CN113259918A - Equipment binding method and system - Google Patents
Equipment binding method and system Download PDFInfo
- Publication number
- CN113259918A CN113259918A CN202110512069.2A CN202110512069A CN113259918A CN 113259918 A CN113259918 A CN 113259918A CN 202110512069 A CN202110512069 A CN 202110512069A CN 113259918 A CN113259918 A CN 113259918A
- Authority
- CN
- China
- Prior art keywords
- security code
- client
- hardware equipment
- cloud platform
- binding
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
Abstract
The invention provides a binding method and a binding system of equipment, wherein the binding method comprises the following steps: the cloud platform receives a binding request sent by a client, wherein the binding request carries a first security code and an identity of hardware equipment, and the client logs in through a target account; the cloud platform receives a second security code reported by the hardware equipment; and the cloud platform binds the target account and the hardware equipment under the condition that the first security code and the second security code pass the verification. The invention solves the problem of low equipment binding safety.
Description
Technical Field
The present invention relates to the field of communications, and in particular, to a device binding method and system.
Background
Currently, in the operation process of binding hardware devices, a wireless network identifier and a wireless network password are broadcasted through a terminal. And when the hardware equipment receives the wireless network identifier and the wireless network password, performing wireless network connection based on the wireless network identifier and the wireless network password. And then, the terminal scans the hardware equipment connected with the wireless network to obtain a plurality of hardware equipment, and when the terminal receives a binding instruction of the specified hardware equipment in the plurality of hardware equipment, the terminal sends the identifier of the specified hardware equipment and the user account currently logged in by the terminal to the server, so that the server establishes the binding relationship between the specified hardware equipment and the user account. However, this method has a problem of low security.
Aiming at the problem of low device binding security in the related art, no effective solution exists at present.
Disclosure of Invention
The embodiment of the invention provides a device binding method and a device, which are used for at least solving the problem of low device binding safety in the related technology.
According to an embodiment of the present invention, there is provided a device binding method, including: the method comprises the steps that a cloud platform receives a binding request sent by a client, wherein the binding request carries a first security code and an identity of hardware equipment, and the client logs in through a target account; the cloud platform receives a second security code reported by the hardware equipment; and the cloud platform binds the target account and the hardware equipment under the condition that the first security code and the second security code pass verification.
Optionally, before the cloud platform receives the binding request sent by the client, the method further includes: the mobile terminal establishes close range communication with the hardware equipment, wherein the client is installed on the mobile terminal; and the client receives the first security code and the identity sent by the hardware equipment through the close range communication.
Optionally, after the mobile terminal establishes the close-range communication with the hardware device, the method further includes: the client sends distribution network information to the hardware equipment through the near field communication so as to indicate the hardware equipment to perform networking through the distribution network information; and the client sends the binding request to the cloud platform under the condition that the networking of the hardware equipment is detected.
Optionally, the client receives the first security code and the identity sent by the hardware device through the close-range communication, and the method includes: the client receives an equipment account number and a password of the hardware equipment; and under the condition that the client checks the equipment account and the password, the client receives the first security code and the identity sent by the hardware equipment through the short-distance communication.
Optionally, the binding, by the cloud platform, the target account and the hardware device when the first security code and the second security code pass the verification, including: and the cloud platform establishes a binding relationship between the target account and the hardware equipment under the condition that the first security code and the second security code are determined to be the same.
Optionally, the close range communication includes bluetooth, Wifi.
According to another embodiment of the present invention, there is provided a binding system of a device, including: the system comprises a client side and a cloud platform, wherein the client side is used for sending a binding request to the cloud platform, the binding request carries a first security code and an identity of hardware equipment, and the client side logs in through a target account; the hardware equipment is used for sending a second security code to the cloud platform; and the cloud platform is used for binding the target account and the hardware equipment under the condition that the first security code and the second security code pass verification.
Optionally, the system further comprises: the mobile terminal is used for establishing close-range communication with the hardware equipment, wherein the client is installed on the mobile terminal; the client is further used for receiving the first security code and the identity sent by the hardware equipment through the close range communication.
According to a further embodiment of the present invention, there is also provided a storage medium having a computer program stored therein, wherein the computer program is arranged to perform the steps of any of the above method embodiments when executed.
According to yet another embodiment of the present invention, there is also provided an electronic device, including a memory in which a computer program is stored and a processor configured to execute the computer program to perform the steps in any of the above method embodiments.
According to the invention, the cloud platform receives the binding request sent by the client, the binding request carries the first security code and the identity of the hardware equipment, and the client logs in through the target account; the cloud platform receives a second security code reported by the hardware equipment; and the cloud platform binds the target account and the hardware equipment under the condition that the first security code and the second security code pass the verification. Therefore, the problem of low equipment binding safety can be solved, and the effect of improving the equipment binding safety is achieved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
fig. 1 is a block diagram of a hardware structure of a mobile terminal of a device binding method according to an embodiment of the present invention;
FIG. 2 is a flow chart of a binding method of a device according to an embodiment of the present invention;
FIG. 3 is an architecture diagram of a device binding system according to an embodiment of the invention;
fig. 4 is a schematic diagram of a device binding flow according to an embodiment of the present invention.
Detailed Description
The invention will be described in detail hereinafter with reference to the accompanying drawings in conjunction with embodiments. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
The method provided by the first embodiment of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Taking an example of the method running on a mobile terminal, fig. 1 is a hardware structure block diagram of the mobile terminal of a device binding method according to an embodiment of the present invention. As shown in fig. 1, the mobile terminal 10 may include one or more (only one shown in fig. 1) processors 102 (the processor 102 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA) and a memory 104 for storing data, and optionally may also include a transmission device 106 for communication functions and an input-output device 108. It will be understood by those skilled in the art that the structure shown in fig. 1 is only an illustration, and does not limit the structure of the mobile terminal. For example, the mobile terminal 10 may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
The memory 104 can be used for storing computer programs, for example, software programs and modules of application software, such as computer programs corresponding to the binding method of the device in the embodiment of the present invention, and the processor 102 executes various functional applications and data processing by running the computer programs stored in the memory 104, thereby implementing the above-mentioned methods. The memory 104 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some instances, the memory 104 may further include memory located remotely from the processor 102, which may be connected to the mobile terminal 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 106 is used for receiving or transmitting data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the mobile terminal 10. In one example, the transmission device 106 includes a Network adapter (NIC), which can be connected to other Network devices through a base station so as to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
In this embodiment, a method for binding devices operating in the mobile terminal is provided, and fig. 2 is a flowchart of the method for binding devices according to the embodiment of the present invention, as shown in fig. 2, the flowchart includes the following steps:
step S202, a cloud platform receives a binding request sent by a client, wherein the binding request carries a first security code and an identity of hardware equipment, and the client logs in through a target account;
step S204, the cloud platform receives a second security code reported by the hardware equipment;
step S206, the cloud platform binds the target account and the hardware device when the first security code and the second security code pass verification.
Through the steps, the cloud platform receives a binding request sent by the client, the binding request carries a first security code and an identity of the hardware equipment, and the client logs in through a target account; the cloud platform receives a second security code reported by the hardware equipment; and the cloud platform binds the target account and the hardware equipment under the condition that the first security code and the second security code pass the verification. Therefore, the problem of low equipment binding safety can be solved, and the effect of improving the equipment binding safety is achieved.
Alternatively, the execution subject of the above steps may be a terminal or the like, but is not limited thereto.
As an alternative implementation, as shown in fig. 3, an architecture diagram of a device binding system according to an alternative embodiment of the present invention is shown, the system comprising: the cloud platform, hardware equipment and mobile terminal, the mobile terminal can be cell-phone, computer, panel computer etc., install the customer end on the mobile terminal, the customer end is logged in by the target account number, explain each module in the binding system of the equipment as follows:
the mobile terminal is provided with a client, and the client provides a visual binding operation interface for a terminal user. The mobile terminal further comprises a service control module and a near field communication module, wherein the near field communication module is configured to perform peer-to-peer communication with the hardware device, and acquire hardware device information through the peer-to-peer communication, where the hardware device information may include device security code information, a hardware type, a device unique identifier, a compatible Wireless Access Point (AP) list, and the like. The near field communication module may also configure hardware distribution network information, and for example, the near field communication module is a Wifi module, the hardware distribution network information may be configured to include at least information such as a Service Set Identifier (SSID), a password, and the like. The service control module comprises a user interaction interface, a device distribution network and bound service logic.
The cloud platform can provide data storage of interaction pipelines and binding relationships of the client and the hardware device. The cloud platform may include a device management system and a binding relationship store, wherein the binding relationship at least includes: the hardware device comprises a device unique identifier, for example, persistent storage of data associated with two items of product Number (SN), physical address (MAC address) and user account (mobile phone Number or user name, etc.), including but not limited to databases such as mysql, MongoDB, etc.
The hardware device can be a hardware device with the capability of connecting a cloud platform and can comprise a communication module, a service control module and a near field communication module. The communication module provides data interaction with the cloud platform, and the communication module and the short-range communication module may be the same hardware, such as a Wifi station mode (STA mode) and a wireless access point mode (AP mode), or a Wifi module and a bluetooth module, and support protocols including but not limited to Wifi, lora, zigbee, 3/4/5G, and the like. The near field communication module provides a point-to-point data interaction function with the client, including but not limited to protocols such as bluetooth and Soft AP, wherein the Soft AP is Soft-AP, and a hardware part of the Soft AP is a standard wireless network card, but the Soft AP provides the same functions as the AP in signal switching, routing and the like through a driver. The service control module provides functions such as equipment security code generation, verification and distribution network.
As an optional implementation manner, the cloud platform receives a binding request sent by a client, where the binding request carries a first security code and an identity of a hardware device, and the binding request is used to indicate that a user account request for logging in the client is bound with the hardware device corresponding to the identity, where the user account corresponds to a target account. In addition, the cloud platform also receives a second security code reported by the hardware device, if the first security code sent by the client is matched with the second security code reported by the hardware device, the verification is passed, and the cloud platform establishes a binding relationship between the user account and the hardware device and performs associated storage. In the embodiment, the security codes respectively sent by the client and the hardware device are verified through the cloud platform, and the binding relationship is established after the verification is passed, so that the technical effect of improving the binding security of the device can be achieved.
Optionally, before the cloud platform receives the binding request sent by the client, the method further includes: the mobile terminal establishes close range communication with the hardware equipment, wherein the client is installed on the mobile terminal; and the client receives the first security code and the identity sent by the hardware equipment through the close range communication.
As an optional implementation manner, the mobile terminal and the hardware device may establish peer-to-peer near field communication through the near field communication module, and the client secure at the mobile terminal may obtain the security code sent by the hardware device through the near field communication. Close range communications include, but are not limited to, bluetooth, Wifi, and the like. In this embodiment, the client on the mobile terminal may obtain the security code of the hardware device from the hardware device through short-range communication, so as to perform device binding through verification of the security code. The technical effect of improving the binding safety of the equipment can be achieved.
Optionally, after the mobile terminal establishes the close-range communication with the hardware device, the method further includes: the client sends distribution network information to the hardware equipment through the near field communication so as to indicate the hardware equipment to perform networking through the distribution network information; and the client sends the binding request to the cloud platform under the condition that the networking of the hardware equipment is detected.
As an optional implementation manner, the client top end provides a user visual binding operation interface, and the user operation interface provided by the client can prompt the user to input the distribution network information of the hardware device, and send the distribution network information to the hardware device through near field communication. The hardware equipment is networked after receiving the distribution network information, for example, modules such as a WIFI distribution network of the hardware equipment can acquire information such as a Service Set Identifier (SSID), a compatible Wireless Access Point (AP) list of signal strength and the like of WIFI configuration around the hardware equipment, and meanwhile, the client Service control module can prompt a user to select the SSID and input a password and the like, so that a good WIFI environment signal of the hardware equipment is ensured.
As an optional implementation manner, the client waits for the online information of the hardware device, and after determining that the hardware device is online, sends a binding request to the cloud platform and carries the first security code. Specifically, the client establishes a long connection channel of the cloud platform, receives an online notification of the hardware device, and sends a binding request carrying a first security code after receiving the online notification; the client can also continuously poll through a short connection (for example, at an interval of 2 seconds), and send a binding request after the device inquiry end is online, wherein the binding request at least comprises a first security code.
Optionally, the client receives the first security code and the identity sent by the hardware device through the close-range communication, and the method includes: the client receives an equipment account number and a password of the hardware equipment; and under the condition that the client checks the equipment account and the password, the client receives the first security code and the identity sent by the hardware equipment through the short-distance communication.
As an alternative embodiment, the hardware device may own its own account hierarchy. If the hardware equipment has an account system of the hardware equipment, the client service module can prompt the user to input an account number and a password of the hardware equipment. The client checks the equipment identity. And under the condition that the verification is passed, the client acquires hardware equipment information sent by the hardware equipment through the short-distance communication, wherein the hardware equipment information comprises but is not limited to the first security code and the identity of the hardware equipment. In order to ensure that the loss of unique identification tags such as two-dimensional codes, bar codes and serial numbers of the hardware equipment does not affect the actual use, the identity of the hardware equipment acquired by the client at this stage includes but is not limited to information such as product models and unique identifiers.
Optionally, the binding, by the cloud platform, the target account and the hardware device when the first security code and the second security code pass the verification, including: and the cloud platform establishes a binding relationship between the target account and the hardware equipment under the condition that the first security code and the second security code are determined to be the same.
As an optional implementation manner, the security code may be randomly generated by the hardware device according to the local factor, or may be burned in the hardware product by a production line at a factory stage, where the security code includes a first security code sent by the hardware device to the client and a second security code reported by the hardware device to the cloud platform. After receiving the binding request, the cloud platform acquires a first security code carried in the binding request. And reporting the second security code to the cloud platform after the hardware equipment is successfully distributed, and verifying whether the first security code and the second security code are the same at the cloud end by the cloud platform. If the security codes are the same, establishing a binding relationship between the target account and the hardware equipment.
As an optional implementation manner, after receiving the binding request, the cloud platform acquires the first security code carried in the binding request, the cloud platform device management system notifies the hardware device to verify the first security code, and after the hardware device passes the verification, the cloud platform establishes the binding relationship between the hardware device and the target account and persistently stores the binding relationship.
As an optional implementation manner, as shown in fig. 4, a schematic diagram of a device binding process according to an optional embodiment of the present invention is shown, where the schematic diagram includes the following contents:
the mobile terminal interacts with the hardware equipment through the near field communication module, the client installed on the mobile terminal is connected with the hardware equipment through the point-to-point communication module, and the module comprises but is not limited to a Bluetooth module and a wifi module.
And judging whether the hardware equipment has a self account system or not, and if the hardware equipment has the self account system, prompting the user to input the account and the password of the hardware equipment by the client service module. The client checks the identity of the hardware equipment, and the check is to acquire equipment information, such as a security code and the like, sent by the hardware equipment. Meanwhile, the user is prompted to input the distribution network information of the hardware equipment, and the distribution network information is notified to the hardware equipment through the near field communication protocol. The security code can be randomly generated by the hardware equipment according to the local factor, and can also be burnt in the hardware equipment by a production line in the factory stage.
In order to ensure that the loss of unique identification tags such as two-dimensional codes, bar codes and serial numbers of products of the hardware equipment does not affect the actual use, the client can acquire information such as product models and unique identifiers of the hardware equipment at this stage to serve as the identity of the hardware equipment.
The client service control module can send the distribution network information to the hardware equipment through near field communication, and the hardware equipment performs networking according to the configuration after receiving the distribution network information; the modules such as the WIFI distribution network and the like are special, the information such as a compatible AP list of SSID (service set identifier), signal strength and the like of the WIFI configuration around the hardware equipment can be acquired, meanwhile, the client service control module prompts a user to select the SSID and input a password and the like, and the WIFI environment signal where the hardware equipment is located is ensured to be good.
The client side waits for the online information of the equipment side, sends a binding request to the cloud platform and carries the security code information, and establishes a long connecting channel of the cloud platform; the client can also continuously poll through a short connection (for example, at an interval of 2 seconds), and send a binding request after the query device is online, wherein the binding request at least comprises the security code information.
And after the cloud platform checks the security code information, persistently storing the binding relationship. After the cloud platform receives the binding request, the hardware equipment is successfully distributed, the security code information is reported to the cloud platform, and the security code is verified at the cloud end after the cloud platform receives the binding request; and the cloud platform equipment management system can also inform the equipment terminal of checking the security code, and after the hardware equipment passes the security code, the cloud platform establishes the binding relationship between the hardware equipment and the equipment terminal and stores the binding relationship persistently. The embodiment simultaneously obtains the equipment information and sets the network configuration through near field communication, thereby meeting the reliability of the equipment distribution network and ensuring the safety of equipment binding.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
In this embodiment, a system for binding devices is also provided, and the system is used to implement the foregoing embodiments and preferred embodiments, and the description of the system that has been already made is omitted. The system comprises: the system comprises a client side and a cloud platform, wherein the client side is used for sending a binding request to the cloud platform, the binding request carries a first security code and an identity of hardware equipment, and the client side logs in through a target account; the hardware equipment is used for sending a second security code to the cloud platform; and the cloud platform is used for binding the target account and the hardware equipment under the condition that the first security code and the second security code pass verification.
Optionally the system further comprises: the mobile terminal is used for establishing close-range communication with the hardware equipment, wherein the client is installed on the mobile terminal; the client is further used for receiving the first security code and the identity sent by the hardware equipment through the close range communication.
Optionally, the client is configured to send distribution network information to the hardware device through the near field communication, so as to instruct the hardware device to perform networking through the distribution network information; sending the binding request to the cloud platform if the networking of the hardware device is detected.
Optionally, the client is configured to receive a device account and a password of the hardware device; and under the condition that the equipment account and the password are verified, the client receives the first security code and the identity sent by the hardware equipment through the short-distance communication.
Optionally, the cloud platform is configured to establish a binding relationship between the target account and the hardware device when it is determined that the first security code is the same as the second security code.
Optionally, the close range communication includes bluetooth, Wifi.
It should be noted that, the above modules may be implemented by software or hardware, and for the latter, the following may be implemented, but not limited to: the modules are all positioned in the same processor; alternatively, the modules are respectively located in different processors in any combination.
Embodiments of the present invention also provide a storage medium having a computer program stored therein, wherein the computer program is arranged to perform the steps of any of the above method embodiments when executed.
Alternatively, in the present embodiment, the storage medium may be configured to store a computer program for executing the steps of:
s1, receiving a binding request sent by a client, wherein the binding request carries a first security code and an identity of a hardware device, and the client logs in from a target account;
s2, receiving a second security code reported by the hardware equipment;
and S3, binding the target account and the hardware device under the condition that the first security code and the second security code pass the verification.
Optionally, in this embodiment, the storage medium may include, but is not limited to: various media capable of storing computer programs, such as a usb disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk.
Embodiments of the present invention also provide an electronic device comprising a memory having a computer program stored therein and a processor arranged to run the computer program to perform the steps of any of the above method embodiments.
Optionally, the electronic apparatus may further include a transmission device and an input/output device, wherein the transmission device is connected to the processor, and the input/output device is connected to the processor.
Optionally, in this embodiment, the processor may be configured to execute the following steps by a computer program:
s1, receiving a binding request sent by a client, wherein the binding request carries a first security code and an identity of a hardware device, and the client logs in from a target account;
s2, receiving a second security code reported by the hardware equipment;
and S3, binding the target account and the hardware device under the condition that the first security code and the second security code pass the verification.
Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments and optional implementation manners, and this embodiment is not described herein again.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and alternatively, they may be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, and in some cases, the steps shown or described may be performed in an order different than that described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple ones of them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the principle of the present invention should be included in the protection scope of the present invention.
Claims (10)
1. A method for binding devices, comprising:
the method comprises the steps that a cloud platform receives a binding request sent by a client, wherein the binding request carries a first security code and an identity of hardware equipment, and the client logs in through a target account;
the cloud platform receives a second security code reported by the hardware equipment;
and the cloud platform binds the target account and the hardware equipment under the condition that the first security code and the second security code pass verification.
2. The method of claim 1, wherein before the cloud platform receives the binding request sent by the client, the method further comprises:
the mobile terminal establishes close range communication with the hardware equipment, wherein the client is installed on the mobile terminal;
and the client receives the first security code and the identity sent by the hardware equipment through the close range communication.
3. The method of claim 2, wherein after the mobile terminal establishes the close-range communication with the hardware device, the method further comprises:
the client sends distribution network information to the hardware equipment through the near field communication so as to indicate the hardware equipment to perform networking through the distribution network information;
and the client sends the binding request to the cloud platform under the condition that the networking of the hardware equipment is detected.
4. The method of claim 2, wherein the client receives the first security code and the identity transmitted by the hardware device through the close-range communication, and comprises:
the client receives an equipment account number and a password of the hardware equipment;
and under the condition that the client checks the equipment account and the password, the client receives the first security code and the identity sent by the hardware equipment through the short-distance communication.
5. The method of claim 1, the cloud platform binding the target account and the hardware device if the first security code and the second security code are verified, comprising:
and the cloud platform establishes a binding relationship between the target account and the hardware equipment under the condition that the first security code and the second security code are determined to be the same.
6. The method according to any one of claims 2 to 4, wherein the close range communication comprises Bluetooth, Wifi.
7. A binding system for a device, comprising:
the system comprises a client side and a cloud platform, wherein the client side is used for sending a binding request to the cloud platform, the binding request carries a first security code and an identity of hardware equipment, and the client side logs in through a target account;
the hardware equipment is used for sending a second security code to the cloud platform;
and the cloud platform is used for binding the target account and the hardware equipment under the condition that the first security code and the second security code pass verification.
8. The system of claim 7, further comprising:
the mobile terminal is used for establishing close-range communication with the hardware equipment, wherein the client is installed on the mobile terminal;
the client is further used for receiving the first security code and the identity sent by the hardware equipment through the close range communication.
9. A storage medium, in which a computer program is stored, wherein the program is executable by a terminal device or a computer to perform the method of any one of claims 1 to 6.
10. An electronic device comprising a memory and a processor, wherein the memory has stored therein a computer program, and wherein the processor is arranged to execute the computer program to perform the method of any of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110512069.2A CN113259918A (en) | 2021-05-11 | 2021-05-11 | Equipment binding method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110512069.2A CN113259918A (en) | 2021-05-11 | 2021-05-11 | Equipment binding method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113259918A true CN113259918A (en) | 2021-08-13 |
Family
ID=77222743
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110512069.2A Pending CN113259918A (en) | 2021-05-11 | 2021-05-11 | Equipment binding method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113259918A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114422216A (en) * | 2021-12-31 | 2022-04-29 | 杭州华橙软件技术有限公司 | Internet of things equipment binding method and device and storage medium |
WO2023092979A1 (en) * | 2021-11-25 | 2023-06-01 | 青岛海尔科技有限公司 | Binding relationship establishing method and device, storage medium, and electronic device |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104580265A (en) * | 2015-02-13 | 2015-04-29 | 小米科技有限责任公司 | Equipment binding method and equipment binding device |
CN108632798A (en) * | 2018-04-26 | 2018-10-09 | 青岛海尔科技有限公司 | A kind of quick binding method of Internet of Things household appliance, system and relevant apparatus |
CN111800317A (en) * | 2020-05-29 | 2020-10-20 | 深圳拓邦股份有限公司 | Method for automatically binding account, intelligent device and handheld terminal |
CN111885594A (en) * | 2020-06-30 | 2020-11-03 | 海尔优家智能科技(北京)有限公司 | Equipment binding method and device |
CN112312386A (en) * | 2019-07-15 | 2021-02-02 | 广东美的制冷设备有限公司 | Equipment binding method and device and electronic equipment |
WO2021027686A1 (en) * | 2019-08-09 | 2021-02-18 | 华为技术有限公司 | Bluetooth device mutual identification or mutual trust method |
-
2021
- 2021-05-11 CN CN202110512069.2A patent/CN113259918A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104580265A (en) * | 2015-02-13 | 2015-04-29 | 小米科技有限责任公司 | Equipment binding method and equipment binding device |
CN108632798A (en) * | 2018-04-26 | 2018-10-09 | 青岛海尔科技有限公司 | A kind of quick binding method of Internet of Things household appliance, system and relevant apparatus |
CN112312386A (en) * | 2019-07-15 | 2021-02-02 | 广东美的制冷设备有限公司 | Equipment binding method and device and electronic equipment |
WO2021027686A1 (en) * | 2019-08-09 | 2021-02-18 | 华为技术有限公司 | Bluetooth device mutual identification or mutual trust method |
CN111800317A (en) * | 2020-05-29 | 2020-10-20 | 深圳拓邦股份有限公司 | Method for automatically binding account, intelligent device and handheld terminal |
CN111885594A (en) * | 2020-06-30 | 2020-11-03 | 海尔优家智能科技(北京)有限公司 | Equipment binding method and device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023092979A1 (en) * | 2021-11-25 | 2023-06-01 | 青岛海尔科技有限公司 | Binding relationship establishing method and device, storage medium, and electronic device |
CN114422216A (en) * | 2021-12-31 | 2022-04-29 | 杭州华橙软件技术有限公司 | Internet of things equipment binding method and device and storage medium |
CN114422216B (en) * | 2021-12-31 | 2024-01-09 | 杭州华橙软件技术有限公司 | Internet of things equipment binding method, device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111885115B (en) | Device binding changing method and device | |
CN110808948B (en) | Remote procedure calling method, device and system | |
CN110099029A (en) | A kind of auth method, terminal device and server | |
CN112637931A (en) | Method and device for establishing network connection | |
CN113259918A (en) | Equipment binding method and system | |
CN111885594A (en) | Equipment binding method and device | |
CN105636030B (en) | Share the method and device of access point | |
CN111263377A (en) | Network configuration method, device, equipment and system and distribution network testing method and system | |
CN112637221B (en) | Equipment control method and device | |
CN113596792B (en) | Binding method and device of electronic equipment, storage medium and electronic device | |
CN107454659B (en) | Terminal identification method, system, terminal equipment and base station | |
CN111372224A (en) | Method, device and equipment for sharing seed code number by eSIM (embedded subscriber identity Module) | |
CN111131324A (en) | Login method and device of business system, storage medium and electronic device | |
CN111726411B (en) | Equipment binding method, device, system, storage medium and electronic device | |
CN113114465B (en) | Method and device for processing attribution authority, storage medium and electronic device | |
US10979287B2 (en) | Method and apparatus for receiving a solution when configuration function verification fails in a terminal | |
CN102567088B (en) | Method of handling step execution result in software and application control management object | |
CN113923112A (en) | Equipment configuration method and equipment configuration device | |
CN112217659A (en) | Method and system for adding client terminal equipment in SD-WAN (secure digital-Wide area network) system | |
CN112087745A (en) | Network distribution method and device of household appliance, electronic device and storage medium | |
CN112689010B (en) | Equipment message transmission method and device, storage medium and electronic device | |
CN111935679B (en) | Method and system for initial communication between Internet of things terminal and wireless terminal small program | |
CN113132986B (en) | Method and device for realizing mesh network of WiFi based on DPP protocol, and storage medium | |
CN113065118B (en) | Method and device for determining authentication code, storage medium and electronic device | |
CN111107663B (en) | Data transmission method and device, storage medium and electronic device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20210813 |