Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. The described embodiments are only some embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings. The embodiments and features of the embodiments in the present application may be combined with each other without conflict.
It should be understood that "system", "apparatus", "unit" and/or "module" as used herein is a method for distinguishing different components, elements, parts or assemblies at different levels. However, other words may be substituted by other expressions if they accomplish the same purpose.
As used in this application and the appended claims, the terms "a," "an," "the," and/or "the" are not intended to be inclusive in the singular, but rather are intended to be inclusive in the plural unless the context clearly dictates otherwise. In general, the terms "comprises" and "comprising" merely indicate that steps and elements are included which are explicitly identified, that the steps and elements do not form an exclusive list, and that a method or apparatus may include other steps or elements. An element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
In the description of the embodiments herein, "/" means "or" unless otherwise specified, for example, a/B may mean a or B; "and/or" herein is merely an association describing an associated object, and means that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, in the description of the embodiments of the present application, "a plurality" means two or more than two.
In the following, the terms "first", "second" are used for descriptive purposes only and are not to be understood as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature.
Flow charts are used herein to illustrate operations performed by systems according to embodiments of the present application. It should be understood that the preceding or following operations are not necessarily performed in the exact order in which they are performed. Rather, the various steps may be processed in reverse order or simultaneously. Meanwhile, other operations may be added to the processes, or a certain step or several steps of operations may be removed from the processes.
Fig. 1 illustrates an exemplary system architecture 100 to which some embodiments of the present method for managing smart devices or apparatus for managing smart devices may be applied.
As shown in fig. 1, the system architecture 100 may includeservers 101 and 102, a smart device 103, and a terminal device 104.
The medium of the communication link between theservers 101 and 102, between theserver 101 and the smart device 103, and between theserver 101 and the terminal device 104 may be provided through a network (not shown in the figure). The network may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
For the sake of convenience of differentiation, in the embodiment of the present application, theservers 101 and 102 may also be referred to as afirst server 101 and asecond server 102, respectively.
The system architecture 100 shown in fig. 1 is applicable to a privatized deployment scenario of smart devices and cloud services. The private deployment may also be referred to as localized deployment, and refers to that a Platform As A Service (PAAS) for controlling the smart device and a code of a client are encrypted and deployed from an original device provider server (i.e., thesecond server 102 in this application) to a client server (i.e., a server trusted by a user, i.e., thefirst server 101 in this application), and a fixed deployment machine is bound, and a link address of a gateway cooperating with the smart device 103 is changed to an address of the client server, which is equivalent to that both data and the smart device are deployed at the user. The code is prevented from being transferred to other deployment machines through encrypted deployment and binding to a fixed deployment machine, so that the security problem caused by code and data leakage is avoided.
In a privatized deployment scenario based on the system architecture shown in fig. 1, the privatized deployment system may include a platform service controlling the smart device and a device management system located in thefirst server 101. The device management system may be a client for the user to manage the smart device 103, and may be deployed in the terminal device 104 of the user. The user may manage and control the smart device 103 through the device management system. The device provider server may import the lifetime of the smart device to the privatization deployment system to authorize the privatization deployment system to privatize the smart device 103 during the lifetime.
Theserver 101 may be a server providing various intelligent device management services, for example, a privatization deployment server providing privatization deployment for the intelligent device 103 and the services. The privatization deployment server may respond to the received device control request sent by the terminal device 104, perform processing such as analysis on the request, obtain a processing result, and control the intelligent device 103 according to the processing result. The background server may also perform processing such as storage and analysis on the data in response to receiving the data sent by the smart device 103, and send the processing result to the terminal device 104.
Theserver 102 may provide various services, such as a server that provides lifetime management for the smart device 103 and a server that provides a device access authentication service for theserver 101. The server can manage the service life of each intelligent device 103, respond to the request of the server 105 when the intelligent device 103 accesses the server 103, authenticate the intelligent device, and send the service life of the intelligent device 103 to theserver 101 after the authentication is passed.
Theservers 101 and 102 may be hardware or software. When theservers 101 and 102 are hardware, they may be implemented as a distributed server cluster composed of multiple servers, or may be implemented as a single server. Whenservers 101 and 102 are software, they may be implemented as multiple pieces of software or software modules (e.g., to provide distributed services) or as a single piece of software or software module. And is not particularly limited herein.
During the corresponding service life of the intelligent device 103, the intelligent device 103 may maintain communication with the PAAS deployed on theserver 101, thereby ensuring that the local data of the intelligent device 103 may be effectively collected and uploaded to the PAAS. The PAAS can perform operation or processing on the received local data, and feed back the operation or processing result to the equipment management system, so as to present the operation or processing result to the client through the client. When a user inputs an instruction for controlling or managing the smart device 103 through the client, the client may issue the instruction to the PAAS. If the PAAS determines that the current time is within the service life of the intelligent device 103, the PAAS may issue the instruction to the intelligent device to control the intelligent device 103 to execute the corresponding operation.
When the service life of the intelligent device 103 is exceeded, the PAAS intercepts or discards the instruction sent by the client to the intelligent device 103, and the instruction of the user cannot be processed and forwarded to the intelligent device 103 at the PAAS layer. But at this time, the smart device 103 may still maintain communication with the PAAS, so as to ensure that the local data of the smart device 103 can still maintain effective collection, uploading and operation processing, but the processing result is no longer fed back to the device management system, but is only stored in theserver 101. In some embodiments, the data uploaded by the smart device 103 and the corresponding processing results may be stored in the database in theserver 101 encrypted during a time period exceeding the lifetime of the smart device 103.
Through the privatization deployment, the requirement of a user on the safety of the data of the intelligent device can be met, meanwhile, in order to avoid the loss of the control authority of the device supplier on the intelligent device, through the method for managing the intelligent device, the device supplier can provide the service life of the trial period to the privatization deployment server through a device supplier server (such as a second server in the method), so that the privatization deployment server can freeze the intelligent device after the trial period, still receive and store the data uploaded by the intelligent device during the process of freezing the intelligent device, and then the use of the device can be recovered and the data during the process of freezing the device can be recovered after the follow-up user prolongs the service life through operation. Therefore, the requirements of the user on data safety and privacy can be met, the equipment supplier can have certain use control authority for the intelligent equipment, if the user does not agree to pay after the trial period of the intelligent equipment (for example, the user can freely try the service life of the intelligent equipment), the equipment is frozen to pay, and therefore the equipment supplier losing the control authority for the intelligent equipment can be prevented from causing great loss. In addition, even if the intelligent device is frozen, the use of the intelligent device can be recovered when the use of the device is recovered, for example, the user can recover the use of the intelligent device by paying within a required time limit, the data during the freezing period is recovered, the integrity experience of the user on the data uploaded by the intelligent device is ensured, and the seamless connection of the use of the user is realized.
The smart device 103 may be hardware or software. When the smart device 103 is hardware, it can be various smart electronic devices, including but not limited to smart meters, smart water meters, smart cats' eyes, smart locks, gateways, and other electronic devices. When the smart device 103 is software, it can be installed in the electronic devices listed above. It may be implemented as multiple pieces of software or software modules (e.g., to provide distributed services) or as a single piece of software or software module. The embodiment of the present application does not set any limit to the specific type of the electronic device.
A user may interact with theserver 101 over a network using the terminal device 104 to receive or send messages or data or the like. Various client applications, such as shopping applications, search applications, social platform software, device management software, etc., may be installed on the end device 104.
The terminal device 104 may be hardware or software. When the terminal device 104 is hardware, it may be various electronic devices, including but not limited to a smart phone, a tablet computer, a wearable device, an in-vehicle device, an Augmented Reality (AR)/Virtual Reality (VR) device, an ultra-mobile personal computer (UMPC), a netbook, a Personal Digital Assistant (PDA), a laptop portable computer, a desktop computer, and other electronic devices. When the terminal device 104 is software, it can be installed in the electronic devices listed above. It may be implemented as multiple pieces of software or software modules (e.g., to provide distributed services) or as a single piece of software or software module. The embodiment of the present application does not set any limit to the specific type of the electronic device.
It should be noted that the method for managing the smart device provided in the embodiment of the present application is generally performed by theserver 101, and accordingly, the apparatus for managing the smart device is generally disposed in theserver 101.
It should be understood that the number of smart devices, terminal devices, and servers in fig. 1 is merely illustrative. There may be any number of intelligent devices, terminal devices, networks, and servers, as desired for implementation.
With continued reference to FIG. 2, aflow 200 of one embodiment of a method for managing smart devices in accordance with the present application is shown. The method for managing the intelligent device comprises the following steps:
instep 201, the lifetime of the first smart device is obtained, and the lifetime is provided by the second server.
In this embodiment, the execution subject of the method for managing the smart device may be a first server,
for example, the first server may be theserver 101 shown in fig. 1. The second server may be, for example, theserver 102 shown in fig. 1. The first smart device may be, for example, the smart device 103 shown in fig. 1.
In some embodiments of the present application, the execution subject may receive the lifetime of the first smart device sent by the second server.
In some embodiments of the application, the execution subject may store the lifetime of the first smart device after receiving the lifetime, so that the lifetime of the first smart device may be directly read during subsequent use.
In some embodiments of the present application, the execution body may store a lifetime corresponding to each of the plurality of smart devices.
In an embodiment of the application, the execution body may encrypt the lifetime and store the encrypted lifetime.
Step 202, responding to the fact that the current time exceeds the service life, intercepting a first instruction sent by a client for managing the first intelligent device, and maintaining communication with the first intelligent device during the first instruction interception period so as to receive and store first data sent by the first intelligent device.
In some embodiments of the present application, when a user needs to operate and manage the first smart device, a corresponding instruction, i.e., the first instruction, may be output in a client (e.g., a client installed in the terminal device 104 shown in fig. 1). The client may send the instruction to the execution subject. After receiving the instruction sent by the client, if it is determined that the current time exceeds the service life corresponding to the first intelligent device, the execution main body may intercept a first instruction sent by the client for managing the first intelligent device. For example, after receiving the first instruction, the execution subject may directly discard the first instruction, or may not perform corresponding processing on the instruction, or may not forward the instruction to the first intelligent device.
In some embodiments of the present application, the first instruction may be an instruction for managing or controlling the smart device. For example, for the smart lock, the first instruction may be a password modification instruction, a state switching instruction, a service upgrading instruction, and the like; for the video monitoring device, the first instruction may be an operation instruction for viewing, downloading, real-time calling, and the like of data collected by the video monitoring device. For the intelligent electric meter or the intelligent water meter and the like, the first instruction can be an electric quantity or water quantity checking instruction, a remote state control instruction and the like.
During intercepting a first instruction, the execution main body keeps communication with a first intelligent device so as to receive and store first data sent by the first intelligent device. The first data may be data generated during the use of the first intelligent device, data collected by the first intelligent device, and the like. For example, when the first smart device is a smart lock, the first data may be data information such as a smart lock switch record and power information. When the first smart device is a smart meter, the first data may be a power-on state, a power consumption amount, and the like provided by the smart meter. When the first intelligent device is a video monitoring device, the first data may be images or video information collected by the video monitoring device.
In an embodiment of the present application, the first data uploaded by the smart device may be encrypted according to a certain encryption algorithm and then stored, and the specific algorithm used for encryption is not limited in the present application.
In some embodiments of the present application, after the service life is exceeded, the execution subject may only execute an instruction for intercepting an operation of the smart device by the user, and does not limit normal operation of the smart device. For example, for the smart lock, a service life may be preset for the smart lock, and if the trial period of the smart lock ends and the service life of the smart lock is not extended by the user, and the user does not extend the service life, the first server may intercept a password modification instruction sent by the user through the client, so that the user cannot modify the lock password outside the service life, but the password set before the smart lock may still be used, that is, the set password may still be used to unlock the smart lock, but the password cannot be modified. For the video monitoring equipment, if the trial period of the video monitoring equipment is over and the service life of the user is not prolonged, the video monitoring equipment can normally collect data and upload the data to the server, but the first server can intercept operations of viewing, downloading, deleting and the like of the data by the user, so that the user cannot perform the operations on the video monitoring equipment outside the service life.
The method for managing the smart device provided by the above embodiment of the present application, by obtaining the lifetime of the first smart device provided by the second server, and when the current time exceeds the lifetime, intercepting the first instruction sent by the client for managing the first smart device, and maintaining communication with the first smart device during intercepting the first instruction, to receive and store the first data sent by the first smart device, and not provide the received data to the user, thereby enabling the second server to flexibly control the use of the first smart device through the setting of the lifetime, that is, to enable the user of the client to freely control and use the first smart device during the lifetime, to limit the control of the first smart device by the user of the client through the instruction intercepted by the client when the lifetime exceeds, and to only store the data of the smart device without providing the data to the user, and the flexible control of the intelligent equipment by the equipment provider outside the privatization system under the privatization deployment scene is realized. In addition, by only receiving and storing the data sent by the first intelligent device during the process of intercepting the client instruction, the data can be conveniently recovered subsequently, so that the integrity of the data of the first intelligent device can be ensured.
With further reference to FIG. 3, aflow 300 of yet another embodiment of a method for managing smart devices is shown. The execution subject of the method for managing smart devices may be, for example, theserver 101 shown in fig. 1. The method for managing the intelligent device comprises the following steps.
Step 301, obtaining the service life of the first intelligent device, wherein the service life is provided by the second server.
Step 302, responding to the fact that the current time exceeds the service life, intercepting a first instruction which is sent by a client and used for managing the first intelligent device, and maintaining communication with the first intelligent device during the first instruction interception period, so as to receive and store first data sent by the first intelligent device, process the received first data, and store the processing result.
For the steps 301-302, reference can be made to the step 201-202 shown in fig. 2, which is not described herein again.
In this embodiment, during the period of intercepting the first instruction, the execution main body further processes the received first data, and stores the processing result.
In an embodiment of the present application, the first data uploaded by the smart device and the corresponding processing result may be encrypted according to a certain encryption algorithm and then stored, and the specific algorithm used for encryption is not limited in the present application.
In some embodiments of the application, if the current time is within the lifetime, the execution main body may normally receive and forward an instruction sent by the client, so as to implement management of the smart device by the user, and after receiving data uploaded by the smart device, the execution main body may store and process the data, and feed back a processing result to the client to provide the user with the processing result.
Step 303, receiving a lifetime extension instruction.
In some embodiments of the present application, the time limit extension instruction may be transmitted by the second server in response to a preset operation of the user. In some embodiments, the preset operation of the user may be a payment operation of the user, an operation of extending a preset service life, or the like.
For example, when the user confirms that the quality and usage experience of the smart device is expected after a period of trial use, and decides to pay by agreement, the user may initiate a payment request to the second server. The second server may send a corresponding time limit extension instruction to the execution main body according to a corresponding time corresponding to the payment request.
For another example, after a period of trial use, the user thinks that more time is needed to experience the use of the smart device, so as to determine whether the use experience meets the user's requirements. At this time, the user may initiate a request for extending the preset lifetime to the second server, and the second server may send a corresponding lifetime extension instruction to the execution main body according to a corresponding time corresponding to the request for extending the preset lifetime.
Step 304, updating the service life according to the life prolonging instruction.
For example, if a user purchases a year of use, the lifetime may be extended by one year. Alternatively, if the user wishes to extend the trial period by one week, the lifetime may be extended by one week.
Step 305, after updating the lifetime, restoring the first data and the processing result stored during the intercepting of the first instruction, and sending the restored first data and/or the processing result to the client.
In some embodiments of the present application, after the lifetime is updated, for example, after the original lifetime is extended, the user may recover the access right to the data and the processing result stored during the interception of the first instruction within the updated lifetime, so that the user may select the required data or result as needed.
In one embodiment of the application, the data and/or processing results stored during the interception of the first instruction may be decrypted according to a decryption algorithm corresponding to the encryption algorithm used at the time of storage and provided to the user of the client.
For example, when the user rotates to pay for using the smart lock or applies for prolonging the trial period of the video monitoring device, the service life is prolonged, and the access and the use authority of the use data and the acquired image data of the video monitoring device are opened to the user again during the previous freezing period of the device, so that the user can view or download the relevant data as required.
The method for managing the smart device, provided by the above embodiment of the application, includes acquiring a lifetime of the first smart device provided by the second server, intercepting a first instruction sent by the client for managing the first smart device when a current time exceeds the lifetime to limit a user from operating the smart device, and maintaining communication with the first smart device during intercepting the first instruction to receive and store first data sent by the first smart device, process the received data, and store a processing result, and after the lifetime is updated, recovering data and a processing result stored during intercepting the instruction, and sending the recovered data and result to the client, so that the usage and management freezing permissions of the smart device can be flexibly controlled by setting the lifetime, and after the lifetime is updated, the data and the processing result during the freezing period can be recovered, so that the integrity of the data of the first intelligent device can be ensured, and a seamless use experience is provided for a user.
In some possible implementations of the foregoing embodiment of the present application, the lifetime may be provided by the second server when the first smart device accesses the first server. Reference may be further made to fig. 4, which illustrates aflow 400 of yet another embodiment of a method for managing smart devices. The execution subject of the method for managing the intelligent device is a first server, and for example, theserver 101 shown in fig. 1 may be used. The method for managing the intelligent device can further comprise the following steps.
Step 401, receiving the lifetime data sent by the second server, where the lifetime data includes identification information and a lifetime of the first intelligent device, and the lifetime data is sent after the second server successfully verifies the first intelligent device.
In some embodiments of the present application, before privatizing deployment of the intelligent device, the validity of the intelligent device may be verified by the device provider, and only after the verification is passed, the intelligent device is allowed to access the privatizing deployment system.
For example, after the first server receives an access request of the first smart device, the first server may send the identification information of the device in the access request to the second server for verification. The second server can judge whether the first intelligent device is provided by a legal device provider or not according to the identification information. If so, the second server determines that the authentication is passed, determines a corresponding lifetime based on the identification information, and provides the device identification and the lifetime encryption to the first server.
If the first intelligent device is judged to be illegal, for example, the first intelligent device is not an intelligent device provided by a client side, or the first intelligent device is recorded as an intelligent device with potential safety hazard, the second server does not send the service life data to the second intelligent device. Or the second server can also send prompt information or authentication failure information to the first server to inform that the intelligent device which is currently requested to be accessed by the first server is not authenticated.
The device identification includes, but is not limited to, a device serial number, etc.
In some embodiments of the present application, the second server may query the lifetime set by the smart device from the database according to the flag information of the device. The database can be updated according to the related operation of the service life setting instruction performed by the user. For example, when a user applies for trial use or temporary use of a certain intelligent device, a corresponding relationship between the intelligent device and a service life corresponding to a trial period may be generated in the database according to the trial period or preset temporary use duration applied by the user. After a user pays for a certain intelligent device, the service life corresponding to the intelligent device can be generated or updated in the database according to the service life corresponding to the payment request of the user.
Step 402, analyzing the lifetime data to obtain the identification information and the lifetime of the first smart device.
In one embodiment of the present application, the first server may decrypt the received lifetime data using a decryption algorithm agreed with the second server to obtain the lifetime of the first smart device.
Step 403, storing the identification information and the lifetime of the first intelligent device, and completing the process of accessing the first server by the first intelligent device.
When the first server successfully stores the service life corresponding to the first intelligent device, the process that the first intelligent device accesses the first server is completed, that is, the first intelligent device successfully accesses the privatization system is completed, and the service life of the first intelligent device is bound.
In the process of completing the access of the first intelligent device to the first server, the first server may manage the first intelligent device according to the lifetime of the storage according to the method shown in fig. 2 or fig. 3. For a specific implementation process, reference may be made to fig. 2 and fig. 3, which are not described herein again.
Therefore, when the intelligent device is accessed to the first server, the first intelligent device is verified by the second server, the service life of the intelligent device is provided by the second intelligent device after the intelligent device passes the verification, the validity of the intelligent device accessed to the first server can be ensured, and the system safety is improved. In addition, the intelligent devices accessed to the first server can be ensured to have the service life set by the second server, so that the first server can manage the intelligent devices according to the service life.
In some embodiments of the present application, the lifetime data may further include a user identifier. The service life data includes identification information of a plurality of first intelligent devices corresponding to the user identification, and the service lives corresponding to the plurality of first intelligent devices are the same.
In this scenario, if the current time exceeds the lifetime, a first instruction sent by the client for managing any one of the plurality of first smart devices may be intercepted. For example, an instruction for some or all of the plurality of first smart devices may be intercepted to freeze some or all of the smart devices corresponding to the user identification.
Therefore, batch management of the intelligent equipment under the user name can be realized based on the management of the user identity, and the management efficiency of the intelligent equipment is improved.
In some embodiments of the present application, the first smart device may include a camera. With further reference to fig. 5, aflow 500 of yet another embodiment of a method for managing smart devices is illustrated. The execution subject of the method for managing a smart device may be a first server, for example, theserver 101 shown in fig. 1. The method for managing the intelligent device can further comprise the following steps on the basis of the steps shown in fig. 2 or fig. 3.
Step 501, receiving second data, which is sent by the first intelligent device and acquired by the camera after the service life is exceeded.
The second data may include, but is not limited to, image, video, and the like. In some embodiments of the present application, the camera device configured to the first smart device may continue to capture data information such as images and videos while the first smart device is frozen, and send the captured data to the first server.
Step 502, analyzing the second data to identify abnormal use information of the first intelligent device from the second data.
The abnormal use information can comprise use information such as violent disassembly, password cracking and the like.
In some embodiments of the present application, the first server may identify, by means of image identification or the like, the image frame with the actions of violent disassembly, password cracking, or the like from the second data, and record and store the image frame. In addition, the first server can also identify the face image of the user who is abnormally used from the second data through face recognition, and record and store the face image.
Step 503, sending the abnormal use information to the second server.
Therefore, data are collected during the freezing period of the equipment through the camera device and are sent to the first server for analysis processing, abnormal use information of the first intelligent equipment is identified, the abnormal use information is provided for the second server, abnormal use evidence during the freezing period of the intelligent equipment can be kept, and corresponding measures can be taken by the second server side according to the abnormal use information to prevent subsequent abnormal use.
In some embodiments of the present application, the method for managing a smart device may further include: responding to the second intelligent device entering a first state, controlling the first intelligent device to execute a first operation, and determining a first duration corresponding to the first operation; and responding to the first intelligent device executing the first operation for a first time length and/or responding to the second intelligent device entering the second state, and controlling the first intelligent device to execute the second operation.
The embodiment can be applied to a scene that a room with an intelligent lock is temporarily watched. Wherein the second smart device may be a smart lock. The first preset state of the intelligent lock can be that the intelligent lock is opened from the outside, and the second preset state of the intelligent lock can be that the intelligent lock is closed from the outside. The first intelligent device can be an intelligent water meter or an intelligent electric meter. The first operation of the intelligent water meter can be to control the water supply of the room where the intelligent lock is located, and the second operation of the intelligent water meter can be to control the water supply of the room where the intelligent lock is located to be cut off. The first operation of the intelligent electric meter can be to control the power-on of the room where the intelligent lock is located, and the second operation of the intelligent electric meter can be to control the power-off of the room where the intelligent lock is located.
Under this scene, when the intelligence lock was opened from the outsider, the server can receive the intelligence lock notice that gets into the first state that the intelligence lock sent, and then steerable intelligence water gauge and the smart electric meter in this intelligence lock place room control room lead to water and circular telegram to the user uses is seen in the convenient area. Meanwhile, the server can also set a corresponding first time length of the current watch, so that when the water passing and power-on time length reaches the first time length, the current watch can be considered to be finished, and the intelligent water meter and the intelligent electric meter in the room where the intelligent lock is located are controlled to control the room to be interrupted with water and power off.
Of course, if the intelligent lock is closed from the outside before the first time period is reached, the server can receive the notification that the intelligent lock enters the second state, and then the intelligent water meter and the intelligent electric meter in the room where the intelligent lock is located can be directly controlled to control the room to be interrupted and powered off.
Therefore, the power on/off and water on/off of the vacant room can be automatically controlled according to the state of the intelligent lock, the temporary power on under the scene with a watch is realized, and the power on/off, the water on/off and the water off/off of the house can be realized. In addition, except controlling the water and electricity state of the room according to the lock state, a time with the watch can be further set when the water is electrified, so that the water is cut off at the automatic power-off point when the time with the watch is reached, and the double guarantee of the automatic control of the water and electricity is realized.
With further reference to fig. 6, as an implementation of the methods shown in some of the above figures, the present application provides an embodiment of an apparatus for managing smart devices, where the embodiment of the apparatus corresponds to the embodiment of the method shown in fig. 2, and the apparatus may be applied to various electronic devices.
As shown in fig. 6, theapparatus 600 for managing smart devices of the present embodiment includes: anacquisition module 601, aninterception module 602, and astorage module 603.
Wherein, the obtainingmodule 601 is configured to obtain a lifetime of the first smart device, and the lifetime is provided by the second server.
An interceptingmodule 602 configured to intercept a first instruction sent by a client for managing the first smart device in response to the current time exceeding the lifespan.
Astorage module 603 configured to maintain communication with the first smart device during the intercepting of the first instruction to receive and store first data transmitted by the first smart device.
In this embodiment, for specific processing of the obtainingmodule 601, the interceptingmodule 602, and thestoring module 603 and technical effects brought by the processing, reference may be made to the related description of the embodiment corresponding to step 201 and step 202 in the embodiment of fig. 2, and no further description is given here.
In some optional implementations of this embodiment, theapparatus 600 for managing smart devices further includes a processing module. The processing module processes the received first data during the period of intercepting the first instruction. Wherein thestorage module 603 is further configured to store the processing result.
In some optional implementations of this embodiment, theapparatus 600 for managing a smart device further includes: a first receiving module configured to receive a lifetime extension instruction; an update module configured to update the lifetime according to the lifetime extension instruction; and the management module is configured to restore the first data and the processing result stored in the first instruction intercepting period after the service life is updated, and send the restored first data and/or the processing result to the client.
In some optional implementations of the embodiment, the time limit extension instruction is sent by the second server in response to a preset operation of the user.
In some optional implementations of this embodiment, the lifetime is provided by the second server when the first smart device accesses the first server.
In some optional implementations of this embodiment, theapparatus 600 for managing a smart device further includes: the second receiving module is configured to receive service life data sent by the second server, wherein the service life data comprise identification information and a service life of the first intelligent device, and the service life data are sent after the second server successfully verifies the first intelligent device; and the analysis module is configured to analyze the service life data to acquire the identification information and the service life of the first intelligent device. Thestorage module 603 is configured to store the identification information and the lifetime of the first smart device, and complete the process of accessing the first server by the first smart device.
In some optional implementations of this embodiment, the lifetime data further includes a user identifier. The service life data comprises a plurality of first intelligent devices corresponding to the user identifications, and the service lives of the first intelligent devices are the same. Theintercept module 602 is further configured to intercept a first instruction sent by the client for managing any of the plurality of first smart devices in response to the current time exceeding the lifespan.
In some optional implementations of this embodiment, the first smart device includes an image capturing apparatus, and the apparatus for managing the smart device further includes: the third receiving module is configured to receive second data which are sent by the first intelligent equipment and acquired by the camera after the service life is exceeded; the analysis module is configured to analyze the second data to identify abnormal use information of the first intelligent device from the second data; and a sending module configured to send the abnormal use information to the second server.
In some optional implementations of this embodiment, the apparatus for managing an intelligent device further includes: a control module configured to: responding to the second intelligent device entering a first state, controlling the first intelligent device to execute a first operation, and determining a first duration corresponding to the first operation; and controlling the first intelligent device to execute the second operation in response to the duration of the first operation executed by the first intelligent device reaching the first duration and/or in response to the second intelligent device entering the second state.
It should be noted that theapparatus 600 for managing an intelligent device may be a chip, a component or a module, and theapparatus 600 for managing an intelligent device may include a processor and a memory, where the obtainingmodule 601, the interceptingmodule 602, thestorage module 603, and the like are all stored as program units in the memory, and the processor executes the program units stored in the memory to implement corresponding functions.
The processor may include a kernel, which calls the corresponding program unit from the memory. The kernel can be provided with one or more of intercepting a first instruction sent by the client for managing the first intelligent device when the service life provided by the second server is exceeded by adjusting the kernel parameters, and maintaining communication with the first intelligent device during interception of the first instruction so as to receive and store first data sent by the first intelligent device.
The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip.
The apparatus for managing smart devices provided by the above-mentioned embodiment of the present application, by obtaining the lifetime of the first smart device provided by the second server, and when the current time exceeds the lifetime, intercepting the first instruction sent by the client for managing the first smart device, and maintaining communication with the first smart device during intercepting the first instruction, to receive and store the first data sent by the first smart device, and not provide the received data to the user, thereby enabling the second server to flexibly control the use of the first smart device through the setting of the lifetime, that is, to enable the user of the client to freely control and use the first smart device during the lifetime, to limit the control of the first smart device by the user of the client through the instruction intercepted by the client when the lifetime exceeds, and to store the data of the smart device only without providing the data to the user, and the flexible control of the intelligent equipment by the equipment provider outside the privatization system under the privatization deployment scene is realized. In addition, by only receiving and storing the data sent by the first intelligent device during the process of intercepting the client instruction, the data can be conveniently recovered subsequently, so that the integrity of the data of the first intelligent device can be ensured.
Referring now to FIG. 7, shown is a schematic diagram of anelectronic device 700 suitable for use in implementing some embodiments of the present application. The electronic device shown in fig. 7 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 7, theelectronic device 700 may include aprocessor 701, amemory 702, acommunication interface 703, aninput unit 704, anoutput unit 705, and acommunication bus 706. Wherein theprocessor 701 and thememory 702 are connected to each other via acommunication bus 706. Acommunication interface 703, aninput unit 704 and anoutput unit 705 are also connected to thecommunication bus 706.
Thecommunication interface 703 may be an interface of a communication module, such as an interface of a GSM module. Thecommunication interface 703 may be configured to obtain a lifetime provided by the second server, obtain first data of the first smart device, obtain a first instruction sent by the client for managing the first smart device, send the first instruction to the first smart device within the lifetime, and send the first data and a processing result of the first data to the client.
In the embodiment of the present application, theprocessor 701 may be a Central Processing Unit (CPU), an application-specific integrated circuit (ASIC), a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA), or other programmable logic devices.
In one possible implementation, thememory 702 may include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data created according to the use of the computer, such as user data, smart device data, processing results of the data, and term data, etc.
Further, thememory 702 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device or other volatile solid state storage device.
Theprocessor 701 may call a program stored in thememory 702, and in particular, theprocessor 701 may execute the method for managing the smart device as shown in any one of the embodiments of fig. 2 to 5 above.
Thememory 702 is used for storing one or more programs, the program may include program codes, the program codes include computer operation instructions, in this embodiment, thememory 702 stores at least the program for realizing the following functions:
acquiring the service life of the first intelligent device, wherein the service life is provided by a second server; and
in response to the current time exceeding the service life, a first instruction sent by the client for managing the first intelligent device is intercepted, and communication with the first intelligent device is kept during the process of intercepting the first instruction, so that first data sent by the first intelligent device is received and stored.
The present application may further include aninput unit 705, and theinput unit 705 may include at least one of a touch sensing unit that senses a touch event on the touch display panel, a keyboard, a mouse, a camera, a microphone, and the like.
Theoutput unit 704 may include: at least one of a display, a speaker, a vibration mechanism, a light, and the like. The display may comprise a display panel, such as a touch display panel or the like. In one possible case, the Display panel may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. The vibration mechanism may displace theelectronic device 700 during operation, and in one possible implementation, the vibration mechanism includes a motor and an eccentric vibrator, and the motor drives the eccentric vibrator to rotate so as to generate vibration. The brightness and/or color of the lamp can be adjusted, in a possible implementation manner, different information can be embodied through at least one of the on-off, brightness and color of the lamp, for example, the alarm information can be embodied through red light emitted by the lamp.
Of course, the structure of theelectronic device 700 shown in fig. 7 does not limit the electronic device in the embodiment of the present application, and in practical applications, the electronic device may include more or less components than those shown in fig. 7, or some components may be combined.
The present application provides a computer readable medium, on which a computer program is stored, wherein the program, when executed by a processor, implements the method for managing a smart device described in the above method embodiments.
The embodiment of the present application provides a processor, where the processor is configured to execute a program, where the program executes to implement the method for managing an intelligent device described in the above method embodiments.
The present application further provides a computer program product which, when executed on a data processing device, causes the data processing device to implement the method for managing a smart device described in the above method embodiments.
In addition, the electronic device, the processor, the computer-readable medium, or the computer program product provided in the foregoing embodiments of the present application may be all used for executing the corresponding method provided above, and therefore, the beneficial effects achieved by the electronic device, the processor, the computer-readable medium, or the computer program product may refer to the beneficial effects in the corresponding method provided above, and are not described herein again.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, which include both non-transitory and non-transitory, removable and non-removable media, may implement the information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above description is only for the purpose of illustrating the preferred embodiments of the present application and the technical principles applied, and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. The scope of the invention according to the present application is not limited to the specific combinations of the above-described features, and may also cover other embodiments in which the above-described features or their equivalents are arbitrarily combined without departing from the spirit of the invention. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.