CN105871821A - Device binding method - Google Patents
Device binding method Download PDFInfo
- Publication number
- CN105871821A CN105871821A CN201610172507.4A CN201610172507A CN105871821A CN 105871821 A CN105871821 A CN 105871821A CN 201610172507 A CN201610172507 A CN 201610172507A CN 105871821 A CN105871821 A CN 105871821A
- Authority
- CN
- China
- Prior art keywords
- binding
- bound
- cloud server
- target
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a device binding method. The method comprises the following steps: a cloud server receives a binding request to a target bound end, wherein the binding request is transmitted by a first binding end, and comprises identifier information of the target bound end; if the cloud server inquires and determines that the target bound end corresponding to the binding request satisfies a set binding condition, the cloud server binds the first binding end with the target bound end; the cloud server records corresponding binding information of the first binding end and the target bound end, and transmits an access identifier of the target bound end to the first binding end so as to realize access of the first binding end to the target bound end. The scheme realizes safe binding between the binding end and the target bound end in an Internet of Things device.
Description
Technical field
The present embodiments relate to technology of Internet of things, a kind of method particularly relating to apparatus bound.
Background technology
Internet of Things is the important component part of generation information technology, is also the important development rank of information age
Section.As its name suggests, Internet of Things is exactly the internet that thing thing is connected.The core of Internet of Things and basis remain mutual
Networking, is the extension on Internet basic and extension, and extend and extend to any article and article it
Between carry out information exchange and communicate, namely thing thing ceases mutually.Internet of Things by Intellisense, identify technology with
The communication cognition technology such as general fit calculation, is widely used in the fusion of network, is the most therefore referred to as world information
The third wave of industry development.
In prior art, the bound end of target in internet of things equipment can connect without in the case of authorizing
Being bound by binding end, thus bring potential safety hazard, end as bound in target performs evil after illegally binding
Meaning operation.
Summary of the invention
The present invention provides a kind of method of apparatus bound, it is to avoid the bound end of target brings due to dangerous binding
Malicious operation, it is achieved that the secure binding of the bound end of target.
First aspect, a kind of method embodiments providing apparatus bound, including:
Cloud server first binds the bind request of the end bound to target that end sends, wherein, described
Bind request includes the identification information of the bound end of described target;
Set if the inquiry of described Cloud Server determines that the bound end of described target corresponding to described bind request meets
Surely bind condition, then described first binding end end bound with described target is bound;
The binding information that first binding end end bound with described target described in described Cloud Server record is corresponding,
And the most described first binding end of access identities sending the bound end of described target, to realize described first binding
Hold the access of end bound to described target.
Second aspect, the embodiment of the present invention additionally provides a kind of method of apparatus bound, including:
First binding end sends the bind request of end bound to target, wherein, described binding to Cloud Server
Request includes the identification information of the bound end of described target;
Described first binding end receives the access identities of the bound end of described target that described Cloud Server returns,
And conduct interviews according to described access identities end bound to described target.
The third aspect, the embodiment of the present invention additionally provides a kind of apparatus bound method, including:
The bound end of target sends the request of activation to Cloud Server;
The bound end of described target receives the access identities that described Cloud Server returns, and wherein, described access is marked
Know and ask to generate by described activation for described Cloud Server;
The bound end of described target sends binding function and opens request extremely described Cloud Server, so that described cloud clothes
Business device, during being not detected by terminating binding trigger condition, opens the binding merit of the bound end of described target
Energy;
The bound end of described target receives the mark to be verified that the first binding end sends, and at described mark to be verified
When knowing consistent with described access identities, accept the access of described first binding end.
Fourth aspect, the embodiment of the present invention additionally provides a kind of method of apparatus bound, including:
First binding end sends bind request to the bound end of target, and wherein, described bind request includes described
The bound secret of the bound end of target;
Described first binding end receives the access identities that the bound end of described target returns, and according to described access
Identify end bound to described target to conduct interviews.
5th aspect, the embodiment of the present invention additionally provides a kind of method of apparatus bound, including:
The bound end of target sends the request of activation to Cloud Server;
The bound end of described target receives the access identities that described Cloud Server returns, and wherein, described access is marked
Know and ask to generate by described activation for described Cloud Server;
The bound end of described target receives the password to be verified that the first binding end sends, and described to be verified close
When code is consistent with the bound secret preset, send described access identities to described first binding end;
The bound end of described target receives the mark to be verified that the first binding end sends, and at described mark to be verified
When knowing consistent with described access identities, accept the access of described first binding end.
6th aspect, the embodiment of the present invention additionally provides the Cloud Server of a kind of apparatus bound, including:
First bind request receiver module, for described cloud server first bind end send to target
The bind request of bound end, wherein, described bind request includes the mark letter of the bound end of described target
Breath;
For the inquiry of described Cloud Server, binding condition query module, if determining that described bind request is corresponding
The bound end of described target meets the binding condition that sets, then by bound with described target for described first binding end
End is bound;
First access identities sending module, for the first binding end and described mesh described in described Cloud Server record
Mark the binding information that bound end is corresponding, and send the access identities of the bound end of described target to described first
Binding end, to realize the access of described first binding end end bound to described target.
7th aspect, the embodiment of the present invention additionally provides the binding end of a kind of apparatus bound, including:
First bind request sending module, sends end bound to target for the first binding end to Cloud Server
Bind request, wherein, described bind request includes the identification information of the bound end of described target;
First access identities receiver module, receives, for described first binding end, the institute that described Cloud Server returns
State the access identities of the bound end of target, and visit according to described access identities end bound to described target
Ask.
Eighth aspect, the embodiment of the present invention additionally provides the bound end of target of a kind of apparatus bound, including:
Activate request sending module, send the request of activation to Cloud Server for the bound end of target;
Second access identities receiver module, receives what described Cloud Server returned for the bound end of described target
Access identities, wherein, described access identities is that described Cloud Server activates request generation by described;
Binding function opens request sending module, and sending binding function unlatching for the bound end of described target please
Ask to described Cloud Server, so that described Cloud Server is during being not detected by terminating binding trigger condition,
Open the binding function of the bound end of described target;
Access receiver module, receive, for the bound end of described target, the mark to be verified that the first binding end sends,
And when described mark to be verified is consistent with described access identities, accept the access of described first binding end.
9th aspect, the embodiment of the present invention additionally provides the binding end of a kind of apparatus bound, including:
Cryptographic binding request sending module, sends bind request for the first binding end to the bound end of target,
Wherein, described bind request includes the bound secret of the bound end of described target;
Cryptographic binding access identities receiver module, receives the bound end of described target for described first binding end
The access identities returned, and conduct interviews according to described access identities end bound to described target.
Tenth aspect, the embodiment of the present invention additionally provides the bound end of target of a kind of apparatus bound, including:
Activate request sending module, send the request of activation to Cloud Server for the bound end of target;
Second access identities receiver module, receives what described Cloud Server returned for the bound end of described target
Access identities, wherein, described access identities is that described Cloud Server activates request generation by described;
Cryptographic binding request accepts module, receives treating of the first binding end transmission for the bound end of described target
Checking password, and when described password to be verified is consistent with the bound secret preset, to described first binding
End sends described access identities;
Access receiver module, receive, for the bound end of described target, the mark to be verified that the first binding end sends,
And when described mark to be verified is consistent with described access identities, accept the access of described first binding end.
The present invention binds the bind request of the end bound to target that end sends by cloud server first
After, if inquiry determines the bound end of the target satisfied setting binding condition that bind request is corresponding, then by first
Binding end end bound with target is bound, and Cloud Server then records the first binding end and the bound end of target
Corresponding binding information, and send the access identities of the bound end of target to the first binding end, to realize first
The access of binding end end bound to described target, solve the bound end of target in internet of things equipment without
The problem crossing the i.e. acceptable binding binding end in the case of authorizing and bring potential safety hazard, it is achieved that binding end
The secure binding of end bound with target.
Accompanying drawing explanation
Fig. 1 is the flow chart of the apparatus bound method that the embodiment of the present invention one provides;
Fig. 2 is the flow chart of the apparatus bound method that the embodiment of the present invention two provides;
Fig. 3 is the flow chart of the apparatus bound method that the embodiment of the present invention three provides;
Fig. 4 is the flow chart of the apparatus bound method that the embodiment of the present invention four provides;
Fig. 5 is the flow chart of the apparatus bound method that the embodiment of the present invention five provides;
Fig. 6 is the structured flowchart of the Cloud Server of the apparatus bound that the embodiment of the present invention six provides;
Fig. 7 is the structured flowchart of the binding end of the apparatus bound that the embodiment of the present invention seven provides;
Fig. 8 is the structured flowchart of the bound end of target of the apparatus bound that the embodiment of the present invention eight provides;
Fig. 9 is the structured flowchart of the binding end of the apparatus bound that the embodiment of the present invention nine provides;
Figure 10 is the structured flowchart of the bound end of target of the apparatus bound that the embodiment of the present invention ten provides.
Detailed description of the invention
The present invention is described in further detail with embodiment below in conjunction with the accompanying drawings.It is understood that this
Specific embodiment described by place is used only for explaining the present invention, rather than limitation of the invention.The most also need
It is noted that for the ease of describing, accompanying drawing illustrate only part related to the present invention and not all knot
Structure.
Embodiment one
The flow chart of the apparatus bound method that Fig. 1 provides for the embodiment of the present invention one, the present embodiment is applicable to
Carrying out situation about binding between internet of things equipment, the method can be performed by Cloud Server, specifically include as
Lower step:
Step 101, cloud server first binds the bind request of the end bound to target that end sends,
Wherein, described bind request includes the identification information of the bound end of described target.
Wherein, Cloud Server can receive the bind request that multiple binding end sends, in each bind request all
Containing the identification information of the bound end of corresponding target, binding end is typically smart mobile phone, panel computer
Or customization controls terminal, target bound end typically air-conditioning, refrigerator, light switch etc. possess circuit control
The internet of things equipment of system.The mark of the bound end of this target can be the title of the bound end of target, Quick Response Code,
Bar code or self-defining character string etc., in order to uniquely to determine the equipment of the bound end of this target, binding end obtains
The mode of target bound end mark is typically include and is manually entered, scans, images or network acquisition online etc..
Binding end and the bound end of target carry out in binding procedure, and first Cloud Server receives tying up of this binding end transmission
Fixed request.
If the inquiry of step 102, Cloud Server determines the satisfied setting of the bound end of target that bind request is corresponding
Binding condition, then bind the first binding end end bound with target.
Wherein, when binding, it is the fullest that Cloud Server needs to inquire about the bound end of target corresponding to bind request
The binding condition that foot sets, Cloud Server can be by the record information in inquiry comparison data storehouse to determine binding
Whether condition meets, and can carry out binding end and the binding of bound end when meeting when imposing a condition.If setting
Binding condition can not meet, and does not the most carry out binding end and the binding of the bound end of target, can send binding simultaneously
Failed information.
Typically, binding condition may include that bound end open binding function, or bound end not by
Bound in arbitrary binding end, or meet above-mentioned bound end simultaneously and open binding function and bound end not
Bound in arbitrary binding end.
The binding information that end end bound with target is corresponding bound in step 103, Cloud Server record first, and
The access identities sending the bound end of target binds end to first, bound to target to realize the first binding end
The access of end.
Wherein, binding end only obtains the access identities of the bound end of target and just can carry out bound to target
The access of end, this access identities typically only exists Cloud Server, binds between end and the bound end of target,
Concrete operations personnel are not required to carry out special operational for this access identities.Binding information typically records
In the database of Cloud Server.
The technical scheme of the present embodiment, solves the bound end of target in internet of things equipment without mandate
In the case of the binding of i.e. acceptable binding end and the problem of bringing potential safety hazard, it is achieved that binding end and target quilt
The secure binding of binding end.
On the basis of technique scheme, set binding condition and may include that the unlatching of target bound end is tied up
Determine function, and the bound end of target is not bound by arbitrary binding end;Accordingly, at Cloud Server record first
Binding binding information corresponding to end end bound with target, and send the access identities of the bound end of target to the
After one binding end, also include: cloud server second binds the end bound to described target that end sends
Bind request;If Cloud Server inquiry determines that the bound end of target opens binding function, and target is tied up
Fixed end is bound by the first binding end, then send binding authorization requests and bind end to first, and wherein, binding authorizes
Request includes the identification information of the second binding end;If Cloud Server receives the confirmation that the first binding end returns
Authorization response, then bind the second binding end end bound with target.
Wherein, the binding function of the bound end of target typically can be opened by the bound end of target self and also may be used
Being opened by Cloud Server, after binding function is opened, Cloud Server can identify the bound end of this target and be in
Can binding state.
Wherein, when the first binding end and the bound end of target have been bound complete, and i.e. the bound end of target is
When binding has binding end, the bind request that cloud server sends to remaining binding end, in this programme
During the bind request that the second binding end sends, determine that the bound end of target opens binding function, then by inquiry
Send binding authorization requests to the first binding end.Now, if the second binding end carries out end bound with target
Binding needs to obtain the mandate of the first binding end.When after the authorization response of cloud server to first binding end
Again the second binding end end bound with target is bound.
On the basis of technique scheme, the method for this apparatus bound can also include: cloud server
The binding function that the bound end of target sends opens request;Cloud Server is opened according to the binding function request of opening
The binding function of the bound end of target;Cloud Server if be detected that terminate binding trigger condition, then closes mesh
Mark the binding function of bound end.
Wherein, the time triggered that end binding trigger condition typically can pass through Cloud Server default also can be by cloud
Server receives the closedown binding function request triggering that the bound end of target sends.Preferably, Cloud Server is worked as
After opening the binding function of the bound end of target, interval is automatically switched off the binding of the bound end of target for 10 minutes
Function.
On the basis of technique scheme, at the binding function that the bound end of cloud server target sends
Before opening request, it is also possible to including: the activation request that the bound end of cloud server target sends;Cloud
Server generates access identities according to the request of activation, and sends access identities to the bound end of target.
Wherein, the request that activates that Cloud Server sends according to the different bound ends of target generates corresponding access
Mark, this access identities is for the access of follow-up end bound to this target.
On the basis of technique scheme, generate described access identities at Cloud Server according to the request of activation,
And access identities is sent to the bound end of target, it is also possible to including: if Cloud Server receives target
The access identities that bound end sends is more newly requested, then update the access identities that end bound with target is corresponding;
Access identities after Cloud Server will update is back to the bound end of target.
Wherein, when needing the binding relationship of the releasing bound end of target and one or more binding end or visiting
When asking that mark is unexpected and reveal, Cloud Server can cancel original access identities and redistribute the bound end of target
Access identities is in order to again to bind.
On the basis of technique scheme, cloud server first bind end send bind request it
Before, it is also possible to including: cloud server first binds the registration request that end sends, wherein, registration request
Including login user name and log in password;Cloud Server generates access password according to registration request, and sends
To the first binding end;Accordingly, cloud server first bind end send bind request specifically can wrap
Include: Cloud Server obtains bind user name to be verified corresponding to end and to be verified with first by logging in interface
Password;Cloud Server is if it is determined that user name to be verified and password to be verified bind stepping on of end with first respectively
Land user name and to log in password consistent, then be supplied to the first binding end by binding interface, and by binding
Interface obtains the to be verified password corresponding with the first binding end;Cloud Server is if it is determined that password to be verified and
The access password of one binding end is consistent, then bind, by binding interface first, the bind request that end sends.
The benefit so arranged is: guarantee that only completing the binding end of lawful registration at Cloud Server just can complete mesh
Mark the binding of bound end, further ensure that the security of binding.
Embodiment two
The flow chart of the apparatus bound method that Fig. 2 provides for the embodiment of the present invention two, the present embodiment is applicable to
Carrying out situation about binding between internet of things equipment, the method can be performed by binding end, specifically includes as follows
Step:
Step 201, the first binding end are to the bind request of Cloud Server transmission end bound to target, wherein,
Bind request includes the identification information of the bound end of target.
Step 202, the first binding end receive the access identities of the bound end of target that Cloud Server returns, and
Conduct interviews according to access identities end bound to target.
The technical scheme of the present embodiment, solves the bound end of target in internet of things equipment without mandate
In the case of the binding of i.e. acceptable binding end and the problem of bringing potential safety hazard, it is achieved that binding end and target quilt
The secure binding of binding end.
On the basis of technique scheme, the target receiving Cloud Server return at the first binding end is bound
After the access identities of end, it is also possible to including: the first binding end receives the binding mandate of Cloud Server transmission please
Asking, wherein, binding authorization requests includes the identification information of the second binding end;If the first binding end authorizes the
Two binding end ends bound to target are bound, then return to Cloud Server and confirm authorization response, so that the
Two binding end ends bound with target are bound.
On the basis of technique scheme, at the first binding end before Cloud Server sends bind request,
Can also include: the registration request that the first binding end sends to Cloud Server, wherein, registration request includes stepping on
Land user name and log in password;First binding end receives the visit corresponding with registration request that Cloud Server returns
Challenge;Accordingly, the first binding end sends bind request to Cloud Server and specifically may include that first ties up
Fixed end is logged in interface input login user name by what described Cloud Server provided and is logged in password, so that cloud
Server carries out login authentication to the first binding end;The binding interface that first binding end is provided by Cloud Server
Input access password, the password authentication so that the first binding end is conducted interviews by Cloud Server;First binding end leads to
Cross binding interface and send bind request.
Embodiment three
The flow chart of the apparatus bound method that Fig. 3 provides for the embodiment of the present invention three, the present embodiment is applicable to
Carrying out situation about binding between internet of things equipment, the method can be performed by the bound end of target, specifically wraps
Include following steps:
The bound end of step 301, target sends the request of activation to Cloud Server.
The bound end of step 302, target receives the access identities that Cloud Server returns, wherein, access identities
Generate by activating request for Cloud Server.
The bound end of step 303, target sends binding function unlatching and asks to Cloud Server, so that cloud service
Device, during being not detected by terminating binding trigger condition, opens the binding function of the bound end of target.
The bound end of step 304, target receives the mark to be verified that the first binding end sends, and to be verified
When identifying consistent with access identities, accept the access of the first binding end.
The technical scheme of the present embodiment, solves the bound end of target in internet of things equipment without mandate
In the case of the binding of i.e. acceptable binding end and the problem of bringing potential safety hazard, it is achieved that binding end and target quilt
The secure binding of binding end.
Embodiment four
The flow chart of the apparatus bound method that Fig. 4 provides for the embodiment of the present invention four, the present embodiment is applicable to
Carrying out the situation of binding between internet of things equipment by internal lan, the method can be performed by binding end,
Specifically include following steps:
Step 401, the first binding end send bind request, wherein, bind request bag to the bound end of target
Include the bound secret of the bound end of target.
Wherein, bound secret typically can be obtained at the bound end of target by the first binding end, it is possible to passes through
Network obtains beyond the clouds.
Step 402, the first binding end receive the access identities that the bound end of target returns, and according to accessing mark
Know end bound to target to conduct interviews.
The technical scheme of the present embodiment, solves the bound end of target in internet of things equipment without mandate
In the case of the binding of i.e. acceptable binding end and the problem of bringing potential safety hazard, it is achieved that binding end and target quilt
The secure binding of binding end.
Embodiment five
The flow chart of the apparatus bound method that Fig. 5 provides for the embodiment of the present invention five, the present embodiment is applicable to
Carrying out the situation of binding between internet of things equipment by internal lan, the method can be by the bound end of target
Perform, specifically include following steps:
The bound end of step 501, target sends the request of activation to Cloud Server.
The bound end of step 502, target receives the access identities that Cloud Server returns, wherein, access identities
Generate by activating request for Cloud Server.
The bound end of step 503, target receives the password to be verified that the first binding end sends, and to be verified
When password is consistent with the bound secret preset, send access identities to the first binding end.
The bound end of step 504, target receives the mark to be verified that the first binding end sends, and to be verified
When identifying consistent with access identities, accept the access of the first binding end.
The technical scheme of the present embodiment, solves the bound end of target in internet of things equipment without mandate
In the case of the binding of i.e. acceptable binding end and the problem of bringing potential safety hazard, it is achieved that binding end and target quilt
The secure binding of binding end.
On the basis of technique scheme, also include: if target bound end amendment bound secret, then
Access identities is sent more newly requested to Cloud Server;The bound end of target receives described Cloud Server and returns more
Access identities after Xin.
Embodiment six
Fig. 6 show the structured flowchart of the Cloud Server of the apparatus bound that the embodiment of the present invention six provides, this reality
Executing the situation that example is applicable between internet of things equipment carry out binding, this Cloud Server specifically includes:
First bind request receiver module 1, for described cloud server first bind end send to mesh
Marking the bind request of bound end, wherein, described bind request includes the mark of the bound end of described target
Information;
For the inquiry of described Cloud Server, binding condition query module 2, if determining that described bind request is corresponding
The bound end of described target meet set binding condition, then by described first binding end tied up with described target
Fixed end is bound;
First access identities sending module 3, for the first binding end and described described in described Cloud Server record
The binding information that the bound end of target is corresponding, and send the access identities of the bound end of described target to the most described the
One binding end, to realize the access of described first binding end end bound to described target.
The technical scheme of the present embodiment, solves the bound end of target in internet of things equipment without mandate
In the case of the binding of i.e. acceptable binding end and the problem of bringing potential safety hazard, it is achieved that binding end and target quilt
The secure binding of binding end.
On the basis of technique scheme, described setting binding condition includes: the bound end of described target is opened
Open binding function, and the bound end of described target is not bound by arbitrary binding end;Accordingly, described cloud service
Device also includes: the second bind request receiver module, binds what end sent for described cloud server second
The bind request of end bound to described target;Authorization requests sending module, if for described Cloud Server
Inquiry determines that the bound end of described target opens binding function, and the bound end of described target is tied up by described first
Fixed end is bound, then send binding authorization requests to described first binding end, wherein, described binding authorization requests
Identification information including described second binding end;Authorization response receiver module, if described Cloud Server receives
The confirmation authorization response returned to described first binding end, then tied up described second binding end with described target
Fixed end is bound.
On the basis of technique scheme, also include: binding function opens request receiver module, for institute
State the binding function unlatching request that the bound end of target described in cloud server sends;Binding function opens mould
Block, opens tying up of the bound end of described target for described Cloud Server according to the request of opening of described binding function
Determine function;Binding function closes module, for described Cloud Server if be detected that terminate binding trigger condition,
Then close the binding function of the bound end of described target.
On the basis of technique scheme, also include: activate request receiver module, for described cloud service
Device receives the activation request that the bound end of described target sends;Access identities generation module, takes for described cloud
Business device activates the request described access identities of generation according to described, and sends described access identities to described target
Bound end.
On the basis of technique scheme, described access identities generation module is additionally operable to: described Cloud Server
If the access identities receiving the transmission of described target bound end is more newly requested, then update and described target quilt
The access identities that binding end is corresponding;Access identities after described Cloud Server will update is back to described target quilt
Binding end.
On the basis of technique scheme, also include: registration request receiver module, for described cloud service
Device receives the registration request that described first binding end sends, and wherein, described registration request includes login user name
And log in password;Access password generation module, generates according to described registration request for described Cloud Server
Access password, and send to described first binding end;Accordingly, described first bind request receiver module tool
Body is used for: described Cloud Server obtains the to be verified user corresponding with described first binding end by logging in interface
Name and password to be verified;Described Cloud Server is if it is determined that described user name to be verified and described to be verified
Password respectively with the described login user name of described first binding end and described in log in password consistent, then will
Binding interface is supplied to described first binding end, and is obtained and described first binding end by described binding interface
Corresponding password to be verified;Described Cloud Server is if it is determined that described password to be verified binds end with described first
Described access password consistent, then by described binding interface first bind end send bind request.
Embodiment seven
Fig. 7 show the structured flowchart of the binding end of the apparatus bound that the embodiment of the present invention seven provides, this enforcement
Example is applicable between internet of things equipment the situation carrying out binding, and this binding end specifically includes:
First bind request sending module 4, sends bound to target for the first binding end to Cloud Server
The bind request of end, wherein, described bind request includes the identification information of the bound end of described target;
First access identities receiver module 5, receives what described Cloud Server returned for described first binding end
The access identities of the bound end of described target, and carry out according to described access identities end bound to described target
Access.
The technical scheme of the present embodiment, solves the bound end of target in internet of things equipment without mandate
In the case of the binding of i.e. acceptable binding end and the problem of bringing potential safety hazard, it is achieved that binding end and target quilt
The secure binding of binding end.
On the basis of technique scheme, also include: authorization requests receiver module, tie up for described first
Fixed end receives the binding authorization requests that described Cloud Server sends, and wherein, described binding authorization requests includes the
The identification information of two binding ends;Authorization response sending module, if authorizing described for described first binding end
Second binding end end bound to described target is bound, then return to described Cloud Server to confirm to authorize and ring
Should, so that described second binding end end bound with described target is bound.
On the basis of technique scheme, also include: registration request sending module, tie up for described first
The registration request that fixed end sends to described Cloud Server, wherein, described registration request include login user name with
And log in password;Access password receiver module, receives described Cloud Server for described first binding end and returns
The access password corresponding with described registration request;Accordingly, the first binding end request sending module is specifically used
In: described first binding end by described Cloud Server provide log in interface input described login user name with
Password is logged in, so that described Cloud Server carries out login authentication to described first binding end described in and;Described
The binding interface that one binding end is provided by described Cloud Server inputs described access password, so that described cloud clothes
Described first binding end is conducted interviews password authentication by business device;Described first binding end is by described binding interface
Send described bind request.
Embodiment eight
Fig. 8 show the structured flowchart of the bound end of target of the apparatus bound that the embodiment of the present invention eight provides,
The present embodiment is applicable between internet of things equipment the situation carrying out binding, and the bound end of this target specifically includes:
Activate request sending module 6, send the request of activation to Cloud Server for the bound end of target;
Second access identities receiver module 7, receives described Cloud Server for the bound end of described target and returns
Access identities, wherein, described access identities is described Cloud Server to be activated request generated by described;
Binding function opens request sending module 8, sends binding function for the bound end of described target and opens
Request is to described Cloud Server, so that described Cloud Server is being not detected by terminating the process of binding trigger condition
In, open the binding function of the bound end of described target;
Access receiver module 9, receive, for the bound end of described target, the mark to be verified that the first binding end sends
Know, and when described mark to be verified is consistent with described access identities, accept the visit of described first binding end
Ask.The technical scheme of the present embodiment, solves the bound end of target in internet of things equipment without mandate
In the case of the binding of i.e. acceptable binding end and the problem of bringing potential safety hazard, it is achieved that binding end and target quilt
The secure binding of binding end.
The technical scheme of the present embodiment, solves the bound end of target in internet of things equipment without mandate
In the case of the binding of i.e. acceptable binding end and the problem of bringing potential safety hazard, it is achieved that binding end and target quilt
The secure binding of binding end.
Embodiment nine
Fig. 9 show the structured flowchart of the binding end of the apparatus bound that the embodiment of the present invention nine provides, this enforcement
Example is applicable to the situation carrying out binding under LAN environment between internet of things equipment, and this binding end specifically includes:
Cryptographic binding request sending module 10, sends bind request for the first binding end to the bound end of target,
Wherein, described bind request includes the bound secret of the bound end of described target;
Cryptographic binding access identities receiver module 11, receives described target for described first binding end bound
The access identities that end returns, and conduct interviews according to described access identities end bound to described target.
The technical scheme of the present embodiment, solves the bound end of target in internet of things equipment without mandate
In the case of the binding of i.e. acceptable binding end and the problem of bringing potential safety hazard, it is achieved that binding end and target quilt
The secure binding of binding end.
Embodiment ten
Figure 10 show the structured flowchart of the bound end of target of the apparatus bound that the embodiment of the present invention ten provides,
The present embodiment is applicable to the situation carrying out binding under LAN environment between internet of things equipment, and this target is tied up
Fixed end specifically includes:
Activate request sending module 6, send the request of activation to Cloud Server for the bound end of target;
Second access identities receiver module 7, receives described Cloud Server for the bound end of described target and returns
Access identities, wherein, described access identities is described Cloud Server to be activated request generated by described;
Cryptographic binding request accepts module 12, receives what the first binding end sent for the bound end of described target
Password to be verified, and when described password to be verified is consistent with the bound secret preset, tie up to described first
Fixed end sends described access identities;
Access receiver module 9, receive, for the bound end of described target, the mark to be verified that the first binding end sends
Know, and when described mark to be verified is consistent with described access identities, accept the visit of described first binding end
Ask.
The technical scheme of the present embodiment, solves the bound end of target in internet of things equipment without mandate
In the case of the binding of i.e. acceptable binding end and the problem of bringing potential safety hazard, it is achieved that binding end and target quilt
The secure binding of binding end.
On the basis of technique scheme, also include: access identities updates request sending module, for institute
If stating target bound end amendment bound secret, then send access identities to described Cloud Server more newly requested;
Second access identities receiver module, receives, for the bound end of described target, the renewal that described Cloud Server returns
After access identities.
The said goods can perform the method that any embodiment of the present invention is provided, and possesses the corresponding merit of execution method
Can module and beneficial effect.
Note, above are only presently preferred embodiments of the present invention and institute's application technology principle.Those skilled in the art
It will be appreciated that the invention is not restricted to specific embodiment described here, can enter for a person skilled in the art
Row various obvious changes, readjust and substitute without departing from protection scope of the present invention.Therefore, though
So by above example, the present invention is described in further detail, but the present invention be not limited only to
Upper embodiment, without departing from the inventive concept, it is also possible to include other Equivalent embodiments more,
And the scope of the present invention is determined by scope of the appended claims.
Claims (10)
1. the method for an apparatus bound, it is characterised in that including:
Cloud server first binds the bind request of the end bound to target that end sends, wherein, described
Bind request includes the identification information of the bound end of described target;
Set if the inquiry of described Cloud Server determines that the bound end of described target corresponding to described bind request meets
Surely bind condition, then described first binding end end bound with described target is bound;
The binding information that first binding end end bound with described target described in described Cloud Server record is corresponding,
And the most described first binding end of access identities sending the bound end of described target, to realize described first binding
Hold the access of end bound to described target.
The method of apparatus bound the most according to claim 1, it is characterised in that described setting binding bar
Part includes: the bound end of described target opens binding function, and the bound end of described target is not by arbitrary binding
End binding;
Accordingly, corresponding at the first binding end end bound with described target described in described Cloud Server record
After binding information, and the most described first binding end of access identities sending the bound end of described target, also wrap
Include:
Described cloud server second binds the bind request of the end bound to described target that end sends;
If the inquiry of described Cloud Server determines that the bound end of described target opens binding function, and described target
Bound end is bound by described first binding end, then send binding authorization requests and bind end to described first, its
In, described binding authorization requests includes the identification information of described second binding end;
If described Cloud Server receives the confirmation authorization response that described first binding end returns, then by described
Second binding end end bound with described target is bound.
The method of apparatus bound the most according to claim 1, it is characterised in that also include:
The binding function that the bound end of target described in described cloud server sends opens request;
Described Cloud Server opens the binding merit of the bound end of described target according to the request of opening of described binding function
Energy;
Described Cloud Server if be detected that terminate binding trigger condition, then closes the bound end of described target
Binding function.
The method of apparatus bound the most according to claim 3, it is characterised in that at described Cloud Server
Before receiving the binding function unlatching request that the bound end of described target sends, also include:
The activation request that the bound end of target described in described cloud server sends;
Described Cloud Server activates the request described access identities of generation according to described, and described access identities is sent out
Deliver to the bound end of described target.
The method of apparatus bound the most according to claim 4, it is characterised in that at described Cloud Server
Activate the request described access identities of generation according to described, and the transmission of described access identities is tied up to described target
Behind fixed end, also include:
If the access identities that described Cloud Server receives the transmission of described target bound end is more newly requested, then
Update the access identities that end bound with described target is corresponding;
Access identities after described Cloud Server will update is back to the bound end of described target.
The method of apparatus bound the most according to claim 1, it is characterised in that at described Cloud Server
Before receiving the bind request that the first binding end sends, also include:
The registration request that first binding end described in described cloud server sends, wherein, described registration request
Including login user name and log in password;
Described Cloud Server generates access password according to described registration request, and sends to described first binding end;
Accordingly, described cloud server first bind end send bind request specifically include:
Described Cloud Server by log in interface obtain bind with described first user name to be verified corresponding to end with
And password to be verified;
Described Cloud Server is if it is determined that described user name to be verified and described password to be verified are respectively with described
The described login user name of the first binding end and described in log in password consistent, then binding interface is supplied to
Described first binding end, and obtain the to be verified mouth corresponding with described first binding end by described binding interface
Order;
Described Cloud Server is if it is determined that the described access password of end bound in described password to be verified and described first
Consistent, then bind, by described binding interface first, the bind request that end sends.
7. the method for an apparatus bound, it is characterised in that including:
First binding end sends the bind request of end bound to target, wherein, described binding to Cloud Server
Request includes the identification information of the bound end of described target;
Described first binding end receives the access identities of the bound end of described target that described Cloud Server returns,
And conduct interviews according to described access identities end bound to described target.
The method of apparatus bound the most according to claim 7, it is characterised in that bind described first
After end receives the access identities of the bound end of described target that described Cloud Server returns, also include:
First binding end receives the binding authorization requests that described Cloud Server sends, and wherein, described binding authorizes
Request includes the identification information of the second binding end;
If described first binding end authorizes described second binding end end bound to described target to bind,
Then return to described Cloud Server and confirm authorization response, so that described second binding end is bound with described target
End is bound.
The method of apparatus bound the most according to claim 7, it is characterised in that first binding end to
Before Cloud Server sends bind request, also include:
The registration request that described first binding end sends to described Cloud Server, wherein, described registration request bag
Include login user name and log in password;
Described first binding end receives the access mouth corresponding with described registration request that described Cloud Server returns
Order;
Accordingly, the first binding end specifically includes to Cloud Server transmission bind request:
Described first binding end by described Cloud Server provide log in interface input described login user name with
Password is logged in, so that described Cloud Server carries out login authentication to described first binding end described in and;
The binding interface that described first binding end is provided by described Cloud Server inputs described access password, with
Make described Cloud Server that described first binding end to be conducted interviews password authentication;
Described first binding end sends described bind request by described binding interface.
10. the method for an apparatus bound, it is characterised in that including:
The bound end of target sends the request of activation to Cloud Server;
The bound end of described target receives the access identities that described Cloud Server returns, and wherein, described access is marked
Know and ask to generate by described activation for described Cloud Server;
The bound end of described target receives the password to be verified that the first binding end sends, and described to be verified close
When code is consistent with the bound secret preset, send described access identities to described first binding end;
The bound end of described target receives the mark to be verified that the first binding end sends, and at described mark to be verified
When knowing consistent with described access identities, accept the access of described first binding end.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610172507.4A CN105871821A (en) | 2016-03-24 | 2016-03-24 | Device binding method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610172507.4A CN105871821A (en) | 2016-03-24 | 2016-03-24 | Device binding method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105871821A true CN105871821A (en) | 2016-08-17 |
Family
ID=56625779
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610172507.4A Pending CN105871821A (en) | 2016-03-24 | 2016-03-24 | Device binding method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105871821A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106707782A (en) * | 2016-12-20 | 2017-05-24 | 北京小米移动软件有限公司 | Environmental parameter processing method and device and equipment binding method and device |
CN107172017A (en) * | 2017-04-25 | 2017-09-15 | 北京大有中城科技有限公司 | A kind of automatic binding method of log-on message |
CN107342984A (en) * | 2017-06-13 | 2017-11-10 | 浙江大华技术股份有限公司 | A kind of system, method and device for apparatus bound |
CN107492247A (en) * | 2017-08-14 | 2017-12-19 | 深圳市极成光电有限公司 | The localization method and system of article |
CN108521857A (en) * | 2017-07-25 | 2018-09-11 | 北京小米移动软件有限公司 | A kind of NB-IoT apparatus bounds method and a kind of Internet of Things network control system |
CN109040013A (en) * | 2018-06-20 | 2018-12-18 | 联想(北京)有限公司 | The authentication method and device of intelligent earphone |
CN109041038A (en) * | 2018-04-20 | 2018-12-18 | 珠海奔图电子有限公司 | For controlling the method and system of electronic device and designated user's binding |
CN110070655A (en) * | 2019-04-29 | 2019-07-30 | 北京摇光智能科技有限公司 | A kind of electronic lock and installation addresses binding method |
CN110611903A (en) * | 2018-06-15 | 2019-12-24 | 中兴通讯股份有限公司 | Equipment binding method, device, equipment and storage medium |
CN111092898A (en) * | 2019-12-24 | 2020-05-01 | 华为终端有限公司 | Message transmission method and related equipment |
CN111818611A (en) * | 2020-07-03 | 2020-10-23 | 青岛易来智能科技股份有限公司 | Equipment binding method and device |
CN112738265A (en) * | 2020-12-31 | 2021-04-30 | 青岛海尔科技有限公司 | Equipment binding method and device, storage medium and electronic device |
CN115988632A (en) * | 2023-01-10 | 2023-04-18 | 中国联合网络通信集团有限公司 | Network access method, device, equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103747010A (en) * | 2014-01-22 | 2014-04-23 | 北京奇虎科技有限公司 | Method, system and device for controlling PC (personal computer) by mobile terminal |
CN104202306A (en) * | 2014-08-15 | 2014-12-10 | 小米科技有限责任公司 | Method, device and system of access authentication |
CN104778612A (en) * | 2015-04-23 | 2015-07-15 | 上海未来宽带技术股份有限公司 | Method and system for realizing offline-to-online marketing management of physical store |
CN105100067A (en) * | 2015-06-26 | 2015-11-25 | 上海庆科信息技术有限公司 | Cloud activation method and system |
CN105306320A (en) * | 2015-11-20 | 2016-02-03 | 青岛海信移动通信技术股份有限公司 | Method and device for binding clients to intelligent device |
CN105407454A (en) * | 2015-11-23 | 2016-03-16 | 深圳还是威健康科技有限公司 | Binding method and device for wearable device |
-
2016
- 2016-03-24 CN CN201610172507.4A patent/CN105871821A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103747010A (en) * | 2014-01-22 | 2014-04-23 | 北京奇虎科技有限公司 | Method, system and device for controlling PC (personal computer) by mobile terminal |
CN104202306A (en) * | 2014-08-15 | 2014-12-10 | 小米科技有限责任公司 | Method, device and system of access authentication |
CN104778612A (en) * | 2015-04-23 | 2015-07-15 | 上海未来宽带技术股份有限公司 | Method and system for realizing offline-to-online marketing management of physical store |
CN105100067A (en) * | 2015-06-26 | 2015-11-25 | 上海庆科信息技术有限公司 | Cloud activation method and system |
CN105306320A (en) * | 2015-11-20 | 2016-02-03 | 青岛海信移动通信技术股份有限公司 | Method and device for binding clients to intelligent device |
CN105407454A (en) * | 2015-11-23 | 2016-03-16 | 深圳还是威健康科技有限公司 | Binding method and device for wearable device |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106707782A (en) * | 2016-12-20 | 2017-05-24 | 北京小米移动软件有限公司 | Environmental parameter processing method and device and equipment binding method and device |
CN107172017A (en) * | 2017-04-25 | 2017-09-15 | 北京大有中城科技有限公司 | A kind of automatic binding method of log-on message |
CN107342984A (en) * | 2017-06-13 | 2017-11-10 | 浙江大华技术股份有限公司 | A kind of system, method and device for apparatus bound |
CN108521857A (en) * | 2017-07-25 | 2018-09-11 | 北京小米移动软件有限公司 | A kind of NB-IoT apparatus bounds method and a kind of Internet of Things network control system |
CN108521857B (en) * | 2017-07-25 | 2021-08-03 | 北京小米移动软件有限公司 | NB-IoT equipment binding method and IOT control system |
US11005944B2 (en) | 2017-07-25 | 2021-05-11 | Beijing Xiaomi Mobile Software Co., Ltd. | Method for binding NB-IoT device, and internet of things control system |
CN107492247A (en) * | 2017-08-14 | 2017-12-19 | 深圳市极成光电有限公司 | The localization method and system of article |
CN109041038A (en) * | 2018-04-20 | 2018-12-18 | 珠海奔图电子有限公司 | For controlling the method and system of electronic device and designated user's binding |
CN110611903A (en) * | 2018-06-15 | 2019-12-24 | 中兴通讯股份有限公司 | Equipment binding method, device, equipment and storage medium |
CN109040013B (en) * | 2018-06-20 | 2021-07-16 | 联想(北京)有限公司 | Authentication method and device of intelligent earphone |
CN109040013A (en) * | 2018-06-20 | 2018-12-18 | 联想(北京)有限公司 | The authentication method and device of intelligent earphone |
CN110070655B (en) * | 2019-04-29 | 2021-03-16 | 北京摇光智能科技有限公司 | Electronic lock and installation address binding method |
CN110070655A (en) * | 2019-04-29 | 2019-07-30 | 北京摇光智能科技有限公司 | A kind of electronic lock and installation addresses binding method |
CN111092898A (en) * | 2019-12-24 | 2020-05-01 | 华为终端有限公司 | Message transmission method and related equipment |
CN111092898B (en) * | 2019-12-24 | 2022-05-10 | 华为终端有限公司 | Message transmission method and related equipment |
CN111818611A (en) * | 2020-07-03 | 2020-10-23 | 青岛易来智能科技股份有限公司 | Equipment binding method and device |
CN112738265A (en) * | 2020-12-31 | 2021-04-30 | 青岛海尔科技有限公司 | Equipment binding method and device, storage medium and electronic device |
CN115988632A (en) * | 2023-01-10 | 2023-04-18 | 中国联合网络通信集团有限公司 | Network access method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105871821A (en) | Device binding method | |
CN103517273B (en) | Authentication method, managing platform and Internet-of-Things equipment | |
CN104601590B (en) | A kind of login method, server and mobile terminal | |
CN105871838B (en) | A kind of log-in control method and customer center platform of third party's account | |
CN102771102B (en) | The network of distribute digital content and management method | |
CN105187431B (en) | Login method, server, client and the communication system of third-party application | |
CN110351228A (en) | Remote entry method, device and system | |
CN108200050A (en) | Single logging-on server, method and computer readable storage medium | |
CN104144167B (en) | User login authentication method of open intelligent gateway platform | |
CN106127888B (en) | Intelligent lock operation method and smart lock operating system | |
CN106131079A (en) | A kind of authentication method, system and proxy server | |
CN103489233A (en) | Electronic door control system with dynamic password | |
CN103780580B (en) | Method, server and system for providing capability access strategy | |
CN104718526A (en) | Secure mobile framework | |
CN106452782A (en) | Method and system for producing a secure communication channel for terminals | |
CN109011583A (en) | virtual resource transfer method and device, storage medium and electronic device | |
CN107426174A (en) | A kind of access control system and method for credible performing environment | |
CN108259432A (en) | A kind of management method of API Calls, equipment and system | |
CN106101054A (en) | The single-point logging method of a kind of multisystem and centralized management system | |
CN102903167A (en) | Management system for renting and selling houses | |
CN104901928A (en) | Data interaction method, device and system | |
CN103914925B (en) | Off-line is opened invoice and carries out the method and system of management and control | |
CN107566367A (en) | A kind of shared method, apparatus of cloud storage information network certification | |
US20200274866A1 (en) | Method for implementing client side credential control to authorize access to a protected device | |
CN104125230B (en) | A kind of short message certification service system and authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160817 |
|
RJ01 | Rejection of invention patent application after publication |