CN105610620B - A kind of Intelligent hardware and its configuration method - Google Patents
A kind of Intelligent hardware and its configuration method Download PDFInfo
- Publication number
- CN105610620B CN105610620B CN201511030312.8A CN201511030312A CN105610620B CN 105610620 B CN105610620 B CN 105610620B CN 201511030312 A CN201511030312 A CN 201511030312A CN 105610620 B CN105610620 B CN 105610620B
- Authority
- CN
- China
- Prior art keywords
- intelligent hardware
- wlan
- account
- user terminal
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/02—Arrangements for optimising operational condition
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
This application discloses a kind of configuration methods of Intelligent hardware, including configure wireless network for Intelligent hardware, specifically: after Intelligent hardware powers on, wireless communication unit therein creates the second WLAN as wireless aps;The WLAN that Intelligent hardware prepares connection is known as the first WLAN;User terminal scanning identifies and is connected to the second WLAN, also sends the link information of the first WLAN to Intelligent hardware by the second WLAN;After Intelligent hardware receives the link information of the first WLAN, wireless communication unit therein is connected to the first WLAN as wireless network card.The application makes Intelligent hardware not leak wifi account and password when configuring wireless network, and is convenient for malfunction elimination;Also make Intelligent hardware only and allow the primary account number authorized and from account access and/or control, so that it is guaranteed that the safe operation and secret protection of Intelligent hardware.
Description
Technical field
This application involves a kind of Intelligent hardware (Intelligent Hardware).
Background technique
Conventional hardware is transformed using technologies such as sensor, controller, actuator, network communications, makes it have intelligence
The feature of energyization becomes as Intelligent hardware.For example, conventional socket is only used for powering, some intelligent sockets then can be vertical according to instruction
Even powering or powering off in given time.
Intelligent hardware generally requires connection wireless network (wireless network).Common wireless network includes wireless
Personal net (WPAN), WLAN (WLAN), wireless MAN (WMAN), mobile communication network etc..Intelligent hardware most often makes
It is the WLAN with Wi-Fi (also making WiFi) for representative.Referring to Fig. 1, this is existing Intelligent hardware configuration nothing
The method of line local area network, includes the following steps:
Step S101: Intelligent hardware powers on, client operation of the wireless communication unit therein as WLAN, i.e.,
It is equivalent to one piece of wireless network card work.
Step S103: user terminal (mobile phone, tablet computer, intelligent remote controller etc.) receives the WLAN of user's input
The title and password of (such as WiFi network of wireless router offer).The title of the WLAN is, for example, WiFi network
SSID (Service Set Identifier, service set).Some WLANs can be connected without password, another
A little WLANs are then needed to verify after password passes through and could be connected.
Step S105: the WLAN title and password of user terminal overseas broadcast user input.
Step S107: the wireless communication unit in Intelligent hardware receive user terminal broadcast WLAN title and
Password.
Step S109: Intelligent hardware passes through the WLAN title received and password is connected to the WLAN.
The method of above-mentioned Intelligent hardware configuration WLAN exists following insufficient:
First, network security risk.The account and password of wireless network are to pass to intelligence by user terminal with broadcast mode
Energy hardware, this makes the account of wireless network and password, and there are risk of leakage.
Second, malfunction elimination is difficult.If Intelligent hardware finally cannot connect to WLAN, it would be possible that being intelligence
Hardware breaks down, it is also possible to the account and password mistake of user's input, it is also possible to user terminal and/or app therein
(application) breaks down, and no technological means can be used for searching failure.
With above-mentioned Intelligent hardware configuration WLAN method correspondingly, in existing Intelligent hardware at least have nothing
Line communication unit, as shown in Figure 2.The wireless communication unit is only used as the client operation of WLAN, on the one hand receives
On the other hand the title and password for the WLAN that user terminal is issued with the forms of broadcasting utilize the WLAN received
Title and password are connected to the WLAN.
After being connected to WLAN, the user terminal in same local area network can visit existing Intelligent hardware
It asks, configure Intelligent hardware, this just brings security risk.Once someone has cracked the account and password of WLAN, so that it may
Easily to obtain the relevant information of Intelligent hardware, or even the operation of control Intelligent hardware.
Summary of the invention
The technical problem to be solved by the application is to provide a kind of Intelligent hardware configuration WLAN and user rights
Method evades the security risk of existing configuration method.For this purpose, the application also provides a kind of corresponding Intelligent hardware.
In order to solve the above technical problems, the configuration method of the application Intelligent hardware includes configuring wireless local area for Intelligent hardware
Net, specifically: after Intelligent hardware powers on, wireless communication unit therein is first used as wireless aps to create the second WLAN;
The WLAN that Intelligent hardware prepares connection is known as the first WLAN;User terminal scanning identifies and is connected to second
WLAN also sends the link information of the first WLAN by the second WLAN to Intelligent hardware;Intelligence is hard
After part receives the link information of the first WLAN, wireless communication unit therein is connected to the first nothing as wireless network card
Line local area network.When the first WLAN can be connected without password, the link information of the first WLAN includes first
The title of WLAN.When the first WLAN, which needs to verify, could connect after password passes through, the first WLAN
Link information include the first WLAN title and password.
The application Intelligent hardware has wireless communication unit;The wireless communication unit is first used as wireless aps to work, and remakes
For wireless network card work;When wireless communication unit works as wireless aps, for establishing the second WLAN and by the
Two WLANs receive the link information for the first WLAN that user terminal issues;When wireless communication unit is as wireless
When network interface card works, for being connected to the first WLAN according to the link information of the first WLAN received.
What the application obtained has the technical effect that so that Intelligent hardware will not leak the first wireless local area when configuring wireless network
The link information of net, and it is convenient for malfunction elimination.Intelligent hardware is powered on to be scanned by the APP in user terminal afterwards and be arrived,
Improve user experience.The application also makes Intelligent hardware only and allows the main account authorized and from account access and/or control, thus
Ensure the safe operation and secret protection of Intelligent hardware.
Detailed description of the invention
Fig. 1 is a kind of method flow diagram of existing Intelligent hardware configuration WLAN.
Fig. 2 is a kind of structural schematic diagram of existing Intelligent hardware.
Fig. 3 is the method flow diagram of the Intelligent hardware configuration WLAN of the application.
Fig. 4 is the structural schematic diagram of the Intelligent hardware of the application.
Fig. 5 is the method flow diagram one of the Intelligent hardware configuration access permission of the application.
Fig. 6 is the method flow diagram two of the Intelligent hardware configuration access permission of the application.
Specific embodiment
Referring to Fig. 3, this is the method for the Intelligent hardware configuration WLAN of the application, include the following steps:
Step S301: Intelligent hardware powers on, and wireless communication unit therein is as wireless aps (access point, access
Point) work, create the second WLAN.For table difference, Intelligent hardware is wished that the WLAN of connection is known as the first nothing
Line local area network.
Preferably, the title of the second WLAN either preset and informs user (such as be printed on intelligence firmly
In the specification of part), or (such as have with the product category, title, trade mark etc. with Intelligent hardware with significant mark
The specific character of pass) in order to user's identification.
Second WLAN, which is either not necessarily to password, to be connected, or needs to verify after password passes through and could connect
It connects.When the second WLAN, which needs to verify, could connect after password passes through, which is also to preset and inform user
's.
Step S303: user terminal passes through the wireless communication unit Wlan scanning of itself.
Step S305: user terminal scans and identifies the second WLAN that Intelligent hardware is established.
Step S307: user terminal by the wireless communication unit of itself be connected to that Intelligent hardware established it is second wireless
Local area network.
Step S309: user terminal sends the connection of the first WLAN by the second WLAN to Intelligent hardware
Information.The link information of first wireless network can be input to user terminal by user, can also obtain automatically it by user terminal
The first WLAN (WLAN e.g. connected before being connected to the second WLAN) of storage inside
Link information.
Step S311: the wireless communication unit in Intelligent hardware receives the first WLAN transmitted by user terminal
Account and password.
Step S313: the wireless communication unit in Intelligent hardware is not re-used as wireless aps work, is changed to as wireless local area
The client operation of net.It is disappeared at this time by the second WLAN that the wireless communication unit in Intelligent hardware is established.
Step S315: Intelligent hardware passes through the title of the first WLAN received and password is connected to first wirelessly
Local area network.
Optionally, user terminal described in step S303 to S307 scans, identifies and be connected to the second WLAN
Process can be automatically performed by the app in user terminal completely, be not necessarily to user's operation.Alternatively, this process can also be grasped by user
It completes.
Optionally, after step S309, user terminal disconnect with the connection of the second WLAN, instead connect to the
One WLAN.This process can be automatically performed by the app in user terminal completely, be not necessarily to user's operation.Alternatively, this
Process can also be completed by user's operation.
Optionally, after step S309, user terminal issues broadcast message (for example, by using udp agreement) request intelligence
The wireless network connection state of energy hardware.After the step s 315, Intelligent hardware is obtained in the request for receiving user terminal sending
After the broadcast message for taking wireless network connection state, either issue broadcast message (for example, by using udp agreement) or only to
Family terminal issues the wireless network connection state that information informs itself.This process can completely by user terminal app with
Automatic synchronization is completed between Intelligent hardware, is not necessarily to user's operation.Alternatively, this process can also be completed by user's operation.
Compared with the method for existing Intelligent hardware configuration WLAN, the application is had the advantages that
One, it is ensured that network security.The account and password of first WLAN are wireless by second by user terminal
Local area network passes to Intelligent hardware, avoids the leakage wind that account and the password of the first WLAN are transmitted with broadcast mode
Danger.
Second, convenient for investigation failure.It is assumed that user terminal can just be often connected to the first WLAN, but can not scan
And/or be connected to the second WLAN, that is, show that Intelligent hardware breaks down.It is assumed that user terminal can just be often connected to
One WLAN, and the second WLAN can be scanned and be connected to, but Intelligent hardware finally cannot connect to the first nothing
Line local area network, that is, show the first WLAN of user's input title and/or password mistake or user terminal and/
Or in which app break down.Based on same principle, more steps can be designed consequently facilitating finding failure source.
With above-mentioned Intelligent hardware configuration WLAN method correspondingly, at least have in the Intelligent hardware of the application
Wireless communication unit, as shown in Figure 4.The wireless communication unit is used as wireless aps to work first, is then used as WLAN
Client (that is, wireless network card) work.When wireless communication unit works as wireless aps, for establishing the second nothing
Line local area network, and the account and password of the first WLAN issued by the second WLAN acquisition user terminal.When
When client operation of the wireless communication unit as wireless network, for according to the title of the first WLAN received and
Password is connected to the first WLAN.
The method of the application Intelligent hardware configuration access permission is that unique main account is arranged for Intelligent hardware, main account tool
There is access and control whole permissions of Intelligent hardware (such as except the permission of engineering mode Deng Jinxian manufacturer operation).The side
Method is also Intelligent hardware setting zero, one or more wholes from account, from account with access and/or control Intelligent hardware
Or part permission, it is perhaps to preset or be arranged by main account from the permission of account.
Referring to Fig. 5, the method that the application is Intelligent hardware configuration access permission includes the following steps:
Step S501: Intelligent hardware receives the access for the first time of user terminal.
Step S503: Intelligent hardware receives and saves the user identifier of user terminal input, and the user identifier is made
For main account.Main account has whole permissions (such as engineering mode Deng Jinxian manufacturer operation for accessing and controlling Intelligent hardware
Permission except).The user identifier is, for example, the account and password that user is registered on Intelligent hardware server.
It is known as the first user terminal with the user terminal that main account logs on to Intelligent hardware.
Step S505: the user identifier of self identification and main account are sent jointly to server, server by Intelligent hardware
The two is bound and saved.The features with uniqueness such as the Intelligent hardware mark for example, MAC Address of Intelligent hardware
Information can also add other information on this basis.
After above-mentioned steps, the main account information of Intelligent hardware is maintained at two: first is that inside Intelligent hardware;Two
It is in the server of internet.Even if account information memory loss occurs for Intelligent hardware, the main account in server can also be believed
Breath is synchronized in Intelligent hardware, avoids repeating setting main account for same Intelligent hardware.
Referring to Fig. 6, the method that the application is Intelligent hardware configuration access permission further includes following steps:
Step S601: the app sending that server receives the first user terminal is request of the Intelligent hardware registration from account.
Step S603: server sends the first identifying code to the first user terminal, and first identifying code is by server
Inquiry database is identified according to the Intelligent hardware or carries out what operation obtained.First identifying code is, for example, number and/or word
The combination of symbol can also be two dimensional code etc..
First identifying code is passed to second user terminal by the S605: the first user terminal of step.For example, the first identifying code is
Two dimensional code, the app in second user terminal realize the transmitting of the first identifying code by the information read in two dimensional code of taking pictures.
Step S607: the app in second user terminal is inquired and/or is calculated according to the first identifying code, obtains second
Identifying code.The algorithm for the database of inquiry and/or for calculating built in the app, is transparent for server.
Step S609: server receives the second identifying code that second user terminal issues.
Step S611: whether the Intelligent hardware mark and the second identifying code that server judgement receives are correct.If mistake
Then return to error message.Authorization mark is sent to second user terminal if correct.Phase has been pre-saved inside Intelligent hardware
Same authorization mark.
Step S613: Intelligent hardware receives the authorization mark and user identifier of second user terminal input, verifying authorization mark
Knowledge pass through after using the user identifier as from account.There is all or part of power for accessing and/or controlling Intelligent hardware from account
Limit.Access and/or control authority from account can be it is pre-set, can also be configured by main account.
Step S615: Intelligent hardware is by self identification and should send jointly to server from the user identifier of account, services
The two is bound and is saved by device.
After above-mentioned steps, the slave account information of each Intelligent hardware is also stored at two: first is that Intelligent hardware
It is internal;Second is that in the server of internet.Even if situations such as Intelligent hardware resets, the slave account in server can also be believed
Breath is synchronized in Intelligent hardware, avoids repeating setting for same Intelligent hardware from account.
With the method for above-mentioned Intelligent hardware configuration access permission correspondingly, the Intelligent hardware of the application includes;
--- when Intelligent hardware receives the access for the first time of user terminal for receiving and saving user terminal input
User identifier, and using the user identifier as the first registering unit of main account;
--- for by self identification and main account or sending jointly to server from the user identifier of account and binding
With the unit of preservation.
Optionally, the Intelligent hardware further includes the authorization mark and user's mark for receiving the input of second user terminal
Know, and using the user identifier as the second registering unit from account.
It, can be there are two types of mode if you need to delete from account.First way: Intelligent hardware receives the first user terminal or the
The deletion of two user terminals input deletes the slave account information saved in Intelligent hardware from the instruction of account.Then by itself
Mark is synchronized to server with having deleted together with the state of account, at this time server by the Intelligent hardware with corresponding from account
It is unbinding.The second way: the first user terminal or second user terminal are deleted some Intelligent hardware on the server and are tied up
Fixed slave account.Then the account information that Intelligent hardware is returned according to server sync, it is corresponding by what is saved in Intelligent hardware
It is deleted from account.
Compared with existing Intelligent hardware configuration access permission, the method for the application Intelligent hardware configuration access permission includes
Main account with whole permissions is set and only there is the slave account of part permission, can greatly promote the safety of Intelligent hardware
Property.Even if there is the user of unauthorized to invade local area network, not obtaining main account authorization, (i.e. the first user terminal is to second user
Terminal transmit the first identifying code process) in the case where also can not access or control Intelligent hardware, ensure that Intelligent hardware
Safe operation and secret protection.
The above is only preferred embodiment of the present application, it is not used to limit the application.Come for those skilled in the art
It says, various changes and changes are possible in this application.Within the spirit and principles of this application, made any modification, equivalent
Replacement, improvement etc., should be included within the scope of protection of this application.
Claims (6)
1. a kind of configuration method of Intelligent hardware, characterized in that the configuration method includes configuring wireless local area for Intelligent hardware
Net, specifically: after Intelligent hardware powers on, wireless communication unit therein creates the second WLAN as wireless aps;Intelligence
The WLAN that hardware prepares connection is known as the first WLAN;User terminal scanning identifies and is connected to second wirelessly
Local area network also sends the link information of the first WLAN by the second WLAN to Intelligent hardware;Intelligent hardware connects
After the link information for receiving the first WLAN, wireless communication unit therein is connected to the first wireless office as wireless network card
Domain net;
The configuration method further includes specifically including: receiving user terminal in Intelligent hardware for Intelligent hardware configuration access permission
Access for the first time when, Intelligent hardware receive and save the user terminal input user identifier, and using the user identifier as lead
Account;Main account has the whole permissions for accessing and controlling Intelligent hardware;Then Intelligent hardware is by self identification with main account's
User identifier sends jointly to server, and the two is bound and saved by server;First user terminal is issued to server and is infused
Volume receives the first identifying code of server return from the request of account;First identifying code is passed to by the first user terminal
Two user terminals;Second user terminal is inquired and/or is calculated according to the first identifying code, obtains the second identifying code, and send
To server authentication;Server authentication passes through and issues authorization mark to the second intelligent terminal;Intelligent hardware receives second user
The authorization mark and user identifier of terminal input, and using the user identifier as from account;Intelligent hardware by self identification with from
The user identifier of account sends jointly to server, and server mutually binds Intelligent hardware with corresponding from account.
2. the configuration method of Intelligent hardware according to claim 1, characterized in that when the first WLAN is not necessarily to password
When can connect, the link information of the first WLAN includes the title of the first WLAN;When the first WLAN
It needs to verify when could be connected after password passes through, the link information of the first WLAN includes the title of the first WLAN
And password.
3. the configuration method of Intelligent hardware according to claim 1, characterized in that described to configure wireless office for Intelligent hardware
In the method for domain net, after user terminal sends the link information of the first WLAN to Intelligent hardware, user terminal broadcast
Message is with the wireless network connection state of request Intelligent hardware;After Intelligent hardware is connected to the first WLAN, intelligence
Energy hardware broadcast message only sends message to user terminal to inform the wireless network connection state of itself.
4. the configuration method of Intelligent hardware according to claim 1, characterized in that there is access and/or control from account
All or part of permission of Intelligent hardware;Access and/or control authority from account are either pre-set or by main account
Family is configured.
5. the configuration method of Intelligent hardware according to claim 1, characterized in that described to be weighed for Intelligent hardware configuration access
The method of limit further include: Intelligent hardware receives the deletion of the first user terminal or the input of second user terminal from the instruction of account,
The slave account information saved in Intelligent hardware is deleted;Then Intelligent hardware by self identification and has deleted the state one from account
Rise be synchronized to server, at this time server by the Intelligent hardware with it is corresponding unbinding from account;
Alternatively, the first user terminal or second user terminal delete slave account bound in some Intelligent hardware on the server;
Then the account information that Intelligent hardware is returned according to server sync, it is corresponding from account deletion by what is saved in Intelligent hardware.
6. a kind of Intelligent hardware, characterized in that have wireless communication unit;The wireless communication unit is first used as wireless aps work
Make, is re-used as wireless network card work;When wireless communication unit as wireless aps work when, for establish the second WLAN and
The link information for the first WLAN that user terminal issues is received by the second WLAN;When wireless communication unit is made
When for wireless network card, for being connected to the first WLAN according to the link information of the first WLAN received;
The Intelligent hardware further includes;
--- receive the user of user terminal inputted when accessing for the first time for receiving and saving the user terminal in Intelligent hardware
Mark, and using the user identifier as the first registering unit of main account;
--- for by self identification and main account or sending jointly to server from the user identifier of account and binding and protect
The unit deposited;
--- for receiving the authorization mark and user identifier of the input of second user terminal, and using the user identifier as from account
Family, and self identification and the user identifier from account are sent jointly into the second registering unit that service is bound and saved;
The authorization mark of the second user terminal is to issue request of the registration from account from the first user terminal to server, and receive
The first identifying code that server returns;First identifying code is passed to second user terminal by the first user terminal;Second user is whole
End is inquired and/or is calculated according to the first identifying code, obtains the second identifying code, and be sent to server authentication;Server is tested
Card is by issuing to the second intelligent terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511030312.8A CN105610620B (en) | 2015-12-31 | 2015-12-31 | A kind of Intelligent hardware and its configuration method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511030312.8A CN105610620B (en) | 2015-12-31 | 2015-12-31 | A kind of Intelligent hardware and its configuration method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105610620A CN105610620A (en) | 2016-05-25 |
CN105610620B true CN105610620B (en) | 2019-04-16 |
Family
ID=55990166
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201511030312.8A Active CN105610620B (en) | 2015-12-31 | 2015-12-31 | A kind of Intelligent hardware and its configuration method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105610620B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107659932B (en) * | 2016-07-25 | 2022-05-20 | 中兴通讯股份有限公司 | Equipment access method and device |
CN106357653A (en) * | 2016-09-27 | 2017-01-25 | 深圳市欧瑞博电子有限公司 | Control authority sharing method and system |
CN107911352B (en) * | 2017-11-06 | 2020-09-08 | 湖南微算互联信息技术有限公司 | Authorization method of cloud mobile phone |
CN113923120B (en) * | 2021-09-29 | 2023-08-18 | 广州鲁邦通物联网科技股份有限公司 | Module ID renaming method of wireless communication module and terminal equipment |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103929746A (en) * | 2013-01-16 | 2014-07-16 | 杭州古北电子科技有限公司 | Internet-surfing configuration method for equipment of Internet of things, equipment of Internet of things and user equipment |
CN104079543A (en) * | 2013-03-29 | 2014-10-01 | 珠海格力电器股份有限公司 | Method, device and system for acquiring monitoring authority of intelligent home system |
CN104283773A (en) * | 2014-10-23 | 2015-01-14 | 深圳市领耀东方科技股份有限公司 | System for controlling internet-of-things devices through microblog |
CN104427501A (en) * | 2013-09-11 | 2015-03-18 | 腾讯科技(深圳)有限公司 | Network access method, device and system |
CN104808501A (en) * | 2015-03-31 | 2015-07-29 | 小米科技有限责任公司 | Intelligent scene deleting method and device |
CN104967596A (en) * | 2014-10-31 | 2015-10-07 | 腾讯科技(深圳)有限公司 | Method and apparatus for realizing binding and communication between user terminal and Internet of things device |
CN105207994A (en) * | 2015-08-17 | 2015-12-30 | 小米科技有限责任公司 | Account number binding method and device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103516514B (en) * | 2012-06-21 | 2016-10-12 | 棣南股份有限公司 | The establishing method of account access rights and control device |
-
2015
- 2015-12-31 CN CN201511030312.8A patent/CN105610620B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103929746A (en) * | 2013-01-16 | 2014-07-16 | 杭州古北电子科技有限公司 | Internet-surfing configuration method for equipment of Internet of things, equipment of Internet of things and user equipment |
CN104079543A (en) * | 2013-03-29 | 2014-10-01 | 珠海格力电器股份有限公司 | Method, device and system for acquiring monitoring authority of intelligent home system |
CN104427501A (en) * | 2013-09-11 | 2015-03-18 | 腾讯科技(深圳)有限公司 | Network access method, device and system |
CN104283773A (en) * | 2014-10-23 | 2015-01-14 | 深圳市领耀东方科技股份有限公司 | System for controlling internet-of-things devices through microblog |
CN104967596A (en) * | 2014-10-31 | 2015-10-07 | 腾讯科技(深圳)有限公司 | Method and apparatus for realizing binding and communication between user terminal and Internet of things device |
CN104808501A (en) * | 2015-03-31 | 2015-07-29 | 小米科技有限责任公司 | Intelligent scene deleting method and device |
CN105207994A (en) * | 2015-08-17 | 2015-12-30 | 小米科技有限责任公司 | Account number binding method and device |
Also Published As
Publication number | Publication date |
---|---|
CN105610620A (en) | 2016-05-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101551315B1 (en) | Using a mobile device to enable another device to connect to a wireless network | |
CN108259164B (en) | Identity authentication method and equipment of Internet of things equipment | |
CN105610620B (en) | A kind of Intelligent hardware and its configuration method | |
EP3748928A1 (en) | Method and system for apparatus awaiting network configuration to access hot spot network apparatus | |
EP3100472B1 (en) | A method for commissioning and joining of a field device to a network | |
CN104767715A (en) | Network access control method and equipment | |
EP1760945A2 (en) | Wireless LAN security system and method | |
US20150181424A1 (en) | Mobile wireless access | |
CN104157029A (en) | Access control system, mobile terminal based control method thereof and mobile terminal | |
CN105282865A (en) | Device pairing | |
DK2924944T3 (en) | Presence authentication | |
CN102143492B (en) | Method for establishing virtual private network (VPN) connection, mobile terminal and server | |
US20110055409A1 (en) | Method For Network Connection | |
CN105635094A (en) | Security authentication method, security authentication device and security verification system | |
CN108243413B (en) | Method and system for wireless access to railway information network | |
CN105050086B (en) | A kind of method that terminal logs in Wifi hot spot | |
US20230154259A1 (en) | Method and devices for configuring electronic locks | |
WO2019215439A1 (en) | Methods and apparatus for authenticating devices | |
KR101722696B1 (en) | Home energy management apparatus and method using the beacon on the home energy management system | |
CN101616414A (en) | Method, system and server that terminal is authenticated | |
CN105516974A (en) | Router connection method, terminal and router | |
US10601824B2 (en) | Provision of access to a network | |
CN104518874A (en) | Network access control method and system | |
CN106789843B (en) | Method, PORTAL server and system for sharing internet access | |
CN112313984B (en) | Method for establishing access authorization, auxiliary system, user equipment and memory |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |