WO2016074586A1 - 权限验证的方法及装置 - Google Patents

权限验证的方法及装置 Download PDF

Info

Publication number
WO2016074586A1
WO2016074586A1 PCT/CN2015/093906 CN2015093906W WO2016074586A1 WO 2016074586 A1 WO2016074586 A1 WO 2016074586A1 CN 2015093906 W CN2015093906 W CN 2015093906W WO 2016074586 A1 WO2016074586 A1 WO 2016074586A1
Authority
WO
WIPO (PCT)
Prior art keywords
binding
terminal
bound
verification
network side
Prior art date
Application number
PCT/CN2015/093906
Other languages
English (en)
French (fr)
Inventor
张彦路
殷明君
高自光
Original Assignee
小米科技有限责任公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 小米科技有限责任公司 filed Critical 小米科技有限责任公司
Priority to MX2017005368A priority Critical patent/MX2017005368A/es
Priority to JP2016548039A priority patent/JP6374517B2/ja
Priority to KR1020167028413A priority patent/KR20160132966A/ko
Priority to RU2017102538A priority patent/RU2663710C2/ru
Priority to EP15858097.7A priority patent/EP3059899B1/en
Publication of WO2016074586A1 publication Critical patent/WO2016074586A1/zh
Priority to US15/266,359 priority patent/US20170006038A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • H04W84/20Master-slave selection or change arrangements

Definitions

  • the present disclosure relates to the field of communications technologies, and in particular, to a method and apparatus for verifying rights.
  • the method of using a two-dimensional code is usually used, which requires that the surface of the bound device is affixed with a uniquely-identified two-dimensional code, and the user uses the camera provided by the mobile phone to take a two-dimensional code, obtain a unique identification code, and then go to the remote server. Verify the unique identification code. If the remote server verifies the validity, it proves the user's ownership of the device to which the QR code is attached.
  • the user is required to use the mobile phone to scan the QR code for scanning, which is unfriendly for devices that are inconvenient to operate.
  • the method and device for verifying rights provided by the embodiments of the present disclosure are used to simplify the authority verification operation, so that the user can complete the authority verification by simple key operation, and has higher security.
  • a method for verifying rights including:
  • the verification information of the performed binding verification operation is reported to the network side server.
  • the method further includes:
  • the method further includes:
  • a binding failure prompt is displayed.
  • a method for verifying rights including:
  • the method further includes:
  • the method further includes:
  • the method further includes: sending, to the control terminal, a binding operation prompt for the physical attribute of the terminal to be bound, and sending an operation instruction for displaying the physical attribute to the terminal to be bound.
  • the instructions for displaying physical attributes include: displaying random numbers, displaying random characters, displaying patterns, displaying phrases, controlling indicator colors, controlling indicator numbers, controlling indicator blinking frequencies, controlling sound output, One or more of physical deformation and physical displacement.
  • a method for verifying rights including:
  • the corresponding physical attribute is displayed.
  • the method further includes: after receiving the binding verification operation for the physical attribute, sending the verification information to the network side server.
  • an apparatus for verifying rights including:
  • the execution module is configured to perform a binding verification operation according to the physical attribute displayed by the terminal to be bound;
  • the reporting module is configured to report the verification information that the binding verification operation has been performed to the network side server.
  • the apparatus further comprises:
  • the binding requesting module is configured to send a binding request to the network side server by using the current account after establishing a communication connection with the terminal to be bound;
  • the prompt receiving module is configured to receive a binding operation prompt returned by the network side server for the physical attribute of the terminal to be bound.
  • the apparatus further comprises:
  • a result receiving module configured to receive a binding result returned by the network side server according to the verification information
  • a processing module configured to determine, when the binding result is that the binding is successful, determining a current account and the terminal to be bound Control relationship; when the binding result is a binding failure, a binding failure prompt is displayed.
  • an apparatus for verifying rights including:
  • the binding receiving module is configured to, after establishing a communication connection with the control terminal, receive a binding request sent by the control terminal by using the current account;
  • the prompt sending module is configured to send a binding operation prompt for the physical attribute of the terminal to be bound to the control terminal.
  • the apparatus further comprises:
  • the verification module is configured to verify the validity of the verification information after receiving the verification information of the performed binding verification operation sent by the control terminal and/or the terminal to be bound;
  • the result sending module is configured to send a binding result to the control terminal according to the verification result.
  • the apparatus further comprises:
  • the establishing module is configured to establish a control relationship between the current account and the terminal to be bound when the verification result is legal.
  • the apparatus further comprises:
  • the operation sending module is configured to send, to the control terminal, a binding operation prompt for the physical attribute of the terminal to be bound, and send an operation instruction for displaying the physical attribute to the terminal to be bound.
  • an apparatus for verifying rights including:
  • the operation receiving module is configured to receive an operation instruction for displaying a physical attribute sent by the network side server;
  • the attribute display module is configured to display the corresponding physical attribute according to the operation instruction.
  • the apparatus further comprises:
  • the verification sending module is configured to send the verification information to the network side server after receiving the binding verification operation for the physical attribute.
  • an apparatus for verifying rights including:
  • a memory for storing processor executable instructions
  • processor is configured to:
  • the corresponding physical attribute is displayed.
  • the technical solution provided by the embodiment of the present disclosure can simplify the authority verification operation, and enable the user to complete the authority verification by simple buttons and the like, and has higher security.
  • FIG. 1 is a flowchart of a method for rights verification according to an exemplary embodiment.
  • FIG. 2 is a flow chart of a method of rights verification, according to an exemplary embodiment.
  • FIG. 3 is a flowchart of a method of rights verification according to an exemplary embodiment.
  • FIG. 4 is a flow chart of a method of rights verification, according to an exemplary embodiment.
  • FIG. 5 is a flow chart of a method of rights verification, according to an exemplary embodiment.
  • FIG. 6 is a flowchart of a method of rights verification according to an exemplary embodiment.
  • FIG. 7 is a flowchart of a method of rights verification according to an exemplary embodiment.
  • FIG. 8 is a flowchart of a method of rights verification according to an exemplary embodiment.
  • FIG. 9 is a flowchart of a method of rights verification, according to an exemplary embodiment.
  • FIG. 10 is a block diagram of an apparatus for rights verification, according to an exemplary embodiment.
  • FIG. 11 is a block diagram of an apparatus for rights verification, according to an exemplary embodiment.
  • FIG. 12 is a block diagram of an apparatus for rights verification, according to an exemplary embodiment.
  • FIG. 13 is a block diagram of another apparatus for authority verification, according to an exemplary embodiment.
  • FIG. 14 is a block diagram of another apparatus for authority verification, according to an exemplary embodiment.
  • FIG. 1 is a flow chart of a method for rights verification, according to an exemplary embodiment. As shown in FIG. 1 , the method is applicable to a terminal in a control terminal, for example, a mobile phone, a tablet, a PC, etc., and includes the following steps:
  • a binding verification operation is performed according to the physical attribute displayed by the terminal to be bound.
  • the physical attribute may be one of a random number displayed, a displayed random character, a displayed pattern, a displayed phrase, an indicator color, a number of indicators, an indicator blinking frequency, a sound output, a physical deformation, and a physical displacement. Or a variety.
  • the control terminal may perform a binding verification operation of inputting the random character.
  • the control terminal may perform a binding verification operation of inputting the color of the indicator.
  • Other forms are not listed again.
  • step S102 the verification information that the binding verification operation has been performed is reported to the network side server.
  • the input indicator color information is sent as verification information to the network side server.
  • the method further includes: after establishing a communication connection with the terminal to be bound, sending a binding request to the network side server by using the current account; and receiving the binding of the physical attribute of the terminal to be bound returned by the network side server. Operational tips.
  • the method further includes: receiving a binding result returned by the network side server according to the verification information; determining, when the binding result is binding, determining a control relationship between the current account and the terminal to be bound; When the binding fails, the binding failure prompt is displayed.
  • the method is described in detail. As shown in FIG. 2, the method is applicable to a mobile phone, and includes the following steps:
  • step S201 the mobile phone establishes a communication connection with the smart camera by using the current account.
  • the mobile phone discovers the smart camera through a network side server or a local area network.
  • the mobile phone can also discover the smart camera directly by sending a broadcast by itself.
  • step S202 the mobile phone sends a binding request to the network side server.
  • step S203 the mobile phone receives a binding operation prompt returned by the network side server for the physical attribute of the smart camera.
  • the binding prompt can be "Please enter the number of flashes of the indicator light.”
  • step S204 the mobile phone performs a binding verification operation according to the physical attribute displayed by the terminal to be bound. For example, the number of times the input is received, and the like.
  • step S205 the mobile phone reports the verification information that the binding verification operation has been performed to the network side server. For example, the mobile phone reports to the network side server the number of times the input is received.
  • step S206 the mobile phone receives the binding result returned by the network side server according to the verification information.
  • the binding result is successful, the control relationship between the current account and the terminal to be bound is determined.
  • the binding result is a binding failure, the binding failure prompt is displayed.
  • FIG. 3 is a flowchart of a method of rights verification according to an exemplary embodiment.
  • the method is applicable to a network side server, for example, a cloud server, a router, etc., and includes the following steps:
  • step S301 after establishing a communication connection with the control terminal, the receiving control terminal uses the binding request sent by the current account.
  • step S302 a binding operation prompt for the physical attribute of the terminal to be bound is sent to the control terminal.
  • the control terminal determines the terminal to be bound that the control terminal requests to be bound. And sending a binding operation prompt to the control terminal according to the physical attribute of the terminal to be bound.
  • the terminal to be bound has an indicator light, and the content of the binding operation prompt can be directed to the indicator light.
  • the terminal to be bound has a display screen, and the content of the binding operation prompt can be displayed for the content displayed on the display screen.
  • the terminal to be bound has a physical button, and the content of the binding operation prompt can be directed to the physical button.
  • the method further includes: sending an operation instruction for displaying the physical attribute to the terminal to be bound, while sending the binding operation prompt for the physical attribute of the terminal to be bound to the control terminal.
  • an operation instruction for transmitting a display number to the terminal to be bound an operation instruction for controlling the illumination of the indicator light, an operation instruction for controlling physical deformation of the terminal to be bound, an operation instruction for controlling a physical displacement of the terminal to be bound, and the like.
  • the displaying physical attributes includes: displaying random numbers, displaying random characters, displaying patterns, displaying phrases, controlling indicator colors, controlling indicator numbers, controlling indicator blinking frequencies, controlling sound output, and physically deforming One or more of physical displacements. For example, moving to the left, rotating to the right, recessing the screen down, etc., will not be enumerated one by one.
  • the method further includes: after receiving the verification information of the performed binding verification operation sent by the control terminal and/or the terminal to be bound, verifying the validity of the verification information; and sending the verification information to the control terminal according to the verification result. Bind the result. For example, if the operation instruction for displaying the physical attribute is sent to the terminal to be bound is the display number 567, and the verification information reported by the control terminal is the number 345, the verification information is invalid, and the control terminal cannot obtain the control authority of the terminal to be bound.
  • the switch is continuously pressed 3 times, and the binding operation sent to the control terminal is prompted to press the switch 3 times, then the verification information is legal, and the control terminal obtains the terminal to be bound. Control permissions.
  • verifying the legality it is also possible to detect whether the verification information is received within a predetermined time. If the predetermined time is exceeded, the verification information is illegal information.
  • the method further includes: establishing, between the current account and the terminal to be bound, when the verification result is legal Control relationship. After the control relationship is established, the control relationship is stored, so that the current account obtains the right to control the terminal to be bound for a long time until the binding is released.
  • the method for obtaining the smart socket is taken as an example.
  • the method provided in this embodiment is described in detail.
  • the method is applicable to the network side server, and includes the following steps:
  • step S401 after establishing a communication connection with the control terminal, the receiving control terminal uses the binding request sent by the current account. For example, after establishing a communication connection with the control terminal pad, receiving a binding request of the binding smart socket sent by the control terminal pad.
  • a binding operation prompt for the physical attribute of the terminal to be bound is sent to the control terminal. For example, send "Please enter the color of the indicator light" to the control terminal.
  • an operation instruction for displaying physical attributes is sent to the terminal smart socket to be bound, for example, the indicator light displays a blue operation instruction.
  • step S403 after receiving the verification information of the performed binding verification operation sent by the control terminal, the validity of the verification information is verified.
  • the binding operation prompts “Please enter the color of the indicator light”, if the verification information sent by the control terminal is “blue”, the verification information is legal.
  • verifying the legality it is also possible to detect whether the verification information is received within a predetermined time. If the predetermined time is exceeded, the verification information is illegal information.
  • step S404 the binding result is sent to the control terminal according to the verification result. Moreover, when the verification result is legal, the control relationship between the current account and the terminal to be bound is established.
  • the method for obtaining the smart socket is taken as an example.
  • the method provided in this embodiment is described in detail.
  • the method is applicable to the network side server, and includes the following steps:
  • step S501 after establishing a communication connection with the control terminal, the receiving control terminal uses the binding request sent by the current account. For example, after establishing a communication connection with the control terminal pad, receiving a binding request of the binding smart socket sent by the control terminal pad.
  • step S502 a binding operation prompt for the physical attribute of the terminal to be bound is sent to the control terminal. For example, send "Please press the key 2 times continuously" to the control terminal.
  • step S503 after receiving the verification information of the performed binding verification operation sent by the terminal to be bound, the validity of the verification information is verified. For example, if the verification information reported by the smart socket is continuously pressed 2 times for the switch key, the verification information is legal. When verifying the legality, it is also possible to detect whether the verification information is received within a predetermined time. If the predetermined time is exceeded, the verification information is illegal information.
  • step S504 the binding result is sent to the control terminal according to the verification result. Moreover, when the verification result is legal, the control relationship between the current account and the terminal to be bound is established.
  • FIG. 6 is a flowchart of a method of rights verification according to an exemplary embodiment.
  • the method is applicable to a smart terminal, for example, a smart socket in a smart home, a smart camera, a smart purifier, a smart air conditioner, etc., including the following steps:
  • step S601 an operation instruction for displaying physical attributes transmitted by the network side server is received.
  • step S602 corresponding physical attributes are displayed according to the operation instruction.
  • the operation instruction for displaying physical attributes may include: displaying random numbers, displaying random characters, displaying patterns, displaying phrases, controlling indicator colors, controlling indicator numbers, controlling indicator blinking frequencies, controlling sound output, physical deformation, physical One or more of displacements and the like.
  • the method further includes: after receiving the binding verification operation for the physical attribute, sending the verification information to the network side server. For example, when the device button is received, the remote controller is operated, an image that continues to sway is acquired, a specific sound input is acquired, and the electromagnetic sensor switch is sensed.
  • the method provided by the embodiment of the present disclosure can perform the authority verification by the physical attributes of the device to be bound, simplify the authority verification operation, and enable the user to complete the authority verification by simple buttons and the like, and has higher security.
  • the neighboring control terminal can prevent the control device from acquiring the control permission after the device is to be bound. For example, the neighbor's mobile phone discovers the user's smart device. If it is simply inputting the verification code pushed by the server, other users will easily obtain the smart device. Control authority of the device.
  • FIG. 7 is a flowchart of a method of rights verification according to an exemplary embodiment. As shown in FIG. 7, the method includes the following steps:
  • step S701 the control terminal establishes a communication connection with the network side server.
  • step S702 the control terminal discovers the terminal to be bound through the network side server or the local area network, or discovers the terminal to be bound by sending a broadcast by itself. For example, when a local area network is used, the control terminal establishes a communication connection with the router that generates the local area network, and sends a broadcast through the router to discover the terminal to be bound.
  • the terminal to be bound is a smart device that does not have explicit control rights.
  • step S703 the control terminal sends a binding request to the network side server by using the current account.
  • step S704 after receiving the binding request, the network side server determines the physical attribute of the terminal to be bound, and returns a binding operation prompt for the physical attribute of the terminal to be bound to the control terminal.
  • step S705 the control terminal receives the binding operation prompt returned by the network side server for the physical attribute of the terminal to be bound, and displays the current page.
  • the binding operation prompts an operation for the physical attribute of the terminal to be bound, for example, the device button is operated, the remote controller is operated, the image is continuously swayed, a specific sound input is collected, and the electromagnetic induction switch is sensed to be operated. Wait. Proceed to step S706.
  • step S706 the terminal to be bound detects a binding verification operation for the physical attribute. For example, it is detected that the device button is operated, the remote controller is operated, the image is continuously shaken, the specific sound input is collected, the electromagnetic induction switch is sensed, and one of the shape deformation and the physical position displacement is detected. Or a variety.
  • step S707 the terminal to be bound sends the verification information to the network side server.
  • step S708 after receiving the verification information of the performed binding verification operation sent by the terminal to be bound, the network side server verifies the validity of the verification information.
  • verifying the legality it is also possible to detect whether the verification information is received within a predetermined time. If the predetermined time is exceeded, the verification information is illegal information.
  • the verification result is legal, the control relationship between the current account and the terminal to be bound is established.
  • step S709 the network side server sends the binding result to the control terminal according to the verification result.
  • the verification result is legal, the control relationship between the current account and the terminal to be bound is established.
  • the control relationship between the account and the terminal to be bound can be accurately confirmed, the control authority is confirmed, and the account is allowed to send a control command to the terminal to be bound. Moreover, the terminal to be bound does not accept the control command sent by other accounts, that is, the abuse of the malicious user is avoided.
  • FIG. 8 is a flowchart of a method of rights verification according to an exemplary embodiment. As shown in FIG. 8, the method includes the following steps:
  • step S801 the control terminal establishes a communication connection with the network side server.
  • step S802 the control terminal discovers the terminal to be bound through the network side server or the local area network, or discovers the terminal to be bound by sending a broadcast by itself. For example, when a local area network is used, the control terminal establishes a communication connection with the router that generates the local area network, and sends a broadcast through the router to discover the terminal to be bound.
  • the terminal to be bound is a smart device that does not have explicit control rights.
  • step S803 the control terminal sends a binding request to the network side server by using the current account.
  • step S804 after receiving the binding request, the network side server determines the physical attribute of the terminal to be bound, and returns a binding operation prompt for the physical attribute of the terminal to be bound to the control terminal, and sends a display to the terminal to be bound. Operational instructions for physical properties.
  • step S805 the terminal to be bound displays the corresponding physical attribute according to the operation instruction.
  • the operation instructions for displaying physical attributes may include: displaying random numbers, displaying random characters, displaying patterns, displaying phrases, controlling indicator colors, controlling indicator numbers, controlling indicator blinking frequencies, controlling sound output, physical deformation, physical displacement, etc. One or more of them.
  • step S806 the control terminal receives the binding operation prompt returned by the network side server for the physical attribute of the terminal to be bound, and displays the current page.
  • step S807 the control terminal inputs the verification information according to the binding operation prompt and the physical attribute displayed by the terminal to be bound.
  • step S808 the control terminal transmits the verification information to the network side server.
  • step S809 after receiving the verification information of the performed binding verification operation sent by the terminal to be bound, the network side server verifies the validity of the verification information.
  • verifying the legality it is also possible to detect whether the verification information is received within a predetermined time. If the predetermined time is exceeded, the verification information is illegal information.
  • step S810 the network side server sends the binding result to the control terminal according to the verification result.
  • the verification result is legal, the control relationship between the current account and the terminal to be bound is established.
  • the control relationship between the account and the terminal to be bound can be accurately confirmed, the control authority is confirmed, and the account is allowed to send a control command to the terminal to be bound. Moreover, the terminal to be bound does not accept the control command sent by other accounts, that is, the abuse of the malicious user is avoided.
  • FIG. 9 is a flow chart of a method of rights verification, according to an exemplary embodiment. As shown in FIG. 9, the method includes the following steps:
  • step S901 the control terminal establishes a communication connection with the network side server.
  • step S902 the control terminal discovers the terminal to be bound through the network side server or the local area network, or discovers the terminal to be bound by sending a broadcast by itself. For example, when a local area network is used, the control terminal establishes a communication connection with the router that generates the local area network, and sends a broadcast through the router to discover the terminal to be bound.
  • the terminal to be bound is a smart device that does not have explicit control rights.
  • step S903 the control terminal sends a binding request to the network side server by using the current account.
  • step S904 after receiving the binding request, the network side server determines the physical attribute of the terminal to be bound, returns a binding operation prompt for the physical attribute of the terminal to be bound to the control terminal, and sends a display to the terminal to be bound.
  • Operational instructions for physical properties may include: displaying random numbers, displaying random characters, displaying patterns, displaying phrases, controlling indicator colors, controlling indicator numbers, controlling indicator blinking frequencies, controlling sound output, physical deformation, physical One or more of displacements and the like.
  • step S905 the control terminal receives the binding operation prompt returned by the network side server for the physical attribute of the terminal to be bound, and displays the current page.
  • the binding operation prompts an operation for the physical attribute of the terminal to be bound, for example, the device button is operated, the remote controller is operated, the image is continuously swayed, a specific sound input is collected, and the electromagnetic induction switch is sensed to be operated. Wait. Proceed to step S906.
  • step S906 the terminal to be bound detects the binding verification operation for the physical attribute, and the control terminal detects the pin. Verification information for the physical attribute input of the bound terminal. For example, it is detected that the device button is operated, the remote controller is operated, the image is continuously shaken, the specific sound input is collected, the electromagnetic induction switch is sensed, and one of the shape deformation and the physical position displacement is detected. Or a variety.
  • step S907 the to-be-bound terminal and the control terminal send verification information to the network side server.
  • step S908 after receiving the verification information of the performed binding verification operation sent by the terminal to be bound and the control terminal, the network side server verifies the validity of the verification information.
  • verifying the legality it is also possible to detect whether the verification information is received within a predetermined time. If the predetermined time is exceeded, the verification information is illegal information.
  • the verification result is legal, the control relationship between the current account and the terminal to be bound is established.
  • step S909 the network side server transmits the binding result to the control terminal according to the verification result.
  • the verification result is legal, the control relationship between the current account and the terminal to be bound is established.
  • the control relationship between the account and the terminal to be bound can be accurately confirmed, the control authority is confirmed, and the account is allowed to send a control command to the terminal to be bound. Moreover, the terminal to be bound does not accept the control command sent by other accounts, that is, the abuse of the malicious user is avoided.
  • An embodiment of the present disclosure provides a device for verifying rights, as shown in FIG. 10, including:
  • the execution module 1001 is configured to perform a binding verification operation according to physical attributes displayed by the terminal to be bound;
  • the reporting module 1002 is configured to report the verification information that the binding verification operation has been performed to the network side server.
  • the device further includes:
  • the binding requesting module 1003 is configured to send a binding request to the network side server by using the current account after establishing a communication connection with the terminal to be bound;
  • the prompt receiving module 1004 is configured to receive a binding operation prompt returned by the network side server for the physical attribute of the terminal to be bound.
  • the device further includes:
  • the result receiving module 1005 is configured to receive a binding result returned by the network side server according to the verification information
  • the processing module 1006 is configured to: when the binding result is that the binding is successful, determine a control relationship between the current account and the terminal to be bound; when the binding result is a binding failure, display a binding failure prompt .
  • An embodiment of the present disclosure provides a device for verifying rights, as shown in FIG.
  • the binding receiving module 1101 is configured to: after establishing a communication connection with the control terminal, receive a binding request sent by the control terminal by using the current account;
  • the prompt sending module 1102 is configured to send a binding operation prompt for the physical attribute of the terminal to be bound to the control terminal.
  • the device further includes:
  • the verification module 1103 is configured to verify the validity of the verification information after receiving the verification information of the performed binding verification operation sent by the control terminal and/or the terminal to be bound;
  • the result sending module 1104 is configured to send a binding result to the control terminal according to the verification result.
  • the device further includes:
  • the establishing module 1105 is configured to establish a control relationship between the current account and the terminal to be bound when the verification result is legal.
  • the device further includes:
  • the operation sending module 1106 is configured to send an operation instruction for displaying a physical attribute to the terminal to be bound while sending a binding operation prompt for the physical attribute of the terminal to be bound to the control terminal.
  • An embodiment of the present disclosure provides a device for verifying rights, as shown in FIG. 12, including:
  • the operation receiving module 1201 is configured to receive an operation instruction for displaying a physical attribute sent by the network side server;
  • the attribute display module 1202 is configured to display corresponding physical attributes according to the operation instruction.
  • the device further includes:
  • the verification sending module 1203 is configured to send the verification information to the network side server after receiving the binding verification operation for the physical attribute.
  • a device for verifying authority comprising:
  • a memory for storing processor executable instructions
  • the processor is also configured to:
  • the corresponding physical attribute is displayed.
  • a non-transitory computer readable storage medium when a command in the storage medium is executed by a processor of a terminal, enabling the terminal to perform a method for verifying rights, the method comprising:
  • the verification information of the performed binding verification operation is reported to the network side server.
  • the method further includes:
  • the method further includes:
  • a binding failure prompt is displayed.
  • the method for verifying rights includes:
  • the method further includes:
  • the method further includes:
  • the method further includes: sending, to the control terminal, a binding operation prompt for the physical attribute of the terminal to be bound, and sending an operation instruction for displaying the physical attribute to the terminal to be bound.
  • the instructions for displaying physical attributes include: displaying random numbers, displaying random characters, displaying patterns, displaying phrases, controlling indicator colors, controlling indicator numbers, controlling indicator blinking frequencies, controlling sound output, One or more of physical deformation and physical displacement.
  • the method for verifying rights includes:
  • the corresponding physical attribute is displayed.
  • the method further includes: after receiving the binding verification operation for the physical attribute, sending the verification information to the network side server.
  • the method provided by the embodiment of the present disclosure may simplify the authority verification operation, enable the user to complete the authority verification by simple buttons and the like, and has higher security.
  • FIG. 13 is a block diagram of an apparatus 1300 for rights verification, which is applicable to a terminal device, according to an exemplary embodiment.
  • device 1300 can be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a gaming console, a tablet device, a medical device, a fitness device, a personal digital assistant, and the like.
  • device 1300 can include one or more of the following components: processing component 1302, memory 1304, power component 1306, multimedia component 1308, audio component 1310, input/output (I/O) interface 1312, sensor component 1314, And a communication component 1316.
  • Processing component 1302 typically controls the overall operation of device 1300, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations.
  • Processing component 1302 can include one or more processors 1320 to execute instructions to perform all or part of the steps of the above described methods.
  • processing component 1302 can include one or more modules to facilitate interaction between component 1302 and other components.
  • processing component 1302 can include a multimedia module to facilitate interaction between multimedia component 1308 and processing component 1302.
  • Memory 1304 is configured to store various types of data to support operation at device 1300. Examples of such data include instructions for any application or method operating on device 1300, contact data, phone book data, messages, pictures, videos, and the like.
  • Memory 1304 can be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only memory (EEPROM), erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Disk or Optical Disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read only memory
  • EPROM erasable Programmable Read Only Memory
  • PROM Programmable Read Only Memory
  • ROM Read Only Memory
  • Magnetic Memory Flash Memory
  • Disk Disk or Optical Disk.
  • Power component 1306 provides power to various components of device 1300.
  • Power component 1306 can include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for device 1300.
  • the multimedia component 1308 includes a screen between the device 1300 and the user that provides an output interface.
  • the screen can include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen can be implemented as a touch screen to receive input signals from the user.
  • the touch panel includes one or more touch sensors to sense touches, slides, and gestures on the touch panel. The touch sensor may sense not only the boundary of the touch or sliding action, but also the duration and pressure associated with the touch or slide operation.
  • the multimedia component 1308 includes a front camera and/or a rear camera. When the device 1300 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front camera The rear camera can be a fixed optical lens system or have focal length and optical zoom capabilities.
  • the audio component 1310 is configured to output and/or input an audio signal.
  • the audio component 1310 includes a microphone (MIC) that is configured to receive an external audio signal when the device 1300 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode.
  • the received audio signal may be further stored in memory 1304 or transmitted via communication component 1316.
  • the audio component 1310 also includes a speaker for outputting an audio signal.
  • the I/O interface 1312 provides an interface between the processing component 1302 and the peripheral interface module, which may be a keyboard, a click wheel, a button, or the like. These buttons may include, but are not limited to, a home button, a volume button, a start button, and a lock button.
  • Sensor assembly 1314 includes one or more sensors for providing device 1300 with a status assessment of various aspects.
  • sensor assembly 1314 can detect an open/closed state of device 1300, a relative positioning of components, such as the display and keypad of device 1300, and sensor component 1314 can also detect a change in position of one component of device 1300 or device 1300. The presence or absence of contact by the user with the device 1300, the orientation or acceleration/deceleration of the device 1300 and the temperature change of the device 1300.
  • Sensor assembly 1314 can include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
  • Sensor assembly 1314 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor component 1314 can also include an acceleration sensor, a gyro sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
  • Communication component 1316 is configured to facilitate wired or wireless communication between device 1300 and other devices.
  • the device 1300 can access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof.
  • the communication component 1316 receives broadcast signals or broadcast associated information from an external broadcast management system via a broadcast channel.
  • the communication component 1316 also includes a near field communication (NFC) module to facilitate short range communication.
  • NFC near field communication
  • the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
  • RFID radio frequency identification
  • IrDA infrared data association
  • UWB ultra-wideband
  • Bluetooth Bluetooth
  • apparatus 1300 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A gate array (FPGA), controller, microcontroller, microprocessor, or other electronic component implementation for performing the above methods.
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGA field programmable A gate array
  • controller microcontroller, microprocessor, or other electronic component implementation for performing the above methods.
  • non-transitory computer readable storage medium comprising instructions, such as a memory 1304 comprising instructions executable by a processor of apparatus 1300 to perform the above method.
  • the non-transitory computer readable storage medium may be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage device.
  • FIG. 14 is a block diagram of an apparatus 1900 for rights verification, according to an exemplary embodiment.
  • the device The 1900 can be provided as a server.
  • apparatus 1900 includes a processing component 1922 that further includes one or more processors, and memory resources represented by memory 1932 for storing instructions executable by processing component 1922, such as an application.
  • An application stored in memory 1932 can include one or more modules each corresponding to a set of instructions.
  • processing component 1922 is configured to execute instructions to perform the methods described above.
  • Apparatus 1900 can also include a power supply component 1926 configured to perform power management of apparatus 1900, a wired or wireless network interface 1950 configured to connect apparatus 1900 to the network, and an input/output (I/O) interface 1958.
  • Device 1900 can operate based on an operating system stored in memory 1932, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • Computer And Data Communications (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

本公开关于权限验证的方法及装置,用以简化权限验证操作,使用户通过简单按键操作即可完成权限验证,且具有更高的安全性。该权限验证的方法,包括:根据待绑定终端显示的物理属性,执行绑定验证操作;向网络侧服务器上报已执行绑定验证操作的验证信息。

Description

权限验证的方法及装置
相关申请的交叉引用
本申请基于申请号为201410646289.4、申请日为2014/11/14的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本申请作为参考。
技术领域
本公开涉及通讯技术领域,尤其涉及权限验证的方法及装置。
背景技术
在无线物联网应用中,物权所有绑定的鉴权是一个难题。目前,通常使用二维码的方式,这要求被绑定的设备表面贴有一个唯一标识的二维码,用户使用手机自带的摄像头,拍摄二维码,得到唯一标识码,再去远程服务器进行校验该唯一标识码。如果远程服务器校验合法,即证明用户对贴有该二维码的设备的所有权。但是,要求用户使用手机对准二维码进行扫描,对于不便进行操作的设备不友好。
发明内容
为克服相关技术中存在的问题,本公开实施例提供的权限验证的方法及装置,用以简化权限验证操作,使用户通过简单按键操作即可完成权限验证,且具有更高的安全性。
根据本公开实施例的第一方面,提供一种权限验证的方法,包括:
根据待绑定终端显示的物理属性,执行绑定验证操作;
向网络侧服务器上报已执行绑定验证操作的验证信息。
在一实施例中,该方法还包括:
与所述待绑定终端建立通讯连接后,采用当前账号向网络侧服务器发送绑定请求;
接收所述网络侧服务器返回的针对所述待绑定终端的物理属性的绑定操作提示。
在一实施例中,该方法还包括:
接收所述网络侧服务器根据所述验证信息返回的绑定结果;
当所述绑定结果为绑定成功时,确定当前账号与所述待绑定终端的控制关系;
当所述绑定结果为绑定失败时,显示绑定失败提示。
根据本公开实施例的第二方面,提供一种权限验证的方法,包括:
与控制终端建立通讯连接后,接收所述控制终端采用当前账号发送的绑定请求;
向所述控制终端发送针对待绑定终端的物理属性的绑定操作提示。
在一实施例中,该方法还包括:
接收到所述控制终端和/或所述待绑定终端发送的已执行绑定验证操作的验证信息后,验证所述验证信息的合法性;
并根据验证结果向所述控制终端发送绑定结果。
在一实施例中,该方法还包括:
所述验证结果为合法时,建立所述当前账号和待绑定终端之间的控制关系。
在一实施例中,该方法还包括:向所述控制终端发送针对待绑定终端的物理属性的绑定操作提示的同时,向所述待绑定终端发送显示物理属性的操作指令。
在一实施例中,所述显示物理属性的指令包括:显示随机数字、显示随机字符、显示图案、显示词组、控制指示灯颜色、控制指示灯个数、控制指示灯闪烁频次、控制声音输出、物理形变、物理位移中的一种或多种。
根据本公开实施例的第三方面,提供一种权限验证的方法,包括:
接收到网络侧服务器发送的显示物理属性的操作指令;
根据所述操作指令,显示相应的物理属性。
在一实施例中,该方法还包括:接收到针对所述物理属性的绑定验证操作后,向所述网络侧服务器发送验证信息。
根据本公开实施例的第四方面,提供一种权限验证的装置,包括:
执行模块,被配置为根据待绑定终端显示的物理属性,执行绑定验证操作;
上报模块,被配置为向网络侧服务器上报已执行绑定验证操作的验证信息。
在一实施例中,该装置还包括:
绑定请求模块,被配置为与所述待绑定终端建立通讯连接后,采用当前账号向网络侧服务器发送绑定请求;
提示接收模块,被配置为接收所述网络侧服务器返回的针对所述待绑定终端的物理属性的绑定操作提示。
在一实施例中,该装置还包括:
结果接收模块,被配置为接收所述网络侧服务器根据所述验证信息返回的绑定结果;
处理模块,被配置为当所述绑定结果为绑定成功时,确定当前账号与所述待绑定终端的 控制关系;当所述绑定结果为绑定失败时,显示绑定失败提示。
根据本公开实施例的第五方面,提供一种权限验证的装置,包括:
绑定接收模块,被配置为与控制终端建立通讯连接后,接收所述控制终端采用当前账号发送的绑定请求;
提示发送模块,被配置为向所述控制终端发送针对待绑定终端的物理属性的绑定操作提示。
在一实施例中,该装置还包括:
验证模块,被配置为接收到所述控制终端和/或所述待绑定终端发送的已执行绑定验证操作的验证信息后,验证所述验证信息的合法性;
结果发送模块,被配置为并根据验证结果向所述控制终端发送绑定结果。
在一实施例中,该装置还包括:
建立模块,被配置为所述验证结果为合法时,建立所述当前账号和待绑定终端之间的控制关系。
在一实施例中,该装置还包括:
操作发送模块,被配置为向所述控制终端发送针对待绑定终端的物理属性的绑定操作提示的同时,向所述待绑定终端发送显示物理属性的操作指令
根据本公开实施例的第六方面,提供一种权限验证的装置,包括:
操作接收模块,被配置为接收到网络侧服务器发送的显示物理属性的操作指令;
属性显示模块,被配置为根据所述操作指令,显示相应的物理属性。
在一实施例中,该装置还包括:
验证发送模块,被配置为接收到针对所述物理属性的绑定验证操作后,向所述网络侧服务器发送验证信息。
根据本公开实施例的第七方面,提供一种权限验证的装置,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
根据待绑定终端显示的物理属性,执行绑定验证操作;
向网络侧服务器上报已执行绑定验证操作的验证信息;
或者
与控制终端建立通讯连接后,接收所述控制终端采用当前账号发送的绑定请求;
向所述控制终端发送针对待绑定终端的物理属性的绑定操作提示;
或者
接收到网络侧服务器发送的显示物理属性的操作指令;
根据所述操作指令,显示相应的物理属性。
本公开的实施例提供的技术方案可以简化权限验证操作,使用户通过简单按键等操作即可完成权限验证,且具有更高的安全性。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本公开的实施例,并与说明书一起用于解释本公开的原理。
图1是根据一示例性实施例示出的一种权限验证的方法的流程图。
图2是根据一示例性实施例示出的权限验证的方法的流程图。
图3是根据一示例性实施例示出的权限验证的方法的流程图。
图4是根据一示例性实施例示出的权限验证的方法的流程图。
图5是根据一示例性实施例示出的权限验证的方法的流程图。
图6是根据一示例性实施例示出的权限验证的方法的流程图。
图7是根据一示例性实施例示出的权限验证的方法的流程图。
图8是根据一示例性实施例示出的权限验证的方法的流程图。
图9是根据一示例性实施例示出的权限验证的方法的流程图。
图10是根据一示例性实施例示出的一种权限验证的装置的框图。
图11是根据一示例性实施例示出的一种权限验证的装置的框图。
图12是根据一示例性实施例示出的一种权限验证的装置的框图。
图13是根据一示例性实施例示出的另一种权限验证的装置的框图。
图14是根据一示例性实施例示出的另一种权限验证的装置的框图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述 的实施方式并不代表与本公开相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开的一些方面相一致的装置和方法的例子。
图1是根据一示例性实施例示出的权限验证的方法流程图。如图1所示,该方法适用于控制终端中,例如,手机、平板、PC等终端,包括如下步骤:
在步骤S101中,根据待绑定终端显示的物理属性,执行绑定验证操作。例如,物理属性可以为显示的随机数字、显示的随机字符、显示的图案、显示的词组、指示灯颜色、指示灯个数、指示灯闪烁频次、声音输出、物理形变、物理位移中的一种或多种。当待绑定终端显示的物理属性为显示的随机字符时,控制终端可以执行输入该随机字符的绑定验证操作。当待绑定终端显示的物理属性为指示灯颜色时,控制终端可以执行输入该指示灯颜色的绑定验证操作。其他形式再次不一一列举。
在步骤S102中,向网络侧服务器上报已执行绑定验证操作的验证信息。例如,将输入的指示灯颜色信息作为验证信息发送到网络侧服务器。
在一实施例中,该方法还包括:与待绑定终端建立通讯连接后,采用当前账号向网络侧服务器发送绑定请求;接收网络侧服务器返回的针对待绑定终端的物理属性的绑定操作提示。
在一实施例中,该方法还包括:接收网络侧服务器根据验证信息返回的绑定结果;当绑定结果为绑定成功时,确定当前账号与待绑定终端的控制关系;当绑定结果为绑定失败时,显示绑定失败提示。
以手机获取智能摄像头的操作权限为例,对本实施例提供的方法进行详细说明,如图2所示,该方法适用于手机中,包括以下步骤:
在步骤S201中,手机采用当前账号与智能摄像头建立通讯连接。例如,手机通过网络侧服务器或本地局域网发现该智能摄像头。手机也可以直接通过自身发送广播等方式发现该智能摄像头。
在步骤S202中,手机向网络侧服务器发送绑定请求。
在步骤S203中,手机接收网络侧服务器返回的针对该智能摄像头的物理属性的绑定操作提示。例如,该绑定提示可以为“请输入指示灯的闪烁次数”。
在步骤S204中,根据待绑定终端显示的物理属性,手机执行绑定验证操作。例如,接收到输入的次数数字等。
在步骤S205中,手机向网络侧服务器上报已执行绑定验证操作的验证信息。例如,手机向网络侧服务器上报接收到输入的次数数字。
在步骤S206中,手机接收网络侧服务器根据验证信息返回的绑定结果。当绑定结果为绑定成功时,确定当前账号与待绑定终端的控制关系;当绑定结果为绑定失败时,显示绑定失败提示。
基于同一构思,图3是根据一示例性实施例示出的权限验证的方法流程图。如图3所示,该方法适用于网络侧服务器中,例如,云端服务器、路由器等,包括如下步骤:
在步骤S301中,与控制终端建立通讯连接后,接收控制终端采用当前账号发送的绑定请求。
在步骤S302中,向控制终端发送针对待绑定终端的物理属性的绑定操作提示。
例如,接收到控制终端采用当前账号发送的绑定请求后,确定控制终端请求绑定的待绑定终端。根据该待绑定终端具有的物理属性,向控制终端发送绑定操作提示。例如,待绑定终端具有指示灯,绑定操作提示的内容可以针对指示灯。待绑定终端具有显示屏,绑定操作提示的内容可以针对显示屏显示的内容。待绑定终端具有实体按键,绑定操作提示的内容可以针对该实体按键。
在一实施例中,该方法还包括:向控制终端发送针对待绑定终端的物理属性的绑定操作提示的同时,向待绑定终端发送显示物理属性的操作指令。例如,向待绑定终端发送显示数字的操作指令,控制指示灯点亮的操作指令,控制待绑定终端产生物理形变的操作指令,控制待绑定终端产生物理位移的操作指令等。
在一实施例中,该显示物理属性的包括:显示随机数字、显示随机字符、显示图案、显示词组、控制指示灯颜色、控制指示灯个数、控制指示灯闪烁频次、控制声音输出、物理形变、物理位移中的一种或多种。例如,向左移动、向右旋转、屏幕向下凹陷等,再此不一一列举。
在一实施例中,该方法还包括:接收到控制终端和/或待绑定终端发送的已执行绑定验证操作的验证信息后,验证验证信息的合法性;并根据验证结果向控制终端发送绑定结果。例如,向待绑定终端发送显示物理属性的操作指令为显示数字567,控制终端上报的验证信息是数字345,那么该验证信息不合法,控制终端无法获得待绑定终端的控制权限。又例如,接收到待绑定终端发送的验证信息为开关被连续按压3次,向控制终端发送的绑定操作提示为按压开关3次,那么该验证信息合法,控制终端获得待绑定终端的控制权限。其中,验证合法性时,还可以检测该验证信息是否在预定时间内接收到,若超过预定时间,该验证信息为非法信息。
在一实施例中,该方法还包括:验证结果为合法时,建立当前账号和待绑定终端之间的 控制关系。建立控制关系后,存储该控制关系,以便该当前账号获得长期控制待绑定终端的权限,直到解除绑定。
以pad获取智能插座的操作权限为例,对本实施例提供的方法进行详细说明,如图4所示,该方法适用于网络侧服务器中,包括以下步骤:
在步骤S401中,与控制终端建立通讯连接后,接收控制终端采用当前账号发送的绑定请求。例如,与控制终端pad建立通讯连接后,接收到控制终端pad发送的绑定智能插座的绑定请求。
在步骤S402中,向控制终端发送针对待绑定终端的物理属性的绑定操作提示。例如,向控制终端发送“请输入指示灯的颜色”。同时,向待绑定终端智能插座发送显示物理属性的操作指令,例如指示灯显示蓝色的操作指令。
在步骤S403中,接收到控制终端发送的已执行绑定验证操作的验证信息后,验证验证信息的合法性。当绑定操作提示为“请输入指示灯的颜色”时,若控制终端发送的验证信息为“蓝色”,则该验证信息合法。其中,验证合法性时,还可以检测该验证信息是否在预定时间内接收到,若超过预定时间,该验证信息为非法信息。
在步骤S404中,根据验证结果向控制终端发送绑定结果。并且,验证结果为合法时,建立当前账号和待绑定终端之间的控制关系。
以pad获取智能插座的操作权限为例,对本实施例提供的方法进行详细说明,如图5所示,该方法适用于网络侧服务器中,包括以下步骤:
在步骤S501中,与控制终端建立通讯连接后,接收控制终端采用当前账号发送的绑定请求。例如,与控制终端pad建立通讯连接后,接收到控制终端pad发送的绑定智能插座的绑定请求。
在步骤S502中,向控制终端发送针对待绑定终端的物理属性的绑定操作提示。例如,向控制终端发送“请连续按压开关键2次”。
在步骤S503中,接收到待绑定终端发送的已执行绑定验证操作的验证信息后,验证验证信息的合法性。例如,智能插座上报的验证信息为开关键被连续按压2次,则该验证信息合法。其中,验证合法性时,还可以检测该验证信息是否在预定时间内接收到,若超过预定时间,该验证信息为非法信息。
在步骤S504中,根据验证结果向控制终端发送绑定结果。并且,验证结果为合法时,建立当前账号和待绑定终端之间的控制关系。
基于同一构思,图6是根据一示例性实施例示出的权限验证的方法流程图。如图6所示, 该方法适用于智能终端中,例如,智能家居中的智能插座、智能摄像头、智能净化器、智能空调等,包括如下步骤:
在步骤S601中,接收到网络侧服务器发送的显示物理属性的操作指令。
在步骤S602中,根据操作指令,显示相应的物理属性。
其中,显示物理属性的操作指令可以包括:显示随机数字、显示随机字符、显示图案、显示词组、控制指示灯颜色、控制指示灯个数、控制指示灯闪烁频次、控制声音输出、物理形变、物理位移等中的一种或多种。
在一实施例中,该方法还包括:接收到针对物理属性的绑定验证操作后,向网络侧服务器发送验证信息。例如,接收到设备按键被操作,遥控器被操作,采集到持续晃动的图像,采集到特定声音输入,感应到电磁感应开关被操作等。
本公开的实施例提供的方法可以通过待绑定设备的物理属性进行权限验证,简化权限验证操作,使用户通过简单按键等操作即可完成权限验证,且具有更高的安全性。可以避免相邻控制终端发现待绑定设备后抢先获取控制权限,例如,邻居家的手机发现了用户的智能设备,若是简单的输入服务器推送的验证码等,其他用户将很容易获取到该智能设备的控制权限。
图7是根据一示例性实施例示出的权限验证的方法流程图。如图7所示,该方法包括以下步骤:
在步骤S701中,控制终端与网络侧服务器建立通讯连接。
在步骤S702中,控制终端通过网络侧服务器或本地局域网发现待绑定终端,或通过自身发送广播发现待绑定终端。例如,使用本地局域网时,控制终端与产生局域网的路由器建立通讯连接,通过该路由器发送广播发现待绑定终端。该待绑定终端为未明确控制权限的智能设备。
在步骤S703中,控制终端采用当前账号向网络侧服务器发送绑定请求。
在步骤S704中,网络侧服务器接收到该绑定请求后,确定待绑定终端的物理属性,向控制终端返回针对待绑定终端的物理属性的绑定操作提示。
在步骤S705中,控制终端接收网络侧服务器返回的针对待绑定终端的物理属性的绑定操作提示,并显示在当前页面。
假设该绑定操作提示为针对待绑定终端的物理属性的操作,例如,设备按键被操作,遥控器被操作,采集到持续晃动的图像,采集到特定声音输入,感应到电磁感应开关被操作等。继续执行步骤S706。
在步骤S706中,待绑定终端检测到针对物理属性的绑定验证操作。例如,检测到设备按键被操作、遥控器被操作,采集到持续晃动的图像,采集到特定声音输入,感应到电磁感应开关被操作,检测到外形产生形变、物理位置发生位移等中的一种或多种。
在步骤S707中,待绑定终端向网络侧服务器发送验证信息。
在步骤S708中,网络侧服务器接收到待绑定终端发送的已执行绑定验证操作的验证信息后,验证验证信息的合法性。其中,验证合法性时,还可以检测该验证信息是否在预定时间内接收到,若超过预定时间,该验证信息为非法信息。验证结果为合法时,建立当前账号和待绑定终端之间的控制关系。
在步骤S709中,网络侧服务器根据验证结果向控制终端发送绑定结果。验证结果为合法时,建立当前账号和待绑定终端之间的控制关系。
采用本实施例提供的方法,可以准确的确认账号与待绑定终端的控制关系,确认控制权限,允许该帐号向该待绑定终端发送控制命令。并且,该待绑定终端不接受其他账号发来的控制命令,即避免了恶意用户的滥用。
图8是根据一示例性实施例示出的权限验证的方法流程图。如图8所示,该方法包括以下步骤:
在步骤S801中,控制终端与网络侧服务器建立通讯连接。
在步骤S802中,控制终端通过网络侧服务器或本地局域网发现待绑定终端,或通过自身发送广播发现待绑定终端。例如,使用本地局域网时,控制终端与产生局域网的路由器建立通讯连接,通过该路由器发送广播发现待绑定终端。该待绑定终端为未明确控制权限的智能设备。
在步骤S803中,控制终端采用当前账号向网络侧服务器发送绑定请求。
在步骤S804中,网络侧服务器接收到该绑定请求后,确定待绑定终端的物理属性,向控制终端返回针对待绑定终端的物理属性的绑定操作提示,向待绑定终端发送显示物理属性的操作指令。
在步骤S805中,待绑定终端根据操作指令,显示相应的物理属性。显示物理属性的操作指令可以包括:显示随机数字、显示随机字符、显示图案、显示词组、控制指示灯颜色、控制指示灯个数、控制指示灯闪烁频次、控制声音输出、物理形变、物理位移等中的一种或多种。
在步骤S806中,控制终端接收网络侧服务器返回的针对待绑定终端的物理属性的绑定操作提示,并显示在当前页面。
在步骤S807中,控制终端根据绑定操作提示以及待绑定终端显示的物理属性,输入验证信息。
在步骤S808中,控制终端向网络侧服务器发送验证信息。
在步骤S809中,网络侧服务器接收到待绑定终端发送的已执行绑定验证操作的验证信息后,验证验证信息的合法性。其中,验证合法性时,还可以检测该验证信息是否在预定时间内接收到,若超过预定时间,该验证信息为非法信息。
在步骤S810中,网络侧服务器根据验证结果向控制终端发送绑定结果。验证结果为合法时,建立当前账号和待绑定终端之间的控制关系。
采用本实施例提供的方法,可以准确的确认账号与待绑定终端的控制关系,确认控制权限,允许该帐号向该待绑定终端发送控制命令。并且,该待绑定终端不接受其他账号发来的控制命令,即避免了恶意用户的滥用。
图9是根据一示例性实施例示出的权限验证的方法流程图。如图9所示,该方法包括以下步骤:
在步骤S901中,控制终端与网络侧服务器建立通讯连接。
在步骤S902中,控制终端通过网络侧服务器或本地局域网发现待绑定终端,或通过自身发送广播发现待绑定终端。例如,使用本地局域网时,控制终端与产生局域网的路由器建立通讯连接,通过该路由器发送广播发现待绑定终端。该待绑定终端为未明确控制权限的智能设备。
在步骤S903中,控制终端采用当前账号向网络侧服务器发送绑定请求。
在步骤S904中,网络侧服务器接收到该绑定请求后,确定待绑定终端的物理属性,向控制终端返回针对待绑定终端的物理属性的绑定操作提示,向待绑定终端发送显示物理属性的操作指令。例如,显示物理属性的操作指令可以包括:显示随机数字、显示随机字符、显示图案、显示词组、控制指示灯颜色、控制指示灯个数、控制指示灯闪烁频次、控制声音输出、物理形变、物理位移等中的一种或多种。
在步骤S905中,控制终端接收网络侧服务器返回的针对待绑定终端的物理属性的绑定操作提示,并显示在当前页面。
假设该绑定操作提示为针对待绑定终端的物理属性的操作,例如,设备按键被操作,遥控器被操作,采集到持续晃动的图像,采集到特定声音输入,感应到电磁感应开关被操作等。继续执行步骤S906。
在步骤S906中,待绑定终端检测到针对物理属性的绑定验证操作,控制终端检测到针 对待绑定终端物理属性输入的验证信息。例如,检测到设备按键被操作、遥控器被操作,采集到持续晃动的图像,采集到特定声音输入,感应到电磁感应开关被操作,检测到外形产生形变、物理位置发生位移等中的一种或多种。
在步骤S907中,待绑定终端和控制终端向网络侧服务器发送验证信息。
在步骤S908中,网络侧服务器接收到待绑定终端和控制终端发送的已执行绑定验证操作的验证信息后,验证验证信息的合法性。其中,验证合法性时,还可以检测该验证信息是否在预定时间内接收到,若超过预定时间,该验证信息为非法信息。验证结果为合法时,建立当前账号和待绑定终端之间的控制关系。
在步骤S909中,网络侧服务器根据验证结果向控制终端发送绑定结果。验证结果为合法时,建立当前账号和待绑定终端之间的控制关系。
采用本实施例提供的方法,可以准确的确认账号与待绑定终端的控制关系,确认控制权限,允许该帐号向该待绑定终端发送控制命令。并且,该待绑定终端不接受其他账号发来的控制命令,即避免了恶意用户的滥用。
本公开实施例提供了一种权限验证的装置,如图10所示,包括:
执行模块1001,被配置为根据待绑定终端显示的物理属性,执行绑定验证操作;
上报模块1002,被配置为向网络侧服务器上报已执行绑定验证操作的验证信息。
可选的,该装置还包括:
绑定请求模块1003,被配置为与所述待绑定终端建立通讯连接后,采用当前账号向网络侧服务器发送绑定请求;
提示接收模块1004,被配置为接收所述网络侧服务器返回的针对所述待绑定终端的物理属性的绑定操作提示。
可选的,该装置还包括:
结果接收模块1005,被配置为接收所述网络侧服务器根据所述验证信息返回的绑定结果;
处理模块1006,被配置为当所述绑定结果为绑定成功时,确定当前账号与所述待绑定终端的控制关系;当所述绑定结果为绑定失败时,显示绑定失败提示。
本公开实施例提供了一种权限验证的装置,如图11所示,包括:
绑定接收模块1101,被配置为与控制终端建立通讯连接后,接收所述控制终端采用当前账号发送的绑定请求;
提示发送模块1102,被配置为向所述控制终端发送针对待绑定终端的物理属性的绑定操作提示。
可选的,该装置还包括:
验证模块1103,被配置为接收到所述控制终端和/或所述待绑定终端发送的已执行绑定验证操作的验证信息后,验证所述验证信息的合法性;
结果发送模块1104,被配置为并根据验证结果向所述控制终端发送绑定结果。
可选的,该装置还包括:
建立模块1105,被配置为所述验证结果为合法时,建立所述当前账号和待绑定终端之间的控制关系。
可选的,该装置还包括:
操作发送模块1106,被配置为向所述控制终端发送针对待绑定终端的物理属性的绑定操作提示的同时,向所述待绑定终端发送显示物理属性的操作指令。
本公开实施例提供了一种权限验证的装置,如图12所示,包括:
操作接收模块1201,被配置为接收到网络侧服务器发送的显示物理属性的操作指令;
属性显示模块1202,被配置为根据所述操作指令,显示相应的物理属性。
可选的,该装置还包括:
验证发送模块1203,被配置为接收到针对所述物理属性的绑定验证操作后,向所述网络侧服务器发送验证信息。
关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。
一种权限验证的装置,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,该处理器还被配置为:
根据待绑定终端显示的物理属性,执行绑定验证操作;
向网络侧服务器上报已执行绑定验证操作的验证信息;
或者
与控制终端建立通讯连接后,接收所述控制终端采用当前账号发送的绑定请求;
向所述控制终端发送针对待绑定终端的物理属性的绑定操作提示;
或者
接收到网络侧服务器发送的显示物理属性的操作指令;
根据所述操作指令,显示相应的物理属性。
一种非临时性计算机可读存储介质,当所述存储介质中的指令由终端的处理器执行时,使得终端能够执行一种权限验证的方法,该方法包括:
根据待绑定终端显示的物理属性,执行绑定验证操作;
向网络侧服务器上报已执行绑定验证操作的验证信息。
在一实施例中,该方法还包括:
与所述待绑定终端建立通讯连接后,采用当前账号向网络侧服务器发送绑定请求;
接收所述网络侧服务器返回的针对所述待绑定终端的物理属性的绑定操作提示。
在一实施例中,该方法还包括:
接收所述网络侧服务器根据所述验证信息返回的绑定结果;
当所述绑定结果为绑定成功时,确定当前账号与所述待绑定终端的控制关系;
当所述绑定结果为绑定失败时,显示绑定失败提示。
该一种权限验证的方法,包括:
与控制终端建立通讯连接后,接收所述控制终端采用当前账号发送的绑定请求;
向所述控制终端发送针对待绑定终端的物理属性的绑定操作提示。
在一实施例中,该方法还包括:
接收到所述控制终端和/或所述待绑定终端发送的已执行绑定验证操作的验证信息后,验证所述验证信息的合法性;
并根据验证结果向所述控制终端发送绑定结果。
在一实施例中,该方法还包括:
所述验证结果为合法时,建立所述当前账号和待绑定终端之间的控制关系。
在一实施例中,该方法还包括:向所述控制终端发送针对待绑定终端的物理属性的绑定操作提示的同时,向所述待绑定终端发送显示物理属性的操作指令。
在一实施例中,所述显示物理属性的指令包括:显示随机数字、显示随机字符、显示图案、显示词组、控制指示灯颜色、控制指示灯个数、控制指示灯闪烁频次、控制声音输出、物理形变、物理位移中的一种或多种。
该一种权限验证的方法,包括:
接收到网络侧服务器发送的显示物理属性的操作指令;
根据所述操作指令,显示相应的物理属性。
在一实施例中,该方法还包括:接收到针对所述物理属性的绑定验证操作后,向所述网络侧服务器发送验证信息。
本公开的实施例提供的方法可以可以简化权限验证操作,使用户通过简单按键等操作即可完成权限验证,且具有更高的安全性。
图13是根据一示例性实施例示出的一种用于权限验证的装置1300的框图,该装置适用于终端设备。例如,装置1300可以是移动电话,计算机,数字广播终端,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等。
参照图13,装置1300可以包括以下一个或多个组件:处理组件1302,存储器1304,电源组件1306,多媒体组件1308,音频组件1310,输入/输出(I/O)的接口1312,传感器组件1314,以及通信组件1316。
处理组件1302通常控制装置1300的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理元件1302可以包括一个或多个处理器1320来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件1302可以包括一个或多个模块,便于处理组件1302和其他组件之间的交互。例如,处理部件1302可以包括多媒体模块,以方便多媒体组件1308和处理组件1302之间的交互。
存储器1304被配置为存储各种类型的数据以支持在设备1300的操作。这些数据的示例包括用于在装置1300上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器1304可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电力组件1306为装置1300的各种组件提供电力。电力组件1306可以包括电源管理系统,一个或多个电源,及其他与为装置1300生成、管理和分配电力相关联的组件。
多媒体组件1308包括在所述装置1300和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件1308包括一个前置摄像头和/或后置摄像头。当设备1300处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头 和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件1310被配置为输出和/或输入音频信号。例如,音频组件1310包括一个麦克风(MIC),当装置1300处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器1304或经由通信组件1316发送。在一些实施例中,音频组件1310还包括一个扬声器,用于输出音频信号。
I/O接口1312为处理组件1302和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件1314包括一个或多个传感器,用于为装置1300提供各个方面的状态评估。例如,传感器组件1314可以检测到设备1300的打开/关闭状态,组件的相对定位,例如所述组件为装置1300的显示器和小键盘,传感器组件1314还可以检测装置1300或装置1300一个组件的位置改变,用户与装置1300接触的存在或不存在,装置1300方位或加速/减速和装置1300的温度变化。传感器组件1314可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件1314还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件1314还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件1316被配置为便于装置1300和其他设备之间有线或无线方式的通信。装置1300可以接入基于通信标准的无线网络,如WiFi,2G或3G,或它们的组合。在一个示例性实施例中,通信部件1316经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信部件1316还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。
在示例性实施例中,装置1300可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器1304,上述指令可由装置1300的处理器执行以完成上述方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
图14是根据一示例性实施例示出的一种用于权限验证的装置1900的框图。例如,装置 1900可以被提供为一服务器。参照图14,装置1900包括处理组件1922,其进一步包括一个或多个处理器,以及由存储器1932所代表的存储器资源,用于存储可由处理部件1922的执行的指令,例如应用程序。存储器1932中存储的应用程序可以包括一个或一个以上的每一个对应于一组指令的模块。此外,处理组件1922被配置为执行指令,以执行上述方法。
装置1900还可以包括一个电源组件1926被配置为执行装置1900的电源管理,一个有线或无线网络接口1950被配置为将装置1900连接到网络,和一个输入输出(I/O)接口1958。装置1900可以操作基于存储在存储器1932的操作系统,例如Windows ServerTM、Mac OS XTM、UnixTM、LinuxTM、FreeBSDTM或类似。
本领域技术人员在考虑说明书及实践这里公开的公开后,将容易想到本公开的其它实施方案。本申请旨在涵盖本公开的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本公开的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本公开的真正范围和精神由下面的权利要求指出。
应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限制。

Claims (20)

  1. 一种权限验证的方法,其特征在于,包括:
    根据待绑定终端显示的物理属性,执行绑定验证操作;
    向网络侧服务器上报已执行绑定验证操作的验证信息。
  2. 如权利要求1所述的方法,其特征在于,还包括:
    与所述待绑定终端建立通讯连接后,采用当前账号向网络侧服务器发送绑定请求;
    接收所述网络侧服务器返回的针对所述待绑定终端的物理属性的绑定操作提示。
  3. 如权利要求1或2所述的方法,其特征在于,还包括:
    接收所述网络侧服务器根据所述验证信息返回的绑定结果;
    当所述绑定结果为绑定成功时,确定当前账号与所述待绑定终端的控制关系;
    当所述绑定结果为绑定失败时,显示绑定失败提示。
  4. 一种权限验证的方法,其特征在于,包括:
    与控制终端建立通讯连接后,接收所述控制终端采用当前账号发送的绑定请求;
    向所述控制终端发送针对待绑定终端的物理属性的绑定操作提示。
  5. 如权利要求4所述的方法,其特征在于,还包括:
    接收到所述控制终端和/或所述待绑定终端发送的已执行绑定验证操作的验证信息后,验证所述验证信息的合法性;
    并根据验证结果向所述控制终端发送绑定结果。
  6. 如权利要求5所述的方法,其特征在于,还包括:
    所述验证结果为合法时,建立所述当前账号和待绑定终端之间的控制关系。
  7. 如权利要求4所述的方法,其特征在于,还包括:向所述控制终端发送针对待绑定终端的物理属性的绑定操作提示的同时,向所述待绑定终端发送显示物理属性的操作指令。
  8. 如权利要求7所述的方法,其特征在于,所述显示物理属性的指令包括:显示随机数字、显示随机字符、显示图案、显示词组、控制指示灯颜色、控制指示灯个数、控制指示灯闪烁频次、控制声音输出、物理形变、物理位移中的一种或多种。
  9. 一种权限验证的方法,其特征在于,包括:
    接收到网络侧服务器发送的显示物理属性的操作指令;
    根据所述操作指令,显示相应的物理属性。
  10. 如权利要求9所述的方法,其特征在于,还包括:
    接收到针对所述物理属性的绑定验证操作后,向所述网络侧服务器发送验证信息。
  11. 一种权限验证的装置,其特征在于,包括:
    执行模块,被配置为根据待绑定终端显示的物理属性,执行绑定验证操作;
    上报模块,被配置为向网络侧服务器上报已执行绑定验证操作的验证信息。
  12. 如权利要求11所述的装置,其特征在于,所述装置还包括:
    绑定请求模块,被配置为与所述待绑定终端建立通讯连接后,采用当前账号向网络侧服务器发送绑定请求;
    提示接收模块,被配置为接收所述网络侧服务器返回的针对所述待绑定终端的物理属性的绑定操作提示。
  13. 如权利要求11或12所述的装置,其特征在于,所述装置还包括:
    结果接收模块,被配置为接收所述网络侧服务器根据所述验证信息返回的绑定结果;
    处理模块,被配置为当所述绑定结果为绑定成功时,确定当前账号与所述待绑定终端的控制关系;当所述绑定结果为绑定失败时,显示绑定失败提示。
  14. 一种权限验证的装置,其特征在于,包括:
    绑定接收模块,被配置为与控制终端建立通讯连接后,接收所述控制终端采用当前账号发送的绑定请求;
    提示发送模块,被配置为向所述控制终端发送针对待绑定终端的物理属性的绑定操作提示。
  15. 如权利要求14所述的装置,其特征在于,还包括:
    验证模块,被配置为接收到所述控制终端和/或所述待绑定终端发送的已执行绑定验证操作的验证信息后,验证所述验证信息的合法性;
    结果发送模块,被配置为并根据验证结果向所述控制终端发送绑定结果。
  16. 如权利要求15所述的装置,其特征在于,还包括:
    建立模块,被配置为所述验证结果为合法时,建立所述当前账号和待绑定终端之间的控制关系。
  17. 如权利要求14所述的装置,其特征在于,还包括:
    操作发送模块,被配置为向所述控制终端发送针对待绑定终端的物理属性的绑定操作提示的同时,向所述待绑定终端发送显示物理属性的操作指令。
  18. 一种权限验证的装置,其特征在于,包括:
    操作接收模块,被配置为接收到网络侧服务器发送的显示物理属性的操作指令;
    属性显示模块,被配置为根据所述操作指令,显示相应的物理属性。
  19. 如权利要求18所述的装置,其特征在于,还包括:
    验证发送模块,被配置为接收到针对所述物理属性的绑定验证操作后,向所述网络侧服务器发送验证信息。
  20. 一种权限验证的装置,其特征在于,包括:
    处理器;
    用于存储处理器可执行指令的存储器;
    其中,所述处理器被配置为:
    根据待绑定终端显示的物理属性,执行绑定验证操作;
    向网络侧服务器上报已执行绑定验证操作的验证信息;
    或者
    与控制终端建立通讯连接后,接收所述控制终端采用当前账号发送的绑定请求;
    向所述控制终端发送针对待绑定终端的物理属性的绑定操作提示;
    或者
    接收到网络侧服务器发送的显示物理属性的操作指令;
    根据所述操作指令,显示相应的物理属性。
PCT/CN2015/093906 2014-11-14 2015-11-05 权限验证的方法及装置 WO2016074586A1 (zh)

Priority Applications (6)

Application Number Priority Date Filing Date Title
MX2017005368A MX2017005368A (es) 2014-11-14 2015-11-05 Metodo y dispositivo para la verificacion de privilegios.
JP2016548039A JP6374517B2 (ja) 2014-11-14 2015-11-05 権限検証方法および装置
KR1020167028413A KR20160132966A (ko) 2014-11-14 2015-11-05 권한을 검증하기 위한 방법 및 디바이스
RU2017102538A RU2663710C2 (ru) 2014-11-14 2015-11-05 Способ и устройство для проверки разрешения
EP15858097.7A EP3059899B1 (en) 2014-11-14 2015-11-05 Permission verification method and device
US15/266,359 US20170006038A1 (en) 2014-11-14 2016-09-15 Method and device for verifying permission

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410646289.4A CN104468524B (zh) 2014-11-14 2014-11-14 权限验证的方法及装置
CN201410646289.4 2014-11-14

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/266,359 Continuation US20170006038A1 (en) 2014-11-14 2016-09-15 Method and device for verifying permission

Publications (1)

Publication Number Publication Date
WO2016074586A1 true WO2016074586A1 (zh) 2016-05-19

Family

ID=52913896

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/093906 WO2016074586A1 (zh) 2014-11-14 2015-11-05 权限验证的方法及装置

Country Status (8)

Country Link
US (1) US20170006038A1 (zh)
EP (1) EP3059899B1 (zh)
JP (1) JP6374517B2 (zh)
KR (1) KR20160132966A (zh)
CN (1) CN104468524B (zh)
MX (1) MX2017005368A (zh)
RU (1) RU2663710C2 (zh)
WO (1) WO2016074586A1 (zh)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104468524B (zh) * 2014-11-14 2018-12-25 小米科技有限责任公司 权限验证的方法及装置
CN104992088A (zh) * 2015-06-30 2015-10-21 小米科技有限责任公司 设备安全保护方法及装置
CN105610821A (zh) * 2015-12-26 2016-05-25 小米科技有限责任公司 安全验证方法及装置
CN107104996B (zh) * 2016-02-19 2021-05-18 腾讯科技(深圳)有限公司 用户位置校验方法和装置、受控设备访问方法和装置
CN106302392A (zh) * 2016-07-27 2017-01-04 深圳前海弘稼科技有限公司 用于智能种植设备的控制方法及控制装置、终端
CN106354183A (zh) * 2016-11-03 2017-01-25 许昌学院 一种基于云服务器的农业大棚智能控制方法
CN106411517B (zh) * 2016-12-14 2019-05-31 北京小米移动软件有限公司 一种密码重置方法及装置
CN106534189A (zh) * 2016-12-14 2017-03-22 宁夏煜隆科技有限公司 双向交互性中心控制服务器
CN107664337B (zh) * 2017-08-21 2019-11-19 珠海格力电器股份有限公司 空调系统、空调机组设备的控制方法和装置
JP2020067824A (ja) * 2018-10-24 2020-04-30 シャープ株式会社 ネットワークシステムおよび電気機器
WO2020133495A1 (zh) * 2018-12-29 2020-07-02 华为技术有限公司 一种智能设备管理方法、移动终端及系统
CN111132110B (zh) * 2019-12-26 2023-06-16 重庆物奇科技有限公司 用于无线通信的设备主从角色切换系统及方法
CN113313350A (zh) * 2021-04-23 2021-08-27 武汉瑞安科技发展有限公司 一种物联网数据采集分析管理系统
CN113490213A (zh) * 2021-07-07 2021-10-08 宁波奥克斯电气股份有限公司 空调器配网方法及系统
CN114449504B (zh) * 2022-03-08 2022-09-06 芯电智联(北京)科技有限公司 一种nfc标签的验证方法、电子设备及存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102790674A (zh) * 2011-05-20 2012-11-21 阿里巴巴集团控股有限公司 身份验证方法、设备和系统
CN103795571A (zh) * 2014-01-24 2014-05-14 北京搜狗科技发展有限公司 设备之间的绑定方法及装置
CN104468524A (zh) * 2014-11-14 2015-03-25 小米科技有限责任公司 权限验证的方法及装置

Family Cites Families (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6470386B1 (en) * 1997-09-26 2002-10-22 Worldcom, Inc. Integrated proxy interface for web based telecommunications management tools
US7287270B2 (en) * 2000-10-31 2007-10-23 Arkray, Inc. User authentication method in network
JP2002251375A (ja) * 2001-02-21 2002-09-06 Ntt Data Corp 通信ネットワークにおけるユーザ認証サーバ、本人認証方法及びプログラム
US7761863B2 (en) * 2004-06-08 2010-07-20 Covia Labs, Inc. Method system and data structure for content renditioning adaptation and interoperability segmentation model
US7529937B2 (en) * 2005-03-07 2009-05-05 Microsoft Corporation System and method for establishing that a server and a correspondent have compatible secure email
US20070111796A1 (en) * 2005-11-16 2007-05-17 Microsoft Corporation Association of peripherals communicatively attached to a console device
US20090038013A1 (en) * 2007-07-31 2009-02-05 Nokia Corporation Wireless communication security when using known link keys
JP2009181396A (ja) * 2008-01-31 2009-08-13 Hitachi Ltd ユーザ認証システム及びその方法
US8850553B2 (en) * 2008-09-12 2014-09-30 Microsoft Corporation Service binding
US20100131409A1 (en) * 2008-11-22 2010-05-27 Google Inc. Identification verification with user challenge
JP5334690B2 (ja) * 2009-06-03 2013-11-06 三菱電機株式会社 情報処理方法、情報処理システム、携帯機器、及びネットワーク機器
US20130214902A1 (en) * 2010-12-02 2013-08-22 Viscount Systems Inc. Systems and methods for networks using token based location
JP2012181716A (ja) * 2011-03-02 2012-09-20 Kddi Corp 色パスワードを用いた認証方法及びシステム
WO2012135563A1 (en) * 2011-03-31 2012-10-04 Sony Mobile Communications Ab System and method for establishing a communication session
CN102571979B (zh) * 2012-02-10 2019-04-19 上海视畅信息科技有限公司 多屏互动设备及其绑定方法
CN103546430A (zh) * 2012-07-11 2014-01-29 网易(杭州)网络有限公司 基于移动终端的身份验证方法、移动终端、服务器及系统
WO2014063363A1 (en) * 2012-10-26 2014-05-01 Baina Innovation (Chengdu) Technology Co., Limited Method and system for authenticating computing devices
KR102210995B1 (ko) * 2013-04-24 2021-02-02 삼성전자 주식회사 전자 장치에서 보안 정보를 통지하기 위한 장치와 방법 및 이를 위한 컴퓨터로 판독 가능한 기록 매체
CN103516726A (zh) * 2013-09-22 2014-01-15 小米科技有限责任公司 基于终端行为的验证方法、装置、客户端、服务器及设备
CN103634297A (zh) * 2013-11-11 2014-03-12 广东天际电器股份有限公司 云电器的账号绑定方法及系统
CN103914039A (zh) * 2013-12-31 2014-07-09 海尔集团公司 用于家电设备的控制方法以及系统
CN103747010B (zh) * 2014-01-22 2017-07-28 北京奇立软件技术有限公司 一种通过移动终端控制pc的方法、系统及装置
CN103751020B (zh) * 2014-01-24 2017-03-08 深圳市盈佳信息动力技术有限公司 智能扩展药盒系统
CN103914645A (zh) * 2014-04-03 2014-07-09 百度在线网络技术(北京)有限公司 身份验证方法以及穿戴式设备

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102790674A (zh) * 2011-05-20 2012-11-21 阿里巴巴集团控股有限公司 身份验证方法、设备和系统
CN103795571A (zh) * 2014-01-24 2014-05-14 北京搜狗科技发展有限公司 设备之间的绑定方法及装置
CN104468524A (zh) * 2014-11-14 2015-03-25 小米科技有限责任公司 权限验证的方法及装置

Also Published As

Publication number Publication date
JP2017510876A (ja) 2017-04-13
JP6374517B2 (ja) 2018-08-15
CN104468524B (zh) 2018-12-25
RU2663710C2 (ru) 2018-08-08
KR20160132966A (ko) 2016-11-21
EP3059899A1 (en) 2016-08-24
MX2017005368A (es) 2017-06-21
CN104468524A (zh) 2015-03-25
US20170006038A1 (en) 2017-01-05
RU2017102538A3 (zh) 2018-07-26
EP3059899B1 (en) 2020-09-23
RU2017102538A (ru) 2018-07-26
EP3059899A4 (en) 2017-06-14

Similar Documents

Publication Publication Date Title
WO2016074586A1 (zh) 权限验证的方法及装置
EP3070905B1 (en) Method and apparatus for binding device
JP6467422B2 (ja) ユーザデバイスの制御権限を決定する方法、装置及び端末デバイス
EP3177077A1 (en) Method and device for network access
WO2017113842A1 (zh) 控制智能设备的方法及装置
US10608988B2 (en) Method and apparatus for bluetooth-based identity recognition
US10102505B2 (en) Server-implemented method, terminal-implemented method and device for acquiring business card information
KR102044113B1 (ko) 스마트 카메라에 액세스하는 방법 및 장치
US20160295625A1 (en) Method and apparatus for network access
WO2016023367A1 (zh) 访问认证方法、装置及系统
US20170019265A1 (en) Method, terminal and server for controlling smart device
WO2016011744A1 (zh) 使用验证码进行验证的方法及装置
RU2644511C2 (ru) Способ и устройство для отображения интерфейса настройки маршрутизатора
RU2628478C2 (ru) Способ и устройство для доступа к сети
WO2019047066A1 (zh) 无人机接入方法及装置
WO2016127669A1 (zh) 终端设备接入无线网络的方法及装置
JP6126755B2 (ja) 端末検証方法、装置、プログラム、及び記録媒体
JP6321193B2 (ja) 設備制御方法及び装置
WO2019028746A1 (zh) 无人机接入方法及装置
WO2018000710A1 (zh) WiFi信号图标的展示方法、装置和移动终端
KR20200065115A (ko) 무선단말을 이용한 초상권 보호 방법

Legal Events

Date Code Title Description
REEP Request for entry into the european phase

Ref document number: 2015858097

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2015858097

Country of ref document: EP

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15858097

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2016548039

Country of ref document: JP

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 20167028413

Country of ref document: KR

Kind code of ref document: A

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112016026109

Country of ref document: BR

ENP Entry into the national phase

Ref document number: 2017102538

Country of ref document: RU

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: MX/A/2017/005368

Country of ref document: MX

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 112016026109

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20161108