CN105610620A - Intelligent hardware and configuration method thereof - Google Patents

Intelligent hardware and configuration method thereof Download PDF

Info

Publication number
CN105610620A
CN105610620A CN201511030312.8A CN201511030312A CN105610620A CN 105610620 A CN105610620 A CN 105610620A CN 201511030312 A CN201511030312 A CN 201511030312A CN 105610620 A CN105610620 A CN 105610620A
Authority
CN
China
Prior art keywords
intelligent hardware
wlan
user terminal
account
hardware
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201511030312.8A
Other languages
Chinese (zh)
Other versions
CN105610620B (en
Inventor
王建方
钱先民
黄晴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tian Jia (shanghai) Mdt Infotech Ltd
Original Assignee
Tian Jia (shanghai) Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tian Jia (shanghai) Mdt Infotech Ltd filed Critical Tian Jia (shanghai) Mdt Infotech Ltd
Priority to CN201511030312.8A priority Critical patent/CN105610620B/en
Publication of CN105610620A publication Critical patent/CN105610620A/en
Application granted granted Critical
Publication of CN105610620B publication Critical patent/CN105610620B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses a configuration method of intelligent hardware. The method comprises a step of configuring a wireless network for the intelligent hardware, specifically comprises following steps that: after the intelligent hardware is electrified, a wireless communication unit, as a wireless AP (access point) newly builds a second wireless local area network; the local area network to be connected with the intelligent hardware is named as a first wireless local area network; a user terminal scans and identifies and is connected to the second wireless local area network; the connection information of the first local area network is sent to the intelligent hardware through the second wireless local area network; after the intelligent hardware receives the connection information of the first local area network, the wireless communication unit, as a wireless network interface card is connected to the first wireless local area network. According to the hardware and the method of the invention, the wifi account and password will not be leaked when configuring the wireless network through the intelligent hardware; troubleshooting is convenient; the intelligent hardware only allows authorized main account and slave account to access and/or control; and therefore, the operation security and privacy protection of the intelligent hardware are ensured.

Description

A kind of intelligent hardware and collocation method thereof
Technical field
The application relates to a kind of intelligent hardware (IntelligentHardware).
Background technology
Adopt the technology such as sensor, controller, actuator, network communication to be transformed traditional hardware, make it have intellectualityFeature, just become intelligent hardware. For example, conventional socket only for power supply, some smart jack can according to instruction immediately orSpecifying moment power supply or power-off.
Intelligence hardware often needs connecting wireless network (wirelessnetwork). Common wireless network comprises radio individualNet (WPAN), WLAN (WLAN), wireless MAN (WMAN), mobile communication network etc. Intelligence hardware the most often makesBe the WLAN taking Wi-Fi (also making WiFi) as representative. Refer to Fig. 1, this is existing intelligent hardware configurationThe method of WLAN, comprises the steps:
Step S101: intelligent hardware powers on, radio communication unit is wherein as the client work of WLAN, suitableIn a wireless network card job.
Step S103: user terminal (mobile phone, panel computer, intelligent remote controller etc.) receives the WLAN (example of user's inputThe WiFi network providing as wireless router) title and password. The title of described WLAN is for example WiFi networkSSID (ServiceSetIdentifier, service set). Some WLAN can connect without password, anotherAfter needing authentication password to pass through, a little WLANs could connect.
Step S105: WLAN title and the password of user terminal overseas broadcast user input.
Step S107: the radio communication unit in intelligent hardware receives WLAN title and the password of user terminal broadcast.
Step S109: intelligent hardware is connected to this WLAN by the WLAN title and the password that receive.
The method of above-mentioned intelligent hardware configuration WLAN exists following not enough:
One, network security risk. The account of wireless network and password are to pass to intelligent hardware by user terminal with broadcast mode, this makes the account of wireless network and password have risk of leakage.
Its two, malfunction elimination difficulty. If intelligent hardware finally cannot be connected to WLAN, may be intelligent hardware soBreaking down, may be also account and the password mistake that user inputs, and may be also user terminal and/or app wherein (application)Break down, do not have technological means to can be used for looking up the fault.
With the method for above-mentioned intelligent hardware configuration WLAN accordingly, in existing intelligent hardware, at least there are wireless telecommunicationsUnit, as shown in Figure 2. Described radio communication unit only, as the client work of WLAN, receives user eventually on the one handTitle and the password of the WLAN that end sends with the forms of broadcasting, the WLAN title that utilization receives on the other hand and closeCode is connected to this WLAN.
Existing intelligent hardware is after being connected to WLAN, and the user terminal in same LAN can be accessed, be configuredIntelligence hardware, this has just brought potential safety hazard. Once there is people to crack account and the password of WLAN, just can be gently and easilyLift the relevant information of obtaining intelligent hardware, even control the operation of intelligent hardware.
Summary of the invention
Technical problems to be solved in this application are to provide a kind of method of intelligent hardware configuration WLAN and user right, ruleKeep away the security risk of existing collocation method. For this reason, the application also will provide a kind of corresponding intelligent hardware.
For solving the problems of the technologies described above, the collocation method of the application's intelligence hardware is included as intelligent hardware configuration WLAN, toolBody is: after intelligent hardware powers on, radio communication unit wherein first as wireless aps newly-built the second WLAN; IntelligenceThe WLAN that hardware is prepared to connect is called the first WLAN; User terminal scans, identifies and be connected to the second wireless officeTerritory net, also sends the link information of the first WLAN to intelligent hardware by the second WLAN; Intelligence hardware receivesAfter the link information of the first WLAN, radio communication unit is wherein connected to the first WLAN as wireless network card.When the first WLAN can connect without password, the link information of the first WLAN comprises the first WLANTitle. Could connect after the first WLAN needs authentication password to pass through time, the link information of the first WLAN comprisesThe title of the first WLAN and password.
The application's intelligence hardware has radio communication unit; Described radio communication unit, first as wireless aps work, is re-used as nothingThe work of gauze card; In the time that radio communication unit is worked as wireless aps, be used for setting up the second WLAN and pass through the second nothingThe link information of the first WLAN that line LAN reception user terminal sends; When radio communication unit is as wireless network card workWhile work, be used for being connected to the first WLAN according to the link information of the first WLAN receiving.
The technique effect that the application obtains is the company that can not leak the first WLAN while making intelligent hardware configuration wireless networkConnect information, and be convenient to carry out malfunction elimination. After intelligence hardware powers on, just can be scanned by the APP in user terminal, improve and useFamily is experienced. The application also make intelligent hardware only allow authorize main account and from account access and/or control, thereby guarantee intelligenceSafe operation and the secret protection of energy hardware.
Brief description of the drawings
Fig. 1 is a kind of method flow diagram of existing intelligent hardware configuration WLAN.
Fig. 2 is a kind of structural representation of existing intelligent hardware.
Fig. 3 is the method flow diagram of the application's intelligent hardware configuration WLAN.
Fig. 4 is the structural representation of the application's intelligent hardware.
Fig. 5 is the method flow diagram one of the application's intelligent hardware configuration access rights.
Fig. 6 is the method flow diagram two of the application's intelligent hardware configuration access rights.
Detailed description of the invention
Refer to Fig. 3, this is the method for the application's intelligent hardware configuration WLAN, comprises the steps:
Step S301: intelligent hardware powers on, radio communication unit is wherein as wireless aps (accesspoint, access point)Work, newly-built the second WLAN. For table difference, intelligent hardware is wished to the WLAN connecting is called the first wireless officeTerritory net.
Preferably, the title of the second WLAN or set in advance and inform that user (is for example printed on saying of intelligent hardwareIn bright book), or with remarkable mark (for example, with relevant with the product category of intelligent hardware, title, trade mark etc.Specific character) so that user's identification.
The second WLAN or can connect without password, or could connect after needing authentication password to pass through. WhenCould connect after two WLANs need authentication password to pass through time, this password also sets in advance and informs user.
Step S303: user terminal is by the radio communication unit Wlan scanning of self.
Step S305: user terminal scans and identify the second WLAN that intelligent hardware is set up.
Step S307: user terminal is connected to by the radio communication unit of self the second WLAN that intelligent hardware is set up.
Step S309: user terminal sends the link information of the first WLAN to intelligent hardware by the second WLAN.The link information of this first wireless network can be input to user terminal by user, also can be by its storage inside of user terminal automatic acquisitionThe link information of the first WLAN (being for example the WLAN connecting before the second WLAN being connected to).
Step S311: the radio communication unit in intelligent hardware receives the account of the first WLAN that user terminal sendsAnd password.
Step S313: the radio communication unit in intelligent hardware is not re-used as wireless aps work, changes into as WLANClient work. The second WLAN of now being set up by the radio communication unit in intelligent hardware disappears.
Step S315: intelligent hardware is connected to the first WLAN by title and the password of the first WLAN of receiving.
Alternatively, user terminal scanning described in step S303 to S307, identify and be connected to the process of the second WLAN,Can automatically be completed by the app in user terminal completely, operate without user. Or this process also can have been operated by userBecome.
Alternatively, after step S309, user terminal disconnection is connected with the second WLAN, changes into and is connected to firstWLAN. This process can be completed by the app in user terminal completely automatically, operates without user. Or, thisProcess also can have been operated by user.
Alternatively, after step S309, user terminal sends broadcast message (for example adopting udp agreement) acquisition request intelligenceThe wireless network connection status of energy hardware. After step S315, intelligent hardware obtains receiving the request that user terminal sendsAfter getting the broadcast message of wireless network connection status, or send broadcast message (for example adopting udp agreement) or only to useFamily terminal is sent the wireless network connection status of information notification self. This process can be completely by the app in user terminal and intelligenceBetween energy hardware, automatic synchronization completes, and operates without user. Or this process also can have been operated by user.
Compared with the method for existing intelligent hardware configuration WLAN, the application's tool has the following advantages:
One, guarantees network security. The account of the first WLAN and password are by the second WLAN by user terminalPass to intelligent hardware, avoided the account of first WLAN and the risk of leakage that password transmits with broadcast mode.
Its two, be convenient to investigate fault. Suppose that user terminal can normally be connected to the first WLAN, but cannot scan and/Or be connected to the second WLAN, show that intelligent hardware breaks down. Suppose that user terminal can normally be connected to the first nothingLine LAN, and can scan and be connected to the second WLAN, but intelligent hardware finally cannot be connected to the first wireless localNet, show title and/or the password mistake of the first WLAN that user inputs, or user terminal and/or whereinApp breaks down. Based on same principle, be convenient to find fault source thereby can design more step.
With the method for above-mentioned intelligent hardware configuration WLAN accordingly, in the application's intelligent hardware, at least there is channel radioNews unit, as shown in Figure 4. Described radio communication unit is first as wireless aps work, then as the visitor of WLANFamily end (being equivalent to wireless network card) work. In the time that radio communication unit is worked as wireless aps, be used for setting up second wirelessLAN, and obtain account and the password of the first WLAN that user terminal sends by the second WLAN. When wirelessWhen communication unit is worked as the client of wireless network, be used for connecting according to the title of the first WLAN receiving and passwordReceive the first WLAN.
The method of the application's intelligence hardware configuration access rights is main accounts unique for intelligent hardware setting, and main account has accessWith whole authorities (except the authority that such as engineering mode etc. moved only for manufacturer) of controlling intelligent hardware. Described method is alsoIntelligence hardware setting zero, one or more from account, has access and/or controls all or part of of intelligent hardware from accountAuthority, from the authority of account or for setting in advance, or is arranged by main account.
Refer to Fig. 5, the application is that the method for intelligent hardware configuration access rights comprises the steps:
Step S501: intelligent hardware is accepted the access first of user terminal.
Step S503: intelligent hardware receives and preserve the ID of this user terminal input, and using this ID as main accountFamily. Main account has whole authorities of accessing and control intelligent hardware, and (such as engineering mode etc. removed only for the authority of manufacturer's operationOutward). Described ID is for example that user registers the account and the password that obtain on intelligent hardware server. With main accountThe user terminal that signs in to intelligent hardware is called first user terminal.
Step S505: intelligent hardware sends to server together with self identification and main account's ID, server by this twoPerson binds and preserves. Described intelligent hardware identifier for example has the characteristic information of uniqueness for the MAC Address of intelligent hardware etc., alsoCan add on this basis other information.
Through after above-mentioned steps, the main account information of intelligent hardware is all kept at two places: the one, and intelligent hardware inside; The 2nd, mutuallyIn the server of networking. Even if intelligent hardware generation account information memory loss, also can be by synchronous the main account information in serverIn intelligent hardware, avoid repeating to arrange main account for same intelligent hardware.
Refer to Fig. 6, the application is that the method for intelligent hardware configuration access rights also comprises the steps:
Step S601: what the app of server reception first user terminal sent is the request of intelligent hardware registration from account.
Step S603: server sends the first identifying code to first user terminal, described the first identifying code is according to being somebody's turn to do by serverIntelligence hardware identifier Query Database or carry out that computing obtains. Described the first identifying code is for example the combination of numeral and/or character,Also can be Quick Response Code etc.
Step S605: the first identifying code is passed to the second user terminal by first user terminal. For example, the first identifying code is two dimensionCode, the app on the second user terminal reads the information in Quick Response Code by taking pictures, realize the transmission of the first identifying code.
Step S607: the app in the second user terminal inquires about and/or calculates according to the first identifying code, obtains the second checkingCode. This app built-in for the database inquired about and/or the algorithm for calculating, for server, be transparent.
Step S609: server receives the second identifying code that the second user terminal sends.
Step S611: server judges that whether the intelligent hardware identifier and the second identifying code that receive be correct. If mistake, returnsError message. If correctly, send and authorize mark to the second user terminal. Intelligence hardware inside is preserved identical mandate in advanceMark.
Step S613: intelligent hardware receives mandate mark and the ID of the second user terminal input, checking authorizes mark to pass throughAfter using this ID as from account. There is all or part of authority of accessing and/or controlling intelligent hardware from account. From accountThe access at family and/or control authority can be set in advance, also can be arranged by main account.
Step S615: intelligent hardware sends to server with this by self identification together with account's ID, and server is by thisBoth bind and preserve.
Through after above-mentioned steps, each intelligent hardware be also kept at two: one from accounts information, intelligent hardware inside;The 2nd, in the server of internet. Even if there is the situations such as reset in intelligent hardware, also can be by server synchronous from accounts informationIn intelligent hardware, avoid repeating to arrange from account for same intelligent hardware.
With the method for above-mentioned intelligent hardware configuration access rights accordingly, the application's intelligent hardware comprises;
---in the time that accepting accessing first of user terminal, marks for the user who receives and preserve this user terminal input by intelligent hardwareKnow, and the first registering unit using this ID as main account;
---for sending to server to bind and preserve with main account or together with account's ID self identificationUnit.
Alternatively, described intelligent hardware also comprises mandate mark and the ID for receiving the second user terminal input, and willThis ID is as the second registering unit from account.
Delete from account as need, can have two kinds of modes. First kind of way: intelligent hardware receives first user terminal or the second useThe deletion of family terminal input is from the instruction of account, by deleting from accounts information of preserving in intelligent hardware. Then by self identification withDeleted from account's state and be synchronized to together server, now server is by this intelligence hardware and accordingly from account unbind.The second way: first user terminal or the second user terminal on server, delete that certain intelligent hardware binds from account.Then the accounts information that intelligent hardware is returned according to server sync, by deleting from account accordingly of preserving in intelligent hardware.
Compared with existing intelligent hardware configuration access rights, the method for the application intelligence hardware configuration access rights comprises tool is setHave the main account of whole authorities and only have part authority from account, can greatly promote the security of intelligent hardware. EvenHaving undelegated user to invade LAN, (is that first user terminal is to the second user terminal transmission not obtaining main account mandateThe process of the first identifying code) situation under also cannot access or control intelligent hardware, thereby guaranteed the safe operation of intelligent hardwareWith secret protection.
These are only the application's preferred embodiment, and be not used in restriction the application. For a person skilled in the art, originallyApplication can have various modifications and variations. All within the application's spirit and principle, any amendment of doing, be equal to replacement,Improve etc., within all should being included in the application's protection domain.

Claims (10)

1. a collocation method for intelligent hardware, is characterized in that, described collocation method is included as intelligent hardware configuration wireless localNet, is specially: after intelligent hardware powers on, radio communication unit is wherein as newly-built the second WLAN of wireless aps; IntelligenceThe WLAN that energy hardware is prepared to connect is called the first WLAN; User terminal scanning, identify and be connected to second wirelessLAN, also sends the link information of the first WLAN to intelligent hardware by the second WLAN; Intelligence hardware receivesAfter the link information of the first WLAN, radio communication unit is wherein connected to the first WLAN as wireless network card.
2. the collocation method of intelligent hardware according to claim 1, is characterized in that, when the first WLAN is without closeWhen code can connect, the link information of the first WLAN comprises the title of the first WLAN; When the first WLANCould connect after needing authentication password to pass through time, the link information of the first WLAN comprise the first WLAN title andPassword.
3. the collocation method of intelligent hardware according to claim 1, is characterized in that, described is that intelligent hardware configuration is wirelessIn the method for LAN, send after the link information of the first WLAN user terminal broadcast to intelligent hardware at user terminalMessage is with the wireless network connection status of acquisition request intelligence hardware; Be connected to after the first WLAN intelligence at intelligent hardwareHardware broadcast or only to user terminal send message to inform the wireless network connection status of self.
4. the collocation method of intelligent hardware according to claim 1, is characterized in that, described collocation method is also included as intelligenceEnergy hardware configuration access rights, specifically comprise: in the time that intelligent hardware is accepted the access first of user terminal, intelligent hardware receives alsoPreserve the ID of this user terminal input, and using this ID as main account; Main account has access and controls intelligenceWhole authorities of hardware; Then intelligent hardware sends to server, server together with self identification and main account's IDBy the two binding preservation.
5. the collocation method of intelligent hardware according to claim 4, is characterized in that, described is intelligent hardware configuration accessThe method of authority also comprises: first user terminal to server sends registration from the request of account, and reception server return theOne identifying code; The first identifying code is passed to the second user terminal by first user terminal; The second user terminal is according to the first identifying codeInquire about and/or calculate, obtain the second identifying code, and send to server authentication; Server authentication by and to the second intelligenceCan terminal send mandate mark; Intelligence hardware receives mandate mark and the ID of the second user terminal input, and by this userMark conduct is from account; Intelligence hardware sends to server by self identification with together with ID from account, and server is by intelligenceCan hardware and corresponding binding mutually from account.
6. the collocation method of intelligent hardware according to claim 5, is characterized in that, has access and/or controls from accountThe all or part of authority of intelligence hardware; From the access of account and/or control authority or set in advance or by main accountFamily arranges.
7. the collocation method of intelligent hardware according to claim 4, is characterized in that, described is intelligent hardware configuration accessThe method of authority also comprises: intelligent hardware receives the deletion of first user terminal or the input of the second user terminal from the instruction of account,By deleting from accounts information of preserving in intelligent hardware; Then intelligent hardware by self identification with delete from together with account's stateBe synchronized to server, now server is by this intelligence hardware and accordingly from account unbind;
Or, first user terminal or the second user terminal on server, delete that certain intelligent hardware binds from account; SoThe accounts information that rear intelligent hardware is returned according to server sync, by deleting from account accordingly of preserving in intelligent hardware.
8. an intelligent hardware, is characterized in that, has radio communication unit; Described radio communication unit is first as wireless aps workDo, be re-used as wireless network card work; In the time that radio communication unit is worked as wireless aps, be used for setting up the second WLANAnd the link information of the first WLAN sending by the second WLAN reception user terminal; When radio communication unit is doneDuring for wireless network card, be used for being connected to the first WLAN according to the link information of the first WLAN receiving.
9. intelligent hardware according to claim 8, is characterized in that, described intelligent hardware comprises;
---in the time that accepting accessing first of user terminal, marks for the user who receives and preserve this user terminal input by intelligent hardwareKnow, and the first registering unit using this ID as main account;
---for sending to server to bind and preserve with main account or together with account's ID self identificationUnit.
10. the collocation method of intelligent hardware according to claim 8, is characterized in that, described intelligent hardware also comprise forReceive mandate mark and the ID of the second user terminal input, and using this ID as the second registering unit from account.
CN201511030312.8A 2015-12-31 2015-12-31 A kind of Intelligent hardware and its configuration method Active CN105610620B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201511030312.8A CN105610620B (en) 2015-12-31 2015-12-31 A kind of Intelligent hardware and its configuration method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201511030312.8A CN105610620B (en) 2015-12-31 2015-12-31 A kind of Intelligent hardware and its configuration method

Publications (2)

Publication Number Publication Date
CN105610620A true CN105610620A (en) 2016-05-25
CN105610620B CN105610620B (en) 2019-04-16

Family

ID=55990166

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201511030312.8A Active CN105610620B (en) 2015-12-31 2015-12-31 A kind of Intelligent hardware and its configuration method

Country Status (1)

Country Link
CN (1) CN105610620B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106357653A (en) * 2016-09-27 2017-01-25 深圳市欧瑞博电子有限公司 Control authority sharing method and system
CN107659932A (en) * 2016-07-25 2018-02-02 中兴通讯股份有限公司 The method and device that a kind of equipment accesses
CN107911352A (en) * 2017-11-06 2018-04-13 湖南红手指信息技术有限公司 A kind of authorization method of cloud mobile phone
CN113923120A (en) * 2021-09-29 2022-01-11 广州鲁邦通物联网科技股份有限公司 Module ID renaming method of wireless communication module and terminal equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130346608A1 (en) * 2012-06-21 2013-12-26 Zeon Corporation Setting Method for Account ID Access Permissions and Controller
CN103929746A (en) * 2013-01-16 2014-07-16 杭州古北电子科技有限公司 Internet-surfing configuration method for equipment of Internet of things, equipment of Internet of things and user equipment
CN104079543A (en) * 2013-03-29 2014-10-01 珠海格力电器股份有限公司 Method, device and system for obtaining intelligent home system monitoring permissions
CN104283773A (en) * 2014-10-23 2015-01-14 深圳市领耀东方科技股份有限公司 System for controlling internet-of-things devices through microblog
CN104427501A (en) * 2013-09-11 2015-03-18 腾讯科技(深圳)有限公司 Network access method, device and system
CN104808501A (en) * 2015-03-31 2015-07-29 小米科技有限责任公司 Intelligent scene deleting method and device
CN104967596A (en) * 2014-10-31 2015-10-07 腾讯科技(深圳)有限公司 Method and apparatus for realizing binding and communication between user terminal and Internet of things device
CN105207994A (en) * 2015-08-17 2015-12-30 小米科技有限责任公司 Account number binding method and device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130346608A1 (en) * 2012-06-21 2013-12-26 Zeon Corporation Setting Method for Account ID Access Permissions and Controller
CN103929746A (en) * 2013-01-16 2014-07-16 杭州古北电子科技有限公司 Internet-surfing configuration method for equipment of Internet of things, equipment of Internet of things and user equipment
CN104079543A (en) * 2013-03-29 2014-10-01 珠海格力电器股份有限公司 Method, device and system for obtaining intelligent home system monitoring permissions
CN104427501A (en) * 2013-09-11 2015-03-18 腾讯科技(深圳)有限公司 Network access method, device and system
CN104283773A (en) * 2014-10-23 2015-01-14 深圳市领耀东方科技股份有限公司 System for controlling internet-of-things devices through microblog
CN104967596A (en) * 2014-10-31 2015-10-07 腾讯科技(深圳)有限公司 Method and apparatus for realizing binding and communication between user terminal and Internet of things device
CN104808501A (en) * 2015-03-31 2015-07-29 小米科技有限责任公司 Intelligent scene deleting method and device
CN105207994A (en) * 2015-08-17 2015-12-30 小米科技有限责任公司 Account number binding method and device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107659932A (en) * 2016-07-25 2018-02-02 中兴通讯股份有限公司 The method and device that a kind of equipment accesses
CN107659932B (en) * 2016-07-25 2022-05-20 中兴通讯股份有限公司 Equipment access method and device
CN106357653A (en) * 2016-09-27 2017-01-25 深圳市欧瑞博电子有限公司 Control authority sharing method and system
CN107911352A (en) * 2017-11-06 2018-04-13 湖南红手指信息技术有限公司 A kind of authorization method of cloud mobile phone
CN107911352B (en) * 2017-11-06 2020-09-08 湖南微算互联信息技术有限公司 Authorization method of cloud mobile phone
CN113923120A (en) * 2021-09-29 2022-01-11 广州鲁邦通物联网科技股份有限公司 Module ID renaming method of wireless communication module and terminal equipment
CN113923120B (en) * 2021-09-29 2023-08-18 广州鲁邦通物联网科技股份有限公司 Module ID renaming method of wireless communication module and terminal equipment

Also Published As

Publication number Publication date
CN105610620B (en) 2019-04-16

Similar Documents

Publication Publication Date Title
US10869196B2 (en) Internet access authentication method and client, and computer storage medium
CN104378145B (en) The matching method and system of bluetooth equipment
CN104966340B (en) Access control system, access control method and cloud service platform
US10177932B2 (en) Method for connecting a domestic appliance to a wireless home network, computer program product, portable communications terminal and domestic appliance
CN104767715B (en) Access control method and equipment
WO2016082417A1 (en) Device configuration method, configuration apparatus and management device
CN105282868B (en) System and method for WiFi network to be temporarily added
CN105610620A (en) Intelligent hardware and configuration method thereof
CN102075904A (en) Method and device for preventing re-authentication of roaming user
CN103329091B (en) Cross access login controller
CN106134143A (en) Method, apparatus and system for dynamic network access-in management
US20090168735A1 (en) Station, setting information managing device, wireless communication system, setting information obtaining method, computer-readable medium
CN102143492B (en) Method for establishing virtual private network (VPN) connection, mobile terminal and server
CN105743844A (en) Information processing method and electronic device
CN103874065A (en) Method and device for judging user position abnormity
US9161375B2 (en) Method for sharing access to a wireless LAN access point
US20230154259A1 (en) Method and devices for configuring electronic locks
CN105898733A (en) Machine changing method and device based on eSIM card, mobile terminal and server
US20160191482A1 (en) System and method for providing authenticated communications from a remote device to a local device
CN105392182B (en) The setting method and system of the network configuration information of WIFI equipment
US9485217B2 (en) Method for configuring network nodes of a telecommunications network, telecommunications network, program and computer program product
CN101616414A (en) Method, system and server that terminal is authenticated
CN105516974A (en) Router connection method, terminal and router
JP5327896B2 (en) Wireless LAN access point and wireless terminal connection maintaining method
CN106789843B (en) Method, PORTAL server and system for sharing internet access

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant