CN105871821A - Device binding method - Google Patents

Device binding method Download PDF

Info

Publication number
CN105871821A
CN105871821A CN201610172507.4A CN201610172507A CN105871821A CN 105871821 A CN105871821 A CN 105871821A CN 201610172507 A CN201610172507 A CN 201610172507A CN 105871821 A CN105871821 A CN 105871821A
Authority
CN
China
Prior art keywords
binding
bound
cloud server
target
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610172507.4A
Other languages
Chinese (zh)
Inventor
彭强兵
顾蒙
马延文
胡志敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
VANE TECHNOLOGY Co Ltd
Original Assignee
VANE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by VANE TECHNOLOGY Co Ltd filed Critical VANE TECHNOLOGY Co Ltd
Priority to CN201610172507.4A priority Critical patent/CN105871821A/en
Publication of CN105871821A publication Critical patent/CN105871821A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a device binding method. The method comprises the following steps: a cloud server receives a binding request to a target bound end, wherein the binding request is transmitted by a first binding end, and comprises identifier information of the target bound end; if the cloud server inquires and determines that the target bound end corresponding to the binding request satisfies a set binding condition, the cloud server binds the first binding end with the target bound end; the cloud server records corresponding binding information of the first binding end and the target bound end, and transmits an access identifier of the target bound end to the first binding end so as to realize access of the first binding end to the target bound end. The scheme realizes safe binding between the binding end and the target bound end in an Internet of Things device.

Description

The method of apparatus bound
Technical field
The present embodiments relate to technology of Internet of things, a kind of method particularly relating to apparatus bound.
Background technology
Internet of Things is the important component part of generation information technology, is also the important development rank of information age Section.As its name suggests, Internet of Things is exactly the internet that thing thing is connected.The core of Internet of Things and basis remain mutual Networking, is the extension on Internet basic and extension, and extend and extend to any article and article it Between carry out information exchange and communicate, namely thing thing ceases mutually.Internet of Things by Intellisense, identify technology with The communication cognition technology such as general fit calculation, is widely used in the fusion of network, is the most therefore referred to as world information The third wave of industry development.
In prior art, the bound end of target in internet of things equipment can connect without in the case of authorizing Being bound by binding end, thus bring potential safety hazard, end as bound in target performs evil after illegally binding Meaning operation.
Summary of the invention
The present invention provides a kind of method of apparatus bound, it is to avoid the bound end of target brings due to dangerous binding Malicious operation, it is achieved that the secure binding of the bound end of target.
First aspect, a kind of method embodiments providing apparatus bound, including:
Cloud server first binds the bind request of the end bound to target that end sends, wherein, described Bind request includes the identification information of the bound end of described target;
Set if the inquiry of described Cloud Server determines that the bound end of described target corresponding to described bind request meets Surely bind condition, then described first binding end end bound with described target is bound;
The binding information that first binding end end bound with described target described in described Cloud Server record is corresponding, And the most described first binding end of access identities sending the bound end of described target, to realize described first binding Hold the access of end bound to described target.
Second aspect, the embodiment of the present invention additionally provides a kind of method of apparatus bound, including:
First binding end sends the bind request of end bound to target, wherein, described binding to Cloud Server Request includes the identification information of the bound end of described target;
Described first binding end receives the access identities of the bound end of described target that described Cloud Server returns, And conduct interviews according to described access identities end bound to described target.
The third aspect, the embodiment of the present invention additionally provides a kind of apparatus bound method, including:
The bound end of target sends the request of activation to Cloud Server;
The bound end of described target receives the access identities that described Cloud Server returns, and wherein, described access is marked Know and ask to generate by described activation for described Cloud Server;
The bound end of described target sends binding function and opens request extremely described Cloud Server, so that described cloud clothes Business device, during being not detected by terminating binding trigger condition, opens the binding merit of the bound end of described target Energy;
The bound end of described target receives the mark to be verified that the first binding end sends, and at described mark to be verified When knowing consistent with described access identities, accept the access of described first binding end.
Fourth aspect, the embodiment of the present invention additionally provides a kind of method of apparatus bound, including:
First binding end sends bind request to the bound end of target, and wherein, described bind request includes described The bound secret of the bound end of target;
Described first binding end receives the access identities that the bound end of described target returns, and according to described access Identify end bound to described target to conduct interviews.
5th aspect, the embodiment of the present invention additionally provides a kind of method of apparatus bound, including:
The bound end of target sends the request of activation to Cloud Server;
The bound end of described target receives the access identities that described Cloud Server returns, and wherein, described access is marked Know and ask to generate by described activation for described Cloud Server;
The bound end of described target receives the password to be verified that the first binding end sends, and described to be verified close When code is consistent with the bound secret preset, send described access identities to described first binding end;
The bound end of described target receives the mark to be verified that the first binding end sends, and at described mark to be verified When knowing consistent with described access identities, accept the access of described first binding end.
6th aspect, the embodiment of the present invention additionally provides the Cloud Server of a kind of apparatus bound, including:
First bind request receiver module, for described cloud server first bind end send to target The bind request of bound end, wherein, described bind request includes the mark letter of the bound end of described target Breath;
For the inquiry of described Cloud Server, binding condition query module, if determining that described bind request is corresponding The bound end of described target meets the binding condition that sets, then by bound with described target for described first binding end End is bound;
First access identities sending module, for the first binding end and described mesh described in described Cloud Server record Mark the binding information that bound end is corresponding, and send the access identities of the bound end of described target to described first Binding end, to realize the access of described first binding end end bound to described target.
7th aspect, the embodiment of the present invention additionally provides the binding end of a kind of apparatus bound, including:
First bind request sending module, sends end bound to target for the first binding end to Cloud Server Bind request, wherein, described bind request includes the identification information of the bound end of described target;
First access identities receiver module, receives, for described first binding end, the institute that described Cloud Server returns State the access identities of the bound end of target, and visit according to described access identities end bound to described target Ask.
Eighth aspect, the embodiment of the present invention additionally provides the bound end of target of a kind of apparatus bound, including:
Activate request sending module, send the request of activation to Cloud Server for the bound end of target;
Second access identities receiver module, receives what described Cloud Server returned for the bound end of described target Access identities, wherein, described access identities is that described Cloud Server activates request generation by described;
Binding function opens request sending module, and sending binding function unlatching for the bound end of described target please Ask to described Cloud Server, so that described Cloud Server is during being not detected by terminating binding trigger condition, Open the binding function of the bound end of described target;
Access receiver module, receive, for the bound end of described target, the mark to be verified that the first binding end sends, And when described mark to be verified is consistent with described access identities, accept the access of described first binding end.
9th aspect, the embodiment of the present invention additionally provides the binding end of a kind of apparatus bound, including:
Cryptographic binding request sending module, sends bind request for the first binding end to the bound end of target, Wherein, described bind request includes the bound secret of the bound end of described target;
Cryptographic binding access identities receiver module, receives the bound end of described target for described first binding end The access identities returned, and conduct interviews according to described access identities end bound to described target.
Tenth aspect, the embodiment of the present invention additionally provides the bound end of target of a kind of apparatus bound, including:
Activate request sending module, send the request of activation to Cloud Server for the bound end of target;
Second access identities receiver module, receives what described Cloud Server returned for the bound end of described target Access identities, wherein, described access identities is that described Cloud Server activates request generation by described;
Cryptographic binding request accepts module, receives treating of the first binding end transmission for the bound end of described target Checking password, and when described password to be verified is consistent with the bound secret preset, to described first binding End sends described access identities;
Access receiver module, receive, for the bound end of described target, the mark to be verified that the first binding end sends, And when described mark to be verified is consistent with described access identities, accept the access of described first binding end.
The present invention binds the bind request of the end bound to target that end sends by cloud server first After, if inquiry determines the bound end of the target satisfied setting binding condition that bind request is corresponding, then by first Binding end end bound with target is bound, and Cloud Server then records the first binding end and the bound end of target Corresponding binding information, and send the access identities of the bound end of target to the first binding end, to realize first The access of binding end end bound to described target, solve the bound end of target in internet of things equipment without The problem crossing the i.e. acceptable binding binding end in the case of authorizing and bring potential safety hazard, it is achieved that binding end The secure binding of end bound with target.
Accompanying drawing explanation
Fig. 1 is the flow chart of the apparatus bound method that the embodiment of the present invention one provides;
Fig. 2 is the flow chart of the apparatus bound method that the embodiment of the present invention two provides;
Fig. 3 is the flow chart of the apparatus bound method that the embodiment of the present invention three provides;
Fig. 4 is the flow chart of the apparatus bound method that the embodiment of the present invention four provides;
Fig. 5 is the flow chart of the apparatus bound method that the embodiment of the present invention five provides;
Fig. 6 is the structured flowchart of the Cloud Server of the apparatus bound that the embodiment of the present invention six provides;
Fig. 7 is the structured flowchart of the binding end of the apparatus bound that the embodiment of the present invention seven provides;
Fig. 8 is the structured flowchart of the bound end of target of the apparatus bound that the embodiment of the present invention eight provides;
Fig. 9 is the structured flowchart of the binding end of the apparatus bound that the embodiment of the present invention nine provides;
Figure 10 is the structured flowchart of the bound end of target of the apparatus bound that the embodiment of the present invention ten provides.
Detailed description of the invention
The present invention is described in further detail with embodiment below in conjunction with the accompanying drawings.It is understood that this Specific embodiment described by place is used only for explaining the present invention, rather than limitation of the invention.The most also need It is noted that for the ease of describing, accompanying drawing illustrate only part related to the present invention and not all knot Structure.
Embodiment one
The flow chart of the apparatus bound method that Fig. 1 provides for the embodiment of the present invention one, the present embodiment is applicable to Carrying out situation about binding between internet of things equipment, the method can be performed by Cloud Server, specifically include as Lower step:
Step 101, cloud server first binds the bind request of the end bound to target that end sends, Wherein, described bind request includes the identification information of the bound end of described target.
Wherein, Cloud Server can receive the bind request that multiple binding end sends, in each bind request all Containing the identification information of the bound end of corresponding target, binding end is typically smart mobile phone, panel computer Or customization controls terminal, target bound end typically air-conditioning, refrigerator, light switch etc. possess circuit control The internet of things equipment of system.The mark of the bound end of this target can be the title of the bound end of target, Quick Response Code, Bar code or self-defining character string etc., in order to uniquely to determine the equipment of the bound end of this target, binding end obtains The mode of target bound end mark is typically include and is manually entered, scans, images or network acquisition online etc.. Binding end and the bound end of target carry out in binding procedure, and first Cloud Server receives tying up of this binding end transmission Fixed request.
If the inquiry of step 102, Cloud Server determines the satisfied setting of the bound end of target that bind request is corresponding Binding condition, then bind the first binding end end bound with target.
Wherein, when binding, it is the fullest that Cloud Server needs to inquire about the bound end of target corresponding to bind request The binding condition that foot sets, Cloud Server can be by the record information in inquiry comparison data storehouse to determine binding Whether condition meets, and can carry out binding end and the binding of bound end when meeting when imposing a condition.If setting Binding condition can not meet, and does not the most carry out binding end and the binding of the bound end of target, can send binding simultaneously Failed information.
Typically, binding condition may include that bound end open binding function, or bound end not by Bound in arbitrary binding end, or meet above-mentioned bound end simultaneously and open binding function and bound end not Bound in arbitrary binding end.
The binding information that end end bound with target is corresponding bound in step 103, Cloud Server record first, and The access identities sending the bound end of target binds end to first, bound to target to realize the first binding end The access of end.
Wherein, binding end only obtains the access identities of the bound end of target and just can carry out bound to target The access of end, this access identities typically only exists Cloud Server, binds between end and the bound end of target, Concrete operations personnel are not required to carry out special operational for this access identities.Binding information typically records In the database of Cloud Server.
The technical scheme of the present embodiment, solves the bound end of target in internet of things equipment without mandate In the case of the binding of i.e. acceptable binding end and the problem of bringing potential safety hazard, it is achieved that binding end and target quilt The secure binding of binding end.
On the basis of technique scheme, set binding condition and may include that the unlatching of target bound end is tied up Determine function, and the bound end of target is not bound by arbitrary binding end;Accordingly, at Cloud Server record first Binding binding information corresponding to end end bound with target, and send the access identities of the bound end of target to the After one binding end, also include: cloud server second binds the end bound to described target that end sends Bind request;If Cloud Server inquiry determines that the bound end of target opens binding function, and target is tied up Fixed end is bound by the first binding end, then send binding authorization requests and bind end to first, and wherein, binding authorizes Request includes the identification information of the second binding end;If Cloud Server receives the confirmation that the first binding end returns Authorization response, then bind the second binding end end bound with target.
Wherein, the binding function of the bound end of target typically can be opened by the bound end of target self and also may be used Being opened by Cloud Server, after binding function is opened, Cloud Server can identify the bound end of this target and be in Can binding state.
Wherein, when the first binding end and the bound end of target have been bound complete, and i.e. the bound end of target is When binding has binding end, the bind request that cloud server sends to remaining binding end, in this programme During the bind request that the second binding end sends, determine that the bound end of target opens binding function, then by inquiry Send binding authorization requests to the first binding end.Now, if the second binding end carries out end bound with target Binding needs to obtain the mandate of the first binding end.When after the authorization response of cloud server to first binding end Again the second binding end end bound with target is bound.
On the basis of technique scheme, the method for this apparatus bound can also include: cloud server The binding function that the bound end of target sends opens request;Cloud Server is opened according to the binding function request of opening The binding function of the bound end of target;Cloud Server if be detected that terminate binding trigger condition, then closes mesh Mark the binding function of bound end.
Wherein, the time triggered that end binding trigger condition typically can pass through Cloud Server default also can be by cloud Server receives the closedown binding function request triggering that the bound end of target sends.Preferably, Cloud Server is worked as After opening the binding function of the bound end of target, interval is automatically switched off the binding of the bound end of target for 10 minutes Function.
On the basis of technique scheme, at the binding function that the bound end of cloud server target sends Before opening request, it is also possible to including: the activation request that the bound end of cloud server target sends;Cloud Server generates access identities according to the request of activation, and sends access identities to the bound end of target.
Wherein, the request that activates that Cloud Server sends according to the different bound ends of target generates corresponding access Mark, this access identities is for the access of follow-up end bound to this target.
On the basis of technique scheme, generate described access identities at Cloud Server according to the request of activation, And access identities is sent to the bound end of target, it is also possible to including: if Cloud Server receives target The access identities that bound end sends is more newly requested, then update the access identities that end bound with target is corresponding; Access identities after Cloud Server will update is back to the bound end of target.
Wherein, when needing the binding relationship of the releasing bound end of target and one or more binding end or visiting When asking that mark is unexpected and reveal, Cloud Server can cancel original access identities and redistribute the bound end of target Access identities is in order to again to bind.
On the basis of technique scheme, cloud server first bind end send bind request it Before, it is also possible to including: cloud server first binds the registration request that end sends, wherein, registration request Including login user name and log in password;Cloud Server generates access password according to registration request, and sends To the first binding end;Accordingly, cloud server first bind end send bind request specifically can wrap Include: Cloud Server obtains bind user name to be verified corresponding to end and to be verified with first by logging in interface Password;Cloud Server is if it is determined that user name to be verified and password to be verified bind stepping on of end with first respectively Land user name and to log in password consistent, then be supplied to the first binding end by binding interface, and by binding Interface obtains the to be verified password corresponding with the first binding end;Cloud Server is if it is determined that password to be verified and The access password of one binding end is consistent, then bind, by binding interface first, the bind request that end sends. The benefit so arranged is: guarantee that only completing the binding end of lawful registration at Cloud Server just can complete mesh Mark the binding of bound end, further ensure that the security of binding.
Embodiment two
The flow chart of the apparatus bound method that Fig. 2 provides for the embodiment of the present invention two, the present embodiment is applicable to Carrying out situation about binding between internet of things equipment, the method can be performed by binding end, specifically includes as follows Step:
Step 201, the first binding end are to the bind request of Cloud Server transmission end bound to target, wherein, Bind request includes the identification information of the bound end of target.
Step 202, the first binding end receive the access identities of the bound end of target that Cloud Server returns, and Conduct interviews according to access identities end bound to target.
The technical scheme of the present embodiment, solves the bound end of target in internet of things equipment without mandate In the case of the binding of i.e. acceptable binding end and the problem of bringing potential safety hazard, it is achieved that binding end and target quilt The secure binding of binding end.
On the basis of technique scheme, the target receiving Cloud Server return at the first binding end is bound After the access identities of end, it is also possible to including: the first binding end receives the binding mandate of Cloud Server transmission please Asking, wherein, binding authorization requests includes the identification information of the second binding end;If the first binding end authorizes the Two binding end ends bound to target are bound, then return to Cloud Server and confirm authorization response, so that the Two binding end ends bound with target are bound.
On the basis of technique scheme, at the first binding end before Cloud Server sends bind request, Can also include: the registration request that the first binding end sends to Cloud Server, wherein, registration request includes stepping on Land user name and log in password;First binding end receives the visit corresponding with registration request that Cloud Server returns Challenge;Accordingly, the first binding end sends bind request to Cloud Server and specifically may include that first ties up Fixed end is logged in interface input login user name by what described Cloud Server provided and is logged in password, so that cloud Server carries out login authentication to the first binding end;The binding interface that first binding end is provided by Cloud Server Input access password, the password authentication so that the first binding end is conducted interviews by Cloud Server;First binding end leads to Cross binding interface and send bind request.
Embodiment three
The flow chart of the apparatus bound method that Fig. 3 provides for the embodiment of the present invention three, the present embodiment is applicable to Carrying out situation about binding between internet of things equipment, the method can be performed by the bound end of target, specifically wraps Include following steps:
The bound end of step 301, target sends the request of activation to Cloud Server.
The bound end of step 302, target receives the access identities that Cloud Server returns, wherein, access identities Generate by activating request for Cloud Server.
The bound end of step 303, target sends binding function unlatching and asks to Cloud Server, so that cloud service Device, during being not detected by terminating binding trigger condition, opens the binding function of the bound end of target.
The bound end of step 304, target receives the mark to be verified that the first binding end sends, and to be verified When identifying consistent with access identities, accept the access of the first binding end.
The technical scheme of the present embodiment, solves the bound end of target in internet of things equipment without mandate In the case of the binding of i.e. acceptable binding end and the problem of bringing potential safety hazard, it is achieved that binding end and target quilt The secure binding of binding end.
Embodiment four
The flow chart of the apparatus bound method that Fig. 4 provides for the embodiment of the present invention four, the present embodiment is applicable to Carrying out the situation of binding between internet of things equipment by internal lan, the method can be performed by binding end, Specifically include following steps:
Step 401, the first binding end send bind request, wherein, bind request bag to the bound end of target Include the bound secret of the bound end of target.
Wherein, bound secret typically can be obtained at the bound end of target by the first binding end, it is possible to passes through Network obtains beyond the clouds.
Step 402, the first binding end receive the access identities that the bound end of target returns, and according to accessing mark Know end bound to target to conduct interviews.
The technical scheme of the present embodiment, solves the bound end of target in internet of things equipment without mandate In the case of the binding of i.e. acceptable binding end and the problem of bringing potential safety hazard, it is achieved that binding end and target quilt The secure binding of binding end.
Embodiment five
The flow chart of the apparatus bound method that Fig. 5 provides for the embodiment of the present invention five, the present embodiment is applicable to Carrying out the situation of binding between internet of things equipment by internal lan, the method can be by the bound end of target Perform, specifically include following steps:
The bound end of step 501, target sends the request of activation to Cloud Server.
The bound end of step 502, target receives the access identities that Cloud Server returns, wherein, access identities Generate by activating request for Cloud Server.
The bound end of step 503, target receives the password to be verified that the first binding end sends, and to be verified When password is consistent with the bound secret preset, send access identities to the first binding end.
The bound end of step 504, target receives the mark to be verified that the first binding end sends, and to be verified When identifying consistent with access identities, accept the access of the first binding end.
The technical scheme of the present embodiment, solves the bound end of target in internet of things equipment without mandate In the case of the binding of i.e. acceptable binding end and the problem of bringing potential safety hazard, it is achieved that binding end and target quilt The secure binding of binding end.
On the basis of technique scheme, also include: if target bound end amendment bound secret, then Access identities is sent more newly requested to Cloud Server;The bound end of target receives described Cloud Server and returns more Access identities after Xin.
Embodiment six
Fig. 6 show the structured flowchart of the Cloud Server of the apparatus bound that the embodiment of the present invention six provides, this reality Executing the situation that example is applicable between internet of things equipment carry out binding, this Cloud Server specifically includes:
First bind request receiver module 1, for described cloud server first bind end send to mesh Marking the bind request of bound end, wherein, described bind request includes the mark of the bound end of described target Information;
For the inquiry of described Cloud Server, binding condition query module 2, if determining that described bind request is corresponding The bound end of described target meet set binding condition, then by described first binding end tied up with described target Fixed end is bound;
First access identities sending module 3, for the first binding end and described described in described Cloud Server record The binding information that the bound end of target is corresponding, and send the access identities of the bound end of described target to the most described the One binding end, to realize the access of described first binding end end bound to described target.
The technical scheme of the present embodiment, solves the bound end of target in internet of things equipment without mandate In the case of the binding of i.e. acceptable binding end and the problem of bringing potential safety hazard, it is achieved that binding end and target quilt The secure binding of binding end.
On the basis of technique scheme, described setting binding condition includes: the bound end of described target is opened Open binding function, and the bound end of described target is not bound by arbitrary binding end;Accordingly, described cloud service Device also includes: the second bind request receiver module, binds what end sent for described cloud server second The bind request of end bound to described target;Authorization requests sending module, if for described Cloud Server Inquiry determines that the bound end of described target opens binding function, and the bound end of described target is tied up by described first Fixed end is bound, then send binding authorization requests to described first binding end, wherein, described binding authorization requests Identification information including described second binding end;Authorization response receiver module, if described Cloud Server receives The confirmation authorization response returned to described first binding end, then tied up described second binding end with described target Fixed end is bound.
On the basis of technique scheme, also include: binding function opens request receiver module, for institute State the binding function unlatching request that the bound end of target described in cloud server sends;Binding function opens mould Block, opens tying up of the bound end of described target for described Cloud Server according to the request of opening of described binding function Determine function;Binding function closes module, for described Cloud Server if be detected that terminate binding trigger condition, Then close the binding function of the bound end of described target.
On the basis of technique scheme, also include: activate request receiver module, for described cloud service Device receives the activation request that the bound end of described target sends;Access identities generation module, takes for described cloud Business device activates the request described access identities of generation according to described, and sends described access identities to described target Bound end.
On the basis of technique scheme, described access identities generation module is additionally operable to: described Cloud Server If the access identities receiving the transmission of described target bound end is more newly requested, then update and described target quilt The access identities that binding end is corresponding;Access identities after described Cloud Server will update is back to described target quilt Binding end.
On the basis of technique scheme, also include: registration request receiver module, for described cloud service Device receives the registration request that described first binding end sends, and wherein, described registration request includes login user name And log in password;Access password generation module, generates according to described registration request for described Cloud Server Access password, and send to described first binding end;Accordingly, described first bind request receiver module tool Body is used for: described Cloud Server obtains the to be verified user corresponding with described first binding end by logging in interface Name and password to be verified;Described Cloud Server is if it is determined that described user name to be verified and described to be verified Password respectively with the described login user name of described first binding end and described in log in password consistent, then will Binding interface is supplied to described first binding end, and is obtained and described first binding end by described binding interface Corresponding password to be verified;Described Cloud Server is if it is determined that described password to be verified binds end with described first Described access password consistent, then by described binding interface first bind end send bind request.
Embodiment seven
Fig. 7 show the structured flowchart of the binding end of the apparatus bound that the embodiment of the present invention seven provides, this enforcement Example is applicable between internet of things equipment the situation carrying out binding, and this binding end specifically includes:
First bind request sending module 4, sends bound to target for the first binding end to Cloud Server The bind request of end, wherein, described bind request includes the identification information of the bound end of described target;
First access identities receiver module 5, receives what described Cloud Server returned for described first binding end The access identities of the bound end of described target, and carry out according to described access identities end bound to described target Access.
The technical scheme of the present embodiment, solves the bound end of target in internet of things equipment without mandate In the case of the binding of i.e. acceptable binding end and the problem of bringing potential safety hazard, it is achieved that binding end and target quilt The secure binding of binding end.
On the basis of technique scheme, also include: authorization requests receiver module, tie up for described first Fixed end receives the binding authorization requests that described Cloud Server sends, and wherein, described binding authorization requests includes the The identification information of two binding ends;Authorization response sending module, if authorizing described for described first binding end Second binding end end bound to described target is bound, then return to described Cloud Server to confirm to authorize and ring Should, so that described second binding end end bound with described target is bound.
On the basis of technique scheme, also include: registration request sending module, tie up for described first The registration request that fixed end sends to described Cloud Server, wherein, described registration request include login user name with And log in password;Access password receiver module, receives described Cloud Server for described first binding end and returns The access password corresponding with described registration request;Accordingly, the first binding end request sending module is specifically used In: described first binding end by described Cloud Server provide log in interface input described login user name with Password is logged in, so that described Cloud Server carries out login authentication to described first binding end described in and;Described The binding interface that one binding end is provided by described Cloud Server inputs described access password, so that described cloud clothes Described first binding end is conducted interviews password authentication by business device;Described first binding end is by described binding interface Send described bind request.
Embodiment eight
Fig. 8 show the structured flowchart of the bound end of target of the apparatus bound that the embodiment of the present invention eight provides, The present embodiment is applicable between internet of things equipment the situation carrying out binding, and the bound end of this target specifically includes:
Activate request sending module 6, send the request of activation to Cloud Server for the bound end of target;
Second access identities receiver module 7, receives described Cloud Server for the bound end of described target and returns Access identities, wherein, described access identities is described Cloud Server to be activated request generated by described;
Binding function opens request sending module 8, sends binding function for the bound end of described target and opens Request is to described Cloud Server, so that described Cloud Server is being not detected by terminating the process of binding trigger condition In, open the binding function of the bound end of described target;
Access receiver module 9, receive, for the bound end of described target, the mark to be verified that the first binding end sends Know, and when described mark to be verified is consistent with described access identities, accept the visit of described first binding end Ask.The technical scheme of the present embodiment, solves the bound end of target in internet of things equipment without mandate In the case of the binding of i.e. acceptable binding end and the problem of bringing potential safety hazard, it is achieved that binding end and target quilt The secure binding of binding end.
The technical scheme of the present embodiment, solves the bound end of target in internet of things equipment without mandate In the case of the binding of i.e. acceptable binding end and the problem of bringing potential safety hazard, it is achieved that binding end and target quilt The secure binding of binding end.
Embodiment nine
Fig. 9 show the structured flowchart of the binding end of the apparatus bound that the embodiment of the present invention nine provides, this enforcement Example is applicable to the situation carrying out binding under LAN environment between internet of things equipment, and this binding end specifically includes:
Cryptographic binding request sending module 10, sends bind request for the first binding end to the bound end of target, Wherein, described bind request includes the bound secret of the bound end of described target;
Cryptographic binding access identities receiver module 11, receives described target for described first binding end bound The access identities that end returns, and conduct interviews according to described access identities end bound to described target.
The technical scheme of the present embodiment, solves the bound end of target in internet of things equipment without mandate In the case of the binding of i.e. acceptable binding end and the problem of bringing potential safety hazard, it is achieved that binding end and target quilt The secure binding of binding end.
Embodiment ten
Figure 10 show the structured flowchart of the bound end of target of the apparatus bound that the embodiment of the present invention ten provides, The present embodiment is applicable to the situation carrying out binding under LAN environment between internet of things equipment, and this target is tied up Fixed end specifically includes:
Activate request sending module 6, send the request of activation to Cloud Server for the bound end of target;
Second access identities receiver module 7, receives described Cloud Server for the bound end of described target and returns Access identities, wherein, described access identities is described Cloud Server to be activated request generated by described;
Cryptographic binding request accepts module 12, receives what the first binding end sent for the bound end of described target Password to be verified, and when described password to be verified is consistent with the bound secret preset, tie up to described first Fixed end sends described access identities;
Access receiver module 9, receive, for the bound end of described target, the mark to be verified that the first binding end sends Know, and when described mark to be verified is consistent with described access identities, accept the visit of described first binding end Ask.
The technical scheme of the present embodiment, solves the bound end of target in internet of things equipment without mandate In the case of the binding of i.e. acceptable binding end and the problem of bringing potential safety hazard, it is achieved that binding end and target quilt The secure binding of binding end.
On the basis of technique scheme, also include: access identities updates request sending module, for institute If stating target bound end amendment bound secret, then send access identities to described Cloud Server more newly requested; Second access identities receiver module, receives, for the bound end of described target, the renewal that described Cloud Server returns After access identities.
The said goods can perform the method that any embodiment of the present invention is provided, and possesses the corresponding merit of execution method Can module and beneficial effect.
Note, above are only presently preferred embodiments of the present invention and institute's application technology principle.Those skilled in the art It will be appreciated that the invention is not restricted to specific embodiment described here, can enter for a person skilled in the art Row various obvious changes, readjust and substitute without departing from protection scope of the present invention.Therefore, though So by above example, the present invention is described in further detail, but the present invention be not limited only to Upper embodiment, without departing from the inventive concept, it is also possible to include other Equivalent embodiments more, And the scope of the present invention is determined by scope of the appended claims.

Claims (10)

1. the method for an apparatus bound, it is characterised in that including:
Cloud server first binds the bind request of the end bound to target that end sends, wherein, described Bind request includes the identification information of the bound end of described target;
Set if the inquiry of described Cloud Server determines that the bound end of described target corresponding to described bind request meets Surely bind condition, then described first binding end end bound with described target is bound;
The binding information that first binding end end bound with described target described in described Cloud Server record is corresponding, And the most described first binding end of access identities sending the bound end of described target, to realize described first binding Hold the access of end bound to described target.
The method of apparatus bound the most according to claim 1, it is characterised in that described setting binding bar Part includes: the bound end of described target opens binding function, and the bound end of described target is not by arbitrary binding End binding;
Accordingly, corresponding at the first binding end end bound with described target described in described Cloud Server record After binding information, and the most described first binding end of access identities sending the bound end of described target, also wrap Include:
Described cloud server second binds the bind request of the end bound to described target that end sends;
If the inquiry of described Cloud Server determines that the bound end of described target opens binding function, and described target Bound end is bound by described first binding end, then send binding authorization requests and bind end to described first, its In, described binding authorization requests includes the identification information of described second binding end;
If described Cloud Server receives the confirmation authorization response that described first binding end returns, then by described Second binding end end bound with described target is bound.
The method of apparatus bound the most according to claim 1, it is characterised in that also include:
The binding function that the bound end of target described in described cloud server sends opens request;
Described Cloud Server opens the binding merit of the bound end of described target according to the request of opening of described binding function Energy;
Described Cloud Server if be detected that terminate binding trigger condition, then closes the bound end of described target Binding function.
The method of apparatus bound the most according to claim 3, it is characterised in that at described Cloud Server Before receiving the binding function unlatching request that the bound end of described target sends, also include:
The activation request that the bound end of target described in described cloud server sends;
Described Cloud Server activates the request described access identities of generation according to described, and described access identities is sent out Deliver to the bound end of described target.
The method of apparatus bound the most according to claim 4, it is characterised in that at described Cloud Server Activate the request described access identities of generation according to described, and the transmission of described access identities is tied up to described target Behind fixed end, also include:
If the access identities that described Cloud Server receives the transmission of described target bound end is more newly requested, then Update the access identities that end bound with described target is corresponding;
Access identities after described Cloud Server will update is back to the bound end of described target.
The method of apparatus bound the most according to claim 1, it is characterised in that at described Cloud Server Before receiving the bind request that the first binding end sends, also include:
The registration request that first binding end described in described cloud server sends, wherein, described registration request Including login user name and log in password;
Described Cloud Server generates access password according to described registration request, and sends to described first binding end;
Accordingly, described cloud server first bind end send bind request specifically include:
Described Cloud Server by log in interface obtain bind with described first user name to be verified corresponding to end with And password to be verified;
Described Cloud Server is if it is determined that described user name to be verified and described password to be verified are respectively with described The described login user name of the first binding end and described in log in password consistent, then binding interface is supplied to Described first binding end, and obtain the to be verified mouth corresponding with described first binding end by described binding interface Order;
Described Cloud Server is if it is determined that the described access password of end bound in described password to be verified and described first Consistent, then bind, by described binding interface first, the bind request that end sends.
7. the method for an apparatus bound, it is characterised in that including:
First binding end sends the bind request of end bound to target, wherein, described binding to Cloud Server Request includes the identification information of the bound end of described target;
Described first binding end receives the access identities of the bound end of described target that described Cloud Server returns, And conduct interviews according to described access identities end bound to described target.
The method of apparatus bound the most according to claim 7, it is characterised in that bind described first After end receives the access identities of the bound end of described target that described Cloud Server returns, also include:
First binding end receives the binding authorization requests that described Cloud Server sends, and wherein, described binding authorizes Request includes the identification information of the second binding end;
If described first binding end authorizes described second binding end end bound to described target to bind, Then return to described Cloud Server and confirm authorization response, so that described second binding end is bound with described target End is bound.
The method of apparatus bound the most according to claim 7, it is characterised in that first binding end to Before Cloud Server sends bind request, also include:
The registration request that described first binding end sends to described Cloud Server, wherein, described registration request bag Include login user name and log in password;
Described first binding end receives the access mouth corresponding with described registration request that described Cloud Server returns Order;
Accordingly, the first binding end specifically includes to Cloud Server transmission bind request:
Described first binding end by described Cloud Server provide log in interface input described login user name with Password is logged in, so that described Cloud Server carries out login authentication to described first binding end described in and;
The binding interface that described first binding end is provided by described Cloud Server inputs described access password, with Make described Cloud Server that described first binding end to be conducted interviews password authentication;
Described first binding end sends described bind request by described binding interface.
10. the method for an apparatus bound, it is characterised in that including:
The bound end of target sends the request of activation to Cloud Server;
The bound end of described target receives the access identities that described Cloud Server returns, and wherein, described access is marked Know and ask to generate by described activation for described Cloud Server;
The bound end of described target receives the password to be verified that the first binding end sends, and described to be verified close When code is consistent with the bound secret preset, send described access identities to described first binding end;
The bound end of described target receives the mark to be verified that the first binding end sends, and at described mark to be verified When knowing consistent with described access identities, accept the access of described first binding end.
CN201610172507.4A 2016-03-24 2016-03-24 Device binding method Pending CN105871821A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610172507.4A CN105871821A (en) 2016-03-24 2016-03-24 Device binding method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610172507.4A CN105871821A (en) 2016-03-24 2016-03-24 Device binding method

Publications (1)

Publication Number Publication Date
CN105871821A true CN105871821A (en) 2016-08-17

Family

ID=56625779

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610172507.4A Pending CN105871821A (en) 2016-03-24 2016-03-24 Device binding method

Country Status (1)

Country Link
CN (1) CN105871821A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106707782A (en) * 2016-12-20 2017-05-24 北京小米移动软件有限公司 Environmental parameter processing method and device and equipment binding method and device
CN107172017A (en) * 2017-04-25 2017-09-15 北京大有中城科技有限公司 A kind of automatic binding method of log-on message
CN107342984A (en) * 2017-06-13 2017-11-10 浙江大华技术股份有限公司 A kind of system, method and device for apparatus bound
CN107492247A (en) * 2017-08-14 2017-12-19 深圳市极成光电有限公司 The localization method and system of article
CN108521857A (en) * 2017-07-25 2018-09-11 北京小米移动软件有限公司 A kind of NB-IoT apparatus bounds method and a kind of Internet of Things network control system
CN109040013A (en) * 2018-06-20 2018-12-18 联想(北京)有限公司 The authentication method and device of intelligent earphone
CN109041038A (en) * 2018-04-20 2018-12-18 珠海奔图电子有限公司 For controlling the method and system of electronic device and designated user's binding
CN110070655A (en) * 2019-04-29 2019-07-30 北京摇光智能科技有限公司 A kind of electronic lock and installation addresses binding method
CN110611903A (en) * 2018-06-15 2019-12-24 中兴通讯股份有限公司 Equipment binding method, device, equipment and storage medium
CN111092898A (en) * 2019-12-24 2020-05-01 华为终端有限公司 Message transmission method and related equipment
CN111818611A (en) * 2020-07-03 2020-10-23 青岛易来智能科技股份有限公司 Equipment binding method and device
CN112738265A (en) * 2020-12-31 2021-04-30 青岛海尔科技有限公司 Equipment binding method and device, storage medium and electronic device
CN115988632A (en) * 2023-01-10 2023-04-18 中国联合网络通信集团有限公司 Network access method, device, equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103747010A (en) * 2014-01-22 2014-04-23 北京奇虎科技有限公司 Method, system and device for controlling PC (personal computer) by mobile terminal
CN104202306A (en) * 2014-08-15 2014-12-10 小米科技有限责任公司 Method, device and system of access authentication
CN104778612A (en) * 2015-04-23 2015-07-15 上海未来宽带技术股份有限公司 Method and system for realizing offline-to-online marketing management of physical store
CN105100067A (en) * 2015-06-26 2015-11-25 上海庆科信息技术有限公司 Cloud activation method and system
CN105306320A (en) * 2015-11-20 2016-02-03 青岛海信移动通信技术股份有限公司 Method and device for binding clients to intelligent device
CN105407454A (en) * 2015-11-23 2016-03-16 深圳还是威健康科技有限公司 Binding method and device for wearable device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103747010A (en) * 2014-01-22 2014-04-23 北京奇虎科技有限公司 Method, system and device for controlling PC (personal computer) by mobile terminal
CN104202306A (en) * 2014-08-15 2014-12-10 小米科技有限责任公司 Method, device and system of access authentication
CN104778612A (en) * 2015-04-23 2015-07-15 上海未来宽带技术股份有限公司 Method and system for realizing offline-to-online marketing management of physical store
CN105100067A (en) * 2015-06-26 2015-11-25 上海庆科信息技术有限公司 Cloud activation method and system
CN105306320A (en) * 2015-11-20 2016-02-03 青岛海信移动通信技术股份有限公司 Method and device for binding clients to intelligent device
CN105407454A (en) * 2015-11-23 2016-03-16 深圳还是威健康科技有限公司 Binding method and device for wearable device

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106707782A (en) * 2016-12-20 2017-05-24 北京小米移动软件有限公司 Environmental parameter processing method and device and equipment binding method and device
CN107172017A (en) * 2017-04-25 2017-09-15 北京大有中城科技有限公司 A kind of automatic binding method of log-on message
CN107342984A (en) * 2017-06-13 2017-11-10 浙江大华技术股份有限公司 A kind of system, method and device for apparatus bound
CN108521857A (en) * 2017-07-25 2018-09-11 北京小米移动软件有限公司 A kind of NB-IoT apparatus bounds method and a kind of Internet of Things network control system
CN108521857B (en) * 2017-07-25 2021-08-03 北京小米移动软件有限公司 NB-IoT equipment binding method and IOT control system
US11005944B2 (en) 2017-07-25 2021-05-11 Beijing Xiaomi Mobile Software Co., Ltd. Method for binding NB-IoT device, and internet of things control system
CN107492247A (en) * 2017-08-14 2017-12-19 深圳市极成光电有限公司 The localization method and system of article
CN109041038A (en) * 2018-04-20 2018-12-18 珠海奔图电子有限公司 For controlling the method and system of electronic device and designated user's binding
CN110611903A (en) * 2018-06-15 2019-12-24 中兴通讯股份有限公司 Equipment binding method, device, equipment and storage medium
CN109040013B (en) * 2018-06-20 2021-07-16 联想(北京)有限公司 Authentication method and device of intelligent earphone
CN109040013A (en) * 2018-06-20 2018-12-18 联想(北京)有限公司 The authentication method and device of intelligent earphone
CN110070655B (en) * 2019-04-29 2021-03-16 北京摇光智能科技有限公司 Electronic lock and installation address binding method
CN110070655A (en) * 2019-04-29 2019-07-30 北京摇光智能科技有限公司 A kind of electronic lock and installation addresses binding method
CN111092898A (en) * 2019-12-24 2020-05-01 华为终端有限公司 Message transmission method and related equipment
CN111092898B (en) * 2019-12-24 2022-05-10 华为终端有限公司 Message transmission method and related equipment
CN111818611A (en) * 2020-07-03 2020-10-23 青岛易来智能科技股份有限公司 Equipment binding method and device
CN112738265A (en) * 2020-12-31 2021-04-30 青岛海尔科技有限公司 Equipment binding method and device, storage medium and electronic device
CN115988632A (en) * 2023-01-10 2023-04-18 中国联合网络通信集团有限公司 Network access method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN105871821A (en) Device binding method
CN103517273B (en) Authentication method, managing platform and Internet-of-Things equipment
CN104601590B (en) A kind of login method, server and mobile terminal
CN105871838B (en) A kind of log-in control method and customer center platform of third party's account
CN102771102B (en) The network of distribute digital content and management method
CN105187431B (en) Login method, server, client and the communication system of third-party application
CN110351228A (en) Remote entry method, device and system
CN108200050A (en) Single logging-on server, method and computer readable storage medium
CN104144167B (en) User login authentication method of open intelligent gateway platform
CN106127888B (en) Intelligent lock operation method and smart lock operating system
CN106131079A (en) A kind of authentication method, system and proxy server
CN103489233A (en) Electronic door control system with dynamic password
CN103780580B (en) Method, server and system for providing capability access strategy
CN104718526A (en) Secure mobile framework
CN106452782A (en) Method and system for producing a secure communication channel for terminals
CN109011583A (en) virtual resource transfer method and device, storage medium and electronic device
CN107426174A (en) A kind of access control system and method for credible performing environment
CN108259432A (en) A kind of management method of API Calls, equipment and system
CN106101054A (en) The single-point logging method of a kind of multisystem and centralized management system
CN102903167A (en) Management system for renting and selling houses
CN104901928A (en) Data interaction method, device and system
CN103914925B (en) Off-line is opened invoice and carries out the method and system of management and control
CN107566367A (en) A kind of shared method, apparatus of cloud storage information network certification
US20200274866A1 (en) Method for implementing client side credential control to authorize access to a protected device
CN104125230B (en) A kind of short message certification service system and authentication method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160817

RJ01 Rejection of invention patent application after publication