CN113490207B - Internet of things equipment binding method and device, computer equipment and storage medium - Google Patents

Internet of things equipment binding method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN113490207B
CN113490207B CN202110724287.2A CN202110724287A CN113490207B CN 113490207 B CN113490207 B CN 113490207B CN 202110724287 A CN202110724287 A CN 202110724287A CN 113490207 B CN113490207 B CN 113490207B
Authority
CN
China
Prior art keywords
internet
client
things
information
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110724287.2A
Other languages
Chinese (zh)
Other versions
CN113490207A (en
Inventor
李辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen TCL New Technology Co Ltd
Original Assignee
Shenzhen TCL New Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen TCL New Technology Co Ltd filed Critical Shenzhen TCL New Technology Co Ltd
Priority to CN202110724287.2A priority Critical patent/CN113490207B/en
Publication of CN113490207A publication Critical patent/CN113490207A/en
Application granted granted Critical
Publication of CN113490207B publication Critical patent/CN113490207B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y30/00IoT infrastructure
    • G16Y30/10Security thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/48Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration

Abstract

The embodiment of the application provides a binding method, a binding device, computer equipment and a storage medium for Internet of things equipment, which relate to the technical field of Internet of things and can acquire equipment information of at least one Internet of things equipment through a first client; sending a configuration request to the Internet of things equipment based on equipment information through the first client, wherein the configuration request is used for indicating the Internet of things equipment to generate authentication information through the second client, and the first client and the second client belong to different Internet of things systems; acquiring authentication information through a first client; and registering and binding the Internet of things equipment based on the authentication information through the first client. The scheme improves the binding efficiency of the equipment of the Internet of things.

Description

Internet of things equipment binding method and device, computer equipment and storage medium
Technical Field
The application relates to the technical field of communication, in particular to an internet of things device binding method, an internet of things device binding device, computer equipment and a storage medium.
Background
The internet of things technology, namely the internet of things is widely applied to the fusion of networks through communication sensing technologies such as intelligent sensing and recognition technologies and pervasive computing, becomes the third wave of development of the world information industry after a computer and the Internet, and is widely applied to various fields at present.
In the prior art, because manufacturers of different internet of things devices are different, corresponding application programs are also different, users need to bind different internet of things devices by using a plurality of application programs respectively, so that the different internet of things devices can be controlled, the binding efficiency of the internet of things devices is lower, and the internet of things devices are inconvenient to control.
Disclosure of Invention
The embodiment of the application provides a binding method and device for Internet of things equipment, computer equipment and a storage medium, and can improve the binding efficiency for the Internet of things equipment.
The method for binding the Internet of things equipment provided by the embodiment of the application comprises the following steps:
acquiring equipment information of at least one piece of equipment of the Internet of things through a first client;
sending, by the first client, a configuration request to the internet of things device based on the device information, where the configuration request is used to instruct the internet of things device to generate authentication information through a second client, and the first client and the second client belong to different internet of things systems;
acquiring the authentication information through the first client;
and through the first client, registering and binding the Internet of things equipment based on the authentication information.
In an embodiment, after the registration binding is performed on the internet of things device by the first client based on the authentication information, the method further includes:
and controlling the Internet of things equipment through the first client.
In an embodiment, the obtaining, by the first client, device information of at least one internet of things device includes:
and inquiring the registered and bound Internet of things equipment through the first client, and acquiring the inquired equipment information of the Internet of things equipment.
In an embodiment, querying the internet of things device capable of registering and binding, and obtaining the queried device information of the internet of things device includes:
broadcasting a device searching message in a preset local area network;
receiving candidate internet of things equipment in the preset local area network, and returning candidate equipment information based on the equipment searching message;
and screening the equipment information of the equipment of the Internet of things from the candidate equipment information of the equipment of the Internet of things.
In an embodiment, after the sending, by the first client, the configuration request to the internet of things device based on the device information, the method further includes:
Displaying, by the second client, an information presentation control based on the sending configuration request;
and responding to the triggering operation of the information display control through the second client, and generating the authentication information.
In an embodiment, the performing, by the first client, registration binding on the internet of things device based on the authentication information includes:
establishing an encryption channel based on the authentication information through the first client or the second client;
identity authentication is carried out on the basis of the encryption channel and the Internet of things equipment through the first client;
and if the identity authentication is passed, registering and binding the Internet of things equipment through the first client.
In an embodiment, if the identity authentication passes, performing registration binding on the internet of things device through the first client includes:
if the identity authentication is passed, acquiring registration information of the Internet of things equipment through the first client;
and sending the registration information to the Internet of things equipment through the first client, and registering and binding the Internet of things equipment based on the registration information.
In an embodiment, the sending, by the first client, the registration information to the internet of things device includes:
generating, by the first client, a target key based on a key algorithm negotiated with the internet of things device and the authentication information;
encrypting the registration information based on the target key by the first client to obtain encrypted registration information;
and sending the encrypted registration information to the internet of things equipment through the first client, so that the internet of things equipment decrypts the encrypted registration information to obtain the registration information.
In an embodiment, if the identity authentication passes, performing registration binding on the internet of things device through the first client includes:
acquiring registration information of the Internet of things equipment through a cloud server associated with the first client, and sending the registration information to the Internet of things equipment and the first client;
and through the first client, registering and binding the Internet of things equipment based on the registration information.
In an embodiment, the first client includes an information input interface, and the obtaining, by the first client, the authentication information includes:
Displaying the authentication information through the second client for viewing by a user;
and receiving the authentication information input by the user through an information input interface of the first client.
In an embodiment, the obtaining, by the first client, the authentication information includes:
generating, by the second client, a graphics code based on the authentication information;
identifying, by the first client, the graphical code to extract the authentication information from the graphical code.
Correspondingly, the embodiment of the application also provides an internet of things equipment binding device, which comprises:
the first acquisition module is used for acquiring equipment information of at least one piece of equipment of the Internet of things through the first client;
the sending module is used for sending a configuration request to the internet of things equipment based on the equipment information through the first client, wherein the configuration request is used for indicating the internet of things equipment to generate authentication information through a second client, and the first client and the second client belong to different internet of things systems;
the second acquisition module is used for acquiring the authentication information through the first client;
and the binding module is used for registering and binding the internet of things equipment based on the authentication information through the first client.
In an embodiment, the first acquisition module includes a query sub-module, specifically:
and a query sub-module: and the device information of the inquired internet of things device is acquired by inquiring the registered and bound internet of things device through the first client.
In one embodiment, the query submodule is specifically configured to:
broadcasting a device searching message in a preset local area network;
receiving candidate equipment information returned by candidate internet of things equipment in a preset local area network based on equipment searching information;
and screening out the equipment information of the equipment of the Internet of things from the candidate equipment information of the candidate equipment of the Internet of things.
In an embodiment, the sending module includes a display sub-module and a generating sub-module, specifically:
and a display sub-module: and the information display control is used for displaying the information display control based on the sending configuration request through the second client.
Generating a submodule: and the authentication information is generated by the second client in response to the triggering operation for the information display control.
In an embodiment, the second acquisition module includes a display sub-module and a receiving sub-module, specifically:
and a display sub-module: and the authentication information is used for displaying the authentication information through the second client for the user to view.
The receiving submodule: and the authentication information input by the user is received through an information input interface of the first client.
In an embodiment, the second acquisition module comprises a generation sub-module and an identification sub-module, in particular:
generating a submodule: and the second client is used for generating a graphic code based on the authentication information.
And (3) an identification sub-module: for identifying the graphic code by the first client to extract the authentication information from the graphic code.
In an embodiment, the device for binding an internet of things device further includes a control module, specifically:
and the control module is used for: the control method is used for controlling the Internet of things equipment through the first client.
In an embodiment, the binding module comprises a setup sub-module, an authentication sub-module and a binding sub-module, in particular:
and (3) establishing a sub-module: the encryption channel is used for establishing an encryption channel based on authentication information through the first client or the second client.
And an authentication sub-module: the method is used for carrying out identity authentication with the Internet of things equipment based on the encryption channel through the first client.
Binding the submodule: and if the identity authentication is passed, registering and binding the Internet of things equipment through the first client.
In an embodiment, the binding module includes an acquisition sub-module, a sending sub-module, specifically:
and (3) an acquisition sub-module: if the identity authentication is passed, acquiring registration information of the Internet of things equipment through the first client;
And a transmitting sub-module: the method comprises the steps of sending registration information to the Internet of things device through a first client, and registering and binding the Internet of things device based on the registration information.
In an embodiment, the sending submodule is specifically configured to:
generating, by the first client, a target key based on a key algorithm negotiated with the internet of things device and authentication information;
encrypting the registration information based on the target key through the first client to obtain encrypted registration information;
and sending the encrypted registration information to the Internet of things equipment through the first client, so that the Internet of things equipment decrypts the encrypted registration information to obtain the registration information.
In one embodiment, the binding submodule is specifically configured to:
acquiring registration information of the Internet of things equipment through a cloud server associated with the first client, and sending the registration information to the Internet of things equipment and the first client;
and carrying out registration binding on the Internet of things equipment based on the registration information through the first client.
Correspondingly, the embodiment of the application also provides computer equipment, which comprises a memory and a processor; the memory stores a computer program, and the processor is configured to run the computer program in the memory, so as to execute any one of the binding methods of the internet of things device provided in the embodiments of the present application.
Accordingly, the embodiment of the application also provides a storage medium, which is used for storing a computer program, and the computer program is loaded by a processor to execute any of the binding methods of the internet of things device provided by the embodiment of the application.
According to the method and the device, the device information of at least one Internet of things device can be obtained through the first client; sending a configuration request to the Internet of things equipment based on equipment information through the first client, wherein the configuration request is used for indicating the Internet of things equipment to generate authentication information through the second client, and the first client and the second client belong to different Internet of things systems; then, acquiring authentication information through a first client; and registering and binding the Internet of things equipment based on the authentication information through the first client. The scheme improves the binding efficiency of the equipment of the Internet of things.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly introduced below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a scene diagram of an internet of things device binding method provided in an embodiment of the present application;
fig. 2 is a flowchart of an internet of things device binding method provided in an embodiment of the present application;
fig. 3 is another flowchart of an internet of things device binding method provided in an embodiment of the present application;
fig. 4 is a schematic view of a display page of a first client and a second client provided in an embodiment of the present application;
fig. 5 is a schematic diagram of an internet of things device binding apparatus provided in an embodiment of the present application;
fig. 6 is a schematic structural diagram of a terminal provided in an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments herein without making any inventive effort, are intended to be within the scope of the present application.
The embodiment of the application provides an Internet of things device binding method, an Internet of things device binding device, computer equipment and a storage medium.
For example, referring to fig. 1, fig. 1 is a schematic view of a scenario in which an internet of things device binding method provided in an embodiment of the present application is applied, where the internet of things device binding method may be applied to an internet of things device binding apparatus, and the internet of things device binding apparatus may be integrated in a computer device, where the computer device may be a device such as a terminal.
The terminal may include a mobile phone, a wearable intelligent device, a tablet computer, a notebook computer, a personal computer (PC, personal Computer), a car-mounted computer, and the like.
The first client and the second client can be respectively arranged at different terminals, or the first client and the second client can be arranged on the same terminal, and the first client and the second client can be different clients, for example, the first client can be a client for establishing communication connection with a cloud server of an Internet of things system A (also called as an ecological A) and carrying out data interaction; the second client may establish a communication connection with a cloud server of the internet of things system B (may also be referred to as an ecological B) and perform data interaction.
The internet of things device may be a physical device that can be connected to the internet of things (The Internet of Things, IOT for short), such as a refrigerator, an air conditioner, a television, a sweeping robot, and a smart speaker.
The internet of things device and the second client can belong to the same internet of things system, a cloud server (which can be called as a second cloud server) of the internet of things system can be a private cloud server corresponding to the second client, and the internet of things device can be controlled to execute corresponding operations in response to a control instruction sent by the second client.
The client may include a browser application program (may also be referred to as a Web application), an application program (may also be referred to as an APP) on the terminal, an applet, and the like.
The internet of things can be used for collecting various needed information such as sound, light, heat, electricity, mechanics, chemistry, biology or positions of any object or process needing to be monitored, connected or interacted in real time through various devices and technologies such as various information sensors, radio frequency identification technologies, global positioning systems, infrared sensors or laser scanners, and realizing ubiquitous connection of objects and people through various possible network access, and realizing intelligent sensing, identification and management of objects and processes. The internet of things is an information carrier based on the internet, a traditional telecommunication network and the like, and enables all common physical objects which can be independently addressed to form an interconnection network.
The cloud server may be, but is not limited to, a cloud server that provides cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communications, middleware services, domain name services, security services, content delivery services (Content Delivery Network, CDN), and basic cloud computing services such as big data and artificial intelligence platforms.
For example, the terminal may obtain device information (such as a device identifier and a type) of at least one internet of things device through the first client, and send a configuration request to the internet of things device based on the device information, where the internet of things device may generate authentication information (such as a PIN code) through the second client after receiving the configuration request, where the first client and the second client belong to different internet of things systems. Then, the second client can send authentication information to the first client, and the terminal can register and bind the Internet of things equipment based on the authentication information through the first client, so that convenient binding between the Internet of things equipment and the clients of different manufacturers is realized, the binding efficiency of the Internet of things equipment is improved, and the convenience of expanding the Internet of things equipment is improved.
The specific implementation of each of the above operations may be referred to the following embodiments, and will not be described herein.
It should be noted that, the schematic view of the scenario of the application of the binding method of the internet of things device shown in fig. 1 is only an example, and the application and the scenario of the binding method of the internet of things device described in the embodiments of the present application are for more clearly describing the technical solution of the embodiments of the present application, and do not constitute a limitation on the technical solution provided in the embodiments of the present application, and as a person of ordinary skill in the art can know, along with the evolution of the application of the binding method of the internet of things device and the appearance of a new service scenario, the technical solution provided in the embodiments of the present application is applicable to similar technical problems.
The following will describe in detail. The following description of the embodiments is not intended to limit the preferred embodiments.
The embodiment will be described in terms of an apparatus for binding an internet of things device, which may be integrated in a computer device, and the computer device may be a device such as a terminal. As shown in fig. 2, the flow of the internet of things device binding method is as follows:
101. and acquiring equipment information of at least one piece of equipment of the Internet of things through the first client.
The device information may include a device identifier of the internet of things device and a device type of the internet of things device.
The device identifier may be formed by any one or more combinations of numbers, letters, symbols, etc., and may be a single character or be represented in the form of a character string, for example, the device identifier may be air1 or TV1, etc. The device type may include a type of air conditioner or television, etc., and the device type may be a type identification representation in the form of characters, for example, type identification 1: indicating that the equipment type is air conditioner, type identifier 2: indicating that the device type is television, etc., the device type of the internet of things device may be determined based on the type identification.
Specifically, the terminal may obtain the device information of the internet of things device through the first client, for example, the device information of the internet of things device may be obtained in a preset device information list local to the terminal, where the preset device list may be preset by a user or a developer.
For another example, the terminal may send an information acquisition request to a corresponding cloud server (may be referred to as a first cloud server) of the first client to acquire device information of the internet of things device from the first cloud server based on the information acquisition request. The first cloud server may be a private cloud server corresponding to the first client, that is, the client and the first cloud server may belong to the same internet of things system.
For another example, if the internet of things device is in the network configuration state, the terminal searches for the internet of things device according to a network configuration mode corresponding to the network configuration state of the internet of things device, and receives device information sent by the internet of things device.
The network configuration state may be a state that the internet of things device waits for association with the client.
The network allocation modes of the configuration of the client and the internet of things device can be a broadcast packet mode, a multicast address mode, a device hot spot network allocation, a Bluetooth network allocation, a mobile phone hot spot network allocation, a router network allocation and the like, and the communication modes of the internet of things device and the associated client are determined by different network allocation modes, for example, the client and the internet of things device are configured in the router network allocation mode, and communication between the client and the internet of things device can be realized through a local area network.
In an embodiment, the step of acquiring, by the first client, the device information of the at least one internet of things device may include:
and inquiring the registered and bound Internet of things equipment through the first client, and acquiring equipment information of the inquired Internet of things equipment.
For example, the terminal may query, through the first client, the internet of things device capable of registering and binding, for example, the terminal may obtain the internet of things device capable of registering and binding from a preset list of the registered and binding devices in a database of the first cloud server.
And then, acquiring the equipment information corresponding to the Internet of things equipment selected by the user from a local database or a database of the first cloud server.
Or the terminal searches the internet of things equipment in the network distribution state, the internet of things equipment in the network distribution state is the registered and bound internet of things equipment, and the terminal receives the equipment information sent by the internet of things equipment.
In an embodiment, the terminal may query the registrable binding internet of things device in the local area network where the terminal is located, that is, the step of "querying the registrable binding internet of things device to obtain the queried device information of the internet of things device" may specifically include:
Broadcasting a device searching message in a preset local area network;
receiving candidate equipment information returned by candidate internet of things equipment in a preset local area network based on equipment searching information;
and screening out the equipment information of the equipment of the Internet of things from the candidate equipment information of the candidate equipment of the Internet of things.
The device information searching can be a message sent by the terminal to the device in the preset local area network through the first client, and the device information searching can be in the form of a broadcast message or a request and the like.
The preset local area network may be a local area network where the terminal is located, the local area network is a private network, and the local area network may also be a wireless local area network.
The candidate internet of things device may be an internet of things device that is searched in a preset local area network by the terminal through the first client.
The candidate device information may be device information of the candidate internet of things device.
For example, the terminal may send the search device message to all devices in the preset local area network through the first client, and the device that receives the search device message may be used as a candidate internet of things device, where after receiving the search device message, the candidate internet of things device may return its own device information, that is, candidate device information, to the terminal.
The terminal displays candidate device information of the candidate device in the page in the first client according to the received candidate device information for selection by a user, and at this time, the terminal can respond to the selection operation of the user on the candidate device information (for example, the user can click on one or more candidate device information to generate the selection operation), and can screen the selected candidate device information from the candidate device information based on the selection operation, and the selected candidate device information is used as the device information of the registrable binding internet of things device.
102. And sending a configuration request to the Internet of things equipment based on the equipment information through the first client, wherein the configuration request is used for indicating the Internet of things equipment to generate authentication information through the second client, and the first client and the second client belong to different Internet of things systems.
The configuration request may be a request that the terminal sends the configuration request to the internet of things device through the first client, and the internet of things device sends the configuration request to the second client to instruct the second client to generate authentication information based on the configuration request. The configuration request may carry device information, and may also carry other information, which is not limited herein.
The first client and the second client may be located on the same terminal, or on different terminals, respectively, and the first client and the second client may belong to different internet of things systems, for example, the first client may be a third party client with respect to the second client, and the second client may be a client belonging to the same vendor as the internet of things device.
The authentication information may be information that the internet of things device and the first client mutually perform identity authentication. The authentication information may be any character, such as a number, a letter, or a character string obtained by randomly combining other symbols, or the like.
For example, the authentication information may be a device identification code (Personal identification number, PIN), which may also be referred to as a device identification number, which is a serial number of passcodes used for authentication and authorization.
For example, the terminal may specifically generate a configuration request according to the device information through the first client, and send the configuration request to the internet of things device through the preset local area network.
And after the Internet of things equipment receives the configuration request, the configuration request is sent to a second cloud server of the Internet of things system corresponding to the Internet of things equipment. The second cloud server sends the configuration request to a second client, and the second client generates authentication information according to the configuration request.
In order to improve security, the second client may display the configuration request, respond to the triggering operation of the user on the configuration request, and generate the authentication information to avoid the danger caused by maliciously binding the internet of things device by using the machine, that is, in an embodiment, after the step of sending, by the first client, the configuration request to the internet of things device based on the device information, the method specifically may include:
Displaying, by the second client, the information presentation control based on the sending configuration request;
and responding to the triggering operation aiming at the information display control through the second client, and generating authentication information.
The information presentation control may be a control that is operated by a user to trigger the second client to generate authentication information, for example, the information presentation control may be a control that is displayed in the form of an icon, a button, or a hyperlink.
For example, the second client may specifically receive the configuration request, generate an information display control based on the configuration request, and display the information display control in a display page of the second client.
When the user performs a triggering operation on the information display control, for example, clicking or sliding, the second client responds to the triggering operation of the user and generates authentication information.
103. And acquiring authentication information through the first client.
In an embodiment, the authentication information input by the user at the first client may be obtained, that is, the first client may include an information input interface, and the step of "obtaining, by the first client, the authentication information" may specifically include:
displaying the authentication information through the second client for viewing by a user;
And receiving the authentication information input by the user through an information input interface of the first client.
The information input interface may be a graphical user interface of the first client, and the information input interface may be used for a user to input information.
For example, the terminal may specifically generate the authentication information by responding to the triggering operation of the user by the second client, and display the authentication information on the display page of the second client. The user may view the authentication information on a display page of the second client.
After the user views the authentication information, the authentication information can be input in the information input interface of the first client.
Specifically, the information input interface of the first client may include an input area and a confirmation control, where the input area may be used for authentication information input by the user, and the confirmation control may be used for performing a confirmation operation after the authentication information is input by the user. After the user views the authentication information, the authentication information is input in the input area through a keyboard or an audio acquisition device (e.g., a microphone, or the like), and the completion of the input is confirmed by performing a confirmation operation on a confirmation control.
And the first client responds to the confirmation operation of the user on the confirmation control, and receives the authentication information input by the user in the input area.
Besides acquiring the authentication information, the terminal can display the graphic code and respond to the scanning action to acquire the authentication information, so that the convenience and accuracy of acquiring the authentication information are improved. That is, in an embodiment, the step of "obtaining, by the first client, the authentication information" may specifically include:
generating, by the second client, a graphics code based on the authentication information;
the graphical code is identified by the first client to extract authentication information from the graphical code.
The graphic code can be recorded data symbol information which is generated according to a coding algorithm and distributed on a plane by using geometric figures according to a certain rule, such as a two-dimensional code or a bar code for recording authentication information.
For example, the second client may specifically generate a graphic code according to the authentication information, and display the graphic code on the display page.
The first client identifies the graphic code and extracts the authentication information recorded by the graphic code. Specifically, if the first client and the second client are not on the same terminal, that is, the first client is an application program in the terminal a and the second client is an application program in the terminal B, the terminal a starts a camera to scan a graphic code displayed by the second client of the terminal B, and information recorded in the identification graphic code obtains authentication information. If the first client and the second client are on the same terminal, for example, the first client and the second client are both application programs in the terminal a, the terminal a may store the graphic code first, then acquire the graphic code through the first client for identification, and extract the authentication information recorded by the graphic code.
If the graphic code is displayed in the form of a picture, the second client can directly store the picture containing the graphic code; if the graphic code is not displayed in the form of a picture, the second client can capture a screen of the page displayed with the graphic code to obtain the picture containing the graphic code.
Optionally, the second client may send the generated authentication information to the internet of things device, the internet of things device sends the authentication information to the first client, and the client obtains the authentication information sent by the internet of things device.
104. And registering and binding the Internet of things equipment based on the authentication information through the first client.
For example, the first client may obtain the authentication information, send the authentication information to the internet of things device, where the internet of things device compares whether the authentication information sent by the first client is consistent with the authentication information sent by the second client, and if so, the internet of things device authenticates the first client, and the first client configures the internet of things device to register and bind the internet of things device. If the authentication is inconsistent, the authentication of the first client by the Internet of things equipment is not passed, and registration binding of the Internet of things equipment cannot be completed at the moment.
Optionally, the authentication information may further include timeout information, so as to improve security of identity authentication of the first client by the internet of things. If the internet of things equipment does not receive the authentication information sent by the first client in the time indicated by the timeout information, authentication of the first client is not passed, and the first client cannot register and bind the internet of things equipment. If the internet of things equipment receives the authentication information sent by the first client in the time indicated by the timeout information, the internet of things equipment can be registered and bound based on the authentication information.
In an embodiment, the terminal may establish an encryption channel between the first client and the internet of things device according to the device information, where the first client sends a control instruction to the internet of things device through the encryption channel, so as to improve security of the internet of things, that is, step "register and bind the internet of things device based on authentication information through the first client" may specifically include:
establishing an encryption channel based on authentication information through the first client or the second client;
identity authentication is carried out with the Internet of things equipment based on the encryption channel through the first client;
and if the identity authentication is passed, registering and binding the Internet of things equipment through the first client.
The encrypted channel may be a secure communication path where the first client and the internet of things device communicate with each other.
For example, the first client may send the authentication information to the internet of things device, where the internet of things device compares whether the authentication information sent by the first client is consistent with the authentication information sent by the second client, and if so, may return information that the authentication passes to the first client.
And the first client determines a communication path with the Internet of things equipment according to the returned information, and establishes an encryption channel.
For another example, if the authentication information sent by the first client is consistent with the authentication information sent by the second client, the internet of things device instructs the second client to authorize the first client, so that the first client establishes an encryption channel with the internet of things device.
The first client and the internet of things device can exchange digital certificates through an encryption channel, and the digital certificates can be issued to the first client and the internet of things device by a third party certification authority which is trusted by the first client and the internet of things device.
The internet of things equipment can authenticate the identity of the first client according to the received digital certificate, and if the digital certificate is a digital certificate issued by a third party authenticator which is trusted by the first client and the internet of things equipment together, the internet of things equipment authenticates the identity of the first client. If the digital certificate is not the digital certificate issued by the third party authenticator which is trusted by the first client and the internet of things equipment together, the identity authentication of the internet of things equipment to the first client is not passed.
The first client can authenticate the identity of the Internet of things device according to the received digital certificate. If the digital certificate is a digital certificate issued by a third party authenticator which is trusted by the first client and the Internet of things equipment together, the identity authentication of the first client to the Internet of things equipment is passed. If the digital certificate is not the digital certificate issued by the third party authenticator which is trusted by the first client and the Internet of things equipment together, the identity authentication of the first client to the Internet of things equipment is not passed.
If the identity authentication of the first client to the internet of things equipment passes and the identity authentication of the internet of things equipment to the first client passes, the identity authentication of the internet of things equipment and the first client passes, and the terminal registers and binds the internet of things equipment through the first client. If the identity authentication of the first client to the internet of things equipment does not pass, or the identity authentication of the first client to the internet of things equipment does not pass, the identity authentication of the internet of things equipment and the first client does not pass, and registration binding cannot be performed on the internet of things equipment.
In an embodiment, the step of "performing, by the first client, registration binding on the internet of things device based on the authentication information" may specifically include:
If the identity authentication is passed, acquiring registration information of the Internet of things equipment through the first client;
and sending the registration information to the Internet of things equipment through the first client, and carrying out registration binding on the Internet of things equipment based on the registration information.
The registration information may be information required by the internet of things device to identify the first client identity, and the registration information may include a device identifier of the internet of things device, a key, a user authority list, and address information (for example, a uniform resource locator URL) of a second cloud server corresponding to the internet of things device.
For example, the terminal may specifically send the registration information to the internet of things device through the first client, and when the internet of things device receives the control instruction, the terminal determines whether the first client has the corresponding authority according to the information carried by the control instruction and the registration information.
In an embodiment, the registration information may be encrypted to improve security, that is, the step of "sending the registration information to the internet of things device through the first client" may specifically include:
generating, by the first client, a target key based on a key algorithm negotiated with the internet of things device and authentication information;
Encrypting the registration information based on the target key through the first client to obtain encrypted registration information;
and sending the encrypted registration information to the Internet of things equipment through the first client, so that the Internet of things equipment decrypts the encrypted registration information to obtain the registration information.
The key algorithm may be an algorithm for generating a target key based on authentication information, and the key algorithm is used for encrypting data interacted with by the registration binding process. For example, the key algorithm may include a data encryption standard algorithm (Data Encryption Standard, DES), an international data encryption algorithm (International Data Encryption Algorithm, IDEA), an advanced encryption standard algorithm (Advanced Encryption Standard, AES), a sequence cipher algorithm, a block cipher algorithm, a public key cipher algorithm, a hash function algorithm, and the like.
The key algorithm may include an encryption process and a decryption process: the basic process of data encryption is to process a plaintext file or data according to a certain algorithm rule to make the plaintext file or data unreadable coding information, which is commonly called as "ciphertext", so as to protect the data from illegal theft, and correspondingly, the process of converting the coding information into the original plaintext file by using the rule of the same key algorithm is called as decryption process, and the key algorithm is divided into a symmetric encryption algorithm and an asymmetric encryption algorithm, wherein the symmetric encryption algorithm is characterized in that the encryption key is identical to the decryption key, and the asymmetric encryption algorithm is characterized in that the encryption key is different from the decryption key. Optionally, each internet of things device may store a key algorithm, and the key algorithms stored in each internet of things device may be the same or different.
The target key may include an encryption key required in converting the registration information into encrypted registration information and a decryption key required in converting the encrypted registration information into registration information, among others.
For example, the terminal may generate an encryption key based on the device information according to a key algorithm negotiated with the device of the internet of things through the first client, encrypt the registration information through the generated encryption key, and obtain the encrypted registration information, so that the security of the information can be protected.
The terminal sends the encrypted registration information obtained by encryption to the internet of things equipment, the internet of things equipment decrypts the encrypted registration information to obtain registration information, for example, the internet of things equipment can decrypt the encrypted registration information through a decryption key to obtain registration information.
The key algorithm negotiated by the first client and the internet of things device may be that the terminal obtains the device information through the first client, and also obtains the key algorithm, for example, when the internet of things device sends the device information, the key algorithm is sent to the first client.
In an embodiment, binding the internet of things device may be completed through a cloud server associated with the first client, that is, the step of "if the identity authentication passes, register and bind the internet of things device through the first client" may specifically include:
Acquiring registration information of the Internet of things equipment through a cloud server associated with the first client, and sending the registration information to the Internet of things equipment and the first client;
and carrying out registration binding on the Internet of things equipment based on the registration information through the first client.
The cloud server may be a private cloud server corresponding to the first client, that is, the first client and the first cloud server may belong to the same internet of things system, and may be referred to as a first cloud server.
For example, the terminal may obtain the registration information through the first cloud server, for example, obtain the registration information from a database of the first cloud server, or the first cloud server receives the registration information sent by the first client, sends the registration information to the internet of things device, and the internet of things device may store the registration information.
After the first client performs registration and binding on the internet of things device, the internet of things device can be controlled, that is, in an embodiment, after the step of performing registration and binding on the internet of things device based on authentication information through the first client, the method specifically further includes:
And controlling the Internet of things equipment through the first client.
For example, the first client receives a control instruction input by a user, for example, the user operates a control in a display page of the first client to trigger the first client to generate the control instruction; or the user inputs voice through the audio acquisition device (such as a microphone or the like), the first client generates a control instruction based on the voice input by the user, and sends the control instruction to the internet of things device so as to control the internet of things device to execute corresponding operation.
For example, when the internet of things device is an air conditioner, the terminal may receive, by the first client, an adjustment operation of an operation parameter such as a temperature, an operation mode, and a wind speed of the air conditioner, which is input by a user in a display page of the first client for air conditioner control, and generate a control instruction based on the adjustment operation.
The air conditioner can adjust the temperature according to the received temperature adjustment instruction (i.e. control instruction).
For another example, when the internet of things device is a television, in a display page of the client for television control, an adjustment operation of operating parameters such as volume, program switching, brightness and the like, which are input by a user, may be received, and a control instruction may be generated based on the adjustment operation.
The television may adjust the volume according to the received volume adjustment instruction (i.e., control instruction).
In order to improve the security of data interaction, the control instruction may be encrypted by a key algorithm, and then the encrypted control instruction is sent to the internet of things device, and the internet of things device may decrypt the encrypted control instruction to obtain the content indicated by the control instruction, and execute a corresponding operation according to the content indicated by the control instruction.
As can be seen from the foregoing, in the embodiment of the present application, device information of at least one device of the internet of things may be obtained through the first client; sending a configuration request to the Internet of things equipment based on equipment information through the first client, wherein the configuration request is used for indicating the Internet of things equipment to generate authentication information through the second client, and the first client and the second client belong to different Internet of things systems; acquiring authentication information through a first client; and registering and binding the Internet of things equipment based on the authentication information through the first client. The scheme improves the binding efficiency of the equipment of the Internet of things.
On the basis of the above embodiments, examples will be described in further detail below.
The embodiment will be described in terms of an internet of things device binding system, where the internet of things device binding system may include a first client, a second client, an internet of things device, and a second cloud server corresponding to the internet of things device, and the first client and the second client may be APPs on the same terminal, or the first client and the second client may be APPs on different terminals.
The specific flow of the binding method for the internet of things equipment provided by the embodiment of the application, as shown in fig. 3, may be as follows:
201. the first client broadcasts a find device message.
For example, the first client may specifically send a device searching message to a device in the preset local area network.
202. And the Internet of things equipment sends equipment information to the first client.
For example, the device information including the device identifier, the device type, and the key algorithm of the device of the internet of things may be returned to the first client after the device search information is received by the device of the internet of things.
203. The first client receives and displays the equipment information, and responds to the selection operation of the user on the Internet of things equipment to generate a configuration request.
For example, the first client may specifically receive the device information, and display the device information to the user through a display page according to the received device information, for example, as shown in a display page 41 in fig. 4, the first client may display the searched internet of things device (such as a smart lamp, an air conditioner, a smart washing machine, and a smart refrigerator in fig. 4) on the display page according to the type of the device information.
The user may select the internet of things device to be configured from the displayed device information, for example, the user selects the displayed internet of things device through the display page 41 of the first client in fig. 4. The round selection control corresponding to the selected internet of things equipment is displayed in black, and the round selection control corresponding to the unselected internet of things equipment is displayed in white. The user can select the device information of one internet of things device, and also can select the device information of a plurality of internet of things devices.
The first client generates a configuration request in response to a user selection, where the configuration request may be a device identifier that carries the internet of things device selected by the user.
For example, when the user selects to configure the internet of things device a and the internet of things device B, the first client generates a configuration request a and a configuration request B, where the configuration request a carries the device identifier of the internet of things device a, and the configuration request B carries the device identifier of the internet of things device B.
Optionally, as shown in the display page 41 of fig. 4, the display page presented by the first client may further include a determination control for the user to confirm the selection operation.
204. The first client sends a configuration request to the Internet of things device.
For example, the first client may specifically send the generated configuration request to the internet of things device selected by the user. For example, a configuration request a is sent to an internet of things device a, and a configuration request B is sent to an internet of things device B.
205. And the Internet of things equipment sends the configuration request to a second cloud server corresponding to the Internet of things equipment.
For example, the internet of things device may specifically send the configuration request to a second cloud server corresponding to the internet of things device.
206. And the second cloud server sends the configuration request to the second client.
For example, the second cloud server may specifically send the configuration request to the second client.
207. The second client side displays the information display control based on the configuration request, and responds to the triggering operation of the user aiming at the information display control to generate and display authentication information.
For example, the second client may specifically receive the configuration request, generate an information presentation control based on the configuration request, and display the information presentation control in a display page of the second client, for example, an information presentation control as shown in display page 42 of fig. 4.
When the user performs a triggering operation on the information display control, for example, clicking or sliding, the second client responds to the triggering operation of the user, generates authentication information (for example, a PIN code), and displays the authentication information on the display page of the second client as shown in the display page 43 of fig. 4.
208. The first client acquires authentication information.
For example, after the user views the authentication information, the authentication information is input through the first client, and the first client obtains the authentication information input by the user.
Specifically, the first client may include an information input interface, which may be as shown in the display page 44 of fig. 4, where the information input interface may include an input area and a confirmation control, where the input area may be used for inputting authentication information by a user, and the confirmation control may be used for performing a confirmation operation after inputting the authentication information by the user. After the user views the authentication information, the authentication information is input through a keyboard or an audio acquisition device (e.g., a microphone, or the like) in the input area, and the completion of the input is confirmed by performing a confirmation operation on a confirmation control.
The first client responds to the confirmation operation of the user on the confirmation control, and acquires the authentication information input by the user in the input area.
209. The first client establishes an encryption channel with the Internet of things equipment through the authentication information.
For example, the first client may send the authentication information to the internet of things device, where the internet of things device compares whether the authentication information sent by the first client is consistent with the authentication information sent by the second client, and if so, may return information that the authentication passes to the first client.
And the first client determines a communication path with the Internet of things equipment according to the returned information, and establishes a through encryption channel.
210. The first client and the Internet of things device perform identity authentication through the encryption channel.
For example, the first client and the internet of things device exchange digital certificates through an encryption channel, and the digital certificates may be third party certification authorities trusted by the first client and the internet of things device, and issued to the first client and the internet of things device.
The internet of things equipment can authenticate the identity of the first client according to the received digital certificate, and if the digital certificate is a digital certificate issued by a commonly trusted third party authenticator, the identity authentication of the internet of things equipment to the first client is passed.
The first client can authenticate the identity of the Internet of things device according to the received digital certificate. If the digital certificate is a digital certificate issued by a commonly trusted third party authenticator, the identity authentication of the first client to the internet of things device is passed.
211. And if the authentication is passed, the first client sends the registration information to the Internet of things equipment.
For example, if the identity authentication of the first client to the internet of things device passes and the identity authentication of the first client to the internet of things device passes, the identity authentication of the internet of things device and the first client passes, and the first client sends registration information to the internet of things device.
212. The first client finishes registering and binding the Internet of things equipment.
For example, the first client may send the registration information to the internet of things device, configure the internet of things device, and complete registration binding on the internet of things device.
Optionally, the internet of things device may also send a prompt for successful binding to the first client, such as the "prompt" shown in display page 45 of fig. 4: the intelligent air conditioner has been successfully bound.
It should be noted that, if the binding to the internet of things device fails, the first client may output related prompt information of the binding failure of the internet of things device, and may display a reason of the specific binding failure, etc. to prompt the user.
213. The first client sends a control instruction to the Internet of things equipment.
For example, the first client receives a control instruction input by a user, for example, the user operates a control in a display page of the first client to trigger the first client to generate the control instruction; or the user inputs voice through an audio collection device (e.g., a microphone, or a microphone, etc.), the first client generates a control instruction based on the voice input by the user, and sends the control instruction to the internet of things device.
For example, as shown in the display page 46 in fig. 4, the user may select the internet of things device to be controlled, such as selecting an intelligent air conditioner, from the display page of the first client, and the first client displays an instruction input page corresponding to the selected internet of things device according to the selection operation of the user.
The instruction input page may be as shown in display page 47 of fig. 4, where a user operates on a control to trigger the first client to generate a control instruction.
214. And the Internet of things equipment executes corresponding operation according to the received control instruction.
For example, the internet of things device may execute the corresponding operation according to the received control instruction.
For example, as shown in fig. 4, the first client may generate a startup instruction (i.e., a control instruction) in the control interface of the air conditioner in response to the user triggering the startup control, and the first client may send the startup instruction to the air conditioner, where the air conditioner may perform a startup operation based on the startup instruction.
As can be seen from the foregoing, in the embodiment of the present application, a device searching message is broadcasted through a first client, device information returned by an internet of things device is received, a configuration request is sent to the internet of things device, the internet of things device sends the configuration request to a second cloud server, the second cloud server sends the configuration request to a second client, the second client generates and displays authentication information, the first client acquires the authentication information, and establishes an encryption channel with the internet of things device, the first client and the internet of things device perform identity authentication through the encryption channel, if the authentication passes, the first client sends registration information to the internet of things device, registration and binding are performed on the internet of things device, the first client sends a control instruction to the internet of things device, and the internet of things device performs a corresponding operation according to the received control instruction. At this time, the internet of things device can be controlled through the first client. According to the scheme, the binding efficiency of the Internet of things equipment is improved, and the convenience of controlling the Internet of things equipment is improved.
In order to facilitate better implementation of the binding method of the internet of things device provided by the embodiment of the application, in an embodiment, an internet of things device binding device is further provided. The meaning of the noun is the same as that in the above-mentioned binding method of the internet of things equipment, and specific implementation details can refer to the description in the method embodiment.
The device for binding the internet of things equipment can be specifically integrated in computer equipment, as shown in fig. 5, and the device for binding the internet of things equipment can comprise: the first acquiring module 301, the sending module 302, the second acquiring module 303 and the binding module 304 are specifically as follows:
the first acquisition module 301: and the device information of at least one Internet of things device is acquired through the first client.
In an embodiment, the first obtaining module 301 may include a query sub-module, specifically:
and a query sub-module: and the device information of the inquired internet of things device is acquired by inquiring the registered and bound internet of things device through the first client.
In one embodiment, the query submodule may be specifically configured to:
broadcasting a device searching message in a preset local area network;
receiving candidate equipment information returned by candidate internet of things equipment in a preset local area network based on equipment searching information;
And screening out the equipment information of the equipment of the Internet of things from the candidate equipment information of the candidate equipment of the Internet of things.
The sending module 302: the configuration request is used for indicating the Internet of things equipment to generate authentication information through the second client, and the first client and the second client belong to different Internet of things systems.
In an embodiment, the sending module 302 may include a display sub-module and a generating sub-module, specifically:
and a display sub-module: and the information display control is used for displaying the information display control based on the sending configuration request through the second client.
Generating a submodule: and the authentication information is generated by the second client in response to the triggering operation for the information display control.
The second acquisition module 303: for obtaining authentication information by the first client.
In an embodiment, the second obtaining module 303 may include a display sub-module and a receiving sub-module, specifically:
and a display sub-module: and the authentication information is used for displaying the authentication information through the second client for the user to view.
The receiving submodule: and the authentication information input by the user is received through an information input interface of the first client.
In an embodiment, the second obtaining module 303 may include a generating sub-module and an identifying sub-module, specifically:
generating a submodule: and the second client is used for generating a graphic code based on the authentication information.
And (3) an identification sub-module: for identifying the graphic code by the first client to extract the authentication information from the graphic code.
Binding module 304: the method comprises the steps of registering and binding the Internet of things device based on authentication information through a first client.
In an embodiment, the device binding apparatus of the internet of things may further include a control module 305, specifically:
the control module 305: the control method is used for controlling the Internet of things equipment through the first client.
In an embodiment, the binding module 304 may include a setup sub-module, an authentication sub-module, and a binding sub-module, specifically:
and (3) establishing a sub-module: the encryption channel is used for establishing an encryption channel based on authentication information through the first client or the second client.
And an authentication sub-module: the method is used for carrying out identity authentication with the Internet of things equipment based on the encryption channel through the first client.
Binding the submodule: and if the identity authentication is passed, registering and binding the Internet of things equipment through the first client.
In an embodiment, the binding module 304 may include an acquisition sub-module, a sending sub-module, and specifically:
and (3) an acquisition sub-module: if the identity authentication is passed, acquiring registration information of the Internet of things equipment through the first client;
and a transmitting sub-module: the method comprises the steps of sending registration information to the Internet of things device through a first client, and registering and binding the Internet of things device based on the registration information.
In an embodiment, the sending submodule may be specifically configured to:
generating, by the first client, a target key based on a key algorithm negotiated with the internet of things device and authentication information;
encrypting the registration information based on the target key through the first client to obtain encrypted registration information;
and sending the encrypted registration information to the Internet of things equipment through the first client, so that the Internet of things equipment decrypts the encrypted registration information to obtain the registration information.
In one embodiment, the binding submodule may be specifically configured to:
acquiring registration information of the Internet of things equipment through a cloud server associated with the first client, and sending the registration information to the Internet of things equipment and the first client;
and carrying out registration binding on the Internet of things equipment based on the registration information through the first client.
As can be seen from the foregoing, in the embodiment of the present application, the first obtaining module 301 may obtain, through the first client, device information of at least one device of the internet of things; transmitting a configuration request to the internet of things device based on the device information through the first client by the transmitting module 302, wherein the configuration request is used for indicating the internet of things device to generate authentication information through the second client, and the first client and the second client belong to different internet of things systems; then, the authentication information is acquired through the first client by the second acquisition module 303; the binding module 304 registers and binds the internet of things device based on the authentication information through the first client. The scheme improves the binding efficiency of the equipment of the Internet of things.
The embodiment of the application further provides a computer device, which may be a terminal, as shown in fig. 6, which shows a schematic structural diagram of the terminal according to the embodiment of the application, specifically:
the terminal may include one or more processing cores' processors 1001, one or more computer-readable storage media (which may also be referred to as storage media) memory 1002, a power supply 1003, and an input unit 1004, among other components. It will be appreciated by those skilled in the art that the terminal structure shown in fig. 6 is not limiting of the terminal and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components. Wherein:
The processor 1001 is a control center of the terminal, connects various parts of the entire terminal using various interfaces and lines, and performs various functions of the terminal and processes data by running or executing software programs and/or modules stored in the memory 1002 and calling data stored in the memory 1002, thereby performing overall monitoring of the terminal. Optionally, the processor 1001 may include one or more processing cores; preferably, the processor 1001 may integrate an application processor and a modem processor, wherein the application processor mainly processes an operating system, a user interface, a computer program, and the like, and the modem processor mainly processes wireless communication. It will be appreciated that the modem processor described above may not be integrated into the processor 1001.
The memory 1002 may be used to store software programs and modules, and the processor 1001 executes various functional applications and data processing by executing the software programs and modules stored in the memory 1002. The memory 1002 may mainly include a stored program area that may store an operating system, computer programs required for at least one function (such as a sound playing function, an image playing function, etc.), and a stored data area; the storage data area may store data created according to the use of the terminal, etc. In addition, memory 1002 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device. Accordingly, the memory 1002 may also include a memory controller to provide the processor 1001 with access to the memory 1002.
The terminal further comprises a power supply 1003 for supplying power to the various components, preferably the power supply 1003 may be logically connected to the processor 1001 by a power management system, so that functions of managing charging, discharging, and power consumption management are implemented by the power management system. The power supply 1003 may also include one or more of any of a direct current or alternating current power supply, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
The terminal may also include an input unit 1004, which input unit 1004 may be used to receive input numeric or character information and to generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control.
Although not shown, the terminal may further include a display unit or the like, which is not described herein. In this embodiment, the processor 1001 in the terminal loads executable files corresponding to the processes of one or more computer programs into the memory 1002 according to the following instructions, and the processor 1001 executes the computer programs stored in the memory 1002, so as to implement various functions, as follows:
acquiring equipment information of at least one piece of equipment of the Internet of things through a first client;
Sending a configuration request to the Internet of things equipment based on equipment information through the first client, wherein the configuration request is used for indicating the Internet of things equipment to generate authentication information through the second client, and the first client and the second client belong to different Internet of things systems;
acquiring authentication information through a first client;
and registering and binding the Internet of things equipment based on the authentication information through the first client.
The specific implementation of each operation may be referred to the previous embodiments, and will not be described herein.
As can be seen from the above, the terminal in the embodiment of the present application may obtain, through the first client, device information of at least one device of the internet of things; sending a configuration request to the Internet of things equipment based on equipment information through the first client, wherein the configuration request is used for indicating the Internet of things equipment to generate authentication information through the second client, and the first client and the second client belong to different Internet of things systems; acquiring authentication information through a first client; and registering and binding the Internet of things equipment based on the authentication information through the first client. The scheme improves the binding efficiency of the equipment of the Internet of things.
According to one aspect of the present application, there is provided a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions to cause the computer device to perform the methods provided in the various alternative implementations of the above embodiments.
It will be appreciated by those of ordinary skill in the art that all or part of the steps of the various methods of the above embodiments may be performed by a computer program, or by computer program control related hardware, which may be stored in a computer readable storage medium (i.e., a storage medium) and loaded and executed by a processor.
To this end, the embodiment of the application provides a storage medium, in which a computer program is stored, where the computer program can be loaded by a processor to execute any of the binding methods of the internet of things device provided in the embodiment of the application.
The specific implementation of each operation above may be referred to the previous embodiments, and will not be described herein.
Wherein the storage medium may include: read Only Memory (ROM), random access Memory (RAM, random Access Memory), magnetic or optical disk, and the like.
Because the computer program stored in the storage medium can execute any of the binding methods of the internet of things device provided in the embodiments of the present application, the beneficial effects that any of the binding methods of the internet of things device provided in the embodiments of the present application can be achieved, and detailed descriptions of the previous embodiments are omitted herein.
The foregoing describes in detail a method, an apparatus, a computer device, and a storage medium for binding an internet of things device provided in the embodiments of the present application, and specific examples are applied to describe the principles and implementations of the present application, where the description of the foregoing embodiments is only for helping to understand the method and core ideas of the present application; meanwhile, those skilled in the art will have variations in the specific embodiments and application scope in light of the ideas of the present application, and the present description should not be construed as limiting the present application in view of the above.

Claims (14)

1. An internet of things device binding method, the method comprising:
acquiring equipment information of at least one piece of equipment of the Internet of things through a first client;
sending, by the first client, a configuration request to the internet of things device based on the device information, where the configuration request is used to instruct the internet of things device to generate authentication information through a second client, and the first client and the second client belong to different internet of things systems;
acquiring the authentication information through the first client; the authentication information is information for mutually authenticating the identity of the Internet of things equipment and the first client;
And through the first client, registering and binding the Internet of things equipment based on the authentication information.
2. The method for binding an internet of things device according to claim 1, wherein after the registration binding is performed on the internet of things device by the first client based on the authentication information, the method further comprises:
and controlling the Internet of things equipment through the first client.
3. The method for binding the internet of things device according to claim 1, wherein the obtaining, by the first client, device information of at least one internet of things device includes:
and inquiring the registered and bound Internet of things equipment through the first client, and acquiring the inquired equipment information of the Internet of things equipment.
4. The method for binding the internet of things device according to claim 3, wherein querying the internet of things device that can register the binding, and obtaining the queried device information of the internet of things device, comprises:
broadcasting a device searching message in a preset local area network;
receiving candidate internet of things equipment in the preset local area network, and returning candidate equipment information based on the equipment searching message;
And screening the equipment information of the equipment of the Internet of things from the candidate equipment information of the equipment of the Internet of things.
5. The method for binding an internet of things device according to claim 1, wherein after the sending, by the first client, a configuration request to the internet of things device based on the device information, the method further comprises:
displaying, by the second client, an information presentation control based on the sending configuration request;
and responding to the triggering operation of the information display control through the second client, and generating the authentication information.
6. The method for binding the internet of things device according to claim 1, wherein the registering and binding the internet of things device based on the authentication information through the first client comprises:
establishing an encryption channel based on the authentication information through the first client or the second client;
identity authentication is carried out on the basis of the encryption channel and the Internet of things equipment through the first client;
and if the identity authentication is passed, registering and binding the Internet of things equipment through the first client.
7. The method for binding the internet of things device according to claim 6, wherein if the identity authentication passes, performing registration binding on the internet of things device through the first client includes:
If the identity authentication is passed, acquiring registration information of the Internet of things equipment through the first client;
and sending the registration information to the Internet of things equipment through the first client, and registering and binding the Internet of things equipment based on the registration information.
8. The method for binding an internet of things device according to claim 7, wherein the sending, by the first client, the registration information to the internet of things device includes:
generating, by the first client, a target key based on a key algorithm negotiated with the internet of things device and the authentication information;
encrypting the registration information based on the target key by the first client to obtain encrypted registration information;
and sending the encrypted registration information to the internet of things equipment through the first client, so that the internet of things equipment decrypts the encrypted registration information to obtain the registration information.
9. The method for binding the internet of things device according to claim 6, wherein if the identity authentication passes, performing registration binding on the internet of things device through the first client includes:
Acquiring registration information of the Internet of things equipment through a cloud server associated with the first client, and sending the registration information to the Internet of things equipment and the first client;
and through the first client, registering and binding the Internet of things equipment based on the registration information.
10. The method for binding an internet of things device according to any one of claims 1 to 9, wherein the first client includes an information input interface, and the acquiring, by the first client, the authentication information includes:
displaying the authentication information through the second client for viewing by a user;
and receiving the authentication information input by the user through an information input interface of the first client.
11. The method for binding an internet of things device according to any one of claims 1 to 9, wherein the obtaining, by the first client, the authentication information includes:
generating, by the second client, a graphics code based on the authentication information;
identifying, by the first client, the graphical code to extract the authentication information from the graphical code.
12. The utility model provides an thing networking equipment binding device which characterized in that includes:
The first acquisition module is used for acquiring equipment information of at least one piece of equipment of the Internet of things through the first client;
the sending module is used for sending a configuration request to the internet of things equipment based on the equipment information through the first client, wherein the configuration request is used for indicating the internet of things equipment to generate authentication information through a second client, and the first client and the second client belong to different internet of things systems;
the second acquisition module is used for acquiring the authentication information through the first client; the authentication information is information for mutually authenticating the identity of the Internet of things equipment and the first client;
and the binding module is used for registering and binding the internet of things equipment based on the authentication information through the first client.
13. A computer device comprising a processor and a memory, the memory having stored therein a computer program, the processor executing the internet of things device binding method of any one of claims 1 to 11 when invoking the computer program in the memory.
14. A storage medium for storing a computer program to be loaded by a processor to perform the internet of things device binding method of any one of claims 1 to 11.
CN202110724287.2A 2021-06-29 2021-06-29 Internet of things equipment binding method and device, computer equipment and storage medium Active CN113490207B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110724287.2A CN113490207B (en) 2021-06-29 2021-06-29 Internet of things equipment binding method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110724287.2A CN113490207B (en) 2021-06-29 2021-06-29 Internet of things equipment binding method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113490207A CN113490207A (en) 2021-10-08
CN113490207B true CN113490207B (en) 2024-02-06

Family

ID=77936471

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110724287.2A Active CN113490207B (en) 2021-06-29 2021-06-29 Internet of things equipment binding method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113490207B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113596090B (en) * 2021-06-25 2023-10-24 青岛海尔科技有限公司 Binding method and device of terminal equipment, computer equipment and storage medium
CN113904847B (en) * 2021-10-09 2022-07-15 天翼物联科技有限公司 Cloud platform binding method, system, equipment and medium of Internet of things card
CN116954441A (en) * 2022-04-15 2023-10-27 华为技术有限公司 Equipment control method and electronic equipment
WO2024031681A1 (en) * 2022-08-12 2024-02-15 Oppo广东移动通信有限公司 Device binding method and apparatus, and device, storage medium and program product

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104202365A (en) * 2014-08-15 2014-12-10 深圳市蜂联科技有限公司 Clustered intelligent gateway platform and method thereby for deploying expanded business application
CN108055339A (en) * 2017-12-22 2018-05-18 海尔优家智能科技(北京)有限公司 Method, apparatus, storage medium and the cloud platform server of home appliance interconnection
CN109412906A (en) * 2018-10-09 2019-03-01 南京物联传感技术有限公司 Across APP program intelligent control interactive system and working method
CN109565442A (en) * 2017-01-19 2019-04-02 株式会社世尊信息系统 IoT data gathering system, IoT method of data capture, managing device, management program, agent apparatus and broker program
CN109672683A (en) * 2018-12-25 2019-04-23 深圳市安信认证系统有限公司 Binding method, binding device and the terminal device of internet of things equipment
CN109787769A (en) * 2018-12-25 2019-05-21 深圳市安信认证系统有限公司 Offline authentication method, user terminal and the device end of internet of things equipment
CN111526112A (en) * 2019-02-02 2020-08-11 京东方科技集团股份有限公司 Cross-domain device registration method and device and computer readable storage medium
CN111835755A (en) * 2020-07-09 2020-10-27 中国联合网络通信集团有限公司 Mutual authentication method and equipment for Internet of things equipment and Internet of things service system
CN112039739A (en) * 2020-08-31 2020-12-04 海信(山东)空调有限公司 Method for controlling binding of household appliance distribution network and household appliance

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8132247B2 (en) * 2007-08-03 2012-03-06 Citrix Systems, Inc. Systems and methods for authorizing a client in an SSL VPN session failover environment
US9203807B2 (en) * 2011-09-09 2015-12-01 Kingston Digital, Inc. Private cloud server and client architecture without utilizing a routing server
US9479499B2 (en) * 2013-03-21 2016-10-25 Tencent Technology (Shenzhen) Company Limited Method and apparatus for identity authentication via mobile capturing code
US11140156B2 (en) * 2019-07-16 2021-10-05 Mastercard International Incorporated Systems and methods for use in binding internet of things devices with identities associated with users

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104202365A (en) * 2014-08-15 2014-12-10 深圳市蜂联科技有限公司 Clustered intelligent gateway platform and method thereby for deploying expanded business application
CN109565442A (en) * 2017-01-19 2019-04-02 株式会社世尊信息系统 IoT data gathering system, IoT method of data capture, managing device, management program, agent apparatus and broker program
CN108055339A (en) * 2017-12-22 2018-05-18 海尔优家智能科技(北京)有限公司 Method, apparatus, storage medium and the cloud platform server of home appliance interconnection
CN109412906A (en) * 2018-10-09 2019-03-01 南京物联传感技术有限公司 Across APP program intelligent control interactive system and working method
CN109672683A (en) * 2018-12-25 2019-04-23 深圳市安信认证系统有限公司 Binding method, binding device and the terminal device of internet of things equipment
CN109787769A (en) * 2018-12-25 2019-05-21 深圳市安信认证系统有限公司 Offline authentication method, user terminal and the device end of internet of things equipment
CN111526112A (en) * 2019-02-02 2020-08-11 京东方科技集团股份有限公司 Cross-domain device registration method and device and computer readable storage medium
CN111835755A (en) * 2020-07-09 2020-10-27 中国联合网络通信集团有限公司 Mutual authentication method and equipment for Internet of things equipment and Internet of things service system
CN112039739A (en) * 2020-08-31 2020-12-04 海信(山东)空调有限公司 Method for controlling binding of household appliance distribution network and household appliance

Also Published As

Publication number Publication date
CN113490207A (en) 2021-10-08

Similar Documents

Publication Publication Date Title
CN113490207B (en) Internet of things equipment binding method and device, computer equipment and storage medium
CN110602087B (en) Intelligent screen projection method and device, intelligent terminal and server
US9992176B2 (en) Systems and methods for encrypted communication in a secure network
CN104065653B (en) A kind of interactive auth method, device, system and relevant device
CN113132973B (en) Equipment network distribution method and system and computer readable storage medium
CN104065652B (en) A kind of auth method, device, system and relevant device
RU2553102C2 (en) Device communication
US20160269176A1 (en) Key Configuration Method, System, and Apparatus
CN104967595A (en) Method and apparatus for registering devices on Internet of things platform
CN112492580B (en) Information processing method and device, communication equipment and storage medium
CN113055867A (en) Method and device for auxiliary network distribution of terminal and electronic equipment
EP3537652B1 (en) Method for securely controlling smart home appliance and terminal device
CN113630727B (en) Intelligent household network distribution method, device and system, electronic equipment and storage medium
CN111723889B (en) Code scanning login method, graphic code display method, device, equipment and storage medium
CN112600820B (en) Network connection method, device, computer equipment and storage medium
CN113556227A (en) Network connection management method and device, computer readable medium and electronic equipment
CN114125832B (en) Network connection method, terminal, network equipment to be distributed and storage medium
CN113099440A (en) Network configuration method, device, equipment and system
CN112533202A (en) Identity authentication method and device
CN112311537A (en) Block chain-based equipment access authentication system and method
CN109145628A (en) A kind of collecting method and system based on credible performing environment
CN113301563A (en) Network configuration method, device, equipment and storage medium
CN106537962B (en) Wireless network configuration, access and access method, device and equipment
CN115242779B (en) File transmission method and system based on applet and electronic equipment
EP4261665A1 (en) Application program login method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant