CN113746633B - Internet of things equipment binding method, device, system, cloud server and storage medium - Google Patents

Internet of things equipment binding method, device, system, cloud server and storage medium Download PDF

Info

Publication number
CN113746633B
CN113746633B CN202110898234.2A CN202110898234A CN113746633B CN 113746633 B CN113746633 B CN 113746633B CN 202110898234 A CN202110898234 A CN 202110898234A CN 113746633 B CN113746633 B CN 113746633B
Authority
CN
China
Prior art keywords
cloud server
internet
client
binding
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110898234.2A
Other languages
Chinese (zh)
Other versions
CN113746633A (en
Inventor
李辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen TCL New Technology Co Ltd
Original Assignee
Shenzhen TCL New Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen TCL New Technology Co Ltd filed Critical Shenzhen TCL New Technology Co Ltd
Priority to CN202110898234.2A priority Critical patent/CN113746633B/en
Publication of CN113746633A publication Critical patent/CN113746633A/en
Priority to PCT/CN2022/099279 priority patent/WO2023011016A1/en
Application granted granted Critical
Publication of CN113746633B publication Critical patent/CN113746633B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y30/00IoT infrastructure
    • G16Y30/10Security thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/084Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/48Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications

Abstract

The embodiment of the application discloses a binding method, a binding device, a binding system, a cloud server and a storage medium for Internet of things equipment, wherein a first binding request for the Internet of things equipment initiated by a client can be received, and the client logs in a user account; responding to the first binding request, indicating a second cloud server matched with the Internet of things equipment, and performing identity verification on the first cloud server matched with the client; receiving first authorization authentication information returned by the second cloud server, wherein the first authorization authentication information is sent after the identity of the second cloud server to the first cloud server is verified; and sending second authorization authentication information to the client according to the first authorization authentication information, so that the client sends a second binding request to the second cloud server based on the second authorization authentication information to instruct the second cloud server to generate token information for the user account, and binds the Internet of things equipment based on the token information, thereby improving the binding efficiency of the Internet of things equipment.

Description

Internet of things equipment binding method, device, system, cloud server and storage medium
Technical Field
The application relates to the technical field of communication, in particular to an internet of things device binding method, device and system, a cloud server and a storage medium.
Background
The internet of things (Internet of Things, ioT) is a necessary choice for future interworking of everything, and various factories are dedicated to the interworking of internet of things devices. At present, when a user configures an internet of things device of an internet of things system B through a client of the internet of things system a, user account information between the internet of things system a and the internet of things system B is generally bound based on a predetermined protocol, so that user information exchange is required for the two parties to be docked, mutual trust is required to be achieved based on the two parties, however, the trust is generally ensured through a business contract, so that the device interconnection in the internet of things becomes point-to-point communication, the cost is high, and the efficiency is low.
Disclosure of Invention
The embodiment of the application provides a binding method, a binding device, a binding system, a cloud server and a storage medium for Internet of things equipment, which can improve the binding efficiency of the Internet of things equipment.
The method for binding the Internet of things equipment provided by the embodiment of the application comprises the following steps:
receiving a first binding request for Internet of things equipment initiated by a client, wherein the client logs in a user account;
responding to the first binding request, indicating a second cloud server matched with the Internet of things equipment, and performing identity verification on the first cloud server matched with the client;
Receiving authorization authentication information returned by the second cloud server, wherein the first authorization authentication information is sent after the identity of the second cloud server to the first cloud server is verified;
and sending second authorization authentication information to the client according to the first authorization authentication information, so that the client sends a second binding request to a second cloud server based on the second authorization authentication information, wherein the second binding request is used for indicating the second cloud server to generate token information for the user account, and binding the Internet of things equipment based on the token information.
The embodiment of the application also provides another binding method for the equipment of the Internet of things, which comprises the following steps:
receiving a verification request sent by a first cloud server, wherein the verification request is sent by the first cloud server in response to a first binding request for internet of things equipment initiated by a client, and the client logs in with a user account;
performing identity verification on the first cloud server based on the verification request;
if the identity verification is passed, first authorization authentication information is sent to the first cloud server, so that the first cloud server sends second authorization authentication information to the client;
And responding to the request sent by the client based on the second authorization authentication information, generating token information for the user account, and binding the Internet of things equipment based on the token information.
Correspondingly, the embodiment of the application also provides a binding device for the equipment of the internet of things, which comprises the following components:
the first receiving module is used for receiving a first binding request for the Internet of things equipment initiated by a client, wherein the client logs in a user account;
the response module is used for responding to the first binding request, indicating a second cloud server matched with the Internet of things equipment and carrying out identity verification on the first cloud server matched with the client;
the second receiving module is used for receiving first authorization authentication information returned by the second cloud server, wherein the first authorization authentication information is sent after the identity verification of the second cloud server on the first cloud server is passed;
the first binding module is used for sending second authorization authentication information to the client according to the first authorization authentication information, so that the client sends a second binding request to a second cloud server based on the second authorization authentication information, the second binding request is used for indicating the second cloud server to generate token information for the user account, and binding the internet of things equipment based on the token information.
Correspondingly, another device for binding devices of the internet of things provided by the embodiment of the application comprises:
the third receiving module is used for receiving a verification request sent by a first cloud server, wherein the verification request is a request sent by the first cloud server in response to a first binding request for internet of things equipment initiated by a client, and the client logs in a user account;
the verification module is used for carrying out identity verification on the first cloud server based on the verification request;
the sending module is used for sending first authorization authentication information to the first cloud server if the identity verification is passed, so that the first cloud server sends second authorization authentication information to the client based on the first authorization authentication information;
and the second binding module is used for responding to a second binding request sent by the client based on the authorization authentication information, generating token information for the user account and binding the Internet of things equipment based on the token information.
Correspondingly, the embodiment of the application also provides an internet of things device binding system, which comprises a first cloud server, a second cloud server, a client matched with the first cloud server and internet of things devices matched with the second cloud server, wherein:
The client is used for sending a binding request aiming at the internet of things equipment to the first cloud server, and the client logs in a user account;
the first cloud server is used for responding to the first binding request and sending a verification request to the second cloud server, wherein the verification request carries verification information of the first cloud server;
the second cloud server is used for carrying out identity authentication on the first cloud server based on the authentication information;
the second cloud server is used for returning first authorization authentication information to the first cloud server if the identity verification is passed;
the first cloud server is used for sending second authorization authentication information to the client based on the first authorization authentication information;
the client is used for sending a second binding request to the second cloud server based on the second authorization authentication information;
the second cloud server is used for responding to the second binding request, generating token information for a user account logged in the client based on the second authorization authentication information, and sending the token information to the client;
the second cloud server is used for binding the internet of things equipment based on the token information;
The client is used for binding the user account with the Internet of things device based on the token information.
Correspondingly, the embodiment of the application also provides a cloud server which comprises a memory and a processor; the memory stores a computer program, and the processor is configured to run the computer program in the memory, so as to execute any one of the binding methods of the internet of things device provided by the embodiments of the present application.
Correspondingly, the embodiment of the application also provides a storage medium for storing a computer program, and the computer program is loaded by a processor to execute any of the binding methods of the Internet of things equipment provided by the embodiment of the application.
The embodiment of the application adopts the steps of receiving a first binding request for the Internet of things equipment initiated by a client, wherein the client logs in a user account; responding to the first binding request, indicating a second cloud server matched with the Internet of things equipment, and performing identity verification on the first cloud server matched with the client; receiving first authorization authentication information returned by the second cloud server, wherein the first authorization authentication information is sent after the identity of the second cloud server to the first cloud server is verified; according to the scheme, the user account logged in the client and the Internet of things device are bound through the token information, the binding is carried out under the condition that the user information does not need to be interacted, the fact that the user information does not need to be interacted between the first cloud server and the second cloud server, the binding of the Internet of things device is carried out under the premise that the user information does not need to be interacted between the first cloud server and the second cloud server, and the guarantee through a business contract is not needed is achieved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a scene diagram of an internet of things device binding method provided by an embodiment of the present application;
fig. 2 is a flowchart of an internet of things device binding method provided by an embodiment of the present application;
fig. 3 is another flowchart of an internet of things device binding method provided by an embodiment of the present application;
fig. 4 is another flowchart of an internet of things device binding method provided by an embodiment of the present application;
fig. 5 is a schematic diagram of an internet of things device binding apparatus according to an embodiment of the present application;
fig. 6 is another schematic diagram of an internet of things device binding apparatus according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a cloud server according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The embodiment of the application provides a binding method, a binding device, a binding system, a cloud server and a storage medium for Internet of things equipment. The device for binding the internet of things equipment can be integrated in computer equipment such as a cloud server.
The cloud server may be, but is not limited to, a cloud server that provides cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communications, middleware services, domain name services, security services, content delivery services (Content Delivery Network, CDN), and basic cloud computing services such as big data and artificial intelligence platforms. The cloud server may be a first cloud server or a second cloud server.
Referring to fig. 1, fig. 1 is a schematic view of a scenario of an application of an internet of things device binding method provided by an embodiment of the present application, where the scenario may include a first cloud server, a second cloud server, a client, an internet of things device, and so on. After a user logs in a user account on a client, a first binding request aiming at the Internet of things equipment can be sent to a first cloud server through the client; after receiving the first binding request, the first cloud server can carry a digital certificate issued by a third-party trust authority which is mutually trusted by the first cloud server and the second cloud server, and request the second cloud server to carry out identity verification; the second cloud server performs identity authentication on the first cloud server based on the digital certificate, and if the second cloud server passes the identity authentication on the first cloud server, first authorization authentication information is sent to the first cloud server; after receiving the first authorization authentication information, the first cloud server sends second authorization authentication information to the client; after receiving the second authorization authentication information, the client may request the second cloud server to generate token information for the second cloud server; after generating token information, the second cloud server sends the token information to the client and binds the token information with the Internet of things equipment; after the client receives the token information, binding the token information and a user account logged in the client so as to realize binding of the Internet of things equipment. When a user account logged on a client controls the Internet of things device through the client, the client sends a control instruction carrying token information to a second cloud server, and the second cloud server binds the Internet of things device according to the token information, so that the second cloud server can determine the Internet of things device to be controlled according to the token information and send the instruction to the corresponding Internet of things device.
The first cloud server may be a private cloud server corresponding to the client, that is, the client and the first cloud server may belong to the same internet of things system, and may establish communication connection with the client and perform data interaction. The second cloud server can be a private cloud server corresponding to the internet of things device, namely, the second cloud server and the internet of things device can belong to the same internet of things system, and communication connection can be established with the internet of things device and data interaction can be performed. The first cloud server and the second cloud server may be cloud servers belonging to different internet of things systems, for example, the first cloud server and the second cloud server are private cloud servers provided by different manufacturers.
The client may include a browser application program (may also be referred to as a Web application), an application program (may also be referred to as an APP) on the terminal, an applet, and the like. The internet of things device may be a physical device that can be connected to the internet of things (The Internet of Things, IOT for short), such as a refrigerator, an air conditioner, a television, a sweeping robot, and a smart speaker.
The internet of things can be used for collecting various needed information such as sound, light, heat, electricity, mechanics, chemistry, biology or positions of any object or process needing to be monitored, connected or interacted in real time through various devices and technologies such as various information sensors, radio frequency identification technologies, global positioning systems, infrared sensors or laser scanners, and realizing ubiquitous connection of objects and people through various possible network access, and realizing intelligent sensing, identification and management of objects and processes. The internet of things is an information carrier based on the internet, a traditional telecommunication network and the like, and enables all common physical objects which can be independently addressed to form an interconnection network.
In order to improve efficiency and reliability of data processing by the first cloud server and the second cloud server, the first cloud server may be divided into a first device management unit, a first user management unit, and the like, and the second cloud server may be divided into a second device management unit, a second user management unit, and the like, and each management unit may work in cooperation to process data.
For example, the first cloud server may receive, through the first user management unit, a first binding request for the internet of things device initiated by the client, the first cloud server may send, through the first user management unit, a verification request to the second cloud server in response to the first binding request, and the first cloud server may generate, through the first user management unit, second authorization authentication information based on the received first authorization authentication information and send the second authorization authentication information to the client. The first cloud server may further receive a control instruction sent by the client through the first device management unit, send the control instruction to the internet of things device, control the internet of things device based on the control instruction, and so on.
The second cloud server can receive the verification request sent by the first cloud server through the second user management unit, and perform identity verification on the first cloud server based on the verification request, and if the identity verification is passed, the first authorization authentication information is sent to the first cloud server through the second user management unit. The second cloud server can respond to a second binding request sent by the client through the second device management unit, generate token information for a user account logged in the client, and bind the internet of things device based on the token information. The second cloud server may also receive, through the second device management unit, a control instruction sent by the first device management unit, control the internet of things device through the second device management unit based on the control instruction, and so on.
In the foregoing embodiments, the descriptions of the embodiments are focused, and the portions of an embodiment that are not described in detail may refer to the following detailed description of the binding method of the internet of things device, which is not repeated herein.
It should be noted that, the schematic view of the scenario of the application of the binding method of the internet of things device shown in fig. 1 is only an example, and the application and scenario of the binding method of the internet of things device described in the embodiment of the present application are for more clearly describing the technical solution of the embodiment of the present application, and do not constitute a limitation on the technical solution provided by the embodiment of the present application, and as a person of ordinary skill in the art knows, along with the evolution of the application of the binding method of the internet of things device and the appearance of a new service scenario, the technical solution provided by the embodiment of the present application is applicable to similar technical problems.
The following will describe in detail. The following description of the embodiments is not intended to limit the preferred embodiments.
The embodiment will be described in terms of an internet of things device binding apparatus, which may be specifically integrated in a cloud server, where the cloud server may be a first cloud server.
Referring to fig. 2, fig. 2 is a flowchart of an internet of things device binding method according to an embodiment of the application. The method for binding the internet of things equipment can comprise the following steps:
101. the method comprises the steps that a first cloud server receives a first binding request for Internet of things equipment initiated by a client, and the client logs in a user account.
The first binding request may be a request sent by the client for requesting that a user account logged on the client be bound to the internet of things device.
The user account is an account corresponding to the client, the user account can be obtained by registering in advance through the client, and the first cloud server stores the user account and information corresponding to the user account, for example, user information such as age, gender or constellation of the user, and information such as operation records.
For example, the first cloud server may specifically receive a first binding request for an internet of things device triggered by operations such as clicking or sliding performed by a user on a client. Optionally, the client may display a setting interface including an internet of things device list, where the internet of things device list may include one or more internet of things devices. For example, the internet of things device list includes internet of things device a, internet of things device B, and internet of things device C.
The user may select, in the setting interface, an internet of things device that wants to bind, for example, when the user currently wants to bind the internet of things device a, the user may select, in the setting interface, the internet of things device a by clicking, and generate, from the trigger client, a first binding request for the selected internet of things device a.
Optionally, the client may also receive voice information or gesture information input by the user, and generate a first binding request for the selected internet of things device. For example, the client acquires voice information or gesture information and the like input by the user, determines the internet of things device which the user wants to bind by identifying or confirming the voice information or gesture information and the like, and then generates a first binding request according to the selected internet of things device.
The first cloud server receives the first binding request sent by the client, and specific types, contents and the like of the first binding request can be flexibly set according to actual needs, and the specific types and the contents are not limited herein.
102. And the first cloud server responds to the first binding request, indicates a second cloud server matched with the Internet of things equipment, and performs identity verification on the first cloud server matched with the client.
In the method, after a first binding request is received by a first cloud server, a second cloud server corresponding to the Internet of things device is determined according to the first binding request, and a request is sent to the second cloud server to indicate the second cloud server matched with the Internet of things device, and identity verification is carried out on the first cloud server.
Optionally, the verification request sent by the first cloud server to the first cloud server in response to the first binding request may carry information capable of proving the identity of the first cloud server, the second cloud server may store a white list, the white list includes a trusted object, the second cloud server compares the information carried by the request sent by the first cloud server with the white list, and determines whether the first cloud server exists in the white list, so as to verify the identity of the first cloud server, and improve security.
Optionally, the authentication request sent by the first cloud server to the first cloud server in response to the first binding request may carry authentication information of the first cloud server, and the second cloud server may perform identity authentication on the first cloud server based on the authentication information.
The verification information may be information that the second cloud server uses to verify the identity of the first cloud server, for example, the verification information may be unique identification information of the first cloud server, or a digital certificate granted by an identity authentication authority, or the like.
For example, the digital certificate may be an identity authentication authority trusted by the first cloud server and the second cloud server, and the digital certificate issued to the first cloud server after authenticating the first cloud server.
The first cloud server instructs the second cloud server to perform identity authentication on the first cloud server based on the digital certificate. Because the second cloud server also trusts the identity authentication mechanism, when the second cloud server receives the first digital certificate sent by the first cloud server, the identity of the first cloud server can be confirmed according to the digital certificate, and the identity authentication of the first cloud server is completed.
In the present application, the request sent by the first cloud server to the second cloud server may include, in addition to the verification information of the first cloud server, other information related to the first cloud server, which may enable the second cloud server to perform identity authentication on the first cloud server.
103. If the second cloud server passes the authentication of the first cloud server, the first cloud server receives first authorization authentication information returned by the second cloud server.
The first authorization authentication information may include information required for mutual authentication between the client and the second cloud server, for example, may include a protocol for mutual authentication between the client and the second cloud server, a version number of the protocol, related information of an authorization page for authentication based on the protocol, and the like. In addition, the authorization authentication information may further include other information required for mutual authentication between the client and the second cloud server, which is not limited in the present application.
In an embodiment, the first authorization authentication information may include an identity (e.g., clientid@oauth2) generated by the second cloud server for the first cloud server, a uniform resource locator (Uniform Resource Locator, URL) of the authorization page, and information such as a protocol and version. In addition, the authorization authentication information may further include other information required for mutual authentication between the client and the second cloud server, which is not limited in the present application.
The authorization page may be a web page accessed through a URL, or may be a page displayed through a URL in an Application (APP) corresponding to the second cloud server, or may be a page jumped through a URL in an applet corresponding to the second cloud server, or the like.
In the application, after a second cloud server receives a request sent by a first cloud server, and performs authentication on the first cloud server based on the request and passes the authentication, the second cloud server sends first authorization authentication information to the first cloud server.
The authorization page may be a web page accessed through a URL, or may be a page displayed through accessing the URL in an Application (APP) corresponding to the second cloud server, or may be a page jumped through accessing the URL in an applet corresponding to the second cloud server, or the like.
For example, the specific method can be as follows: if the first cloud server indicates the second cloud server to perform identity authentication, and the identity authentication passes, which means that the first cloud server and the second cloud server trust each other, the second cloud server sends first authorization authentication information to the first cloud server, and the first cloud server receives the first authorization authentication information returned by the second cloud server.
For example, the client and the second cloud server perform mutual authentication through OAuth2.0, and the authorization authentication information returned by the first cloud server to the second cloud server may include OAuth protocol, version of OAuth protocol (e.g. 2.0), and access address (e.g. URL) of the authorization page.
104. And sending second authorization authentication information to the client according to the first authorization authentication information, so that the client sends a second binding request to the second cloud server based on the second authorization authentication information, wherein the second binding request is used for indicating the second cloud server to generate token information for the user account based on the second authorization authentication information, and binding the Internet of things equipment based on the token information.
The token information may be identification information characterizing an object having authority to control the internet of things device, for example, a user account logged on a client sends a control instruction to the internet of things device based on the token information, and the control instruction is legal for the internet of things device and can be executed.
The binding may be a process of establishing an association between the internet of things device and the user account logged in the client by the second cloud server, specifically, taking the identity of the internet of things device in the second cloud server as the serial number of the internet of things device as an example to describe: the second cloud server generates token information aiming at the user account logged in the client, an object for sending a request or an instruction can be determined through the token information, and the second cloud server binds the token information corresponding to the user account logged in the client and the equipment serial number of the Internet of things equipment.
In the embodiment of the application, after the first cloud server receives the first authorization authentication information sent by the second cloud server, the first cloud server generates second authorization authentication information according to the first authorization authentication information, and sends the second authorization authentication information to the client.
In the embodiment of the present application, the second authorization authentication information may include the content of the first authorization authentication information. Optionally, the second authorization authentication information may include other content, such as information related to the first cloud server, in addition to the content including the first authorization authentication information.
For example, the first authorization authentication information includes information such as an identity of the first cloud server (e.g., clientid@oauth2), a uniform resource locator (Uniform Resource Locator, URL) of the authorization page, a protocol and a version, and after the first cloud server receives the first authorization authentication information, the callback address information callback_url of the first cloud server is added on the basis of the first authorization authentication information, so as to generate second authorization authentication information, and the second authorization authentication information is sent to the client.
After receiving the second authorization authentication information, the client authenticates with the second cloud server through the second authorization authentication information, and then sends a second binding request to the second cloud server to request the second cloud server to generate token information for a user account logged on the client according to the second authorization authentication information. After the second cloud server generates token information for the user account logged in the client, the token information is bound with the internet of things device, specifically, the token information and the identity of the internet of things device can be bound, and the token information is sent to the client. And after receiving the token information sent by the second cloud server, the client binds the token information with a user account logged in the client, the second cloud server binds the token information with the Internet of things equipment, the client binds the user account with the token information, the binding process is completed, and the token information is used as an intermediate bridge for binding, so that the binding can be realized without interaction of the user information.
In an embodiment, when a user controls the internet of things through a client, the client sends a control instruction carrying token information to a second cloud server, and the second cloud server determines the internet of things equipment to be controlled by the user according to the token information and sends the control instruction to the internet of things equipment.
In another embodiment, after the second cloud server generates token information for the user account logged in the client, the second cloud server sends the token information to the internet of things device to be bound, and sends the token information to the client, and the client binds the user account and the token information to complete the binding process.
When a user controls the Internet of things through the client, the client sends a control instruction carrying token information to the Internet of things equipment, the Internet of things equipment judges whether the token information in the control instruction is consistent with the stored control instruction, if so, the control instruction is executed, and if not, the control instruction is not executed.
It can be understood that the second cloud server does not acquire the user account information logged in the client, when the second cloud server performs identity verification on the first cloud server, the second cloud server generates token information for the user account logged in the client after verification, and the client accesses the second cloud server through the token information, so that in the binding process, the second cloud server and the internet of things device do not acquire related information of the user account logged in the client, information of the user is not leaked, and information security in the binding process is improved.
In practical application, the first cloud server and the second cloud server may be divided into units according to functions or purposes, etc., loads of the first cloud server and the second cloud server are balanced, and response rates of the first cloud server and the second cloud server are improved, that is, in an embodiment, the first cloud server may include a first device management unit, the second cloud server may include a second device management unit, and after the internet of things device is bound by the internet of things device binding method, the method specifically may include:
receiving a control instruction sent by a client through a first equipment management unit;
and sending the control instruction to the Internet of things equipment through the second equipment management unit by the first equipment management unit so as to control the Internet of things equipment based on the control instruction.
The first device management unit may be a unit in the first cloud server that performs a specific function, for example, a function of receiving a control instruction sent by the client.
The second device management unit may be a unit in the second cloud server that is designated to perform a specific function, for example, may perform a function of transmitting a control instruction to the internet of things device.
The control instruction may be a code that the client tells the internet of things device to perform a specific operation.
For example, the first cloud server may specifically receive, through the first device management unit, a control instruction sent by the client and directed against the internet of things device, store the control instruction in a database or in a cache, where the first device management unit obtains the control instruction from the database or in the cache, sends the control instruction to the second device management unit of the second cloud server, and the second device management unit sends the control instruction to the internet of things device, so that the internet of things performs a corresponding operation based on the control instruction.
In order to reduce data interaction and improve response speed to a control instruction, after receiving the control instruction, the first cloud server directly sends the control instruction to the internet of things device, that is, in an embodiment, the first cloud server includes a first device management unit, and after the internet of things device is bound by the internet of things device binding method, the method specifically may further include:
receiving a control instruction sent by a client through a first equipment management unit;
and sending the control instruction to the Internet of things equipment through the first equipment management unit so as to control the Internet of things equipment based on the control instruction.
For example, the first cloud server may specifically receive, through the first device management unit, a control instruction sent by the client, and send, through the first device management unit, the control instruction to the device of the internet of things, so that the internet of things performs a corresponding operation based on the control instruction.
In an embodiment, the client may generate the control instruction in response to the operation of the user, and directly send the control instruction to the internet of things device, so that the internet of things performs the corresponding operation based on the control instruction.
As can be seen from the above, the embodiment of the present application may receive a first binding request for an internet of things device initiated by a client, where the client logs in with a user account; responding to the first binding request, indicating a second cloud server matched with the Internet of things equipment, and performing identity verification on the first cloud server matched with the client; receiving first authorization authentication information returned by the second cloud server, wherein the first authorization authentication information is sent after the identity of the second cloud server to the first cloud server is verified; and sending second authorization authentication information to the client based on the first authorization authentication information, so that the client sends a second binding request to the second cloud server based on the second authorization authentication information, wherein the second binding request is used for indicating the second cloud server to generate token information for the user account based on the second authorization authentication information, and binding the Internet of things equipment based on the token information. According to the scheme, the user account logged in the client can be bound to the Internet of things equipment on the premise that user information does not need to be interacted between the first cloud server and the second cloud server and the business contract is not required to be guaranteed, and the binding efficiency of the Internet of things equipment is improved.
On the basis of the above embodiments, examples will be described in further detail below.
The embodiment will be described in terms of an internet of things device binding apparatus, which may be specifically integrated in a cloud server, and the cloud server may be a second cloud server.
The method for binding the internet of things equipment provided by the embodiment of the application can be executed by the second cloud server, and as shown in fig. 3, the specific flow of the method for binding the internet of things equipment can be as follows:
201. receiving an authentication request sent by a first cloud server, wherein the authentication request is sent by the first cloud server in response to a first binding request for internet of things equipment initiated by a client, and the client logs in with a user account.
The first cloud server and the second cloud server may be the first cloud server mentioned in the above embodiment. For example, the first cloud server and the second cloud server may be private cloud servers provided by different vendors.
The verification request may be request information sent by the first cloud server and used for requesting the second cloud server to perform identity verification.
For example, the specific method can be as follows: the first cloud server may respond to the binding request sent by the client for the internet of things device, generate a verification request, and send the verification request to the second cloud server, where the second cloud server may receive the verification request sent by the first cloud server.
202. And carrying out identity verification on the first cloud server based on the verification request.
For example, after receiving the verification request sent by the first cloud server, the first cloud server performs identity verification on the first cloud server according to information carried by the verification request, for example, the first cloud server may carry an identifier, the second cloud server compares the identifier with a preset identifier list according to the identifier, if the identifier list includes the identifier, the verification of the first cloud server passes, and if the identifier list does not include the identifier, the verification of the first cloud server does not pass.
In order to prevent the situation that the identification information is modified to obtain the trust of the second cloud server, the security and reliability of the identity verification are improved, the verification request may further carry verification information, where the verification information may be information that the second cloud server is used to verify the identity of the first cloud server, for example, may be a digital certificate provided by a third party trust authority, that is, in an embodiment, the step of "receiving the verification request sent by the first cloud server, and performing identity verification on the first cloud server based on the verification request" may specifically include:
receiving a verification request sent by a first cloud server based on a binding request of a response client, wherein the verification request carries verification information of the first cloud server;
And carrying out identity verification on the first cloud server based on the verification information.
The verification information may be information that the second cloud server uses to verify the identity of the first cloud server, for example, unique identification information of the first cloud server, or a digital certificate granted by an identity authentication authority.
For example, the user may specifically trigger a binding request to send to the first cloud server at the client, where the first cloud server responds to the request to send an authentication request to the second cloud server, where the authentication request carries authentication information.
And after receiving the verification request, the second cloud server verifies the first cloud server according to verification information carried by the request.
In an embodiment, the verification information may be an identity authentication authority trusted by the first cloud server and the second cloud server together, and after authenticating the first cloud server, the digital certificate issued to the first cloud server.
Because the second cloud server trusts the identity authentication mechanism, when the second cloud server receives the digital certificate, the first cloud server can be determined to be trusted according to the digital certificate, namely, the second cloud server passes the verification of the first cloud server.
203. And if the identity verification is passed, the first authorization authentication information is sent to the first cloud server, so that the first cloud server sends the second authorization authentication information to the client based on the first authorization authentication information.
The first authorization authentication information may be information required for mutual authentication between the client and the second cloud server, for example, information such as a protocol for mutual authentication between the client and the second cloud server, a version number of the protocol, an authorization page for providing mutual authentication, and the like.
Wherein the second authorization authentication information may include contents of the first authorization authentication information. Optionally, the second authorization authentication information may include other content besides the content of the first authorization authentication information, for example, related information of the first cloud server.
For example, the first authorization authentication information includes information such as an identity of the first cloud server (e.g., clientid@oauth2), a uniform resource locator (Uniform Resource Locator, URL) of the authorization page, a protocol and a version, and after the first cloud server receives the first authorization authentication information, the callback address information callback_url of the first cloud server is added on the basis of the first authorization authentication information, so as to generate second authorization authentication information, and the second authorization authentication information is sent to the client.
For example, if the second cloud server passes the verification of the first cloud server, the first cloud server sends first authorization authentication information to the first cloud server, so that the first cloud server adds callback address information of the first cloud server on the basis of the first authorization authentication information to generate second authorization authentication information, and sends the second authorization authentication information to the client.
204. And responding to a second binding request sent by the client based on the second authorization authentication information, generating token information for the user account, and binding the Internet of things equipment based on the token information.
For example, after the first cloud server sends the second authorization authentication information to the client, the user account logged on the client authenticates the second cloud server with the content included in the second authorization authentication information, and then sends a second binding request to the second cloud server.
The second cloud server responds to a second binding request sent by the terminal, generates token information for a user account logged on the client, and binds the token information with the internet of things device requested to be bound by the client, and specifically, binds the token information with a device identifier of the internet of things device.
In an embodiment, the step of "responding to the second binding request sent by the client based on the second authorization authentication information to generate token information for the user account and bind the internet of things device based on the token information" may specifically include:
receiving the feedback agreeing binding information based on the second authorization authentication information sent by the first cloud server by the client;
Based on the consent binding information, generating token information aiming at the user account, and sending the token information to the client so that the client binds the user account with the Internet of things equipment based on the token information;
binding the internet of things equipment based on the token information.
The binding agreement information may be information indicating that the client agrees to bind with the internet of things device, for example, information indicating that the client agrees to bind with the internet of things device is 1, information indicating that the client does not agree to bind with the internet of things device is 0, that is, if the user agrees to bind, the binding agreement information is 1.
For example, specifically, if the second cloud server verifies that the first cloud server passes, the first cloud server sends first authorization authentication information to the first cloud server, the first cloud server sends second authorization authentication information to the client based on the first authorization authentication information, the client accesses the authorization webpage according to the URL of the authorization webpage in the second authorization authentication information, the user performs binding confirmation on the authorization webpage, and the client responds to the confirmation operation of the user on the authorization webpage and sends consent binding information to the second cloud server.
The second cloud server can generate token information according to the binding agreement information, bind the token information with the Internet of things equipment requested to be bound by the client, and send the token information to the client, so that the client binds the token information with a user account logged on the client after receiving the token information.
In an embodiment, the step of binding the internet of things device based on the token information may specifically include:
responding to an information acquisition request sent by the client carrying token information, generating equipment binding information, and sending the equipment binding information to the client;
if the information returned by the client is matched with the device binding information, binding the Internet of things device based on the token information.
Wherein the information acquisition request may be a request for requesting the second cloud server to generate device binding information.
The device binding information may be a device binding code, and specific types and content included in the device binding information may be flexibly set according to actual needs, and in particular, the device binding information is not limited herein, and for example, the device binding information may be in a form of a string of numbers or a string of characters, etc.
For example, the client may specifically initiate an information acquisition request for acquiring the device binding information to the second cloud server with the token information, that is, request the second cloud service to generate the device binding information.
The second cloud server can verify the identity of the object sending the information acquisition request according to the token information carried by the received information acquisition request, and if the verification is passed, corresponding equipment binding information is generated and sent to the client.
The user can check the device binding information through the client, input the acquired device binding information through a user interface provided by the client, and return the information input by the user to the second cloud server in response to the input operation of the user. And the second cloud server compares the information returned by the client and the self-generated device binding information, and if the information is consistent with the self-generated device binding information, the token information is bound with the device of the Internet of things requested to be bound by the client.
Optionally, in order to improve security, an expiration date may be set for the device binding information, and if the client sends the device binding information outside the expiration date, the second cloud server determines that the device binding information sent by the terminal is invalid information, and does not bind the internet of things device.
In one embodiment, the step of "sending token information to the client" may specifically include:
obtaining callback address information of a first cloud server;
and sending the token information to the first cloud server based on the callback address information.
The callback address information may be address information of the first cloud server, and is used for indicating the second cloud server to return token information based on the callback address information.
For example, the first cloud server may obtain callback address information, send the callback address information and the first authorization authentication information to the client, so that the client accesses the authorization page according to the received second authorization authentication information, the authorization page may include a confirmation control, the confirmation control may be used for binding confirmation by user operation, the client responds to the operation of the user on the confirmation control in the authorization page, for example, may click on the confirmation control to trigger the control, send binding approval information to the second cloud server, and send the callback address information.
And the second cloud server sends the token information to the first cloud server according to the callback address information.
In practical application, the first cloud server and the second cloud server may be divided into units according to functions or purposes, etc., loads of the first cloud server and the second cloud server are balanced, and response rates of the first cloud server and the second cloud server are improved, that is, in an embodiment, the first cloud server may include a first device management unit, and after binding the internet of things device, the method for binding the internet of things device may specifically further include:
receiving a control instruction sent by a first equipment management unit;
And controlling the Internet of things equipment based on the control instruction.
The first device management unit may be a unit in the first cloud server that performs a specific function, for example, may perform a function of transmitting a control instruction transmitted from the client to the second cloud server.
For example, the second cloud server may specifically receive a control instruction sent by the first device management unit of the first cloud server, and send the control instruction to the internet of things device, so that the internet of things device performs a corresponding operation based on the received control instruction.
Alternatively, the second cloud server may include a second device management unit, which may be a unit in the second cloud server designated to perform a specific function, for example, a function of receiving a control instruction sent by the first device management unit of the first cloud server and sending the control instruction to the internet of things device to control the internet of things device may be performed.
For example, the second cloud server may specifically receive, through the second device management unit, a control instruction sent by the first device management unit of the first cloud server, and send, through the second device management unit, the control instruction to the internet of things device, so that the internet of things device performs a corresponding operation based on the received control instruction.
In the foregoing embodiments, the descriptions of the embodiments are focused, and the portions of an embodiment that are not described in detail may be referred to the above detailed description of the binding method of the internet of things device, which is not repeated herein.
As can be seen from the above, in the embodiment of the present application, by receiving the verification request sent by the first cloud server, the verification request is sent by the first cloud server in response to the first binding request sent by the client, where the client logs in with the user account; performing identity verification on the first cloud server based on the verification request; if the identity verification is passed, the first authorization authentication information is sent to the first cloud server, so that the first cloud server generates second authorization authentication information based on the first authorization authentication information, and the second authorization authentication information is sent to the client; and responding to a second binding request sent by the client based on the second authorization authentication information, generating token information for the user account, and binding the Internet of things equipment based on the token information. According to the scheme, the fact that the first cloud server and the second cloud server do not need to interact with user information and binding of the Internet of things equipment is achieved on the premise that the business contract is not required to guarantee, and binding efficiency of the Internet of things equipment is improved.
On the basis of the above embodiments, examples will be described in further detail below.
The embodiment will be described in terms of an internet of things device binding system, where the internet of things device binding system includes a first cloud server, a second cloud server, a client matched with the first cloud server, and an internet of things device matched with the second cloud server, where,
the client may be configured to send a first binding request for the internet of things device to the first cloud server.
The first cloud server may be configured to send, in response to the binding request, an authentication request to the second cloud server, where the authentication request carries authentication information of the first cloud server, and the client logs in with a user account.
The second cloud server may be configured to perform authentication on the first cloud server based on the authentication information.
The second cloud server may be configured to return the first authorization authentication information to the first cloud server if the authentication passes.
The first cloud server may be configured to send second authorization authentication information to the client based on the first authorization authentication information.
The client may be configured to send a second binding request to a second cloud server based on the second authorization authentication information.
The second cloud server may be configured to generate token information for a user account logged in to the client based on the authorization authentication information in response to the second binding request, and send the token information to the client.
The second cloud server can be used for binding the internet of things equipment based on the token information;
the client may be configured to bind the user account with the internet of things device based on the token information.
The meaning of the noun is the same as that in the above-mentioned binding method of the internet of things device, and specific implementation details can refer to the detailed description in the embodiment of the binding method of the internet of things device.
Specifically, based on the above-mentioned internet of things device binding system, the specific flow of the internet of things device binding method provided by the embodiment of the application may be as follows, as shown in fig. 4:
301. and the client establishes connection with the Internet of things equipment.
For example, the internet of things device may be in a network configuration state, the client may search for the internet of things device, configure with the internet of things device, and verify the client by using the internet of things device, for example, the client sends a first digital certificate to the internet of things device, where the first digital certificate may be a first digital certificate granted to the client by a third party certification authority that is trusted by the internet of things device and the client together, and when the internet of things device trusts the third party certification authority, the identity of the client may be confirmed and mutual authentication is completed after receiving the first digital certificate sent by the client.
For example, the client sends authentication information to the internet of things device, the authentication information may be identification information of the internet of things device, such as a PIN code (Personal identification number, abbreviated as PIN), or a key, the internet of things device compares the authentication information sent by the client according to preset authentication information, if the authentication information is consistent with the PIN code, authentication of the client is completed, and the client establishes a connection with the internet of things device.
The internet of things device may send information required for binding to the client, for example, an identity of the client is required, and the client may generate an identity (clientid@oauth2) for the first cloud server by using the second cloud server in the first authorization authentication information in a subsequent binding process, and send the identity as an identity of the client to the internet of things device.
Optionally, the client discovers the internet of things device, and may display a connection page, where the connection page is used for a user to perform a confirmation operation to confirm connection, and the client responds to the confirmation operation of the user on the connection page and configures with the internet of things device.
The network configuration state may be a state that the internet of things device waits for association with the client.
The network allocation modes of the configuration of the client and the internet of things device can be a broadcast packet mode, a multicast address mode, a device hot spot network allocation, a Bluetooth network allocation, a mobile phone hot spot network allocation, a router network allocation and the like, and the communication modes of the internet of things device and the associated client are determined by different network allocation modes, for example, the client and the internet of things device are configured in the router network allocation mode, and communication between the client and the internet of things device is realized through a local area network.
302. The client sends a first binding request to a first user management unit of a first cloud server.
For example, the client may specifically initiate a first binding request to a first user management unit of the first cloud server.
303. The first user management unit of the first cloud server responds to the first binding request of the client and sends an identity verification request to the second user management unit of the second cloud server.
For example, the first user management unit of the first cloud server may initiate an authentication request to the second user management unit of the second cloud server after receiving the first binding request sent by the client, so as to perform mutual authentication with the second cloud server.
For example, the transmitted authentication request of the first cloud server may carry a second digital certificate, where the second digital certificate may be a third party certificate authority trusted by both the first cloud server and the second cloud server, granting the digital certificate of the first cloud server.
304. And the second user management unit of the second cloud server performs identity verification on the first cloud server.
For example, the second user management unit of the second cloud server may specifically perform authentication on the first cloud server through the second digital certificate sent by the first user management unit of the first cloud server, and if the second digital certificate is granted by a commonly trusted third party authority, the authentication on the first cloud server is passed. If the second digital certificate is not granted by a co-trusted third party authority, the authentication of the first cloud server is not passed.
305. And if the verification is passed, the second user management unit of the second cloud server returns the first authorization authentication information to the first user management unit of the first cloud server.
If the second cloud server passes the verification of the first cloud server, the first authorization authentication information is returned to the first user management unit of the first cloud server, wherein the first authorization authentication information can comprise a protocol for mutual authentication between the client and the second cloud server, a version number of the protocol, related information of an authorization page for providing mutual authentication, and the like. For example, the client and the second cloud server perform mutual authentication through OAuth2.0, and the first cloud server receives the identity identifier generated by the second cloud server for the first cloud server and returned by the second cloud server, and the authorization authentication information may include OAuth protocol, version 2.0, access address of authorization page, and the like.
If the verification is not passed, the second cloud server does not return authorization authentication information to the first cloud server, and the second cloud server can also send prompt information that the identity authentication is not passed to the client.
306. And the first user management unit of the first cloud server sends the first authorization authentication information and the callback address information to the client.
For example, the first user management unit of the first cloud server may specifically obtain callback address information of the first cloud server, and send the first authorization authentication information and the callback address information to the client.
307. And the client accesses the authorization page according to the first authorization authentication information.
For example, the client may specifically access the authorization page according to an access address (URL) of the authorization page in the first authorization authentication information, for example, access the authorization page pointed by the URL through a browser, or skip to the authorization page in the app corresponding to the second cloud server according to the URL, or skip to the authorization page in the applet corresponding to the second cloud server according to the URL.
The user can input an account number and a password on the authorization page, wherein the account number and the password can be an account number and a password applied by the user aiming at the second cloud server, and the user indicates that the user account number logged in the client is authorized to access the appointed information of the first cloud server through inputting the account number and the password. And after the second cloud server verifies the account number and the password, generating token information for the user account number logged in the client.
Optionally, before binding a user account (for distinguishing, hereinafter referred to as a first user account) logged in a client with an internet of things device, the internet of things device and a user account (the user account is an account input by a user on an authorization page, for distinguishing, hereinafter referred to as a second user account) registered by a second cloud server may be bound first, when the first user account logged in the client sends an instruction to the internet of things device, the internet of things device may synchronize the instruction to corresponding data of the second user account in the second cloud server, specifically, the second user account and the internet of things device may be bound first, and then the first user account and the internet of things device may be bound, so that even if the internet of things device is controlled by user accounts of different internet of things systems, the second cloud server may also obtain information that the internet of things device is controlled, and a worker of a manufacturer corresponding to the second cloud server may timely obtain a control situation of the internet of things device, so as to prevent an attack operation on the internet of things device in time, and improve security of the internet of things device.
308. The client generates an information acquisition request in response to a user based on a confirmation operation for the authorization page.
For example, after the user inputs the second user account and the password of the second user account in the authorization page, determining the confirmation control, for example, clicking the confirmation control, responding to the confirmation operation of the user on the authorization page by the terminal, obtaining the second user account and the password input by the user, sending a request to the second device management unit, after the second device management unit verifies the second user account and the password, returning a temporary token to the client in response to the request, where the temporary token may be a code, after the client receives the code, obtaining token information from the second device management unit based on the code and callback address information, where the token information may be token, and sending the token information to the client by the second user management unit of the second cloud server according to the temporary token and based on the address indicated by the callback address information.
The client generates an information acquisition request based on the token information, the information acquisition request carrying the token information.
309. The client sends an information acquisition request to the second device management unit.
For example, the client may specifically send an information acquisition request to the second device management unit with the token information.
310. And the second device management unit of the second cloud server responds to the information acquisition request and sends device binding information to the client.
For example, the client may specifically initiate a request for obtaining device binding information to the second device management unit of the second cloud server based on the token information, that is, request the second device management unit to generate the device binding information. And the second equipment management unit checks whether the token information is legal or not, if so, generates equipment binding information and sends the equipment binding information to the client.
311. And the client sends the device binding information to the Internet of things device.
For example, the client may specifically display the device binding information after receiving the device binding information, and display a user interface for inputting information based on the received device binding information, where the client responds to an input operation of the user, obtains information input by the user, and sends the information to the internet of things device.
312. And the internet of things device sends the device binding information to a second device management unit of the second cloud server.
For example, the internet of things device may specifically send information input by the user and sent by the client to the second device management unit of the second cloud server.
313. And binding the Internet of things equipment by a second equipment management unit of the second cloud server.
For example, the second device management unit may compare the information input by the user and sent by the internet of things device with the generated device binding information, and if the information sent by the internet of things device is consistent with the generated device binding information, the second cloud server binds token information generated for the first user account logged in the client with the internet of things device.
Optionally, after the second cloud server binds the token information and the internet of things device, a prompt message of successful binding is returned to the client, the client responds to the prompt message and binds the first user account logged in the client with the token information, and it can be understood that the first user account logged in the client is bound with the internet of things device by taking the token information as an intermediate bridge, and the first user account-token information and the token information-the internet of things device are indirectly bound with the internet of things device by binding.
Optionally, in order to improve security, an expiration date may be set for the token information, and when the token information fails, the user may bind the internet of things device again through the above manner, where the second cloud server and the client may update the binding relationship accordingly.
Alternatively, the validity period of the token information may be updated each time the user accesses the second cloud server or controls the internet of things device through the token information, for example, if the user does not access the second cloud server for 48 hours continuously, the token information is disabled, and when the user accesses within 48 hours, the validity period is updated again to 48 hours.
314. And the client responds to the control operation of the user and generates a control instruction.
For example, the control operation for the internet of things device may be executed by receiving a control instruction of the user in a display page of the client, where the client responds to the control operation of the user to generate a control instruction carrying token information corresponding to a user account logged in the client. For example, when the internet of things device is an air conditioner, in a display page of a client for air conditioner control, an adjustment operation for temperature, an operation mode, wind speed and other operation parameters of the air conditioner input by a user can be received, and a control instruction carrying token information is generated based on the adjustment operation. For example, when the internet of things device is a television, in a display page of a client for television control, an adjustment operation of operating parameters such as volume, program switching, brightness and the like of the television input by a user can be received, and a generation control instruction of token information corresponding to a user account logged in the client is carried based on the adjustment operation.
315. And the client sends the control instruction to a second device management unit of the second cloud server.
For example, the client may specifically send the control instruction to the second device management unit of the second cloud server.
316. And the second equipment management unit of the second cloud server sends the control instruction to the equipment of the Internet of things.
For example, the second device management unit may specifically determine, according to the token information carried in the control instruction and the binding relationship between the token information and the internet of things device, the internet of things device to be controlled by the control instruction, and send the control instruction to the corresponding internet of things device.
317. And the Internet of things equipment executes corresponding operation according to the received control instruction.
For example, the internet of things device may specifically execute corresponding operations according to the received control instruction.
For example, when the internet of things device is an air conditioner, the air conditioner may adjust the temperature according to the received temperature adjustment instruction (i.e., the control instruction). For another example, when the internet of things device is a television, the television may adjust the volume according to the received volume adjustment instruction (i.e., the control instruction).
As can be seen from the above, in the embodiment of the present application, the client and the internet of things device establish a connection, the client may send a binding request to the first user management unit of the first cloud server, the first user management unit of the first cloud server responds to the first binding request of the client, an authentication request is initiated to the second user management unit of the second cloud server, the second user management unit of the second cloud server performs authentication on the first cloud server, if the authentication is passed, the second user management unit of the second cloud server returns a first authorization authentication information to the first user management unit of the first cloud server, the first user management unit of the first cloud server sends a first authorization authentication information and callback address information to the client, the client accesses an authorization page according to the first authorization authentication information, the client sends an information acquisition request to the second device management unit according to a confirmation operation for the authorization page, the second device management unit of the second cloud server responds to the information acquisition request, the second device binding information is sent to the client, the client sends a device binding information to the first device to the internet of things device to the first device, the second device is controlled by the internet of things device to the second device, the first device is controlled by the internet of things device receives an instruction from the second device, the internet of things device is controlled by the second device to control the internet of things device, the second device is controlled by the internet of things device to send the second device binding information to the second device, and the internet of things device is controlled by the internet of things device, and the Internet of things equipment executes corresponding operation according to the received control instruction. According to the scheme, user information does not need to be interacted between the first cloud server and the second cloud server, and the Internet of things equipment is bound on the premise that the business contract is not required to be guaranteed, so that the safety of user privacy is guaranteed, the binding efficiency of the Internet of things equipment is improved, and the safety of data interaction is improved.
In order to facilitate better implementation of the binding method of the internet of things equipment provided by the embodiment of the application, in an embodiment, an internet of things equipment binding device is also provided. The meaning of the noun is the same as that in the above-mentioned binding method of the internet of things equipment, and specific implementation details can refer to the description in the method embodiment.
The device for binding the internet of things equipment can be specifically integrated in a cloud server, the cloud server can be a first cloud server, as shown in fig. 5, and the device for binding the internet of things equipment can comprise: the first receiving module 401, the response module 402, the second receiving module 403, the first binding module 404, etc. may specifically be as follows:
the first receiving module 401: the method comprises the steps of receiving a first binding request for the Internet of things equipment initiated by a client, wherein the client logs in a user account.
Response module 402: and the cloud server is used for responding to the first binding request, indicating a second cloud server matched with the Internet of things equipment and carrying out identity verification on the first cloud server matched with the client.
Optionally, the response module 402 may include a sending sub-module and an indicating sub-module, specifically:
and a transmitting sub-module: and the method is used for responding to the first binding request and sending a verification request to the second cloud server, wherein the verification request carries verification information of the first cloud server matched with the client.
An indication sub-module: and the authentication module is used for indicating the second cloud server according to the authentication request and carrying out identity authentication on the first cloud server based on the authentication information.
The second receiving module 403: and the first authorization authentication information is sent after the identity verification of the second cloud server on the first cloud server is passed.
The first binding module 404: the method comprises the steps that second authorization authentication information is sent to a client according to the first authorization authentication information, so that the client sends a second binding request to a second cloud server based on the second authorization authentication information, the second binding request is used for indicating the second cloud server to generate token information for a user account, and the Internet of things device is bound based on the token information.
Optionally, the first binding module 404 may include an acquisition sub-module and a sending sub-module, specifically:
and (3) an acquisition sub-module: for obtaining callback address information.
The generation module is used for: generating second authorization authentication information based on the first authorization authentication information;
an information generation module: generating second authorization authentication information based on the first authorization authentication information and the callback address information;
and a transmitting sub-module: and the callback address information is used for indicating the second cloud server to return token information.
Optionally, the internet of things device binding apparatus may include a fourth receiving module and a second sending module, specifically:
a fourth receiving module: and the control instruction is used for receiving the control instruction sent by the client through the first equipment management unit.
And a second receiving module: the control device is used for sending the control instruction to the Internet of things device through the first device management unit and the second device management unit so as to control the Internet of things device based on the control instruction.
Optionally, the internet of things device binding apparatus may include a fifth receiving module and a third sending module, specifically:
and a fifth receiving module: and the control instruction is used for receiving the control instruction sent by the client through the first equipment management unit.
And a third receiving module: the control instruction is sent to the Internet of things equipment through the first equipment management unit so as to control the Internet of things equipment based on the control instruction.
As can be seen from the above, in the embodiment of the present application, the first binding request for the internet of things device initiated by the client is received through the first receiving module 401, and the client logs in with the user account; responding to the first binding request through the response module 402, indicating a second cloud server matched with the Internet of things equipment, and performing identity verification on the first cloud server matched with the client; the second receiving module 403 receives the first authorization authentication information returned by the second cloud server; the first binding module 404 is used for sending the second authorization authentication information to the client based on the first authorization authentication information, so that the client sends a second binding request to the second cloud server based on the second authorization authentication information, the second binding request is used for indicating the second cloud server to generate token information for the user account and binding the internet of things equipment based on the token.
In order to facilitate better implementation of the binding method of the internet of things equipment provided by the embodiment of the application, in an embodiment, an internet of things equipment binding device is also provided. The meaning of the noun is the same as that in the above-mentioned binding method of the internet of things equipment, and specific implementation details can refer to the description in the method embodiment.
The device for binding the internet of things equipment can be specifically integrated in a cloud server, the cloud server can be a second cloud server, as shown in fig. 6, and the device for binding the internet of things equipment can comprise: the third receiving module 501, the verifying module 502, the sending module 503, the second binding module 504, etc. may specifically be as follows:
third receiving module 501: the method comprises the steps that a verification request sent by a first cloud server is received, the verification request is sent by the first cloud server in response to a first binding request, initiated by a client, aiming at the Internet of things equipment, and the client logs in a user account.
The verification module 502: and the authentication module is used for carrying out identity authentication on the first cloud server based on the authentication request.
Optionally, the verification module 502 may include a sending sub-module and a verification sub-module, specifically:
and a transmitting sub-module: the method comprises the steps that a first cloud server receives a verification request sent by the first cloud server based on a first binding request of a response client, wherein the verification request carries verification information of the first cloud server.
And (3) a verification sub-module: and the authentication module is used for carrying out identity authentication on the first cloud server based on the authentication information.
The sending module 503: and if the identity verification is passed, the first authorization authentication information is sent to the first cloud server, so that the first cloud server sends second authorization authentication information to the client based on the first authorization authentication information.
The second binding module 504: and the system is used for responding to a request sent by the client based on the second authorization authentication information, generating token information for the user account and binding the Internet of things equipment based on the token information.
Optionally, the second binding module 504 may include a receiving sub-module and a generating sub-module, specifically:
the receiving submodule: and the client is used for receiving the feedback consent binding information based on the second authorization authentication information sent by the first cloud server.
Generating a submodule: the method comprises the steps that based on binding agreement information, token information is generated for a user account, and the token information is sent to a client, so that the client binds the user account with the Internet of things equipment based on the token information;
binding the internet of things equipment based on the token information.
Optionally, the generating submodule is specifically configured to: responding to an information acquisition request sent by the client carrying token information, generating equipment binding information, and sending the equipment binding information to the client;
If the information returned by the client is matched with the device binding information, binding the Internet of things device based on the token information.
Optionally, the generating submodule is specifically configured to:
and acquiring callback address information of the first cloud server.
And sending the token information to the first cloud server based on the callback address information, so that the first cloud server sends the token information to the client.
Optionally, the internet of things device binding apparatus may include a sixth receiving module and a control module, specifically:
a sixth receiving module: and the control instruction is used for receiving the control instruction sent by the first equipment management unit.
And the control module is used for: the control method is used for controlling the Internet of things equipment based on the control instruction.
As can be seen from the above, in the embodiment of the present application, the third receiving module 501 receives the verification request sent by the first cloud server; performing identity verification on the first cloud server based on the verification request through a verification module 502; if the authentication passes, the sending module 503 sends the first authorization authentication information to the first cloud server, so that the first cloud server sends the second authorization authentication information to the client based on the first authorization authentication information; and generating token information for the user account by the second binding module 504 in response to a second binding request sent by the client based on the second authorization authentication information, and binding the internet of things device based on the token information. According to the scheme, the fact that the first cloud server and the second cloud server do not need to interact with user information and binding of the Internet of things equipment is achieved on the premise that the business contract is not required to guarantee, and binding efficiency of the Internet of things equipment is improved.
The embodiment of the application also provides a cloud server, which may be a first cloud server or a second cloud server, as shown in fig. 7, which shows a schematic structural diagram of the cloud server according to the embodiment of the application, specifically:
the cloud server may include one or more processors 1001 of a processing core, one or more memories 1002 of a computer readable storage medium (which may also be referred to as a storage medium), a power supply 1003, and an input unit 1004, and the like. Those skilled in the art will appreciate that the cloud server architecture shown in fig. 7 is not limiting of the cloud server and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components. Wherein:
the processor 1001 is a control center of the cloud server, connects respective parts of the entire cloud server using various interfaces and lines, and performs various functions of the cloud server and processes data by running or executing software programs and/or modules stored in the memory 1002 and calling data stored in the memory 1002, thereby performing overall monitoring of the cloud server. Optionally, the processor 1001 may include one or more processing cores; preferably, the processor 1001 may integrate an application processor and a modem processor, wherein the application processor mainly processes an operating system, a user interface, a computer program, and the like, and the modem processor mainly processes wireless communication. It will be appreciated that the modem processor described above may not be integrated into the processor 1001.
The memory 1002 may be used to store software programs and modules, and the processor 1001 executes various functional applications and data processing by executing the software programs and modules stored in the memory 1002. The memory 1002 may mainly include a stored program area that may store an operating system, computer programs required for at least one function (such as a sound playing function, an image playing function, etc.), and a stored data area; the storage data area may store data created according to the use of the cloud server, or the like. In addition, memory 1002 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device. Accordingly, the memory 1002 may also include a memory controller to provide the processor 1001 with access to the memory 1002.
The cloud server further includes a power supply 1003 for supplying power to the respective components, and preferably, the power supply 1003 may be logically connected to the processor 1001 through a power management system, so that functions of managing charging, discharging, and power consumption management are implemented through the power management system. The power supply 1003 may also include one or more of any of a direct current or alternating current power supply, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
The cloud server may further include an input unit 1004, which input unit 1004 may be used to receive input numeric or character information and to generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control.
Although not shown, the cloud server may further include a display unit or the like, which is not described herein. In particular, in this embodiment, the processor 1001 in the cloud server loads executable files corresponding to the processes of one or more computer programs into the memory 1002 according to the following instructions, and the processor 1001 executes the computer programs stored in the memory 1002, so as to implement various functions as follows:
when the cloud server is a first cloud server, a first binding request for the internet of things device initiated by the client can be received; responding to the first binding request, indicating a second cloud server matched with the Internet of things equipment, and performing identity verification on the first cloud server matched with the client; receiving first authorization authentication information returned by the second cloud server, wherein the first authorization authentication information is sent after the identity of the second cloud server to the first cloud server is verified; and sending second authorization authentication information to the client according to the first authorization authentication information, so that the client sends a second binding request to the second cloud server based on the second authorization authentication information, wherein the second binding request is used for indicating the second cloud server to generate token information for a user account, and binding the Internet of things equipment based on the token information.
When the cloud server is a second cloud server, a verification request sent by the first cloud server can be received, the verification request is sent by the first cloud server in response to a first binding request, initiated by a client, for the internet of things device, and the client logs in with a user account; performing identity verification on the first cloud server based on the verification request; if the identity verification is passed, the first authorization authentication information is sent to the first cloud server, so that the first cloud server sends second authorization authentication information to the client based on the first authorization authentication information; and responding to a second binding request sent by the client based on the second authorization authentication information, generating token information for the user account, and binding the Internet of things equipment based on the token information.
According to one aspect of the present application, there is provided a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The computer instructions are read from the computer-readable storage medium by a processor of the cloud server, and executed by the processor, cause the cloud server to perform the methods provided in the various alternative implementations of the embodiments described above.
It will be appreciated by those of ordinary skill in the art that all or part of the steps of the various methods of the above embodiments may be performed by a computer program, or by computer program control related hardware, which may be stored in a computer readable storage medium and loaded and executed by a processor.
To this end, an embodiment of the present application provides a storage medium in which a computer program is stored, where the computer program can be loaded by a processor to execute any one of the binding methods for the internet of things device provided by the embodiment of the present application.
The specific implementation of each operation above may be referred to the previous embodiments, and will not be described herein.
Wherein the storage medium may include: read-only memory (ROM, readOnlyMemory), random access memory (RAM, randomAccessMemory), magnetic or optical disk, and the like.
The steps in any of the binding methods of the internet of things devices provided by the embodiments of the present application can be executed by the computer program stored in the storage medium, so that the beneficial effects that any of the binding methods of the internet of things devices provided by the embodiments of the present application can be achieved, and detailed descriptions of the previous embodiments are omitted herein.
The method, the device, the system, the cloud server and the storage medium for binding the internet of things equipment provided by the embodiment of the application are described in detail, and specific examples are applied to the principle and the implementation mode of the application, and the description of the embodiment is only used for helping to understand the method and the core idea of the application; meanwhile, as those skilled in the art will have variations in the specific embodiments and application scope in light of the ideas of the present application, the present description should not be construed as limiting the present application.

Claims (16)

1. The method for binding the equipment of the Internet of things is characterized by comprising the following steps of:
receiving a first binding request for Internet of things equipment initiated by a client, wherein the client logs in a user account;
responding to the first binding request, and sending a verification request to a second cloud server matched with the Internet of things equipment, wherein the verification request carries verification information of a first cloud server matched with the client, and the verification request is used for indicating the second cloud server to carry out identity verification on the first cloud server based on the verification information;
receiving first authorization authentication information returned by the second cloud server, wherein the first authorization authentication information is sent after the identity of the second cloud server passes the identity verification of the first cloud server;
And sending second authorization authentication information to the client according to the first authorization authentication information, so that the client accesses an authorization page of the client corresponding to the second cloud server based on the second authorization authentication information, and sends a second binding request to the second cloud server in response to an operation for the authorization page, wherein the second binding request is used for indicating the second cloud server to generate token information for the user account, and binding the internet of things equipment based on the token information.
2. The method for binding an internet of things device according to claim 1, wherein the responding to the first binding request, indicating the second cloud server matched with the internet of things device, and performing identity verification on the first cloud server matched with the client, includes:
responding to the first binding request, and sending a verification request to the second cloud server, wherein the verification request carries verification information of a first cloud server matched with the client;
and indicating the second cloud server according to the verification request, and carrying out identity verification on the first cloud server based on the verification information.
3. The method for binding an internet of things device according to claim 1, wherein the sending the second authorization authentication information to the client according to the first authorization authentication information includes:
obtaining callback address information;
generating the second authorization authentication information based on the first authorization authentication information and the callback address information;
and sending the second authorization authentication information to the client, wherein the callback address information is used for indicating the second cloud server to return token information to the client.
4. The internet of things device binding method of any of claims 1 to 3, wherein the first cloud server comprises a first device management unit and the second cloud server comprises a second device management unit, the method further comprising:
receiving a control instruction sent by the client through the first equipment management unit;
and sending the control instruction to the internet of things device through the second device management unit by the first device management unit so as to control the internet of things device based on the control instruction.
5. The internet of things device binding method of any of claims 1 to 3, wherein the first cloud server comprises a first device management unit, the method further comprising:
Receiving a control instruction sent by the client through the first equipment management unit;
and sending the control instruction to the internet of things equipment through the first equipment management unit so as to control the internet of things equipment based on the control instruction.
6. The method for binding the equipment of the Internet of things is characterized by comprising the following steps of:
receiving a verification request sent by a first cloud server, wherein the verification request is sent by the first cloud server in response to a first binding request for internet of things equipment initiated by a client, and the client logs in with a user account;
performing identity verification on the first cloud server based on the verification request;
if the identity verification is passed, first authorization authentication information is sent to the first cloud server, so that the first cloud server sends second authorization authentication information to the client based on the first authorization authentication information;
and accessing an authorization page of the client corresponding to a second cloud server matched with the Internet of things equipment according to the second authorization authentication information, responding to a second binding request sent by the operation of the authorization page, generating token information for the user account, and binding the Internet of things equipment according to the token information.
7. The method for binding an internet of things device according to claim 6, wherein the receiving a verification request sent by a first cloud server, and verifying the identity of the first cloud server based on the verification request, comprises:
receiving a verification request sent by a first cloud server based on a first binding request for the internet of things equipment initiated by the response client, wherein the verification request carries verification information of the first cloud server;
and carrying out identity verification on the first cloud server based on the verification information.
8. The method according to claim 6, wherein the responding to the second binding request sent by the client based on the second authorization authentication information generates token information for the user account, and binds the internet of things device based on the token information, includes:
receiving the feedback consent binding information of the client based on the second authorization authentication information sent by the first cloud server;
generating token information aiming at the user account based on the agreeing binding information, and sending the token information to the client so that the client binds the user account with the Internet of things equipment based on the token information;
Binding the Internet of things equipment based on the token information.
9. The method for binding the internet of things device according to claim 8, wherein the binding the internet of things device based on the token information comprises:
responding to an information acquisition request sent by the client carrying the token information, generating equipment binding information, and sending the equipment binding information to the client;
and if the information returned by the client is matched with the equipment binding information, binding the Internet of things equipment based on the token information.
10. The method of claim 9, wherein the sending the token information to the client comprises:
obtaining callback address information of the first cloud server;
and sending token information to the first cloud server based on the callback address information, so that the first cloud server sends the token information to the client.
11. The internet of things device binding method according to any one of claims 6 to 10, wherein the first cloud server includes a first device management unit, the method further comprising:
Receiving a control instruction sent by the first equipment management unit;
and controlling the Internet of things equipment based on the control instruction.
12. The utility model provides an thing networking equipment binding device which characterized in that includes:
the first receiving module is used for receiving a first binding request for the Internet of things equipment initiated by a client, wherein the client logs in a user account;
the response module is used for responding to the first binding request and sending a verification request to a second cloud server matched with the Internet of things equipment, wherein the verification request carries verification information of a first cloud server matched with the client, and the verification request is used for indicating the second cloud server to carry out identity verification on the first cloud server matched with the client based on the verification information;
the second receiving module is used for receiving first authorization authentication information returned by the second cloud server, wherein the first authorization authentication information is sent after the identity verification of the second cloud server on the first cloud server is passed;
the first binding module is configured to send second authorization authentication information to the client according to the first authorization authentication information, so that the client accesses an authorization page of the client corresponding to the second cloud server based on the second authorization authentication information, and sends a second binding request to the second cloud server in response to an operation for the authorization page, where the second binding request is used to instruct the second cloud server to generate token information for the user account, and bind the internet of things device based on the token information.
13. The utility model provides an thing networking equipment binding device which characterized in that includes:
the third receiving module is used for receiving a verification request sent by a first cloud server, wherein the verification request is sent by the first cloud server in response to a first binding request for internet of things equipment initiated by a client, and the client logs in with a user account;
the verification module is used for carrying out identity verification on the first cloud server based on the verification request;
the sending module is used for sending first authorization authentication information to the first cloud server if the identity verification is passed, so that the first cloud server sends second authorization authentication information to the client based on the first authorization authentication information;
the second binding module is used for responding to the authorization authentication information of the client, accessing an authorization page of the client corresponding to a second cloud server matched with the Internet of things equipment, responding to a second binding request sent by the operation of the authorization page, generating token information for the user account, and binding the Internet of things equipment based on the token information.
14. The Internet of things equipment binding system is characterized by comprising a first cloud server, a second cloud server, a client matched with the first cloud server and Internet of things equipment matched with the second cloud server,
The client is used for sending a first binding request aiming at the internet of things equipment to the first cloud server, and the client logs in a user account;
the first cloud server is used for responding to the first binding request and sending a verification request to the second cloud server, wherein the verification request carries verification information of the first cloud server;
the second cloud server is used for carrying out identity authentication on the first cloud server based on the authentication information;
the second cloud server is used for returning first authorization authentication information to the first cloud server if the identity verification is passed;
the first cloud server is used for sending second authorization authentication information to the client based on the first authorization authentication information;
the client is used for sending a second binding request to the second cloud server based on the second authorization authentication information;
the second cloud server is used for responding to the second binding request, generating token information for a user account logged in the client based on the second authorization authentication information, and sending the token information to the client;
the second cloud server is used for binding the internet of things equipment based on the token information;
The client is used for binding the user account with the Internet of things device based on the token information.
15. A cloud server, comprising a processor and a memory, wherein the memory stores a computer program, and when the processor invokes the computer program in the memory, the method for binding an internet of things device according to any one of claims 1 to 5 is executed, or the method for binding an internet of things device according to any one of claims 6 to 11 is executed.
16. A storage medium storing a computer program to be loaded by a processor to perform the internet of things device binding method of any one of claims 1 to 5 or to perform the internet of things device binding method of any one of claims 6 to 11.
CN202110898234.2A 2021-08-05 2021-08-05 Internet of things equipment binding method, device, system, cloud server and storage medium Active CN113746633B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202110898234.2A CN113746633B (en) 2021-08-05 2021-08-05 Internet of things equipment binding method, device, system, cloud server and storage medium
PCT/CN2022/099279 WO2023011016A1 (en) 2021-08-05 2022-06-16 Internet of things device binding method, apparatus and system, and cloud server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110898234.2A CN113746633B (en) 2021-08-05 2021-08-05 Internet of things equipment binding method, device, system, cloud server and storage medium

Publications (2)

Publication Number Publication Date
CN113746633A CN113746633A (en) 2021-12-03
CN113746633B true CN113746633B (en) 2023-10-17

Family

ID=78730238

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110898234.2A Active CN113746633B (en) 2021-08-05 2021-08-05 Internet of things equipment binding method, device, system, cloud server and storage medium

Country Status (2)

Country Link
CN (1) CN113746633B (en)
WO (1) WO2023011016A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113839917B (en) * 2021-06-30 2023-10-31 海信(广东)空调有限公司 Voice information processing method, data processing platform and equipment cloud server
CN113746633B (en) * 2021-08-05 2023-10-17 深圳Tcl新技术有限公司 Internet of things equipment binding method, device, system, cloud server and storage medium
CN114500617B (en) * 2021-12-24 2023-11-28 青岛海尔科技有限公司 Internet equipment control method and device, storage medium and electronic equipment
CN114866251B (en) * 2022-04-25 2023-07-07 中国银联股份有限公司 Equipment interconnection security authentication system, method, device, server and medium
CN117440377A (en) * 2022-07-21 2024-01-23 荣耀终端有限公司 Communication system, method and electronic equipment
WO2024031681A1 (en) * 2022-08-12 2024-02-15 Oppo广东移动通信有限公司 Device binding method and apparatus, and device, storage medium and program product
WO2024050754A1 (en) * 2022-09-08 2024-03-14 Oppo广东移动通信有限公司 Method for starting client, first device, configuration device, and cloud platform

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109995710A (en) * 2017-12-29 2019-07-09 上海智显光电科技有限公司 A kind of lan device management system and method
CN110677248A (en) * 2019-10-30 2020-01-10 宁波奥克斯电气股份有限公司 Safe binding method and system based on narrowband Internet of things
CN110944035A (en) * 2019-10-22 2020-03-31 珠海格力电器股份有限公司 Internet of things equipment control method and system and readable medium
CN112637245A (en) * 2021-01-13 2021-04-09 广州技象科技有限公司 Internet of things equipment binding method and device
CN112738805A (en) * 2020-12-30 2021-04-30 青岛海尔科技有限公司 Device control method and apparatus, storage medium, and electronic device

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10645557B2 (en) * 2017-04-04 2020-05-05 Dell Products L.P. Transferable ownership tokens for discrete, identifiable devices
US11689571B2 (en) * 2019-03-12 2023-06-27 Nxp B.V. Certificate provisioning and customer binding mechanisms using device group identification token
CN111327583B (en) * 2019-08-22 2022-03-04 刘高峰 Identity authentication method, intelligent equipment and authentication server
CN111277565B (en) * 2020-01-08 2022-04-12 北京小米松果电子有限公司 Information processing method and device, and storage medium
CN111639319B (en) * 2020-06-02 2023-04-25 抖音视界有限公司 User resource authorization method, device and computer readable storage medium
CN113746633B (en) * 2021-08-05 2023-10-17 深圳Tcl新技术有限公司 Internet of things equipment binding method, device, system, cloud server and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109995710A (en) * 2017-12-29 2019-07-09 上海智显光电科技有限公司 A kind of lan device management system and method
CN110944035A (en) * 2019-10-22 2020-03-31 珠海格力电器股份有限公司 Internet of things equipment control method and system and readable medium
CN110677248A (en) * 2019-10-30 2020-01-10 宁波奥克斯电气股份有限公司 Safe binding method and system based on narrowband Internet of things
CN112738805A (en) * 2020-12-30 2021-04-30 青岛海尔科技有限公司 Device control method and apparatus, storage medium, and electronic device
CN112637245A (en) * 2021-01-13 2021-04-09 广州技象科技有限公司 Internet of things equipment binding method and device

Also Published As

Publication number Publication date
CN113746633A (en) 2021-12-03
WO2023011016A1 (en) 2023-02-09

Similar Documents

Publication Publication Date Title
CN113746633B (en) Internet of things equipment binding method, device, system, cloud server and storage medium
CN112738805B (en) Device control method and apparatus, storage medium, and electronic device
WO2015196908A1 (en) Service processing method, terminal, server and system
WO2022247751A1 (en) Method, system and apparatus for remotely accessing application, device, and storage medium
US20130007867A1 (en) Network Identity for Software-as-a-Service Authentication
WO2012055339A1 (en) Authentication routing system, method and authentication router of cloud computing service
CN103069742B (en) For by the method and apparatus of key bindings to name space
CN111049946B (en) Portal authentication method, portal authentication system, electronic equipment and storage medium
CN103685204A (en) Resource authentication method based on internet of things resource sharing platform
CN106790251B (en) User access method and user access system
CN109344628A (en) The management method of trusted node, node and storage medium in block chain network
US20230208831A1 (en) Service processing method and apparatus, server, and storage medium
CN113765655A (en) Access control method, device, equipment and storage medium
CN115022047B (en) Account login method and device based on multi-cloud gateway, computer equipment and medium
CN109088890A (en) A kind of identity identifying method, relevant apparatus and system
CN113596141B (en) Method and device for setting device control authority, computer device and storage medium
CN113612747B (en) Method and device for setting device control authority, computer device and storage medium
CN116647572B (en) Access endpoint switching method, device, electronic equipment and storage medium
CN104469770A (en) WLAN authentication method, platform and system for third-party application
CN102694779B (en) Combination attestation system and authentication method
JP2023519650A (en) Internet-of-Things device registration method, device, device and storage medium
CN113489695B (en) Private cloud networking method, device, system, computer equipment and storage medium
CN113596013B (en) Method and device for setting device control authority, computer device and storage medium
JP6848275B2 (en) Program, authentication system and authentication cooperation system
CN114969045A (en) Account creating method, Internet of things multi-tenant system, equipment, program and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant