Disclosure of Invention
An exemplary embodiment of the present application provides a smart home device control method, a control device and a smart home device, so as to protect user privacy information.
According to an aspect of the exemplary embodiments, there is provided a smart home device control method, including:
receiving an authentication request sent by intelligent home equipment, wherein the authentication request comprises user information to be verified, and the user information is used for verifying the validity of the user identity;
verifying the user information to be verified according to locally stored user information;
and sending an authentication response to the intelligent home equipment, wherein the authentication response comprises a verification result of the user information to be verified, so that the intelligent home equipment performs corresponding processing operation according to the verification result.
In some implementations, the user information includes: at least one item of fingerprint information, voice print information and face information.
In some implementations, the authentication request includes information of the smart home device; the verifying the user information to be verified according to the locally stored user information comprises the following steps:
inquiring the corresponding relation between the intelligent household equipment and the user information type according to the information of the intelligent household equipment contained in the authentication request to obtain the user information type corresponding to the information of the intelligent household equipment;
acquiring locally stored user information of corresponding types according to the user information types;
and verifying the user information to be verified according to the locally stored user information of the corresponding type.
In some implementations, the information of the smart home device includes: at least one of the identification, address, type and model of the intelligent household equipment.
In some implementations, the authentication request includes type indication information of the user information to be verified; the verifying the user information to be verified according to the locally stored user information comprises the following steps: acquiring locally stored user information of corresponding type according to the type indication information of the user information to be verified contained in the authentication request; and verifying the user information to be verified according to the locally stored user information of the corresponding type.
In some implementations, the method further includes: and if the user information to be verified fails to be verified, generating and storing a verification failure record corresponding to the intelligent household equipment.
According to an aspect of an exemplary embodiment, there is provided a control apparatus including: a memory and a processor coupled with the memory, the processor configured to:
receiving an authentication request sent by intelligent home equipment, wherein the authentication request comprises user information to be verified, and the user information is used for verifying the validity of the user identity;
verifying the user information to be verified according to locally stored user information;
and sending an authentication response to the intelligent home equipment, wherein the authentication response comprises a verification result of the user information to be verified, so that the intelligent home equipment performs corresponding processing operation according to the verification result.
In some implementations, the authentication request includes information of the smart home device;
the processor is further configured to:
inquiring the corresponding relation between the intelligent household equipment and the user information type according to the information of the intelligent household equipment contained in the authentication request to obtain the user information type corresponding to the information of the intelligent household equipment;
acquiring locally stored user information of corresponding types according to the user information types;
and verifying the user information to be verified according to the locally stored user information of the corresponding type.
In some implementations, the authentication request includes type indication information of the user information to be verified; the processor is further configured to: acquiring locally stored user information of corresponding type according to the type indication information of the user information to be verified contained in the authentication request; and verifying the user information to be verified according to the locally stored user information of the corresponding type.
According to an aspect of the exemplary embodiments, there is provided a smart home device including: a memory and a processor coupled with the memory, the processor configured to:
responding to the operation of collecting user information, and sending an authentication request to control equipment, wherein the authentication request comprises user information to be verified, which is input by a user, and the user information is used for verifying the legality of the user identity;
receiving an authentication response sent by the control equipment according to the authentication request, wherein the authentication response comprises a verification result of the user information to be verified;
and performing corresponding processing operation according to the verification result.
In the above embodiment of the application, the smart home device does not need to store user information locally, when the smart home device needs to verify the user information input by the user, an authentication request is sent to a device (control device) for performing authentication uniformly, so that the device can verify the user information to be verified according to the locally stored user information, because the user information is privacy information generally, such as a fingerprint, and there is a large risk of disclosure if the user information is stored locally in the smart home device, and once the user privacy information is disclosed, a large security risk may be caused.
Detailed Description
To make the objects, technical solutions and advantages of the exemplary embodiments of the present application clearer, the technical solutions in the exemplary embodiments of the present application will be clearly and completely described below with reference to the drawings in the exemplary embodiments of the present application, and it is obvious that the described exemplary embodiments are only a part of the embodiments of the present application, but not all the embodiments.
All other embodiments, which can be derived by a person skilled in the art from the exemplary embodiments shown in the present application without inventive effort, shall fall within the scope of protection of the present application. Moreover, while the disclosure herein has been presented in terms of exemplary one or more examples, it is to be understood that each aspect of the disclosure can be utilized independently and separately from other aspects of the disclosure to provide a complete disclosure.
It should be understood that the terms "first," "second," "third," and the like in the description and in the claims of the present application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used are interchangeable under appropriate circumstances and can be implemented in sequences other than those illustrated or otherwise described herein with respect to the embodiments of the application, for example.
Furthermore, the terms "comprises" and "comprising," as well as any variations thereof, are intended to cover a non-exclusive inclusion, such that a product or device that comprises a list of elements is not necessarily limited to those elements explicitly listed, but may include other elements not expressly listed or inherent to such product or device.
The term "module" as used herein refers to any known or later developed hardware, software, firmware, artificial intelligence, fuzzy logic, or combination of hardware and/or software code that is capable of performing the functionality associated with that element.
FIG. 1 illustrates a schematic diagram of a smart home scenario. As shown, the home environment may include various smart home devices, such as asmart door lock 101, asmart air conditioner 102, ahealth monitoring device 103, and the like, as shown in the figure. The smart home devices are connected to acontrol device 104, and thecontrol device 104 is connected to aserver 106 through anetwork 105. Theserver 106 may also be communicatively connected to amobile terminal 108 of the user via amobile communications network 107. The control device is mainly used for realizing management control on the intelligent household equipment, and the control device can also be called as intelligent housekeeper equipment.
In some application scenarios, each smart home device may be connected to the control device through a local area network, and the control device may be connected to the server through the internet.
Some smart home devices need to verify information input by a user, and perform corresponding processing operation according to a verification result. Taking the intelligent door lock as an example, a user can input a fingerprint so that the intelligent door lock can verify the fingerprint, and the door lock can be opened only under the condition that the verification is passed. Taking the intelligent air conditioner as an example, the user can control the intelligent air conditioner through a voice instruction, the intelligent air conditioner can recognize the voice of the user and verify the recognized voice characteristics (voiceprint), and the voice instruction of the user can be responded only under the condition that the voice characteristics (voiceprint) pass the verification.
In a conventional situation, information such as fingerprints and voiceprints of a user is stored in the smart home device so that the smart home device can verify the information, but in this way, the risk that the privacy information of the user is leaked is high.
Therefore, in the embodiment of the application, the smart home device does not need to store user information (such as fingerprints, voiceprints, face information and the like) for legality verification of the user identity, and the user information is stored in the control device. When the intelligent home equipment needs to verify the validity of the user identity based on the user information input by the user, the user information to be verified can be sent to the control equipment, so that the control equipment can verify the validity according to the locally stored user information and send a verification result to the intelligent home equipment.
The control device may be a stand-alone device, may be formed integrally with other devices, or may be implemented by adding the functions provided by the embodiments of the present application to other devices (such as a home gateway or a set-top box).
In the embodiment of the application, each piece of smart home equipment may first access the control equipment, and perform equipment registration on each piece of smart home equipment, that is, store relevant information (such as equipment ID, IP address, MAC address, installation location, and other information) of the smart home equipment in the control equipment, so that the control equipment interacts with the smart home equipment, and control and management of the smart home equipment are achieved.
In the embodiment of the application, the user also needs to be registered. Taking a home scene as an example, the family members need to be registered, including acquiring user information, performing desensitization algorithm processing on the acquired user information, and storing the processed user information. Further, for the sake of data security, the user information may be encrypted and stored. The collection and storage of the user information may be done on the control device. The user information may include a fingerprint, a voiceprint, a face image (or face feature information), and the like. The above are only some examples of the user information, and the embodiment of the present application does not limit the types of the user information.
Fig. 2 exemplarily shows a structure of a control apparatus, and as shown, the control apparatus may include: theprocessor 21, thememory 22, and further, aninformation collector 23 and acommunication interface 24 may also be included.
Thememory 22 stores therein computer instructions executable by theprocessor 21 to implement the methods provided by the embodiments of the present application. Thememory 22 may also store intermediate data generated during operation of theprocessor 21, as well as collected user information.
Theinformation collector 23 can realize the collecting function of the user information and can support the multi-mode user privacy data collection, for example, theinformation collector 23 may include a fingerprint collector for collecting the user fingerprint, an image collector for collecting the user face information, and a sound collector for collecting the user voiceprint information.
Thecommunication interface 24 may adopt a wired communication interface (such as a network cable interface) or a wireless communication interface (such as a bluetooth interface) to realize data transmission with the smart home device. The control device may further include a communication interface with an external network device to perform data transmission with the server through the external network device.
Theprocessor 22 may be configured to perform the following operations: receiving an authentication request sent by intelligent home equipment, wherein the authentication request comprises user information to be verified, and the user information is used for verifying the validity of the user identity; verifying the user information to be verified according to the locally stored user information; and sending an authentication response to the intelligent home equipment, wherein the authentication response comprises a verification result of the user information to be verified, so that the intelligent home equipment performs corresponding processing operation according to the verification result.
In some embodiments, theprocessor 22 may be further configured to: and if the user information to be verified fails to be verified, generating and storing a verification failure record corresponding to the intelligent household equipment. The saved authentication failure record may allow user queries.
In some embodiments, the authentication request may include information of the smart home device, such as at least one of an identifier, an address, a type, and a model of the smart home device. Accordingly, theprocessor 22 may be further configured to: inquiring the corresponding relation between the intelligent household equipment and the user information type according to the information of the intelligent household equipment contained in the authentication request to obtain the user information type corresponding to the information of the intelligent household equipment; according to the user information type, acquiring locally stored user information of a corresponding type; and verifying the user information to be verified according to the locally stored user information of the corresponding type.
In some embodiments, the authentication request may include type indication information of the user information to be verified. Accordingly, theprocessor 22 may be further configured to: acquiring locally stored user information of corresponding type according to the type indication information of the user information to be verified contained in the authentication request; and verifying the user information to be verified according to the locally stored user information of the corresponding type.
Fig. 3 illustrates an example of a structure of a smart home device, and as shown in the figure, the control device may include: theprocessor 31, thememory 32, and further, aninformation collector 33 and acommunication interface 34 may be further included.
Thememory 32 stores therein computer instructions, which can be executed by theprocessor 31 to implement the method provided by the embodiment of the present application. Theinformation collector 33 may realize the collecting function of the user information, for example, theinformation collector 33 may include a fingerprint collector for collecting a fingerprint of the user, an image collector for collecting face information of the user, and a sound collector for collecting voiceprint information of the user. Thecommunication interface 34 may employ a wired communication interface (such as a network cable interface) or a wireless communication interface (such as a bluetooth interface) to realize data transmission with the smart home device.
Theprocessor 32 may be configured to perform the following operations: responding to the operation of collecting the user information, sending an authentication request to the control equipment, wherein the authentication request comprises the user information to be verified input by the user, receiving an authentication response sent by the draft control equipment according to the authentication request, and performing corresponding processing operation according to the authentication result, wherein the authentication response comprises the verification result of the user information to be verified.
Referring to fig. 4, a schematic flow chart of the smart home device control method provided in the embodiment of the present application is shown, and as shown in the drawing, the flow chart may include the following steps:
s401: the smart home equipment sends an authentication request to the control equipment, wherein the authentication request comprises user information to be verified, and the user information is used for verifying the validity of the user identity.
Wherein the user information includes: at least one item of fingerprint information, voice print information and face information.
In this step, the smart home device calls user information authentication through a unified authentication Interface provided by the control device, for example, if the smart door lock needs to call user information authentication, an Application Program Interface (API) provided by the control device is called first at a terminal program of the smart door lock to implement services such as face authentication unlocking and locking or fingerprint authentication unlocking and locking for the smart door lock.
Fig. 5 is a schematic diagram illustrating the smart home device calling the API to request the control device to perform user information authentication. As shown in the figure, the unified authentication API provided by the control device can be called by the smart home devices such as the smart door lock and the health monitoring device, so that the control device can verify various user information.
S402: and after receiving the authentication request, the control equipment verifies the user information to be verified according to the locally stored user information.
In this step, the control device may compare the user information to be verified with the user information stored locally, and if the user information is matched (for example, the user information is the same), the verification is passed, otherwise, the verification fails. The embodiment of the application does not limit the user information verification algorithm.
Further, if the user information stored this time is encrypted, the encrypted user information may be decrypted before verification.
In the embodiment of the application, the user information types used by different smart home devices may be different, for example, the smart door lock needs to verify the user fingerprint, and the smart sound box needs to verify the user voiceprint; the same smart home device can also use various user information, for example, the smart door lock needs to verify the user fingerprint and the user face at the same time. Various types of user information may be stored in the control device. In order to improve the verification efficiency, the related information may be carried in the authentication request, so that the control device may determine the type of the user information that needs to be verified according to the information, so as to improve the verification efficiency.
In some embodiments, in the control device, a correspondence between related information of the smart home devices (such as an identifier, an address, a type, a model, and the like of the smart home devices) and user information types may be established to represent types of user information used by different smart home devices, so that the control device may quickly determine which type or types of user information need to be verified. Specifically, the authentication request includes information of the smart home device, such as at least one of an identifier, an address, a type, and a model of the smart home device. Correspondingly, the control device may query a corresponding relationship between the smart home device and the user information type according to the information of the smart home device included in the authentication request, obtain the user information type corresponding to the information of the smart home device, obtain locally stored user information of a corresponding type according to the user information type, and verify the user information to be verified according to the locally stored user information of a corresponding type.
In other embodiments, indication information indicating the type of user information may be carried in the authentication request, so that the control device may quickly determine which type or types of user information need to be verified. Specifically, the authentication request includes type indication information of the user information to be verified. Correspondingly, the control device may obtain the locally stored user information of the corresponding type according to the type indication information of the user information to be verified included in the authentication request, and verify the user information to be verified according to the locally stored user information of the corresponding type.
S403: and the control equipment sends an authentication response to the intelligent household equipment, wherein the authentication response comprises a verification result of the user information to be verified.
The verification result may include the following two cases:
and (4) the verification is passed: indicating that the user information to be verified is matched with the user information locally stored by the control equipment;
and (3) failure of verification: indicating that the user information to be verified does not match the user information stored locally by the control device.
In some embodiments, if the control device fails to verify the user information to be verified, logging may be performed for subsequent viewing.
In some embodiments, if the control device fails to verify the user information continuously sent by the smart home device for multiple times, the control device may send alarm information to the server, so that the server sends the alarm information to the mobile terminal of the specified user, thereby notifying the relevant user in time.
S404: and the intelligent household equipment receives the authentication response and carries out corresponding processing operation according to the verification result.
Taking the intelligent door lock as an example, if the authentication response received by the intelligent door lock carries a result of passing the verification, the unlocking operation is executed; if the authentication response received by the intelligent door lock carries the result of the verification failure, the unlocking operation cannot be executed, and further, the user can be prompted to input the fingerprint again, or an alarm is given, or log recording is performed to record relevant information (such as occurrence time, occurrence times, failure reasons and the like) of the verification failure.
As can be seen from the above description, in the above embodiments of the present application, a unified authentication and authorization interface is provided for an intelligent home device authorized by user privacy data, the intelligent home device does not need to store user information locally, when the intelligent home device needs to verify the user information input by the user, an authentication request is sent to a device (control device) for unified authentication, so that the device can verify the user information to be verified according to the locally stored user information, since the user information is generally privacy information, such as a fingerprint, etc., there is a greater risk of leakage if stored locally in the intelligent home device, and once the user privacy information is leaked, there is a greater security risk, and with the above embodiments of the present application, since the user privacy information is centrally stored in the control device, the authentication is performed by the control device in a unified manner, thereby reducing the risk of leakage of user privacy information.
On the other hand, the embodiment of the application can carry out unified authentication and localized management on the intelligent household equipment related to the user privacy information identification function in the user family, personal privacy data do not need to be provided for different equipment manufacturers, the equipment manufacturers do not need to bear the privacy data authentication equipment cost and the algorithm research cost, the centralized management and protection of the user privacy data are realized, and the research and development cost of the intelligent household equipment related to the user privacy is also reduced. The embodiment of the application is suitable for different manufacturers and different intelligent household devices, and has high reliability and expandability.
In some embodiments, the control device may further provide an inquiry function, for example, a user may send an inquiry request to the control device through an application program (APP) on a terminal (such as a mobile phone) used by the user, and the control device may send, in response to the inquiry request, a log recorded with user information authentication failure information stored locally to the user terminal, so that the user may check the user information authentication failure condition through the APP.
In some embodiments, the server may provide an inquiry function, for example, the user may send an inquiry request to the server through an application program (APP) on a terminal (such as a mobile phone) used by the user, and the server may send, in response to the inquiry request, a log recorded with user information authentication failure information, which is locally stored or acquired from the control device, to the user terminal, so that the user may check the user information authentication failure condition through the APP.
According to an aspect of the exemplary embodiments, there is provided a computer storage medium having stored therein computer program instructions which, when run on a computer, cause the computer to execute the above-described user information authentication method.
On the basis of the common knowledge in the field, the above preferred conditions can be combined randomly to obtain the preferred embodiments of the application.
Since the communication terminal and the computer storage medium in the embodiment of the present application may be applied to the processing method, reference may also be made to the above method embodiment for obtaining technical effects, and details of the embodiment of the present application are not described herein again.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
While specific embodiments of the present application have been described above, it will be appreciated by those skilled in the art that these are by way of example only, and that the scope of the present application is defined by the appended claims. Various changes and modifications to these embodiments may be made by those skilled in the art without departing from the spirit and principles of this application, and these changes and modifications are intended to be included within the scope of this application.