CN113079515A - Safety binding method and system and intelligent device - Google Patents

Safety binding method and system and intelligent device Download PDF

Info

Publication number
CN113079515A
CN113079515A CN202110341615.0A CN202110341615A CN113079515A CN 113079515 A CN113079515 A CN 113079515A CN 202110341615 A CN202110341615 A CN 202110341615A CN 113079515 A CN113079515 A CN 113079515A
Authority
CN
China
Prior art keywords
key
target key
countdown
binding
external terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110341615.0A
Other languages
Chinese (zh)
Inventor
龙小寒
张宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Hongmei Intelligent Technology Co Ltd
Original Assignee
Sichuan Hongmei Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Hongmei Intelligent Technology Co Ltd filed Critical Sichuan Hongmei Intelligent Technology Co Ltd
Priority to CN202110341615.0A priority Critical patent/CN113079515A/en
Publication of CN113079515A publication Critical patent/CN113079515A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G04HOROLOGY
    • G04GELECTRONIC TIME-PIECES
    • G04G9/00Visual time or date indication means
    • G04G9/0064Visual time or date indication means in which functions not related to time can be displayed
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Electromagnetism (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a security binding method, a security binding system and intelligent equipment. Receiving a binding instruction sent by an external terminal, wherein the binding instruction is generated by the external terminal by scanning a two-dimensional code attached to the intelligent equipment to obtain an equipment code of the intelligent equipment and generating the equipment code according to the equipment code; after receiving the binding instruction, randomly selecting a target key from at least one key installed on the mobile terminal and triggering a timer to start countdown of a preset time value; displaying information of the target key and countdown of the timer to prompt a user to press the target key before the countdown is finished; and when a signal triggered by the pressing of the target key is received before the countdown of the timer is finished, sending permission information indicating permission for binding to the external terminal through a server according to the equipment information of the external terminal. The scheme of the invention can safely bind the intelligent equipment.

Description

Safety binding method and system and intelligent device
Technical Field
The invention relates to the technical field of intelligent equipment, in particular to a safety binding method and system and intelligent equipment.
Background
The smart device usually has a network connection function, and can perform operations such as query, binding and management through an APP installed on a smart phone or a tablet computer. To manage and operate the intelligent device, a one-to-one operation relationship between the external terminal and the intelligent device needs to be established, that is, binding is performed. The management and operation of the intelligent device cannot be realized without binding.
In the prior art, a user realizes binding by scanning a binding two-dimensional code attached to an intelligent device through an external terminal, however, the two-dimensional codes of the intelligent devices of various manufacturers are generated according to a certain rule and are easily obtained by analysis and derivation according to the rule, so that the safety problem of false binding occurs.
The patent application with the application number CN201811162546.1 provides a method for binding intelligent devices safely, a server, an intelligent device and a user end device, and the security of the intelligent device in the binding process is ensured by dynamically generating an authentication code through a binding authentication request carrying the ID information of the intelligent device, which is actively sent after the intelligent device is networked and enters an activation phase. However, the scheme does not relate to the security binding problem caused by the fact that the two-dimension code of the intelligent device is easy to crack.
Disclosure of Invention
The embodiment of the invention provides a safe binding method, a system and intelligent equipment, which can safely bind the intelligent equipment.
In a first aspect, an embodiment of the present invention provides a security binding method, applied to an intelligent device, including:
receiving a binding instruction sent by an external terminal, wherein the binding instruction is generated by the external terminal by scanning a two-dimensional code attached to the intelligent equipment to obtain an equipment code of the intelligent equipment and generating the equipment code according to the equipment code;
after receiving the binding instruction, randomly selecting a target key from at least one key installed on the mobile terminal and triggering a timer to start countdown of a preset time value;
displaying information of the target key and countdown of the timer to prompt a user to press the target key before the countdown is finished;
and when a signal triggered by the pressing of the target key is received before the countdown of the timer is finished, sending permission information indicating permission for binding to the external terminal through a server according to the equipment information of the external terminal.
Preferably, the first and second electrodes are formed of a metal,
the random selection of a target key from at least one key installed by the random selection device comprises the following steps:
determining the number N of installed keys, wherein N is a positive integer;
creating a random array comprising N elements; each element in the array represents a target key;
determining a length variable according to the length of the array, wherein the length of the array is the number of the digits contained in the array;
determining an index value of the random array according to the length variable;
determining an element from the random array according to the index value;
selecting the target key characterized by the determined element.
Preferably, the first and second electrodes are formed of a metal,
displaying the information of the target key and the countdown of the timer, comprising:
determining the key name of the target key, wherein the key name of each key is the name of a function triggered when the key is pressed;
generating prompt information for indicating a user to press a target key according to the key name;
calling a pre-created display plug-in;
and sending the countdown to the display plug-in unit according to a preset sending period through the timer so that the display plug-in unit displays the countdown.
Preferably, the first and second electrodes are formed of a metal,
after randomly selecting a target key from at least one key installed in the mobile terminal, the method further comprises the following steps:
determining a key value of the target key;
stopping executing the action of reporting the key value to an application layer, wherein the application layer executes corresponding operation according to the key value when receiving the key value;
and when the countdown of the timer is finished or the target key is triggered, the action of reporting the key value to the application layer is recovered to be executed.
Preferably, the first and second electrodes are formed of a metal,
further comprising:
pre-collecting a plurality of voice samples corresponding to at least one key name to construct a training sample set;
obtaining a voice template of the key name through iterative training based on the training sample set; setting a matching threshold value for the voice template according to the similarity between the voice samples acquired in the iterative training;
wherein the obtaining of the voice template of the key name through iterative training based on the training sample set comprises: selecting a first voice sample from the training sample set as an initial intermediate template; sequentially selecting untrained second voice samples from the training sample set to execute the iterative training so as to update the intermediate template; and responding to the iterative training end condition, and storing the intermediate template as the voice template of the key name.
Preferably, the first and second electrodes are formed of a metal,
after the determining the key name of the target key, before generating prompt information for instructing a user to press the target key according to the key name, the method further includes:
recognizing the pronunciation of the key name, and determining a voice template with the matching degree higher than the highest matching degree in the matching threshold;
generating voice information corresponding to the key name according to the voice template;
and playing the voice information to prompt the user to press the target key.
Preferably, the first and second electrodes are formed of a metal,
after the sending the permission information indicating permission of binding to the external terminal, the method further includes:
receiving confirmation information which is returned by the external terminal through the mqtt server and represents that the binding is performed;
and when the confirmation information is received, sending feedback information to the external terminal so that the external terminal sends the equipment code and the equipment information of the external terminal to the user server through an http protocol when receiving the feedback information, and the user server establishes the binding relationship between the intelligent equipment and the external terminal according to the equipment code and the equipment information.
In a second aspect, an embodiment of the present invention provides an intelligent device based on the security binding method in any one of the first aspects, including:
the intelligent device comprises a receiving module, a processing module and a processing module, wherein the receiving module is used for receiving a binding instruction sent by an external terminal, and the binding instruction is generated by the external terminal through scanning a two-dimensional code attached to the intelligent device to obtain a device code of the intelligent device and generating the device code according to the device code;
the selection module is used for randomly selecting a target key from at least one key installed per se after receiving the binding instruction and triggering a timer to start countdown of a preset time value;
the display module is used for displaying the information of the target key and the countdown of the timer so as to prompt a user to press the target key before the countdown is finished;
and the sending module is used for sending permission information indicating permission of binding to the external terminal through the server according to the equipment information of the external terminal when a signal triggered by pressing the target key is received before the countdown of the timer is finished.
Preferably, the first and second electrodes are formed of a metal,
the selection module, when executing the random selection of a target key from at least one key installed by itself, executes:
determining the number N of installed keys, wherein N is a positive integer;
creating a random array comprising N elements; each element in the array represents a target key;
determining a length variable according to the length of the array, wherein the length of the array is the number of the digits contained in the array;
determining an index value of the random array according to the length variable;
determining an element from the random array according to the index value;
selecting a target key characterized by the determined element;
and/or the presence of a gas in the gas,
the display module executes the following steps when the information of the target key and the countdown of the timer are displayed:
determining the key name of the target key, wherein the key name of each key is the name of a function triggered when the key is pressed;
generating prompt information for indicating a user to press a target key according to the key name;
calling a pre-created display plug-in;
sending the countdown to the display plug-in through the timer according to a preset sending period so that the display plug-in displays the countdown;
and/or the presence of a gas in the gas,
the selection module, after executing the random selection of a target key from at least one key installed by itself, is further configured to execute:
determining a key value of the target key;
stopping executing the action of reporting the key value to an application layer, wherein the application layer executes corresponding operation according to the key value when receiving the key value;
and when the countdown of the timer is finished or the target key is triggered, the action of reporting the key value to the application layer is recovered to be executed.
In a third aspect, an embodiment of the present invention provides a secure binding system, including the intelligent device and the external terminal described in any one of the second aspects;
the external terminal is used for sending a binding instruction to the intelligent equipment; and receiving permission information sent by the intelligent terminal.
The embodiment of the invention provides a security binding method, a security binding system and intelligent equipment. When a user needs to bind, the two-dimensional code attached to the intelligent equipment is scanned through the external terminal, the equipment code of the intelligent equipment is obtained, and a binding instruction is generated according to the equipment code. After the intelligent device receives the binding instruction, in order to ensure the binding safety and prevent the malicious binding of the remote end, a target key is randomly selected from the keys installed on the intelligent device, a timer is triggered to start countdown, after the countdown is started, the information of the target key and the remaining time of the countdown are displayed, and a user is prompted to press the target key before the countdown is finished. And the intelligent equipment monitors whether the target key is pressed or not during the countdown duration, and if a signal triggered by the pressed target key is received before the countdown is finished, the intelligent equipment feeds back the information to the external terminal through the server according to the equipment information of the external terminal to inform that the binding is allowed. According to the scheme provided by the invention, on the basis of the traditional two-dimensional code scanning binding, the step of pressing the entity key for verification is added, and as the target key of the intelligent equipment needs to be pressed in a short distance within the time limit, the key can be pressed only at a place close to the intelligent equipment, and the entity key can not be controlled for verification by the malicious binding at the far end, so that the intelligent equipment can be safely bound.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a flow chart of a security binding method provided by an embodiment of the invention;
FIG. 2 is a schematic diagram of a smart device provided by an embodiment of the present invention;
fig. 3 is a schematic diagram of a secure binding system according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer and more complete, the technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention, and based on the embodiments of the present invention, all other embodiments obtained by a person of ordinary skill in the art without creative efforts belong to the scope of the present invention.
As described above, the smart device generally has a function of connecting to a network, and can perform operations such as querying, binding, and managing through an APP installed on a smart phone or a tablet computer. To manage and operate the intelligent device, a one-to-one operation relationship between the external terminal and the intelligent device needs to be established, that is, binding is performed. The management and operation of the intelligent device cannot be realized without binding. In the prior art, a user realizes binding by scanning a binding two-dimensional code attached to an intelligent device through an external terminal, however, the two-dimensional codes of the intelligent devices of various manufacturers are generated according to a certain rule and are easily obtained by analysis and derivation according to the rule, so that the safety problem of false binding occurs.
The security binding method, system and intelligent device provided by the embodiments of the present invention are described in detail below with reference to the accompanying drawings.
As shown in fig. 1, an embodiment of the present invention provides a security binding method applied to an intelligent device, where the method includes the following steps:
step 101: receiving a binding instruction sent by an external terminal, wherein the binding instruction is generated by the external terminal by scanning a two-dimensional code attached to the intelligent equipment to obtain an equipment code of the intelligent equipment and generating the equipment code according to the equipment code;
step 102: after receiving the binding instruction, randomly selecting a target key from at least one key installed on the mobile terminal and triggering a timer to start countdown of a preset time value;
step 103: displaying information of the target key and countdown of the timer to prompt a user to press the target key before the countdown is finished;
step 104: and when a signal triggered by the pressing of the target key is received before the countdown of the timer is finished, sending permission information indicating permission for binding to the external terminal through a server according to the equipment information of the external terminal.
In the embodiment of the invention, when a user needs to bind, the two-dimensional code attached to the intelligent equipment is scanned through the external terminal to obtain the equipment code of the intelligent equipment, and the binding instruction is generated according to the equipment code. After the intelligent device receives the binding instruction, in order to ensure the binding safety and prevent the malicious binding of the remote end, a target key is randomly selected from the keys installed on the intelligent device, a timer is triggered to start countdown, after the countdown is started, the information of the target key and the remaining time of the countdown are displayed, and a user is prompted to press the target key before the countdown is finished. And the intelligent equipment monitors whether the target key is pressed or not during the countdown duration, and if a signal triggered by the pressed target key is received before the countdown is finished, the intelligent equipment feeds back the information to the external terminal through the server according to the equipment information of the external terminal to inform that the binding is allowed. According to the scheme provided by the invention, on the basis of the traditional two-dimensional code scanning binding, the step of pressing the entity key for verification is added, and as the short-distance operation is required and the target key of the intelligent equipment is required to be pressed within the time limit, the key can be pressed only at a place close to the intelligent equipment, and the malicious binding at the far end cannot control the entity key for verification, so that the intelligent equipment can be safely bound.
Specifically, the smart device is a device capable of performing data communication with the outside through the internet (the smart device is connected with the APP through the cloud, and the user can perform remote control on the smart device at home). With the increasingly widespread application of home appliances in the internet of things, the market proportion of NBIoT, 4G and large-screen intelligent home appliances is gradually increasing, and one feature of such home appliances is that they can be actively networked, such as automatically networked when being powered on or directly networked on a screen. After the products are networked, how to safely bind the intelligent household appliances with real users is an important part in the current product research and development.
In an embodiment of the present invention, the randomly selecting a target key from at least one key installed in the target key includes:
determining the number N of installed keys, wherein N is a positive integer;
creating a random array comprising N elements; each element in the array represents a target key;
determining a length variable according to the length of the array, wherein the length of the array is the number of the digits contained in the array;
determining an index value of the random array according to the length variable;
determining an element from the random array according to the index value;
selecting the target key characterized by the determined element.
Specifically, in order to further increase security, on the basis that the physical key needs to be pressed for verification during binding, the key that needs to be pressed for each binding may be set to be random, so as to further improve the security of binding. Specifically, determining a positive integer N of the number of keys installed on the intelligent device, and creating a random array comprising N elements; each element in the array represents a target key respectively, and a length variable is determined according to the length of the array, namely the number of the included numbers; and determining an index value of the random array according to the length variable, and randomly selecting an element from the random array according to the index value. Since each element corresponds to one key, the key to be pressed is the key corresponding to the element.
In an embodiment of the present invention, displaying the information of the target key and the countdown of the timer includes:
determining the key name of the target key, wherein the key name of each key is the name of a function triggered when the key is pressed;
generating prompt information for indicating a user to press a target key according to the key name;
calling a pre-created display plug-in;
and sending the countdown to the display plug-in unit according to a preset sending period through the timer so that the display plug-in unit displays the countdown.
In order to more intuitively remind the user of pressing the target key before the countdown is finished, the key needing to be pressed and the countdown remaining time can be displayed through a pre-created display plug-in. For example, when the countdown time is 30 seconds and the key to be pressed is the standby key, the display plug-in displays "please press the standby key within 30 seconds" on the external screen of the smart device, and the displayed countdown is updated in real time to further prompt the user to press the standby key within the countdown time. And if the user presses the standby key within 30 seconds, the intelligent device replies the permission information of the external terminal, and if the pressing is not completed within 30 seconds, the intelligent device fails to be bound with the external terminal.
In an embodiment of the present invention, after randomly selecting a target key from at least one key installed on the mobile terminal, the method further includes:
determining a key value of the target key;
stopping executing the action of reporting the key value to an application layer, wherein the application layer executes corresponding operation according to the key value when receiving the key value;
and when the countdown of the timer is finished or the target key is triggered, the action of reporting the key value to the application layer is recovered to be executed.
Specifically, after the target key to be pressed is determined, the next pressing of the target key should only be used for verification, and the original corresponding function is not executed any more, otherwise, when the target key is pressed, a conflict situation may occur, resulting in a binding failure. For example, when it is randomly determined that the target key to be pressed is the power on/off key, if the original function of the power on/off key is not shielded, the smart device executes the power off operation when the user presses the power on/off key, thereby causing a binding failure. Therefore, after the target key is determined, the key value of the target key is determined, and since the triggering of the function corresponding to the key is the function represented by the key value corresponding to each key, the corresponding operation is executed by reporting the key value of the target key to the application layer by stopping execution. After the countdown of the timer is finished or the user presses the target key once to finish the verification, the action of reporting the key value of the target key to the application layer is replied and executed to recover the use of the target key.
In an embodiment of the present invention, the method further includes: pre-collecting a plurality of voice samples corresponding to at least one key name to construct a training sample set; obtaining a voice template of the key name through iterative training based on the training sample set; setting a matching threshold value for the voice template according to the similarity between the voice samples acquired in the iterative training; wherein the obtaining of the voice template of the key name through iterative training based on the training sample set comprises: selecting a first voice sample from the training sample set as an initial intermediate template; sequentially selecting untrained second voice samples from the training sample set to execute the iterative training so as to update the intermediate template; and responding to the iterative training end condition, and storing the intermediate template as the voice template of the key name.
Specifically, after the target key is randomly determined and countdown is started, the display module of the intelligent device can remind a user of pressing the target key of the intelligent device through voice broadcasting besides displaying. In order to enable voice broadcasting to be more accurate, a plurality of voice samples corresponding to at least one key name are collected in advance to construct a training sample set, a voice template of each key name is obtained through iterative training of the training sample set, and a middle template is updated through continuous training. After the iterative training is finished, the intermediate template after the iterative training is carried out for multiple times is used as a voice template of the key name, and the keys required to be pressed by the user can be broadcasted through voice better and accurately through the voice template.
In an embodiment of the present invention, after determining the key name of the target key, before generating, according to the key name, a prompt message for instructing a user to press the target key, the method further includes:
recognizing the pronunciation of the key name, and determining a voice template with the matching degree higher than the highest matching degree in the matching threshold;
generating voice information corresponding to the key name according to the voice template;
and playing the voice information to prompt the user to press the target key.
In summary, in the embodiments of the present invention, through interaction between the external terminal and the smart device, the security of the binding of the smart device is ensured in a manner that the user presses the key of the smart device, and the specific implementation process is as follows:
1: the intelligent equipment supporting 4G is inserted into the SIM card, the intelligent equipment is started to be automatically networked, the intelligent equipment is communicated with the mqtt server through an mqtt protocol, equipment codes are registered and activated, and the communication unique identification of the intelligent equipment is consistent with the two-dimensional code of the intelligent equipment;
2: a user logs in a client APP through an external terminal, scans a two-dimensional code of the intelligent device to identify a device code, the APP is connected with an mqtt server to inquire whether the device is registered and activated, if the device finishes the step 1, the communication authority of the device is obtained, the step 3 is entered, and otherwise, the user is prompted to insert an SIM card to activate the device;
3: the client APP sends a user binding instruction to the intelligent equipment through the mqtt server, the intelligent equipment receives the user binding instruction, then the intelligent equipment prompts a user to press an intelligent equipment function key in a voice mode, the user presses the intelligent equipment function key within 30 seconds, then the intelligent equipment replies a client APP equipment binding permission instruction, the client APP receives the intelligent equipment binding permission instruction, then a user server interface is started, the binding relationship between the user and the intelligent equipment is added, and the user and the intelligent equipment are successfully and safely bound; the client APP is communicated with the mqtt server through an mqtt protocol and communicated with the user server through an https protocol.
4: and 3, sending an mqtt binding message to the intelligent equipment by the client APP, counting down for 30 seconds to monitor equipment feedback, carrying out voice prompt on the intelligent equipment, counting down for 30 seconds to monitor function key pressing, informing the client APP equipment of allowing binding by the intelligent equipment through the mqtt message by the intelligent equipment when the function key is pressed within 30 seconds, allowing binding by the client APP within 30 seconds, communicating with the user server through an https protocol, and adding the binding relationship between the user and the intelligent equipment.
5: and if the client APP binding countdown does not receive the intelligent equipment binding permission message within 30 seconds, the user binding the equipment fails. Within 30 seconds of intelligent device binding countdown, the intelligent device function key is not pressed, the intelligent device informs the client side APP device of refusing to bind through the mqtt message, the user binds the device failure, and the problem that the intelligent device is maliciously bound by code scanning by other people is solved.
As shown in fig. 2, on the basis of fig. 1, an embodiment of the present invention provides an intelligent device, including:
the receiving module 201 is configured to receive a binding instruction sent by an external terminal, where the binding instruction is generated by the external terminal by scanning a two-dimensional code attached to the smart device to obtain a device code of the smart device and according to the device code;
the selection module 202 is configured to, after receiving the binding instruction, randomly select a target key from at least one key installed in the selection module and trigger a timer to start countdown of a preset time value;
the display module 203 is configured to display information of the target key and countdown of the timer, so as to prompt a user to press the target key before the countdown is finished;
a sending module 204, configured to send, by the server, permission information indicating permission to perform binding to the external terminal according to the device information of the external terminal when a signal triggered by pressing the target key is received before the countdown of the timer is finished.
In an embodiment of the present invention, when the selecting module 202 performs the random selection of a target key from at least one key installed in itself, the selecting module performs:
determining the number N of installed keys, wherein N is a positive integer;
creating a random array comprising N elements; each element in the array represents a target key;
determining a length variable according to the length of the array, wherein the length of the array is the number of the digits contained in the array;
determining an index value of the random array according to the length variable;
determining an element from the random array according to the index value;
selecting a target key characterized by the determined element;
in an embodiment of the present invention, when the displaying of the information of the target key and the countdown of the timer are executed, the displaying module 203 executes:
determining the key name of the target key, wherein the key name of each key is the name of a function triggered when the key is pressed;
generating prompt information for indicating a user to press a target key according to the key name;
calling a pre-created display plug-in;
sending the countdown to the display plug-in through the timer according to a preset sending period so that the display plug-in displays the countdown;
in an embodiment of the present invention, after the selecting module 204 performs the random selection of a target key from at least one key installed in itself, the selecting module is further configured to perform:
determining a key value of the target key;
stopping executing the action of reporting the key value to an application layer, wherein the application layer executes corresponding operation according to the key value when receiving the key value;
and when the countdown of the timer is finished or the target key is triggered, the action of reporting the key value to the application layer is recovered to be executed.
It is to be understood that the illustrated structure of the embodiment of the present invention does not specifically limit the smart device. In other embodiments of the invention, the smart device may include more or fewer components than shown, or combine certain components, or split certain components, or a different arrangement of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
Since the contents of information interaction, execution process, and the like between the units in the intelligent device are based on the same concept as the method embodiment of the present invention, specific contents may refer to the description in the method embodiment of the present invention, and are not described herein again.
As shown in fig. 3, an embodiment of the present invention provides a security binding system, which includes the smart device 301 and the external terminal 302 provided in the embodiments of fig. 2;
the external terminal 302 is configured to send a binding instruction to the smart device; and receiving permission information sent by the intelligent terminal.
Since the contents of information interaction, execution process, and the like between the units in the security binding system are based on the same concept as the method embodiment of the present invention, specific contents may refer to the description in the method embodiment of the present invention, and are not described herein again.
It should be noted that not all steps and modules in the above flows and system structure diagrams are necessary, and some steps or modules may be omitted according to actual needs. The execution order of the steps is not fixed and can be adjusted as required. The system structure described in the above embodiments may be a physical structure or a logical structure, that is, some modules may be implemented by the same physical entity, or some modules may be implemented by a plurality of physical entities, or some components in a plurality of independent devices may be implemented together.
In the above embodiments, the hardware unit may be implemented mechanically or electrically. For example, a hardware element may comprise permanently dedicated circuitry or logic (such as a dedicated processor, FPGA or ASIC) to perform the corresponding operations. The hardware elements may also comprise programmable logic or circuitry, such as a general purpose processor or other programmable processor, that may be temporarily configured by software to perform the corresponding operations. The specific implementation (mechanical, or dedicated permanent, or temporarily set) may be determined based on cost and time considerations.
While the invention has been shown and described in detail in the drawings and in the preferred embodiments, the invention is not limited to the embodiments disclosed, and those skilled in the art will appreciate that various combinations of code auditing means in the various embodiments described above may be employed to obtain further embodiments of the invention, which are also within the scope of the invention.

Claims (10)

1. The safety binding method is characterized by being applied to intelligent equipment and comprising the following steps:
receiving a binding instruction sent by an external terminal, wherein the binding instruction is generated by the external terminal by scanning a two-dimensional code attached to the intelligent equipment to obtain an equipment code of the intelligent equipment and generating the equipment code according to the equipment code;
after receiving the binding instruction, randomly selecting a target key from at least one key installed on the mobile terminal and triggering a timer to start countdown of a preset time value;
displaying information of the target key and countdown of the timer to prompt a user to press the target key before the countdown is finished;
and when a signal triggered by the pressing of the target key is received before the countdown of the timer is finished, sending permission information indicating permission for binding to the external terminal through a server according to the equipment information of the external terminal.
2. The method of claim 1,
the random selection of a target key from at least one key installed by the random selection device comprises the following steps:
determining the number N of installed keys, wherein N is a positive integer;
creating a random array comprising N elements; each element in the array represents a target key;
determining a length variable according to the length of the array, wherein the length of the array is the number of the digits contained in the array;
determining an index value of the random array according to the length variable;
determining an element from the random array according to the index value;
selecting the target key characterized by the determined element.
3. The method of claim 2,
displaying the information of the target key and the countdown of the timer, comprising:
determining the key name of the target key, wherein the key name of each key is the name of a function triggered when the key is pressed;
generating prompt information for indicating a user to press a target key according to the key name;
calling a pre-created display plug-in;
and sending the countdown to the display plug-in unit according to a preset sending period through the timer so that the display plug-in unit displays the countdown.
4. The method of claim 1,
after randomly selecting a target key from at least one key installed in the mobile terminal, the method further comprises the following steps:
determining a key value of the target key;
stopping executing the action of reporting the key value to an application layer, wherein the application layer executes corresponding operation according to the key value when receiving the key value;
and when the countdown of the timer is finished or the target key is triggered, the action of reporting the key value to the application layer is recovered to be executed.
5. The method of claim 3,
further comprising:
pre-collecting a plurality of voice samples corresponding to at least one key name to construct a training sample set;
obtaining a voice template of the key name through iterative training based on the training sample set; setting a matching threshold value for the voice template according to the similarity between the voice samples acquired in the iterative training;
wherein the obtaining of the voice template of the key name through iterative training based on the training sample set comprises: selecting a first voice sample from the training sample set as an initial intermediate template; sequentially selecting untrained second voice samples from the training sample set to execute the iterative training so as to update the intermediate template; and responding to the iterative training end condition, and storing the intermediate template as the voice template of the key name.
6. The method of claim 5,
after the determining the key name of the target key, before generating prompt information for instructing a user to press the target key according to the key name, further comprising:
recognizing the pronunciation of the key name, and determining a voice template with the matching degree higher than the highest matching degree in the matching threshold;
generating voice information corresponding to the key name according to the voice template;
and playing the voice information to prompt the user to press the target key.
7. The method according to any one of claims 1 to 6,
after the sending the permission information indicating permission of binding to the external terminal, the method further includes:
receiving confirmation information which is returned by the external terminal through the mqtt server and represents that the binding is performed;
and when the confirmation information is received, sending feedback information to the external terminal so that the external terminal sends the equipment code and the equipment information of the external terminal to the user server through an http protocol when receiving the feedback information, and the user server establishes the binding relationship between the intelligent equipment and the external terminal according to the equipment code and the equipment information.
8. The intelligent device based on the security binding method of any one of claims 1 to 7, comprising:
the intelligent device comprises a receiving module, a processing module and a processing module, wherein the receiving module is used for receiving a binding instruction sent by an external terminal, and the binding instruction is generated by the external terminal through scanning a two-dimensional code attached to the intelligent device to obtain a device code of the intelligent device and generating the device code according to the device code;
the selection module is used for randomly selecting a target key from at least one key installed per se after receiving the binding instruction and triggering a timer to start countdown of a preset time value;
the display module is used for displaying the information of the target key and the countdown of the timer so as to prompt a user to press the target key before the countdown is finished;
and the sending module is used for sending permission information indicating permission of binding to the external terminal through the server according to the equipment information of the external terminal when a signal triggered by pressing the target key is received before the countdown of the timer is finished.
9. The smart device of claim 8,
the selection module, when executing the random selection of a target key from at least one key installed by itself, executes:
determining the number N of installed keys, wherein N is a positive integer;
creating a random array comprising N elements; each element in the array represents a target key;
determining a length variable according to the length of the array, wherein the length of the array is the number of the digits contained in the array;
determining an index value of the random array according to the length variable;
determining an element from the random array according to the index value;
selecting a target key characterized by the determined element;
and/or the presence of a gas in the gas,
the display module executes the following steps when the information of the target key and the countdown of the timer are displayed:
determining the key name of the target key, wherein the key name of each key is the name of a function triggered when the key is pressed;
generating prompt information for indicating a user to press a target key according to the key name;
calling a pre-created display plug-in;
sending the countdown to the display plug-in through the timer according to a preset sending period so that the display plug-in displays the countdown;
and/or the presence of a gas in the gas,
the selection module, after executing the random selection of a target key from at least one key installed by itself, further executes:
determining a key value of the target key;
stopping executing the action of reporting the key value to an application layer, wherein the application layer executes corresponding operation according to the key value when receiving the key value;
and when the countdown of the timer is finished or the target key is triggered, the action of reporting the key value to the application layer is recovered to be executed.
10. A secure binding system comprising the smart device of any one of claims 8 to 9 and an external terminal;
the external terminal is used for sending a binding instruction to the intelligent equipment; and receiving permission information sent by the intelligent terminal.
CN202110341615.0A 2021-03-30 2021-03-30 Safety binding method and system and intelligent device Pending CN113079515A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110341615.0A CN113079515A (en) 2021-03-30 2021-03-30 Safety binding method and system and intelligent device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110341615.0A CN113079515A (en) 2021-03-30 2021-03-30 Safety binding method and system and intelligent device

Publications (1)

Publication Number Publication Date
CN113079515A true CN113079515A (en) 2021-07-06

Family

ID=76611928

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110341615.0A Pending CN113079515A (en) 2021-03-30 2021-03-30 Safety binding method and system and intelligent device

Country Status (1)

Country Link
CN (1) CN113079515A (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1729494A (en) * 2002-12-19 2006-02-01 皇家飞利浦电子股份有限公司 Remote control system and authentication method
CN104865906A (en) * 2014-06-27 2015-08-26 广东美的环境电器制造有限公司 Environmental regulation device control system, method, server and mobile terminal
CN105446293A (en) * 2015-11-27 2016-03-30 珠海格力电器股份有限公司 Binding method, device and system of intelligent household equipment and intelligent terminal
CN105553964A (en) * 2015-12-10 2016-05-04 小米科技有限责任公司 Method and apparatus for controlling Bluetooth device
CN105681315A (en) * 2016-01-29 2016-06-15 深圳市轱辘软件开发有限公司 Method for binding intelligent equipment, intelligent equipment and terminal equipment
CN107645548A (en) * 2017-09-13 2018-01-30 广东乐心医疗电子股份有限公司 Data processing method, equipment server and public equipment
CN104936304B (en) * 2015-06-01 2018-09-18 小米科技有限责任公司 Smart machine binding method, smart machine and server
CN109246604A (en) * 2018-09-30 2019-01-18 美的集团股份有限公司 Smart machine secure binding method, server, smart machine and ustomer premises access equipment
CN109413004A (en) * 2017-08-16 2019-03-01 阿里巴巴集团控股有限公司 Verification method, device and equipment
CN109474595A (en) * 2018-11-13 2019-03-15 京东方科技集团股份有限公司 A kind of electronic equipment binding method, electronic equipment, mobile terminal and server
CN111147746A (en) * 2019-12-30 2020-05-12 深圳市金龙锋科技有限公司 Intelligent early education equipment terminal management method
CN112073243A (en) * 2020-09-08 2020-12-11 芜湖美的厨卫电器制造有限公司 Intelligent household appliance configuration method, terminal, intelligent household appliance, server and storage medium
CN112348996A (en) * 2019-08-06 2021-02-09 云丁网络技术(北京)有限公司 Device binding method, user terminal and device to be bound
CN112448873A (en) * 2020-11-17 2021-03-05 深圳Tcl新技术有限公司 Equipment binding method and device and computer readable storage medium

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1729494A (en) * 2002-12-19 2006-02-01 皇家飞利浦电子股份有限公司 Remote control system and authentication method
CN104865906A (en) * 2014-06-27 2015-08-26 广东美的环境电器制造有限公司 Environmental regulation device control system, method, server and mobile terminal
CN104936304B (en) * 2015-06-01 2018-09-18 小米科技有限责任公司 Smart machine binding method, smart machine and server
CN105446293A (en) * 2015-11-27 2016-03-30 珠海格力电器股份有限公司 Binding method, device and system of intelligent household equipment and intelligent terminal
CN105553964A (en) * 2015-12-10 2016-05-04 小米科技有限责任公司 Method and apparatus for controlling Bluetooth device
CN105681315A (en) * 2016-01-29 2016-06-15 深圳市轱辘软件开发有限公司 Method for binding intelligent equipment, intelligent equipment and terminal equipment
CN109413004A (en) * 2017-08-16 2019-03-01 阿里巴巴集团控股有限公司 Verification method, device and equipment
CN107645548A (en) * 2017-09-13 2018-01-30 广东乐心医疗电子股份有限公司 Data processing method, equipment server and public equipment
CN109246604A (en) * 2018-09-30 2019-01-18 美的集团股份有限公司 Smart machine secure binding method, server, smart machine and ustomer premises access equipment
CN109474595A (en) * 2018-11-13 2019-03-15 京东方科技集团股份有限公司 A kind of electronic equipment binding method, electronic equipment, mobile terminal and server
CN112348996A (en) * 2019-08-06 2021-02-09 云丁网络技术(北京)有限公司 Device binding method, user terminal and device to be bound
CN111147746A (en) * 2019-12-30 2020-05-12 深圳市金龙锋科技有限公司 Intelligent early education equipment terminal management method
CN112073243A (en) * 2020-09-08 2020-12-11 芜湖美的厨卫电器制造有限公司 Intelligent household appliance configuration method, terminal, intelligent household appliance, server and storage medium
CN112448873A (en) * 2020-11-17 2021-03-05 深圳Tcl新技术有限公司 Equipment binding method and device and computer readable storage medium

Similar Documents

Publication Publication Date Title
US9787393B2 (en) Method for realizing bluetooth-binding between smart key device and mobile device
JP6259091B2 (en) Intelligent device control method, terminal and server
CN109246604B (en) Intelligent device safety binding method, server, intelligent device and user side device
JP2017521968A (en) Device binding method, apparatus, program, and recording medium
CN110166427B (en) Security processing method, device and system used by merchant management equipment
WO2015149235A1 (en) Privacy protection method and terminal device
CN112583799B (en) Processing method, related device, equipment and medium for registered account
CN109474595B (en) Electronic equipment binding method, electronic equipment, mobile terminal and server
CN112135186B (en) Screen projection method, device, equipment and storage medium based on small program
CN105450643A (en) Network access authentication method, apparatus and system
CN112492611A (en) Network configuration method, network configuration device, electronic equipment and readable storage medium
CN109214166B (en) Intelligent device authorization control method and system
CN112738046A (en) One-key login method, terminal and system server
US20200012573A1 (en) Data backup method and terminal
CN112203301A (en) Network configuration method, system, device and storage medium of projection equipment
CN106507158B (en) Information processing method, first terminal and second terminal
CN105760729B (en) Login method and electronic equipment
CN110990821B (en) Identity type verification method, device and storage medium
CN108418905B (en) Method, terminal, cloud platform device and medium for safely binding devices
CN106131771B (en) Bluetooth pairing method and device for mobile phone and payment terminal
CN113079515A (en) Safety binding method and system and intelligent device
CN111243189A (en) Leasing method, server, leasing equipment and leasing system for mobile power supply
CN110768925B (en) Verification method and device for verification code short message
CN111581624A (en) Intelligent terminal user identity authentication method
EP4310407A1 (en) Control right switching method and apparatus for virtual remote control, device, and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210706

RJ01 Rejection of invention patent application after publication