CN108134773B - Shared device binding method and device, storage medium and server - Google Patents

Shared device binding method and device, storage medium and server Download PDF

Info

Publication number
CN108134773B
CN108134773B CN201711096814.XA CN201711096814A CN108134773B CN 108134773 B CN108134773 B CN 108134773B CN 201711096814 A CN201711096814 A CN 201711096814A CN 108134773 B CN108134773 B CN 108134773B
Authority
CN
China
Prior art keywords
equipment
verification
shared
operator
binding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711096814.XA
Other languages
Chinese (zh)
Other versions
CN108134773A (en
Inventor
周永敬
翁健峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201711096814.XA priority Critical patent/CN108134773B/en
Publication of CN108134773A publication Critical patent/CN108134773A/en
Application granted granted Critical
Publication of CN108134773B publication Critical patent/CN108134773B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Abstract

The application provides a method and a device for binding shared equipment, a storage medium and a server. The method for binding the sharing device comprises the following steps: an information receiving step of receiving shared equipment identification information and equipment operator information from a terminal, wherein the shared equipment identification information comprises a two-dimensional code, a bar code or an equipment ID number; a verification step, which is used for judging whether the equipment operator has the operation authority to the sharing equipment according to the received sharing equipment identification information and the equipment operator information, and determining whether the verification is successful according to the judgment result; a binding step for: and if the verification is determined to be successful, binding the shared equipment with the equipment operator. The technical scheme provided by the application does not need binding of the shared equipment before leaving the factory, can bind when the merchant needs, is convenient for operation, and ensures that the system is more flexible.

Description

Shared device binding method and device, storage medium and server
Technical Field
The present application relates to the field of intelligent electrical appliances, and in particular, to a method and apparatus for binding a shared device, a storage medium, and a server.
Background
With the increasing popularity of sharing devices, the types of sharing devices are more and more abundant, and the sharing devices have positive influence on the daily life of people, so that the life of people is more and more convenient. The sharing devices on the market today are mostly sharing bicycles. The devices sharing the bicycle are all operated by a company alone, that is to say, the operators of the bicycle are determined when leaving the factory, so that the binding of the operators is basically not involved. The mode of binding the operator by the sharing device when leaving the factory is not modified once the operator is determined, although the operation is convenient to a certain extent. For some household type products, such as washing machines, induction cookers, microwave ovens, refrigerators, etc., if a third party manufacturer purchases a retrofit to a shared device, it may be necessary to bind the operator because the device is shipped from the factory without determining the operator unless it is a highly customized product. How to safely and flexibly bind the shared equipment with an operator.
Disclosure of Invention
The application aims to overcome the defects of the prior art and provides a method, a device, a storage medium and a server for binding shared equipment, so as to solve the problem that the shared equipment and an operator cannot be flexibly bound in the prior art.
In one aspect, the present application provides a method for binding a shared device, including: an information receiving step of receiving shared equipment identification information and equipment operator information from a terminal, wherein the shared equipment identification information comprises a two-dimensional code, a bar code or an equipment ID number; a verification step, which is used for judging whether the equipment operator has the operation authority to the sharing equipment according to the received sharing equipment identification information and the equipment operator information, and determining whether the verification is successful according to the judgment result; a binding step for: and if the verification is determined to be successful, binding the shared equipment with the equipment operator.
Optionally, determining whether the device operator has the operation authority to the shared device according to the received shared device identification information and the device operator information includes: pre-storing shared equipment binding information, wherein the shared equipment binding information comprises shared equipment identification information and operator information with operation authority for the shared equipment; matching the received shared device identification information and device operator information with the prestored shared device binding information; if the matching is successful, judging that the equipment operator has the operation authority to the shared equipment.
Optionally, the method further comprises: if the matching is unsuccessful, a prompt that the operation authority of the sharing equipment is not given to the equipment operator is returned to the terminal.
Optionally, the determining whether the verification is successful according to the judging result includes: if the equipment operator has the operation authority to the shared equipment, the verification is determined to be successful; or if the equipment operator has the operation authority to the sharing equipment, sending an instruction for entering a verification mode to the sharing equipment, and receiving a first verification code returned by the sharing equipment; the verification mode entering instruction is used for randomly generating the first verification code after the shared equipment receives the first verification code, displaying the first verification code on a panel of the shared equipment and sending the generated first verification code to the server; receiving a second verification code from the terminal; the second verification code is obtained from a panel of the sharing equipment and is sent through the terminal; and comparing the second verification code from the terminal with the first verification code returned by the sharing equipment, if the second verification code is consistent with the first verification code, determining that verification is successful, and sending an instruction of exiting the verification mode to the sharing equipment.
Optionally, after the binding step, the method further includes: and sending a confirmation message of successful binding to the terminal.
Optionally, after the binding step, the method further includes: the verification step is re-executed in response to receiving a request from the equipment operator of the terminal to unbind the shared equipment, shared equipment identification information and equipment operator information; and if the verification is determined to be successful, unbinding the shared equipment and the equipment operator.
The present application also provides a shared device binding apparatus, including: an information receiving unit, configured to receive shared device identification information and device operator information from a terminal, where the shared device identification information includes a two-dimensional code, a bar code, or a device ID number; the verification unit is used for judging whether the equipment operator has operation authority to the sharing equipment according to the received sharing equipment identification information and equipment operator information, and determining whether verification is successful according to a judgment result; a binding unit for: and if the verification is determined to be successful, binding the shared equipment with the equipment operator.
Optionally, the verification unit includes: the preset subunit is used for pre-storing shared equipment binding information, wherein the shared equipment binding information comprises the shared equipment identification information and operator information with operation authority for the shared equipment; a matching subunit, configured to match the received shared device identification information and device operator information with the prestored shared device binding information; a judging and processing subunit, configured to: if the matching is successful, judging that the equipment operator has the operation authority to the shared equipment.
Optionally, the judging processing subunit is further configured to: if the matching is unsuccessful, a prompt that the operation authority of the sharing equipment is not given to the equipment operator is returned to the terminal.
Optionally, the verification unit further comprises a first determination subunit, the first determination subunit being configured to: if the equipment operator has the operation authority to the shared equipment, the verification is determined to be successful; alternatively, the verification unit further comprises a second determination subunit for: if the equipment operator has the operation authority to the sharing equipment, sending an instruction for entering a verification mode to the sharing equipment, and receiving a first verification code returned by the sharing equipment; the verification mode entering instruction is used for randomly generating the first verification code after the shared equipment receives the first verification code, displaying the first verification code on a panel of the shared equipment and sending the generated first verification code to the server; receiving a second verification code from the terminal; the second verification code is obtained from a panel of the sharing equipment and is sent through the terminal; and comparing the second verification code from the terminal with the first verification code returned by the sharing equipment, if the second verification code is consistent with the first verification code, determining that verification is successful, and sending an instruction of exiting the verification mode to the sharing equipment.
Optionally, the method further comprises a message sending unit, configured to send a confirmation message that the binding is successful to the terminal after the shared device is bound with the device operator.
Optionally, the binding unit is further configured to: re-executing the function executed by the verification unit in response to receiving a request for unbinding the shared device from the device operator of the terminal, shared device identification information and device operator information; and if the verification is determined to be successful, unbinding the shared equipment and the equipment operator.
In yet another aspect, the present application provides a server, including an apparatus as described in any one of the above.
In yet another aspect, the present application provides a server, including a processor, a memory, and a computer program stored on the memory and executable on the processor, where the processor implements any of the steps described above as applied to a server-side method when the program is executed.
Yet another aspect of the present application provides a computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of a method as described in any of the above for use on a server side, for use on a terminal or for use on a device side.
The technical scheme provided by the application does not need binding of the shared equipment before leaving the factory, can bind when the merchant needs, is convenient for operation, and ensures that the system is more flexible. Further, by adopting the mode that the equipment to be verified generates the verification code, the unique correspondence between the equipment and the binding two-dimensional code is verified, the availability of the equipment is ensured, the correctness of the two-dimensional code of the equipment can be ensured, the equipment of a merchant can be ensured not to be maliciously bound by other merchants, meanwhile, the unbinding can be dynamically carried out by the mode, the operation is flexible, and the authority safety and the correctness can be ensured.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. In the drawings:
FIG. 1 is an overall framework diagram of a shared device binding method provided by the present application;
FIG. 2 is a workflow diagram of the method for binding a shared device according to the present application for determining whether a device operator has an operation right to the shared device;
FIG. 3 is a workflow diagram of a preferred embodiment of the verification steps of the shared device binding method provided by the present application;
FIG. 4 is a workflow diagram of yet another preferred embodiment of the verification steps of the shared device binding method provided by the present application;
FIG. 5 is a workflow diagram of another preferred embodiment of the shared device binding method provided by the present application;
FIG. 6 is a schematic diagram of information interaction of a preferred embodiment of the method for binding a shared device according to the present application;
FIG. 7 is an overall frame diagram of the shared device binding apparatus provided by the present application;
FIG. 8 is a schematic diagram of a preferred embodiment of a shared device binding apparatus provided by the present application;
fig. 9 is a schematic structural diagram of another preferred embodiment of the shared device binding apparatus provided by the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be clearly and completely described below with reference to specific embodiments of the present application and corresponding drawings. It will be apparent that the described embodiments are only some, but not all, embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the application described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The application provides a method for binding sharing equipment. Fig. 1 is an overall framework diagram of a method for binding a shared device provided by the present application. As shown in fig. 1, the method for binding sharing devices of the present application includes: step S110, an information receiving step, which is used for receiving shared equipment identification information and equipment operator information from a terminal, wherein the shared equipment identification information comprises a two-dimensional code, a bar code or an equipment ID number; step S120, a verification step, which is used for judging whether the equipment operator has the operation authority to the sharing equipment according to the received sharing equipment identification information and the equipment operator information, and determining whether the verification is successful according to the judgment result; step S130, a binding step, for: and if the verification is determined to be successful, binding the shared equipment with the equipment operator.
With the increasing advent of the sharing concept, many devices began to have shared attributes. Early coin-operated washing machines, as well as public induction cookers, microwave ovens, refrigerators, etc., were early attended sharing. If the devices also want to be made into unattended sharing similar to a sharing bicycle in the present sense and support code scanning payment, merchants are bound and pay and use through two-dimension codes set by the merchants.
Unlike shared bicycles currently popular in the market, which have only one payee, the technical scheme of the present application allows a third party to operate. That is, after the third party's operator purchases the shared device, the shared device needs to be bound to itself as the operator and becomes the payee. The network-enabled shared device not bound with the operator can register own information on the server after being electrified, but the registered information only has the basic state information of the device, and for the universality of the device, the operator information is bound by the operator after the device is electrified, and only the device bound with the operator has a payee and can be put into the market. The product which can be modified into the shared equipment such as household appliances and the like needs an internet surfing module, and can be on the internet through a mobile network, wifi and the like, the factory equipment is attached with a two-dimension code representing the unique identifier of the current equipment, and an operator can bind through the two-dimension code.
Fig. 2 is a workflow diagram of the method for binding a shared device according to the present application for determining whether a device operator has an operation authority to the shared device. As shown in fig. 2, according to an embodiment of the method for binding a shared device of the present application, determining whether the device operator has an operation authority to the shared device according to the received shared device identification information and device operator information includes: step S210, pre-storing shared equipment binding information, wherein the shared equipment binding information comprises the shared equipment identification information and operator information with operation authority for the shared equipment; step S220, matching the received shared equipment identification information and equipment operator information with the prestored shared equipment binding information; step S230, if the matching is successful, judging that the equipment operator has the operation authority to the sharing equipment; step S240, if the matching is unsuccessful, a prompt that the equipment operator has no operation authority for the sharing equipment is returned to the terminal.
In this embodiment, when the sharing device operator purchases the sharing device, that is, the sharing device binding information is stored in the server, including identification information for uniquely identifying the sharing device, and operator information having an operation right for the sharing device; taking the shared equipment identification information as an example of a two-dimensional code, when an operator wants to put the shared equipment into use, scanning the two-dimensional code stuck on the shared equipment by using a terminal, and sending the two-dimensional code on the shared equipment and login information of the operator to a server through the terminal; after receiving the information, the server is matched with the prestored shared equipment binding information so as to judge whether an equipment operator has operation authority on the shared equipment.
FIG. 3 is a workflow diagram of a preferred embodiment of the verification steps of the shared device binding method provided by the present application; fig. 4 is a workflow diagram of yet another preferred embodiment of the verification steps of the shared device binding method provided by the present application. As shown in fig. 3, according to an embodiment of the method for binding a shared device of the present application, the determining whether verification is successful according to the determination result includes: step S250, if the equipment operator has the operation authority to the shared equipment, the verification is determined to be successful.
Alternatively, according to an embodiment of the method for binding a shared device of the present application, as shown in fig. 4, the determining whether the verification is successful according to the determination result includes: step S260, if the equipment operator has the operation authority to the sharing equipment, sending an instruction for entering a verification mode to the sharing equipment, and receiving a first verification code returned by the sharing equipment; the verification mode entering instruction is used for randomly generating the first verification code after the shared equipment receives the first verification code, displaying the first verification code on a panel of the shared equipment and sending the generated first verification code to the server; step S270, receiving a second verification code from the terminal; the second verification code is obtained from a panel of the sharing equipment and is sent through the terminal; and step S280, comparing the second verification code from the terminal with the first verification code returned by the sharing equipment, if the second verification code is consistent with the first verification code, determining that verification is successful, and sending an instruction of exiting the verification mode to the sharing equipment.
The embodiment shown in fig. 3 verifies whether the operator has the operation authority to the sharing device only through the two-dimension code pasted on the sharing device, if the two-dimension code passes the verification, the verification is successful, and then the operator can be bound with the sharing device. On the basis of the embodiment shown in fig. 3, the embodiment shown in fig. 4 further verifies the two-dimensional code by randomly generating the verification code through the sharing device after the two-dimensional code is verified. In the implementation mode, the success of binding can be ensured only if the verification code input by the mobile phone is consistent with the number of the equipment, and the implementation mode ensures the corresponding relation between the two-dimensional code of the machine body and the machine. The operator uses the software on the mobile device to log in the account number of the operator and opens the two-dimensional code on the scanning device with the code scanning function to enable the device to enter a verification mode, at the moment, a string of numbers or characters are displayed on a display screen of the device and flash a screen, and meanwhile, the numbers or characters are uploaded to the server; and inputting the verification number or the text on the display screen of the equipment by the mobile phone and sending the verification number or the text to the server. The verification can be successfully bound, if the two-dimension code is misplaced, the device will not react, and the two-dimension code can be verified and ensured to be correct. Meanwhile, before the equipment enters the verification mode, an operator can judge whether the server has operation authority or not, and only the equipment with the use authority can enter the verification mode, if the equipment is not the operator, the mobile phone can remind that the operation authority is not available during scanning.
The sharing equipment is bound in the mode, so that the correctness of the two-dimension code of the equipment can be guaranteed, the equipment of an operator can be prevented from being maliciously bound by other merchants, the operation is flexible, and the permission safety and the correctness can be guaranteed.
Fig. 5 is a workflow diagram of another preferred embodiment of the shared device binding method provided by the present application. As shown in fig. 5, according to an embodiment of the method for binding a shared device of the present application, after the binding step, the method further includes: and step S140, sending a confirmation message of successful binding to the terminal.
According to one embodiment of the method for binding a shared device of the present application, after the step of binding, the method further comprises: the verification step is re-executed in response to receiving a request from the equipment operator of the terminal to unbind the shared equipment, shared equipment identification information and equipment operator information; and if the verification is determined to be successful, unbinding the shared equipment and the equipment operator. In case the shared device is not operated any more by the operator, it is unbound and after the unbound, it is bound again in the above-described way if it is necessary to restart the operation again. In another case, after the binding is released, another operator starts to operate the shared device, and according to the method, the binding information of the shared device is changed on the server, that is, the operator information with the operation authority of the shared device is changed, and then the new operator rebinds the shared device. The implementation mode dynamically unbinding and rebinding, the operation is flexible, and the security and the correctness of the authority can be ensured.
Fig. 6 is an information interaction schematic diagram of a preferred embodiment of the method for binding a shared device according to the present application. The reference numerals shown in fig. 6 are: 1 is sharing equipment; 2 is a terminal; and 3 is a server. The shared device usage system shown in fig. 6 includes home appliances or other products with display functions, the internet surfing module may be a cellular network, wifi, etc., the two-dimensional code including unique information of device networking, a mobile client may be a mobile phone, etc., and a server is further required. The operation steps are step1-step7 shown in FIG. 6, and are specifically as follows:
step1: opening software of the terminal 2, scanning a two-dimensional code on the self-service sharing equipment 1 to be bound by using the provided code scanning function, and clicking a verification button on an opened interface after the mobile terminal 2 is scanned;
step2: after clicking the verification button, the terminal 2 checks whether the operation authority exists through the server 3, and if the operation authority does not exist, a corresponding prompt is given;
step3: if step2 passes the authentication, the server 3 causes the sharing device 1 to enter the authentication mode, i.e. to display a string of random numbers, and to flash on the liquid crystal panel, as shown in fig. 6, with an authentication code 23456 displayed on the liquid crystal panel in the upper left corner of the sharing device 1. If the sharing device 1 does not enter the verification mode, it is required to confirm whether the current two-dimensional code is wrong;
step 4: the sharing device 1 entering the verification state uploads the random number to the server 3;
step 5: the user inputs a random number on the sharing device 1 at the terminal 2, clicks a binding button, and sends a verification code to the server 3;
step 6: the server 3 compares the numbers uploaded by the terminal 2 and the sharing device 1, combines the information of the sharing device, returns a verification result, informs the terminal 2, and confirms the binding result;
step 7: the server 3 notifies the sharing device 1 to exit the authentication state.
The application further provides a shared device binding device. Fig. 7 is an overall frame diagram of the shared device binding apparatus provided by the present application. As shown in fig. 7, the shared device binding apparatus of the present application includes: an information receiving unit 100 for receiving shared device identification information and device operator information from a terminal, the shared device identification information including a two-dimensional code, a bar code, or a device ID number; a verification unit 200, configured to determine whether the device operator has an operation authority on the shared device according to the received shared device identification information and device operator information, and determine whether verification is successful according to a determination result; a binding unit 300 for: and if the verification is determined to be successful, binding the shared equipment with the equipment operator.
FIG. 8 is a schematic diagram of a preferred embodiment of a shared device binding apparatus provided by the present application; fig. 9 is a schematic structural diagram of another preferred embodiment of the shared device binding apparatus provided by the present application. As shown in fig. 8 and 9, according to an embodiment of the shared device binding apparatus of the present application, the authentication unit 200 includes: a preset subunit 210, configured to pre-store shared device binding information, where the shared device binding information includes the shared device identification information and operator information that has an operation right on the shared device; a matching subunit 220, configured to match the received shared device identification information and device operator information with the prestored shared device binding information; a judgment processing subunit 230, configured to: if the matching is successful, judging that the equipment operator has the operation authority to the shared equipment.
According to an embodiment of the shared device binding apparatus of the present application, the determining processing subunit 230 is further configured to: if the matching is unsuccessful, a prompt that the operation authority of the sharing equipment is not given to the equipment operator is returned to the terminal.
As shown in fig. 8, according to an embodiment of the shared device binding apparatus of the present application, the verification unit 200 further includes a first determining subunit 240, where the first determining subunit 240 is configured to: if the equipment operator has the operation authority to the shared equipment, the verification is determined to be successful; alternatively, as shown in fig. 9, according to another embodiment of the shared device binding apparatus of the present application, the verification unit 200 further includes a second determination subunit 250, where the second determination subunit 250 is configured to: if the equipment operator has the operation authority to the sharing equipment, sending an instruction for entering a verification mode to the sharing equipment, and receiving a first verification code returned by the sharing equipment; the verification mode entering instruction is used for randomly generating the first verification code after the shared equipment receives the first verification code, displaying the first verification code on a panel of the shared equipment and sending the generated first verification code to the server; receiving a second verification code from the terminal; the second verification code is obtained from a panel of the sharing equipment and is sent through the terminal; and comparing the second verification code from the terminal with the first verification code returned by the sharing equipment, if the second verification code is consistent with the first verification code, determining that verification is successful, and sending an instruction of exiting the verification mode to the sharing equipment.
As shown in fig. 8 and 9, an embodiment of the device binding apparatus for sharing a device according to the present application further includes a message sending unit 400 for sending a confirmation message of successful binding to the terminal after binding the sharing device with the device operator.
According to an embodiment of the shared device binding apparatus of the present application, the binding unit 300 is further configured to: re-executing the function executed by the verification unit in response to receiving a request for unbinding the shared device from the device operator of the terminal, shared device identification information and device operator information; and if the verification is determined to be successful, unbinding the shared equipment and the equipment operator.
In yet another aspect, the present application provides a server, including an apparatus as described in any one of the above.
In yet another aspect, the present application provides a server, including a processor, a memory, and a computer program stored on the memory and executable on the processor, where the processor implements any of the steps described above as applied to a server-side method when the program is executed.
Yet another aspect of the present application provides a computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of a method as described in any of the above for use on a server side, for use on a terminal or for use on a device side.
According to the technical scheme provided by the application, the permission is confirmed through the mobile equipment code scanning, the corresponding relation between the two-dimensional code information and the equipment is confirmed through the comparison mode of the random number verification code generated by the sharing equipment and the verification code manually input by the user, the accuracy of the corresponding relation is ensured, and the binding permission and the binding relation are confirmed through the login information of the logged-in operator.
Scanning a two-dimensional code with shared equipment information through software provided by mobile equipment, and communicating data acquired by the software through code scanning with a server to verify whether an operator of the account has the authority of binding equipment; after the verification rights pass, the device is put into a verification mode. The sharing device entering the authentication mode generates a series of random numbers and displays the random numbers on a display module of the sharing device. The internet surfing module acquires the random number and uploads the random number to the server, meanwhile, the terminal fills in the random number on the seen device and submits the random number to the server for checking, and the checking can be bound to the operator after passing.
The technical scheme provided by the application does not need binding of the shared equipment before leaving the factory, can bind when the merchant needs, is convenient for operation, and ensures that the system is more flexible. Further, by adopting the mode that the equipment to be verified generates the verification code, the unique correspondence between the equipment and the binding two-dimensional code is verified, the availability of the equipment is ensured, the correctness of the two-dimensional code of the equipment can be ensured, the equipment of a merchant can be ensured not to be maliciously bound by other merchants, meanwhile, the unbinding can be dynamically carried out by the mode, the operation is flexible, and the authority safety and the correctness can be ensured.
The functions described herein may be implemented in hardware, software executed by a processor, firmware, or any combination thereof. If implemented in software that is executed by a processor, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Other examples and implementations are within the scope and spirit of the application and the appended claims. For example, due to the nature of software, the functions described above may be implemented using software executed by a processor, hardware, firmware, hardwired, or a combination of any of these. In addition, each functional unit may be integrated in one processing unit, each unit may exist alone physically, or two or more units may be integrated in one unit.
In the several embodiments provided in the present application, it should be understood that the disclosed technology may be implemented in other manners. The above-described embodiments of the apparatus are merely exemplary, and the division of the units, for example, may be a logic function division, and may be implemented in another manner, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interfaces, units or modules, or may be in electrical or other forms.
The units described as separate components may or may not be physically separate, and components as control devices may or may not be physical units, may be located in one place, or may be distributed over multiple units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in part or all of the technical solution or in part in the form of a software product stored in a storage medium, including instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The above description is only an example of the present application and is not intended to limit the present application, but various modifications and variations can be made to the present application by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (13)

1. A method of binding a shared device, comprising:
an information receiving step of receiving shared equipment identification information and equipment operator information from a terminal, wherein the shared equipment identification information comprises a two-dimensional code, a bar code or an equipment ID number;
a verification step, which is used for judging whether the equipment operator has the operation authority to the sharing equipment according to the received sharing equipment identification information and the equipment operator information, and determining whether the verification is successful according to the judgment result;
a binding step for: if the verification is successful, binding the shared equipment with the equipment operator;
the method for judging whether the equipment operator has the operation authority to the sharing equipment according to the received sharing equipment identification information and the equipment operator information comprises the following steps:
pre-storing shared equipment binding information, wherein the shared equipment binding information comprises shared equipment identification information and operator information with operation authority for the shared equipment;
matching the received shared device identification information and device operator information with the prestored shared device binding information;
if the matching is successful, judging that the equipment operator has the operation authority to the shared equipment.
2. The method as recited in claim 1, further comprising: if the matching is unsuccessful, a prompt that the operation authority of the sharing equipment is not given to the equipment operator is returned to the terminal.
3. The method according to claim 1 or 2, wherein determining whether the verification is successful based on the determination result comprises:
if the equipment operator has the operation authority to the shared equipment, the verification is determined to be successful; or alternatively, the process may be performed,
if the equipment operator has the operation authority to the sharing equipment, sending an instruction for entering a verification mode to the sharing equipment, and receiving a first verification code returned by the sharing equipment; the verification mode entering instruction is used for randomly generating the first verification code after the shared equipment receives the first verification code, displaying the first verification code on a panel of the shared equipment and sending the generated first verification code to a server;
receiving a second verification code from the terminal; the second verification code is obtained from a panel of the sharing equipment and is sent through the terminal;
and comparing the second verification code from the terminal with the first verification code returned by the sharing equipment, if the second verification code is consistent with the first verification code, determining that verification is successful, and sending an instruction of exiting the verification mode to the sharing equipment.
4. The method of claim 1, further comprising, after the binding step: and sending a confirmation message of successful binding to the terminal.
5. The method of claim 1, further comprising, after the binding step:
the verification step is re-executed in response to receiving a request from the equipment operator of the terminal to unbind the shared equipment, shared equipment identification information and equipment operator information;
and if the verification is determined to be successful, unbinding the shared equipment and the equipment operator.
6. A shared device binding apparatus, comprising:
an information receiving unit, configured to receive shared device identification information and device operator information from a terminal, where the shared device identification information includes a two-dimensional code, a bar code, or a device ID number;
the verification unit is used for judging whether the equipment operator has operation authority to the sharing equipment according to the received sharing equipment identification information and equipment operator information, and determining whether verification is successful according to a judgment result;
a binding unit for: if the verification is successful, binding the shared equipment with the equipment operator;
the authentication unit includes:
the preset subunit is used for pre-storing shared equipment binding information, wherein the shared equipment binding information comprises the shared equipment identification information and operator information with operation authority for the shared equipment;
a matching subunit, configured to match the received shared device identification information and device operator information with the prestored shared device binding information;
a judging and processing subunit, configured to: if the matching is successful, judging that the equipment operator has the operation authority to the shared equipment.
7. The apparatus of claim 6, wherein the determination processing subunit is further configured to: if the matching is unsuccessful, a prompt that the operation authority of the sharing equipment is not given to the equipment operator is returned to the terminal.
8. The apparatus according to claim 6 or 7, wherein,
the verification unit further comprises a first determination subunit for:
if the equipment operator has the operation authority to the shared equipment, the verification is determined to be successful;
alternatively, the verification unit further comprises a second determination subunit for:
if the equipment operator has the operation authority to the sharing equipment, sending an instruction for entering a verification mode to the sharing equipment, and receiving a first verification code returned by the sharing equipment; the verification mode entering instruction is used for randomly generating the first verification code after the shared equipment receives the first verification code, displaying the first verification code on a panel of the shared equipment and sending the generated first verification code to a server;
receiving a second verification code from the terminal; the second verification code is obtained from a panel of the sharing equipment and is sent through the terminal;
and comparing the second verification code from the terminal with the first verification code returned by the sharing equipment, if the second verification code is consistent with the first verification code, determining that verification is successful, and sending an instruction of exiting the verification mode to the sharing equipment.
9. The apparatus according to claim 6, further comprising a message sending unit configured to send an acknowledgement message to the terminal that the binding was successful after binding the shared device with the device operator.
10. The apparatus of claim 6, wherein the binding unit is further to:
re-executing the function executed by the verification unit in response to receiving a request for unbinding the shared device from the device operator of the terminal, shared device identification information and device operator information;
and if the verification is determined to be successful, unbinding the shared equipment and the equipment operator.
11. A server comprising the apparatus of any one of claims 6-10.
12. A server comprising a processor, a memory and a computer program stored on the memory and executable on the processor, said processor implementing the steps of the method according to any one of claims 1-5 when said program is executed.
13. A computer readable storage medium, characterized in that a computer program is stored thereon, which program, when being executed by a processor, implements the steps of the method according to any of claims 1-5.
CN201711096814.XA 2017-11-09 2017-11-09 Shared device binding method and device, storage medium and server Active CN108134773B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711096814.XA CN108134773B (en) 2017-11-09 2017-11-09 Shared device binding method and device, storage medium and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711096814.XA CN108134773B (en) 2017-11-09 2017-11-09 Shared device binding method and device, storage medium and server

Publications (2)

Publication Number Publication Date
CN108134773A CN108134773A (en) 2018-06-08
CN108134773B true CN108134773B (en) 2023-10-24

Family

ID=62389690

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711096814.XA Active CN108134773B (en) 2017-11-09 2017-11-09 Shared device binding method and device, storage medium and server

Country Status (1)

Country Link
CN (1) CN108134773B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110610394B (en) * 2018-06-15 2022-05-27 佛山市顺德区美的电热电器制造有限公司 Household appliance sharing method, device, equipment and storage medium
CN109272665A (en) * 2018-09-11 2019-01-25 深圳数位科技有限公司 A kind of application method and system of shared device
CN111726268B (en) * 2019-03-19 2022-04-12 佛山市顺德区美的电热电器制造有限公司 Data sharing method and device, equipment and storage medium
CN111062026B (en) * 2019-12-11 2022-06-17 维沃移动通信有限公司 Verification information sharing method and electronic equipment
CN111882842B (en) * 2020-08-04 2022-12-02 珠海格力电器股份有限公司 Early warning method of sharing equipment and sharing equipment
CN113807475A (en) * 2021-08-11 2021-12-17 杭州博联智能科技股份有限公司 Method, system, device and medium for sharing a large number of devices based on two-dimensional code
CN114283508A (en) * 2022-01-13 2022-04-05 广东好太太智能家居有限公司 Intelligent equipment binding method, mobile device and readable medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005002179A2 (en) * 2003-06-25 2005-01-06 Docomo Communications Laboratories Usa, Inc. Method and apparatus for resource sharing among mobile terminals
CN1920873A (en) * 2006-08-31 2007-02-28 刘洪利 Electric vehicle network lease system
CN102609646A (en) * 2012-01-20 2012-07-25 华为终端有限公司 Information protection method, information protection device and terminal equipment
CN103024525A (en) * 2012-12-27 2013-04-03 深圳市茁壮网络股份有限公司 Set-top box and method of controlling the same by mobile terminal
CN105407454A (en) * 2015-11-23 2016-03-16 深圳还是威健康科技有限公司 Binding method and device for wearable device
CN106911561A (en) * 2017-02-15 2017-06-30 美的智慧家居科技有限公司 The sharing method of the control authority of home appliance, device and server
CN107194540A (en) * 2017-04-21 2017-09-22 上海积索智能科技有限公司 Bicycle Sharing Management system, method, intelligent sharing knee and Compliance control server

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005002179A2 (en) * 2003-06-25 2005-01-06 Docomo Communications Laboratories Usa, Inc. Method and apparatus for resource sharing among mobile terminals
CN1920873A (en) * 2006-08-31 2007-02-28 刘洪利 Electric vehicle network lease system
CN102609646A (en) * 2012-01-20 2012-07-25 华为终端有限公司 Information protection method, information protection device and terminal equipment
CN103024525A (en) * 2012-12-27 2013-04-03 深圳市茁壮网络股份有限公司 Set-top box and method of controlling the same by mobile terminal
CN105407454A (en) * 2015-11-23 2016-03-16 深圳还是威健康科技有限公司 Binding method and device for wearable device
CN106911561A (en) * 2017-02-15 2017-06-30 美的智慧家居科技有限公司 The sharing method of the control authority of home appliance, device and server
CN107194540A (en) * 2017-04-21 2017-09-22 上海积索智能科技有限公司 Bicycle Sharing Management system, method, intelligent sharing knee and Compliance control server

Also Published As

Publication number Publication date
CN108134773A (en) 2018-06-08

Similar Documents

Publication Publication Date Title
CN108134773B (en) Shared device binding method and device, storage medium and server
US20210233056A1 (en) Data interaction method, verification terminal, server, and system
US9589262B2 (en) Mobile checkout systems and methods
CN106716960B (en) User authentication method and system
CN103023917B (en) The mthods, systems and devices of authorizing are carried out for intelligent appliance
CN109544135B (en) Bank card binding method and device, storage medium and mobile terminal
US10657582B2 (en) Method, user terminal, and service terminal for processing service data
CN106716918B (en) User authentication method and system
CN109246604B (en) Intelligent device safety binding method, server, intelligent device and user side device
WO2015051727A1 (en) Electronic transaction method and system, and payment platform system
US11276049B2 (en) Systems and methods for creating dynamic sessions for mobile application integration
BR102016018163A2 (en) verification system implemented on a mobile communication device and method
TWI485636B (en) The use of integrated bar code in the system and mobile devices to deal with payment information control method
CN110011885B (en) Control authority binding method and device of electric appliance, storage medium and electric appliance
KR101814079B1 (en) Method, application, computer program and device for providing authentication service using mobile terminal
WO2016029793A1 (en) Processing method, device, and system for interactive information
US20210125165A1 (en) Pos system with personal device integration using provisioned url
US20210065153A1 (en) System and application server for secure guest checkout
KR20230005815A (en) Tap to pay your credit bill
US20150052544A1 (en) Information processing device, information processing method, information processing system, and computer program product
WO2016138743A1 (en) Secure payment method, mobile terminal, and payment authentication server
CN103763311A (en) System for uniformly authenticating satellite digital services
JP4975065B2 (en) Settlement system, settlement method, and program
WO2020019291A1 (en) Information processing method, electronic device, server, and information processing system
EP3410332A1 (en) A system and method for transferring data to an authentication device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant