CN106856497B - Binding method and device for mobile equipment and accessory - Google Patents

Binding method and device for mobile equipment and accessory Download PDF

Info

Publication number
CN106856497B
CN106856497B CN201510907385.4A CN201510907385A CN106856497B CN 106856497 B CN106856497 B CN 106856497B CN 201510907385 A CN201510907385 A CN 201510907385A CN 106856497 B CN106856497 B CN 106856497B
Authority
CN
China
Prior art keywords
accessory
binding
target server
account
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510907385.4A
Other languages
Chinese (zh)
Other versions
CN106856497A (en
Inventor
赵剑锋
韩莹光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510907385.4A priority Critical patent/CN106856497B/en
Publication of CN106856497A publication Critical patent/CN106856497A/en
Application granted granted Critical
Publication of CN106856497B publication Critical patent/CN106856497B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/303Terminal profiles

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Information Transfer Between Computers (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention provides a method and a device for binding mobile equipment and accessories, wherein the method comprises the following steps: starting an accessory application in the mobile device to load the locked initialization interface in the accessory application; scanning a two-dimensional code on an accessory in the initialization interface; generating a binding request according to the two-dimension code; sending the binding request to a target server, and requesting the target server to bind the mobile equipment and the accessory; receiving a message for confirming binding returned by the target server when the mobile equipment and the accessory are bound; an operator interface for the accessory is loaded in the accessory application. According to the embodiment of the invention, the hardware is bound by locking and unlocking the accessory application, and the problem of piracy caused by counterfeiting due to simple design is avoided.

Description

Binding method and device for mobile equipment and accessory
Technical Field
The invention relates to the technical field of mobile equipment, in particular to a binding method and a binding device for the mobile equipment and accessories.
Background
With the development of mobile communication technology, mobile devices such as mobile phones are more and more popular, and great convenience is brought to life, study and work of people.
Currently, around mobile devices, various manufacturers provide different accessories to complete the functions of the mobile devices.
For example, the appearance design of a mobile phone is single, and the screen is large, so that a manufacturer designs a protective sleeve to be sleeved on the mobile phone, the design diversification can be highlighted on one hand, and the screen of the mobile phone can be protected on the other hand.
However, since the design of the accessory is generally simple and can be easily counterfeited, the piracy problem is prominent.
Disclosure of Invention
In view of the above problems, the present invention has been made to provide a binding method of a mobile device and an accessory and a corresponding binding apparatus of a mobile device and an accessory that overcome or at least partially solve the above problems.
According to an aspect of the present invention, there is provided a method for binding a mobile device and an accessory, including:
starting an accessory application in the mobile device to load the locked initialization interface in the accessory application;
scanning a two-dimensional code on an accessory in the initialization interface;
generating a binding request according to the two-dimension code;
sending the binding request to a target server, and requesting the target server to bind the mobile equipment and the accessory;
receiving a message for confirming binding returned by the target server when the mobile equipment and the accessory are bound;
an operator interface for the accessory is loaded in the accessory application.
Optionally, the method further comprises:
scanning a two-dimensional code on an accessory in a mobile device;
and downloading the accessory application according to the two-dimension code.
Optionally, the step of generating a binding request according to the two-dimensional code includes:
converting the two-dimensional code into a character string;
reading accessory identification from the character string;
reading a device identification of the mobile device;
embedding the accessory identification and the device identification into a binding request.
Optionally, the step of receiving a message confirming the binding returned by the target server when binding the mobile device with the accessory comprises:
and receiving a binding confirmation message returned by the target server when the target server confirms that the accessory identification is not bound in advance and binds the accessory identification and the equipment identification.
Optionally, the step of loading the operation interface of the accessory in the accessory application includes:
extracting equipment identification of current mobile equipment and accessory identification of accessories;
sending the equipment identification of the current mobile equipment and the accessory identification of the accessory to a target server;
and when receiving a message returned by the target server and bound with the equipment identifier of the current mobile equipment and the accessory identifier of the accessory, loading the operating interface of the accessory.
Optionally, the step of loading the operation interface of the accessory in the accessory application includes:
extracting a first digital signature generated based on the equipment identifier and the accessory identifier in the previous binding request in the message for confirming the binding;
extracting equipment identification of current mobile equipment and accessory identification of accessories;
generating a second digital signature based on the currently extracted device identification and accessory identification;
and when the first digital signature is matched with the second digital signature, loading an operation interface of the accessory.
Optionally, the step of downloading the accessory application according to the two-dimensional code includes:
converting the two-dimensional code into a character string;
reading a download address from the character string;
and accessing the download address to download the accessory application.
Optionally, the model of the mobile device is adapted to the model of the accessory, and the step of accessing the download address to download the accessory application includes:
and accessing the download address to download the accessory application matched with the model of the mobile equipment.
Optionally, the method further comprises:
and requesting the target server to configure a first account in the operation interface so as to bind the mobile equipment and the accessory with the first account.
Optionally, the step of requesting, in the operation interface, the target server to configure the first account to bind the mobile device and the accessory to the first account includes:
and requesting the target server to configure a first account in the operation interface so as to bind the equipment identifier and the accessory identifier with the first account.
Optionally, the step of loading the operation interface of the accessory in the accessory application includes:
extracting a first account;
sending the first account to a target server;
and when receiving a message which is returned by the target server and confirms that the first account is bound, loading an operation interface of the accessory.
Optionally, the method further comprises:
and requesting the target server to remove the binding of the first account with the mobile equipment and the accessory in the operation interface, and establishing the binding of the second account with the mobile equipment and the accessory.
Optionally, the step of requesting, in the operation interface, the target server to release the binding between the first account and the mobile device or the accessory, and the step of establishing the binding between the second account and the mobile device or the accessory includes:
and requesting the target server to remove the binding of the first account with the equipment identifier and the accessory identifier and establish the binding of the second account with the equipment identifier and the accessory identifier in the operation interface.
Optionally, the accessory comprises a protective sleeve.
According to another aspect of the present invention, there is provided an apparatus for binding a mobile device and an accessory, comprising:
the initialization interface loading module is suitable for starting the accessory application in the mobile equipment so as to load the locked initialization interface in the accessory application;
the application scanning module is suitable for scanning the two-dimensional code on the accessory in the initialization interface;
the binding request generation module is suitable for generating a binding request according to the two-dimension code;
a binding request sending module adapted to send the binding request to a target server requesting the target server to bind the mobile device with the accessory;
the message receiving module is suitable for receiving a message which is returned by the target server and confirms the binding when the mobile equipment and the accessory are bound;
and the operation interface loading module is suitable for loading the operation interface of the accessory in the accessory application.
Optionally, the method further comprises:
the device scanning module is suitable for scanning the two-dimensional code on the accessory in the mobile device;
and the accessory application downloading module is suitable for downloading the accessory application according to the two-dimensional code.
Optionally, the binding request sending module is further adapted to:
converting the two-dimensional code into a character string;
reading accessory identification from the character string;
reading a device identification of the mobile device;
embedding the accessory identification and the device identification into a binding request.
Optionally, the message receiving module is further adapted to:
and receiving a binding confirmation message returned by the target server when the target server confirms that the accessory identification is not bound in advance and binds the accessory identification and the equipment identification.
Optionally, the operation interface loading module is further adapted to:
extracting equipment identification of current mobile equipment and accessory identification of accessories;
sending the equipment identification of the current mobile equipment and the accessory identification of the accessory to a target server;
and when receiving a message returned by the target server and bound with the equipment identifier of the current mobile equipment and the accessory identifier of the accessory, loading the operating interface of the accessory.
Optionally, the operation interface loading module is further adapted to:
extracting a first digital signature generated based on the equipment identifier and the accessory identifier in the previous binding request in the message for confirming the binding;
extracting equipment identification of current mobile equipment and accessory identification of accessories;
generating a second digital signature based on the currently extracted device identification and accessory identification;
and when the first digital signature is matched with the second digital signature, loading an operation interface of the accessory.
Optionally, the accessory application download module is further adapted to:
converting the two-dimensional code into a character string;
reading a download address from the character string;
and accessing the download address to download the accessory application.
Optionally, the accessory application download module is further adapted to:
and accessing the download address to download the accessory application matched with the model of the mobile equipment.
Optionally, the method further comprises:
and the account configuration module is suitable for requesting the target server to configure a first account in the operation interface so as to bind the mobile equipment and the accessory with the first account.
Optionally, the account configuration module is further adapted to:
and requesting the target server to configure a first account in the operation interface so as to bind the equipment identifier and the accessory identifier with the first account.
Optionally, the operation interface loading module is further adapted to:
extracting a first account;
sending the first account to a target server;
and when receiving a message which is returned by the target server and confirms that the first account is bound, loading an operation interface of the accessory.
Optionally, the method further comprises:
and the transfer module is suitable for requesting the target server to release the binding of the first account number with the mobile equipment and the accessory in the operation interface and establish the binding of the second account number with the mobile equipment and the accessory.
Optionally, the transfer module is further adapted to:
and requesting the target server to remove the binding of the first account with the equipment identifier and the accessory identifier and establish the binding of the second account with the equipment identifier and the accessory identifier in the operation interface.
Optionally, the accessory comprises a protective sleeve.
According to the embodiment of the invention, the target server is requested to bind the mobile equipment and the accessory by scanning the two-dimensional code on the accessory, the operation interface of the accessory is loaded when the target server binds the mobile equipment and the accessory, and the hardware binding can be realized by locking and unlocking the accessory application because the accessory is used depending on the accessory application, so that the problem of piracy caused by simple design and counterfeiting is avoided.
According to the embodiment of the invention, the two-dimension code on the accessory is scanned, the adaptive accessory application and the binding equipment are downloaded, and the complex operations of searching and downloading the adaptive accessory application are avoided by multiplexing the two-dimension code, so that the simplicity of operation is improved.
The embodiment of the invention realizes the transfer of the use right of the accessory based on the unbinding and the rebinding of the account number, and avoids the waste of the accessory.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 shows a flowchart of the steps of an embodiment 1 of a method for binding a mobile device and an accessory according to an embodiment of the invention;
FIG. 2 is a flowchart illustrating steps of embodiment 2 of a method for binding a mobile device to an accessory according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating steps of embodiment 3 of a method for binding a mobile device to an accessory according to an embodiment of the present invention;
fig. 4 is a block diagram illustrating a binding apparatus of a mobile device and an accessory according to an embodiment of the present invention, embodiment 1
Fig. 5 is a block diagram illustrating a binding apparatus of a mobile device and an accessory according to an embodiment 2 of the present invention; and
fig. 6 shows a block diagram of a binding apparatus of a mobile device and an accessory according to an embodiment 3 of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Referring to fig. 1, a flowchart illustrating steps of embodiment 1 of a method for binding a mobile device and an accessory according to an embodiment of the present invention is shown, which may specifically include the following steps:
step 101, starting an accessory application in the mobile equipment to load a locked initialization interface in the accessory application;
it should be noted that the embodiments of the present invention can be applied to various mobile devices, such as a mobile phone, a tablet computer, a personal digital assistant, a wearable device (such as glasses, a watch, etc.), and the like.
In a specific implementation, the mobile device may have an accessory, which is physical hardware, and may specifically include a protective sleeve, a smart key, a pendant, and the like.
In order to make the embodiment of the present invention better understood by those skilled in the art, in the embodiment of the present invention, a protective cover is explained as an example of the fitting.
The operating system of the mobile device may include Android (Android), IOS, Windows Phone, Windows, and the like, and may support the running of an accessory application, which is an application matched with an accessory.
In the embodiment of the invention, the starting of the accessory application can be triggered by the mode that a user clicks an icon of the accessory application on a desktop, other applications call the accessory application and the like.
When the accessory application is started, the locked initialization interface can be loaded, i.e. cannot jump to the operator interface before being unlocked.
Step 102, scanning a two-dimensional code on an accessory in the initialization interface;
by applying the embodiment of the invention, the two-dimensional code can be printed in the accessory, for example, the two-dimensional code is printed inside the protective sleeve.
In a specific implementation, the configuration application may call a camera through Intent, the camera aligns to the two-dimensional code on the accessory, and a preview image of the two-dimensional code may be acquired in an onactive result (int requestCode, int resultCode, Intent data), so that the two-dimensional code is displayed and scanned in an initialization interface.
Two-dimensional code, also called two-dimensional bar code, is a method for recording data symbol information by using black and white patterns distributed on a plane (two-dimensional direction) according to a certain rule by using a certain specific geometric figure, and in the code formulation, the concept of '0' and '1' bit stream forming the internal logic basis of a computer is utilized, and a plurality of geometric figures corresponding to binary system are used for representing literal numerical information.
103, generating a binding request according to the two-dimension code;
in practical applications, the two-dimensional code may be converted into a character string, and the accessory identification, which is information capable of representing a uniquely determined accessory, such as an accessory ID, may be read from the character string.
Since the accessory identification is unique, the two-dimensional code printed on the accessory is also unique.
In addition, the device identification of the Mobile device may be read, which is information that can represent a uniquely determined Mobile device, such as an IMEI (International Mobile Equipment Identity) code, etc.
If the accessory identification and the device identification are read, the accessory identification and the device identification may be embedded in the binding request.
Step 104, sending the binding request to a target server, and requesting the target server to bind the mobile equipment and the accessory;
after generating the binding request, the accessory application can send the binding application to a target server, such as a server provided by the vendor that produced the accessory, requesting that the target server will bind the mobile device with the accessory.
Step 105, receiving a message for confirming binding returned by the target server when the mobile equipment and the accessory are bound;
in the embodiment of the present invention, when the target server receives the binding request, the accessory identifier and the device identifier may be extracted from the binding request, and it is determined whether the accessory identifier is bound with another device identifier.
If the accessory identification is confirmed not to be bound with other equipment identifications, the accessory can be represented to be not activated, the accessory identification and the equipment identification can be bound, the accessory is activated, a message for confirming the binding is generated, and the accessory application is returned.
Thus, the accessory application can receive a message confirming the binding returned by the target server upon confirming that the accessory identification was not previously bound, and that the accessory identification and the device identification were bound.
And step 106, loading an operation interface of the accessory in the accessory application.
If the accessory application receives the message for confirming the binding, the accessory application can indicate that the matched accessory is activated, unlock the initialization interface and jump to the operation interface (namely, the interface capable of carrying out specific operation, which comprises one or more menus, controls and the like), the user can freely set, and the accessory application can be matched with the accessory to operate.
In the embodiment of the invention, in order to prevent the accessory application from being tampered (i.e. cracked), binding verification can be performed on the mobile device and the accessory, if the binding verification is passed, it is indicated that the mobile device and the accessory are bound, and an operation interface of the accessory can be loaded, and if the binding verification is not passed, it is indicated that the mobile device and the accessory are not bound, the accessory application is possibly tampered, and the operation interface of the accessory is prohibited from being loaded.
In an alternative embodiment of the present invention, step 106 may comprise the following sub-steps:
substep S11, extracting the device identification of the current mobile device and the accessory identification of the accessory;
substep S12, sending the device identification of the current mobile device and the accessory identification of the accessory to the target server;
and a substep S13, loading the operation interface of the accessory when receiving the message that the device identification of the current mobile device and the accessory identification of the accessory are bound and returned by the target server.
In the embodiment of the present invention, if the target server is connected, the device identifier of the current mobile device and the accessory identifier of the accessory (i.e., the accessory identifier stored when the binding request was generated in advance) may be extracted, and sent to the target server to determine whether the device identifier and the accessory identifier are bound.
If the target server judges that the binding is performed, the bound message can be returned to the accessory application, and the accessory application can load an operation interface of the accessory.
In another alternative embodiment of the present invention, step 106 may include the following sub-steps:
substep S21, extracting a first digital signature generated based on the device identifier and the accessory identifier in the previous binding request from the binding confirmation message;
substep S22, extracting the device identification of the current mobile device and the accessory identification of the accessory;
a substep S23 of generating a second digital signature based on the currently extracted device identification and accessory identification;
and a substep S24, loading the operation interface of the accessory when the first digital signature is matched with the second digital signature.
By applying the embodiment of the invention, the calculation mode of calculating the digital signature (namely the first digital signature and the second digital signature) by the target server and the accessory application can be agreed in advance.
If the target server is not connected, the target server can be extracted to previously generate a first digital signature generated based on the device identifier and the accessory identifier in the binding request, and the current device identifier and the current accessory identifier (namely the accessory identifier stored when the binding request is previously generated), generate a second digital signature, and perform binding verification.
Further, the target server and the accessory application may encrypt the device identification and the accessory identification in an irreversible encryption manner to obtain the first digital signature and the second digital signature.
It should be noted that the irreversible encryption method is characterized in that a secret key is not needed in the encryption process, the encrypted data is directly encrypted into a ciphertext after inputting the plaintext, the encrypted data cannot be decrypted generally, and the data can be really decrypted only after inputting the plaintext again and performing the same irreversible encryption again to obtain the same ciphertext and re-identifying the same ciphertext.
For example, the irreversible encryption scheme is MD5(Message-Digest Algorithm 5) Algorithm, SHS (Secure Hash Standard) Algorithm, or the like.
In an alternative example of the embodiment of the present invention, the device identifier and the accessory identifier may be combined, and the combination may be any combination, such as sequential combination (overlapping one another in a certain order), insertion combination (inserting one into the other), and the like.
Of course, the above encryption manner is only used as an example, and when the embodiment of the present invention is implemented, other encryption manners may be set according to actual situations, for example, an RSA algorithm, an ElGamal algorithm, a knapsack algorithm, a Rabin algorithm, an ECC algorithm, and the embodiment of the present invention is not limited thereto. In addition, besides the above judgment processing method, a person skilled in the art may also adopt other judgment processing methods according to actual needs, and the embodiment of the present invention is not limited thereto.
If the first digital signature generated by the target server is not the same as the second digital signature generated by the accessory application, the accessory application may be tampered, and the loading of the operation interface is prohibited.
On the contrary, if the first digital signature generated by the target server is the same as the second digital signature generated by the accessory application, the accessory application is not tampered, and the operation interface is loaded.
Of course, the above-mentioned determining of the binding check is only an example, and when the embodiment of the present invention is implemented, other binding checks may be set according to an actual situation, which is not limited in the embodiment of the present invention. In addition, besides the binding check, a person skilled in the art may also adopt other binding checks according to actual needs, and the embodiment of the present invention is not limited to this.
According to the embodiment of the invention, the target server is requested to bind the mobile equipment and the accessory by scanning the two-dimensional code on the accessory, the operation interface of the accessory is loaded when the target server binds the mobile equipment and the accessory, and the hardware binding can be realized by locking and unlocking the accessory application because the accessory is used depending on the accessory application, so that the problem of piracy caused by simple design and counterfeiting is avoided.
Referring to fig. 2, a flowchart illustrating steps of embodiment 2 of a method for binding a mobile device and an accessory according to an embodiment of the present invention is shown, which may specifically include the following steps:
step 201, scanning a two-dimensional code on an accessory in a mobile device;
in the embodiment of the invention, an application with a function of scanning the two-dimensional code, such as a browser, an instant messaging tool and the like, can be started.
The application with the function of scanning the two-dimensional code can call the camera through Intent, the camera is aligned to the two-dimensional code on the accessory, the image previewed by the camera can be acquired in the onactive result (int requestCode, int resultCode, Intent data), and then the two-dimensional code is displayed and scanned in the initialization interface.
Step 202, downloading accessory application according to the two-dimension code;
in practical applications, the two-dimensional code may be converted into a character string, a download address, such as a URL (Uniform Resource Locator), may be read from the character string, and the download address may be accessed to download the accessory application and install the accessory application.
Furthermore, since the functions of different mobile devices are different, the functions of the accessories are also different, and the settings are also different, that is, the models of the mobile devices are adapted to the models of the accessories.
If the download address is resolved, the download address can be accessed to download the accessory application that is adapted to the model of the mobile device.
Step 203, starting an accessory application in the mobile device to load the locked initialization interface in the accessory application;
step 204, scanning the two-dimensional code on the accessory in the initialization interface;
step 205, generating a binding request according to the two-dimension code;
step 206, sending the binding request to a target server, requesting the target server to bind the mobile device and the accessory;
step 207, receiving a message for confirming the binding returned by the target server when the mobile device and the accessory are bound;
and step 208, loading an operation interface of the accessory in the accessory application.
According to the embodiment of the invention, the two-dimension code on the accessory is scanned, the adaptive accessory application and the binding equipment are downloaded, and the complex operations of searching and downloading the adaptive accessory application are avoided by multiplexing the two-dimension code, so that the simplicity of operation is improved.
Referring to fig. 3, a flowchart illustrating steps of embodiment 3 of a method for binding a mobile device and an accessory according to an embodiment of the present invention is shown, which may specifically include the following steps:
step 301, starting an accessory application in the mobile device to load a locked initialization interface in the accessory application;
step 302, scanning a two-dimensional code on an accessory in the initialization interface;
step 303, generating a binding request according to the two-dimension code;
step 304, sending the binding request to a target server, requesting the target server to bind the mobile device and the accessory;
step 305, receiving a message which is returned by the target server when the mobile device and the accessory are bound and confirms the binding;
step 306, requesting a target server to configure a first account in the operation interface so as to bind the mobile device, the accessory and the first account;
in the embodiment of the present invention, a first account may be set for a current user, and subsequent operations may be performed based on the first account, for example, sending a message sent by a target server or another account, sending a message to the target server or another account, counting operation data of the first account by the target server, and the like.
Specifically, the target server may be requested to configure the first account in the operation interface, so as to bind the device identifier and the accessory identifier with the first account.
If the target server receives the request, a first account can be configured, the device identifier and the accessory identifier are bound with the first account, and account information (such as account ID and account level) of the first account is returned to the accessory application.
Step 307, loading an operation interface of the accessory in the accessory application;
in the embodiment of the invention, if the target server is connected, the first account of the current accessory application and the accessory identifier of the accessory (namely, the accessory identifier stored in the process of generating the binding request in advance) can be extracted, the first account of the current accessory application and the accessory identifier of the accessory are sent to the target server, and the target server is requested to judge whether the first account and the accessory identifier are bound or not;
if the target server determines that the binding has occurred, the bound message may be returned to the accessory application.
And when receiving a message which is returned by the target server and is bound by the first account number of the current accessory application and the accessory identification of the accessory, loading the operating interface of the accessory.
Step 308, requesting the target server to release the binding between the first account and the mobile device and the accessory in the operation interface, and establishing the binding between the second account and the mobile device and the accessory.
In the embodiment of the invention, if the user does not use the accessory, the use right of the accessory can be transferred to other users.
Specifically, the target server may be requested to release the binding between the first account and the device identifier and the accessory identifier in the operation interface, and establish the binding between the second account and the device identifier and the accessory identifier.
The target server can release the binding of the first account number with the equipment identifier and the accessory identifier according to the request, establish the binding of the second account number with the equipment identifier and the accessory identifier, and realize that the use right of the accessory is transferred from the first account number to the second account number.
The embodiment of the invention realizes the transfer of the use right of the accessory based on the unbinding and the rebinding of the account number, and avoids the waste of the accessory.
For simplicity of explanation, the method embodiments are described as a series of acts or combinations, but those skilled in the art will appreciate that the embodiments are not limited by the order of acts described, as some steps may occur in other orders or concurrently with other steps in accordance with the embodiments of the invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
Referring to fig. 4, a block diagram of a binding apparatus embodiment 1 for a mobile device and an accessory according to an embodiment of the present invention is shown, which may specifically include the following modules:
an initialization interface loading module 401, adapted to start an accessory application in the mobile device to load a locked initialization interface in the accessory application;
the application scanning module 402 is suitable for scanning the two-dimensional code on the accessory in the initialization interface;
a binding request generating module 403, adapted to generate a binding request according to the two-dimensional code;
a binding request sending module 404 adapted to send the binding request to a target server requesting that the target server will bind the mobile device with the accessory;
a message receiving module 405 adapted to receive a message confirming the binding returned by the target server when binding the mobile device with the accessory;
and the operation interface loading module 406 is suitable for loading the operation interface of the accessory in the accessory application.
In an optional embodiment of the present invention, the binding request sending module 404 may be further adapted to:
converting the two-dimensional code into a character string;
reading accessory identification from the character string;
reading a device identification of the mobile device;
embedding the accessory identification and the device identification into a binding request.
In an optional embodiment of the present invention, the message receiving module 405 may be further adapted to:
and receiving a binding confirmation message returned by the target server when the target server confirms that the accessory identification is not bound in advance and binds the accessory identification and the equipment identification.
In an optional embodiment of the present invention, the operation interface loading module 406 may be further adapted to:
extracting equipment identification of current mobile equipment and accessory identification of accessories;
sending the equipment identification of the current mobile equipment and the accessory identification of the accessory to a target server;
and when receiving a message returned by the target server and bound with the equipment identifier of the current mobile equipment and the accessory identifier of the accessory, loading the operating interface of the accessory.
In another optional embodiment of the present invention, the operation interface loading module 406 may be further adapted to:
extracting a first digital signature generated based on the equipment identifier and the accessory identifier in the previous binding request in the message for confirming the binding;
extracting equipment identification of current mobile equipment and accessory identification of accessories;
generating a second digital signature based on the currently extracted device identification and accessory identification;
and when the first digital signature is matched with the second digital signature, loading an operation interface of the accessory.
In a particular implementation, the accessory may include a protective sleeve.
Referring to fig. 5, a block diagram of a binding apparatus embodiment 2 for a mobile device and an accessory according to an embodiment of the present invention is shown, which may specifically include the following modules:
a device scanning module 501, adapted to scan a two-dimensional code on an accessory in a mobile device;
an accessory application downloading module 502 adapted to download an accessory application according to the two-dimensional code;
an initialization interface loading module 503 adapted to start an accessory application in the mobile device to load the locked initialization interface in the accessory application;
an application scanning module 504, adapted to scan the two-dimensional code on the accessory in the initialization interface;
a binding request generating module 505, adapted to generate a binding request according to the two-dimensional code;
a binding request sending module 506 adapted to send the binding request to a target server requesting the target server to bind the mobile device with the accessory;
a message receiving module 507 adapted to receive a message confirming the binding returned by the target server when binding the mobile device with the accessory;
and the operation interface loading module 508 is suitable for loading the operation interface of the accessory in the accessory application.
In an optional embodiment of the invention, the accessory application download module 502 may be further adapted to:
converting the two-dimensional code into a character string;
reading a download address from the character string;
and accessing the download address to download the accessory application.
In an optional embodiment of the invention, the accessory application download module 502 may be further adapted to:
and accessing the download address to download the accessory application matched with the model of the mobile equipment.
Referring to fig. 6, a block diagram of a binding apparatus embodiment 3 for a mobile device and an accessory according to an embodiment of the present invention is shown, which may specifically include the following modules:
an initialization interface loading module 601, adapted to start an accessory application in the mobile device to load a locked initialization interface in the accessory application;
the application scanning module 602 is adapted to scan the two-dimensional code on the accessory in the initialization interface;
a binding request generating module 603 adapted to generate a binding request according to the two-dimensional code;
a binding request sending module 604 adapted to send the binding request to a target server requesting the target server to bind the mobile device with the accessory;
a message receiving module 605 adapted to receive a message confirming the binding returned by the target server when binding the mobile device with the accessory;
an account configuration module 606, adapted to request the target server to configure a first account in the operation interface, so as to bind the mobile device, the accessory and the first account;
an operation interface loading module 607 adapted to load an operation interface of an accessory in an accessory application;
the transfer module 608 is adapted to request the target server to release the binding between the first account and the mobile device or the accessory and to establish the binding between the second account and the mobile device or the accessory in the operation interface.
In an optional embodiment of the present invention, the account configuration module 606 may be further adapted to:
and requesting the target server to configure a first account in the operation interface so as to bind the equipment identifier and the accessory identifier with the first account.
In an optional embodiment of the present invention, the operation interface loading module 607 may be further adapted to:
extracting a first account;
sending the first account to a target server;
and when receiving a message which is returned by the target server and confirms that the first account is bound, loading an operation interface of the accessory.
In an optional embodiment of the present invention, the transfer module 608 may be further adapted to:
and requesting the target server to remove the binding of the first account with the equipment identifier and the accessory identifier and establish the binding of the second account with the equipment identifier and the accessory identifier in the operation interface.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. It will be appreciated by those skilled in the art that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functionality of some or all of the components in a mobile device and accessory binding device in accordance with embodiments of the present invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
The embodiment of the invention discloses A1, a method for binding a mobile device and an accessory, which comprises the following steps:
starting an accessory application in the mobile device to load the locked initialization interface in the accessory application;
scanning a two-dimensional code on an accessory in the initialization interface;
generating a binding request according to the two-dimension code;
sending the binding request to a target server, and requesting the target server to bind the mobile equipment and the accessory;
receiving a message for confirming binding returned by the target server when the mobile equipment and the accessory are bound;
an operator interface for the accessory is loaded in the accessory application.
A2, the method of a1, further comprising:
scanning a two-dimensional code on an accessory in a mobile device;
and downloading the accessory application according to the two-dimension code.
A3, the method of A1, wherein the step of generating the binding request according to the two-dimensional code comprises:
converting the two-dimensional code into a character string;
reading accessory identification from the character string;
reading a device identification of the mobile device;
embedding the accessory identification and the device identification into a binding request.
A4, the method of A3, wherein the step of receiving a message returned by the target server in binding the mobile device to the accessory confirming the binding comprises:
and receiving a binding confirmation message returned by the target server when the target server confirms that the accessory identification is not bound in advance and binds the accessory identification and the equipment identification.
A5, the method as in A3, the step of loading an operation interface of the accessory in the accessory application includes:
extracting equipment identification of current mobile equipment and accessory identification of accessories;
sending the equipment identification of the current mobile equipment and the accessory identification of the accessory to a target server;
and when receiving a message returned by the target server and bound with the equipment identifier of the current mobile equipment and the accessory identifier of the accessory, loading the operating interface of the accessory.
A6, the method as in A3, the step of loading an operation interface of the accessory in the accessory application includes:
extracting a first digital signature generated based on the equipment identifier and the accessory identifier in the previous binding request in the message for confirming the binding;
extracting equipment identification of current mobile equipment and accessory identification of accessories;
generating a second digital signature based on the currently extracted device identification and accessory identification;
and when the first digital signature is matched with the second digital signature, loading an operation interface of the accessory.
A7, the method of A2, the downloading the accessory application according to the two-dimensional code comprising:
converting the two-dimensional code into a character string;
reading a download address from the character string;
and accessing the download address to download the accessory application.
A8, the method as in a7, the model of the mobile device being adapted to the model of the accessory, the step of accessing the download address to download the accessory application comprising:
and accessing the download address to download the accessory application matched with the model of the mobile equipment.
A9, the method of a1 or a2 or A3 or a4 or a5 or a6 or a7 or A8, further comprising:
and requesting the target server to configure a first account in the operation interface so as to bind the mobile equipment and the accessory with the first account.
A10, the method of A9, the step of requesting the target server to configure the first account in the operation interface, so as to bind the mobile device and the accessory with the first account includes:
and requesting the target server to configure a first account in the operation interface so as to bind the equipment identifier and the accessory identifier with the first account.
A11, the method as in A10, the step of loading an operation interface of the accessory in the accessory application includes:
extracting a first account;
sending the first account to a target server;
and when receiving a message which is returned by the target server and confirms that the first account is bound, loading an operation interface of the accessory.
A12, the method of a9, further comprising:
and requesting the target server to remove the binding of the first account with the mobile equipment and the accessory in the operation interface, and establishing the binding of the second account with the mobile equipment and the accessory.
A13, the method of A12, wherein the step of requesting the target server to unbind the first account from the mobile device and the accessory in the operation interface, and the step of establishing the binding of the second account to the mobile device and the accessory comprises:
and requesting the target server to remove the binding of the first account with the equipment identifier and the accessory identifier and establish the binding of the second account with the equipment identifier and the accessory identifier in the operation interface.
A14, such as a1 or a2 or A3 or a4 or a5 or A6 or a7 or A8 or a10 or a11 or a12 or a13, said accessory comprising a protective sheath.
The embodiment of the invention also discloses B15, a binding device of the mobile device and the accessory, which comprises:
the initialization interface loading module is suitable for starting the accessory application in the mobile equipment so as to load the locked initialization interface in the accessory application;
the application scanning module is suitable for scanning the two-dimensional code on the accessory in the initialization interface;
the binding request generation module is suitable for generating a binding request according to the two-dimension code;
a binding request sending module adapted to send the binding request to a target server requesting the target server to bind the mobile device with the accessory;
the message receiving module is suitable for receiving a message which is returned by the target server and confirms the binding when the mobile equipment and the accessory are bound;
and the operation interface loading module is suitable for loading the operation interface of the accessory in the accessory application.
B16, the apparatus of B15, further comprising:
the device scanning module is suitable for scanning the two-dimensional code on the accessory in the mobile device;
and the accessory application downloading module is suitable for downloading the accessory application according to the two-dimensional code.
B17, the apparatus of B15, the binding request sending module further adapted to:
converting the two-dimensional code into a character string;
reading accessory identification from the character string;
reading a device identification of the mobile device;
embedding the accessory identification and the device identification into a binding request.
B18, the apparatus of B17, the message receiving module further adapted to:
and receiving a binding confirmation message returned by the target server when the target server confirms that the accessory identification is not bound in advance and binds the accessory identification and the equipment identification.
B19, the apparatus of B17, the operator interface loading module further adapted to:
extracting equipment identification of current mobile equipment and accessory identification of accessories;
sending the equipment identification of the current mobile equipment and the accessory identification of the accessory to a target server;
and when receiving a message returned by the target server and bound with the equipment identifier of the current mobile equipment and the accessory identifier of the accessory, loading the operating interface of the accessory.
B20, the apparatus of B17, the operator interface loading module further adapted to:
extracting a first digital signature generated based on the equipment identifier and the accessory identifier in the previous binding request in the message for confirming the binding;
extracting equipment identification of current mobile equipment and accessory identification of accessories;
generating a second digital signature based on the currently extracted device identification and accessory identification;
and when the first digital signature is matched with the second digital signature, loading an operation interface of the accessory.
B21, the apparatus of B16, the accessory application download module further adapted to:
converting the two-dimensional code into a character string;
reading a download address from the character string;
and accessing the download address to download the accessory application.
B22, the apparatus of B21, the accessory application download module further adapted to:
and accessing the download address to download the accessory application matched with the model of the mobile equipment.
B23, an apparatus as described in B15 or B16 or B17 or B18 or B19 or B20 or B21 or B22, further comprising:
and the account configuration module is suitable for requesting the target server to configure a first account in the operation interface so as to bind the mobile equipment and the accessory with the first account.
B24, the apparatus of B23, the account configuration module further adapted to:
and requesting the target server to configure a first account in the operation interface so as to bind the equipment identifier and the accessory identifier with the first account.
B25, the apparatus of B24, the operator interface loading module further adapted to:
extracting a first account;
sending the first account to a target server;
and when receiving a message which is returned by the target server and confirms that the first account is bound, loading an operation interface of the accessory.
B26, the apparatus of B23, further comprising:
and the transfer module is suitable for requesting the target server to release the binding of the first account number with the mobile equipment and the accessory in the operation interface and establish the binding of the second account number with the mobile equipment and the accessory.
B27, the apparatus of B26, the transfer module further adapted to:
and requesting the target server to remove the binding of the first account with the equipment identifier and the accessory identifier and establish the binding of the second account with the equipment identifier and the accessory identifier in the operation interface.
B28, a device as described in B15 or B16 or B17 or B18 or B19 or B20 or B21 or B22 or B24 or B25 or B26 or B27, said accessory comprising a protective sheath.

Claims (26)

1. A method of binding a mobile device to an accessory, comprising:
starting an accessory application in the mobile device to load the locked initialization interface in the accessory application;
scanning a two-dimensional code on an accessory in the initialization interface;
generating a binding request according to the two-dimension code; the binding request carries an accessory identifier and an equipment identifier;
sending the binding request to a target server, and requesting the target server to bind the mobile equipment and the accessory;
receiving a message for confirming binding returned by the target server when the mobile equipment and the accessory are bound;
loading an operating interface of an accessory in an accessory application;
the step of loading an operation interface of the accessory in the accessory application comprises the following steps:
extracting a first digital signature generated based on the equipment identifier and the accessory identifier in the previous binding request in the message for confirming the binding;
extracting equipment identification of current mobile equipment and accessory identification of accessories;
generating a second digital signature based on the currently extracted device identification and accessory identification;
and when the first digital signature is matched with the second digital signature, loading an operation interface of the accessory.
2. The method of claim 1, further comprising:
scanning a two-dimensional code on an accessory in a mobile device;
and downloading the accessory application according to the two-dimension code.
3. The method of claim 1, wherein the step of generating a binding request according to the two-dimensional code comprises:
converting the two-dimensional code into a character string;
reading accessory identification from the character string;
reading a device identification of the mobile device;
embedding the accessory identification and the device identification into a binding request.
4. The method of claim 3, wherein the step of receiving a message returned by the target server in binding the mobile device with the accessory confirming binding comprises:
and receiving a binding confirmation message returned by the target server when the target server confirms that the accessory identification is not bound in advance and binds the accessory identification and the equipment identification.
5. The method of claim 3, wherein the step of loading an operator interface for the accessory in the accessory application comprises:
extracting equipment identification of current mobile equipment and accessory identification of accessories;
sending the equipment identification of the current mobile equipment and the accessory identification of the accessory to a target server;
and when receiving a message returned by the target server and bound with the equipment identifier of the current mobile equipment and the accessory identifier of the accessory, loading the operating interface of the accessory.
6. The method of claim 2, wherein the downloading of the accessory application according to the two-dimensional code comprises:
converting the two-dimensional code into a character string;
reading a download address from the character string;
and accessing the download address to download the accessory application.
7. The method of claim 6, wherein a model of the mobile device is adapted to a model of the accessory, and the step of accessing the download address to download the accessory application comprises:
and accessing the download address to download the accessory application matched with the model of the mobile equipment.
8. The method of claim 1, 2, 3, 4, 5, 6, or 7, further comprising:
and requesting the target server to configure a first account in the operation interface so as to bind the mobile equipment and the accessory with the first account.
9. The method of claim 8, wherein the step of requesting the target server to configure the first account in the operator interface to bind the mobile device, accessory, and first account comprises:
and requesting the target server to configure a first account in the operation interface so as to bind the equipment identifier and the accessory identifier with the first account.
10. The method of claim 9, wherein the step of loading an operator interface for the accessory in the accessory application comprises:
extracting a first account;
sending the first account to a target server;
and when receiving a message which is returned by the target server and confirms that the first account is bound, loading an operation interface of the accessory.
11. The method of claim 8, further comprising:
and requesting the target server to remove the binding of the first account with the mobile equipment and the accessory in the operation interface, and establishing the binding of the second account with the mobile equipment and the accessory.
12. The method of claim 11, wherein the step of requesting the target server to unbind the first account from the mobile device and the accessory and establish the second account with the mobile device and the accessory in the operation interface comprises:
and requesting the target server to remove the binding of the first account with the equipment identifier and the accessory identifier and establish the binding of the second account with the equipment identifier and the accessory identifier in the operation interface.
13. The method of claim 1 or 2 or 3 or 4 or 5 or 6 or 7 or 9 or 10 or 11 or 12, wherein the accessory comprises a protective sleeve.
14. A binding apparatus for a mobile device to an accessory, comprising:
the initialization interface loading module is suitable for starting the accessory application in the mobile equipment so as to load the locked initialization interface in the accessory application;
the application scanning module is suitable for scanning the two-dimensional code on the accessory in the initialization interface;
the binding request generation module is suitable for generating a binding request according to the two-dimension code; the binding request carries an accessory identifier and an equipment identifier;
a binding request sending module adapted to send the binding request to a target server requesting the target server to bind the mobile device with the accessory;
the message receiving module is suitable for receiving a message which is returned by the target server and confirms the binding when the mobile equipment and the accessory are bound;
the operation interface loading module is suitable for loading an operation interface of the accessory in the accessory application;
the operation interface loading module is further adapted to:
extracting a first digital signature generated based on the equipment identifier and the accessory identifier in the previous binding request in the message for confirming the binding;
extracting equipment identification of current mobile equipment and accessory identification of accessories;
generating a second digital signature based on the currently extracted device identification and accessory identification;
and when the first digital signature is matched with the second digital signature, loading an operation interface of the accessory.
15. The apparatus of claim 14, further comprising:
the device scanning module is suitable for scanning the two-dimensional code on the accessory in the mobile device;
and the accessory application downloading module is suitable for downloading the accessory application according to the two-dimensional code.
16. The apparatus of claim 14, wherein the binding request sending module is further adapted to:
converting the two-dimensional code into a character string;
reading accessory identification from the character string;
reading a device identification of the mobile device;
embedding the accessory identification and the device identification into a binding request.
17. The apparatus of claim 16, wherein the message receiving module is further adapted to:
and receiving a binding confirmation message returned by the target server when the target server confirms that the accessory identification is not bound in advance and binds the accessory identification and the equipment identification.
18. The apparatus of claim 16, wherein the operator interface loading module is further adapted to:
extracting equipment identification of current mobile equipment and accessory identification of accessories;
sending the equipment identification of the current mobile equipment and the accessory identification of the accessory to a target server;
and when receiving a message returned by the target server and bound with the equipment identifier of the current mobile equipment and the accessory identifier of the accessory, loading the operating interface of the accessory.
19. The apparatus of claim 15, wherein the accessory application download module is further adapted to:
converting the two-dimensional code into a character string;
reading a download address from the character string;
and accessing the download address to download the accessory application.
20. The apparatus of claim 19, wherein the accessory application download module is further adapted to:
and accessing the download address to download the accessory application matched with the model of the mobile equipment.
21. The apparatus of claim 14, 15, 16, 17, 18, 19, or 20, further comprising:
and the account configuration module is suitable for requesting the target server to configure a first account in the operation interface so as to bind the mobile equipment and the accessory with the first account.
22. The apparatus of claim 21, wherein the account configuration module is further adapted to:
and requesting the target server to configure a first account in the operation interface so as to bind the equipment identifier and the accessory identifier with the first account.
23. The apparatus of claim 22, wherein the operator interface loading module is further adapted to:
extracting a first account;
sending the first account to a target server;
and when receiving a message which is returned by the target server and confirms that the first account is bound, loading an operation interface of the accessory.
24. The apparatus of claim 21, further comprising:
and the transfer module is suitable for requesting the target server to release the binding of the first account number with the mobile equipment and the accessory in the operation interface and establish the binding of the second account number with the mobile equipment and the accessory.
25. The apparatus of claim 24, wherein the transfer module is further adapted to:
and requesting the target server to remove the binding of the first account with the equipment identifier and the accessory identifier and establish the binding of the second account with the equipment identifier and the accessory identifier in the operation interface.
26. A device as claimed in claim 14, 15, 16, 17, 18, 19, 20, 22, 23, 24 or 25, wherein the accessory comprises a protective sleeve.
CN201510907385.4A 2015-12-09 2015-12-09 Binding method and device for mobile equipment and accessory Active CN106856497B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510907385.4A CN106856497B (en) 2015-12-09 2015-12-09 Binding method and device for mobile equipment and accessory

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510907385.4A CN106856497B (en) 2015-12-09 2015-12-09 Binding method and device for mobile equipment and accessory

Publications (2)

Publication Number Publication Date
CN106856497A CN106856497A (en) 2017-06-16
CN106856497B true CN106856497B (en) 2022-01-25

Family

ID=59132562

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510907385.4A Active CN106856497B (en) 2015-12-09 2015-12-09 Binding method and device for mobile equipment and accessory

Country Status (1)

Country Link
CN (1) CN106856497B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833342A (en) * 2018-04-27 2018-11-16 深圳市网心科技有限公司 device authentication method, authentication server and computer readable storage medium
DE102018111290A1 (en) * 2018-05-11 2019-11-14 ABUS August Bremicker Söhne KG locking system
CN113168257B (en) * 2018-11-22 2024-04-12 华为技术有限公司 Method for locking touch operation and electronic equipment
CN109714769B (en) * 2018-12-28 2020-01-14 北京深思数盾科技股份有限公司 Information binding method, device, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102870064A (en) * 2010-06-15 2013-01-09 苹果公司 Method and system for locating an accessory and an application for use with a user device
CN203734708U (en) * 2013-12-30 2014-07-23 硕擎科技股份有限公司 Mobile phone protective sleeve with control circuit board
CN104661175A (en) * 2015-02-16 2015-05-27 陈王胜 Method and equipment for binding intelligent mobile terminal and intelligent wearable equipment
CN104954512A (en) * 2015-04-02 2015-09-30 苏州联科盛世科技有限公司 Passive mobile-phone protection shell with display and display method thereof

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101951592A (en) * 2010-08-31 2011-01-19 上海闻泰电子科技有限公司 Method for mobile phone to download game based on mobile phone two-dimensional codes
CN102325185A (en) * 2011-09-14 2012-01-18 章云芳 Android system mobile phone software-downloading method based on two-dimensional code recognition
CN103795571B (en) * 2014-01-24 2017-10-17 北京搜狗科技发展有限公司 Binding method and device between equipment
US9930523B2 (en) * 2014-03-11 2018-03-27 Ecole Polytechnique Federale De Lausanne (Epfl) Method and device for proving his identity

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102870064A (en) * 2010-06-15 2013-01-09 苹果公司 Method and system for locating an accessory and an application for use with a user device
CN203734708U (en) * 2013-12-30 2014-07-23 硕擎科技股份有限公司 Mobile phone protective sleeve with control circuit board
CN104661175A (en) * 2015-02-16 2015-05-27 陈王胜 Method and equipment for binding intelligent mobile terminal and intelligent wearable equipment
CN104954512A (en) * 2015-04-02 2015-09-30 苏州联科盛世科技有限公司 Passive mobile-phone protection shell with display and display method thereof

Also Published As

Publication number Publication date
CN106856497A (en) 2017-06-16

Similar Documents

Publication Publication Date Title
JP6936949B2 (en) Methods and devices to facilitate electronic payments using wearable devices
WO2017177383A1 (en) Remote management method and device
CN106856497B (en) Binding method and device for mobile equipment and accessory
US11012244B2 (en) Network node encryption method and apparatus
WO2015081882A1 (en) Method and apparatus for downloading operator document
CN103873692B (en) Method, device and system for resource sharing
CN112883361B (en) Function jump method and device of application program, computer equipment and storage medium
JP2014531659A (en) System and method for user authentication
CN109660353A (en) A kind of application program installation method and device
JP2008251021A (en) Application authentication system
WO2018129753A1 (en) Method and device for downloading subscription information set, and related equipment
TWI270284B (en) Method and system for downloading and authenticating digital copyright
JP4518969B2 (en) Mobile communication device, backup device, backup method, and backup program
CN106161531A (en) A kind of method that data are uploaded and device thereof
EP3041188B1 (en) Method, device and system for controlling presentation of application
CN110263882B (en) Image generation method, information acquisition method, device and electronic equipment
CN105471920A (en) Identifying code processing method and device
US20090150979A1 (en) Network system, network method, and terminal and program therefor
EP3410332B1 (en) A system and method for transferring data to an authentication device
CN108268759A (en) The processing method of copyright data
KR101561771B1 (en) The software license authentication apparatus and the method of using the portable terminal
EP3145117B1 (en) A method and a system for shared digital signing of a document
CN102473211B (en) Method for acquisition of software applications
US10275697B2 (en) Method for automatically triggering data share event between sender device and receiver device
JP2013046122A (en) Terminal, application protection method, and program

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240112

Address after: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.