CN112165706B - Equipment connection management method and device and Bluetooth equipment - Google Patents

Equipment connection management method and device and Bluetooth equipment Download PDF

Info

Publication number
CN112165706B
CN112165706B CN202011030424.4A CN202011030424A CN112165706B CN 112165706 B CN112165706 B CN 112165706B CN 202011030424 A CN202011030424 A CN 202011030424A CN 112165706 B CN112165706 B CN 112165706B
Authority
CN
China
Prior art keywords
information
authorization
bluetooth
electronic device
connection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011030424.4A
Other languages
Chinese (zh)
Other versions
CN112165706A (en
Inventor
胡期鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Hangzhou Co Ltd
Original Assignee
Vivo Mobile Communication Hangzhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Hangzhou Co Ltd filed Critical Vivo Mobile Communication Hangzhou Co Ltd
Priority to CN202011030424.4A priority Critical patent/CN112165706B/en
Publication of CN112165706A publication Critical patent/CN112165706A/en
Application granted granted Critical
Publication of CN112165706B publication Critical patent/CN112165706B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Abstract

The application discloses a device connection management method, a device and Bluetooth equipment, wherein the method comprises the following steps: receiving an authorization request sent by first electronic equipment; the authorization request comprises authorization information and first verification information corresponding to the first electronic equipment; under the condition that the first check information is successfully checked based on target information pre-stored by the Bluetooth equipment, storing the authorization information; and connecting with the second electronic equipment based on the stored authorization information. The method can improve the connection safety of the Bluetooth device.

Description

Equipment connection management method and device and Bluetooth equipment
Technical Field
The application belongs to the technical field of communication, and particularly relates to a device connection management method and device and a Bluetooth device.
Background
With the rapid development of hardware technology and design, the types of devices are increasing, and the types of devices can be roughly divided into two types, namely wired devices and wireless devices. In recent years, more and more electronic devices have eliminated device connection sockets, making wireless devices such as bluetooth devices a trend in recent years.
Currently, when connecting a bluetooth device, the electronic device can be connected to the bluetooth device as long as the bluetooth device is enabled, which may make the connection security of the bluetooth device relatively low.
Disclosure of Invention
The embodiment of the application aims to provide a device connection management method and device and a Bluetooth device, and the problem that the connection safety of the Bluetooth device is low in the prior art can be solved.
In order to solve the technical problem, the present application is implemented as follows:
in a first aspect, an embodiment of the present application provides a device connection management method, where the method is applied to a bluetooth device, and includes:
receiving an authorization request sent by first electronic equipment; the authorization request comprises authorization information and first verification information corresponding to the first electronic equipment;
under the condition that the first check information is successfully checked based on target information pre-stored by the Bluetooth equipment, storing the authorization information;
and connecting with the second electronic equipment based on the stored authorization information.
In a second aspect, an embodiment of the present application provides an apparatus for device connection management, including:
the first receiving module is used for receiving an authorization request sent by first electronic equipment; the authorization request comprises authorization information and first verification information corresponding to the first electronic equipment;
the first storage module is used for storing the authorization information under the condition that the first verification information is verified successfully based on target information pre-stored by the Bluetooth equipment;
and the first connection module is used for connecting with the second electronic equipment based on the stored authorization information.
In a third aspect, embodiments of the present application provide a bluetooth device, which includes a processor, a memory, and a program or instructions stored on the memory and executable on the processor, and when executed by the processor, the program or instructions implement the steps of the method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a readable storage medium, on which a program or instructions are stored, which when executed by a processor implement the steps of the method according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the method according to the first aspect.
In the embodiment of the application, an authorization request sent by first electronic equipment is received; the authorization request comprises authorization information and first verification information corresponding to the first electronic equipment; under the condition that the first check information is successfully checked based on target information pre-stored by the Bluetooth equipment, storing the authorization information; and connecting with the second electronic equipment based on the stored authorization information. Therefore, when other electronic devices are connected with the Bluetooth device, the Bluetooth device needs to verify whether the electronic device is an authorized electronic device based on the authorization information, and thus, other electronic devices need the authorization of the first electronic device to be connected with the Bluetooth device, so that the connection safety of the Bluetooth device can be improved.
Drawings
Fig. 1 is a flowchart of a device connection management method provided in an embodiment of the present application;
fig. 2 is a block diagram of a device connection management apparatus according to an embodiment of the present application;
fig. 3 is a block diagram of a bluetooth device according to an embodiment of the present application;
fig. 4 is a schematic diagram of a hardware structure of a bluetooth device for implementing the embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application may be practiced in sequences other than those illustrated or described herein, and that the terms "first," "second," and the like are generally used herein in a generic sense and do not limit the number of terms, e.g., the first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
The device connection management provided by the embodiment of the present application is described in detail through specific embodiments and application scenarios thereof with reference to the accompanying drawings.
Referring to fig. 1, fig. 1 is a flowchart of a device connection management method provided in an embodiment of the present application, and as shown in fig. 1, includes the following steps:
step 101, receiving an authorization request sent by first electronic equipment; the authorization request comprises authorization information and first verification information corresponding to the first electronic device.
In this embodiment, the device connection management method is applied to a bluetooth device, and the bluetooth device may be an electronic device with a bluetooth function, such as a bluetooth headset, a bluetooth sound device, and the like.
In this step, the first electronic device may be a terminal device, for example, a mobile phone or an intelligent wearable device, and may establish a connection with the bluetooth device through bluetooth.
The first electronic device may be referred to as a master terminal device, which is an electronic device bound to the bluetooth device. In an optional embodiment, the first electronic device may be an electronic device to which a bluetooth device is connected for the first time, and in a case where the bluetooth device is connected to the first electronic device for the first time, the bluetooth device may be bound. In another alternative embodiment, the first electronic device may also be an electronic device that is unbound and then unbound again.
After the bluetooth device binds the first electronic device, the first electronic device may set a permission for connecting with the bluetooth device for another terminal device (which may be referred to as a guest terminal device), so that the guest terminal device may connect with the bluetooth device within a range allowed by the permission.
Specifically, under the condition that the first electronic device is connected with the bluetooth device, the user can trigger the first target control on the first electronic device, so that the first electronic device generates an authorization request and sends the authorization request to the bluetooth device, and the permission for connecting with the bluetooth device is set for the visitor terminal device.
The authorization request may include authorization information and first verification information corresponding to the first electronic device, where the first verification information is used to verify an identity of the first electronic device to determine whether the first electronic device has authorization authority. In an optional implementation manner, the first check information may check whether the first electronic device is a master terminal device, and if the identity of the first electronic device is checked to be the master terminal device, the first electronic device has an authorization right.
The first check information may include identification information of the first electronic device, and optionally, the identification information of the first electronic device may be a Media Access Control (MAC) Address. The first check information may also include first account information for the first electronic device to access the bluetooth device, and the first check information may also include first key information, where the first key information may be key information that is preset by a user and used for authorization. That is, the first verification information may include at least one of identification information of the first electronic device, first account information, and first key information.
The first account information may include account information logged on an application APP run by the first electronic device, and optionally, in order to further ensure connection security of the bluetooth device, the first account information may further include identification information of the application APP.
The authorization information is used for setting a connection certificate of the Bluetooth device and the visitor terminal device, so that the visitor terminal device can establish connection with the Bluetooth device based on the connection certificate under the condition of authorization of the first electronic device.
The authorization information may include key information connectable to the guest terminal device, and optionally, the authorization information may include target key information, which may be key information set by the user for the guest terminal device. Of course, in order to further improve the connection security of the bluetooth device, the authorization information may also include a time period during which the guest terminal device can be connected to the bluetooth device based on the target key information, that is, a first authorization time period set for the target key information by the first electronic device, where the first authorization time period may be a certain time length or a certain time period. That is, the guest terminal device can connect with the bluetooth device only based on the target key information within the first authorization period.
The authorization information may also include target account information that the guest terminal device may access the bluetooth device. Of course, in order to further improve the connection security of the bluetooth device, the authorization information may also include a time period during which the guest terminal device can be connected to the bluetooth device based on the target account information, that is, a second authorization time period set for the target account information by the first electronic device, where the second authorization time period may be a certain time length or a certain time period, that is, the guest terminal device may be connected to the bluetooth device only within the second authorization time period based on the target account information.
The authorization information may also include a destination MAC address of an electronic device to which the bluetooth device may connect. Of course, in order to further improve the connection security of the bluetooth device, the authorization information may also include a time period during which the guest terminal device corresponding to the target MAC address can be connected to the bluetooth device, that is, a third authorization time period set for the target MAC address by the first electronic device, where the third authorization time period may be a certain time length or a certain time period. That is, the guest terminal device corresponding to the target MAC address can be connected to the bluetooth device only during the third authorized period.
The user may authorize the connection of the guest terminal device according to actual conditions, and may authorize in one or more ways, that is, the authorization information may include one or more of the above information, which is not limited specifically herein.
Accordingly, the bluetooth device may receive the authorization request transmitted by the first electronic device to perform device connection management according to the authorization request.
And 102, storing the authorization information under the condition that the first verification information is verified successfully based on target information pre-stored in the Bluetooth device.
In this step, the target information may be authorization verification information, and the authorization verification information may be used to verify whether the first electronic device has authorization capability, and may include at least one of a MAC address of a terminal device for authorization (which may be a master terminal device), key information for authorization set by the master terminal device, and account information.
When the first verification information includes the first key information, the first key information may be matched with key information for authorization in the target information, and when the matching is successful, it may be stated that the first verification information is successfully verified, and the first electronic device has authorization authority, and at this time, the authorization information may be stored.
When the first check information includes the first MAC address of the first electronic device, the first MAC address may be matched with the MAC address of the terminal device for authorization in the target information, and when the matching is successful, the first check information may be verified successfully, and the first electronic device has authorization authority, and at this time, the authorization information may be stored.
Under the condition that the first check information comprises first account information of a first electronic device accessing the Bluetooth device, the first account information can be matched with account information used for authorization in the target information, under the condition that the matching is successful, the first check information can be verified successfully, the first electronic device has authorization authority, and at the moment, the authorization information can be stored.
Of course, in the case where the first verification information includes a plurality of kinds of information, the bluetooth device may store the authorization information in the case where verification of only one kind of information is successful. The bluetooth device may also store the authorization information only when the verification of the multiple information is successful, which is not limited specifically here.
And 103, connecting with a second electronic device based on the stored authorization information.
In this step, after the bluetooth device stores the authorization information, when the second electronic device requests to establish a connection with the bluetooth device, the bluetooth device may check, based on the authorization information, second verification information of the second electronic device in the connection request sent by the second electronic device, and may establish a connection with the second electronic device when the check is successful, and when the check is failed, it indicates that the second electronic device is not an electronic device authorized by the first electronic device, and at this time, the bluetooth device may not establish a connection with the second electronic device.
In this embodiment, an authorization request sent by a first electronic device is received; the authorization request comprises authorization information and first verification information corresponding to the first electronic equipment; under the condition that the first check information is successfully checked based on target information pre-stored by the Bluetooth equipment, storing the authorization information; and connecting with the second electronic equipment based on the stored authorization information. So, other electronic equipment when being connected with bluetooth equipment, bluetooth equipment need verify whether this electronic equipment is authorized electronic equipment based on the authorization information, like this, other electronic equipment need first electronic equipment's authorization just can be connected with bluetooth equipment to can improve bluetooth equipment's connection security, the indirect security that can improve electronic equipment.
Optionally, the first verification information includes at least one of:
first key information;
the first electronic equipment accesses first account information of the Bluetooth equipment;
a first media access control, MAC, address of the first electronic device.
In this embodiment, the first electronic device may transmit the first verification information according to actual conditions. In an optional embodiment, the user may select authorized first check information on a setting interface of the first electronic device, and by default, in a case that the user does not select the first check information, the first electronic device may send the first MAC address of the first electronic device to the bluetooth device as the first check information in the authorization request, so that the bluetooth device may verify the identity of the first electronic device. Of course, the user may also input the first key information or log in the first account information (i.e. log in the APP and the account for authorization), so as to send the first key information or the first account information to the bluetooth device as the first verification information in the authorization request.
When the first verification information includes the first key information, the first key information may be matched with key information for authorization in the target information, and when the matching is successful, it may be stated that the first verification information is successfully verified, and the first electronic device has authorization authority, and at this time, the authorization information may be stored.
When the first check information includes the first MAC address of the first electronic device, the first MAC address may be matched with the MAC address of the terminal device used for authorization in the destination information, and when the matching is successful, it may be described that the first check information is successfully checked, and the first electronic device has authorization authority, and at this time, the authorization information may be stored.
Under the condition that the first check information comprises first account information of a first electronic device accessing the Bluetooth device, the first account information can be matched with account information used for authorization in the target information, under the condition that the matching is successful, the first check information can be verified successfully, the first electronic device has authorization authority, and at the moment, the authorization information can be stored.
Of course, in the case where the first verification information includes a plurality of kinds of information, the bluetooth device may store the authorization information in the case where verification of only one kind of information is successful. The bluetooth device may also store the authorization information only when the verification of the multiple information is successful, which is not limited herein.
In this embodiment, the identity of the first electronic device is verified through the first check information to determine whether the first electronic device has the authorization right, and the bluetooth device stores the authorization information only when the first electronic device has the authorization right, so that the connection security of the bluetooth device can be improved.
Moreover, the Bluetooth device can set multiple modes to check the first electronic device, so that the authorization process of the first electronic device is more flexible.
Optionally, the authorization information includes at least one of the following:
target account information of the Bluetooth device can be accessed;
the second target key information corresponds to the authorization time period of the target key information;
a destination MAC address of an electronic device to which the Bluetooth device can connect.
In this embodiment, the authorization information may include key information connectable to the guest terminal device, and optionally, the authorization information may include target key information, which may be key information set for the guest terminal device by the user. Of course, in order to further improve the connection security of the bluetooth device, the authorization information may also include a time period during which the guest terminal device can be connected to the bluetooth device based on the target key information, that is, a first authorization time period set for the target key information by the first electronic device, that is, the guest terminal device can be connected to the bluetooth device only within the first authorization time period based on the target key information.
The authorization information may also include target account information that the guest terminal device may access the bluetooth device. Of course, in order to further improve the connection security of the bluetooth device, the authorization information may also include a time period during which the guest terminal device can be connected to the bluetooth device based on the target account information, that is, a second authorization time period set for the target account information by the first electronic device, that is, the guest terminal device can be connected to the bluetooth device only within the second authorization time period based on the target account information.
The authorization information may also include a destination MAC address of an electronic device to which the bluetooth device may connect. Of course, in order to further improve the connection security of the bluetooth device, the authorization information may also include a time period during which the guest terminal device corresponding to the target MAC address can be connected to the bluetooth device, that is, a third authorization time period set for the target MAC address by the first electronic device, that is, the guest terminal device corresponding to the target MAC address can be connected to the bluetooth device only in the third authorization time period.
The user may authorize the connection of the guest terminal device according to actual conditions, and may authorize in one or more ways, that is, the authorization information may include one or more of the above information, which is not limited specifically herein.
In this embodiment, the first electronic device may authorize in multiple ways, so that flexibility of the authorization way of the first electronic device may be improved.
Optionally, based on the first embodiment, the step 103 specifically includes:
under the condition that a connection request sent by the second electronic equipment is received, matching second verification information corresponding to the second electronic equipment and carried in the connection request with the authorization information; wherein the second check-up information includes any one of second key information, second account information for the second electronic device to access the bluetooth device, and a second MAC address of the second electronic device;
when the second key information is matched with target key information in the authorization information and the use time of the second key information is within the authorization time period, establishing connection with the second electronic equipment; or, under the condition that the second account information is matched with the target account information, establishing connection with the second electronic equipment; or, establishing a connection with the second electronic device if the second MAC address matches the target MAC address.
In this embodiment, the second electronic device may send a connection request to the bluetooth device when the bluetooth device is scanned, where the connection request may carry second check information corresponding to the second electronic device. The second verification information may include any one of second key information, second account information of the second electronic device accessing the bluetooth device, and a second MAC address of the second electronic device, and the second account information may include identification information of an application APP of the second electronic device accessing the bluetooth device and an account where the application APP logs in. Accordingly, the bluetooth device may receive a connection request sent by the second electronic device.
Under the condition that the Bluetooth device receives the connection request sent by the second electronic device, if the second electronic device is the visitor terminal device, the Bluetooth device can match the second check information with the pre-stored authorization information, and under the condition that the matching is successful, the Bluetooth device is connected with the second electronic device, otherwise, the Bluetooth device is not connected with the second electronic device.
Specifically, if the second electronic device is connected to the bluetooth device through the key information, that is, under the condition that the second verification information includes the second key information, the second key information may be matched with the target key information in the authorization information, and under the condition that the matching is successful or the matching is successful and the use time of the second key information is within the first authorization time period, the bluetooth device is connected to the second electronic device, otherwise, the bluetooth device is not connected to the second electronic device.
If the second electronic device is connected with the bluetooth device through the account information, that is, under the condition that the second electronic device includes the second account information, the second account information may be matched with the target account information in the authorization information, and under the condition that the matching is successful or the matching is successful and the use time of the second account information is within a second authorization time period, the bluetooth device is connected with the second electronic device, otherwise, the bluetooth device is not connected with the second electronic device.
If the second electronic device is connected with the bluetooth device through the MAC address, that is, if the second check information includes the second MAC address, the second MAC information may be matched with the target MAC in the authorization information, and if the matching is successful or if the matching is successful and the connection time between the second electronic device and the bluetooth device is within the third authorization time period, the bluetooth device and the second electronic device may be connected, otherwise, the bluetooth device may not be connected to the second electronic device.
In the process of connecting the Bluetooth device and the second electronic device, the Bluetooth device can verify whether the current connection time of the second electronic device is within the authorized time period, if so, the Bluetooth device keeps the connection with the second electronic device, and if not, the Bluetooth device is disconnected from the second electronic device, so that the connection safety of the Bluetooth device can be ensured.
In this embodiment, the second check-up information corresponding to the second electronic device is matched with the authorization information pre-stored in the bluetooth device, and the bluetooth device is connected to the second electronic device under the matching condition, so that the second electronic device can be connected to the bluetooth device only under the authorization condition of the first electronic device, that is, the bluetooth device can be connected to the first electronic device and the electronic device authorized by the first electronic device only, so that the connection security of the bluetooth device can be improved.
Optionally, based on the first embodiment, the first electronic device may be a master terminal device, and the master terminal device needs to be bound with the bluetooth device in advance, and can authorize the visitor terminal device when connected with the bluetooth device. Specifically, before the step 101, the method further includes:
receiving a binding request sent by the first electronic equipment; the binding request comprises binding information and third key information, wherein the binding information comprises at least one of the first key information, the first MAC address and the first account information which are set by a user;
storing the binding information as the target information under the condition that the third key information is matched with the initial key information; and establishing a connection with the first electronic device.
The embodiment describes a specific process of binding the first electronic device by the bluetooth device, after binding, the first electronic device becomes a master terminal device connected with the bluetooth device, and the first electronic device has an authorization right in a connection process with the bluetooth device.
Specifically, when the first electronic device scans the bluetooth device, the user may trigger the second target control on the first electronic device, so that the first electronic device generates a binding request and sends the binding request to the bluetooth device. The binding request may include binding information and third key information, where the binding information may include at least one of the first key information, the first MAC address, and the first account information set by the user.
And under the condition that the third key information is matched with the initial key information, the binding information can be stored to obtain target information, and the subsequent Bluetooth equipment can verify the identity of the electronic equipment based on the target information to open the connection authority or set the authority of the electronic equipment.
Specifically, in the case that the binding information includes a first MAC address, the first MAC address may be determined as a target MAC address of an electronic device connectable to the bluetooth device, and stored, so as to obtain the target information, and establish a first connection with the first electronic device. Thus, the bluetooth device is successfully bound with the main terminal device, and the target MAC address is the MAC address of the main terminal device.
In the case that the binding information includes the first key information set by the user, the first key information may be stored to obtain the target information, and a first connection may be established with the first electronic device. So far, the bluetooth device successfully binds the first key information.
When the binding information includes first account information, the first account information may be stored to obtain the target information, and a first connection may be established with the first electronic device. Therefore, the bluetooth device successfully binds the first account information. Subsequently, when the second electronic device needs to be connected with the Bluetooth device, the second electronic device can be connected with the Bluetooth device only by sending the account information bound with the Bluetooth device, so that the multi-terminal connection is more convenient.
And then, if the first electronic device needs to establish connection with the bluetooth device again, only the binding information needs to be sent again, for example, the first MAC address of the bound first electronic device, the bound first account information or the bound first key information is sent. In addition, the first electronic device may perform corresponding connection management on the bluetooth device during connection with the bluetooth device, for example, perform authorized connection for the guest terminal device, modify connection key information and initial key information of the guest terminal device, unbind the host terminal device, delete connection key information of the guest terminal device, and the like.
In this embodiment, the bluetooth device enables the first electronic device to have the authorization authority by binding the first electronic device or binding the information, and authorizes the visitor terminal device under the condition of being connected with the bluetooth device, so that the visitor terminal device authorized by the main terminal device can be connected with the bluetooth device, and the connection security of the bluetooth device can be improved.
Optionally, according to the first embodiment, after the step 102, the method further includes:
under the condition of being connected with the first electronic equipment, receiving an information editing request sent by the first electronic equipment; the information editing request comprises the first verification information;
and modifying or deleting the authorization information based on the information editing request under the condition that the first verification information is verified successfully based on the target information.
In this embodiment, after the bluetooth device binds the first electronic device, the first electronic device serves as a main terminal device, and has not only an authorization right but also a right to edit authorization information.
When the first electronic device is connected, it may receive an information editing request sent by the first electronic device, where the information editing request includes the first verification information.
When the first check information is successfully checked based on the target information, that is, the binding information, that is, when the first electronic device is checked to be an authorized electronic device, the authorization information may be modified or deleted based on the information editing request, when the information editing request is a request for deleting the authorization information, the authorization information may be directly deleted, and when the information editing request is a request for modifying the authorization information, the authorization information is modified based on the modification information in the information editing request.
In this embodiment, the first electronic device may modify information authorized by the first electronic device in the bluetooth device by interacting with the bluetooth device, so that the authorization of the first electronic device may be more flexible.
In addition, when the first electronic device is connected to the bluetooth device, the first electronic device may also perform operations such as unbinding the host terminal device and modifying the initial key information, which will be described below.
Optionally, after the bluetooth device binds to the master terminal device, the method further includes:
under the condition of connecting with the first electronic equipment, receiving a unbinding request sent by the first electronic equipment; the unbinding request comprises a first MAC address of the first electronic device or first account information of the first electronic device for accessing the Bluetooth device;
deleting the MAC address bound by the Bluetooth equipment under the condition that the first MAC address is matched with the MAC address bound by the Bluetooth equipment; or, deleting the account information bound to the Bluetooth device under the condition that the first account information is matched with the account information bound to the Bluetooth device. Meanwhile, the authorization information of the first electronic device can be deleted.
Optionally, in a case that the first electronic device is connected to the bluetooth device, the first electronic device may further interact with the bluetooth device to modify the initial key information, and the method further includes:
under the condition of connecting with the first electronic equipment, receiving a key modification request sent by the first electronic equipment; the key modification request comprises new key information and key modification verification information corresponding to the first electronic device, wherein the key modification verification information comprises a first MAC address of the first electronic device or first account information of the first electronic device for accessing the Bluetooth device;
under the condition that the first MAC address is matched with the MAC address bound with the Bluetooth equipment, the initial key information is modified into new key information set by a user; or, modifying the initial key information into new key information set by the user under the condition that the first account information is matched with account information bound to the Bluetooth device.
In addition, since the bound master terminal device may be lost or the connected initial key information may be forgotten, by setting a super key, in the case of receiving an information deletion request sent by a third electronic device, if the key information in the information deletion request matches the super key, the information bound in the bluetooth device may be cleared, so as to ensure the availability of the bluetooth device.
In order to describe the device connection management method in the embodiment of the present application in more detail, the following takes a bluetooth headset as an example for explanation.
In one embodiment, the terminal device may enter the key and the MAC address when scanning the bluetooth headset to attempt to establish a first connection with the bluetooth headset, and the bluetooth headset writes the MAC address into hardware of the bluetooth headset for binding if the key is verified to be correct, and then the bluetooth headset connects the terminal device for the first time to be regarded as a binding master terminal device.
The master terminal device may connect to the bluetooth headset and send a new key and MAC address for key modification.
The main terminal equipment can also be connected with a Bluetooth headset, the MAC address is sent to the Bluetooth headset, and after the Bluetooth headset verifies that the MAC address is the MAC address of the main terminal equipment, the main terminal equipment can be unbound, and authorization information is deleted at the same time.
The master terminal device may set a guest key of the guest terminal device, which may transmit a MAC address, the guest key, and time information, which may be a connectable time period or a connectable time in hours, to the bluetooth headset, and the bluetooth headset may write the guest key and the time information into hardware of the bluetooth headset in case of verifying the identity of the master terminal device. The master terminal device can set a plurality of visitor keys at a time or set the visitor keys for a plurality of times.
The visitor terminal equipment can be connected with the Bluetooth headset by using the visitor key, the Bluetooth headset verifies the time configuration of the visitor key, whether the time configuration is within the valid time period or not is judged, and if yes, the connection is successful. After connection, the Bluetooth headset can verify the validity of the visitor key through the set time length or the set time period, can be connected with the visitor terminal equipment within the valid time period, does not disconnect the visitor terminal equipment within the valid time period, and deletes the visitor key.
In addition, the main terminal device can set a visitor key under the condition of connecting the Bluetooth headset, and the operation can set the key, the duration or the time period. And may also delete the guest key.
In the embodiment, the visitor terminal equipment can be successfully connected with the Bluetooth headset only under the condition that the main terminal sets authorization, so that the connection safety of the Bluetooth headset can be enhanced, and the safety of the terminal is indirectly enhanced. Meanwhile, under the condition that the main terminal device is connected with the Bluetooth headset, unbinding operation, information deleting operation, key modifying operation and the like can be performed, so that application scenes of the Bluetooth headset can be increased.
In another embodiment, the terminal device may enter the key, the application APP and the account information in case of scanning the bluetooth headset to attempt to establish a first connection with the bluetooth headset.
After receiving the key, the identification information of the application program APP and the account information corresponding to the application program APP, the Bluetooth headset verifies the correctness of the key, and stores the identification information and the account information of the application program APP into the Bluetooth headset to be bound under the condition that the identification information and the account information of the application program APP are not stored in the Bluetooth headset.
After binding is successful, the application program APP and the account information of the Bluetooth equipment accessible to the visitor terminal equipment can be set through the identification information and the account information of the bound application program APP, if the visitor terminal equipment uses the authorized application program APP and logs in the authorized account information, when the Bluetooth headset is connected, the identification information and the account information of the application program APP are sent to be checked, and if checking is successful, the Bluetooth headset is connected.
The main terminal device can send a new key, the identification information of the application program APP and the account information under the condition of connecting the Bluetooth headset so as to modify the initial key.
The main terminal equipment can also send the identification information and the account information of the application program APP under the condition of connecting the Bluetooth headset so as to perform unbinding operation.
In addition, the bluetooth device may also bind identification information of multiple application programs APP and corresponding account information.
In the embodiment, the key management is more convenient by binding the application program APP and the account information, the terminal device is connected with the Bluetooth headset, and the key management can be carried out on the Bluetooth headset only by checking the application program APP and the account information. Moreover, by binding the APP and the account information, the multi-terminal device is more convenient to connect, and the terminal device is replaced without the need of first unbinding the old terminal device and then binding the new terminal device.
It should be noted that, in the device connection management method provided in the embodiment of the present application, the execution main body may be a device connection management apparatus, or a control module in the device connection management apparatus for executing the device connection management method. In the embodiment of the present application, an apparatus connection management device executes an apparatus connection management method as an example, and the apparatus connection management device provided in the embodiment of the present application is described.
Referring to fig. 2, fig. 2 is a structural diagram of a device connection management apparatus provided in an embodiment of the present application, where the apparatus is applied to a bluetooth device, and as shown in fig. 2, the device connection management apparatus 200 includes:
a first receiving module 201, configured to receive an authorization request sent by a first electronic device; the authorization request comprises authorization information and first verification information corresponding to the first electronic equipment;
a first storage module 202, configured to store the authorization information when the first verification information is successfully verified based on target information pre-stored in the bluetooth device;
and the first connection module 203 is configured to connect with a second electronic device based on the stored authorization information.
Optionally, the first verification information includes at least one of:
first key information;
the first electronic equipment accesses first account information of the Bluetooth equipment;
a first media access control, MAC, address of the first electronic device.
Optionally, the authorization information includes at least one of the following:
target account information of the Bluetooth device can be accessed;
the second target key information corresponds to the target key information in an authorization time period;
a destination MAC address of an electronic device to which the bluetooth device may connect.
Optionally, the first connection module 203 includes:
the matching unit is used for matching second check-up information corresponding to the second electronic equipment carried in the connection request with the authorization information under the condition that the connection request sent by the second electronic equipment is received; wherein the second check-up information includes any one of second key information, second account information for the second electronic device to access the bluetooth device, and a second MAC address of the second electronic device;
the first connection unit is used for establishing connection with the second electronic equipment under the condition that the second key information is matched with target key information in the authorization information and the use time of the second key information is within the authorization time period;
the second connection unit is used for establishing connection with the second electronic equipment under the condition that the second account information is matched with the target account information;
a third connection unit, configured to establish a connection with the second electronic device when the second MAC address matches the target MAC address.
Optionally, the apparatus further comprises:
the second receiving module is used for receiving the binding request sent by the first electronic equipment; the binding request comprises binding information and third key information, wherein the binding information comprises at least one of the first key information, the first MAC address and the first account information which are set by a user;
the second storage module is used for storing the binding information as the target information under the condition that the third key information is matched with the initial key information;
and the second connection module is used for establishing connection with the first electronic equipment.
Optionally, the apparatus further comprises:
the third receiving module is used for receiving an information editing request sent by the first electronic equipment under the condition of being connected with the first electronic equipment; wherein, the information editing request comprises the first verification information;
and the editing module is used for modifying or deleting the authorization information based on the information editing request under the condition that the first verification information is verified successfully based on the target information.
In this embodiment, an authorization request sent by a first electronic device is received through a first receiving module 201; the authorization request comprises authorization information and first verification information corresponding to the first electronic equipment; under the condition that the first verification information is verified successfully based on target information pre-stored by the Bluetooth device, the authorization information is stored through a first storage module 202; and connects with the second electronic device through the first connection module 203 based on the stored authorization information. So, other electronic equipment when being connected with bluetooth equipment, bluetooth equipment need verify whether this electronic equipment is authorized electronic equipment based on the authorization information, like this, other electronic equipment need first electronic equipment's authorization just can be connected with bluetooth equipment to can improve bluetooth equipment's connection security, the indirect security that can improve electronic equipment.
The device connection management apparatus in the embodiment of the present application may be an apparatus, or may be a component, an integrated circuit, or a chip in a bluetooth device. The device can be mobile electronic equipment or non-mobile electronic equipment. By way of example, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine or a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
The device connection management apparatus in the embodiment of the present application may be an apparatus having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present application are not limited specifically.
The device connection management apparatus provided in the embodiment of the present application can implement each process implemented in the method embodiment of fig. 1, and is not described here again to avoid repetition.
Optionally, referring to fig. 3, fig. 3 is a structural diagram of a bluetooth device provided in this embodiment of the present application, and as shown in fig. 3, an embodiment of the present application further provides a bluetooth device 300, which includes a processor 301, a memory 302, and a program or an instruction stored in the memory 302 and capable of running on the processor 301, where the program or the instruction is executed by the processor 301 to implement each process of the device connection management method embodiment, and can achieve the same technical effect, and is not described herein again to avoid repetition.
It should be noted that the bluetooth device in the embodiment of the present application includes the mobile electronic device and the non-mobile electronic device described above.
Fig. 4 is a schematic diagram of a hardware structure of a bluetooth device for implementing the embodiment of the present application.
The bluetooth device 400 includes, but is not limited to: radio unit 401, network module 402, audio output unit 403, input unit 404, sensor 405, display unit 406, user input unit 407, interface unit 408, memory 409, and processor 410.
Those skilled in the art will appreciate that the bluetooth device 400 may further include a power source (e.g., a battery) for supplying power to various components, and the power source may be logically connected to the processor 410 through a power management system, so as to implement functions of managing charging, discharging, and power consumption through the power management system. The bluetooth device structure shown in fig. 4 does not constitute a limitation of the bluetooth device, and the bluetooth device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the detailed description thereof is omitted.
Wherein, the processor 410 is configured to:
receiving an authorization request sent by first electronic equipment; the authorization request comprises authorization information and first verification information corresponding to the first electronic equipment;
under the condition that the first check information is successfully checked based on target information pre-stored by the Bluetooth equipment, storing the authorization information;
and connecting with the second electronic equipment based on the stored authorization information.
In the embodiment of the present application, an authorization request sent by a first electronic device is received by a processor 410; the authorization request comprises authorization information and first verification information corresponding to the first electronic equipment; under the condition that the first check information is successfully checked based on target information pre-stored by the Bluetooth equipment, storing the authorization information; and connecting with the second electronic equipment based on the stored authorization information. So, other electronic equipment when being connected with bluetooth equipment, bluetooth equipment need verify whether this electronic equipment is authorized electronic equipment based on the authorization information, like this, other electronic equipment need first electronic equipment's authorization just can be connected with bluetooth equipment to can improve bluetooth equipment's connection security, the security that can improve electronic equipment indirectly.
Optionally, the processor 410 is specifically configured to:
under the condition that a connection request sent by the second electronic equipment is received, matching second verification information corresponding to the second electronic equipment and carried in the connection request with the authorization information; wherein the second check-up information includes any one of second key information, second account information for the second electronic device to access the bluetooth device, and a second MAC address of the second electronic device;
when the second key information is matched with target key information in the authorization information and the use time of the second key information is within the authorization time period, establishing connection with the second electronic equipment; or, under the condition that the second account information is matched with the target account information, establishing connection with the second electronic device; or, establishing a connection with the second electronic device if the second MAC address matches the target MAC address.
Optionally, the processor 410 is further configured to:
receiving a binding request sent by the first electronic equipment; the binding request comprises binding information and third key information, wherein the binding information comprises at least one of the first key information, the first MAC address and the first account information which are set by a user;
storing the binding information as the target information under the condition that the third key information is matched with the initial key information; and establishing a connection with the first electronic device.
Optionally, the processor 410 is further configured to:
under the condition of being connected with the first electronic equipment, receiving an information editing request sent by the first electronic equipment; wherein, the information editing request comprises the first verification information;
and modifying or deleting the authorization information based on the information editing request under the condition that the first verification information is verified successfully based on the target information.
It should be understood that in the embodiment of the present application, the input Unit 404 may include a Graphics Processing Unit (GPU) 4041 and a microphone 4042, and the Graphics processor 4041 processes image data of a still picture or a video obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The display unit 406 may include a display panel 4061, and the display panel 4061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 407 includes a touch panel 4071 and other input devices 4072. A touch panel 4071, also referred to as a touch screen. The touch panel 4071 may include two parts, a touch detection device and a touch controller. Other input devices 4072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein. The memory 409 may be used to store software programs as well as various data including, but not limited to, application programs and an operating system. The processor 410 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 410.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the above device connection management method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
Wherein, the processor is the processor in the bluetooth device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and so on.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to run a program or an instruction to implement each process of the above device connection management method embodiment, and can achieve the same technical effect, and in order to avoid repetition, the description is omitted here.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of another identical element in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (14)

1. A device connection management method is applied to a Bluetooth device and comprises the following steps:
receiving an authorization request sent by first electronic equipment; the authorization request comprises authorization information and first verification information corresponding to the first electronic equipment; the first verification information is used for verifying the identity of the first electronic equipment; the authorization information comprises target key information and an authorization time period corresponding to the target key information;
under the condition that the first check information is successfully checked based on target information pre-stored by the Bluetooth equipment, storing the authorization information;
receiving a connection request sent by second electronic equipment;
and connecting with the second electronic equipment according to the authorization time period under the condition that the verification of the second key information carried in the connection request is successful based on the target key information in the authorization information.
2. The method of claim 1, wherein the first verification information comprises at least one of:
first key information;
the first electronic equipment accesses first account information of the Bluetooth equipment;
a first media access control, MAC, address of the first electronic device.
3. The method of claim 1, wherein the authorization information further comprises at least one of:
target account information of the Bluetooth device can be accessed;
a destination MAC address of an electronic device to which the bluetooth device may connect.
4. The method of claim 3, further comprising:
under the condition that a connection request sent by the second electronic device is received, matching any one of second account information of the second electronic device accessing the Bluetooth device and a second MAC address of the second electronic device carried in the connection request with the authorization information; under the condition that the second account information is matched with the target account information, connection is established with the second electronic equipment; or, establishing a connection with the second electronic device when the second MAC address matches the target MAC address.
5. The method of claim 2, wherein prior to receiving the authorization request sent by the first electronic device, the method further comprises:
receiving a binding request sent by the first electronic equipment; the binding request comprises binding information and third key information, wherein the binding information comprises at least one of the first key information, the first MAC address and the first account information which are set by a user;
storing the binding information as the target information in case that the third key information matches the initial key information; and establishing a connection with the first electronic device.
6. The method of claim 1, wherein after storing the authorization information, the method further comprises:
under the condition of being connected with the first electronic equipment, receiving an information editing request sent by the first electronic equipment; wherein, the information editing request comprises the first verification information;
and modifying or deleting the authorization information based on the information editing request under the condition that the first verification information is verified successfully based on the target information.
7. An apparatus for managing connection of devices, the apparatus being applied to a bluetooth device, comprising:
the first receiving module is used for receiving an authorization request sent by first electronic equipment; the authorization request comprises authorization information and first verification information corresponding to the first electronic equipment; the first verification information is used for verifying the identity of the first electronic equipment; the authorization information comprises target key information and an authorization time period corresponding to the target key information;
the first storage module is used for storing the authorization information under the condition that the first verification information is verified successfully based on target information pre-stored by the Bluetooth equipment; the first connection module is used for receiving a connection request sent by second electronic equipment; and connecting with the second electronic equipment according to the authorization time period under the condition that the verification of the second key information carried in the connection request is successful based on the target key information in the authorization information.
8. The apparatus of claim 7, wherein the first verification information comprises at least one of:
first key information;
the first electronic equipment accesses first account information of the Bluetooth equipment;
a first media access control, MAC, address of the first electronic device.
9. The apparatus of claim 7, wherein the authorization information further comprises at least one of:
target account information of the Bluetooth device can be accessed;
a destination MAC address of an electronic device to which the bluetooth device may connect.
10. The apparatus of claim 9, wherein the first connection module comprises:
the matching unit is used for matching any one of second account information of the second electronic device accessing the Bluetooth device and a second MAC address of the second electronic device carried in the connection request with the authorization information under the condition of receiving the connection request sent by the second electronic device; the second connection unit is used for establishing connection with the second electronic equipment under the condition that the second account information is matched with the target account information;
a third connection unit, configured to establish a connection with the second electronic device if the second MAC address matches the target MAC address.
11. The apparatus of claim 8, further comprising:
the second receiving module is used for receiving the binding request sent by the first electronic equipment; the binding request comprises binding information and third key information, wherein the binding information comprises at least one of the first key information, the first MAC address and the first account information which are set by a user;
the second storage module is used for storing the binding information as the target information under the condition that the third key information is matched with the initial key information;
and the second connection module is used for establishing connection with the first electronic equipment.
12. The apparatus of claim 7, further comprising:
the third receiving module is used for receiving an information editing request sent by the first electronic equipment under the condition of being connected with the first electronic equipment; wherein, the information editing request comprises the first verification information;
and the editing module is used for modifying or deleting the authorization information based on the information editing request under the condition that the first verification information is verified successfully based on the target information.
13. A Bluetooth device comprising a processor, a memory, and a program or instructions stored on the memory and executable on the processor, the program or instructions when executed by the processor implementing the steps of the device connection management method according to any one of claims 1-6.
14. A readable storage medium, on which a program or instructions are stored, which when executed by a processor, implement the steps of the device connection management method according to any one of claims 1-6.
CN202011030424.4A 2020-09-27 2020-09-27 Equipment connection management method and device and Bluetooth equipment Active CN112165706B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011030424.4A CN112165706B (en) 2020-09-27 2020-09-27 Equipment connection management method and device and Bluetooth equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011030424.4A CN112165706B (en) 2020-09-27 2020-09-27 Equipment connection management method and device and Bluetooth equipment

Publications (2)

Publication Number Publication Date
CN112165706A CN112165706A (en) 2021-01-01
CN112165706B true CN112165706B (en) 2023-03-24

Family

ID=73863259

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011030424.4A Active CN112165706B (en) 2020-09-27 2020-09-27 Equipment connection management method and device and Bluetooth equipment

Country Status (1)

Country Link
CN (1) CN112165706B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101646221A (en) * 2008-08-08 2010-02-10 比亚迪股份有限公司 Method, system and mobile terminal for processing Bluetooth connection request
CN105490996A (en) * 2014-10-09 2016-04-13 比亚迪股份有限公司 Authorizing system and method for vehicle Bluetooth keys
CN105516909A (en) * 2015-09-30 2016-04-20 北京清川科技有限公司 Method and system of connecting Bluetooth device base on authorization
CN107396362A (en) * 2017-08-21 2017-11-24 上海掌门科技有限公司 A kind of method and apparatus for being used to carry out user equipment wireless connection pre-authorization
CN108521644A (en) * 2013-03-13 2018-09-11 华为终端(东莞)有限公司 A kind of method for network access and equipment, system
CN109548018A (en) * 2019-01-11 2019-03-29 腾讯科技(深圳)有限公司 Wireless network access method, device, equipment and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101727553B1 (en) * 2010-11-04 2017-04-17 삼성전자주식회사 Apparatus and method for connecting with bluetooth devices in portable terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101646221A (en) * 2008-08-08 2010-02-10 比亚迪股份有限公司 Method, system and mobile terminal for processing Bluetooth connection request
CN108521644A (en) * 2013-03-13 2018-09-11 华为终端(东莞)有限公司 A kind of method for network access and equipment, system
CN105490996A (en) * 2014-10-09 2016-04-13 比亚迪股份有限公司 Authorizing system and method for vehicle Bluetooth keys
CN105516909A (en) * 2015-09-30 2016-04-20 北京清川科技有限公司 Method and system of connecting Bluetooth device base on authorization
CN107396362A (en) * 2017-08-21 2017-11-24 上海掌门科技有限公司 A kind of method and apparatus for being used to carry out user equipment wireless connection pre-authorization
CN109548018A (en) * 2019-01-11 2019-03-29 腾讯科技(深圳)有限公司 Wireless network access method, device, equipment and system

Also Published As

Publication number Publication date
CN112165706A (en) 2021-01-01

Similar Documents

Publication Publication Date Title
CN110096857B (en) Authority management method, device, equipment and medium for block chain system
US9635018B2 (en) User identity verification method and system, password protection apparatus and storage medium
CN108632253B (en) Client data security access method and device based on mobile terminal
CN110826043B (en) Digital identity application system and method, identity authentication system and method
US20150319173A1 (en) Co-verification method, two dimensional code generation method, and device and system therefor
CN109416800B (en) Authentication method of mobile terminal and mobile terminal
CN105259771A (en) Authentication method and associated device
CN107820702B (en) Management and control method, device and electronic equipment
CN101593252B (en) Method and system for controlling access of computer to USB equipment
CN104866752A (en) Application protection method and user terminal
WO2023151677A1 (en) Method and apparatus for determining file integrity in file system, and electronic device
WO2021052145A1 (en) Security verification method and system, computer device and medium
CN109977039A (en) HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing
CN108460251B (en) Method, device and system for running application program
CN114861158A (en) Security authentication method, device, system, electronic equipment and storage medium
US20150235228A1 (en) Method, device and system for on-line payment information transmission
CN113438264B (en) Wearable massager connection method, device, computer equipment and storage medium
WO2015154489A1 (en) Driving method of usb device, host and usb device
CN112165706B (en) Equipment connection management method and device and Bluetooth equipment
CN105871840B (en) A kind of certificate management method and system
CN114422236B (en) Intelligent device access method and device and electronic device
CN103577744A (en) Network on-line activating mode for Android mobile internet equipment
CN114726664B (en) Binding method and binding equipment for household equipment
CN107707550B (en) Method, device and system for accessing virtual machine
CN113923005B (en) Method and system for writing data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant