CN110290033A - A kind of method and apparatus carrying out authentication based on trusted device - Google Patents
A kind of method and apparatus carrying out authentication based on trusted device Download PDFInfo
- Publication number
- CN110290033A CN110290033A CN201910548718.7A CN201910548718A CN110290033A CN 110290033 A CN110290033 A CN 110290033A CN 201910548718 A CN201910548718 A CN 201910548718A CN 110290033 A CN110290033 A CN 110290033A
- Authority
- CN
- China
- Prior art keywords
- authentication
- trusted device
- smart
- list
- equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
This application discloses a kind of methods for carrying out authentication based on trusted device, are applied to intelligent home network, comprising: setting trusted device list;In intelligent home network, when needing to carry out authentication to user, judged according to the trusted device list, if corresponding trusted device is verified in current intelligent home network, otherwise, verifying does not pass through.Using technical solution disclosed in the present application, the scene for needing authentication can easily be examined using equipment such as smart phone, Intelligent bracelet watches, to achieve the purpose that quickly complete verifying and not influence safety.
Description
Technical field
This application involves Smart Home technical field, in particular to a kind of side that authentication is carried out based on trusted device
Method and equipment.
Background technique
Universal and perfect with smart home system, smart machine will be more and more in family.Smart phone, intelligence
A series of intelligent appliance equipment such as plate, intelligent sound box, smart television, intelligent refrigerator, intelligent lighting even intelligent robot, group
Has the house system of artificial intelligence at one.
Each smart machine has respective function, some functions, which do not need safety and authentication, to be operated, than
Switch lamp, air-conditioning in such as smart home open operation.The unlatching of some functions preferably has the verifying of identity to increase peace
Quan Xing, such as the unlatching of pay television channel, such as the payment operation of smart shopper etc..
Existing smart machine, general verification method have vocal print, recognition of face or fingerprint, as shown in Figure 1.
When vocal print has its limitation, such as flu, throat inflammation, the accuracy of identification will affect.Recognition of face
Or fingerprint, then need equipment to carry camera and the cooperation of user.If user is interacted by intelligent sound box far field,
It needs to carry out authentication, it is also necessary to which user walks close to camera and verifies.These above-mentioned methods all reduce under many scenes
The intelligence experience of entire smart home.
So, how while not reducing safety progress authentication, the convenience of user is improved, is of the invention
Consider emphasis.
Summary of the invention
This application provides a kind of method and apparatus that authentication is carried out based on trusted device, in smart home ring
In border, using equipment such as smart phone, Intelligent bracelet watches, the scene for needing authentication is easily examined, thus
Achieve the purpose that quickly complete verifying and does not influence safety.
This application discloses a kind of methods for carrying out authentication based on trusted device, are applied to intelligent home network,
Include:
A, trusted device list is set;
B, in intelligent home network, when needing to carry out authentication to user, according to the trusted device list
Judged, if corresponding trusted device is verified in current intelligent home network, otherwise, verifying does not pass through.
Preferably, including: the information and its corresponding permission of trusted device in the trusted device list.
Preferably, the B is specifically included:
When needing to carry out authentication to user, equipment to be verified sends authentication to smart home cloud network and asks
It asks;
The smart home cloud network is according to the corresponding trusted device of the requested permission of the authentication request
Whether judged online, if the corresponding trusted device is online, be verified, otherwise, verifying does not pass through.
Preferably, this method further include:
The smart home cloud network safeguards online list of devices and the trusted device list;
When having, smart machine newly enters the intelligent home network or existing smart machine exits the smart home net
When network, the smart home cloud network updates the online equipment list.
Preferably, this method further include:
Judging result is returned to the equipment to be verified by the smart home cloud network;
The equipment to be verified shows the result of the authentication according to the result of the judgement.
Preferably, the B is specifically included:
When needing to carry out authentication to user, equipment to be verified is according to the online equipment list that obtains in real time and credible
List of devices is appointed to be judged, if the corresponding trusted device of permission corresponding to the authentication is online, verifying is logical
It crosses, otherwise, verifying does not pass through.
Preferably, this method further include:
The smart home cloud network safeguards online list of devices and the trusted device list;
When having, smart machine newly enters the intelligent home network or existing smart machine exits the smart home net
When network, the smart home cloud network updates the online equipment list, and updated online equipment list is sent out in real time
Give the smart machine in the intelligent home network.
Preferably, this method further include:
The equipment to be verified shows the result of the authentication according to the result of the judgement.
Disclosed herein as well is a kind of smart machines, are applied to intelligent home network, comprising: authentication module and displaying mould
Block, in which:
The authentication module, for sending body to intelligent home network cloud when needing to carry out authentication to user
Part checking request, and receive the authentication result that the smart home cloud network returns;Wherein, the authentication result
The smart home cloud network is judged to obtain according to preset trusted device list, if corresponding trusted
Equipment is then verified in current intelligent home network, and otherwise, verifying does not pass through;
The display module, for showing the authentication result.
Disclosed herein as well is a kind of smart home cloud network equipment, comprising: communication module and authentication module, in which:
The communication module, for receiving authentication request from smart machine;
The authentication module, for being judged according to preset trusted device list, if corresponding trusted is set
Standby to be then verified in current intelligent home network, otherwise, verifying does not pass through;
The communication module is also used to the result of the judgement returning to the smart machine.
Preferably, the equipment further include: management module;
The management module, for safeguarding online list of devices and the trusted device list;When there is smart machine
When newly exiting the intelligent home network into intelligent home network or existing smart machine, for updating the online equipment
List.
Disclosed herein as well is a kind of smart machines, are applied to intelligent home network, comprising: authentication module and displaying mould
Block, in which:
The authentication module, for being arranged according to the online equipment obtained in real time when needing to carry out authentication to user
Table and trusted device list are judged, if trusted device corresponding to the authentication is online, are verified,
Otherwise, verifying does not pass through;
The display module, for showing the authentication result.
Preferably, in the smart machine further include: communication module;
The communication module, for obtaining the online equipment list of real-time update from smart home cloud network.
As seen from the above technical solution, what the application proposed carries out the method for authentication based on trusted device and sets
It is standby, the scenes such as authentication being related to when in intelligent home network using smart machine, using in intelligent home network
Trusted device information carries out authority checking, to enormously simplify the authentications such as the payment in Intelligent household scene, authorization
Link, while improving convenience, safety is also ensured, the user experience in perfect smart home.
Detailed description of the invention
Fig. 1 is the several method schematic diagram that user usually carries out authentication in the prior art;
Fig. 2 is that the present invention is based on the method flow schematic diagrams that trusted device carries out authentication;
Fig. 3 is the trusted device list schematic diagram of the application smart home system;
Fig. 4 is that the application cloud updates trusted device list and carries out the schematic diagram of authentication to user;
Fig. 5 be the application cloud by trusted list real-time synchronization give each smart machine, by equipment to be verified to user into
The schematic diagram of row authentication;
Fig. 6 is the schematic diagram that one user of the embodiment of the present application carries out commodity purchasing in refrigerator Family Hub;
Two user of Fig. 7 the embodiment of the present application sees the schematic diagram of payment Football channel on TV;
The schematic diagram of three user of Fig. 8 the embodiment of the present application predetermined air ticket on intelligent sound box or intelligent robot;
The children of four subscriber household of Fig. 9 the embodiment of the present application open the schematic diagram that TV sees cartoon by intelligent sound box;
Five intruder of Figure 10 the embodiment of the present application attempts the schematic diagram using intelligent sound box;
Figure 11 is the composed structure schematic diagram of the preferable smart machine of the application one;
Figure 12 is the composed structure schematic diagram of the preferable smart home cloud network equipment of the application one;
Figure 13 is the composed structure schematic diagram of another preferable smart machine of the application.
Specific embodiment
It is right hereinafter, referring to the drawings and the embodiments, for the objects, technical solutions and advantages of the application are more clearly understood
The application is described in further detail.
As previously mentioned, at present in smart home system, the method for being able to carry out authentication, be mostly Application on Voiceprint Recognition,
Recognition of face or fingerprint recognition.All there is some drawbacks, such as the change of sound in these methods, old man be inconvenient to walk about or
It needs to interact with mobile phone.The smart home system of these auth methods is applied, can greatly reduce user to intelligence
The usage experience of house system or smart machine.
To solve the problems, such as that the prior art is deposited, the present invention proposes a kind of method based on trusted device authentication,
Its main thought is:
In smart home or smart machine environment, using smart machines such as smart phones as the trusted of certain scene
Equipment.When needing to verify, as long as trusted device in smart home environment, that is, is verified;Opposite, in smart home
In environment, when needing to verify, if trusted device is verified and is not passed through not in current network.It is finally reached easily
Authentication is completed on ground, improves the smart home experience of user.
According to above-mentioned main thought, the invention proposes a kind of methods for carrying out authentication based on trusted device, should
The flow diagram of method is as shown in Fig. 2, mainly comprise the steps that
Step 201: setting trusted device list.
Step 202: in intelligent home network, when needing to carry out authentication to user, being set according to the trusted
Standby list is judged, if corresponding trusted device is verified in current intelligent home network, otherwise, verifying
Do not pass through.
On how to carry out authentication, this application provides two kinds of preferable modes: when equipment to be verified need to
When family carries out authentication, request cloud is verified, alternatively, cloud pushes online trusted device list to each intelligence in real time
Equipment is verified by the equipment to be verified according to the online trusted device list got.
Step 203: showing the result of authentication.
The specific implementation of above steps is described below below:
Step 201: setting trusted device list
User needs that corresponding trusted device list, Yong Huke is arranged for different situations in smart home system
To carry out additions and deletions operation to trusted device list.Trusted device is mainly smart phone, Intelligent bracelet, intelligent wristwatch etc. can
Mobile smart machine, for fixed smart television, intelligent sound box etc., it is not recommended that as trusted device, because it
Have been in smart home environment, that is to say, that these smart machines are constantly in online in smart home environment
Whether state can not judge user in smart home environment by their state.
A., trusted device list is set
It include the information and its corresponding permission of trusted device in trusted device list.
The trusted device list schematic diagram of one exemplary smart home system is as shown in figure 3, according to Fig. 3:
Trusted device includes: male master cellular phone 1, hostess's mobile phone 1, male owner's bracelet, hostess's bracelet, old man's hand
Machine, other.Wherein:
The permission of male master cellular phone 1 includes: the payment of Family Hub in refrigerator, the unlatching football pay channel in TV
With open TV, the payment in intelligent sound box and music APP member log in;Wherein, Family Hub is a shopping in refrigerator
Application program;
The permission of hostess's mobile phone 1 includes: the payment of Family Hub in refrigerator, in TV opens TV, intelligent sound box
In payment and music APP member log in;
The permission of male owner's bracelet includes: the payment of Family Hub in refrigerator, the unlatching football pay channel in TV;
The permission of male owner's bracelet includes: the payment of Family Hub in refrigerator, the unlatching football pay channel in TV;
The permission of hostess's bracelet includes: the payment of Family Hub in refrigerator;
The permission of older mobile phone includes: the emergency function in intelligent sound box;
Other smart machines do not have any permission.
B., the connection configuration of smart machine and smart home system is set
When smart machine is connected in smart home system, which is marked, registers, binding MAC
The information such as location.Smart home system is set to trusted device to be selected.The cloud of smart home, which will save, all once to be connected
It connects and by the facility information of user's mark.
Step 202: when certain equipment to be verified needs to carry out authentication to user, request cloud is verified, or
Cloud pushes online equipment list to each smart machine in real time, by the equipment to be verified according to the online equipment list got into
Row verifying.Wherein, equipment to be verified is the smart machine in smart home system.
In general, operated when the execution of user's indicating intelligent equipment is a certain (such as: payment) when, receive the smart machine of the instruction
It is considered as " equipment to be verified ", which needs to carry out authentication to user, to determine whether user has correspondence
Operating right.For authentication, the present invention provides following two preferable implementation method:
First method: the equipment to be verified sends authentication to smart home cloud network (can be also simply referred to as cloud)
Whether request, determined by cloud according to the corresponding trusted device of the requested permission of authentication request online, if
Trusted device is online, then is verified, and otherwise, verifying does not pass through, and verification result is notified the equipment to be verified.Such as:
Verification result is carried in response message and is sent to equipment to be verified by cloud.
The schematic diagram of first method is as shown in Figure 4:
When smart television (smartTV as shown in the figure) needs to carry out authentication to user, authentication will be carried out
Request be sent to smart home cloud.Cloud saves list of devices and trusted online in current intelligent home network
List of devices is judged by cloud and retransmits response message to smart television.When there is smart machine newly to enter smart home net
When network or existing smart machine exit intelligent home network, cloud updates online equipment list.
Second method: online list of devices is safeguarded in cloud, when there is smart machine newly to enter intelligent home network or existing
When having smart machine to leave intelligent home network, i.e., notice is likely to require the smart machine for carrying out authentication.Due to each
Smart machine has obtained the online situation of real-time trusted device, therefore, can carry out authentication to user in local, sentence
Whether the corresponding trusted device of requested permission of breaking is online, if trusted device is online, is verified, and otherwise, tests
Card does not pass through.
The schematic diagram of second method is as shown in Figure 5:
The real-time online trusted device list of preservation is sent to each smart machine by cloud, each smart machine saves simultaneously
The authentication that may need to carry out to future.Process require that cloud record in real time newly join and depart network equipment it is clear
It is single, and when changing, notice is likely to require the smart machine for carrying out authentication.
Step 203: the result of smart machine displaying authentication
According to the two different methods for completing authentication in step 202, corresponding step is also classified into two classes:
A. smart home cloud carries out authentication
Because cloud saves the list information of real-time online trusted device, checking request is sent to by equipment to be verified
Cloud after cloud has carried out verifying, returns result to equipment to be verified, from the result that equipment to be verified returns to cloud to user
Display.
B. local intelligent equipment carries out authentication
Local intelligent equipment saves online trusted device list in real time, without requesting to cloud.According to it is local
Line trusted device list information can judge authentication that right rear line shows result.
Specific application scenarios are combined below by several preferred embodiments, technical scheme illustrate
It is bright.
Embodiment one: user carries out commodity purchasing, small amount payment in the Family Hub of refrigerator.
The flow chart of the embodiment of the present application one is as shown in Figure 6, comprising:
It 1) is the trusted device of the Family Hub APP setting shopping payment verification of refrigerator under smart home environment
Are as follows: Intelligent bracelet and smart phone.
2) after smart phone and Intelligent bracelet are gone home with user, intelligent home network, smart home system are connected automatically to
The presence of system registration smart phone and Intelligent bracelet.
3) shopping channel that user opens FamilyHub in refrigerator buys beer.
When needing to pay, in the payment verification stage, refrigerator checks whether trusted device required for payment is online, works as hair
The smart phone or Intelligent bracelet at current family nearby (in home network) when, i.e., judgement be true and my buying behavior,
It is verified, pays successfully, buying behavior success.
Embodiment two: user sees payment Football channel on TV.
The flow chart of the embodiment of the present application two as shown in fig. 7, comprises:
2) after smart phone and Intelligent bracelet are gone home with user, intelligent home network, smart home system are connected automatically to
The presence of system registration smart phone and Intelligent bracelet.
1) under smart home environment, in advance be TV be arranged TV shopping payment verification trusted device be male owner
Intelligent wristwatch.
2) when male owner is after Intelligent bracelet is gone home with male owner, intelligent home network, smart home are connected automatically to
The presence of system registry " male owner's intelligent wristwatch ".Then, male owner opens TV.
3) user is when seeing TV, program request payment Football channel program, in small amount payment Qualify Phase, TV discovery
The intelligent wristwatch of male owner is nearby (in home network), i.e., judgement is true and user buying behavior, is verified,
It pays successfully, buys successfully.
Embodiment three: user's predetermined air ticket on intelligent sound box or intelligent robot.
The flow chart of the embodiment of the present application three is as shown in Figure 8, comprising:
1) under smart home environment, it is male owner that trusted device, which is arranged, for intelligent sound box (or intelligent robot) in advance
Intelligent wristwatch or the hostess smart phone.
2) male owner says intelligent sound box: " air ticket that one 2 pm of purchase goes to Pekinese ".
3) intelligent sound box finds that the intelligent wristwatch of male owner in intelligent home network, that is, determines in the payment verification stage
It is the true buying behavior of user, is verified, small amount payment success is bought successfully.
Example IV: the children of subscriber household open tv animation slice channel by intelligent sound box and see cartoon.
The flow chart of the embodiment of the present application four is as shown in Figure 9, comprising:
1) under smart home environment, trusted is arranged in the authentication for opening TV in advance for intelligent sound box voice control
Equipment is male owner's smart phone.
2) after child goes home, phonetic order " Hi, intelligent sound box open TV, watch animated films " is issued, the instruction is by intelligence
Speaker is got.
3) intelligent sound box carries out authentication, and the mobile phone of the male owner of discovery is stayed out in the network of front yard, that is, judges that this request is lost
It loses, verifying does not pass through, speech answering authentication failed, and TV opens failure.
Embodiment five: in the unmanned situation of user family, there are the intruders such as thief, intruder attempts through intelligent sound box to family
IOT equipment operated.
The flow chart of the embodiment of the present application five is as shown in Figure 10, comprising:
1) in smart home environment, sensitive information inquiry in voice control home network is set for intelligent sound box in advance
The trusted device of authentication is male owner's smart phone and hostess's smart phone.
2) intruder issues phonetic order: " Hi, intelligent sound box check nearest home photos " is to intelligent sound box.
3) intelligent sound box carries out authentication, and discovery trusted device " smart phone of user " is stayed out in the network of front yard,
Authentication failed issues the sound result of refusal.
Embodiment six: user clicks on smart television opens certain APP for needing authentication.
1) in intelligent home network, be smart television preset trusted device be user mobile phone.
2) user while watching tv, opens certain APP, and APP setting needs authentication that can just open.
3) smart television carries out authentication, it is found that trusted device " smart phone of user " in home network, is tested
It demonstrate,proves successfully.
4) APP is successfully opened.
Corresponding to the above method, present invention also provides corresponding equipment, say below to equipment provided by the invention
It is bright.
Figure 11 is the composed structure schematic diagram of the preferable smart machine of the application one, which is applied to smart home net
Network, comprising: authentication module and display module, in which:
The authentication module, for sending body to intelligent home network cloud when needing to carry out authentication to user
Part checking request, and receive the authentication result that the smart home cloud network returns;Wherein, the authentication result
The smart home cloud network is judged to obtain according to preset trusted device list, if corresponding trusted
Equipment is then verified in current intelligent home network, and otherwise, verifying does not pass through;
The display module, for showing the authentication result.
Figure 12 is the composed structure schematic diagram of the preferable smart home cloud network equipment of the application one, which at least wraps
It includes: communication module and authentication module, in which:
The communication module, for receiving authentication request from smart machine;
The authentication module, for being judged according to preset trusted device list, if corresponding trusted is set
Standby to be then verified in current intelligent home network, otherwise, verifying does not pass through;
The communication module is also used to the result of the judgement returning to the smart machine.
Preferably, equipment shown in Figure 12 can also include management module, for safeguard online list of devices and it is described can
Trusted devices list;When having, smart machine newly enters intelligent home network or existing smart machine exits the smart home net
When network, for updating the online equipment list.
Figure 13 is the composed structure schematic diagram of another preferable smart machine of the application, which is applied to smart home
Network includes at least: authentication module and display module, in which:
The authentication module, for being arranged according to the online equipment obtained in real time when needing to carry out authentication to user
Table and trusted device list are judged, if trusted device corresponding to the authentication is online, are verified,
Otherwise, verifying does not pass through;
The display module, for showing the authentication result.
Preferably, can also include: communication module in smart machine shown in Figure 13, which be used for from smart home
The online equipment list of cloud network acquisition real-time update.
The foregoing is merely the preferred embodiments of the application, not to limit the application, all essences in the application
Within mind and principle, any modification, equivalent substitution, improvement and etc. done be should be included within the scope of the application protection.
Claims (13)
1. a kind of method for carrying out authentication based on trusted device, is applied to intelligent home network, which is characterized in that packet
It includes:
A, trusted device list is set;
B, it in intelligent home network, when needing to carry out authentication to user, is carried out according to the trusted device list
Judgement, if corresponding trusted device is verified in current intelligent home network, otherwise, verifying does not pass through.
2. according to the method described in claim 1, it is characterized by:
It include: the information and its corresponding permission of trusted device in the trusted device list.
3. according to the method described in claim 2, it is characterized in that, the B is specifically included:
When needing to carry out authentication to user, equipment to be verified sends authentication request to smart home cloud network;
The smart home cloud network according to the corresponding trusted device of the requested permission of the authentication request whether
Judged online, if the corresponding trusted device is online, be verified, otherwise, verifying does not pass through.
4. according to the method described in claim 3, it is characterized in that, this method further include:
The smart home cloud network safeguards online list of devices and the trusted device list;
When there is smart machine newly to exit the intelligent home network into the intelligent home network or existing smart machine,
The smart home cloud network updates the online equipment list.
5. the method according to claim 3 or 4, which is characterized in that this method further include:
Judging result is returned to the equipment to be verified by the smart home cloud network;
The equipment to be verified shows the result of the authentication according to the result of the judgement.
6. according to the method described in claim 2, it is characterized in that, the B is specifically included:
When needing to carry out authentication to user, equipment to be verified is set according to the online equipment list obtained in real time and trusted
Standby list is judged, if the corresponding trusted device of permission corresponding to the authentication is online, is verified, no
Then, verifying does not pass through.
7. according to the method described in claim 6, it is characterized in that, this method further include:
The smart home cloud network safeguards online list of devices and the trusted device list;
When there is smart machine newly to exit the intelligent home network into the intelligent home network or existing smart machine,
The smart home cloud network updates the online equipment list, and updated online equipment list is sent to institute in real time
State the smart machine in intelligent home network.
8. method according to claim 6 or 7, which is characterized in that this method further include:
The equipment to be verified shows the result of the authentication according to the result of the judgement.
9. a kind of smart machine is applied to intelligent home network characterized by comprising authentication module and display module,
In:
The authentication module, for sending identity to intelligent home network cloud and testing when needing to carry out authentication to user
Card request, and receive the authentication result that the smart home cloud network returns;Wherein, the authentication is the result is that institute
State what smart home cloud network was judged according to preset trusted device list, if corresponding trusted device
It in current intelligent home network, is then verified, otherwise, verifying does not pass through;
The display module, for showing the authentication result.
10. a kind of smart home cloud network equipment characterized by comprising communication module and authentication module, in which:
The communication module, for receiving authentication request from smart machine;
The authentication module, for being judged according to preset trusted device list, if corresponding trusted device exists
It in current intelligent home network, is then verified, otherwise, verifying does not pass through;
The communication module is also used to the result of the judgement returning to the smart machine.
11. smart home cloud network equipment according to claim 10, which is characterized in that the equipment further include: management
Module;
The management module, for safeguarding online list of devices and the trusted device list;When have smart machine newly into
Enter intelligent home network or when existing smart machine exits the intelligent home network, for updating the online equipment column
Table.
12. a kind of smart machine is applied to intelligent home network characterized by comprising authentication module and display module,
In:
The authentication module, for when needing to carry out authentication to user, according to the online equipment list that obtains in real time and
Trusted device list is judged, if trusted device corresponding to the authentication is online, is verified, no
Then, verifying does not pass through;
The display module, for showing the authentication result.
13. smart machine according to claim 12, which is characterized in that in the smart machine further include: communication module;
The communication module, for obtaining the online equipment list of real-time update from smart home cloud network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910548718.7A CN110290033A (en) | 2019-06-24 | 2019-06-24 | A kind of method and apparatus carrying out authentication based on trusted device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910548718.7A CN110290033A (en) | 2019-06-24 | 2019-06-24 | A kind of method and apparatus carrying out authentication based on trusted device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110290033A true CN110290033A (en) | 2019-09-27 |
Family
ID=68004409
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910548718.7A Pending CN110290033A (en) | 2019-06-24 | 2019-06-24 | A kind of method and apparatus carrying out authentication based on trusted device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110290033A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112859620A (en) * | 2019-11-12 | 2021-05-28 | 西门子(中国)有限公司 | Safety protection method and device, smart home system and computer readable medium |
CN113467388A (en) * | 2020-07-14 | 2021-10-01 | 青岛海信电子产业控股股份有限公司 | Intelligent household equipment control method and control equipment and intelligent household equipment |
CN114648333A (en) * | 2020-12-21 | 2022-06-21 | 花瓣云科技有限公司 | Identity verification method, device and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104062921A (en) * | 2014-06-27 | 2014-09-24 | 广州视源电子科技股份有限公司 | Household appliance intelligent control method |
CN104615004A (en) * | 2014-12-31 | 2015-05-13 | 北京海尔广科数字技术有限公司 | Intelligent household electrical appliance operating authorization control method and device |
CN104714414A (en) * | 2015-03-25 | 2015-06-17 | 小米科技有限责任公司 | Smart home equipment control method and device and electronic equipment |
US20160226674A1 (en) * | 2014-12-31 | 2016-08-04 | Xiaomi Inc. | Method and apparatus for controlling smart device |
CN108462697A (en) * | 2018-02-07 | 2018-08-28 | 广东欧珀移动通信有限公司 | Data processing method and device, electronic equipment, computer readable storage medium |
-
2019
- 2019-06-24 CN CN201910548718.7A patent/CN110290033A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104062921A (en) * | 2014-06-27 | 2014-09-24 | 广州视源电子科技股份有限公司 | Household appliance intelligent control method |
CN104615004A (en) * | 2014-12-31 | 2015-05-13 | 北京海尔广科数字技术有限公司 | Intelligent household electrical appliance operating authorization control method and device |
US20160226674A1 (en) * | 2014-12-31 | 2016-08-04 | Xiaomi Inc. | Method and apparatus for controlling smart device |
CN104714414A (en) * | 2015-03-25 | 2015-06-17 | 小米科技有限责任公司 | Smart home equipment control method and device and electronic equipment |
CN108462697A (en) * | 2018-02-07 | 2018-08-28 | 广东欧珀移动通信有限公司 | Data processing method and device, electronic equipment, computer readable storage medium |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112859620A (en) * | 2019-11-12 | 2021-05-28 | 西门子(中国)有限公司 | Safety protection method and device, smart home system and computer readable medium |
CN112859620B (en) * | 2019-11-12 | 2023-05-05 | 西门子(中国)有限公司 | Security protection method, security protection device, intelligent home system and computer readable medium |
CN113467388A (en) * | 2020-07-14 | 2021-10-01 | 青岛海信电子产业控股股份有限公司 | Intelligent household equipment control method and control equipment and intelligent household equipment |
CN114648333A (en) * | 2020-12-21 | 2022-06-21 | 花瓣云科技有限公司 | Identity verification method, device and system |
WO2022135203A1 (en) * | 2020-12-21 | 2022-06-30 | 花瓣云科技有限公司 | Identity verification method, apparatus and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105818783B (en) | Invasion vehicle-mounted to electronics responds | |
CN106850580B (en) | A kind of automobile account system and account automatic verification method | |
CN107074174B (en) | Method and system for remote access control | |
CN110290033A (en) | A kind of method and apparatus carrying out authentication based on trusted device | |
CN107650863A (en) | Vehicle sharing method and system | |
CN104091376B (en) | Intelligent lock control method and apparatus thereof | |
CN105894627A (en) | Bluetooth access control equipment and bluetooth access control management system and method | |
CN109711133A (en) | Authentication method, device and the server of identity information | |
CN108174363A (en) | Car searching method and device | |
CN111324672A (en) | Block chain safety processing system and method | |
CN106846563A (en) | Control method for vehicle and system, car key, vehicle and Vehicular system | |
CN107409278B (en) | System and method for programming, controlling and monitoring a wireless network | |
CN105788047A (en) | Bluetooth access control device, Bluetooth access control management system and Bluetooth access control management method | |
CN109712293A (en) | Control method, mobile terminal and the readable storage medium storing program for executing of smart lock | |
CN105743931A (en) | Control method and device applied to intelligent home platform | |
CN107042803A (en) | The Vehicular system of wearable device control | |
CN108462697A (en) | Data processing method and device, electronic equipment, computer readable storage medium | |
US11245523B2 (en) | Method for implementing client side credential control to authorize access to a protected device | |
CN203350880U (en) | POS safety certification device and system | |
CN110111460A (en) | Visitor's method, apparatus and readable storage medium storing program for executing | |
US11238683B1 (en) | Methods and apparatus for enabling digital identity support on legacy access control systems | |
CN108549804A (en) | Mode switching method and device, computer readable storage medium, terminal | |
CN107623673A (en) | The safe settling time value in connection equipment | |
CN106156549A (en) | Application program authorization processing method and device | |
CN109413006A (en) | Processing method, device, equipment and the machine readable media of account |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190927 |