CN112491670B - Device control method and apparatus, electronic device, and storage medium - Google Patents

Device control method and apparatus, electronic device, and storage medium Download PDF

Info

Publication number
CN112491670B
CN112491670B CN202011349995.4A CN202011349995A CN112491670B CN 112491670 B CN112491670 B CN 112491670B CN 202011349995 A CN202011349995 A CN 202011349995A CN 112491670 B CN112491670 B CN 112491670B
Authority
CN
China
Prior art keywords
authorization
state
type
authorization data
current
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011349995.4A
Other languages
Chinese (zh)
Other versions
CN112491670A (en
Inventor
刘磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Yunding Network Technology Beijing Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Yunding Network Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd, Yunding Network Technology Beijing Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN202011349995.4A priority Critical patent/CN112491670B/en
Publication of CN112491670A publication Critical patent/CN112491670A/en
Application granted granted Critical
Publication of CN112491670B publication Critical patent/CN112491670B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/283Processing of data at an internetworking point of a home automation network
    • H04L12/2834Switching of information between an external network and a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The disclosure relates to a device control method and apparatus, an electronic device, and a storage medium. The method comprises the following steps: acquiring a control request sent by a third-party application, wherein the control request comprises authorization data sent to the third-party application by a main control device; verifying the authorization data to obtain a verification result; and determining whether to respond to the control request of the third-party application according to the verification result. In this embodiment, by authorizing the third-party application, the third-party application can control the target device, which is beneficial to improving the security of the target device and improving the use experience.

Description

Device control method and apparatus, electronic device, and storage medium
Technical Field
The present disclosure relates to the field of control technologies, and in particular, to a device control method and apparatus, an electronic device, and a storage medium.
Background
The rice APP is a control center and an e-commerce platform of a millet ecological chain product, integrates equipment control, e-commerce marketing, crowd funding platform and scene sharing, and is an integral solution for intelligent life of a user taking intelligent hardware as a main part and covering hardware and home service products. Therefore, in real life, a user can rely on a millet ecological chain system to connect various devices in a house together based on a Mijia APP, and an intelligent living environment, namely an intelligent Home (Smart Home), is achieved.
Disclosure of Invention
The disclosure provides a device control method and apparatus, an electronic device, and a storage medium.
According to a first aspect of the embodiments of the present disclosure, there is provided an apparatus control method, applied to a target apparatus, including:
acquiring a control request sent by a third-party application, wherein the control request comprises authorization data sent to the third-party application by a main control device;
verifying the authorization data to obtain a verification result;
and determining whether to respond to the control request of the third-party application according to the verification result.
Optionally, the verifying the authorization data to obtain a verification result includes:
acquiring the current authorization state of target equipment; the current authorization state comprises an authorization state or an unauthorized state;
when the current authorization state is the authorization state, comparing the length of the authorization data with a preset length;
when the length of the authorization data is a preset length, comparing the equipment identification in the authorization data with the unique identification code of the target equipment;
and when the equipment identification is matched with the unique identification code, obtaining a verification result which shows that the authorization data passes the verification.
Optionally, after the device identifier and the unique identification code match, the method further comprises:
obtaining an authorization type in the authorization data; the authorization type comprises a periodic type;
when the authorization type is a periodic type, acquiring the current time of the target equipment and the starting time and the ending time in the authorization data;
judging whether the current time is between the starting time and the ending time;
when the current time is between the starting time and the ending time, obtaining a verification result indicating that the authorization data passes the verification; otherwise, obtaining a verification result indicating that the authorization data is not verified.
Optionally, the authorization type further includes a one-time type, and after obtaining the authorization type in the authorization data, the method further includes:
and when the authorization type is a disposable type, adjusting the authorization state to be an unauthorized state and obtaining a verification result indicating that the authorization data passes the verification.
Optionally, the verifying the authorization data to obtain a verification result further includes:
when the current authorization state is an unauthorized state, or the length of the authorization data is not equal to a preset length, or when the device identification in the authorization data is not matched with the unique identification code, a verification result indicating that the authorization data is not verified is obtained.
Optionally, determining whether to respond to the control request of the third-party application according to the verification result includes:
and when the verification result shows that the authorization data passes the verification, updating the current authorization state of the target equipment and responding to the control request.
Optionally, the method further comprises:
when detecting that the master control equipment is in a connection state, acquiring a state synchronization request sent by the master control equipment;
and synchronizing the current authorization state of the target equipment to the main control equipment.
Optionally, the method further comprises:
acquiring a query request sent by the master control device, wherein the query request is used for acquiring a unique identification code of the target device;
and sending the unique identification code of the target equipment to the main control equipment so that the main control equipment generates authorization data according to the unique identification code and sends the authorization data to the third-party application.
According to a second aspect of the embodiments of the present disclosure, there is provided a device control method applied to a master device, including:
displaying an authorization type when a trigger operation representing authorization to a third-party application is detected; the authorization type comprises a one-time type and a periodic type; the periodicity type comprises a time length of each period;
when the trigger operation representing the selection of the authorization type is detected, sending a query request to target equipment, wherein the query request is used for acquiring a unique identification code of the target equipment;
after the unique identification code is obtained, authorization data with a preset length are generated according to the unique identification code and the authorization type;
and sending the authorization data to a third device installed with a third-party application so that the third device controls the target device based on the authorization data.
Optionally, generating authorization data with a preset length according to the unique identification code and the authorization type includes:
when the authorization type is a periodic type, acquiring the current time and the end time;
and generating authorization data with preset length according to the current time, the ending time, the periodic type and the unique identification code.
Optionally, the obtaining of the authorization type further includes a one-time type, and the generating of the authorization data with the preset length according to the unique identification code and the authorization type includes:
and generating authorization data with a preset length according to the unique identification code and the disposable type.
Optionally, after sending the authorization data to a third device installed with a third-party application, the method further includes:
when detecting that the target equipment is in a connection state, sending a state synchronization request to the target equipment so as to enable the target equipment to be in a synchronous current authorization state.
According to a third aspect of the embodiments of the present disclosure, there is provided a device control apparatus applied to a target device, including:
the control request acquisition module is used for acquiring a control request sent by a third-party application, wherein the control request comprises authorization data sent to the third-party application by a main control device;
the authorized data checking module is used for checking the authorized data to obtain a checking result;
and the control request response module is used for determining whether to respond to the control request of the third-party application according to the verification result.
Optionally, the authorization data checking module includes:
a current state obtaining unit, configured to obtain a current authorization state of a target device; the current authorization status comprises an authorization status or an unauthorized status;
the data length obtaining unit is used for comparing the length of the authorization data with a preset length when the current authorization state is the authorization state;
the device identifier comparison unit is used for comparing the device identifier in the authorization data with the unique identification code of the target device when the length of the authorization data is a preset length;
and the verification result acquisition unit is used for acquiring a verification result which shows that the authorization data passes the verification when the equipment identification is matched with the unique identification code.
Optionally, the authorization data checking module further includes:
an authorization type obtaining unit, configured to obtain an authorization type in the authorization data; the authorization type comprises a periodic type;
a current time obtaining unit, configured to obtain a current time of a target device and a start time and an end time in the authorization data when the authorization type is a periodic type;
a current time judging unit, configured to judge whether the current time is between the start time and the end time;
a verification result obtaining unit, configured to obtain a verification result indicating that the authorization data passes verification when the current time is between the start time and the end time; otherwise, obtaining a verification result indicating that the authorization data is not verified.
Optionally, the authorization type further includes a one-time type, and the check result obtaining unit is further configured to, when the authorization type is the one-time type, adjust the authorization state to an unauthorized state and obtain a check result indicating that the authorization data passes the check.
Optionally, the authorization data checking module is further configured to obtain a checking result indicating that the authorization data fails to be checked when the current authorization state is an unauthorized state, or the length of the authorization data is not equal to a preset length, or when the device identifier in the authorization data does not match the unique identifier.
Optionally, the control request response module is configured to update a current authorization status of the target device and respond to the control request when the verification result indicates that the authorization data passes the verification.
Optionally, the apparatus further comprises:
the synchronization request acquisition module is used for acquiring a state synchronization request sent by the main control equipment when detecting that the main control equipment is in a connection state;
and the authorization state synchronization module is used for synchronizing the current authorization state of the target equipment to the master control equipment.
Optionally, the apparatus further comprises:
the query request acquisition module is used for acquiring a query request sent by the master control equipment, wherein the query request is used for acquiring the unique identification code of the target equipment;
and the identification code sending module is used for sending the unique identification code of the target equipment to the main control equipment so that the main control equipment generates authorization data according to the unique identification code and sends the authorization data to the third-party application.
According to a fourth aspect of the embodiments of the present disclosure, there is provided a device control apparatus applied to a master control device, including:
an authorization type display module for displaying an authorization type when a trigger operation indicating authorization to a third party application is detected; the authorization type comprises a one-time type and a periodic type; the periodicity type comprises a time length of each period;
the query request sending module is used for sending a query request to target equipment after detecting the trigger operation which indicates that the authorization type is selected, wherein the query request is used for acquiring the unique identification code of the target equipment;
the authorization data generation module is used for generating authorization data with a preset length according to the unique identification code and the authorization type after the unique identification code is obtained;
and the authorization data sending module is used for sending the authorization data to a third device provided with a third party application so as to enable the third device to control the target device based on the authorization data.
Optionally, the authorization data generation module includes:
the time acquisition unit is used for acquiring the current time and the ending time when the authorization type is a periodic type;
and the data generation unit is used for generating authorization data with preset length according to the current time, the ending time, the periodicity type and the unique identification code.
Optionally, the acquired authorization type further includes a one-time type, and the data generating unit is further configured to generate authorization data with a preset length according to the unique identification code and the one-time type.
Optionally, the apparatus further comprises:
and the authorization state synchronization module is used for sending a state synchronization request to the target equipment when detecting that the target equipment is in a connection state, so that the target equipment is in a synchronous current authorization state.
Optionally, the authorization data generation module further includes:
a setting request sending unit, configured to set a request to a target device to adjust a current authorization state of the target device;
and the state information receiving unit is used for receiving the state information returned by the target equipment.
According to a fifth aspect of embodiments of the present disclosure, there is provided an electronic apparatus including:
a processor;
a memory for storing a computer program executable by the processor;
wherein the processor is configured to execute the computer program in the memory to implement the above-described method.
According to a sixth aspect of embodiments of the present disclosure, there is provided a computer-readable storage medium, in which an executable computer program is executed by a processor, to implement the above-mentioned method.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
as can be seen from the foregoing embodiments, in the embodiments of the present disclosure, the target device may obtain authorization data sent by the third-party application, where the authorization data is sent to the third-party application by the main control device. Then, the target device can verify the authorization data to obtain a verification result; and then, determining whether to respond to the control request of the third-party application according to the verification result. In this way, in this embodiment, by authorizing the third-party application, the third-party application can control the target device, which is beneficial to improving the security of the target device and improving the use experience.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and, together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a diagram illustrating an application scenario in accordance with an exemplary embodiment.
FIG. 2 is a flow chart illustrating a method of device control according to an exemplary embodiment.
FIG. 3 is a flow diagram illustrating a verification of authorization data according to an example embodiment.
FIG. 4 is a flow diagram illustrating another verification of authorization data according to an example embodiment.
Fig. 5 is a flow chart illustrating another method of device control according to an example embodiment.
FIG. 6 is a diagram illustrating a display effect according to an exemplary embodiment.
FIG. 7 is a schematic diagram illustrating another display effect according to an example embodiment.
Fig. 8 is a schematic diagram illustrating yet another display effect according to an exemplary embodiment.
FIG. 9 is a diagram illustrating yet another display effect according to an example embodiment.
FIG. 10 is an interaction diagram shown in accordance with an example embodiment.
FIG. 11 is a flow diagram illustrating verification of an intelligent door lock, according to an exemplary embodiment.
Fig. 12 is a block diagram illustrating an appliance control device according to an exemplary embodiment.
FIG. 13 is a block diagram illustrating an electronic device in accordance with an example embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The following exemplary described embodiments do not represent all embodiments consistent with the present disclosure. Rather, they are merely examples of devices consistent with certain aspects of the present disclosure as recited in the claims below.
In practical application, other providers may also provide a third-party application similar to the mijiki APP, for example, the homekit APP of the smart home platform released by apple, and the user may also use the third-party application to bind various smart hardware to achieve the purpose of control and management.
Use intelligent lock in the intelligent hardware as an example, the user is except making the rice family APP unblank, can also utilize homekit APP to bind intelligent lock and realize unblanking, include: the homekit APP can scan the setting codes in the intelligent door lock or find the intelligent door lock in the accessory list and manually input the codes to bind; and then, controlling the intelligent door lock to be unlocked by using the homekit APP.
However, when a user (owner) does not add the intelligent door lock through homekit APP, other users may secretly shoot the setting code of the intelligent door lock and maliciously bind the intelligent door lock, so that the safety of the intelligent door lock is in a high-risk state, and the use experience is greatly reduced.
In order to solve the above technical problem, an embodiment of the present disclosure provides a solution, referring to fig. 1, a device 10 (hereinafter, referred to as a master device), a device 20 (hereinafter, referred to as a third device), and a device 30 (hereinafter, referred to as a target device) may establish a communication connection therebetween. The method comprises the steps that information required by communication between a main control device and a target device, such as a unique identification code, generates authorization data; the master control device can send the authorization data to the third device when communicating with the target device; when the third device communicates with the target device, the third device may send the authorization data to the target device, and the target device may receive control of the third device after passing verification of the authorization data. That is to say, in this embodiment, the authorized third device may control the target device, and the unauthorized device cannot control the target device, which is beneficial to improving the security of the target device and improving the use experience.
It should be noted that the third device may perform multiple controls on the target device, the control content may be set according to the target device, and taking the target device as an intelligent door lock as an example, the control content may be unlocking.
Fig. 2 is a flowchart illustrating a device control method according to an exemplary embodiment, and referring to fig. 2, a device control method, which may be applied to a target device, includes steps 21 to 23:
in step 21, a control request sent by a third party application is obtained, where the control request includes authorization data sent by a master control device to the third party application.
When a user has a need to control a target device, a third device may be brought into communication connection with the target device, including but not limited to bluetooth, WIFI, infrared, and NFC. After the third device establishes communication connection with the target device, the user may operate the third device to expect to control the target device, and at this time, the third device may send a control request to the target device, where the control request includes authorization data sent by the main control device to the third-party application; the authorisation data may enable the third device to control the target device under certain conditions. The certain condition may be set according to a specific scenario, for example, the control is performed by times, the control is performed by time periods, and the like, and is not limited herein. In this way, the target device may obtain authorization data for the third party application.
For the third device, after establishing a communication connection with the master device, the master device may authorize it. The authorization process may include:
the master control device may display a trigger key indicating authorization to the third application in the operation page, and may display the authorization type in the display interface when detecting that the trigger key is triggered to be operated. The authorization type may include a one-time type and a periodic type: the disposable type refers to a type in which control is possible only once and authorization is disabled after control; the periodic type refers to a type that can be controlled an unlimited number of times between the start time and the end time and that grants a failure when outside the start time and the end time, for example, 1 day, 2 days, 7 days, 30 days, 365 days, and the like.
When one of the authorization types is triggered to operate, the master device may send an inquiry request to the target device, where the inquiry request is used to obtain the unique identification code of the target device. After the target device receives the query request, the unique identification code of the target device can be sent to the main control device. The unique identification code may be a MAC address of the target device, and may be selected according to a specific scenario.
The main control device can generate authorization data with a preset length by using the authorization type and the unique identification code after receiving the unique identification code. The preset length may be 128, 256, 512, etc., and the device may be configured according to the unique identification code, the authorization type, the length of the start time and the end time, which is not limited herein.
For example, when the authorization type is a one-time type, the master device may generate authorization data of a preset length using the authorization type and the unique identification code. The master device may then send the authorization data to the third device.
For another example, when the authorization type is a periodic type, the master control device may obtain the current time, use the current time as the start time, and determine the end time according to the period of the periodic type, so as to obtain the start time and the end time. The master device may then generate authorization data of a preset length using the authorization type, the start time, the end time, and the unique identification code. The master device may then send the authorization data to the third device.
It should be noted that, in consideration of the limited number of the third-party applications authorized by the master control device, the number is usually several; moreover, the authorization processes of the several third-party applications are not simultaneous, so that the authorization data can be guaranteed to be unique.
In step 22, the authorization data is verified to obtain a verification result.
After obtaining the authorization data, the target device may verify the authorization data, including:
in one example, referring to fig. 3, in step 31, the target device may obtain its current authorization status; the current authorization status includes an authorization status or an unauthorized status. In step 32, when the current authorization status is the authorization status, the target device may compare the length of the authorization data with a preset length. And when the length of the authorization data is not equal to the preset length, obtaining a verification result indicating that the authorization data is not verified. In step 33, when the length of the authorization data is a preset length, the target device may compare the device identifier in the authorization data with the unique identifier of the target device. When the device identification and the unique identification code match, the target device may obtain a verification result indicating that the authorization data passes the verification. In step 34, when the device identification and the unique identification code match, the target device may obtain a verification result indicating that the authorization data passes the verification.
It should be noted that matching the device identifier and the unique identification code may include that the device identifier is the same as the unique identifier. Alternatively, the matching of the device identifier and the unique identifier may include that the matching of the device identifier and the unique identifier satisfies a preset matching relationship, for example, when the lengths of the device identifier and the unique identifier are the same, the characters at the designated positions are the same. It will be appreciated that where it can be determined that the device identification and the unique identification code match, the corresponding arrangement falls within the scope of the present disclosure.
In yet another example, referring to fig. 4, in step 41, the target device may obtain the authorization type in the authorization data; the authorization type may include a periodic type. In step 42, when the authorization type is periodic, the target device may obtain its current time and the start time and end time in the authorization data. In step 43, the target device may determine whether the current time is between the start time and the end time. In step 44, when the current time is between the start time and the end time, the target device may obtain a verification result indicating that the authorization data passes the verification; otherwise, a verification result indicating that the authorization data is not verified is obtained.
In step 23, it is determined whether to respond to the control request of the third party application according to the verification result.
After determining the verification result, the target device may determine whether to respond to the control request of the third-party application according to the verification result, for example, when the verification result indicates that the authorization data passes the verification, the target device may respond to the control request of the third-party application. For another example, the target device may not respond to the control request of the third party application when the verification result indicates that the authorization data is not verified.
In an embodiment, the target device may also periodically send a connection request to establish a communication connection with the master device. When detecting that the target device is in a connection state with the master control device, the target device may obtain a state synchronization request sent by the master control device, and then synchronize the current authorization state of the target device to the master control device. Therefore, the user can inquire the authorization state of the target device through the main control device, and the use experience is improved.
Therefore, in the embodiment of the present disclosure, the target device may obtain authorization data sent by the third-party application, and the authorization data is sent to the third-party application by the main control device. Then, the target device can verify the authorization data to obtain a verification result; and then, determining whether to respond to the control request of the third-party application according to the verification result. In this way, in this embodiment, by authorizing the third-party application, the third-party application can control the target device, which is beneficial to improving the security of the target device and improving the use experience.
Fig. 5 is a flowchart illustrating a device control method according to an exemplary embodiment, and referring to fig. 5, a device control method, which may be applied to a master device, includes steps 51 to 54:
in step 51, when a trigger operation representing authorization to a third-party application is detected, displaying an authorization type; the authorization type comprises a one-time type and a periodic type; the periodicity type includes a length of time for each period.
In this embodiment, when the user of the third device has a requirement for controlling the target device, the user may enable the main control device to establish a communication connection with the third device, including but not limited to bluetooth, WIFI, infrared ray, and NFC. After the master device establishes a communication connection with the third device, the user may operate the master device in anticipation of authorization of the third device (or third-party application).
The master device may display a trigger key representing authorization to the third application within the operation page, with the schematic effect as shown in fig. 6. When the trigger key is detected to be triggered to operate, the authorization type can be displayed in the display interface, and the schematic effect is as shown in fig. 7. The authorization type may include a one-time type and a periodic type: the disposable type refers to a type in which control is possible only once and authorization is disabled after control; the periodic type refers to a type that can be controlled an unlimited number of times between the start time and the end time and that grants a failure when outside the start time and the end time, such as 1 day, 2 days, 7 days, 30 days, and 365 days, even permanently, and the like.
In step 52, after detecting a trigger operation indicating that the authorization type is selected, sending an inquiry request to a target device, where the inquiry request is used to obtain a unique identification code of the target device.
When one of the authorization types is triggered to operate, as shown in fig. 8, the master device may send an inquiry request to the target device, where the inquiry request is used to obtain the unique identifier of the target device. After the target device receives the query request, the unique identification code of the target device can be sent to the main control device.
In step 53, authorization data with a preset length is generated according to the unique identification code and the authorization type.
The main control device can generate authorization data with a preset length by using the authorization type and the unique identification code after receiving the unique identification code. The preset length may be 128, 256, 512, etc., and the device may be configured according to the unique identification code, the authorization type, the length of the start time and the end time, which is not limited herein.
For example, when the authorization type is a one-time type, the master device may generate authorization data of a preset length using the authorization type and the unique identification code.
For another example, when the authorization type is a periodic type, the master control device may obtain the current time, use the current time as the start time, and determine the end time according to the period of the periodic type, so as to obtain the start time and the end time. The master device may then generate authorization data of a preset length using the authorization type, the start time, the end time, and the unique identification code.
In step 54, the authorization data is sent to a third device installed with a third party application, so that the third device controls the target device based on the authorization data.
The master device may send the authorization data to the third device, that is, the authorization is successfully applied to the third party, with the schematic effect shown in fig. 9.
In an embodiment, when detecting that the target device is in a connected state, the master device may send a state synchronization request to the target device to synchronize the current authorization state of the target device. In this way, the user can view the authorization status of the target device through the master device.
Therefore, in the embodiment of the present disclosure, the user may send the authorization data to the third device through the master control device for authorization, so that the third-party application may control the target device by using the authorization data, which is beneficial to improving the security of the target device and improving the use experience.
The method is described below by combining a scenario that a main control device is provided with a Mijia APP, a target device is an intelligent door lock, and a third device is provided with an apple Homekit APP, and the Mijia APP authorizes the apple Homekit APP to control the intelligent door lock to unlock, and refer to fig. 1, fig. 10 and fig. 11:
referring to fig. 1, when there is a need for authorizing unlocking of a Homekit, a mijia APP can establish communication connection with the Homekit APP and an intelligent door lock respectively.
Referring to fig. 10, the mijia APP may send an inquiry request to the intelligent door lock, and the intelligent door lock returns its own unique identification code in response to the inquiry request, where the mijia APP may obtain the unique identification code.
The mijia APP can send a setting request to the intelligent door lock, and the setting request is used for setting an authorization state of the intelligent door lock. After the current authorization state is determined to be updated from the unauthorized state to the authorized state, the intelligent door lock can return the current authorization state or state information such as authorization success information and the like.
The Mijia APP can generate authorization data according to the unique identification code, the starting time, the ending time and the authorization type and send the authorization data to the Homekit APP. And the Mimehomer APP can receive the returned information of the successful authorization fed back by the Homekit APP.
The Homekit APP can issue the authorization data to the intelligent door lock through an unlocking request according to the triggering operation of the user, and when the authorization data are effective authorization data, the intelligent door lock can respond to the unlocking request to unlock; when the authorization data is invalid authorization data, the intelligent door lock can ignore the unlocking request.
Referring to fig. 11, after receiving an unlocking request, the smart door lock may determine whether the mikey APP is authorized, for example, determine that the current authorized state is authorized, and determine that the current authorized state is unauthorized. And in an unauthorized state, ignoring the unlocking request and ending the process.
When the Mijia has authorized, the intelligent door lock can obtain the authorization data from the unlocking request, and the length of the authorization data is compared with the preset length. And when the length of the authorization data is not equal to the preset length, determining that the authorization data is illegal, ignoring the unlocking request and ending the process.
When the length of the authorization data is equal to the preset length, the intelligent door lock can acquire the unique identification code from the authorization data and verify whether the unique identification code is correct or not. And when the unique identification code is incorrect, ignoring the unlocking request and ending the process.
When the unique identification code is correct, the intelligent door lock can obtain the authorized unlocking type from the authorized data.
When the authorized unlocking type is a disposable type, the intelligent door lock can clear the authorized state, namely, the current authorized state is updated to be an unauthorized state, and the process is finished after unlocking is executed.
When the authorized unlocking type is a periodic type, the intelligent door lock can judge whether the current time is in the authorized unlocking period, and if so, the process is finished after unlocking is executed. If not, the authorization state can be cleared, namely the current authorization state is updated to be an unauthorized state, and the process is ended after unlocking is executed.
On the basis of the above device control method, referring to fig. 12, an embodiment of the present disclosure further provides a device control apparatus, applied to a target device, including:
a control request obtaining module 121, configured to obtain a control request sent by a third-party application, where the control request includes authorization data sent by a master control device to the third-party application;
the authorized data checking module 122 is configured to check the authorized data to obtain a checking result;
and a control request response module 123, configured to determine whether to respond to the control request of the third-party application according to the verification result.
In one embodiment, the authorization data checking module includes:
a current state obtaining unit, configured to obtain a current authorization state of a target device; the current authorization state comprises an authorization state or an unauthorized state;
a data length obtaining unit, configured to compare the length of the authorization data with a preset length when the current authorization status is an authorization status;
the device identifier comparison unit is used for comparing the device identifier in the authorization data with the unique identification code of the target device when the length of the authorization data is a preset length;
and the verification result acquisition unit is used for acquiring a verification result which represents that the authorization data passes the verification when the equipment identifier is matched with the unique identification code.
In one embodiment, the authorization data checking module further comprises:
the authorization type acquisition unit is used for acquiring the authorization type in the authorization data; the authorization type comprises a periodic type;
a current time obtaining unit, configured to obtain a current time of a target device and a start time and an end time in the authorization data when the authorization type is a periodic type;
a current time judging unit, configured to judge whether the current time is between the start time and the end time;
a verification result obtaining unit, configured to obtain a verification result indicating that the authorization data passes verification when the current time is between the start time and the end time; otherwise, obtaining a verification result indicating that the authorization data is not verified.
In an embodiment, the authorization type further includes a one-time type, and the check result obtaining unit is further configured to, when the authorization type is the one-time type, adjust the authorization status to an unauthorized status and obtain a check result indicating that the authorization data passes the check.
In an embodiment, the authorization data checking module is further configured to obtain a check result indicating that the authorization data is not checked when the current authorization status is an unauthorized status, or the length of the authorization data is not equal to a preset length, or when the device identifier in the authorization data does not match the unique identifier.
In one embodiment, the apparatus further comprises:
the synchronization request acquisition module is used for acquiring a state synchronization request sent by the main control equipment when detecting that the main control equipment is in a connection state;
and the authorization state synchronization module is used for synchronizing the current authorization state of the target equipment to the main control equipment.
In one embodiment, the apparatus further comprises:
the query request acquisition module is used for acquiring a query request sent by the main control equipment, wherein the query request is used for acquiring the unique identification code of the target equipment;
and the identification code sending module is used for sending the unique identification code of the target equipment to the main control equipment so that the main control equipment generates authorization data according to the unique identification code and sends the authorization data to the third-party application.
In one embodiment, the authorization data generation module further comprises:
a setting request sending unit, configured to set a request to a target device to adjust a current authorization state of the target device;
and the state information receiving unit is used for receiving the state information returned by the target equipment.
It can be understood that the apparatus provided in the embodiments of the present disclosure corresponds to the method described above, and specific contents may refer to the contents of each embodiment of the method, which are not described herein again.
FIG. 13 is a block diagram illustrating an electronic device in accordance with an example embodiment. For example, the electronic device 1300 may be a smartphone, a computer, a digital broadcast terminal, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 13, electronic device 1300 may include one or more of the following components: a processing component 1302, a memory 1304, a power component 1306, a multimedia component 1308, an audio component 1310, an input/output (I/O) interface 1312, a sensor component 1314, a communication component 1316, and an image acquisition component 1318.
The processing component 1302 generally controls the overall operation of the electronic device 1300, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 1302 may include one or more processors 1320 to execute computer programs. Further, processing component 1302 can include one or more modules that facilitate interaction between processing component 1302 and other components. For example, the processing component 1302 may include a multimedia module to facilitate interaction between the multimedia component 1308 and the processing component 1302.
The memory 1304 is configured to store various types of data to support operation at the electronic device 1300. Examples of such data include computer programs, contact data, phonebook data, messages, pictures, videos, etc. for any application or method operating on the electronic device 1300. The memory 1304 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power supply component 1306 provides power to the various components of the electronic device 1300. Power components 1306 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for electronic device 1300. The power supply component 1306 may include a power chip, and the controller may communicate with the power chip to control the power chip to turn the switching device on or off to allow the battery to supply power or not supply power to the motherboard circuitry.
The multimedia component 1308 includes a screen between the electronic device 1300 and the target object that provides an output interface. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a target object. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation.
The audio component 1310 is configured to output and/or input audio signals. For example, the audio component 1310 includes a Microphone (MIC) configured to receive external audio signals when the electronic device 1300 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 1304 or transmitted via the communication component 1316. In some embodiments, the audio component 1310 also includes a speaker for outputting audio signals.
The I/O interface 1312 provides an interface between the processing component 1302 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc.
The sensor assembly 1314 includes one or more sensors for providing various aspects of state assessment for the electronic device 1300. For example, the sensor assembly 1314 may detect an open/closed state of the electronic device 1300, the relative positioning of components, such as a display and keypad of the electronic device 1300, the sensor assembly 1314 may also detect a change in the position of the electronic device 1300 or one of the components, the presence or absence of a target object in contact with the electronic device 1300, orientation or acceleration/deceleration of the electronic device 1300, and a change in the temperature of the electronic device 1300. In this example, the sensor assembly 1314 may include a magnetic sensor, a gyroscope, and a magnetic field sensor, wherein the magnetic field sensor includes at least one of: hall sensor, thin film magneto-resistance sensor, magnetic liquid acceleration sensor.
The communication component 1316 is configured to facilitate communications between the electronic device 1300 and other devices in a wired or wireless manner. The electronic device 1300 may access a wireless network based on a communication standard, such as WiFi, 2G, 3G, 4G, 5G, or a combination thereof. In an exemplary embodiment, the communication component 1316 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communications component 1316 also includes a Near Field Communications (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an example embodiment, the electronic device 1300 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors, or other electronic components.
In an exemplary embodiment, a non-transitory readable storage medium is also provided that includes an executable computer program, such as the memory 1304 that includes instructions, that are executable by the processor. The readable storage medium may be, among others, ROM, Random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, and the like.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This disclosure is intended to cover any variations, uses, or adaptations following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice in the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (28)

1. An apparatus control method, applied to a target apparatus, comprising:
acquiring a control request sent by a third-party application, wherein the control request comprises authorization data sent to the third-party application by a main control device;
verifying the authorization data to obtain a verification result;
determining whether to respond to a control request of the third-party application according to the verification result;
wherein, the verifying the authorization data to obtain a verification result includes:
acquiring the current authorization state of the target equipment; wherein the current authorization status comprises an authorization status or an unauthorized status; the current authorization state is adjusted according to a received setting request, and the setting request is sent by the main control equipment under the condition that the triggering operation representing the authorization to the third party application is detected and the unique identification code of the target equipment is obtained;
when the current authorization state is the authorization state, verifying the authorization data to obtain a verification result;
and when the current authorization state is an unauthorized state, ignoring the control request.
2. The method of claim 1, wherein verifying the authorization data results in a verification result, comprising:
acquiring the current authorization state of the target equipment; the current authorization state comprises an authorization state or an unauthorized state;
when the current authorization state is the authorization state, comparing the length of the authorization data with a preset length;
when the length of the authorization data is a preset length, comparing the equipment identification in the authorization data with the unique identification code of the target equipment;
and when the equipment identification is matched with the unique identification code, obtaining a verification result which shows that the authorization data passes the verification.
3. The method of claim 2, wherein after the device identification and the unique identification code match, the method further comprises:
obtaining an authorization type in the authorization data; the authorization type comprises a periodic type;
when the authorization type is a periodic type, acquiring the current time of the target equipment and the starting time and the ending time in the authorization data;
judging whether the current time is between the starting time and the ending time;
when the current time is between the starting time and the ending time, obtaining a verification result which indicates that the authorization data passes the verification; otherwise, obtaining a verification result indicating that the authorization data is not verified.
4. The method of claim 3, wherein the authorization type further comprises a one-time type, and wherein after obtaining the authorization type in the authorization data, the method further comprises:
and when the authorization type is a disposable type, adjusting the authorization state to be an unauthorized state and obtaining a verification result indicating that the authorization data passes the verification.
5. The method of claim 2, wherein verifying the authorization data results in a verification result, further comprising:
when the current authorization state is an unauthorized state, or the length of the authorization data is not equal to a preset length, or when the device identification in the authorization data is not matched with the unique identification code, a verification result indicating that the authorization data is not verified is obtained.
6. The method of claim 1, wherein determining whether to respond to the control request of the third-party application according to the verification result comprises:
and when the verification result shows that the authorization data passes the verification, updating the current authorization state of the target equipment and responding to the control request.
7. The method of claim 1, further comprising:
when detecting that the master control equipment is in a connection state, acquiring a state synchronization request sent by the master control equipment;
and synchronizing the current authorization state of the target equipment to the main control equipment.
8. The method of claim 1, further comprising:
acquiring a query request sent by the master control device, wherein the query request is used for acquiring a unique identification code of the target device;
and sending the unique identification code of the target equipment to the main control equipment so that the main control equipment generates authorization data according to the unique identification code and sends the authorization data to the third-party application.
9. A device control method is applied to a master control device, and comprises the following steps:
setting a request to a target device to adjust a current authorization status of the target device; the current authorization state comprises an authorization state or an unauthorized state, the target device ignores the control request of the third-party application when the current authorization state is the unauthorized state, and verifies authorization data contained in the control request sent by the third-party application when the current authorization state is the authorization state to obtain a verification result;
displaying an authorization type when a trigger operation representing authorization to a third-party application is detected; the authorization type comprises a one-time type and a periodic type; the periodicity type comprises a time length of each period;
when the trigger operation representing the selection of the authorization type is detected, sending a query request to target equipment, wherein the query request is used for acquiring a unique identification code of the target equipment;
after the unique identification code is obtained, authorization data with a preset length are generated according to the unique identification code and the authorization type;
sending the authorization data to third equipment provided with third-party application, so that the third equipment controls the target equipment based on the authorization data under the condition that the current authorization state of the target equipment is an authorization state;
wherein the third device controlling the target device based on the authorization data if the current authorization status of the target device is an authorization status comprises:
and sending a control request including the authorization data to target equipment so that the target equipment checks the authorization data to obtain a check result, and determining whether to respond to the control request of the third-party application according to the check result.
10. The method of claim 9, wherein generating the authorization data with a preset length according to the unique identification code and the authorization type comprises:
when the authorization type is a periodic type, acquiring the current time and the ending time;
and generating authorization data with preset length according to the current time, the ending time, the periodicity type and the unique identification code.
11. The method of claim 10, wherein obtaining the authorization type further comprises a one-time type, and wherein generating the authorization data with the preset length according to the unique identification code and the authorization type comprises:
and generating authorization data with a preset length according to the unique identification code and the disposable type.
12. The method of claim 9, wherein after transmitting the authorization data to a third device having a third party application installed, the method further comprises:
when detecting that the target equipment is in a connection state, sending a state synchronization request to the target equipment so as to enable the target equipment to be in a synchronous current authorization state.
13. The method of claim 9, wherein after obtaining the unique identification code, the method further comprises:
and receiving the state information returned by the target equipment.
14. An apparatus control device, applied to a target apparatus, comprising:
the control request acquisition module is used for acquiring a control request sent by a third-party application, wherein the control request comprises authorization data sent to the third-party application by a main control device;
the authorized data checking module is used for checking the authorized data to obtain a checking result;
the control request response module is used for determining whether to respond to the control request of the third-party application according to the verification result;
the authorization data checking module is used for acquiring the current authorization state of the target equipment; wherein the current authorization status comprises an authorization status or an unauthorized status; the current authorization state is adjusted according to a received setting request, and the setting request is sent by the main control equipment under the condition that the triggering operation representing the authorization to the third party application is detected and the unique identification code of the target equipment is obtained; when the current authorization state is the authorization state, verifying the authorization data to obtain a verification result; and when the current authorization state is an unauthorized state, ignoring the control request.
15. The apparatus of claim 14, wherein the authorization data checking module comprises:
a current state obtaining unit, configured to obtain a current authorization state of a target device; the current authorization status comprises an authorization status or an unauthorized status;
a data length obtaining unit, configured to compare the length of the authorization data with a preset length when the current authorization status is an authorization status;
the device identifier comparison unit is used for comparing the device identifier in the authorization data with the unique identification code of the target device when the length of the authorization data is a preset length;
and the verification result acquisition unit is used for acquiring a verification result which shows that the authorization data passes the verification when the equipment identification is matched with the unique identification code.
16. The apparatus of claim 15, wherein the authorization data verification module further comprises:
the authorization type acquisition unit is used for acquiring the authorization type in the authorization data; the authorization type comprises a periodic type;
a current time obtaining unit, configured to obtain a current time of a target device and a start time and an end time in the authorization data when the authorization type is a periodic type;
a current time judging unit, configured to judge whether the current time is between the start time and the end time;
a verification result obtaining unit, configured to obtain a verification result indicating that the authorization data passes verification when the current time is between the start time and the end time; otherwise, obtaining a verification result indicating that the authorization data is not verified.
17. The apparatus according to claim 16, wherein the authorization type further includes a one-time type, and the check result obtaining unit is further configured to adjust the authorization status to an unauthorized status and obtain a check result indicating that the authorization data passes the check when the authorization type is the one-time type.
18. The apparatus according to claim 15, wherein the authorization data checking module is further configured to obtain a check result indicating that the authorization data is not checked when the current authorization status is an unauthorized status, or the length of the authorization data is not equal to a preset length, or when the device identifier in the authorization data does not match the unique identifier.
19. The apparatus according to claim 14, wherein the control request responding module is configured to update the current authorization status of the target device and respond to the control request when the verification result indicates that the authorization data passes the verification.
20. The apparatus of claim 14, further comprising:
the synchronization request acquisition module is used for acquiring a state synchronization request sent by the main control equipment when detecting that the main control equipment is in a connection state;
and the authorization state synchronization module is used for synchronizing the current authorization state of the target equipment to the master control equipment.
21. The apparatus of claim 14, further comprising:
the query request acquisition module is used for acquiring a query request sent by the master control equipment, wherein the query request is used for acquiring the unique identification code of the target equipment;
and the identification code sending module is used for sending the unique identification code of the target equipment to the main control equipment so that the main control equipment generates authorization data according to the unique identification code and sends the authorization data to the third-party application.
22. An apparatus control device, applied to a master control apparatus, comprising:
a setting request sending unit, configured to set a request to a target device to adjust a current authorization state of the target device; the current authorization state comprises an authorization state or an unauthorized state, and the target device ignores the control request of the third-party application when the current authorization state is the unauthorized state;
an authorization type display module for displaying an authorization type when a trigger operation indicating authorization to a third party application is detected; the authorization type comprises a one-time type and a periodic type; the periodicity type comprises a time length of each period;
the query request sending module is used for sending a query request to target equipment after detecting the trigger operation which indicates that the authorization type is selected, wherein the query request is used for acquiring the unique identification code of the target equipment;
the authorization data generation module is used for generating authorization data with a preset length according to the unique identification code and the authorization type after the unique identification code is obtained;
the authorization data sending module is used for sending the authorization data to third equipment provided with third-party application so as to enable the third equipment to control the target equipment based on the authorization data under the condition that the current authorization state of the target equipment is the authorization state; wherein the third device controlling the target device based on the authorization data if the current authorization status of the target device is an authorization status comprises: and sending a control request including the authorization data to target equipment so that the target equipment checks the authorization data to obtain a check result, and determining whether to respond to the control request of the third-party application according to the check result.
23. The apparatus of claim 22, wherein the authorization data generation module comprises:
the time acquisition unit is used for acquiring the current time and the ending time when the authorization type is a periodic type;
and the data generation unit is used for generating authorization data with preset length according to the current time, the ending time, the periodicity type and the unique identification code.
24. The apparatus according to claim 23, wherein the acquisition authorization type further includes a one-time type, and the data generating unit is further configured to generate authorization data with a preset length according to the unique identifier and the one-time type.
25. The apparatus of claim 22, further comprising:
and the authorization state synchronization module is used for sending a state synchronization request to the target equipment when detecting that the target equipment is in a connection state, so that the target equipment is in a synchronous current authorization state.
26. The apparatus of claim 22, wherein the authorization data generation module further comprises:
and the state information receiving unit is used for receiving the state information returned by the target equipment.
27. An electronic device, comprising:
a processor;
a memory for storing a computer program executable by the processor;
wherein the processor is configured to execute the computer program in the memory to implement the steps of the method according to any one of claims 1 to 13.
28. A computer-readable storage medium, in which an executable computer program is stored which, when executed by a processor, is capable of carrying out the steps of a method according to any one of claims 1 to 13.
CN202011349995.4A 2020-11-26 2020-11-26 Device control method and apparatus, electronic device, and storage medium Active CN112491670B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011349995.4A CN112491670B (en) 2020-11-26 2020-11-26 Device control method and apparatus, electronic device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011349995.4A CN112491670B (en) 2020-11-26 2020-11-26 Device control method and apparatus, electronic device, and storage medium

Publications (2)

Publication Number Publication Date
CN112491670A CN112491670A (en) 2021-03-12
CN112491670B true CN112491670B (en) 2022-06-24

Family

ID=74935208

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011349995.4A Active CN112491670B (en) 2020-11-26 2020-11-26 Device control method and apparatus, electronic device, and storage medium

Country Status (1)

Country Link
CN (1) CN112491670B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113434004A (en) * 2021-06-17 2021-09-24 胡成余 Power supply remote control system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104243250A (en) * 2014-08-18 2014-12-24 小米科技有限责任公司 Access authorization method, device and equipment based on intelligent housing system
CN105654580A (en) * 2015-07-28 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Access control method and system, electronic lock, and management and visitor terminal
CN107517208A (en) * 2017-08-22 2017-12-26 努比亚技术有限公司 Apparatus control method, device and computer-readable recording medium
CN111815812A (en) * 2020-06-22 2020-10-23 北京智辉空间科技有限责任公司 Third-party unlocking control method and system for electronic lock

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104243250A (en) * 2014-08-18 2014-12-24 小米科技有限责任公司 Access authorization method, device and equipment based on intelligent housing system
CN105654580A (en) * 2015-07-28 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Access control method and system, electronic lock, and management and visitor terminal
CN107517208A (en) * 2017-08-22 2017-12-26 努比亚技术有限公司 Apparatus control method, device and computer-readable recording medium
CN111815812A (en) * 2020-06-22 2020-10-23 北京智辉空间科技有限责任公司 Third-party unlocking control method and system for electronic lock

Also Published As

Publication number Publication date
CN112491670A (en) 2021-03-12

Similar Documents

Publication Publication Date Title
EP3657370B1 (en) Methods and devices for authenticating smart card
EP3073708B1 (en) A method and a terminal for controlling a smart home device
EP3188414B1 (en) Method and apparatus for controlling smart device
US11485320B2 (en) Method and apparatus for vehicle function control, and storage medium
CN105847243B (en) Method and device for accessing intelligent camera
CN107819572B (en) Command transmission method and device and electronic equipment
CN109219036B (en) Method and device for unbinding equipment and electronic equipment
CN108811179B (en) Wireless network connection method, device and storage medium
US20170094522A1 (en) Methods for controlling smart device
CN110400405B (en) Method, device and medium for controlling access control
CN106097494A (en) The method for unlocking of smart lock and device
CN111199039B (en) Application security verification method and device and terminal equipment
WO2016011739A1 (en) Method, device, and system for anti-counterfeiting verification
CN106126986B (en) Unlocking processing method and device for locked data partition
CN105450662A (en) Encryption method and device
CN112491670B (en) Device control method and apparatus, electronic device, and storage medium
CN107145771B (en) Application program unlocking method and device and terminal
KR101763140B1 (en) Authentification Method by User Terminal Connecting Access Controller, Software therefor, and Program Distributing Server Storing the Software
CN113055169B (en) Data encryption method and device, electronic equipment and storage medium
CN107911380B (en) Identity verification method and device
CN106485151B (en) Method and device for controlling flashing
CN112651012B (en) Information processing method and device
CN112351131B (en) Control method and device of electronic equipment, electronic equipment and storage medium
CN104243159A (en) Verification method, server and terminal for service operation
CN114386008A (en) Information processing method and device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant