CN105610620A - Intelligent hardware and configuration method thereof - Google Patents
Intelligent hardware and configuration method thereof Download PDFInfo
- Publication number
- CN105610620A CN105610620A CN201511030312.8A CN201511030312A CN105610620A CN 105610620 A CN105610620 A CN 105610620A CN 201511030312 A CN201511030312 A CN 201511030312A CN 105610620 A CN105610620 A CN 105610620A
- Authority
- CN
- China
- Prior art keywords
- intelligent hardware
- wlan
- user terminal
- account
- hardware
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
The invention discloses a configuration method of intelligent hardware. The method comprises a step of configuring a wireless network for the intelligent hardware, specifically comprises following steps that: after the intelligent hardware is electrified, a wireless communication unit, as a wireless AP (access point) newly builds a second wireless local area network; the local area network to be connected with the intelligent hardware is named as a first wireless local area network; a user terminal scans and identifies and is connected to the second wireless local area network; the connection information of the first local area network is sent to the intelligent hardware through the second wireless local area network; after the intelligent hardware receives the connection information of the first local area network, the wireless communication unit, as a wireless network interface card is connected to the first wireless local area network. According to the hardware and the method of the invention, the wifi account and password will not be leaked when configuring the wireless network through the intelligent hardware; troubleshooting is convenient; the intelligent hardware only allows authorized main account and slave account to access and/or control; and therefore, the operation security and privacy protection of the intelligent hardware are ensured.
Description
Technical field
The application relates to a kind of intelligent hardware (IntelligentHardware).
Background technology
Adopt the technology such as sensor, controller, actuator, network communication to be transformed traditional hardware, make it have intellectualityFeature, just become intelligent hardware. For example, conventional socket only for power supply, some smart jack can according to instruction immediately orSpecifying moment power supply or power-off.
Intelligence hardware often needs connecting wireless network (wirelessnetwork). Common wireless network comprises radio individualNet (WPAN), WLAN (WLAN), wireless MAN (WMAN), mobile communication network etc. Intelligence hardware the most often makesBe the WLAN taking Wi-Fi (also making WiFi) as representative. Refer to Fig. 1, this is existing intelligent hardware configurationThe method of WLAN, comprises the steps:
Step S101: intelligent hardware powers on, radio communication unit is wherein as the client work of WLAN, suitableIn a wireless network card job.
Step S103: user terminal (mobile phone, panel computer, intelligent remote controller etc.) receives the WLAN (example of user's inputThe WiFi network providing as wireless router) title and password. The title of described WLAN is for example WiFi networkSSID (ServiceSetIdentifier, service set). Some WLAN can connect without password, anotherAfter needing authentication password to pass through, a little WLANs could connect.
Step S105: WLAN title and the password of user terminal overseas broadcast user input.
Step S107: the radio communication unit in intelligent hardware receives WLAN title and the password of user terminal broadcast.
Step S109: intelligent hardware is connected to this WLAN by the WLAN title and the password that receive.
The method of above-mentioned intelligent hardware configuration WLAN exists following not enough:
One, network security risk. The account of wireless network and password are to pass to intelligent hardware by user terminal with broadcast mode, this makes the account of wireless network and password have risk of leakage.
Its two, malfunction elimination difficulty. If intelligent hardware finally cannot be connected to WLAN, may be intelligent hardware soBreaking down, may be also account and the password mistake that user inputs, and may be also user terminal and/or app wherein (application)Break down, do not have technological means to can be used for looking up the fault.
With the method for above-mentioned intelligent hardware configuration WLAN accordingly, in existing intelligent hardware, at least there are wireless telecommunicationsUnit, as shown in Figure 2. Described radio communication unit only, as the client work of WLAN, receives user eventually on the one handTitle and the password of the WLAN that end sends with the forms of broadcasting, the WLAN title that utilization receives on the other hand and closeCode is connected to this WLAN.
Existing intelligent hardware is after being connected to WLAN, and the user terminal in same LAN can be accessed, be configuredIntelligence hardware, this has just brought potential safety hazard. Once there is people to crack account and the password of WLAN, just can be gently and easilyLift the relevant information of obtaining intelligent hardware, even control the operation of intelligent hardware.
Summary of the invention
Technical problems to be solved in this application are to provide a kind of method of intelligent hardware configuration WLAN and user right, ruleKeep away the security risk of existing collocation method. For this reason, the application also will provide a kind of corresponding intelligent hardware.
For solving the problems of the technologies described above, the collocation method of the application's intelligence hardware is included as intelligent hardware configuration WLAN, toolBody is: after intelligent hardware powers on, radio communication unit wherein first as wireless aps newly-built the second WLAN; IntelligenceThe WLAN that hardware is prepared to connect is called the first WLAN; User terminal scans, identifies and be connected to the second wireless officeTerritory net, also sends the link information of the first WLAN to intelligent hardware by the second WLAN; Intelligence hardware receivesAfter the link information of the first WLAN, radio communication unit is wherein connected to the first WLAN as wireless network card.When the first WLAN can connect without password, the link information of the first WLAN comprises the first WLANTitle. Could connect after the first WLAN needs authentication password to pass through time, the link information of the first WLAN comprisesThe title of the first WLAN and password.
The application's intelligence hardware has radio communication unit; Described radio communication unit, first as wireless aps work, is re-used as nothingThe work of gauze card; In the time that radio communication unit is worked as wireless aps, be used for setting up the second WLAN and pass through the second nothingThe link information of the first WLAN that line LAN reception user terminal sends; When radio communication unit is as wireless network card workWhile work, be used for being connected to the first WLAN according to the link information of the first WLAN receiving.
The technique effect that the application obtains is the company that can not leak the first WLAN while making intelligent hardware configuration wireless networkConnect information, and be convenient to carry out malfunction elimination. After intelligence hardware powers on, just can be scanned by the APP in user terminal, improve and useFamily is experienced. The application also make intelligent hardware only allow authorize main account and from account access and/or control, thereby guarantee intelligenceSafe operation and the secret protection of energy hardware.
Brief description of the drawings
Fig. 1 is a kind of method flow diagram of existing intelligent hardware configuration WLAN.
Fig. 2 is a kind of structural representation of existing intelligent hardware.
Fig. 3 is the method flow diagram of the application's intelligent hardware configuration WLAN.
Fig. 4 is the structural representation of the application's intelligent hardware.
Fig. 5 is the method flow diagram one of the application's intelligent hardware configuration access rights.
Fig. 6 is the method flow diagram two of the application's intelligent hardware configuration access rights.
Detailed description of the invention
Refer to Fig. 3, this is the method for the application's intelligent hardware configuration WLAN, comprises the steps:
Step S301: intelligent hardware powers on, radio communication unit is wherein as wireless aps (accesspoint, access point)Work, newly-built the second WLAN. For table difference, intelligent hardware is wished to the WLAN connecting is called the first wireless officeTerritory net.
Preferably, the title of the second WLAN or set in advance and inform that user (is for example printed on saying of intelligent hardwareIn bright book), or with remarkable mark (for example, with relevant with the product category of intelligent hardware, title, trade mark etc.Specific character) so that user's identification.
The second WLAN or can connect without password, or could connect after needing authentication password to pass through. WhenCould connect after two WLANs need authentication password to pass through time, this password also sets in advance and informs user.
Step S303: user terminal is by the radio communication unit Wlan scanning of self.
Step S305: user terminal scans and identify the second WLAN that intelligent hardware is set up.
Step S307: user terminal is connected to by the radio communication unit of self the second WLAN that intelligent hardware is set up.
Step S309: user terminal sends the link information of the first WLAN to intelligent hardware by the second WLAN.The link information of this first wireless network can be input to user terminal by user, also can be by its storage inside of user terminal automatic acquisitionThe link information of the first WLAN (being for example the WLAN connecting before the second WLAN being connected to).
Step S311: the radio communication unit in intelligent hardware receives the account of the first WLAN that user terminal sendsAnd password.
Step S313: the radio communication unit in intelligent hardware is not re-used as wireless aps work, changes into as WLANClient work. The second WLAN of now being set up by the radio communication unit in intelligent hardware disappears.
Step S315: intelligent hardware is connected to the first WLAN by title and the password of the first WLAN of receiving.
Alternatively, user terminal scanning described in step S303 to S307, identify and be connected to the process of the second WLAN,Can automatically be completed by the app in user terminal completely, operate without user. Or this process also can have been operated by userBecome.
Alternatively, after step S309, user terminal disconnection is connected with the second WLAN, changes into and is connected to firstWLAN. This process can be completed by the app in user terminal completely automatically, operates without user. Or, thisProcess also can have been operated by user.
Alternatively, after step S309, user terminal sends broadcast message (for example adopting udp agreement) acquisition request intelligenceThe wireless network connection status of energy hardware. After step S315, intelligent hardware obtains receiving the request that user terminal sendsAfter getting the broadcast message of wireless network connection status, or send broadcast message (for example adopting udp agreement) or only to useFamily terminal is sent the wireless network connection status of information notification self. This process can be completely by the app in user terminal and intelligenceBetween energy hardware, automatic synchronization completes, and operates without user. Or this process also can have been operated by user.
Compared with the method for existing intelligent hardware configuration WLAN, the application's tool has the following advantages:
One, guarantees network security. The account of the first WLAN and password are by the second WLAN by user terminalPass to intelligent hardware, avoided the account of first WLAN and the risk of leakage that password transmits with broadcast mode.
Its two, be convenient to investigate fault. Suppose that user terminal can normally be connected to the first WLAN, but cannot scan and/Or be connected to the second WLAN, show that intelligent hardware breaks down. Suppose that user terminal can normally be connected to the first nothingLine LAN, and can scan and be connected to the second WLAN, but intelligent hardware finally cannot be connected to the first wireless localNet, show title and/or the password mistake of the first WLAN that user inputs, or user terminal and/or whereinApp breaks down. Based on same principle, be convenient to find fault source thereby can design more step.
With the method for above-mentioned intelligent hardware configuration WLAN accordingly, in the application's intelligent hardware, at least there is channel radioNews unit, as shown in Figure 4. Described radio communication unit is first as wireless aps work, then as the visitor of WLANFamily end (being equivalent to wireless network card) work. In the time that radio communication unit is worked as wireless aps, be used for setting up second wirelessLAN, and obtain account and the password of the first WLAN that user terminal sends by the second WLAN. When wirelessWhen communication unit is worked as the client of wireless network, be used for connecting according to the title of the first WLAN receiving and passwordReceive the first WLAN.
The method of the application's intelligence hardware configuration access rights is main accounts unique for intelligent hardware setting, and main account has accessWith whole authorities (except the authority that such as engineering mode etc. moved only for manufacturer) of controlling intelligent hardware. Described method is alsoIntelligence hardware setting zero, one or more from account, has access and/or controls all or part of of intelligent hardware from accountAuthority, from the authority of account or for setting in advance, or is arranged by main account.
Refer to Fig. 5, the application is that the method for intelligent hardware configuration access rights comprises the steps:
Step S501: intelligent hardware is accepted the access first of user terminal.
Step S503: intelligent hardware receives and preserve the ID of this user terminal input, and using this ID as main accountFamily. Main account has whole authorities of accessing and control intelligent hardware, and (such as engineering mode etc. removed only for the authority of manufacturer's operationOutward). Described ID is for example that user registers the account and the password that obtain on intelligent hardware server. With main accountThe user terminal that signs in to intelligent hardware is called first user terminal.
Step S505: intelligent hardware sends to server together with self identification and main account's ID, server by this twoPerson binds and preserves. Described intelligent hardware identifier for example has the characteristic information of uniqueness for the MAC Address of intelligent hardware etc., alsoCan add on this basis other information.
Through after above-mentioned steps, the main account information of intelligent hardware is all kept at two places: the one, and intelligent hardware inside; The 2nd, mutuallyIn the server of networking. Even if intelligent hardware generation account information memory loss, also can be by synchronous the main account information in serverIn intelligent hardware, avoid repeating to arrange main account for same intelligent hardware.
Refer to Fig. 6, the application is that the method for intelligent hardware configuration access rights also comprises the steps:
Step S601: what the app of server reception first user terminal sent is the request of intelligent hardware registration from account.
Step S603: server sends the first identifying code to first user terminal, described the first identifying code is according to being somebody's turn to do by serverIntelligence hardware identifier Query Database or carry out that computing obtains. Described the first identifying code is for example the combination of numeral and/or character,Also can be Quick Response Code etc.
Step S605: the first identifying code is passed to the second user terminal by first user terminal. For example, the first identifying code is two dimensionCode, the app on the second user terminal reads the information in Quick Response Code by taking pictures, realize the transmission of the first identifying code.
Step S607: the app in the second user terminal inquires about and/or calculates according to the first identifying code, obtains the second checkingCode. This app built-in for the database inquired about and/or the algorithm for calculating, for server, be transparent.
Step S609: server receives the second identifying code that the second user terminal sends.
Step S611: server judges that whether the intelligent hardware identifier and the second identifying code that receive be correct. If mistake, returnsError message. If correctly, send and authorize mark to the second user terminal. Intelligence hardware inside is preserved identical mandate in advanceMark.
Step S613: intelligent hardware receives mandate mark and the ID of the second user terminal input, checking authorizes mark to pass throughAfter using this ID as from account. There is all or part of authority of accessing and/or controlling intelligent hardware from account. From accountThe access at family and/or control authority can be set in advance, also can be arranged by main account.
Step S615: intelligent hardware sends to server with this by self identification together with account's ID, and server is by thisBoth bind and preserve.
Through after above-mentioned steps, each intelligent hardware be also kept at two: one from accounts information, intelligent hardware inside;The 2nd, in the server of internet. Even if there is the situations such as reset in intelligent hardware, also can be by server synchronous from accounts informationIn intelligent hardware, avoid repeating to arrange from account for same intelligent hardware.
With the method for above-mentioned intelligent hardware configuration access rights accordingly, the application's intelligent hardware comprises;
---in the time that accepting accessing first of user terminal, marks for the user who receives and preserve this user terminal input by intelligent hardwareKnow, and the first registering unit using this ID as main account;
---for sending to server to bind and preserve with main account or together with account's ID self identificationUnit.
Alternatively, described intelligent hardware also comprises mandate mark and the ID for receiving the second user terminal input, and willThis ID is as the second registering unit from account.
Delete from account as need, can have two kinds of modes. First kind of way: intelligent hardware receives first user terminal or the second useThe deletion of family terminal input is from the instruction of account, by deleting from accounts information of preserving in intelligent hardware. Then by self identification withDeleted from account's state and be synchronized to together server, now server is by this intelligence hardware and accordingly from account unbind.The second way: first user terminal or the second user terminal on server, delete that certain intelligent hardware binds from account.Then the accounts information that intelligent hardware is returned according to server sync, by deleting from account accordingly of preserving in intelligent hardware.
Compared with existing intelligent hardware configuration access rights, the method for the application intelligence hardware configuration access rights comprises tool is setHave the main account of whole authorities and only have part authority from account, can greatly promote the security of intelligent hardware. EvenHaving undelegated user to invade LAN, (is that first user terminal is to the second user terminal transmission not obtaining main account mandateThe process of the first identifying code) situation under also cannot access or control intelligent hardware, thereby guaranteed the safe operation of intelligent hardwareWith secret protection.
These are only the application's preferred embodiment, and be not used in restriction the application. For a person skilled in the art, originallyApplication can have various modifications and variations. All within the application's spirit and principle, any amendment of doing, be equal to replacement,Improve etc., within all should being included in the application's protection domain.
Claims (10)
1. a collocation method for intelligent hardware, is characterized in that, described collocation method is included as intelligent hardware configuration wireless localNet, is specially: after intelligent hardware powers on, radio communication unit is wherein as newly-built the second WLAN of wireless aps; IntelligenceThe WLAN that energy hardware is prepared to connect is called the first WLAN; User terminal scanning, identify and be connected to second wirelessLAN, also sends the link information of the first WLAN to intelligent hardware by the second WLAN; Intelligence hardware receivesAfter the link information of the first WLAN, radio communication unit is wherein connected to the first WLAN as wireless network card.
2. the collocation method of intelligent hardware according to claim 1, is characterized in that, when the first WLAN is without closeWhen code can connect, the link information of the first WLAN comprises the title of the first WLAN; When the first WLANCould connect after needing authentication password to pass through time, the link information of the first WLAN comprise the first WLAN title andPassword.
3. the collocation method of intelligent hardware according to claim 1, is characterized in that, described is that intelligent hardware configuration is wirelessIn the method for LAN, send after the link information of the first WLAN user terminal broadcast to intelligent hardware at user terminalMessage is with the wireless network connection status of acquisition request intelligence hardware; Be connected to after the first WLAN intelligence at intelligent hardwareHardware broadcast or only to user terminal send message to inform the wireless network connection status of self.
4. the collocation method of intelligent hardware according to claim 1, is characterized in that, described collocation method is also included as intelligenceEnergy hardware configuration access rights, specifically comprise: in the time that intelligent hardware is accepted the access first of user terminal, intelligent hardware receives alsoPreserve the ID of this user terminal input, and using this ID as main account; Main account has access and controls intelligenceWhole authorities of hardware; Then intelligent hardware sends to server, server together with self identification and main account's IDBy the two binding preservation.
5. the collocation method of intelligent hardware according to claim 4, is characterized in that, described is intelligent hardware configuration accessThe method of authority also comprises: first user terminal to server sends registration from the request of account, and reception server return theOne identifying code; The first identifying code is passed to the second user terminal by first user terminal; The second user terminal is according to the first identifying codeInquire about and/or calculate, obtain the second identifying code, and send to server authentication; Server authentication by and to the second intelligenceCan terminal send mandate mark; Intelligence hardware receives mandate mark and the ID of the second user terminal input, and by this userMark conduct is from account; Intelligence hardware sends to server by self identification with together with ID from account, and server is by intelligenceCan hardware and corresponding binding mutually from account.
6. the collocation method of intelligent hardware according to claim 5, is characterized in that, has access and/or controls from accountThe all or part of authority of intelligence hardware; From the access of account and/or control authority or set in advance or by main accountFamily arranges.
7. the collocation method of intelligent hardware according to claim 4, is characterized in that, described is intelligent hardware configuration accessThe method of authority also comprises: intelligent hardware receives the deletion of first user terminal or the input of the second user terminal from the instruction of account,By deleting from accounts information of preserving in intelligent hardware; Then intelligent hardware by self identification with delete from together with account's stateBe synchronized to server, now server is by this intelligence hardware and accordingly from account unbind;
Or, first user terminal or the second user terminal on server, delete that certain intelligent hardware binds from account; SoThe accounts information that rear intelligent hardware is returned according to server sync, by deleting from account accordingly of preserving in intelligent hardware.
8. an intelligent hardware, is characterized in that, has radio communication unit; Described radio communication unit is first as wireless aps workDo, be re-used as wireless network card work; In the time that radio communication unit is worked as wireless aps, be used for setting up the second WLANAnd the link information of the first WLAN sending by the second WLAN reception user terminal; When radio communication unit is doneDuring for wireless network card, be used for being connected to the first WLAN according to the link information of the first WLAN receiving.
9. intelligent hardware according to claim 8, is characterized in that, described intelligent hardware comprises;
---in the time that accepting accessing first of user terminal, marks for the user who receives and preserve this user terminal input by intelligent hardwareKnow, and the first registering unit using this ID as main account;
---for sending to server to bind and preserve with main account or together with account's ID self identificationUnit.
10. the collocation method of intelligent hardware according to claim 8, is characterized in that, described intelligent hardware also comprise forReceive mandate mark and the ID of the second user terminal input, and using this ID as the second registering unit from account.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511030312.8A CN105610620B (en) | 2015-12-31 | 2015-12-31 | A kind of Intelligent hardware and its configuration method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511030312.8A CN105610620B (en) | 2015-12-31 | 2015-12-31 | A kind of Intelligent hardware and its configuration method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105610620A true CN105610620A (en) | 2016-05-25 |
CN105610620B CN105610620B (en) | 2019-04-16 |
Family
ID=55990166
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201511030312.8A Active CN105610620B (en) | 2015-12-31 | 2015-12-31 | A kind of Intelligent hardware and its configuration method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105610620B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106357653A (en) * | 2016-09-27 | 2017-01-25 | 深圳市欧瑞博电子有限公司 | Control authority sharing method and system |
CN107659932A (en) * | 2016-07-25 | 2018-02-02 | 中兴通讯股份有限公司 | The method and device that a kind of equipment accesses |
CN107911352A (en) * | 2017-11-06 | 2018-04-13 | 湖南红手指信息技术有限公司 | A kind of authorization method of cloud mobile phone |
CN113923120A (en) * | 2021-09-29 | 2022-01-11 | 广州鲁邦通物联网科技股份有限公司 | Module ID renaming method of wireless communication module and terminal equipment |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130346608A1 (en) * | 2012-06-21 | 2013-12-26 | Zeon Corporation | Setting Method for Account ID Access Permissions and Controller |
CN103929746A (en) * | 2013-01-16 | 2014-07-16 | 杭州古北电子科技有限公司 | Internet-surfing configuration method for equipment of Internet of things, equipment of Internet of things and user equipment |
CN104079543A (en) * | 2013-03-29 | 2014-10-01 | 珠海格力电器股份有限公司 | Method, device and system for obtaining intelligent home system monitoring permissions |
CN104283773A (en) * | 2014-10-23 | 2015-01-14 | 深圳市领耀东方科技股份有限公司 | System for controlling internet-of-things devices through microblog |
CN104427501A (en) * | 2013-09-11 | 2015-03-18 | 腾讯科技(深圳)有限公司 | Network access method, device and system |
CN104808501A (en) * | 2015-03-31 | 2015-07-29 | 小米科技有限责任公司 | Intelligent scene deleting method and device |
CN104967596A (en) * | 2014-10-31 | 2015-10-07 | 腾讯科技(深圳)有限公司 | Method and apparatus for realizing binding and communication between user terminal and Internet of things device |
CN105207994A (en) * | 2015-08-17 | 2015-12-30 | 小米科技有限责任公司 | Account number binding method and device |
-
2015
- 2015-12-31 CN CN201511030312.8A patent/CN105610620B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130346608A1 (en) * | 2012-06-21 | 2013-12-26 | Zeon Corporation | Setting Method for Account ID Access Permissions and Controller |
CN103929746A (en) * | 2013-01-16 | 2014-07-16 | 杭州古北电子科技有限公司 | Internet-surfing configuration method for equipment of Internet of things, equipment of Internet of things and user equipment |
CN104079543A (en) * | 2013-03-29 | 2014-10-01 | 珠海格力电器股份有限公司 | Method, device and system for obtaining intelligent home system monitoring permissions |
CN104427501A (en) * | 2013-09-11 | 2015-03-18 | 腾讯科技(深圳)有限公司 | Network access method, device and system |
CN104283773A (en) * | 2014-10-23 | 2015-01-14 | 深圳市领耀东方科技股份有限公司 | System for controlling internet-of-things devices through microblog |
CN104967596A (en) * | 2014-10-31 | 2015-10-07 | 腾讯科技(深圳)有限公司 | Method and apparatus for realizing binding and communication between user terminal and Internet of things device |
CN104808501A (en) * | 2015-03-31 | 2015-07-29 | 小米科技有限责任公司 | Intelligent scene deleting method and device |
CN105207994A (en) * | 2015-08-17 | 2015-12-30 | 小米科技有限责任公司 | Account number binding method and device |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107659932A (en) * | 2016-07-25 | 2018-02-02 | 中兴通讯股份有限公司 | The method and device that a kind of equipment accesses |
CN107659932B (en) * | 2016-07-25 | 2022-05-20 | 中兴通讯股份有限公司 | Equipment access method and device |
CN106357653A (en) * | 2016-09-27 | 2017-01-25 | 深圳市欧瑞博电子有限公司 | Control authority sharing method and system |
CN107911352A (en) * | 2017-11-06 | 2018-04-13 | 湖南红手指信息技术有限公司 | A kind of authorization method of cloud mobile phone |
CN107911352B (en) * | 2017-11-06 | 2020-09-08 | 湖南微算互联信息技术有限公司 | Authorization method of cloud mobile phone |
CN113923120A (en) * | 2021-09-29 | 2022-01-11 | 广州鲁邦通物联网科技股份有限公司 | Module ID renaming method of wireless communication module and terminal equipment |
CN113923120B (en) * | 2021-09-29 | 2023-08-18 | 广州鲁邦通物联网科技股份有限公司 | Module ID renaming method of wireless communication module and terminal equipment |
Also Published As
Publication number | Publication date |
---|---|
CN105610620B (en) | 2019-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10869196B2 (en) | Internet access authentication method and client, and computer storage medium | |
CN104378145B (en) | The matching method and system of bluetooth equipment | |
CN104966340B (en) | Access control system, access control method and cloud service platform | |
US10177932B2 (en) | Method for connecting a domestic appliance to a wireless home network, computer program product, portable communications terminal and domestic appliance | |
CN104767715B (en) | Access control method and equipment | |
WO2016082417A1 (en) | Device configuration method, configuration apparatus and management device | |
CN105282868B (en) | System and method for WiFi network to be temporarily added | |
CN105610620A (en) | Intelligent hardware and configuration method thereof | |
CN102075904A (en) | Method and device for preventing re-authentication of roaming user | |
CN103329091B (en) | Cross access login controller | |
CN106134143A (en) | Method, apparatus and system for dynamic network access-in management | |
US20090168735A1 (en) | Station, setting information managing device, wireless communication system, setting information obtaining method, computer-readable medium | |
CN102143492B (en) | Method for establishing virtual private network (VPN) connection, mobile terminal and server | |
CN105743844A (en) | Information processing method and electronic device | |
CN103874065A (en) | Method and device for judging user position abnormity | |
US9161375B2 (en) | Method for sharing access to a wireless LAN access point | |
US20230154259A1 (en) | Method and devices for configuring electronic locks | |
CN105898733A (en) | Machine changing method and device based on eSIM card, mobile terminal and server | |
US20160191482A1 (en) | System and method for providing authenticated communications from a remote device to a local device | |
CN105392182B (en) | The setting method and system of the network configuration information of WIFI equipment | |
US9485217B2 (en) | Method for configuring network nodes of a telecommunications network, telecommunications network, program and computer program product | |
CN101616414A (en) | Method, system and server that terminal is authenticated | |
CN105516974A (en) | Router connection method, terminal and router | |
JP5327896B2 (en) | Wireless LAN access point and wireless terminal connection maintaining method | |
CN106789843B (en) | Method, PORTAL server and system for sharing internet access |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |