CN110071908A - Terminal binding method, device, computer equipment and storage medium - Google Patents

Terminal binding method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN110071908A
CN110071908A CN201910190549.4A CN201910190549A CN110071908A CN 110071908 A CN110071908 A CN 110071908A CN 201910190549 A CN201910190549 A CN 201910190549A CN 110071908 A CN110071908 A CN 110071908A
Authority
CN
China
Prior art keywords
information
terminal
service equipment
security information
terminal iidentification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910190549.4A
Other languages
Chinese (zh)
Other versions
CN110071908B (en
Inventor
于晓杰
冷国强
魏东
张军昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Dahua Technology Co Ltd
Original Assignee
Zhejiang Dahua Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Dahua Technology Co Ltd filed Critical Zhejiang Dahua Technology Co Ltd
Priority to CN201910190549.4A priority Critical patent/CN110071908B/en
Publication of CN110071908A publication Critical patent/CN110071908A/en
Application granted granted Critical
Publication of CN110071908B publication Critical patent/CN110071908B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This application involves a kind of terminal binding method, device, computer equipment and storage mediums.The described method includes: obtaining terminal iidentification, terminal iidentification is sent to offline service equipment;Receive the verification information that offline service equipment is generated according to terminal iidentification;Verification information is sent to first service equipment;The security information that first service equipment is sent is received, security information is generated according to verification information;Security information is sent to offline service equipment, security information is used to indicate offline service equipment and is compared according to security information and with reference to security information, when comparing successfully, determines terminal iidentification and the success of offline service apparatus bound.Terminal binding can be carried out in private network communication using the scheme of the application.

Description

Terminal binding method, device, computer equipment and storage medium
Technical field
This application involves field of computer technology, more particularly to a kind of terminal binding method, device, computer equipment and Storage medium.
Background technique
With the development of computer technology, more and more services require to carry out terminal binding.Traditional terminal binding Dependent on the connection of server-side and public network, terminal to be bound is sent by short message by the identifying code that server-side generates.Terminal After receiving identifying code, identifying code is re-send to server-side by user, then can complete terminal binding.However, current terminal is tied up Determine method, terminal binding can not be carried out in private network communication.
Summary of the invention
Based on this, it is necessary to asking for terminal binding can not be carried out in private network communication for current terminal binding method Topic provides a kind of terminal binding method, device, computer equipment and computer storage medium, can carry out in private network communication Terminal binding.
A kind of terminal binding method, which comprises obtain terminal iidentification, send terminal mark to offline service equipment Know;Receive the verification information that offline service equipment is generated according to terminal iidentification;Verification information is sent to first service equipment;It receives The security information that first service equipment is sent, security information is generated according to verification information;It sends and pacifies to offline service equipment Full information, security information are used to indicate offline service equipment and are compared according to security information and with reference to security information, work as comparison When success, terminal iidentification and the success of offline service apparatus bound are determined.
A kind of terminal binding method, which comprises receive terminal iidentification, verification information is generated according to terminal iidentification; Verification information is sent to terminal;Security information is received from terminal, security information is that first service equipment is generated according to verification information , the verification information in first service equipment is sent by terminal;Security information is compared with reference to security information, when When comparing successfully, terminal iidentification binding success is determined.
A kind of terminal binding device, described device includes: acquisition module, for obtaining terminal iidentification;Sending module is used for Terminal iidentification is sent to offline service equipment;Receiving module is tested for receiving offline service equipment according to what terminal iidentification generated Demonstrate,prove information;Sending module is also used to send verification information to first service equipment;Receiving module is also used to receive first service The security information that equipment is sent, security information is generated according to verification information;Sending module is also used to offline service equipment Security information is sent, security information is used to indicate offline service equipment and is compared according to security information and with reference to security information, When comparing successfully, terminal iidentification and the success of offline service apparatus bound are determined.
A kind of terminal binding device, described device includes: verification information generation module, for receiving terminal iidentification, according to Terminal iidentification generates verification information;Verification information sending module, for sending verification information to terminal;Security information receives mould Block, for receiving security information from terminal, security information is that first service equipment is generated according to verification information, and first service is set Standby upper verification information is sent by terminal;Security information comparison module, for by security information and with reference to security information into Row compares, and when comparing successfully, determines terminal iidentification binding success.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing Device performs the steps of acquisition terminal iidentification when executing the computer program, sends terminal iidentification to offline service equipment;It connects Receive the verification information that offline service equipment is generated according to terminal iidentification;Verification information is sent to first service equipment;Receive first The security information that service equipment is sent, security information is generated according to verification information;Safety letter is sent to offline service equipment Breath, security information are used to indicate offline service equipment and are compared according to security information and with reference to security information, when comparing successfully When, determine terminal iidentification and the success of offline service apparatus bound.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor Acquisition terminal iidentification is performed the steps of when row, sends terminal iidentification to offline service equipment;Receive offline service equipment according to The verification information that terminal iidentification generates;Verification information is sent to first service equipment;Receive the safety that first service equipment is sent Information, security information are generated according to verification information;Security information is sent to offline service equipment, security information is used to indicate Offline service equipment is compared according to security information and with reference to security information, when comparing successfully, determine terminal iidentification and from Line service equipment binding success.
Above-mentioned terminal binding method, device, computer equipment and storage medium, by obtaining terminal iidentification, to offline clothes Equipment of being engaged in sends terminal iidentification, the verification information that offline service equipment is generated according to terminal iidentification is received, to first service equipment Send verification information, receive first service equipment send security information, security information is generated according to verification information, to from Line service equipment sends security information, and security information is used to indicate offline service equipment according to security information and with reference to security information It is compared, when comparing successfully, determines terminal iidentification and the success of offline service apparatus bound;Terminal iidentification can be converted to and be tested Information is demonstrate,proved, security information is then converted to, can guarantee that terminal iidentification is not leaked;And after security information is cracked, still can not Obtain terminal iidentification;A terminal iidentification is contained only in binding procedure, and cannot be tampered, to realize terminal iidentification certification Closed loop is able to achieve the terminal binding in private network communication, and counterfeit, the safety of raising terminal binding can not be carried out in intermediate link Property.
Detailed description of the invention
Fig. 1 is the applied environment figure of terminal binding method in one embodiment;
Fig. 2 is the flow diagram of terminal binding method in one embodiment;
Fig. 3 is the flow diagram of terminal binding method in another embodiment;
Fig. 4 is the time diagram of terminal binding method in one embodiment;
Fig. 5 is the interaction schematic diagram of terminal binding method in one embodiment;
Fig. 6 is the structural block diagram of terminal binding device in one embodiment;
Fig. 7 is the structural block diagram of terminal binding device in another embodiment;
Fig. 8 is the internal structure chart of computer equipment in one embodiment;
Fig. 9 is the internal structure chart of computer equipment in another embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not For limiting the application.
The terminal binding method provided in the embodiment of the present application, can be applied in application environment as shown in Figure 1.Its In, offline service equipment 102 is only communicated by first network with terminal 104.Terminal 104 passes through the second network and the first clothes Business equipment 106 is communicated.Wherein, first network and the second network are not consolidated networks, and first network is with the second network Incompatible network.Such as first network can be private network, the second network can be public network.Wherein, terminal 104 can with but it is unlimited Then various personal computers, laptop, smart phone, tablet computer and portable wearable device.Terminal 104 is unlimited Quantity, such as can be 2, for being connected by first network with offline service equipment, second terminal is used for first terminal It is connected by the second network with offline service equipment.Offline service equipment 104 and first service equipment 106 may each be terminal Service equipment can also be realized with the server cluster of the either multiple server compositions of independent server.Wherein, offline Service equipment 104 cannot connect to the second network, can not also be communicated by Short Message Service Gateway with terminal 104.
In one embodiment, as shown in Fig. 2, providing a kind of terminal binding method, it is applied in Fig. 1 in this way It is illustrated for terminal 104, comprising the following steps:
Step 202, terminal iidentification is obtained, sends terminal iidentification to offline service equipment.
Wherein, terminal iidentification refers to the unique identification for distinguishing terminal or user.Such as terminal iidentification can be society The number of handing over the accounts, email address or phone number etc..
Specifically, in the first network that terminal access allows to be communicated with offline service equipment.Terminal obtains input Terminal iidentification sends the terminal iidentification to offline service equipment.
Step 204, the verification information that offline service equipment is generated according to terminal iidentification is received.
Wherein, verification information, which can be, obtains after offline service equipment encrypts terminal iidentification.Verification information can By one of text, number or character or a variety of to form.
Specifically, offline service equipment receives the terminal iidentification that terminal is sent, and carries out encryption generation to terminal iidentification and test Information is demonstrate,proved, verification information is sent to terminal by first network.Terminal receives offline service equipment according to end by first network The verification information that end mark generates.
Step 206, verification information is sent to first service equipment.
Specifically, terminal is switched in the second network that permission is communicated with first service equipment.Terminal passes through second Network sends the verification information that offline service equipment generates to first service equipment.
Step 208, the security information that first service equipment is sent is received, security information is generated according to verification information.
Wherein, security information is that first service equipment is generated according to verification information.Security information can be by text, number Or one of character or a variety of compositions.And first service equipment generates algorithm used by security information and offline service equipment It is not identical to generate algorithm used by verification information.
Specifically, first service equipment receives verification information, is adopted according to verification information and is generated algorithmically by security information, to end End sends security information.Terminal receives the security information that first service equipment is sent, wherein security information is according to verification information It generates.
Step 210, security information is sent to offline service equipment, security information is used to indicate offline service equipment according to peace Full information and reference security information are compared, and when comparing successfully, determine terminal iidentification and the success of offline service apparatus bound.
It wherein, is offline service equipment use calculation identical with first service equipment generation security information with reference to security information Method handles terminal iidentification.
Specifically, terminal sends security information to offline service equipment.Wherein, security information is used to indicate offline service and sets It is standby to be compared according to security information and with reference to security information, when comparing successfully, determine terminal iidentification and offline service equipment Binding success.
In above-mentioned terminal binding method, by obtain terminal iidentification, to offline service equipment send terminal iidentification, receive from The verification information that line service equipment is generated according to terminal iidentification sends verification information to first service equipment, can make the first clothes Business equipment receives verification information, realizes that offline service equipment is synchronous with the data between first service equipment;Receive the first clothes The security information that equipment of being engaged in is sent, security information is generated according to verification information, sends security information to offline service equipment, Security information is used to indicate offline service equipment and is compared according to security information and with reference to security information, when comparing successfully, It determines terminal iidentification and the success of offline service apparatus bound, secondary conversion is carried out to terminal iidentification, i.e., is converted to terminal iidentification Verification information is then converted into security information, can guarantee that terminal iidentification is not leaked;And after security information is cracked, still without Method obtains terminal iidentification;A terminal iidentification is contained only in binding procedure, and cannot be tampered, to realize that terminal iidentification authenticates Closed loop, realize in private network communication terminal binding, and can not intermediate link carry out it is counterfeit, thus improve terminal binding Safety.
In one embodiment, terminal binding method further include: receive offline service equipment and generated according to verification information Two dimensional code;Two dimensional code is parsed, information is verified.
Specifically, offline service equipment generates two dimensional code according to verification information, and sends two dimensional code to terminal.Terminal passes through First network receives the two dimensional code that offline service equipment is generated according to verification information, and shows.Two dimensional code may be displayed on offline On the corresponding local GUI of service equipment (Graphical User Interface, graphic user interface), or and offline service In the corresponding client of PC (Personal Computer, personal computer) that equipment is connected by first network.Terminal is cut After changing to the second network, two dimensional code is parsed, information is verified.After terminal is verified information, verification information is submitted automatically To first service equipment.
In the present embodiment, terminal can be two terminals.Wherein, first terminal can be offline service equipment corresponding On ground GUI (Graphical User Interface, graphic user interface), or with offline service equipment pass through first network The corresponding client of PC (Personal Computer, personal computer) being connected.And first terminal passes through first network It is connected with offline service equipment.Second terminal can be what any one was connected by the second network with first service equipment Terminal.First terminal is used to receive the two dimensional code that offline service equipment is generated according to verification information by first network, and shows. Second terminal is verified information for scanning the two-dimensional code.Second terminal is also used to send verification information to service equipment.
In above-mentioned terminal binding method, the two dimensional code generated by receiving offline service equipment according to verification information, and solve Two dimensional code is analysed, information is verified, verification information is sent to first service equipment, then can complete the switching of network, and first Service equipment can receive verification information, to reach the synchronizing information between offline service equipment and first service equipment.
In one embodiment, verification information is that offline service equipment is generated according to random information and terminal iidentification; Security information is that the terminal iidentification that first service equipment is parsed according to verification information and random information generate;With reference to safety Information is that offline service equipment handles to obtain by algorithm identical with security information is generated to random information and terminal iidentification.
Wherein, random information can be the information that offline service equipment generates at random.Random information can be by text, number With one of character or a variety of compositions.
Specifically, verification information is that offline service equipment generates random information, and random information and terminal iidentification are carried out Encryption generation is carried out after combination.For example, offline service equipment can define a structural body, by 11 bytes of phone number In addition 13 bytes of random information generate verification information, but not limited to this form.Offline service equipment, which can be used, to be pre-saved Public key verification information is encrypted, for example, by using public key of RSA2048 Encryption Algorithm etc. but it is unlimited this to verification information into Row encryption, and encrypted verification information is sent to terminal.Terminal receives offline service equipment and is added according to what terminal iidentification generated Verification information after close.
Security information is first service equipment parsing verification information, after obtaining terminal iidentification and random information, using algorithm Terminal iidentification and random information are calculated.For example, first service equipment is using corresponding with RSA2048 Encryption Algorithm Private key parse verification information, obtain terminal iidentification and random information.First service equipment using Hash non-reversible algorithm or Other Similarity algorithms handle to obtain to terminal iidentification and random information.Such as first service equipment only extract by Hash it is irreversible Former bit digitals that algorithm obtains after calculating.Terminal receives first service equipment and sends treated security information.
First service equipment is stored in advance in offline service equipment and generates the algorithm used when security information.With reference to safe letter Breath is that first service equipment is handled to obtain by algorithm identical with security information is generated to random information and terminal iidentification 's.Such as first service equipment generates security information using Hash non-reversible algorithm, then offline service equipment can not by Hash Algorithm for inversion is handled to obtain with reference to security information to random information and terminal iidentification.
It can also include offline service device identification, binding time and binding validity period in verification information in the present embodiment At least one of.Wherein, offline service device identification is the unique identification for distinguishing offline service equipment.Verification information can To be that offline service equipment has according to random information and terminal iidentification and offline service device identification, binding time and binding What at least one of effect phase generated.
First service equipment can parse verification information, obtain random information and terminal iidentification and offline service equipment mark At least one of knowledge, binding time and binding validity period.First service equipment can according to random information and terminal iidentification, and At least one of offline service device identification, binding time and binding validity period, generate security information.
Offline service equipment can by with generate the identical algorithm of security information, to random information and terminal iidentification and At least one of offline service device identification, binding time and binding validity period are handled, and are generated and are referred to security information.
In one embodiment, first service equipment can store the binding relationship of terminal iidentification and offline service equipment.It should Binding relationship can be used in subsequent application.
In above-mentioned terminal binding method, by verification information, security information and with reference to the generation of security information, it can be realized Synchronizing information between offline service equipment and first service equipment, and the algorithm and first used when reference security information generation The algorithm used when service equipment generation security information is identical, improves the reliability to safety code verifying, ensure that terminal mark The legitimacy of knowledge improves the safety of terminal binding.
In one embodiment, as shown in figure 3, providing a kind of terminal binding method, it is applied in Fig. 1 in this way It is illustrated for offline service equipment 102, comprising the following steps:
Step 302, terminal iidentification is received, verification information is generated according to terminal iidentification.
Specifically, in the first network that terminal access allows to be communicated with offline service equipment.Terminal receives input Terminal iidentification sends the terminal iidentification to offline service equipment.Offline service equipment receives the terminal iidentification that terminal is sent, and right Terminal iidentification carries out encryption and generates verification information.
Step 304, verification information is sent to terminal.
Specifically, offline service equipment sends verification information to terminal by first network.
Step 306, security information being received from terminal, security information is that first service equipment is generated according to verification information, Verification information in first service equipment is sent by terminal.
Specifically, terminal receives verification information, and sends the verification information to first service equipment.First service equipment root Security information is generated according to verification information.I.e. security information is that first service equipment is generated according to verification information, and first service is set Standby upper verification information is sent by terminal.Offline service equipment receives security information from terminal by first network.
Step 308, security information is compared with reference to security information, when comparing successfully, determines that terminal iidentification is tied up Fixed success.
Specifically, offline service equipment is compared one by one according to security information and with reference to security information, when comparing successfully When, determine terminal iidentification and the success of offline service apparatus bound.
In above-mentioned terminal binding method, by receiving terminal iidentification, verification information is generated according to terminal iidentification, is sent out to terminal Verification information is sent, receives security information from terminal, security information is that first service equipment is generated according to verification information, the first clothes Verification information in equipment of being engaged in is sent by terminal, security information is compared with reference security information, when comparing successfully When, it determines terminal iidentification binding success, secondary conversion is carried out to terminal iidentification, can guarantee that terminal iidentification is not leaked;And when peace After full information is cracked, it is still unable to get terminal iidentification;A terminal iidentification is contained only in binding procedure, and cannot be usurped Change, to realize the closed loop of terminal iidentification certification, realizes the terminal authentication in private network communication, and can not carry out in intermediate link It is counterfeit, to improve the safety of terminal binding.
In one embodiment, verification information is generated according to terminal iidentification, comprising: generate random information;By terminal iidentification It is encrypted with random information, generates verification information.
Specifically, offline service equipment generates random information, and random information and terminal iidentification are combined, and will combine Terminal iidentification and random information afterwards is encrypted, and verification information is generated.For example, offline service equipment can define a structure Body, 13 bytes by 11 bytes of phone number plus random information generate verification information, but not limited to this form.Offline Service equipment can be used the public key pre-saved and encrypt to verification information, for example, by using the public key of RSA2048 Encryption Algorithm Deng but unlimited this verification information is encrypted, and send encrypted verification information to terminal.
It can also include offline service device identification, binding time and binding validity period in verification information in the present embodiment At least one of.Wherein, offline service device identification is the unique identification for distinguishing offline service equipment.Verification information can To be that offline service equipment has according to random information and terminal iidentification and offline service device identification, binding time and binding What at least one of effect phase generated.
In one embodiment, first service equipment can store the binding relationship of terminal iidentification and offline service equipment.It should Binding relationship can be used in subsequent application.
In above-mentioned terminal binding method, random information is generated, terminal iidentification and random information are encrypted, generates verifying Information can encrypt simultaneously terminal iidentification and random information, when verification information is acquired, also improve terminal iidentification quilt The difficulty cracked improves the safety of terminal binding.
In one embodiment, with reference to the generating mode of security information, comprising: by generating safety with first service equipment The identical algorithm of information handles to obtain with reference to security information to random information and terminal iidentification.
Specifically, first service equipment is stored in advance in offline service equipment and generates the algorithm used when security information.The One service equipment is calculated random information and terminal iidentification by algorithm identical with security information is generated.Such as First service equipment generates security information according to verification information, using Hash non-reversible algorithm.Then offline service equipment passes through Kazakhstan Random information and terminal iidentification is calculated with reference to security information in uncommon non-reversible algorithm.
In the present embodiment, offline service equipment can by with generate the identical algorithm of security information, to random information and At least one of terminal iidentification and offline service device identification, binding time and binding validity period are handled, and ginseng is generated Examine security information.
In above-mentioned terminal binding method, by algorithm identical with first service equipment generation security information to random information It handles to obtain with reference to security information with terminal iidentification, the verifying to security information is able to achieve, to guarantee the true of terminal iidentification Property, improve the safety of terminal binding.
In one embodiment, verification information be used to indicate first service equipment parsing verification information obtain random information and Terminal iidentification, and security information is generated according to random information and terminal iidentification, it is sent and is pacified to corresponding terminal according to terminal iidentification Full information.
Specifically, verification information is used to indicate first service equipment using private key solution corresponding with RSA2048 Encryption Algorithm Verification information is analysed, random information and terminal iidentification are obtained.First service equipment is using Hash non-reversible algorithm or other are similar After algorithm handles random information and terminal iidentification, security information is generated.What first service equipment can be obtained according to parsing Terminal iidentification sends security information to corresponding terminal.For example, first service equipment passes through according to the phone number that parsing obtains Short Message Service Gateway sends security information to the corresponding terminal of phone number.Wherein, only the legal phone number counterpart terminal is Security information can be received.Alternatively, the terminal iidentification that first service equipment is obtained according to parsing passes through the language casting that calls back The security information.Wherein, the only corresponding terminal of the legal stabilization terminal iidentification can just receive security information.Alternatively, the The social account that one service equipment is obtained according to parsing sends security information to the corresponding terminal of social account by public network.Its In, only the legal corresponding terminal of social account can just receive security information.
In the present embodiment, first service equipment can parse verification information, obtain random information and terminal iidentification, and offline At least one of service equipment mark, binding time and binding validity period.First service equipment can be according to random information and end At least one of end mark and offline service device identification, binding time and binding validity period, generate security information.On It states in terminal binding method, verification information is used to indicate first service equipment parsing verification information and obtains random information and terminal mark Know, and security information generated according to random information and terminal iidentification, security information is sent to corresponding terminal according to terminal iidentification, The synchronizing information being able to achieve between offline service equipment and first service equipment, and first service equipment can parse terminal mark Know, and security information is sent to corresponding terminal according to terminal iidentification, realizes the closed loop verifying of the terminal iidentification in private network.
In one embodiment, a kind of terminal binding method, as shown in Figure 4, comprising the following steps:
Step 402, terminal obtains terminal iidentification.
Step 404, terminal sends terminal iidentification to offline service equipment.
Step 406, offline service equipment generates random information, terminal iidentification and random information is encrypted, generation is tested Demonstrate,prove information.
Step 408, offline service equipment sends verification information to terminal.
Step 410, the two dimensional code that terminal parsing offline service equipment is generated according to verification information, parses two dimensional code, obtains Verification information.
Step 412, terminal sends verification information to first service equipment.
Step 414, first service equipment parsing verification information obtains random information and terminal iidentification, according to random information and Terminal iidentification generates security information.
Step 416, first service equipment sends security information to corresponding terminal according to terminal iidentification.
Step 418, terminal sends security information to offline service equipment.
Step 420, offline service equipment is compared according to security information and with reference to security information, when comparing successfully, Determine terminal iidentification binding success.
Step 422, offline service equipment returns to binding result to terminal.
In above-mentioned terminal binding method, first service equipment is made to receive verification information, be able to achieve offline service equipment with Data between first service equipment are synchronous;And secondary conversion is carried out to terminal iidentification, i.e. terminal iidentification is converted to verification information, It is then converted into security information, can guarantee that terminal iidentification and verification information are not leaked;And after security information is cracked, still It is unable to get terminal iidentification;A terminal iidentification is contained only in binding procedure, and cannot be tampered, and guarantees that security information can only be sent out Terminal corresponding to terminal iidentification is sent, to realize the closed loop of terminal iidentification certification, realizes the terminal authentication in private network communication, And counterfeit, the safety of raising terminal binding can not be carried out in intermediate link.
In one embodiment, as shown in figure 5, being the interaction figure of terminal binding method in one embodiment, comprising:
Step 502, first terminal sends terminal iidentification to offline service equipment, and wherein the terminal iidentification is second terminal Terminal iidentification.
Step 504, offline service equipment receives terminal iidentification, by the random information of terminal iidentification and generation, using pre- The public key deposited is encrypted, and verification information is generated.
Step 506, offline service equipment sends verification information to first terminal and is shown as two dimensional code.
Step 508, first terminal shows the two dimensional code.
Step 510, second terminal parses the two dimensional code, is verified information.
Step 512, second terminal sends verification information to first service equipment.
Step 514, first service equipment is according to verification information, using corresponding private key decryption verification information, obtains random Information and terminal iidentification.First service equipment is calculated using irreversible algorithm according to random information and terminal iidentification and obtains safety Information.
Step 516, first service equipment sends corresponding terminal iidentification for security information by Short Message Service Gateway.
Step 518, security information is sent to the corresponding terminal of terminal iidentification by Short Message Service Gateway.
Step 520, second terminal receives security information, and first terminal sends security information to offline service equipment.
Step 522, offline service equipment is by the random information of terminal iidentification and generation, using with first service equipment phase Same algorithm process is obtained with reference to security information.Security information that offline service equipment sends terminal and with reference to security information into Row compares, when comparing successfully, terminal iidentification and the success of offline service apparatus bound.
Step 524, offline service equipment returns to binding result to first terminal.
In above-mentioned terminal binding method, by being shown as two dimensional code, parsing two dimensional code is verified information, is able to achieve offline Synchronizing information between service equipment and first service equipment;Offline service device is encrypted using the public key prestored, the first clothes Equipment of being engaged in uses corresponding private key decryption verification information, terminal iidentification can be made not will be leaked, and after security information is cracked, Still it is unable to get terminal iidentification;A terminal iidentification is contained only in binding procedure, and cannot be tampered, to realize terminal mark The closed loop of recognition card realizes the terminal authentication in private network communication, and can not be counterfeit in intermediate link progress, to improve terminal The safety of binding.
It should be understood that although each step in the flow chart of Fig. 2-3 is successively shown according to the instruction of arrow, These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-3 Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively It carries out, but can be at least part of the sub-step or stage of other steps or other steps in turn or alternately It executes.
In one embodiment, as shown in fig. 6, providing a kind of terminal binding device, it is applied to terminal 104, comprising: obtain Modulus block 602, sending module 604 and receiving module 606, in which:
Module 602 is obtained, for obtaining terminal iidentification.
Sending module 604, for sending terminal iidentification to offline service equipment.
Receiving module 606, the verification information generated for receiving offline service equipment according to terminal iidentification.
Sending module 604 is also used to send verification information to first service equipment.
Receiving module 606, is also used to receive the security information of first service equipment transmission, and security information is believed according to verifying What breath generated.
Sending module 604 is also used to send security information to offline service equipment, and security information is used to indicate offline service Equipment is compared according to security information and with reference to security information, when comparing successfully, determines that terminal iidentification is set with offline service Standby binding success.
In above-mentioned terminal binding device, by receive terminal iidentification, to offline service equipment send terminal iidentification, receive from The verification information that line service equipment is generated according to terminal iidentification;Verification information is sent to first service equipment, the first clothes can be made Business equipment receives verification information, realizes that offline service equipment is synchronous with the data between first service equipment;Receive the first clothes The security information that equipment of being engaged in is sent, security information is generated according to verification information, sends security information to offline service equipment, Security information is used to indicate offline service equipment and is compared according to security information and with reference to security information, when comparing successfully, It determines terminal iidentification and the success of offline service apparatus bound, secondary conversion is carried out to terminal iidentification, i.e., is converted to terminal iidentification Verification information is then converted into security information, can guarantee that terminal iidentification is not leaked;And after security information is cracked, still without Method obtains terminal iidentification;A terminal iidentification is contained only in binding procedure, and cannot be tampered, to realize that terminal iidentification authenticates Closed loop, realize terminal authentication in private network communication, and can not carry out in intermediate link counterfeit, improve the safety of terminal binding Property.
In one embodiment, receiving module 606 is also used to receive two that offline service equipment is generated according to verification information Tie up code;Two dimensional code is parsed, information is verified.
In above-mentioned terminal binding device, the two dimensional code generated by receiving offline service equipment according to verification information, and solve Two dimensional code is analysed, information is verified, verification information is sent to first service equipment, then can complete the switching of network, and first Service equipment can receive verification information, to reach the synchronizing information between offline service equipment and first service equipment.
In one embodiment, verification information is that offline service equipment is generated according to random information and terminal iidentification; Security information is that the terminal iidentification that first service equipment is parsed according to verification information and random information generate;With reference to safety Information is that offline service equipment handles to obtain by algorithm identical with security information is generated to random information and terminal iidentification.
In above-mentioned terminal binding device, by verification information, security information and with reference to the generation of security information, it can be realized Synchronizing information between offline service equipment and first service equipment, and the algorithm and first used when reference security information generation The algorithm used when service equipment generation security information is identical, improves the reliability to safety code verifying, ensure that terminal mark The authenticity of knowledge improves the safety of terminal binding.
In one embodiment, as shown in fig. 7, providing a kind of terminal binding device, it is applied to offline service equipment 102, comprising: verification information generation module 702, verification information sending module 704, security information receiving module 706 and comparison mould Block 708, in which:
Verification information generation module 702 generates verification information according to terminal iidentification for receiving terminal iidentification.
Verification information sending module 704, for sending verification information to terminal.
Security information receiving module 706, for receiving security information from terminal, security information be first service equipment according to What verification information generated, the verification information in first service equipment is sent by terminal.
Security information comparison module 708, for security information to be compared with reference to security information, when comparing successfully When, determine terminal iidentification binding success.
In above-mentioned terminal binding device, by receiving terminal iidentification, verification information is generated according to terminal iidentification, is sent out to terminal Verification information is sent, receives security information from terminal, security information is that first service equipment is generated according to verification information, the first clothes Verification information in equipment of being engaged in is sent by terminal, security information is compared with reference security information, when comparing successfully When, it determines terminal iidentification binding success, secondary conversion is carried out to terminal iidentification, can guarantee that terminal iidentification is not leaked;And when peace After full information is cracked, it is still unable to get terminal iidentification;A terminal iidentification is contained only in binding procedure, and cannot be usurped Change, to realize the closed loop of terminal iidentification certification, realizes the terminal authentication in private network communication, and can not carry out in intermediate link It is counterfeit, improve the safety of terminal binding.
In one embodiment, verification information generation module 702 is also used to generate random information;By terminal iidentification and with Machine information is encrypted, and verification information is generated.
In above-mentioned terminal binding device, random information is generated, terminal iidentification and random information are encrypted, generates verifying Information can encrypt simultaneously terminal iidentification and random information, when verification information is acquired, also improve terminal iidentification quilt The difficulty cracked, therefore improve the safety of terminal binding.
In one embodiment, security information comparison module 708 is also used to by generating safety letter with first service equipment It ceases identical algorithm and random information and terminal iidentification is handled to obtain with reference to security information.
In above-mentioned terminal binding device, by algorithm identical with first service equipment generation security information to random information It handles to obtain with reference to security information with terminal iidentification, the verifying to security information is able to achieve, to guarantee the true of terminal iidentification Property, improve the safety of terminal binding.
In one embodiment, verification information be used to indicate first service equipment parsing verification information obtain random information and Terminal iidentification, and security information is generated according to random information and terminal iidentification, it is sent and is pacified to corresponding terminal according to terminal iidentification Full information.
In above-mentioned terminal binding device, verification information is used to indicate first service equipment parsing verification information and is believed at random Breath and terminal iidentification, and security information is generated according to random information and terminal iidentification, it is sent out according to terminal iidentification to corresponding terminal Security information is sent, the synchronizing information being able to achieve between offline service equipment and first service equipment, and first service equipment can solve Terminal iidentification is precipitated, and security information is sent to corresponding terminal according to terminal iidentification, realizes that terminal iidentification closes in private network Ring verifying.
Specific about terminal binding device limits the restriction that may refer to above for terminal binding method, herein not It repeats again.Modules in above-mentioned terminal binding device can be realized fully or partially through software, hardware and combinations thereof.On Stating each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also store in a software form In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be terminal, internal structure Figure can be as shown in Figure 8.The computer equipment includes processor, the memory, network interface, display connected by system bus Screen and input unit.Wherein, the processor of the computer equipment is for providing calculating and control ability.The computer equipment is deposited Reservoir includes non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system and computer journey Sequence.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating The network interface of machine equipment is used to communicate with external terminal by network connection.When the computer program is executed by processor with Realize a kind of terminal binding method.The display screen of the computer equipment can be liquid crystal display or electric ink display screen, The input unit of the computer equipment can be the touch layer covered on display screen, be also possible to be arranged on computer equipment shell Key, trace ball or Trackpad, can also be external keyboard, Trackpad or mouse etc..
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction Composition can be as shown in Figure 9.The computer equipment include by system bus connect processor, memory, network interface and Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating The database of machine equipment is for storing terminal binding data.The network interface of the computer equipment is used to pass through with external terminal Network connection communication.To realize a kind of terminal binding method when the computer program is executed by processor.
It will be understood by those skilled in the art that structure shown in Fig. 8 and Fig. 9, only relevant to application scheme The block diagram of part-structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specifically calculates Machine equipment may include perhaps combining certain components or with different components than more or fewer components as shown in the figure Arrangement.
A kind of terminal binding system, the system include terminal, offline service equipment and first service equipment, terminal and offline It is communicated between service equipment by first network, terminal and first service equipment pass through the second network communication;
Terminal sends terminal iidentification for receiving terminal iidentification, to offline service equipment;
Offline service equipment generates verification information for receiving terminal iidentification, according to terminal iidentification, and tests to terminal transmission Demonstrate,prove information;
Terminal sends verification information for receiving verification information, and to first service equipment;
First service equipment is used to generate security information according to verification information;
Terminal is used to receive the security information of first service equipment transmission, and sends security information to offline service equipment;
Offline service equipment is used to receive security information from terminal, and security information is compared with reference to security information It is right, when comparing successfully, determine terminal iidentification binding success.
In one embodiment, a kind of computer equipment, including memory and processor are provided, is stored in memory The step of computer program, which realizes above-mentioned terminal binding method when executing computer program.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program realizes the step of above-mentioned terminal binding method when being executed by processor.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (11)

1. a kind of terminal binding method, which is characterized in that the described method includes:
Terminal iidentification is obtained, sends the terminal iidentification to offline service equipment;
Receive the verification information that the offline service equipment is generated according to the terminal iidentification;
The verification information is sent to first service equipment;
The security information that the first service equipment is sent is received, the security information is generated according to the verification information;
The security information is sent to the offline service equipment, the security information is used to indicate the offline service equipment root Be compared according to the security information and with reference to security information, when comparing successfully, determine the terminal iidentification with it is described offline Service equipment binding success.
2. the method according to claim 1, wherein the method also includes:
Receive the two dimensional code that the offline service equipment is generated according to the verification information;
The two dimensional code is parsed, information is verified.
3. method according to claim 1 or 2, which is characterized in that the verification information is the offline service equipment root It is generated according to random information and the terminal iidentification;
The terminal iidentification and institute that the security information, which is the first service equipment, to be parsed according to the verification information State random information generation;
Described with reference to security information is the offline service equipment by algorithm identical with the security information is generated to described What random information and the terminal iidentification were handled.
4. a kind of terminal binding method, which is characterized in that the described method includes:
Terminal iidentification is received, verification information is generated according to the terminal iidentification;
The verification information is sent to terminal;
Security information is received from the terminal, the security information is that first service equipment is generated according to the verification information, Verification information in the first service equipment is sent by the terminal;
The security information is compared with reference to security information, when comparing successfully, determines that the terminal iidentification is bound into Function.
5. according to the method described in claim 4, it is characterized in that, described generate verification information, packet according to the terminal iidentification It includes:
Generate random information;
The terminal iidentification and the random information are encrypted, verification information is generated.
6. according to the method described in claim 5, it is characterized in that, the generating mode with reference to security information, comprising:
By algorithm identical with first service equipment generation security information to the random information and the terminal iidentification Processing is obtained with reference to security information.
7. according to the method described in claim 4, it is characterized in that, the verification information is used to indicate the first service equipment It parses the verification information and obtains the random information and the terminal iidentification, and according to the random information and the terminal mark Know and generate the security information, the security information is sent to corresponding terminal according to the terminal iidentification.
8. a kind of terminal binding device, which is characterized in that described device includes:
Module is obtained, for obtaining terminal iidentification;
Sending module, for sending the terminal iidentification to offline service equipment;
Receiving module, the verification information generated for receiving the offline service equipment according to the terminal iidentification;
The sending module is also used to send the verification information to first service equipment;
The receiving module, is also used to receive the security information that the first service equipment is sent, and the security information is It is generated according to the verification information;
The sending module is also used to send the security information to the offline service equipment, and the security information is for referring to Show that the offline service equipment is compared according to the security information and with reference to security information, when comparing successfully, determines institute State terminal iidentification and offline service apparatus bound success.
9. a kind of terminal binding device, which is characterized in that described device includes:
Verification information generation module generates verification information according to the terminal iidentification for receiving terminal iidentification;
Verification information sending module, for sending the verification information to terminal;
Security information receiving module, for receiving security information from terminal, the security information is first service equipment according to institute Verification information generation is stated, the verification information in first service equipment is sent by terminal;
Security information comparison module, for the security information to be compared with reference to security information, when comparing successfully, really The fixed terminal iidentification binding success.
10. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists In the step of processor realizes any one of claims 1 to 7 the method when executing the computer program.
11. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any one of claims 1 to 7 is realized when being executed by processor.
CN201910190549.4A 2019-03-13 2019-03-13 Terminal binding method and device, computer equipment and storage medium Active CN110071908B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910190549.4A CN110071908B (en) 2019-03-13 2019-03-13 Terminal binding method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910190549.4A CN110071908B (en) 2019-03-13 2019-03-13 Terminal binding method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110071908A true CN110071908A (en) 2019-07-30
CN110071908B CN110071908B (en) 2021-09-21

Family

ID=67365219

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910190549.4A Active CN110071908B (en) 2019-03-13 2019-03-13 Terminal binding method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110071908B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112437071A (en) * 2020-11-17 2021-03-02 珠海格力电器股份有限公司 Method, system, device and storage medium for device control

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516103A (en) * 2015-11-30 2016-04-20 青岛海尔智能家电科技有限公司 Method, device and system for binding intelligent household electrical appliances
CN106301785A (en) * 2016-08-09 2017-01-04 Tcl集团股份有限公司 The binding method of a kind of intelligent home device and intelligent terminal and system
CN108173720A (en) * 2017-12-07 2018-06-15 无锡小天鹅股份有限公司 The control method and system of household electrical appliance, home appliance system
US20180316664A1 (en) * 2016-04-27 2018-11-01 Tencent Technology (Shenzhen) Company Limited Method, apparatus, and system for controlling intelligent device, and storage medium
CN108768970A (en) * 2018-05-15 2018-11-06 腾讯科技(北京)有限公司 A kind of binding method of smart machine, identity authentication platform and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516103A (en) * 2015-11-30 2016-04-20 青岛海尔智能家电科技有限公司 Method, device and system for binding intelligent household electrical appliances
US20180316664A1 (en) * 2016-04-27 2018-11-01 Tencent Technology (Shenzhen) Company Limited Method, apparatus, and system for controlling intelligent device, and storage medium
CN106301785A (en) * 2016-08-09 2017-01-04 Tcl集团股份有限公司 The binding method of a kind of intelligent home device and intelligent terminal and system
CN108173720A (en) * 2017-12-07 2018-06-15 无锡小天鹅股份有限公司 The control method and system of household electrical appliance, home appliance system
CN108768970A (en) * 2018-05-15 2018-11-06 腾讯科技(北京)有限公司 A kind of binding method of smart machine, identity authentication platform and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112437071A (en) * 2020-11-17 2021-03-02 珠海格力电器股份有限公司 Method, system, device and storage medium for device control
CN112437071B (en) * 2020-11-17 2023-05-16 珠海格力电器股份有限公司 Method, system, device and storage medium for controlling device

Also Published As

Publication number Publication date
CN110071908B (en) 2021-09-21

Similar Documents

Publication Publication Date Title
CN108064440B (en) FIDO authentication method, device and system based on block chain
CN105376216B (en) A kind of remote access method, proxy server and client
CN109325342B (en) Identity information management method, device, computer equipment and storage medium
CN108322451B (en) Data processing method, data processing device, computer equipment and storage medium
CN106304074B (en) Auth method and system towards mobile subscriber
CN111787530B (en) Block chain digital identity management method based on SIM card
CN113364760A (en) Data encryption processing method and device, computer equipment and storage medium
CN111327583B (en) Identity authentication method, intelligent equipment and authentication server
CN113691502B (en) Communication method, device, gateway server, client and storage medium
CN113067699B (en) Data sharing method and device based on quantum key and computer equipment
CN108199847B (en) Digital security processing method, computer device, and storage medium
CN109376824A (en) Dynamic Two-dimensional code generating method and system
CN110489393A (en) Promise breaking information query method, device, computer equipment and storage medium
CN109614825A (en) Contract Signing method, apparatus, computer equipment and storage medium
CN111343170B (en) Electronic signing method and system
EP4024311A1 (en) Method and apparatus for authenticating biometric payment device, computer device and storage medium
CN109768979A (en) Data encryption and transmission method, device, computer equipment and storage medium
CN110135175A (en) Information processing, acquisition methods, device, equipment and medium based on block chain
CN110768784A (en) Password transmission method, device, computer equipment and storage medium
CN116662941B (en) Information encryption method, device, computer equipment and storage medium
CN109347813A (en) Internet of things equipment login method, system, computer equipment and storage medium
CN109286933A (en) Authentication method, device, system, computer equipment and storage medium
CN114172747B (en) Method and system for group members to obtain authentication certificate based on digital certificate
CN110445757A (en) Personnel information encryption method, device, computer equipment and storage medium
CN109064606A (en) Gate inhibition's task executing method, system, access control system and readable storage medium storing program for executing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant