CN109379354A - A kind of methods, devices and systems for binding smart machine - Google Patents

A kind of methods, devices and systems for binding smart machine Download PDF

Info

Publication number
CN109379354A
CN109379354A CN201811177403.8A CN201811177403A CN109379354A CN 109379354 A CN109379354 A CN 109379354A CN 201811177403 A CN201811177403 A CN 201811177403A CN 109379354 A CN109379354 A CN 109379354A
Authority
CN
China
Prior art keywords
smart machine
facility information
legitimacy verifies
network
verifies
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811177403.8A
Other languages
Chinese (zh)
Inventor
余涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiaoya Intelligent Platform (shenzhen) Co Ltd
Original Assignee
Xiaoya Intelligent Platform (shenzhen) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaoya Intelligent Platform (shenzhen) Co Ltd filed Critical Xiaoya Intelligent Platform (shenzhen) Co Ltd
Priority to CN201811177403.8A priority Critical patent/CN109379354A/en
Publication of CN109379354A publication Critical patent/CN109379354A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention provides a kind of methods, devices and systems for binding smart machine, and described method includes following steps: obtaining the facility information of smart machine, facility information includes MAC Address, api interface verifying serial number and applies key;Legitimacy verifies are carried out to facility information;If facility information binds smart machine and passes through certification by the legitimacy verifies;It will indicate that smart machine is successfully bound and certified information is sent to smart machine;If facility information does not pass through the legitimacy verifies, facility information is pulled in into blacklist to refuse to continue to the service request of smart machine.The present invention realizes the purpose for authenticating for legitimate device and carrying out exclusive processing to illegality equipment.

Description

A kind of methods, devices and systems for binding smart machine
Technical field
The present invention relates to technical field of the computer network more particularly to a kind of method, apparatus for binding smart machine and it is System.
Background technique
With the improvement of people's living standards, smart machine is more more and more universal, and smart machine needs and special intelligence Energy platform carries out binding authentication use, and then is just able to achieve stronger big function using the content resource on intelligent platform.How Certification more effectively is carried out for legitimate device and exclusive processing is carried out to illegality equipment, becomes a problem.
Summary of the invention
The present invention is directed to the shortcomings that existing way, a kind of methods, devices and systems for binding smart machine is proposed, to solve The above problem certainly of the existing technology.
According to the first aspect of the invention, a kind of method for binding smart machine is provided, is included the following steps:
The facility information of smart machine is obtained, the facility information includes MAC Address, api interface verifying serial number and application Key;
It is whether legal with the determination smart machine that legitimacy verifies are carried out to the facility information;
If the facility information determines that the smart machine is legal, then to the smart machine by the legitimacy verifies It is bound and passes through certification;
It will indicate that the smart machine is successfully bound and certified information is sent to smart machine;
If the facility information determines the illegal method of the smart machine, sets described not over the legitimacy verifies Standby information pulls blacklist to refuse to continue to the service request of the smart machine.
Further, before the facility information for obtaining smart machine, further includes:
By being connected to the network the smart machine, the network includes Wi-Fi and/or cable network.
Further, legitimacy verifies are carried out to the facility information, referred to:
Using the facility information as index information, one corresponding to the facility information prestored in database is called Or multinomial verifying logic carries out legitimacy verifies to the facility information, the verifying logic includes with respectively corresponding the MAC Location, api interface verifying serial number and place value logic, length logical, key value logic using key.
Further, legitimacy verifies are carried out to the facility information, referred to:
Time legitimacy verifies are carried out to the facility information.
Further, after to facility information progress legitimacy verifies, further includes:
The destination file that legitimacy verifies are carried out to the facility information is obtained, the name nominating by the destination file is Time when verification, then in the database by destination file storage.
Further, further includes:
If indicated in the destination file illegal part be more than preset certain proportion if alarm.
On the other hand, the present invention provides a kind of devices for binding smart machine, comprising:
Module is obtained, for obtaining the facility information of smart machine, the facility information includes that MAC Address, api interface are tested It demonstrate,proves serial number and applies key;
Correction verification module, it is whether legal with the determination smart machine for carrying out legitimacy verifies to the facility information;
Processing module is if determining that the smart machine is legal by the legitimacy verifies for the facility information, then right The smart machine is bound and passes through certification;
If the facility information determines the illegal method of the smart machine, sets described not over the legitimacy verifies Standby information pulls blacklist to refuse to continue to the service request of the smart machine;
Sending module, for that will indicate that successfully binding and certified information have been sent to intelligent set to the smart machine It is standby.
It further, further include link block;
The link block is used for by being connected to the network the smart machine, and the network includes Wi-Fi and/or has Gauze network.
Further, the correction verification module carries out legitimacy verifies to the facility information, refers to:
Using the facility information as index information, one corresponding to the facility information prestored in database is called Or multinomial verifying logic carries out legitimacy verifies to the facility information, the verifying logic includes with respectively corresponding the MAC Location, api interface verifying serial number and place value logic, length logical, key value logic using key.
The third aspect, the present invention provides a kind of system, including smart machine, network service module, database and as above The device of the binding smart machine:
The smart machine connects and binds the device of binding smart machine as described above to transmit data;
The network service module includes gateway verification unit, Wi-Fi unit and cable network unit, for providing Exit passageway mutually passes for the data between smart machine and the device of binding smart machine as described above;
The database, for the device storing data for binding smart machine as described above.
Compared with prior art, the beneficial effects of the present invention are:
The present invention is by obtaining the facility information of smart machine and carrying out legitimacy verifies, if facility information is legal by this Property verification, it is determined that smart machine is legal, then is bound to smart machine and pass through certification;If facility information is not over this Legitimacy verifies, it is determined that smart machine is illegal, and smart machine is pulled in blacklist to refuse to continue to the smart machine Service request, realize and carry out authenticating and carrying out illegal smart machine the purpose of exclusive processing for legal smart machine.
The additional aspect of the present invention and advantage will be set forth in part in the description, these will become from the following description Obviously, or practice through the invention is recognized.
Detailed description of the invention
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments Obviously and it is readily appreciated that, in which:
Fig. 1 is the flow chart for the method that one of embodiment of the present invention one binds smart machine;
Fig. 2 is the structural block diagram for the device that one of embodiment of the present invention two binds smart machine;
Fig. 3 is the structural schematic diagram of one of the embodiment of the present invention three system;
Fig. 4 is the part-structure block diagram of mobile phone in the embodiment of the present invention three when energy equipment is mobile phone.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described.
In some processes of the description in description and claims of this specification and above-mentioned attached drawing, contain according to Multiple operations that particular order occurs, but it should be clearly understood that these operations can not be what appears in this article suitable according to its Sequence is executed or is executed parallel, and serial number of operation such as 101,102 etc. is only used for distinguishing each different operation, serial number It itself does not represent and any executes sequence.In addition, these processes may include more or fewer operations, and these operations can To execute or execute parallel in order.It should be noted that the description such as " first " herein, " second ", is for distinguishing not Same message, equipment, module etc., does not represent sequencing, does not also limit " first " and " second " and be different type.
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiment is only a part of example of the present invention, is implemented instead of all the embodiments.It is based on Embodiment in the present invention, those skilled in the art's every other implementation obtained without creative efforts Example, shall fall within the protection scope of the present invention.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should also Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art The consistent meaning of meaning, and unless idealization or meaning too formal otherwise will not be used by specific definitions as here To explain.
Embodiment one
As shown in Figure 1, providing a kind of method of binding smart machine of one embodiment of the invention, including walk as follows It is rapid:
S101 obtains the facility information of smart machine, and facility information includes MAC Address, api interface verifying serial number and application Key;
The address MAC (Media Access Control or Medium Access Control), free translation is media interviews Control, or be physical address, hardware address, for defining the position of the network equipment.In osi model, third layer network layer It is responsible for IP address, second layer data link layer is then responsible for MAC Address.Therefore a host has a MAC Address, and each net Network position has the IP address for being specific to it.
Api interface verifies serial number abbreviation App key, is for verifying API access legitimacy;Which website accessed Api interface, it is necessary to which this website allows to access.
Using key, refer to interface secret key used in third party developer.
Before the facility information for obtaining smart machine, further includes:
By being connected to the network smart machine, network includes Wi-Fi and/or cable network.
Wireless network (Wireless Network) is the network realized using wireless communication technique.Wireless network both included Allow user to establish global voice and data network that remote-wireless connects, also includes being optimized near radio connection Infrared technology and radio-frequency technique, very similar with the purposes of cable network, maximum difference is the difference of transmission medium, Replace cable using radio technology, can be mutually backups with cable network.
Cable network, the computer network connected using coaxial cable, twisted pair and optical fiber.Coaxial electric cable network is common A kind of network connecting mode.It is both economical, and installation is more convenient, and transmission rate and anti-interference ability are general, and transmission range is shorter.It is double Twisted wire net is the current most common network connecting mode.
In contrast, cable network is cheap, easy for installation, but vulnerable to interference, transmission rate is lower, transmission range ratio Coaxial cable wants short.Optical fiber is writing a Chinese character in simplified form for optical fiber, is a kind of being all-trans in the fiber made of glass or plastics using light The light conduction tool penetrating principle and reaching.Fine optical fiber is encapsulated in plastic sheath, allows it to be bent and be unlikely to disconnected It splits.In general, the emitter of one end of optical fiber uses light emitting diode (Light Emitting Diode, LED) or a branch of sharp Light pulse is sent to optical fiber by light, and the reception device of the other end of optical fiber detects pulse using light-sensitive element.In daily life, Since light is more much lower than the loss that electricity is conducted in electric wire in the conduction loss of optical fiber, the information that optical fiber is used as long range is passed It passs.
Wireless network: mainly making transmission medium using air, transmits number as carrier by electromagnetic wave and infrared ray etc. According to although networking mode is convenient, flexible, since Wireless Networking is costly, so also less universal.
Whether S102 carries out legitimacy verifies facility information legal with the determination smart machine;
In terms of carrying out legitimacy verifies, including following three to facility information:
1, using facility information as index information, call what is prestored in database to correspond to the one or more of facility information Verifying logic carries out legitimacy verifies to facility information, and verifying logic includes respectively corresponding MAC Address, api interface verifying serial number With place value logic, length logical, the key value logic of application key, only pass through one or more in preset logic checking , facility information just passes through this legitimacy verifies.
2, time legitimacy verifies are carried out to facility information;
Whether the time legitimacy verifies can be directed to limited (authorization) time limit of the issuing time of device version or be most New version can determine whether to be legal as judgement, in either latest edition of limited (authorization) time limit.
3, the destination file for carrying out legitimacy verifies to facility information is obtained, is school by the name nominating of the destination file Time when testing, then in the database by destination file storage;
Such as: the legitimacy verifies of an entry index information can be used as a destination file, the legitimacy of multinomial index information Verification can be used as multiple destination file;Alternatively, carrying out legitimacy verifies to facility information every time can be used as a destination file, it is more It is secondary that multiple destination file can be used as to facility information progress legitimacy verifies;
Destination file can be .txt file.
If indicated in destination file illegal part be more than preset certain proportion if alarm;
Setting herein is primarily to facilitating staff to detect and safeguarding software and hardware and periodic cleaning storage.
If S103 facility information determines that the smart machine is legal by the legitimacy verifies, then smart machine is carried out It binds and passes through certification;
The certification provided primarily directed to the device security of connection and authorization service (Authentication and Authorization Service), it can control the access to sensitive or keystone resources, such as file system, network service, System property access etc., reinforces the safety of connection.The connection accessed every time is mainly exempted in binding and the time waits, and binds it It further include authorization afterwards in addition to certification, the purpose of certification is that whom determination reliable and securely is currently and using resource, and resource can be with It is an application, applet, bean, servlet;The purpose of authorization is to be determined what permission currently used user has, Whether resource can access.
If facility information not over the legitimacy verifies, determines that the smart machine is illegal, facility information is pulled in Blacklist with refuse to continue to the service request of smart machine with;
S104 will indicate that smart machine is successfully bound and certified information is sent to smart machine;
Such as: indicate that successfully binding and certified information are that " your equipment has been bound and obtained to smart machine Certification ".
Embodiment two
As described in Figure 2, a kind of device for binding smart machine is provided, comprising:
Link block A201, for by network connection smart machine, network to include Wi-Fi and/or cable network.
Modules A 202 is obtained, it is whether legal with the determination smart machine for obtaining the facility information of smart machine, if Standby information includes MAC Address, api interface verifying serial number and applies key;
Correction verification module A203, for carrying out legitimacy verifies to facility information;
In terms of correction verification module A203 carries out legitimacy verifies, including following three to facility information:
1, using facility information as index information, call what is prestored in database to correspond to the one or more of facility information Verifying logic carries out legitimacy verifies to facility information, and verifying logic includes respectively corresponding MAC Address, api interface verifying serial number With place value logic, length logical, the key value logic of application key.
2, time legitimacy verifies are carried out to facility information.
3, the destination file for carrying out legitimacy verifies to facility information is obtained, is school by the name nominating of the destination file Time when testing, then in the database by destination file storage.
If indicated in destination file illegal part be more than preset certain proportion if alarm.
Processing module A204 is if determining that the smart machine is legal by the legitimacy verifies for facility information, then right Smart machine is bound and passes through certification;
If facility information not over the legitimacy verifies, determines that the smart machine is illegal, facility information is pulled in Blacklist is to refuse to continue to the service request of smart machine;
Sending module A205, for that will indicate that successfully binding and certified information have been sent to intelligent set to smart machine It is standby.
It is apparent to those skilled in the art that for convenience and simplicity of description, the module of foregoing description, The specific work process of related work unit and device, can refer to corresponding processes in the foregoing method embodiment, herein no longer It repeats.
Embodiment three
As shown in figure 3, providing a kind of system, including smart machine A301, network service module A302, database A303 And the device A304 of binding smart machine as above:
Smart machine A301 is connected and is bound the device A304 of binding smart machine as above to transmit data;
The device can be include computer equipment, mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of Sales, point-of-sale terminal), any terminal device such as vehicle-mounted computer, Taking the terminal as an example:
As shown in figure 4, the block diagram of the part-structure of mobile phone, mobile phone includes: radio frequency (Radio Frequency, RF) circuit 1510, memory 1520, input unit 1530, display unit 1540, sensor 1550, voicefrequency circuit 1560, Wireless Fidelity The components such as (wireless fidelity, WiFi) module 1570, processor 1580 and power supply 1590.Those skilled in the art It is appreciated that handset structure shown in Fig. 4 does not constitute the restriction to mobile phone, it may include than illustrating more or fewer portions Part perhaps combines certain components or different component layouts.
Network service module A302 includes gateway verification unit, Wi-Fi unit and cable network unit, for providing Exit passageway mutually passes for the data between smart machine A301 and the device A304 of binding smart machine as above;
Database A303, for the device storing data for binding smart machine as above.
In embodiment provided herein, it should be understood that disclosed method, system, device, module and/or Unit may be implemented in other ways.For example, embodiment of the method described above is only schematical, for example, institute The division of module is stated, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple moulds Block or component can be combined or can be integrated into another system, or some features can be ignored or not executed.The conduct The unit of separate part description may or may not be physically separated, component shown as a unit can be or Person may not be physical unit, it can and it is in one place, or may be distributed over multiple network units.It can root According to actual needs, some or all of the units may be selected to achieve the purpose of the solution of this embodiment.
The above is only some embodiments of the invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (10)

1. a kind of method for binding smart machine, which comprises the steps of:
The facility information of smart machine is obtained, the facility information includes MAC Address, api interface verifying serial number and applies key;
It is whether legal with the determination smart machine that legitimacy verifies are carried out to the facility information;
If the facility information determines that the smart machine is legal by the legitimacy verifies, then the smart machine is carried out It binds and passes through certification;
If the facility information not over the legitimacy verifies, determines that the smart machine is illegal, by the facility information Blacklist is pulled in refuse to continue to the service request of the smart machine;
It will indicate that the smart machine is successfully bound and certified information is sent to smart machine.
2. the method according to claim 1, wherein also being wrapped before the facility information for obtaining smart machine It includes:
By being connected to the network the smart machine, the network includes Wi-Fi and/or cable network.
3. referring to the method according to claim 1, wherein carrying out legitimacy verifies to the facility information:
Using the facility information as index information, one or more corresponding to the facility information prestored in database is called Verifying logic carries out legitimacy verifies to the facility information, the verifying logic include respectively correspond the MAC Address, Api interface verifies place value logic, length logical, the key value logic of serial number and application key.
4. referring to the method according to claim 1, wherein carrying out legitimacy verifies to the facility information:
Time legitimacy verifies are carried out to the facility information.
5. the method according to claim 1, wherein being gone back after carrying out legitimacy verifies to the facility information Include:
The destination file for carrying out legitimacy verifies to the facility information is obtained, is verification by the name nominating of the destination file When time, then by the destination file storage in the database.
6. according to the method described in claim 5, it is characterized by further comprising:
If indicated in the destination file illegal part be more than preset certain proportion if alarm.
7. a kind of device for binding smart machine characterized by comprising
Module is obtained, for obtaining the facility information of smart machine, the facility information includes MAC Address, api interface verifying sequence Number and apply key;
Correction verification module, it is whether legal with the determination smart machine for carrying out legitimacy verifies to the facility information;
Processing module, if determining that the smart machine is legal, then to described by the legitimacy verifies for the facility information Smart machine is bound and passes through certification;
If the facility information determines the illegal method of the smart machine, the equipment is believed not over the legitimacy verifies Breath pulls blacklist to refuse to continue to the service request of the smart machine;
Sending module, for that will indicate that the smart machine is successfully bound and certified information is sent to smart machine.
8. device according to claim 7, which is characterized in that further include link block;
The link block is used for by being connected to the network the smart machine, and the network includes Wi-Fi and/or wired network Network.
9. device according to claim 7, which is characterized in that the correction verification module carries out legitimacy to the facility information Verification, refers to:
Using the facility information as index information, one or more corresponding to the facility information prestored in database is called Verifying logic carries out legitimacy verifies to the facility information, the verifying logic include respectively correspond the MAC Address, Api interface verifies place value logic, length logical, the key value logic of serial number and application key.
10. a kind of system, including smart machine, network service module, database and as described in claim 7-9 any one Bind the device of smart machine:
The smart machine connects and binds the device of the binding smart machine as described in claim 7-9 any one to pass Transmission of data;
The network service module includes gateway verification unit, Wi-Fi unit and cable network unit, for providing safety Data between the device of binding smart machine of the channel for smart machine and as described in claim 7-9 any one are mutual It passes;
The database, for the device storing data for the binding smart machine as described in claim 7-9 any one.
CN201811177403.8A 2018-10-10 2018-10-10 A kind of methods, devices and systems for binding smart machine Pending CN109379354A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811177403.8A CN109379354A (en) 2018-10-10 2018-10-10 A kind of methods, devices and systems for binding smart machine

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811177403.8A CN109379354A (en) 2018-10-10 2018-10-10 A kind of methods, devices and systems for binding smart machine

Publications (1)

Publication Number Publication Date
CN109379354A true CN109379354A (en) 2019-02-22

Family

ID=65403993

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811177403.8A Pending CN109379354A (en) 2018-10-10 2018-10-10 A kind of methods, devices and systems for binding smart machine

Country Status (1)

Country Link
CN (1) CN109379354A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111865731A (en) * 2020-06-09 2020-10-30 深圳市欧瑞博科技股份有限公司 Intelligent equipment adding method and device, intelligent household control panel and storage medium
WO2024002301A1 (en) * 2022-06-30 2024-01-04 先临三维科技股份有限公司 Device binding method and apparatus, and computer readable storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1842000A (en) * 2005-03-29 2006-10-04 华为技术有限公司 Method for realizing access authentication of WLAN
CN104518874A (en) * 2013-09-26 2015-04-15 中兴通讯股份有限公司 Network access control method and system
CN105450655A (en) * 2015-12-14 2016-03-30 小米科技有限责任公司 Device binding methods and apparatuses
US9807092B1 (en) * 2013-07-05 2017-10-31 Dcs7, Llc Systems and methods for classification of internet devices as hostile or benign
CN107911337A (en) * 2017-10-11 2018-04-13 海信集团有限公司 A kind of apparatus bound method, server and equipment
CN107979514A (en) * 2017-11-21 2018-05-01 海信集团有限公司 A kind of method and apparatus bound to equipment
CN108600259A (en) * 2018-05-08 2018-09-28 普联技术有限公司 The certification of equipment and binding method and computer storage media, server

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1842000A (en) * 2005-03-29 2006-10-04 华为技术有限公司 Method for realizing access authentication of WLAN
US9807092B1 (en) * 2013-07-05 2017-10-31 Dcs7, Llc Systems and methods for classification of internet devices as hostile or benign
CN104518874A (en) * 2013-09-26 2015-04-15 中兴通讯股份有限公司 Network access control method and system
CN105450655A (en) * 2015-12-14 2016-03-30 小米科技有限责任公司 Device binding methods and apparatuses
CN107911337A (en) * 2017-10-11 2018-04-13 海信集团有限公司 A kind of apparatus bound method, server and equipment
CN107979514A (en) * 2017-11-21 2018-05-01 海信集团有限公司 A kind of method and apparatus bound to equipment
CN108600259A (en) * 2018-05-08 2018-09-28 普联技术有限公司 The certification of equipment and binding method and computer storage media, server

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111865731A (en) * 2020-06-09 2020-10-30 深圳市欧瑞博科技股份有限公司 Intelligent equipment adding method and device, intelligent household control panel and storage medium
WO2024002301A1 (en) * 2022-06-30 2024-01-04 先临三维科技股份有限公司 Device binding method and apparatus, and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN103249047B (en) The access authentication method and device of WLAN hot spot
CN104767715B (en) Access control method and equipment
CN103106736B (en) A kind of identity identifying method, terminal and server
CN104254073A (en) Method and device for authentication of access terminal
CN106716956B (en) Method, related device and system for sharing cloud operation interface
CN110266642A (en) Identity identifying method and server, electronic equipment
JP5593575B2 (en) Method, apparatus and system for obtaining encrypted information under wireless access
CN107872447A (en) Electronic device, server, communication system and communication method
CN104270250A (en) WiFi Internet surfing connecting authentication method and system based on asymmetric full-process encryption
CN101668288A (en) Identity authenticating method, identity authenticating system and terminal
CN109102297A (en) A kind of voidable method of payment and device
CN104025551B (en) Method and communication terminal for transmitting data in a secure manner
CN107835162B (en) Software digital permit server gives the method and software digital permit server that permission is signed and issued in the license of software developer's software digital
CN105357224B (en) A kind of registration of intelligent domestic gateway, removing method and system
CN109379354A (en) A kind of methods, devices and systems for binding smart machine
CN109729000A (en) A kind of instant communicating method and device
CN106230788A (en) The reorientation method of a kind of portal certification, radio reception device, portal server
CN102255904B (en) Communication network and terminal authentication method thereof
CN106656985A (en) Backup account login method, device and system
CN106209918A (en) The method of a kind of internet security management and terminal
US20190007831A1 (en) Communication method and device
CN106888091A (en) Trustable network cut-in method and system based on EAP
KR20020000961A (en) A wireless authentication method using mobile telecommunication system
CN106302519A (en) The method of a kind of internet security management and terminal
CN106878270A (en) Enhanced access control equipment based on portal agreements

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190222