WO2016074586A1 - 权限验证的方法及装置 - Google Patents
权限验证的方法及装置 Download PDFInfo
- Publication number
- WO2016074586A1 WO2016074586A1 PCT/CN2015/093906 CN2015093906W WO2016074586A1 WO 2016074586 A1 WO2016074586 A1 WO 2016074586A1 CN 2015093906 W CN2015093906 W CN 2015093906W WO 2016074586 A1 WO2016074586 A1 WO 2016074586A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- binding
- terminal
- bound
- verification
- network side
- Prior art date
Links
- 238000012795 verification Methods 0.000 title claims abstract description 194
- 238000000034 method Methods 0.000 title claims abstract description 83
- 230000027455 binding Effects 0.000 claims abstract description 185
- 238000009739 binding Methods 0.000 claims abstract description 185
- 238000004891 communication Methods 0.000 claims description 39
- 238000006073 displacement reaction Methods 0.000 claims description 11
- 239000003086 colorant Substances 0.000 claims description 7
- 230000000704 physical effect Effects 0.000 abstract description 3
- 230000004397 blinking Effects 0.000 description 7
- 238000010586 diagram Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 6
- 230000005674 electromagnetic induction Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 4
- 238000007726 management method Methods 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000005286 illumination Methods 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/305—Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
- H04W84/20—Master-slave selection or change arrangements
Definitions
- the present disclosure relates to the field of communications technologies, and in particular, to a method and apparatus for verifying rights.
- the method of using a two-dimensional code is usually used, which requires that the surface of the bound device is affixed with a uniquely-identified two-dimensional code, and the user uses the camera provided by the mobile phone to take a two-dimensional code, obtain a unique identification code, and then go to the remote server. Verify the unique identification code. If the remote server verifies the validity, it proves the user's ownership of the device to which the QR code is attached.
- the user is required to use the mobile phone to scan the QR code for scanning, which is unfriendly for devices that are inconvenient to operate.
- the method and device for verifying rights provided by the embodiments of the present disclosure are used to simplify the authority verification operation, so that the user can complete the authority verification by simple key operation, and has higher security.
- a method for verifying rights including:
- the verification information of the performed binding verification operation is reported to the network side server.
- the method further includes:
- the method further includes:
- a binding failure prompt is displayed.
- a method for verifying rights including:
- the method further includes:
- the method further includes:
- the method further includes: sending, to the control terminal, a binding operation prompt for the physical attribute of the terminal to be bound, and sending an operation instruction for displaying the physical attribute to the terminal to be bound.
- the instructions for displaying physical attributes include: displaying random numbers, displaying random characters, displaying patterns, displaying phrases, controlling indicator colors, controlling indicator numbers, controlling indicator blinking frequencies, controlling sound output, One or more of physical deformation and physical displacement.
- a method for verifying rights including:
- the corresponding physical attribute is displayed.
- the method further includes: after receiving the binding verification operation for the physical attribute, sending the verification information to the network side server.
- an apparatus for verifying rights including:
- the execution module is configured to perform a binding verification operation according to the physical attribute displayed by the terminal to be bound;
- the reporting module is configured to report the verification information that the binding verification operation has been performed to the network side server.
- the apparatus further comprises:
- the binding requesting module is configured to send a binding request to the network side server by using the current account after establishing a communication connection with the terminal to be bound;
- the prompt receiving module is configured to receive a binding operation prompt returned by the network side server for the physical attribute of the terminal to be bound.
- the apparatus further comprises:
- a result receiving module configured to receive a binding result returned by the network side server according to the verification information
- a processing module configured to determine, when the binding result is that the binding is successful, determining a current account and the terminal to be bound Control relationship; when the binding result is a binding failure, a binding failure prompt is displayed.
- an apparatus for verifying rights including:
- the binding receiving module is configured to, after establishing a communication connection with the control terminal, receive a binding request sent by the control terminal by using the current account;
- the prompt sending module is configured to send a binding operation prompt for the physical attribute of the terminal to be bound to the control terminal.
- the apparatus further comprises:
- the verification module is configured to verify the validity of the verification information after receiving the verification information of the performed binding verification operation sent by the control terminal and/or the terminal to be bound;
- the result sending module is configured to send a binding result to the control terminal according to the verification result.
- the apparatus further comprises:
- the establishing module is configured to establish a control relationship between the current account and the terminal to be bound when the verification result is legal.
- the apparatus further comprises:
- the operation sending module is configured to send, to the control terminal, a binding operation prompt for the physical attribute of the terminal to be bound, and send an operation instruction for displaying the physical attribute to the terminal to be bound.
- an apparatus for verifying rights including:
- the operation receiving module is configured to receive an operation instruction for displaying a physical attribute sent by the network side server;
- the attribute display module is configured to display the corresponding physical attribute according to the operation instruction.
- the apparatus further comprises:
- the verification sending module is configured to send the verification information to the network side server after receiving the binding verification operation for the physical attribute.
- an apparatus for verifying rights including:
- a memory for storing processor executable instructions
- processor is configured to:
- the corresponding physical attribute is displayed.
- the technical solution provided by the embodiment of the present disclosure can simplify the authority verification operation, and enable the user to complete the authority verification by simple buttons and the like, and has higher security.
- FIG. 1 is a flowchart of a method for rights verification according to an exemplary embodiment.
- FIG. 2 is a flow chart of a method of rights verification, according to an exemplary embodiment.
- FIG. 3 is a flowchart of a method of rights verification according to an exemplary embodiment.
- FIG. 4 is a flow chart of a method of rights verification, according to an exemplary embodiment.
- FIG. 5 is a flow chart of a method of rights verification, according to an exemplary embodiment.
- FIG. 6 is a flowchart of a method of rights verification according to an exemplary embodiment.
- FIG. 7 is a flowchart of a method of rights verification according to an exemplary embodiment.
- FIG. 8 is a flowchart of a method of rights verification according to an exemplary embodiment.
- FIG. 9 is a flowchart of a method of rights verification, according to an exemplary embodiment.
- FIG. 10 is a block diagram of an apparatus for rights verification, according to an exemplary embodiment.
- FIG. 11 is a block diagram of an apparatus for rights verification, according to an exemplary embodiment.
- FIG. 12 is a block diagram of an apparatus for rights verification, according to an exemplary embodiment.
- FIG. 13 is a block diagram of another apparatus for authority verification, according to an exemplary embodiment.
- FIG. 14 is a block diagram of another apparatus for authority verification, according to an exemplary embodiment.
- FIG. 1 is a flow chart of a method for rights verification, according to an exemplary embodiment. As shown in FIG. 1 , the method is applicable to a terminal in a control terminal, for example, a mobile phone, a tablet, a PC, etc., and includes the following steps:
- a binding verification operation is performed according to the physical attribute displayed by the terminal to be bound.
- the physical attribute may be one of a random number displayed, a displayed random character, a displayed pattern, a displayed phrase, an indicator color, a number of indicators, an indicator blinking frequency, a sound output, a physical deformation, and a physical displacement. Or a variety.
- the control terminal may perform a binding verification operation of inputting the random character.
- the control terminal may perform a binding verification operation of inputting the color of the indicator.
- Other forms are not listed again.
- step S102 the verification information that the binding verification operation has been performed is reported to the network side server.
- the input indicator color information is sent as verification information to the network side server.
- the method further includes: after establishing a communication connection with the terminal to be bound, sending a binding request to the network side server by using the current account; and receiving the binding of the physical attribute of the terminal to be bound returned by the network side server. Operational tips.
- the method further includes: receiving a binding result returned by the network side server according to the verification information; determining, when the binding result is binding, determining a control relationship between the current account and the terminal to be bound; When the binding fails, the binding failure prompt is displayed.
- the method is described in detail. As shown in FIG. 2, the method is applicable to a mobile phone, and includes the following steps:
- step S201 the mobile phone establishes a communication connection with the smart camera by using the current account.
- the mobile phone discovers the smart camera through a network side server or a local area network.
- the mobile phone can also discover the smart camera directly by sending a broadcast by itself.
- step S202 the mobile phone sends a binding request to the network side server.
- step S203 the mobile phone receives a binding operation prompt returned by the network side server for the physical attribute of the smart camera.
- the binding prompt can be "Please enter the number of flashes of the indicator light.”
- step S204 the mobile phone performs a binding verification operation according to the physical attribute displayed by the terminal to be bound. For example, the number of times the input is received, and the like.
- step S205 the mobile phone reports the verification information that the binding verification operation has been performed to the network side server. For example, the mobile phone reports to the network side server the number of times the input is received.
- step S206 the mobile phone receives the binding result returned by the network side server according to the verification information.
- the binding result is successful, the control relationship between the current account and the terminal to be bound is determined.
- the binding result is a binding failure, the binding failure prompt is displayed.
- FIG. 3 is a flowchart of a method of rights verification according to an exemplary embodiment.
- the method is applicable to a network side server, for example, a cloud server, a router, etc., and includes the following steps:
- step S301 after establishing a communication connection with the control terminal, the receiving control terminal uses the binding request sent by the current account.
- step S302 a binding operation prompt for the physical attribute of the terminal to be bound is sent to the control terminal.
- the control terminal determines the terminal to be bound that the control terminal requests to be bound. And sending a binding operation prompt to the control terminal according to the physical attribute of the terminal to be bound.
- the terminal to be bound has an indicator light, and the content of the binding operation prompt can be directed to the indicator light.
- the terminal to be bound has a display screen, and the content of the binding operation prompt can be displayed for the content displayed on the display screen.
- the terminal to be bound has a physical button, and the content of the binding operation prompt can be directed to the physical button.
- the method further includes: sending an operation instruction for displaying the physical attribute to the terminal to be bound, while sending the binding operation prompt for the physical attribute of the terminal to be bound to the control terminal.
- an operation instruction for transmitting a display number to the terminal to be bound an operation instruction for controlling the illumination of the indicator light, an operation instruction for controlling physical deformation of the terminal to be bound, an operation instruction for controlling a physical displacement of the terminal to be bound, and the like.
- the displaying physical attributes includes: displaying random numbers, displaying random characters, displaying patterns, displaying phrases, controlling indicator colors, controlling indicator numbers, controlling indicator blinking frequencies, controlling sound output, and physically deforming One or more of physical displacements. For example, moving to the left, rotating to the right, recessing the screen down, etc., will not be enumerated one by one.
- the method further includes: after receiving the verification information of the performed binding verification operation sent by the control terminal and/or the terminal to be bound, verifying the validity of the verification information; and sending the verification information to the control terminal according to the verification result. Bind the result. For example, if the operation instruction for displaying the physical attribute is sent to the terminal to be bound is the display number 567, and the verification information reported by the control terminal is the number 345, the verification information is invalid, and the control terminal cannot obtain the control authority of the terminal to be bound.
- the switch is continuously pressed 3 times, and the binding operation sent to the control terminal is prompted to press the switch 3 times, then the verification information is legal, and the control terminal obtains the terminal to be bound. Control permissions.
- verifying the legality it is also possible to detect whether the verification information is received within a predetermined time. If the predetermined time is exceeded, the verification information is illegal information.
- the method further includes: establishing, between the current account and the terminal to be bound, when the verification result is legal Control relationship. After the control relationship is established, the control relationship is stored, so that the current account obtains the right to control the terminal to be bound for a long time until the binding is released.
- the method for obtaining the smart socket is taken as an example.
- the method provided in this embodiment is described in detail.
- the method is applicable to the network side server, and includes the following steps:
- step S401 after establishing a communication connection with the control terminal, the receiving control terminal uses the binding request sent by the current account. For example, after establishing a communication connection with the control terminal pad, receiving a binding request of the binding smart socket sent by the control terminal pad.
- a binding operation prompt for the physical attribute of the terminal to be bound is sent to the control terminal. For example, send "Please enter the color of the indicator light" to the control terminal.
- an operation instruction for displaying physical attributes is sent to the terminal smart socket to be bound, for example, the indicator light displays a blue operation instruction.
- step S403 after receiving the verification information of the performed binding verification operation sent by the control terminal, the validity of the verification information is verified.
- the binding operation prompts “Please enter the color of the indicator light”, if the verification information sent by the control terminal is “blue”, the verification information is legal.
- verifying the legality it is also possible to detect whether the verification information is received within a predetermined time. If the predetermined time is exceeded, the verification information is illegal information.
- step S404 the binding result is sent to the control terminal according to the verification result. Moreover, when the verification result is legal, the control relationship between the current account and the terminal to be bound is established.
- the method for obtaining the smart socket is taken as an example.
- the method provided in this embodiment is described in detail.
- the method is applicable to the network side server, and includes the following steps:
- step S501 after establishing a communication connection with the control terminal, the receiving control terminal uses the binding request sent by the current account. For example, after establishing a communication connection with the control terminal pad, receiving a binding request of the binding smart socket sent by the control terminal pad.
- step S502 a binding operation prompt for the physical attribute of the terminal to be bound is sent to the control terminal. For example, send "Please press the key 2 times continuously" to the control terminal.
- step S503 after receiving the verification information of the performed binding verification operation sent by the terminal to be bound, the validity of the verification information is verified. For example, if the verification information reported by the smart socket is continuously pressed 2 times for the switch key, the verification information is legal. When verifying the legality, it is also possible to detect whether the verification information is received within a predetermined time. If the predetermined time is exceeded, the verification information is illegal information.
- step S504 the binding result is sent to the control terminal according to the verification result. Moreover, when the verification result is legal, the control relationship between the current account and the terminal to be bound is established.
- FIG. 6 is a flowchart of a method of rights verification according to an exemplary embodiment.
- the method is applicable to a smart terminal, for example, a smart socket in a smart home, a smart camera, a smart purifier, a smart air conditioner, etc., including the following steps:
- step S601 an operation instruction for displaying physical attributes transmitted by the network side server is received.
- step S602 corresponding physical attributes are displayed according to the operation instruction.
- the operation instruction for displaying physical attributes may include: displaying random numbers, displaying random characters, displaying patterns, displaying phrases, controlling indicator colors, controlling indicator numbers, controlling indicator blinking frequencies, controlling sound output, physical deformation, physical One or more of displacements and the like.
- the method further includes: after receiving the binding verification operation for the physical attribute, sending the verification information to the network side server. For example, when the device button is received, the remote controller is operated, an image that continues to sway is acquired, a specific sound input is acquired, and the electromagnetic sensor switch is sensed.
- the method provided by the embodiment of the present disclosure can perform the authority verification by the physical attributes of the device to be bound, simplify the authority verification operation, and enable the user to complete the authority verification by simple buttons and the like, and has higher security.
- the neighboring control terminal can prevent the control device from acquiring the control permission after the device is to be bound. For example, the neighbor's mobile phone discovers the user's smart device. If it is simply inputting the verification code pushed by the server, other users will easily obtain the smart device. Control authority of the device.
- FIG. 7 is a flowchart of a method of rights verification according to an exemplary embodiment. As shown in FIG. 7, the method includes the following steps:
- step S701 the control terminal establishes a communication connection with the network side server.
- step S702 the control terminal discovers the terminal to be bound through the network side server or the local area network, or discovers the terminal to be bound by sending a broadcast by itself. For example, when a local area network is used, the control terminal establishes a communication connection with the router that generates the local area network, and sends a broadcast through the router to discover the terminal to be bound.
- the terminal to be bound is a smart device that does not have explicit control rights.
- step S703 the control terminal sends a binding request to the network side server by using the current account.
- step S704 after receiving the binding request, the network side server determines the physical attribute of the terminal to be bound, and returns a binding operation prompt for the physical attribute of the terminal to be bound to the control terminal.
- step S705 the control terminal receives the binding operation prompt returned by the network side server for the physical attribute of the terminal to be bound, and displays the current page.
- the binding operation prompts an operation for the physical attribute of the terminal to be bound, for example, the device button is operated, the remote controller is operated, the image is continuously swayed, a specific sound input is collected, and the electromagnetic induction switch is sensed to be operated. Wait. Proceed to step S706.
- step S706 the terminal to be bound detects a binding verification operation for the physical attribute. For example, it is detected that the device button is operated, the remote controller is operated, the image is continuously shaken, the specific sound input is collected, the electromagnetic induction switch is sensed, and one of the shape deformation and the physical position displacement is detected. Or a variety.
- step S707 the terminal to be bound sends the verification information to the network side server.
- step S708 after receiving the verification information of the performed binding verification operation sent by the terminal to be bound, the network side server verifies the validity of the verification information.
- verifying the legality it is also possible to detect whether the verification information is received within a predetermined time. If the predetermined time is exceeded, the verification information is illegal information.
- the verification result is legal, the control relationship between the current account and the terminal to be bound is established.
- step S709 the network side server sends the binding result to the control terminal according to the verification result.
- the verification result is legal, the control relationship between the current account and the terminal to be bound is established.
- the control relationship between the account and the terminal to be bound can be accurately confirmed, the control authority is confirmed, and the account is allowed to send a control command to the terminal to be bound. Moreover, the terminal to be bound does not accept the control command sent by other accounts, that is, the abuse of the malicious user is avoided.
- FIG. 8 is a flowchart of a method of rights verification according to an exemplary embodiment. As shown in FIG. 8, the method includes the following steps:
- step S801 the control terminal establishes a communication connection with the network side server.
- step S802 the control terminal discovers the terminal to be bound through the network side server or the local area network, or discovers the terminal to be bound by sending a broadcast by itself. For example, when a local area network is used, the control terminal establishes a communication connection with the router that generates the local area network, and sends a broadcast through the router to discover the terminal to be bound.
- the terminal to be bound is a smart device that does not have explicit control rights.
- step S803 the control terminal sends a binding request to the network side server by using the current account.
- step S804 after receiving the binding request, the network side server determines the physical attribute of the terminal to be bound, and returns a binding operation prompt for the physical attribute of the terminal to be bound to the control terminal, and sends a display to the terminal to be bound. Operational instructions for physical properties.
- step S805 the terminal to be bound displays the corresponding physical attribute according to the operation instruction.
- the operation instructions for displaying physical attributes may include: displaying random numbers, displaying random characters, displaying patterns, displaying phrases, controlling indicator colors, controlling indicator numbers, controlling indicator blinking frequencies, controlling sound output, physical deformation, physical displacement, etc. One or more of them.
- step S806 the control terminal receives the binding operation prompt returned by the network side server for the physical attribute of the terminal to be bound, and displays the current page.
- step S807 the control terminal inputs the verification information according to the binding operation prompt and the physical attribute displayed by the terminal to be bound.
- step S808 the control terminal transmits the verification information to the network side server.
- step S809 after receiving the verification information of the performed binding verification operation sent by the terminal to be bound, the network side server verifies the validity of the verification information.
- verifying the legality it is also possible to detect whether the verification information is received within a predetermined time. If the predetermined time is exceeded, the verification information is illegal information.
- step S810 the network side server sends the binding result to the control terminal according to the verification result.
- the verification result is legal, the control relationship between the current account and the terminal to be bound is established.
- the control relationship between the account and the terminal to be bound can be accurately confirmed, the control authority is confirmed, and the account is allowed to send a control command to the terminal to be bound. Moreover, the terminal to be bound does not accept the control command sent by other accounts, that is, the abuse of the malicious user is avoided.
- FIG. 9 is a flow chart of a method of rights verification, according to an exemplary embodiment. As shown in FIG. 9, the method includes the following steps:
- step S901 the control terminal establishes a communication connection with the network side server.
- step S902 the control terminal discovers the terminal to be bound through the network side server or the local area network, or discovers the terminal to be bound by sending a broadcast by itself. For example, when a local area network is used, the control terminal establishes a communication connection with the router that generates the local area network, and sends a broadcast through the router to discover the terminal to be bound.
- the terminal to be bound is a smart device that does not have explicit control rights.
- step S903 the control terminal sends a binding request to the network side server by using the current account.
- step S904 after receiving the binding request, the network side server determines the physical attribute of the terminal to be bound, returns a binding operation prompt for the physical attribute of the terminal to be bound to the control terminal, and sends a display to the terminal to be bound.
- Operational instructions for physical properties may include: displaying random numbers, displaying random characters, displaying patterns, displaying phrases, controlling indicator colors, controlling indicator numbers, controlling indicator blinking frequencies, controlling sound output, physical deformation, physical One or more of displacements and the like.
- step S905 the control terminal receives the binding operation prompt returned by the network side server for the physical attribute of the terminal to be bound, and displays the current page.
- the binding operation prompts an operation for the physical attribute of the terminal to be bound, for example, the device button is operated, the remote controller is operated, the image is continuously swayed, a specific sound input is collected, and the electromagnetic induction switch is sensed to be operated. Wait. Proceed to step S906.
- step S906 the terminal to be bound detects the binding verification operation for the physical attribute, and the control terminal detects the pin. Verification information for the physical attribute input of the bound terminal. For example, it is detected that the device button is operated, the remote controller is operated, the image is continuously shaken, the specific sound input is collected, the electromagnetic induction switch is sensed, and one of the shape deformation and the physical position displacement is detected. Or a variety.
- step S907 the to-be-bound terminal and the control terminal send verification information to the network side server.
- step S908 after receiving the verification information of the performed binding verification operation sent by the terminal to be bound and the control terminal, the network side server verifies the validity of the verification information.
- verifying the legality it is also possible to detect whether the verification information is received within a predetermined time. If the predetermined time is exceeded, the verification information is illegal information.
- the verification result is legal, the control relationship between the current account and the terminal to be bound is established.
- step S909 the network side server transmits the binding result to the control terminal according to the verification result.
- the verification result is legal, the control relationship between the current account and the terminal to be bound is established.
- the control relationship between the account and the terminal to be bound can be accurately confirmed, the control authority is confirmed, and the account is allowed to send a control command to the terminal to be bound. Moreover, the terminal to be bound does not accept the control command sent by other accounts, that is, the abuse of the malicious user is avoided.
- An embodiment of the present disclosure provides a device for verifying rights, as shown in FIG. 10, including:
- the execution module 1001 is configured to perform a binding verification operation according to physical attributes displayed by the terminal to be bound;
- the reporting module 1002 is configured to report the verification information that the binding verification operation has been performed to the network side server.
- the device further includes:
- the binding requesting module 1003 is configured to send a binding request to the network side server by using the current account after establishing a communication connection with the terminal to be bound;
- the prompt receiving module 1004 is configured to receive a binding operation prompt returned by the network side server for the physical attribute of the terminal to be bound.
- the device further includes:
- the result receiving module 1005 is configured to receive a binding result returned by the network side server according to the verification information
- the processing module 1006 is configured to: when the binding result is that the binding is successful, determine a control relationship between the current account and the terminal to be bound; when the binding result is a binding failure, display a binding failure prompt .
- An embodiment of the present disclosure provides a device for verifying rights, as shown in FIG.
- the binding receiving module 1101 is configured to: after establishing a communication connection with the control terminal, receive a binding request sent by the control terminal by using the current account;
- the prompt sending module 1102 is configured to send a binding operation prompt for the physical attribute of the terminal to be bound to the control terminal.
- the device further includes:
- the verification module 1103 is configured to verify the validity of the verification information after receiving the verification information of the performed binding verification operation sent by the control terminal and/or the terminal to be bound;
- the result sending module 1104 is configured to send a binding result to the control terminal according to the verification result.
- the device further includes:
- the establishing module 1105 is configured to establish a control relationship between the current account and the terminal to be bound when the verification result is legal.
- the device further includes:
- the operation sending module 1106 is configured to send an operation instruction for displaying a physical attribute to the terminal to be bound while sending a binding operation prompt for the physical attribute of the terminal to be bound to the control terminal.
- An embodiment of the present disclosure provides a device for verifying rights, as shown in FIG. 12, including:
- the operation receiving module 1201 is configured to receive an operation instruction for displaying a physical attribute sent by the network side server;
- the attribute display module 1202 is configured to display corresponding physical attributes according to the operation instruction.
- the device further includes:
- the verification sending module 1203 is configured to send the verification information to the network side server after receiving the binding verification operation for the physical attribute.
- a device for verifying authority comprising:
- a memory for storing processor executable instructions
- the processor is also configured to:
- the corresponding physical attribute is displayed.
- a non-transitory computer readable storage medium when a command in the storage medium is executed by a processor of a terminal, enabling the terminal to perform a method for verifying rights, the method comprising:
- the verification information of the performed binding verification operation is reported to the network side server.
- the method further includes:
- the method further includes:
- a binding failure prompt is displayed.
- the method for verifying rights includes:
- the method further includes:
- the method further includes:
- the method further includes: sending, to the control terminal, a binding operation prompt for the physical attribute of the terminal to be bound, and sending an operation instruction for displaying the physical attribute to the terminal to be bound.
- the instructions for displaying physical attributes include: displaying random numbers, displaying random characters, displaying patterns, displaying phrases, controlling indicator colors, controlling indicator numbers, controlling indicator blinking frequencies, controlling sound output, One or more of physical deformation and physical displacement.
- the method for verifying rights includes:
- the corresponding physical attribute is displayed.
- the method further includes: after receiving the binding verification operation for the physical attribute, sending the verification information to the network side server.
- the method provided by the embodiment of the present disclosure may simplify the authority verification operation, enable the user to complete the authority verification by simple buttons and the like, and has higher security.
- FIG. 13 is a block diagram of an apparatus 1300 for rights verification, which is applicable to a terminal device, according to an exemplary embodiment.
- device 1300 can be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a gaming console, a tablet device, a medical device, a fitness device, a personal digital assistant, and the like.
- device 1300 can include one or more of the following components: processing component 1302, memory 1304, power component 1306, multimedia component 1308, audio component 1310, input/output (I/O) interface 1312, sensor component 1314, And a communication component 1316.
- Processing component 1302 typically controls the overall operation of device 1300, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations.
- Processing component 1302 can include one or more processors 1320 to execute instructions to perform all or part of the steps of the above described methods.
- processing component 1302 can include one or more modules to facilitate interaction between component 1302 and other components.
- processing component 1302 can include a multimedia module to facilitate interaction between multimedia component 1308 and processing component 1302.
- Memory 1304 is configured to store various types of data to support operation at device 1300. Examples of such data include instructions for any application or method operating on device 1300, contact data, phone book data, messages, pictures, videos, and the like.
- Memory 1304 can be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only memory (EEPROM), erasable Programmable Read Only Memory (EPROM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Magnetic Memory, Flash Memory, Disk or Optical Disk.
- SRAM static random access memory
- EEPROM electrically erasable programmable read only memory
- EPROM erasable Programmable Read Only Memory
- PROM Programmable Read Only Memory
- ROM Read Only Memory
- Magnetic Memory Flash Memory
- Disk Disk or Optical Disk.
- Power component 1306 provides power to various components of device 1300.
- Power component 1306 can include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for device 1300.
- the multimedia component 1308 includes a screen between the device 1300 and the user that provides an output interface.
- the screen can include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen can be implemented as a touch screen to receive input signals from the user.
- the touch panel includes one or more touch sensors to sense touches, slides, and gestures on the touch panel. The touch sensor may sense not only the boundary of the touch or sliding action, but also the duration and pressure associated with the touch or slide operation.
- the multimedia component 1308 includes a front camera and/or a rear camera. When the device 1300 is in an operation mode, such as a shooting mode or a video mode, the front camera and/or the rear camera can receive external multimedia data. Each front camera The rear camera can be a fixed optical lens system or have focal length and optical zoom capabilities.
- the audio component 1310 is configured to output and/or input an audio signal.
- the audio component 1310 includes a microphone (MIC) that is configured to receive an external audio signal when the device 1300 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode.
- the received audio signal may be further stored in memory 1304 or transmitted via communication component 1316.
- the audio component 1310 also includes a speaker for outputting an audio signal.
- the I/O interface 1312 provides an interface between the processing component 1302 and the peripheral interface module, which may be a keyboard, a click wheel, a button, or the like. These buttons may include, but are not limited to, a home button, a volume button, a start button, and a lock button.
- Sensor assembly 1314 includes one or more sensors for providing device 1300 with a status assessment of various aspects.
- sensor assembly 1314 can detect an open/closed state of device 1300, a relative positioning of components, such as the display and keypad of device 1300, and sensor component 1314 can also detect a change in position of one component of device 1300 or device 1300. The presence or absence of contact by the user with the device 1300, the orientation or acceleration/deceleration of the device 1300 and the temperature change of the device 1300.
- Sensor assembly 1314 can include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
- Sensor assembly 1314 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
- the sensor component 1314 can also include an acceleration sensor, a gyro sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
- Communication component 1316 is configured to facilitate wired or wireless communication between device 1300 and other devices.
- the device 1300 can access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof.
- the communication component 1316 receives broadcast signals or broadcast associated information from an external broadcast management system via a broadcast channel.
- the communication component 1316 also includes a near field communication (NFC) module to facilitate short range communication.
- NFC near field communication
- the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
- RFID radio frequency identification
- IrDA infrared data association
- UWB ultra-wideband
- Bluetooth Bluetooth
- apparatus 1300 may be implemented by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable A gate array (FPGA), controller, microcontroller, microprocessor, or other electronic component implementation for performing the above methods.
- ASICs application specific integrated circuits
- DSPs digital signal processors
- DSPDs digital signal processing devices
- PLDs programmable logic devices
- FPGA field programmable A gate array
- controller microcontroller, microprocessor, or other electronic component implementation for performing the above methods.
- non-transitory computer readable storage medium comprising instructions, such as a memory 1304 comprising instructions executable by a processor of apparatus 1300 to perform the above method.
- the non-transitory computer readable storage medium may be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage device.
- FIG. 14 is a block diagram of an apparatus 1900 for rights verification, according to an exemplary embodiment.
- the device The 1900 can be provided as a server.
- apparatus 1900 includes a processing component 1922 that further includes one or more processors, and memory resources represented by memory 1932 for storing instructions executable by processing component 1922, such as an application.
- An application stored in memory 1932 can include one or more modules each corresponding to a set of instructions.
- processing component 1922 is configured to execute instructions to perform the methods described above.
- Apparatus 1900 can also include a power supply component 1926 configured to perform power management of apparatus 1900, a wired or wireless network interface 1950 configured to connect apparatus 1900 to the network, and an input/output (I/O) interface 1958.
- Device 1900 can operate based on an operating system stored in memory 1932, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, or the like.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
- Computer And Data Communications (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
Description
Claims (20)
- 一种权限验证的方法,其特征在于,包括:根据待绑定终端显示的物理属性,执行绑定验证操作;向网络侧服务器上报已执行绑定验证操作的验证信息。
- 如权利要求1所述的方法,其特征在于,还包括:与所述待绑定终端建立通讯连接后,采用当前账号向网络侧服务器发送绑定请求;接收所述网络侧服务器返回的针对所述待绑定终端的物理属性的绑定操作提示。
- 如权利要求1或2所述的方法,其特征在于,还包括:接收所述网络侧服务器根据所述验证信息返回的绑定结果;当所述绑定结果为绑定成功时,确定当前账号与所述待绑定终端的控制关系;当所述绑定结果为绑定失败时,显示绑定失败提示。
- 一种权限验证的方法,其特征在于,包括:与控制终端建立通讯连接后,接收所述控制终端采用当前账号发送的绑定请求;向所述控制终端发送针对待绑定终端的物理属性的绑定操作提示。
- 如权利要求4所述的方法,其特征在于,还包括:接收到所述控制终端和/或所述待绑定终端发送的已执行绑定验证操作的验证信息后,验证所述验证信息的合法性;并根据验证结果向所述控制终端发送绑定结果。
- 如权利要求5所述的方法,其特征在于,还包括:所述验证结果为合法时,建立所述当前账号和待绑定终端之间的控制关系。
- 如权利要求4所述的方法,其特征在于,还包括:向所述控制终端发送针对待绑定终端的物理属性的绑定操作提示的同时,向所述待绑定终端发送显示物理属性的操作指令。
- 如权利要求7所述的方法,其特征在于,所述显示物理属性的指令包括:显示随机数字、显示随机字符、显示图案、显示词组、控制指示灯颜色、控制指示灯个数、控制指示灯闪烁频次、控制声音输出、物理形变、物理位移中的一种或多种。
- 一种权限验证的方法,其特征在于,包括:接收到网络侧服务器发送的显示物理属性的操作指令;根据所述操作指令,显示相应的物理属性。
- 如权利要求9所述的方法,其特征在于,还包括:接收到针对所述物理属性的绑定验证操作后,向所述网络侧服务器发送验证信息。
- 一种权限验证的装置,其特征在于,包括:执行模块,被配置为根据待绑定终端显示的物理属性,执行绑定验证操作;上报模块,被配置为向网络侧服务器上报已执行绑定验证操作的验证信息。
- 如权利要求11所述的装置,其特征在于,所述装置还包括:绑定请求模块,被配置为与所述待绑定终端建立通讯连接后,采用当前账号向网络侧服务器发送绑定请求;提示接收模块,被配置为接收所述网络侧服务器返回的针对所述待绑定终端的物理属性的绑定操作提示。
- 如权利要求11或12所述的装置,其特征在于,所述装置还包括:结果接收模块,被配置为接收所述网络侧服务器根据所述验证信息返回的绑定结果;处理模块,被配置为当所述绑定结果为绑定成功时,确定当前账号与所述待绑定终端的控制关系;当所述绑定结果为绑定失败时,显示绑定失败提示。
- 一种权限验证的装置,其特征在于,包括:绑定接收模块,被配置为与控制终端建立通讯连接后,接收所述控制终端采用当前账号发送的绑定请求;提示发送模块,被配置为向所述控制终端发送针对待绑定终端的物理属性的绑定操作提示。
- 如权利要求14所述的装置,其特征在于,还包括:验证模块,被配置为接收到所述控制终端和/或所述待绑定终端发送的已执行绑定验证操作的验证信息后,验证所述验证信息的合法性;结果发送模块,被配置为并根据验证结果向所述控制终端发送绑定结果。
- 如权利要求15所述的装置,其特征在于,还包括:建立模块,被配置为所述验证结果为合法时,建立所述当前账号和待绑定终端之间的控制关系。
- 如权利要求14所述的装置,其特征在于,还包括:操作发送模块,被配置为向所述控制终端发送针对待绑定终端的物理属性的绑定操作提示的同时,向所述待绑定终端发送显示物理属性的操作指令。
- 一种权限验证的装置,其特征在于,包括:操作接收模块,被配置为接收到网络侧服务器发送的显示物理属性的操作指令;属性显示模块,被配置为根据所述操作指令,显示相应的物理属性。
- 如权利要求18所述的装置,其特征在于,还包括:验证发送模块,被配置为接收到针对所述物理属性的绑定验证操作后,向所述网络侧服务器发送验证信息。
- 一种权限验证的装置,其特征在于,包括:处理器;用于存储处理器可执行指令的存储器;其中,所述处理器被配置为:根据待绑定终端显示的物理属性,执行绑定验证操作;向网络侧服务器上报已执行绑定验证操作的验证信息;或者与控制终端建立通讯连接后,接收所述控制终端采用当前账号发送的绑定请求;向所述控制终端发送针对待绑定终端的物理属性的绑定操作提示;或者接收到网络侧服务器发送的显示物理属性的操作指令;根据所述操作指令,显示相应的物理属性。
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MX2017005368A MX2017005368A (es) | 2014-11-14 | 2015-11-05 | Metodo y dispositivo para la verificacion de privilegios. |
JP2016548039A JP6374517B2 (ja) | 2014-11-14 | 2015-11-05 | 権限検証方法および装置 |
KR1020167028413A KR20160132966A (ko) | 2014-11-14 | 2015-11-05 | 권한을 검증하기 위한 방법 및 디바이스 |
RU2017102538A RU2663710C2 (ru) | 2014-11-14 | 2015-11-05 | Способ и устройство для проверки разрешения |
EP15858097.7A EP3059899B1 (en) | 2014-11-14 | 2015-11-05 | Permission verification method and device |
US15/266,359 US20170006038A1 (en) | 2014-11-14 | 2016-09-15 | Method and device for verifying permission |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410646289.4A CN104468524B (zh) | 2014-11-14 | 2014-11-14 | 权限验证的方法及装置 |
CN201410646289.4 | 2014-11-14 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/266,359 Continuation US20170006038A1 (en) | 2014-11-14 | 2016-09-15 | Method and device for verifying permission |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016074586A1 true WO2016074586A1 (zh) | 2016-05-19 |
Family
ID=52913896
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/093906 WO2016074586A1 (zh) | 2014-11-14 | 2015-11-05 | 权限验证的方法及装置 |
Country Status (8)
Country | Link |
---|---|
US (1) | US20170006038A1 (zh) |
EP (1) | EP3059899B1 (zh) |
JP (1) | JP6374517B2 (zh) |
KR (1) | KR20160132966A (zh) |
CN (1) | CN104468524B (zh) |
MX (1) | MX2017005368A (zh) |
RU (1) | RU2663710C2 (zh) |
WO (1) | WO2016074586A1 (zh) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104468524B (zh) * | 2014-11-14 | 2018-12-25 | 小米科技有限责任公司 | 权限验证的方法及装置 |
CN104992088A (zh) * | 2015-06-30 | 2015-10-21 | 小米科技有限责任公司 | 设备安全保护方法及装置 |
CN105610821A (zh) * | 2015-12-26 | 2016-05-25 | 小米科技有限责任公司 | 安全验证方法及装置 |
CN107104996B (zh) * | 2016-02-19 | 2021-05-18 | 腾讯科技(深圳)有限公司 | 用户位置校验方法和装置、受控设备访问方法和装置 |
CN106302392A (zh) * | 2016-07-27 | 2017-01-04 | 深圳前海弘稼科技有限公司 | 用于智能种植设备的控制方法及控制装置、终端 |
CN106354183A (zh) * | 2016-11-03 | 2017-01-25 | 许昌学院 | 一种基于云服务器的农业大棚智能控制方法 |
CN106411517B (zh) * | 2016-12-14 | 2019-05-31 | 北京小米移动软件有限公司 | 一种密码重置方法及装置 |
CN106534189A (zh) * | 2016-12-14 | 2017-03-22 | 宁夏煜隆科技有限公司 | 双向交互性中心控制服务器 |
CN107664337B (zh) * | 2017-08-21 | 2019-11-19 | 珠海格力电器股份有限公司 | 空调系统、空调机组设备的控制方法和装置 |
JP2020067824A (ja) * | 2018-10-24 | 2020-04-30 | シャープ株式会社 | ネットワークシステムおよび電気機器 |
WO2020133495A1 (zh) * | 2018-12-29 | 2020-07-02 | 华为技术有限公司 | 一种智能设备管理方法、移动终端及系统 |
CN111132110B (zh) * | 2019-12-26 | 2023-06-16 | 重庆物奇科技有限公司 | 用于无线通信的设备主从角色切换系统及方法 |
CN113313350A (zh) * | 2021-04-23 | 2021-08-27 | 武汉瑞安科技发展有限公司 | 一种物联网数据采集分析管理系统 |
CN113490213A (zh) * | 2021-07-07 | 2021-10-08 | 宁波奥克斯电气股份有限公司 | 空调器配网方法及系统 |
CN114449504B (zh) * | 2022-03-08 | 2022-09-06 | 芯电智联(北京)科技有限公司 | 一种nfc标签的验证方法、电子设备及存储介质 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102790674A (zh) * | 2011-05-20 | 2012-11-21 | 阿里巴巴集团控股有限公司 | 身份验证方法、设备和系统 |
CN103795571A (zh) * | 2014-01-24 | 2014-05-14 | 北京搜狗科技发展有限公司 | 设备之间的绑定方法及装置 |
CN104468524A (zh) * | 2014-11-14 | 2015-03-25 | 小米科技有限责任公司 | 权限验证的方法及装置 |
Family Cites Families (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6470386B1 (en) * | 1997-09-26 | 2002-10-22 | Worldcom, Inc. | Integrated proxy interface for web based telecommunications management tools |
US7287270B2 (en) * | 2000-10-31 | 2007-10-23 | Arkray, Inc. | User authentication method in network |
JP2002251375A (ja) * | 2001-02-21 | 2002-09-06 | Ntt Data Corp | 通信ネットワークにおけるユーザ認証サーバ、本人認証方法及びプログラム |
US7761863B2 (en) * | 2004-06-08 | 2010-07-20 | Covia Labs, Inc. | Method system and data structure for content renditioning adaptation and interoperability segmentation model |
US7529937B2 (en) * | 2005-03-07 | 2009-05-05 | Microsoft Corporation | System and method for establishing that a server and a correspondent have compatible secure email |
US20070111796A1 (en) * | 2005-11-16 | 2007-05-17 | Microsoft Corporation | Association of peripherals communicatively attached to a console device |
US20090038013A1 (en) * | 2007-07-31 | 2009-02-05 | Nokia Corporation | Wireless communication security when using known link keys |
JP2009181396A (ja) * | 2008-01-31 | 2009-08-13 | Hitachi Ltd | ユーザ認証システム及びその方法 |
US8850553B2 (en) * | 2008-09-12 | 2014-09-30 | Microsoft Corporation | Service binding |
US20100131409A1 (en) * | 2008-11-22 | 2010-05-27 | Google Inc. | Identification verification with user challenge |
JP5334690B2 (ja) * | 2009-06-03 | 2013-11-06 | 三菱電機株式会社 | 情報処理方法、情報処理システム、携帯機器、及びネットワーク機器 |
US20130214902A1 (en) * | 2010-12-02 | 2013-08-22 | Viscount Systems Inc. | Systems and methods for networks using token based location |
JP2012181716A (ja) * | 2011-03-02 | 2012-09-20 | Kddi Corp | 色パスワードを用いた認証方法及びシステム |
WO2012135563A1 (en) * | 2011-03-31 | 2012-10-04 | Sony Mobile Communications Ab | System and method for establishing a communication session |
CN102571979B (zh) * | 2012-02-10 | 2019-04-19 | 上海视畅信息科技有限公司 | 多屏互动设备及其绑定方法 |
CN103546430A (zh) * | 2012-07-11 | 2014-01-29 | 网易(杭州)网络有限公司 | 基于移动终端的身份验证方法、移动终端、服务器及系统 |
WO2014063363A1 (en) * | 2012-10-26 | 2014-05-01 | Baina Innovation (Chengdu) Technology Co., Limited | Method and system for authenticating computing devices |
KR102210995B1 (ko) * | 2013-04-24 | 2021-02-02 | 삼성전자 주식회사 | 전자 장치에서 보안 정보를 통지하기 위한 장치와 방법 및 이를 위한 컴퓨터로 판독 가능한 기록 매체 |
CN103516726A (zh) * | 2013-09-22 | 2014-01-15 | 小米科技有限责任公司 | 基于终端行为的验证方法、装置、客户端、服务器及设备 |
CN103634297A (zh) * | 2013-11-11 | 2014-03-12 | 广东天际电器股份有限公司 | 云电器的账号绑定方法及系统 |
CN103914039A (zh) * | 2013-12-31 | 2014-07-09 | 海尔集团公司 | 用于家电设备的控制方法以及系统 |
CN103747010B (zh) * | 2014-01-22 | 2017-07-28 | 北京奇立软件技术有限公司 | 一种通过移动终端控制pc的方法、系统及装置 |
CN103751020B (zh) * | 2014-01-24 | 2017-03-08 | 深圳市盈佳信息动力技术有限公司 | 智能扩展药盒系统 |
CN103914645A (zh) * | 2014-04-03 | 2014-07-09 | 百度在线网络技术(北京)有限公司 | 身份验证方法以及穿戴式设备 |
-
2014
- 2014-11-14 CN CN201410646289.4A patent/CN104468524B/zh active Active
-
2015
- 2015-11-05 JP JP2016548039A patent/JP6374517B2/ja active Active
- 2015-11-05 EP EP15858097.7A patent/EP3059899B1/en active Active
- 2015-11-05 KR KR1020167028413A patent/KR20160132966A/ko active Search and Examination
- 2015-11-05 RU RU2017102538A patent/RU2663710C2/ru active
- 2015-11-05 MX MX2017005368A patent/MX2017005368A/es unknown
- 2015-11-05 WO PCT/CN2015/093906 patent/WO2016074586A1/zh active Application Filing
-
2016
- 2016-09-15 US US15/266,359 patent/US20170006038A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102790674A (zh) * | 2011-05-20 | 2012-11-21 | 阿里巴巴集团控股有限公司 | 身份验证方法、设备和系统 |
CN103795571A (zh) * | 2014-01-24 | 2014-05-14 | 北京搜狗科技发展有限公司 | 设备之间的绑定方法及装置 |
CN104468524A (zh) * | 2014-11-14 | 2015-03-25 | 小米科技有限责任公司 | 权限验证的方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
JP2017510876A (ja) | 2017-04-13 |
JP6374517B2 (ja) | 2018-08-15 |
CN104468524B (zh) | 2018-12-25 |
RU2663710C2 (ru) | 2018-08-08 |
KR20160132966A (ko) | 2016-11-21 |
EP3059899A1 (en) | 2016-08-24 |
MX2017005368A (es) | 2017-06-21 |
CN104468524A (zh) | 2015-03-25 |
US20170006038A1 (en) | 2017-01-05 |
RU2017102538A3 (zh) | 2018-07-26 |
EP3059899B1 (en) | 2020-09-23 |
RU2017102538A (ru) | 2018-07-26 |
EP3059899A4 (en) | 2017-06-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016074586A1 (zh) | 权限验证的方法及装置 | |
EP3070905B1 (en) | Method and apparatus for binding device | |
JP6467422B2 (ja) | ユーザデバイスの制御権限を決定する方法、装置及び端末デバイス | |
EP3177077A1 (en) | Method and device for network access | |
WO2017113842A1 (zh) | 控制智能设备的方法及装置 | |
US10608988B2 (en) | Method and apparatus for bluetooth-based identity recognition | |
US10102505B2 (en) | Server-implemented method, terminal-implemented method and device for acquiring business card information | |
KR102044113B1 (ko) | 스마트 카메라에 액세스하는 방법 및 장치 | |
US20160295625A1 (en) | Method and apparatus for network access | |
WO2016023367A1 (zh) | 访问认证方法、装置及系统 | |
US20170019265A1 (en) | Method, terminal and server for controlling smart device | |
WO2016011744A1 (zh) | 使用验证码进行验证的方法及装置 | |
RU2644511C2 (ru) | Способ и устройство для отображения интерфейса настройки маршрутизатора | |
RU2628478C2 (ru) | Способ и устройство для доступа к сети | |
WO2019047066A1 (zh) | 无人机接入方法及装置 | |
WO2016127669A1 (zh) | 终端设备接入无线网络的方法及装置 | |
JP6126755B2 (ja) | 端末検証方法、装置、プログラム、及び記録媒体 | |
JP6321193B2 (ja) | 設備制御方法及び装置 | |
WO2019028746A1 (zh) | 无人机接入方法及装置 | |
WO2018000710A1 (zh) | WiFi信号图标的展示方法、装置和移动终端 | |
KR20200065115A (ko) | 무선단말을 이용한 초상권 보호 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
REEP | Request for entry into the european phase |
Ref document number: 2015858097 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2015858097 Country of ref document: EP |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15858097 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2016548039 Country of ref document: JP Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 20167028413 Country of ref document: KR Kind code of ref document: A |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112016026109 Country of ref document: BR |
|
ENP | Entry into the national phase |
Ref document number: 2017102538 Country of ref document: RU Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: MX/A/2017/005368 Country of ref document: MX |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 112016026109 Country of ref document: BR Kind code of ref document: A2 Effective date: 20161108 |