CN114079925B - Binding method and binding system for intelligent equipment and terminal - Google Patents

Binding method and binding system for intelligent equipment and terminal Download PDF

Info

Publication number
CN114079925B
CN114079925B CN202111355656.1A CN202111355656A CN114079925B CN 114079925 B CN114079925 B CN 114079925B CN 202111355656 A CN202111355656 A CN 202111355656A CN 114079925 B CN114079925 B CN 114079925B
Authority
CN
China
Prior art keywords
target
information
terminal
target terminal
intelligent device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111355656.1A
Other languages
Chinese (zh)
Other versions
CN114079925A (en
Inventor
姚楚琳
王永永
宋德超
李绍斌
甄志坚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN202111355656.1A priority Critical patent/CN114079925B/en
Publication of CN114079925A publication Critical patent/CN114079925A/en
Application granted granted Critical
Publication of CN114079925B publication Critical patent/CN114079925B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/48Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • H04W12/64Location-dependent; Proximity-dependent using geofenced areas
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery

Abstract

The application provides a binding method and a binding system for intelligent equipment and a terminal. The method comprises the following steps: under the condition that request information of a target terminal is received, corresponding first verification information is generated and sent to the target terminal, wherein the request information comprises a distribution network request and a first position; under the condition that feedback information of the target intelligent device is received, determining whether the target terminal is allowed to be bound with the target intelligent device according to the request information and the feedback information, wherein the feedback information comprises second verification information and a second position, the second verification information is generated by the target intelligent device in response to a first preset operation acting on a target keyboard, and the first preset operation is an operation of inputting the first verification information; and under the condition that the target terminal is determined to be allowed to bind with the target intelligent equipment, sending license information to the target terminal so that the target terminal displays a distribution network interface. The method can effectively prevent malicious network allocation of other devices.

Description

Binding method and binding system for intelligent equipment and terminal
Technical Field
The application relates to the field of intelligent equipment, in particular to a binding method, a computer readable storage medium, a processor and a binding system of intelligent equipment and a terminal.
Background
Along with the development of the internet of things technology, more and more intelligent devices realize intelligent work through an access network, and great convenience is brought to work and life.
The current mainstream intelligent terminal network configuration process is generally: the smart terminal receives the UDP packet through a mobile phone APP (Application) end and sends a UDP (User Datagram Protocol ) broadcast packet or multicast packet containing a WIFI (Wireless Fidelity, wireless communication technology) user name and password, and as long as the organization form of the UDP is known, the smart terminal can decrypt the WIFI user name and password through the received UDP packet, and then the smart terminal configures the decrypted WIFI user name and password to a designated WIFI access point. However, the flow of the existing scheme cannot effectively prevent other users from maliciously distributing the network through the APP end.
The above information disclosed in the background section is only for enhancement of understanding of the background art from the technology described herein and, therefore, may contain some information that does not form the prior art that is already known in the country to a person of ordinary skill in the art.
Disclosure of Invention
The application mainly aims to provide a binding method, a computer readable storage medium, a processor and a binding system for intelligent equipment and a terminal, so as to solve the problem that a network configuration scheme of the intelligent equipment cannot effectively prevent malicious network allocation in the prior art.
According to an aspect of an embodiment of the present invention, there is provided a binding method of an intelligent device and a terminal, where the intelligent device includes a keyboard, the method including: under the condition that request information of a target terminal is received, generating corresponding first verification information and sending the first verification information to the target terminal, wherein the request information comprises a distribution network request and a first position, and the first position is the position of the target terminal; under the condition that feedback information of a target intelligent device is received, determining whether the target terminal is allowed to be bound with the target intelligent device or not according to the request information and the feedback information, wherein the feedback information comprises second verification information and a second position, the second verification information is generated by the target intelligent device in response to a first preset operation acting on a target keyboard, the first preset operation is an operation for inputting the first verification information, the target keyboard is a keyboard of the target intelligent device, and the second position is a position of the target intelligent device; and under the condition that the target terminal is allowed to bind with the target intelligent equipment, sending permission information to the target terminal so that the target terminal displays a distribution network interface, and establishing a connection relationship between the target terminal and the target intelligent equipment according to the distribution network interface.
Optionally, in the case of receiving the request information of the target terminal, generating corresponding first verification information and sending the first verification information to the target terminal, including: generating the first verification information and sending the first verification information to the target terminal under the condition that the request information is received; and storing the first verification information and the corresponding first position into a database.
Optionally, under the condition that feedback information of the target intelligent device is received, determining whether to allow the target terminal to bind with the target intelligent device according to the request information and the feedback information includes: determining the first verification information which is the same as the second verification information from the database under the condition that the feedback information is received; determining the corresponding first position according to the first verification information; determining whether the second location is within a predetermined area including the first location; and under the condition that the second position is determined to be located in the preset area, determining to allow the target terminal to be bound with the target intelligent device.
Optionally, the request information further includes device information bound to the target smart device, and in a case that it is determined that the target terminal is allowed to bind to the target smart device, license information is sent to the target terminal, so that after the target terminal displays a distribution network interface, the method further includes: receiving parameter information of the target intelligent equipment sent by the target terminal; and adding the parameter information to the corresponding equipment information.
According to another aspect of the embodiment of the present invention, there is also provided a binding method between an intelligent device and a terminal, including: generating request information and sending the request information to a server under the condition that an operation for adding a target intelligent device acting on a target terminal is received, wherein the request information comprises a distribution network request and a first position, and the first position is the position of the target terminal; receiving first verification information sent by the server, wherein the first verification information is generated by the server according to the request information; and under the condition that permission information sent by the server is received, establishing a connection relation with the target intelligent device according to the permission information, wherein the permission information is sent by the server under the condition that a preset result is determined, the preset result is determined by the server under the condition that feedback information of the target intelligent device is received, the preset result is determined according to the request information and the feedback information, the target terminal is allowed to be bound with the target intelligent device, the feedback information comprises second verification information and a second position, the second verification information is generated by the target intelligent device according to a first preset operation acting on a target keyboard, the first preset operation is an operation of inputting the first verification information, the target keyboard is a keyboard of the target intelligent device, and the second position is a position of the target intelligent device.
Optionally, under the condition that the license information sent by the server is received, establishing a connection relationship with the target intelligent device according to the license information, including: displaying a distribution network interface under the condition that the permission information is received; and receiving a second preset operation acting on the distribution network interface, and establishing a connection relationship with the target intelligent equipment.
Optionally, the network distribution interface includes a first input box and a second input box, receives a second predetermined operation acting on the network distribution interface, and establishes a connection relationship with the target intelligent device, including: receiving input operation acting on the first input box, and acquiring a WIFI name; receiving input operation acting on the second input box, and acquiring a WIFI password; and accessing the WIFI broadcast initiated by the target intelligent device according to the WIFI name and the WIFI password.
Optionally, in the case of receiving the license information sent by the server, after establishing a connection relationship with the target intelligent device according to the license information, the method further includes: acquiring parameter information of the target intelligent equipment; and sending the parameter information to the server so that the server adds the parameter information to the equipment information corresponding to the target terminal.
According to yet another aspect of the embodiments of the present application, there is also provided a computer-readable storage medium including a stored program, wherein the program is for executing any one of the methods.
According to yet another aspect of an embodiment of the present application, there is further provided a processor, where the processor is configured to execute a program, and where the program executes any of the methods.
According to still another aspect of the embodiment of the present application, there is further provided a binding system, including an intelligent device, a server, and a terminal subsystem, where the intelligent device includes a keyboard; the server comprises a first control device for executing any one of the methods; the terminal subsystem comprises a terminal and a second control device of the terminal, wherein the second control device is used for executing any one of the methods.
In the binding method of the intelligent device and the terminal, firstly, under the condition that request information comprising a network allocation request and a first position of a target terminal is received, corresponding first verification information is generated and sent to the target terminal; then, under the condition that feedback information comprising second verification information and a second position sent by the target intelligent device is received, determining whether the target terminal is allowed to be bound with the target intelligent device or not, wherein the second verification information is generated by a user inputting the received first verification information into a keyboard of the target intelligent device by the target terminal; and finally, under the condition that the target terminal is determined to be allowed to bind with the target intelligent equipment, transmitting permission information which can enable the target terminal to display a distribution network interface to the target terminal, so that the target terminal establishes a connection relationship with the target intelligent equipment according to the distribution network interface. Compared with the problem that the network configuration scheme of the intelligent equipment cannot effectively prevent malicious network allocation in the prior art, the binding method of the intelligent equipment and the terminal can determine whether the target terminal and the target intelligent equipment are allowed to bind according to the first verification information, the second verification information, the first position and the second position when the target terminal requests to establish the connection relation with the target intelligent equipment, and can establish the connection relation only under the condition that the target terminal and the target intelligent equipment are allowed to bind, so that the malicious network allocation of other equipment can be effectively prevented, and better user experience is ensured.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application. In the drawings:
fig. 1 shows a flow diagram of a binding method of an intelligent device and a terminal according to an embodiment of the application;
FIG. 2 is a flow chart of a binding method of an intelligent device and a terminal according to another embodiment of the application;
FIG. 3 shows a schematic diagram of a binding apparatus of a smart device and a terminal according to an embodiment of the present application;
FIG. 4 shows a schematic diagram of a binding apparatus of a smart device and a terminal according to another embodiment of the present application;
fig. 5 shows a binding flowchart of a smart device and a terminal according to an embodiment of the present application.
Detailed Description
It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be combined with each other. The application will be described in detail below with reference to the drawings in connection with embodiments.
In order that those skilled in the art will better understand the present application, a technical solution in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, shall fall within the scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate in order to describe the embodiments of the application herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It will be understood that when an element such as a layer, film, region, or substrate is referred to as being "on" another element, it can be directly on the other element or intervening elements may also be present. Furthermore, in the description and in the claims, when an element is described as being "connected" to another element, the element may be "directly connected" to the other element or "connected" to the other element through a third element.
As described in the background art, in order to solve the problem that the network configuration scheme of the intelligent device in the prior art cannot effectively prevent malicious network configuration, in an exemplary embodiment of the present application, a binding method, a computer readable storage medium, a processor and a binding system for an intelligent device and a terminal are provided.
According to the embodiment of the application, a binding method of intelligent equipment and a terminal is provided, wherein the intelligent equipment comprises a keyboard, and the method can be applied to a server.
Fig. 1 is a flowchart of a binding method of an intelligent device and a terminal according to an embodiment of the present application. As shown in fig. 1, the method comprises the steps of:
step S101, when request information of a target terminal is received, generating corresponding first verification information and sending the first verification information to the target terminal, wherein the request information comprises a distribution network request and a first position, and the first position is the position of the target terminal;
step S102, determining whether to allow the target terminal to bind with the target intelligent device according to the request information and the feedback information when feedback information of the target intelligent device is received, wherein the feedback information comprises second verification information and a second position, the second verification information is generated by the target intelligent device in response to a first preset operation acting on a target keyboard, the first preset operation is an operation for inputting the first verification information, the target keyboard is a keyboard of the target intelligent device, and the second position is a position of the target intelligent device;
Step S103, sending permission information to the target terminal under the condition that the target terminal is allowed to bind with the target intelligent device is determined, so that the target terminal displays a distribution network interface, and the target terminal establishes a connection relation with the target intelligent device according to the distribution network interface.
In the binding method of the intelligent device and the terminal, firstly, under the condition that request information including a network allocation request and a first position of a target terminal is received, corresponding first verification information is generated and sent to the target terminal; then, under the condition that feedback information comprising second verification information and a second position sent by the target intelligent device is received, determining whether the target terminal is allowed to be bound with the target intelligent device or not, wherein the second verification information is generated by a user inputting the received first verification information into a keyboard of the target intelligent device by the target terminal; and finally, under the condition that the target terminal is determined to be allowed to bind with the target intelligent equipment, transmitting permission information which can enable the target terminal to display a distribution network interface to the target terminal, so that the target terminal establishes a connection relationship with the target intelligent equipment according to the distribution network interface. Compared with the problem that the network configuration scheme of the intelligent equipment cannot effectively prevent malicious network allocation in the prior art, the binding method of the intelligent equipment and the terminal can determine whether the target terminal and the target intelligent equipment are allowed to bind according to the first verification information, the second verification information, the first position and the second position when the target terminal requests to establish the connection relation with the target intelligent equipment, and can establish the connection relation only under the condition that the target terminal and the target intelligent equipment are allowed to bind, so that the malicious network allocation of other equipment can be effectively prevented, and better user experience is ensured.
In a specific embodiment, the first verification information and the second verification information are verification codes, and of course, the first verification information and the second verification information are not limited to the verification codes, but may be other types of verification information, such as chinese characters, graphics, and the like.
According to a specific embodiment of the present application, when receiving request information of a target terminal, generating corresponding first authentication information and transmitting the first authentication information to the target terminal includes: generating the first verification information and transmitting the first verification information to the target terminal when the request information is received; and storing the first verification information and the corresponding first position into a database. By generating the corresponding first verification information and sending the first verification information to the target terminal and storing the first verification information and the first position in the database in a one-to-one correspondence manner, whether the target terminal is allowed to be bound with the target intelligent device or not is conveniently determined according to the request information and the feedback information, and the problem that other terminals are maliciously connected with the intelligent device is further avoided.
In order to further ensure the security of the network between the terminal and the intelligent device and further ensure that the user experience is better, according to another specific embodiment of the present application, when feedback information of a target intelligent device is received, determining whether to allow binding between the target terminal and the target intelligent device according to the request information and the feedback information includes: determining the first authentication information which is the same as the second authentication information from the database when the feedback information is received; determining the corresponding first position according to the first verification information; determining whether said second location is within a predetermined area including said first location; and under the condition that the second position is determined to be located in the preset area, the target terminal is determined to be allowed to bind with the target intelligent device. By determining the first verification information which is the same as the second verification information from the database and determining whether the second position is in a preset area of the first position, the connection relationship between a terminal which is not near the target intelligent device and the target intelligent device is avoided, and the distribution network security is further ensured.
In the practical application process, a person skilled in the art may set the range of the predetermined area according to the actual requirement, for example, set the predetermined area to an area with the first position as the center and with the radius of 20m as the center.
According to still another embodiment of the present application, the request information further includes device information bound to the target smart device, and in a case where it is determined that the target terminal is allowed to bind to the target smart device, permission information is sent to the target terminal, so that after the target terminal displays a distribution network interface, the method further includes: receiving parameter information of the target intelligent equipment sent by the target terminal; and adding the parameter information to the corresponding equipment information. After the connection relation between the terminal and the intelligent equipment is established, the parameter information of the target intelligent equipment is added to the corresponding equipment information, so that the connection between the terminal and the intelligent equipment can be directly realized without repeating the verification process when the next-phase terminal wants to connect the intelligent equipment, further the user operation is facilitated, and the user experience is further guaranteed to be better.
In still another specific embodiment of the present application, before the target terminal sends the request information, the user needs to reset the corresponding target smart device, so that the target smart device is in a network to be configured state.
In the practical application process, the intelligent equipment comprises door lock equipment with a keyboard.
According to another exemplary embodiment of the present application, a binding method of an intelligent device and a terminal is provided, and the method can be applied to the terminal.
Fig. 2 is a flowchart of a binding method of a smart device and a terminal according to an embodiment of the present application. As shown in fig. 2, the method comprises the steps of:
step S201, under the condition that an operation for adding a target intelligent device acting on a target terminal is received, generating request information and sending the request information to a server, wherein the request information comprises a distribution network request and a first position, and the first position is the position of the target terminal;
step S202, receiving first verification information sent by the server, wherein the first verification information is generated by the server according to the request information;
and step S203, when receiving the permission information sent by the server, establishing a connection relationship with the target smart device according to the permission information, where the permission information is sent by the server when determining a predetermined result, the predetermined result is determined by the server when receiving feedback information of the target smart device according to the request information and the feedback information, the predetermined result is determined by allowing the target terminal to bind with the target smart device, the feedback information includes second verification information and a second location, the second verification information is generated by the target smart device in response to a first predetermined operation acting on a target keyboard, the first predetermined operation is an operation of inputting the first verification information, the target keyboard is a keyboard of the target smart device, and the second location is a location of the target smart device.
In the binding method of the intelligent device and the terminal, firstly, under the condition that the operation of adding the target intelligent device acting on the target terminal is received, request information comprising a network allocation request and a first position is generated and sent to a server; then, receiving first verification information sent by the server, wherein the first verification information is generated by the server according to the request information; and finally, under the condition that the permission information sent by the server is received, establishing a connection relation with the target intelligent device according to the permission information, wherein the permission information is sent by the server under the condition that a preset result which is used for allowing the target terminal to be bound with the target intelligent device is confirmed, the preset result is determined by the server under the condition that feedback information comprising second verification information and a second position of the target intelligent device is received, the second verification information is generated by the target intelligent device according to a first preset operation acting on a target keyboard and is determined according to the request information and the feedback information, and the first preset operation is an operation for inputting the first verification information. Compared with the problem that the network configuration scheme of the intelligent equipment cannot effectively prevent malicious network allocation in the prior art, the binding method of the intelligent equipment and the terminal can determine whether the target terminal and the target intelligent equipment are allowed to bind according to the first verification information, the second verification information, the first position and the second position when the target terminal requests to establish the connection relation with the target intelligent equipment, and can establish the connection relation only under the condition that the target terminal and the target intelligent equipment are allowed to bind, so that the malicious network allocation of other equipment can be effectively prevented, and better user experience is ensured.
In a specific embodiment, the first verification information and the second verification information are verification codes, and of course, the first verification information and the second verification information are not limited to the verification codes, but may be other types of verification information, such as chinese characters, graphics, and the like.
According to a specific embodiment of the present application, when receiving the license information sent by the server, establishing a connection relationship with the target intelligent device according to the license information, including: displaying a distribution network interface under the condition of receiving the permission information; and receiving a second preset operation acting on the distribution network interface, and establishing a connection relation with the target intelligent equipment. The terminal further ensures that the connection relation between the intelligent equipment and the terminal is established more safely by receiving the second preset operation acting on the distribution network interface, and further avoids the problem of malicious distribution network.
In order to further avoid malicious network allocation of other devices, further ensure that the user experience is better, according to another specific embodiment of the present application, the network allocation interface includes a first input box and a second input box, receives a second predetermined operation acting on the network allocation interface, and establishes a connection relationship with the target intelligent device, including: receiving input operation acting on the first input box, and acquiring a WIFI name; receiving input operation acting on the second input box, and acquiring a WIFI password; and accessing the WIFI broadcast initiated by the target intelligent device according to the WIFI name and the WIFI password. And under the condition that the terminal obtains the permission information, the terminal can only access the WIFI broadcast initiated by the intelligent device if the WIFI name and the WIFI password are known, and finally the connection between the target terminal and the target intelligent device is established, so that the better security of the connection relationship is further ensured.
According to another embodiment of the present application, when receiving the license information sent by the server, after establishing a connection with the target smart device according to the license information, the method further includes: acquiring parameter information of the target intelligent equipment; and transmitting the parameter information to the server so that the server adds the parameter information to the device information corresponding to the target terminal. After the connection relation between the terminal and the intelligent equipment is established, the parameter information of the target intelligent equipment is added to the corresponding equipment information, so that the connection between the terminal and the intelligent equipment can be directly realized without repeating the verification process when the next-phase terminal wants to connect the intelligent equipment, further the user operation is facilitated, and the user experience is further guaranteed to be better.
Specifically, the terminal may include an electronic device such as a mobile phone, a tablet, and the terminal may further include an APP in the electronic device or an applet in the APP. The intelligent device is an intelligent device with a keyboard, such as a door lock device with a keyboard.
The embodiment of the application also provides a binding device of the intelligent equipment and the terminal, which can be applied to a server. The binding device for the intelligent device and the terminal provided by the embodiment of the application is introduced as follows.
Fig. 3 is a schematic diagram of a binding apparatus of an intelligent device and a terminal according to an embodiment of the present application. As shown in fig. 3, the apparatus includes a first generating unit 10, a determining unit 20, and a first transmitting unit 30, where the first generating unit 10 is configured to generate corresponding first verification information and transmit the first verification information to a target terminal when receiving request information of the target terminal, where the request information includes a network allocation request and a first location, and the first location is a location of the target terminal; the determining unit 20 is configured to determine, when feedback information of a target smart device is received, whether to allow binding of the target terminal with the target smart device according to the request information and the feedback information, where the feedback information includes second authentication information and a second location, the second authentication information is generated by the target smart device in response to a first predetermined operation acting on a target keyboard, the first predetermined operation is an operation of inputting the first authentication information, the target keyboard is a keyboard of the target smart device, and the second location is a location of the target smart device; the first sending unit 30 is configured to send permission information to the target terminal when it is determined that the target terminal is allowed to bind to the target smart device, so that the target terminal displays a distribution network interface, and the target terminal establishes a connection relationship with the target smart device according to the distribution network interface.
In the binding device of the intelligent equipment and the terminal, under the condition that request information of a target terminal is received through the first generation unit, corresponding first verification information is generated and sent to the target terminal, wherein the request information comprises a distribution network request and a first position, and the first position is the position of the target terminal; determining, by the determining unit, whether to allow binding of the target terminal and the target smart device according to the request information and the feedback information when feedback information of the target smart device is received, where the feedback information includes second verification information and a second location, the second verification information is generated by the target smart device in response to a first predetermined operation acting on a target keyboard, the first predetermined operation is an operation of inputting the first verification information, the target keyboard is a keyboard of the target smart device, and the second location is a location of the target smart device; and sending permission information to the target terminal by the first sending unit under the condition that the target terminal is ensured to be allowed to bind with the target intelligent equipment, so that the target terminal displays a distribution network interface, and the target terminal establishes a connection relation with the target intelligent equipment according to the distribution network interface. Compared with the problem that the network configuration scheme of the intelligent equipment cannot effectively prevent malicious network allocation in the prior art, the binding device of the intelligent equipment and the terminal can determine whether the target terminal and the target intelligent equipment are allowed to bind according to the first verification information, the second verification information, the first position and the second position when the target terminal requests to establish the connection relation with the target intelligent equipment, and can establish the connection relation only under the condition that the target terminal and the target intelligent equipment are allowed to bind, so that the malicious network allocation of other equipment can be effectively prevented, and the user experience is ensured to be better.
In a specific embodiment, the first verification information and the second verification information are verification codes, and of course, the first verification information and the second verification information are not limited to the verification codes, but may be other types of verification information, such as chinese characters, graphics, and the like.
According to a specific embodiment of the present application, the first generating unit includes a generating module and a storage module, where the generating module is configured to generate the first verification information and send the first verification information to the target terminal when the request information is received; the storage module is used for storing the first verification information and the corresponding first position into a database. By generating the corresponding first verification information and sending the first verification information to the target terminal and storing the first verification information and the first position in the database in a one-to-one correspondence manner, whether the target terminal is allowed to be bound with the target intelligent device or not is conveniently determined according to the request information and the feedback information, and the problem that other terminals are maliciously connected with the intelligent device is further avoided.
In order to further ensure the security of the distribution network of the terminal and the intelligent device and further ensure that the experience of the user is better, according to another specific embodiment of the present application, the determining unit includes a first determining module, a second determining module, a third determining module, and a fourth determining module, where the first determining module is configured to determine, when receiving the feedback information, the first verification information that is the same as the second verification information from the database; the second determining module is used for determining the corresponding first position according to the first verification information; the third determining module is configured to determine whether the second location is located in a predetermined area including the first location; the fourth determining module is configured to determine to allow the target terminal to bind with the target smart device if it is determined that the second location is located in the predetermined area. By determining the first verification information which is the same as the second verification information from the database and determining whether the second position is in a preset area of the first position, the connection relationship between a terminal which is not near the target intelligent device and the target intelligent device is avoided, and the distribution network security is further ensured.
In the practical application process, a person skilled in the art may set the range of the predetermined area according to the actual requirement, for example, set the predetermined area to an area with the first position as the center and with the radius of 20m as the center.
According to still another specific embodiment of the present application, the request information further includes device information bound to the target smart device, and the apparatus further includes a first receiving unit and an adding unit, where the first receiving unit is configured to send permission information to the target terminal when determining that the target terminal is allowed to bind to the target smart device, so that after the target terminal displays a network allocation interface, receive parameter information of the target smart device sent by the target terminal; the adding unit is configured to add the parameter information to the corresponding device information. After the connection relation between the terminal and the intelligent equipment is established, the parameter information of the target intelligent equipment is added to the corresponding equipment information, so that the connection between the terminal and the intelligent equipment can be directly realized without repeating the verification process when the next-phase terminal wants to connect the intelligent equipment, further the user operation is facilitated, and the user experience is further guaranteed to be better.
In still another specific embodiment of the present application, before the target terminal sends the request information, the user needs to reset the corresponding target smart device, so that the target smart device is in a network to be configured state.
In the practical application process, the intelligent equipment comprises door lock equipment with a keyboard.
The embodiment of the application also provides a binding device of the intelligent equipment and the terminal, which can be applied to the terminal. The binding device for the intelligent device and the terminal provided by the embodiment of the application is introduced as follows.
Fig. 4 is a schematic diagram of a binding apparatus of an intelligent device and a terminal according to an embodiment of the present application. As shown in fig. 4, the apparatus includes a second generating unit 40, a second receiving unit 50, and a connecting unit 60, where the second generating unit 40 is configured to generate request information and send the request information to a server when receiving an operation for adding a target smart device acting on a target terminal, where the request information includes a request for a distribution network and a first location, and the first location is a location of the target terminal; the second receiving unit 50 is configured to receive first authentication information sent by the server, where the first authentication information is generated by the server according to the request information; the connection unit 60 is configured to establish a connection relationship with the target smart device according to the license information when receiving the license information sent by the server, where the license information is sent by the server when determining a predetermined result, the predetermined result is determined by the server when receiving feedback information of the target smart device according to the request information and the feedback information, the predetermined result is determined by allowing the target terminal to bind with the target smart device, the feedback information includes second authentication information and a second location, the second authentication information is generated by the target smart device in response to a first predetermined operation acting on a target keyboard, the first predetermined operation is an operation of inputting the first authentication information, the target keyboard is a keyboard of the target smart device, and the second location is a location of the target smart device.
In the binding device of the intelligent device and the terminal, under the condition that the second generating unit receives the operation of adding the target intelligent device acting on the target terminal, request information is generated and sent to the server, the request information comprises a network distribution request and a first position, and the first position is the position of the target terminal; receiving, by the second receiving unit, first authentication information sent by the server, where the first authentication information is generated by the server according to the request information; and establishing a connection relationship with the target intelligent device according to the permission information when receiving the permission information sent by the server through the connection unit, wherein the permission information is sent by the server when determining a preset result, the preset result is determined by the server when receiving feedback information of the target intelligent device according to the request information and the feedback information, the preset result is determined by allowing the target terminal to bind with the target intelligent device, the feedback information comprises second verification information and a second position, the second verification information is generated by the target intelligent device according to a first preset operation acting on a target keyboard, the first preset operation is an operation of inputting the first verification information, the target keyboard is a keyboard of the target intelligent device, and the second position is a position of the target intelligent device. Compared with the problem that the network configuration scheme of the intelligent equipment cannot effectively prevent malicious network allocation in the prior art, the binding method of the intelligent equipment and the terminal can determine whether the target terminal and the target intelligent equipment are allowed to bind according to the first verification information, the second verification information, the first position and the second position when the target terminal requests to establish the connection relation with the target intelligent equipment, and can establish the connection relation only under the condition that the target terminal and the target intelligent equipment are allowed to bind, so that the malicious network allocation of other equipment can be effectively prevented, and better user experience is ensured.
In a specific embodiment, the first verification information and the second verification information are verification codes, and of course, the first verification information and the second verification information are not limited to the verification codes, but may be other types of verification information, such as chinese characters, graphics, and the like.
According to a specific embodiment of the present application, the connection unit includes a display module and a connection module, where the display module is configured to display a distribution network interface when receiving the permission information; the connection module is used for receiving a second preset operation acting on the distribution network interface and establishing a connection relation with the target intelligent equipment. The terminal further ensures that the connection relation between the intelligent equipment and the terminal is established more safely by receiving the second preset operation acting on the distribution network interface, and further avoids the problem of malicious distribution network.
In order to further avoid malicious network allocation of other devices, and further ensure better user experience, according to another specific embodiment of the present application, the network allocation interface includes a first input box and a second input box, and the connection module includes a first acquisition submodule, a second acquisition submodule, and an access submodule, where the first acquisition submodule is configured to receive an input operation acting on the first input box and acquire a WIFI name; the second obtaining submodule is used for receiving input operation acting on the second input box and obtaining a WIFI password; the access submodule is used for accessing the WIFI broadcast initiated by the target intelligent device according to the WIFI name and the WIFI password. And under the condition that the terminal obtains the permission information, the terminal can only access the WIFI broadcast initiated by the intelligent device if the WIFI name and the WIFI password are known, and finally the connection between the target terminal and the target intelligent device is established, so that the better security of the connection relationship is further ensured.
According to another specific embodiment of the present application, the apparatus further includes an obtaining unit and a second sending unit, where the obtaining unit is configured to, when receiving the permission information sent by the server, obtain parameter information of the target smart device after establishing a connection relationship with the target smart device according to the permission information; the second sending unit is configured to send the parameter information to the server, so that the server adds the parameter information to device information corresponding to the target terminal. After the connection relation between the terminal and the intelligent equipment is established, the parameter information of the target intelligent equipment is added to the corresponding equipment information, so that the connection between the terminal and the intelligent equipment can be directly realized without repeating the verification process when the next-phase terminal wants to connect the intelligent equipment, further the user operation is facilitated, and the user experience is further guaranteed to be better.
Specifically, the terminal may include an electronic device such as a mobile phone, a tablet, and the terminal may further include an APP in the electronic device or an applet in the APP. The intelligent device is an intelligent device with a keyboard, such as a door lock device with a keyboard.
The binding device of the intelligent device and the terminal comprises a processor and a memory, wherein the first generating unit, the determining unit, the first transmitting unit, the second generating unit, the second receiving unit, the connecting unit and the like are all stored in the memory as program units, and the processor executes the program units stored in the memory to realize corresponding functions.
The processor includes a kernel, and the kernel fetches the corresponding program unit from the memory. The kernel can be provided with one or more than one kernel, and the problem that the network configuration scheme of the intelligent device in the prior art cannot effectively prevent malicious network allocation is solved by adjusting kernel parameters.
The memory may include volatile memory, random Access Memory (RAM), and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM), among other forms in computer readable media, the memory including at least one memory chip.
The embodiment of the invention provides a computer readable storage medium, wherein a program is stored in the computer readable storage medium, and the program is executed by a processor to realize the binding method of the intelligent device and the terminal.
The embodiment of the invention provides a processor, wherein the computer readable storage medium comprises a stored program, and the binding method of the intelligent device and the terminal is executed when the program runs.
The embodiment of the invention provides equipment, which comprises a processor, a memory and a program stored in the memory and capable of running on the processor, wherein the processor realizes at least the following steps when executing the program:
step S101, when request information of a target terminal is received, generating corresponding first verification information and sending the first verification information to the target terminal, wherein the request information comprises a distribution network request and a first position, and the first position is the position of the target terminal;
step S102, determining whether to allow the target terminal to bind with the target intelligent device according to the request information and the feedback information when feedback information of the target intelligent device is received, wherein the feedback information comprises second verification information and a second position, the second verification information is generated by the target intelligent device in response to a first preset operation acting on a target keyboard, the first preset operation is an operation for inputting the first verification information, the target keyboard is a keyboard of the target intelligent device, and the second position is a position of the target intelligent device;
step S103, sending permission information to the target terminal to enable the target terminal to display a distribution network interface under the condition that the target terminal is allowed to bind with the target intelligent device, wherein the target terminal establishes a connection relationship with the target intelligent device according to the distribution network interface,
Or the processor when executing the program performs at least the following steps:
step S201, under the condition that an operation for adding a target intelligent device acting on a target terminal is received, generating request information and sending the request information to a server, wherein the request information comprises a distribution network request and a first position, and the first position is the position of the target terminal;
step S202, receiving first verification information sent by the server, wherein the first verification information is generated by the server according to the request information;
and step S203, when receiving the permission information sent by the server, establishing a connection relationship with the target smart device according to the permission information, where the permission information is sent by the server when determining a predetermined result, the predetermined result is determined by the server when receiving feedback information of the target smart device according to the request information and the feedback information, the predetermined result is determined by allowing the target terminal to bind with the target smart device, the feedback information includes second verification information and a second location, the second verification information is generated by the target smart device in response to a first predetermined operation acting on a target keyboard, the first predetermined operation is an operation of inputting the first verification information, the target keyboard is a keyboard of the target smart device, and the second location is a location of the target smart device.
The device herein may be a server, PC, PAD, cell phone, etc.
The application also provides a computer program product adapted to perform, when executed on a data processing device, a program initialized with at least the following method steps:
step S101, when request information of a target terminal is received, generating corresponding first verification information and sending the first verification information to the target terminal, wherein the request information comprises a distribution network request and a first position, and the first position is the position of the target terminal;
step S102, determining whether to allow the target terminal to bind with the target intelligent device according to the request information and the feedback information when feedback information of the target intelligent device is received, wherein the feedback information comprises second verification information and a second position, the second verification information is generated by the target intelligent device in response to a first preset operation acting on a target keyboard, the first preset operation is an operation for inputting the first verification information, the target keyboard is a keyboard of the target intelligent device, and the second position is a position of the target intelligent device;
Step S103, sending permission information to the target terminal to enable the target terminal to display a distribution network interface under the condition that the target terminal is allowed to bind with the target intelligent device, wherein the target terminal establishes a connection relationship with the target intelligent device according to the distribution network interface,
or a program adapted to perform an initialization with at least the following method steps:
step S201, under the condition that an operation for adding a target intelligent device acting on a target terminal is received, generating request information and sending the request information to a server, wherein the request information comprises a distribution network request and a first position, and the first position is the position of the target terminal;
step S202, receiving first verification information sent by the server, wherein the first verification information is generated by the server according to the request information;
and step S203, when receiving the permission information sent by the server, establishing a connection relationship with the target smart device according to the permission information, where the permission information is sent by the server when determining a predetermined result, the predetermined result is determined by the server when receiving feedback information of the target smart device according to the request information and the feedback information, the predetermined result is determined by allowing the target terminal to bind with the target smart device, the feedback information includes second verification information and a second location, the second verification information is generated by the target smart device in response to a first predetermined operation acting on a target keyboard, the first predetermined operation is an operation of inputting the first verification information, the target keyboard is a keyboard of the target smart device, and the second location is a location of the target smart device.
According to another exemplary embodiment of the present application, there is further provided a processor, where the processor is configured to execute a program, and the program executes the binding method between the smart device and the terminal.
According to yet another exemplary embodiment of the present application, there is also provided a binding system, including an intelligent device, a server, and a terminal subsystem, where the intelligent device includes a keyboard; the server comprises a first control device, wherein the first control device is used for executing the binding method of the intelligent equipment and the terminal applied to the server side; the terminal subsystem comprises a terminal and a second control device of the terminal, and the second control device is used for executing the binding method of the intelligent equipment applied to the terminal and the terminal.
The binding system comprises an intelligent device, a server and a terminal subsystem, wherein the intelligent device comprises a keyboard; the server comprises a first control device, wherein the first control device is used for executing the binding method of the intelligent equipment and the terminal applied to the server side; the terminal subsystem comprises a terminal and a second control device of the terminal, and the second control device is used for executing the binding method of the intelligent equipment applied to the terminal and the terminal. Compared with the problem that the network configuration scheme of the intelligent equipment cannot effectively prevent malicious network allocation in the prior art, the binding system of the intelligent equipment and the terminal can effectively prevent the malicious network allocation of other equipment by setting the first verification information, the second verification information, the first position and the second position to determine whether the target terminal and the target intelligent equipment are allowed to bind or not when the target terminal requests to establish the connection relation with the target intelligent equipment, and the connection relation can be established only when the target terminal and the target intelligent equipment are allowed to bind, so that the malicious network allocation of other equipment can be effectively prevented, and the user experience is ensured to be better.
The binding procedure of the intelligent device and the terminal according to the specific embodiment of the application is as follows:
as shown in fig. 5, a user sends request information to a server through an APP on a mobile phone, where the request information includes a network allocation request, a first location characterizing a location of the user, and user information;
the server stores the first position and the user information into a database;
the server generates the corresponding first verification code and returns the first verification code to the mobile phone of the user so that the mobile phone displays the first verification code on a screen;
the user inputs a second verification code on a keyboard of the target intelligent device according to the first verification code displayed on the mobile phone, and the first verification code is identical to the second verification code under the condition that the user does not input errors;
when the target intelligent device receives the second verification code, feedback information comprising the second verification code and a second position representing the target intelligent device is sent to a server;
the server analyzes the feedback information to perform information verification and position information verification, specifically, the server searches a first position corresponding to a second verification code from a database, determines whether the second position is in a preset area comprising the first position, and determines that the network distribution is successful when the second position is in the preset area comprising the first position, or determines that the network distribution is failed when the second position is in the preset area comprising the first position. Therefore, when the user inputs the first verification code incorrectly or the user exceeds the allowable network distribution range of the target intelligent equipment, the network distribution with the target intelligent equipment cannot be successful, and the problem of malicious network distribution is avoided.
In the foregoing embodiments of the present application, the descriptions of the embodiments are emphasized, and for a portion of this disclosure that is not described in detail in this embodiment, reference is made to the related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed technology may be implemented in other manners. The above-described embodiments of the apparatus are merely exemplary, and the division of the units may be a logic function division, and there may be another division manner when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interfaces, units or modules, or may be in electrical or other forms.
The units described above as separate components may or may not be physically separate, and components shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units described above, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server or a network device, etc.) to perform all or part of the steps of the above-mentioned method of the various embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
From the above description, it can be seen that the above embodiments of the present application achieve the following technical effects:
1) In the binding method of the intelligent equipment and the terminal, firstly, under the condition that request information comprising a distribution network request and a first position of a target terminal is received, corresponding first verification information is generated and sent to the target terminal; then, under the condition that feedback information comprising second verification information and a second position sent by the target intelligent device is received, determining whether the target terminal is allowed to be bound with the target intelligent device or not, wherein the second verification information is generated by a user inputting the received first verification information into a keyboard of the target intelligent device by the target terminal; and finally, under the condition that the target terminal is determined to be allowed to bind with the target intelligent equipment, transmitting permission information which can enable the target terminal to display a distribution network interface to the target terminal, so that the target terminal establishes a connection relationship with the target intelligent equipment according to the distribution network interface. Compared with the problem that the network configuration scheme of the intelligent equipment cannot effectively prevent malicious network allocation in the prior art, the binding method of the intelligent equipment and the terminal can determine whether the target terminal and the target intelligent equipment are allowed to bind according to the first verification information, the second verification information, the first position and the second position when the target terminal requests to establish the connection relation with the target intelligent equipment, and can establish the connection relation only under the condition that the target terminal and the target intelligent equipment are allowed to bind, so that the malicious network allocation of other equipment can be effectively prevented, and better user experience is ensured.
2) In the binding method of the intelligent device and the terminal, firstly, under the condition of receiving the operation of adding the target intelligent device acting on the target terminal, request information comprising a network allocation request and a first position is generated and sent to a server; then, receiving first verification information sent by the server, wherein the first verification information is generated by the server according to the request information; and finally, under the condition that the permission information sent by the server is received, establishing a connection relation with the target intelligent device according to the permission information, wherein the permission information is sent by the server under the condition that a preset result which is used for allowing the target terminal to be bound with the target intelligent device is confirmed, the preset result is determined by the server under the condition that feedback information comprising second verification information and a second position of the target intelligent device is received, the second verification information is generated by the target intelligent device according to a first preset operation acting on a target keyboard and is determined according to the request information and the feedback information, and the first preset operation is an operation for inputting the first verification information. Compared with the problem that the network configuration scheme of the intelligent equipment cannot effectively prevent malicious network allocation in the prior art, the binding method of the intelligent equipment and the terminal can determine whether the target terminal and the target intelligent equipment are allowed to bind according to the first verification information, the second verification information, the first position and the second position when the target terminal requests to establish the connection relation with the target intelligent equipment, and can establish the connection relation only under the condition that the target terminal and the target intelligent equipment are allowed to bind, so that the malicious network allocation of other equipment can be effectively prevented, and better user experience is ensured.
3) In the binding device of the intelligent equipment and the terminal, under the condition that the first generation unit receives the request information of the target terminal, corresponding first verification information is generated and sent to the target terminal, wherein the request information comprises a network distribution request and a first position, and the first position is the position of the target terminal; determining, by the determining unit, whether to allow binding of the target terminal and the target smart device according to the request information and the feedback information when feedback information of the target smart device is received, where the feedback information includes second verification information and a second location, the second verification information is generated by the target smart device in response to a first predetermined operation acting on a target keyboard, the first predetermined operation is an operation of inputting the first verification information, the target keyboard is a keyboard of the target smart device, and the second location is a location of the target smart device; and sending permission information to the target terminal by the first sending unit under the condition that the target terminal is ensured to be allowed to bind with the target intelligent equipment, so that the target terminal displays a distribution network interface, and the target terminal establishes a connection relation with the target intelligent equipment according to the distribution network interface. Compared with the problem that the network configuration scheme of the intelligent equipment cannot effectively prevent malicious network allocation in the prior art, the binding device of the intelligent equipment and the terminal can determine whether the target terminal and the target intelligent equipment are allowed to bind according to the first verification information, the second verification information, the first position and the second position when the target terminal requests to establish the connection relation with the target intelligent equipment, and can establish the connection relation only under the condition that the target terminal and the target intelligent equipment are allowed to bind, so that the malicious network allocation of other equipment can be effectively prevented, and the user experience is ensured to be better.
4) In the binding device of the intelligent equipment and the terminal, under the condition that the second generating unit receives the operation acting on the target terminal and used for adding the target intelligent equipment, request information is generated and sent to the server, the request information comprises a distribution network request and a first position, and the first position is the position of the target terminal; receiving, by the second receiving unit, first authentication information sent by the server, where the first authentication information is generated by the server according to the request information; and establishing a connection relationship with the target intelligent device according to the permission information when receiving the permission information sent by the server through the connection unit, wherein the permission information is sent by the server when determining a preset result, the preset result is determined by the server when receiving feedback information of the target intelligent device according to the request information and the feedback information, the preset result is determined by allowing the target terminal to bind with the target intelligent device, the feedback information comprises second verification information and a second position, the second verification information is generated by the target intelligent device according to a first preset operation acting on a target keyboard, the first preset operation is an operation of inputting the first verification information, the target keyboard is a keyboard of the target intelligent device, and the second position is a position of the target intelligent device. Compared with the problem that the network configuration scheme of the intelligent equipment cannot effectively prevent malicious network allocation in the prior art, the binding method of the intelligent equipment and the terminal can determine whether the target terminal and the target intelligent equipment are allowed to bind according to the first verification information, the second verification information, the first position and the second position when the target terminal requests to establish the connection relation with the target intelligent equipment, and can establish the connection relation only under the condition that the target terminal and the target intelligent equipment are allowed to bind, so that the malicious network allocation of other equipment can be effectively prevented, and better user experience is ensured.
5) The binding system comprises intelligent equipment, a server and a terminal subsystem, wherein the intelligent equipment comprises a keyboard; the server comprises a first control device, wherein the first control device is used for executing the binding method of the intelligent equipment and the terminal applied to the server side; the terminal subsystem comprises a terminal and a second control device of the terminal, and the second control device is used for executing the binding method of the intelligent equipment applied to the terminal and the terminal. Compared with the problem that the network configuration scheme of the intelligent equipment cannot effectively prevent malicious network allocation in the prior art, the binding method of the intelligent equipment and the terminal can determine whether the target terminal and the target intelligent equipment are allowed to bind according to the first verification information, the second verification information, the first position and the second position when the target terminal requests to establish the connection relation with the target intelligent equipment, and can establish the connection relation only under the condition that the target terminal and the target intelligent equipment are allowed to bind, so that the malicious network allocation of other equipment can be effectively prevented, and better user experience is ensured.
The above description is only of the preferred embodiments of the present application and is not intended to limit the present application, but various modifications and variations can be made to the present application by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (10)

1. A method for binding an intelligent device with a terminal, the intelligent device including a keyboard, the method comprising:
under the condition that request information of a target terminal is received, generating corresponding first verification information and sending the first verification information to the target terminal, wherein the request information comprises a distribution network request and a first position, and the first position is the position of the target terminal;
under the condition that feedback information of a target intelligent device is received, determining whether the target terminal is allowed to be bound with the target intelligent device or not according to the request information and the feedback information, wherein the feedback information comprises second verification information and a second position, the second verification information is generated by the target intelligent device in response to a first preset operation acting on a target keyboard, the first preset operation is an operation for inputting the first verification information, the target keyboard is a keyboard of the target intelligent device, and the second position is a position of the target intelligent device;
Sending permission information to the target terminal under the condition that the target terminal is determined to be allowed to bind with the target intelligent equipment, so that the target terminal displays a distribution network interface, the target terminal establishes a connection relationship with the target intelligent equipment according to the distribution network interface,
under the condition that feedback information of the target intelligent device is received, determining whether to allow the target terminal to bind with the target intelligent device according to the request information and the feedback information comprises the following steps:
determining the first verification information which is the same as the second verification information from a database under the condition that the feedback information is received;
determining the corresponding first position according to the first verification information;
determining whether the second location is within a predetermined area including the first location;
and under the condition that the second position is determined to be located in the preset area, determining to allow the target terminal to be bound with the target intelligent device.
2. The method according to claim 1, wherein generating corresponding first authentication information and transmitting the first authentication information to a target terminal in case of receiving request information of the target terminal, comprises:
Generating the first verification information and sending the first verification information to the target terminal under the condition that the request information is received;
and storing the first verification information and the corresponding first position into a database.
3. The method according to claim 1 or 2, wherein the request information further includes device information bound to the target smart device, and in case it is determined that the target terminal is allowed to bind to the target smart device, sending license information to the target terminal, so that the target terminal displays a distribution network interface, the method further comprises:
receiving parameter information of the target intelligent equipment sent by the target terminal;
and adding the parameter information to the corresponding equipment information.
4. The binding method of the intelligent device and the terminal is characterized by comprising the following steps:
generating request information and sending the request information to a server under the condition that an operation for adding a target intelligent device acting on a target terminal is received, wherein the request information comprises a distribution network request and a first position, and the first position is the position of the target terminal;
receiving first verification information sent by the server, wherein the first verification information is generated by the server according to the request information;
In the case of receiving the permission information sent by the server, establishing a connection relationship with the target intelligent device according to the permission information, wherein the permission information is sent by the server under the condition of determining a preset result, the preset result is determined by the server according to the request information and the feedback information under the condition of receiving feedback information of the target intelligent device, the preset result is determined by allowing the target terminal to bind with the target intelligent device, the feedback information comprises second verification information and a second position, the second verification information is generated by the target intelligent device according to a first preset operation acting on a target keyboard, the first preset operation is an operation of inputting the first verification information, the target keyboard is a keyboard of the target intelligent device, the second position is a position of the target intelligent device,
the predetermined result is determined by the server in a case where the second location is determined to be located in a predetermined area of a first location determined by the server based on the first authentication information that is the same as the second authentication information determined from a database.
5. The method according to claim 4, wherein, in the case of receiving the license information sent by the server, establishing a connection relationship with the target smart device according to the license information, includes:
displaying a distribution network interface under the condition that the permission information is received;
and receiving a second preset operation acting on the distribution network interface, and establishing a connection relationship with the target intelligent equipment.
6. The method of claim 5, wherein the distribution network interface includes a first input box and a second input box, receiving a second predetermined operation acting on the distribution network interface, establishing a connection with the target smart device, comprising:
receiving input operation acting on the first input box, and acquiring a WIFI name;
receiving input operation acting on the second input box, and acquiring a WIFI password;
and accessing the WIFI broadcast initiated by the target intelligent device according to the WIFI name and the WIFI password.
7. The method according to any one of claims 4 to 6, wherein in case of receiving license information sent by the server, after establishing a connection relationship with the target smart device according to the license information, the method further comprises:
Acquiring parameter information of the target intelligent equipment;
and sending the parameter information to the server so that the server adds the parameter information to the equipment information corresponding to the target terminal.
8. A computer-readable storage medium, characterized in that the computer-readable storage medium comprises a stored program, wherein the program performs the method of any one of claims 1 to 3 or the method of any one of claims 4 to 7.
9. A processor for running a program, wherein the program when run performs the method of any one of claims 1 to 3 or the method of any one of claims 4 to 7.
10. A binding system, comprising:
an intelligent device comprising a keyboard;
a server comprising first control means for performing the method of any one of claims 1 to 3;
terminal subsystem comprising a terminal and second control means of the terminal for performing the method of any of claims 4 to 7.
CN202111355656.1A 2021-11-16 2021-11-16 Binding method and binding system for intelligent equipment and terminal Active CN114079925B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111355656.1A CN114079925B (en) 2021-11-16 2021-11-16 Binding method and binding system for intelligent equipment and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111355656.1A CN114079925B (en) 2021-11-16 2021-11-16 Binding method and binding system for intelligent equipment and terminal

Publications (2)

Publication Number Publication Date
CN114079925A CN114079925A (en) 2022-02-22
CN114079925B true CN114079925B (en) 2023-10-03

Family

ID=80283589

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111355656.1A Active CN114079925B (en) 2021-11-16 2021-11-16 Binding method and binding system for intelligent equipment and terminal

Country Status (1)

Country Link
CN (1) CN114079925B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108259643A (en) * 2018-01-12 2018-07-06 美的智慧家居科技有限公司 Smart machine and the binding method of user's operation terminal and device, electronic equipment
CN109246604A (en) * 2018-09-30 2019-01-18 美的集团股份有限公司 Smart machine secure binding method, server, smart machine and ustomer premises access equipment
CN112533206A (en) * 2020-12-04 2021-03-19 北京金史密斯科技有限公司 Network distribution method and device, storage medium and electronic equipment
CN112637844A (en) * 2020-12-16 2021-04-09 珠海格力电器股份有限公司 Security authentication method, device, equipment and medium
CN113507707A (en) * 2021-05-21 2021-10-15 海南师范大学 Network distribution method and system of intelligent teaching equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108259643A (en) * 2018-01-12 2018-07-06 美的智慧家居科技有限公司 Smart machine and the binding method of user's operation terminal and device, electronic equipment
CN109246604A (en) * 2018-09-30 2019-01-18 美的集团股份有限公司 Smart machine secure binding method, server, smart machine and ustomer premises access equipment
CN112533206A (en) * 2020-12-04 2021-03-19 北京金史密斯科技有限公司 Network distribution method and device, storage medium and electronic equipment
CN112637844A (en) * 2020-12-16 2021-04-09 珠海格力电器股份有限公司 Security authentication method, device, equipment and medium
CN113507707A (en) * 2021-05-21 2021-10-15 海南师范大学 Network distribution method and system of intelligent teaching equipment

Also Published As

Publication number Publication date
CN114079925A (en) 2022-02-22

Similar Documents

Publication Publication Date Title
US11539687B2 (en) Message right management method, device and storage medium
CN109068179B (en) Multi-platform live broadcast method, computer device and computer readable storage medium
CN104967997B (en) A kind of Wi-Fi cut-in method, Wi-Fi equipment, terminal device and system
CN103944890B (en) Virtual interaction system based on customer end/server mode and method
US20200021596A1 (en) Cloud Device Account Configuration Method, Apparatus and System, and Data Processing Method
CN109328467B (en) Method, server and system for downloading updated profiles
CN110198296B (en) Authentication method and device, storage medium and electronic device
CN110365684B (en) Access control method and device for application cluster and electronic equipment
CN105379223A (en) Validating the identity of a mobile application for mobile application management
CN111355723B (en) Single sign-on method, device, equipment and readable storage medium
CN107086984A (en) A kind of method, terminal and server for obtaining and generating identifying code
CN110430167B (en) Temporary account management method, electronic device, management terminal and storage medium
CN112559993B (en) Identity authentication method, device and system and electronic equipment
CN107820702B (en) Management and control method, device and electronic equipment
CN106254319B (en) Light application login control method and device
CN104680075A (en) Framework for fine-grain access control from high-level application permissions
US9877190B1 (en) System and method for authentication and sharing of subscriber data
CN104468486A (en) Information processing method and system and electronic device
CN101917700B (en) Method for using service application and user identification module
EP3308319B1 (en) Method and system for anonymizing a user identity and/or user data of a subscriber of a data protection service, program and computer program product
CN113766496A (en) Cross-platform binding method and system of intelligent equipment and related equipment
CN104426834A (en) Webpage requesting method, client, server and system
CN114079925B (en) Binding method and binding system for intelligent equipment and terminal
CN107204959B (en) Verification method, device and system of verification code
CN103747423A (en) Registration method, apparatus and system of terminal application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant