CN114500617B - Internet equipment control method and device, storage medium and electronic equipment - Google Patents

Internet equipment control method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN114500617B
CN114500617B CN202111603006.4A CN202111603006A CN114500617B CN 114500617 B CN114500617 B CN 114500617B CN 202111603006 A CN202111603006 A CN 202111603006A CN 114500617 B CN114500617 B CN 114500617B
Authority
CN
China
Prior art keywords
target
server
equipment
user
authorization information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111603006.4A
Other languages
Chinese (zh)
Other versions
CN114500617A (en
Inventor
张亚庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao Haier Technology Co Ltd
Haier Smart Home Co Ltd
Original Assignee
Qingdao Haier Technology Co Ltd
Haier Smart Home Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao Haier Technology Co Ltd, Haier Smart Home Co Ltd filed Critical Qingdao Haier Technology Co Ltd
Priority to CN202111603006.4A priority Critical patent/CN114500617B/en
Publication of CN114500617A publication Critical patent/CN114500617A/en
Application granted granted Critical
Publication of CN114500617B publication Critical patent/CN114500617B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Automation & Control Theory (AREA)
  • Telephonic Communication Services (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses an Internet equipment control method and device, a storage medium and electronic equipment. Wherein the method comprises the following steps: acquiring user authorization information of a target user, wherein the target user is a user account accessing a target server, and the user authorization information is used for indicating the target user to allow a first server to control internet equipment associated with the target user in the target server; acquiring equipment authorization information of a target server to a first server, wherein the equipment authorization information is used for indicating the equipment type of the Internet equipment which the target server allows the first server to control; and under the condition that the equipment type of the target equipment is the equipment type indicated by the equipment authorization information, the control target equipment receives a control instruction of the first server, wherein the target equipment is the internet equipment associated with the target user in the target server. The invention solves the technical problem that own internet equipment cannot be managed and controlled through the third-party cloud platform.

Description

Internet equipment control method and device, storage medium and electronic equipment
Technical Field
The present invention relates to the field of communications, and in particular, to an internet device control method and apparatus, a storage medium, and an electronic device.
Background
With the development of the internet of things, most intelligent devices are configured with a networking module to access the internet. Each manufacturer developed a cloud for managing and controlling intelligent devices.
However, the cloud end of each manufacturer can only be used for managing and controlling the intelligent devices of the manufacturer, and the intelligent devices cannot be managed and controlled through the third-party cloud end. If intelligent equipment management of different factories is required, equipment management control is required to be performed by logging in cloud ends corresponding to the factories respectively.
In view of the above problems, no effective solution has been proposed at present.
Disclosure of Invention
The embodiment of the invention provides an internet equipment control method and device, a storage medium and electronic equipment, which at least solve the technical problem that own internet equipment cannot be managed and controlled through a third-party cloud platform.
According to an aspect of an embodiment of the present invention, there is provided an internet device control method, including: obtaining user authorization information of a target user, wherein the target user is a user account accessing a target server, and the user authorization information is used for indicating the target user to allow a first server to control internet equipment associated with the target user in the target server; acquiring equipment authorization information of the target server to the first server, wherein the equipment authorization information is used for indicating the equipment type of the Internet equipment which the target server allows the first server to control; and controlling the target equipment to receive the control instruction of the first server under the condition that the equipment type of the target equipment is the equipment type indicated by the equipment authorization information, wherein the target equipment is the internet equipment associated with the target user in the target server.
According to another aspect of the embodiment of the present invention, there is also provided an internet device control apparatus, including: the first acquisition unit is used for acquiring user authorization information of a target user, wherein the target user is a user account accessing to a target server, and the user authorization information is used for indicating the target user to allow the first server to control internet equipment associated with the target user in the target server; a second obtaining unit, configured to obtain device authorization information of the target server for the first server, where the device authorization information is used to indicate a device type of an internet device that the target server allows the first server to control; and the control unit is used for controlling the target equipment to receive the control instruction of the first server under the condition that the equipment type of the target equipment is the equipment type indicated by the equipment authorization information, wherein the target equipment is the internet equipment associated with the target user in the target server.
According to still another aspect of the embodiments of the present invention, there is also provided a computer-readable storage medium having a computer program stored therein, wherein the computer program is configured to execute the above-described internet device control method when run.
According to still another aspect of the embodiments of the present invention, there is also provided an electronic device including a memory in which a computer program is stored, and a processor configured to execute the above-described internet device control method by the computer program.
In the embodiment of the invention, the user authorization information of the target user is acquired, the device authorization information of the target server for the first server is acquired, and under the condition that the internet device associated with the target user in the target server belongs to the device type authorized by the target server for the first server, the first server is allowed to carry out the management control of the target device through the control instruction, the first server is carried out through the user account associated with the internet device in the target server, namely the user authorization of the third party server, and the device authorization of the device type is carried out on the first server through the target server, and under the condition that the target device associated with the target user in the target server belongs to the authorized device type, the first server can carry out the management control of the target device in the target server, thereby achieving the aim of the management control of the target device in the target server through the third party cloud platform, and further solving the technical problem that the own internet device cannot be managed and controlled through the third party cloud platform.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. In the drawings:
FIG. 1 is a schematic illustration of an application environment of an alternative Internet appliance control method according to an embodiment of the application;
FIG. 2 is a flow chart of an alternative method of controlling Internet devices according to an embodiment of the application;
FIG. 3 is a flow chart of an alternative method of controlling Internet devices according to an embodiment of the application;
FIG. 4 is a flow chart of an alternative method of controlling an Internet appliance according to an embodiment of the application;
FIG. 5 is a flow chart of an alternative method of controlling an Internet appliance according to an embodiment of the present application;
FIG. 6 is a flow chart of an alternative method of controlling an Internet appliance according to an embodiment of the present application;
FIG. 7 is a schematic diagram of an alternative Internet appliance control device according to an embodiment of the present application;
fig. 8 is a schematic structural view of an alternative electronic device according to an embodiment of the present application.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
According to an aspect of the embodiment of the present invention, there is provided an internet device control method, which may alternatively be, but not limited to, applied to the environment shown in fig. 1. The target device 100 is an internet device associated with a target user in the target server 110, the target device 100 receives a management control instruction of the target server 110 through the network 120, and the target device 100 reports operation data through the network 120. The first server 130 is a third party server in parallel with the target server 110 and is not limited to data interaction via the network 120.
The first server 130 is not limited to realizing control of the target device 100 in the target server 110 by sequentially performing S102 to S106. And obtaining user authorization information. And acquiring user authorization information of a target user, wherein the target user is a user account accessing to a target server, and the user authorization information is used for indicating the target user to allow a first server to control internet equipment associated with the target user in the target server. And acquiring equipment authorization information. And acquiring device authorization information of the target server to the first server, wherein the device authorization information is used for indicating the device type of the Internet device which the target server allows the first server to control. And controlling the target device. And under the condition that the equipment type of the target equipment is the equipment type indicated by the equipment authorization information, the control target equipment receives the control instruction of the first server, and the target equipment is the internet equipment associated with the target user in the target server.
Optionally, in this embodiment, the target device may be an intelligent terminal device, and may include, but is not limited to, at least one of the following: a mobile phone (e.g., an Android mobile phone, iOS mobile phone, etc.), a notebook computer, a tablet computer, a palm computer, a MID (Mobile Internet Devices, mobile internet device), a PAD, a desktop computer, a smart home device, etc. The network may include, but is not limited to: a wired network, a wireless network, wherein the wired network comprises: local area networks, metropolitan area networks, and wide area networks, the wireless network comprising: bluetooth, WIFI, and other networks that enable wireless communications. The server may be a single server, a server cluster composed of a plurality of servers, or a cloud server. The above is merely an example, and is not limited in any way in the present embodiment.
As an alternative embodiment, as shown in fig. 2, the above-mentioned internet device control method includes:
s202, acquiring user authorization information of a target user, wherein the target user is a user account accessing a target server, and the user authorization information is used for indicating the target user to allow a first server to control internet equipment associated with the target user in the target server;
S204, obtaining equipment authorization information of the target server to the first server, wherein the equipment authorization information is used for indicating the equipment type of the Internet equipment which is allowed to be controlled by the first server by the target server;
s206, controlling the target equipment to receive a control instruction of the first server under the condition that the equipment type of the target equipment is the equipment type indicated by the equipment authorization information, wherein the target equipment is the internet equipment associated with the target user in the target server.
The above-mentioned internet device control method is not limited to management control that you can use on the internet of things device, and the internet of things device is not limited to include home devices, for example: television, air conditioner, sound box, humidifier, robot for sweeping floor, lighting equipment, etc. This is merely an example of an internet device and is not intended as limiting in any way.
The target device is internet equipment associated with a user account of a target user in the target server, and the user account is an account registered in the target server and is used for controlling the operation of the target device through the target server.
The first server is not limited to a third party server that operates independently of the target server, and is used for managing and controlling access to the internet device in the first server. In the case where the target server is a management server corresponding to the target vendor, the first server is not limited to be a shared server, or a server of another vendor.
In the above step S202, the user authorization information is authorization information for indicating that the target user is authorized for the third party server through the target server, and the authorization is not limited to including access authorization, inquiry authorization, control authorization, and the like. In the case that the user authorization information indicates that the target user is authorized for the first server as the third party server, the third party server may perform management control of the internet device associated with the user account through the network. And under the condition that the user authorization information indicates that the target user is authorized for the first server, the third server cannot perform management control of the Internet equipment associated with the user account through the network.
In the case that the first server manages and controls the target device through the network, the method is not limited to carrying the authorization information in the control instruction, and in the case that the authorization information passes verification, the target device executes the control operation corresponding to the control instruction, so as to realize the management control of the first server on the target device.
In the above step S204, the device authorization information is used to indicate the management control server of the target device-the authorization information of the target server for the first server. The authorization information of the target server for the first server is not limited to the first server performing the permission opening according to the device type. The device type authority opened for the first service server is not limited to be all or part of the device types in the target server. Under the condition that the device type authorized by the target server for the first server is part of the device types, the first server can only manage and control the Internet devices belonging to the authorized device types in the target server, and can not manage and control the Internet devices not belonging to the authorized device types in the target server.
And under the condition that the equipment type authorized by the target server for the first server is part of equipment types and the first server acquires the user authorization of the target user, the first server can only manage and control the target Internet equipment belonging to the equipment type authorized by the target server in the Internet equipment associated with the target user. For non-target internet devices which do not belong to the device type authorized by the target server in the internet devices associated with the target user, the first server has no authority to manage and control.
In the embodiment of the application, the user authorization information of the target user is acquired, the device authorization information of the target server for the first server is acquired, and under the condition that the internet device associated with the target user in the target server belongs to the device type authorized by the target server for the first server, the first server is allowed to carry out the management control of the target device through the control instruction, the first server is carried out through the user account associated with the internet device in the target server, namely the user authorization of the third party server, and the device authorization of the device type is carried out on the first server through the target server, and under the condition that the target device associated with the target user in the target server belongs to the authorized device type, the first server can carry out the management control of the target device in the target server, thereby achieving the aim of the management control of the target device in the target server through the third party cloud platform, and further solving the technical problem that the own internet device cannot be managed and controlled through the third party cloud platform.
As an optional implementation manner, the acquiring the user authorization information of the target user includes:
s1, acquiring service authorization information of a user account in a target server to a first server;
s2, searching user authorization information corresponding to the target user from the service authorization information;
s3, under the condition that the user authorization information is found, determining to acquire the user authorization information of the target user.
Optionally, the user authorization information of the target user is not limited to obtaining the service authorization information of the target user for at least one third party server from the user center, the target user can respectively perform user authorization on different third party servers through the user account, and the user authorization information of the target user for at least one third party server is recorded in the service authorization information.
Optionally, the user authorization of the target user for different third party servers is not limited to the same or different, e.g., the target user authorizes all third party servers accessing the target server, or the target user authorizes only part of the third party servers accessing the target server, or the target user does not authorize any third party servers accessing the target server.
Optionally, the user accounts registered in the target server independently perform user authorization of the third party server, and are not affected by each other. The target server may also perform user permission configuration on the registered user accounts in a unified manner, for example, open the user permissions of the first server for all the user accounts.
Alternatively, the user authorization information is not limited to be stored and updated according to the third party server, and the user account in the target server and the user authorization information of the corresponding third party server are stored in the service authorization information. Taking the first server as an example, when the user account authorizes the first server, the account identifier of the user account is recorded in service authorization information corresponding to the first server, so that when the account identifier of the target user is found in the service authorization information, the target user is determined to be authorized by the first server, and the user authorization information of the target user for the first server is obtained.
In the embodiment of the application, whether the target user authorizes the first server is determined by searching the user authorization information of the first server by the user account in the target server, and the first server serving as the third party server can perform management control of the internet equipment associated with the target user in the target server under the condition that the first server obtains the authorization of the target user.
As an optional implementation manner, before obtaining the user authorization information of the target user, the method further includes:
s1, when a target server acquires access authentication of a first server, receiving an authorization operation instruction of a target user when the target user accesses the target server;
s2, determining authorization information of the target user to the first server according to the authorization operation instruction of the target user;
and S3, adding the user authorization information into the service authorization information under the condition that the authorization operation instruction indicates the target user to authorize the first server.
Optionally, before the first server obtains the user authorization of the user account in the target server, the first server initiates an access request for requesting management control of the internet device in the target server. In the event that the target server determines to be the first server access control authority, an access authentication is issued for the first server. Under the condition that the first server is provided with access authentication of the target server, when the target user accesses the target server by using the user account, the target server pushes a user authorization page of the first server to the user account so as to receive an authorization operation instruction of the target user. And determining whether the target user grants the management control authority of the Internet equipment for the first server through the authorization operation instruction.
The target user accessing the target server using the user account is not limited to logging in on the target client or web page corresponding to the target server using the user account, so as to realize accessing the target server using the user account. And under the condition that the target user grants the user authority to the first server through the authority operation instruction, synchronizing the user authority of the target user to the first server into the service authority information of the first server.
As an optional implementation manner, the obtaining the device authorization information of the target server to the first server includes: and acquiring a device list configured by the target server for the first server, wherein the device list records the device types which the target server allows the first server to control and the device model included by each device type.
Optionally, in the case that the target server allows the first server to manage and control the internet device in the target server, a device list is configured for the first server, and a device type of the internet device that the target server allows the first server to manage and control and a device model corresponding to the device type are recorded in the device list.
The device type is not limited to the classification of internet devices, for example, the classification of air-conditioning, television, washing machine, etc. The device type is only for example and is not intended as a limitation of the device type. The device model is not limited to a specific authorized model for the device type, such as the device model in each device type.
In the embodiment of the application, under the condition that the target server allows the first server to manage and control the Internet equipment in the target server, the equipment list is configured for the first server and used for indicating the equipment type and the equipment model which allow the first server to manage and control, so that the flexibility of managing and controlling own equipment for the third-party server is realized.
As an optional implementation manner, after obtaining the device authorization information of the target server to the first server, the method further includes:
s1, acquiring the equipment model of target equipment;
s2, searching the equipment model of the target equipment in the equipment list;
and S3, under the condition that the equipment model of the target equipment is found out from the equipment list, determining that the equipment type of the target equipment is the equipment type indicated by the equipment authorization information.
In the case where the device authorization information of the target server for the first server is determined, a determination of the associated internet device is made for each user account of the target server that is authorized for the first server. And when the equipment model is in the equipment list corresponding to the first server, determining that the internet equipment is the target equipment which can be managed and controlled by the first server. And when the device model is not in the device list, determining that the internet device is a non-target device which is not authorized to perform management control for the first server.
When the management control of the target device is performed by the first application corresponding to the first server, the method is not limited to displaying only the target device of which the first server has the management control authority, and hiding the non-target device of which the first server does not have the management control authority.
And under the condition that the user account in the target server is authorized for the first server, determining whether the Internet equipment can be managed and controlled by the first server according to the equipment model of the Internet equipment associated with the user account.
As an optional implementation manner, after the control target device receives the control instruction of the first server, the method further includes:
s1, under the condition that a control instruction is a query instruction, querying equipment operation parameters of target equipment;
s2, returning the operation parameters of the equipment to the first server.
Alternatively, the query instruction is not limited to device operating parameters for querying the target device, and the device operating parameters are not limited to include device operating status and device operating data. And feeding back the operation parameters to the first server under the condition that the first server requests to inquire the operation parameters of the target device.
As an optional implementation manner, after the control target device receives the control instruction of the first server, the method further includes:
S1, controlling target equipment to execute target operation under the condition that a control instruction is a control execution instruction;
s2, determining a control result obtained by the target equipment executing the target operation;
and S3, returning the control result to the first server.
The control execution instruction is not limited to control the target device to execute the target operation, and the target operation is not limited to the operation state adjustment, the operation mode adjustment, and the like of the target device. The operation state adjustment is not limited to on, standby, stop, and the like, and the operation mode adjustment is not limited to switching of the operation data of the target device, for example, the air conditioning device is adjusted from the cooling mode to the dehumidification mode, the cooling temperature is adjusted from 27 degrees to 26 degrees, and the like. And in the case that the first server requests the control target device to execute the operation, feeding back an operation result of executing the operation to the first server.
Authorization of the first server with the target server and the target user is not limited to that shown in fig. 3. The target application 301 is an application corresponding to the target server 110, and the user logs in a user account on the target application 301 to realize management control on the internet device associated with the target user. In the application interconnection, a user center 310 and a device center 320 are set, the user center 310 is used for user account management, and the device center 320 is used for internet device management. A message platform 330 is provided in the device interconnect for synchronizing management control messages of the internet devices. The first server 130 initiates an authorization request to the target server 110, and the target server 110 issues an access authentication to the first server 130 in the case that it is determined that the management control authority is to be granted to the first server 130, specifically, but not limited to, indicating the system ID and the system Key of the first server, and synchronizes the system ID and the system Key of the first server to the user center 310. In the case that the target server 110 determines that the first server 130 is granted the management control authority, the device list configured for the first server 130 is used to indicate the specific device type and device model authorized for the first server 110, the device list and the system ID corresponding to the first server 110 are synchronized to the message platform 330, and the message platform 330 synchronizes the device list to the device center 320.
In the case where the target server 110 opens the device management control authority in the device list for the first server 130, the target server 110 obtains the user authorization of the first server 130 for the user account logging into the target application 301 by pushing the authority page to the target application 301. The entitlement page is not limited to synchronizing the user authorization information to the user center 310 in the event that the H5 page determines authorization of the first server by the user account based on the authorization page.
The list of devices for which the first server obtains authorization of the target server is not limited to that shown in fig. 4. After acquiring the user permission of the user account for the first server, the first server 130 refreshes the device list, and the device center 320 acquires the user device from the permission system 410 in the device interconnection, where the user device is an internet device with which the user account is associated in the target server 110, when receiving the refresh command of the first server. In the case of acquiring the user device associated with the user account, the device center 320 acquires the device model of the user device through the database 420. The device center 320 filters the user devices using the system IDs to generate a list of user devices associated with the user IDs and the system IDs. The first server 130 caches the user equipment list in case it is received.
The situation/state query of the target device by the user via the first server is not limited to that shown in fig. 5. The first application 501 is an application corresponding to the first server 130, and is configured to receive an operation management instruction of a user on the first server 130. The user initiates a device query instruction through the first application 501, the first server 130 initiates a query request to the device center 320, and the device center 320 checks a device list corresponding to the first server 130 to determine that the first server 130 currently has the device query authority when receiving the query request. After determining the device rights, the device center 320 obtains parameters indicating the condition/status of the device from the database 420, and returns the device parameters to the first server 130 and displays the device parameters in the first application 501, so as to enable the user to obtain the condition/status of the internet device running in the target server 110 through the first server 130.
The operation control of the target device by the user through the first server is not limited to that shown in fig. 6. The user initiates a device control operation through the first application 501, the first server 130 initiates a control request to the device center 320, and the device center 320 checks a device list corresponding to the first server 130 to determine that the first server 130 currently has the query authority of the device when receiving the control request. After determining the device authority, the device center 320 sends a control instruction to the device model 610 in the device interconnection, the device model is used for analyzing the control instruction, after analyzing the control instruction, the control instruction is converted through the M2M620, so as to avoid control failure caused by different device models used by the first server 130 and the target server 110, the M2M620 sends the converted control instruction to the target device 100, after executing an operation corresponding to the control instruction, the target device 100 obtains a control result, and the control result is fed back to the device center 320 through the M2M620 and the device model 610 in sequence, so that the control result is fed back to the first server 130 through the device center 320 and is displayed in the first application 501.
It should be noted that, for simplicity of description, the foregoing method embodiments are all described as a series of acts, but it should be understood by those skilled in the art that the present invention is not limited by the order of acts described, as some steps may be performed in other orders or concurrently in accordance with the present invention. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily required for the present invention.
According to another aspect of the embodiment of the present invention, there is also provided an internet device control apparatus for implementing the above-mentioned internet device control method. As shown in fig. 7, the apparatus includes:
a first obtaining unit 702, configured to obtain user authorization information of a target user, where the target user is a user account accessing a target server, and the user authorization information is used to instruct the target user to allow the first server to control an internet device associated with the target user in the target server;
a second obtaining unit 704, configured to obtain device authorization information of the target server for the first server, where the device authorization information is used to indicate a device type of the internet device that the target server allows the first server to control;
And the control unit 706 is configured to control the target device to receive a control instruction of the first server, where the target device is an internet device associated with the target user in the target server, where the device type of the target device is a device type indicated by the device authorization information.
Optionally, the first acquiring unit 702 includes:
the service module is used for acquiring service authorization information of a user account in the target server to the first server;
the searching module is used for searching the user authorization information corresponding to the target user from the service authorization information;
and the determining module is used for determining to acquire the user authorization information of the target user under the condition that the user authorization information is found.
Optionally, the above internet device control apparatus further includes an authorization unit, configured to receive, before acquiring the user authorization information of the target user, an authorization operation instruction of the target user when the target user accesses the target server in a case that the target server acquires the access authentication of the first server; determining authorization information of a target user to a first server according to an authorization operation instruction of the target user; in the case that the authorization operation instruction instructs the target user to authorize the first server, user authorization information is added to the service authorization information.
Optionally, the second obtaining unit 704 is further configured to obtain a device list configured by the target server for the first server, where a device type that the target server allows the first server to control and a device model included in each device type are recorded in the device list.
Optionally, the internet device control apparatus further includes a device unit, configured to obtain a device model of the target device after obtaining device authorization information of the target server to the first server; searching the equipment model of the target equipment in the equipment list; and under the condition that the device model of the target device is found out from the device list, determining that the device type of the target device is the device type indicated by the device authorization information.
Optionally, the above internet device control apparatus further includes a query unit, configured to query, after the control target device receives the control instruction of the first server, a device operation parameter of the target device if the control instruction is a query instruction; the device operating parameters are returned to the first server.
Optionally, the above internet device control apparatus further includes a control unit, configured to, after the control target device receives the control instruction of the first server, control the target device to perform the target operation if the control instruction is a control execution instruction; determining a control result obtained by target equipment executing target operation; and returning the control result to the first server.
In the embodiment of the application, the user authorization information of the target user is acquired, the device authorization information of the target server for the first server is acquired, and under the condition that the internet device associated with the target user in the target server belongs to the device type authorized by the target server for the first server, the first server is allowed to carry out the management control of the target device through the control instruction, the first server is carried out through the user account associated with the internet device in the target server, namely the user authorization of the third party server, and the device authorization of the device type is carried out on the first server through the target server, and under the condition that the target device associated with the target user in the target server belongs to the authorized device type, the first server can carry out the management control of the target device in the target server, thereby achieving the aim of the management control of the target device in the target server through the third party cloud platform, and further solving the technical problem that the own internet device cannot be managed and controlled through the third party cloud platform.
According to still another aspect of the embodiment of the present invention, there is also provided an electronic device for implementing the above-mentioned method for controlling an internet device, where the electronic device may be a terminal device or a server as shown in fig. 1. The present embodiment is described taking the electronic device as a server as an example. As shown in fig. 8, the electronic device comprises a memory 802 and a processor 804, the memory 802 having stored therein a computer program, the processor 804 being arranged to perform the steps of any of the method embodiments described above by means of the computer program.
Alternatively, in this embodiment, the electronic device may be located in at least one network device of a plurality of network devices of the computer network.
Alternatively, in the present embodiment, the above-described processor may be configured to execute the following steps by a computer program:
s1, acquiring user authorization information of a target user, wherein the target user is a user account accessing a target server, and the user authorization information is used for indicating the target user to allow a first server to control internet equipment associated with the target user in the target server;
s2, acquiring equipment authorization information of the target server to the first server, wherein the equipment authorization information is used for indicating the equipment type of the Internet equipment which is allowed to be controlled by the first server by the target server;
And S3, controlling the target equipment to receive a control instruction of the first server under the condition that the equipment type of the target equipment is the equipment type indicated by the equipment authorization information, wherein the target equipment is the internet equipment associated with the target user in the target server.
Alternatively, it will be understood by those skilled in the art that the structure shown in fig. 8 is only schematic, and the electronic device may also be a terminal device such as a smart phone (e.g. Android phone, IOS phone, etc.), a tablet computer, a palm computer, and a mobile internet device (Mobile Internet Devices, MID), a PAD, etc. Fig. 8 is not limited to the structure of the electronic device described above. For example, the electronic device may also include more or fewer components (e.g., network interfaces, etc.) than shown in FIG. 8, or have a different configuration than shown in FIG. 8.
The memory 802 may be used to store software programs and modules, such as program instructions/modules corresponding to the method and apparatus for controlling an internet device in the embodiment of the present invention, and the processor 804 executes the software programs and modules stored in the memory 802, thereby performing various functional applications and data processing, that is, implementing the method for controlling an internet device. Memory 802 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, memory 802 may further include memory remotely located relative to processor 804, which may be connected to the terminal via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof. The memory 802 may be used to store, but is not limited to, user authorization information, device authorization information, control instructions, and the like. As an example, as shown in fig. 8, the memory 802 may include, but is not limited to, the first acquiring unit 702, the second acquiring unit 704, and the control unit 706 in the internet device control apparatus. In addition, other module units in the above-mentioned internet device control apparatus may be included, but are not limited to, and are not described in detail in this example.
Optionally, the transmission device 806 is used to receive or transmit data via a network. Specific examples of the network described above may include wired networks and wireless networks. In one example, the transmission means 806 includes a network adapter (Network Interface Controller, NIC) that can connect to other network devices and routers via a network cable to communicate with the internet or a local area network. In one example, the transmission device 806 is a Radio Frequency (RF) module for communicating wirelessly with the internet.
In addition, the electronic device further includes: a display 808 for displaying the user authorization information, the device authorization information, and the like; and a connection bus 810 for connecting the respective module parts in the above-described electronic device.
In other embodiments, the terminal device or the server may be a node in a distributed system, where the distributed system may be a blockchain system, and the blockchain system may be a distributed system formed by connecting the plurality of nodes through a network communication. Among them, the nodes may form a Peer-To-Peer (P2P) network, and any type of computing device, such as a server, a terminal, etc., may become a node in the blockchain system by joining the Peer-To-Peer network.
According to one aspect of the present application, there is provided a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The computer instructions are read from the computer-readable storage medium by a processor of a computer device, and executed by the processor, cause the computer device to perform the methods provided in the various alternative implementations of the internet device control aspects described above. Wherein the computer program is arranged to perform the steps of any of the method embodiments described above when run.
Alternatively, in the present embodiment, the above-described computer-readable storage medium may be configured to store a computer program for executing the steps of:
s1, acquiring user authorization information of a target user, wherein the target user is a user account accessing a target server, and the user authorization information is used for indicating the target user to allow a first server to control internet equipment associated with the target user in the target server;
s2, acquiring equipment authorization information of the target server to the first server, wherein the equipment authorization information is used for indicating the equipment type of the Internet equipment which is allowed to be controlled by the first server by the target server;
And S3, controlling the target equipment to receive a control instruction of the first server under the condition that the equipment type of the target equipment is the equipment type indicated by the equipment authorization information, wherein the target equipment is the internet equipment associated with the target user in the target server.
Alternatively, in this embodiment, it will be understood by those skilled in the art that all or part of the steps in the methods of the above embodiments may be performed by a program for instructing a terminal device to execute the steps, where the program may be stored in a computer readable storage medium, and the storage medium may include: flash disk, read-Only Memory (ROM), random-access Memory (Random Access Memory, RAM), magnetic or optical disk, and the like.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
The integrated units in the above embodiments may be stored in the above-described computer-readable storage medium if implemented in the form of software functional units and sold or used as separate products. Based on such understanding, the technical solution of the present invention may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a storage medium, comprising several instructions for causing one or more computer devices (which may be personal computers, servers or network devices, etc.) to perform all or part of the steps of the method described in the embodiments of the present invention.
In the foregoing embodiments of the present application, the descriptions of the embodiments are emphasized, and for a portion of this disclosure that is not described in detail in this embodiment, reference is made to the related descriptions of other embodiments.
In several embodiments provided by the present application, it should be understood that the disclosed client may be implemented in other manners. The above-described embodiments of the apparatus are merely exemplary, and the division of the units, such as the division of the units, is merely a logical function division, and may be implemented in another manner, for example, multiple units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interfaces, units or modules, or may be in electrical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The foregoing is merely a preferred embodiment of the present invention and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present invention, which are intended to be comprehended within the scope of the present invention.

Claims (9)

1. An internet appliance control method, comprising:
obtaining user authorization information of a target user, wherein the target user is a user account accessing a target server, the user authorization information is used for indicating that the target user allows a first server to control internet equipment associated with the target user in the target server, and the obtaining the user authorization information of the target user comprises: acquiring service authorization information of a user account in the target server to the first server; searching the user authorization information corresponding to the target user from the service authorization information; under the condition that the user authorization information is found, determining to acquire the user authorization information of the target user;
Acquiring equipment authorization information of the target server to the first server, wherein the equipment authorization information is used for indicating the equipment type of the Internet equipment which is allowed to be controlled by the first server by the target server;
and controlling the target equipment to receive the control instruction of the first server under the condition that the equipment type of the target equipment is the equipment type indicated by the equipment authorization information, wherein the target equipment is the internet equipment associated with the target user in the target server.
2. The method of claim 1, further comprising, prior to obtaining the user authorization information for the target user:
receiving an authorization operation instruction of the target user when the target user accesses the target server under the condition that the target server acquires access authentication of the first server;
determining authorization information of the target user to the first server according to the authorization operation instruction of the target user;
and adding the user authorization information into the service authorization information in the condition that the authorization operation instruction indicates the target user to authorize the first server.
3. The method of claim 1, wherein the obtaining device authorization information for the first server by the target server comprises:
and acquiring a device list configured by the target server for the first server, wherein the device list records the device types which the target server allows the first server to control and the device model included by each device type.
4. The method of claim 3, further comprising, after obtaining the device authorization information of the target server for the first server:
acquiring the equipment model of the target equipment;
searching the equipment model of the target equipment in the equipment list;
and under the condition that the equipment model of the target equipment is found out from the equipment list, determining the equipment type of the target equipment as the equipment type indicated by the equipment authorization information.
5. The method of claim 1, further comprising, after controlling the target device to receive the control instruction of the first server:
inquiring the equipment operation parameters of the target equipment under the condition that the control instruction is an inquiry instruction;
And returning the equipment operation parameters to the first server.
6. The method of claim 1, further comprising, after controlling the target device to receive the control instruction of the first server:
controlling the target equipment to execute target operation under the condition that the control instruction is a control execution instruction;
determining a control result obtained by the target equipment executing the target operation;
and returning the control result to the first server.
7. An internet appliance control apparatus, comprising:
the first acquisition unit is used for acquiring user authorization information of a target user, wherein the target user is a user account accessing to a target server, the user authorization information is used for indicating that the target user allows a first server to control internet equipment associated with the target user in the target server, and the first acquisition unit comprises a service module used for acquiring service authorization information of the user account in the target server to the first server; the searching module is used for searching the user authorization information corresponding to the target user from the service authorization information; the determining module is used for determining to acquire the user authorization information of the target user under the condition that the user authorization information is found;
A second obtaining unit, configured to obtain device authorization information of the target server for the first server, where the device authorization information is used to indicate a device type of an internet device that the target server allows the first server to control;
and the control unit is used for controlling the target equipment to receive the control instruction of the first server under the condition that the equipment type of the target equipment is the equipment type indicated by the equipment authorization information, wherein the target equipment is the internet equipment associated with the target user in the target server.
8. A computer-readable storage medium, characterized in that the computer-readable storage medium comprises a stored program, wherein the program, when run, performs the method of any one of claims 1 to 6.
9. An electronic device comprising a memory and a processor, characterized in that the memory has stored therein a computer program, the processor being arranged to execute the method according to any of the claims 1 to 6 by means of the computer program.
CN202111603006.4A 2021-12-24 2021-12-24 Internet equipment control method and device, storage medium and electronic equipment Active CN114500617B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111603006.4A CN114500617B (en) 2021-12-24 2021-12-24 Internet equipment control method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111603006.4A CN114500617B (en) 2021-12-24 2021-12-24 Internet equipment control method and device, storage medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN114500617A CN114500617A (en) 2022-05-13
CN114500617B true CN114500617B (en) 2023-11-28

Family

ID=81496277

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111603006.4A Active CN114500617B (en) 2021-12-24 2021-12-24 Internet equipment control method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN114500617B (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104541261A (en) * 2012-06-22 2015-04-22 谷歌公司 Aggregating online activities
CN104836814A (en) * 2015-05-29 2015-08-12 北京奇虎科技有限公司 Cloud-end access control method of intelligent hardware and corresponding device
CN105684389A (en) * 2013-10-23 2016-06-15 高通股份有限公司 Peer based authentication
CN110505188A (en) * 2018-05-18 2019-11-26 华为技术有限公司 A kind of terminal authentication method, relevant device and Verification System
CN110972131A (en) * 2019-10-31 2020-04-07 阿里巴巴集团控股有限公司 Authorization and control method, device, system and storage medium
CN111885026A (en) * 2020-07-10 2020-11-03 海尔优家智能科技(北京)有限公司 Block chain-based interconnection and intercommunication method and device, storage medium and electronic device
CN112466303A (en) * 2020-11-25 2021-03-09 青岛海尔科技有限公司 Device discovery method, device, storage medium, and electronic apparatus
CN112463831A (en) * 2020-11-25 2021-03-09 青岛海尔科技有限公司 Equipment state query method and device, storage medium and electronic device
CN112492023A (en) * 2020-11-25 2021-03-12 青岛海尔科技有限公司 Device control method, device, storage medium, and electronic apparatus
CN112600856A (en) * 2020-12-28 2021-04-02 青岛海尔科技有限公司 Equipment authorization method and device, storage medium and electronic device
CN112637264A (en) * 2020-11-23 2021-04-09 北京百度网讯科技有限公司 Information interaction method and device, electronic equipment and storage medium
CN112738025A (en) * 2020-12-09 2021-04-30 青岛海尔科技有限公司 Device control method and apparatus, storage medium, and electronic apparatus
CN112738805A (en) * 2020-12-30 2021-04-30 青岛海尔科技有限公司 Device control method and apparatus, storage medium, and electronic device
CN113395193A (en) * 2021-05-27 2021-09-14 深圳Tcl新技术有限公司 Equipment control method and device, computer equipment and storage medium
CN113746633A (en) * 2021-08-05 2021-12-03 深圳Tcl新技术有限公司 Internet of things equipment binding method, device and system, cloud server and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10127400B2 (en) * 2016-09-26 2018-11-13 Bank Of America Corporation Control device for aggregation and distribution of machine-initiated resource distribution
US10250692B2 (en) * 2017-04-21 2019-04-02 Sony Corporation Voice user interface for pairing between devices
US11470085B2 (en) * 2020-06-16 2022-10-11 At&T Intellectual Property I, L.P. Service and security enhancement of communication services

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104541261A (en) * 2012-06-22 2015-04-22 谷歌公司 Aggregating online activities
CN105684389A (en) * 2013-10-23 2016-06-15 高通股份有限公司 Peer based authentication
CN104836814A (en) * 2015-05-29 2015-08-12 北京奇虎科技有限公司 Cloud-end access control method of intelligent hardware and corresponding device
CN110505188A (en) * 2018-05-18 2019-11-26 华为技术有限公司 A kind of terminal authentication method, relevant device and Verification System
CN110972131A (en) * 2019-10-31 2020-04-07 阿里巴巴集团控股有限公司 Authorization and control method, device, system and storage medium
CN111885026A (en) * 2020-07-10 2020-11-03 海尔优家智能科技(北京)有限公司 Block chain-based interconnection and intercommunication method and device, storage medium and electronic device
CN112637264A (en) * 2020-11-23 2021-04-09 北京百度网讯科技有限公司 Information interaction method and device, electronic equipment and storage medium
CN112466303A (en) * 2020-11-25 2021-03-09 青岛海尔科技有限公司 Device discovery method, device, storage medium, and electronic apparatus
CN112492023A (en) * 2020-11-25 2021-03-12 青岛海尔科技有限公司 Device control method, device, storage medium, and electronic apparatus
CN112463831A (en) * 2020-11-25 2021-03-09 青岛海尔科技有限公司 Equipment state query method and device, storage medium and electronic device
CN112738025A (en) * 2020-12-09 2021-04-30 青岛海尔科技有限公司 Device control method and apparatus, storage medium, and electronic apparatus
CN112600856A (en) * 2020-12-28 2021-04-02 青岛海尔科技有限公司 Equipment authorization method and device, storage medium and electronic device
CN112738805A (en) * 2020-12-30 2021-04-30 青岛海尔科技有限公司 Device control method and apparatus, storage medium, and electronic device
CN113395193A (en) * 2021-05-27 2021-09-14 深圳Tcl新技术有限公司 Equipment control method and device, computer equipment and storage medium
CN113746633A (en) * 2021-08-05 2021-12-03 深圳Tcl新技术有限公司 Internet of things equipment binding method, device and system, cloud server and storage medium

Also Published As

Publication number Publication date
CN114500617A (en) 2022-05-13

Similar Documents

Publication Publication Date Title
CN112738805B (en) Device control method and apparatus, storage medium, and electronic device
CN110463164B (en) System and method for resolving credentials for a device
US10637661B2 (en) System for user-friendly access control setup using a protected setup
CN107995215B (en) Control method and device of intelligent household equipment and cloud platform server
JP7474302B2 (en) Automatic service registration in a communications network - Patents.com
US9479504B2 (en) Method and apparatus for controlling access between home device and external server in home network system
CN104937895B (en) The method and apparatus for controlling access in a wireless communication system
KR101453155B1 (en) Method for Authorizing Access to Resource in M2M Communications
CN104348903A (en) Communication system for establishing P2P connections and the corresponding devices
CN108156176B (en) Device control method, cloud platform, system, storage medium and device
CN111885026B (en) Block chain-based interconnection and intercommunication method and device, storage medium and electronic device
WO2013141764A1 (en) Methods, device and social network manager for enabling interaction with another device
CN109983748A (en) The group command management of equipment group
CN112689316B (en) Binding method and device of intelligent equipment, storage medium and electronic device
CN103812672A (en) Method for discovering newly-added network element device, correlative device, and system
CN113596141B (en) Method and device for setting device control authority, computer device and storage medium
CN113612747A (en) Method and device for setting equipment control authority, computer equipment and storage medium
CN114500617B (en) Internet equipment control method and device, storage medium and electronic equipment
US10652201B1 (en) Cloud service registry
JP2023120287A (en) Scalable certificate management system architecture
US20230045914A1 (en) Method and apparatus for controlling device in internet of things, and gateway device and storage medium
CN112152827A (en) Management method and device of Internet of things equipment, gateway and readable storage medium
CN105071959A (en) Plug-and-play management method and system based on unified registration of power network devices
KR101117316B1 (en) Remote access service profile setting method and user authentication method for remote accessing UPNP devices
CN115622723A (en) Device access control method and device, electronic device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant