CN113490207A - Internet of things equipment binding method and device, computer equipment and storage medium - Google Patents

Internet of things equipment binding method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN113490207A
CN113490207A CN202110724287.2A CN202110724287A CN113490207A CN 113490207 A CN113490207 A CN 113490207A CN 202110724287 A CN202110724287 A CN 202110724287A CN 113490207 A CN113490207 A CN 113490207A
Authority
CN
China
Prior art keywords
internet
client
things
information
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110724287.2A
Other languages
Chinese (zh)
Other versions
CN113490207B (en
Inventor
李辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen TCL New Technology Co Ltd
Original Assignee
Shenzhen TCL New Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen TCL New Technology Co Ltd filed Critical Shenzhen TCL New Technology Co Ltd
Priority to CN202110724287.2A priority Critical patent/CN113490207B/en
Publication of CN113490207A publication Critical patent/CN113490207A/en
Application granted granted Critical
Publication of CN113490207B publication Critical patent/CN113490207B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y30/00IoT infrastructure
    • G16Y30/10Security thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/48Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the application provides an Internet of things equipment binding method and device, computer equipment and a storage medium, relates to the technical field of Internet of things, and can obtain equipment information of at least one piece of Internet of things equipment through a first client; sending a configuration request to the Internet of things equipment through a first client based on the equipment information, wherein the configuration request is used for indicating the Internet of things equipment to generate authentication information through a second client, and the first client and the second client belong to different Internet of things systems; acquiring authentication information through a first client; and registering and binding the Internet of things equipment based on the authentication information through the first client. The scheme improves the binding efficiency of the equipment of the Internet of things.

Description

Internet of things equipment binding method and device, computer equipment and storage medium
Technical Field
The application relates to the technical field of communication, in particular to a method and a device for binding Internet of things equipment, computer equipment and a storage medium.
Background
The technology of the internet of things, namely the internet of things, is widely applied to network fusion through communication sensing technologies such as intelligent sensing, identification technology and pervasive computing, becomes the third wave of development of the world information industry after computers and the internet, and is widely applied to various fields at present.
In the prior art, because manufacturers of different internet of things devices are different and also different from corresponding application programs, a user needs to use a plurality of application programs to bind different internet of things devices respectively to control different internet of things devices, so that the binding efficiency of the internet of things devices is low, and the control of the internet of things devices is inconvenient.
Disclosure of Invention
The embodiment of the application provides a method and a device for binding equipment of the Internet of things, computer equipment and a storage medium, and the efficiency of binding the equipment of the Internet of things can be improved.
The method for binding the Internet of things equipment comprises the following steps:
acquiring equipment information of at least one piece of Internet of things equipment through a first client;
sending, by the first client, a configuration request to the internet of things device based on the device information, where the configuration request is used to instruct the internet of things device to generate authentication information through a second client, and the first client and the second client belong to different internet of things systems;
acquiring the authentication information through the first client;
and registering and binding the Internet of things equipment based on the authentication information through the first client.
In an embodiment, after the registering and binding, by the first client, the internet of things device based on the authentication information, the method further includes:
and controlling the Internet of things equipment through the first client.
In an embodiment, the obtaining, by the first client, device information of at least one internet of things device includes:
and inquiring the registrable and bindable Internet of things equipment through the first client to acquire the inquired equipment information of the Internet of things equipment.
In one embodiment, querying a registerable and bindable internet of things device, and acquiring queried device information of the internet of things device includes:
broadcasting a device searching message in a preset local area network;
receiving candidate Internet of things equipment in the preset local area network, and returning candidate equipment information based on the equipment searching message;
and screening out the equipment information of the IOT equipment from the candidate equipment information of the candidate IOT equipment.
In an embodiment, after the sending, by the first client, the configuration request to the internet of things device based on the device information, the method further includes:
displaying, by the second client, an information presentation control based on the send configuration request;
and responding to the triggering operation aiming at the information display control through the second client to generate the authentication information.
In an embodiment, the registering, by the first client, and binding the internet of things device based on the authentication information includes:
establishing, by the first client or the second client, an encryption channel based on the authentication information;
performing identity authentication with the Internet of things equipment based on the encryption channel through the first client;
and if the identity authentication is passed, registering and binding the Internet of things equipment through the first client.
In an embodiment, if the identity authentication passes, registering and binding the internet of things device by the first client, including:
if the identity authentication is passed, acquiring registration information of the Internet of things equipment through the first client;
sending the registration information to the Internet of things equipment through the first client, and registering and binding the Internet of things equipment based on the registration information.
In an embodiment, the sending, by the first client, the registration information to the internet of things device includes:
generating, by the first client, a target key based on a key algorithm negotiated with the internet of things device and the authentication information;
encrypting, by the first client, the registration information based on the target key to obtain encrypted registration information;
and sending the encrypted registration information to the Internet of things equipment through the first client, so that the Internet of things equipment decrypts the encrypted registration information to obtain the registration information.
In an embodiment, if the identity authentication passes, registering and binding the internet of things device by the first client, including:
acquiring registration information of the Internet of things equipment through a cloud server associated with the first client, and sending the registration information to the Internet of things equipment and the first client;
and registering and binding the Internet of things equipment based on the registration information through the first client.
In an embodiment, the first client includes an information input interface, and the obtaining, by the first client, the authentication information includes:
displaying the authentication information through the second client for a user to view;
and receiving the authentication information input by the user through an information input interface of the first client.
In an embodiment, the obtaining, by the first client, the authentication information includes:
generating, by the second client, a graphic code based on the authentication information;
identifying, by the first client, the graphical code to extract the authentication information from the graphical code.
Correspondingly, the internet of things equipment binding device that this application embodiment still provided includes:
the first acquisition module is used for acquiring the equipment information of at least one piece of Internet of things equipment through a first client;
a sending module, configured to send, by the first client, a configuration request to the internet of things device based on the device information, where the configuration request is used to instruct the internet of things device to generate authentication information by a second client, and the first client and the second client belong to different internet of things systems;
the second acquisition module is used for acquiring the authentication information through the first client;
and the binding module is used for registering and binding the Internet of things equipment based on the authentication information through the first client.
In an embodiment, the first obtaining module includes a query submodule, specifically:
a query submodule: the device information processing method and system are used for inquiring the registered and bound Internet of things devices through the first client and obtaining the inquired device information of the Internet of things devices.
In an embodiment, the query submodule is specifically configured to:
broadcasting a device searching message in a preset local area network;
receiving candidate Internet of things equipment in a preset local area network, and returning candidate equipment information based on the equipment searching message;
and screening out the equipment information of the IOT equipment from the candidate equipment information of the candidate IOT equipment.
In an embodiment, the sending module includes a display sub-module and a generation sub-module, specifically:
a display submodule: and the information display control is displayed based on the sending configuration request through the second client.
Generating a submodule: and the authentication information is generated by the second client in response to the triggering operation aiming at the information display control.
In an embodiment, the second obtaining module includes a display sub-module and a receiving sub-module, specifically:
a display submodule: and the authentication information is displayed through the second client for the user to view.
A receiving submodule: the authentication information input by the user is received through an information input interface of the first client.
In an embodiment, the second obtaining module includes a generating sub-module and an identifying sub-module, specifically:
generating a submodule: and the second client is used for generating a graphic code based on the authentication information.
An identification submodule: the authentication server is used for identifying the graphic code through the first client so as to extract the authentication information from the graphic code.
In an embodiment, the internet of things device binding apparatus further includes a control module, specifically:
a control module: the Internet of things equipment is controlled through the first client.
In an embodiment, the binding module includes an establishing sub-module, an authenticating sub-module, and a binding sub-module, specifically:
establishing a submodule: and the first client or the second client is used for establishing an encryption channel based on the authentication information.
An authentication sub-module: and the identity authentication is carried out on the Internet of things equipment through the first client based on the encryption channel.
Binding the sub-modules: and if the identity authentication is passed, registering and binding the Internet of things equipment through the first client.
In an embodiment, the binding module includes an obtaining submodule and a sending submodule, specifically:
obtaining a submodule: the first client is used for acquiring registration information of the Internet of things equipment if the identity authentication is passed;
a sending submodule: the first client is used for sending the registration information to the Internet of things equipment and registering and binding the Internet of things equipment based on the registration information.
In an embodiment, the sending submodule is specifically configured to:
generating a target key based on a key algorithm and authentication information negotiated with the Internet of things equipment through a first client;
encrypting the registration information based on the target key through the first client to obtain encrypted registration information;
and sending the encrypted registration information to the Internet of things equipment through the first client, so that the Internet of things equipment decrypts the encrypted registration information to obtain the registration information.
In an embodiment, the binding submodule is specifically configured to:
acquiring registration information of the Internet of things equipment through a cloud server associated with a first client, and sending the registration information to the Internet of things equipment and the first client;
and registering and binding the Internet of things equipment based on the registration information through the first client.
Correspondingly, the embodiment of the application also provides computer equipment, which comprises a memory and a processor; the memory stores computer programs, and the processor is used for running the computer programs in the memory to execute any one of the internet of things device binding methods provided by the embodiments of the present application.
Correspondingly, an embodiment of the present application further provides a storage medium, where the storage medium is used to store a computer program, and the computer program is loaded by a processor to execute any one of the internet of things device binding methods provided in the embodiment of the present application.
The method and the device for the internet of things equipment comprise the steps that equipment information of at least one internet of things equipment can be obtained through a first client; sending a configuration request to the Internet of things equipment through a first client based on the equipment information, wherein the configuration request is used for indicating the Internet of things equipment to generate authentication information through a second client, and the first client and the second client belong to different Internet of things systems; then, acquiring authentication information through the first client; and registering and binding the Internet of things equipment based on the authentication information through the first client. The scheme improves the binding efficiency of the equipment of the Internet of things.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a scene diagram of an internet of things device binding method provided in an embodiment of the present application;
fig. 2 is a flowchart of an internet of things device binding method provided in an embodiment of the present application;
fig. 3 is another flowchart of an internet of things device binding method provided in an embodiment of the present application;
fig. 4 is a schematic display page diagram of a first client and a second client provided by an embodiment of the present application;
fig. 5 is a schematic diagram of an internet of things device binding apparatus provided in an embodiment of the present application;
fig. 6 is a schematic structural diagram of a terminal according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The embodiment of the application provides an Internet of things equipment binding method and device, computer equipment and a storage medium.
For example, referring to fig. 1, fig. 1 is a schematic view of a scene in which the internet of things device binding method provided in the embodiment of the present application is applied, where the internet of things device binding method may be applied to an internet of things device binding apparatus, the internet of things device binding apparatus may be integrated in a computer device, and the computer device may be a terminal or other device.
The terminal may include a mobile phone, a wearable smart device, a tablet Computer, a notebook Computer, a Personal Computer (PC), a vehicle-mounted Computer, and the like.
The method includes the steps that a first client and a second client can be respectively arranged on different terminals, or the first client and the second client can be arranged on the same terminal, and the first client and the second client can be different clients, for example, the first client can be a client which establishes communication connection with a cloud server of an internet of things system A (also called as an ecological A) and performs data interaction; the second client can establish communication connection with a cloud server of the internet of things system B (also referred to as an ecological B) and perform data interaction.
The Internet of Things device may be a physical device that can be accessed to The Internet of Things (IOT for short), for example, a refrigerator, an air conditioner, a television, a floor sweeping robot, and an intelligent sound box.
The internet of things device and the second client may belong to the same internet of things system, and a cloud server (which may be referred to as a second cloud server) of the internet of things system may be a private cloud server corresponding to the second client, and may respond to a control instruction sent by the second client to control the internet of things device to execute a corresponding operation.
The client may include a browser application (also referred to as a Web application), an application on the terminal (also referred to as an APP), an applet, and the like.
The internet of things can acquire any object or process needing monitoring, connection or interaction in real time through various devices and technologies such as various information sensors, radio frequency identification technologies, global positioning systems, infrared sensors or laser scanners and acquire various required information such as sound, light, heat, electricity, mechanics, chemistry, biology or positions of the object or process, and the object, the object and people are connected in a ubiquitous manner through various possible network accesses, so that the intelligent sensing, identification and management of the object and the process are realized. The internet of things is an information bearer based on the internet, a traditional telecommunication network and the like, and all common physical objects which can be independently addressed form an interconnected network.
The cloud server may be a cloud server that provides basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a web service, cloud communication, a middleware service, a domain name service, a security service, a Content Delivery Network (CDN), and a big data and artificial intelligence platform, but is not limited thereto.
For example, the terminal may obtain device information (e.g., device identifier, type, and the like) of at least one internet of things device through the first client, and send a configuration request to the internet of things device based on the device information, at this time, the internet of things device may generate authentication information (e.g., PIN code) through the second client after receiving the configuration request, where the first client and the second client belong to different internet of things systems. Then, the second client can send authentication information to the first client, and the terminal can register and bind the Internet of things equipment based on the authentication information through the first client, so that the Internet of things equipment and the client of different manufacturers can be conveniently and rapidly bound, the binding efficiency of the Internet of things equipment is improved, and the expansion convenience of the Internet of things equipment is improved.
The specific implementation of the above operations can be seen in the following embodiments, which are not described herein.
It should be noted that the scene diagram of the application of the internet of things device binding method shown in fig. 1 is merely an example, and the application and the scene of the internet of things device binding method described in the embodiment of the present application are for more clearly illustrating the technical solution of the embodiment of the present application, and do not form a limitation on the technical solution provided in the embodiment of the present application.
The following are detailed below. It should be noted that the following description of the embodiments is not intended to limit the preferred order of the embodiments.
The embodiment will be described from the perspective of an internet of things device binding apparatus, which may be specifically integrated in a computer device, where the computer device may be a terminal or other devices. As shown in fig. 2, the flow of the internet of things device binding method is as follows:
101. and acquiring the equipment information of at least one piece of equipment of the Internet of things through the first client.
The device information may include a device identifier of the internet of things device and a device type of the internet of things device.
The device identifier may be composed of any one or more of numbers, words, letters, symbols, and the like, may be a single character or may be represented in a character string, and may be air1 or TV1, for example. The device type may include a type of an air conditioner or a television, and the device type may be represented by a type identifier in the form of characters, for example, the type identifier 1: indicating that the equipment type is air conditioner, type identifier 2: the device type is represented as a television or the like, and the device type of the internet of things device can be determined based on the type identification.
Specifically, the terminal may obtain the device information of the internet of things device through the first client, for example, the device information of the internet of things device may be obtained in a local preset device information list of the terminal, where the preset device list may be set in advance by a user or a developer.
For another example, the terminal may send an information acquisition request to a corresponding cloud server of the first client (which may be referred to as a first cloud server), so as to acquire device information of the internet of things device from the first cloud server based on the information acquisition request. The first cloud server may be a private cloud server corresponding to the first client, that is, the client and the first cloud server may belong to the same internet of things system.
For another example, if the internet of things device is in a distribution network state, the terminal searches for the internet of things device according to a distribution network mode corresponding to the distribution network state of the internet of things device, and receives device information sent by the internet of things device.
The distribution network state may be a state in which the internet of things device waits to be associated with the client.
The network distribution mode for configuring the client and the internet of things device can be a broadcast packet mode, a multicast address mode, a device hotspot network distribution mode, a bluetooth network distribution mode, a mobile phone hotspot network distribution mode, a router network distribution mode and the like, and different network distribution modes determine the communication mode of the internet of things device and the associated client, for example, the client and the internet of things device are configured in the network distribution mode through the router, and the client and the internet of things device can communicate through a local area network.
In an embodiment, the method may include, by querying the internet of things device capable of being registered and bound, and then acquiring the device information of the internet of things device, that is, "acquiring the device information of at least one internet of things device through the first client", specifically:
and inquiring the registered and bound Internet of things equipment through the first client to obtain the equipment information of the inquired Internet of things equipment.
For example, the terminal may specifically query the internet of things device capable of being registered and bound through the first client, and for example, the internet of things device capable of being registered and bound may be obtained locally from the terminal or from a preset registrable and bound device list in a database of the first cloud server.
Then, device information corresponding to the internet of things device selected by the user can be acquired from a local or first cloud server database.
Or the terminal searches for the internet of things equipment in the network distribution state, the internet of things equipment in the network distribution state is registrable and bindable internet of things equipment, and receives equipment information sent by the internet of things equipment.
In an embodiment, the terminal may query the internet of things device capable of being registered and bound in the local area network where the terminal is located, that is, "query the internet of things device capable of being registered and bound, and obtain the device information of the queried internet of things device" in step, specifically, the method may include:
broadcasting a device searching message in a preset local area network;
receiving candidate Internet of things equipment in a preset local area network, and returning candidate equipment information based on the equipment searching message;
and screening out the equipment information of the IOT equipment from the candidate equipment information of the candidate IOT equipment.
The device information searching method includes that a terminal sends a message to a device in a preset local area network through a first client, and the device information searching method includes that the terminal sends the message to the device in the preset local area network through the first client, and the device information searching method includes that the terminal sends the message to the device in the preset local area network through the first client, and the device information searching method includes that the device information searching method can be in the forms of broadcast messages or requests.
The preset local area network may be a local area network where the terminal is located, the local area network may be a private network, and the local area network may also be a wireless local area network.
The candidate internet of things device can be an internet of things device searched by the terminal in a preset local area network through the first client.
The candidate device information may be device information of a candidate internet of things device.
For example, the terminal may specifically send the device searching message to all devices in the preset local area network through the first client, the device that receives the device searching message may be used as a candidate internet of things device, and the candidate internet of things device may return device information of itself, that is, candidate device information, to the terminal after receiving the device searching message.
The terminal displays the candidate device information of the candidate device in the display page of the first client according to the received candidate device information for selection of the user, at this time, the selection operation of the user for the candidate device information can be responded (for example, the user can click one or more candidate device information to generate the selection operation), the selected candidate device information can be screened from the candidate device information based on the selection operation, and the selected candidate device information is used as the device information of the internet of things device capable of being registered and bound.
102. And sending a configuration request to the Internet of things equipment through the first client based on the equipment information, wherein the configuration request is used for indicating the Internet of things equipment to generate authentication information through the second client, and the first client and the second client belong to different Internet of things systems.
The configuration request may be a request that the terminal sends to the internet of things device through the first client, and the internet of things device sends the configuration request to the second client to instruct the second client to generate the authentication information based on the configuration request. The configuration request may carry device information, and may also carry other information, which is not limited herein.
The first client and the second client may be located on the same terminal or on different terminals, respectively, and may belong to different internet of things systems, for example, the first client may be a third-party client with respect to the second client, and the second client may be a client belonging to the same manufacturer as the internet of things device.
The authentication information may be information for mutual identity authentication between the internet of things device and the first client. The authentication information may be any character, such as a character string obtained by randomly combining numbers, letters, or other symbols.
For example, the authentication information may be a Personal Identification Number (PIN), which may also be called a device identification number, and is a serial number of numbers used for authentication and authorization.
For example, the terminal may specifically generate a configuration request according to the device information through the first client, and send the configuration request to the internet of things device through a preset local area network.
And after the Internet of things equipment receives the configuration request, the configuration request is sent to a second cloud server of the Internet of things system corresponding to the Internet of things equipment. The second cloud server sends the configuration request to the second client, and the second client generates authentication information according to the configuration request.
In order to improve security, the second client may display the configuration request, and generate authentication information in response to a trigger operation of a user for the configuration request, so as to avoid a risk caused by maliciously binding the internet of things device by using a machine, that is, in an embodiment, after the step "sending the configuration request to the internet of things device based on the device information by using the first client", the method specifically includes:
displaying, by the second client, the information presentation control based on the send configuration request;
and responding to the triggering operation aiming at the information display control through the second client to generate the authentication information.
The information display control may be a control for a user to operate to trigger the second client to generate the authentication information, for example, the information display control may be a control displayed in the form of an icon, a button, or a hyperlink.
For example, the second client may specifically receive the configuration request, generate the information display control based on the configuration request, and display the information display control in the display page of the second client.
When the user performs a trigger operation on the information display control, for example, clicking or sliding, the second client responds to the trigger operation of the user to generate the authentication information.
103. And acquiring the authentication information through the first client.
In an embodiment, the authentication information input by the user at the first client may be acquired, that is, the first client may include an information input interface, and the step "acquiring the authentication information through the first client" may specifically include:
displaying the authentication information through the second client for a user to view;
and receiving the authentication information input by the user through an information input interface of the first client.
The information input interface may be a graphical user interface of the first client, and the information input interface may be used for a user to input information.
For example, the terminal may specifically respond to a trigger operation of the user through the second client to generate the authentication information, and display the authentication information on a display page of the second client. The user may view the authentication information on a display page of the second client.
After the user views the authentication information, the authentication information can be input in the information input interface of the first client.
Specifically, the information input interface of the first client may include an input area and a confirmation control, the input area may be used for authentication information input by a user, and the confirmation control may be used for a user to perform a confirmation operation after inputting the authentication information. After the user views the authentication information, the user inputs the authentication information in the input area through a keyboard or an audio acquisition device (e.g., a microphone, or a microphone, etc.), and confirms the input completion by performing a confirmation operation on the confirmation control.
And the first client responds to the confirmation operation of the user on the confirmation control and receives the authentication information input by the user in the input area.
Besides the authentication information input by the user, the authentication information can be acquired by acquiring the authentication information input by the user, displaying the graphic code through the terminal and responding to the scanning action, so that the authentication information is acquired, and the convenience and the accuracy of acquiring the authentication information are improved. That is, in an embodiment, the step "obtaining, by the first client, the authentication information" may specifically include:
generating, by the second client, a graphic code based on the authentication information;
the graphical code is recognized by the first client to extract authentication information from the graphical code.
The graphic code may be recorded data symbol information generated according to a coding algorithm and distributed on a plane by a geometric figure according to a certain rule, such as a two-dimensional code or a barcode for recording authentication information.
For example, the second client may specifically generate a graphic code according to the authentication information, and display the graphic code on a display page.
And the first client identifies the graphic code and extracts the authentication information recorded by the graphic code. Specifically, if the first client and the second client are not on the same terminal, that is, the first client is an application program in the terminal a, and the second client is an application program in the terminal B, the terminal a starts the camera to scan the graphic code displayed by the second client of the terminal B, and identifies the information recorded in the graphic code to obtain the authentication information. If the first client and the second client are on the same terminal, for example, both the first client and the second client are application programs in the terminal a, the terminal a may first store the graphic code, and then the first client obtains the graphic code for identification, and extracts the authentication information recorded by the graphic code.
If the graphic code is displayed in the form of a picture, the second client can directly store the picture containing the graphic code; if the graphic code is not displayed in the form of a picture, the second client can capture a screenshot of the page on which the graphic code is displayed to obtain the picture containing the graphic code.
Optionally, the second client may send the generated authentication information to the internet of things device, the internet of things device sends the authentication information to the first client, and the client acquires the authentication information sent by the internet of things device.
104. And registering and binding the Internet of things equipment based on the authentication information through the first client.
For example, the first client may specifically acquire the authentication information and send the authentication information to the internet of things device, the internet of things device compares whether the authentication information sent by the first client is consistent with the authentication information sent by the second client, if so, the internet of things device passes authentication of the first client, and the first client configures the internet of things device to register and bind the internet of things device. If the authentication is inconsistent with the authentication of the first client, the internet of things equipment does not pass the authentication of the first client, and the registration and binding of the internet of things equipment cannot be completed.
Optionally, the authentication information may further include timeout information, so as to improve security of the internet of things for identity authentication of the first client. If the internet of things equipment does not receive the authentication information sent by the first client within the time indicated by the timeout information, the authentication of the first client is not passed, and the first client cannot register and bind the internet of things equipment. If the internet of things device receives the authentication information sent by the first client within the time indicated by the timeout information, the internet of things device can be registered and bound based on the authentication information.
In an embodiment, the terminal may establish an encrypted channel between the first client and the internet of things device according to the device information, and the first client sends the control instruction to the internet of things device through the encrypted channel, so that the security of the internet of things may be improved, that is, the step "register and bind the internet of things device based on the authentication information through the first client" may specifically include:
establishing an encryption channel based on the authentication information through the first client or the second client;
performing identity authentication with the Internet of things equipment through the first client based on the encryption channel;
and if the identity authentication is passed, registering and binding the Internet of things equipment through the first client.
The encrypted channel may be a secure communication path through which the first client and the internet of things device communicate with each other.
For example, the first client may specifically send the authentication information to the internet of things device, and the internet of things device compares whether the authentication information sent by the first client is consistent with the authentication information sent by the second client, and if so, may return information that the authentication passes to the first client.
And the first client determines a communication path with the Internet of things equipment according to the returned information, and establishes an encryption channel.
For another example, if the authentication information sent by the first client is consistent with the authentication information sent by the second client, the internet of things device instructs the second client to authorize the first client, so that the first client is established in the encryption channel of the internet of things device.
The first client and the internet of things equipment can exchange digital certificates through the encrypted channel, and the digital certificates can be issued to the first client and the internet of things equipment by a third-party certification authority trusted by the first client and the internet of things equipment.
The Internet of things equipment can authenticate the identity of the first client according to the received digital certificate, and if the digital certificate is issued by a third-party authentication machine trusted by the first client and the Internet of things equipment together, the identity authentication of the first client by the Internet of things equipment is passed. If the digital certificate is not issued by a third-party certification machine which is trusted by the first client and the equipment of the internet of things together, the equipment of the internet of things does not pass the identity certification of the first client.
The first client can authenticate the identity of the Internet of things equipment according to the received digital certificate. And if the digital certificate is issued by a third-party certification machine which is trusted by the first client and the equipment in the Internet of things together, the first client passes the identity certification of the equipment in the Internet of things. If the digital certificate is not issued by a third-party certification machine which is trusted by the first client and the equipment in the internet of things together, the identity authentication of the first client to the equipment in the internet of things is not passed.
If the identity authentication of the first client to the internet of things equipment is passed and the identity authentication of the first client by the internet of things equipment is passed, the identity authentication of the internet of things equipment and the first client is passed, and the terminal registers and binds the internet of things equipment through the first client. If the identity authentication of the first client to the internet of things device does not pass or the identity authentication of the first client by the internet of things device does not pass, the identity authentication of the internet of things device and the first client does not pass, and the internet of things device cannot be registered and bound.
In an embodiment, the step "performing, by the first client, registration binding on the internet of things device based on the authentication information" may specifically include:
if the identity authentication is passed, acquiring registration information of the Internet of things equipment through the first client;
and sending the registration information to the Internet of things equipment through the first client, and registering and binding the Internet of things equipment based on the registration information.
The registration information may be information required by the internet of things device to identify the identity of the first client, and the registration information may include a device identifier, a key, a user permission list of the internet of things device, and address information (e.g., a uniform resource locator URL) of a second cloud server corresponding to the internet of things device.
For example, the terminal may specifically send the registration information to the internet of things device through the first client, and when the internet of things device receives the control instruction, the internet of things device determines whether the first client has a corresponding right according to comparison between information carried by the control instruction and the registration information.
In an embodiment, the registration information may be encrypted to improve security, that is, the step of sending the registration information to the internet of things device through the first client includes:
generating a target key based on a key algorithm and authentication information negotiated with the Internet of things equipment through a first client;
encrypting the registration information based on the target key through the first client to obtain encrypted registration information;
and sending the encrypted registration information to the Internet of things equipment through the first client, so that the Internet of things equipment decrypts the encrypted registration information to obtain the registration information.
The key algorithm may be an algorithm for generating a target key based on the authentication information, and the key algorithm is used for encrypting data interacted in the registration binding process. For example, the key Algorithm may include a Data Encryption Standard (DES), an International Data Encryption Algorithm (IDEA), an Advanced Encryption Standard (AES), a sequence cipher Algorithm, a block cipher Algorithm, a public key cipher Algorithm, a hash function Algorithm, and the like.
The key algorithm may include an encryption process and a decryption process: the basic process of data encryption is to process a plaintext file or data according to a certain algorithm rule to make the plaintext file or data become unreadable coded information, which is generally called as "ciphertext", so as to protect the data from being illegally stolen, correspondingly, the process of converting the coded information into the original plaintext file by using the rule of the same key algorithm is a decryption process, and the key algorithm is divided into a symmetric encryption algorithm and an asymmetric encryption algorithm, wherein the symmetric encryption algorithm is characterized in that an encryption key is the same as a decryption key, and the asymmetric encryption algorithm is characterized in that the encryption key is different from the decryption key. Optionally, each internet of things device may store a key algorithm, and the key algorithms stored in the internet of things devices may be the same or different.
The target key may include an encryption key required in the process of converting the registration information into the encrypted registration information, and a decryption key required in the process of converting the encrypted registration information into the registration information.
For example, the terminal may specifically generate an encryption key based on the device information through the first client according to a key algorithm negotiated with the internet of things device, encrypt the registration information through the generated encryption key, obtain the encrypted registration information, and protect the security of the information.
The terminal sends the encrypted registration information obtained by encryption to the internet of things device, the internet of things device decrypts the encrypted registration information to obtain the registration information, and for example, the internet of things device can decrypt the encrypted registration information through the decryption key to obtain the registration information.
The key algorithm negotiated between the first client and the internet of things device may be that the terminal obtains the device information through the first client and also obtains the key algorithm, for example, the key algorithm may be sent to the first client when the internet of things device sends the device information.
In an embodiment, the binding of the internet of things device may be completed by a cloud server associated with the first client, that is, the step "register and bind the internet of things device by the first client if the identity authentication passes" may specifically include:
acquiring registration information of the Internet of things equipment through a cloud server associated with a first client, and sending the registration information to the Internet of things equipment and the first client;
and registering and binding the Internet of things equipment based on the registration information through the first client.
The cloud server may be a private cloud server corresponding to the first client, that is, the first client and the first cloud server may belong to the same internet of things system, and may be referred to as a first cloud server.
For example, the terminal may specifically acquire the registration information through the first cloud server, for example, acquire the registration information from a database of the first cloud server, or the first cloud server receives the registration information sent by the first client and sends the registration information to the internet of things device, and the internet of things device may store the registration information, and at this time, the internet of things device may register to the first client based on the registration information, and may also associate and bind the first client and the second cloud server based on the registration information, so that the internet of things device may be controlled through the first client, and thus registration and binding of the internet of things device may be completed.
After the first client registers and binds the internet of things device, the first client may control the internet of things device, that is, in an embodiment, after the step "register and bind the internet of things device based on the authentication information by the first client", the method may specifically include:
and controlling the Internet of things equipment through the first client.
For example, the first client may specifically receive a control instruction input by a user, for example, in a display page of the first client, the user operates a control to trigger the first client to generate the control instruction; or the user inputs voice through an audio acquisition device (such as a microphone or a microphone), the first client generates a control instruction based on the voice input by the user, and sends the control instruction to the internet of things device so as to control the internet of things device to execute corresponding operation.
For example, when the internet of things device is an air conditioner, the terminal may receive, through the first client, an adjustment operation of an operation parameter, such as a temperature, an operation mode, and a wind speed, of the air conditioner, which is input by a user in a display page of the first client for air conditioner control, and generate a control instruction based on the adjustment operation.
The air conditioner can adjust the temperature according to the received temperature adjusting instruction (namely, the control instruction).
For another example, when the internet-of-things device is a television, the adjustment operation of the running parameters such as the volume, the program switching, and the brightness of the television input by the user may be received in the display page of the client for the television control, and the control instruction may be generated based on the adjustment operation.
The television can adjust the volume according to the received volume adjusting instruction (namely, the control instruction).
It should be noted that, in order to improve the security of data interaction, the control instruction may be encrypted through a key algorithm, and then the encrypted control instruction is sent to the internet of things device, and the internet of things device may decrypt the encrypted control instruction to obtain the content indicated by the control instruction, and perform a corresponding operation according to the content indicated by the control instruction.
As can be seen from the above, in the embodiment of the application, the device information of at least one piece of internet-of-things device can be acquired through the first client; sending a configuration request to the Internet of things equipment through a first client based on the equipment information, wherein the configuration request is used for indicating the Internet of things equipment to generate authentication information through a second client, and the first client and the second client belong to different Internet of things systems; acquiring authentication information through a first client; and registering and binding the Internet of things equipment based on the authentication information through the first client. The scheme improves the binding efficiency of the equipment of the Internet of things.
On the basis of the above-described embodiments, further details will be given below by way of example.
This embodiment will be described from the perspective of the internet of things device binding system, and this internet of things device binding system may include a first client, a second client, an internet of things device, and a second cloud server and the like corresponding to the internet of things device, where the first client and the second client may be APPs on the same terminal, or the first client and the second client may be APPs on different terminals, respectively.
As shown in fig. 3, a specific flow of the internet of things device binding method provided in the embodiment of the present application may be as follows:
201. the first client broadcasts a find device message.
For example, the first client may specifically send a device lookup message to a device in a preset local area network.
202. And the Internet of things equipment sends equipment information to the first client.
For example, after receiving the device lookup information, the internet of things device may return device information including a device identifier, a device type, and a key algorithm of the internet of things device to the first client.
203. The first client receives and displays the equipment information, and responds to the selection operation of the user on the Internet of things equipment to generate a configuration request.
For example, the first client may specifically receive the device information and present the device information to the user through a display page according to the received device information, for example, as shown in a display page 41 in fig. 4, the first client may display the searched internet of things devices (such as the intelligent electric lamp, the air conditioner, the intelligent washing machine, and the intelligent refrigerator in fig. 4) on the display page according to the type of the device information.
The user may select the internet of things device to be configured from the displayed device information, for example, the user selects the internet of things device displayed on the display page 41 of the first client in fig. 4. The circular selection control corresponding to the selected Internet of things equipment is displayed in black, and the circular selection control corresponding to the unselected Internet of things equipment is displayed in white. The user can select the equipment information of one piece of internet of things equipment and also can select the equipment information of a plurality of pieces of internet of things equipment.
The first client responds to the selection of the user to generate a configuration request, and the configuration request can carry a device identifier of the internet of things device selected by the user.
For example, if the user selects to configure the internet of things device a and the internet of things device B, the first client generates a configuration request a and a configuration request B, where the configuration request a carries the device identifier of the internet of things device a and the configuration request B carries the device identifier of the internet of things device B.
Optionally, as shown in the display page 41 of fig. 4, the display page presented by the first client may further include a determination control for the user to confirm the selection operation.
204. The first client sends a configuration request to the Internet of things equipment.
For example, the configuration request generated by the first client may be specifically sent to the internet of things device selected by the user. For example, the configuration request a is sent to the internet of things device a, and the configuration request B is sent to the internet of things device B.
205. The Internet of things equipment sends the configuration request to a second cloud server corresponding to the Internet of things equipment.
For example, the configuration request may be specifically sent to a second cloud server corresponding to the internet of things device by the internet of things device.
206. And the second cloud server sends the configuration request to the second client.
For example, the configuration request may be specifically sent to the second client by the second cloud server.
207. And the second client displays the information display control based on the configuration request, responds to the triggering operation of the user aiming at the information display control, and generates and displays the authentication information.
For example, the second client may specifically receive the configuration request, generate an information display control based on the configuration request, and display the information display control in a display page of the second client, for example, the information display control shown in the display page 42 in fig. 4.
When the user performs a trigger operation on the information display control, for example, clicking or sliding, the second client generates authentication information (for example, a PIN code) in response to the trigger operation of the user, and displays the authentication information on the display page of the second client as shown in the display page 43 of fig. 4.
208. The first client acquires authentication information.
For example, after the user views the authentication information, the authentication information is input through the first client, and the first client obtains the authentication information input by the user.
Specifically, the first client may include an information input interface, which may be as shown in the display page 44 of fig. 4, and the information input interface may include an input area for authentication information input by the user and a confirmation control for confirmation operation performed after the authentication information is input by the user. After the user views the authentication information, the authentication information is input through a keyboard or an audio acquisition device (such as a microphone, a microphone or the like) in the input area, and the input completion is confirmed by performing a confirmation operation on the confirmation control.
And the first client responds to the confirmation operation of the user on the confirmation control to acquire the authentication information input by the user in the input area.
209. And the first client establishes an encryption channel with the Internet of things equipment through the authentication information.
For example, the first client may specifically send the authentication information to the internet of things device, and the internet of things device compares whether the authentication information sent by the first client is consistent with the authentication information sent by the second client, and if so, may return information that the authentication passes to the first client.
And the first client determines a communication path with the Internet of things equipment according to the returned information, and establishes a pass-through encryption channel.
210. The first client and the Internet of things equipment perform identity authentication through the encryption channel.
For example, the first client and the internet of things device may exchange a digital certificate through an encrypted channel, and the digital certificate may be a digital certificate issued by a third-party certification authority that is trusted by both the first client and the internet of things device.
The Internet of things equipment can authenticate the identity of the first client according to the received digital certificate, and if the digital certificate is issued by a third-party authentication machine with common trust, the Internet of things equipment passes the identity authentication of the first client.
The first client can authenticate the identity of the Internet of things equipment according to the received digital certificate. And if the digital certificate is issued by a third-party certification machine with common trust, the first client passes the identity authentication of the Internet of things equipment.
211. And if the authentication is passed, the first client sends the registration information to the Internet of things equipment.
For example, if the identity authentication of the first client to the internet of things device passes and the identity authentication of the internet of things device to the first client passes, the identity authentication of the internet of things device and the first client passes, and the first client sends the registration information to the internet of things device.
212. The first client finishes registering and binding the Internet of things equipment.
For example, the first client may specifically send the registration information to the internet of things device, configure the internet of things device, and complete registration and binding of the internet of things device.
Optionally, the internet of things device may further send a prompt message indicating that the binding is successful to the first client, such as "prompt: smart air conditioners have been successfully bound.
It should be noted that, if the binding of the internet of things device fails, the first client may output a prompt message related to the binding failure of the internet of things device, and may also display a specific reason of the binding failure, etc. to prompt the user.
213. And the first client sends a control instruction to the Internet of things equipment.
For example, the first client may specifically receive a control instruction input by a user, for example, in a display page of the first client, the user operates a control to trigger the first client to generate the control instruction; or the user inputs voice through an audio acquisition device (such as a microphone or a microphone), the first client generates a control instruction based on the voice input by the user, and sends the control instruction to the internet of things device.
For example, as shown in the display page 46 of fig. 4, the user may select an internet of things device to be controlled, such as a smart air conditioner, in the display page of the first client, and the first client displays an instruction input page corresponding to the selected internet of things device according to the selection operation of the user.
The instruction input page may be as shown in the display page 47 of fig. 4, and the user operates the control in the instruction input page to trigger the first client to generate the control instruction.
214. And the Internet of things equipment executes corresponding operation according to the received control command.
For example, the internet of things device may specifically execute a corresponding operation according to the received control instruction.
For example, as shown in fig. 4, the first client may generate a power-on instruction (i.e., a control instruction) in response to the user triggering the power-on control in the control interface of the air conditioner, and the first client may send the power-on instruction to the air conditioner, where the air conditioner may execute a power-on operation based on the power-on instruction.
As can be seen from the above, in the embodiment of the application, the device information returned by the internet of things device is received through broadcasting of the device searching message by the first client, the configuration request is sent to the second cloud server by the internet of things device, the configuration request is sent to the second client by the second cloud server, the authentication information is generated and displayed by the second client, the authentication information is obtained by the first client, the encryption channel is established with the internet of things device, the first client and the internet of things device perform identity authentication through the encryption channel, if the authentication is passed, the registration information is sent to the internet of things device by the first client, registration and binding are performed on the internet of things device, the first client sends the control instruction to the internet of things device, and the internet of things device executes corresponding operation according to the received control instruction. At this time, the internet of things equipment can be controlled through the first client. According to the scheme, the binding efficiency of the equipment of the Internet of things is improved, and the convenience of controlling the equipment of the Internet of things is improved.
In order to better implement the method for binding the internet of things equipment provided by the embodiment of the application, an embodiment of the invention further provides a device for binding the internet of things equipment. The meaning of the noun is the same as that in the internet of things device binding method, and specific implementation details can refer to the description in the method embodiment.
The internet of things device binding apparatus may be specifically integrated in a computer device, as shown in fig. 5, the internet of things device binding apparatus may include: the first obtaining module 301, the sending module 302, the second obtaining module 303, and the binding module 304 are specifically as follows:
the first obtaining module 301: the method and the device for the internet of things equipment comprise the steps that the first client side is used for obtaining equipment information of at least one internet of things equipment.
In an embodiment, the first obtaining module 301 may include a query submodule, specifically:
a query submodule: the device information processing method and system are used for inquiring the registered and bound Internet of things devices through the first client and obtaining the inquired device information of the Internet of things devices.
In an embodiment, the query submodule may be specifically configured to:
broadcasting a device searching message in a preset local area network;
receiving candidate Internet of things equipment in a preset local area network, and returning candidate equipment information based on the equipment searching message;
and screening out the equipment information of the IOT equipment from the candidate equipment information of the candidate IOT equipment.
The sending module 302: the device information sending method comprises the steps that a configuration request is sent to the Internet of things device through a first client side based on device information, the configuration request is used for indicating the Internet of things device to generate authentication information through a second client side, and the first client side and the second client side belong to different Internet of things systems.
In an embodiment, the sending module 302 may include a display sub-module and a generation sub-module, specifically:
a display submodule: and the information display control is displayed based on the sending configuration request through the second client.
Generating a submodule: and the authentication information is generated by the second client in response to the triggering operation aiming at the information display control.
The second obtaining module 303: the first client is used for obtaining the authentication information.
In an embodiment, the second obtaining module 303 may include a display sub-module and a receiving sub-module, specifically:
a display submodule: and the authentication information is displayed through the second client for the user to view.
A receiving submodule: the authentication information input by the user is received through an information input interface of the first client.
In an embodiment, the second obtaining module 303 may include a generating sub-module and an identifying sub-module, specifically:
generating a submodule: and the second client is used for generating a graphic code based on the authentication information.
An identification submodule: the authentication server is used for identifying the graphic code through the first client so as to extract the authentication information from the graphic code.
The binding module 304: the first client is used for registering and binding the Internet of things equipment based on the authentication information.
In an embodiment, the internet of things device binding apparatus may further include a control module 305, specifically:
the control module 305: the Internet of things equipment is controlled through the first client.
In an embodiment, the binding module 304 may include an establishing sub-module, an authenticating sub-module, and a binding sub-module, specifically:
establishing a submodule: and the first client or the second client is used for establishing an encryption channel based on the authentication information.
An authentication sub-module: and the identity authentication is carried out on the Internet of things equipment through the first client based on the encryption channel.
Binding the sub-modules: and if the identity authentication is passed, registering and binding the Internet of things equipment through the first client.
In an embodiment, the binding module 304 may include an obtaining submodule and a sending submodule, specifically:
obtaining a submodule: the first client is used for acquiring registration information of the Internet of things equipment if the identity authentication is passed;
a sending submodule: the first client is used for sending the registration information to the Internet of things equipment and registering and binding the Internet of things equipment based on the registration information.
In an embodiment, the sending submodule may be specifically configured to:
generating a target key based on a key algorithm and authentication information negotiated with the Internet of things equipment through a first client;
encrypting the registration information based on the target key through the first client to obtain encrypted registration information;
and sending the encrypted registration information to the Internet of things equipment through the first client, so that the Internet of things equipment decrypts the encrypted registration information to obtain the registration information.
In an embodiment, the binding submodule may be specifically configured to:
acquiring registration information of the Internet of things equipment through a cloud server associated with a first client, and sending the registration information to the Internet of things equipment and the first client;
and registering and binding the Internet of things equipment based on the registration information through the first client.
As can be seen from the above, in the embodiment of the application, the first obtaining module 301 may obtain, through the first client, the device information of at least one piece of internet-of-things device; sending a configuration request to the internet of things equipment through a first client based on the equipment information through a sending module 302, wherein the configuration request is used for indicating the internet of things equipment to generate authentication information through a second client, and the first client and the second client belong to different internet of things systems; then, the authentication information is acquired by the first client through the second acquisition module 303; the internet of things device is registered and bound by the binding module 304 through the first client based on the authentication information. The scheme improves the binding efficiency of the equipment of the Internet of things.
An embodiment of the present application further provides a computer device, where the computer device may be a terminal, as shown in fig. 6, which shows a schematic structural diagram of a terminal according to an embodiment of the present application, and specifically:
the terminal may include components such as a processor 1001 of one or more processing cores, memory 1002 of one or more computer-readable storage media (which may also be referred to as storage media), a power source 1003, and an input unit 1004. Those skilled in the art will appreciate that the terminal structure shown in fig. 6 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components. Wherein:
the processor 1001 is a control center of the terminal, connects various parts of the entire terminal using various interfaces and lines, and performs various functions of the terminal and processes data by running or executing software programs and/or modules stored in the memory 1002 and calling data stored in the memory 1002, thereby performing overall monitoring of the terminal. Optionally, processor 1001 may include one or more processing cores; preferably, the processor 1001 may integrate an application processor, which mainly handles operating systems, user interfaces, computer programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 1001.
The memory 1002 may be used to store software programs and modules, and the processor 1001 executes various functional applications and data processing by operating the software programs and modules stored in the memory 1002. The memory 1002 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, a computer program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data created according to the use of the terminal, and the like. Further, the memory 1002 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory 1002 may also include a memory controller to provide the processor 1001 access to the memory 1002.
The terminal further includes a power source 1003 for supplying power to the various components, and preferably, the power source 1003 is logically connected to the processor 1001 through a power management system, so that functions of managing charging, discharging, power consumption, and the like are implemented through the power management system. The power source 1003 may also include any component including one or more of a dc or ac power source, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
The terminal may further include an input unit 1004, and the input unit 1004 may be used to receive input numeric or character information and generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control.
Although not shown, the terminal may further include a display unit and the like, which will not be described in detail herein. Specifically, in this embodiment, the processor 1001 in the terminal loads the executable file corresponding to the process of one or more computer programs into the memory 1002 according to the following instructions, and the processor 1001 runs the computer programs stored in the memory 1002, so as to implement various functions as follows:
acquiring equipment information of at least one piece of Internet of things equipment through a first client;
sending a configuration request to the Internet of things equipment through a first client based on the equipment information, wherein the configuration request is used for indicating the Internet of things equipment to generate authentication information through a second client, and the first client and the second client belong to different Internet of things systems;
acquiring authentication information through a first client;
and registering and binding the Internet of things equipment based on the authentication information through the first client.
The above operations can be implemented in the foregoing embodiments, and are not described in detail herein.
As can be seen from the above, the terminal of the embodiment of the application can obtain the device information of at least one piece of internet-of-things device through the first client; sending a configuration request to the Internet of things equipment through a first client based on the equipment information, wherein the configuration request is used for indicating the Internet of things equipment to generate authentication information through a second client, and the first client and the second client belong to different Internet of things systems; acquiring authentication information through a first client; and registering and binding the Internet of things equipment based on the authentication information through the first client. The scheme improves the binding efficiency of the equipment of the Internet of things.
According to an aspect of the application, a computer program product or computer program is provided, comprising computer instructions, the computer instructions being stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions to cause the computer device to perform the method provided in the various alternative implementations of the above embodiments.
It will be understood by those skilled in the art that all or part of the steps of the methods of the above embodiments may be implemented by a computer program, which is stored in a computer-readable storage medium (i.e., a storage medium), loaded and executed by a processor, or by controlling associated hardware.
To this end, an embodiment of the present application provides a storage medium, in which a computer program is stored, where the computer program can be loaded by a processor to execute any one of the methods for binding devices in the internet of things provided in the embodiment of the present application.
The above operations can be implemented in the foregoing embodiments, and are not described in detail herein.
Wherein the storage medium may include: read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, and the like.
As the computer program stored in the storage medium can execute any of the internet of things device binding methods provided in the embodiments of the present application, beneficial effects that can be achieved by any of the internet of things device binding methods provided in the embodiments of the present application can be achieved, which are detailed in the foregoing embodiments and will not be described herein again.
The method, the device, the computer device and the storage medium for binding the internet of things device provided by the embodiment of the application are introduced in detail, a specific example is applied in the description to explain the principle and the implementation mode of the application, and the description of the embodiment is only used for helping to understand the method and the core idea of the application; meanwhile, for those skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (14)

1. An Internet of things device binding method is characterized by comprising the following steps:
acquiring equipment information of at least one piece of Internet of things equipment through a first client;
sending, by the first client, a configuration request to the internet of things device based on the device information, where the configuration request is used to instruct the internet of things device to generate authentication information through a second client, and the first client and the second client belong to different internet of things systems;
acquiring the authentication information through the first client;
and registering and binding the Internet of things equipment based on the authentication information through the first client.
2. The internet of things device binding method according to claim 1, wherein after the registration binding of the internet of things device is performed by the first client based on the authentication information, the method further comprises:
and controlling the Internet of things equipment through the first client.
3. The internet of things equipment binding method according to claim 1, wherein the obtaining, by the first client, equipment information of at least one internet of things equipment comprises:
and inquiring the registrable and bindable Internet of things equipment through the first client to acquire the inquired equipment information of the Internet of things equipment.
4. The internet of things equipment binding method according to claim 3, wherein inquiring registerable and bindable internet of things equipment and acquiring inquired equipment information of the internet of things equipment comprises:
broadcasting a device searching message in a preset local area network;
receiving candidate Internet of things equipment in the preset local area network, and returning candidate equipment information based on the equipment searching message;
and screening out the equipment information of the IOT equipment from the candidate equipment information of the candidate IOT equipment.
5. The internet-of-things device binding method according to claim 1, wherein after sending, by the first client, a configuration request to the internet-of-things device based on the device information, the method further comprises:
displaying, by the second client, an information presentation control based on the send configuration request;
and responding to the triggering operation aiming at the information display control through the second client to generate the authentication information.
6. The internet of things equipment binding method according to claim 1, wherein the registering and binding, by the first client, the internet of things equipment based on the authentication information includes:
establishing, by the first client or the second client, an encryption channel based on the authentication information;
performing identity authentication with the Internet of things equipment based on the encryption channel through the first client;
and if the identity authentication is passed, registering and binding the Internet of things equipment through the first client.
7. The internet of things equipment binding method of claim 6, wherein if the identity authentication is passed, registering and binding the internet of things equipment through the first client comprises:
if the identity authentication is passed, acquiring registration information of the Internet of things equipment through the first client;
sending the registration information to the Internet of things equipment through the first client, and registering and binding the Internet of things equipment based on the registration information.
8. The internet of things device binding method of claim 7, wherein sending, by the first client, the registration information to the internet of things device comprises:
generating, by the first client, a target key based on a key algorithm negotiated with the internet of things device and the authentication information;
encrypting, by the first client, the registration information based on the target key to obtain encrypted registration information;
and sending the encrypted registration information to the Internet of things equipment through the first client, so that the Internet of things equipment decrypts the encrypted registration information to obtain the registration information.
9. The internet of things equipment binding method of claim 6, wherein if the identity authentication is passed, registering and binding the internet of things equipment through the first client comprises:
acquiring registration information of the Internet of things equipment through a cloud server associated with the first client, and sending the registration information to the Internet of things equipment and the first client;
and registering and binding the Internet of things equipment based on the registration information through the first client.
10. The internet of things device binding method according to any one of claims 1 to 9, wherein the first client includes an information input interface, and the obtaining the authentication information by the first client includes:
displaying the authentication information through the second client for a user to view;
and receiving the authentication information input by the user through an information input interface of the first client.
11. The internet of things device binding method according to any one of claims 1 to 9, wherein the obtaining the authentication information by the first client includes:
generating, by the second client, a graphic code based on the authentication information;
identifying, by the first client, the graphical code to extract the authentication information from the graphical code.
12. An internet of things equipment binding device, comprising:
the first acquisition module is used for acquiring the equipment information of at least one piece of Internet of things equipment through a first client;
a sending module, configured to send, by the first client, a configuration request to the internet of things device based on the device information, where the configuration request is used to instruct the internet of things device to generate authentication information by a second client, and the first client and the second client belong to different internet of things systems;
the second acquisition module is used for acquiring the authentication information through the first client;
and the binding module is used for registering and binding the Internet of things equipment based on the authentication information through the first client.
13. A computer device comprising a processor and a memory, the memory having a computer program stored therein, the processor executing the internet of things device binding method of any one of claims 1 to 11 when calling the computer program in the memory.
14. A storage medium for storing a computer program which is loaded by a processor to perform the internet of things device binding method of any one of claims 1 to 11.
CN202110724287.2A 2021-06-29 2021-06-29 Internet of things equipment binding method and device, computer equipment and storage medium Active CN113490207B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110724287.2A CN113490207B (en) 2021-06-29 2021-06-29 Internet of things equipment binding method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110724287.2A CN113490207B (en) 2021-06-29 2021-06-29 Internet of things equipment binding method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113490207A true CN113490207A (en) 2021-10-08
CN113490207B CN113490207B (en) 2024-02-06

Family

ID=77936471

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110724287.2A Active CN113490207B (en) 2021-06-29 2021-06-29 Internet of things equipment binding method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113490207B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113596090A (en) * 2021-06-25 2021-11-02 青岛海尔科技有限公司 Binding method and device of terminal equipment, computer equipment and storage medium
WO2023056713A1 (en) * 2021-10-09 2023-04-13 天翼物联科技有限公司 Cloud platform binding method and system for internet of things card, and device and medium
WO2023198196A1 (en) * 2022-04-15 2023-10-19 华为技术有限公司 Device control method and electronic device
WO2024031681A1 (en) * 2022-08-12 2024-02-15 Oppo广东移动通信有限公司 Device binding method and apparatus, and device, storage medium and program product

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090037998A1 (en) * 2007-08-03 2009-02-05 Saibal Adhya Systems and Methods for Authorizing a Client in an SSL VPN Session Failover Environment
US20130067550A1 (en) * 2011-09-09 2013-03-14 Kingston Digital Inc. Private cloud server and client architecture without utilizing a routing server
US20140289508A1 (en) * 2013-03-21 2014-09-25 Tencent Technology (Shenzhen) Company Limited Method, client and system of identity authentication
CN104202365A (en) * 2014-08-15 2014-12-10 深圳市蜂联科技有限公司 Clustered intelligent gateway platform and method thereby for deploying expanded business application
CN108055339A (en) * 2017-12-22 2018-05-18 海尔优家智能科技(北京)有限公司 Method, apparatus, storage medium and the cloud platform server of home appliance interconnection
CN109412906A (en) * 2018-10-09 2019-03-01 南京物联传感技术有限公司 Across APP program intelligent control interactive system and working method
CN109565442A (en) * 2017-01-19 2019-04-02 株式会社世尊信息系统 IoT data gathering system, IoT method of data capture, managing device, management program, agent apparatus and broker program
CN109672683A (en) * 2018-12-25 2019-04-23 深圳市安信认证系统有限公司 Binding method, binding device and the terminal device of internet of things equipment
CN109787769A (en) * 2018-12-25 2019-05-21 深圳市安信认证系统有限公司 Offline authentication method, user terminal and the device end of internet of things equipment
CN111526112A (en) * 2019-02-02 2020-08-11 京东方科技集团股份有限公司 Cross-domain device registration method and device and computer readable storage medium
CN111835755A (en) * 2020-07-09 2020-10-27 中国联合网络通信集团有限公司 Mutual authentication method and equipment for Internet of things equipment and Internet of things service system
CN112039739A (en) * 2020-08-31 2020-12-04 海信(山东)空调有限公司 Method for controlling binding of household appliance distribution network and household appliance
US20210021589A1 (en) * 2019-07-16 2021-01-21 Mastercard International Incorporated Systems and methods for use in binding internet of things devices with identities associated with users

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090037998A1 (en) * 2007-08-03 2009-02-05 Saibal Adhya Systems and Methods for Authorizing a Client in an SSL VPN Session Failover Environment
US20130067550A1 (en) * 2011-09-09 2013-03-14 Kingston Digital Inc. Private cloud server and client architecture without utilizing a routing server
US20140289508A1 (en) * 2013-03-21 2014-09-25 Tencent Technology (Shenzhen) Company Limited Method, client and system of identity authentication
CN104202365A (en) * 2014-08-15 2014-12-10 深圳市蜂联科技有限公司 Clustered intelligent gateway platform and method thereby for deploying expanded business application
CN109565442A (en) * 2017-01-19 2019-04-02 株式会社世尊信息系统 IoT data gathering system, IoT method of data capture, managing device, management program, agent apparatus and broker program
CN108055339A (en) * 2017-12-22 2018-05-18 海尔优家智能科技(北京)有限公司 Method, apparatus, storage medium and the cloud platform server of home appliance interconnection
CN109412906A (en) * 2018-10-09 2019-03-01 南京物联传感技术有限公司 Across APP program intelligent control interactive system and working method
CN109672683A (en) * 2018-12-25 2019-04-23 深圳市安信认证系统有限公司 Binding method, binding device and the terminal device of internet of things equipment
CN109787769A (en) * 2018-12-25 2019-05-21 深圳市安信认证系统有限公司 Offline authentication method, user terminal and the device end of internet of things equipment
CN111526112A (en) * 2019-02-02 2020-08-11 京东方科技集团股份有限公司 Cross-domain device registration method and device and computer readable storage medium
US20210021589A1 (en) * 2019-07-16 2021-01-21 Mastercard International Incorporated Systems and methods for use in binding internet of things devices with identities associated with users
CN111835755A (en) * 2020-07-09 2020-10-27 中国联合网络通信集团有限公司 Mutual authentication method and equipment for Internet of things equipment and Internet of things service system
CN112039739A (en) * 2020-08-31 2020-12-04 海信(山东)空调有限公司 Method for controlling binding of household appliance distribution network and household appliance

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113596090A (en) * 2021-06-25 2021-11-02 青岛海尔科技有限公司 Binding method and device of terminal equipment, computer equipment and storage medium
CN113596090B (en) * 2021-06-25 2023-10-24 青岛海尔科技有限公司 Binding method and device of terminal equipment, computer equipment and storage medium
WO2023056713A1 (en) * 2021-10-09 2023-04-13 天翼物联科技有限公司 Cloud platform binding method and system for internet of things card, and device and medium
WO2023198196A1 (en) * 2022-04-15 2023-10-19 华为技术有限公司 Device control method and electronic device
WO2024031681A1 (en) * 2022-08-12 2024-02-15 Oppo广东移动通信有限公司 Device binding method and apparatus, and device, storage medium and program product

Also Published As

Publication number Publication date
CN113490207B (en) 2024-02-06

Similar Documents

Publication Publication Date Title
CN113490207B (en) Internet of things equipment binding method and device, computer equipment and storage medium
CN113132973B (en) Equipment network distribution method and system and computer readable storage medium
CN113055867A (en) Method and device for auxiliary network distribution of terminal and electronic equipment
CN104427501B (en) Method for network access, device and system
EP3065334A1 (en) Key configuration method, system and apparatus
EP3537652B1 (en) Method for securely controlling smart home appliance and terminal device
CN107708099B (en) Bluetooth device sharing request and control method and device, and readable storage medium
CN109995876B (en) File transmission method, device, system and computer storage medium
CN105188013A (en) Network hotspot sharing method, device and system
CN110099427A (en) A kind of method and system to distribution net equipment access network hotspot equipment
US20230344626A1 (en) Network connection management method and apparatus, readable medium, program product, and electronic device
CN113630727B (en) Intelligent household network distribution method, device and system, electronic equipment and storage medium
CN107182053B (en) It is a kind of for connecting the method and apparatus of hiding wireless access point
CN109890029B (en) Automatic network distribution method of intelligent wireless equipment
EP4261665A1 (en) Application program login method and system
CN111865731B (en) Intelligent equipment adding method and device, intelligent household control panel and storage medium
CN113301563A (en) Network configuration method, device, equipment and storage medium
CN108282551B (en) Message identification processing method and device, monitoring equipment and readable storage medium
CN115686542A (en) Application installation method, device, equipment and storage medium
CN106537962B (en) Wireless network configuration, access and access method, device and equipment
CN110290109A (en) The acquisition methods and device of data processing method and device, processing authority
CN114338132B (en) Secret-free login method, client application, operator server and electronic equipment
WO2017128919A1 (en) Mobile terminal and service end connection method and apparatus
CN113645054A (en) Wireless network equipment configuration method and system
CN117061115B (en) Key negotiation method, key negotiation apparatus, computer device, and computer-readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant