Method and apparatus for third party to control device

A technology for controlling equipment and intelligent equipment, applied in the direction of program control, computer control, comprehensive factory control, etc., can solve problems such as inconvenient operation, and achieve the effect of improving safety and usability

Inactive Publication Date: 2017-03-01
HAIER YOUJIA INTELLIGENT TECH BEIJING CO LTD
View PDF9 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem of inconvenient operation in the prior art, the present invention provides a method and device for controlling equipment by a third party

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for third party to control device
  • Method and apparatus for third party to control device
  • Method and apparatus for third party to control device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] The authorized user on the first terminal is an authorized user of the first smart device, and has control authority for at least one control content of the first smart device. The access user on the second terminal is not an authorized user of the first smart device, but needs to control the first smart device. For example, when the smart device is an access control system, the authorized user has control authority over the door opening control of the access control system, or at the same time also has control authority over the door closing control of the access control system. When the smart device is not an access control device, the authorized user has the control authority for multiple control contents of the smart device.

[0067] figure 1 It is a flowchart of a method for a third-party control device in an embodiment; the method for a third-party control device includes:

[0068] Step 101, the first terminal generates and records credential information for con...

Embodiment 2

[0094] image 3 It is the third-party control device method in the second embodiment, the execution subject of this method is a smart device, and this method includes:

[0095] Step 301, the smart device receives request information from the access terminal for the first control of the smart device by the access user;

[0096] Step 302, when it is judged that the request information contains credential information for controlling the smart device, parse out the identity of the authorized user from the request information, and send the request information to the terminal to which the authorized user belongs according to the identity of the authorized user and performing the first control after receiving confirmation information from the terminal to which the authorized user belongs.

[0097] The method further includes: after parsing out the identity of the authorized user, when judging according to the identity of the authorized user that the authorized user has the authority...

specific Embodiment 1

[0107] Such as Figure 5 As shown, the terminal belonging to user A who has the control authority to the access control system is the first terminal, and the terminal to which user B has no control authority to the access control system is the second terminal.

[0108] The first terminal sends a request for acquiring user information to the second terminal. A specific implementation may be that the first terminal dynamically generates an application (APP) in webpage format, and pushes its uniform resource locator (URL) to the second terminal in the form of real-time communication (IM). User B clicks on the URL to activate the application in webpage format. This application can obtain user B's user information (user ID and device ID, etc.), and the APP can establish a session with the application of the first terminal, and send user B's user information through this session information. This APP is also the window for user B to send subsequent messages.

[0109] The first te...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and apparatus for a third party to control a device. The method includes the following steps that: a first terminal generates credential information for controlling a first intelligent device according to the identity information of a visiting user, records the credential information, and transmits the credential information to a second terminal to which the visiting user belongs; and request information of the visiting user, for performing first control on the first intelligent device, is obtained from the second terminal or the first intelligent device, when it is judged that the request information carries the recorded credential information, instruction information used for instructing the first intelligent device to execute the first control is generated and is sent to the first intelligent device. According to the method and apparatus of the invention, an indirect authorization mode is adopted, a device with an intelligent device control authority is adopted as an agency, and therefore, the control of the behavior of the third-party visitor can be ensured constantly, the isolation of the visitor from an operating system can be benefitted, the security and feasibility of the system can be ensured. The method and apparatus are suitable for a variety of kinds of intelligent devices.

Description

technical field [0001] The present invention relates to a method for controlling equipment, in particular to a method and device for controlling equipment by a third party. Background technique [0002] With the development of the Internet of Things and smart home technology, various home automation scenarios emerge in an endless stream, and standards and technologies are also introduced. , In terms of application scenarios, remote control of home appliances, remote monitoring, security alarms, etc. have also become the focus of smart homes for various businesses. [0003] A typical application scenario is: A invites B to be a guest at home. When B arrives, A does not arrive due to other reasons, so A opens the access control system for B through the mobile terminal. In order to open the access control system when A has not arrived, in the prior art, after A obtains the arrival of B, he remotely opens the access control system through a mobile terminal. The application scen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G05B15/02G05B19/418
CPCG05B15/02G05B19/418G05B2219/2642Y02P90/02
Inventor 吕小强
Owner HAIER YOUJIA INTELLIGENT TECH BEIJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products