CN110677248B - Safe binding method and system based on narrowband Internet of things - Google Patents

Safe binding method and system based on narrowband Internet of things Download PDF

Info

Publication number
CN110677248B
CN110677248B CN201911048765.1A CN201911048765A CN110677248B CN 110677248 B CN110677248 B CN 110677248B CN 201911048765 A CN201911048765 A CN 201911048765A CN 110677248 B CN110677248 B CN 110677248B
Authority
CN
China
Prior art keywords
client
equipment
authorization code
token
binary authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911048765.1A
Other languages
Chinese (zh)
Other versions
CN110677248A (en
Inventor
罗梅梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aux Air Conditioning Co Ltd
Ningbo Aux Electric Co Ltd
Original Assignee
Aux Air Conditioning Co Ltd
Ningbo Aux Electric Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aux Air Conditioning Co Ltd, Ningbo Aux Electric Co Ltd filed Critical Aux Air Conditioning Co Ltd
Priority to CN201911048765.1A priority Critical patent/CN110677248B/en
Publication of CN110677248A publication Critical patent/CN110677248A/en
Application granted granted Critical
Publication of CN110677248B publication Critical patent/CN110677248B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos

Abstract

The invention provides a safe binding method and a system based on a narrowband Internet of things, wherein the method comprises the steps that NB equipment sends equipment information to a cloud platform; the NB equipment receives a token (token) corresponding to the NB equipment and a binary authorization code, wherein the token (token) and the binary authorization code are generated by the cloud platform, and the binary authorization code is randomly generated and unique according to the equipment information; and the NB device displays the binary authorization code as a segment code of a nixie tube for a client to input so as to perform binding operation with the NB device. The invention solves the problem of insecurity when the client and the NB equipment are bound in a two-dimensional code scanning mode.

Description

Safe binding method and system based on narrowband Internet of things
Technical Field
The invention belongs to the technical field of networks, and particularly relates to a safe binding method and system based on a narrowband Internet of things.
Background
With the continuous development of NB-IoT (narrowband internet of things) technology, internet of things devices (hereinafter referred to as "NB devices") such as air conditioners, washing machines, refrigerators, and the like are continuously appearing, and a user can establish a communication connection between the NB device and the internet according to a protocol, so as to control the NB device.
Currently, before a user controls an NB device through a client, the NB device needs to be authorized and bound, and most of the clients on the market currently perform binding operation with the NB device by scanning a two-dimensional code. Therefore, the two-dimension code binding mode can be stolen and changed by others, or the two-dimension code is damaged and lost, so that the client cannot normally bind and control the NB equipment by scanning the code.
Disclosure of Invention
The problem to be solved by the invention is the insecurity problems of damage, loss and the like when the client and the NB equipment are bound in a two-dimensional code scanning mode.
In order to solve the above problems, as an aspect of the present invention, a secure binding method based on a narrowband internet of things is provided, including the following steps: the NB equipment sends equipment information to the cloud platform; the NB equipment receives a token (token) corresponding to the NB equipment and a binary authorization code, wherein the token (token) and the binary authorization code are generated by the cloud platform, and the binary authorization code is randomly generated and unique according to the equipment information; and the NB device displays the binary authorization code as a segment code of a nixie tube for a client to input so as to perform binding operation with the NB device.
NB equipment obtains the binary authorization code of random generation from the cloud platform and shows through the charactron to need not to paste labels such as two-dimensional code, bar code on NB equipment and provide the authorization code for cloud platform or customer end, can not produce the problem that the label is damaged or is stolen, owing to need not the customer end and sweep the sign indicating number operation moreover, just also need not to use the cell-phone camera authority, reduce user's authority and apply.
In some embodiments of the present invention, the binary authorization code has 14 bits, and the nixie tube is a double eight nixie tube.
Therefore, for NB devices with extremely low requirements on display screens, such as air conditioners, washing machines and refrigerators, the 14-bit binary authorization code can be displayed by only having a double eight display screen, and the probability that the binary authorization codes generated at the same time are repeated is 1/2 14 Almost can be ignored, in other words, the problem of authorization code repetition can be avoided under the condition of low nixie tube number, and the binding reliability is improved. In addition, the binary authorization code is bound for use and then fails, even if the same user is connected with the distribution network again, the binary authorization code cannot be the same verification code, and the security is extremely high.
In some embodiments of the present invention, the secure binding method further comprises: and after the NB equipment and the client are bound, the NB equipment receives a response instruction sent by the client to cancel the nixie tube display. Therefore, before the client finishes the binding operation, the NB equipment always displays the binary authorization code, so that a user can conveniently check the authorization code and input the authorization code into the client.
In some embodiments of the present invention, the secure binding method further comprises: and when the NB equipment is reset, the step of binding the NB equipment and the client is carried out again. At this time, after the NB device is reset, the original token (token) stored in the bound NB device is invalid, and it is necessary to obtain a new token (token) and a binary authorization code from the cloud platform again, and then display the newly obtained binary authorization code.
Based on the above embodiment, for example, in the process of using the NB device, if the device is repaired or the internal NB module needs to be replaced, the NB device may be bound to the client again by resetting, and the two-dimensional code and other identifiers on the NB device do not need to be replaced, thereby avoiding an error that the two-dimensional code and the NB device are not matched.
As another aspect of the present invention, a secure binding method based on a narrowband internet of things is provided, which includes the following steps: inputting a binary authorization code consistent with a segment code displayed by a nixie tube of the NB equipment at a client; the client sends the binary authorization code and the equipment information to a cloud platform to obtain a token (token); and receiving a token (token) sent by the cloud platform to finish binding.
In some embodiments of the invention, the client has an interface for a graphical nixie tube, and the binary authorization code is entered by selecting different segments of the graphical nixie tube. The operation of inputting the binary authorization code on the interface of the graphical nixie tube can be realized by clicking the interface and other operations, and the operation has the advantages of simplicity in operation and interestingness.
In some embodiments of the present invention, the secure binding method further comprises: after the NB equipment and the client finish binding, the client sends a response instruction to the NB equipment to cancel the nixie tube display of the NB equipment.
As another aspect of the present invention, a secure binding method based on a narrowband internet of things is provided, which includes the following steps: the method comprises the steps that a cloud platform receives equipment information sent by NB equipment, randomly generates a unique binary authorization code according to the equipment information, and sends the binary authorization code to the NB equipment; the cloud platform receives a binary authorization code and equipment information sent by a client, verifies whether the binary authorization code sent by the client is consistent with the binary authorization code generated on the NB equipment, if so, sends a token (token) corresponding to the NB equipment to the client, so that the client and the NB equipment are bound, and if not, sends binding failure information to the client.
According to another aspect of the present invention, there is provided a securely bound NB device for narrowband internet of things, including an NB module, an electronic control module, and a nixie tube, wherein: the NB module is used for sending equipment information to the cloud platform through the narrowband Internet of things, so that the cloud platform randomly generates a unique binary authorization code according to the equipment information and receives the binary authorization code generated by the cloud platform; and the electronic control module is used for receiving the binary authorization code from the NB module, using the binary authorization code as a segment code of the nixie tube, and controlling the nixie tube to display the binary authorization code so as to be input by a client side to perform binding operation with the NB equipment.
According to another aspect of the present invention, there is provided a client for secure binding of a narrowband internet of things, including: the input module is used for inputting a binary authorization code consistent with nixie tube display of the NB equipment; and the transceiver module is used for sending the binary authorization code and the equipment information to a cloud platform to obtain a token (token), receiving the token (token) sent by the cloud platform and finishing binding.
According to another aspect of the present invention, there is provided a secure binding cloud platform for a narrowband internet of things, the cloud platform comprising: the first processing module is used for receiving equipment information sent by NB equipment, generating a token (token) corresponding to the NB equipment and a binary authorization code, wherein the binary authorization code is randomly generated and unique according to the equipment information, and sending the token (token) and the binary authorization code to the NB equipment; the second processing module is configured to receive a binary authorization code and device information sent by a client, verify whether the binary authorization code sent by the client is consistent with a binary authorization code generated on the NB device, send a token (token) corresponding to the NB device to the client if the binary authorization code sent by the client is consistent with the binary authorization code generated on the NB device, bind the client and the NB device, and send binding failure information to the client if the binary authorization code sent by the client is inconsistent with the binary authorization code generated on the NB device.
According to another aspect of the present invention, there is provided a system for secure binding of a narrowband internet of things, including an NB device, a client, and a cloud platform, wherein: the system comprises an NB (NB) device, a cloud platform and a server, wherein the NB device is used for sending device information to the cloud platform, receiving a token (token) which is generated by the cloud platform and corresponds to the NB device and a binary authorization code, the binary authorization code is randomly generated and unique according to the device information, and displaying the binary authorization code as a segment code of a nixie tube; the client is used for inputting the binary authorization code consistent with the segment code displayed by the nixie tube of the NB equipment, sending the binary authorization code and the equipment information to the cloud platform to obtain a token (token), receiving the token sent by the cloud platform and finishing binding; the cloud platform is used for receiving the device information sent by the NB device, generating a token and a binary authorization code corresponding to the NB device, and sending the token (token) and the binary authorization code to the NB device; receiving a binary authorization code and device information sent by a client, verifying whether the binary authorization code sent by the client is consistent with the binary authorization code generated on the NB device, if so, sending a token (token) corresponding to the NB device to the client, binding the client and the NB device, and if not, sending binding failure information to the client.
Drawings
Fig. 1 is a flowchart of a secure binding method based on a narrowband internet of things according to a first embodiment of the present invention;
FIG. 2 is a diagram illustrating the effect of a nixie tube display of a binary authorization code according to a first embodiment of the present invention;
fig. 3 is a diagram of an NB device structure for secure binding of the narrowband internet of things according to the first embodiment of the present invention;
fig. 4 is a flowchart of a secure binding method based on a narrowband internet of things according to a second embodiment of the present invention;
FIG. 5 is a diagram illustrating an interface display effect of a graphical nixie tube according to a second embodiment of the present invention;
FIG. 6 is a diagram illustrating the display effect of the interface after the client completes binding according to the second embodiment of the present invention;
fig. 7 is a diagram of a client structure for secure binding of the narrowband internet of things according to a second embodiment of the present invention;
fig. 8 is a flowchart of a security binding method based on a narrowband internet of things according to a third embodiment of the present invention;
fig. 9 is a diagram of a secure binding cloud platform structure for a narrowband internet of things according to a third embodiment of the present invention;
fig. 10 is a flowchart of a security binding method based on a narrowband internet of things according to a fourth embodiment of the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below.
First embodiment
In a first exemplary embodiment of the present invention, a security binding method based on a narrowband internet of things is provided. Fig. 1 is a flowchart of a secure binding method based on a narrowband internet of things according to a first embodiment of the present invention, and referring to fig. 1, the secure binding method of the present invention includes the following steps:
step S101: the NB equipment sends equipment information to the cloud platform;
in this embodiment, the NB device includes, but is not limited to, an air conditioner, a refrigerator, a washing machine, and the like, and an internet of things module (that is, an NB-IoT module, hereinafter referred to as "NB module") is built in the NB device, and the NB module connects a narrowband internet of things built in a cellular network by using a wireless cellular network communication protocol, for example, an operator core network is connected to a cloud platform, and can upload device information to the cloud platform.
Optionally, the device information includes, but is not limited to, a device type, a device MAC address (i.e., a device unique identifier), a device name, an operation parameter, and the like.
The sending of the device information may be triggered by a preset operation of the user on the NB device, and optionally, triggered by a reset operation on the NB device, where the specific reset operation may be, for example, pressing a reset key set on the NB device, and long-pressing a power-on key 3s or 5s of the NB device.
Step S102: the method comprises the steps that an NB (NB) device receives a token (token) corresponding to the NB device and a binary authorization code, wherein the token (token) and the binary authorization code are generated by a cloud platform, and the binary authorization code is randomly generated and unique according to device information;
the token (token) is generated by the cloud platform according to the device information of the NB device through an algorithm, and only a client with a control right can acquire the token (token) for the private identity of the NB device. Before the NB device is reset, the bound NB device will store the token (token), and after resetting, the original token (token) is invalid and a new token (token) needs to be acquired again.
The binary authorization code is a 14-bit random code in this embodiment, for example, obviously, the number of bits of the binary authorization code is not limited to this, and may also be, for example, 7 bits, 8 bits, 21 bits, and so on, as long as it can be matched with a nixie tube having a corresponding number of segments. The random code is adopted to prevent the authorization code from being stolen, and the security of the binding process is improved.
Step S103: the NB device displays the binary authorization code as a segment code of the nixie tube for the client to input so as to perform the binding operation with the NB device;
nixie tubes are well known to those skilled in the art, and are formed by packaging a plurality of light emitting diodes together into an 8-shaped device, and the arrangement of the device is as shown in fig. 2, and the device is formed by segments represented by a to G, DP, the double eight nixie tube in this embodiment does not include a decimal point GP, at this time, a binary code 1 represents a high level, a corresponding diode is turned on, a binary code 0 represents a low level, and a corresponding diode is turned off, so that the 14-bit binary authorization code "10010000100100" in this embodiment corresponds to the nixie tube from the binary low level in the following table 1.
TABLE 1
A B C D E F G A B C D E F G
0 0 1 0 0 1 0 0 0 0 1 0 0 1
Therefore, the C/F/D/G diode in the double-eight nixie tube is lightened, the display effect is as shown in fig. 2, and the authorization code is displayed through the nixie tube, so that the problem that labels such as two-dimensional codes and bar codes are pasted on NB equipment to provide authorization codes for cloud platforms or clients, and the labels are damaged or stolen is avoided.
At this time, the binary authorization code of 14 bits can be displayed through the double eight nixie tubes, and the probability of generating the binary authorization repetition at the same time is 1/2 14 The problem of repeated authorization codes can be avoided by using the double-bit nixie tube, and the method is particularly suitable for NB equipment with extremely low requirements on display screens, such as air conditioners, washing machines, refrigerators and the like. It is of course not excluded that in other embodiments, other numbers of nixie tubes may be used to display the binary authorization of the corresponding digit.
Then, the user inputs the binary authorization code displayed on the NB device into the client to perform the binding operation on the client, which will be described in detail in the second embodiment below.
Optionally, the present embodiment further includes step S104: when the NB device is reset, the step of binding the NB device and the client is performed again, specifically, the operations in steps S101 to S103 are repeated, at this time, after the NB device is reset, the original token (token) stored in the bound NB device fails, a new token (token) and a binary authorization code need to be obtained from the cloud platform again, and then the newly obtained binary authorization code is displayed. One case of using this step S104 is: when the device is repaired or the internal NB module needs to be replaced, the binding between the NB device and the client can be carried out again through resetting.
Optionally, this embodiment further includes step S105: after the NB equipment and the client are bound, the NB equipment receives a response instruction sent by the client to cancel the nixie tube display. Therefore, before the client finishes the binding operation, the NB device always displays the binary authorization code, so that a user can conveniently check the authorization code and input the authorization code into the client.
Based on the secure binding method, the embodiment also provides an NB device for secure binding of a narrowband internet of things. Fig. 3 is a structure diagram of an NB device for secure binding of a narrowband internet of things according to a first embodiment of the present invention, and referring to fig. 3, the NB device includes an NB module, an electronic control module, and a nixie tube, where: the system comprises an NB module, a cloud platform and a server, wherein the NB module is used for sending equipment information to the cloud platform and receiving a token (token) and a binary authorization code which are generated by the cloud platform and correspond to NB equipment, and the binary authorization code is generated according to the equipment information and is unique; and the electronic control module is used for receiving the binary authorization code sent by the NB module, and controlling the nixie tube to display the binary authorization code as a segment code of the nixie tube so as to be input by a client side to perform binding operation with the NB equipment.
Optionally, the NB device has a reset key, which may trigger a reset operation of the NB device, at this time, send device information to the cloud platform again, receive a new token (token) and a binary authorization code, which are sent by the cloud platform and correspond to the NB device, and re-bind the NB device and the client.
Second embodiment
In a second exemplary embodiment of the present invention, a security binding method based on a narrowband internet of things is provided. Fig. 4 is a flowchart of a secure binding method based on a narrowband internet of things according to a second embodiment of the present invention, and referring to fig. 4, the secure binding method of the present invention includes the following steps:
step S201: inputting a binary authorization code consistent with a segment code displayed by a nixie tube of the NB equipment at a client;
in this embodiment, the client is a mobile phone, and has an interface of a graphical nixie tube, as shown in fig. 5, and a binary authorization code is input by clicking different segments of the graphical nixie tube in the interface, so that the method has the advantages of being simple in operation and interesting. Referring again to fig. 2, the graphical nixie tube of the interface visually demonstrates a display effect consistent with the nixie tube of the NB device.
Step S202: the client sends the binary authorization code and the equipment information to the cloud platform to obtain a token (token);
in this embodiment, referring to fig. 5, sending the binary authorization code to the cloud platform by the client may be triggered by clicking a button "bind device" in the interface.
Step S203: the client receives the token (token) sent by the cloud platform, binding is completed, and then the subsequent client controls and manages the NB device.
Optionally, the present embodiment further includes step S204: after binding between the NB equipment and the client, the client sends a response instruction to the NB equipment to cancel the nixie tube display of the NB equipment.
Specifically referring to fig. 6, a "confirm" button is displayed on the interface displayed after the client receives a token (token) sent by the cloud platform and completes binding, and a response instruction is sent to the NB device by clicking the "confirm" button, wherein the response instruction is specifically uploaded to the cloud platform, and is sent to the NB device by the cloud platform, so that the nixie tube display of the NB device is cancelled according to the response instruction.
Based on the secure binding method, the embodiment provides a secure binding client for a narrowband internet of things. Fig. 7 is a diagram of a client structure for secure binding of a narrowband internet of things according to a second embodiment of the present invention, and referring to fig. 7, the client includes an input module for inputting a binary authorization code consistent with a segment code displayed by a nixie tube of an NB device; the receiving and sending module is used for sending the binary authorization code and the device information to the cloud platform to obtain the token (token), receiving the token (token) sent by the cloud platform, and completing binding.
Third embodiment
In a third exemplary embodiment of the present invention, a method for secure binding based on a narrowband internet of things is provided. Fig. 8 is a flowchart of a security binding method based on a narrowband internet of things according to a third embodiment of the present invention, and referring to fig. 8, the security binding method of the present invention includes the following steps:
step S301: the method comprises the steps that a cloud platform receives equipment information sent by NB equipment, generates a token (token) corresponding to the NB equipment and a binary authorization code, the binary authorization code is randomly generated and unique according to the equipment information, and sends the token (token) and the binary authorization code to the NB equipment;
the token is generated through an algorithm according to the device information, and is used as a private identity of the NB device, and the generated binary code is described in the first embodiment, which is not described herein again.
Step S302: the cloud platform receives the binary authorization code and the device information sent by the client, verifies whether the binary authorization code sent by the client is consistent with the binary authorization code generated on the NB device, if so, sends a token (token) corresponding to the NB device to the client, so that the client and the NB device are bound, and if not, sends binding failure information to the client.
Optionally, the cloud platform verifies the device information sent by the client in addition to the binary authorization code, sends a token (token) corresponding to the NB device to the client if the device information is correct, and sends binding failure information to the client if the device information is not consistent. If the binding fails, the user needs to obtain the binary authorization code by resetting the NB device again to perform the binding operation.
Based on the secure binding method, the embodiment also provides a secure binding cloud platform for the narrowband internet of things. Fig. 9 is a diagram of a secure binding cloud platform structure for a narrowband internet of things according to a third embodiment of the present invention, and referring to fig. 9, the cloud platform includes: the first processing module is configured to receive device information sent by an NB device, generate a token (token) and a binary authorization code corresponding to the NB device, where the binary authorization code is randomly generated and unique according to the device information, and send the token (token) and the binary authorization code to the NB device; the second processing module is configured to receive the binary authorization code and the device information sent by the client, verify whether the binary authorization code sent by the client is consistent with the binary authorization code generated on the NB device, send a token (token) corresponding to the NB device to the client if the binary authorization code sent by the client is consistent with the binary authorization code generated on the NB device, bind the client and the NB device, and send binding failure information to the client if the binary authorization code sent by the client is inconsistent with the binary authorization code generated on the NB device.
Fourth embodiment
In a fourth exemplary embodiment of the present invention, a security binding method based on a narrowband internet of things is provided. Fig. 10 is a flowchart of a security binding method based on a narrowband internet of things according to a fourth embodiment of the present invention, and referring to fig. 10, the security binding method of the present invention includes the following steps: the NB equipment sends equipment information to the cloud platform; the method comprises the steps that a cloud platform receives equipment information sent by NB equipment, generates a token (token) corresponding to the NB equipment and a binary authorization code, the binary authorization code is randomly generated and unique according to the equipment information, and sends the token (token) and the binary authorization code to the NB equipment; the method comprises the steps that an NB (NB) device receives a token (token) corresponding to the NB device and a binary authorization code, wherein the token (token) and the binary authorization code are generated by a cloud platform, and the binary authorization code is randomly generated and unique according to device information; the NB device displays the binary authorization code as a segment code of the nixie tube for the client to input so as to perform the binding operation with the NB device; inputting a binary authorization code consistent with a segment code displayed by a nixie tube of the NB equipment at a client; the client sends the binary authorization code and the equipment information to the cloud platform to obtain a token (token); the platform receives a binary authorization code and equipment information sent by a client, verifies whether the binary authorization code sent by the client is consistent with a binary authorization code generated on NB equipment, if so, sends a token (token) corresponding to the NB equipment to the client, so that the client and the NB equipment are bound, and if not, sends binding failure information to the client; the client receives the token (token) sent by the cloud platform, binding is completed, and then the subsequent client controls and manages the NB device. The above steps have been described in detail in the foregoing three embodiments, and are not described herein.
Based on the above secure binding method, the embodiment further provides a system for secure binding of a narrowband internet of things, where the system includes an NB device, a client, and a cloud platform, where: the system comprises an NB (NB) device, a cloud platform and a server, wherein the NB device is used for sending device information to the cloud platform, receiving a token (token) which is generated by the cloud platform and corresponds to the NB device and a binary authorization code, the binary authorization code is randomly generated and unique according to the device information, and the binary authorization code is displayed as a segment code of a nixie tube; the client is used for inputting a binary authorization code consistent with a segment code displayed by a nixie tube of the NB equipment, sending the binary authorization code and equipment information to the cloud platform to obtain a token (token), receiving the token (token) sent by the cloud platform and finishing binding; the cloud platform is used for receiving the device information sent by the NB device, generating a token (token) and a binary authorization code corresponding to the NB device, and sending the token (token) and the binary authorization code to the NB device; receiving a binary authorization code and equipment information sent by a client, verifying whether the binary authorization code sent by the client is consistent with a binary authorization code generated on NB equipment, if so, sending a token (token) corresponding to the NB equipment to the client, so that the client and the NB equipment are bound, and if not, sending binding failure information to the client.
Furthermore, the present invention also provides a computer-readable storage medium, on which a computer program is stored, where the program, when executed by a processor, implements the method for secure binding based on narrowband internet of things as described in the first to fourth embodiments. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. If implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
Although the present invention is disclosed above, the present invention is not limited thereto. Various changes and modifications may be effected therein by one skilled in the art without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (10)

1. A safe binding method based on a narrowband Internet of things is characterized by comprising the following steps:
the NB equipment sends equipment information to the cloud platform;
the NB equipment receives a token and a binary authorization code which are generated by the cloud platform and correspond to the NB equipment, the binary authorization code is randomly generated and unique according to the equipment information, and the token can be obtained only by a client with control authority; and
the NB device displays the binary authorization code as a segment code of a nixie tube so that a client can input the binary authorization code and device information and send the binary authorization code and the device information to the cloud platform to obtain a token, and then binding operation with the NB device is carried out.
2. The secure binding method of claim 1, wherein the binary authorization code has 14 bits and the nixie tube is a double eight nixie tube.
3. The secure binding method of claim 1, further comprising: and when the NB equipment is reset, the step of binding the NB equipment and the client is carried out again.
4. A safe binding method based on a narrow-band Internet of things is characterized by comprising the following steps:
inputting a binary authorization code consistent with a segment code displayed by a nixie tube of the NB equipment at a client;
the client sends the binary authorization code and the equipment information to a cloud platform to obtain a token; receiving a token sent by the cloud platform, and completing binding, wherein the token can be obtained only by a client with a control authority;
after the NB equipment is bound with the client, the client sends a response instruction to the NB equipment to cancel nixie tube display of the NB equipment.
5. The secure binding method of claim 4, wherein the client has an interface for a graphical nixie tube, and wherein the binary authorization code is entered by selecting different segment bits of the graphical nixie tube.
6. A safe binding method based on a narrowband Internet of things is characterized by comprising the following steps:
the method comprises the steps that a cloud platform receives equipment information sent by NB equipment, generates a token and a binary authorization code corresponding to the NB equipment, the binary authorization code is randomly generated and unique according to the equipment information, the token can be obtained only by a client with control authority, and the token and the binary authorization code are sent to the NB equipment;
the cloud platform receives a binary authorization code and equipment information sent by a client, verifies whether the binary authorization code sent by the client is consistent with a binary authorization code generated on NB equipment, if so, sends a token corresponding to the NB equipment to the client, binds the client and the NB equipment, sends a response instruction to the NB equipment by the client to cancel the nixie tube display of the NB equipment, and if not, sends binding failure information to the client.
7. The utility model provides a NB equipment that is used for safe binding of narrowband thing networking which characterized in that, NB equipment includes NB module, electronic control module and charactron, wherein:
the NB module is used for sending equipment information to a cloud platform, and receiving a token and a binary authorization code which are generated by the cloud platform and correspond to the NB equipment, wherein the binary authorization code is generated and unique according to the equipment information, and the token can be obtained only by a client with control authority;
and the electronic control module is used for receiving the binary authorization code sent by the NB module, controlling the nixie tube to display the binary authorization code as a segment code of the nixie tube so that a client can input the binary authorization code and device information and send the binary authorization code and the device information to the cloud platform to obtain a token for binding with the NB device, and after the NB device and the client are bound, the NB device receives a response instruction sent by the client to cancel the nixie tube display.
8. A client for secure binding of a narrowband internet of things, the client comprising:
the input module is used for inputting a binary authorization code consistent with a segment code displayed by a nixie tube of the NB equipment;
the receiving and sending module is used for sending the binary authorization code and the equipment information to a cloud platform to obtain a token, receiving the token sent by the cloud platform, and completing binding, wherein the token can be obtained only by a client with control authority;
after the NB equipment is bound with the client, the client sends a response instruction to the NB equipment to cancel nixie tube display of the NB equipment.
9. A cloud platform for secure binding of narrowband internet of things, the cloud platform comprising:
the first processing module is used for receiving device information sent by NB (evolved node B) devices, generating tokens and binary authorization codes corresponding to the NB devices, wherein the binary authorization codes are randomly generated and unique according to the device information, the tokens can be acquired only by a client with control authority, and sending the tokens and the binary authorization codes to the NB devices;
the second processing module is configured to receive a binary authorization code and device information sent by a client, verify whether the binary authorization code sent by the client is consistent with a binary authorization code generated on the NB device, send a token corresponding to the NB device to the client if the binary authorization code sent by the client is consistent with the binary authorization code generated on the NB device, bind the client and the NB device, send a response instruction to the NB device by the client to cancel a nixie tube display of the NB device, and send binding failure information to the client if the binary authorization code sent by the client is inconsistent with the binary authorization code generated on the NB device.
10. A system for secure binding of a narrowband Internet of things, the system comprising an NB device, a client, and a cloud platform, wherein:
the system comprises NB equipment, a cloud platform and a client, wherein the NB equipment is used for sending equipment information to the cloud platform, receiving a token and a binary authorization code, which are generated by the cloud platform and correspond to the NB equipment, the binary authorization code is randomly generated and unique according to the equipment information, only a client with control authority can obtain the token, and the binary authorization code is used as a segment code of a nixie tube to be displayed;
the client is used for inputting the binary authorization code consistent with the segment code displayed by the nixie tube of the NB equipment, sending the binary authorization code and equipment information to a cloud platform to obtain a token, receiving the token sent by the cloud platform to complete binding, and after the NB equipment and the client are bound, sending a response instruction to the NB equipment by the client to cancel the nixie tube display of the NB equipment;
the cloud platform is used for receiving equipment information sent by NB equipment, generating a token and a binary authorization code corresponding to the NB equipment, and sending the token and the binary authorization code to the NB equipment; receiving a binary authorization code and equipment information sent by a client, verifying whether the binary authorization code sent by the client is consistent with the binary authorization code generated on the NB equipment, if so, sending a token corresponding to the NB equipment to the client to bind the client and the NB equipment, and if not, sending binding failure information to the client.
CN201911048765.1A 2019-10-30 2019-10-30 Safe binding method and system based on narrowband Internet of things Active CN110677248B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911048765.1A CN110677248B (en) 2019-10-30 2019-10-30 Safe binding method and system based on narrowband Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911048765.1A CN110677248B (en) 2019-10-30 2019-10-30 Safe binding method and system based on narrowband Internet of things

Publications (2)

Publication Number Publication Date
CN110677248A CN110677248A (en) 2020-01-10
CN110677248B true CN110677248B (en) 2022-09-30

Family

ID=69084861

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911048765.1A Active CN110677248B (en) 2019-10-30 2019-10-30 Safe binding method and system based on narrowband Internet of things

Country Status (1)

Country Link
CN (1) CN110677248B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111898111A (en) * 2020-06-29 2020-11-06 南京博联智能科技有限公司 Device binding method, device, electronic device, storage medium and system
CN113746633B (en) * 2021-08-05 2023-10-17 深圳Tcl新技术有限公司 Internet of things equipment binding method, device, system, cloud server and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105897668A (en) * 2015-10-22 2016-08-24 乐视致新电子科技(天津)有限公司 Third party account authorization method, device, server and system
CN108540433A (en) * 2017-03-06 2018-09-14 华为技术有限公司 User identity method of calibration and device

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7302571B2 (en) * 2001-04-12 2007-11-27 The Regents Of The University Of Michigan Method and system to maintain portable computer data secure and authentication token for use therein
JP6198477B2 (en) * 2013-06-21 2017-09-20 キヤノン株式会社 Authority transfer system, authorization server system, control method, and program
CN105827573B (en) * 2015-01-07 2019-03-05 中国移动通信集团山东有限公司 System, method and the relevant apparatus of internet of things equipment strong authentication
CN104717215A (en) * 2015-03-07 2015-06-17 上海恩辅信息科技有限公司 Equipment safety control method and system based on internet of things
CN104994073B (en) * 2015-05-29 2019-03-19 北京奇虎科技有限公司 Mobile phone terminal, server and its account number and apparatus bound control execute method
CN105812491B (en) * 2016-05-12 2020-06-16 腾讯科技(深圳)有限公司 Equipment remote binding method and device
CN106130958B (en) * 2016-06-08 2019-02-01 美的集团股份有限公司 The communication system and method for household appliance and terminal, household appliance, terminal
CN106685917B (en) * 2016-11-09 2019-11-12 苏州数言信息技术有限公司 The realization method and system that internet of things equipment and controller are intelligently bound
US10382203B1 (en) * 2016-11-22 2019-08-13 Amazon Technologies, Inc. Associating applications with Internet-of-things (IoT) devices using three-way handshake
CN107421060B (en) * 2017-06-29 2019-12-31 青岛海尔空调器有限总公司 NB-IoT network-based air conditioner communication method and air conditioner
CN108521857B (en) * 2017-07-25 2021-08-03 北京小米移动软件有限公司 NB-IoT equipment binding method and IOT control system
CN107800687B (en) * 2017-09-26 2020-04-14 无锡小天鹅电器有限公司 Equipment binding method and system based on Internet of things and washing machine
CN107979514B (en) * 2017-11-21 2021-03-19 海信集团有限公司 Method and device for binding devices
CN110247829A (en) * 2018-08-02 2019-09-17 无锡小天鹅电器有限公司 Appliances equipment control method, device, electronic equipment and storage medium
CN109309683B (en) * 2018-10-30 2021-09-14 泰华智慧产业集团股份有限公司 Token-based client identity authentication method and system
CN109743598A (en) * 2018-12-29 2019-05-10 深圳Tcl新技术有限公司 Third party is authorized to access method, system and the readable storage medium storing program for executing of TV

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105897668A (en) * 2015-10-22 2016-08-24 乐视致新电子科技(天津)有限公司 Third party account authorization method, device, server and system
CN108540433A (en) * 2017-03-06 2018-09-14 华为技术有限公司 User identity method of calibration and device

Also Published As

Publication number Publication date
CN110677248A (en) 2020-01-10

Similar Documents

Publication Publication Date Title
US10387856B2 (en) Online payment method, system, and apparatus
US10084602B2 (en) Dynamic token and a working method thereof
US20160210632A1 (en) Secured payment method and relevant device and system
CN110677248B (en) Safe binding method and system based on narrowband Internet of things
CN106487743A (en) Method and apparatus for supporting multi-user's cluster authentication
CN105915343B (en) A kind of offline Activiation method of registration user and system
CN108848162B (en) Display device connection method, display device and system
CN103747013A (en) Cloud terminal login verification method and device
CN105787682A (en) Logistics business information processing method, related device, and related system
CN105100067A (en) Cloud activation method and system
CN103249033A (en) Method and terminal for achieving self-help number changing of SIM card
CN109660487B (en) Authorization method based on H5 webpage, storage medium, electronic device and system
CN103501391A (en) Method and system for managing updating behavior of user
CN112632484A (en) Software authorization method and device and computer equipment
CN106846505A (en) A kind of ticket checking method
CN106790756B (en) Automatic generation method and system for MAC address of power distribution terminal
CN109639622B (en) Offline application login method, terminal and server
CN109445973A (en) Position the method and device of application crash
CN111683372B (en) Attribute information processing method, attribute information processing device, processor and terminal
CN115361104A (en) Intelligent equipment upgrading method, system, computer equipment and storage medium
CN115688199A (en) Key generation method and device for intelligent device, electronic device and medium
CN114968822A (en) Interface testing method and device, computer equipment and storage medium
CN111541692B (en) Identity verification method, system, device and equipment
CN113935069A (en) Data verification method, device and equipment based on block chain and storage medium
CN107862090A (en) The horizontal extension method and device of database

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant