CN105610620B - A kind of Intelligent hardware and its configuration method - Google Patents

A kind of Intelligent hardware and its configuration method Download PDF

Info

Publication number
CN105610620B
CN105610620B CN201511030312.8A CN201511030312A CN105610620B CN 105610620 B CN105610620 B CN 105610620B CN 201511030312 A CN201511030312 A CN 201511030312A CN 105610620 B CN105610620 B CN 105610620B
Authority
CN
China
Prior art keywords
intelligent hardware
wlan
account
user terminal
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201511030312.8A
Other languages
Chinese (zh)
Other versions
CN105610620A (en
Inventor
王建方
钱先民
黄晴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tian Jia (shanghai) Mdt Infotech Ltd
Original Assignee
Tian Jia (shanghai) Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tian Jia (shanghai) Mdt Infotech Ltd filed Critical Tian Jia (shanghai) Mdt Infotech Ltd
Priority to CN201511030312.8A priority Critical patent/CN105610620B/en
Publication of CN105610620A publication Critical patent/CN105610620A/en
Application granted granted Critical
Publication of CN105610620B publication Critical patent/CN105610620B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

This application discloses a kind of configuration methods of Intelligent hardware, including configure wireless network for Intelligent hardware, specifically: after Intelligent hardware powers on, wireless communication unit therein creates the second WLAN as wireless aps;The WLAN that Intelligent hardware prepares connection is known as the first WLAN;User terminal scanning identifies and is connected to the second WLAN, also sends the link information of the first WLAN to Intelligent hardware by the second WLAN;After Intelligent hardware receives the link information of the first WLAN, wireless communication unit therein is connected to the first WLAN as wireless network card.The application makes Intelligent hardware not leak wifi account and password when configuring wireless network, and is convenient for malfunction elimination;Also make Intelligent hardware only and allow the primary account number authorized and from account access and/or control, so that it is guaranteed that the safe operation and secret protection of Intelligent hardware.

Description

A kind of Intelligent hardware and its configuration method
Technical field
This application involves a kind of Intelligent hardware (Intelligent Hardware).
Background technique
Conventional hardware is transformed using technologies such as sensor, controller, actuator, network communications, makes it have intelligence The feature of energyization becomes as Intelligent hardware.For example, conventional socket is only used for powering, some intelligent sockets then can be vertical according to instruction Even powering or powering off in given time.
Intelligent hardware generally requires connection wireless network (wireless network).Common wireless network includes wireless Personal net (WPAN), WLAN (WLAN), wireless MAN (WMAN), mobile communication network etc..Intelligent hardware most often makes It is the WLAN with Wi-Fi (also making WiFi) for representative.Referring to Fig. 1, this is existing Intelligent hardware configuration nothing The method of line local area network, includes the following steps:
Step S101: Intelligent hardware powers on, client operation of the wireless communication unit therein as WLAN, i.e., It is equivalent to one piece of wireless network card work.
Step S103: user terminal (mobile phone, tablet computer, intelligent remote controller etc.) receives the WLAN of user's input The title and password of (such as WiFi network of wireless router offer).The title of the WLAN is, for example, WiFi network SSID (Service Set Identifier, service set).Some WLANs can be connected without password, another A little WLANs are then needed to verify after password passes through and could be connected.
Step S105: the WLAN title and password of user terminal overseas broadcast user input.
Step S107: the wireless communication unit in Intelligent hardware receive user terminal broadcast WLAN title and Password.
Step S109: Intelligent hardware passes through the WLAN title received and password is connected to the WLAN.
The method of above-mentioned Intelligent hardware configuration WLAN exists following insufficient:
First, network security risk.The account and password of wireless network are to pass to intelligence by user terminal with broadcast mode Energy hardware, this makes the account of wireless network and password, and there are risk of leakage.
Second, malfunction elimination is difficult.If Intelligent hardware finally cannot connect to WLAN, it would be possible that being intelligence Hardware breaks down, it is also possible to the account and password mistake of user's input, it is also possible to user terminal and/or app therein (application) breaks down, and no technological means can be used for searching failure.
With above-mentioned Intelligent hardware configuration WLAN method correspondingly, in existing Intelligent hardware at least have nothing Line communication unit, as shown in Figure 2.The wireless communication unit is only used as the client operation of WLAN, on the one hand receives On the other hand the title and password for the WLAN that user terminal is issued with the forms of broadcasting utilize the WLAN received Title and password are connected to the WLAN.
After being connected to WLAN, the user terminal in same local area network can visit existing Intelligent hardware It asks, configure Intelligent hardware, this just brings security risk.Once someone has cracked the account and password of WLAN, so that it may Easily to obtain the relevant information of Intelligent hardware, or even the operation of control Intelligent hardware.
Summary of the invention
The technical problem to be solved by the application is to provide a kind of Intelligent hardware configuration WLAN and user rights Method evades the security risk of existing configuration method.For this purpose, the application also provides a kind of corresponding Intelligent hardware.
In order to solve the above technical problems, the configuration method of the application Intelligent hardware includes configuring wireless local area for Intelligent hardware Net, specifically: after Intelligent hardware powers on, wireless communication unit therein is first used as wireless aps to create the second WLAN; The WLAN that Intelligent hardware prepares connection is known as the first WLAN;User terminal scanning identifies and is connected to second WLAN also sends the link information of the first WLAN by the second WLAN to Intelligent hardware;Intelligence is hard After part receives the link information of the first WLAN, wireless communication unit therein is connected to the first nothing as wireless network card Line local area network.When the first WLAN can be connected without password, the link information of the first WLAN includes first The title of WLAN.When the first WLAN, which needs to verify, could connect after password passes through, the first WLAN Link information include the first WLAN title and password.
The application Intelligent hardware has wireless communication unit;The wireless communication unit is first used as wireless aps to work, and remakes For wireless network card work;When wireless communication unit works as wireless aps, for establishing the second WLAN and by the Two WLANs receive the link information for the first WLAN that user terminal issues;When wireless communication unit is as wireless When network interface card works, for being connected to the first WLAN according to the link information of the first WLAN received.
What the application obtained has the technical effect that so that Intelligent hardware will not leak the first wireless local area when configuring wireless network The link information of net, and it is convenient for malfunction elimination.Intelligent hardware is powered on to be scanned by the APP in user terminal afterwards and be arrived, Improve user experience.The application also makes Intelligent hardware only and allows the main account authorized and from account access and/or control, thus Ensure the safe operation and secret protection of Intelligent hardware.
Detailed description of the invention
Fig. 1 is a kind of method flow diagram of existing Intelligent hardware configuration WLAN.
Fig. 2 is a kind of structural schematic diagram of existing Intelligent hardware.
Fig. 3 is the method flow diagram of the Intelligent hardware configuration WLAN of the application.
Fig. 4 is the structural schematic diagram of the Intelligent hardware of the application.
Fig. 5 is the method flow diagram one of the Intelligent hardware configuration access permission of the application.
Fig. 6 is the method flow diagram two of the Intelligent hardware configuration access permission of the application.
Specific embodiment
Referring to Fig. 3, this is the method for the Intelligent hardware configuration WLAN of the application, include the following steps:
Step S301: Intelligent hardware powers on, and wireless communication unit therein is as wireless aps (access point, access Point) work, create the second WLAN.For table difference, Intelligent hardware is wished that the WLAN of connection is known as the first nothing Line local area network.
Preferably, the title of the second WLAN either preset and informs user (such as be printed on intelligence firmly In the specification of part), or (such as have with the product category, title, trade mark etc. with Intelligent hardware with significant mark The specific character of pass) in order to user's identification.
Second WLAN, which is either not necessarily to password, to be connected, or needs to verify after password passes through and could connect It connects.When the second WLAN, which needs to verify, could connect after password passes through, which is also to preset and inform user 's.
Step S303: user terminal passes through the wireless communication unit Wlan scanning of itself.
Step S305: user terminal scans and identifies the second WLAN that Intelligent hardware is established.
Step S307: user terminal by the wireless communication unit of itself be connected to that Intelligent hardware established it is second wireless Local area network.
Step S309: user terminal sends the connection of the first WLAN by the second WLAN to Intelligent hardware Information.The link information of first wireless network can be input to user terminal by user, can also obtain automatically it by user terminal The first WLAN (WLAN e.g. connected before being connected to the second WLAN) of storage inside Link information.
Step S311: the wireless communication unit in Intelligent hardware receives the first WLAN transmitted by user terminal Account and password.
Step S313: the wireless communication unit in Intelligent hardware is not re-used as wireless aps work, is changed to as wireless local area The client operation of net.It is disappeared at this time by the second WLAN that the wireless communication unit in Intelligent hardware is established.
Step S315: Intelligent hardware passes through the title of the first WLAN received and password is connected to first wirelessly Local area network.
Optionally, user terminal described in step S303 to S307 scans, identifies and be connected to the second WLAN Process can be automatically performed by the app in user terminal completely, be not necessarily to user's operation.Alternatively, this process can also be grasped by user It completes.
Optionally, after step S309, user terminal disconnect with the connection of the second WLAN, instead connect to the One WLAN.This process can be automatically performed by the app in user terminal completely, be not necessarily to user's operation.Alternatively, this Process can also be completed by user's operation.
Optionally, after step S309, user terminal issues broadcast message (for example, by using udp agreement) request intelligence The wireless network connection state of energy hardware.After the step s 315, Intelligent hardware is obtained in the request for receiving user terminal sending After the broadcast message for taking wireless network connection state, either issue broadcast message (for example, by using udp agreement) or only to Family terminal issues the wireless network connection state that information informs itself.This process can completely by user terminal app with Automatic synchronization is completed between Intelligent hardware, is not necessarily to user's operation.Alternatively, this process can also be completed by user's operation.
Compared with the method for existing Intelligent hardware configuration WLAN, the application is had the advantages that
One, it is ensured that network security.The account and password of first WLAN are wireless by second by user terminal Local area network passes to Intelligent hardware, avoids the leakage wind that account and the password of the first WLAN are transmitted with broadcast mode Danger.
Second, convenient for investigation failure.It is assumed that user terminal can just be often connected to the first WLAN, but can not scan And/or be connected to the second WLAN, that is, show that Intelligent hardware breaks down.It is assumed that user terminal can just be often connected to One WLAN, and the second WLAN can be scanned and be connected to, but Intelligent hardware finally cannot connect to the first nothing Line local area network, that is, show the first WLAN of user's input title and/or password mistake or user terminal and/ Or in which app break down.Based on same principle, more steps can be designed consequently facilitating finding failure source.
With above-mentioned Intelligent hardware configuration WLAN method correspondingly, at least have in the Intelligent hardware of the application Wireless communication unit, as shown in Figure 4.The wireless communication unit is used as wireless aps to work first, is then used as WLAN Client (that is, wireless network card) work.When wireless communication unit works as wireless aps, for establishing the second nothing Line local area network, and the account and password of the first WLAN issued by the second WLAN acquisition user terminal.When When client operation of the wireless communication unit as wireless network, for according to the title of the first WLAN received and Password is connected to the first WLAN.
The method of the application Intelligent hardware configuration access permission is that unique main account is arranged for Intelligent hardware, main account tool There is access and control whole permissions of Intelligent hardware (such as except the permission of engineering mode Deng Jinxian manufacturer operation).The side Method is also Intelligent hardware setting zero, one or more wholes from account, from account with access and/or control Intelligent hardware Or part permission, it is perhaps to preset or be arranged by main account from the permission of account.
Referring to Fig. 5, the method that the application is Intelligent hardware configuration access permission includes the following steps:
Step S501: Intelligent hardware receives the access for the first time of user terminal.
Step S503: Intelligent hardware receives and saves the user identifier of user terminal input, and the user identifier is made For main account.Main account has whole permissions (such as engineering mode Deng Jinxian manufacturer operation for accessing and controlling Intelligent hardware Permission except).The user identifier is, for example, the account and password that user is registered on Intelligent hardware server. It is known as the first user terminal with the user terminal that main account logs on to Intelligent hardware.
Step S505: the user identifier of self identification and main account are sent jointly to server, server by Intelligent hardware The two is bound and saved.The features with uniqueness such as the Intelligent hardware mark for example, MAC Address of Intelligent hardware Information can also add other information on this basis.
After above-mentioned steps, the main account information of Intelligent hardware is maintained at two: first is that inside Intelligent hardware;Two It is in the server of internet.Even if account information memory loss occurs for Intelligent hardware, the main account in server can also be believed Breath is synchronized in Intelligent hardware, avoids repeating setting main account for same Intelligent hardware.
Referring to Fig. 6, the method that the application is Intelligent hardware configuration access permission further includes following steps:
Step S601: the app sending that server receives the first user terminal is request of the Intelligent hardware registration from account.
Step S603: server sends the first identifying code to the first user terminal, and first identifying code is by server Inquiry database is identified according to the Intelligent hardware or carries out what operation obtained.First identifying code is, for example, number and/or word The combination of symbol can also be two dimensional code etc..
First identifying code is passed to second user terminal by the S605: the first user terminal of step.For example, the first identifying code is Two dimensional code, the app in second user terminal realize the transmitting of the first identifying code by the information read in two dimensional code of taking pictures.
Step S607: the app in second user terminal is inquired and/or is calculated according to the first identifying code, obtains second Identifying code.The algorithm for the database of inquiry and/or for calculating built in the app, is transparent for server.
Step S609: server receives the second identifying code that second user terminal issues.
Step S611: whether the Intelligent hardware mark and the second identifying code that server judgement receives are correct.If mistake Then return to error message.Authorization mark is sent to second user terminal if correct.Phase has been pre-saved inside Intelligent hardware Same authorization mark.
Step S613: Intelligent hardware receives the authorization mark and user identifier of second user terminal input, verifying authorization mark Knowledge pass through after using the user identifier as from account.There is all or part of power for accessing and/or controlling Intelligent hardware from account Limit.Access and/or control authority from account can be it is pre-set, can also be configured by main account.
Step S615: Intelligent hardware is by self identification and should send jointly to server from the user identifier of account, services The two is bound and is saved by device.
After above-mentioned steps, the slave account information of each Intelligent hardware is also stored at two: first is that Intelligent hardware It is internal;Second is that in the server of internet.Even if situations such as Intelligent hardware resets, the slave account in server can also be believed Breath is synchronized in Intelligent hardware, avoids repeating setting for same Intelligent hardware from account.
With the method for above-mentioned Intelligent hardware configuration access permission correspondingly, the Intelligent hardware of the application includes;
--- when Intelligent hardware receives the access for the first time of user terminal for receiving and saving user terminal input User identifier, and using the user identifier as the first registering unit of main account;
--- for by self identification and main account or sending jointly to server from the user identifier of account and binding With the unit of preservation.
Optionally, the Intelligent hardware further includes the authorization mark and user's mark for receiving the input of second user terminal Know, and using the user identifier as the second registering unit from account.
It, can be there are two types of mode if you need to delete from account.First way: Intelligent hardware receives the first user terminal or the The deletion of two user terminals input deletes the slave account information saved in Intelligent hardware from the instruction of account.Then by itself Mark is synchronized to server with having deleted together with the state of account, at this time server by the Intelligent hardware with corresponding from account It is unbinding.The second way: the first user terminal or second user terminal are deleted some Intelligent hardware on the server and are tied up Fixed slave account.Then the account information that Intelligent hardware is returned according to server sync, it is corresponding by what is saved in Intelligent hardware It is deleted from account.
Compared with existing Intelligent hardware configuration access permission, the method for the application Intelligent hardware configuration access permission includes Main account with whole permissions is set and only there is the slave account of part permission, can greatly promote the safety of Intelligent hardware Property.Even if there is the user of unauthorized to invade local area network, not obtaining main account authorization, (i.e. the first user terminal is to second user Terminal transmit the first identifying code process) in the case where also can not access or control Intelligent hardware, ensure that Intelligent hardware Safe operation and secret protection.
The above is only preferred embodiment of the present application, it is not used to limit the application.Come for those skilled in the art It says, various changes and changes are possible in this application.Within the spirit and principles of this application, made any modification, equivalent Replacement, improvement etc., should be included within the scope of protection of this application.

Claims (6)

1. a kind of configuration method of Intelligent hardware, characterized in that the configuration method includes configuring wireless local area for Intelligent hardware Net, specifically: after Intelligent hardware powers on, wireless communication unit therein creates the second WLAN as wireless aps;Intelligence The WLAN that hardware prepares connection is known as the first WLAN;User terminal scanning identifies and is connected to second wirelessly Local area network also sends the link information of the first WLAN by the second WLAN to Intelligent hardware;Intelligent hardware connects After the link information for receiving the first WLAN, wireless communication unit therein is connected to the first wireless office as wireless network card Domain net;
The configuration method further includes specifically including: receiving user terminal in Intelligent hardware for Intelligent hardware configuration access permission Access for the first time when, Intelligent hardware receive and save the user terminal input user identifier, and using the user identifier as lead Account;Main account has the whole permissions for accessing and controlling Intelligent hardware;Then Intelligent hardware is by self identification with main account's User identifier sends jointly to server, and the two is bound and saved by server;First user terminal is issued to server and is infused Volume receives the first identifying code of server return from the request of account;First identifying code is passed to by the first user terminal Two user terminals;Second user terminal is inquired and/or is calculated according to the first identifying code, obtains the second identifying code, and send To server authentication;Server authentication passes through and issues authorization mark to the second intelligent terminal;Intelligent hardware receives second user The authorization mark and user identifier of terminal input, and using the user identifier as from account;Intelligent hardware by self identification with from The user identifier of account sends jointly to server, and server mutually binds Intelligent hardware with corresponding from account.
2. the configuration method of Intelligent hardware according to claim 1, characterized in that when the first WLAN is not necessarily to password When can connect, the link information of the first WLAN includes the title of the first WLAN;When the first WLAN It needs to verify when could be connected after password passes through, the link information of the first WLAN includes the title of the first WLAN And password.
3. the configuration method of Intelligent hardware according to claim 1, characterized in that described to configure wireless office for Intelligent hardware In the method for domain net, after user terminal sends the link information of the first WLAN to Intelligent hardware, user terminal broadcast Message is with the wireless network connection state of request Intelligent hardware;After Intelligent hardware is connected to the first WLAN, intelligence Energy hardware broadcast message only sends message to user terminal to inform the wireless network connection state of itself.
4. the configuration method of Intelligent hardware according to claim 1, characterized in that there is access and/or control from account All or part of permission of Intelligent hardware;Access and/or control authority from account are either pre-set or by main account Family is configured.
5. the configuration method of Intelligent hardware according to claim 1, characterized in that described to be weighed for Intelligent hardware configuration access The method of limit further include: Intelligent hardware receives the deletion of the first user terminal or the input of second user terminal from the instruction of account, The slave account information saved in Intelligent hardware is deleted;Then Intelligent hardware by self identification and has deleted the state one from account Rise be synchronized to server, at this time server by the Intelligent hardware with it is corresponding unbinding from account;
Alternatively, the first user terminal or second user terminal delete slave account bound in some Intelligent hardware on the server; Then the account information that Intelligent hardware is returned according to server sync, it is corresponding from account deletion by what is saved in Intelligent hardware.
6. a kind of Intelligent hardware, characterized in that have wireless communication unit;The wireless communication unit is first used as wireless aps work Make, is re-used as wireless network card work;When wireless communication unit as wireless aps work when, for establish the second WLAN and The link information for the first WLAN that user terminal issues is received by the second WLAN;When wireless communication unit is made When for wireless network card, for being connected to the first WLAN according to the link information of the first WLAN received;
The Intelligent hardware further includes;
--- receive the user of user terminal inputted when accessing for the first time for receiving and saving the user terminal in Intelligent hardware Mark, and using the user identifier as the first registering unit of main account;
--- for by self identification and main account or sending jointly to server from the user identifier of account and binding and protect The unit deposited;
--- for receiving the authorization mark and user identifier of the input of second user terminal, and using the user identifier as from account Family, and self identification and the user identifier from account are sent jointly into the second registering unit that service is bound and saved; The authorization mark of the second user terminal is to issue request of the registration from account from the first user terminal to server, and receive The first identifying code that server returns;First identifying code is passed to second user terminal by the first user terminal;Second user is whole End is inquired and/or is calculated according to the first identifying code, obtains the second identifying code, and be sent to server authentication;Server is tested Card is by issuing to the second intelligent terminal.
CN201511030312.8A 2015-12-31 2015-12-31 A kind of Intelligent hardware and its configuration method Active CN105610620B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201511030312.8A CN105610620B (en) 2015-12-31 2015-12-31 A kind of Intelligent hardware and its configuration method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201511030312.8A CN105610620B (en) 2015-12-31 2015-12-31 A kind of Intelligent hardware and its configuration method

Publications (2)

Publication Number Publication Date
CN105610620A CN105610620A (en) 2016-05-25
CN105610620B true CN105610620B (en) 2019-04-16

Family

ID=55990166

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201511030312.8A Active CN105610620B (en) 2015-12-31 2015-12-31 A kind of Intelligent hardware and its configuration method

Country Status (1)

Country Link
CN (1) CN105610620B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107659932B (en) * 2016-07-25 2022-05-20 中兴通讯股份有限公司 Equipment access method and device
CN106357653A (en) * 2016-09-27 2017-01-25 深圳市欧瑞博电子有限公司 Control authority sharing method and system
CN107911352B (en) * 2017-11-06 2020-09-08 湖南微算互联信息技术有限公司 Authorization method of cloud mobile phone
CN113923120B (en) * 2021-09-29 2023-08-18 广州鲁邦通物联网科技股份有限公司 Module ID renaming method of wireless communication module and terminal equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103929746A (en) * 2013-01-16 2014-07-16 杭州古北电子科技有限公司 Internet-surfing configuration method for equipment of Internet of things, equipment of Internet of things and user equipment
CN104079543A (en) * 2013-03-29 2014-10-01 珠海格力电器股份有限公司 Method, device and system for obtaining intelligent home system monitoring permissions
CN104283773A (en) * 2014-10-23 2015-01-14 深圳市领耀东方科技股份有限公司 System for controlling internet-of-things devices through microblog
CN104427501A (en) * 2013-09-11 2015-03-18 腾讯科技(深圳)有限公司 Network access method, device and system
CN104808501A (en) * 2015-03-31 2015-07-29 小米科技有限责任公司 Intelligent scene deleting method and device
CN104967596A (en) * 2014-10-31 2015-10-07 腾讯科技(深圳)有限公司 Method and apparatus for realizing binding and communication between user terminal and Internet of things device
CN105207994A (en) * 2015-08-17 2015-12-30 小米科技有限责任公司 Account number binding method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103516514B (en) * 2012-06-21 2016-10-12 棣南股份有限公司 The establishing method of account access rights and control device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103929746A (en) * 2013-01-16 2014-07-16 杭州古北电子科技有限公司 Internet-surfing configuration method for equipment of Internet of things, equipment of Internet of things and user equipment
CN104079543A (en) * 2013-03-29 2014-10-01 珠海格力电器股份有限公司 Method, device and system for obtaining intelligent home system monitoring permissions
CN104427501A (en) * 2013-09-11 2015-03-18 腾讯科技(深圳)有限公司 Network access method, device and system
CN104283773A (en) * 2014-10-23 2015-01-14 深圳市领耀东方科技股份有限公司 System for controlling internet-of-things devices through microblog
CN104967596A (en) * 2014-10-31 2015-10-07 腾讯科技(深圳)有限公司 Method and apparatus for realizing binding and communication between user terminal and Internet of things device
CN104808501A (en) * 2015-03-31 2015-07-29 小米科技有限责任公司 Intelligent scene deleting method and device
CN105207994A (en) * 2015-08-17 2015-12-30 小米科技有限责任公司 Account number binding method and device

Also Published As

Publication number Publication date
CN105610620A (en) 2016-05-25

Similar Documents

Publication Publication Date Title
KR101551315B1 (en) Using a mobile device to enable another device to connect to a wireless network
CN108259164B (en) Identity authentication method and equipment of Internet of things equipment
CN105610620B (en) A kind of Intelligent hardware and its configuration method
EP3748928A1 (en) Method and system for apparatus awaiting network configuration to access hot spot network apparatus
EP3100472B1 (en) A method for commissioning and joining of a field device to a network
CN104767715A (en) Network access control method and equipment
EP1760945A2 (en) Wireless LAN security system and method
EP2876855A1 (en) Mobile wireless access and establishment of virtual private network
CN104157029A (en) Access control system, mobile terminal based control method thereof and mobile terminal
CN105282865A (en) Device pairing
DK2924944T3 (en) Presence authentication
JP2006345205A (en) Wireless lan connection control method, wireless lan connection control system, and setting wireless relay device
CN102143492B (en) Method for establishing virtual private network (VPN) connection, mobile terminal and server
CN105635094A (en) Security authentication method, security authentication device and security verification system
CN108243413B (en) Method and system for wireless access to railway information network
CN105050086B (en) A kind of method that terminal logs in Wifi hot spot
CN103329091A (en) Cross access login controller
KR101722696B1 (en) Home energy management apparatus and method using the beacon on the home energy management system
US20230154259A1 (en) Method and devices for configuring electronic locks
WO2019215439A1 (en) Methods and apparatus for authenticating devices
CN101616414A (en) Method, system and server that terminal is authenticated
US20150229608A1 (en) Method for configuring network nodes of a telecommunications network, telecommunications network, program and computer program product
CN105516974A (en) Router connection method, terminal and router
US10601824B2 (en) Provision of access to a network
CN104518874A (en) Network access control method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant