CN110611903A - Equipment binding method, device, equipment and storage medium - Google Patents

Equipment binding method, device, equipment and storage medium Download PDF

Info

Publication number
CN110611903A
CN110611903A CN201810623617.7A CN201810623617A CN110611903A CN 110611903 A CN110611903 A CN 110611903A CN 201810623617 A CN201810623617 A CN 201810623617A CN 110611903 A CN110611903 A CN 110611903A
Authority
CN
China
Prior art keywords
binding
equipment
server
near field
field communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810623617.7A
Other languages
Chinese (zh)
Other versions
CN110611903B (en
Inventor
刘威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201810623617.7A priority Critical patent/CN110611903B/en
Publication of CN110611903A publication Critical patent/CN110611903A/en
Application granted granted Critical
Publication of CN110611903B publication Critical patent/CN110611903B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup

Abstract

The embodiment of the invention provides a device binding method, a device and a storage medium, wherein the method comprises the following steps: starting a near field communication module based on a first broadcast identifier sent by a server, and entering a bindable state; establishing connection with a second device through the near field communication module, and authenticating; and if the authentication is passed, completing the binding with the second equipment.

Description

Equipment binding method, device, equipment and storage medium
Technical Field
The present invention relates to the field of network technologies, and in particular, to, but not limited to, a device binding method, apparatus, device, and storage medium.
Background
Along with the development of science and technology, various intelligent devices are more and more, for example intelligent wrist-watch, intelligent bracelet, intelligent lock, tracker etc.. Such products often need to be managed by means of another device, typically a smartphone. After a computer Application program (APP) is installed on the smart phone and is bound with the smart device, all functions of the smart device can be controlled through the APP. Therefore, how to safely and quickly complete the binding is the most basic function to be solved by such products.
At present, a common device binding method is to display a unique binding identifier of a bound device in a two-dimensional code or bar code manner, and then the smart phone completes binding by scanning a code. However, by adopting the existing equipment binding method, the two-dimension code of the bound equipment is open and can be acquired by anyone, so that the bound equipment is easily maliciously bound and the use of a real user is influenced; in addition, the two-dimensional code is generally printed on the device shell or the packaging box, and if the two-dimensional code label is damaged or lost, the user can be bound again to cause troubles.
Disclosure of Invention
Embodiments of the present invention provide an apparatus binding method, an apparatus, and a storage medium, which can avoid a malicious binding event caused by leakage of a binding identifier of a bound apparatus, and reduce apparatus cost without providing external tags such as a two-dimensional code.
The technical scheme of the embodiment of the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides a device binding method, which is applied to a first device of a bound device, and the method includes:
starting a near field communication module based on the first broadcast identifier sent by the server, and entering a pre-binding program;
establishing physical connection with a second device through the near field communication module, and authenticating;
and if the authentication is passed, completing the binding with the second equipment.
In other embodiments, the method further comprises:
sending a first binding request to the server, the first binding request including an identification of the first device; receiving a first broadcast identification transmitted by a server based on the first binding request;
alternatively, the first and second electrodes may be,
the method for starting the near field communication module based on the first broadcast identifier sent by the server and entering the pre-binding program comprises the following steps:
when the first broadcast identification is received, the first equipment starts a near field communication module and is in an unbound state;
and when receiving the binding notification sent by the server, the first equipment is changed from the non-bindable state to the bindable state.
In other embodiments, the creating, by the near field communication module, a connection with a second device and performing authentication includes:
after the physical connection between the near field communication module and the second equipment is established, forbidding to establish data connection between the near field communication module and the second equipment in a near field communication mode, and receiving a second key sent by the second equipment in the near field communication mode;
generating a first key based on a predefined algorithm;
when the first key is matched with the second key, the authentication is passed;
the method further comprises the following steps: and after the authentication is passed, establishing data connection with the second equipment by adopting a near field communication mode.
In other embodiments, the method further comprises:
determining a first time, wherein the first time is a time when the first device changes to the bindable state, or a time when a first broadcast identifier is received;
determining a second moment according to the first moment and a preset validity period;
determining a third time instant at which the second key is received;
if the third time is before the second time, and when the first key is matched with the second key, the authentication is passed;
and if the third time is after the second time, the authentication fails.
In other embodiments, the method further comprises:
when binding with the second device is completed, the first device changes from the bindable state to a bound state;
the first device communicates with the second device through a server or communicates with the second device through a near field communication mode.
In other embodiments, the method further comprises:
determining a number of second devices bound to the first device;
if the number of the second devices reaches a preset threshold value, the first device is in an unbound state;
if the number of the second devices does not reach a preset threshold value, starting a near field communication module based on a second broadcast identifier sent by a server, and entering a bindable state;
establishing connection with another second device through the near field communication module, and authenticating;
and if the authentication is passed, completing the binding with the other second equipment.
In a second aspect, an embodiment of the present invention provides a device binding method, which is applied to a second device serving as a bound device, and the method includes:
sending a first broadcast identifier determined by a broadcast identifier set searched by the server to the server;
receiving an identification of the first device transmitted by the server based on the first broadcast identification;
establishing connection with the first equipment through a near field communication module, and authenticating;
and if the authentication is passed, finishing the binding with the first equipment.
In other embodiments, the method further comprises:
receiving a predefined rule sent by the server;
and searching the broadcast identification set according to the predefined rule, wherein the broadcast identification set comprises at least one broadcast identification.
In other embodiments, the creating a connection with the first device through the near field communication module and performing authentication includes:
generating a second key based on a predefined algorithm, and sending the second key to the first device in a near field communication mode;
and when the first equipment passes the authentication based on the second secret key, receiving an authentication passing notice sent by the first equipment.
In a third aspect, an embodiment of the present invention provides an apparatus binding method, which is applied to a server, and the method includes:
sending a predefined rule to a second device, and receiving the first broadcast identification sent by the second device;
informing the first equipment corresponding to the first broadcast identification to enter a bindable state;
sending the identifier of the first device corresponding to the first broadcast identifier to the second device;
and receiving a binding success notification sent by the second equipment, and establishing a mapping relation between the first equipment and the second equipment.
In other embodiments, the method further comprises:
receiving a first binding request sent by the first device, wherein the first binding request comprises an identifier of the first device;
transmitting a first broadcast identification to the first device based on the first binding request.
In other embodiments, said sending a first broadcast identification to the first device based on the first binding request comprises:
when the server receives the first binding request sent by the first device, the server generates the first broadcast identifier according to the predefined rule;
and sending the first broadcast identification to the first equipment.
In a fourth aspect, an embodiment of the present invention provides an apparatus for binding devices, which is applied to a first device of a bound device, and the apparatus includes:
the near field communication module starting unit is used for starting the near field communication module based on the first broadcast identifier sent by the server and enabling the first equipment to enter a pre-binding program;
the first establishing connection unit is used for establishing physical connection with the second equipment through the near field communication module and authenticating;
and the first binding completion unit is used for completing the binding with the second equipment when the authentication is passed.
In a fifth aspect, an embodiment of the present invention provides an apparatus for binding devices, where the apparatus is applied to a second device serving as a binding device, and the apparatus includes:
the first sending unit is used for sending a first broadcast identifier determined by a broadcast identifier set searched by the first sending unit to the server;
a first receiving unit, configured to receive an identifier of a first device transmitted by a server based on the first broadcast identifier;
the second establishing connection unit is used for establishing connection with the first equipment through the near field communication module and authenticating;
and the second binding completion unit is used for completing the binding with the second equipment when the authentication is passed.
In a sixth aspect, an embodiment of the present invention provides an apparatus for binding devices, where the apparatus is applied to a server, and the apparatus includes:
a second sending unit, configured to send the predefined rule to the second device;
a second receiving unit, configured to receive a first broadcast identifier sent by the second device;
a notification unit, configured to notify a first device corresponding to the first broadcast identifier to enter a bindable state;
a third sending unit, configured to send, to the second device, an identifier of the first device corresponding to the first broadcast identifier;
a third receiving unit, configured to receive a binding success notification sent by the second device;
and the mapping relation establishing unit is used for establishing the mapping relation between the first equipment and the second equipment.
In a seventh aspect, an embodiment of the present invention provides an electronic device, where the electronic device at least includes: a processor and a storage medium configured to store executable instructions, wherein: the processor is configured to execute stored executable instructions;
the executable instruction is configured to execute the device binding method of the first device side, the second device side or the server side.
In an eighth aspect, an embodiment of the present invention provides a computer-readable storage medium, in which computer-executable instructions are stored, and the computer-executable instructions are configured to execute the above-mentioned device binding method.
The embodiment of the invention provides a device binding method, a device and a storage medium, wherein the method comprises the following steps: starting a near field communication module based on a first broadcast identifier sent by a server, and entering a pre-binding program; establishing physical connection with a second device through the near field communication module, and authenticating; and if the authentication is passed, completing the binding with the second equipment. Therefore, the method provided by the embodiment of the invention does not need to provide external tags such as two-dimensional codes and the like, so that the equipment cost can be reduced, malicious binding events caused by the leakage of the identifier of the first equipment can be avoided, the whole binding process can be fully automated, the binding process is more convenient and faster, and the user experience can be effectively improved.
Drawings
In the drawings, which are not necessarily drawn to scale, like reference numerals may describe similar components in different views. Like reference numerals having different letter suffixes may represent different examples of similar components. The drawings illustrate generally, by way of example, but not by way of limitation, various embodiments discussed herein.
Fig. 1 is a schematic flow chart illustrating an implementation of a device binding method according to an embodiment of the present invention;
fig. 2 is a schematic view of an application scenario of the device binding method according to the embodiment of the present invention;
fig. 3 is a schematic flow chart illustrating an implementation of a second device binding method according to an embodiment of the present invention;
fig. 4 is a schematic diagram of a device binding system according to a third embodiment of the present invention;
fig. 5 is a schematic diagram of main hardware components of a three-device binding method according to an embodiment of the present invention;
FIG. 6 is a state diagram of a first device in an embodiment of the present invention;
fig. 7 is a schematic diagram of an implementation flow of a third device binding method according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a four-device binding apparatus according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of a five-device binding apparatus according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of a sixth device binding apparatus according to an embodiment of the present invention;
fig. 11 is a schematic structural diagram of an electronic device according to an embodiment of the invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the following describes specific technical solutions of the present invention in further detail with reference to the accompanying drawings in the embodiments of the present invention. The following examples are intended to illustrate the invention but are not intended to limit the scope of the invention.
Example one
The embodiment of the invention provides a device binding method, which is applied to first devices, wherein the first devices are bound devices. The first device can be intelligent devices such as an intelligent watch, an intelligent bracelet, an intelligent door lock and a tracker, and certainly, the first device can also be electronic devices such as a mobile phone, a tablet computer, a notebook computer, a desktop computer and a personal digital assistant. The functions implemented by the device binding method of this embodiment may be implemented by a processor in the first device calling a program code, and of course, the program code may be stored in a computer storage medium.
Fig. 1 is a schematic diagram illustrating an implementation flow of a device binding method according to an embodiment of the present invention, as shown in fig. 1, the method includes the following steps:
step S101, the first device starts a near field communication module based on a first broadcast identifier sent by the server, and enters a pre-binding program.
Here, the near field communication module is to enable communication between the first device and other second devices. The near field communication module may be bluetooth or Wireless Fidelity (WIFI), and since the first device to be bound and the second device to be bound are both within a preset range in this embodiment, and in practical application, the first device and the second device may be within a certain range, data exchange between the first device and the second device may be achieved through a near field communication manner. Of course, the first device and the second device may also exchange data in other communication manners, for example, a 2G/3G/4G wireless communication manner, which is not limited in this embodiment.
In an embodiment of the present invention, step S101 may also be implemented by:
step S1011, when receiving the first broadcast identifier, the first device starts a near field communication module and is in an unbundable state.
Here, when the first device is in the non-bindable state, in this case, the second device may only search for the first broadcast identifier of the first device using the same near field communication method as the first device, but may not access the first device, or may not exchange data with the first device even if the second device is accessible.
Step S1012, when receiving the binding notification sent by the server, the first device changes from the non-bindable state to the bindable state.
Here, when the first device changes from the non-bindable state to the bindable state, the second device may access the first device using the same near field communication method as the first device to exchange data with the first device.
And step S102, the first equipment establishes physical connection with the second equipment through the near field communication module and performs authentication.
When the first device enters the bindable state, the first device can establish a physical connection with the second device through the near field communication module to exchange data. The authentication process is achieved by data exchange between the first device and the second device.
Here, the authentication is performed in order to verify whether the second device has the right to bind with the first device and to access the first device for data exchange with the first device to control the function of the first device. By authenticating the second device which is bound with the first device in advance, the safety of the first device can be effectively ensured, and the first device is prevented from being maliciously bound.
In an embodiment of the present invention, step S102 may also be implemented by the following steps:
step S1021, the first device receives the second key sent by the second device in a near field communication manner.
Here, the second key is generated by the second device according to a predefined algorithm based on the received identifier of the first device, the predefined algorithm is an algorithm configured by the server for the second device, and the algorithm is a predefined algorithm that is not disclosed. Thus, the second key generated according to the predefined algorithm is unique based on the received identification of the first device.
It should be noted that after the physical connection between the first device and the second device through the near field communication module is completed, the data connection between the first device and the second device is prohibited from being established in a near field communication manner, and at this time, the first device receives the second key sent by the second device in a near field communication manner.
In step S1022, the first device generates a first key based on a predefined algorithm.
Here, the first device also generates the first key based on the same predefined algorithm, as well as its own identity. Thus, since the identification of the first device is fixed and invariant, and the predefined algorithm is fixed, the first key generated by the first device is also unique.
Step S1023, when the first key matches the second key, the authentication is passed.
Here, the first device matches the first key with the second key, determines whether the first key is the same as the second key, and passes authentication if the determination result indicates that the first key is the same as the second key; and if the judgment result shows that the first secret key is different from the second secret key, the authentication is not passed.
And step S103, if the authentication is passed, the binding with the second equipment is completed.
If the authentication result of the first device to the second device is authentication pass, the second device is a device which can be bound with the first device. Then, the first device binds with the second device so that the second device controls the function of the first device, or can enable efficient data transmission between the first device and the second device. When the first device finishes the binding with the second device, the first device is changed from the bindable state to the bound state, and at the moment, the first device communicates with the second device through the server or communicates with the second device in a near field communication mode to exchange data.
If the authentication result of the first device to the second device is that the authentication is not passed, the second device and the first device cannot be bound, data exchange cannot be performed between the second device and the first device, and the second device cannot control the first device.
In an embodiment of the present invention, before the first device turns on the near field communication module, the method may further include the steps of:
step S104, the first device sends a first binding request to the server.
Here, the first binding request includes an identification of the first device. For the first device, its identity is only actively sent to the server and not to the other devices. That is, the identity of the first device is not exposed to the outside except for the server, and only the server can obtain its identity from the first device.
In the embodiment of the invention, the communication between the first device and the server can be realized through the server communication module, and the server communication module can communicate in a 2G/3G/4G wireless communication mode or in a near field communication mode such as Bluetooth and WIFI. Then, before the first device sends the first binding request to the server, the user is required to open the first device first, and after the first device is opened, the first device can establish communication with the server through the server communication module, and send the first binding request to the server.
It should be noted that, before the first device sends the first binding request to the server, the first device may be in a factory default state, at this time, the server communication module maintains a closed state, and the communication module between the first device and the other second device also maintains a closed state.
In step S105, the first device receives the first broadcast identifier sent by the server based on the first binding request.
Here, the first broadcast flag received by the first device is generated and transmitted by the server based on the first binding request. The first broadcast identifier is used for broadcasting to at least one second device around the first device to ensure that the at least one second device around the first device can search for the first device through the first broadcast identifier.
After the first device sends a first binding request including the first device identifier to the server, the server analyzes the first binding request to obtain the identifier of the first device, generates a first broadcast identifier according to a predefined rule, and sends the first broadcast identifier to the first device.
In the embodiment of the present invention, in the process of authenticating the second device, the method further includes the following steps:
in step S1061, the first device determines a first time.
Here, the first time is a time when the first device changes to the bindable state or a time when a first broadcast identifier is received. When the first device changes from the non-binding state to the binding state or when the first device receives the first broadcast identifier, the first device records the current time and determines the current time as the first time.
In step S1062, the first device determines a second time according to the first time and a preset validity period.
Here, the validity period may be preset when the first device is shipped from a factory, may be preset when a user sets the first device as needed, or may be a preset validity period allocated by the server to the first device. The validity period is a time period, and when the first device has determined the first time, the first time may be used as a start time of the preset validity period, and then an end time of the preset validity period is the second time.
In step S1063, the first device determines a third time to receive the second key.
Here, the third time is a time when the first device receives the second key transmitted by the second device.
Step S1064, if the third time is before the second time, and when the first key matches the second key, the authentication is passed.
Here, if the third time is before the second time, which means that the time when the first device receives the second key sent by the second device is within the preset validity period, the above steps S1022 to S1023 may be performed to authenticate the second device.
Step S1065, if the third time is after the second time, failing to authenticate.
Here, if the third time is after the second time, which indicates that the time when the first device receives the second key sent by the second device is not within the preset validity period, the second device is already in the authentication timeout state when sending the second key, and the authentication fails.
In the device binding method provided in this embodiment, in the process of authenticating the second device, whether the time when the first device receives the second key sent by the second device is within the preset validity period is determined by monitoring the time of the authentication process, so that if the first device cannot receive the second key sent by the second device for a long time, the authentication is overtime and the authentication fails, and the first device does not need to wait for receiving the second key all the time, thereby reducing the energy consumption of the first device.
In this embodiment of the present invention, after the first device and the second device are bound or after the first device is just powered on, the method may further include the following steps:
in step S1071, the first device determines the number of second devices bound to the first device.
Here, the number may be 0 or any positive integer of 1 or more. When the number is 0, it indicates that the second device is not bound with the first device at this time, and at this time, the first device may be a factory default state immediately after the start-up, or may be a state after being unbound with all previously bound second devices; when the number is any positive integer N which is greater than or equal to 1, it is indicated that N second devices are bound with the first device at this time, that is, after the first device and the second device are bound, the number N of the second devices bound with the first device is obtained.
Step S1072, if the number of the second devices reaches a preset threshold, the first device is in an unbundable state.
Here, the preset threshold is a preset number threshold of the second devices that can be bound with the first device. The preset threshold may be preset by the first device when the first device leaves a factory, may also be preset by a user by setting the first device as needed, and may also be a preset threshold allocated by the server for the first device.
And when the number N of the second devices reaches a preset threshold value M, the first device is in an unbondable state. For example, a user may preset a preset threshold M to be 3, and at this time, the number of the second devices already bound to the first device is 3, the first device determines that the number N of the second devices bound to the first device is 3, and determines that the value of N reaches the preset threshold M, that is, the value of N is equal to the value of M, and then the first device is in an unbundable state at this time.
Step S1073, if the number of the second devices does not reach the preset threshold value, the near field communication module is started based on the second broadcast identifier sent by the server, and the binding state is entered.
Here, when the number N of the second devices does not reach the preset threshold M, it indicates that the first device may also bind with other second devices at this time. For example, a preset threshold M may be preset by a user to be 3, and at this time, the number of the second devices already bound to the first device is 2, the first device determines that the number N of the second devices bound to the first device is 2, and determines that the value of N does not reach the preset threshold M, that is, the value of N is smaller than the value of M, and then the first device may also bind to other second devices at this time.
Step S1074, a connection is created with another second device through the near field communication module, and authentication is performed.
Step S1075, if the authentication is passed, completing the binding with the another second device.
Here, the steps S1073 to S1075 are the same as the binding process of the steps S102 to S103, and this embodiment is not described again for saving space. Steps S1073 to S1075 are to dynamically allocate a broadcast identifier to the first device, so that the first device can be bound to a plurality of second devices within the validity period, so as to avoid a situation where only one second device is bound, and the one second device has a fault and cannot effectively implement control over the first device.
According to the device binding method provided by the embodiment, the first device can be bound with at least one second device, when the number of the second devices bound with the first device reaches the preset threshold, the first device is in a non-binding state, and at this time, even if other second devices meeting the binding condition still exist, the second device cannot be bound with the first device, so that resource waste caused by too many useless second devices being bound with the first device can be prevented, and malicious binding of the second device to the first device can be avoided. In addition, when the number of the second devices bound with the first device does not reach the preset threshold value, the first device continues the binding process, so that other second devices meeting the conditions can be bound with the first device, the binding of the first device and the plurality of second devices is realized, more requirements of users are met, and the diversification of the user requirements is realized.
Fig. 2 is a schematic view of an application scenario of the device binding method according to the embodiment of the present invention, as shown in fig. 2, here, a first device is an intelligent bracelet 201, a second device is a mobile phone 202, for example, the intelligent bracelet 201 is worn on a hand of a child, and the mobile phone 202 is carried by a parent, by using the device binding method according to the embodiment of the present invention, after the intelligent bracelet 201 and the mobile phone 202 are bound, the intelligent bracelet 201 and the mobile phone 202 can perform data transmission, so that the parent can control the intelligent bracelet 201 worn by the child through the mobile phone 202, for example, the alarm clock time on the intelligent bracelet is controlled through the mobile phone, so as to prevent the child from late learning; acquiring the position of the smart bracelet by using a mobile phone to determine the current specific position of the child; the mobile phone is used for controlling the smart bracelet to start a photographing function or a shooting function so as to acquire the environment of the position of the child, so that the safety condition of the child is determined.
The device binding method provided by this embodiment is adopted to bind the smart band 201 and the mobile phone 202 in fig. 2, first, the smart band of the child is opened, and the binding button is selected to operate to control the smart band to bind, then, the smart band sends a first binding request to the server to request to bind with the mobile phone of the parent, where the first binding request includes an identifier of the smart band, and the identifier may be an Identity Identifier (ID) of the smart band. After the smart band sends the first binding request, the server sends a first broadcast identifier to the smart band based on the first binding request, the smart band opens a WIFI function based on the first broadcast identifier and enters a bindable state, at the moment, the mobile phone of a parent receives a predefined rule sent by the server and searches for the identifier of the smart band according to the predefined rule, the identifier of the smart band is sent to the server, and finally the smart band is connected with the mobile phone through the WIFI function and authenticates the mobile phone, and if the identifier of the smart band passes the authentication, the binding with the mobile phone is completed. The whole binding process only needs a user to open the intelligent bracelet and select the binding button, the other binding steps are completed by the equipment, the full automation can be realized by the binding process, and the binding process is more convenient.
Example two
The embodiment of the invention provides a device binding method, which is applied to a device binding system, wherein the system comprises at least one first device of a bound device, at least one second device serving as the bound device and a server. The first device may be an intelligent device such as a smart watch, a smart bracelet, a smart door lock, a tracker, or an electronic device such as a mobile phone, a tablet computer, a notebook computer, a desktop computer, and a personal digital assistant. The second device is used for managing the bound first device, the second device can be an electronic device such as a mobile phone, a tablet computer, a notebook computer, a desktop computer and a personal digital assistant, and certainly, the second device can also be an intelligent device such as a smart watch and a smart bracelet.
Fig. 3 is a schematic diagram of an implementation flow of a second device binding method according to an embodiment of the present invention, and as shown in fig. 3, the method includes the following steps:
step S301, the server sends a first broadcast identifier to the first device.
Here, the first binding request includes an identification of the first device.
In this embodiment of the present invention, the step S301 may include the following steps:
step S3011, when the server receives the first binding request sent by the first device, the server generates the first broadcast identifier according to the predefined rule.
Here, the first broadcast identification is generated and transmitted by the server based on the first binding request. The first broadcast identifier is used for broadcasting to at least one second device around the first device to ensure that the at least one second device around the first device can search for the first device through the first broadcast identifier.
When the server receives the first binding request sent by the first device, the server analyzes the first binding request to obtain the identifier of the first device, and generates a first broadcast identifier according to a predefined rule.
Step S3012, send the first broadcast identifier to the first device.
Step S302, the first device starts the nfc module and enters a pre-binding procedure.
Step S303, the server sends the predefined rule to the second device.
Here, the predefined rule is a canonical format for generating the first broadcast identifier, and the predefined rule may specify a character string format of the generated first broadcast identifier; the first broadcast identification transmitted by the second device may be at least one.
Step S304, the second device sends the first broadcast identifier determined from the set of broadcast identifiers searched by itself to the server.
In this embodiment of the present invention, the step S304 may include the following steps:
in step S3041, the second device searches the broadcast identifier set according to the predefined rule.
Here, since the first broadcast identifier sent by the server to the first device is generated according to a predefined rule, the second device performs a search according to the predefined rule, and when the first device is within the search range, the second device can search the first device according to the predefined rule.
In this embodiment, the second device may search for at least one first device, and then, according to a predefined rule, the second device may search for a broadcast identifier set, where the broadcast identifier set includes at least one broadcast identifier, and each broadcast identifier corresponds to one first device. Therefore, when the second device searches for a plurality of broadcast identifiers in the broadcast identifier set, the second device searches for a plurality of first devices.
Step S3042, the second device sends the first broadcast identifier determined from the broadcast identifier set to the server.
Here, the second device determines at least one first broadcast identifier from the broadcast identifier set, and in implementation, all broadcast identifiers in the broadcast identifier set may be displayed and output to a user, and the user selects at least one broadcast identifier from the plurality of broadcast identifiers, so that the broadcast identifier selected by the user is the determined first broadcast identifier.
And the second device sends the determined first broadcast identification to the server, wherein the determined first broadcast identification can be at least one, and when the determined first broadcast identifications are multiple, the second device indicates that the user needs to bind multiple second devices with the first device.
Step S305, the server notifies the first device corresponding to the first broadcast identifier to enter a bindable state.
When the server receives a first broadcast identifier sent by the second device, the server analyzes the first broadcast identifier, determines a first device corresponding to the first broadcast identifier, and sends a binding notification to the determined first device to notify the first device to enter a bindable state after the first device is determined.
In step S306, the first device maintains a bindable state.
Step S307, the server sends the identifier of the first device corresponding to the first broadcast identifier to the second device.
Here, the first device is a first device corresponding to the determined first broadcast identifier transmitted to the server by the second device. The server searches for the first device corresponding to the first broadcast identifier based on the first broadcast identifier sent by the second device, and sends the identifier of the first device to the second device when the first device is found.
It should be noted that the number of the identifiers of the first device is at least one, and the number of the identifiers of the first device is equal to or less than the number of the first broadcast identifiers determined by the second device. For example, when the number K of the first broadcast identifiers determined by the second device in the broadcast identifier set is 3, and the second device sends the first broadcast identifiers to the server, the number of the first devices found by the server is also 3, and the number L of the identifiers of the first devices sent to the second device is also 3. Or, when the number K of the first broadcast identifiers determined by the second device in the broadcast identifier set is 3, the second device sends the first broadcast identifier to the server, and the server only finds two first devices, then the number L of the identifiers of the first devices sent to the second device is 2.
Step S308, the first device establishes physical connection with the second device through the near field communication module, and performs authentication.
In the embodiment of the present invention, the authentication in step S308 may be implemented by the following steps:
and S3081, the second device generates a second key based on a predefined algorithm and sends the second key to the first device in a near field communication mode.
Step S3082, when the first device passes the authentication based on the second key, receiving an authentication pass notification sent by the first device.
And S3083, if the authentication is passed, the binding with the first equipment is completed.
In step S309, the server receives the binding success notification sent by the second device.
Step S310, the server establishes a mapping relationship between the first device and the second device.
And after the second device and the first device are bound, the server receives a binding success notice sent by the second device, and establishes a mapping relation between the first device and the second device according to the identification information of the first device and the second device to form binding information. Here, the mapping relationship between the first device and the second device is association information between the first device and the second device, that is, the binding information.
According to the equipment binding method provided by the embodiment of the invention, because the broadcast identification set is searched according to the predefined rule, the searched broadcast identifications are all the broadcast identifications of the first equipment in a bindable state, so that the effective binding of the first equipment and the second equipment can be ensured, the whole binding process can be fully automated, the binding process is more convenient and faster, and the user experience can be effectively improved. In addition, after receiving the first broadcast identifier sent by the second device, the server sends the identifier of the first device corresponding to the first broadcast identifier to the second device, so that accurate binding of the first device and the second device can be guaranteed, binding errors are avoided, full automation of the whole binding process can be realized, the binding process is more convenient, and user experience can be effectively improved.
EXAMPLE III
The embodiment of the invention provides an equipment binding method, wherein first equipment involved in the embodiment is bound equipment, the first equipment can be intelligent equipment such as an intelligent watch, an intelligent bracelet, an intelligent door lock, a tracker and the like, and certainly, the first equipment can also be electronic equipment such as a mobile phone, a tablet computer, a notebook computer, a desktop computer, a personal digital assistant and the like. The related second device is a device pre-bound with the first device, the second device is used for managing the bound first device, the second device can be an electronic device such as a mobile phone, a tablet computer, a notebook computer, a desktop computer and a personal digital assistant, and certainly, the second device can also be an intelligent device such as a smart watch and a smart bracelet.
Fig. 4 is a schematic diagram of a device binding system provided in a third embodiment of the present invention, and as shown in fig. 4, the entire system related in the third embodiment of the present invention mainly includes three parts:
the first device 401: a bound device;
the second device 402: means for managing the first device;
the server 403: and the device is responsible for interacting with the first device and the second device, generating binding information and recording binding data.
Fig. 5 is a schematic diagram of main hardware components of a three-device binding method according to an embodiment of the present invention, where a device according to the method of the present invention supports at least two communication capabilities, as shown in fig. 5, the main hardware components of the embodiment of the present invention include a server communication module 501 and a near field communication module 502, where the server communication module 501 is used to maintain a capability of communicating with a server, for example, using a 2G/3G/4G wireless module; the near field communication module 502 is for maintaining near field communication capability with other devices, such as bluetooth, WiFi, etc.
The first device in this embodiment of the present invention has four states with respect to the server, as shown in fig. 6, which is a state diagram of the first device in this embodiment of the present invention:
factory default state 601: the server communication module and the near field communication module are both kept in a closed state.
Unbound state 602: after the first device is started, the first device automatically establishes communication with the server by using the server communication module to obtain the broadcast identifier of the near field communication module, and then enters an unbound state. In this state, the second device only searches for the broadcast identifier of the first device by using the same near field communication mode, but cannot access the broadcast identifier; or after the access, the first device cannot exchange any data;
bindable state 603: and the first equipment enters a bindable state after receiving the instruction of the server. At this time, the second device may access the first device using the same near field communication manner and exchange data.
Bound state 604: and the first equipment receives the server instruction, confirms that the binding is successful, and cannot be bound any more at the moment. Only the second device is allowed to communicate with the first device via a server, or near field communication.
Fig. 7 is a schematic flow chart of an implementation of a method for binding a third device according to an embodiment of the present invention, and for convenience of example, a server communication module of a device according to the embodiment of the present invention selects a 4G communication module; the near field communication module of the device selects the bluetooth communication module. As shown in fig. 7, the method comprises the steps of:
step S701, after the first device is started, the 4G communication module is used for establishing communication with the server, and the unique identifier of the first device is sent to the server.
Step S702: the server assigns a broadcast identification used by the bluetooth communication module to the first device based on predefined rules.
Step S703: the first device receives the broadcast identification sent by the server, opens the Bluetooth communication module, broadcasts by using the broadcast identification, and keeps the Bluetooth in an unbound state.
Step S704: the second device obtains the predefined rule from the server.
Step S705: the second device starts the Bluetooth communication module and searches for the Bluetooth device broadcast whose periphery meets the predefined rule.
Step S706: the second device uses the 4G communication module to report the searched Bluetooth identification to the server.
Step S707: and the server informs the first equipment corresponding to the Bluetooth identifier to enter a bindable state.
Step S708: the first device receives the server instruction and sets the Bluetooth communication module to be in a bindable state.
Step S709: the first device sends a response message to the server to confirm that the bindable state is entered.
Step S710: the server informs the second device of the unique identity of the first device that the second device has entered a bindable state.
Step S711: the server informs the second device to initiate a binding process to the first device.
Step S712: the second device establishes a bluetooth connection with the first device. The first device does not respond to any data request by the second device until authentication is passed.
Step S713: the first device starts an authentication timer. If the authentication is timed out, step S718 is performed.
Step S714: the second device generates a second key based on the unique identifier of the first device and a predefined algorithm, and sends the second key to the first device through the created Bluetooth channel.
Step S715: after receiving the second key, the first device generates a first key based on the unique identifier of the first device and the same predefined algorithm; judging whether the first key is the same as the second key or not, and if so, sending an authentication passing message to the second equipment; if not, step S718 is performed.
Step S716: and the second equipment reports the binding success message to the server.
Step S717: the server creates binding information.
Step S718: the first device disconnects bluetooth connection with the second device.
According to the equipment binding method provided by the embodiment of the invention, when a user executes equipment binding, only the following two steps are required to be executed:
the first step is as follows: the first device is powered on.
The second step is that: and the second equipment opens the binding program, is placed at the periphery of the first equipment, and clicks to start binding.
The expected result of the device binding method provided by the embodiment of the invention is that the second device prompts success or failure of binding.
By adopting the equipment binding method provided by the embodiment of the invention, when the second equipment scans a plurality of peripheral first equipment for binding, all the equipment for binding can be listed through the binding program, so that a user can manually select the equipment.
The equipment binding method provided by the embodiment of the invention replaces and cancels the existing two-dimensional code scanning mode, and the whole binding process can be fully automated, so that the binding process is more convenient and faster, and the user experience is effectively improved. And on the basis of the traditional binding interaction between the first equipment and the server and the binding interaction between the second equipment and the server, the binding authentication based on the near field communication mode between the first equipment and the second equipment is added, the physical security is increased, and the malicious binding caused by the leakage of the binding identifier of the first equipment is avoided. In addition, the first equipment does not need to provide external labels such as two-dimensional codes and bar codes, and equipment cost is reduced.
Example four
An apparatus for binding devices is provided in an embodiment of the present invention, fig. 8 is a schematic structural diagram of a four-device binding apparatus in an embodiment of the present invention, and the apparatus 800 is applied to a first device of a bound device, as shown in fig. 8, the apparatus 800 includes: a near field communication module opening unit 801, a first creation connection unit 802, and a first binding completion unit 803.
The nfc module starting unit 801 is configured to start the nfc module based on the first broadcast identifier sent by the server, and enable the first device to enter the pre-binding procedure.
A first creating connection unit 802, configured to create a physical connection with a second device through the near field communication module, and perform authentication.
A first binding completion unit 803, configured to complete binding with the second device when authentication is passed.
In other embodiments, the apparatus further comprises: a first transmitting unit and a first receiving unit.
The first sending unit is configured to send a first binding request to the server, where the first binding request includes an identifier of the first device.
A first receiving unit, configured to receive a first broadcast identifier sent by the server based on the first binding request.
In other embodiments, the nfc module starting unit 801 may be configured to start the nfc module when receiving the first broadcast identifier, and be in an unbundable state;
and when receiving the binding notification sent by the server, changing from the non-bindable state to the bindable state.
In other embodiments, the first creating connection unit 802 includes a second receiving unit, a first generating unit, a first matching unit, and a data connection unit.
The second receiving unit is configured to prohibit a data connection from being established with the second device in a near field communication manner after the physical connection with the second device is completed through the near field communication module, and receive the second key sent by the second device in the near field communication manner.
A first generating unit for generating a first key based on a predefined algorithm.
And the matching unit is used for passing the authentication when the first secret key is matched with the second secret key.
And the data connection unit is used for establishing data connection with the second equipment in a near field communication mode after the authentication is passed.
In other embodiments, the apparatus further comprises a first determining unit, a second determining unit, a third determining unit, and a second matching unit.
The first determining unit is configured to determine a first time, where the first time is a time when the first device changes to the bindable state, or a time when a first broadcast identifier is received.
And the second determining unit is used for determining a second moment according to the first moment and a preset validity period.
A third determining unit configured to determine a third time instant at which the second key is received.
A second matching unit, configured to pass authentication if the third time is before the second time and the first key matches the second key; and if the third time is after the second time, the authentication fails.
In other embodiments, the apparatus further comprises: and a changing unit.
Wherein the changing unit is configured to change the first device from the bindable state to a bound state when binding with the second device is completed; the first device communicates with the second device through a server or communicates with the second device through a near field communication mode.
In other embodiments, the apparatus further comprises: a fourth determining unit and a second establishing connection unit.
The fourth determining unit is used for determining the number of the second devices bound with the first device; if the number of the second devices reaches a preset threshold value, the first device is in an unbound state; and if the number of the second devices does not reach the preset threshold value, starting the near field communication module based on a second broadcast identifier sent by the server, and entering a bindable state.
The second establishing connection unit is used for establishing connection with another second device through the near field communication module and authenticating; and if the authentication is passed, completing the binding with the other second equipment.
The device binding apparatus provided in this embodiment is applied to the first device of the bound device, and it should be noted that the description of the apparatus of this embodiment is similar to that of the first method embodiment, and has similar beneficial effects to the first method embodiment, and therefore, the description is omitted here. For technical details not disclosed in the embodiments of the apparatus of the present invention, reference is made to the description of the first embodiment of the method of the present invention for understanding.
EXAMPLE five
An apparatus binding device is provided in an embodiment of the present invention, fig. 9 is a schematic diagram illustrating a composition structure of a five-device binding device in an embodiment of the present invention, where the apparatus 900 is applied to a second device serving as a binding device, as shown in fig. 9, the apparatus 900 includes: a second sending unit 901, a third receiving unit 902, a second creating connection unit 903, and a second binding completion unit 904.
Wherein, the second sending unit 901 is configured to send the first broadcast identifier determined from the set of broadcast identifiers searched by itself to the server.
A third receiving unit 902, configured to receive the identifier of the first device sent by the server based on the first broadcast identifier.
A second creating connection unit 903, configured to create a connection with the first device through the near field communication module, and perform authentication.
A second binding completion unit 904, configured to complete binding with the second device when the authentication is passed.
In other embodiments, the apparatus further comprises: a fourth receiving unit and a searching unit.
The fourth receiving unit is used for receiving the predefined rule sent by the server.
And the searching unit is used for searching the broadcast identification set according to the predefined rule, wherein the broadcast identification set comprises at least one broadcast identification.
In other embodiments, the second creating connection unit 903 includes: the device comprises a second generating unit, a third transmitting unit and a fifth receiving unit.
Wherein the second generating unit is configured to generate a second key based on a predefined algorithm.
And a third sending unit, configured to send the second key to the first device in a near field communication manner.
A fifth receiving unit, configured to receive, when the first device passes authentication based on the second key, an authentication pass notification sent by the first device.
The device binding apparatus provided in this embodiment is applied to a second device serving as a binding device, and it should be noted that the description of the apparatus of this embodiment is similar to the description of the method embodiment, and has similar beneficial effects to the method embodiment, and therefore, the description is omitted here. For technical details not disclosed in the embodiments of the apparatus according to the invention, reference is made to the description of the embodiments of the method according to the invention for understanding.
EXAMPLE six
An apparatus binding device is provided in an embodiment of the present invention, fig. 10 is a schematic diagram illustrating a structure of a six-apparatus binding device in an embodiment of the present invention, where the apparatus 100 is applied to a server, and as shown in fig. 10, the apparatus 100 includes: a fourth transmitting unit 101, a sixth receiving unit 102, a notifying unit 103, a fifth transmitting unit 104, a seventh receiving unit 105, and a mapping relationship establishing unit 106.
Wherein, the fourth sending unit 101 is configured to send the predefined rule to the second device.
A sixth receiving unit 102, configured to receive the first broadcast identifier sent by the second device.
A notifying unit 103, configured to notify the first device corresponding to the first broadcast identifier to enter a bindable state.
A fifth sending unit 104, configured to send, to the second device, an identifier of the first device corresponding to the first broadcast identifier.
A seventh receiving unit 105, configured to receive a binding success notification sent by the second device.
A mapping relationship establishing unit 106, configured to establish a mapping relationship between the first device and the second device.
In other embodiments, the apparatus further comprises: an eighth receiving unit and a sixth transmitting unit.
The eighth receiving unit is configured to receive a first binding request sent by the first device, where the first binding request includes an identifier of the first device.
A sixth sending unit, configured to send the first broadcast identifier to the first device based on the first binding request.
In other embodiments, the apparatus further comprises: a third generating unit and a seventh transmitting unit.
Wherein, the third generating unit is configured to, when the server receives the first binding request sent by the first device, generate, by the server, the first broadcast identifier according to the predefined rule.
A seventh sending unit, configured to send the first broadcast identifier to the first device.
The device binding apparatus provided in this embodiment is applied to a server, and it should be noted that the description of the apparatus of this embodiment is similar to the description of the method embodiment, and has similar beneficial effects to the method embodiment, and therefore, the description is omitted here. For technical details not disclosed in the embodiments of the apparatus according to the invention, reference is made to the description of the embodiments of the method according to the invention for understanding.
EXAMPLE seven
An embodiment of the present invention provides an electronic device, fig. 11 is a schematic diagram of a composition structure of an electronic device according to an embodiment of the present invention, and as shown in fig. 11, the electronic device 110 at least includes: a processor 111 and a storage medium 112 configured to store executable instructions, wherein:
the processor 111 is configured to execute stored executable instructions configured to perform the device binding method provided in any of the embodiments described above.
In the implementation process, the electronic device may be a smart band or a mobile phone or a server. When the electronic equipment is an intelligent bracelet, a processor of the intelligent bracelet is configured to execute stored executable instructions; the executable instructions are configured to perform the above-described device binding method on the first device side. When the electronic device is a mobile phone, a processor of the mobile phone is configured to execute stored executable instructions; the executable instructions are configured to perform the above-described device binding method on the second device side. When the electronic device is a server, a processor of the server is configured to execute stored executable instructions; the executable instructions are configured to perform the server-side device binding method described above.
It should be noted that the description of the embodiment of the electronic device is similar to the description of the embodiment of the method, and has similar beneficial effects to the embodiment of the method, and therefore, the description is not repeated. For technical details not disclosed in the embodiments of the electronic device of the present invention, reference is made to the description of the embodiments of the method of the present invention for understanding.
Correspondingly, an embodiment of the present invention provides a computer-readable storage medium, where computer-executable instructions are stored in the computer-readable storage medium, and the computer-executable instructions are configured to execute the device binding method provided in the other embodiments of the present invention.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.

Claims (11)

1. A device binding method applied to a first device of bound devices, the method comprising:
starting a near field communication module based on a first broadcast identifier sent by a server, and entering a pre-binding program;
establishing physical connection with a second device through the near field communication module, and authenticating;
and if the authentication is passed, completing the binding with the second equipment.
2. The method of claim 1, further comprising:
sending a first binding request to the server, the first binding request including an identification of the first device; receiving a first broadcast identification transmitted by a server based on the first binding request;
alternatively, the first and second electrodes may be,
the method for starting the near field communication module based on the first broadcast identifier sent by the server and entering the pre-binding program comprises the following steps:
when the first broadcast identification is received, the first equipment starts a near field communication module and is in an unbound state;
and when receiving the binding notification sent by the server, the first equipment is changed from the non-bindable state to the bindable state.
3. The method of claim 1, wherein the creating a connection with a second device and authenticating via the near field communication module comprises:
after the physical connection between the near field communication module and the second equipment is established, forbidding to establish data connection between the near field communication module and the second equipment in a near field communication mode, and receiving a second key sent by the second equipment in the near field communication mode;
generating a first key based on a predefined algorithm;
when the first key is matched with the second key, the authentication is passed;
the method further comprises the following steps: and after the authentication is passed, establishing data connection with the second equipment by adopting a near field communication mode.
4. The method of claim 2, further comprising:
determining a first time, wherein the first time is a time when the first device changes to the bindable state, or a time when a first broadcast identifier is received;
determining a second moment according to the first moment and a preset validity period;
determining a third time instant at which the second key is received;
if the third time is before the second time, and when the first key is matched with the second key, the authentication is passed;
and if the third time is after the second time, the authentication fails.
5. A device binding method applied to a second device as a bound device, the method comprising:
determining a first broadcast identifier from a broadcast identifier set searched by the server, and sending the first broadcast identifier to the server;
receiving an identification of the first device transmitted by the server based on the first broadcast identification;
establishing connection with the first equipment through a near field communication module, and authenticating;
and if the authentication is passed, finishing the binding with the first equipment.
6. The method of claim 5, wherein the creating a connection with the first device and authenticating via the near field communication module comprises:
generating a second key based on a predefined algorithm, and sending the second key to the first device in a near field communication mode;
and when the first equipment passes the authentication based on the second secret key, receiving an authentication passing notice sent by the first equipment.
7. A device binding method applied to a server is characterized by comprising the following steps:
sending a predefined rule to a second device, and receiving a first broadcast identifier sent by the second device;
informing the first equipment corresponding to the first broadcast identification to enter a bindable state;
sending the identifier of the first device corresponding to the first broadcast identifier to the second device;
and receiving a binding success notification sent by the second equipment, and establishing a mapping relation between the first equipment and the second equipment.
8. An apparatus for binding devices, applied to a first device of the bound devices, the apparatus comprising:
the near field communication module starting unit is used for starting the near field communication module based on the first broadcast identifier sent by the server and enabling the first equipment to enter a pre-binding program;
the first establishing connection unit is used for establishing physical connection with the second equipment through the near field communication module and authenticating;
and the first binding completion unit is used for completing the binding with the second equipment when the authentication is passed.
9. An apparatus for binding devices, applied to a second device as a binding device, the apparatus comprising:
the first sending unit is used for sending a first broadcast identifier determined by a broadcast identifier set searched by the first sending unit to the server;
a first receiving unit, configured to receive an identifier of a first device transmitted by a server based on the first broadcast identifier;
the second establishing connection unit is used for establishing connection with the first equipment through the near field communication module and authenticating;
and the second binding completion unit is used for completing the binding with the second equipment when the authentication is passed.
10. An electronic device, characterized in that the electronic device comprises at least: a processor and a storage medium configured to store executable instructions, wherein: the processor is configured to execute stored executable instructions;
the executable instructions are configured to perform the device binding method as provided in any one of the above claims 1 to 4, or claim 5 or 6, or claim 7.
11. A computer-readable storage medium having computer-executable instructions stored thereon, the computer-executable instructions configured to perform the device binding method as provided in any one of the preceding claims 1 to 4, or claims 5 or 6, or claim 7.
CN201810623617.7A 2018-06-15 2018-06-15 Equipment binding method, device, equipment and storage medium Active CN110611903B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810623617.7A CN110611903B (en) 2018-06-15 2018-06-15 Equipment binding method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810623617.7A CN110611903B (en) 2018-06-15 2018-06-15 Equipment binding method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110611903A true CN110611903A (en) 2019-12-24
CN110611903B CN110611903B (en) 2022-07-15

Family

ID=68888623

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810623617.7A Active CN110611903B (en) 2018-06-15 2018-06-15 Equipment binding method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110611903B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111540458A (en) * 2020-04-02 2020-08-14 出门问问信息科技有限公司 Information processing method and device, electronic equipment and computer storage medium
CN112738767A (en) * 2020-11-30 2021-04-30 中南大学 Trust-based mobile edge user task scheduling method

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130217333A1 (en) * 2012-02-22 2013-08-22 Qualcomm Incorporated Determining rewards based on proximity of devices using short-range wireless broadcasts
CN103795571A (en) * 2014-01-24 2014-05-14 北京搜狗科技发展有限公司 Binding method and device between equipment
CN104219058A (en) * 2014-09-28 2014-12-17 小米科技有限责任公司 Identity authentication and authorization method and device
CN104243484A (en) * 2014-09-25 2014-12-24 小米科技有限责任公司 Information interaction method and device and electronic equipment
CN104661175A (en) * 2015-02-16 2015-05-27 陈王胜 Method and equipment for binding intelligent mobile terminal and intelligent wearable equipment
US20150356560A1 (en) * 2014-06-05 2015-12-10 Vishwanath Shastry Identification and Verification for Provisioning Mobile Application
CN105407454A (en) * 2015-11-23 2016-03-16 深圳还是威健康科技有限公司 Binding method and device for wearable device
CN105530596A (en) * 2014-10-21 2016-04-27 三星电子株式会社 Device and Method for Secure Connection
CN105591676A (en) * 2014-10-20 2016-05-18 北京握奇智能科技有限公司 Method and system for enabling mobile terminal to identify security authentication device bound with mobile terminal
CN105635249A (en) * 2015-12-18 2016-06-01 小米科技有限责任公司 Session management method and apparatus
CN105871821A (en) * 2016-03-24 2016-08-17 浙江风向标科技有限公司 Device binding method
CN106161359A (en) * 2015-04-02 2016-11-23 阿里巴巴集团控股有限公司 The method and device of certification user, the method and device of registration wearable device
CN106572427A (en) * 2015-10-12 2017-04-19 阿里巴巴集团控股有限公司 Establishment method and device for establishing short-range communication
CN106911642A (en) * 2015-12-23 2017-06-30 北京奇虎科技有限公司 A kind of smart machine binding method and device
CN106973443A (en) * 2017-03-31 2017-07-21 北京小米移动软件有限公司 Equipment correlating method, equipment associated apparatus and electronic equipment
CN107580040A (en) * 2017-08-29 2018-01-12 聚好看科技股份有限公司 The method and apparatus that a kind of communication module in intelligent household terminal upgrades

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130217333A1 (en) * 2012-02-22 2013-08-22 Qualcomm Incorporated Determining rewards based on proximity of devices using short-range wireless broadcasts
CN103795571A (en) * 2014-01-24 2014-05-14 北京搜狗科技发展有限公司 Binding method and device between equipment
US20150356560A1 (en) * 2014-06-05 2015-12-10 Vishwanath Shastry Identification and Verification for Provisioning Mobile Application
CN104243484A (en) * 2014-09-25 2014-12-24 小米科技有限责任公司 Information interaction method and device and electronic equipment
CN104219058A (en) * 2014-09-28 2014-12-17 小米科技有限责任公司 Identity authentication and authorization method and device
CN105591676A (en) * 2014-10-20 2016-05-18 北京握奇智能科技有限公司 Method and system for enabling mobile terminal to identify security authentication device bound with mobile terminal
CN105530596A (en) * 2014-10-21 2016-04-27 三星电子株式会社 Device and Method for Secure Connection
CN104661175A (en) * 2015-02-16 2015-05-27 陈王胜 Method and equipment for binding intelligent mobile terminal and intelligent wearable equipment
CN106161359A (en) * 2015-04-02 2016-11-23 阿里巴巴集团控股有限公司 The method and device of certification user, the method and device of registration wearable device
CN106572427A (en) * 2015-10-12 2017-04-19 阿里巴巴集团控股有限公司 Establishment method and device for establishing short-range communication
CN105407454A (en) * 2015-11-23 2016-03-16 深圳还是威健康科技有限公司 Binding method and device for wearable device
CN105635249A (en) * 2015-12-18 2016-06-01 小米科技有限责任公司 Session management method and apparatus
CN106911642A (en) * 2015-12-23 2017-06-30 北京奇虎科技有限公司 A kind of smart machine binding method and device
CN105871821A (en) * 2016-03-24 2016-08-17 浙江风向标科技有限公司 Device binding method
CN106973443A (en) * 2017-03-31 2017-07-21 北京小米移动软件有限公司 Equipment correlating method, equipment associated apparatus and electronic equipment
CN107580040A (en) * 2017-08-29 2018-01-12 聚好看科技股份有限公司 The method and apparatus that a kind of communication module in intelligent household terminal upgrades

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
李昱兵: "基于NFC技术的自动售货机Android签到管理系统的设计和实现", 《家电科技》 *
鄂金龙: "基于近场通信的移动平台服务研究", 《信息科技辑》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111540458A (en) * 2020-04-02 2020-08-14 出门问问信息科技有限公司 Information processing method and device, electronic equipment and computer storage medium
CN112738767A (en) * 2020-11-30 2021-04-30 中南大学 Trust-based mobile edge user task scheduling method

Also Published As

Publication number Publication date
CN110611903B (en) 2022-07-15

Similar Documents

Publication Publication Date Title
CN107121938B (en) Intelligent household equipment control method, device and system based on identity recognition
EP3355521B1 (en) Smart home service server and control method therefor
KR101741967B1 (en) Method for assigning an agent device from a first device registry to a second device registry
EP3324660A1 (en) Communication control method and apparatus, terminal, and network platform
JP5513618B2 (en) Smart card remote control method and system
KR101697979B1 (en) Method and apparatus for syncronizing data in connected devices
US8549593B2 (en) Network access control system and method
CN109640326B (en) Authority management method, device and system and mobile terminal
GB2532305A (en) Method for Configuring and controlling smart home products
CN110611903B (en) Equipment binding method, device, equipment and storage medium
US20210341889A1 (en) Coordinationg modifications by multiple users to a shared automated environment
CN112202747A (en) Target device binding method and device, storage medium and electronic device
CN109495874A (en) The method and apparatus of Profile downloading
WO2022247373A1 (en) Method and apparatus for controlling home appliance, and appliance
CN108401504A (en) Wireless communications method, apparatus and system, wireless telecom equipment and recording medium
CN108713199B (en) Authority management method and system, mobile terminal, shared charging equipment and server
CN115604094A (en) User information sharing method, electronic device, and computer-readable storage medium
CN107562501A (en) A kind of smart machine management-control method and system
CN110851161B (en) Firmware updating method for intelligent household equipment
CN113518021A (en) Method, system, device and equipment for binding user account
CN114301628A (en) Smart home equipment authentication method, device, equipment, system and storage medium
CN112004978B (en) Key information generation system and key information generation method
JP2021152832A (en) Control apparatus, control system, control method, and program
CN112039952A (en) Method and device for controlling intelligent equipment, storage medium and electronic equipment
KR20140005065A (en) System for changing automatically of a password in digital door lock

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant