateway to the server, so as to request the server for the first activation code.
  • the first activation code is mainly used to represent the identity of the gateway.
  • the server sends the first activation code to the client logged in by the client.
  • the server may randomly generate the first activation code based on the identity of the gateway.
  • the first activation code may consist of multiple random numbers.
  • the server After the server generates the first activation code, it can send the first activation code to the client terminal where the customer logs in.
  • the client logged in by the client negotiates with the gateway based on the third identification code, and determines a fourth shared key required for secure communication between the two.
  • the client logged in by the customer negotiates with the gateway based on the third identification code to obtain the fourth shared key.
  • the fourth shared key is mainly used to encrypt communication information during communication between the two.
  • the subsequent information communicated between the two can be encrypted with the fourth shared key before being transmitted to the other party.
  • the process of encryption and decryption will not be described in the subsequent steps.
  • the client logged in by the customer sends a binding request to the gateway.
  • the client logged in by the customer may encrypt the binding request based on the fourth shared key, and send the encrypted binding request to the gateway.
  • the binding request is a request to bind the user account of the client terminal logged in by the customer to the gateway.
  • the binding request may carry a first account identifier used to characterize the customer account.
  • the first account identifier used to represent the customer account may be a hash value obtained after hash calculation is performed on the customer account.
  • the gateway judges whether it is bound.
  • the gateway decrypts the information to obtain the binding request.
  • the gateway may store an account identifier used to represent the customer's user account. Therefore, when the gateway receives the binding request sent by the client logged in by the customer, the gateway can determine whether the account ID is stored in it. If the account ID is stored in the gateway, it means that the gateway has been bound with other customers. At this time , the gateway can prohibit the current client from binding, and at this time, the gateway can feed back the binding failure information to the client logged in by the client. If no account identifier is stored in the gateway, it means that the gateway is not bound with other customers. At this time, the gateway can agree to bind with the current customer and perform subsequent steps.
  • the gateway can record the customer account information of the customer. For example, record the customer's account ID.
  • the gateway sends information agreeing to bind to the client logged in by the customer.
  • the client logged in by the customer sends the first activation code to the gateway.
  • the gateway registers with the server.
  • the gateway may send its own identity and the first activation code to the server.
  • the server receives the identity identifier and the first activation code sent by the gateway, it can query whether the first activation code is just assigned by it from the record of the activation code generated by it. If the server determines that the first activation code is the one it has just allocated, it may allow the gateway to register. At this point, the server can record the information of the gateway (such as an identity), and associate the gateway with the account of the customer.
  • the server can assign an identifier representing the identity of the gateway to the gateway, wherein the server can record the identifier and use the identifier as the information of the gateway.
  • the server sends a registration result to the gateway.
  • the gateway sends a registration result to the client logged in by the customer.
  • the server pushes the device information of the gateway to the client logged in by the client.
  • the gateway applies to the server in batches for the second activation codes corresponding to each smart device.
  • the gateway may send the identities of the smart devices registered thereto to the server, so as to apply to the server for the second activation codes of the smart devices in batches.
  • the second activation code is mainly used to characterize the identity of the smart device.
  • the server sends the second activation code of each smart device to the gateway.
  • the server may randomly generate a corresponding second activation code based on the identity of each device.
  • the second activation code may consist of multiple random numbers.
  • the server may send the second activation code to the gateway.
  • the gateway sends the second activation code of the smart device to the smart device.
  • the smart device registers with the server.
  • the smart device may send its own identity and the second activation code to the server.
  • the server receives the ID and the activation code sent by the smart device, it can inquire whether the second activation code is just allocated from the record of the activation code generated by it. If the server determines that the second activation code was just assigned by it, it may allow the smart device to register. At this point, the server can record information of the smart device (such as an identity), and associate the smart device with the customer's account.
  • the server can assign an identifier representing the identity of the smart device to the smart device, wherein the server can record the identifier and use the identifier as the information of the smart device.
  • the server sends the registration result to the smart device.
  • the smart device sends a registration result to the gateway.
  • the server records the corresponding relationship between the gateway, the smart device and the account of the customer.
  • the server pushes the device information of the smart device to the client logged in by the client.
  • the gateway can record its registered information, so that the gateway can report its own status information (such as online or not, current operating parameters, etc.) in real time or periodically.
  • the smart device can also record its registered information, so that the smart device can report its own status information (such as online or not, current operating parameters, etc.) in real time or periodically.
  • the smart desk lamp may report its light brightness information and the like to the server every preset time interval (such as 30 minutes, 1 hour, etc.).
  • the smart device needs to use the second activation code to register with the server, mainly to enable the server to identify whether the smart device is a counterfeit device. If the smart device is a counterfeit device, the server can prohibit the smart device from Device registration.
  • the server can push the updated information to the client logged in by the client, so that the client can obtain the latest information in time.
  • the customer has completed the device binding.
  • the customer can view the gateway and each smart device registered under the gateway on the client terminal where the customer logs in.
  • the customer can see the gateway a bound to his account, and the smart devices a and b registered under the gateway.
  • the customer can control each smart device through the client terminal logged in by the customer.
  • the smart device is a smart desk lamp as an example, and the procedure for the customer to control the smart device will be described. As shown in Figure 14, the following steps are included:
  • the client terminal logged in by the customer receives a brightness adjustment instruction issued by the customer for the smart desk lamp.
  • the customer can control the smart desk lamp under the gateway bound to it. For example, issue brightness adjustment instructions.
  • the customer can adjust the brightness of the smart desk lamp through the brightness adjustment control in the area c1.
  • the client logged in by the customer receives the brightness adjustment command issued by the customer.
  • the brightness adjustment instruction may include a target brightness adjustment value, such as adjusting to 60% brightness and the like.
  • the client logged in by the client sends a brightness adjustment instruction to the server.
  • the server sends a brightness adjustment instruction to the smart desk lamp.
  • the smart desk lamp After the smart desk lamp receives the brightness adjustment instruction, it adjusts the brightness according to the brightness adjustment instruction.
  • FIG. 16 is a schematic flow chart of the steps for a customer to share a device with colleagues in the smart home device control method provided by the embodiment of the present application. As shown in Figure 16, the steps for the customer to share the device with fellow personnel may include:
  • the client logged in by the customer obtains the account information of the companions.
  • the client can use the client logged in to initiate device sharing with the accounts of its companions.
  • the client terminal logged in by the customer obtains the account information of the accompanying person.
  • the client can scan a graphic code (for example, a QR code) containing the account information of the accompanying personnel by using the client that the client logs in, so that the client that the customer logs in can obtain the account information of the accompanying personnel.
  • a graphic code for example, a QR code
  • the client logged in by the client sends a sharing request to the server.
  • the sharing request carries the account information of the companion.
  • the server records the sharing information.
  • the server sends the sharing information to the client logged in by the companion.
  • the server may send the shared information to the account of the companion. Since the companion is a client that logs in with its own account, when the server sends the shared information to the account of the companion, the client that the companion logs in can receive the shared information.
  • the client terminal logged in by the companion responds to the accepting and sharing operation of the fellow, and sends information about receiving and sharing to the server.
  • the client logged in by the companions can display the shared information so that the fellows can receive and share it.
  • the client logged in by the peers can send and receive the shared information to the server.
  • the server updates the management authority of the gateway.
  • the server can update the management authority of the gateway.
  • the server may change the management authority of the gateway from the account of the customer to the account of the customer and the accounts of the companions, thereby updating the management authority of the gateway.
  • the server sends to the gateway an account identifier used to represent the user account of the accompanying person.
  • the gateway stores the account identifier.
  • the gateway sends information of successful storage to the server.
  • the server sends information that the sharing is successful to the client logged in by the companion.
  • the server sends the device information of the gateway and the smart devices registered under the gateway to the client logged in by the companion.
  • the peers can view the gateway and the smart devices under the gateway on the client that is logged in, and can control the smart devices.
  • FIG. 17 is a schematic flowchart of the steps of unbinding the device for the customer or the administrator of the hotel in the smart home device control method provided by the embodiment of the present application.
  • the step for the customer to unbind the device may include:
  • the client logged in by the client receives an instruction to unbind the gateway from the client.
  • customers can unbind the gateway on their logged-in client.
  • the customer can select the gateway a in the area a1 on the client that he logs in, and then a prompt to delete the device can be displayed, that is, the device can be displayed as shown in (b) in Figure 18 displayed interface.
  • the client logged in by the customer will receive the unbinding instruction to the gateway issued by the customer.
  • the client logged in by the client sends unbinding information to the server.
  • the client logged in by the customer after the client logged in by the customer receives the unbinding instruction sent by the customer, it can send the device information of the gateway that the customer needs to unbind to the server.
  • the device information of the gateway to be unbound by the customer may include the identity of the gateway.
  • the server updates the management authority of the gateway.
  • the server may clear the management authority of the gateway.
  • the management authority is that the client can manage the gateway; after the server clears the management authority of the gateway, the management authority can be empty, and at this time, the gateway is not controlled.
  • the server sends a successful unbinding message to the client logged in by the client.
  • the client can no longer control the gateway and the smart devices registered on the gateway. Afterwards, the server can send a successful unbinding message to the client logged in by the client. After the client logged in by the customer receives the information that the unbinding is successful, the device information of the gateway and the smart device will no longer be displayed on it.
  • the server sends an unbinding instruction to the gateway.
  • the gateway clears the authority information.
  • the gateway can clear the account information stored in it, thereby clearing up the authority information.
  • the gateway can also clear the recorded information when clearing the authority.
  • the gateway sends an information clearing instruction to the smart device.
  • the gateway may send an information clearing instruction to the smart device, so that the smart device clears the information that the smart device has registered to the server.
  • the smart device clears its recorded information registered with the server.
  • the smart device sends a clearing success message to the gateway.
  • the gateway sends information that the unbinding is successful to the server.
  • the server can send the unbinding instruction to the gateway again, that is, execute steps S1715-S1719 again until the server receives the unbinding successful information sent by the gateway.
  • the steps for the hotel administrator to unbind the device may include:
  • the first device used by the administrator accesses the network in the room to which the gateway belongs.
  • the administrator when the administrator unbinds the device for the client, the administrator can enter the room where the client lives, and connect the first device used by the administrator to the network in the room.
  • the first device may access the network provided by the router in the room to which the gateway belongs.
  • the client logged in by the administrator acquires the identity of the gateway and the fourth identification code in the gateway.
  • the administrator can use the management account and password to log in to the client on the first device (such as a mobile phone) on which the client is installed.
  • the client logged in by the administrator can obtain the fourth identification code in the gateway, such as a personal identification number (personal identification number, PIN code) with the assistance of the administrator.
  • the fourth identification code may be randomly generated, or preset in the gateway, which is not limited here.
  • the administrator can use the first device to touch the gateway to obtain the fourth identification code.
  • the process of obtaining the fourth identification code refer to the above description for details, and will not be repeated here.
  • the client logged in by the administrator requests the third activation code from the server.
  • the client logged in by the administrator may send the identity of the gateway to the server to request the third activation code from the server.
  • the third activation code is mainly used to represent the identity of the gateway.
  • the server sends the third activation code to the client logged in by the administrator.
  • the server may randomly generate a third activation code based on the identity of the gateway.
  • the third activation code may be composed of multiple random numbers.
  • the server may send the third activation code to the client logged in by the administrator.
  • the client logged in by the administrator negotiates with the gateway based on the fourth identification code, and determines a fifth shared key required for secure communication between the two.
  • the client logged in by the administrator obtains the fourth identification code, it can use the fourth identification code to negotiate with the gateway through a key exchange algorithm (simple password exponential key exchange, SPEKE) based on password authentication to determine the For the fifth shared key, refer to the description above for details, and will not be repeated here.
  • a key exchange algorithm simple password exponential key exchange, SPEKE
  • the subsequent communication information between the two can be encrypted with the fifth shared key before being transmitted to the other party.
  • the process of encryption and decryption will not be described in the subsequent steps.
  • the client logged in by the administrator sends a binding request to the gateway.
  • the client logged in by the administrator may encrypt the binding request based on the fifth shared key, and send the encrypted binding request to the gateway.
  • the binding request is a request to bind the management account of the client terminal logged in by the administrator with the gateway.
  • the binding request may carry a third account identifier used to represent the management account.
  • the third account identifier used to represent the management account may be a hash value obtained after hash calculation is performed on the management account.
  • the gateway determines that it cannot be bound.
  • the gateway After the gateway receives the binding request sent by the client logged in by the administrator, since the gateway has already been bound to the client, the administrator cannot be bound again at this time, and the gateway can determine that it cannot be bound. Certainly.
  • the gateway sends information requesting input of a maintenance password to the client logged in by the administrator.
  • the client logged in by the administrator sends the maintenance password to the gateway.
  • the gateway feeds back a password verification result.
  • the client logged in by the administrator sends an information query request to the gateway.
  • the gateway feeds back the device information to the client logged in by the administrator.
  • the gateway can send its own device information and the device information of the smart devices registered to it to the client logged in by the administrator, so that the client logged in by the administrator can display the gateway to the user and register to the gateway smart devices, and then maintain the gateway and the smart devices registered to the gateway.
  • the client logged in by the administrator receives an instruction to unbind the gateway issued by the administrator.
  • administrators can unbind gateways for customers on their logged-in clients.
  • the administrator can select the gateway a in the area a1 on the client he logs in, and then a prompt to delete the device can be displayed, that is, the (b) of Figure 18 can be displayed ) shows the interface.
  • the administrator selects "delete device" in area a2
  • the client where the administrator logs in receives the unbinding instruction to the gateway issued by the administrator.
  • the gateway sends unbinding information to the server.
  • the gateway after the gateway receives the unbinding instruction sent by the client logged in by the administrator, it can send its own device information to the server.
  • the device information of the gateway may include the identity of the gateway.
  • the server updates the management authority of the gateway.
  • the server sends information that the authority is updated successfully to the gateway.
  • the client can no longer control the gateway and the smart devices registered on the gateway. That is, it can be understood that the unbinding has been successful at this time, so the server can send a successful authority update message to the gateway. information.
  • the gateway sends information that the unbinding is successful to the client logged in by the administrator.
  • the gateway may send the information of successful unbinding to the client logged in by the administrator.
  • the gateway may resend the unbinding information to the server.
  • the gateway clears the authority information.
  • the gateway can clear the account information stored in it, thereby realizing clearing the authority information.
  • the gateway can also clear the recorded information when clearing the authority.
  • the gateway sends an information clearing instruction to the smart device.
  • the gateway may send an information clearing instruction to the smart device, so that the smart device clears the information that the smart device has registered to the server.
  • the smart device clears its recorded information registered with the server.
  • the smart device sends a clearing success message to the gateway.
  • S1722-S1732 can also be understood as a process for the administrator to maintain the device. Among them, after S1732, the administrator can view the information of the gateway and the smart devices registered to the gateway. At this time, the administrator can maintain the gateway and the smart devices registered to the gateway, such as equipment maintenance.
  • the device used by the administrator needs to communicate with the gateway in short distance to obtain the information of the gateway and the smart device registered on the gateway. Therefore, the administrator cannot Remotely obtain the device information used by the user, thereby ensuring the privacy and security of the user.
  • the administrator can only use the device he uses to communicate with the gateway in the room in a short distance, so that he can obtain the information of the camera device. After the customer checks in the room, it is difficult for the administrator to Casually entering the guest room prevents the administrator from obtaining the information of the camera equipment at will, thus protecting the user's privacy and avoiding the leakage of the user's privacy.
  • the operations performed by the client can be understood as the operations performed by the device where the client is located.
  • FIG. 19 shows a schematic flowchart of another method for controlling smart home devices.
  • a client related to smart home device control is installed on the first electronic device, a first account is logged on the client, and the client corresponds to a server.
  • the first electronic device can perform short-distance communication with the second electronic device, and the second electronic device can perform long-distance communication with the server.
  • There are n smart devices pre-registered on the second electronic device that is, n smart devices are pre-bound with the second electronic device, and the second electronic device and n smart devices are in the same local area network, and n is greater than or equal to 1 positive integer.
  • the second electronic device may be a gateway, or an electronic device integrated with a gateway function, which may be understood as an entrance for the first electronic device to access the smart home system to which the second electronic device belongs.
  • the second electronic device when the second electronic device is an electronic device with a gateway function, the second electronic device may be a central device, such as a smart speaker, a smart TV, a smart screen, and the like.
  • the first electronic device may be the device used by the customer described above, for example, the first electronic device may be the mobile phone 15 described in Figure 1 above; the second electronic device may be the mobile phone 15 described in Figure 1 above
  • the gateway 11 described in ; the smart device can be the smart speaker 12 , the smart desk lamp 13 and the smart TV 14 described in FIG. 1 above; the server can be the server 16 described in FIG. 1 above.
  • the smart home device control method may include the following steps:
  • the first electronic device communicates with the second electronic device in a short distance, and acquires first information related to the second electronic device from the second electronic device, where the first information includes a first identifier of the second electronic device.
  • the first electronic device may touch the second electronic device, or scan a graphic code on the second electronic device, to obtain the first identification of the second electronic device.
  • the first electronic device may touch the second electronic device, or scan a graphic code on the second electronic device, to obtain the first identification of the second electronic device.
  • the first electronic device sends a first message to the server, where the first message includes a first identifier, and the first message is used to obtain a first activation code representing the identity of the second electronic device.
  • the first electronic device may send the first identification to the server, so as to obtain the first activation code representing the identity of the second electronic device from the server.
  • the server responds to the first message, and generates a first activation code based on the first identifier.
  • the server may randomly generate the first activation code based on the first identifier.
  • the first activation code may consist of multiple random numbers.
  • the server sends the first activation code to the first electronic device.
  • the first electronic device sends a second message to the second electronic device, the second message includes the first account, and the second message is used to request to bind the first account with the second electronic device.
  • the first electronic device may send a second message including the first account to the second electronic device, so as to request to bind the first account with the second electronic device.
  • the second message can be understood as a message related to the binding request.
  • the second electronic device responds to the second message, agrees to bind with the first account, and stores the first account.
  • the second electronic device may agree to bind with the first account and store the first account.
  • the second electronic device sends a third message to the first electronic device, where the third message includes information that the second electronic device agrees to the binding.
  • the first electronic device sends a fourth message to the second electronic device in response to the third message, the fourth message includes the first activation code, and the fourth message is used to instruct the second electronic device to register with the server using the first activation code.
  • the second electronic device sends a fifth message to the server in response to the fourth message, the fifth message includes the first identification and the first activation code, and the fifth message is used to request registration to the server.
  • the second electronic device may send a message including the first identification and the first activation code to the server, so as to request registration to the server.
  • the server responds to the fifth message, agrees to register the second electronic device, and records the first identifier.
  • the server may inquire whether the first activation code is just assigned by the server from the record of the activation code generated by it. If the server determines that the first activation code was just assigned by it, it may allow the registration of the second electronic device. At this time, the server may record the information of the second electronic device (such as the first identifier), and associate the second electronic device with the customer's account. In addition, in order to avoid leakage of user data, the server may assign an identifier representing the identity of the second electronic device to the second electronic device, wherein the server may record the identifier and use the identifier as the information of the second electronic device.
  • the server sends a sixth message to the second electronic device, where the sixth message includes information that the registration is successful.
  • the server sends a seventh message to the first electronic device, where the seventh message includes device information of the second electronic device.
  • the second electronic device sends an eighth message to the server in response to the sixth message.
  • the eighth message contains the second identifiers of n smart devices, and the eighth message is used to request to obtain n second identifiers representing the identities of n smart devices.
  • Activation code one second activation code corresponds to one smart device.
  • the second electronic device may apply to the server in batches for the second activation codes corresponding to each smart device, so that subsequent smart devices can be registered on the server.
  • the server responds to the eighth message, and generates n second activation codes based on the second identifiers of the n smart devices.
  • the server may randomly generate a second activation code corresponding to each smart device based on the second identification of each smart device.
  • the second activation code may consist of multiple random numbers.
  • the server sends n second activation codes to the second electronic device.
  • the second electronic device sends a ninth message to the smart device, where the ninth message includes the second activation code, and the ninth message is used to instruct the smart device to register with the server by using the second activation code.
  • the smart device sends a tenth message to the server in response to the ninth message, the tenth message includes the second identification and the second activation code of the smart device, and the tenth message is used to request registration to the server.
  • the server responds to the tenth message, agrees to register the smart device, and records the second identifier.
  • the server may inquire whether the second activation code is just assigned by the server from the record of the activation code generated by it. If the server determines that the second activation code was just assigned by it, it may allow the smart device to register. At this point, the server may record the information of the smart device (such as the second identifier), and associate the smart device with the customer's account. In addition, in order to avoid leakage of user data, the server may assign an ID representing the identity of the smart device to the smart device, wherein the server may record the ID and use the ID as the information of the smart device. S1919. The server sends an eleventh message to the smart device, where the eleventh message includes information that the registration is successful.
  • the server sends a twelfth message to the first electronic device, where the twelfth message includes device information of the smart device. It can be understood that the seventh message and the twelfth message may be sent separately, or may be combined and sent simultaneously, which is not limited here.
  • the first electronic device outputs device information of the second electronic device and the smart device.
  • the first electronic device may output device information of the second electronic device and the smart device, so that the user can view the second electronic device and the smart device.
  • the first electronic device may display the device information of the second electronic device and the smart device, and may also broadcast the device information of the second electronic device and the smart device through a voice broadcast.
  • the first electronic device may display the device information of the second electronic device when receiving the seventh message, and display the device information of the smart device when receiving the twelfth message. device information.
  • the first electronic device can display the device information of the second electronic device and the smart device at the same time when receiving the seventh message and the twelfth message, and can also display the device information of the second electronic device in a time-sharing manner.
  • Device information of electronic devices and smart devices which is not limited here.
  • the second electronic device and/or the smart device may be manipulated.
  • the unbinding process may include the following steps:
  • the first electronic device receives an unbinding instruction.
  • the first electronic device sends a thirteenth message to the server, where the thirteenth message is used to indicate to release the binding relationship between the second electronic device and the first account.
  • the server responds to the thirteenth message, and updates the management authority of the second electronic device.
  • the server may clear the management authority of the second electronic device.
  • the management authority is that the client can manage the second electronic device; after the server clears the management authority of the second electronic device, the management authority can be empty, at this time, The second electronic device is not controlled.
  • the server sends a fourteenth message to the second electronic device, where the fourteenth message is used to instruct the second electronic device to unbind the first account.
  • the second electronic device responds to the fourteenth message, and clears the stored account information and registration information registered on the server.
  • the second electronic device when the second electronic device releases the binding between itself and the account, the account information stored in it can be cleared, thereby realizing the unbinding.
  • the second electronic device may also clear its registration information registered on the server, so that the second electronic device no longer feeds back device information to the server.
  • the second electronic device sends a fifteenth message to the smart device, where the fifteenth message is used to instruct the smart device to clear the registration information that the smart device has registered with the server.
  • the smart device responds to the fifteenth message, and clears the registration information registered on the server.
  • the smart device can clear its registration information registered to the server, so that the smart device no longer feeds back device information to the server.
  • FIG. 21 shows a schematic flowchart of another method for controlling smart home devices.
  • a client related to smart home device control is installed on the first electronic device, a first account is logged on the client, and the client corresponds to a server.
  • the first electronic device can perform short-distance communication with the second electronic device, and the second electronic device can perform long-distance communication with the server.
  • There are n smart devices pre-registered on the second electronic device that is, n smart devices are pre-bound with the second electronic device, and the second electronic device and n smart devices are in the same local area network, and n is greater than or equal to 1 positive integer.
  • the second electronic device may be a gateway, or an electronic device integrated with a gateway function, which may be understood as an entrance for the first electronic device to access the smart home system to which the second electronic device belongs.
  • the second electronic device when the second electronic device is an electronic device with a gateway function, the second electronic device may be a central device, such as a smart speaker, a smart TV, a smart screen, and the like.
  • the first electronic device may be the device used by the administrator described above; the second electronic device may be the gateway 11 described above in FIG. 1; the smart device may be the device described above in FIG. 1 The smart speaker 12, the smart desk lamp 13 and the smart TV 14; the server can be the server 16 described in FIG. 1 above.
  • the smart home device control method may include the following steps:
  • the first electronic device communicates with the second electronic device in a short distance, and obtains first information related to the second electronic device from the second electronic device, where the first information includes a first identification of the second electronic device.
  • the first electronic device sends a first message to the server, the first message includes a first identifier, and the first message is used to acquire a first activation code representing the identity of the second electronic device.
  • the server responds to the first message, and generates a first activation code based on the first identifier.
  • the server sends the first activation code to the first electronic device.
  • the first electronic device sends a second message to the second electronic device, the second message includes the first account, and the second message is used to request to bind the first account with the second electronic device.
  • the second electronic device responds to the second message, prohibiting binding with the first account.
  • the second electronic device after the second electronic device receives the second message, if there is account information stored in it, and the account information does not include the first account, it can prohibit binding with the first account, thereby preventing the second electronic device from The device is bound by multiple people. It can be understood that, in the case that the second electronic device has been bound with the account, the user can share the second electronic device with other users through device sharing, so as to realize the binding of the second electronic device to multiple people.
  • the second electronic device sends a sixteenth message to the first electronic device, where the sixteenth message includes information requesting input of a maintenance password.
  • the first electronic device receives a password input operation.
  • the first electronic device sends a seventeenth message to the second electronic device, where the seventeenth message includes a maintenance password.
  • the second electronic device responds to the seventeenth message, and sends an eighteenth message to the first electronic device, where the eighteenth message contains a password verification result.
  • the second electronic device After the second electronic device receives the maintenance password, it can compare the maintenance password with the stored password set by the administrator, and if the two are the same, the verification is successful.
  • the first electronic device responds to the eighteenth message and sends a nineteenth message to the second electronic device, where the nineteenth message includes an information query request.
  • the second electronic device responds to the nineteenth message and sends a twentieth message to the first electronic device, where the twentieth message includes device information of the second electronic device and the smart device.
  • the first electronic device responds to the twentieth message, and outputs the device information of the second electronic device and the smart device.
  • the second electronic device and/or the smart device may be manipulated, for example, the binding relationship between the second electronic device and the account is released.
  • the unbinding process may include the following steps:
  • the first electronic device receives an unbinding instruction.
  • the first electronic device sends a twenty-first message to the second electronic device, where the twenty-first message is used to indicate to release the binding relationship between the second electronic device and the account.
  • the second electronic device sends a twenty-second message to the server in response to the twenty-first message, where the twenty-second message includes information about releasing the binding relationship between the second electronic device and the account.
  • the server responds to the twenty-second message, and updates the management authority of the second electronic device.
  • the server sends a twenty-third message to the second electronic device, where the twenty-third message includes information that the unbinding is successful.
  • the second electronic device responds to the twenty-third message and sends a twenty-fourth message to the first electronic device, where the twenty-fourth message includes information that the unbinding is successful.
  • the second electronic device clears the stored account information and registration information registered on the server.
  • the second electronic device sends a fifteenth message to the smart device, where the fifteenth message is used to instruct the smart device to clear the registration information that the smart device has registered with the server.
  • the smart device responds to the fifteenth message, and clears the registration information registered on the server.
  • processor in the embodiments of the present application may be a central processing unit (central processing unit, CPU), and may also be other general processors, digital signal processors (digital signal processor, DSP), application specific integrated circuits (application specific integrated circuit, ASIC), field programmable gate array (field programmable gate array, FPGA) or other programmable logic devices, transistor logic devices, hardware components or any combination thereof.
  • CPU central processing unit
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • a general-purpose processor can be a microprocessor, or any conventional processor.
  • the method steps in the embodiments of the present application may be implemented by means of hardware, or may be implemented by means of a processor executing software instructions.
  • the software instructions can be composed of corresponding software modules, and the software modules can be stored in random access memory (random access memory, RAM), flash memory, read-only memory (read-only memory, ROM), programmable read-only memory (programmable rom) , PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically erasable programmable read-only memory (electrically EPROM, EEPROM), register, hard disk, mobile hard disk, CD-ROM or known in the art any other form of storage medium.
  • An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium.
  • the storage medium may also be a component of the processor.
  • the processor and storage medium can be located in the ASIC.
  • all or part of them may be implemented by software, hardware, firmware or any combination thereof.
  • software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in or transmitted via a computer-readable storage medium.
  • the computer instructions may be transmitted from one website site, computer, server, or data center to another website site by wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.) , computer, server or data center for transmission.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media.
  • the available medium may be a magnetic medium (such as a floppy disk, a hard disk, or a magnetic tape), an optical medium (such as a DVD), or a semiconductor medium (such as a solid state disk (solid state disk, SSD)), etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Manufacturing & Machinery (AREA)
  • Quality & Reliability (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种智能家居控制方法及系统。智能家居系统包括第二电子设备、智能设备和服务器。智能设备和第二电子设备处于同一局域网中,且智能设备已注册至第二电子设备上。其中,在用户使用其账号登录的客户端所在的第一电子设备与智能家居系统中的第二电子设备进行短距通信后,第二电子设备与用户的账号之间可以自动绑定,从而使得用户可以对第二电子设备和注册至第二电子设备上的智能设备进行操控。

Description

一种智能家居设备控制方法及系统
本申请要求于2021年6月21日提交至中国国家知识产权局、申请号为202110685507.5、申请名称为“一种智能家居设备控制方法及系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及智能家居技术领域,尤其涉及一种智能家居控制方法及系统。
背景技术
随着智能家居设备的普及,智能设备在酒店的应用也越来越广泛。家庭场景下的智能家居设备管理方案已经比较成熟,而酒店场景下智能家居设备管理诉求,与家庭场景下有明显的不同,这导致在酒店场景下仍然存在一些场景诉求是当前主流的管理方案无法满足的。例如,酒店场景下绑定设备的用户会频繁变更且不同的用户会在不同的时期绑定,而家庭场景下绑定设备的用户是固定的且基本保持不变。因此,如何在酒店场景下提供一种安全且易用的控制智能家居设备的技术方案是目前亟需解决的技术问题。
发明内容
为了解决上述的技术问题,本申请提供了一种智能家居设备控制方法、第一电子设备、第二电子设备、服务器、计算机可读存储介质及计算机程序产品。本申请提供的技术方案,能够使得用户用户只需一步操作甚至无需操作,即可自动完成全屋设备绑定,显著提升了用户体验。
第一方面,提供一种智能家居控制方法,该方法应用于第一电子设备,第一电子设备设置有客户端,客户端登录有第一账号,客户端对应有服务器;该方法可以包括:第一电子设备与第二电子设备短距通信,并从第二电子设备获取到与第二电子设备相关的第一信息,第一信息包括第二电子设备的第一标识;其中,第二电子设备注册有n个智能设备,第二电子设备与n个智能设备处于同一局域网中,n为大于或等于1的正整数;第一电子设备向服务器发送第一消息,第一消息包含第一标识,第一消息用于获取代表第二电子设备身份的第一激活码;第一电子设备接收服务器发送的第一激活码;第一电子设备向第二电子设备发送第二消息,第二消息包含第一账号,第二消息用于请求将第一账号与第二电子设备绑定;响应于接收到的第二电子设备发送的第三消息,第三消息包含第二电子设备同意绑定的信息,第一电子设备向第二电子设备发送第四消息,第四消息包含第一激活码,第四消息用于指示第二电子设备利用第一激活码向服务器注册;第一电子设备接收服务器发送的第七消息和第十二消息,第七消息包括第二电子设备的设备信息,第十二消息包含n个智能设备的设备信息,其中,第七消息为服务器在第二电子设备注册至服务器上时发送,第十二消息为服务器在n个智能设备响应第二电子设备发送的注册指令注册至服务器上时发送;第一电子设备输出第二电子设备和n个智能设备的设备信息。这样,通过配置有客户端的第一电子设备与第二电子设备进行短距通信,即可以将客户端上登录的账号与第二电子设备绑定,从而使得用户只需一步操作甚至无需操作,即可自动完成全屋设备绑定,显著提升了用户体验。示例性的, 一步操作可以理解为用户只需要将第一电子设备靠近第二电子设备。
示例性的,第二电子设备可以为网关,或者为集成有网关功能的电子设备,或者为不集成有网关功能的电子设备。示例性的,第二电子设备可以为具备网关功能的中枢设备,比如,智能音箱、智慧屏、路由器等等。
根据第一方面,在第一电子设备输出第二电子设备和n个智能设备的设备信息之后,该方法还可以包括:响应于接收到的设备分享操作,第一电子设备向服务器发送设备分享信息,设备分享信息包含待分享账号,设备分享信息用于指示服务器将待分享账号与第二电子设备绑定。这样,用户可以将绑定的设备分享至同行人员,提升了分享的便利性,从而使得同行人员可以对第二电子设备和/或智能设备进行操控。
根据第一方面,或者以上第一方面的任意一种实现方式,在第一电子设备输出第二电子设备和n个智能设备的设备信息之后,该方法还包括:响应于接收到的与第二电子设备解除绑定的解绑指令,第一电子设备向服务器发送第十三消息,第十三消息用于指示解除第二电子设备与第一账号之间的绑定关系。这样,用户可以在客户端上一键完成对第二电子设备的解绑,提升了用户操作的便利性,显著提高了用户体验。
根据第一方面,或者以上第一方面的任意一种实现方式,第一电子设备输出第二电子设备和n个智能设备的设备信息,包括:第一电子设备显示第二电子设备和n个智能设备的设备信息,和/或,第一电子设备通过语音播放第二电子设备和n个智能设备的设备信息。
第二方面,提供一种智能家居控制方法,应用于第二电子设备。第二电子设备注册有n个智能设备,第二电子设备与n个智能设备处于同一局域网中,n为大于或等于1的正整数,该方法包括:
第二电子设备与第一电子设备短距通信,向第一电子设备发送第一信息,第一信息包括第二电子设备的第一标识,其中,第一电子设备设置有客户端,客户端登录有第一账号,客户端对应有服务器;第二电子设备接收第一电子设备发送的第二消息,第二消息包含第一账号,第二消息用于请求将第一账号与第二电子设备绑定;第二电子设备存储第一账号,并向第一电子设备发送第三消息,第三消息包含第二电子设备同意绑定的信息;第二电子设备接收第一电子设备发送的第四消息,第四消息包含第一激活码,第四消息用于指示第二电子设备利用第一激活码向服务器注册,第一激活码为服务器接收到第一电子设备发送的第一消息时生成,第一消息包含第一标识,第一激活码用于代表第二电子设备的身份;第二电子设备向服务器发送第五消息,第五消息包含第一标识和第一激活码,第五消息用于请求将第二电子设备注册至服务器;响应于接收到的服务器发送的第六消息,第六消息包含注册成功的信息,第二电子设备向服务器发送第八消息,第八消息包含n个智能设备的第二标识,第八消息用于请求获取代表n个智能设备身份的n个第二激活码;第二电子设备接收服务器发送的n个第二激活码,其中,一个第二激活码对应一个智能设备;第二电子设备分别向n个智能设备发送第九消息,第九消息包含智能设备对应的第二激活码,第九消息用于指示智能设备利用智能设备对应的第二激活码向服务器注册。这样,通过配置有客户端的第一电子设备与第二电子设备进行短距通信,即可以将客户端上登录的账号与第二电子设备绑定,从而使得用户只需一步操作甚至无需操作,即可自动完成全屋设备绑定,显著提升了用户体验。
示例性的,第二电子设备可以为网关,或者为集成有网关功能的电子设备,或者为不集成有网关功能的电子设备。示例性的,第二电子设备可以为具备网关功能的中枢设备,比如,智能音箱、智慧屏、路由器等等。
根据第二方面,在第二电子设备分别向n个智能设备发送第九消息之后,该方法还包括:接收服务器发送的待分享账号,以及存储待分享账号。这样,可以将用户分享的账号与第二电子设备绑定,从而使得与用户同行的人员也可以使用第二电子设备和注册至第二电子设备上的智能设备。
根据第二方面,或者以上第二方面的任意一种实现方式,在第二电子设备分别向n个智能设备发送第九消息之后,该方法还包括:第二电子设备接收服务器发送的第十四消息,第十四消息用于指示第二电子设备与第一账号解除绑定;响应第十四消息,第二电子设备清除存储的账号信息和已注册至服务器上的注册信息。这样,第二电子设备可以与账户解除绑定关系。
根据第二方面,或者以上第二方面的任意一种实现方式,该方法还包括:第二电子设备分别向n个智能设备发送的十五消息,第十五消息用于指示智能设备清除智能设备已注册至服务器上的注册信息。这样,智能设备可以清除已注册至服务器上的信息,进而可以在第二电子设备与用户的账号解绑后不用再向服务器发送设备状态信息,提升用户体验。
第三方面,提供一种智能家居控制方法,应用于第一电子设备。第一电子设备设置有客户端,客户端登录有第一账号,客户端对应有服务器,该方法包括:第一电子设备与第二电子设备短距通信,并从第二电子设备获取到与第二电子设备相关的第一信息,第一信息包括第二电子设备的第一标识;其中,第二电子设备注册有n个智能设备,第二电子设备与n个智能设备处于同一局域网中,n为大于或等于1的正整数;第一电子设备向服务器发送第一消息,第一消息包含第一标识,第一消息用于获取代表第二电子设备身份的第一激活码;第一电子设备接收服务器发送的第一激活码;第一电子设备向第二电子设备发送第二消息,第二消息包含第一账号,第二消息用于请求将第一账号与第二电子设备绑定;第一电子设备接收第二电子设备发送的第十六消息,第十六消息包含请求输入维护密码的信息,其中,第十六消息为第二电子设备确定其存储有与用户账号相关的账号信息,且账号信息中未包含第一账号时发送;响应于接收到的密码输入操作,第一电子设备向第二电子设备发送第十七消息,第十七消息包含维护密码;第一电子设备接收第二电子设备发送的第二十消息,第二十消息包含第二电子设备和n个智能设备的设备信息;第一电子设备输出第二电子设备和n个智能设备的设备信息。这样,通过配置有客户端的第一电子设备与第二电子设备进行短距通信,即可以对第二电子设备进行维护,从而使得用户只需一步操作甚至无需操作,即可自动完成全屋设备绑定,显著提升了用户体验。
示例性的,第二电子设备可以为网关,或者为集成有网关功能的电子设备,或者为不集成有网关功能的电子设备。示例性的,第二电子设备可以为具备网关功能的中枢设备,比如,智能音箱、智慧屏、路由器等等。
根据第三方面,在第一电子设备输出第二电子设备和n个智能设备的设备信息之后,该方法还包括:响应于接收到的解绑指令,第一电子设备向第二电子设备发送第二十一消息,第二十一消息用于指示解除第二电子设备与第二电子设备中存储的账号之间的绑定关系。这样,使得可以代替其他账号的所有人解绑第二电子设备,提升操作的便利性。
第四方面,提供一种智能家居控制方法,应用于第二电子设备。第二电子设备注册有n个智能设备,第二电子设备与n个智能设备处于同一局域网中,n为大于或等于1的正整数,该方法包括:第二电子设备与第一电子设备短距通信,向第一电子设备发送第一信息,第一信息包括第二电子设备的第一标识,其中,第一电子设备设置有客户端,客户端登录有第一 账号,客户端对应有服务器;第二电子设备接收第一电子设备发送的第二消息,第二消息包含第一账号,第二消息用于请求将第一账号与第二电子设备绑定;第二电子设备确定存储有与用户账号相关的账号信息,且账号信息中未包含第一账号,向第一电子设备发送第十六消息,第十六消息包含请求输入维护密码的信息;响应于第一电子设备发送的第十七消息,第十七消息包含维护密码,第二电子设备对维护密码进行校验,以及在校验通过时,向第一电子设备发送第二电子设备和n个智能设备的设备信息。这样,通过配置有客户端的第一电子设备与第二电子设备进行短距通信,即可以对第二电子设备进行维护,从而使得用户只需一步操作甚至无需操作,即可自动完成全屋设备绑定,显著提升了用户体验。
示例性的,第二电子设备可以为网关,或者为集成有网关功能的电子设备,或者为不集成有网关功能的电子设备。示例性的,第二电子设备可以为具备网关功能的中枢设备,比如,智能音箱、智慧屏、路由器等等。
根据第四方面,在第二电子设备向第一电子设备发送第二电子设备和n个智能设备的设备信息之后,该方法还包括:第二电子设备接收第一电子设备发送的第二十一消息,第二十一消息用于指示解除第二电子设备与第二电子设备中存储的账号之间的绑定关系;响应第二十一消息,第二电子设备向服务器发送第二十二消息,第二十二消息用于指示服务器解除第二电子设备与第二电子设备中存储的账号之间的绑定关系;响应于服务器发送的第二十三消息,第二十三消息包含解绑成功的信息,第二电子设备清除第二电子设备存储的账号信息和已注册至服务器上的注册信息。这样,第二电子设备可以解除与账号的绑定关系。
根据第四方面,或者以上第四方面的任意一种实现方式,该方法还包括:第二电子设备分别向n个智能设备发送第十五消息,第十五消息用于指示智能设备清除智能设备已注册至服务器上的注册信息。这样,智能设备可以清除已注册至服务器上的信息,进而可以在第二电子设备与用户的账号解绑后不用再向服务器发送设备状态信息,提升用户体验。
第五方面,提供一种智能家居控制方法,应用于服务器。服务器与客户端对应,客户端登录有第一账号,客户端设置于第一电子设备上,该方法包括:服务器接收第一电子设备发送的第一消息,第一消息包含第二电子设备的第一标识,第一消息用于获取代表第二电子设备身份的第一激活码,其中,第一标识为第一电子设备通过与第二电子设备短距通信得到,第二电子设备注册有n个智能设备,第二电子设备与n个智能设备处于同一局域网中,n为大于或等于1的正整数;服务器基于第一标识,生成第一激活码,以及将第一激活码发送至第一电子设备。这样,服务器在接收到第二电子设备的注册请求时,可以判断注册请求中携带的第一激活码是否是其下发的,当判断是其下发的时,服务器即可以同意第二电子设备注册,提升设备注册的安全性。
示例性的,第二电子设备可以为网关,或者为集成有网关功能的电子设备,或者为不集成有网关功能的电子设备。示例性的,第二电子设备可以为具备网关功能的中枢设备,比如,智能音箱、智慧屏、路由器等等。
根据第五方面,在服务器将第一激活码发送至第一电子设备之后,该方法还包括:服务器接收第二电子设备发送的第五消息,第五消息包含第一标识和第一激活码,第五消息用于请求将第二电子设备注册至服务器;服务器对第一激活码进行校验,以及在校验通过时记录第一标识,并向第二电子设备发送第六消息,第六消息包含注册成功的信息;服务器接收第二电子设备发送的第八消息,第八消息包含n个智能设备的第二标识,第八消息用于获取代表n个智能设备身份的n个第二激活码;服务器基于n个第二标识中的各个标识,生成n个 第二激活码,以及将n个第二激活码发送至第二电子设备;服务器接收n个智能设备发送的n个第十消息,每个第十消息均包含一个智能设备的第二标识和第二激活码,第十消息用于请求将智能设备注册至服务器;服务器分别对n个第二激活码进行校验,以及在校验通过时分别记录n个智能设备的第二标识;服务器向第一电子设备发送第七消息和第十二消息,第七消息包含第二电子设备的设备信息,第十二消息包含n个智能设备的设备信息。这样,通过配置有客户端的第一电子设备与第二电子设备进行短距通信,即可以将客户端上登录的账号与第二电子设备绑定,从而使得用户只需一步操作甚至无需操作,即可自动完成全屋设备绑定,显著提升了用户体验。
根据第五方面,或者以上第五方面的任意一种实现方式,在服务器向第一电子设备发送第七消息和第十二消息之后,该方法还包括:服务器接收第一电子设备发送的第十三消息,第十三消息用于指示解除第二电子设备与第一账号之间的绑定关系;服务器更新第二电子设备的管理权限,以及向第二电子设备发送第十四消息,第十四消息用于指示第二电子设备解除与第一账号之间的绑定关系。这样,第二电子设备可以解除与第一账号之间的绑定关系。
根据第五方面,或者以上第五方面的任意一种实现方式,在服务器将第一激活码发送至第一电子设备之后,该方法还包括:服务器接收第二电子设备发送的第二十二消息,第二十二消息用于指示解除第二电子设备与第二电子设备中存储的账号之间的绑定关系;服务器更新第二电子设备的管理权限,以及向第二电子设备发送第二十三消息,第二十三消息包含解绑成功的信息。这样,第二电子设备可以解除与账号之间的绑定关系。
第六方面,提供一种第一电子设备,第一电子设备设置有客户端,客户端登录有第一账号,第一电子设备用于执行如第一方面以及第一方面任意一种实现方式的方法。
第六方面及第六方面的任意一种实现方式分别与第一方面及第一方面的任意一种实现方式相对应。第六方面以及第六方面中任意一种实现方式所对应的技术效果可参见上述第一方面以及第一方面中任意一种实现方式所对应的技术效果,此处不再赘述。
第七方面,提供一种第一电子设备,第一电子设备设置有客户端,客户端登录有第一账号,第一电子设备用于执行如第三方面以及第三方面任意一种实现方式的方法。
第七方面及第七方面的任意一种实现方式分别与第三方面及第三方面的任意一种实现方式相对应。第七方面以及第七方面中任意一种实现方式所对应的技术效果可参见上述第三方面以及第三方面中任意一种实现方式所对应的技术效果,此处不再赘述。
第八方面,提供一种第二电子设备,第二电子设备上注册有n个智能设备,第二电子设备与n个智能设备处于同一局域网中,n为大于或等于1的正整数,第二电子设备用于执行如第二方面以及第二方面任意一种实现方式的方法。
示例性的,第二电子设备可以为网关,或者为集成有网关功能的电子设备,或者为不集成有网关功能的电子设备。示例性的,第二电子设备可以为具备网关功能的中枢设备,比如,智能音箱、智慧屏、路由器等等。
第八方面及第八方面的任意一种实现方式分别与第二方面及第二方面的任意一种实现方式相对应。第八方面以及第八方面中任意一种实现方式所对应的技术效果可参见上述第二方面以及第二方面中任意一种实现方式所对应的技术效果,此处不再赘述。
第九方面,提供一种第二电子设备,第二电子设备上注册有n个智能设备,第二电子设备与n个智能设备处于同一局域网中,n为大于或等于1的正整数,第二电子设备用于执行如第四方面以及第四方面任意一种实现方式的方法。
示例性的,第二电子设备可以为网关,或者为集成有网关功能的电子设备,或者为不集成有网关功能的电子设备。示例性的,第二电子设备可以为具备网关功能的中枢设备,比如,智能音箱、智慧屏、路由器等等。
第九方面及第九方面的任意一种实现方式分别与第四方面及第四方面的任意一种实现方式相对应。第九方面以及第九方面中任意一种实现方式所对应的技术效果可参见上述第四方面以及第四方面中任意一种实现方式所对应的技术效果,此处不再赘述。
第十方面,提供一种服务器,服务器用于执行如第五方面以及第五方面任意一种实现方式的方法。
第十方面及第十方面的任意一种实现方式分别与第五方面及第五方面的任意一种实现方式相对应。第十方面以及第十方面中任意一种实现方式所对应的技术效果可参见上述第五方面以及第五方面中任意一种实现方式所对应的技术效果,此处不再赘述。
第十一方面,提供一种智能家居控制系统,包括如第六方面以及第六方面任意一种实现方式的客户端,如第八方面以及第八方面任意一种实现方式的第二电子设备,如第十方面以及第十方面任意一种实现方式的服务器,和n个智能设备,其中,n个智能设备注册于第二电子设备上,第二电子设备与n个智能设备处于同一局域网中,n为大于或等于1的正整数。
示例性的,第二电子设备可以为网关,或者为集成有网关功能的电子设备,或者为不集成有网关功能的电子设备。示例性的,第二电子设备可以为具备网关功能的中枢设备,比如,智能音箱、智慧屏、路由器等等。
第十一方面及第十一方面的任意一种实现方式分别与第六方面及第六方面的任意一种实现方式,与第八方面及第八方面的任意一种实现方式,和与第十方面及第十方面的任意一种实现方式相对应。第十一方面以及第十一方面中任意一种实现方式所对应的技术效果可参见上述第六方面以及第六方面中任意一种实现方式,第八方面及第八方面的任意一种实现方式和第十方面及第十方面的任意一种实现方式所对应的技术效果,此处不再赘述。
第十二方面,提供一种智能家居控制系统,包括如第七方面以及第七方面任意一种实现方式的客户端,如第九方面以及第九方面任意一种实现方式的第二电子设备,如第十方面以及第十方面任意一种实现方式的服务器,和n个智能设备,其中,n个智能设备注册于第二电子设备上,第二电子设备与n个智能设备处于同一局域网中,n为大于或等于1的正整数。
示例性的,第二电子设备可以为网关,或者为集成有网关功能的电子设备,或者为不集成有网关功能的电子设备。示例性的,第二电子设备可以为具备网关功能的中枢设备,比如,智能音箱、智慧屏、路由器等等。
第十二方面及第十二方面的任意一种实现方式分别与第七方面及第七方面的任意一种实现方式,与第九方面及第九方面的任意一种实现方式,和与第十方面及第十方面的任意一种实现方式相对应。第十二方面以及第十二方面中任意一种实现方式所对应的技术效果可参见上述第七方面以及第七方面中任意一种实现方式,第九方面及第九方面的任意一种实现方式和第十方面及第十方面的任意一种实现方式所对应的技术效果,此处不再赘述。
第十三方面,提供一种计算机可读存储介质。计算机可读存储介质存储有计算机程序,当计算机程序在第一电子设备上运行时,使得第一电子设备上的客户端执行如第一方面以及第一方面任意一种实现方式的方法,或者,执行如第三方面以及第三方面任意一种实现方式的方法。
第十三方面及第十三方面的任意一种实现方式与第一方面及第一方面的任意一种实现方 式,或者,与第三方面及第三方面的任意一种实现方式相对应。第十三方面以及第十三方面中任意一种实现方式所对应的技术效果可参见上述第一方面以及第一方面中任意一种实现方式,或者参见第三方面及第三方面的任意一种实现方式所对应的技术效果,此处不再赘述。
第十四方面,提供一种计算机可读存储介质。计算机可读存储介质存储有计算机程序,当计算机程序在第二电子设备上运行时,使得第二电子设备执行如第二方面以及第二方面任意一种实现方式的方法,或者,执行如第四方面以及第四方面任意一种实现方式的方法。
第十四方面及第十四方面的任意一种实现方式与第二方面及第二方面的任意一种实现方式,或者,与第四方面及第四方面的任意一种实现方式相对应。第十四方面以及第十四方面中任意一种实现方式所对应的技术效果可参见上述第二方面以及第二方面中任意一种实现方式,或者参见第四方面及第四方面的任意一种实现方式所对应的技术效果,此处不再赘述。
第十五方面,提供一种计算机可读存储介质。计算机可读存储介质存储有计算机程序,当计算机程序在服务器上运行时,使得服务器执行如第五方面以及第五方面任意一种实现方式的方法。
第十五方面及第十五方面的任意一种实现方式与第五方面及第五方面的任意一种实现方式相对应。第十五方面以及第十五方面中任意一种实现方式所对应的技术效果可参见上述第五方面以及第五方面中任意一种实现方式所对应的技术效果,此处不再赘述。
第十六方面,提供一种计算机程序产品。当计算机程序产品在第一电子设备上运行时,使得第一电子设备上的客户端执行如第一方面以及第一方面任意一种实现方式的方法,或者,执行如第三方面以及第三方面任意一种实现方式的方法。
第十六方面及第十六方面的任意一种实现方式与第一方面及第一方面的任意一种实现方式,或者,与第三方面及第三方面的任意一种实现方式相对应。第十六方面以及第十六方面中任意一种实现方式所对应的技术效果可参见上述第一方面以及第一方面中任意一种实现方式,或者参见第三方面及第三方面的任意一种实现方式所对应的技术效果,此处不再赘述。
第十七方面,提供一种计算机程序产品。当计算机程序产品在第二电子设备上运行时,使得第二电子设备执行如第二方面以及第二方面任意一种实现方式的方法,或者,执行如第四方面以及第四方面任意一种实现方式的方法。
第十七方面及第十七方面的任意一种实现方式与第二方面及第二方面的任意一种实现方式,或者,与第四方面及第四方面的任意一种实现方式相对应。第十七方面以及第十七方面中任意一种实现方式所对应的技术效果可参见上述第二方面以及第二方面中任意一种实现方式,或者参见第四方面及第四方面的任意一种实现方式所对应的技术效果,此处不再赘述。
第十八方面,提供一种计算机程序产品。当计算机程序产品在服务器上运行时,使得服务器执行如第五方面以及第五方面任意一种实现方式的方法。
第十八方面及第十八方面的任意一种实现方式与第五方面及第五方面的任意一种实现方式相对应。第十八方面以及第十八方面中任意一种实现方式所对应的技术效果可参见上述第五方面以及第五方面中任意一种实现方式所对应的技术效果,此处不再赘述。
附图说明
图1是本申请实施例提供的一种应用场景的示意图;
图2是本申请实施例提供的一种电子设备的硬件结构的示意图;
图3是本申请实施例提供的一种智能家居设备控制方法的流程示意图;
图4是图3所示的智能家居设备控制方法中,对酒店中的设备进行初始化配置的步骤的流程示意图;
图5是图4所示的对酒店中的设备进行初始化配置的步骤中,对网关进行初始化配置的步骤的流程示意图;
图6是本申请实施例提供的一种配置网关过程中电子设备的界面显示示意图;
图7是图4所示的对酒店中的设备进行初始化配置的步骤中,对智能设备进行初始化配置的步骤的流程示意图;
图8是本申请实施例提供的一种电子设备的界面显示示意图;
图9是图4所示的对酒店中的设备进行初始化配置的步骤中,网关发现智能设备的步骤的流程示意图;
图10是本申请实施例提供的一种电子设备的界面显示示意图;
图11是本申请实施例提供的一种电子设备的界面显示示意图;
图12是图3所示的智能家居设备控制方法中,对客户入住酒店并绑定设备的步骤的流程示意图;
图13是本申请实施例提供的一种电子设备的界面显示示意图;
图14是本申请实施例提供的一种客户控制智能台灯的流程示意图;
图15是本申请实施例提供的一种电子设备的界面显示示意图;
图16是图3所示的智能家居设备控制方法中,对客户向同行人员分享设备的步骤的流程示意图;
图17是图3所示的智能家居设备控制方法中,对客户或酒店的管理员解绑设备的步骤的流程示意图;
图18是本申请实施例提供的一种客户解绑设备过程中电子设备的界面显示示意图;
图19是本申请实施例提供的一种智能家居控制方法的流程示意图;
图20是本申请实施例提供的另一种智能家居控制方法的流程示意图;
图21是本申请实施例提供的又一种智能家居控制方法的流程示意图;
图22是本申请实施例提供的再一种智能家居控制方法的流程示意图。
具体实施方式
以下实施例中所使用的术语只是为了描述特定实施例的目的,而并非旨在作为对本申请的限制。如在本申请的说明书和所附权利要求书中所使用的那样,单数表达形式“一个”、“一种”、“所述”、“上述”、“该”和“这一”旨在也包括例如“一个或多个”这种表达形式,除非其上下文中明确地有相反指示。还应当理解,在本申请以下各实施例中,“至少一个”、“一个或多个”是指一个或两个以上(包含两个)。术语“和/或”,用于描述关联对象的关联关系,表示可以存在三种关系;例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A、B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。
在本说明书中描述的参考“一个实施例”或“一些实施例”等意味着在本申请的一个或多个实施例中包括结合该实施例描述的特定特征、结构或特点。由此,在本说明书中的不同之处出现的语句“在一个实施例中”、“在一些实施例中”、“在其他一些实施例中”、“在另外一些实施例中”等不是必然都参考相同的实施例,而是意味着“一个或多个但不是所有的实 施例”,除非是以其他方式另外特别强调。术语“包括”、“包含”、“具有”及它们的变形都意味着“包括但不限于”,除非是以其他方式另外特别强调。术语“连接”包括直接连接和间接连接,除非另外说明。
以下,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括一个或者更多个该特征。
在本申请实施例中,“示例性地”或者“例如”等词用于表示作例子、例证或说明。本申请实施例中被描述为“示例性地”或者“例如”的任何实施例或设计方案不应被解释为比其它实施例或设计方案更优选或更具优势。确切而言,使用“示例性地”或者“例如”等词旨在以具体方式呈现相关概念。
示例性地,下面以酒店场景为例,结合图1来阐明本申请的应用场景。
示例性的,图1是本申请实施例提供的一种应用场景示意图。如图1所示,网关11,智能音箱12,智能台灯13和智能电视14均部署于同一场所(比如,酒店中的同一房间内),且均归属于同一管理者。手机15归属于客户,该客户可以为在酒店住宿的人员。网关11,智能音箱12,智能台灯13和智能电视14可以处于同一局域网中,且智能音箱12,智能台灯13和智能电视14均已在网关11上注册(比如,网关11中存储有智能音箱12,智能台灯13和智能电视14的设备信息)。手机15上安装有智能家居管理应用,该应用可以用于管理网关11,智能音箱12,智能台灯13和智能电视14等设备。
本方案中,在手机15所属的客户进入到网关11所属的场所时,该客户可以在手机15上登录智能家居管理应用后,使用手机15与网关11进行近距离通信,并构建安全通信通道。网关11在接收到手机15的绑定请求后,网关11可以在其自身未被其他客户绑定的情况下,同意绑定,并将其自身注册到服务器16,以及通知智能音箱12,智能台灯13和智能电视14注册到服务器16。之后,手机15所属的客户可以在手机15上安装的智能家居管理应用中查看到网关11,智能音箱12,智能台灯13和智能电视14,进而可以通过手机15对网关11,智能音箱12,智能台灯13和智能电视14进行操控。由此基于短距安全传输,对多个设备的绑定,为用户提供了一种安全且易用的控制智能家居设备的技术方案。
此外,在手机15所属的客户离开网关11所属的场所时,该客户可以通过手机15上的智能家居管理应用发起对网关15的解绑指令。服务器16接收到客户发起的解绑指令后,可以清除该客户与网关15、智能音箱12,智能台灯13和智能电视14之间的对应关系,以及通知网关15解除该客户的绑定。之后,网关15在接收到服务器16的通知后,可以清除该客户的权限信息。由此,实现网关15与该客户的之间的解绑,使得该客户在离开网关11所属的场所后不在具备该网关15及已注册到该网关15上的设备的控制权限。
在一个例子中,网关11可以是手机15接入到网关11所属的智能居家系统的入口,其可以是一个独立的设备,也可以作为一个服务承载在智能设备上,如承载在智能电视14上等。
在一个例子中,服务器16与网关11,智能音箱12,智能台灯13,智能电视14和手机15之间均可以通过网络建立连接,以进行长距通信。例如,该网络可以为局域网(local area networks,LAN),也可以为广域网(wide area networks,WAN)(例如,互联网)。手机15与网关11之间可以基于近程通信(near field communication,NFC)或控制发射功率的临近感知网络(neighborhood aware networking,NAN)等短距离通信方式进行通信。网关11与智能音箱12,智能台灯13或智能电视14等智能设备之间可以通过电力线通信(power line  communication,PLC)连接,网线,无线保真(wireless fidelity,Wi-Fi),蓝牙(bluetooth),紫蜂(zigbee)等技术建立连接。
可以理解的是,图1中所示的各个电子设备也可以替换为其他的电子设备,如平板电脑,可穿戴设备等。示例性的,本方案中涉及的电子设备可以是包括但不限于搭载
Figure PCTCN2022084075-appb-000001
Figure PCTCN2022084075-appb-000002
或者其它操作系统的电子设备。本方案中对电子设备的具体类型不作特殊限制。
示例性的,图2示出了一种电子设备的硬件结构示意图。其中,该电子设备可以为图1中示出的任一电子设备。如图2所示,该电子设备200可以包括:处理器210、存储器220和通信模块230。其中,处理器210,存储器220,及通信模块230可通过总线或其他方式连接。
本方案中,处理器210是电子设备200的计算核心及控制核心。处理器210可以包括一个或多个处理单元。例如,处理器210可以包括应用处理器(application processor,AP)、调制解调器(modem)、图形处理器(graphics processing unit,GPU)、图像信号处理器(image signal processor,ISP)、控制器、视频编解码器、数字信号处理器(digital signal processor,DSP)、基带处理器、和/或神经网络处理器(neural-network processing unit,NPU)等中的一项或多项。其中,不同的处理单元可以是独立的器件,也可以集成在一个或多个处理器中。
存储器220可以存储有程序,程序可被处理器210运行,使得处理器210执行本申请提供的方法。存储器220还可以存储有数据。处理器210可以读取存储器220中存储的数据。存储器220和处理器210可以单独设置。可选地,存储器220也可以集成在处理器210中。
通信模块230可以包括移动通信模块和无线通信模块中的至少一种。其中,当通信模块230包括移动通信模块时,通信模块230可以提供应用在电子设备200上的包括2G/3G/4G/5G等无线通信的解决方案。比如,全球移动通讯系统(global system for mobile communications,GSM)、通用分组无线服务(general packet radio service,GPRS)、码分多址接入(code divisionmultiple access,CDMA)、宽带码分多址(wideband code division multiple access,WCDMA),时分码分多址(time-division code division multiple access,TD-SCDMA)、长期演进(long term evolution,LTE)、新空口(new radio,NR)等。
通信模块230可以包括至少一个滤波器,开关,功率放大器,低噪声放大器(low noise amplifier,LNA)等。通信模块230可以通过至少一根天线接收电磁波,并对接收的电磁波进行滤波,放大等处理,传送至调制解调器进行解调。通信模块230还可以对经调制解调器调制后的信号放大,经天线转为电磁波辐射出去。在一些示例中,通信模块230的至少部分功能模块可以被设置于处理器210中。在一些示例中,通信模块230的至少部分功能模块可以与处理器210的至少部分模块被设置在同一个器件中。当通信模块230包括无线通信模块时,通信模块230可以提供应用在电子设备200上的包括无线局域网(wireless local area networks,WLAN)(如无线保真(wireless fidelity,Wi-Fi)网络),蓝牙(bluetooth,BT),全球导航卫星系统(global navigation satellite system,GNSS),调频(frequency modulation,FM),近距离无线通信技术(near field communication,NFC),红外技术(infrared,IR)等无线通信的解决方案。通信模块230可以是集成至少一个通信处理模块的一个或多个器件。通信模块230经由天线接收电磁波,将电磁波信号调频以及滤波处理,将处理后的信号发送到处理器210。通信模块230还可以从处理器210接收待发送的信号,对 其进行调频,放大,经天线转为电磁波辐射出去。
可以理解的是,本方案图2示意的结构并不构成对电子设备200的具体限定。在本方案另一些实施例中,电子设备200可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。图示的部件可以以硬件,软件或软件和硬件的组合实现。
下面结合图3,对本申请提供的技术方案进行详细说明。示例性地,图3示出了本申请实施例提供的一种智能家居设备控制方法的流程示意图。如图3所示,该方法可以包括以下步骤:
S1、对酒店中的设备进行初始化配置的步骤。
具体地,对酒店中的设备进行初始化配置的步骤用于对酒店中的设备进行初始化配置。本申请实施例中,酒店管理员可以登录到客户端对酒店中的设备进行初始化配置,以便后续入住酒店的客户可以绑定到酒店中的设备,以及使用酒店中的设备。
需要说明的是,S1并非是该方法的必需步骤。即在该方法的执行中,并非每次都要执行S1。
S2、客户入住酒店并绑定设备的步骤。
具体地,在对酒店中的设备进行初始化配置后,当客户入住酒店时,客户可以登录到客户端,并将其用户账号与酒店中的设备绑定,以便客户可以在客户端上对酒店中的设备进行操控。
S3、客户向同行人员分享设备的步骤。
具体地,客户在绑定设备后,可以将绑定的设备分享至同行人员,以便同行人员也可以在客户端上对酒店中的设备进行操控。
需要说明的是,S3并非是该方法的必需步骤。即在该方法的执行中,并非每次都要执行S3,也可以每次都不执行S3,还可以每次都执行S3。
S4、客户或酒店的管理员解绑设备的步骤。
具体地,在客户退房后,客户可以在客户端上主动解绑设备,以便后续入住的客户可以绑定到设备。此外,当客户遗忘解绑设备时,酒店的管理员也可以在客户端上解除设备与客户之间的绑定关系,以便后续入住的客户可以绑定到设备。
下面结合图4,对本申请提供的智能家居设备控制方法中,对酒店中的设备进行初始化配置的步骤进行详细说明。本申请实施例中,在酒店投入运营前,酒店管理员可以对酒店中的设备进行初始配置;其中,该初始配置可以包括对网关的初始配置和对网关以外的智能设备的初始配置。示例性地,图4为本申请实施例提供的智能家居设备控制方法中,对酒店中的设备进行初始化配置的步骤的流程示意图。如图4所示,对酒店中的设备进行初始化配置的步骤可以包括:
S41、对网关进行初始配置。
具体的,酒店的管理员在酒店投运前可以对网关进行初始配置。例如,为网关配置网络等。
需要说明的是,S41并非是该方法的必需步骤。即在该方法的执行中,并非每次都要执行S41。示例性的,若网关承载于酒店中的路由器上,则此时网关已通过网线接入到酒店中的网络中,因此,此时可以不用为网关配置网络,即不需要执行S41。
S42、对网关之外的智能设备进行初始配置。
具体的,酒店的管理员在酒店投运前可以对智能设备进行初始配置。例如,为智能设备配置网络等。
S43、网关发现局域网中的智能设备。
在对网关和智能设备均进行初始化配置后,网关则可以发现与其处于同一局域网中的智能设备。至此即完成对酒店中的设备进行初始化配置。
示例性地,S41的具体步骤可以如图5所示。具体来说,S41可以包括以下步骤:
S410、管理员所使用的第一设备接入网关所属的房间中的网络。
具体的,管理员在对网关进行初始配置时,可以先将其所使用的第一设备接入到网关所属的房间中的网络;其中,此时网关未接入网络。示例性的,酒店中的每个房间均可以单独配置有一个网络。示例性的,第一设备上安装有与智能家居设备控制相关的客户端,例如华为智慧生活客户端等。
S411、管理员登录的客户端获取网关中的第一识别码。
具体的,管理员可以在安装有客户端的第一设备(比如手机)上,使用管理账号和密码登录客户端。之后,管理员登录的客户端可以在管理员的协助下获取到网关中的第一识别码。
示例性的,在网关上可以预置有第一识别码,比如个人识别码(personal identification number,PIN码)。示例性的,该第一识别码可以预置于网关上的NFC标签中。此时,管理员可以使用第一设备贴碰网关,以使得管理员登录的客户端可以获取到该第一识别码。示例性的,该第一识别码也可以预置于网关上的图形码(比如二维码)中。此时,管理员可以使用第一设备扫描该图形码,以使得管理员登录的客户端可以获取到该第一识别码。示例性的,该第一识别码可以预置于网关上的NFC标签中,同时也预置于网关上的图形码。此时,管理员可以通过任一方式使得管理员登录的客户端获取到该第一识别码。
示例性的,第一识别码也可以是随机生成的。此时,管理员使用第一设备贴碰网关时,网关可以贴碰操作随机生成第一识别码,以及将该第一识别码发送至管理员登录的客户端。此外,当网关承载于具有显示屏的设备上时,网关随机生成的第一识别码可以在显示屏上以图形码的形式呈现给管理员,以便管理员可以使用第一设备扫描该图形码得到第一识别码。
S412、管理员登录的客户端发现并登录网关。
具体的,管理员可以在其登录的客户端上添加或搜索设备,或者,管理员登录的客户端可以自动执行发现设备的流程。示例性的,如图6的(a)所示,管理员可以选择区域61处的“搜索设备”按键,以发现设备。可以理解的是,网关在启动后,可以进行自检,以确定其是否被配置网络。其中,当网关确定出其未被配置网络时,网关可以向外部广播其自身的设备信息(比如网关的标识等),以便被其他设备发现;当管理员登录的客户端接收到网关广播的设备信息后,管理员登录的客户端即可以获知到网关的信息,从而发现网关。此外,网关也可以向外部广播其未配网的信息,管理员登录的客户端接收到网关未配网的信息后,则可以确定执行配网流程,而不执行绑定流程。
管理员登录的客户端搜索到设备后,可以将其搜索到的设备呈现给管理员,以供管理员选择。示例性的,如图6的(b)所示,管理员登录的客户端可以向管理员呈现设备列表。
当管理员登录的客户端搜到的设备中包括网关时,管理员则可以选择网关,以对网关进行初始配置。示例性的,继续参阅图6的(b),管理员可以选取区域62处的“网关a”。
管理员登录的客户端接收到管理员的选取操作后,管理员登录的客户端可以显示网关登录界面,在该界面上管理员需要输入网关的登录名和密码。管理员输入网关的登录名和密码 后,管理员登录的客户端即可以接入网关,此时管理员登录的客户端则可以对网关进行初始配置。在一个例子中,网关上可以预留有登录名和密码。
示例性的,如图6的(c)所示,在管理员选择网关a后,管理员登录的客户端可以显示登录界面。在该登录界面上,管理员可以在区域63处输入网关a的登录名,在区域64处输入网关a的登录密码。之后,管理员可以选择区域65处的“下一步”按键;之后,管理员登录的客户端则可以对网关a进行初始配置。
S413、管理员登录的客户端基于第一识别码与网关协商,确定两者安全通信所需的第一共享密钥。
具体的,在对网关进行初始配置前,管理员登录的客户端可以基于第一识别码与网关协商,得到第一共享密钥。其中,两者均可以利用该第一共享密钥加密通信信息,并将加密后的通信信息发送至对方,以保障通信安全。示例性的,管理员登录的客户端获取到第一识别码后,可以利用该第一识别码,通过基于口令认证的密钥交换算法(simple password exponential key exchange,SPEKE)与网关进行协商,确定出第一共享密钥。
示例性的,以管理员登录的客户端为Client,网关为Gateway,第一识别码为p为例描述确定第一共享密钥的过程。该过程具体为:
1)、Client产生一个随机公钥/私钥对U A/V A,用p将U A加密,得到E p(U A),并将E p(U A)发送给Gateway。
2)、Gateway用预置于其内的p解密E p(U A),得到Client的公钥U A=D p(E p(U A))。Gateway产生一个随机第一共享密钥K,然后用U A加密K得到U A(K),再用p加密U A(K)得到E p(U A(K)),并将E p(U A(K))发送给Client。
3)、Client解密E p(U A(K)),得到K=V A(E p(U A(K)))。Client产生一个随机挑战数C A,将C A用K加密得到E k(C A),并将其发送给Gateway。
4)、Gateway解密E k(C A),得到C A。Gateway产生一个随机挑战数C B,将(C A||C B)用K加密得到E k(C A||C B),并将其发送给Client。
5)、Client解密E k(C A||C B),得到C A和C B。Client用K加密C B,得到E k(C B),并将其发送给Gateway。
6)、Gateway解密E k(C B),得到C B。如果以上步骤成功完成,则Client和Gateway协商第一共享密钥K成功,即确定出第一共享密钥K。其中,Client和Gateway在后续的通信过程中,可以使用第一共享密钥K对通信信息进行加密,再将该加密后的通信信息发送至对方。
可以理解的是,在管理员登录的客户端和网关协商出第一共享密钥后,后续两者之间通信的信息均可以在利用该第一共享密钥加密后再传输至对方。为便于叙述,后续步骤中不在描述加密和解密的过程。
示例性的,以管理员登录的客户端为Client,网关为Gateway,第一共享密钥为K,待发送数据为f为例,描述信息发送过程。该过程具体为:1)、Client利用K对f加密,得到E k(f),并将E k(f)发送至Gateway。2)、Gateway利用K解密E k(f),得到f。
S414、管理员登录的客户端获取网关的第一公钥。
具体的,管理员登录的客户端与网关协商出第一共享密钥后,管理员登录的客户端可以向网关发送公钥获取请求。之后,网关可以利用第一共享密钥将其自身的第一公钥加密,并发送至管理员登录的客户端。之后,管理员登录的客户端解密网关发送的信息,即得到第一公钥。其中,管理员登录的客户端获取网关的公钥主要是便于后续网关在发现智能设备过程 中网关与智能设备间协商密钥。
S415、管理员登录的客户端为网关配置网络。
具体的,该步骤主要是为网关配置网络,比如选择网关需加入的网络和该网络的加入密码等,以使得网关可以接入到酒店中的无线网络中。
示例性的,继续参阅图6的(c),管理员选择区域65处的“下一步”按键后,管理员登录的客户端可以显示网络配置界面,即显示如图6的(d)所示的界面,此时,管理员可以选择其希望网关加入的网络。继续参阅图6的(d),管理员可以在区域66处选择“房间a”网络,接着,管理员可以在区域67处输入“房间a”的网络密码,以及选择区域68处的“下一步”按键。之后,管理员登录的客户端可以将管理员配置的网络名和密码发送至网关。至此,即完成为网关配置网络。
S416、网关接入所配置的网络。
具体的,网关接收到管理员登录的客户端发送的配置信息后,其可以根据配置信息中的网络名和密码加入到所配置的网络中。
至此,即完成对网关的初始网络配置工作。此时,在管理员登录的客户端中即可以查看到刚配置的网关。示例性的,如图6的(e)所示,在管理员登录的客户端上可以看到刚配置的网关a。
示例性地,S42的具体步骤可以如图7所示。具体来说,S42可以包括以下步骤:
S420、管理员所使用的第一设备接入智能设备所属的房间中的网络。
具体的,管理员在对智能设备进行初始配置时,可以先将其所使用的第一设备接入到智能设备所属的房间中的网络;其中,此时智能设备未接入网络。示例性的,酒店中的每个房间均可以单独配置有一个网络。示例性的,第一设备上安装有与智能家居设备控制相关的客户端,例如华为智慧生活客户端等。
需要说明的是,S420并非是该方法的必需步骤。即在该方法的执行中,并非每次都要执行S420。示例性的,在管理员在配置完网关后,若继续配置该网关所属房间中的智能设备,则可以不用执行S420;若管理员未配置该网关所属房间中的智能设备,而是配置其他网关所属的房间中的智能设备,则需要执行S420。
可以理解是的,本申请实施例中,不同的网关所属的房间中的网络可以不同,由此便于配置网关和与该网关属于同一房间中的智能设备,避免后续网关发现智能设备过程中出现配置错误的情况发生。此外,也可以在客户入住后,便于保护客户隐私,避免不法分子从局域网中获取到客户的信息。
S421、管理员登录的客户端获取智能设备中的第二识别码。
具体的,管理员可以在安装有客户端的第一设备(比如手机)上,使用管理账号和密码登录客户端。之后,管理员登录的客户端可以在管理员的协助下获取到智能设备中的第二识别码。
示例性的,在智能设备上可以预置有第二识别码,比如个人识别码(personal identification number,PIN码)。示例性的,该第二识别码可以预置于智能设备上的NFC标签中,此时,管理员可以使用第一设备贴碰智能设备,以使得管理员登录的客户端可以获取到该第二识别码。示例性的,该第二识别码也可以预置于智能设备上的图形码(比如,二维码)中,此时,管理员可以使用第一设备扫描该图形码,以使得管理员登录的客户端可以 获取到该第二识别码。示例性的,该第二识别码可以预置于智能设备上的NFC标签中,同时也预置于智能设备上的图形码,此时,管理员可以通过任一方式使得管理员登录的客户端获取到该第二识别码。
示例性的,第二识别码也可以是随机生成的。此时,管理员使用第一设备贴碰智能设备时,智能设备可以贴碰操作随机生成第二识别码,以及将该第二识别码发送至管理员登录的客户端。此外,当智能设备具有显示屏时,智能设备随机生成的第二识别码可以以图形码的形式呈现给管理员,以便管理员可以使用第一设备扫描该图形码得到第二识别码。
S422、管理员登录的客户端发现智能设备。
具体的,管理员可以在其登录的客户端上添加或搜索设备。示例性的,继续参阅图6a,管理员可以选择区域61处的“搜索设备”按键,以发现设备。可以理解的是,智能设备在启动后,可以进行自检,以确定其是否被配置网络。其中,当智能设备确定出其未被配置网络时,智能设备可以向外部广播其自身的设备信息(比如智能设备的标识等),以便被其他设备发现;当管理员登录的客户端接收到智能设备广播的设备信息后,管理员登录的客户端即可以获知到智能设备的信息,从而发现智能设备。
管理员登录的客户端搜索到设备后,可以将其搜索到的设备呈现给管理员,以供管理员选择。示例性的,继续参阅图6的(b),管理员登录的客户端可以向管理员呈现设备列表。
当管理员登录的客户端搜到的设备中包括智能设备时,管理员则可以选择智能设备,以对智能设备进行初始配置。示例性的,如图8所示,管理员可以选取区域81处的“智能设备a”。
S423、管理员登录的客户端基于第二识别码与智能设备协商,确定两者安全通信所需的第二共享密钥。
具体的,在对智能设备进行初始配置前,管理员登录的客户端可以基于第二识别码与智能设备协商,得到第一共享密钥。其中,两者均可以利用该第二共享密钥加密通信信息,并将加密后的通信信息发送至对方,以保障通信安全。示例性的,管理员登录的客户端获取到第二识别码后,可以利用该第二识别码,通过基于口令认证的密钥交换算法(simple password exponential key exchange,SPEKE)与智能设备进行协商,确定出第二共享密钥。有关协商过程,可参照前文描述,此处不再赘述。
可以理解的是,在管理员登录的客户端和智能设备协商出第二共享密钥后,后续两者之间通信的信息均可以在利用该第二共享密钥加密后再传输至对方。为便于叙述,后续步骤中不在描述加密和解密的过程。
S424、管理员登录的客户端向智能设备发送网关的第一公钥,以及获取智能设备的第二公钥。
具体的,管理员登录的客户端与智能设备协商出第二共享密钥后,管理员登录的客户端可以利用第二共享密钥对网关的第一公钥进行加密,并发送至智能设备。智能设备接收到加密后的信息后,解密即可以得到网关的第一公钥。之后,智能设备可以利用第二共享密钥将其自身的第二公钥进行加密,并发送至管理员登录的客户端。管理员登录的客户端解密智能设备发送的信息,即得到第二公钥。其中,管理员登录的客户端获取智能设备的公钥主要是后续将智能设备的公钥告知网关,以便后续网关在发现智能设备过程中网关与智能设备间协商密钥。
S425、管理员登录的客户端为智能设备配置网络。
具体的,该步骤主要是为智能设备配置网络,比如选择智能设备需加入的网络和该网络的加入密码等,以使得智能设备可以接入到酒店中的无线网络中。
在一个例子中,为了使得网关能够发现智能设备,为智能设备配置的网络可以与为网关配置的网络相同,以保证网关和智能设备处于同一局域网中。
示例性的,继续参阅图8,管理员选择区域81处的“智能设备a”后,管理员登录的客户端可以显示网络配置界面,即显示如图6的(d)所示的界面。此时,管理员可以选择其希望智能设备加入的网络。继续参阅图6的(d),管理员可以在区域66处选择“房间a”网络。接着,管理员可以在区域67处输入“房间a”的网络密码,以及选择区域68处的“下一步”按键。之后,管理员登录的客户端可以将管理员配置的网络名和密码发送至智能设备a。至此,即完成为智能设备a配置网络。
S426、智能设备接入所配置的网络。
具体的,智能设备接收到管理员登录的客户端发送的配置信息后,其可以根据配置信息中的网络名和密码加入到所配置的网络中。
至此,即完成对智能设备的初始网络配置工作。
示例性地,S43的具体步骤可以如图9的(A)所示。其中,图9的(A)所示的步骤为管理员主动触发网关发现智能设备的步骤。具体来说,S43可以包括以下步骤:
S4311、管理员登录的客户端向网关发送设备发现指令。
具体的,管理员在配置网关和智能设备后,可以从其登录的客户端上登录到网关,并选择让网关发现设备。示例性的,如图10所示,管理员登录网关后,可以选择区域101处的“发现设备”按键,之后,管理员登录的客户端可以向网关发送设备发现指令。
在管理员通过其登录的客户端控制网关进行设备发现后,即下发设备发现指令后,管理员登录的客户端可以向网关发送设备发现指令。示例性的,设备发现指令中可以包括智能设备的第二公钥,以便网关获知到智能设备的公钥,并与智能设备协商共享密钥。
S4312、网关组播发送设备发现请求。
具体的,由于网关和智能设备接入的是同一局域网中,因此,网关可以在该局域网中组播发送设备发现请求。示例性的,该设备发现请求中可以携带有网关的设备信息。示例性的,网关的设备标识可以包括网关的身份标识,比如产品序列号,主机地址等。
S4313、智能设备向网关发送身份标识。
具体的,与网关处于同一网络中的智能设备在接收到网关发送的设备发现请求后,该智能设备可以将其自身的身份标识发送至网关。
在一个例子中,若智能设备中已存储有网关的设备信息,则表明该智能设备已经注册到网关,此时该智能设备可以不用再次向网关发送身份标识。
S4314、网关利用其自身的公钥以及该智能设备的公钥与智能设备进行协商,确定两者安全通信所需的第三共享密钥。
具体的,网关获取到智能设备的身份标识后,可以基于该身份标识查询到该智能设备的公钥。之后,网关可以利用其自身的公钥以及该智能设备的公钥,通过站到站密钥协商算法(station-to-station,STS)与该智能设备进行协商,得到两者可以共享的一个第三共享密钥。之后,两者可以使用该第三共享密钥对通信信息进行加密,并将该加密后的通信信息发送至对方,由此实现两者之间的通信安全。
可以理解的是,在网关和智能设备协商出第三共享密钥后,后续两者之间通信的信息均可以在利用该第三共享密钥加密后再传输至对方。为便于叙述,后续步骤中不在描述加密和解密的过程。
S4315、智能设备注册到网关。
具体的,网关与智能设备之间协商出共享密钥后,网关可以记录智能设备的设备信息,同时,智能设备中也可以记录网关的设备信息。示例性的,智能设备的设备标识可以包括智能设备的身份标识,比如产品序列号,主机地址等,网关的设备标识可以包括网关的身份标识,比如产品序列号,主机地址等。
至此,网关即发现与其处于同一局域网下的智能设备。
示例性地,S43的具体步骤也可以如图9的(B)所示。其中,图9的(B)所示的步骤为网关自动触发发现智能设备的步骤。由于网关难以一直不停的发广播,因此,为了提高效率,在智能设备上线的时候,智能设备可以发送其已上线的广播。网关收到该广播后,可以启动发现设备。此外,由于网关在发现智能设备过程中,网关与智能设备间需要协商共享密钥,而协商共享密钥的前提是网关需要提前获知到智能设备的公钥,且智能设备需要提前获知到网关的公钥,因此,在管理员登录的客户端获取到智能设备的公钥后,管理员登录的客户端可以主动将智能设备的公钥发送至网关,以便网关及时获知到智能设备的公钥。可以理解的是,由于在配置智能设备时,管理员登录的客户端已将网关的公钥发送至智能设备,因此,此时管理员登录的客户端可以不用再次向智能设备发送网关的公钥。
具体来说,S43可以包括以下步骤:
S4321、智能设备发送上线信息。
智能设备被开启后,其可以在局域网中广播其已上线的信息。示例性的,上线信息可以理解为智能设备被开启的信息。
S4322、网关组播发送设备发现请求。
S4323、智能设备向网关发送身份标识。
S4324、网关利用其自身的公钥以及该智能设备的公钥与智能设备进行协商,确定两者安全通信所需的第三共享密钥。
S4325、智能设备注册到网关。
至此,网关即发现与其处于同一局域网下的智能设备。
在一个例子中,在网关发现智能设备后,管理员即可以在该网关中查看到该网关所发现的智能设备。示例性的,如图11所示,管理员利用期登录的客户端登录到网关后,即可以查看到该网关发现的智能设备,如智能设备a,智能设备b。
进一步地,为了便于管理员对网关及网关上注册的设备进行维护,管理员可以为该网关设置维护密码,以锁定网关与智能设备之间的关系,避免管理员之外的人员(如入住酒店的客户等)对随意更改网关与智能设备之间的关系。示例性的,在对网关或智能设备初始配置完成后,管理员登录的客户端可以引导管理员设置维护密码。
至此即完成初始化配置。
下面结合图12,对本申请提供的智能家居设备控制方法中,对客户入住酒店并绑定设备的步骤进行详细说明。本申请实施例中,在酒店投入运营后,客户可以入住酒店;其中,客 户在入住酒店后,可以绑定其所入住的房间中的网关,以对网关中注册的智能设备进行操控。其中,客户所使用的第二设备可以与网关之间进行短距通信,且该第二设备可以与第二设备上安装的客户端对应的服务器进行长距通信。此外,网关与服务器之间可以进行长距通信。示例性地,图12为本申请实施例提供的智能家居设备控制方法中,对客户入住酒店并绑定设备的步骤的流程示意图。如图12所示,对客户入住酒店并绑定设备的步骤可以包括:
S1201、客户登录的客户端获取网关的身份标识和网关中的第三识别码。
具体的,客户可以在安装有客户端的第二设备(比如手机)上,使用其注册的用户账号和密码登录客户端。之后,客户登录的客户端可以在客户的协助下获取到网关的身份标识和网关中的第三识别码。对于第三识别码的获取过程,详见上文描述,此处不再赘述。对于网关的身份标识,网关可以在向客户登录的客户端发送第三识别码时,同时或分时发送其自身的身份标识。
S1202、客户登录的客户端向服务器请求第一激活码。
具体的,客户登录的客户端获取到网关的身份标识后,其可以将网关的身份标识发送至服务器,以向服务器请求第一激活码。其中,该第一激活码主要用于表征网关的身份。
S1203、服务器向客户登录的客户端发送第一激活码。
具体的,服务器接收到客户登录的客户端的请求后,可以基于网关的身份标识,随机生成第一激活码。示例性的,第一激活码可以由多个随机数构成。服务器在生成第一激活码后,可以将该第一激活码发送至客户登录的客户端。
S1204、客户登录的客户端基于第三识别码与网关协商,确定两者安全通信所需的第四共享密钥。
具体的,客户登录的客户端在绑定网关前,为了保障两者之间的通信安全,客户登录的客户端基于第三识别码与网关协商,得到第四共享密钥,详细过程,详见上文描述,此处不再赘述。该第四共享密钥主要是用于两者之间通信时加密通信信息。
可以理解的是,在客户登录的客户端和网关协商出第四共享密钥后,后续两者之间通信的信息均可以在利用该第四共享密钥加密后再传输至对方。为便于叙述,后续步骤中不在描述加密和解密的过程。
S1205、客户登录的客户端向网关发送绑定请求。
具体的,得到第四共享密钥后,客户登录的客户端可以基于第四共享密钥加密绑定请求,以及向网关发送加密后的绑定请求。该绑定请求是请求将客户登录的客户端的用户账号与网关进行绑定。其中,该绑定请求中可以携带有用于表征客户账号的第一账号标识。示例性的,用于表征客户账号的第一账号标识可以为对客户账号进行哈希计算后得到的哈希值。
S1206、网关判断其是否被绑定。
具体的,网关接收到基于第四共享密钥加密绑定请求后,解密该信息即可以得到绑定请求。在网关被绑定后,网关中可以存储用于表征该客户的用户账号的账号标识。因此,当网关接收到客户登录的客户端发送的绑定请求后,网关可以判断其是否存储有账号标识,如果网关中存储有账号标识,则说明该网关已与其他的客户绑定,此时,网关可以禁止当前的客户绑定,此时网关可以向客户登录的客户端反馈绑定失败的信息。如果网关中未存储有账号标识,则说明该网关未与其他的客户绑定,此时,网关可以同意与当前的客户绑定,并执行后续步骤。
在一个例子中,网关同意与当前的客户绑定后,网关可以记录该客户的客户账户信息。 例如,记录该客户的账号标识。
S1207、网关向客户登录的客户端发送同意绑定的信息。
S1208、客户登录的客户端向网关发送第一激活码。
S1209、网关向服务器注册。
具体的,在网关接收到客户登录的客户端发送的第一激活码后,网关可以向服务器发送其自身的身份标识和该第一激活码。服务器接收到网关发送的身份标识和第一激活码后,可以由其生成激活码的记录中查询该第一激活码是否是其刚分配的。如果服务器判断出该第一激活码是其刚分配的,则其可以同意网关注册。此时,服务器可以记录网关的信息(比如身份标识),以及,将该网关与客户的账号进行关联。此外,为了避免用户数据泄露,服务器可以为网关分配一个代表网关身份的标识,其中服务器可以记录该标识,并以该标识作为网关的信息。
S12010、服务器向网关发送注册结果。
S12011、网关向客户登录的客户端发送注册结果。
S12012、服务器向客户登录的客户端推送网关的设备信息。
S12013、网关向服务器批量申请各个智能设备对应的第二激活码。
具体的,网关可以将注册到其上的各个智能设备的身份标识发送至服务器,以向服务器批量申请各个智能设备的第二激活码。该第二激活码主要是用于表征智能设备的身份。
S12014、服务器向网关发送各个智能设备的第二激活码。
具体的,服务器接收到各个智能设备的身份标识后,可以基于各个设备的身份标识,随机生成对应的第二激活码。示例性的,第二激活码可以由多个随机数构成。服务器在生成第二激活码后,可以将该第二激活码发送至网关。
S12015、网关向智能设备发送该智能设备的第二激活码。
S12016、智能设备向服务器注册。
具体的,智能设备在接收到网关发送的第二激活码后,可以向服务器发送其自身的身份标识和该第二激活码。服务器接收到智能设备发送的身份标识和激活码后,可以由其生成激活码的记录中查询该第二激活码是否是其刚刚分配的。如果服务器判断出该第二激活码是其刚分配的,则其可以同意智能设备注册。此时,服务器可以记录智能设备的信息(比如身份标识),以及,将该智能设备与客户的账号进行关联。此外,为了避免用户数据泄露,服务器可以为智能设备分配一个代表智能设备身份的标识,其中服务器可以记录该标识,并以该标识作为智能设备的信息。
S12017、服务器向智能设备发送注册结果。
S12018、智能设备向网关发送注册结果。
S12019、服务器记录网关,智能设备和客户的账号之间的对应关系。
S12020、服务器向客户登录的客户端推送智能设备的设备信息。
在一个例子中,在网关注册到服务器后,网关可以记录下其已注册的信息,以便网关实时或周期性上报其自身的状态信息(比如是否在线,当前的运行参数等)。此外,在智能设备注册到服务器后,智能设备也可以记录下其已注册的信息,以便智能设备实时或周期性上报其自身的状态信息(比如是否在线,当前的运行参数等)。示例性的,以智能设备为智能台灯为例,智能台灯可以每间隔预设时间(如30分钟、1小时等)向服务器上报一次其灯光亮度信息等。
可以理解的是,本申请实施例中,智能设备需要利用第二激活码向服务器进行注册,主要是为了使服务器辨别智能设备是否是仿冒设备,若智能设备属于仿冒设备,服务器则可以禁止该智能设备注册。
可以理解的是,当服务器上的信息出现更新时,服务器可以向客户登录的客户端推送更新后的信息,以使得客户可以及时获知到最新的信息。
至此,客户即完成设备绑定。此时,客户在客户登录的客户端上即可以查看到网关和注册到网关下的各个智能设备。示例性的,如图13所示,在客户登录的客户端上可以看到与其账号绑定的网关a,以及注册在该网关下的智能设备a和b。
进一步地,客户即可以通过客户登录的客户端对各个智能设备进行操控。
示例性的,智能设备为智能台灯为例,对客户操控智能设备的流程进行说明。如图14所示,包括以下步骤:
S1401、客户登录的客户端接收客户针对智能台灯下发的亮度调节指令。
客户在登录客户端后,可以对其绑定的网关下的智能台灯进行控制。例如,下发亮度调节指令。示例性的,如图15所示,客户可以通过区域c1处的亮度调节控件,对智能台灯的亮度进行调节。在客户调节亮度后,客户登录的客户端即接收到客户下发的亮度调节指令。示例性的,该亮度调节指令中可以包括目标亮度调整值,例如调整至60%亮度等。
S1402、客户登录的客户端向服务器发送亮度调节指令。
S1403、服务器向智能台灯发送亮度调节指令。
S1404、智能台灯调节亮度。
智能台灯接收到亮度调节指令后,即按照该亮度调节指令调节亮度。
由此以实现对智能台灯的操控。
下面结合图16,对本申请提供的智能家居设备控制方法中,对客户向同行人员分享设备的步骤进行详细说明。其中,入住客户在绑定设备后,其可以向其同行人员分享其绑定的设备。在一个例子中,同行人员可以默认无法绑定或控制设备,必须由入住用户分享设备给同行人员后才可以控制。示例性地,图16为本申请实施例提供的智能家居设备控制方法中,对客户向同行人员分享设备的步骤的流程示意图。如图16所示,对客户向同行人员分享设备的步骤可以包括:
S1601、客户登录的客户端获取同行人员的账号信息。
具体的,客户在利用使用其账号和密码登录的客户端绑定设备后,可以利用其登录的客户端向其同行人员的账号发起设备共享。示例性的,当客户在其登录的客户端上输入同行人员的账号信息后,客户登录的客户端即获取到该同行人员的账号信息。示例性的,客户可以利用使用其登录的客户端扫描包含有同行人员的账号信息的图形码(比如,二维码),以使得客户登录的客户端获取到同行人员的账号信息。
S1602、客户登录的客户端向服务器发送分享请求。该分享请求中携带有同行人员的账号信息。
S1603、服务器记录分享信息。
S1604、服务器向同行人员登录的客户端发送分享信息。
具体的,服务器可以向同行人员的账号发送分享信息。由于同行人员是使用其自身的账号登录的客户端,因此,当服务器向同行人员的账号发送分享信息后,同行人员登录的客户 端即可以接收到该分享信息。
S1605、同行人员登录的客户端响应同行人员的接受分享操作,向服务器发送接收分享的信息。
具体的,同行人员登录的客户端接收到分享信息后,可以展示该分享信息,以便同行人员接收分享。同行人员接收分享后,同行人员登录的客户端可以向服务器发送接收分享的信息。
S1606、服务器更新网关的管理权限。
具体的,服务器接收到同行人员登录的客户端发送的接收分享的信息后,服务器可以更新网关的管理权限。示例性的,服务器可以将网关的管理权限由客户的账号变更为客户的账号和同行人员的账号,由此,以更新网关的管理权限。
S1607、服务器向网关发送用于表征该同行人员的用户账号的账号标识。
S1608、网关存储该账号标识。
S1609、网关向服务器发送存储成功的信息。
S1610、服务器向同行人员登录的客户端发送分享成功的信息。
S1611、服务器向同行人员登录的客户端发送网关和注册到网关下的智能设备的设备信息。
至此,同行人员登录的客户端上即可以查看到网关和该网关下的智能设备,以及可以对智能设备进行操控。
下面结合图17,对本申请提供的智能家居设备控制方法中,对客户或酒店的管理员解绑设备的步骤进行详细说明。其中,客户可以主动解绑设备,酒店的管理员也可以为客户解绑设备。示例性地,图17为本申请实施例提供的智能家居设备控制方法中,对客户或酒店的管理员解绑设备的步骤的流程示意图。
示例性的,如图17的(A)所示,客户解绑设备的步骤可以包括:
S1711、客户登录的客户端接收客户下发的对网关的解绑指令。
具体的,客户可以在其登录的客户端上解绑网关。示例性的,如图的(a)所示,客户可以在其登录的客户端上选择区域a1处的网关a,之后,可以显示删除设备的提示,即可以显示如图18的(b)所示的界面。继续参阅图18的(b),客户在选择区域a2处的“删除设备”后,客户登录的客户端即接收客户下发的对网关的解绑指令。
S1712、客户登录的客户端向服务器发送解绑信息。
具体的,客户登录的客户端接收到客户下发的解绑指令后,其可以将客户所需解绑的网关的设备信息发生至服务器。其中,客户所需解绑的网关的设备信息可以包括网关的身份标识。
S1713、服务器更新网关的管理权限。
具体的,服务器可以清空该网关的管理权限。例如,服务器未清空网关的管理权限前,该管理权限为该客户可以对网关进行管理;服务器清空网关的管理权限后,该管理权限可以为空,此时,该网关不受控。
S1714、服务器向客户登录的客户端发送解绑成功的信息。
具体的,服务器更新网关的管理权限后,客户则不再可以对网关及注册到网关上的智能设备进行操控。之后,服务器可以向客户登录的客户端发送解绑成功的信息。客户登录的客 户端接收到解绑成功的信息后,其上则不再显示网关和智能设备的设备信息。
S1715、服务器向网关发送解绑指令。
S1716、网关清理权限信息。
具体的,网关接收的服务器下发的解绑指令后,其可以清空其存储的账号信息,由此以实现清理权限信息。在一个例子中,若网关中记录有其已注册到服务器的信息时,网关在清理权限时,还可以将该记录信息清除。
S1717、网关向智能设备发送信息清除指令。
具体的,当智能设备中记录有其已注册到服务器的信息时,网关可以向智能设备发送信息清除指令,以便智能设备清除该智能设备记录的已注册到服务器的信息。
S1718、智能设备清除其记录的已注册到服务器的信息。
S1719、智能设备向网关发送清除成功的消息。
S17110、网关向服务器发送解绑成功的信息。
可以理解的是,当网关向服务器发送解绑失败的信息后,服务器可以再次向网关发送解绑指令,即再次执行S1715-S1719的步骤,直至服务器接收到网关发送的解绑成功的信息。
至此,客户即完成设备解绑。
示例性的,如图17的(B)所示,酒店的管理员解绑设备的步骤可以包括:
S1721、管理员所使用的第一设备接入网关所属的房间中的网络。
具体的,管理员在为客户解绑设备时,管理员可以进入到客户入住的房间,并将其所使用的第一设备接入到该房间中的网络中。其中,第一设备可以接入至网关所属的房间中的路由器所提供的网络。
S1722、管理员登录的客户端获取网关的身份标识和网关中的第四识别码。
具体的,管理员可以在安装有客户端的第一设备(比如手机)上,使用管理账号和密码登录客户端。之后,管理员登录的客户端可以在管理员的协助下获取到网关中的第四识别码,比如个人识别码(personal identification number,PIN码)。其中,该第四识别码可以是随机生成的,也可以是预置于网关中的,此处不做限定。例如,管理员可以使用第一设备贴碰网关,以得到第四识别码。获取第四识别码的过程,详见上文中的描述,此处不在赘述。
S1723、管理员登录的客户端向服务器请求第三激活码。
具体的,管理员登录的客户端获取到网关的身份标识后,其可以将网关的身份标识发送至服务器,以向服务器请求第三激活码。其中,该第三激活码主要用于表征网关的身份。
S1724、服务器向管理员登录的客户端发送第三激活码。
具体的,服务器接收到管理员登录的客户端的请求后,可以基于网关的身份标识,可以随机生成第三激活码。示例性的,第三激活码可以由多个随机数构成。服务器在生成第三激活码后,可以将该第三激活码发送至管理员登录的客户端。
S1725、管理员登录的客户端基于第四识别码与网关协商,确定两者安全通信所需的第五共享密钥。
具体的,管理员登录的客户端获取到第四识别码后,可以利用该第四识别码,通过基于口令认证的密钥交换算法(simple password exponential key exchange,SPEKE)与网关进行协商,确定出第五共享密钥,详见上文中的描述,此处不在赘述。
可以理解的是,在管理员登录的客户端和网关协商出第五共享密钥后,后续两者之间通 信的信息均可以在利用该第五共享密钥加密后再传输至对方。为便于叙述,后续步骤中不在描述加密和解密的过程。
S1726、管理员登录的客户端向网关发送绑定请求。
具体的,得到第五共享密钥后,管理员登录的客户端可以基于第五共享密钥加密绑定请求,以及向网关发送加密后的绑定请求。该绑定请求是请求将管理员登录的客户端的管理账号与网关进行绑定。其中,该绑定请求中可以携带有用于表征管理账号的第三账号标识。示例性的,用于表征管理账号的第三账号标识可以为对管理账号进行哈希计算后得到的哈希值。
S1727、网关确定无法被绑定。
具体的,网关接收到管理员登录的客户端发送的绑定请求后,由于该网关已与客户绑定,因此,此时管理员无法再次被绑定,此时网关则可以确定出无法被绑定。
S1728、网关向管理员登录的客户端发送请求输入维护密码的信息。
S1729、管理员登录的客户端向网关发送维护密码。
S1730、网关反馈密码校验结果。
S1731、管理员登录的客户端向网关发送信息查询请求。
S1732、网关向管理员登录的客户端反馈设备信息。
具体的,网关可以将其自身的设备信息,以及注册到其上的智能设备的设备信息发送至管理员登录的客户端,以便管理员登录的客户端可以向用户展示网关和注册到该网关上的智能设备,进而对网关和注册到该网关上的智能设备进行维护。
S1733、管理员登录的客户端接收管理员下发的对网关的解绑指令。
具体的,管理员可以在其登录的客户端上为客户解绑网关。示例性的,如图18的(a)所示,管理员可以在其登录的客户端上选择区域a1处的网关a,之后,可以显示删除设备的提示,即可以显示如图18的(b)所示的界面。继续参阅图18的(b),管理员在选择区域a2处的“删除设备”后,管理员登录的客户端即接收到管理员下发的对网关的解绑指令。
S1734、管理员登录的客户端向网关发送解绑指令。
S1735、网关向服务器发送解绑信息。
具体的,网关接收到管理员登录的客户端下发的解绑指令后,其可以将其自身的设备信息发生至服务器。其中,网关的设备信息可以包括网关的身份标识。
S1736、服务器更新网关的管理权限。
S1737、服务器向网关发送权限更新成功的信息。
具体的,服务器更新网关的管理权限后,客户则不再可以对网关及注册到网关上的智能设备进行操控,即此时可以理解为已解绑成功,因此服务器可以向网关发送权限更新成功的信息。
S1738、网关向管理员登录的客户端发送解绑成功的信息。
具体的,网关接收到服务器发送的解绑成功的信息后,可以向管理员登录的客户端发送解绑成功的信息。
可以理解的是,若网关接收到的是服务器发送的权限更新失败的信息,则网关可以重新向服务器发送解绑信息。
S1739、网关清理权限信息。
具体的,网关接收到服务器发送权限更新成功的信息后,其可以清空其存储的账号信息,由此以实现清理权限信息。在一个例子中,若网关中记录有其已注册到服务器的信息时,网 关在清理权限时,还可以将该记录信息清除。
S1740、网关向智能设备发送信息清除指令。
具体的,当智能设备中记录有其已注册到服务器的信息时,网关可以向智能设备发送信息清除指令,以便智能设备清除该智能设备记录的已注册到服务器的信息。
S1741、智能设备清除其记录的已注册到服务器的信息。
S1742、智能设备向网关发送清除成功的消息。
至此,酒店的管理员即完成为客户解绑设备。
需要说明的是,S1722-S1732也可以理解为管理员维护设备的过程。其中,在S1732后,管理员即可以查看到网关及注册到网关上的智能设备的信息,此时,管理员可以对网关和注册到网关上的智能设备进行维护,如设备检修等。
可以理解的是,本申请实施例中,管理员所使用的设备需要与网关进行近距离通信,才能够获取到网关及注册到该网关上的智能设备的信息,由此,使得管理员不能够远程获取到用户所使用的设备信息,从而保障了用户的隐私安全。示例性的,客房中有摄像设备,此时管理员只能利用其使用的设备与客房中的网关进行短距通信,其才能获取到摄像设备的信息,而在客户入住客房后,管理员难以随便进入到客房中,这就使得管理员不能随意的获取到摄像设备的信息,进而保护了用户隐私,避免了用户隐私泄露。
需要说明的是,本申请实施例中,客户端所执行的操作均可以理解为是客户端所在的设备执行的操作。
示例性的,图19示出了另一种智能家居设备控制方法的流程示意图。其中,在图19中,第一电子设备上安装有与智能家居设备控制相关的客户端,该客户端上登录有第一账号,且该客户端对应有服务器。第一电子设备可以与第二电子设备之间进行短距通信,第二电子设备与服务器之间可以进行长距通信。第二电子设备上预先注册有n个智能设备,即n个智能设备预先与第二电子设备进行绑定,且第二电子设备与n个智能设备处于同一局域网中,n为大于或等于1的正整数。在一个例子中,第二电子设备可以为网关,也可以为集成有网关功能的电子设备,其可以理解为是第一电子设备接入到第二电子设备所属的智能居家系统的入口。示例性的,当第二电子设备为具备网关功能的电子设备时,第二电子设备可以为中枢设备,比如,智能音箱、智能电视、智慧屏等等。示例性的,第一电子设备可以为上文所描述的客户所使用的设备,比如,第一电子设备可以为上文图1中所描述的手机15;第二电子设备可以为上文图1中所描述的网关11;智能设备可以为上文图1中所描述的智能音箱12、智能台灯13和智能电视14;服务器可以为上文图1中所描述的服务器16。
如图19所示,智能家居设备控制方法可以包括以下步骤:
S1901、第一电子设备与第二电子设备短距通信,并从第二电子设备获取到与第二电子设备相关的第一信息,第一信息中包括第二电子设备的第一标识。
具体的,第一电子设备可以贴碰第二电子设备,或者扫描第二电子设备上的图形码,以获取到第二电子设备的第一标识。对于第一标识的获取过程,详见上文描述,此处不再赘述。
S1902、第一电子设备向服务器发送第一消息,第一消息包含第一标识,第一消息用于获取代表第二电子设备身份的第一激活码。
具体的,第一电子设备获取到第二电子设备的第一标识后,可以向将第一标识发送至服务器,以从服务器获取代表第二电子设备身份的第一激活码。
S1903、服务器响应第一消息,基于第一标识,生成第一激活码。
具体的,服务器接收到第一消息后,可以基于第一标识,随机生成第一激活码。示例性的,第一激活码可以由多个随机数构成。
S1904、服务器向第一电子设备发送第一激活码。
S1905、第一电子设备向第二电子设备发送第二消息,第二消息包含第一账号,第二消息用于请求将第一账号与第二电子设备绑定。
具体的,第一电子设备获取到第一激活码后,可以向第二电子设备发送包含第一账号的第二消息,以请求将第一账号与第二电子设备进行绑定。示例性的,第二消息可以理解为与绑定请求相关的消息。
S1906、第二电子设备响应第二消息,同意与第一账号绑定,并存储第一账号。
具体的,第二电子设备接收到第二消息后,若其内未存储有账号信息,则其可以同意与第一账号绑定,并存储第一账号。
S1907、第二电子设备向第一电子设备发送第三消息,第三消息包含第二电子设备同意绑定的信息。
S1908、第一电子设备响应第三消息,向第二电子设备发送第四消息,第四消息包含第一激活码,第四消息用于指示第二电子设备利用第一激活码向服务器注册。
S1909、第二电子设备响应第四消息,向服务器发送第五消息,第五消息包含第一标识和第一激活码,第五消息用于请求注册至服务器。
具体的,第二电子设备接收到包含第一激活码的消息后,可以向服务器发送包含第一标识和第一激活码的消息,以请求注册至服务器。
S1910、服务器响应第五消息,同意第二电子设备注册,并记录第一标识。
具体的,服务器可以由其生成激活码的记录中查询该第一激活码是否是其刚分配的。如果服务器判断出该第一激活码是其刚分配的,则其可以同意第二电子设备注册。此时,服务器可以记录第二电子设备的信息(比如第一标识),以及,将该第二电子设备与客户的账号进行关联。此外,为了避免用户数据泄露,服务器可以为第二电子设备分配一个代表第二电子设备身份的标识,其中服务器可以记录该标识,并以该标识作为第二电子设备的信息。
S1911、服务器向第二电子设备发送第六消息,第六消息包含注册成功的信息。
S1912、服务器向第一电子设备发送第七消息,第七消息包含第二电子设备的设备信息。
S1913、第二电子设备响应第六消息,向服务器发送第八消息,第八消息包含n个智能设备的第二标识,第八消息用于请求获取代表n个智能设备的身份的n个第二激活码,一个第二激活码对应一个智能设备。
具体的,在第二电子设备注册到服务器上后,第二电子设备可以向服务器批量申请各个智能设备对应的第二激活码,以使得后续智能设备能够注册到服务器上。
S1914、服务器响应第八消息,基于n个智能设备的第二标识,生成n个第二激活码。
具体的,服务器接收到第八消息后,可以基于各个智能设备的第二标识,随机生成各个智能设备对应的第二激活码。示例性的,第二激活码可以由多个随机数构成。
S1915、服务器向第二电子设备发送n个第二激活码。
S1919、第二电子设备向智能设备发送第九消息,第九消息包含第二激活码,第九消息用于指示智能设备利用第二激活码向服务器注册。
S1917、智能设备响应第九消息,向服务器发送第十消息,第十消息包含智能设备的第二 标识和第二激活码,第十消息用于请求注册至服务器。
S1918、服务器响应第十消息,同意智能设备注册,并记录第二标识。
具体的,服务器可以由其生成激活码的记录中查询该第二激活码是否是其刚分配的。如果服务器判断出该第二激活码是其刚分配的,则其可以同意智能设备注册。此时,服务器可以记录智能设备的信息(比如第二标识),以及,将该智能设备与客户的账号进行关联。此外,为了避免用户数据泄露,服务器可以为智能设备分配一个代表智能设备身份的标识,其中服务器可以记录该标识,并以该标识作为智能设备的信息。S1919、服务器向智能设备发送第十一消息,第十一消息包含注册成功的信息。
S1920、服务器向第一电子设备发送第十二消息,第十二消息包含智能设备的设备信息。可以理解的是,第七消息和第十二消息可以分别单独发送,也可以组合在一起同时发送,此处不做限定。
S1921、第一电子设备输出第二电子设备和智能设备的设备信息。
具体的,第一电子设备可以输出第二电子设备和智能设备的设备信息,以使得用户可以查看到第二电子设备和智能设备。示例性的,第一电子设备可以显示第二电子设备和智能设备的设备信息,也可以通过语音播报的方式广播第二电子设备和智能设备的设备信息。示例性的,当第七消息和第十二消息分别单独发送时,第一电子设备可以在接收到第七消息时显示第二电子设备的设备信息,在接收到第十二消息时显示智能设备的设备信息。当第七消息和第十二消息同时发送时,第一电子设备可以在接收到第七消息和第十二消息时,同时显示第二电子设备和智能设备的设备信息,也可以分时显示第二电子设备和智能设备的设备信息,此处不做限定。
进一步地,在S1921之后,可以对第二电子设备和/智能设备进行操控。以解绑第一账号与第二电子设备之间的关系为例,示例性的,如图20所示,解绑流程可以包括以下步骤:
S1922、第一电子设备接收到解绑指令。
S1923、第一电子设备向服务器发送第十三消息,第十三消息用于指示解除第二电子设备与第一账号之间的绑定关系。
S1924、服务器响应第十三消息,更新第二电子设备的管理权限。
具体的,服务器可以清空该第二电子设备的管理权限。例如,服务器未清空第二电子设备的管理权限前,该管理权限为该客户可以对第二电子设备进行管理;服务器清空第二电子设备的管理权限后,该管理权限可以为空,此时,该第二电子设备不受控。
S1925、服务器向第二电子设备发送第十四消息,第十四消息用于指示第二电子设备与第一账号解除绑定。
S1926、第二电子设备响应第十四消息,清除存储的账号信息和已注册至服务器上的注册信息。
具体的,第二电子设备在解除其与账号之间的绑定时,可以清除其存储的账号信息,由此实现解绑。此外,第二电子设备也可以清除其已注册至服务器上的注册信息,由此使得第二电子设备不再向服务器反馈设备信息。
S1927、第二电子设备向智能设备发送第十五消息,第十五消息用于指示智能设备清除智能设备已注册至服务器上的注册信息。
S1928、智能设备响应第十五消息,清除已注册至服务器上的注册信息。
具体的,智能设备可以清除其已注册至服务器上的注册信息,由此使得智能设备不再向 服务器反馈设备信息。
示例性的,图21示出了又一种智能家居设备控制方法的流程示意图。其中,在图21中,第一电子设备上安装有与智能家居设备控制相关的客户端,该客户端上登录有第一账号,且该客户端对应有服务器。第一电子设备可以与第二电子设备之间进行短距通信,第二电子设备与服务器之间可以进行长距通信。第二电子设备上预先注册有n个智能设备,即n个智能设备预先与第二电子设备进行绑定,且第二电子设备与n个智能设备处于同一局域网中,n为大于或等于1的正整数。在一个例子中,第二电子设备可以为网关,也可以为集成有网关功能的电子设备,其可以理解为是第一电子设备接入到第二电子设备所属的智能居家系统的入口。示例性的,当第二电子设备为具备网关功能的电子设备时,第二电子设备可以为中枢设备,比如,智能音箱、智能电视、智慧屏等等。示例性的,第一电子设备可以为上文所描述的管理员所使用的设备;第二电子设备可以为上文图1中所描述的网关11;智能设备可以为上文图1中所描述的智能音箱12、智能台灯13和智能电视14;服务器可以为上文图1中所描述的服务器16。
如图21所示,智能家居设备控制方法可以包括以下步骤:
S2001、第一电子设备与第二电子设备短距通信,并从第二电子设备获取到与第二电子设备相关的第一信息,第一信息中包括第二电子设备的第一标识。
S2002、第一电子设备向服务器发送第一消息,第一消息包含第一标识,第一消息用于获取代表第二电子设备身份的第一激活码。
S2003、服务器响应第一消息,基于第一标识,生成第一激活码。
S2004、服务器向第一电子设备发送第一激活码。
S2005、第一电子设备向第二电子设备发送第二消息,第二消息包含第一账号,第二消息用于请求将第一账号与第二电子设备绑定。
S2006、第二电子设备响应第二消息,禁止与第一账号绑定。
具体的,第二电子设备接收到第二消息后,若其内存储有账号信息,且账号信息中未包含第一账号,则其可以禁止与第一账号绑定,由此以避免第二电子设备被多人绑定。可以理解的是,在第二电子设备已与账号绑定的情况下,用户可以通过设备分享的方式将第二电子设备分享给其他用户,从而实现第二电子设备与多人绑定。
S2007、第二电子设备向第一电子设备发送第十六消息,第十六消息包含请求输入维护密码的信息。
S2008、第一电子设备接收密码输入操作。
S2009、第一电子设备向第二电子设备第十七消息,第十七消息包含维护密码。
S2010、第二电子设备响应第十七消息,向第一电子设备发送第十八消息,第十八消息包含密码校验结果。
具体的,第二电子设备接收到维护密码后,其可以将该维护密码与其存储的管理员设置的密码进行比较,当两者相同时则检验成功。
S2011、第一电子设备响应第十八消息,向第二电子设备发送第十九消息,第十九消息包含信息查询请求。
S2012、第二电子设备响应第十九消息,向第一电子设备发送第二十消息,第二十消息包含第二电子设备和智能设备的设备信息。
S2013、第一电子设备响应第二十消息,输出第二电子设备和智能设备的设备信息。
进一步地,在S2013之后,可以对第二电子设备和/智能设备进行操控,例如,解除第二电子设备与账号之间的绑定关系等。以解绑账号与第二电子设备之间的关系为例,示例性的,如图22所示,解绑流程可以包括以下步骤:
S2014、第一电子设备接收到解绑指令。
S2015、第一电子设备向第二电子设备发送第二十一消息,第二十一消息用于指示解除第二电子设备与账号之间的绑定关系。
S2016、第二电子设备响应第二十一消息,向服务器发送第二十二消息,第二十二消息包含解除第二电子设备与账户之间的绑定关系的信息。
S2017、服务器响应第二十二消息,更新第二电子设备的管理权限。
S2018、服务器向第二电子设备发送第二十三消息,第二十三消息包含解绑成功的信息。
S2019、第二电子设备响应第二十三消息,向第一电子设备发送第二十四消息,第二十四消息包含解绑成功的信息。
S2020、第二电子设备清除存储的账号信息和已注册至服务器上的注册信息。
S2021、第二电子设备向智能设备发送第十五消息,第十五消息用于指示智能设备清除智能设备已注册至服务器上的注册信息。
S2022、智能设备响应第十五消息,清除已注册至服务器上的注册信息。
可以理解的是,本申请的任意实施例的任意特征的全部或部分在不矛盾的前提下,可以自由地、任何地组合。组合后的技术方案也在本申请的范围之内。
可以理解的是,本申请的实施例中的处理器可以是中央处理单元(central processing unit,CPU),还可以是其他通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现场可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、晶体管逻辑器件,硬件部件或者其任意组合。通用处理器可以是微处理器,也可以是任何常规的处理器。
本申请的实施例中的方法步骤可以通过硬件的方式来实现,也可以由处理器执行软件指令的方式来实现。软件指令可以由相应的软件模块组成,软件模块可以被存放于随机存取存储器(random access memory,RAM)、闪存、只读存储器(read-only memory,ROM)、可编程只读存储器(programmable rom,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)、寄存器、硬盘、移动硬盘、CD-ROM或者本领域熟知的任何其它形式的存储介质中。一种示例性的存储介质耦合至处理器,从而使处理器能够从该存储介质读取信息,且可向该存储介质写入信息。当然,存储介质也可以是处理器的组成部分。处理器和存储介质可以位于ASIC中。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者通过所述计算机可读存储介质进行传输。所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无 线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘(solid state disk,SSD))等。
可以理解的是,在本申请的实施例中涉及的各种数字编号仅为描述方便进行的区分,并不用来限制本申请的实施例的范围。

Claims (24)

  1. 一种智能家居控制方法,其特征在于,所述方法应用于第一电子设备,所述第一电子设备设置有客户端,所述客户端登录有第一账号,所述客户端对应有服务器,所述方法包括:
    所述第一电子设备与第二电子设备短距通信,并从所述第二电子设备获取到与所述第二电子设备相关的第一信息,所述第一信息包括所述第二电子设备的第一标识;其中,所述第二电子设备注册有n个智能设备,所述第二电子设备与n个所述智能设备处于同一局域网中,n为大于或等于1的正整数;
    所述第一电子设备向服务器发送第一消息,所述第一消息包含所述第一标识,所述第一消息用于获取代表所述第二电子设备身份的第一激活码;
    所述第一电子设备接收所述服务器发送的所述第一激活码;
    所述第一电子设备向所述第二电子设备发送第二消息,所述第二消息包含所述第一账号,所述第二消息用于请求将所述第一账号与所述第二电子设备绑定;
    响应于接收到的所述第二电子设备发送的第三消息,所述第三消息包含所述第二电子设备同意绑定的信息,所述第一电子设备向所述第二电子设备发送第四消息,所述第四消息包含所述第一激活码,所述第四消息用于指示所述第二电子设备利用所述第一激活码向所述服务器注册;
    所述第一电子设备接收所述服务器发送的第七消息和第十二消息,所述第七消息包括所述第二电子设备的设备信息,所述第十二消息包含n个所述智能设备的设备信息,其中,所述第七消息为所述服务器在所述第二电子设备注册至所述服务器上时发送,所述第十二消息为所述服务器在n个所述智能设备响应所述第二电子设备发送的注册指令注册至所述服务器上时发送;
    所述第一电子设备输出所述第二电子设备和n个所述智能设备的设备信息。
  2. 根据权利要求1所述的方法,其特征在于,在所述第一电子设备输出所述第二电子设备和n个所述智能设备的设备信息之后,所述方法还包括:
    响应于接收到的设备分享操作,所述第一电子设备向所述服务器发送设备分享信息,所述设备分享信息包含待分享账号,所述设备分享信息用于指示所述服务器将所述待分享账号与所述第二电子设备绑定。
  3. 根据权利要求1或2所述的方法,其特征在于,在所述第一电子设备输出所述第二电子设备和n个所述智能设备的设备信息之后,所述方法还包括:
    响应于接收到的与所述第二电子设备解除绑定的解绑指令,所述第一电子设备向所述服务器发送第十三消息,所述第十三消息用于指示解除所述第二电子设备与所述第一账号之间的绑定关系。
  4. 根据权利要求1-3中任意一项所述的方法,其特征在于,所述第一电子设备输出所述第二电子设备和n个所述智能设备的设备信息,包括:
    所述第一电子设备显示所述第二电子设备和n个所述智能设备的设备信息,和/或,所述第一电子设备通过语音播放所述第二电子设备和n个所述智能设备的设备信息。
  5. 一种智能家居控制方法,其特征在于,所述方法应用于第二电子设备,所述第二电子设备注册有n个智能设备,所述第二电子设备与n个所述智能设备处于同一局域网中,n为大于或等于1的正整数,所述方法包括:
    所述第二电子设备与第一电子设备短距通信,向所述第一电子设备发送第一信息,所述第一信息包括所述第二电子设备的第一标识,其中,所述第一电子设备设置有客户端,所述客户端登录有第一账号,所述客户端对应有服务器;
    所述第二电子设备接收所述第一电子设备发送的第二消息,所述第二消息包含所述第一账号,所述第二消息用于请求将所述第一账号与所述第二电子设备绑定;
    所述第二电子设备存储所述第一账号,并向所述第一电子设备发送第三消息,所述第三消息包含所述第二电子设备同意绑定的信息;
    所述第二电子设备接收所述第一电子设备发送的第四消息,所述第四消息包含第一激活码,所述第四消息用于指示所述第二电子设备利用所述第一激活码向所述服务器注册,所述第一激活码为所述服务器接收到所述第一电子设备发送的第一消息时生成,所述第一消息包含所述第一标识,所述第一激活码用于代表所述第二电子设备的身份;
    所述第二电子设备向所述服务器发送第五消息,所述第五消息包含所述第一标识和所述第一激活码,所述第五消息用于请求将所述第二电子设备注册至所述服务器;
    响应于接收到的所述服务器发送的第六消息,所述第六消息包含注册成功的信息,所述第二电子设备向所述服务器发送第八消息,所述第八消息包含n个所述智能设备的第二标识,所述第八消息用于请求获取代表n个所述智能设备身份的n个第二激活码;
    所述第二电子设备接收所述服务器发送的n个第二激活码,其中,一个所述第二激活码对应一个所述智能设备;
    所述第二电子设备分别向n个所述智能设备发送第九消息,所述第九消息包含所述智能设备对应的第二激活码,所述第九消息用于指示所述智能设备利用所述智能设备对应的第二激活码向所述服务器注册。
  6. 根据权利要求5所述的方法,其特征在于,在所述第二电子设备分别向n个所述智能设备发送第九消息之后,所述方法还包括:
    接收所述服务器发送的待分享账号,以及存储所述待分享账号。
  7. 根据权利要求5或6所述的方法,其特征在于,在所述第二电子设备分别向n个所述智能设备发送第九消息之后,所述方法还包括:
    所述第二电子设备接收所述服务器发送的第十四消息,所述第十四消息用于指示所述第二电子设备与所述第一账号解除绑定;
    响应所述第十四消息,所述第二电子设备清除存储的账号信息和已注册至所述服务器上的注册信息。
  8. 根据权利要求7所述的方法,其特征在于,所述方法还包括:
    所述第二电子设备分别向n个所述智能设备发送的十五消息,所述第十五消息用于指示所述智能设备清除所述智能设备已注册至所述服务器上的注册信息。
  9. 一种智能家居控制方法,其特征在于,所述方法应用于第一电子设备,所述第一电子设备设置有客户端,所述客户端登录有第一账号,所述客户端对应有服务器,所述方法包括:
    所述第一电子设备与第二电子设备短距通信,并从所述第二电子设备获取到与所述第二电子设备相关的第一信息,所述第一信息包括所述第二电子设备的第一标识;其中,所述第二电子设备注册有n个智能设备,所述第二电子设备与n个所述智能设备处于同一局域网中,n为大于或等于1的正整数;
    所述第一电子设备向服务器发送第一消息,所述第一消息包含所述第一标识,所述第一 消息用于获取代表所述第二电子设备身份的第一激活码;
    所述第一电子设备接收所述服务器发送的所述第一激活码;
    所述第一电子设备向所述第二电子设备发送第二消息,所述第二消息包含所述第一账号,所述第二消息用于请求将所述第一账号与所述第二电子设备绑定;
    所述第一电子设备接收所述第二电子设备发送的第十六消息,所述第十六消息包含请求输入维护密码的信息,其中,所述第十六消息为所述第二电子设备确定其存储有与用户账号相关的账号信息,且所述账号信息中未包含所述第一账号时发送;
    响应于接收到的密码输入操作,所述第一电子设备向所述第二电子设备发送第十七消息,所述第十七消息包含维护密码;
    所述第一电子设备接收所述第二电子设备发送的第二十消息,所述第二十消息包含所述第二电子设备和n个所述智能设备的设备信息;
    所述第一电子设备输出所述第二电子设备和n个所述智能设备的设备信息。
  10. 根据权利要求9所述的方法,其特征在于,在所述第一电子设备输出所述第二电子设备和n个所述智能设备的设备信息之后,所述方法还包括:
    响应于接收到的解绑指令,所述第一电子设备向所述第二电子设备发送第二十一消息,所述第二十一消息用于指示解除所述第二电子设备与所述第二电子设备中存储的账号之间的绑定关系。
  11. 一种智能家居控制方法,其特征在于,所述方法应用于第二电子设备,所述第二电子设备注册有n个智能设备,所述第二电子设备与n个所述智能设备处于同一局域网中,n为大于或等于1的正整数,所述方法包括:
    所述第二电子设备与第一电子设备短距通信,向所述第一电子设备发送第一信息,所述第一信息包括所述第二电子设备的第一标识,其中,所述第一电子设备设置有客户端,所述客户端登录有第一账号,所述客户端对应有服务器;
    所述第二电子设备接收所述第一电子设备发送的第二消息,所述第二消息包含所述第一账号,所述第二消息用于请求将所述第一账号与所述第二电子设备绑定;
    所述第二电子设备确定存储有与用户账号相关的账号信息,且所述账号信息中未包含所述第一账号,向所述第一电子设备发送第十六消息,所述第十六消息包含请求输入维护密码的信息;
    响应于所述第一电子设备发送的第十七消息,所述第十七消息包含维护密码,所述第二电子设备对所述维护密码进行校验,以及在校验通过时,向所述第一电子设备发送所述第二电子设备和n个所述智能设备的设备信息。
  12. 根据权利要求11所述的方法,其特征在于,在所述第二电子设备向所述第一电子设备发送所述第二电子设备和n个所述智能设备的设备信息之后,所述方法还包括:
    所述第二电子设备接收所述第一电子设备发送的第二十一消息,所述第二十一消息用于指示解除所述第二电子设备与所述第二电子设备中存储的账号之间的绑定关系;
    响应所述第二十一消息,所述第二电子设备向所述服务器发送第二十二消息,所述第二十二消息用于指示所述服务器解除所述第二电子设备与所述第二电子设备中存储的账号之间的绑定关系;
    响应于所述服务器发送的第二十三消息,所述第二十三消息包含解绑成功的信息,所述第二电子设备清除所述第二电子设备存储的账号信息和已注册至所述服务器上的注册信息。
  13. 根据权利要求12所述的方法,其特征在于,所述方法还包括:
    所述第二电子设备分别向n个所述智能设备发送第十五消息,所述第十五消息用于指示所述智能设备清除所述智能设备已注册至所述服务器上的注册信息。
  14. 一种智能家居控制方法,其特征在于,所述方法应用于服务器,所述服务器与客户端对应,所述客户端登录有第一账号,所述客户端设置于第一电子设备上,所述方法包括:
    所述服务器接收第一电子设备发送的第一消息,所述第一消息包含第二电子设备的第一标识,所述第一消息用于获取代表所述第二电子设备身份的第一激活码,其中,所述第一标识为所述第一电子设备通过与所述第二电子设备短距通信得到,所述第二电子设备注册有n个智能设备,所述第二电子设备与n个所述智能设备处于同一局域网中,n为大于或等于1的正整数;
    所述服务器基于所述第一标识,生成所述第一激活码,以及将所述第一激活码发送至所述第一电子设备。
  15. 根据权利要求14所述的方法,其特征在于,在所述服务器将所述第一激活码发送至所述第一电子设备之后,所述方法还包括:
    所述服务器接收所述第二电子设备发送的第五消息,所述第五消息包含所述第一标识和所述第一激活码,所述第五消息用于请求将所述第二电子设备注册至所述服务器;
    所述服务器对所述第一激活码进行校验,以及在校验通过时记录所述第一标识,并向所述第二电子设备发送第六消息,所述第六消息包含注册成功的信息;
    所述服务器接收所述第二电子设备发送的第八消息,所述第八消息包含n个所述智能设备的第二标识,所述第八消息用于获取代表n个所述智能设备身份的n个第二激活码;
    所述服务器基于n个所述第二标识中的各个标识,生成n个所述第二激活码,以及将n个所述第二激活码发送至所述第二电子设备;
    所述服务器接收n个所述智能设备发送的n个第十消息,每个所述第十消息均包含一个所述智能设备的第二标识和第二激活码,所述第十消息用于请求将所述智能设备注册至所述服务器;
    所述服务器分别对n个所述第二激活码进行校验,以及在校验通过时分别记录n个所述智能设备的第二标识;
    所述服务器向所述第一电子设备发送第七消息和第十二消息,所述第七消息包含所述第二电子设备的设备信息,所述第十二消息包含n个所述智能设备的设备信息。
  16. 根据权利要求15所述的方法,其特征在于,在所述服务器向所述第一电子设备发送第七消息和第十二消息之后,所述方法还包括:
    所述服务器接收所述第一电子设备发送的第十三消息,所述第十三消息用于指示解除所述第二电子设备与所述第一账号之间的绑定关系;
    所述服务器更新所述第二电子设备的管理权限,以及向所述第二电子设备发送第十四消息,所述第十四消息用于指示所述第二电子设备解除与所述第一账号之间的绑定关系。
  17. 根据权利要求14所述的方法,其特征在于,在所述服务器将所述第一激活码发送至所述第一电子设备之后,所述方法还包括:
    所述服务器接收所述第二电子设备发送的第二十二消息,所述第二十二消息用于指示解除所述第二电子设备与所述第二电子设备中存储的账号之间的绑定关系;
    所述服务器更新所述第二电子设备的管理权限,以及向所述第二电子设备发送第二十三 消息,所述第二十三消息包含解绑成功的信息。
  18. 一种第一电子设备,其特征在于,所述第一电子设备设置有客户端,所述客户端登录有第一账号,所述第一电子设备用于执行如权利要求1-4和9-10中任意一项所述的方法。
  19. 一种第二电子设备,其特征在于,所述第二电子设备注册有n个智能设备,所述第二电子设备与n个所述智能设备处于同一局域网中,n为大于或等于1的正整数,所述第二电子设备用于执行如权利要求5-8和11-13中任意一项所述的方法。
  20. 根据权利要求19所述的第二电子设备,其特征在于,所述第二电子设备为网关,或者为集成有网关功能的电子设备。
  21. 一种服务器,其特征在于,所述服务器用于执行如权利要求14-17中任意一项所述的方法。
  22. 一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,当所述计算机程序在第一电子设备上运行时,使得所述第一电子设备执行如权利要求1-4和9-10中任意一项所述的方法。
  23. 一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,当所述计算机程序在第二电子设备上运行时,使得所述第二电子设备执行如权利要求5-8和11-13中任意一项所述的方法。
  24. 一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,当所述计算机程序在服务器上运行时,使得所述服务器执行如权利要求14-17中任意一项所述的方法。
PCT/CN2022/084075 2021-06-21 2022-03-30 一种智能家居设备控制方法及系统 WO2022267598A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP22827103.7A EP4332695A1 (en) 2021-06-21 2022-03-30 Smart home device control method and system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110685507.5 2021-06-21
CN202110685507.5A CN115576210A (zh) 2021-06-21 2021-06-21 一种智能家居设备控制方法及系统

Publications (1)

Publication Number Publication Date
WO2022267598A1 true WO2022267598A1 (zh) 2022-12-29

Family

ID=84544020

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/084075 WO2022267598A1 (zh) 2021-06-21 2022-03-30 一种智能家居设备控制方法及系统

Country Status (3)

Country Link
EP (1) EP4332695A1 (zh)
CN (1) CN115576210A (zh)
WO (1) WO2022267598A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116232847A (zh) * 2023-05-10 2023-06-06 北京拓普丰联信息科技股份有限公司 一种故障检测的方法、装置、设备和介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105992306A (zh) * 2015-03-02 2016-10-05 海信集团有限公司 一种终端与家庭网关的绑定方法
US20180184298A1 (en) * 2016-12-27 2018-06-28 Lite-On Electronics (Guangzhou) Limited GATEWAY, GATEWAY SETUP METHOD, AND IoT DEVICE SETUP METHOD IN IoT SYSTEM
US20190029074A1 (en) * 2016-03-07 2019-01-24 Seiko Epson Corporation Gateway device and communication system
US20190306024A1 (en) * 2016-07-01 2019-10-03 Intel Corporation Automated configuration of machine-to-machine systems

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105992306A (zh) * 2015-03-02 2016-10-05 海信集团有限公司 一种终端与家庭网关的绑定方法
US20190029074A1 (en) * 2016-03-07 2019-01-24 Seiko Epson Corporation Gateway device and communication system
US20190306024A1 (en) * 2016-07-01 2019-10-03 Intel Corporation Automated configuration of machine-to-machine systems
US20180184298A1 (en) * 2016-12-27 2018-06-28 Lite-On Electronics (Guangzhou) Limited GATEWAY, GATEWAY SETUP METHOD, AND IoT DEVICE SETUP METHOD IN IoT SYSTEM

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116232847A (zh) * 2023-05-10 2023-06-06 北京拓普丰联信息科技股份有限公司 一种故障检测的方法、装置、设备和介质
CN116232847B (zh) * 2023-05-10 2023-06-30 北京拓普丰联信息科技股份有限公司 一种故障检测的方法、装置、设备和介质

Also Published As

Publication number Publication date
EP4332695A1 (en) 2024-03-06
CN115576210A (zh) 2023-01-06

Similar Documents

Publication Publication Date Title
EP3794853B1 (en) Secure systems and methods for establishing wireless audio sharing connection
RU2409853C2 (ru) Администрирование управления доступом в беспроводных сетях
EP1758304B1 (en) A method for implementing grouping devices and interacting among grouped devices
US7937089B2 (en) Method, apparatus, and program product for provisioning secure wireless sensors
US7275156B2 (en) Method and apparatus for establishing and using a secure credential infrastructure
US20050129240A1 (en) Method and apparatus for establishing a secure ad hoc command structure
US20040107366A1 (en) Method, apparatus, and program product for automatically provisioning secure network elements
CN113163379A (zh) 一种发现及配网的方法和电子设备
JP4382659B2 (ja) ネットワークセキュリティ
US10015151B2 (en) Method and apparatus for enabling service-configurable wireless connections
WO2023280194A1 (zh) 网络连接管理方法、装置、可读介质、程序产品及电子设备
CN113518348B (zh) 业务处理方法、装置、系统及存储介质
US10420156B2 (en) Wireless communication terminal, wireless communication system, wireless communication method, and non-transitory medium saving program
WO2022028538A1 (zh) 确定用户面安全算法的方法、系统及装置
WO2022267598A1 (zh) 一种智能家居设备控制方法及系统
WO2017091987A1 (zh) 一种终端间的安全交互方法及装置
US9729625B1 (en) Personal cloud network
EP2741465B1 (en) Method and device for managing secure communications in dynamic network environments
US20210243599A1 (en) User authentication method through bluetooth device and device therefor
WO2021204083A1 (zh) 一种电子设备的蓝牙组网方法及相关设备
WO2022042170A1 (zh) 一种IoT设备及其授权方法
KR102209289B1 (ko) 이동 통신 시스템 환경에서 프록시미티 기반 서비스를 위한 보안 및 정보 지원 방법 및 시스템
CN113645024B (zh) 密钥分发方法、系统、装置及可读存储介质和芯片
CN113543131A (zh) 网络连接管理方法、装置、计算机可读介质及电子设备
KR20150066475A (ko) M2M시스템에서 DNS 기반노드 등록 및 PoA 설정 방법 및 이를 위한 장치

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22827103

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2022827103

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2022827103

Country of ref document: EP

Effective date: 20231129

NENP Non-entry into the national phase

Ref country code: DE