CN110290033A - A kind of method and apparatus carrying out authentication based on trusted device - Google Patents

A kind of method and apparatus carrying out authentication based on trusted device Download PDF

Info

Publication number
CN110290033A
CN110290033A CN201910548718.7A CN201910548718A CN110290033A CN 110290033 A CN110290033 A CN 110290033A CN 201910548718 A CN201910548718 A CN 201910548718A CN 110290033 A CN110290033 A CN 110290033A
Authority
CN
China
Prior art keywords
authentication
trusted device
smart
list
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910548718.7A
Other languages
Chinese (zh)
Inventor
陆沿青
许可喜
肖方
洪艳婷
陈华胜
刘昊东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Samsung Electronics China R&D Center
Samsung Electronics Co Ltd
Original Assignee
Samsung Electronics China R&D Center
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung Electronics China R&D Center, Samsung Electronics Co Ltd filed Critical Samsung Electronics China R&D Center
Priority to CN201910548718.7A priority Critical patent/CN110290033A/en
Publication of CN110290033A publication Critical patent/CN110290033A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This application discloses a kind of methods for carrying out authentication based on trusted device, are applied to intelligent home network, comprising: setting trusted device list;In intelligent home network, when needing to carry out authentication to user, judged according to the trusted device list, if corresponding trusted device is verified in current intelligent home network, otherwise, verifying does not pass through.Using technical solution disclosed in the present application, the scene for needing authentication can easily be examined using equipment such as smart phone, Intelligent bracelet watches, to achieve the purpose that quickly complete verifying and not influence safety.

Description

A kind of method and apparatus carrying out authentication based on trusted device
Technical field
This application involves Smart Home technical field, in particular to a kind of side that authentication is carried out based on trusted device Method and equipment.
Background technique
Universal and perfect with smart home system, smart machine will be more and more in family.Smart phone, intelligence A series of intelligent appliance equipment such as plate, intelligent sound box, smart television, intelligent refrigerator, intelligent lighting even intelligent robot, group Has the house system of artificial intelligence at one.
Each smart machine has respective function, some functions, which do not need safety and authentication, to be operated, than Switch lamp, air-conditioning in such as smart home open operation.The unlatching of some functions preferably has the verifying of identity to increase peace Quan Xing, such as the unlatching of pay television channel, such as the payment operation of smart shopper etc..
Existing smart machine, general verification method have vocal print, recognition of face or fingerprint, as shown in Figure 1.
When vocal print has its limitation, such as flu, throat inflammation, the accuracy of identification will affect.Recognition of face Or fingerprint, then need equipment to carry camera and the cooperation of user.If user is interacted by intelligent sound box far field, It needs to carry out authentication, it is also necessary to which user walks close to camera and verifies.These above-mentioned methods all reduce under many scenes The intelligence experience of entire smart home.
So, how while not reducing safety progress authentication, the convenience of user is improved, is of the invention Consider emphasis.
Summary of the invention
This application provides a kind of method and apparatus that authentication is carried out based on trusted device, in smart home ring In border, using equipment such as smart phone, Intelligent bracelet watches, the scene for needing authentication is easily examined, thus Achieve the purpose that quickly complete verifying and does not influence safety.
This application discloses a kind of methods for carrying out authentication based on trusted device, are applied to intelligent home network, Include:
A, trusted device list is set;
B, in intelligent home network, when needing to carry out authentication to user, according to the trusted device list Judged, if corresponding trusted device is verified in current intelligent home network, otherwise, verifying does not pass through.
Preferably, including: the information and its corresponding permission of trusted device in the trusted device list.
Preferably, the B is specifically included:
When needing to carry out authentication to user, equipment to be verified sends authentication to smart home cloud network and asks It asks;
The smart home cloud network is according to the corresponding trusted device of the requested permission of the authentication request Whether judged online, if the corresponding trusted device is online, be verified, otherwise, verifying does not pass through.
Preferably, this method further include:
The smart home cloud network safeguards online list of devices and the trusted device list;
When having, smart machine newly enters the intelligent home network or existing smart machine exits the smart home net When network, the smart home cloud network updates the online equipment list.
Preferably, this method further include:
Judging result is returned to the equipment to be verified by the smart home cloud network;
The equipment to be verified shows the result of the authentication according to the result of the judgement.
Preferably, the B is specifically included:
When needing to carry out authentication to user, equipment to be verified is according to the online equipment list that obtains in real time and credible List of devices is appointed to be judged, if the corresponding trusted device of permission corresponding to the authentication is online, verifying is logical It crosses, otherwise, verifying does not pass through.
Preferably, this method further include:
The smart home cloud network safeguards online list of devices and the trusted device list;
When having, smart machine newly enters the intelligent home network or existing smart machine exits the smart home net When network, the smart home cloud network updates the online equipment list, and updated online equipment list is sent out in real time Give the smart machine in the intelligent home network.
Preferably, this method further include:
The equipment to be verified shows the result of the authentication according to the result of the judgement.
Disclosed herein as well is a kind of smart machines, are applied to intelligent home network, comprising: authentication module and displaying mould Block, in which:
The authentication module, for sending body to intelligent home network cloud when needing to carry out authentication to user Part checking request, and receive the authentication result that the smart home cloud network returns;Wherein, the authentication result The smart home cloud network is judged to obtain according to preset trusted device list, if corresponding trusted Equipment is then verified in current intelligent home network, and otherwise, verifying does not pass through;
The display module, for showing the authentication result.
Disclosed herein as well is a kind of smart home cloud network equipment, comprising: communication module and authentication module, in which:
The communication module, for receiving authentication request from smart machine;
The authentication module, for being judged according to preset trusted device list, if corresponding trusted is set Standby to be then verified in current intelligent home network, otherwise, verifying does not pass through;
The communication module is also used to the result of the judgement returning to the smart machine.
Preferably, the equipment further include: management module;
The management module, for safeguarding online list of devices and the trusted device list;When there is smart machine When newly exiting the intelligent home network into intelligent home network or existing smart machine, for updating the online equipment List.
Disclosed herein as well is a kind of smart machines, are applied to intelligent home network, comprising: authentication module and displaying mould Block, in which:
The authentication module, for being arranged according to the online equipment obtained in real time when needing to carry out authentication to user Table and trusted device list are judged, if trusted device corresponding to the authentication is online, are verified, Otherwise, verifying does not pass through;
The display module, for showing the authentication result.
Preferably, in the smart machine further include: communication module;
The communication module, for obtaining the online equipment list of real-time update from smart home cloud network.
As seen from the above technical solution, what the application proposed carries out the method for authentication based on trusted device and sets It is standby, the scenes such as authentication being related to when in intelligent home network using smart machine, using in intelligent home network Trusted device information carries out authority checking, to enormously simplify the authentications such as the payment in Intelligent household scene, authorization Link, while improving convenience, safety is also ensured, the user experience in perfect smart home.
Detailed description of the invention
Fig. 1 is the several method schematic diagram that user usually carries out authentication in the prior art;
Fig. 2 is that the present invention is based on the method flow schematic diagrams that trusted device carries out authentication;
Fig. 3 is the trusted device list schematic diagram of the application smart home system;
Fig. 4 is that the application cloud updates trusted device list and carries out the schematic diagram of authentication to user;
Fig. 5 be the application cloud by trusted list real-time synchronization give each smart machine, by equipment to be verified to user into The schematic diagram of row authentication;
Fig. 6 is the schematic diagram that one user of the embodiment of the present application carries out commodity purchasing in refrigerator Family Hub;
Two user of Fig. 7 the embodiment of the present application sees the schematic diagram of payment Football channel on TV;
The schematic diagram of three user of Fig. 8 the embodiment of the present application predetermined air ticket on intelligent sound box or intelligent robot;
The children of four subscriber household of Fig. 9 the embodiment of the present application open the schematic diagram that TV sees cartoon by intelligent sound box;
Five intruder of Figure 10 the embodiment of the present application attempts the schematic diagram using intelligent sound box;
Figure 11 is the composed structure schematic diagram of the preferable smart machine of the application one;
Figure 12 is the composed structure schematic diagram of the preferable smart home cloud network equipment of the application one;
Figure 13 is the composed structure schematic diagram of another preferable smart machine of the application.
Specific embodiment
It is right hereinafter, referring to the drawings and the embodiments, for the objects, technical solutions and advantages of the application are more clearly understood The application is described in further detail.
As previously mentioned, at present in smart home system, the method for being able to carry out authentication, be mostly Application on Voiceprint Recognition, Recognition of face or fingerprint recognition.All there is some drawbacks, such as the change of sound in these methods, old man be inconvenient to walk about or It needs to interact with mobile phone.The smart home system of these auth methods is applied, can greatly reduce user to intelligence The usage experience of house system or smart machine.
To solve the problems, such as that the prior art is deposited, the present invention proposes a kind of method based on trusted device authentication, Its main thought is:
In smart home or smart machine environment, using smart machines such as smart phones as the trusted of certain scene Equipment.When needing to verify, as long as trusted device in smart home environment, that is, is verified;Opposite, in smart home In environment, when needing to verify, if trusted device is verified and is not passed through not in current network.It is finally reached easily Authentication is completed on ground, improves the smart home experience of user.
According to above-mentioned main thought, the invention proposes a kind of methods for carrying out authentication based on trusted device, should The flow diagram of method is as shown in Fig. 2, mainly comprise the steps that
Step 201: setting trusted device list.
Step 202: in intelligent home network, when needing to carry out authentication to user, being set according to the trusted Standby list is judged, if corresponding trusted device is verified in current intelligent home network, otherwise, verifying Do not pass through.
On how to carry out authentication, this application provides two kinds of preferable modes: when equipment to be verified need to When family carries out authentication, request cloud is verified, alternatively, cloud pushes online trusted device list to each intelligence in real time Equipment is verified by the equipment to be verified according to the online trusted device list got.
Step 203: showing the result of authentication.
The specific implementation of above steps is described below below:
Step 201: setting trusted device list
User needs that corresponding trusted device list, Yong Huke is arranged for different situations in smart home system To carry out additions and deletions operation to trusted device list.Trusted device is mainly smart phone, Intelligent bracelet, intelligent wristwatch etc. can Mobile smart machine, for fixed smart television, intelligent sound box etc., it is not recommended that as trusted device, because it Have been in smart home environment, that is to say, that these smart machines are constantly in online in smart home environment Whether state can not judge user in smart home environment by their state.
A., trusted device list is set
It include the information and its corresponding permission of trusted device in trusted device list.
The trusted device list schematic diagram of one exemplary smart home system is as shown in figure 3, according to Fig. 3:
Trusted device includes: male master cellular phone 1, hostess's mobile phone 1, male owner's bracelet, hostess's bracelet, old man's hand Machine, other.Wherein:
The permission of male master cellular phone 1 includes: the payment of Family Hub in refrigerator, the unlatching football pay channel in TV With open TV, the payment in intelligent sound box and music APP member log in;Wherein, Family Hub is a shopping in refrigerator Application program;
The permission of hostess's mobile phone 1 includes: the payment of Family Hub in refrigerator, in TV opens TV, intelligent sound box In payment and music APP member log in;
The permission of male owner's bracelet includes: the payment of Family Hub in refrigerator, the unlatching football pay channel in TV;
The permission of male owner's bracelet includes: the payment of Family Hub in refrigerator, the unlatching football pay channel in TV;
The permission of hostess's bracelet includes: the payment of Family Hub in refrigerator;
The permission of older mobile phone includes: the emergency function in intelligent sound box;
Other smart machines do not have any permission.
B., the connection configuration of smart machine and smart home system is set
When smart machine is connected in smart home system, which is marked, registers, binding MAC The information such as location.Smart home system is set to trusted device to be selected.The cloud of smart home, which will save, all once to be connected It connects and by the facility information of user's mark.
Step 202: when certain equipment to be verified needs to carry out authentication to user, request cloud is verified, or Cloud pushes online equipment list to each smart machine in real time, by the equipment to be verified according to the online equipment list got into Row verifying.Wherein, equipment to be verified is the smart machine in smart home system.
In general, operated when the execution of user's indicating intelligent equipment is a certain (such as: payment) when, receive the smart machine of the instruction It is considered as " equipment to be verified ", which needs to carry out authentication to user, to determine whether user has correspondence Operating right.For authentication, the present invention provides following two preferable implementation method:
First method: the equipment to be verified sends authentication to smart home cloud network (can be also simply referred to as cloud) Whether request, determined by cloud according to the corresponding trusted device of the requested permission of authentication request online, if Trusted device is online, then is verified, and otherwise, verifying does not pass through, and verification result is notified the equipment to be verified.Such as: Verification result is carried in response message and is sent to equipment to be verified by cloud.
The schematic diagram of first method is as shown in Figure 4:
When smart television (smartTV as shown in the figure) needs to carry out authentication to user, authentication will be carried out Request be sent to smart home cloud.Cloud saves list of devices and trusted online in current intelligent home network List of devices is judged by cloud and retransmits response message to smart television.When there is smart machine newly to enter smart home net When network or existing smart machine exit intelligent home network, cloud updates online equipment list.
Second method: online list of devices is safeguarded in cloud, when there is smart machine newly to enter intelligent home network or existing When having smart machine to leave intelligent home network, i.e., notice is likely to require the smart machine for carrying out authentication.Due to each Smart machine has obtained the online situation of real-time trusted device, therefore, can carry out authentication to user in local, sentence Whether the corresponding trusted device of requested permission of breaking is online, if trusted device is online, is verified, and otherwise, tests Card does not pass through.
The schematic diagram of second method is as shown in Figure 5:
The real-time online trusted device list of preservation is sent to each smart machine by cloud, each smart machine saves simultaneously The authentication that may need to carry out to future.Process require that cloud record in real time newly join and depart network equipment it is clear It is single, and when changing, notice is likely to require the smart machine for carrying out authentication.
Step 203: the result of smart machine displaying authentication
According to the two different methods for completing authentication in step 202, corresponding step is also classified into two classes:
A. smart home cloud carries out authentication
Because cloud saves the list information of real-time online trusted device, checking request is sent to by equipment to be verified Cloud after cloud has carried out verifying, returns result to equipment to be verified, from the result that equipment to be verified returns to cloud to user Display.
B. local intelligent equipment carries out authentication
Local intelligent equipment saves online trusted device list in real time, without requesting to cloud.According to it is local Line trusted device list information can judge authentication that right rear line shows result.
Specific application scenarios are combined below by several preferred embodiments, technical scheme illustrate It is bright.
Embodiment one: user carries out commodity purchasing, small amount payment in the Family Hub of refrigerator.
The flow chart of the embodiment of the present application one is as shown in Figure 6, comprising:
It 1) is the trusted device of the Family Hub APP setting shopping payment verification of refrigerator under smart home environment Are as follows: Intelligent bracelet and smart phone.
2) after smart phone and Intelligent bracelet are gone home with user, intelligent home network, smart home system are connected automatically to The presence of system registration smart phone and Intelligent bracelet.
3) shopping channel that user opens FamilyHub in refrigerator buys beer.
When needing to pay, in the payment verification stage, refrigerator checks whether trusted device required for payment is online, works as hair The smart phone or Intelligent bracelet at current family nearby (in home network) when, i.e., judgement be true and my buying behavior, It is verified, pays successfully, buying behavior success.
Embodiment two: user sees payment Football channel on TV.
The flow chart of the embodiment of the present application two as shown in fig. 7, comprises:
2) after smart phone and Intelligent bracelet are gone home with user, intelligent home network, smart home system are connected automatically to The presence of system registration smart phone and Intelligent bracelet.
1) under smart home environment, in advance be TV be arranged TV shopping payment verification trusted device be male owner Intelligent wristwatch.
2) when male owner is after Intelligent bracelet is gone home with male owner, intelligent home network, smart home are connected automatically to The presence of system registry " male owner's intelligent wristwatch ".Then, male owner opens TV.
3) user is when seeing TV, program request payment Football channel program, in small amount payment Qualify Phase, TV discovery The intelligent wristwatch of male owner is nearby (in home network), i.e., judgement is true and user buying behavior, is verified, It pays successfully, buys successfully.
Embodiment three: user's predetermined air ticket on intelligent sound box or intelligent robot.
The flow chart of the embodiment of the present application three is as shown in Figure 8, comprising:
1) under smart home environment, it is male owner that trusted device, which is arranged, for intelligent sound box (or intelligent robot) in advance Intelligent wristwatch or the hostess smart phone.
2) male owner says intelligent sound box: " air ticket that one 2 pm of purchase goes to Pekinese ".
3) intelligent sound box finds that the intelligent wristwatch of male owner in intelligent home network, that is, determines in the payment verification stage It is the true buying behavior of user, is verified, small amount payment success is bought successfully.
Example IV: the children of subscriber household open tv animation slice channel by intelligent sound box and see cartoon.
The flow chart of the embodiment of the present application four is as shown in Figure 9, comprising:
1) under smart home environment, trusted is arranged in the authentication for opening TV in advance for intelligent sound box voice control Equipment is male owner's smart phone.
2) after child goes home, phonetic order " Hi, intelligent sound box open TV, watch animated films " is issued, the instruction is by intelligence Speaker is got.
3) intelligent sound box carries out authentication, and the mobile phone of the male owner of discovery is stayed out in the network of front yard, that is, judges that this request is lost It loses, verifying does not pass through, speech answering authentication failed, and TV opens failure.
Embodiment five: in the unmanned situation of user family, there are the intruders such as thief, intruder attempts through intelligent sound box to family IOT equipment operated.
The flow chart of the embodiment of the present application five is as shown in Figure 10, comprising:
1) in smart home environment, sensitive information inquiry in voice control home network is set for intelligent sound box in advance The trusted device of authentication is male owner's smart phone and hostess's smart phone.
2) intruder issues phonetic order: " Hi, intelligent sound box check nearest home photos " is to intelligent sound box.
3) intelligent sound box carries out authentication, and discovery trusted device " smart phone of user " is stayed out in the network of front yard, Authentication failed issues the sound result of refusal.
Embodiment six: user clicks on smart television opens certain APP for needing authentication.
1) in intelligent home network, be smart television preset trusted device be user mobile phone.
2) user while watching tv, opens certain APP, and APP setting needs authentication that can just open.
3) smart television carries out authentication, it is found that trusted device " smart phone of user " in home network, is tested It demonstrate,proves successfully.
4) APP is successfully opened.
Corresponding to the above method, present invention also provides corresponding equipment, say below to equipment provided by the invention It is bright.
Figure 11 is the composed structure schematic diagram of the preferable smart machine of the application one, which is applied to smart home net Network, comprising: authentication module and display module, in which:
The authentication module, for sending body to intelligent home network cloud when needing to carry out authentication to user Part checking request, and receive the authentication result that the smart home cloud network returns;Wherein, the authentication result The smart home cloud network is judged to obtain according to preset trusted device list, if corresponding trusted Equipment is then verified in current intelligent home network, and otherwise, verifying does not pass through;
The display module, for showing the authentication result.
Figure 12 is the composed structure schematic diagram of the preferable smart home cloud network equipment of the application one, which at least wraps It includes: communication module and authentication module, in which:
The communication module, for receiving authentication request from smart machine;
The authentication module, for being judged according to preset trusted device list, if corresponding trusted is set Standby to be then verified in current intelligent home network, otherwise, verifying does not pass through;
The communication module is also used to the result of the judgement returning to the smart machine.
Preferably, equipment shown in Figure 12 can also include management module, for safeguard online list of devices and it is described can Trusted devices list;When having, smart machine newly enters intelligent home network or existing smart machine exits the smart home net When network, for updating the online equipment list.
Figure 13 is the composed structure schematic diagram of another preferable smart machine of the application, which is applied to smart home Network includes at least: authentication module and display module, in which:
The authentication module, for being arranged according to the online equipment obtained in real time when needing to carry out authentication to user Table and trusted device list are judged, if trusted device corresponding to the authentication is online, are verified, Otherwise, verifying does not pass through;
The display module, for showing the authentication result.
Preferably, can also include: communication module in smart machine shown in Figure 13, which be used for from smart home The online equipment list of cloud network acquisition real-time update.
The foregoing is merely the preferred embodiments of the application, not to limit the application, all essences in the application Within mind and principle, any modification, equivalent substitution, improvement and etc. done be should be included within the scope of the application protection.

Claims (13)

1. a kind of method for carrying out authentication based on trusted device, is applied to intelligent home network, which is characterized in that packet It includes:
A, trusted device list is set;
B, it in intelligent home network, when needing to carry out authentication to user, is carried out according to the trusted device list Judgement, if corresponding trusted device is verified in current intelligent home network, otherwise, verifying does not pass through.
2. according to the method described in claim 1, it is characterized by:
It include: the information and its corresponding permission of trusted device in the trusted device list.
3. according to the method described in claim 2, it is characterized in that, the B is specifically included:
When needing to carry out authentication to user, equipment to be verified sends authentication request to smart home cloud network;
The smart home cloud network according to the corresponding trusted device of the requested permission of the authentication request whether Judged online, if the corresponding trusted device is online, be verified, otherwise, verifying does not pass through.
4. according to the method described in claim 3, it is characterized in that, this method further include:
The smart home cloud network safeguards online list of devices and the trusted device list;
When there is smart machine newly to exit the intelligent home network into the intelligent home network or existing smart machine, The smart home cloud network updates the online equipment list.
5. the method according to claim 3 or 4, which is characterized in that this method further include:
Judging result is returned to the equipment to be verified by the smart home cloud network;
The equipment to be verified shows the result of the authentication according to the result of the judgement.
6. according to the method described in claim 2, it is characterized in that, the B is specifically included:
When needing to carry out authentication to user, equipment to be verified is set according to the online equipment list obtained in real time and trusted Standby list is judged, if the corresponding trusted device of permission corresponding to the authentication is online, is verified, no Then, verifying does not pass through.
7. according to the method described in claim 6, it is characterized in that, this method further include:
The smart home cloud network safeguards online list of devices and the trusted device list;
When there is smart machine newly to exit the intelligent home network into the intelligent home network or existing smart machine, The smart home cloud network updates the online equipment list, and updated online equipment list is sent to institute in real time State the smart machine in intelligent home network.
8. method according to claim 6 or 7, which is characterized in that this method further include:
The equipment to be verified shows the result of the authentication according to the result of the judgement.
9. a kind of smart machine is applied to intelligent home network characterized by comprising authentication module and display module, In:
The authentication module, for sending identity to intelligent home network cloud and testing when needing to carry out authentication to user Card request, and receive the authentication result that the smart home cloud network returns;Wherein, the authentication is the result is that institute State what smart home cloud network was judged according to preset trusted device list, if corresponding trusted device It in current intelligent home network, is then verified, otherwise, verifying does not pass through;
The display module, for showing the authentication result.
10. a kind of smart home cloud network equipment characterized by comprising communication module and authentication module, in which:
The communication module, for receiving authentication request from smart machine;
The authentication module, for being judged according to preset trusted device list, if corresponding trusted device exists It in current intelligent home network, is then verified, otherwise, verifying does not pass through;
The communication module is also used to the result of the judgement returning to the smart machine.
11. smart home cloud network equipment according to claim 10, which is characterized in that the equipment further include: management Module;
The management module, for safeguarding online list of devices and the trusted device list;When have smart machine newly into Enter intelligent home network or when existing smart machine exits the intelligent home network, for updating the online equipment column Table.
12. a kind of smart machine is applied to intelligent home network characterized by comprising authentication module and display module, In:
The authentication module, for when needing to carry out authentication to user, according to the online equipment list that obtains in real time and Trusted device list is judged, if trusted device corresponding to the authentication is online, is verified, no Then, verifying does not pass through;
The display module, for showing the authentication result.
13. smart machine according to claim 12, which is characterized in that in the smart machine further include: communication module;
The communication module, for obtaining the online equipment list of real-time update from smart home cloud network.
CN201910548718.7A 2019-06-24 2019-06-24 A kind of method and apparatus carrying out authentication based on trusted device Pending CN110290033A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910548718.7A CN110290033A (en) 2019-06-24 2019-06-24 A kind of method and apparatus carrying out authentication based on trusted device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910548718.7A CN110290033A (en) 2019-06-24 2019-06-24 A kind of method and apparatus carrying out authentication based on trusted device

Publications (1)

Publication Number Publication Date
CN110290033A true CN110290033A (en) 2019-09-27

Family

ID=68004409

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910548718.7A Pending CN110290033A (en) 2019-06-24 2019-06-24 A kind of method and apparatus carrying out authentication based on trusted device

Country Status (1)

Country Link
CN (1) CN110290033A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112859620A (en) * 2019-11-12 2021-05-28 西门子(中国)有限公司 Safety protection method and device, smart home system and computer readable medium
CN113467388A (en) * 2020-07-14 2021-10-01 青岛海信电子产业控股股份有限公司 Intelligent household equipment control method and control equipment and intelligent household equipment
CN114648333A (en) * 2020-12-21 2022-06-21 花瓣云科技有限公司 Identity verification method, device and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104062921A (en) * 2014-06-27 2014-09-24 广州视源电子科技股份有限公司 Household appliance intelligent control method
CN104615004A (en) * 2014-12-31 2015-05-13 北京海尔广科数字技术有限公司 Intelligent household electrical appliance operating authorization control method and device
CN104714414A (en) * 2015-03-25 2015-06-17 小米科技有限责任公司 Smart home equipment control method and device and electronic equipment
US20160226674A1 (en) * 2014-12-31 2016-08-04 Xiaomi Inc. Method and apparatus for controlling smart device
CN108462697A (en) * 2018-02-07 2018-08-28 广东欧珀移动通信有限公司 Data processing method and device, electronic equipment, computer readable storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104062921A (en) * 2014-06-27 2014-09-24 广州视源电子科技股份有限公司 Household appliance intelligent control method
CN104615004A (en) * 2014-12-31 2015-05-13 北京海尔广科数字技术有限公司 Intelligent household electrical appliance operating authorization control method and device
US20160226674A1 (en) * 2014-12-31 2016-08-04 Xiaomi Inc. Method and apparatus for controlling smart device
CN104714414A (en) * 2015-03-25 2015-06-17 小米科技有限责任公司 Smart home equipment control method and device and electronic equipment
CN108462697A (en) * 2018-02-07 2018-08-28 广东欧珀移动通信有限公司 Data processing method and device, electronic equipment, computer readable storage medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112859620A (en) * 2019-11-12 2021-05-28 西门子(中国)有限公司 Safety protection method and device, smart home system and computer readable medium
CN112859620B (en) * 2019-11-12 2023-05-05 西门子(中国)有限公司 Security protection method, security protection device, intelligent home system and computer readable medium
CN113467388A (en) * 2020-07-14 2021-10-01 青岛海信电子产业控股股份有限公司 Intelligent household equipment control method and control equipment and intelligent household equipment
CN114648333A (en) * 2020-12-21 2022-06-21 花瓣云科技有限公司 Identity verification method, device and system
WO2022135203A1 (en) * 2020-12-21 2022-06-30 花瓣云科技有限公司 Identity verification method, apparatus and system

Similar Documents

Publication Publication Date Title
CN105818783B (en) Invasion vehicle-mounted to electronics responds
CN106850580B (en) A kind of automobile account system and account automatic verification method
CN107074174B (en) Method and system for remote access control
CN110290033A (en) A kind of method and apparatus carrying out authentication based on trusted device
CN107650863A (en) Vehicle sharing method and system
CN104091376B (en) Intelligent lock control method and apparatus thereof
CN105894627A (en) Bluetooth access control equipment and bluetooth access control management system and method
CN109711133A (en) Authentication method, device and the server of identity information
CN108174363A (en) Car searching method and device
CN111324672A (en) Block chain safety processing system and method
CN106846563A (en) Control method for vehicle and system, car key, vehicle and Vehicular system
CN107409278B (en) System and method for programming, controlling and monitoring a wireless network
CN105788047A (en) Bluetooth access control device, Bluetooth access control management system and Bluetooth access control management method
CN109712293A (en) Control method, mobile terminal and the readable storage medium storing program for executing of smart lock
CN105743931A (en) Control method and device applied to intelligent home platform
CN107042803A (en) The Vehicular system of wearable device control
CN108462697A (en) Data processing method and device, electronic equipment, computer readable storage medium
US11245523B2 (en) Method for implementing client side credential control to authorize access to a protected device
CN203350880U (en) POS safety certification device and system
CN110111460A (en) Visitor's method, apparatus and readable storage medium storing program for executing
US11238683B1 (en) Methods and apparatus for enabling digital identity support on legacy access control systems
CN108549804A (en) Mode switching method and device, computer readable storage medium, terminal
CN107623673A (en) The safe settling time value in connection equipment
CN106156549A (en) Application program authorization processing method and device
CN109413006A (en) Processing method, device, equipment and the machine readable media of account

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190927