CN109379354A - A kind of methods, devices and systems for binding smart machine - Google Patents
A kind of methods, devices and systems for binding smart machine Download PDFInfo
- Publication number
- CN109379354A CN109379354A CN201811177403.8A CN201811177403A CN109379354A CN 109379354 A CN109379354 A CN 109379354A CN 201811177403 A CN201811177403 A CN 201811177403A CN 109379354 A CN109379354 A CN 109379354A
- Authority
- CN
- China
- Prior art keywords
- smart machine
- facility information
- legitimacy verifies
- network
- verifies
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention provides a kind of methods, devices and systems for binding smart machine, and described method includes following steps: obtaining the facility information of smart machine, facility information includes MAC Address, api interface verifying serial number and applies key;Legitimacy verifies are carried out to facility information;If facility information binds smart machine and passes through certification by the legitimacy verifies;It will indicate that smart machine is successfully bound and certified information is sent to smart machine;If facility information does not pass through the legitimacy verifies, facility information is pulled in into blacklist to refuse to continue to the service request of smart machine.The present invention realizes the purpose for authenticating for legitimate device and carrying out exclusive processing to illegality equipment.
Description
Technical field
The present invention relates to technical field of the computer network more particularly to a kind of method, apparatus for binding smart machine and it is
System.
Background technique
With the improvement of people's living standards, smart machine is more more and more universal, and smart machine needs and special intelligence
Energy platform carries out binding authentication use, and then is just able to achieve stronger big function using the content resource on intelligent platform.How
Certification more effectively is carried out for legitimate device and exclusive processing is carried out to illegality equipment, becomes a problem.
Summary of the invention
The present invention is directed to the shortcomings that existing way, a kind of methods, devices and systems for binding smart machine is proposed, to solve
The above problem certainly of the existing technology.
According to the first aspect of the invention, a kind of method for binding smart machine is provided, is included the following steps:
The facility information of smart machine is obtained, the facility information includes MAC Address, api interface verifying serial number and application
Key;
It is whether legal with the determination smart machine that legitimacy verifies are carried out to the facility information;
If the facility information determines that the smart machine is legal, then to the smart machine by the legitimacy verifies
It is bound and passes through certification;
It will indicate that the smart machine is successfully bound and certified information is sent to smart machine;
If the facility information determines the illegal method of the smart machine, sets described not over the legitimacy verifies
Standby information pulls blacklist to refuse to continue to the service request of the smart machine.
Further, before the facility information for obtaining smart machine, further includes:
By being connected to the network the smart machine, the network includes Wi-Fi and/or cable network.
Further, legitimacy verifies are carried out to the facility information, referred to:
Using the facility information as index information, one corresponding to the facility information prestored in database is called
Or multinomial verifying logic carries out legitimacy verifies to the facility information, the verifying logic includes with respectively corresponding the MAC
Location, api interface verifying serial number and place value logic, length logical, key value logic using key.
Further, legitimacy verifies are carried out to the facility information, referred to:
Time legitimacy verifies are carried out to the facility information.
Further, after to facility information progress legitimacy verifies, further includes:
The destination file that legitimacy verifies are carried out to the facility information is obtained, the name nominating by the destination file is
Time when verification, then in the database by destination file storage.
Further, further includes:
If indicated in the destination file illegal part be more than preset certain proportion if alarm.
On the other hand, the present invention provides a kind of devices for binding smart machine, comprising:
Module is obtained, for obtaining the facility information of smart machine, the facility information includes that MAC Address, api interface are tested
It demonstrate,proves serial number and applies key;
Correction verification module, it is whether legal with the determination smart machine for carrying out legitimacy verifies to the facility information;
Processing module is if determining that the smart machine is legal by the legitimacy verifies for the facility information, then right
The smart machine is bound and passes through certification;
If the facility information determines the illegal method of the smart machine, sets described not over the legitimacy verifies
Standby information pulls blacklist to refuse to continue to the service request of the smart machine;
Sending module, for that will indicate that successfully binding and certified information have been sent to intelligent set to the smart machine
It is standby.
It further, further include link block;
The link block is used for by being connected to the network the smart machine, and the network includes Wi-Fi and/or has
Gauze network.
Further, the correction verification module carries out legitimacy verifies to the facility information, refers to:
Using the facility information as index information, one corresponding to the facility information prestored in database is called
Or multinomial verifying logic carries out legitimacy verifies to the facility information, the verifying logic includes with respectively corresponding the MAC
Location, api interface verifying serial number and place value logic, length logical, key value logic using key.
The third aspect, the present invention provides a kind of system, including smart machine, network service module, database and as above
The device of the binding smart machine:
The smart machine connects and binds the device of binding smart machine as described above to transmit data;
The network service module includes gateway verification unit, Wi-Fi unit and cable network unit, for providing
Exit passageway mutually passes for the data between smart machine and the device of binding smart machine as described above;
The database, for the device storing data for binding smart machine as described above.
Compared with prior art, the beneficial effects of the present invention are:
The present invention is by obtaining the facility information of smart machine and carrying out legitimacy verifies, if facility information is legal by this
Property verification, it is determined that smart machine is legal, then is bound to smart machine and pass through certification;If facility information is not over this
Legitimacy verifies, it is determined that smart machine is illegal, and smart machine is pulled in blacklist to refuse to continue to the smart machine
Service request, realize and carry out authenticating and carrying out illegal smart machine the purpose of exclusive processing for legal smart machine.
The additional aspect of the present invention and advantage will be set forth in part in the description, these will become from the following description
Obviously, or practice through the invention is recognized.
Detailed description of the invention
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments
Obviously and it is readily appreciated that, in which:
Fig. 1 is the flow chart for the method that one of embodiment of the present invention one binds smart machine;
Fig. 2 is the structural block diagram for the device that one of embodiment of the present invention two binds smart machine;
Fig. 3 is the structural schematic diagram of one of the embodiment of the present invention three system;
Fig. 4 is the part-structure block diagram of mobile phone in the embodiment of the present invention three when energy equipment is mobile phone.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention
Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described.
In some processes of the description in description and claims of this specification and above-mentioned attached drawing, contain according to
Multiple operations that particular order occurs, but it should be clearly understood that these operations can not be what appears in this article suitable according to its
Sequence is executed or is executed parallel, and serial number of operation such as 101,102 etc. is only used for distinguishing each different operation, serial number
It itself does not represent and any executes sequence.In addition, these processes may include more or fewer operations, and these operations can
To execute or execute parallel in order.It should be noted that the description such as " first " herein, " second ", is for distinguishing not
Same message, equipment, module etc., does not represent sequencing, does not also limit " first " and " second " and be different type.
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiment is only a part of example of the present invention, is implemented instead of all the embodiments.It is based on
Embodiment in the present invention, those skilled in the art's every other implementation obtained without creative efforts
Example, shall fall within the protection scope of the present invention.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art
Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should also
Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art
The consistent meaning of meaning, and unless idealization or meaning too formal otherwise will not be used by specific definitions as here
To explain.
Embodiment one
As shown in Figure 1, providing a kind of method of binding smart machine of one embodiment of the invention, including walk as follows
It is rapid:
S101 obtains the facility information of smart machine, and facility information includes MAC Address, api interface verifying serial number and application
Key;
The address MAC (Media Access Control or Medium Access Control), free translation is media interviews
Control, or be physical address, hardware address, for defining the position of the network equipment.In osi model, third layer network layer
It is responsible for IP address, second layer data link layer is then responsible for MAC Address.Therefore a host has a MAC Address, and each net
Network position has the IP address for being specific to it.
Api interface verifies serial number abbreviation App key, is for verifying API access legitimacy;Which website accessed
Api interface, it is necessary to which this website allows to access.
Using key, refer to interface secret key used in third party developer.
Before the facility information for obtaining smart machine, further includes:
By being connected to the network smart machine, network includes Wi-Fi and/or cable network.
Wireless network (Wireless Network) is the network realized using wireless communication technique.Wireless network both included
Allow user to establish global voice and data network that remote-wireless connects, also includes being optimized near radio connection
Infrared technology and radio-frequency technique, very similar with the purposes of cable network, maximum difference is the difference of transmission medium,
Replace cable using radio technology, can be mutually backups with cable network.
Cable network, the computer network connected using coaxial cable, twisted pair and optical fiber.Coaxial electric cable network is common
A kind of network connecting mode.It is both economical, and installation is more convenient, and transmission rate and anti-interference ability are general, and transmission range is shorter.It is double
Twisted wire net is the current most common network connecting mode.
In contrast, cable network is cheap, easy for installation, but vulnerable to interference, transmission rate is lower, transmission range ratio
Coaxial cable wants short.Optical fiber is writing a Chinese character in simplified form for optical fiber, is a kind of being all-trans in the fiber made of glass or plastics using light
The light conduction tool penetrating principle and reaching.Fine optical fiber is encapsulated in plastic sheath, allows it to be bent and be unlikely to disconnected
It splits.In general, the emitter of one end of optical fiber uses light emitting diode (Light Emitting Diode, LED) or a branch of sharp
Light pulse is sent to optical fiber by light, and the reception device of the other end of optical fiber detects pulse using light-sensitive element.In daily life,
Since light is more much lower than the loss that electricity is conducted in electric wire in the conduction loss of optical fiber, the information that optical fiber is used as long range is passed
It passs.
Wireless network: mainly making transmission medium using air, transmits number as carrier by electromagnetic wave and infrared ray etc.
According to although networking mode is convenient, flexible, since Wireless Networking is costly, so also less universal.
Whether S102 carries out legitimacy verifies facility information legal with the determination smart machine;
In terms of carrying out legitimacy verifies, including following three to facility information:
1, using facility information as index information, call what is prestored in database to correspond to the one or more of facility information
Verifying logic carries out legitimacy verifies to facility information, and verifying logic includes respectively corresponding MAC Address, api interface verifying serial number
With place value logic, length logical, the key value logic of application key, only pass through one or more in preset logic checking
, facility information just passes through this legitimacy verifies.
2, time legitimacy verifies are carried out to facility information;
Whether the time legitimacy verifies can be directed to limited (authorization) time limit of the issuing time of device version or be most
New version can determine whether to be legal as judgement, in either latest edition of limited (authorization) time limit.
3, the destination file for carrying out legitimacy verifies to facility information is obtained, is school by the name nominating of the destination file
Time when testing, then in the database by destination file storage;
Such as: the legitimacy verifies of an entry index information can be used as a destination file, the legitimacy of multinomial index information
Verification can be used as multiple destination file;Alternatively, carrying out legitimacy verifies to facility information every time can be used as a destination file, it is more
It is secondary that multiple destination file can be used as to facility information progress legitimacy verifies;
Destination file can be .txt file.
If indicated in destination file illegal part be more than preset certain proportion if alarm;
Setting herein is primarily to facilitating staff to detect and safeguarding software and hardware and periodic cleaning storage.
If S103 facility information determines that the smart machine is legal by the legitimacy verifies, then smart machine is carried out
It binds and passes through certification;
The certification provided primarily directed to the device security of connection and authorization service (Authentication and
Authorization Service), it can control the access to sensitive or keystone resources, such as file system, network service,
System property access etc., reinforces the safety of connection.The connection accessed every time is mainly exempted in binding and the time waits, and binds it
It further include authorization afterwards in addition to certification, the purpose of certification is that whom determination reliable and securely is currently and using resource, and resource can be with
It is an application, applet, bean, servlet;The purpose of authorization is to be determined what permission currently used user has,
Whether resource can access.
If facility information not over the legitimacy verifies, determines that the smart machine is illegal, facility information is pulled in
Blacklist with refuse to continue to the service request of smart machine with;
S104 will indicate that smart machine is successfully bound and certified information is sent to smart machine;
Such as: indicate that successfully binding and certified information are that " your equipment has been bound and obtained to smart machine
Certification ".
Embodiment two
As described in Figure 2, a kind of device for binding smart machine is provided, comprising:
Link block A201, for by network connection smart machine, network to include Wi-Fi and/or cable network.
Modules A 202 is obtained, it is whether legal with the determination smart machine for obtaining the facility information of smart machine, if
Standby information includes MAC Address, api interface verifying serial number and applies key;
Correction verification module A203, for carrying out legitimacy verifies to facility information;
In terms of correction verification module A203 carries out legitimacy verifies, including following three to facility information:
1, using facility information as index information, call what is prestored in database to correspond to the one or more of facility information
Verifying logic carries out legitimacy verifies to facility information, and verifying logic includes respectively corresponding MAC Address, api interface verifying serial number
With place value logic, length logical, the key value logic of application key.
2, time legitimacy verifies are carried out to facility information.
3, the destination file for carrying out legitimacy verifies to facility information is obtained, is school by the name nominating of the destination file
Time when testing, then in the database by destination file storage.
If indicated in destination file illegal part be more than preset certain proportion if alarm.
Processing module A204 is if determining that the smart machine is legal by the legitimacy verifies for facility information, then right
Smart machine is bound and passes through certification;
If facility information not over the legitimacy verifies, determines that the smart machine is illegal, facility information is pulled in
Blacklist is to refuse to continue to the service request of smart machine;
Sending module A205, for that will indicate that successfully binding and certified information have been sent to intelligent set to smart machine
It is standby.
It is apparent to those skilled in the art that for convenience and simplicity of description, the module of foregoing description,
The specific work process of related work unit and device, can refer to corresponding processes in the foregoing method embodiment, herein no longer
It repeats.
Embodiment three
As shown in figure 3, providing a kind of system, including smart machine A301, network service module A302, database A303
And the device A304 of binding smart machine as above:
Smart machine A301 is connected and is bound the device A304 of binding smart machine as above to transmit data;
The device can be include computer equipment, mobile phone, tablet computer, PDA (Personal Digital
Assistant, personal digital assistant), POS (Point of Sales, point-of-sale terminal), any terminal device such as vehicle-mounted computer,
Taking the terminal as an example:
As shown in figure 4, the block diagram of the part-structure of mobile phone, mobile phone includes: radio frequency (Radio Frequency, RF) circuit
1510, memory 1520, input unit 1530, display unit 1540, sensor 1550, voicefrequency circuit 1560, Wireless Fidelity
The components such as (wireless fidelity, WiFi) module 1570, processor 1580 and power supply 1590.Those skilled in the art
It is appreciated that handset structure shown in Fig. 4 does not constitute the restriction to mobile phone, it may include than illustrating more or fewer portions
Part perhaps combines certain components or different component layouts.
Network service module A302 includes gateway verification unit, Wi-Fi unit and cable network unit, for providing
Exit passageway mutually passes for the data between smart machine A301 and the device A304 of binding smart machine as above;
Database A303, for the device storing data for binding smart machine as above.
In embodiment provided herein, it should be understood that disclosed method, system, device, module and/or
Unit may be implemented in other ways.For example, embodiment of the method described above is only schematical, for example, institute
The division of module is stated, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple moulds
Block or component can be combined or can be integrated into another system, or some features can be ignored or not executed.The conduct
The unit of separate part description may or may not be physically separated, component shown as a unit can be or
Person may not be physical unit, it can and it is in one place, or may be distributed over multiple network units.It can root
According to actual needs, some or all of the units may be selected to achieve the purpose of the solution of this embodiment.
The above is only some embodiments of the invention, it is noted that for the ordinary skill people of the art
For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered
It is considered as protection scope of the present invention.
Claims (10)
1. a kind of method for binding smart machine, which comprises the steps of:
The facility information of smart machine is obtained, the facility information includes MAC Address, api interface verifying serial number and applies key;
It is whether legal with the determination smart machine that legitimacy verifies are carried out to the facility information;
If the facility information determines that the smart machine is legal by the legitimacy verifies, then the smart machine is carried out
It binds and passes through certification;
If the facility information not over the legitimacy verifies, determines that the smart machine is illegal, by the facility information
Blacklist is pulled in refuse to continue to the service request of the smart machine;
It will indicate that the smart machine is successfully bound and certified information is sent to smart machine.
2. the method according to claim 1, wherein also being wrapped before the facility information for obtaining smart machine
It includes:
By being connected to the network the smart machine, the network includes Wi-Fi and/or cable network.
3. referring to the method according to claim 1, wherein carrying out legitimacy verifies to the facility information:
Using the facility information as index information, one or more corresponding to the facility information prestored in database is called
Verifying logic carries out legitimacy verifies to the facility information, the verifying logic include respectively correspond the MAC Address,
Api interface verifies place value logic, length logical, the key value logic of serial number and application key.
4. referring to the method according to claim 1, wherein carrying out legitimacy verifies to the facility information:
Time legitimacy verifies are carried out to the facility information.
5. the method according to claim 1, wherein being gone back after carrying out legitimacy verifies to the facility information
Include:
The destination file for carrying out legitimacy verifies to the facility information is obtained, is verification by the name nominating of the destination file
When time, then by the destination file storage in the database.
6. according to the method described in claim 5, it is characterized by further comprising:
If indicated in the destination file illegal part be more than preset certain proportion if alarm.
7. a kind of device for binding smart machine characterized by comprising
Module is obtained, for obtaining the facility information of smart machine, the facility information includes MAC Address, api interface verifying sequence
Number and apply key;
Correction verification module, it is whether legal with the determination smart machine for carrying out legitimacy verifies to the facility information;
Processing module, if determining that the smart machine is legal, then to described by the legitimacy verifies for the facility information
Smart machine is bound and passes through certification;
If the facility information determines the illegal method of the smart machine, the equipment is believed not over the legitimacy verifies
Breath pulls blacklist to refuse to continue to the service request of the smart machine;
Sending module, for that will indicate that the smart machine is successfully bound and certified information is sent to smart machine.
8. device according to claim 7, which is characterized in that further include link block;
The link block is used for by being connected to the network the smart machine, and the network includes Wi-Fi and/or wired network
Network.
9. device according to claim 7, which is characterized in that the correction verification module carries out legitimacy to the facility information
Verification, refers to:
Using the facility information as index information, one or more corresponding to the facility information prestored in database is called
Verifying logic carries out legitimacy verifies to the facility information, the verifying logic include respectively correspond the MAC Address,
Api interface verifies place value logic, length logical, the key value logic of serial number and application key.
10. a kind of system, including smart machine, network service module, database and as described in claim 7-9 any one
Bind the device of smart machine:
The smart machine connects and binds the device of the binding smart machine as described in claim 7-9 any one to pass
Transmission of data;
The network service module includes gateway verification unit, Wi-Fi unit and cable network unit, for providing safety
Data between the device of binding smart machine of the channel for smart machine and as described in claim 7-9 any one are mutual
It passes;
The database, for the device storing data for the binding smart machine as described in claim 7-9 any one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811177403.8A CN109379354A (en) | 2018-10-10 | 2018-10-10 | A kind of methods, devices and systems for binding smart machine |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811177403.8A CN109379354A (en) | 2018-10-10 | 2018-10-10 | A kind of methods, devices and systems for binding smart machine |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109379354A true CN109379354A (en) | 2019-02-22 |
Family
ID=65403993
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811177403.8A Pending CN109379354A (en) | 2018-10-10 | 2018-10-10 | A kind of methods, devices and systems for binding smart machine |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109379354A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111865731A (en) * | 2020-06-09 | 2020-10-30 | 深圳市欧瑞博科技股份有限公司 | Intelligent equipment adding method and device, intelligent household control panel and storage medium |
WO2024002301A1 (en) * | 2022-06-30 | 2024-01-04 | 先临三维科技股份有限公司 | Device binding method and apparatus, and computer readable storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1842000A (en) * | 2005-03-29 | 2006-10-04 | 华为技术有限公司 | Method for realizing access authentication of WLAN |
CN104518874A (en) * | 2013-09-26 | 2015-04-15 | 中兴通讯股份有限公司 | Network access control method and system |
CN105450655A (en) * | 2015-12-14 | 2016-03-30 | 小米科技有限责任公司 | Device binding methods and apparatuses |
US9807092B1 (en) * | 2013-07-05 | 2017-10-31 | Dcs7, Llc | Systems and methods for classification of internet devices as hostile or benign |
CN107911337A (en) * | 2017-10-11 | 2018-04-13 | 海信集团有限公司 | A kind of apparatus bound method, server and equipment |
CN107979514A (en) * | 2017-11-21 | 2018-05-01 | 海信集团有限公司 | A kind of method and apparatus bound to equipment |
CN108600259A (en) * | 2018-05-08 | 2018-09-28 | 普联技术有限公司 | The certification of equipment and binding method and computer storage media, server |
-
2018
- 2018-10-10 CN CN201811177403.8A patent/CN109379354A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1842000A (en) * | 2005-03-29 | 2006-10-04 | 华为技术有限公司 | Method for realizing access authentication of WLAN |
US9807092B1 (en) * | 2013-07-05 | 2017-10-31 | Dcs7, Llc | Systems and methods for classification of internet devices as hostile or benign |
CN104518874A (en) * | 2013-09-26 | 2015-04-15 | 中兴通讯股份有限公司 | Network access control method and system |
CN105450655A (en) * | 2015-12-14 | 2016-03-30 | 小米科技有限责任公司 | Device binding methods and apparatuses |
CN107911337A (en) * | 2017-10-11 | 2018-04-13 | 海信集团有限公司 | A kind of apparatus bound method, server and equipment |
CN107979514A (en) * | 2017-11-21 | 2018-05-01 | 海信集团有限公司 | A kind of method and apparatus bound to equipment |
CN108600259A (en) * | 2018-05-08 | 2018-09-28 | 普联技术有限公司 | The certification of equipment and binding method and computer storage media, server |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111865731A (en) * | 2020-06-09 | 2020-10-30 | 深圳市欧瑞博科技股份有限公司 | Intelligent equipment adding method and device, intelligent household control panel and storage medium |
WO2024002301A1 (en) * | 2022-06-30 | 2024-01-04 | 先临三维科技股份有限公司 | Device binding method and apparatus, and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103249047B (en) | The access authentication method and device of WLAN hot spot | |
CN104767715B (en) | Access control method and equipment | |
CN103106736B (en) | A kind of identity identifying method, terminal and server | |
CN104254073A (en) | Method and device for authentication of access terminal | |
CN106716956B (en) | Method, related device and system for sharing cloud operation interface | |
CN110266642A (en) | Identity identifying method and server, electronic equipment | |
JP5593575B2 (en) | Method, apparatus and system for obtaining encrypted information under wireless access | |
CN107872447A (en) | Electronic device, server, communication system and communication method | |
CN104270250A (en) | WiFi Internet surfing connecting authentication method and system based on asymmetric full-process encryption | |
CN101668288A (en) | Identity authenticating method, identity authenticating system and terminal | |
CN109102297A (en) | A kind of voidable method of payment and device | |
CN104025551B (en) | Method and communication terminal for transmitting data in a secure manner | |
CN107835162B (en) | Software digital permit server gives the method and software digital permit server that permission is signed and issued in the license of software developer's software digital | |
CN105357224B (en) | A kind of registration of intelligent domestic gateway, removing method and system | |
CN109379354A (en) | A kind of methods, devices and systems for binding smart machine | |
CN109729000A (en) | A kind of instant communicating method and device | |
CN106230788A (en) | The reorientation method of a kind of portal certification, radio reception device, portal server | |
CN102255904B (en) | Communication network and terminal authentication method thereof | |
CN106656985A (en) | Backup account login method, device and system | |
CN106209918A (en) | The method of a kind of internet security management and terminal | |
US20190007831A1 (en) | Communication method and device | |
CN106888091A (en) | Trustable network cut-in method and system based on EAP | |
KR20020000961A (en) | A wireless authentication method using mobile telecommunication system | |
CN106302519A (en) | The method of a kind of internet security management and terminal | |
CN106878270A (en) | Enhanced access control equipment based on portal agreements |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190222 |