CN108449758A - A kind of binding method and system of Intelligent hardware - Google Patents

A kind of binding method and system of Intelligent hardware Download PDF

Info

Publication number
CN108449758A
CN108449758A CN201810256995.6A CN201810256995A CN108449758A CN 108449758 A CN108449758 A CN 108449758A CN 201810256995 A CN201810256995 A CN 201810256995A CN 108449758 A CN108449758 A CN 108449758A
Authority
CN
China
Prior art keywords
beacon
binding
intelligent hardware
user account
intelligent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810256995.6A
Other languages
Chinese (zh)
Inventor
史龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Feixun Information Technology Co Ltd
Original Assignee
Sichuan Feixun Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Feixun Information Technology Co Ltd filed Critical Sichuan Feixun Information Technology Co Ltd
Priority to CN201810256995.6A priority Critical patent/CN108449758A/en
Publication of CN108449758A publication Critical patent/CN108449758A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/40Connection management for selective distribution or broadcast

Abstract

The invention discloses a kind of binding method of Intelligent hardware and systems, including:When receiving the first bind request and user account of intelligent terminal transmission, the network information and the user account are encrypted radio reception device step S1 with default device private, obtain encrypted characters string;Radio reception device broadcast transmission described in step S2 encrypts beacon;Wherein, the encryption beacon is the beacon that service set field is replaced with the encrypted characters string;Step S3 when receiving the encryption beacon, according to the encryption beacon bound by the Intelligent hardware to be bound.The most binding procedure of the present invention is voluntarily completed by radio reception device and Intelligent hardware to be bound, and is enormously simplified operating process, is improved binding efficiency and user experience.

Description

A kind of binding method and system of Intelligent hardware
Technical field
The present invention relates to Intelligent hardware field more particularly to the binding methods and system of a kind of Intelligent hardware.
Background technology
Currently, many enterprises are proposed a variety of Intelligent hardwares, such as intelligent sound box, intelligent socket, intelligent Human fat balance, user When in use, it is necessary first to itself and the account of oneself be bound, subsequent management is facilitated.
Existing hardware binding method is most of as follows:By the switch of long-press Intelligent hardware, Intelligent hardware is made to emit nothing Line signal, user are first associated by the mobile phone of oneself with Intelligent hardware, then select equipment class by the mating APP on mobile phone Type sends account and router Wi-Fi passwords to Intelligent hardware;Intelligent hardware is receiving account and router Wi-Fi passwords When, the connection with mobile phone is first disconnected, the wireless network for attempting to connect corresponding router transmitting is removed using router Wi-Fi passwords Network is bundled in when being successfully connected to wireless network under the account received.
Existing binding procedure needs Intelligent hardware first to be connect with mobile phone terminal, and needs by the manual input router of user Wi-Fi passwords, account etc. are sent to Intelligent hardware, the connection that Intelligent hardware breaks with mobile phone again, the company's of going router, then are tied up Fixed, process is very cumbersome, using difficult for ordinary user.And router Wi-Fi passwords are inputting, in transmission process, It is possible that monitored to leak password, there are security risks.
Invention content
The object of the present invention is to provide a kind of binding method of Intelligent hardware and systems, simplify binding procedure, improve safety Property.
Technical solution provided by the invention is as follows:
A kind of binding method of Intelligent hardware, including:Step S1 is when the first bind request for receiving intelligent terminal transmission When with user account, the network information and the user account are encrypted radio reception device with default device private, are obtained Encrypted characters string;Radio reception device broadcast transmission described in step S2 encrypts beacon;Wherein, the encryption beacon is to be added with described Close character string replaces the beacon of service set field;Step S3 is described to wait for binding intelligence when receiving the encryption beacon Hardware is bound according to the encryption beacon.
It in the above-mentioned technical solutions, will as long as radio reception device receives the first bind request and user account It is automatic to send encryption beacon, allow Intelligent hardware to be bound oneself scanning to encrypt beacon, to realize subsequent binding, without artificial It is manually entered password, binding procedure simply, conveniently, improves the experience of user.
Further, it is specially when receiving the encryption beacon in the step S3:Binding intelligence is waited for described in step S31 Hardware is decrypted the beacon received using predetermined hardware private key, described when there are a beacon successful decryption, obtaining When the network information and user account, then it is assumed that receive the encryption beacon;Wherein, the default device private and described default Hardware private keys are associated.
Further, Intelligent hardware to be bound described in the step S3 carries out binding specific packet according to the encryption beacon It includes:Intelligent hardware to be bound described in step S32 is networked according to the network information;Step S33 is described when networking successfully Intelligent hardware to be bound sends the user account and the second bind request to server, and the Intelligent hardware to be bound is bound Under the user account.
In the above-mentioned technical solutions, Intelligent hardware to be bound by with the associated predetermined hardware private key of default device private come Decryption encryption beacon, obtains the network information and user account, it is allowed voluntarily to complete binding, easy to operate;And the network information is passing It is in encrypted state during defeated, substantially increases safety.
Further, further include:After step S4 has sent first bind request and user account, when the intelligent terminal The binding information that the Intelligent hardware to be bound is inquired under the user account, or, not inquiring within a preset period of time When the binding information, the intelligent terminal, which is sent, stops bind request to the radio reception device.
In the above-mentioned technical solutions, intelligent terminal can allow radio reception device to stop sending encryption letter on appropriate opportunity Mark, makes the normal function of radio reception device not to be affected.
Further, further include:Step S5 is described wireless when receiving the stopping bind request that the intelligent terminal is sent Access device, which is gone off the air, sends the encryption beacon.
In the above-mentioned technical solutions, it can complete to wait for intelligence in the case where not influencing the normal function of radio reception device The binding of energy hardware, it is simple to operate.
The present invention also provides a kind of binding systems of Intelligent hardware, including:It intelligent terminal, radio reception device and waits binding Intelligent hardware, the intelligent terminal and radio reception device communication connection;The intelligent terminal includes:Request sends mould Block, for sending the first bind request and user account to the radio reception device;The radio reception device includes:Information Encrypting module, for when receiving the first bind request and user account that the intelligent terminal is sent, by the network information and The user account is encrypted with default device private, obtains encrypted characters string;Beacon broadcast module, for broadcast transmission plus Secret letter mark;Wherein, the encryption beacon is the beacon that service set field is replaced with the encrypted characters string;It is described to wait binding Intelligent hardware includes:Binding module, for when receiving the encryption beacon, being bound according to the encryption beacon.
It in the above-mentioned technical solutions, will as long as radio reception device receives the first bind request and user account It is automatic to send encryption beacon, allow Intelligent hardware to be bound oneself scanning to encrypt beacon, to realize subsequent binding, without artificial It is manually entered password, binding procedure simply, conveniently, improves the experience of user.
Further, the binding module includes:Decrypt submodule, for using predetermined hardware private key to the beacon that receives It is decrypted, when there are a beacon successful decryptions, when obtaining the network information and user account, then it is assumed that receive institute State encryption beacon;Wherein, the default device private and the predetermined hardware private key are associated.
Further, the binding module further includes:Networking submodule, for being networked according to the network information;Hair Submodule is sent, for when networking successfully, sending the user account and the second bind request to server, waiting binding by described Intelligent hardware is bundled under the user account.
Further, the request sending module is further used for after having sent first bind request and user account, When the binding information for inquiring the Intelligent hardware to be bound under the user account, or, not inquiring within a preset period of time When to the binding information, sends and stop bind request to the radio reception device.
Further, the beacon broadcast module is further used for when the stopping binding for receiving the intelligent terminal transmission When request, goes off the air and send the encryption beacon.
Compared with prior art, the binding method of Intelligent hardware of the invention and system advantageous effect are:
The binding procedure of the Intelligent hardware of the present invention, which is save, allows Intelligent hardware to be bound first to connect with intelligent terminal, break again Open, the processes such as user is manually entered user account, the password of wireless network, most binding procedure by radio reception device and Intelligent hardware to be bound voluntarily is completed, and is enormously simplified operating process, is improved binding efficiency and user experience.In addition, It being in encrypted state when binding Intelligent hardware being sent to network parameter, improving the safety of data transmission.
Description of the drawings
Below by a manner of clearly understandable, preferred embodiment is described with reference to the drawings, to a kind of binding of Intelligent hardware Above-mentioned characteristic, technical characteristic, advantage and its realization method of method and system are further described.
Fig. 1 is the flow chart of binding method one embodiment of Intelligent hardware of the present invention;
Fig. 2 is the flow chart of another embodiment of the binding method of Intelligent hardware of the present invention;
Fig. 3 is the flow chart of another embodiment of the binding method of Intelligent hardware of the present invention;
Fig. 4 is the structural schematic diagram of binding system one embodiment of Intelligent hardware of the present invention;
Fig. 5 is the structural schematic diagram of another embodiment of the binding system of Intelligent hardware of the present invention.
Drawing reference numeral explanation:
100. intelligent terminal, 110. request sending modules, 200. radio reception devices, 210. information encrypting modules, 220. Beacon broadcast module, 300. Intelligent hardwares to be bound, 310. binding modules, 311. decryption submodules, 312. networking submodules, 313. sending submodule.
Specific implementation mode
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, control is illustrated below The specific implementation mode of the present invention.It should be evident that drawings in the following description are only some embodiments of the invention, for For those of ordinary skill in the art, without creative efforts, other are can also be obtained according to these attached drawings Attached drawing, and obtain other embodiments.
To make simplified form, part related to the present invention is only schematically shown in each figure, they are not represented Its practical structures as product.In addition, so that simplified form is easy to understand, there is identical structure or function in some figures Component only symbolically depicts one of those, or has only marked one of those.Herein, "one" is not only indicated " only this ", can also indicate the situation of " more than one ".
In one embodiment of the invention, as shown in Figure 1, a kind of binding method of Intelligent hardware, including:
Step S1 is when the first bind request for receiving intelligent terminal transmission and when user account, and radio reception device is by net Network information and the user account are encrypted with default device private, obtain encrypted characters string;
Radio reception device broadcast transmission described in step S2 encrypts beacon;
Wherein, the encryption beacon is the beacon that service set field is replaced with the encrypted characters string;
Step S3 when receiving the encryption beacon, according to the encryption beacon tied up by the Intelligent hardware to be bound It is fixed.
Specifically, be equipped with the mating APP of Intelligent hardware on intelligent terminal, intelligent terminal can be mobile phone, tablet computer, The intelligent electronic devices such as PC;Radio reception device can be connected to the wireless device of internet, such as:Wireless routing Device.
Wait for that Intelligent hardware can be the Intelligent hardware for needing to bind, such as:Intelligent sound box, intelligent Human fat balance, intelligent socket Deng.
When existing when binding Intelligent hardware, user directly beats on the intelligent terminal communicated to connect with radio reception device Mating APP is opened, allows it to send the first bind request and user account to radio reception device, mating APP is generally It may require that user is logged in using its user account, therefore, can directly invoke, when binding no longer needs user to be manually entered every time User account.The instruction that triggering sends these information may be that user clicks " addition equipment " this operation on mating APP.
The network information refers to the service set (Service Set Identifier, SSID) of radio reception device and right The password answered.Encrypted characters string has been obtained after the network information and user account are encrypted with default device private, has used encrypted characters String goes to replace the ssid field in beacon (Beacon), obtains encryption beacon.About beacon, each wireless terminal (such as:Mobile phone) When opening Wi-Fi, only in the Beacon of scanning to radio reception device, it can just show that its SSID, wireless access are set It is standby the Beacon of oneself to be sent with certain frequency, allow wireless terminal scanning to arrive.
It is to send when the radio reception device in the present embodiment is when being not received by the first bind request and user account Normal Beacon, i.e. ssid field are normal SSID can show when the scanning of other wireless terminals is to this normal Beacon The SSID of radio reception device.But works as and receive the first bind request and user account, operation is encrypted, obtains encryption letter After mark, encryption beacon can be sent to send the frequency of normal Beacon, not retransmit normal Beacon.
When binding Intelligent hardware when opening its Wi-Fi function, it is scanned, obtains various beacons, when wirelessly being connect When entering the encryption beacon of equipment transmission, Intelligent hardware bind can be according to the behaviour that be bound of content encrypted in beacon Make.
As long as radio reception device receives the first bind request and user account in the present embodiment, it will send automatically Beacon is encrypted, allows Intelligent hardware to be bound oneself scanning to encrypt beacon, to realize subsequent binding, without being artificially manually entered Password, binding procedure simply, conveniently, improve the experience of user.
In another embodiment of the present invention, it as shown in Fig. 2, the improvement based on above-described embodiment, removes and the above Except identical, it is specially when receiving the encryption beacon in step S3:
Intelligent hardware to be bound described in step S31 is decrypted the beacon received using predetermined hardware private key, when depositing In a beacon successful decryption, when obtaining the network information and user account, then it is assumed that receive the encryption beacon;
Wherein, the default device private and the predetermined hardware private key are associated.
Specifically, voluntarily being scanned after opening Wi-Fi functions after binding Intelligent hardware, the beacon that can be obtained to scanning It is decrypted with the predetermined hardware private key for being stored in local, when it decrypts a certain beacon, has obtained above-mentioned radio reception device When the network information and user account of transmission, this decrypted beacon is exactly the encryption beacon that radio reception device is sent, Mean that Intelligent hardware to be bound has received encryption beacon.
It should be noted that default device private and predetermined hardware private key are associated, predetermined hardware could be used in this way Private key decryption is predetermined the encrypted encrypted characters string of device private.
Preferably, Intelligent hardware to be bound described in step S3 carries out binding according to the encryption beacon and specifically includes:
Intelligent hardware to be bound described in step S32 is networked according to the network information;
For step S33 when networking successfully, the Intelligent hardware to be bound sends the user account and the second bind request To server, the Intelligent hardware to be bound is bundled under the user account.
It, can be according to SSID in the network information and close specifically, when binding Intelligent hardware and decrypting to obtain the network information Code is connected to corresponding wireless network and realizes networking;After networking successfully, Intelligent hardware to be bound can tie up user account and second Fixed request is sent to corresponding server, to allow server to be bundled under user account, completes bindings.
Include binding information in second bind request, such as:Intelligent hardware to be bound physical address (i.e. MAC Address, Media Access Control), device type (such as:Intelligent sound box, intelligent Human fat balance etc.), Device ID etc..Server These binding informations can be bundled under user account, to complete to treat the binding of binding Intelligent hardware.
In the present embodiment, Intelligent hardware to be bound with the associated predetermined hardware private key of default device private to decrypt by adding Secret letter mark, obtains the network information and user account, it is allowed voluntarily to complete binding, easy to operate;And the network information is in transmission process In be in encrypted state, substantially increase safety.
In another embodiment of the present invention, as shown in figure 3, the improvement based on any of the above-described embodiment, except with it is above-mentioned Except identical, further include:
After step S4 has sent first bind request and user account, when the intelligent terminal is in the user account Under inquire the binding information of the Intelligent hardware to be bound, or, when not inquiring the binding information within a preset period of time, The intelligent terminal, which is sent, stops bind request to the radio reception device;
When receiving the stopping bind request that the intelligent terminal is sent, the radio reception device stops wide step S5 It broadcasts and send the encryption beacon.
Specifically, when intelligent terminal to radio reception device after having sent the first bind request and user account, meeting It persistently checks whether binding success, if inquiring binding success, just no longer inquires, and sent to radio reception device and stop tying up Fixed request.
In order not to allow intelligent terminal unlimitedly to inquire, there are one preset time periods for meeting, such as:1 minute, if intelligence Terminal finds binding information not yet in 1 minute, illustrates that Intelligent hardware to be bound there is a problem do not have in binding procedure Necessity is waited again, stops bind request accordingly it is also possible to be sent to radio reception device.
For radio reception device when receiving stopping bind request, just no longer broadcast transmission encrypts beacon, is starting to send just Normal beacon.
Such as:User clicks the option of " addition equipment " on mobile phone, and mobile phone can send user's account to wireless router Number and the first bind request;Wireless router is with 20 beats/min before not receiving user account and the first bind request Frequency broadcast sends normal beacon and is encrypted after having received user account and the first bind request, obtains encrypted word After symbol string, start to send encryption beacon with 20 beats/min of frequency broadcast, be equivalent to encryption beacon be substituted normal beacon into Row broadcast.Intelligent sound box to be bound has had already turned on Wi-Fi functions, is arrived with the predetermined hardware private key decryption scanning of oneself storage Beacon, if decryption failure (that is, not obtaining the network information and user account), abandoned, if successful decryption (that is, obtaining the network information and user account) then first networks according to the network information, then sends the second bind request and user's account It number is bound to its corresponding server.In this process, mobile phone can have sent the first bind request and user account Afterwards, persistently check whether occur the binding information of intelligent sound box to be bound under user account in 2 minutes, if 1 point 10 seconds When detect binding information, just to wireless router send stop bind request, after wireless router receives, stop send Beacon is encrypted, starts to send normal beacon.If mobile phone in 2 minutes again without binding information is detected, also can be to nothing Line router, which is sent, stops bind request, after wireless router receives, can also stop sending encryption beacon, start to send normal Beacon.
The intelligent terminal of the present embodiment can allow radio reception device to stop sending encryption beacon, Neng Gou on appropriate opportunity In the case of the normal function for not influencing radio reception device, the binding for waiting for Intelligent hardware is completed, it is simple to operate.
The binding procedure of the Intelligent hardware of the present invention, which is save, allows Intelligent hardware to be bound first to connect with intelligent terminal, break again Open, the processes such as user is manually entered user account, the password of wireless network, most binding procedure by radio reception device and Intelligent hardware to be bound voluntarily is completed, and is enormously simplified operating process, is improved binding efficiency and user experience.In addition, It being in encrypted state when binding Intelligent hardware being sent to network parameter, improving the safety of data transmission.
In another embodiment of the present invention, as shown in figure 4, a kind of binding system of Intelligent hardware, including:
Intelligent terminal 100, radio reception device 200 and Intelligent hardware to be bound 300, the intelligent terminal and described wireless Access device communicates to connect;
The intelligent terminal 100 includes:
Request sending module 110, for sending the first bind request and user account to the radio reception device;
The radio reception device 200 includes:
Information encrypting module 210, for when the first bind request and user account for receiving the intelligent terminal transmission When, the network information and the user account are encrypted with default device private, obtain encrypted characters string;
Beacon broadcast module 220 is electrically connected with information encrypting module 210, and beacon is encrypted for broadcast transmission;
Wherein, the encryption beacon is the beacon that service set field is replaced with the encrypted characters string;
The Intelligent hardware to be bound 300 includes:
Binding module 310, for when receiving the encryption beacon, being bound according to the encryption beacon.
Specifically, be equipped with the mating APP of Intelligent hardware on intelligent terminal, intelligent terminal can be mobile phone, tablet computer, The intelligent electronic devices such as PC;Radio reception device can be connected to the wireless device of internet, such as:Wireless routing Device.
Wait for that Intelligent hardware can be the Intelligent hardware for needing to bind, such as:Intelligent sound box, intelligent Human fat balance, intelligent socket Deng.
When existing when binding Intelligent hardware, user directly beats on the intelligent terminal communicated to connect with radio reception device Mating APP is opened, allows it to send the first bind request and user account to radio reception device, mating APP is generally It may require that user is logged in using its user account, therefore, can directly invoke, when binding no longer needs user to be manually entered every time User account.The instruction that triggering sends these information may be that user clicks " addition equipment " this operation on mating APP.
The network information refers to the service set (Service Set Identifier, SSID) of radio reception device and right The password answered.Encrypted characters string has been obtained after the network information and user account are encrypted with default device private, has used encrypted characters String goes to replace the ssid field in beacon (Beacon), obtains encryption beacon.
It is to send when the radio reception device in the present embodiment is when being not received by the first bind request and user account Normal Beacon, i.e. ssid field are normal SSID can show when the scanning of other wireless terminals is to this normal Beacon The SSID of radio reception device.But works as and receive the first bind request and user account, operation is encrypted, obtains encryption letter After mark, encryption beacon can be sent to send the frequency of normal Beacon, not retransmit normal Beacon.
When binding Intelligent hardware when opening its Wi-Fi function, it is scanned, obtains various beacons, when wirelessly being connect When entering the encryption beacon of equipment transmission, Intelligent hardware bind can be according to the behaviour that be bound of content encrypted in beacon Make.
As long as radio reception device receives the first bind request and user account in the present embodiment, it will send automatically Beacon is encrypted, allows Intelligent hardware to be bound oneself scanning to encrypt beacon, to realize subsequent binding, without being artificially manually entered Password, binding procedure simply, conveniently, improve the experience of user.
In another embodiment of the present invention, it as shown in figure 5, the improvement based on above-described embodiment, removes and the above Except identical, binding module 300 includes:
Submodule 311 is decrypted, for the beacon received to be decrypted using predetermined hardware private key, when there are described in one Beacon successful decryption, when obtaining the network information and user account, then it is assumed that receive the encryption beacon;
Wherein, the default device private and the predetermined hardware private key are associated.
Specifically, voluntarily being scanned after opening Wi-Fi functions after binding Intelligent hardware, the beacon that can be obtained to scanning It is decrypted with the predetermined hardware private key for being stored in local, when it decrypts a certain beacon, has obtained above-mentioned radio reception device When the network information and user account of transmission, this decrypted beacon is exactly the encryption beacon that radio reception device is sent, Mean that Intelligent hardware to be bound has received encryption beacon.
It should be noted that default device private and predetermined hardware private key are associated, predetermined hardware could be used in this way Private key decryption is predetermined the encrypted encrypted characters string of device private.
Preferably, binding module 310 further includes:
Networking submodule 312, for being networked according to the network information;
Sending submodule 313, for when networking successfully, sending the user account and the second bind request to service The Intelligent hardware to be bound is bundled under the user account by device.
It, can be according to SSID in the network information and close specifically, when binding Intelligent hardware and decrypting to obtain the network information Code is connected to corresponding wireless network and realizes networking;After networking successfully, Intelligent hardware to be bound can tie up user account and second Fixed request is sent to corresponding server, to allow server to be bundled under user account, completes bindings.
Include binding information in second bind request, such as:Intelligent hardware to be bound physical address (i.e. MAC Address, Media Access Control), device type (such as:Intelligent sound box, intelligent Human fat balance etc.), Device ID etc..Server These binding informations can be bundled under user account, to complete to treat the binding of binding Intelligent hardware.
In the present embodiment, Intelligent hardware to be bound with the associated predetermined hardware private key of default device private to decrypt by adding Secret letter mark, obtains the network information and user account, it is allowed voluntarily to complete binding, easy to operate;And the network information is in transmission process In be in encrypted state, substantially increase safety.
In another embodiment of the present invention, the improvement based on any of the above-described embodiment, in addition to same as described above, Request sending module 110 is further used for after having sent first bind request and user account, when in the user account Under inquire the binding information of the Intelligent hardware to be bound, or, when not inquiring the binding information within a preset period of time, It sends and stops bind request to the radio reception device;
Beacon broadcast module 220 is further used for, when receiving the stopping bind request that the intelligent terminal is sent, stopping Only beacon is encrypted described in broadcast transmission.
Specifically, when intelligent terminal to radio reception device after having sent the first bind request and user account, meeting It persistently checks whether binding success, if inquiring binding success, just no longer inquires, and sent to radio reception device and stop tying up Fixed request.
In order not to allow intelligent terminal unlimitedly to inquire, there are one preset time periods for meeting, such as:1 minute, if intelligence Terminal finds binding information not yet in 1 minute, illustrates that Intelligent hardware to be bound there is a problem do not have in binding procedure Necessity is waited again, stops bind request accordingly it is also possible to be sent to radio reception device.
For radio reception device when receiving stopping bind request, just no longer broadcast transmission encrypts beacon, is starting to send just Normal beacon.The specific implementation process of this embodiment is identical as the specific implementation process in above method embodiment, herein no longer Detailed description.
The intelligent terminal of the present embodiment can allow radio reception device to stop sending encryption beacon, Neng Gou on appropriate opportunity In the case of the normal function for not influencing radio reception device, the binding for waiting for Intelligent hardware is completed, it is simple to operate.
It should be noted that above-described embodiment can be freely combined as needed.The above is only the preferred of the present invention Embodiment, it is noted that for those skilled in the art, in the premise for not departing from the principle of the invention Under, several improvements and modifications can also be made, these improvements and modifications also should be regarded as protection scope of the present invention.

Claims (10)

1. a kind of binding method of Intelligent hardware, which is characterized in that including:
For step S1 when receiving the first bind request and user account of intelligent terminal transmission, radio reception device believes network Breath and the user account are encrypted with default device private, obtain encrypted characters string;
Radio reception device broadcast transmission described in step S2 encrypts beacon;
Wherein, the encryption beacon is the beacon that service set field is replaced with the encrypted characters string;
Step S3 when receiving the encryption beacon, according to the encryption beacon bound by the Intelligent hardware to be bound.
2. the binding method of Intelligent hardware as described in claim 1, which is characterized in that described when receiving in the step S3 It is specially when encrypting beacon:
Intelligent hardware to be bound described in step S31 is decrypted the beacon received using predetermined hardware private key, when there are one The beacon successful decryption, when obtaining the network information and user account, then it is assumed that receive the encryption beacon;
Wherein, the default device private and the predetermined hardware private key are associated.
3. the binding method of Intelligent hardware as claimed in claim 2, which is characterized in that intelligence to be bound described in the step S3 Energy hardware carries out binding according to the encryption beacon and specifically includes:
Intelligent hardware to be bound described in step S32 is networked according to the network information;
For step S33 when networking successfully, the Intelligent hardware to be bound sends the user account and the second bind request to clothes Business device, the Intelligent hardware to be bound is bundled under the user account.
4. the binding method of Intelligent hardware as described in claim 1, which is characterized in that further include:
After step S4 has sent first bind request and user account, when the intelligent terminal is looked under the user account The binding information of the Intelligent hardware to be bound is ask, or, when not inquiring the binding information within a preset period of time, it is described Intelligent terminal, which is sent, stops bind request to the radio reception device.
5. the binding method of Intelligent hardware as claimed in claim 4, which is characterized in that further include:
Step S5 when receiving the stopping bind request that the intelligent terminal is sent, go off the air hair by the radio reception device Send the encryption beacon.
6. a kind of binding system of Intelligent hardware, which is characterized in that including:
Intelligent terminal, radio reception device and Intelligent hardware to be bound, the intelligent terminal and radio reception device communication Connection;
The intelligent terminal includes:
Request sending module, for sending the first bind request and user account to the radio reception device;
The radio reception device includes:
Information encrypting module, for when receiving the first bind request and user account that the intelligent terminal is sent, by net Network information and the user account are encrypted with default device private, obtain encrypted characters string;
Beacon broadcast module encrypts beacon for broadcast transmission;
Wherein, the encryption beacon is the beacon that service set field is replaced with the encrypted characters string;
The Intelligent hardware to be bound includes:
Binding module, for when receiving the encryption beacon, being bound according to the encryption beacon.
7. the binding system of Intelligent hardware as claimed in claim 6, which is characterized in that the binding module includes:
Submodule is decrypted, for the beacon received to be decrypted using predetermined hardware private key, when there are a beacon solutions Close success, when obtaining the network information and user account, then it is assumed that receive the encryption beacon;
Wherein, the default device private and the predetermined hardware private key are associated.
8. the binding system of Intelligent hardware as claimed in claim 7, which is characterized in that the binding module further includes:
Networking submodule, for being networked according to the network information;
Sending submodule sends the user account and the second bind request to server for when network successfully, will described in Intelligent hardware to be bound is bundled under the user account.
9. the binding system of Intelligent hardware as claimed in claim 6, it is characterised in that:
The request sending module is further used for after having sent first bind request and user account, when in the use The binding information that the Intelligent hardware to be bound is inquired under the account of family, or, not inquiring the binding within a preset period of time When information, sends and stop bind request to the radio reception device.
10. the binding system of Intelligent hardware as claimed in claim 9, it is characterised in that:
The beacon broadcast module is further used for, when receiving the stopping bind request that the intelligent terminal is sent, stopping Beacon is encrypted described in broadcast transmission.
CN201810256995.6A 2018-03-27 2018-03-27 A kind of binding method and system of Intelligent hardware Pending CN108449758A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810256995.6A CN108449758A (en) 2018-03-27 2018-03-27 A kind of binding method and system of Intelligent hardware

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810256995.6A CN108449758A (en) 2018-03-27 2018-03-27 A kind of binding method and system of Intelligent hardware

Publications (1)

Publication Number Publication Date
CN108449758A true CN108449758A (en) 2018-08-24

Family

ID=63196742

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810256995.6A Pending CN108449758A (en) 2018-03-27 2018-03-27 A kind of binding method and system of Intelligent hardware

Country Status (1)

Country Link
CN (1) CN108449758A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110011987A (en) * 2019-03-21 2019-07-12 深圳云知声信息技术有限公司 A kind of system and method that handset program is bound with Intelligent hardware
CN111353141A (en) * 2018-12-20 2020-06-30 美的集团股份有限公司 Intelligent device authority control method, server, user side device and electronic device
CN112036666A (en) * 2020-09-29 2020-12-04 中移(杭州)信息技术有限公司 Binding process evaluation method, device, server and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150256563A1 (en) * 2013-10-07 2015-09-10 Google Inc. Hazard detection unit facilitating user-friendly setup experience
CN105072012A (en) * 2015-08-14 2015-11-18 四川长虹电器股份有限公司 Quick network access method of intelligent device
CN105120456A (en) * 2015-09-08 2015-12-02 南京创维信息技术研究院有限公司 Method and system for intelligent device to access to wireless network quickly
CN105391608A (en) * 2015-12-04 2016-03-09 美的集团股份有限公司 Household electrical appliance, network configuration method thereof and household intelligent network box
CN105873186A (en) * 2016-04-26 2016-08-17 杭州赫智电子科技有限公司 Smart home equipment adding method and equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150256563A1 (en) * 2013-10-07 2015-09-10 Google Inc. Hazard detection unit facilitating user-friendly setup experience
CN105072012A (en) * 2015-08-14 2015-11-18 四川长虹电器股份有限公司 Quick network access method of intelligent device
CN105120456A (en) * 2015-09-08 2015-12-02 南京创维信息技术研究院有限公司 Method and system for intelligent device to access to wireless network quickly
CN105391608A (en) * 2015-12-04 2016-03-09 美的集团股份有限公司 Household electrical appliance, network configuration method thereof and household intelligent network box
CN105873186A (en) * 2016-04-26 2016-08-17 杭州赫智电子科技有限公司 Smart home equipment adding method and equipment

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111353141A (en) * 2018-12-20 2020-06-30 美的集团股份有限公司 Intelligent device authority control method, server, user side device and electronic device
CN111353141B (en) * 2018-12-20 2022-05-24 美的集团股份有限公司 Intelligent device authority control method, server, user side device and electronic device
CN110011987A (en) * 2019-03-21 2019-07-12 深圳云知声信息技术有限公司 A kind of system and method that handset program is bound with Intelligent hardware
CN112036666A (en) * 2020-09-29 2020-12-04 中移(杭州)信息技术有限公司 Binding process evaluation method, device, server and storage medium
CN112036666B (en) * 2020-09-29 2024-03-22 中移(杭州)信息技术有限公司 Binding flow evaluation method, device, server and storage medium

Similar Documents

Publication Publication Date Title
CN109640324B (en) A kind of communication means and relevant apparatus
CN104010309B (en) The method and terminal of connection are established between access point and terminal
CN106059869B (en) A kind of internet of things intelligent household equipment safety control method and system
CN102594895B (en) Network node, mobility information server, WTRU and method
CN1929398B (en) Security setting method in wireless communication network, storage medium, network system and client device
JP3585422B2 (en) Access point device and authentication processing method thereof
CN108391238A (en) Wireless MESH network matches network method
CN107371163A (en) A kind of method and apparatus for controlling access wireless network
CN105493453B (en) It is a kind of to realize the method, apparatus and system remotely accessed
CN103581901B (en) A kind of Wi Fi wireless networks access the processing method of configuration information and equipment
CN106921963A (en) A kind of smart machine accesses the method and device of WLAN
CN107770182A (en) The date storage method and home gateway of home gateway
CN109413627A (en) A kind of smart home device matches network method and distribution network systems
CN105472699B (en) The cut-in method and system of smart home device
CN112449315B (en) Network slice management method and related device
CN106455001A (en) Method and device for configuring WIFI module
CN108632056A (en) A kind of smart machine network collocating method and system
RU2008109827A (en) MOBILE STATION, RADIO ACCESS NETWORK DEVICE, MOBILE SWITCHING STATION, MOBILE COMMUNICATION SYSTEM AND METHOD OF GIVING ACCESS TO COMMUNICATION SERVICES
CN106656547A (en) Method and apparatus for updating network configuration of household electrical appliances
JP2004297814A (en) Management of authentication and encryption of user information in digital user terminal
US20160330775A1 (en) Methods and Devices for Sending or Receiving Wireless Parameter
CN109617867B (en) Intelligent gateway system for controlling household equipment
CN108449758A (en) A kind of binding method and system of Intelligent hardware
CN108684040A (en) A kind of connection method of wireless network and system
CN108834138A (en) A kind of distribution method and system based on voice print database

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180824