CN114040411B - Equipment binding method and device, electronic equipment and storage medium - Google Patents

Equipment binding method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114040411B
CN114040411B CN202111290155.XA CN202111290155A CN114040411B CN 114040411 B CN114040411 B CN 114040411B CN 202111290155 A CN202111290155 A CN 202111290155A CN 114040411 B CN114040411 B CN 114040411B
Authority
CN
China
Prior art keywords
binding
information
dimensional code
target equipment
attribute information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111290155.XA
Other languages
Chinese (zh)
Other versions
CN114040411A (en
Inventor
唐立
唐杰
李春光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN202111290155.XA priority Critical patent/CN114040411B/en
Publication of CN114040411A publication Critical patent/CN114040411A/en
Application granted granted Critical
Publication of CN114040411B publication Critical patent/CN114040411B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/48Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides a device binding method and device, electronic equipment and a storage medium, and belongs to the technical field of equipment control. The method comprises the steps of obtaining object identification, attribute information and binding information corresponding to target equipment corresponding to an object; generating a binding two-dimensional code based on the attribute information and the binding information; transmitting the binding two-dimensional code to the object; acquiring first detection information uploaded by the target equipment, wherein the first detection information is information obtained by the target equipment for identifying the binding two-dimensional code displayed by the object; and when the first detection information and the binding information accord with a preset first matching condition, establishing a binding relation between the object identifier and the target device based on the attribute information. Namely, the binding relation between the object identifier and the door lock is established by utilizing the two-dimension code, so that the safety of the binding process is improved.

Description

Equipment binding method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of device control technologies, and in particular, to a device binding method, a device binding apparatus, an electronic device, and a storage medium.
Background
Along with the development of science and technology and the improvement of living standard of people, the intelligent door lock gradually goes into thousands of families. The intelligent door lock is a lockset which is more intelligent and simplified in terms of user safety, identification and manageability, and is usually required to be bound with a user ID before formal use, and after the binding, the user can use the intelligent door lock according to binding content. Currently, the binding process is generally: the door lock management platform issues a binding code to a user, the binding code is input on the intelligent door lock for binding after the user receives the binding code, the intelligent door lock uploads the binding code input by the user to the door lock management platform for comparison, and when the comparison results are consistent, the binding of the user and the intelligent door lock is completed. However, most of the current binding codes are random digital codes with 6-8 bits, and the digital plaintext is easy to leak in the device binding process, so that the security is low.
Disclosure of Invention
The embodiment of the application aims to provide a device binding method, a device, electronic equipment and a storage medium, so as to solve the problem that the binding is easy to leak by utilizing digital plaintext at present.
The specific technical scheme is as follows:
in a first aspect, a device binding method is provided, the method comprising:
acquiring an object identifier, attribute information and binding information corresponding to target equipment corresponding to an object;
generating a binding two-dimensional code based on the attribute information and the binding information;
transmitting the binding two-dimensional code to the object;
acquiring first detection information uploaded by the target equipment, wherein the first detection information is information obtained by the target equipment for identifying the binding two-dimensional code displayed by the object;
and when the first detection information and the binding information accord with a preset first matching condition, establishing a binding relation between the object identifier and the target device based on the attribute information.
Optionally, the attribute information includes first authentication information,
the establishing a binding relationship between the object identifier and the target device based on the attribute information includes:
acquiring second verification information pre-stored in the target equipment;
determining whether the first verification information and the second verification information accord with a preset second matching condition or not;
and when the first verification information and the second verification information accord with a preset second matching condition, establishing a binding relation between the object identifier and the target equipment.
Optionally, the attribute information includes authorization information,
the establishing a binding relationship between the object identifier and the target device based on the attribute information includes:
determining a usage right based on the authorization information;
and establishing a binding relation between the object identifier and the target equipment according to the use authority.
Optionally, the method further comprises:
acquiring interaction information corresponding to the target equipment;
generating a binding two-dimensional code based on the interaction information, the attribute information and the binding information;
and sending the binding two-dimensional code to the object, and controlling the target equipment to upload the first detection information based on the interaction information after identifying the binding two-dimensional code displayed by the object.
Optionally, the generating a binding two-dimensional code based on the attribute information and the binding information includes:
encrypting the attribute information and the binding information according to a preset encryption rule to obtain encrypted information;
and generating the binding two-dimensional code based on the encryption information.
Optionally, the binding two-dimensional code includes a dynamic two-dimensional code, and the method further includes:
determining whether the target device is in a networking state;
when the target equipment is in a non-networking state, generating a dynamic two-dimensional code based on the attribute information and the binding information, wherein the dynamic two-dimensional code carries a limiting condition;
and sending the dynamic two-dimensional code to the object, and controlling the target equipment to finish the restriction binding with the object identifier according to the restriction condition after identifying the dynamic two-dimensional code displayed by the object.
In a second aspect, there is provided a device binding method, the method comprising:
acquiring an object identifier, attribute information and binding information corresponding to target equipment corresponding to an object;
generating a binding two-dimensional code based on the attribute information and the binding information;
the binding two-dimensional code is sent to the target equipment, and the target equipment is controlled to display the binding two-dimensional code;
acquiring second detection information uploaded by the object, wherein the second detection information is obtained by the object identifying the binding two-dimensional code;
and when the second detection information and the binding information accord with a preset third matching condition, establishing a binding relation between the object identifier and the target device based on the attribute information.
In a third aspect, there is provided a device binding apparatus, the apparatus comprising:
the first acquisition module is used for acquiring an object identifier corresponding to the object, attribute information and binding information corresponding to the target equipment;
the generation module is used for generating a binding two-dimensional code based on the attribute information and the binding information;
the sending module is used for sending the binding two-dimensional code to the object;
the second acquisition module is used for acquiring first detection information uploaded by the target equipment, wherein the first detection information is information obtained by the target equipment identifying the binding two-dimensional code displayed by the object;
the establishing module is used for establishing the binding relation between the object identifier and the target device based on the attribute information when the first detection information and the binding information accord with a preset first matching condition.
Optionally, the attribute information includes first authentication information,
the building module is specifically configured to:
acquiring second verification information pre-stored in the target equipment;
determining whether the first verification information and the second verification information accord with a preset second matching condition or not;
and when the first verification information and the second verification information accord with a preset second matching condition, establishing a binding relation between the object identifier and the target equipment.
Optionally, the attribute information includes authorization information,
the establishing module is further configured to:
determining a usage right based on the authorization information;
and establishing a binding relation between the object identifier and the target equipment according to the use authority.
Optionally, the generating module is further configured to:
acquiring interaction information corresponding to the target equipment;
generating a binding two-dimensional code based on the interaction information, the attribute information and the binding information;
and sending the binding two-dimensional code to the object, and controlling the target equipment to upload the first detection information based on the interaction information after identifying the binding two-dimensional code displayed by the object.
Optionally, the generating module is further configured to:
encrypting the attribute information and the binding information according to a preset encryption rule to obtain encrypted information;
and generating the binding two-dimensional code based on the encryption information.
Optionally, the generating module is further configured to:
determining whether the target device is in a networking state;
when the target equipment is in a non-networking state, generating a dynamic two-dimensional code based on the attribute information and the binding information, wherein the dynamic two-dimensional code carries a limiting condition;
and sending the dynamic two-dimensional code to the object, and controlling the target equipment to finish the restriction binding with the object identifier according to the restriction condition after identifying the dynamic two-dimensional code displayed by the object.
In a fourth aspect, there is provided a device binding apparatus, the apparatus comprising:
the first acquisition module is used for acquiring an object identifier corresponding to an object, attribute information and binding information corresponding to target equipment;
the generation module is used for generating a binding two-dimensional code based on the attribute information and the binding information;
the sending module is used for sending the binding two-dimensional code to the target equipment and controlling the target equipment to display the binding two-dimensional code;
the second acquisition module is used for acquiring second detection information uploaded by the object, wherein the second detection information is obtained by the object identifying the binding two-dimensional code;
the establishing module is configured to establish a binding relationship between the object identifier and the target device based on the attribute information when the second detection information and the binding information meet a preset third matching condition.
In a fifth aspect, an electronic device is provided, including a processor, a communication interface, a memory, and a communication bus, where the processor, the communication interface, and the memory complete communication with each other through the communication bus;
a memory for storing a computer program;
a processor for implementing the method steps of any of the first aspects when executing a program stored on a memory.
In a sixth aspect, a computer readable storage medium is provided, characterized in that the computer readable storage medium has stored therein a computer program which, when executed by a processor, implements the method steps of any of the first aspects.
In a seventh aspect, there is provided a computer program product comprising instructions which, when run on a computer, cause the computer to perform any of the device binding methods described above.
The embodiment of the application has the beneficial effects that:
the embodiment of the application provides a device binding method, a device, electronic equipment and a storage medium, wherein in the method, firstly, object identification and attribute information corresponding to an object and binding information corresponding to target equipment are obtained; generating a binding two-dimensional code based on the attribute information and the binding information; then, the binding two-dimensional code is sent to the object; and finally, when the first detection information and the binding information obtained by the target device for identifying the binding two-dimensional code accord with a preset first matching condition, establishing a binding relation between the object identifier and the target device based on the attribute information.
According to the application, the binding relation between the object and the door lock can be established by utilizing the two-dimension code, the binding by using digital plaintext is avoided, the two-dimension code communication belongs to short-range communication, the safety is high, the possibility of hijacking information can be reduced, and the safety of the binding process can be improved by binding the two-dimension code. In addition, the application can carry other attribute information except the binding information required in the binding process in the two-dimensional code, namely, the attribute information required in the binding process and the binding information are transmitted simultaneously through the two-dimensional code, so that the information exchange times are reduced, and the binding efficiency is improved.
Of course, it is not necessary for any one product or method of practicing the application to achieve all of the advantages set forth above at the same time.
Drawings
In order to more clearly illustrate the embodiments of the application or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, and it will be obvious to a person skilled in the art that other drawings can be obtained from these drawings without inventive effort.
FIG. 1 is a flowchart of a device binding method according to an embodiment of the present application;
FIG. 2 is a flowchart of a device binding method according to another embodiment of the present application;
FIG. 3 is a flowchart of a device binding method according to another embodiment of the present application;
FIG. 4 is a flowchart of a device binding method according to another embodiment of the present application;
fig. 5 is a schematic structural diagram of a device binding apparatus according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Because the current binding code is mostly a random digital code with 6-8 bits, the digital plaintext is easy to leak in the equipment binding process, and the security is low. Therefore, the embodiment of the application provides a device binding method which can be applied to device binding.
The following will describe a device binding method provided in the embodiment of the present application in detail with reference to a specific implementation, as shown in fig. 1, and the specific steps are as follows:
s101, obtaining object identification, attribute information and binding information corresponding to target equipment corresponding to an object.
S102, generating a binding two-dimensional code based on the attribute information and the binding information.
In the embodiment of the application, the object can be a mobile device, such as a mobile phone or a wearable device, and the object identifier can be a unique identifier of the object, such as a device code, or a user ID stored on the object; the attribute information refers to other information required in the binding process, such as authorization information; binding information refers to information for binding objects and devices, and may be in a literal form, a numerical form, or other form that may be used for binding verification, such as a numerical binding code.
Further, for the object identifier and the attribute information, the binding information may be obtained based on user input, and may be randomly generated based on the object identifier or may be stored in advance.
Further, the binding information may be a random code generated in real time for the target device based on the user request, or may be preset information corresponding to the target device.
Further, after the attribute information and the binding information are acquired, the attribute information and the binding information are generated into a binding two-dimensional code for the binding device, namely the attribute information and the binding information are carried in the binding two-dimensional code.
S103, the binding two-dimensional code is sent to the object.
S104, acquiring first detection information uploaded by the target equipment, wherein the first detection information is information obtained by the target equipment identifying the binding two-dimensional code displayed by the object.
S105, when the first detection information and the binding information meet a preset first matching condition, a binding relation between the object identifier and the target device is established based on the attribute information.
In the embodiment of the application, a display device for displaying the two-dimensional code, such as a display screen, is arranged on the object; the target device is provided with an identification device for identifying the two-dimensional code, such as an image type red light two-dimensional code scanner or a CCD (Charge Coupled Device, optical coupling device) scanner.
In this embodiment, after the binding two-dimensional code is generated, the binding two-dimensional code is sent to the object, so that the object displays the binding two-dimensional code to the identification device of the target device, after the target device identifies the binding two-dimensional code, the information in the binding two-dimensional code can be analyzed according to a preset protocol to obtain first detection information, and the first detection information is uploaded to the server according to a pre-stored transmission address and a pre-stored transmission protocol.
Further, whether the binding two-dimensional code displayed by the object to the target device is the binding two-dimensional code or not can be determined by comparing the first detection information and the binding information, namely, whether the object identifier and the target device can be bound or not is determined, and when the first detection information and the binding information accord with a preset first matching condition, the object identifier and the target device can be bound, so that the binding relationship between the object identifier and the target device can be established based on the attribute information.
Further, when the first detection information and the binding information are consistent, it is determined that the first detection information and the binding information are consistent with a preset first matching condition.
Further, when the object identifier is the unique identifier of the device, after the binding relationship between the object identifier and the target device is established, the target device can be controlled by the device; when the object identifier is a user ID, after the binding relation between the object identifier and the target device is established, the target device can be controlled through the user ID.
In the embodiment of the application, the binding relation between the object and the door lock can be established by utilizing the two-dimension code, the binding by using the digital plaintext is avoided, the two-dimension code communication belongs to short-range communication, the safety is high, the possibility of hijacking information can be reduced, and the safety of the binding process can be improved by binding the two-dimension code. In addition, the application can carry other attribute information except the binding information required in the binding process in the two-dimensional code, namely, the attribute information required in the binding process and the binding information are transmitted simultaneously through the two-dimensional code, so that the information exchange times are reduced, and the binding efficiency is improved.
In yet another embodiment of the present application, the step S105 may include the steps of:
step one, obtaining second verification information prestored in the target equipment;
step two, determining whether the first verification information and the second verification information accord with a preset second matching condition;
and thirdly, when the first verification information and the second verification information accord with a preset second matching condition, establishing a binding relation between the object identifier and the target device.
In the embodiment of the application, the attribute information may include first verification information, that is, verification information authorized by an administrator, for example, a key, and the second verification information is verification information stored in the target device in advance, and whether the user identifier is authorized by the administrator may be determined by determining whether the first verification information and the second verification information are matched.
Specifically, when the first detection information and the binding information are determined to be in accordance with a preset first matching condition, whether the first verification information and the second verification information are matched or not is determined, and when the first verification information and the second verification information are matched, the binding object identification and the target device can be finally determined.
Through the scheme, the authorization verification information of the administrator can be carried in the two-dimensional code, the safety of the binding process is further improved, the binding information and the authorization verification information can be transmitted to the target equipment through the two-dimensional code at one time without multiple transmission, so that the information exchange times are reduced, and the binding efficiency is improved.
In yet another embodiment of the present application, the step S105 may include the steps of:
step one, determining a use right based on the authorization information;
and step two, establishing a binding relation between the object identifier and the target equipment according to the use authority.
In the embodiment of the present application, the attribute information may include authorization information, which refers to various rights contents authorized by an administrator, such as a use time, a use content, and the like. Furthermore, the use authority can be determined according to the authorization information, and the binding relationship between the object identifier and the target device can be established on the basis of the use authority. For example, the usage right is the usage time of 24 hours, and the binding relationship between the object identifier and the target device fails after 24 hours from the binding completion time. Through the scheme, the binding information and the authorization information can be transmitted to the target equipment by utilizing the two-dimension code at one time without multiple transmission, so that the information exchange times are reduced, and the binding efficiency is improved.
In yet another embodiment of the present application, the method may further comprise the steps of:
s201, acquiring interaction information corresponding to the target equipment;
s202, generating a binding two-dimensional code based on the interaction information, the attribute information and the binding information;
s203, the binding two-dimensional code is sent to the object, and the target device is controlled to upload the first detection information based on the interaction information after the binding two-dimensional code displayed by the object is identified.
In the embodiment of the application, the interaction information may be information such as a server address or a communication protocol, which is used to instruct the target device how to interact with the server. And generating a binding two-dimensional code by the interaction information, the attribute information and the binding information, namely carrying the interaction information in the binding two-dimensional code, and transmitting the interaction information, the attribute information and the binding information to the target equipment when the two-dimensional code is displayed by the object to the identification device of the target equipment. After the target device recognizes the binding two-dimensional code, the target device can acquire the interaction information carried in the binding two-dimensional code, and determines a server address, a communication protocol and the like which need to upload the first detection information according to the interaction information.
According to the embodiment of the application, the information of communication between the target equipment and the server can be desensitized by carrying the interactive information in the two-dimensional code, the interactive information such as the server address, the communication protocol and the like does not need to be stored in the target equipment in advance, the adaptability in the binding process is improved, and the information leakage caused by hijacking of the route can be avoided by transmitting the two-dimensional code.
In yet another embodiment of the present application, the step S102 may include the following steps:
step one, encrypting the attribute information and the binding information according to a preset encryption rule to obtain encrypted information;
and step two, generating the binding two-dimensional code based on the encryption information.
In the embodiment of the application, before the binding two-dimensional code is generated, the attribute information and the binding information can be encrypted according to the preset encryption rule, and then the encrypted information is generated into the binding two-dimensional code, so that the safety of the information is further ensured. It should be noted that, in this embodiment, a decryption rule corresponding to the encryption rule is stored in the target device in advance, and the target device may decrypt the encrypted information according to the decryption rule after identifying the binding two-dimensional code.
In one implementation manner of the embodiment of the present application, an initial two-dimensional code may be generated for the attribute information and the binding information, and the two-dimensional code may be encrypted to obtain the binding two-dimensional code.
In this embodiment, the static two-dimensional code may be encrypted based on agreed verification information, and the dynamic two-dimensional code may be encrypted by adding a time stamp. Thereby further ensuring the safety of the information.
In yet another embodiment of the present application, the method may further comprise the steps of:
s301, determining whether the target device is in a networking state;
s302, when the target equipment is in a non-networking state, generating a dynamic two-dimensional code based on the attribute information and the binding information, wherein the dynamic two-dimensional code carries a limiting condition;
s303, the dynamic two-dimensional code is sent to the object, and the target device is controlled to complete limiting binding with the object identifier according to the limiting condition after the dynamic two-dimensional code displayed by the object is identified.
In the embodiment of the application, when the target device is in a non-networking state, the information of the two-dimensional code cannot be uploaded to the server in time after the two-dimensional code is identified, in order to ensure the use experience of a user, the dynamic two-dimensional code can be generated based on the attribute information and the binding information, the dynamic two-dimensional code can carry limiting conditions, such as limiting binding time or binding content, and the limiting binding with the object identifier can be completed according to the limiting conditions after the target device identifies the dynamic two-dimensional code. Thereby ensuring that the user uses the target device during the binding restriction.
In one implementation manner of the embodiment of the application, when the target device is in the networking state, the limitation binding completed when the target device is in the non-networking state can be searched, and the binding relation between the object identifier and the target device is perfected according to the attribute information and the binding information. Therefore, the user is not required to bind again during networking, and the user experience is improved.
In yet another embodiment of the present application, another device binding method is provided, as shown in fig. 4, and the specific steps are as follows:
s401, obtaining object identification, attribute information and binding information corresponding to target equipment corresponding to an object.
S402, generating a binding two-dimensional code based on the attribute information and the binding information.
S403, the binding two-dimensional code is sent to the target device, and the target device is controlled to display the binding two-dimensional code;
s404, obtaining second detection information uploaded by the object, wherein the second detection information is obtained by the object identifying the binding two-dimensional code;
and S405, when the second detection information and the binding information meet a preset third matching condition, establishing a binding relationship between the object identifier and the target device based on the attribute information.
In the embodiment of the application, the display device is arranged on the target device, the device for identifying the two-dimensional code is arranged on the object, the server can send the two-dimensional code to the target device after generating the binding two-dimensional code so as to enable the target device to display the binding two-dimensional code, the user can identify the two-dimensional code by utilizing the identification device on the object and upload second detection information obtained by identifying the two-dimensional code to the server, and when the second detection information is matched with the binding information (for example, the second detection information is consistent with the binding information), the binding relationship between the object identification and the target device is established based on the attribute information. According to the scheme, the binding of the binding two-dimensional code can be completed by displaying the binding two-dimensional code through the target equipment under the condition that the target equipment does not have an identification device, so that the adaptability of the binding process is improved.
Based on the same technical concept, the embodiment of the application further provides a device binding apparatus, as shown in fig. 5, where the device comprises:
a first obtaining module 501, configured to obtain an object identifier, attribute information, and binding information corresponding to a target device, where the object identifier and the attribute information correspond to an object;
a generating module 502, configured to generate a binding two-dimensional code based on the attribute information and the binding information;
a sending module 503, configured to send the binding two-dimensional code to the object, or send the binding two-dimensional code to the target device;
a second obtaining module 504, configured to obtain first detection information uploaded by the target device, where the first detection information is information obtained by the target device identifying the bound two-dimensional code displayed by the object, or obtain second detection information uploaded by the object, and the second detection information is information obtained by the object identifying the bound two-dimensional code;
the establishing module 505 is configured to establish a binding relationship between the object identifier and the target device based on the attribute information when the first detection information and the binding information meet a preset first matching condition, or establish a binding relationship between the object identifier and the target device based on the attribute information when the second detection information and the binding information meet a preset third matching condition.
Optionally, the attribute information includes first authentication information,
the building module is specifically configured to:
acquiring second verification information pre-stored in the target equipment;
determining whether the first verification information and the second verification information accord with a preset second matching condition or not;
and when the first verification information and the second verification information accord with a preset second matching condition, establishing a binding relation between the object identifier and the target equipment.
Optionally, the attribute information includes authorization information,
the establishing module is further configured to:
determining a usage right based on the authorization information;
and establishing a binding relation between the object identifier and the target equipment according to the use authority.
Optionally, the generating module is further configured to:
acquiring interaction information corresponding to the target equipment;
generating a binding two-dimensional code based on the interaction information, the attribute information and the binding information;
and sending the binding two-dimensional code to the object, and controlling the target equipment to upload the first detection information based on the interaction information after identifying the binding two-dimensional code displayed by the object.
Optionally, the generating module is further configured to:
encrypting the attribute information and the binding information according to a preset encryption rule to obtain encrypted information;
and generating the binding two-dimensional code based on the encryption information.
Optionally, the generating module is further configured to:
determining whether the target device is in a networking state;
when the target equipment is in a non-networking state, generating a dynamic two-dimensional code based on the attribute information and the binding information, wherein the dynamic two-dimensional code carries a limiting condition;
and sending the dynamic two-dimensional code to the object, and controlling the target equipment to finish the restriction binding with the object identifier according to the restriction condition after identifying the dynamic two-dimensional code displayed by the object.
In the embodiment of the application, the binding relation between the object and the door lock can be established by utilizing the two-dimension code, the binding by using the digital plaintext is avoided, the two-dimension code communication belongs to short-range communication, the safety is high, the possibility of hijacking information can be reduced, and the safety of the binding process can be improved by binding the two-dimension code. In addition, the application can carry other attribute information except the binding information required in the binding process in the two-dimensional code, namely, the attribute information required in the binding process and the binding information are transmitted simultaneously through the two-dimensional code, so that the information exchange times are reduced, and the binding efficiency is improved.
Based on the same technical concept, the embodiment of the present application further provides an electronic device, as shown in fig. 6, including a processor 111, a communication interface 112, a memory 113 and a communication bus 114, where the processor 111, the communication interface 112, and the memory 113 perform communication with each other through the communication bus 114,
a memory 113 for storing a computer program;
the processor 111 is configured to execute a program stored in the memory 113, and implement the following steps:
acquiring an object identifier, attribute information and binding information corresponding to target equipment corresponding to an object;
generating a binding two-dimensional code based on the attribute information and the binding information;
transmitting the binding two-dimensional code to the object;
acquiring first detection information uploaded by the target equipment, wherein the first detection information is information obtained by the target equipment for identifying the binding two-dimensional code displayed by the object;
and when the first detection information and the binding information accord with a preset first matching condition, establishing a binding relation between the object identifier and the target device based on the attribute information.
The communication bus mentioned above for the electronic devices may be a peripheral component interconnect standard (Peripheral Component Interconnect, PCI) bus or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, etc. The communication bus may be classified as an address bus, a data bus, a control bus, or the like. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
The communication interface is used for communication between the electronic device and other devices.
The Memory may include random access Memory (Random Access Memory, RAM) or may include Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the aforementioned processor.
The processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; but also digital signal processors (Digital Signal Processing, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
In yet another embodiment of the present application, a computer readable storage medium is provided, in which a computer program is stored, which when executed by a processor, implements the steps of any of the device binding methods described above.
In yet another embodiment of the present application, there is also provided a computer program product containing instructions that, when run on a computer, cause the computer to perform any of the device binding methods of the above embodiments.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present application, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another, for example, by wired (e.g., coaxial cable, optical fiber, digital Subscriber Line (DSL)), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), etc.
It should be noted that in this document, relational terms such as "first" and "second" and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing is only a specific embodiment of the application to enable those skilled in the art to understand or practice the application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (9)

1. A method of device binding, the method comprising:
acquiring an object identifier, attribute information and binding information corresponding to target equipment corresponding to an object, and acquiring interaction information corresponding to the target equipment;
generating a binding two-dimensional code based on the interaction information, the attribute information and the binding information;
the binding two-dimensional code is sent to the object, and the target device is controlled to upload first detection information based on the interaction information after the binding two-dimensional code displayed by the object is identified;
acquiring first detection information uploaded by the target equipment, wherein the first detection information is information obtained by the target equipment for identifying the binding two-dimensional code displayed by the object;
and when the first detection information and the binding information accord with a preset first matching condition, establishing a binding relation between the object identifier and the target device based on the attribute information.
2. The method of claim 1, wherein the attribute information comprises first authentication information,
the establishing a binding relationship between the object identifier and the target device based on the attribute information includes:
acquiring second verification information pre-stored in the target equipment;
determining whether the first verification information and the second verification information accord with a preset second matching condition or not;
and when the first verification information and the second verification information accord with a preset second matching condition, establishing a binding relation between the object identifier and the target equipment.
3. The method of claim 1, wherein the attribute information comprises authorization information,
the establishing a binding relationship between the object identifier and the target device based on the attribute information includes:
determining a usage right based on the authorization information;
and establishing a binding relation between the object identifier and the target equipment according to the use authority.
4. The method of claim 1, wherein the generating a binding two-dimensional code based on the attribute information and the binding information comprises:
encrypting the attribute information and the binding information according to a preset encryption rule to obtain encrypted information;
and generating the binding two-dimensional code based on the encryption information.
5. The method of claim 1, wherein the binding two-dimensional code comprises a dynamic two-dimensional code, the method further comprising:
determining whether the target device is in a networking state;
when the target equipment is in a non-networking state, generating a dynamic two-dimensional code based on the attribute information and the binding information, wherein the dynamic two-dimensional code carries a limiting condition;
and sending the dynamic two-dimensional code to the object, and controlling the target equipment to finish the restriction binding with the object identifier according to the restriction condition after identifying the dynamic two-dimensional code displayed by the object.
6. A method of device binding, the method comprising:
acquiring an object identifier, attribute information and binding information corresponding to target equipment corresponding to an object, and acquiring interaction information corresponding to the target equipment;
generating a binding two-dimensional code based on the interaction information, the attribute information and the binding information;
the binding two-dimensional code is sent to the target equipment, the target equipment is controlled to display the binding two-dimensional code, and the object is controlled to upload second detection information based on the interaction information after the binding two-dimensional code displayed by the target equipment is identified;
acquiring second detection information uploaded by the object, wherein the second detection information is obtained by the object identifying the binding two-dimensional code;
and when the second detection information and the binding information accord with a preset third matching condition, establishing a binding relation between the object identifier and the target device based on the attribute information.
7. A device binding apparatus, the apparatus comprising:
the first acquisition module is used for acquiring an object identifier corresponding to an object, attribute information and binding information corresponding to target equipment and acquiring interaction information corresponding to the target equipment;
the generation module is used for generating a binding two-dimensional code based on the interaction information, the attribute information and the binding information;
the sending module is used for sending the binding two-dimensional code to the object and controlling the target equipment to upload first detection information based on the interaction information after identifying the binding two-dimensional code displayed by the object;
the second acquisition module is used for acquiring first detection information uploaded by the target equipment, wherein the first detection information is information obtained by the target equipment identifying the binding two-dimensional code displayed by the object;
the establishing module is used for establishing the binding relation between the object identifier and the target device based on the attribute information when the first detection information and the binding information accord with a preset first matching condition.
8. The electronic equipment is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory are communicated with each other through the communication bus;
a memory for storing a computer program;
a processor for carrying out the method steps of any one of claims 1-6 when executing a program stored on a memory.
9. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored therein a computer program which, when executed by a processor, implements the method steps of any of claims 1-6.
CN202111290155.XA 2021-11-02 2021-11-02 Equipment binding method and device, electronic equipment and storage medium Active CN114040411B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111290155.XA CN114040411B (en) 2021-11-02 2021-11-02 Equipment binding method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111290155.XA CN114040411B (en) 2021-11-02 2021-11-02 Equipment binding method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN114040411A CN114040411A (en) 2022-02-11
CN114040411B true CN114040411B (en) 2023-10-10

Family

ID=80142643

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111290155.XA Active CN114040411B (en) 2021-11-02 2021-11-02 Equipment binding method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114040411B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114580956A (en) * 2022-03-15 2022-06-03 苏州浪潮智能科技有限公司 Asset code distribution management method and device and electronic equipment
CN115865539B (en) * 2023-03-03 2023-06-09 新云网科技集团股份有限公司 Security binding method, device, equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103971435A (en) * 2014-05-22 2014-08-06 广东欧珀移动通信有限公司 Unlocking method, server, mobile terminal, electronic lock and unlocking system
WO2017050011A1 (en) * 2015-09-25 2017-03-30 广州视睿电子科技有限公司 Equipment control method, control side equipment, controlled side equipment, and equipment control system
CN111093192A (en) * 2019-12-24 2020-05-01 珠海格力电器股份有限公司 Device binding method, device, terminal device and network side device
CN111860727A (en) * 2020-07-30 2020-10-30 深圳前海微众银行股份有限公司 Two-dimensional code generation method, verification method, device and computer-readable storage medium
CN111882008A (en) * 2020-07-13 2020-11-03 上汽大众汽车有限公司 Method and system for binding vehicle with Internet of vehicles account

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103971435A (en) * 2014-05-22 2014-08-06 广东欧珀移动通信有限公司 Unlocking method, server, mobile terminal, electronic lock and unlocking system
WO2017050011A1 (en) * 2015-09-25 2017-03-30 广州视睿电子科技有限公司 Equipment control method, control side equipment, controlled side equipment, and equipment control system
CN111093192A (en) * 2019-12-24 2020-05-01 珠海格力电器股份有限公司 Device binding method, device, terminal device and network side device
CN111882008A (en) * 2020-07-13 2020-11-03 上汽大众汽车有限公司 Method and system for binding vehicle with Internet of vehicles account
CN111860727A (en) * 2020-07-30 2020-10-30 深圳前海微众银行股份有限公司 Two-dimensional code generation method, verification method, device and computer-readable storage medium

Also Published As

Publication number Publication date
CN114040411A (en) 2022-02-11

Similar Documents

Publication Publication Date Title
CN108512846B (en) Bidirectional authentication method and device between terminal and server
CN1996834B (en) Method and apparatus for acquiring domain information and domain-related data
CN114040411B (en) Equipment binding method and device, electronic equipment and storage medium
CN105184931A (en) Bluetooth-based unlocking method, system and hand-held terminal and Bluetooth-based electronic lock
CN110177088B (en) Temporary identity authentication method, device and system
CN105099673A (en) Authorization method, authorization requesting method and devices
CN112202772A (en) Authorization management method and device
CN106254323A (en) The exchange method of a kind of TA and SE, TA, SE and TSM platform
CN112398824B (en) Authority verification method, storage medium and electronic equipment
CN105765941A (en) Illegal access server prevention method and device
CN106453410A (en) Data transmission method and data transmission apparatus
CN113381984A (en) Data processing method, device and system, electronic equipment and storage medium
CN110266653B (en) Authentication method, system and terminal equipment
CN104104650B (en) data file access method and terminal device
CN104219626A (en) Identity authentication method and device
CN114095277A (en) Power distribution network secure communication method, secure access device and readable storage medium
CN107248910A (en) Method for security protection and equipment
CN112650954B (en) Block chain data sharing method, device, equipment and storage medium
CN112819454B (en) Payment method, gateway device, server and storage medium
CN113761498A (en) Third party login information hosting method, system, equipment and storage medium
CN109858235B (en) Portable equipment and password obtaining method and device thereof
CN114866247B (en) Communication method, device, system, terminal and server
CN108429621B (en) Identity verification method and device
CN112702743B (en) Network data monitoring and protecting method based on artificial intelligence
CN110545263B (en) Decryption method, encryption method, terminal device, server and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant