TWI688245B - Login method and device of internet of things equipment - Google Patents

Login method and device of internet of things equipment Download PDF

Info

Publication number
TWI688245B
TWI688245B TW108101179A TW108101179A TWI688245B TW I688245 B TWI688245 B TW I688245B TW 108101179 A TW108101179 A TW 108101179A TW 108101179 A TW108101179 A TW 108101179A TW I688245 B TWI688245 B TW I688245B
Authority
TW
Taiwan
Prior art keywords
verification
iot
server
internet
user
Prior art date
Application number
TW108101179A
Other languages
Chinese (zh)
Other versions
TW201943251A (en
Inventor
覃瑤
王林青
鄒啟蒙
繆仁將
Original Assignee
香港商阿里巴巴集團服務有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 香港商阿里巴巴集團服務有限公司 filed Critical 香港商阿里巴巴集團服務有限公司
Publication of TW201943251A publication Critical patent/TW201943251A/en
Application granted granted Critical
Publication of TWI688245B publication Critical patent/TWI688245B/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Abstract

本說明書實施例提供一種物聯網設備的登錄方法和裝置,其中,所述方法包括:在檢測到登錄觸發時,獲取設備操作使用者輸入的驗證要素;對所述驗證要素進行本地校驗;若校驗通過,啟用登錄時的離線功能,並將所述驗證要素發送至物聯網伺服器進行二次校驗;當所述物聯網伺服器二次校驗通過時,登錄所述物聯網伺服器,以開始與所述物聯網伺服器之間的業務通訊。Embodiments of the present specification provide a method and an apparatus for logging in an Internet of Things device, wherein the method includes: acquiring a verification element input by a device operation user when a login trigger is detected; performing local verification on the verification element; if Pass verification, enable offline function at login, and send the verification element to the IoT server for secondary verification; when the secondary verification of the IoT server passes, log in to the IoT server To start business communication with the Internet of Things server.

Description

物聯網設備的登錄方法和裝置Login method and device of internet of things equipment

本公開涉及物聯網技術領域,特別涉及一種物聯網設備的登錄方法和裝置。 The present disclosure relates to the field of Internet of Things technology, and in particular, to a method and device for logging in an Internet of Things device.

物聯網(Internet of things,簡稱:IoT)是新一代資訊技術的重要組成部分,物聯網可以透過智慧感知、識別技術與普及計算等通信感知技術,在物品和物品之間實現資訊交換和通信,物聯網也被稱為繼電腦、網際網路之後世界資訊產業發展的第三次浪潮。隨著物聯網技術的快速發展,IOT設備也日益增多。例如,IOT設備可以是智慧家居設備,也可以是繳費設備等多種類型的設備。IOT設備的安全問題是物聯網發展中需要重點關注和解決的問題。 The Internet of Things (IoT) is an important part of the new generation of information technology. The Internet of Things can realize information exchange and communication between items and items through communication perception technologies such as smart perception, recognition technology, and popular computing. The Internet of Things is also known as the third wave of development of the world’s information industry after computers and the Internet. With the rapid development of Internet of Things technology, IOT devices are also increasing. For example, the IOT device can be a smart home device, or it can be a payment device and other types of devices. The security problem of IOT equipment is a problem that needs to be focused and solved in the development of the Internet of Things.

有鑑於此,本說明書一個或多個實施例提供一種物聯網設備的登錄方法和裝置,以實現物聯網設備更加快速和安全的登錄。 In view of this, one or more embodiments of this specification provide a method and an apparatus for logging in an Internet of Things device, so as to realize a faster and safer login of the Internet of Things device.

具體地,本說明書一個或多個實施例是透過如下技術方案實現的: Specifically, one or more embodiments of this specification are implemented through the following technical solutions:

第一方面,提供一種物聯網設備的登錄方法,所述方法包括:在檢測到登錄觸發時,獲取設備操作使用者輸入的驗證要素;對所述驗證要素進行本地校驗;若校驗通過,啟用登錄時的離線功能,並將所述驗證要素發送至物聯網伺服器進行二次校驗;當所述物聯網伺服器二次校驗通過時,登錄所述物聯網伺服器,以開始與所述物聯網伺服器之間的業務通訊。 In a first aspect, a method for logging in an Internet of Things device is provided. The method includes: acquiring a verification element input by a device operation user when a login trigger is detected; performing local verification on the verification element; if the verification passes, Enable the offline function during login, and send the verification element to the IoT server for secondary verification; when the secondary verification of the IoT server passes, log in to the IoT server to start Business communication between the Internet of Things servers.

第二方面,提供了一種物聯網設備的登錄方法,所述方法包括:接收並儲存物聯網設備發送的驗證要素,所述驗證要素由所述物聯網設備對應的設備操作使用者設置;在接收到所述物聯網設備發送的二次校驗請求時,比較所述二次校驗請求中攜帶的驗證要素與儲存的所述驗證要素,若兩者相同,則二次校驗通過,設置所述物聯網設備為登錄狀態,以開始與所述物聯網設備進行業務通訊。 In a second aspect, a method for logging in an IoT device is provided. The method includes: receiving and storing a verification element sent by the IoT device, the verification element being set by a device operation user corresponding to the IoT device; When the secondary verification request sent by the IoT device is compared with the verification element carried in the secondary verification request and the stored verification element, if the two are the same, the secondary verification passes and the The Internet of Things device is in a login state to start business communication with the Internet of Things device.

第三方面,提供一種物聯網設備的登錄裝置,所述裝置包括:要素接收模組,用於在檢測到登錄觸發時,獲取設備操作使用者的驗證要素;本地校驗模組,用於對所述驗證要素進行本地校驗;校驗結果模組,用於在所述本地校驗模組校驗通過時,將所述驗證要素發送至物聯網伺服器進行二次校驗;連接處理模組,用於當所述物聯網伺服器二次校驗通過時,登錄所述物聯網伺服器,開始與所述物聯網伺服器之間的業務通訊。 第四方面,提供一種物聯網設備的登錄裝置,所述裝置包括: 要素儲存模組,用於接收並儲存物聯網設備發送的驗證要素,所述驗證要素由所述物聯網設備對應的設備操作使用者設置; 校驗處理模組,用於在接收到所述物聯網設備發送的二次校驗請求時,比較所述二次校驗請求中攜帶的驗證要素與儲存的所述驗證要素,若兩者相同,則二次校驗通過,設置所述物聯網設備為登錄狀態,並開始與所述物聯網設備進行業務通訊。 第五方面,提供一種物聯網設備,所述設備包括記憶體、處理器,以及儲存在記憶體上並可在處理器上運行的電腦指令,所述處理器執行指令時實現以下步驟: 在檢測到登錄觸發時,獲取設備操作使用者的驗證要素; 對所述驗證要素進行本地校驗; 若校驗通過,啟用登錄時的離線功能,並將所述驗證要素發送至物聯網伺服器進行二次校驗; 當所述物聯網伺服器二次校驗通過時,登錄所述物聯網伺服器,開始與所述物聯網伺服器之間的業務通訊。 第六方面,提供一種物聯網伺服器,所述設備包括記憶體、處理器,以及儲存在記憶體上並可在處理器上運行的電腦指令,所述處理器執行指令時實現以下步驟: 接收並儲存物聯網設備發送的驗證要素,所述驗證要素由所述物聯網設備對應的設備操作使用者設置; 在接收到所述物聯網設備發送的二次校驗請求時,比較所述二次校驗請求中攜帶的驗證要素與儲存的所述驗證要素,若兩者相同,則二次校驗通過,設置所述物聯網設備為登錄狀態,並開始與所述物聯網設備進行業務通訊。 第七方面,提供一種物聯網系統,所述系統包括:物聯網設備和物聯網伺服器; 所述物聯網設備,用於:獲取所述設備操作使用者設置的所述驗證要素,儲存所述驗證要素,並將所述驗證要素發送至物聯網伺服器儲存;在檢測到登錄觸發時,獲取設備操作使用者的驗證要素;對所述驗證要素進行本地校驗;若校驗通過,啟用登錄時的離線功能,並將所述驗證要素發送至物聯網伺服器進行二次校驗;當所述物聯網伺服器二次校驗通過時,登錄所述物聯網伺服器,開始與所述物聯網伺服器之間的業務通訊; 所述物聯網伺服器,用於:接收並儲存物聯網設備發送的驗證要素,所述驗證要素由所述物聯網設備對應的設備操作使用者設置;並在接收到所述物聯網設備發送的二次校驗請求時,比較所述二次校驗請求中攜帶的驗證要素與儲存的所述驗證要素,若兩者相同,則二次校驗通過,設置所述物聯網設備為登錄狀態,並開始與所述物聯網設備進行業務通訊。 本說明書一個或多個實施例的物聯網設備的登錄方法和裝置,透過使用“雙重校驗”的方式,一方面的校驗是在物聯網設備的本地校驗,另一方面的校驗是在物聯網伺服器側的二次校驗,這種雙重校驗方式,能夠很好的保證“使用者和綁定設備之間對應關係的正確”,提高了IOT設備的安全性,保障IOT設備是由其真正的歸屬使用者在操作;並且,透過在本地校驗通過後,就預先啟用離線功能,使得物聯網設備更加快速的登錄。In a third aspect, a login device for an Internet of Things device is provided. The device includes: an element receiving module for acquiring a verification element of a user operating the device when a login trigger is detected; a local verification module for The verification element performs local verification; the verification result module is used to send the verification element to the Internet of Things server for secondary verification when the local verification module passes the verification; connection processing mode The group is used to log in to the IoT server and start business communication with the IoT server when the IoT server passes the second verification. According to a fourth aspect, an apparatus for logging in an Internet of Things device is provided. The apparatus includes: An element storage module for receiving and storing verification elements sent by the Internet of Things device, the verification elements being set by a device operation user corresponding to the Internet of Things device; The verification processing module is used to compare the verification element carried in the secondary verification request with the stored verification element when receiving the secondary verification request sent by the Internet of Things device, if the two are the same , The second verification passes, the Internet of Things device is set to the login state, and business communication with the Internet of Things device is started. According to a fifth aspect, an Internet of Things device is provided. The device includes a memory, a processor, and computer instructions stored on the memory and executable on the processor. When the processor executes the instructions, the following steps are implemented: When the login trigger is detected, obtain the verification elements of the device operation user; Perform local verification on the verification element; If the verification passes, the offline function at the time of login is enabled, and the verification element is sent to the Internet of Things server for secondary verification; When the second verification of the Internet of Things server passes, the Internet of Things server is registered, and business communication with the Internet of Things server is started. According to a sixth aspect, an IoT server is provided. The device includes a memory, a processor, and computer instructions stored on the memory and executable on the processor. When the processor executes the instructions, the following steps are implemented: Receiving and storing verification elements sent by the Internet of Things device, the verification elements being set by a device operation user corresponding to the Internet of Things device; When receiving the secondary verification request sent by the Internet of Things device, compare the verification element carried in the secondary verification request with the stored verification element, if the two are the same, the secondary verification passes, The Internet of Things device is set to a login state, and business communication with the Internet of Things device is started. In a seventh aspect, an IoT system is provided. The system includes: an IoT device and an IoT server; The IoT device is used to: obtain the verification element set by the user of the device operation, store the verification element, and send the verification element to the IoT server for storage; when a login trigger is detected, Obtain the verification elements of the equipment operation user; perform local verification on the verification elements; if the verification passes, enable the offline function at login, and send the verification elements to the Internet of Things server for secondary verification; When the second verification of the IoT server passes, log in to the IoT server and start business communication with the IoT server; The IoT server is used to: receive and store the verification element sent by the IoT device, the verification element is set by a device operation user corresponding to the IoT device; During the second verification request, compare the verification element carried in the second verification request with the stored verification element, if the two are the same, the second verification passes, and the Internet of Things device is set to the login state, And start business communication with the Internet of Things equipment. In the method and device for logging in an IoT device according to one or more embodiments of this specification, by using the "double verification" method, the verification on the one hand is local verification on the IoT device, and the verification on the other hand is The secondary verification on the server side of the Internet of Things, this double verification method can well guarantee "the correct correspondence between the user and the bound device", improve the security of the IOT device, and protect the IOT device It is operated by its real attribution user; and, after passing the local verification, the offline function is enabled in advance, so that the IoT device can log in more quickly.

為了使本技術領域的人員更好地理解本說明書一個或多個實施例中的技術方案,下面將結合本說明書一個或多個實施例中的圖式,對本說明書一個或多個實施例中的技術方案進行清楚、完整地描述,顯然,所描述的實施例僅僅是本說明書一部分實施例,而不是全部的實施例。基於本說明書一個或多個實施例,本領域普通技術人員在沒有作出創造性勞動前提下所獲得的所有其他實施例,都應當屬於本公開保護的範圍。 在物聯網系統中,可以由物聯網伺服器來對物聯網設備進行操作控制,如果一個使用者想要使用一個物聯網設備,可以向設備對應的物聯網伺服器申請對該設備的操作許可權。可以參見圖1示例的物聯網系統,如圖1所示,該系統可以包括:物聯網設備11、物聯網設備12、物聯網設備1n等設備,這些設備的操作控制可以都由物聯網伺服器21管理。 如果一個使用者22想要使用其中一個物聯網設備11,他可以向物聯網伺服器21申請對這個設備的使用授權。例如,當物聯網伺服器21授權使用者22使用物聯網設備11之後,相當於建立了物聯網設備11與使用者22之間的綁定關係,其他使用者可以不再具有對該設備的操作使用權限。而假如物聯網伺服器21解除了物聯網設備11與使用者22之間的綁定關係,相當於該物聯網設備11不存在與之綁定的使用者,則該設備將可以不回應任何使用者的操作指令,設備處於鎖定狀態。 在物聯網設備的使用中發現,物聯網設備與其對應綁定的使用者,存在這種綁定關係被破壞的安全隱患。以物聯網設備是收款設備(如,銷售終端POS機,到賬播報設備,二維碼反掃器等)為例,商家可以使用收款設備來進行日常商業活動中的收款,並且商家和自己的收款設備之間存在綁定關係,這個收款設備可以專用於該綁定的商家收款,商家可以在收款設備上設置自己的收款帳戶。但是,有可能犯罪分子將商家的收款設備偷偷替換為另一個收款設備,且該另一個收款設備上設置了犯罪分子自己的收款帳戶,商家如果沒有發現,將造成資金損失。再例如,犯罪分子可以將商家的收款設備偷走,並變更了設備上的收款帳戶為自己的帳戶,如果不能及時發現,也會造成資金損失。 為了保證商家使用的收款設備一定是自己的設備,保障物聯網設備及其操作使用者之間的對應關係的正確性,本說明書一個或多個實施例提供了一種物聯網設備的登錄方法,該方法可以在物聯網設備與物聯網伺服器登錄連接的過程中進行校驗,確保在物聯網設備與物聯網伺服器業務通訊(即開始正常的業務通訊傳輸)之前,就預先校驗了是正確的綁定使用者在使用該物聯網設備。 圖2示例了本說明書一個或多個實施例的物聯網設備的登錄方法,這裡的“登錄”指的是物聯網設備登錄上物聯網伺服器,可以與物聯網伺服器進行正常的業務通訊,包括物聯網設備上不僅可以使用離線功能,也可以使用非離線功能。如圖2所示,完成上述登錄過程的方法可以包括如下處理。 在步驟200中,使用者終端獲取物聯網設備的設備資訊。 在一個例子中,物聯網設備上可以貼有二維碼,該二維碼中可以包括了物聯網設備的設備資訊,還可以包括設備對應的物聯網伺服器的伺服器位址。本例子中,可以將要操作使用物聯網設備的使用者稱為設備操作使用者。設備操作使用者可以使用自己的使用者終端(例如,手機)掃描上述二維碼,獲得設備資訊和伺服器位址。該設備資訊可以用於使得物聯網伺服器知曉是哪個物聯網設備。 在步驟202中,使用者終端向物聯網伺服器請求對物聯網設備的使用權限。 例如,設備操作使用者可以透過使用者終端,向伺服器位址對應的物聯網伺服器發送設備使用請求,該請求用於申請設備操作使用者對物聯網設備的使用權限。在分配許可權之前,可以認為各個物聯網設備都是處於鎖定狀態,處於鎖定狀態的物聯網設備可以不回應使用者輸入的操作指令,使用者無法使用設備。 其中,設備使用請求中可以攜帶:步驟200中獲得的設備資訊,以使得物聯網伺服器知曉使用者是在請求對哪個設備的使用權限。此外,設備使用請求中還可以攜帶設備操作使用者的使用者資訊,物聯網伺服器在授權設備操作使用者使用物聯網設備之前,可以根據該使用者資訊對使用者身份進行校驗,判斷這個使用者是否能夠具有使用所請求的物聯網設備的使用權限。比如,使用者是否是已經註冊的使用者,使用者是否是物聯網設備的預置使用者,等。 如果物聯網伺服器校驗使用者資訊通過,則可以繼續執行步驟204;否則,物聯網伺服器可以向使用者終端回饋“您沒有許可權使用該設備”等提示資訊。 在步驟204中,物聯網設備向使用者終端分配登錄帳號。 例如,物聯網設備可以分別向使用者終端和物聯網設備發送登錄帳號。設備操作使用者可以憑藉該登錄帳號,操作物聯網設備。即該登錄帳號可以由設備操作使用者在設備初始化時使用,比如,當物聯網設備是收款設備時,使用者可以在物聯網設備上設置收款帳戶;還可以在物聯網設備上設置指紋、密碼等驗證要素以供後續驗證使用。而對於物聯網設備來說,物聯網設備可以憑藉物聯網伺服器發送的登錄帳號,知曉可以回應該登錄帳號對應的設備操作使用者的使用者指令,接受該使用者的操作和使用。 此外,物聯網伺服器還可以管理物聯網設備的狀態,示例性的,可以包括:鎖定狀態、分配狀態。本步驟中,在分配了登錄帳號後,物聯網伺服器可以將物聯網設備的設備狀態更改為分配狀態。物聯網伺服器還可以儲存物聯網設備和設備操作使用者之間的對應關係,如表1所示,其中,設備操作使用者可以用上述分配的登錄帳號來標識,設備標識可以由設備資訊中獲得: 表1 設備和使用者的對應關係

Figure 108101179-A0304-0001
上述表1的對應關係,表示物聯網伺服器建立了物聯網設備和設備操作使用者之間的綁定關係,該設備可以接受該設備操作使用者的使用者指令,所述的指令可以是使用者對設備的設置。 在步驟206中,使用者透過該登錄帳號使用物聯網設備,設置驗證要素。 本步驟中,使用者可以向物聯網設備設置驗證要素。例如,該驗證要素可以是密碼或者生物特徵,所述的密碼可以是數字和字母組合的密碼,或者還可以是圖案密碼、口令密碼;生物特徵可以是聲紋、指紋、人臉等。 此外,使用者向物聯網設備設置驗證要素的方式,可以是直接在設備上輸入;或者也可以是使用者透過使用者終端向物聯網設備發送。 還可能的方式是,設備操作使用者可以是在初次使用該物聯網設備時,在設備上設置驗證要素。或者,也可以是,在使用了一段時間後,想啟用驗證模式,再向物聯網設備設置驗證要素。 在步驟208中,物聯網設備儲存驗證要素,並將驗證要素發送至物聯網伺服器。本步驟中,物聯網設備一方面可以在本機存放區驗證要素,以供後續的本地校驗使用。並且,還可以將驗證要素發送至物聯網伺服器,以供後續的二次校驗使用。 此外,物聯網伺服器還可以在表1的對應關係的基礎上,添加驗證要素。如下面的表2所示,用於記錄登錄帳號對應的設備操作使用者設置的驗證要素。 表2 設備和使用者的對應關係
Figure 108101179-A0304-0002
在步驟210中,物聯網設備檢測到登錄觸發。 例如,這裡的登錄觸發,可以是物聯網設備檢測到設備操作使用者離開後,再回來時要重新進行登錄驗證。作為設備操作使用者的離開依據,示例性的,可以是物聯網設備檢測到設備鎖屏後一段時間要重新開啟,或者檢測到設備關機後又重新開機。這些操作都可以觸發物聯網設備的重新登錄。 在步驟212中,物聯網設備獲取設備操作使用者的驗證要素。 例如,物聯網設備可以獲取設備操作使用者的指紋、密碼等要素,以待驗證。使用者可以設置至少一個驗證要素。 在步驟214中,物聯網設備對驗證要素進行本地校驗。 例如,物聯網設備可以將在步驟212中檢測到登錄觸發後獲取的驗證要素,與步驟208中本機存放區的驗證要素比較,若兩者相同,則確認本地校驗通過。 在步驟216中,在本地校驗通過後,物聯網設備本地啟用登錄時的離線功能。 例如,若一個物聯網設備完成了整個登錄過程,可以認為包括兩個方面,一個方面是物聯網設備本地具有的一些離線功能已經能夠開始使用,比如,電腦,這些離線功能不涉及設備操作使用者的關鍵資料,可以不需要聯網使用;另一方面是物聯網設備還能夠由物聯網伺服器獲取到設備操作使用者的關鍵資料,這些關鍵資料是透過聯網後,由物聯網伺服器獲得。關鍵資料獲得後,物聯網設備可以與物聯網伺服器開始業務通訊,比如,以物聯網設備是POS機為例,業務通訊後,POS機可以向物聯網伺服器發送交易請求,伺服器可以配合POS機一起完成轉帳交易,例如,交易請求中可以包括轉帳金額、設備操作使用者設置的收款帳戶等參數,物聯網伺服器可以根據這些參數實現轉帳處理。 本步驟中,物聯網設備在本地校驗通過後,本地啟用登錄時的離線功能,可以加快設備的登錄速度,這樣等到後續步驟的二次校驗通過,物聯網設備只需要由物聯網伺服器獲取其他關鍵資料即可開始進行業務互動。並且,離線功能的預先啟用,也使得設備操作使用者可以先將這些離線功能使用起來,不需要等到物聯網伺服器校驗通過後才使用,使用者體驗比較好。 在步驟218中,物聯網設備將驗證要素發送至物聯網伺服器進行二次校驗。 本步驟中,物聯網設備可以向物聯網伺服器發送二次校驗請求,該請求中可以攜帶驗證要素,將驗證要素發送至物聯網伺服器,可以在伺服器側再驗證一次。 在步驟220中,物聯網伺服器對驗證要素進行二次校驗。 例如,物聯網伺服器在接收到物聯網設備發送的驗證要素後,可以將該驗證要素與步驟208中儲存的驗證要素進行比較。其中,物聯網設備在向物聯網伺服器發送驗證要素時,可以攜帶設備標識,由此物聯網伺服器可以知曉表2中對應該設備標識的驗證要素,從而進行儲存的驗證要素與接收到的二次校驗請求中攜帶的驗證要素的比較。若兩者相同,則二次校驗通過。 如果二次校驗通過,則物聯網伺服器可以繼續執行步驟222;否則,如果二次校驗不通過,可以執行步驟224。 在步驟222中,物聯網伺服器與物聯網設備開始登錄後的業務通訊過程。 例如,在二次校驗通過後,物聯網伺服器可以設置所述物聯網設備的狀態為登錄狀態,並開始與所述物聯網設備進行業務通訊,比如,POS機可以透過物聯網伺服器進行轉帳交易的處理。 在步驟224中,物聯網伺服器中止與物聯網設備的通訊。 本步驟中,物聯網伺服器可以向物聯網設備發送提示,不再繼續與物聯網設備正常通訊。例如,可以提示登錄失敗。此外,物聯網伺服器也可以向使用者終端提示異常,表示物聯網設備不能繼續使用。 本例子的物聯網設備的登錄方法,使用了“雙重校驗”的方式,一方面的校驗是在物聯網設備的本地校驗,另一方面的校驗是在物聯網伺服器側的二次校驗。這種雙重校驗方式,能夠很好的保證“使用者和綁定設備之間對應關係的正確”,提高IOT設備的安全性,保障IOT設備是由其真正的歸屬使用者在操作。 例如,假設犯罪分子偷偷使用物聯網設備,那麼他將無法通過物聯網設備的本地校驗,比如,指紋識別失敗;或者,假設犯罪分子將真正的物聯網設備替換為了犯罪分子自己的物聯網設備,那麼同樣真正的使用者在假的設備上也無法成功進行本地校驗。在登錄之前本地校驗的失敗,可以保證“設備操作使用者”和“物聯網設備”其中之一被替換,都會發現。 又例如,假設物聯網設備直接被犯罪分子偷走,並且假設真正使用者的本地校驗的驗證要素也被知曉,那可能犯罪分子將更改物聯網設備中的收款帳戶,以透過該帳戶獲取非法資金。 這種情況下,真正的設備操作使用者已經知曉物聯網設備被偷走了,使用者可以透過使用者終端向物聯網伺服器發送驗證取消請求,該請求用於請求取消所述設備操作使用者設置的驗證要素。例如,驗證取消請求中可以攜帶登錄帳號、或者使用者資訊、或者驗證要素。物聯網伺服器根據驗證取消請求,就可以找到類似表2所示的對應關係,並將對應關係中的物聯網設備和設備操作使用者之間的綁定解除,比如,解除了使用者使用的登錄帳號和設備標識之間的對應關係,可以直接將該對應關係進行清除,也不再儲存對應關係中的驗證要素,並且可以將物聯網設備的狀態重新設置為鎖定狀態。 那麼對於犯罪分子來說,即使進行本地校驗通過,二次校驗也無法通過,因為,若物聯網伺服器在接收到所述物聯網設備發送的二次校驗請求時,將會無法查找到儲存有該驗證要素,即確定並未儲存所述二次校驗請求中攜帶的驗證要素,則二次校驗失敗。而且在真正的設備操作使用者通知物聯網伺服器取消綁定後,物聯網設備已經重新鎖定,不再回應任何人的使用者指令了,物聯網伺服器和物聯網設備不再進行正常通訊。如果犯罪分子想要使用該物聯網設備,只能重新執行步驟200和步驟202,重新驗證身份獲取該設備的使用權限。因此,通過“物聯網伺服器側的二次校驗”,進一步增強了IOT設備的安全性,防止犯罪分子隨意使用物聯網設備。 如上,透過本說明書一個或多個實施例提供的物聯網設備的登錄方法,可以有效保證物聯網設備是由其真正的歸屬使用者在使用,保障了IOT設備的安全性。 為了實現上述的物聯網設備的登錄方法,本說明書一個或多個實施例還提供了一種物聯網設備的登錄裝置,該裝置可以應用於物聯網設備。如圖3所示,該裝置可以包括:要素接收模組31、本地校驗模組32、校驗結果模組33、連接處理模組34。 要素接收模組31,用於在檢測到登錄觸發時,獲取設備操作使用者的驗證要素; 本地校驗模組32,用於對所述驗證要素進行本地校驗; 校驗結果模組33,用於在所述本地校驗模組校驗通過時,將所述驗證要素發送至物聯網伺服器進行二次校驗; 連接處理模組34,用於當所述物聯網伺服器二次校驗通過時,登錄所述物聯網伺服器,開始與所述物聯網伺服器之間的業務通訊。 在一個例子中,要素接收模組31,還用於:在檢測到登錄觸發之前,獲取所述設備操作使用者設置的所述驗證要素;儲存所述驗證要素,並將所述驗證要素發送至物聯網伺服器儲存,以使得所述物聯網伺服器根據儲存的驗證要素執行二次校驗; 所述本地校驗模組32,具體用於:將在檢測到登錄觸發後獲取的驗證要素,與所述要素接收模組儲存的驗證要素比較,若兩者相同則確認本地校驗通過。 為了實現上述的物聯網設備的登錄方法,本說明書一個或多個實施例還提供了一種物聯網設備的登錄裝置,該裝置可以應用於物聯網伺服器。如圖4所示,該裝置可以包括:要素儲存模組41和校驗處理模組42。 要素儲存模組41,用於接收並儲存物聯網設備發送的驗證要素,所述驗證要素由所述物聯網設備對應的設備操作使用者設置; 校驗處理模組42,用於在接收到所述物聯網設備發送的二次校驗請求時,比較所述二次校驗請求中攜帶的驗證要素與儲存的所述驗證要素,若兩者相同,則二次校驗通過,設置所述物聯網設備為登錄狀態,並開始與所述物聯網設備進行業務通訊。 上述實施例闡明的裝置或模組,具體可以由電腦晶片或實體實現,或者由具有某種功能的產品來實現。一種典型的實現設備為電腦,電腦的具體形式可以是個人電腦、膝上型電腦、蜂窩電話、相機電話、智慧型電話、個人數位助理、媒體播放機、導航設備、電子郵件收發設備、遊戲控制台、平板電腦、可穿戴設備或者這些設備中的任意幾種設備的組合。 為了描述的方便,描述以上裝置時以功能分為各種模組分別描述。當然,在實施本說明書一個或多個實施例時可以把各模組的功能在同一個或多個軟體和/或硬體中實現。 上述圖中所示流程中的各個步驟,其執行順序不限制於流程圖中的順序。此外,各個步驟的描述,可以實現為軟體、硬體或者其結合的形式,例如,本領域技術人員可以將其實現為軟體程式碼的形式,可以為能夠實現所述步驟對應的邏輯功能的電腦可執行指令。當其以軟體的方式實現時,所述的可執行指令可以儲存在記憶體中,並被設備中的處理器執行。 例如,對應於上述方法,本說明書一個或多個實施例同時提供一種物聯網設備,該設備可以包括處理器、記憶體、以及儲存在記憶體上並可在處理器上運行的電腦指令,所述處理器透過執行所述指令,用於實現如下步驟: 在檢測到登錄觸發時,獲取設備操作使用者的驗證要素; 對所述驗證要素進行本地校驗; 若校驗通過,啟用登錄時的離線功能,並將所述驗證要素發送至物聯網伺服器進行二次校驗; 當所述物聯網伺服器二次校驗通過時,登錄所述物聯網伺服器,開始與所述物聯網伺服器之間的業務通訊。 在一個例子中,所述驗證要素,包括如下至少一種:指紋、密碼、口令、人臉、聲紋。 在一個例子中,所述處理器還用於在執行電腦指令時實現以下步驟: 在檢測到登錄觸發之前,獲取所述設備操作使用者設置的所述驗證要素; 儲存所述驗證要素,並將所述驗證要素發送至物聯網伺服器儲存,以使得所述物聯網伺服器根據儲存的所述驗證要素執行所述二次校驗。 例如,對應於上述方法,本說明書一個或多個實施例同時提供一種物聯網伺服器,該伺服器可以包括處理器、記憶體、以及儲存在記憶體上並可在處理器上運行的電腦指令,所述處理器透過執行所述指令,用於實現如下步驟: 接收並儲存物聯網設備發送的驗證要素,所述驗證要素由所述物聯網設備對應的設備操作使用者設置; 在接收到所述物聯網設備發送的二次校驗請求時,比較所述二次校驗請求中攜帶的驗證要素與儲存的所述驗證要素,若兩者相同,則二次校驗通過,設置所述物聯網設備為登錄狀態,並開始與所述物聯網設備進行業務通訊。 在一個例子中,所述處理器還用於在執行電腦指令時實現以下步驟: 接收所述設備操作使用者的使用者終端發送的驗證取消請求,所述驗證取消請求用於請求取消所述設備操作使用者設置的驗證要素; 根據所述驗證取消請求,清除所述驗證要素; 若在接收到所述物聯網設備發送的二次校驗請求時,確定並未儲存所述二次校驗請求中攜帶的驗證要素,則二次校驗失敗。 本說明書一個或多個實施例還提供了一種物聯網系統,該系統可以包括:物聯網設備和物聯網伺服器。 所述物聯網設備,用於:獲取所述設備操作使用者設置的所述驗證要素,儲存所述驗證要素,並將所述驗證要素發送至物聯網伺服器儲存;在檢測到登錄觸發時,獲取設備操作使用者的驗證要素;對所述驗證要素進行本地校驗;若校驗通過,啟用登錄時的離線功能,並將所述驗證要素發送至物聯網伺服器進行二次校驗;當所述物聯網伺服器二次校驗通過時,登錄所述物聯網伺服器,開始與所述物聯網伺服器之間的業務通訊; 所述物聯網伺服器,用於:接收並儲存物聯網設備發送的驗證要素,所述驗證要素由所述物聯網設備對應的設備操作使用者設置;並在接收到所述物聯網設備發送的二次校驗請求時,比較所述二次校驗請求中攜帶的驗證要素與儲存的所述驗證要素,若兩者相同,則二次校驗通過,設置所述物聯網設備為登錄狀態,並開始與所述物聯網設備進行業務通訊。 還需要說明的是,術語“包括”、“包含”或者其任何其他變體意在涵蓋非排他性的包含,從而使得包括一系列要素的過程、方法、商品或者設備不僅包括那些要素,而且還包括沒有明確列出的其他要素,或者是還包括為這種過程、方法、商品或者設備所固有的要素。在沒有更多限制的情況下,由語句“包括一個……”限定的要素,並不排除在包括所述要素的過程、方法、商品或者設備中還存在另外的相同要素。 本領域技術人員應明白,本說明書一個或多個實施例可提供為方法、系統或電腦程式產品。因此,本說明書一個或多個實施例可採用完全硬體實施例、完全軟體實施例或結合軟體和硬體方面的實施例的形式。而且,本說明書一個或多個實施例可採用在一個或多個其中包含有電腦可用程式碼的電腦可用儲存媒體(包括但不限於磁碟記憶體、CD-ROM、光學記憶體等)上實施的電腦程式產品的形式。 本說明書一個或多個實施例可以在由電腦執行的電腦可執行指令的一般上下文中描述,例如程式模組。一般地,程式模組包括執行特定任務或實現特定抽象資料類型的常式、程式、物件、元件、資料結構等等。也可以在分散式運算環境中實踐本說明書一個或多個實施例,在這些分散式運算環境中,由透過通信網路而被連接的遠端處理設備來執行任務。在分散式運算環境中,程式模組可以位於包括存放裝置在內的本地和遠端電腦儲存媒體中。 本說明書中的各個實施例均採用遞進的方式描述,各個實施例之間相同相似的部分互相參見即可,每個實施例重點說明的都是與其他實施例的不同之處。尤其,對於資料處理設備實施例而言,由於其基本相似於方法實施例,所以描述的比較簡單,相關之處參見方法實施例的部分說明即可。 上述對本說明書特定實施例進行了描述。其它實施例在申請專利範圍的範圍內。在一些情況下,在申請專利範圍中記載的動作或步驟可以按照不同於實施例中的順序來執行並且仍然可以實現期望的結果。另外,在圖式中描繪的過程不一定要求示出的特定順序或者連續順序才能實現期望的結果。在某些實施方式中,多工處理和並行處理也是可以的或者可能是有利的。 以上所述僅為本說明書一個或多個實施例的較佳實施例而已,並不用以限制本說明書一個或多個實施例,凡在本說明書一個或多個實施例的精神和原則之內,所做的任何修改、等同替換、改進等,均應包含在本說明書一個或多個實施例保護的範圍之內。In order to enable those skilled in the art to better understand the technical solutions in one or more embodiments of this specification, the following will be combined with the drawings in one or more embodiments of this specification. The technical solution is described clearly and completely. Obviously, the described embodiments are only a part of the embodiments of this specification, but not all the embodiments. Based on one or more embodiments of this specification, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present disclosure. In the IoT system, the IoT server can be used to control the operation of the IoT device. If a user wants to use an IoT device, he can apply for the operation permission of the device from the IoT server corresponding to the device . Please refer to the IoT system illustrated in FIG. 1, as shown in FIG. 1, the system may include: IoT devices 11, IoT devices 12, IoT devices 1n, etc. The operation control of these devices may all be controlled by IoT servers 21 management. If a user 22 wants to use one of the IoT devices 11, he can apply to the IoT server 21 for authorization to use the device. For example, after the Internet of Things server 21 authorizes the user 22 to use the Internet of Things device 11, it is equivalent to establishing a binding relationship between the Internet of Things device 11 and the user 22, and other users may no longer have operations on the device Use permissions. If the IoT server 21 releases the binding relationship between the IoT device 11 and the user 22, which means that there is no user bound to the IoT device 11, the device will not respond to any use. The user's operation instruction, the device is in a locked state. In the use of Internet of Things devices, it is found that the Internet of Things devices and their corresponding bound users have a hidden security risk that the binding relationship is broken. Taking the Internet of Things device as a collection device (for example, a sales terminal POS machine, an account reporting device, a QR code scanner, etc.) as an example, a merchant can use the collection device to collect money in daily business activities, and the merchant There is a binding relationship with its own collection device. This collection device can be used exclusively by the bound merchant to collect payments. The merchant can set up its own collection account on the collection device. However, it is possible that the criminals secretly replaced the merchant’s collection device with another collection device, and the criminal’s own collection account was set on the other collection device. If the merchant did not find it, it would cause financial losses. For another example, criminals can steal the merchant’s collection device and change the collection account on the device to their own account. If it cannot be found in time, it will also cause financial losses. In order to ensure that the payment device used by the merchant must be its own device, and to ensure the correctness of the correspondence between the IoT device and its operating users, one or more embodiments of this specification provide a login method for the IoT device, This method can be verified during the login connection between the IoT device and the IoT server, to ensure that the IoT device and the IoT server are pre-verified before the business communication (that is, the start of normal business communication transmission) The correct binding user is using the IoT device. FIG. 2 illustrates the login method of an IoT device according to one or more embodiments of this specification. “Login” refers to the IoT device logging into an IoT server, which can perform normal business communication with the IoT server. Including not only offline functions but also non-offline functions can be used on IoT devices. As shown in FIG. 2, the method for completing the above login process may include the following processing. In step 200, the user terminal obtains device information of the Internet of Things device. In one example, the IoT device may be pasted with a QR code, which may include device information of the IoT device, and may also include a server address of the IoT server corresponding to the device. In this example, the user who wants to operate and use the IoT device may be referred to as the device operation user. Device operation users can use their own user terminals (for example, mobile phones) to scan the QR code to obtain device information and server addresses. The device information can be used to make the IoT server know which IoT device. In step 202, the user terminal requests permission to use the Internet of Things device from the Internet of Things server. For example, a device operation user can send a device use request to an IoT server corresponding to the server address through a user terminal, and the request is used to apply for a device operation user's permission to use the IoT device. Before assigning the permission, it can be considered that each IoT device is in a locked state, and the IoT device in the locked state may not respond to the operation instruction input by the user, and the user cannot use the device. Among them, the device use request may carry: the device information obtained in step 200, so that the Internet of Things server knows which device the user is requesting the right to use. In addition, the device use request can also carry the user information of the device operation user. Before the IoT server authorizes the device operation user to use the IoT device, it can verify the user's identity based on the user information to determine this Whether the user can have the right to use the requested IoT device. For example, whether the user is a registered user, whether the user is a preset user of the IoT device, etc. If the IoT server verifies that the user information is passed, you can continue to perform step 204; otherwise, the IoT server can feed back prompt information such as "You do not have permission to use the device" to the user terminal. In step 204, the Internet of Things device allocates a login account to the user terminal. For example, the Internet of Things device may send a login account to the user terminal and the Internet of Things device, respectively. The device operation user can operate the Internet of Things device by virtue of the login account. That is, the login account can be used by the device operation user when the device is initialized. For example, when the IoT device is a payment device, the user can set a payment account on the IoT device; you can also set a fingerprint on the IoT device , Password and other verification elements for subsequent verification. As for the IoT device, the IoT device can know that it can respond to the user instruction of the device operation user corresponding to the login account by virtue of the login account sent by the IoT server, and accept the user's operation and use. In addition, the Internet of Things server can also manage the status of the Internet of Things devices. Exemplarily, the status may include: a locked state and an assigned state. In this step, after the login account is assigned, the IoT server can change the device state of the IoT device to the assigned state. The IoT server can also store the correspondence between the IoT device and the device operation user, as shown in Table 1, where the device operation user can be identified by the above assigned login account, and the device identification can be identified in the device information Obtained: Table 1 Correspondence between equipment and users
Figure 108101179-A0304-0001
The correspondence in Table 1 above indicates that the IoT server has established a binding relationship between the IoT device and the device operation user. The device can accept user instructions from the device operation user. The instructions may be used The settings of the device. In step 206, the user uses the IoT device through the login account to set authentication elements. In this step, the user can set authentication elements to the IoT device. For example, the verification element may be a password or a biological feature, and the password may be a combination of numbers and letters, or may also be a pattern password, a password password; the biological feature may be a voiceprint, a fingerprint, a human face, and so on. In addition, the method for the user to set the authentication element to the IoT device may be directly input on the device; or the user may send it to the IoT device through the user terminal. It is also possible that the user of the device operation may set the authentication element on the device when using the IoT device for the first time. Or, it may be that after using it for a period of time, you want to enable the verification mode and then set the verification element to the IoT device. In step 208, the IoT device stores the verification element and sends the verification element to the IoT server. In this step, on the one hand, the IoT device can verify the elements in the local storage area for subsequent local verification. In addition, the verification elements can also be sent to the IoT server for subsequent secondary verification. In addition, the IoT server can also add verification elements based on the correspondence in Table 1. As shown in Table 2 below, it is used to record the verification elements set by the device operation user corresponding to the login account. Table 2 Correspondence between equipment and users
Figure 108101179-A0304-0002
In step 210, the IoT device detects a login trigger. For example, the login trigger here may be that after the IoT device detects that the user of the device operation has left, it will have to perform login verification again when it comes back. As a basis for the user leaving the device operation, for example, it may be that the Internet of Things device restarts after detecting the device lock screen for a period of time, or detects that the device is turned off and then turned on again. These operations can trigger the re-login of IoT devices. In step 212, the Internet of Things device acquires the verification element of the user of the device operation. For example, the Internet of Things device can obtain fingerprints, passwords and other elements of the device operation user to be verified. The user can set at least one verification element. In step 214, the IoT device performs local verification on the verification element. For example, the IoT device may compare the verification element obtained after the login trigger is detected in step 212 with the verification element in the local storage area in step 208, and if the two are the same, confirm that the local verification is passed. In step 216, after the local verification is passed, the IoT device locally enables the offline function at login. For example, if an IoT device completes the entire login process, it can be considered to include two aspects. One aspect is that some offline functions that the IoT device has locally can already be used, such as a computer. These offline functions do not involve device operation users. The key data can be used without Internet connection; on the other hand, the IoT device can also obtain the key data of the device operation user from the IoT server. These key data are obtained by the IoT server after being connected to the Internet. After the key data is obtained, the IoT device can start business communication with the IoT server. For example, taking the IoT device as a POS machine for example, after the business communication, the POS machine can send a transaction request to the IoT server, and the server can cooperate The POS machine completes the transfer transaction together. For example, the transaction request may include the transfer amount, the collection account set by the user of the device operation, and other parameters. The IoT server can implement the transfer process according to these parameters. In this step, after the IoT device passes the local verification, the offline function at the time of login is enabled locally, which can speed up the device's login speed, so that until the second verification of the subsequent step passes, the IoT device only needs to be sent by the IoT server Get other key information to start business interaction. In addition, the offline function is enabled in advance, so that the device operation user can use these offline functions first, and does not need to wait until the IoT server passes the verification before using it. The user experience is better. In step 218, the IoT device sends the verification element to the IoT server for secondary verification. In this step, the IoT device can send a secondary verification request to the IoT server. The request can carry the verification element, and the verification element can be sent to the IoT server for verification once again on the server side. In step 220, the IoT server performs a second verification on the verification element. For example, after receiving the verification element sent by the IoT device, the IoT server may compare the verification element with the verification element stored in step 208. Among them, the IoT device can carry the device identification when sending the verification element to the IoT server, so that the IoT server can know the verification element corresponding to the device identification in Table 2, so that the stored verification element and the received Comparison of verification elements carried in the second verification request. If the two are the same, the second verification passes. If the second verification passes, the Internet of Things server may continue to perform step 222; otherwise, if the second verification fails, step 224 may be performed. In step 222, the IoT server and the IoT device start the business communication process after login. For example, after the second verification is passed, the IoT server can set the state of the IoT device to the login state, and start business communication with the IoT device, for example, a POS machine can perform through the IoT server Handling of transfer transactions. In step 224, the IoT server suspends communication with the IoT device. In this step, the Internet of Things server can send a prompt to the Internet of Things device, and will no longer continue normal communication with the Internet of Things device. For example, you can be prompted for login failure. In addition, the Internet of Things server can also prompt an abnormality to the user terminal, indicating that the Internet of Things device can no longer be used. The login method of the IoT device in this example uses the "double verification" method. On the one hand, the verification is on the local verification of the IoT device, on the other hand, the verification is on the IoT server side. Secondary verification. This double verification method can well guarantee the "correspondence between the user and the bound device is correct", improve the security of the IOT device, and ensure that the IOT device is operated by its truly attributable user. For example, if the criminal uses the IoT device secretly, he will not be able to pass the local verification of the IoT device, for example, fingerprint recognition fails; or, suppose the criminal replaces the real IoT device with the criminal's own IoT device , Then the same real user cannot successfully perform local verification on the fake device. The failure of the local verification before login can ensure that one of the "device operation user" and the "Internet of Things device" is replaced and will be discovered. For another example, if the IoT device is directly stolen by a criminal, and it is assumed that the verification element of the local verification of the real user is also known, then the criminal may change the collection account in the IoT device to obtain through the account Illegal funds. In this case, the real device operation user already knows that the IoT device has been stolen, and the user can send a verification cancellation request to the IoT server through the user terminal, the request is used to request the cancellation of the device operation user Set the verification elements. For example, the verification cancellation request may carry a login account, user information, or verification elements. According to the verification cancellation request, the IoT server can find the corresponding relationship similar to that shown in Table 2, and release the binding between the IoT device and the device operation user in the corresponding relationship, for example, the user’s The corresponding relationship between the login account and the device ID can be directly cleared, the verification elements in the corresponding relationship are no longer stored, and the state of the IoT device can be reset to the locked state. Then for criminals, even if the local verification is passed, the secondary verification will not pass, because if the IoT server receives the secondary verification request sent by the IoT device, it will not be able to find When the verification element is stored, that is, it is determined that the verification element carried in the secondary verification request is not stored, the secondary verification fails. Moreover, after the real device operation user informs the IoT server to cancel the binding, the IoT device has been locked again and no longer responds to any user's commands, and the IoT server and the IoT device no longer communicate normally. If criminals want to use the IoT device, they can only re-execute step 200 and step 202 to re-verify their identity and obtain the permission to use the device. Therefore, the "secondary verification on the server side of the Internet of Things" further enhances the security of the IOT device and prevents criminals from using the Internet of Things device at will. As mentioned above, through the login method of the IoT device provided by one or more embodiments of this specification, it can effectively ensure that the IoT device is used by its real attributive user, and the security of the IOT device is guaranteed. In order to implement the above method for logging in an Internet of Things device, one or more embodiments of this specification also provide an apparatus for logging in an Internet of Things device, which can be applied to an Internet of Things device. As shown in FIG. 3, the device may include: an element receiving module 31, a local verification module 32, a verification result module 33, and a connection processing module 34. The element receiving module 31 is used to obtain the verification element of the device operation user when the login trigger is detected; the local verification module 32 is used to perform local verification on the verification element; the verification result module 33, When the local verification module passes the verification, the verification element is sent to the IoT server for secondary verification; the connection processing module 34 is used for secondary verification of the IoT server When passing the verification, log in to the Internet of Things server and start business communication with the Internet of Things server. In one example, the element receiving module 31 is further configured to: before detecting the login trigger, obtain the verification element set by the user of the device operation; store the verification element and send the verification element to The IoT server stores, so that the IoT server performs a second verification according to the stored verification elements; the local verification module 32 is specifically used for: the verification elements obtained after the registration trigger is detected, Compared with the verification element stored in the element receiving module, if the two are the same, it is confirmed that the local verification is passed. In order to implement the above-mentioned login method of the Internet of Things device, one or more embodiments of this specification also provide a login device of the Internet of Things device, which can be applied to the Internet of Things server. As shown in FIG. 4, the device may include: an element storage module 41 and a verification processing module 42. The element storage module 41 is used to receive and store the verification element sent by the Internet of Things device, and the verification element is set by a device operation user corresponding to the Internet of Things device; the verification processing module 42 is used to receive When the secondary verification request sent by the Internet of Things device is compared, the verification element carried in the secondary verification request and the stored verification element are compared, and if the two are the same, the secondary verification passes and the object is set The networked device is in a login state and starts business communication with the Internet of Things device. The device or module explained in the above embodiments may be realized by a computer chip or entity, or by a product with a certain function. A typical implementation device is a computer, and the specific form of the computer may be a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email sending and receiving device, and a game control Desk, tablet, wearable device, or any combination of these devices. For the convenience of description, when describing the above device, the functions are divided into various modules and described separately. Of course, when implementing one or more embodiments of this specification, the functions of each module may be implemented in one or more software and/or hardware. The execution order of each step in the flow shown in the above figure is not limited to the order in the flowchart. In addition, the description of each step can be implemented in the form of software, hardware, or a combination thereof. For example, those skilled in the art can implement it in the form of software code, which can be a computer capable of implementing the logical functions corresponding to the steps Executable instructions. When implemented in software, the executable instructions can be stored in memory and executed by the processor in the device. For example, corresponding to the above method, one or more embodiments of this specification simultaneously provide an Internet of Things device, which may include a processor, a memory, and computer instructions stored on the memory and executable on the processor. The processor is used to implement the following steps by executing the instruction: When a login trigger is detected, the verification element of the device operation user is obtained; the verification element is locally verified; if the verification passes, the Offline function, and send the verification element to the IoT server for secondary verification; when the secondary verification of the IoT server passes, log in to the IoT server and start to serve with the IoT server Business communication between devices. In one example, the verification element includes at least one of the following: fingerprint, password, password, face, voiceprint. In one example, the processor is further configured to implement the following steps when executing computer instructions: before detecting a login trigger, obtain the verification element set by the device operation user; store the verification element, and store The verification element is sent to an IoT server for storage, so that the IoT server performs the secondary verification according to the stored verification element. For example, corresponding to the above method, one or more embodiments of this specification simultaneously provide an Internet of Things server, which may include a processor, a memory, and computer instructions stored on the memory and executable on the processor , The processor is used to implement the following steps by executing the instruction: receiving and storing the verification element sent by the Internet of Things device, the verification element is set by a device operation user corresponding to the Internet of Things device; When the secondary verification request sent by the Internet of Things device is compared, the verification element carried in the secondary verification request and the stored verification element are compared, and if the two are the same, the secondary verification passes and the object is set The networked device is in a login state and starts business communication with the Internet of Things device. In one example, the processor is further configured to implement the following steps when executing computer instructions: receiving a verification cancellation request sent by a user terminal of the user who operates the device, and the verification cancellation request is used to request cancellation of the device Operate the verification element set by the user; clear the verification element according to the verification cancellation request; if the secondary verification request sent by the IoT device is received, determine that the secondary verification request is not stored The verification element carried in the second verification fails. One or more embodiments of this specification also provide an IoT system, which may include: an IoT device and an IoT server. The IoT device is used to: obtain the verification element set by the user of the device operation, store the verification element, and send the verification element to the IoT server for storage; when a login trigger is detected, Obtain the verification elements of the device operation user; perform local verification on the verification elements; if the verification passes, enable the offline function at login, and send the verification elements to the Internet of Things server for secondary verification; When the second verification of the IoT server passes, log in to the IoT server and start business communication with the IoT server; The IoT server is used to: receive and store the IoT server A verification element sent by the device, the verification element being set by a device operation user corresponding to the IoT device; and when receiving the secondary verification request sent by the IoT device, comparing the secondary verification request If the verification element carried in and the stored verification element are the same, the second verification is passed, the Internet of Things device is set to the login state, and business communication with the Internet of Things device is started. It should also be noted that the terms "include", "include" or any other variant thereof are intended to cover non-exclusive inclusion, so that a process, method, commodity or device that includes a series of elements includes not only those elements, but also includes Other elements not explicitly listed, or include elements inherent to this process, method, commodity, or equipment. Without more restrictions, the element defined by the sentence "include one..." does not exclude that there are other identical elements in the process, method, commodity, or equipment that includes the element. Those skilled in the art should understand that one or more embodiments of this specification may be provided as a method, system, or computer program product. Therefore, one or more embodiments of this specification may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Moreover, one or more embodiments of this specification can be implemented on one or more computer-usable storage media (including but not limited to disk memory, CD-ROM, optical memory, etc.) containing computer-usable program code In the form of computer program products. One or more embodiments of this specification may be described in the general context of computer-executable instructions executed by a computer, such as program modules. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform specific tasks or implement specific abstract data types. One or more embodiments of this specification can also be practiced in a distributed computing environment in which remote processing devices connected through a communication network perform tasks. In a distributed computing environment, program modules can be located in local and remote computer storage media including storage devices. The embodiments in this specification are described in a progressive manner. The same or similar parts between the embodiments can be referred to each other. Each embodiment focuses on the differences from other embodiments. In particular, for the embodiment of the data processing device, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant part can be referred to the description of the method embodiment. The foregoing describes specific embodiments of the present specification. Other embodiments are within the scope of patent application. In some cases, the actions or steps described in the scope of the patent application may be performed in a different order than in the embodiment and still achieve the desired result. In addition, the processes depicted in the drawings do not necessarily require the particular order shown or sequential order to achieve the desired results. In some embodiments, multiplexing and parallel processing are also possible or may be advantageous. The above are only preferred embodiments of one or more embodiments of this specification, and are not intended to limit one or more embodiments of this specification. Anything within the spirit and principle of one or more embodiments of this specification, Any modifications, equivalent replacements, improvements, etc. made should be included within the scope of protection of one or more embodiments of this specification.

11‧‧‧物聯網設備 12‧‧‧物聯網設備 1n‧‧‧物聯網設備 21‧‧‧物聯網伺服器 22‧‧‧使用者 31‧‧‧要素接收模組 32‧‧‧本地校驗模組 33‧‧‧校驗結果模組 34‧‧‧連接處理模組 41‧‧‧要素儲存模組 42‧‧‧校驗處理模組11‧‧‧Internet of Things equipment 12‧‧‧Internet of Things equipment 1n‧‧‧Internet of Things equipment 21‧‧‧Internet of things server 22‧‧‧User 31‧‧‧Element receiving module 32‧‧‧Local calibration module 33‧‧‧Check result module 34‧‧‧Connect processing module 41‧‧‧Element storage module 42‧‧‧Check processing module

為了更清楚地說明本說明書一個或多個實施例或現有技術中的技術方案,下面將對實施例或現有技術描述中所需要使用的圖式作簡單地介紹,顯而易見地,下面描述中的圖式僅僅是本說明書一個或多個實施例中記載的一些實施例,對於本領域普通技術人員來講,在不付出創造性勞動性的前提下,還可以根據這些圖式獲得其他的圖式。 圖1為本說明書一個或多個實施例提供的物聯網系統的系統架構圖; 圖2為本說明書一個或多個實施例提供的物聯網設備的登錄方法的流程圖; 圖3為本說明書一個或多個實施例提供的物聯網設備的登錄裝置的結構示意圖; 圖4為本說明書一個或多個實施例提供的物聯網設備的登錄裝置的結構示意圖。In order to more clearly explain one or more embodiments of the specification or the technical solutions in the prior art, the following briefly introduces the drawings used in the embodiments or the description of the prior art. Obviously, the drawings in the following description The formulas are only some of the embodiments described in one or more embodiments of this specification. For those of ordinary skill in the art, without paying any creative labor, other diagrams can also be obtained from these diagrams. 1 is a system architecture diagram of an Internet of Things system provided by one or more embodiments of this specification; 2 is a flowchart of a login method of an Internet of Things device provided by one or more embodiments of this specification; 3 is a schematic structural diagram of a login device of an Internet of Things device provided by one or more embodiments of the present specification; FIG. 4 is a schematic structural diagram of a login device of an Internet of Things device provided by one or more embodiments of the present specification.

Claims (15)

一種物聯網設備的登錄方法,由物聯網設備執行以下步驟,該方法包括:在檢測到登錄觸發時,獲取設備操作使用者輸入的驗證要素;對該驗證要素進行本地校驗;若校驗通過,啟用登錄時的離線功能,並將該驗證要素發送至物聯網伺服器進行二次校驗;當該物聯網伺服器二次校驗通過時,登錄該物聯網伺服器,以開始與該物聯網伺服器之間的業務通訊。 A method for logging in an IoT device, the IoT device performs the following steps. The method includes: acquiring a verification element input by a device operation user when a login trigger is detected; performing local verification on the verification element; if the verification passes , Enable the offline function at the time of registration, and send the verification element to the IoT server for the second verification; when the second verification of the IoT server passes, log in to the IoT server to start Business communication between networked servers. 根據申請專利範圍第1項所述的方法,該檢測到登錄觸發,包括:檢測到設備鎖屏後的開啟觸發;或者,檢測到設備關機後的開機觸發。 According to the method described in item 1 of the patent application scope, the detection of the login trigger includes: an opening trigger after the device locks the screen; or, an activation trigger after the device is turned off. 根據申請專利範圍第1項所述的方法,該驗證要素,包括如下至少一種:密碼或者生物特徵。 According to the method described in item 1 of the patent application scope, the verification element includes at least one of the following: a password or a biometric. 根據申請專利範圍第1項所述的方法,由該物聯網設備執行以下步驟,在檢測到登錄觸發之前,該方法還包括: 獲取該設備操作使用者設置的該驗證要素;儲存該驗證要素,並將該驗證要素發送至物聯網伺服器儲存,以使得該物聯網伺服器根據儲存的該驗證要素執行該二次校驗;該對該驗證要素進行本地校驗,包括:將在檢測到登錄觸發後獲取的該驗證要素,與本機存放區的該驗證要素比較,若兩者相同,則確認本地校驗通過。 According to the method described in item 1 of the patent application scope, the following steps are performed by the IoT device, and before the login trigger is detected, the method further includes: Obtain the verification element set by the device operation user; store the verification element, and send the verification element to the IoT server for storage, so that the IoT server performs the secondary verification according to the stored verification element; The local verification of the verification element includes: comparing the verification element acquired after detecting the login trigger with the verification element in the local storage area, and if the two are the same, confirming that the local verification passes. 一種物聯網設備的登錄方法,由物聯網伺服器執行以下步驟,該方法包括:接收並儲存物聯網設備發送的驗證要素,該驗證要素由該物聯網設備對應的設備操作使用者設置;在接收到該物聯網設備發送的二次校驗請求時,比較該二次校驗請求中攜帶的驗證要素與儲存的該驗證要素,若兩者相同,則二次校驗通過,設置該物聯網設備為登錄狀態,以開始與該物聯網設備進行業務通訊。 A method for logging in an IoT device, the following steps are performed by an IoT server, the method includes: receiving and storing verification elements sent by the IoT device, the verification elements are set by a device operation user corresponding to the IoT device; When the secondary verification request sent by the IoT device is compared, the verification element carried in the secondary verification request is compared with the stored verification element. If the verification elements are the same, the secondary verification passes and the IoT device is set In the login state, to start business communication with the IoT device. 根據申請專利範圍第5項所述方法,由該物聯網伺服器執行以下步驟,該方法還包括:接收該設備操作使用者的使用者終端發送的驗證取消請求,該驗證取消請求用於請求取消該設備操作使用者設置的驗證要素;根據該驗證取消請求,清除該驗證要素; 若在接收到該物聯網設備發送的二次校驗請求時,確定並未儲存該二次校驗請求中攜帶的驗證要素,則二次校驗失敗。 According to the method described in item 5 of the patent application scope, the following steps are performed by the IoT server. The method further includes: receiving a verification cancellation request sent by a user terminal of the user who operates the device, the verification cancellation request is used to request cancellation The device operates the verification element set by the user; according to the verification cancellation request, the verification element is cleared; If it is determined that the verification element carried in the secondary verification request is not stored when the secondary verification request sent by the Internet of Things device is received, the secondary verification fails. 一種物聯網設備的登錄裝置,該裝置包括:要素接收模組,用於在檢測到登錄觸發時,獲取設備操作使用者的驗證要素;本地校驗模組,用於對該驗證要素進行本地校驗;校驗結果模組,用於在該本地校驗模組校驗通過時,將該驗證要素發送至物聯網伺服器進行二次校驗;連接處理模組,用於當該物聯網伺服器二次校驗通過時,登錄該物聯網伺服器,開始與該物聯網伺服器之間的業務通訊。 A log-in device for an Internet of Things device, the device includes: an element receiving module for acquiring verification elements of a device operation user when a log-in trigger is detected; a local verification module for performing local verification of the verification element Verification; the verification result module is used to send the verification element to the IoT server for secondary verification when the local verification module passes the verification; the connection processing module is used to serve as the IoT server When the device passes the second verification, log in to the IoT server and start business communication with the IoT server. 根據申請專利範圍第7項所述的裝置,該要素接收模組,還用於:在檢測到登錄觸發之前,獲取該設備操作使用者設置的該驗證要素;儲存該驗證要素,並將該驗證要素發送至物聯網伺服器儲存,以使得該物聯網伺服器根據儲存的驗證要素執行二次校驗;該本地校驗模組,具體用於:將在檢測到登錄觸發後獲取的驗證要素,與該要素接收模組儲存的驗證要素比較,若兩者相同則確認本地校驗通過。 According to the device described in item 7 of the patent application scope, the element receiving module is also used to: before detecting the login trigger, obtain the verification element set by the user of the device operation; store the verification element and store the verification element The elements are sent to the IoT server for storage, so that the IoT server performs secondary verification based on the stored verification elements; the local verification module is specifically used for: the verification elements obtained after the registration trigger is detected, Compared with the verification element stored in the element receiving module, if the two are the same, it is confirmed that the local verification is passed. 一種物聯網設備的登錄裝置,該裝置包括: 要素儲存模組,用於接收並儲存物聯網設備發送的驗證要素,該驗證要素由該物聯網設備對應的設備操作使用者設置;校驗處理模組,用於在接收到該物聯網設備發送的二次校驗請求時,比較該二次校驗請求中攜帶的驗證要素與儲存的該驗證要素,若兩者相同,則二次校驗通過,設置該物聯網設備為登錄狀態,並開始與該物聯網設備進行業務通訊。 A login device for Internet of Things equipment, the device includes: The element storage module is used to receive and store the verification element sent by the IoT device, the verification element is set by the user of the device operation corresponding to the IoT device; the verification processing module is used to receive the IoT device to send In the second verification request, compare the verification element carried in the second verification request with the stored verification element, if the two are the same, then the second verification passes, set the IoT device to the login state, and start Business communication with the IoT device. 一種物聯網設備,該設備包括記憶體、處理器,以及儲存在記憶體上並可在處理器上運行的電腦指令,該處理器執行指令時實現以下步驟:在檢測到登錄觸發時,獲取設備操作使用者的驗證要素;對該驗證要素進行本地校驗;若校驗通過,啟用登錄時的離線功能,並將該驗證要素發送至物聯網伺服器進行二次校驗;當該物聯網伺服器二次校驗通過時,登錄該物聯網伺服器,開始與該物聯網伺服器之間的業務通訊。 An Internet of Things device including a memory, a processor, and computer instructions stored on the memory and runable on the processor, the processor implements the following steps when executing the instruction: when a login trigger is detected, the device is acquired Operate the user's verification element; perform local verification on the verification element; if the verification passes, enable the offline function at login and send the verification element to the IoT server for secondary verification; when the IoT server When the device passes the second verification, log in to the IoT server and start business communication with the IoT server. 根據申請專利範圍第10項所述的物聯網設備,該驗證要素,包括如下至少一種:指紋、密碼、口令、人臉、聲紋。 According to the Internet of Things device described in item 10 of the patent application scope, the verification element includes at least one of the following: fingerprint, password, password, face, and voiceprint. 根據申請專利範圍第10項所述的物聯網設備,該處理器還用於在執行電腦指令時實現以下步驟:在檢測到登錄觸發之前,獲取該設備操作使用者設置的該驗證要素;儲存該驗證要素,並將該驗證要素發送至物聯網伺服器儲存,以使得該物聯網伺服器根據儲存的該驗證要素執行該二次校驗。 According to the Internet of Things device described in item 10 of the patent application scope, the processor is also used to implement the following steps when executing computer instructions: before detecting the login trigger, obtain the verification element set by the user operating the device; store the Verify the element, and send the verified element to the IoT server for storage, so that the IoT server performs the secondary verification according to the stored verified element. 一種物聯網伺服器,該伺服器包括記憶體、處理器,以及儲存在記憶體上並可在處理器上運行的電腦指令,該處理器執行指令時實現以下步驟:接收並儲存物聯網設備發送的驗證要素,該驗證要素由該物聯網設備對應的設備操作使用者設置;在接收到該物聯網設備發送的二次校驗請求時,比較該二次校驗請求中攜帶的驗證要素與儲存的該驗證要素,若兩者相同,則二次校驗通過,設置該物聯網設備為登錄狀態,並開始與該物聯網設備進行業務通訊。 An Internet of Things server, which includes a memory, a processor, and computer instructions stored on the memory and runable on the processor, and the processor implements the following steps when executing the instructions: receiving and storing the Internet of Things device to send Verification element, which is set by the device operator corresponding to the IoT device; when receiving the secondary verification request sent by the IoT device, compare the verification element carried in the secondary verification request with the storage If the two verification elements are the same, the second verification passes, the IoT device is set to the login state, and business communication with the IoT device is started. 根據申請專利範圍第13項所述的伺服器,該處理器還用於在執行電腦指令時實現以下步驟:接收該設備操作使用者的使用者終端發送的驗證取消請求,該驗證取消請求用於請求取消該設備操作使用者設置的驗證要素;根據該驗證取消請求,清除該驗證要素; 若在接收到該物聯網設備發送的二次校驗請求時,確定並未儲存該二次校驗請求中攜帶的驗證要素,則二次校驗失敗。 According to the server described in item 13 of the patent application scope, the processor is also used to implement the following steps when executing computer instructions: receiving a verification cancellation request sent by a user terminal of the user who operates the device, the verification cancellation request is used for Request to cancel the verification element set by the user of the device operation; according to the verification cancellation request, clear the verification element; If it is determined that the verification element carried in the secondary verification request is not stored when the secondary verification request sent by the Internet of Things device is received, the secondary verification fails. 一種物聯網系統,該系統包括:物聯網設備和物聯網伺服器;該物聯網設備,用於:獲取該設備操作使用者設置的該驗證要素,儲存該驗證要素,並將該驗證要素發送至物聯網伺服器儲存;在檢測到登錄觸發時,獲取設備操作使用者的驗證要素;對該驗證要素進行本地校驗;若校驗通過,啟用登錄時的離線功能,並將該驗證要素發送至物聯網伺服器進行二次校驗;當該物聯網伺服器二次校驗通過時,登錄該物聯網伺服器,開始與該物聯網伺服器之間的業務通訊;該物聯網伺服器,用於:接收並儲存物聯網設備發送的驗證要素,該驗證要素由該物聯網設備對應的設備操作使用者設置;並在接收到該物聯網設備發送的二次校驗請求時,比較該二次校驗請求中攜帶的驗證要素與儲存的該驗證要素,若兩者相同,則二次校驗通過,設置該物聯網設備為登錄狀態,並開始與該物聯網設備進行業務通訊。 An IoT system, including: an IoT device and an IoT server; the IoT device is used to: obtain the verification element set by the device operation user, store the verification element, and send the verification element to IoT server storage; when the login trigger is detected, obtain the verification element of the device operation user; perform local verification on the verification element; if the verification is passed, enable the offline function at the time of login and send the verification element to The IoT server performs the second verification; when the IoT server passes the second verification, log in to the IoT server and start business communication with the IoT server; the IoT server uses Yu: Receive and store the verification element sent by the IoT device, the verification element is set by the device operation user corresponding to the IoT device; and when the secondary verification request sent by the IoT device is received, the verification element is compared If the verification element carried in the verification request and the stored verification element are the same, the second verification is passed, the IoT device is set to the login state, and business communication with the IoT device is started.
TW108101179A 2018-03-30 2019-01-11 Login method and device of internet of things equipment TWI688245B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN201810313297.5A CN108566391B (en) 2018-03-30 2018-03-30 Login method and device for Internet of things equipment
CN201810313297.5 2018-03-30
??201810313297.5 2018-03-30

Publications (2)

Publication Number Publication Date
TW201943251A TW201943251A (en) 2019-11-01
TWI688245B true TWI688245B (en) 2020-03-11

Family

ID=63534412

Family Applications (1)

Application Number Title Priority Date Filing Date
TW108101179A TWI688245B (en) 2018-03-30 2019-01-11 Login method and device of internet of things equipment

Country Status (3)

Country Link
CN (1) CN108566391B (en)
TW (1) TWI688245B (en)
WO (1) WO2019184599A1 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108566391B (en) * 2018-03-30 2020-05-12 阿里巴巴集团控股有限公司 Login method and device for Internet of things equipment
CN109639692B (en) * 2018-12-20 2021-09-14 广州河东科技有限公司 Offline login method, device, equipment, system and storage medium
CN116760567A (en) * 2019-05-16 2023-09-15 深圳市欢太科技有限公司 Account association method, device, electronic equipment and storage medium
CN110247740B (en) * 2019-05-17 2022-03-08 五邑大学 Data transmission method, device, equipment and storage medium
CN112583616B (en) * 2019-09-29 2022-08-26 海信电子科技(武汉)有限公司 Internet of things equipment, Internet of things platform and method for accessing Internet of things platform
CN111314346A (en) * 2020-02-19 2020-06-19 中国第一汽车股份有限公司 Account login method and device and vehicle
CN112287319A (en) * 2020-11-02 2021-01-29 刘高峰 Identity verification method, client, server and system based on biological characteristics
CN112287320A (en) * 2020-11-02 2021-01-29 刘高峰 Identity verification method and device based on biological characteristics and client
CN113595785A (en) * 2021-07-27 2021-11-02 创维光电科技(深圳)有限公司 Internet of things equipment management device and method
CN115809276A (en) * 2022-12-20 2023-03-17 镁佳(北京)科技有限公司 Vehicle personalized configuration management method, device, server and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102202040A (en) * 2010-03-26 2011-09-28 联想(北京)有限公司 Client authentication method and device
CN104967595A (en) * 2014-10-31 2015-10-07 腾讯科技(深圳)有限公司 Method and apparatus for registering devices on Internet of things platform
CN106790267A (en) * 2017-02-13 2017-05-31 郑州云海信息技术有限公司 A kind of method and apparatus of access server operating system
CN106850209A (en) * 2017-02-28 2017-06-13 苏州福瑞思信息科技有限公司 A kind of identity identifying method and device
CN107612909A (en) * 2017-09-18 2018-01-19 阿里巴巴集团控股有限公司 Information interacting method, device and equipment on internet of things equipment

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105809419A (en) * 2014-12-29 2016-07-27 北京握奇智能科技有限公司 Online banking transaction system
US10231122B2 (en) * 2015-04-27 2019-03-12 International Business Machines Corporation Challenge-response authentication based on internet of things information
CN106686004B (en) * 2017-02-28 2019-07-12 飞天诚信科技股份有限公司 A kind of login authentication method and system
CN108566391B (en) * 2018-03-30 2020-05-12 阿里巴巴集团控股有限公司 Login method and device for Internet of things equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102202040A (en) * 2010-03-26 2011-09-28 联想(北京)有限公司 Client authentication method and device
CN104967595A (en) * 2014-10-31 2015-10-07 腾讯科技(深圳)有限公司 Method and apparatus for registering devices on Internet of things platform
CN106790267A (en) * 2017-02-13 2017-05-31 郑州云海信息技术有限公司 A kind of method and apparatus of access server operating system
CN106850209A (en) * 2017-02-28 2017-06-13 苏州福瑞思信息科技有限公司 A kind of identity identifying method and device
CN107612909A (en) * 2017-09-18 2018-01-19 阿里巴巴集团控股有限公司 Information interacting method, device and equipment on internet of things equipment

Also Published As

Publication number Publication date
CN108566391A (en) 2018-09-21
WO2019184599A1 (en) 2019-10-03
CN108566391B (en) 2020-05-12
TW201943251A (en) 2019-11-01

Similar Documents

Publication Publication Date Title
TWI688245B (en) Login method and device of internet of things equipment
EP3507938B1 (en) Biometric identification and verification among iot devices and applications
US8595808B2 (en) Methods and systems for increasing the security of network-based transactions
WO2018014789A1 (en) Method and device for controlling service operation risk
WO2017167093A1 (en) Method and device for registering biometric identity and authenticating biometric identity
AU2019253872A1 (en) Seamless transaction minimizing user input
US20150294313A1 (en) Systems, apparatus and methods for improved authentication
WO2019042324A1 (en) Resource transfer method, fund payment method and apparatus, and electronic device
US11539526B2 (en) Method and apparatus for managing user authentication in a blockchain network
US20170372310A1 (en) Secure key based trust chain among user devices
US20170206525A1 (en) Online transaction authorization via a mobile device application
US11494769B2 (en) System, methods and computer program products for identity authentication for electronic payment transactions
US11868988B2 (en) Devices and methods for selective contactless communication
US11301862B2 (en) Secure transfer of tokens between devices
US20210217024A1 (en) System and Method of Consolidating Identity Services
JP6349188B2 (en) User authentication device
US20210297403A1 (en) Systems and methods for authentication using authentication management server and device application
US11715105B2 (en) Payment authentication using OS-based and issuer-based authenticator applications
CN111355722B (en) Method, system and non-transitory storage medium for associating biological characteristics with virtual resources
US11475446B2 (en) System, methods and computer program products for identity authentication for electronic payment transactions
WO2017145273A1 (en) User authentication device
US20240046252A1 (en) Device and systems for provisioning and verifying tokens with strong identity and strong authentication
CN108768658B (en) Intelligent security chip
KR101647468B1 (en) User authentication method using double authentication means and system performing the same