WO2022053069A1 - 绑定帐号的方法、装置、终端及存储介质 - Google Patents

绑定帐号的方法、装置、终端及存储介质 Download PDF

Info

Publication number
WO2022053069A1
WO2022053069A1 PCT/CN2021/118359 CN2021118359W WO2022053069A1 WO 2022053069 A1 WO2022053069 A1 WO 2022053069A1 CN 2021118359 W CN2021118359 W CN 2021118359W WO 2022053069 A1 WO2022053069 A1 WO 2022053069A1
Authority
WO
WIPO (PCT)
Prior art keywords
character string
server
control device
account
binding
Prior art date
Application number
PCT/CN2021/118359
Other languages
English (en)
French (fr)
Inventor
曾春亮
翟召轩
黄翔文
杨启昌
余振荣
余志刚
吴泰月
冯涛
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Priority to EP21866121.3A priority Critical patent/EP4213047A4/en
Publication of WO2022053069A1 publication Critical patent/WO2022053069A1/zh
Priority to US18/147,708 priority patent/US20230217248A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0433Key management protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • the embodiments of the present application relate to the field of computer technologies, and in particular, to a method, device, terminal, and storage medium for binding an account.
  • smart devices with camera functions are also increasingly popular.
  • the smart device needs to be bound with the user's master account to achieve the effect of being controlled by the master account.
  • a smart device with a camera function usually needs to establish a communication connection with a control device, and then sends a master account to a server and binds it with the smart device.
  • the user manually enters the network access information through the control device, and instructs the smart device to connect to the Internet according to the network access information.
  • the smart device sends its own identification and the master account to the server, and binds the master account and the smart device in the server.
  • the embodiments of the present application provide a method, device, terminal and storage medium for binding an account.
  • the technical solution is as follows:
  • a method for binding an account is provided, applied in a server, and the method includes:
  • the first character string is generated according to a preset rule, and the first character string has a mapping relationship with the master account logged in the control device;
  • the control device Send the first character string to the control device, so that the control device transmits the first character string to the smart device in a preset manner, and the first character string is used by the server according to the mapping relationship Verify the legitimacy of the binding relationship established between the smart device and the master account.
  • a method for binding an account is provided, which is applied in a control device, and the method includes:
  • the smart device scans and parses the target graphic code to obtain a second character string
  • the second character string is used by the server to verify the smart device and the main controller according to the mapping relationship. The legitimacy of establishing a binding relationship between accounts.
  • a method for binding an account is provided, the smart device has an image acquisition component, and the method includes:
  • the target graphic code includes a first character string, and the first character string has a mapping relationship with the main control account logged in the control device;
  • an account binding device is provided, applied in a server, and the device includes:
  • a first receiving module configured to receive a request message sent by the control device, where the request message is used to request a first character string
  • a character string obtaining module configured to generate the first character string according to a preset rule, and the first character string has a mapping relationship with the master account logged in the control device;
  • a first sending module configured to send the first character string to the control device, so that the control device transmits the first character string to the smart device in a preset manner, and the first character string is used for all
  • the server verifies the legitimacy of establishing a binding relationship between the smart device and the master account according to the mapping relationship.
  • an apparatus for binding an account which is applied in a control device, and the apparatus includes:
  • a second sending module configured to send a request message to the server, where the request message is used to request the first character string
  • a second receiving module configured to receive the first character string sent by the server, where the first character string has a mapping relationship with the master account logged in the control device;
  • a graphic code generation module for generating a target graphic code according to the first character string
  • a graphic code display module configured to display the target graphic code, so that the smart device scans and parses the target graphic code to obtain a second character string, and the second character string is used by the server to verify the The legitimacy of the binding relationship established between the smart device and the master account.
  • an account binding device is provided, the smart device includes an image acquisition component, and the device includes:
  • a code scanning module for scanning the target graphic code displayed by the control device, the target graphic code includes a first character string, and the first character string has a mapping relationship with the main control account logged in the control device;
  • a parsing module for parsing the target graphic code to obtain a second character string
  • a third sending module configured to send the second character string to the server, where the second character string is used by the server to verify the establishment of a binding relationship between the smart device and the master account according to the mapping relationship legitimacy.
  • a server includes a processor and a memory connected to the processor, the memory stores program instructions, and the processor executes the program instructions.
  • a control device includes a processor and a memory connected to the processor, the memory stores program instructions, and the processor executes the The method for binding an account provided by various aspects of the present application is implemented when the program instruction is used.
  • a smart device includes a processor and a memory connected to the processor, the memory stores program instructions, and the processor executes the The method for binding an account provided by various aspects of the present application is implemented when the program instruction is used.
  • a computer-readable storage medium having stored therein at least one instruction, the instruction being loaded and executed by a processor to implement various aspects as provided by the server in the present application How to bind an account.
  • a computer-readable storage medium is provided, and at least one instruction is stored in the storage medium, and the instruction is loaded and executed by a processor to implement various functions provided by the control device in the present application. How to bind an account.
  • a computer-readable storage medium is provided, and at least one instruction is stored in the storage medium, and the instruction is loaded and executed by a processor to implement various functions provided by the smart device in the present application. How to bind an account.
  • a computer program product comprising computer instructions stored in a computer-readable storage medium.
  • the processor of the server reads the computer instruction from the computer-readable storage medium, and the processor executes the computer instruction, so that the computer device executes the method for binding an account provided in various optional implementation manners executed by the server.
  • a computer program product comprising computer instructions stored in a computer-readable storage medium.
  • the processor of the control device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device executes the method for binding an account provided in various optional implementations executed by the control device.
  • a computer program product comprising computer instructions stored in a computer-readable storage medium.
  • the processor of the smart device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device executes the method for binding an account provided in the various optional implementations executed by the smart device.
  • FIG. 1 is a schematic diagram of an implementation environment to which a method for binding an account provided by an embodiment of the present application is applied;
  • FIG. 2 is a structural block diagram of a control device provided by an exemplary embodiment of the present application.
  • FIG. 3 is a structural block diagram of a smart device provided by an exemplary embodiment of the present application.
  • FIG. 4 is a structural block diagram of a server provided by an exemplary embodiment of the present application.
  • FIG. 5 is a flowchart of a method for binding an account provided by an exemplary embodiment of the present application.
  • FIG. 6 is a flowchart of a method for binding an account provided by an exemplary embodiment of the present application.
  • FIG. 7 is a flowchart of a method for binding an account provided by an exemplary embodiment of the present application.
  • FIG. 8 is a flowchart of a method for binding an account provided by another exemplary embodiment of the present application.
  • FIG. 9 is a structural block diagram of an apparatus for binding an account provided by an exemplary embodiment of the present application.
  • FIG. 10 is a structural block diagram of an account binding device provided by an exemplary embodiment of the present application.
  • FIG. 11 is a structural block diagram of an apparatus for binding an account provided by an exemplary embodiment of the present application.
  • a plurality means two or more.
  • “And/or”, which describes the association relationship of the associated objects means that there can be three kinds of relationships, for example, A and/or B, which can mean that A exists alone, A and B exist at the same time, and B exists alone.
  • the character “/” generally indicates that the associated objects are an "or" relationship.
  • the present application provides a method for binding an account, wherein, when applied to a server, the method includes:
  • the mapping relationship verifies the legitimacy of establishing a binding relationship between the smart device and the master account.
  • the method further includes: receiving a second string sent by the smart device; in response to the second string matching the first string, establishing the smart device and the master account binding relationship between.
  • the method further includes: setting a timer; in response to the timer expiring, releasing the master account and the first character Mapping relationship between strings.
  • the acquiring the first character string according to a preset rule includes: generating a first sequence according to a random number generating function, where the first sequence is a random sequence; determining the first sequence according to the first sequence string.
  • the determining the first character string according to the first sequence includes: obtaining the first character in the first sequence; taking the first character modulo n to obtain results m, n and m is a positive integer; add m at the end of the first sequence to obtain the first character string; or, obtain the first character in the first sequence; take the first character modulo n to obtain the result m, n and m are positive integers; add m-bit identical preset characters at the end of the first sequence to obtain the first character string; or, obtain the first character in the first sequence; According to the modulo n, the result m is obtained, and n and m are positive integers; according to the preset mapping relationship, the check code k corresponding to m is determined, and k is a character or character string; adding k to the tail of the first sequence, obtaining the first character string; or, determining the first sequence as the first character string.
  • acquiring the first character string according to a preset rule includes: selecting a second sequence from a preset sequence library, where the second sequence is a sequence determined according to a random selection rule; A sequence is determined to be the first character string.
  • the method further includes: acquiring a domain corresponding to the master account, and adding the smart device to the in the domain.
  • the master account corresponds to at least two domains
  • the obtaining the domain corresponding to the master account includes: obtaining the geographic location when the control device sends the request message; In the domain, the domain corresponding to the geographic location is determined.
  • the present application also provides a method for binding an account, wherein, when applied to a control device, the method includes: sending a request message to a server, where the request message is used to request a first character string; receiving all the information sent by the server. the first character string, the first character string has a mapping relationship with the main control account logged in the control device; the target graphic code is generated according to the first character string; the target graphic code is displayed, so that the smart device After scanning and parsing the target graphic code, a second character string is obtained, and the second character string is used by the server to verify the legitimacy of the binding relationship established between the smart device and the master account according to the mapping relationship.
  • the generating the target graphic code according to the first character string includes: acquiring network access information, where the network access information is used to access a specified wireless router; encoding the first character string and the network access information, and generate the target graphic code.
  • the generating the target graphic code also includes: according to an encoding rule for representing binary data based on 64 printable characters, encoding the first character string and the said first character string encoded by the preset encoding rule. Network access information is generated as the target graphic code.
  • the present application also provides a method for binding an account, wherein, when applied to a smart device, the smart device has an image acquisition component, and the method includes: scanning a target graphic code displayed by the control device, where the target graphic code includes a first A character string, the first character string has a mapping relationship with the main control account logged in the control device; parse the target graphic code to obtain a second character string; send the second character string to the server, the first character string
  • the two strings are used by the server to verify the validity of the binding relationship between the smart device and the master account according to the mapping relationship.
  • the target graphic code further includes network access information, where the network access information is used to access a designated wireless router; before the sending the second character string to the server, the method further includes: Parsing the target graphic code to obtain the network access information; and accessing the wireless router according to the network access information.
  • the server when the control device applies for obtaining the first character string, can maintain the mapping relationship between the master account and the first character string in the server, and send the first character string to the control device;
  • the control device generates a corresponding graphic code according to the first character string;
  • the intelligent device photographs the graphic code, parses the second character string from the graphic code, and sends the second character string to the server;
  • the server verifies the intelligent device according to the mapping relationship The legality of establishing a binding relationship with the master account. Since the smart device can securely establish and bind with the master account in the server after scanning the graphic code, the operation of binding the smart device to the master account is simplified, and the leakage of the master account is avoided at the same time.
  • the first string a string obtained from the server in the cloud according to preset rules.
  • the first character string is content generated by the server according to a preset rule.
  • the character string does not originally exist in the server, and after receiving the request message sent by the control device, the server generates the first character string according to a preset rule.
  • the first string is an existing string in a preset sequence library in the server.
  • the server can obtain the first character string according to the preset rule after the control device transmits the request message to the server.
  • the first character string may be BindKey (Bind Key, binding code), and BindKey may be a character string used by the smart device to perform binding authentication between the cloud server and the master account.
  • This string is a string generated in the smart device.
  • the smart device has the ability to parse the graphic code.
  • the smart device parses the character string encoded by the first character string in the graphic code, and the parsed character string is the second character string.
  • the character string can be sent to the server by the smart device, so that the server can determine whether the first character string is the same as the second character string according to the comparison between the second character string and the first character string.
  • the server will bind the smart device and the master account to achieve the effect of quickly binding the smart device to the master account.
  • Master account the account currently logged in to the control device. It should be noted that the master account can be a mobile phone number, email address, nickname, name or room number, etc. It can be seen from this that the master account contains the user's private information to a certain extent, which may affect the user's privacy after disclosure. Therefore, the embodiment of the present application does not transmit the master account number between the control terminal and the intelligent device, and between the intelligent device and the server during the networking of the intelligent device, which improves the security of the master account and avoids the user's Leakage of private information during the above-mentioned transmission process.
  • Preset encoding rule used to indicate a rule for encoding the first character string and the network access information into a character string in a specified form.
  • the preset encoding rule may be a base62-based encoding rule.
  • the first character string obtained according to the foregoing preset encoding rule is a field, and the field is included in the target character string.
  • the target segment can include several fields, and the two fields are separated by spaces.
  • Each field includes keywords and field content.
  • the keyword indicates the role of the field. In one possible way, the keyword is a capital letter. In other possible implementation manners, the keyword may also be a combination of specified characters and capital letters.
  • the target string can be W:D ⁇ Timestamp>R ⁇ Region>B ⁇ BindKey>S ⁇ SSID>P ⁇ PASSPHASE>.
  • W is the start identifier, so that the control device can identify D ⁇ Timestamp>R ⁇ Region>B ⁇ BindKey>S ⁇ SSID>P ⁇ PASSPHASE> as the first character string.
  • Field D ⁇ Timestamp> is a timestamp, used to indicate the current date, and the encoding rule is hexadecimal.
  • Field B ⁇ BindKey> is the field where the first string is located, and the maximum length is less than 32 bytes. In the first string, BindKey is included.
  • Field S ⁇ SSID> is a field for indicating the SSID of WiFi, and the maximum length is less than 31 bytes.
  • the field R ⁇ Region> is used to indicate the domain name prefix of the IoT server, and the content of the field can be composed of uppercase letters.
  • the field P ⁇ PASSPHASE> is a field used to indicate the password of WiFi, and the value range is 8 bytes to 63 bytes.
  • the field R ⁇ Region> can be omitted if the server is unique.
  • the field R ⁇ Region> can be omitted if the server is the default.
  • the field P ⁇ PASSPHASE> can be omitted when WiFi has no password.
  • the sequence of each field can be arranged.
  • the order can be any order.
  • the control device can escape the field content in each field.
  • the content of the QR code field of the generated target graphic code uses the escape character "" to escape the field that may cause confusion, which belongs to the ASCII 92 encoding format.
  • the characters that need to be escaped include spaces (SPACE, ASCII 32) and the escape character itself (ASCII 92). Below, an example is used to illustrate the way of escaping.
  • the actual content of the field is "AB Chinese CD PNF", which is "AB Chinese C ⁇ D ⁇ PNF" after escaping.
  • the control device when the control device reads " ", it needs to judge whether the character after " " is a space (SPACE) or the escape character itself. If the character after " " is a space (SPACE) or the escape character itself, it will be merged into one symbol, otherwise it will remain as two symbols.
  • the escaped content is A ⁇ B Chinese ⁇ Text C ⁇ D ⁇ PNF
  • the content parsing should be A ⁇ B Chinese ⁇ Text C ⁇ D PNF.
  • the timestamp may be a UTC day-level timestamp, which is expressed in an uppercase hexadecimal system.
  • the time 2020-05-28T14:11:44Z should be encoded as 47EA.
  • the field S ⁇ SSID> represents the SSID of the WiFi, the length will not exceed 31 bytes, and it is encoded using the UTF-8 character set. Illustratively, if there are special characters in the field S ⁇ SSID> that need to be escaped, it may exceed 31 bytes after the transfer.
  • the field P ⁇ PASSPHASE> is used to indicate the obfuscated WiFi connection password, which can be omitted in a specified scenario, indicating that there is no WiFi connection password at this time.
  • the WiFi connection password can be 8-63 ASCII characters.
  • the method for obfuscating the WiFi connection password may be to perform an XOR operation with the SSID. When the length of the SSID is insufficient, the SSID will be written circularly to obtain the field P ⁇ PASSPHASE>.
  • the field R ⁇ Region> is the region identifier, which can become a URL after completion.
  • the default completion suffix is .iot.abcabcabcd.com. That is, if the Region is CN, after the suffix is completed, the complete domain name is CN.iot.abcabcabcd.com.
  • BindKey> is used to represent the token in the process of binding the smart device and the master account, which consists of 32 uppercase and lowercase letters and numbers. In a possible way, the valid duration of BindKey is 10 minutes.
  • the target field could be W:D47EA RCN B1234567890abcdefghijklmnopqrstuv SSSID.
  • the meaning of the target field is that the system time is May 28, 2020 00:00:00UTC; try to connect to an unauthenticated wireless router whose SSID is SSID; the server to which the smart device connects is located in the CN area; the smart device uses The BindKey is 1234567890abcdefghijklmnopqrstuv.
  • control terminal may also use the current system time as the encoded original information to jointly generate the graphic code. For example, if the current system time of the control terminal is 15:24:36 on August 21, 2020, 20200821152436 can be used as one of the information for generating the graphic code.
  • Graphical codes Can include barcodes, QR codes, and other graphics that contain coded information.
  • the two-dimensional code may be a QR-Code (Quick Response Code, quick response matrix code).
  • Network access information includes information for accessing the wireless router.
  • the network access information may only include the identifier of the wireless router.
  • the identifier of the wireless router is an SSID (Service Set Identifier, service set identifier).
  • the network access information when the wireless router requires key access, may include the identifier and the key of the wireless router.
  • the key may be PSK (Phase-Shift Keying, pre-shared key).
  • DHCP Dynamic Host Configuration Protocol, dynamic host configuration
  • IP Internet Protocol Address, Internet Protocol Address
  • the method can be applied to a system including a server, a control device, and a smart device. Therefore, before introducing the method for binding an account provided by the present application, a possible implementation environment of the present application is first introduced.
  • FIG. 1 is a schematic diagram of an implementation environment to which a method for binding an account provided by an embodiment of the present application is applied.
  • a server 110 a control terminal 120 , an image acquisition terminal 130 and an image capture terminal 130 are included.
  • the server 110 may be a server provided in the cloud.
  • the server 110 may also be a server cluster composed of multiple servers provided in the cloud.
  • the multiple servers may be composed of a distributed architecture.
  • a server cluster includes storage servers, core servers, and scheduling servers.
  • the server 110 is a virtual server provided in a physical network device.
  • services can be provided for multiple virtual servers according to resource requirements and time requirements.
  • This embodiment of the present application does not limit the actual implementation of the server 110 .
  • the control terminal 120 is a device capable of connecting to the Internet and capable of connecting to the smart device 130 shown in this application. It should be noted that, because the control device needs to be connected with the smart device. Therefore, the control device needs to support the same communication protocol as the smart device. When the communication protocol is a protocol with a preset verification password, the control device and the smart device both have the preset verification password.
  • control terminal 120 may be a mobile phone, a tablet computer, a notebook computer or a wearable smart device.
  • the smart device 130 may be a device having an image capture component.
  • the image acquisition component may be a camera, an optical sensor, or other sensors capable of acquiring image appearance information.
  • a wireless router 140 may also be included.
  • the solution provided in this application needs to be executed.
  • the smart device 130 completes the network configuration, a communication connection is established between the smart device 130 and the wireless router 140 .
  • the control device 120 may not be in communication connection with the smart device 130 .
  • the wireless router 140 communicates with the server 110 through a network cable.
  • the control device 120 is communicatively connected with the server 110 through the mobile Internet or the wireless router 140 .
  • the wireless router 140 can be used as a gateway device in the current home to control each device in the home.
  • the smart devices in the family also include smart TVs, smart air conditioners, smart refrigerators, smart washing machines, smart water heaters, smart water dispensers, smart rice cookers, smart ovens, smart microwave ovens, smart dishwashers, and smart water purifiers. Machines, smart air purifiers, smart sweeping robots, smart clothes dryers, smart clothes dryers, smart projectors, smart lamps, smart window locks, smart doorbells, smart cat eyes, smart door locks and smart cameras.
  • the smart device may be the above-mentioned device including an image capturing component. That is, when an image acquisition component, such as a camera, exists in the smart device, the smart device can be regarded as the smart device 130 shown in this application.
  • control device the control device, the server and the smart device can be introduced as follows respectively.
  • Figure 2 a possible hardware structure of the control device is introduced.
  • Figure 3 a possible hardware structure of a server is introduced.
  • Fig. 4 the hardware structure of a smart device is introduced.
  • FIG. 2 is a structural block diagram of a control device provided by an exemplary embodiment of the present application.
  • the control device includes a processor 220, a memory 240, a display component 260, and a communication component 280.
  • the memory 240 stores at least one instruction, and the instruction is loaded and executed by the processor 220 to implement the method for binding an account according to the various method embodiments of this application.
  • the control device 200 sends a request message to the server, where the request message is used to request a first character string; and receives the first character string sent by the server, the first character string and the control device
  • the main control account logged in has a mapping relationship; a target graphic code is generated according to the first character string; the target graphic code is displayed, so that the smart device scans and parses the target graphic code to obtain a second character string, the The second character string is used by the server to verify the validity of the binding relationship established between the smart device and the master account according to the mapping relationship.
  • Processor 220 may include one or more processing cores.
  • the processor 220 uses various interfaces and lines to connect various parts of the entire control device 200, and executes by running or executing the instructions, programs, code sets or instruction sets stored in the memory 240, and calling the data stored in the memory 240.
  • Various functions of the device 200 are controlled and data is processed.
  • the processor 220 may adopt at least one of digital signal processing (Digital Signal Processing, DSP), field programmable gate array (Field-Programmable Gate Array, FPGA), and programmable logic array (Programmable Logic Array, PLA).
  • DSP Digital Signal Processing
  • FPGA Field-Programmable Gate Array
  • PLA programmable logic array
  • the processor 220 may integrate one or a combination of a central processing unit (Central Processing Unit, CPU), a graphics processing unit (Graphics Processing Unit, GPU), a modem, and the like.
  • CPU Central Processing Unit
  • GPU Graphics Processing Unit
  • the CPU mainly handles the operating system, user interface, and application programs
  • the GPU is used to render and draw the content that needs to be displayed on the display screen
  • the modem is used to handle wireless communication. It can be understood that, the above-mentioned modem may also not be integrated into the processor 220, and is implemented by a single chip.
  • the memory 240 may include a random access memory (Random Access Memory, RAM), or may include a read-only memory (Read-Only Memory, ROM).
  • the memory 240 includes a non-transitory computer-readable storage medium.
  • Memory 240 may be used to store instructions, programs, codes, sets of codes, or sets of instructions.
  • the memory 240 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for at least one function (such as a touch function, a sound playback function, an image playback function, etc.), Instructions, etc., used to implement the following method embodiments; the storage data area can store data and the like involved in the following method embodiments.
  • the display component 260 is used to display the target graphic code.
  • the display component 260 may be a display screen, a projection component, or other components capable of displaying images.
  • the communication component 280 is used for connecting to the wireless router, and then performing information interaction with the server through the wireless router. Alternatively, the communication component 280 is used to directly interact with the server through the mobile Internet.
  • FIG. 3 is a structural block diagram of a smart device provided by an exemplary embodiment of the present application.
  • the smart device includes a processor 320 , a memory 340 , an image acquisition component 360 and a communication component 380 , at least one instruction is stored in the memory 340, and the instruction is loaded and executed by the processor 320 to implement the method for binding an account according to each method embodiment of the present application.
  • the smart device 300 scans the target graphic code displayed by the control device, the target graphic code includes a first character string, and the first character string has a mapping relationship with the master account logged in the control device; parsing; Obtaining the second character string from the target graphic code; sending the second character string to the server, where the second character string is used by the server to verify the relationship between the smart device and the master account according to the mapping relationship The legitimacy of establishing a binding relationship.
  • Processor 320 may include one or more processing cores.
  • the processor 320 uses various interfaces and lines to connect various parts in the entire smart device 300, and executes by running or executing the instructions, programs, code sets or instruction sets stored in the memory 340, and calling the data stored in the memory 340.
  • Various functions and processing data of the smart device 300 may adopt at least one of digital signal processing (Digital Signal Processing, DSP), field-programmable gate array (Field-Programmable Gate Array, FPGA), and programmable logic array (Programmable Logic Array, PLA).
  • DSP Digital Signal Processing
  • FPGA Field-Programmable Gate Array
  • PLA programmable logic array
  • the processor 320 may integrate one or a combination of a central processing unit (Central Processing Unit, CPU), a graphics processing unit (Graphics Processing Unit, GPU), a modem, and the like.
  • CPU Central Processing Unit
  • GPU Graphics Processing Unit
  • the CPU mainly handles the operating system, user interface, and application programs
  • the GPU is used to render and draw the content that needs to be displayed on the display screen
  • the modem is used to handle wireless communication. It can be understood that, the above-mentioned modem may not be integrated into the processor 320, and is implemented by a single chip.
  • the memory 340 may include a random access memory (Random Access Memory, RAM), or may include a read-only memory (Read-Only Memory, ROM).
  • the memory 340 includes a non-transitory computer-readable storage medium.
  • Memory 340 may be used to store instructions, programs, codes, sets of codes, or sets of instructions.
  • the memory 340 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for at least one function (such as a touch function, a sound playback function, an image playback function, etc.), Instructions, etc., used to implement the following method embodiments; the storage data area can store data and the like involved in the following method embodiments.
  • the image capture component 360 is used to capture an image containing the target graphic code.
  • the image capturing component 360 may be a camera.
  • the smart device 300 itself may be a device such as a camera, a smart doorbell, or an electronic cat's eye.
  • the smart device 300 may also be a smart TV, a smart air conditioner, or a smart refrigerator, and the aforementioned devices may include a camera.
  • the communication component 380 can be used to communicate with the wireless router, and then connect to the server through the wireless router.
  • the smart device 300 connected to the server can exchange data with the server.
  • the smart device 300 can also directly connect with other devices through the communication component 380 .
  • the communication protocols that can provide direct connection include Bluetooth protocol, WiFi (Wireless Fidelity, wireless fidelity) protocol, ZigBee (ZigBee) protocol or HiFi (Light Fidelity, visible light wireless communication) protocol, etc., which are not made in this application. limited.
  • FIG. 4 is a structural block diagram of a server provided by an exemplary embodiment of the present application.
  • the server includes a processor 420 , a memory 440 and a communication component 460 , and the memory 440 stores There is at least one instruction, and the instruction is loaded and executed by the processor 420 to implement the method for binding an account as described in the various method embodiments of this application.
  • the server 400 receives a request message sent by a control device, where the request message is used to request a first character string; the first character string is generated according to a preset rule, and the first character string is associated with the control device There is a mapping relationship between the master account logged in and the control device; send the first character string to the control device, so that the control device transmits the first character string to the smart device in a preset manner, the first character string for the server to verify the validity of the binding relationship established between the smart device and the master account according to the mapping relationship.
  • Processor 420 may include one or more processing cores.
  • the processor 420 uses various interfaces and lines to connect various parts of the entire server 400, and executes the server by running or executing the instructions, programs, code sets or instruction sets stored in the memory 440, and calling the data stored in the memory 440. 400 various functions and processing data.
  • the processor 420 may use at least one of digital signal processing (Digital Signal Processing, DSP), field programmable gate array (Field-Programmable Gate Array, FPGA), and programmable logic array (Programmable Logic Array, PLA).
  • DSP Digital Signal Processing
  • FPGA field programmable gate array
  • PROM programmable logic array
  • a hardware form is implemented.
  • the processor 420 may integrate one or a combination of a central processing unit (Central Processing Unit, CPU), a graphics processing unit (Graphics Processing Unit, GPU), a modem, and the like.
  • the CPU mainly handles the operating system, user interface, and application programs; the GPU is used to render and draw the content that needs to be displayed on the display screen; the modem is used to handle wireless communication. It can be understood that, the above-mentioned modem may not be integrated into the processor 420, but is implemented by a single chip.
  • the memory 440 may include random access memory (Random Access Memory, RAM), or may include read-only memory (Read-Only Memory, ROM).
  • the memory 440 includes a non-transitory computer-readable storage medium.
  • Memory 440 may be used to store instructions, programs, codes, sets of codes, or sets of instructions.
  • the memory 440 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for at least one function (such as a touch function, a sound playback function, an image playback function, etc.), Instructions, etc., used to implement the following method embodiments; the storage data area can store data and the like involved in the following method embodiments.
  • the communication component 460 can be used to communicate with the wireless router, and then connect the smart device through the wireless router.
  • the server 400 can also directly connect with other devices through the communication component 380 .
  • the communication protocols that can provide direct connection include Bluetooth protocol, WiFi protocol, ZigBee (ZigBee) protocol or HiFi (Light Fidelity, visible light wireless communication) protocol, etc., which are not limited in this application.
  • the communication component 460 is further configured to communicate with the control device.
  • FIG. 5 is a flowchart of a method for binding an account provided by an exemplary embodiment of the present application.
  • the method for binding an account can be applied to the control device shown above.
  • the method of binding accounts includes:
  • Step 510 Send a request message to the server, where the request message is used to request to obtain the first character string.
  • control device may first log in to the server through the master account and password.
  • the server may be set according to the region it serves.
  • a country has one server.
  • server A serves country a
  • server B serves country b
  • Server C serves country c.
  • a region has one server, for example, in country A, including servers in East China, servers in Northeast China, servers in North China, servers in Northwest China, servers in Central China, servers in South China, servers in Southwest China and Servers in key coastal areas.
  • the control device can independently select the server in the region that needs to be logged in before the server to be logged in. For example, a control device currently in South China can choose to log in to a server in East China.
  • the control device does not need to select the server to log in. After receiving the login request sent by the main control device in the control devices, any one of the control devices will query the home server of the main control device, and forward the login request to the home server.
  • the home server is a server where the master account is registered.
  • control device does not need to select the server to log in.
  • the control device sends the login request of the master account to the server corresponding to the current location of the control device.
  • the server can establish trusted encrypted communication with the control device.
  • the server may establish TLS (Transport Layer Security, Transport Layer Security)-based communication with the control device.
  • the communication between the server and the control device does not need to transmit their own identity again, and the identity can be identified through the token.
  • the A information transmitted by the control device to the server does not need to carry the identification of the control device itself, and the server can also identify that the A information is the information sent by the control device through the token.
  • control device can send a request message to the server. It should be noted that, in this step, the control device requests the first character string from the server, so that the first character string replaces the master account, so as to avoid the potential leakage of the master account during the transmission process.
  • Step 520 Receive the first character string sent by the server.
  • control device receives the first character string sent by the server, and the first character string has a mapping relationship with the master account logged in the control device.
  • the server determines the first character string according to the above request message and sends the first character string to the control device.
  • the server sends the first character string to the control device.
  • Step 530 generating a target graphic code according to the first character string.
  • control device can determine the preset encoding rule.
  • preset coding rule is a rule preset in the control device.
  • control terminal implements the method for binding an account implemented by the control terminal provided by the embodiment of the present application through a specified application program (App, Application).
  • the corresponding processing logic can be used as the logic set in the application program.
  • the application program is running, the method executed by the control terminal is automatically executed.
  • the application may be either a built-in system application in the operating system, or a third-party application provided by a service provider.
  • the preset encoding rule may be a comprehensive rule of fields and encoding including base62 rules.
  • control device may also acquire network access information.
  • the network access information is used to access a designated wireless router. Because the network access information is the ID and access password of the designated wireless router. Therefore, the network access information is used to access the designated wireless router.
  • the control device After acquiring the network access information, the control device will encode the first character string and the network access information according to the preset coding rule, and convert the encoded character string into a two-dimensional code to obtain the target graphic code.
  • the network access information may be networking parameter information, and if the communication network used is a wifi network, the network access information may be an SSID and a corresponding PSK. It should be noted that, the information in the control terminal can be either manually input by the user, or extracted by the control terminal from the information that has been saved.
  • the control terminal needs to encode the first character string and the network access information according to a preset encoding rule, as shown in the following process.
  • the first character string is represented by BindKey
  • the network access information includes ssid and PSK.
  • the encoding rule is "S ⁇ base62(ssid)>P ⁇ base62(PSK XOR ssid)>B ⁇ base62(BindKey)>".
  • S, P and B are the key.
  • S represents the ssid of the wifi
  • P represents the PSK of the wifi.
  • B represents the first string BindKey.
  • the PSK and ssid in the above P field are XORed to protect the PSK and prevent the PSK from being obtained directly after simple parsing by any device after scanning the QR code.
  • PSK can also perform XOR operation with other fields, for example, PSK can perform XOR operation with BindKey.
  • the control device can also use other operations to protect the PSK. After the first character string is processed by the preset encoding rule, it can be converted into a two-dimensional code by being converted into a two-dimensional code.
  • control terminal needs to encode the current system time, the first string and the network access information according to the preset encoding rules, and the encoded string is then QR-coded to obtain the target graphic code.
  • the encoding rule is "T ⁇ base62(time)>S ⁇ base62(ssid)>P ⁇ base62(PSK XOR ssid)>B ⁇ base62(BindKey)>".
  • the keyword T represents the system time when the control terminal generates the graphic code.
  • the keyword T can also be replaced by the keyword D, and the keyword D also represents the system time when the graphic code is generated.
  • the encoding rule may also be "D ⁇ base62(time)>S ⁇ base62(ssid)>P ⁇ base62(PSK XOR ssid)>B ⁇ base62(BindKey)>".
  • the control terminal needs to encode the current system time, the identifier of the server, the first character string and the network access information according to a preset encoding rule.
  • the encoding rule is D ⁇ base62(time)>R ⁇ base62(region)>S ⁇ base62(ssid)>P ⁇ base62(PSK XOR ssid)>B ⁇ base62(BindKey).
  • the keyword R represents the identifier of the server, and R may specifically represent the region where the server is located.
  • Step 540 displaying the target graphic code, so that the smart device scans and parses the target graphic code to obtain a second string, the second string is used by the server to verify the legality of the binding relationship between the smart device and the master account according to the mapping relationship. sex.
  • the control device can display the target graphic code through the display component.
  • the terminal directly displays the target graphic code through the screen.
  • the target graphic code can be displayed through the projection component.
  • the control terminal adopts the preset encoding rule
  • the first character string and the network access information may be encoded into the target graphic code.
  • the network access information is used to establish a communication connection with the wireless router.
  • the control device according to an encoding rule for representing binary data based on 64 printable characters (base64), the control device generates the first character string encoded by the preset encoding rule and the network access information as the target graphic code.
  • the second string will be scanned by the smart device to obtain a second string, and the second string can be used by the server together with the mapping relationship to verify the binding relationship between the smart device and the master account. legality.
  • the smart device can parse out the information in it to obtain a second character string, and the binding between the smart device and the master account logged in the control device is legalized through the second character string.
  • sexual verification the binding between the smart device and the master account logged in the control device is legalized through the second character string.
  • the control terminal can send a request to the server, obtain the first character string sent by the server, generate the target graphic code according to the first character string, and finally display the target graphic code on the screen. target graphic code. Because the control terminal can replace the main control account logged in the control terminal with the first character string, and display it in the form of a graphic code, the smart device can parse the corresponding second character string from the target graphic code, and finally pass it through the server. In the case of verification, complete the binding between the smart device and the control device. Based on this, the control terminal provided in this application can improve the efficiency of binding the master account of the smart device under the condition of protecting the account security of the master account logged in the control device.
  • FIG. 6 is a flowchart of a method for binding an account provided by an exemplary embodiment of the present application.
  • the method for binding an account can be applied to the smart device shown above.
  • the method of binding accounts includes:
  • Step 610 Scan the target graphic code displayed by the control device, where the target graphic code includes a first character string, and the first character string has a mapping relationship with the master account logged in the control device.
  • the smart device can photograph the target graphic code displayed by the control device. It should be noted that when the smart device is not connected to the Internet, it can be in a network configuration state. In the network distribution state, the smart device can identify each frame of images collected at the target period, and if an image containing the target graphic code is identified, the image can be extracted.
  • Step 620 parse the target graphic code to obtain the second character string.
  • the smart device will extract the second character string from the target graphic code according to a preset parsing rule in the device. It should be noted that the smart device can obtain the second character string after parsing the field encoded by the first character string through the preset encoding rule and parsed through the preset parsing rule.
  • the smart device can obtain the network access information after parsing the encoded network access information.
  • a preset parsing rule is set therein, and the preset parsing rule is a rule corresponding to the preset encoding rule.
  • the original target character string abcde will be obtained.
  • the smart device can also parse the target graphic code to obtain network access information, and establish a communication connection with the wireless router according to the network access information.
  • the smart device can implement the operation of establishing a communication connection with the wireless router by performing steps (1), (2) and (3).
  • Step (1) parsing the identifier and key of the wireless router in the network access information.
  • Step (2) parse the address acquisition method of the wireless router in the network access information.
  • Step (3) establish a communication connection with the wireless router according to the identification and key of the wireless router, and obtain the Internet communication protocol address according to the address acquisition method.
  • the acquisition method of the Internet communication protocol address may be determined according to the specific type of the address acquisition method.
  • the smart device may acquire the specified static IP address provided by the wireless router. In this way, the smart device will receive the static IP address assigned by the wireless router.
  • the smart device may acquire the IP address according to the dynamic acquisition rule.
  • the dynamic acquisition rule may be DHCP (Dynamic Host Configuration Protocol, dynamic host configuration).
  • Step 630 Send a second character string to the server, where the second character string is used by the server to verify the validity of the binding relationship established between the smart device and the master account according to the mapping relationship.
  • the smart device can obtain the second character string by scanning the target graphic code displayed on the control terminal, and send the second character string to the server. There is an identical first character string in the server, and the server binds the smart device with the master account. Since the smart device can obtain the second string that does not contain the master account from the graphic code provided by the control device, and complete the binding with the master account through the second string, the steps for binding the master account to the smart device are simplified. , which improves the security of the master account.
  • FIG. 7 is a flowchart of a method for binding an account provided by an exemplary embodiment of the present application.
  • the method of binding an account can be applied to the server shown above.
  • the method of binding accounts includes:
  • Step 710 Receive a request message sent by the control device, where the request message is used to request to obtain the first character string.
  • the server can receive the request message sent by the control device. It should be noted that the control terminal may establish encrypted communication with the server in advance, and the server may directly determine that the request is sent by the control device when acquiring the request message.
  • the server may not establish encrypted communication with the control device in advance.
  • the control device when the control device sends the request message to the server, it also sends the master account logged in the control device.
  • Step 720 Acquire a first character string according to a preset rule.
  • the server can obtain the first character string according to a preset rule. It should be noted that the server can either generate the first character string or select a character string from a preset sequence library that has stored several character strings. Wherein, the first character string has a mapping relationship with the master account logged in the control device.
  • mapping relationship is actively established by the server.
  • the server can establish and maintain the mapping relationship between the first character string and the master account logged in the control device.
  • the mapping relationship can be saved through a mapping table.
  • Step 730 Send the first character string to the control device, so that the control device transmits the first character string to the smart device in a preset manner, and the first character string is used by the server to verify the establishment of a binding between the smart device and the master account according to the mapping relationship. the legitimacy of the relationship.
  • the server can send the first character string to the control device, the first character string is used for the control device to generate the target graphic code, and after being read by the smart device, the corresponding information is then sent to the server, and the server according to the information When verifying that the smart device is securely bound to the master account, it will be bound to the master account.
  • the server can generate and maintain the mapping relationship between the master account and the first character string, so that when the master account logged in the control device is bound to it by the smart device, it is not necessary for the control device to provide the
  • the master account ensures the security of the master account. If the first string is accidentally leaked, there is no need to worry about the leakage of the master account. The reason is that the relationship between the master account and the first string is a mapping relationship. When the security of the mapping relationship in the server is not leaked, The security of the master account can be effectively guaranteed.
  • FIG. 8 is a flowchart of a method for binding an account provided by another exemplary embodiment of the present application.
  • the method for binding an account can be implemented by the control device, the server and the smart device.
  • the method for binding accounts includes:
  • Step 801 the control device sends a request message to the server.
  • the request message is used to request to obtain the first character string.
  • the server receives the request message sent by the control device.
  • Step 802 the server generates a first sequence according to the random number generating function.
  • the server calls the random number generation interface to generate the first sequence.
  • the first sequence is a random sequence.
  • the server directly executes the random number generating function to generate the first sequence.
  • Step 803 the server determines the first character string according to the first sequence.
  • the server can determine the first character string in various ways. Four methods of determining the first string will be described below.
  • the server obtains the first character in the first sequence.
  • the server takes the first character modulo n to obtain the result m, where n and m are positive integers.
  • the server adds m at the end of the first sequence to obtain the first string.
  • the server can digitize the first character by digitizing it. For example, digitizing according to hexadecimal, and taking the modulo n to obtain the number m, by adding m after the first sequence, the length of the first sequence is changed, which increases the difficulty for malicious information interceptors to obtain the first sequence.
  • the server obtains the first character in the first sequence.
  • the server takes the first character modulo n to obtain the result m, where n and m are positive integers.
  • the server adds m bits of the same preset character to the end of the first sequence to obtain the first character string.
  • the server can also supplement m to be the same preset character after the first sequence to obtain the first character string, and realize the effect of changing the length of the first sequence.
  • the server obtains the first character in the first sequence.
  • the server takes the first character modulo n to obtain the result m, where n and m are positive integers.
  • the server determines the check code k corresponding to m according to the preset mapping relationship, where k is a character or a character string.
  • the server adds k at the end of the first sequence to obtain the first string.
  • the server maintains the mapping relationship between m and the corresponding check code k in advance. By adding k after the first sequence, the server changes the length of the first sequence, which increases the difficulty for malicious information interceptors to obtain the first sequence.
  • Step 804 Select a second sequence from the preset sequence library, where the second sequence is a sequence determined according to a random selection rule.
  • Step 805 determining the second sequence as the first character string.
  • Step 806 the server establishes a mapping relationship between the first character string and the master account logged in the control device.
  • Step 807 setting a timer.
  • mapping relationship between the master account and the first character string is maintained.
  • mapping relationship between the master account and the first character string is released.
  • Step 808 the server sends the first character string to the control device.
  • the server sends the first character string to the control device, so that the control device transmits the first character string to the smart device in a preset way, and the first character string is used by the server to verify the relationship between the smart device and the master account according to the mapping relationship.
  • control device receives the first character string sent by the server.
  • Step 809 the control device generates the target graphic code according to the first character string.
  • control device can also program the network access information into the target graphic code together.
  • the network access information is used to access the designated wireless router.
  • Step 810 the control device displays the target graphic code.
  • control device displays the target graphic code, so that the designated smart device is bound with the main control account logged in the control device according to the information of the target graphic code.
  • Step 811 the smart device scans the target graphic code displayed by the control device.
  • step 811 enables the smart device to scan and parse the target graphic code to obtain a second character string, and the second character string is used by the server to verify the relationship between the smart device and the master account according to the mapping relationship The legitimacy of establishing a binding relationship.
  • Step 812 the smart device parses the target graphic code to obtain the second character string and network access information.
  • Step 813 the smart device establishes a communication connection with the wireless router according to the network access information.
  • Step 814 the smart device sends the second character string to the server through the wireless router.
  • the server receives the second character string sent by the smart device.
  • Step 815 the server binds the smart device to the master account in response to the second character string being the same as the first character string.
  • Step 816 the server obtains the domain corresponding to the master account, and adds the smart device to the domain.
  • the master account may only correspond to one domain.
  • the master account Jack only corresponds to the domain of Jack's home.
  • the server adds the smart device to the domain.
  • the master account corresponds to at least two domains
  • the master account Brown corresponds to two domains of Brown's home and Brown's office.
  • the server may determine the corresponding domain according to the current geographic location of the control device. For example, if the geographic location of the control device when sending the request message is the ABC office building, the server can determine that the domain corresponding to the geographic location is Brown's office according to the geographic location of the pre-stored domain, and then the server adds the smart device to the location. in the domain.
  • the timer in the server times out, the mapping relationship between the master account and the first character string is contacted. It should be noted that the timer is automatically set when the server determines the first character string.
  • the duration of the timer may be set to a duration of 5 minutes, 10 minutes, or 15 minutes, which is not limited in this embodiment of the present application.
  • the server when the control device applies for obtaining the first character string, can maintain the mapping relationship between the master account and the first character string in the server, and send the first character string to the control device;
  • the control device generates a corresponding graphic code according to the first character string and the network access information through a preset encoding rule;
  • the intelligent device scans the graphic code, and parses the second string and the network access information from the graphic code, Then access the wireless router according to the network access information, and send the second character string to the server through the wireless router; when the second character string is the same as the first character string, the server establishes a connection between the smart device and the master account.
  • the smart device can directly connect to the Internet after scanning the graphic code, and bind it with the master account in the server, the operation of network binding of the smart device is simplified, and the security of the master account is improved at the same time, avoiding the need for the master account. Control account leakage.
  • FIG. 9 is a structural block diagram of an account binding apparatus provided by an exemplary embodiment of the present application.
  • the device for binding the account can be implemented as all or a part of the server through software, hardware or a combination of the two.
  • the device includes:
  • a first receiving module 910 configured to receive a request message sent by the control device, where the request message is used to request a first character string
  • a character string obtaining module 920 configured to generate the first character string according to a preset rule, and the first character string has a mapping relationship with the master account logged in the control device;
  • the first sending module 930 is configured to send the first character string to the control device, so that the control device transmits the first character string to the smart device in a preset manner, and the first character string is used for
  • the server verifies the legality of establishing a binding relationship between the smart device and the master account according to the mapping relationship.
  • the apparatus further includes an execution module, the execution module is configured to receive a second character string sent by the smart device; in response to the second character string and the first character string match, and establish a binding relationship between the smart device and the master account.
  • the apparatus further includes a timing module configured to set a timer; in response to the timer expiring, release the mapping relationship between the master account and the first character string.
  • the character string obtaining module 920 is configured to generate a first sequence according to a random number generating function, where the first sequence is a random sequence; and determine the first character according to the first sequence string.
  • the character string obtaining module 920 is configured to obtain the first character in the first sequence; the first character is modulo n to obtain a result m, where n and m are positive integers ; Add m at the end of the first sequence to obtain the first string.
  • the character string obtaining module 920 is configured to obtain the first character in the first sequence; the first character is modulo n to obtain a result m, where n and m are positive integers ; Add m-bit identical preset characters to the tail of the first sequence to obtain the first character string.
  • the character string obtaining module 920 is configured to obtain the first character in the first sequence; the first character is modulo n to obtain a result m, where n and m are positive integers ; According to the preset mapping relationship, determine the check code k corresponding to m, where k is a character or a character string; add k at the tail of the first sequence to obtain the first character string.
  • the character string obtaining module 920 is configured to determine the first sequence as the first character string.
  • the character string obtaining module 920 is configured to select a second sequence from a preset sequence library, where the second sequence is a sequence determined according to a random selection rule; Determined to be the first character string.
  • the apparatus further includes a binding module for receiving a second character string sent by the smart device; in response to the second character string being the same as the first character string, detecting the Whether the timer has timed out; in response to the timer not timed out, bind the smart device to the master account.
  • the binding module is configured to acquire the domain corresponding to the master account, and add the smart device to the domain.
  • the binding module is configured to acquire the geographic location when the control device sends the request message; from at least two of the domains, determine a domain corresponding to the geographic location, The master account corresponds to at least two domains.
  • the server can generate and maintain the mapping relationship between the master account and the first character string, so that the master account logged in the control device can be bound to it by the smart device. It is not necessary to ask the control device to provide the master account at a certain time, which ensures the security of the master account. If the first string is accidentally leaked, there is no need to worry about the leakage of the master account. The reason is that the relationship between the master account and the first string is a mapping relationship. When the security of the mapping relationship in the server is not leaked, The security of the master account can be effectively guaranteed.
  • FIG. 10 is a structural block diagram of an apparatus for binding accounts provided by an exemplary embodiment of the present application.
  • the device for binding an account can be implemented as all or a part of the control device through software, hardware or a combination of the two.
  • the device includes:
  • a second sending module 1010 configured to send a request message to the server, where the request message is used to request the first character string
  • the second receiving module 1020 is configured to receive the first character string sent by the server, where the first character string has a mapping relationship with the master account logged in the control device;
  • a graphic code generation module 1030 configured to generate a target graphic code according to the first character string
  • the graphic code display module 1040 is configured to display the target graphic code, so that the smart device scans and parses the target graphic code to obtain a second character string, and the second character string is used by the server to verify all images according to the mapping relationship. the validity of the binding relationship established between the smart device and the master account.
  • the graphic code generation module 1030 is configured to acquire network access information, where the network access information is used to access a specified wireless router; encode the first character string and the network access information, and generate the target graphic code.
  • the graphic code generation module 1030 is configured to, according to an encoding rule for representing binary data based on 64 printable characters, generate the first character string encoded by the preset encoding rule and the network access information is generated as the target graphic code.
  • the control terminal can send a request to the server, obtain the first character string sent by the server, generate the target graphic code according to the first character string, and finally display the target graphic code on the screen. Since the control terminal can replace the main control account logged in the control terminal with the first character string, and display it in the form of a graphic code, the smart device can parse out the corresponding second character string from the target graphic code, and finally pass it on the server. In the case of verification, complete the binding between the smart device and the control device. Based on this, the control terminal provided in this application can improve the efficiency of binding the master account of the smart device under the condition of protecting the account security of the master account logged in the control device.
  • FIG. 11 is a structural block diagram of an account binding apparatus provided by an exemplary embodiment of the present application.
  • the device for binding the account can be implemented as all or a part of the smart device through software, hardware or a combination of the two.
  • the device includes:
  • the code scanning module 1110 is used to scan the target graphic code displayed by the control device, the target graphic code includes a first character string, and the first character string has a mapping relationship with the main control account logged in the control device;
  • a parsing module 1120 configured to parse the target graphic code to obtain a second character string
  • the third sending module 1130 is configured to send the second character string to the server, where the second character string is used by the server to verify the establishment of binding between the smart device and the master account according to the mapping relationship the legitimacy of the relationship.
  • the apparatus further includes a networking module, configured to parse the target graphic code to obtain the network access information.
  • the target graphic code further includes network access information, and the network access information is used to access a designated wireless router.
  • the smart device can obtain the second character string by scanning the target graphic code displayed on the control terminal, and send the second character string to the server. There is an identical first character string in the server, and the server binds the smart device with the master account. Since the smart device can obtain the second string that does not contain the master account from the graphic code provided by the control device, and complete the binding with the master account through the second string, the steps for binding the master account to the smart device are simplified. , which improves the security of the master account.
  • Embodiments of the present application further provide a computer-readable medium, where the computer-readable medium stores at least one instruction, and the at least one instruction is loaded and executed by the processor to implement the account binding described in each of the above embodiments Methods.
  • the device for binding an account provided by the above embodiment executes the method for binding an account
  • only the division of the above functional modules is used as an example for illustration.
  • the functional modules of the device are completed, that is, the internal structure of the device is divided into different functional modules to complete all or part of the functions described above.
  • the device for binding an account provided in the above embodiment and the method for binding an account belong to the same concept, and the specific implementation process is detailed in the method embodiment, which will not be repeated here.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephonic Communication Services (AREA)

Abstract

一种绑定帐号的方法、装置、终端及存储介质,属于计算机技术领域。该方法包括:服务器中能够在控制设备申请获取第一字符串时,在服务器中维护主控帐号与第一字符串之间的映射关系,并将第一字符串发送至控制设备;控制设备根据第一字符串生成对应的图形码;智能设备拍摄该图形码,并从该图形码中解析出第二字符串,再将第二字符串发送至服务器;服务器根据映射关系验证智能设备和主控帐号之间建立绑定关系的合法性。由于智能设备能够在扫描到图形码后在服务器中安全地建立与主控帐号进行绑定,简化了智能设备绑定主控帐号的操作,同时避免了主控帐号的泄露。

Description

绑定帐号的方法、装置、终端及存储介质
本申请要求于2020年9月14日提交的申请号为202010960187.5、发明名称为“绑定帐号的方法、装置、终端及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请实施例涉及计算机技术领域,特别涉及一种绑定帐号的方法、装置、终端及存储介质。
背景技术
随着智能设备在生活中的广泛应用,具备摄像功能的智能设备也日益普及。一些场景中,该智能设备需要与用户的主控帐号进行绑定,以实现被主控帐号控制的效果。
相关技术中,具备摄像功能的智能设备通常需要与控制设备建立通信连接,进而向服务器发送主控帐号并将其与智能设备进行绑定。用户通过控制设备手动输入网络接入信息,指示该智能设备根据网络接入信息连入互联网。随后,智能设备将自身的标识和主控帐号发送至服务器,在服务器中绑定主控帐号与智能设备。
发明内容
本申请实施例提供了一种绑定帐号的方法、装置、终端及存储介质。所述技术方案如下:
根据本申请的一方面内容,提供了一种绑定帐号的方法,应用在服务器中,所述方法包括:
接收控制设备发送的请求消息,所述请求消息用于请求第一字符串;
根据预设规则生成所述第一字符串,所述第一字符串与所述控制设备中登录的主控帐号具有映射关系;
向所述控制设备发送所述第一字符串,以使所述控制设备通过预设方式向智能设备传递所述第一字符串,所述第一字符串用于所述服务器根据所述映射关系验证所述智能设备与所述主控帐号之间建立绑定关系的合法性。
根据本申请的一方面内容,提供了一种绑定帐号的方法,应用在控制设备中,所述方法包括:
向服务器发送请求消息,所述请求消息用于请求第一字符串;
接收所述服务器发送的所述第一字符串,所述第一字符串与所述控制设备中登录的主控帐号具有映射关系;
根据所述第一字符串生成目标图形码;
显示所述目标图形码,以使智能设备扫描并解析所述目标图形码后获取第二字符串,所述第二字符串用于服务器根据所述映射关系验证所述智能设备与所述主控帐号之间建立绑定关系的合法性。
根据本申请的一方面内容,提供了一种绑定帐号的方法,所述智能设备具有图像采集组件,所述方法包括:
扫描控制设备显示的目标图形码,所述目标图形码包括第一字符串,所述第一字符串与所述控制设备中登录的主控帐号具有映射关系;
解析所述目标图形码获取第二字符串;
向服务器发送所述第二字符串,所述第二字符串用于所述服务器根据所述映射关系验证所述智能设备与所述主控帐号之间建立绑定关系的合法性。
根据本申请的另一方面内容,提供了一种绑定帐号的装置,应用在服务器中,所述装置包括:
第一接收模块,用于接收控制设备发送的请求消息,所述请求消息用于请求第一字符串;
字符串获取模块,用于根据预设规则生成所述第一字符串,所述第一字符串与所述控制设备中登录的主控帐号具有映射关系;
第一发送模块,用于向所述控制设备发送所述第一字符串,以使所述控制设备通过预设方式向智能设备传递所述第一字符串,所述第一字符串用于所述服务器根据所述映射关系验证所述智能设备与所述主控帐号之间建立绑定关系的合法性。
根据本申请的另一方面内容,提供了一种绑定帐号的装置,应用在控制设备中,所述装置包括:
第二发送模块,用于向服务器发送请求消息,所述请求消息用于请求第一字符串;
第二接收模块,用于接收所述服务器发送的所述第一字符串,所述第一字符串与所述控制设备中登录的主控帐号具有映射关系;
图形码生成模块,用于根据所述第一字符串生成目标图形码;
图形码显示模块,用于显示所述目标图形码,以使智能设备扫描并解析所述目标图形码后获取第二字符串,所述第二字符串用于服务器根据所述映射关系验证所述智能设备与所述主控帐号之间建立绑定关系的合法性。
根据本申请的另一方面内容,提供了一种绑定帐号的装置,所述智能设备包括图像采集组件,所述装置包括:
扫码模块,用于扫描控制设备显示的目标图形码,所述目标图形码包括第一字符串,所述第一字符串与所述控制设备中登录的主控帐号具有映射关系;
解析模块,用于解析所述目标图形码获取第二字符串;
第三发送模块,用于向服务器发送所述第二字符串,所述第二字符串用于所述服务器根据所述映射关系验证所述智能设备与所述主控帐号之间建立绑定关系的合法性。
根据本申请的另一方面内容,提供了一种服务器,所述服务器包括处理器、和与所述处理器相连的存储器,所述存储器上存储有程序指令,所述处理器执行所述程序指令时实现如本申请各个方面提供的绑定帐号的方法。
根据本申请的另一方面内容,提供了一种控制设备,所述控制设备包括处理器、和与所述处理器相连的存储器,所述存储器上存储有程序指令,所述处理器执行所述程序指令时实现如本申请各个方面提供的绑定帐号的方法。
根据本申请的另一方面内容,提供了一种智能设备,所述智能设备包括处理器、和与所述处理器相连的存储器,所述存储器上存储有程序指令,所述处理器执行所述程序指令时实现如本申请各个方面提供的绑定帐号的方法。
根据本申请的另一方面内容,提供了一种计算机可读存储介质,所述存储介质中存储有至少一条指令,所述指令由处理器加载并执行以实现如本申请中服务器提供的各个方面绑定帐号的方法。
根据本申请的另一方面内容,提供了一种计算机可读存储介质,所述存储介质中存储有至少一条指令,所述指令由处理器加载并执行以实现如本申请中控制设备提供的各个方面绑定帐号的方法。
根据本申请的另一方面内容,提供了一种计算机可读存储介质,所述存储介质中存储有至少一条指令,所述指令由处理器加载并执行以实现如本申请中智能设备提供的各个方面绑定帐号的方法。
根据本申请的一个方面,提供了一种计算机程序产品,该计算机程序产品包括计算机指令,该计算机指令存储在计算机可读存储介质中。服务器的处理器从计算机可读存储介质读取该计算机指令,处理器执行该计算机指令,使得该计算机设备执行上述由服务器执行的各种可选实现方式中提供的绑定帐号的方法。
根据本申请的一个方面,提供了一种计算机程序产品,该计算机程序产品包括计算机指令,该计算机指令存储在计算机可读存储介质中。控制设备的处理器从计算机可读存储介质读取该计算机指令,处理器执行该计算机指令,使得该计算机设备执行上述由控制设备执行的各种可选实现方式中提供的绑定帐号的方法。
根据本申请的一个方面,提供了一种计算机程序产品,该计算机程序产品包括计算机指令,该计算机指令存储在计算机可读存储介质中。智能设备的处理器从计算机可读存储介质读取该计算机指令,处理器执行该计算机指令,使得该计算机设备执行上述由智能设备执行的各种可选实现方式中提供的绑定帐号的方法。
附图说明
为了更清楚地介绍本申请实施例中的技术方案,下面将对本申请实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其它的附图。
图1是本申请实施例提供的一种绑定帐号的方法所应用的实施环境的示意图;
图2是本申请一个示例性实施例提供的一种控制设备的结构框图;
图3是本申请一个示例性实施例提供的一种智能设备的结构框图;
图4是本申请一个示例性实施例提供的一种服务器的结构框图;
图5是本申请一个示例性实施例提供的一种绑定帐号的方法的流程图;
图6是本申请一个示例性实施例提供的一种绑定帐号的方法的流程图;
图7是本申请一个示例性实施例提供的一种绑定帐号的方法的流程图;
图8是本申请另一个示例性实施例提供的一种绑定帐号的方法流程图;
图9是本申请一个示例性实施例提供的一种绑定帐号的装置的结构框图;
图10是本申请一个示例性实施例提供的一种绑定帐号的装置的结构框图;
图11是本申请一个示例性实施例提供的一种绑定帐号的装置的结构框图。
具体实施方式
为使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施方式作进一步地详细描述。
下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本申请相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本申请的一些方面相一致的装置和方法的例子。
在本申请的描述中,需要理解的是,术语“第一”、“第二”等仅用于描述目的,而不能理解为指示或暗示相对重要性。在本申请的描述中,需要说明的是,除非另有明确的规定和限定,术语“相连”、“连接”应做广义理解,例如,可以是固定连接,也可以是可拆卸连接,或一体地连接;可以是机械连接,也可以是电连接;可以是直接相连,也可以通过中间媒介间接相连。对于本领域的普通技术人员而言,可以具体情况理解上述术语在本申请中的具体含义。此外,在本申请的描述中,除非另有说明,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。字符“/”一般表示前后关联对象是一种“或”的关系。
本申请提供了一种绑定帐号的方法,其中,应用于服务器中,所述方法包括:
接收控制设备发送的请求消息,所述请求消息用于请求第一字符串;根据预设规则生成所述第一字符串,所述第一字符串与所述控制设备中登录的主控帐号具有映射关系;向所述控制设备发送所述第一字符串,以使所述控制设备通过预设方式向智能设备传递所述第一字符串,所述第一字符串用于所述服务器根据所述映射关系验证所述智能设备与所述主控帐号之间建立绑定关系的合法性。
可选地,所述方法还包括:接收所述智能设备发送的第二字符串;响应于所述第二字符串与所述第一字符串匹配,建立所述智能设备与所述主控帐号之间的绑定关系。
可选地,在所述根据预设规则获取所述第一字符串之后,所述方法还包括:设置定时器;响应于所述定时器超时,解除所述主控帐号与所述第一字符串之间的映射关系。
可选地,所述根据预设规则获取所述第一字符串,包括:根据随机数生成函数生成第一序列,所述第一序列是随机序列;根据所述第一序列确定所述第一字符串。
可选地,所述根据所述第一序列确定所述第一字符串,包括:获取所述第一序列中的首字符;将所述首字符按n取模,得到结果m,n和m为正整数;在所述第一序列的尾部增加m,得到所述第一字符串;或,获取所述第一序列中的首字符;将所述首字符按n取模,得到结果m,n和m为正整数;在所述第一序列的尾部增加m位相同的预设字符,得到所述第一字符串;或,获取所述第一序列中的首字符;将所述首字符按n取模,得到结果m,n和m为正整数;根据预设映射关系,确定m对应的校验码k,k为字符或字符串;在所述第一序列的尾部增加k,得到所述第一字符串;或,将所述第一序列确定为所述第一字符串。
可选地,所述根据预设规则获取所述第一字符串,包括:从预设序列库中选取第二序列,所述第二序列是按照随机选取规则确定的序列;将所述第二序列确定为所述第一字符串。
可选地,述建立所述智能设备与所述主控帐号之间的绑定关系之后,所述方法还包括:获取所述主控帐号所对应的域,将所述智能设备添加到所述域中。
可选地,所述主控帐号对应至少两个域,所述获取所述主控帐号所对应的域,包括:获取所述控制设备发送所述请求消息时的地理位置;从至少两个所述域中,确定所述地理位置对应的域。
本申请还提供一种绑定帐号的方法,其中,应用于控制设备中,所述方法包括:向服务器发送请求消息,所述请求消息用于请求第一字符串;接收所述服务器发送的所述第一字符串,所述第一字符串与所述控制设备中登录的主控帐号具有映射关系;根据所述第一字符串生成目标图形码;显示所述目标图形码,以使智能设备扫描并解析所述目标图形码后获取第二字符串,所述第二字符串用于服务器根据所述映射关系验证所述智能设备与所述主控帐号之间建立绑定关系的合法性。
可选地,所述根据所述第一字符串生成目标图形码包括:获取网络接入信息,所述网络接入信息用于 接入指定的无线路由器;根据预设编码规则编码所述第一字符串和所述网络接入信息,并生成所述目标图形码。
可选地,所述生成所述目标图形码,还包括:根据基于64个可打印字符来表示二进制数据的编码规则,将经过所述预设编码规则编码的所述第一字符串和所述网络接入信息生成为所述目标图形码。
本申请还提供一种绑定帐号的方法,其中,应用于智能设备中,所述智能设备具有图像采集组件,所述方法包括:扫描控制设备显示的目标图形码,所述目标图形码包括第一字符串,所述第一字符串与所述控制设备中登录的主控帐号具有映射关系;解析所述目标图形码获取第二字符串;向服务器发送所述第二字符串,所述第二字符串用于所述服务器根据所述映射关系验证所述智能设备与所述主控帐号之间建立绑定关系的合法性。
可选地,所述目标图形码还包括网络接入信息,所述网络接入信息用于接入指定的无线路由器;所述向服务器发送所述第二字符串之前,所述方法还包括:解析所述目标图形码获取所述网络接入信息;根据所述网络接入信息接入所述无线路由器。
本申请实施例提供的技术方案带来的有益效果可以包括:
在本申请实施例中,服务器中能够在控制设备申请获取第一字符串时,在服务器中维护主控帐号与第一字符串之间的映射关系,并将第一字符串发送至控制设备;控制设备根据第一字符串生成对应的图形码;智能设备拍摄该图形码,并从该图形码中解析出第二字符串,再将第二字符串发送至服务器;服务器根据映射关系验证智能设备和主控帐号之间建立绑定关系的合法性。由于智能设备能够在扫描到图形码后在服务器中安全地建立与主控帐号进行绑定,简化了智能设备绑定主控帐号的操作,同时避免了主控帐号的泄露。
为了本申请实施例所示方案易于理解,下面对本申请实施例中出现的若干名词进行介绍。
第一字符串:是在云端的服务器中按照预设规则获取的字符串。
一种可能的方式中,第一字符串是服务器根据预设规则生成的内容。服务器中原本不存在该字符串,服务器在接收到控制设备发送的请求消息后,按照预设规则生成该第一字符串。
另一种可能的方式中,第一字符串是服务器中的预设序列库中现有的字符串。服务器能够在控制设备向服务器发射请求消息后,按照预设规则获取第一字符串。在本申请实施例中,第一字符串可以是BindKey(Bind Key,绑定码),BindKey可以是智能设备在云端服务器与主控帐号之间进行绑定认证使用的字符串。
第二字符串:该字符串是在智能设备中生成的字符串。智能设备具有图形码的解析能力。智能设备将图形码中第一字符串编码后的字符串进行解析,解析后的字符串是第二字符串。该字符串能够被智能设备发送至服务器中,令服务器根据该第二字符串和第一字符串的比对,确定第一字符串是否和第二字符串相同。当第一字符串和第二字符串相同时,服务器将绑定智能设备与主控帐号,实现智能设备快速与主控帐号绑定的效果。
主控帐号:当前登录在控制设备中的帐号。需要说明的是,主控帐号可以是手机号码、邮箱地址、昵称、姓名或房间号码等。由此可知,主控帐号一定程度包括了用户的隐私信息,在泄露后可能对用户的隐私造成影响。因此,本申请实施例在智能设备联网的过程中,没有在控制终端与智能设备之间,以及,智能设备和服务器之间传输主控帐号,提高了主控帐号的安全性,避免了用户的隐私信息在上述传输过程中的泄露。
预设编码规则:用于指示一种将第一字符串和网络接入信息编码为指定形式的字符串的规则。一种可能的方式中,该预设编码规则可以是基于base62的编码规则。
示意性的,按照上述预设编码规则得到的第一字符串是一个字段,该字段包括在目标字符串中。目标段中可以包括若干个字段,两个字段之间通过空格分隔。每一个字段包括关键字和字段内容。其中,关键字表示该字段的作用。一种可能的方式中,关键字是一个大写字母。在其它可能的实现方式中,关键字还可以是指定的字符和大写字母的组合。
例如,目标字符串可以是W:D<Timestamp>R<Region>B<BindKey>S<SSID>P<PASSPHASE>。
在上边第一字符串中,W:是起始标识符,以便于控制设备将D<Timestamp>R<Region>B<BindKey>S<SSID>P<PASSPHASE>识别为第一字符串。
字段D<Timestamp>是时间戳,用于指示当前的日期,编码规则是十六进制。
字段B<BindKey>是第一字符串所在的字段,最大长度小于32字节,在第一字符串中,包括BindKey。
字段S<SSID>是用于指示WiFi的SSID的字段,最大长度小于31字节。
字段R<Region>是用于指示IoT服务器域名前缀,字段内容可以是由大写字母组成。
字段P<PASSPHASE>是用于指示WiFi的密码的字段,取值范围是8字节至63字节。
可选地,上述字段中,字段R<Region>在服务器唯一的情况下可以省略。或者,字段R<Region>在服务器是默认的情况下可以省略。字段P<PASSPHASE>在WiFi是没有密码的情况下,是可以省略的。
需要说明的是,在目标字符串中,各个字段之间的前后排列顺序是可安排的。该序可以是任意顺序。
在控制设备安排好上述各个字段的前后排列顺序后,控制设备能够对各个字段中的字段内容进行转义。在一种可能的转义过程中,生成目标图形码的二维码字段内容使用转义符“”对可能产生混淆的字段进行转义,该符号属于ASCII 92的编码格式。其中,需要转义的字符包括空格(SPACE,ASCII 32)和转义符本身(ASCII 92)。下面,通过示例来说明转义的方式。
比如,字段实际的内容为“AB中文CD PNF”,转义后为“AB中文C\\D\PNF”。在该例解析时,控制设备读取到“”时,需要判断“”的后一个字符是否为空格(SPACE)或转义符本身。若“”的后一个字符是空格(SPACE)或转义符本身,则合并为一个符号,否则仍保持为两个符号。比如,转义后内容为A\B中\文C\\D\PNF,则内容解析应为A\B中\文C\D PNF。
详细而言,在字段D<Timestamp>表示的时间戳中,该时间戳可以是UTC日级时间戳,以大写16进制的方式表示。例如,时间2020-05-28T14:11:44Z应编码为47EA。
字段S<SSID>表示WiFi的SSID,长度不会超过31字节,使用UTF-8字符集进行编码。示意性的,若字段S<SSID>中存在特殊字符需要被转义,则转以后可能超过31字节。
字段P<PASSPHASE>是用于表示混淆后的WiFi连接密码,可以在指定的场景下进行省略,表示此时WiFi没有连接密码。其中,WiFi连接密码可以是8-63个ASCII码字符。在本实施例中,混淆WiFi连接密码的方法可以是与SSID进行异或运算。当SSID的长度不足时,SSID将循环列写,从而得到字段P<PASSPHASE>。
字段R<Region>是地区标识,补全后可以成为URL。例如,预设的补全后缀为.iot.abcabcabcd.com。即若Region为CN,则补全后缀后,完整域名为CN.iot.abcabcabcd.com。
字段<BindKey>用于表示智能设备和主控帐号绑定过程中的令牌,由32个大小写字母和数字字符组成。一种可能的方式中,BindKey的有效时长是10分钟。
在一种可能的场景中,目标字段可以是W:D47EA RCN B1234567890abcdefghijklmnopqrstuv SSSID。该目标字段的含义是,系统时间是2020年05月28日00:00:00UTC;尝试连接到一个SSID为SSID的无认证的无线路由器中;智能设备连接到的服务器位于CN区域;智能设备使用的BindKey是1234567890abcdefghijklmnopqrstuv。
再比如,在本申请实施例中,控制终端还可以将当前的系统时刻一同作为编码的原始信息,共同生成图形码。例如,控制终端当前的系统时间是2020年8月21日15点24分36秒,则20200821152436可以作为生成图形码的信息之一。
图形码:可以包括条形码、二维码和其它包含编码信息的图形。一种可能的方式中,二维码可以是QR-Code(Quick Response Code,快速响应矩阵图码)。
网络接入信息:包括用于接入无线路由器的信息。
一种网络接入信息可能的场景中,当无线路由器是开放的,无需密码便可接入的网关,则网络接入信息可以仅包括无线路由器的标识。一种可能的方式中,无线路由器的标识是SSID(Service Set Identifier,服务集标识)。
另一种网络接入信息可能的场景中,当无线路由器是需要密钥接入时,网络接入信息可以包括无线路由器的标识和密钥。其中,密钥可以是PSK(Phase-Shift Keying,预共享密钥)。
DHCP(Dynamic Host Configuration Protocol,动态主机配置)。
IP(Internet Protocol Address,互联网通讯协议地址)。
在本申请实施例中,本方法可以应用在包括服务器、控制设备和智能设备三者的系统中。因此,在介绍本申请提供的绑定帐号的方法之前,先行介绍本申请的一种可能的实施环境。
请参见图1,图1是本申请实施例提供的一种绑定帐号的方法所应用的实施环境的示意图。在图1中,包括服务器110、控制终端120、图像采集终端130和。
服务器110可以是设置在云端中的一台服务器。或者,服务器110还可以是设置在云端中的多台服务器组成的服务器集群。当服务器110是多台服务器组成的服务器集群时,多台服务器可以通过分布式架构组成。
当服务器110是多台服务器组成的服务器集群时,服务器110可以将自身的各个功能分别通过不同的服务器实现。例如服务器集群包括存储服务器、核心服务器和调度服务器等。
另一种可能的方式中,服务器110是设置在实体网络设备中的虚拟服务器。在一台实体网络设备中,可以按照资源需求和时间需求,为多个虚拟服务器提供服务。
本申请实施例不对服务器110的实际实现方式进行限定。
控制终端120具有连接互联网能力且能够连接本申请中所示的智能设备130的设备。需要说明的是,由于控制设备需要与智能设备相连接。因此,该控制设备需要与智能设备支持相同的通信协议。当通信协 议是预先设定的验证密码的协议时,控制设备和智能设备是同时具备预先设定的验证密码。
在一种可能的实现方式中,控制终端120可以是手机、平板电脑、笔记本电脑或可穿戴智能设备。
智能设备130可以是具有图像采集组件的设备。示意性的,图像采集组件可以是摄像头、光学传感器或者其它能够获取图像外观信息的传感器。
在本申请所示的实施环境中,还可以包括无线路由器140。
当智能设备130还没有连接到互联网时,需要执行本申请提供的方案。当智能设备130完成配网后,智能设备130与无线路由器140之间建立通信连接。控制设备120可以不与智能设备130进行通信连接。无线路由器140通过网线与服务器110进行通信连接。控制设备120通过移动互联网或者无线路由器140与服务器110进行通信连接。
需要说明的是,无线路由器140可以作为当前的家庭中的网关设备,对家庭中的各个设备进行控制。
一种可能的方式中,家庭中的智能设备还包括智能电视、智能空调、智能冰箱、智能洗衣机、智能热水器、智能饮水机、智能电饭煲、智能烤箱、智能微波炉、智能洗碗机、智能净水机、智能空气净化器、智能扫地机器人、智能干衣机、智能晾衣机、智能投影仪、智能灯具、智能窗锁、智能门铃、智能猫眼、智能门锁和智能摄像头。需要说明的是,上述智能设备仅为示意性说明,不对本申请中所示的智能设备形成限定。可选地,智能设备可以是上述包括图像采集组件的设备。也即,当智能设备中存在图像采集组件,例如摄像头,该智能设备即可视为本申请所示的智能设备130。
在本申请中,控制设备、服务器和智能设备可以分别介绍如下。在图2中,介绍了一种控制设备可能实现的硬件结构。在图3中,介绍了一种服务器可能实现的硬件结构。在图4中,介绍了一种智能设备的硬件结构。
请参见图2,图2是本申请一个示例性实施例提供的一种控制设备的结构框图,如图2所示,该控制设备包括处理器220、存储器240、显示组件260和通信组件280,所述存储器240中存储有至少一条指令,所述指令由所述处理器220加载并执行以实现如本申请各个方法实施例所述的绑定帐号的方法。
在本申请中,控制设备200向服务器发送请求消息,所述请求消息用于请求第一字符串;接收所述服务器发送的所述第一字符串,所述第一字符串与所述控制设备中登录的主控帐号具有映射关系;根据所述第一字符串生成目标图形码;显示所述目标图形码,以使智能设备扫描并解析所述目标图形码后获取第二字符串,所述第二字符串用于服务器根据所述映射关系验证所述智能设备与所述主控帐号之间建立绑定关系的合法性。
处理器220可以包括一个或者多个处理核心。处理器220利用各种接口和线路连接整个控制设备200内的各个部分,通过运行或执行存储在存储器240内的指令、程序、代码集或指令集,以及调用存储在存储器240内的数据,执行控制设备200的各种功能和处理数据。可选的,处理器220可以采用数字信号处理(Digital Signal Processing,DSP)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)、可编程逻辑阵列(Programmable Logic Array,PLA)中的至少一种硬件形式来实现。处理器220可集成中央处理器(Central Processing Unit,CPU)、图像处理器(Graphics Processing Unit,GPU)和调制解调器等中的一种或几种的组合。其中,CPU主要处理操作系统、用户界面和应用程序等;GPU用于负责显示屏所需要显示的内容的渲染和绘制;调制解调器用于处理无线通信。可以理解的是,上述调制解调器也可以不集成到处理器220中,单独通过一块芯片进行实现。
存储器240可以包括随机存储器(Random Access Memory,RAM),也可以包括只读存储器(Read-Only Memory,ROM)。可选的,该存储器240包括非瞬时性计算机可读介质(non-transitory computer-readable storage medium)。存储器240可用于存储指令、程序、代码、代码集或指令集。存储器240可包括存储程序区和存储数据区,其中,存储程序区可存储用于实现操作系统的指令、用于至少一个功能的指令(比如触控功能、声音播放功能、图像播放功能等)、用于实现下述各个方法实施例的指令等;存储数据区可存储下面各个方法实施例中涉及到的数据等。
显示组件260用于显示目标图形码。在本申请中,显示组件260可以是显示屏、投影组件或者其它能够显示图像的组件。
通信组件280用于连接无线路由器,进而通过无线路由器与服务器进行信息交互。或者,通信组件280用于通过移动互联网直接与服务器进行信息交互。
请参见图3,图3是本申请一个示例性实施例提供的一种智能设备的结构框图,如图3所示,该智能设备包括处理器320、存储器340、图像采集组件360和通信组件380,所述存储器340中存储有至少一条指令,所述指令由所述处理器320加载并执行以实现如本申请各个方法实施例所述的绑定帐号的方法。
在本申请中,智能设备300扫描控制设备显示的目标图形码,所述目标图形码包括第一字符串,所述第一字符串与所述控制设备中登录的主控帐号具有映射关系;解析所述目标图形码获取第二字符串;向服 务器发送所述第二字符串,所述第二字符串用于所述服务器根据所述映射关系验证所述智能设备与所述主控帐号之间建立绑定关系的合法性。
处理器320可以包括一个或者多个处理核心。处理器320利用各种接口和线路连接整个智能设备300内的各个部分,通过运行或执行存储在存储器340内的指令、程序、代码集或指令集,以及调用存储在存储器340内的数据,执行智能设备300的各种功能和处理数据。可选的,处理器320可以采用数字信号处理(Digital Signal Processing,DSP)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)、可编程逻辑阵列(Programmable Logic Array,PLA)中的至少一种硬件形式来实现。处理器320可集成中央处理器(Central Processing Unit,CPU)、图像处理器(Graphics Processing Unit,GPU)和调制解调器等中的一种或几种的组合。其中,CPU主要处理操作系统、用户界面和应用程序等;GPU用于负责显示屏所需要显示的内容的渲染和绘制;调制解调器用于处理无线通信。可以理解的是,上述调制解调器也可以不集成到处理器320中,单独通过一块芯片进行实现。
存储器340可以包括随机存储器(Random Access Memory,RAM),也可以包括只读存储器(Read-Only Memory,ROM)。可选的,该存储器340包括非瞬时性计算机可读介质(non-transitory computer-readable storage medium)。存储器340可用于存储指令、程序、代码、代码集或指令集。存储器340可包括存储程序区和存储数据区,其中,存储程序区可存储用于实现操作系统的指令、用于至少一个功能的指令(比如触控功能、声音播放功能、图像播放功能等)、用于实现下述各个方法实施例的指令等;存储数据区可存储下面各个方法实施例中涉及到的数据等。
图像采集组件360用于拍摄包含目标图形码的图像。一种可能的实现方式中,图像采集组件360可以是摄像头。智能设备300本身即可以是摄像头、智能门铃或者电子猫眼等设备。或者,智能设备300还可以是智能电视、智能空调或者智能冰箱,上述设备中可以包括摄像头。
通信组件380可以用于与无线路由器进行通信连接,再通过无线路由器连接服务器。连接服务器后的智能设备300,能够与服务器之间进行数据交换。另一种可能的方式中,智能设备300还能够通过通信组件380与其它设备进行直连。示意性的,能够提供直连的通信协议包括蓝牙协议、WiFi(Wireless Fidelity,无线保真)协议、ZigBee(紫蜂)协议或HiFi(Light Fidelity,可见光无线通信)协议等,本申请对此不作限定。
请参见图4,图4是本申请一个示例性实施例提供的一种服务器的结构框图,如图4所示,该服务器包括处理器420、存储器440和通信组件460,所述存储器440中存储有至少一条指令,所述指令由所述处理器420加载并执行以实现如本申请各个方法实施例所述的绑定帐号的方法。
在本申请中,服务器400接收控制设备发送的请求消息,所述请求消息用于请求第一字符串;根据预设规则生成所述第一字符串,所述第一字符串与所述控制设备中登录的主控帐号具有映射关系;向所述控制设备发送所述第一字符串,以使所述控制设备通过预设方式向智能设备传递所述第一字符串,所述第一字符串用于所述服务器根据所述映射关系验证所述智能设备与所述主控帐号之间建立绑定关系的合法性。
处理器420可以包括一个或者多个处理核心。处理器420利用各种接口和线路连接整个服务器400内的各个部分,通过运行或执行存储在存储器440内的指令、程序、代码集或指令集,以及调用存储在存储器440内的数据,执行服务器400的各种功能和处理数据。可选的,处理器420可以采用数字信号处理(Digital Signal Processing,DSP)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)、可编程逻辑阵列(Programmable Logic Array,PLA)中的至少一种硬件形式来实现。处理器420可集成中央处理器(Central Processing Unit,CPU)、图像处理器(Graphics Processing Unit,GPU)和调制解调器等中的一种或几种的组合。其中,CPU主要处理操作系统、用户界面和应用程序等;GPU用于负责显示屏所需要显示的内容的渲染和绘制;调制解调器用于处理无线通信。可以理解的是,上述调制解调器也可以不集成到处理器420中,单独通过一块芯片进行实现。
存储器440可以包括随机存储器(Random Access Memory,RAM),也可以包括只读存储器(Read-Only Memory,ROM)。可选的,该存储器440包括非瞬时性计算机可读介质(non-transitory computer-readable storage medium)。存储器440可用于存储指令、程序、代码、代码集或指令集。存储器440可包括存储程序区和存储数据区,其中,存储程序区可存储用于实现操作系统的指令、用于至少一个功能的指令(比如触控功能、声音播放功能、图像播放功能等)、用于实现下述各个方法实施例的指令等;存储数据区可存储下面各个方法实施例中涉及到的数据等。
通信组件460可以用于与无线路由器进行通信连接,再通过无线路由器连接智能设备。另一种可能的方式中,服务器400还能够通过通信组件380与其它设备进行直连。示意性的,能够提供直连的通信协议包括蓝牙协议、WiFi协议、ZigBee(紫蜂)协议或HiFi(Light Fidelity,可见光无线通信)协议等,本申请对此不作限定。
另一种可能的方式中,通信组件460还用于与控制设备进行通信连接。
请参考图5,图5是本申请一个示例性实施例提供的一种绑定帐号的方法的流程图。该绑定帐号的方法可以应用在上述所示的控制设备中。在图5中,绑定帐号的方法包括:
步骤510,向服务器发送请求消息,请求消息用于请求获取第一字符串。
在本申请实施例中,控制设备可以先通过主控帐号和密码在服务器中进行登录。
示意性的,服务器可以根据其服务的地区进行设置。一种可能的方式中,一个国家具有一个服务器。例如,服务器A为a国进行服务,服务器B为b国进行服务。服务器C为c国进行服务。
另一种可能的方式中,一个地区具有一个服务器,例如,在A国境内,包括华东地区服务器、东北地区服务器、华北地区服务器、西北地区服务器、华中地区服务器、华南地区服务器、西南地区服务器和重点沿海地区服务器。
一种可能的服务器登录方式中,控制设备在登录的服务器之前,能够自主选择需要登录的地区的服务器。例如,当前处于华南地区的控制设备,自主选择登录华东地区服务器。
另一种可能的服务器登录方式中,控制设备无需选择登录的服务器。任一接收到控制设备中的主控设备发出的登录请求之后,将查询该主控设备归属的服务器,并将该登录请求转发至该归属的服务器。示意性的,该归属的服务器是主控帐号注册地所在地的服务器。
另一种可能的服务器登录方式中,控制设备无需选择登录的服务器。控制设备将主控帐号的登录请求发送至当前控制设备所在地对应的服务器。
当服务器通过主控帐号和密码的验证之后,服务器可以和控制设备之间建立可信加密通信。示意性的,服务器可以在和控制设备之间建立基于TLS(Transport Layer Security,传输层安全协议)的通信。
可选地,在服务器和控制设备之间建立可信加密通信之后,服务器和控制设备之间的通信无需再次传输自身的标识,可以通过token来进行身份的识别。例如,控制设备向服务器传输的A信息中无需再携带控制设备自身的标识,服务器也能通过token够识别出A信息是控制设备发送的信息。
在本例中,控制设备能够向服务器发送请求消息。需要说明的是,本步骤是控制设备向服务器请求第一字符串,以使第一字符串替代主控帐号,从而避免主控帐号在传输过程中可能发生泄漏的隐患。
步骤520,接收服务器发送的第一字符串。
在本例中,控制设备接收服务器发送的第一字符串,第一字符串与控制设备中登录的主控帐号具有映射关系。其中,服务器根据上述请求消息,确定第一字符串并向控制设备发送第一字符串。
相应的,服务器向控制设备发送的第一字符串。
步骤530,根据第一字符串生成目标图形码。
在本申请实施例中,控制设备能够确定预设编码规则。需要说明的是,预设编码规则是控制设备中预先设定的规则。
在一种可能的实现方式中,控制终端通过指定的应用程序(App,Application)来实现本申请实施例提供的控制终端实现的绑定帐号的方法。相应的处理逻辑可以作为应用程序中设定好的逻辑,在应用程序运行时,由控制终端所执行的方法自动被执行。
可选地,该应用程序既可以是操作系统中内置的系统应用,也可以是服务商提供的第三方应用。
在本例中,预设编码规则可以是包括base62规则在内的字段和编码的综合规则。
在本申请实施例中,控制设备还可以获取网络接入信息。其中,网络接入信息用于接入指定的无线路由器。由于网络接入信息中是指定的无线路由器的标识和接入密码。因此,该网络接入信息用于接入指定的无线路由器。
在获取网络接入信息后,控制设备将根据预设编码规则编码第一字符串和网络接入信息,并将编码后的字符串二维码化,得到目标图形码。
需要说明的是,网络接入信息可以是联网参数信息,若使用的通信网络是wifi网络,则网络接入信息可以是SSID和相应的PSK。需要说明的是,控制终端中的该信息既可以是用户手动输入的,也可以是控制终端从已经保存的信息中提取出的。
在一种实际应用的场景中,控制终端需要根据预设编码规则,将第一字符串和网络接入信息编码,可以参见如下过程。在本例中,第一字符串以BindKey表示,网络接入信息包括ssid和PSK。编码规则是“S<base62(ssid)>P<base62(PSK XOR ssid)>B<base62(BindKey)>”。其中,S、P和B为关键。S表示wifi的ssid,P表示wifi的PSK。B表示第一字符串BindKey。
示意性的,上述P字段中的PSK与ssid做了异或运算,目的在于保护PSK,避免PSK被任意设备扫描二维码后简单解析后直接得到。需要说明的是,PSK还可以与其它字段进行异或运算,比如,PSK可以与BindKey进行异或运算。除了异或运算,控制设备还可以采用其他运算对PSK进行保护。当第一字符串被预设编码规则处理后,可以进行二维码化,被转化成二维形式的代码。
在另一种实际应用的场景中,控制终端需要根据预设编码规则,将当前的系统时刻、第一字符串和网 络接入信息进行编码,编码后的字符串再进行二维码化得到目标图形码。
示意性的,编码规则是“T<base62(time)>S<base62(ssid)>P<base62(PSK XOR ssid)>B<base62(BindKey)>”。其中,关键字T表示控制终端在生成图形码时的系统时刻。其中,关键字T还可以被关键字D所替代,关键字D同样表示生成图形码的系统时刻。
也即,编码规则还可以是“D<base62(time)>S<base62(ssid)>P<base62(PSK XOR ssid)>B<base62(BindKey)>”。
在另一种实际应用的场景中,控制终端需要根据预设编码规则,将当前的系统时刻、服务器的标识、第一字符串和网络接入信息编码。示意性的,编码规则是D<base62(time)>R<base62(region)>S<base62(ssid)>P<base62(PSK XOR ssid)>B<base62(BindKey)。其中,关键字R表示服务器的标识,R具体可以表示服务器所在的地区。
步骤540,显示目标图形码,以使智能设备扫描并解析目标图形码后获取第二字符串,第二字符串用于服务器根据映射关系验证智能设备与主控帐号之间建立绑定关系的合法性。
在本申请实施例中,控制设备能够在生成目标图形码之后,通过显示组件显示目标图形码。一种可能的方式中,终端直接通过屏幕显示该目标图形码。另一种可能的方式中,终端还能够在配备投影组件时,通过投影组件显示该目标图形码。
可选地,采用base64规则避免个别字符串难以正确被编码。在控制终端采用预设编码规则之后,可以将第一字符串和网络接入信息编码成目标图形码。其中,网络接入信息用于与无线路由器建立通信连接。一种方式中,根据基于64个可打印字符(base64)来表示二进制数据的编码规则,控制设备将经过预设编码规则编码的第一字符串和网络接入信息生成为目标图形码。
需要说明的是,第二字符串将被智能设备扫描后得到第二字符串,该第二字符串能够和映射关系一并被服务器用来验证智能设备与主控帐号之间建立绑定关系的合法性。
相应的,智能设备获取到该目标图形码后,能够解析出其中的信息,得到第二字符串,通过第二字符串对智能设备与控制设备中登录的主控帐号之间的绑定进行合法性验证。
综上所述,本实施例提供的绑定帐号的方法中,控制终端能够向服务器发送请求,获取服务器发送的第一字符串,根据第一字符串生成目标图形码,最终在屏幕中显示该目标图形码。由于控制终端能够通过第一字符串替代控制终端中登录的主控帐号,并通过图形码的形式显示,令智能设备能够从目标图形码中解析出相应的第二字符串,最终在服务器中通过验证的情况下,完成智能设备与控制设备之间的绑定。基于此,本申请中提供的控制终端能够在保护控制设备中登录的主控帐号的帐号安全的情况下,提高智能设备绑定主控帐号的效率。
请参考图6,图6是本申请一个示例性实施例提供的一种绑定帐号的方法的流程图。该绑定帐号的方法可以应用在上述所示的智能设备中。在图6中,绑定帐号的方法包括:
步骤610,扫描控制设备显示的目标图形码,目标图形码包括第一字符串,第一字符串与控制设备中登录的主控帐号具有映射关系。
在本申请实施例中,智能设备能够拍摄控制设备显示的目标图形码。需要说明的是,智能设备在没有接入互联网时,可以处于配网状态。在配网状态中,智能设备能够以目标周期对所采集的各帧图像进行识别,若识别到包含有目标图形码的图像,则可以提取该图像。
步骤620,解析目标图形码获取第二字符串。
可选地,智能设备将根据设备中预设解析规则从目标图形码中提取出第二字符串。需要说明的是,智能设备能够将第一字符串经过预设编码规则编码后的字段,经过预设解析规则解析后得到第二字符串。
可选地,智能设备能够将经过编码的网络接入信息解析后得到网络接入信息。
示意性,当智能设备是按照预设协议处理的设备时,其中设置有预设解析规则,该预设解析规则是与预设编码规则对应的规则。一种可能的实施方式中,目标字符串abcde经过预设编码规则编码后,再经过预设解析规则解析时,将得到原本的目标字符串abcde。
可选的,智能设备还能够解析目标图形码获取网络接入信息,并根据网络接入信息与无线路由器建立通信连接。
在本例中,智能设备可以通过执行步骤(1)、步骤(2)和步骤(3)来实现与无线路由器建立通信连接的操作。
步骤(1),解析网络接入信息中的无线路由器的标识和密钥。
步骤(2),解析网络接入信息中的无线路由器的地址获取方式。
步骤(3),根据无线路由器的标识和密钥与无线路由器建立通信连接,并按照地址获取方式获取互联网通讯协议地址。
其中,步骤(3)在执行的过程中,可以根据地址获取方式的具体类型,确定互联网通讯协议地址(IP 地址)的获取方式。
在一种可能的方式中,当地址获取方式是静态获取时,智能设备可以获取无线路由器提供的指定的静态IP地址。在该方式中,智能设备将接收无线路由器分配的静态IP地址。
在另一种可能的方式中,当地址获取方式是动态分配时,智能设备可以按照动态获取规则获取IP地址。其中,动态获取规则可以是DHCP(Dynamic Host Configuration Protocol,动态主机配置)。
步骤630,向服务器发送第二字符串,第二字符串用于服务器根据映射关系验证智能设备与主控帐号之间建立绑定关系的合法性。
综上所述,本申请提供的绑定帐号的方法,智能设备能够通过扫描控制终端显示的目标图形码,解析得到第二字符串,将第二字符串发送到服务器中,当第二字符串在服务器中存在与其完全相同的第一字符串,服务器将智能设备与主控帐号绑定。由于智能设备能够从控制设备提供的图形码中获取不包含主控帐号的第二字符串,通过第二字符串与主控帐号完成绑定,使得简化智能设备绑定主控帐号的步骤前提下,提高了主控帐号的安全。
请参见图7,图7是本申请一个示例性实施例提供的一种绑定帐号的方法的流程图。该绑定帐号的方法可以应用在上述所示的服务器中。在图7中,绑定帐号的方法包括:
步骤710,接收控制设备发送的请求消息,请求消息用于请求获取第一字符串。
在本申请实施例中,服务器能够接收控制设备发送的请求消息。需要说明的是,控制终端可以预先与服务器建立加密通信,服务器在获取请求消息时便可直接确定是控制设备发送的请求。
在另一种可能的实现方式中,服务器能够不预先与控制设备建立加密通信。在该实现方式中,控制设备向服务器发送请求消息的同时,还将发送控制设备中登录的主控帐号。
步骤720,根据预设规则获取第一字符串。
在本例中,服务器能够根据预设规则获取第一字符串。需要说明的是,服务器既可以生成第一字符串,也可以从已经保存有若干个字符串的预设序列库中选取字符串。其中,第一字符串与控制设备中登录的主控帐号具有映射关系。
可选的,上述映射关系是服务器主动建立的。
在本申请实施例中,服务器能够建立并维护第一字符串与控制设备中登录的主控帐号之间的映射关系。示意性的,该映射关系可以通过映射表的保存。
步骤730,向控制设备发送第一字符串,以使控制设备通过预设方式向智能设备传递第一字符串,第一字符串用于服务器根据映射关系验证智能设备与主控帐号之间建立绑定关系的合法性。
在本例中,服务器能够向控制设备发送第一字符串,该第一字符串用于供控制设备生成目标图形码,被智能设备读取后,再将对应信息发送至服务器,服务器根据该信息验证智能设备与主控帐号绑定安全时,将与主控帐号的绑定。
在本申请实施例中,服务器能够生成并维护主控帐号与第一字符串的映射关系,使得登录在控制设备中的主控帐号在智能设备与之绑定时,无需再令控制设备提供该主控帐号,保障了主控帐号的安全。在第一字符串不慎泄露的情况下,也无需担心主控帐号的泄露,原因在于主控帐号与第一字符串之间是映射的关系,在服务器中的映射关系安全并没有泄露时,主控帐号的安全能够得到有效的保障。
下面通过一个服务器、控制设备和智能设备三者参与的示例,来介绍本申请实施例所示的绑定帐号的方法。
请参见图8,图8是本申请另一个示例性实施例提供的一种绑定帐号的方法流程图。该绑定帐号的方法可以由控制设备、服务器和智能设备配合实现。在图8中,该绑定帐号的方法包括:
步骤801,控制设备向服务器发送请求消息。
其中,请求消息用于请求获取第一字符串。
相应的,服务器接收控制设备发送的请求消息。
步骤802,服务器根据随机数生成函数,生成第一序列。
在一种可能的方式中,服务器调用随机数生成接口,生成第一序列。其中,第一序列是随机序列。
在另一种可能的方式中,服务器直接执行随机数生成函数,生成第一序列。
步骤803,服务器根据第一序列确定第一字符串。
在本申请实施例中,服务器能够通过多种方式确定第一字符串。下面将介绍四个确定第一字符串的方法。
(1)补模确定法:
1)服务器获取第一序列中的首字符。
2)服务器将首字符按n取模,得到结果m,n和m为正整数。
3)服务器在第一序列的尾部增加m,得到第一字符串。
在补模确定法中,服务器能够通过对首字符进行数字化。例如,按照十六进制进行数字化,并按n取模得到数字m,通过在第一序列后增加m,改变了第一序列的长度,增加了恶意的信息截取者获取第一序列的难度。
(2)补数确定法:
1)服务器获取第一序列中的首字符。
2)服务器将首字符按n取模,得到结果m,n和m为正整数。
3)服务器在第一序列的尾部增加m位相同的预设字符,得到第一字符串。
类似于补模确定法,服务器还能够在第一序列后补充m为相同的预设字符,得到第一字符串,实现改变第一序列的长度的效果。
(3)补串确定法:
1)服务器获取第一序列中的首字符。
2)服务器将首字符按n取模,得到结果m,n和m为正整数。
3)服务器根据预设映射关系,确定m对应的校验码k,k为字符或字符串。
4)服务器在第一序列的尾部增加k,得到第一字符串。
在补串确定法中,服务器预先维护m与对应的校验码k之间的映射关系。服务器通过在第一序列后增加k,改变第一序列的长度,增加了恶意的信息截取者获取第一序列的难度。
(4)直接确定法:服务器将第一序列确定为第一字符串。
步骤804,从预设序列库中选取第二序列,第二序列是按照随机选取规则确定的序列。
步骤805,将第二序列确定为第一字符串。
步骤806,服务器建立第一字符串与控制设备中登录的主控帐号的映射关系。
步骤807,设置定时器。
在本例中,响应于定时器未超时,保持主控帐号与第一字符串的映射关系。
在本例中,响应于定时器超时,解除主控帐号与第一字符串的映射关系。
步骤808,服务器向控制设备发送第一字符串。
在本例中,服务器向控制设备发送第一字符串,以使控制设备通过预设方式向智能设备传递第一字符串,第一字符串用于服务器根据映射关系验证智能设备与主控帐号之间建立绑定关系的合法性。
相应的,控制设备接收服务器发送的第一字符串。
步骤809,控制设备根据第一字符串生成目标图形码。
在本申请实施例中,控制设备还能够将网络接入信息一起编入目标图形码。网络接入信息用于接入指定无线路由器。
步骤810,控制设备显示目标图形码。
其中,控制设备显示该目标图形码,以使指定的智能设备根据目标图形码的信息与控制设备中登录的主控帐号进行绑定。
步骤811,智能设备扫描控制设备显示的目标图形码。
其中,步骤811能够令智能设备扫描并解析所述目标图形码后获取第二字符串,所述第二字符串用于服务器根据所述映射关系验证所述智能设备与所述主控帐号之间建立绑定关系的合法性。
步骤812,智能设备解析目标图形码获取第二字符串和网络接入信息。
步骤813,智能设备根据网络接入信息与无线路由器建立通信连接。
步骤814,智能设备通过无线路由器向服务器发送第二字符串。
相应的,服务器接收智能设备发送的第二字符串。
步骤815,服务器响应于第二字符串和第一字符串相同,将智能设备绑定至主控帐号。
步骤816,服务器获取主控帐号所对应的域,将智能设备添加到域中。
示意性的,主控帐号可以仅对应一个域。例如,主控帐号杰克仅对应杰克的家这一个域。在该情况下,服务器将智能设备添加到该域中。
可选地,当主控帐号对应至少两个域时,例如,主控帐号布朗对应布朗的家和布朗的办公室两个域。服务器在确定主控帐号所对应的域时,可以根据控制设备当前所在的地理位置,确定对应的域。例如,控制设备在发送请求消息时所在的地理位置是ABC办公楼,则服务器能够根据预先存储的域的地理位置,确定地理位置对应的域是布朗的办公室,随后,服务器将智能设备添加到该域中。
在本申请中,若服务器中的定时器超时,则接触主控帐号与第一字符串之间的映射关系。需要说明的是,定时器是在服务器确定第一字符串时自动设定的。定时器的时长可以设定为5分钟、10分钟或者15分钟等时长,本申请实施例对此不作限定。
在本申请实施例中,服务器中能够在控制设备申请获取第一字符串时,在服务器中维护主控帐号与第 一字符串之间的映射关系,并将第一字符串发送至控制设备;控制设备根据第一字符串和网络接入信息,通过预设的编码规则生成对应的图形码;智能设备扫描该图形码,并从该图形码中解析出第二字符串和网络接入信息,再根据网络接入信息接入无线路由器,通过无线路由器将第二字符串发送至服务器;服务器在第二字符串和第一字符串相同的情况下,将智能设备与主控帐号建立连接。由于智能设备能够在扫描到图形码后直接连入互联网,并在服务器中与主控帐号进行绑定,简化了智能设备联网绑定的操作,同时提高了主控帐号的安全性,避免了主控帐号的泄露。
下述为本申请装置实施例,可以用于执行本申请方法实施例。对于本申请装置实施例中未披露的细节,请参照本申请方法实施例。
请参考图9,图9是本申请一个示例性实施例提供的一种绑定帐号的装置的结构框图。该绑定帐号的装置可以通过软件、硬件或者两者的结合实现成为服务器的全部或一部分。该装置包括:
第一接收模块910,用于接收控制设备发送的请求消息,所述请求消息用于请求第一字符串;
字符串获取模块920,用于根据预设规则生成所述第一字符串,所述第一字符串与所述控制设备中登录的主控帐号具有映射关系;
第一发送模块930,用于向所述控制设备发送所述第一字符串,以使所述控制设备通过预设方式向智能设备传递所述第一字符串,所述第一字符串用于所述服务器根据所述映射关系验证所述智能设备与所述主控帐号之间建立绑定关系的合法性。
在一个可选的实施例中,所述装置还包括执行模块,所述执行模块用于接收所述智能设备发送的第二字符串;响应于所述第二字符串与所述第一字符串匹配,建立所述智能设备与所述主控帐号之间的绑定关系。
在一个可选的实施例中,所述装置还包括定时模块,用于设置定时器;响应于所述定时器超时,解除所述主控帐号与所述第一字符串的映射关系。
在一个可选的实施例中,所述字符串获取模块920,用于根据随机数生成函数生成第一序列,所述第一序列是随机序列;根据所述第一序列确定所述第一字符串。
在一个可选的实施例中,所述字符串获取模块920,用于获取所述第一序列中的首字符;将所述首字符按n取模,得到结果m,n和m为正整数;在所述第一序列的尾部增加m,得到所述第一字符串。
在一个可选的实施例中,所述字符串获取模块920,用于获取所述第一序列中的首字符;将所述首字符按n取模,得到结果m,n和m为正整数;在所述第一序列的尾部增加m位相同的预设字符,得到所述第一字符串。
在一个可选的实施例中,所述字符串获取模块920,用于获取所述第一序列中的首字符;将所述首字符按n取模,得到结果m,n和m为正整数;根据预设映射关系,确定m对应的校验码k,k为字符或字符串;在所述第一序列的尾部增加k,得到所述第一字符串。
在一个可选的实施例中,所述字符串获取模块920,用于将所述第一序列确定为所述第一字符串。
在一个可选的实施例中,所述字符串获取模块920,用于从预设序列库中选取第二序列,所述第二序列是按照随机选取规则确定的序列;将所述第二序列确定为所述第一字符串。
在一个可选的实施例中,所述装置还包括绑定模块,用于接收智能设备发送的第二字符串;响应于所述第二字符串和所述第一字符串相同,检测所述定时器是否超时;响应于所述定时器未超时,将所述智能设备绑定至所述主控帐号。
在一个可选的实施例中,所述绑定模块,用于获取所述主控帐号所对应的域,将所述智能设备添加到所述域中。
在一个可选的实施例中,所述绑定模块,用于获取所述控制设备发送所述请求消息时的地理位置;从至少两个所述域中,确定所述地理位置对应的域,所述主控帐号对应至少两个域。
综上所述,本实施例提供的绑定帐号的装置中,服务器能够生成并维护主控帐号与第一字符串的映射关系,使得登录在控制设备中的主控帐号在智能设备与之绑定时,无需再令控制设备提供该主控帐号,保障了主控帐号的安全。在第一字符串不慎泄露的情况下,也无需担心主控帐号的泄露,原因在于主控帐号与第一字符串之间是映射的关系,在服务器中的映射关系安全并没有泄露时,主控帐号的安全能够得到有效的保障。
请参考图10,图10是本申请一个示例性实施例提供的一种绑定帐号的装置的结构框图。该绑定帐号的装置可以通过软件、硬件或者两者的结合实现成为控制设备的全部或一部分。该装置包括:
第二发送模块1010,用于向服务器发送请求消息,所述请求消息用于请求第一字符串;
第二接收模块1020,用于接收所述服务器发送的所述第一字符串,所述第一字符串与所述控制设备中登录的主控帐号具有映射关系;
图形码生成模块1030,用于根据所述第一字符串生成目标图形码;
图形码显示模块1040,用于显示所述目标图形码,以使智能设备扫描并解析所述目标图形码后获取第二字符串,所述第二字符串用于服务器根据所述映射关系验证所述智能设备与所述主控帐号之间建立绑定关系的合法性。
在一个可选的实施例中,所述图形码生成模块1030,用于获取网络接入信息,所述网络接入信息用于接入指定的无线路由器;根据预设编码规则编码所述第一字符串和所述网络接入信息,并生成所述目标图形码。
在一个可选的实施例中,所述图形码生成模块1030,用于根据基于64个可打印字符来表示二进制数据的编码规则,将经过所述预设编码规则编码的所述第一字符串和所述网络接入信息生成为所述目标图形码。
在本申请实施例提供的装置中,控制终端能够向服务器发送请求,获取服务器发送的第一字符串,根据第一字符串生成目标图形码,最终在屏幕中显示该目标图形码。由于控制终端能够通过第一字符串替代控制终端中登录的主控帐号,并通过图形码的形式显示,令智能设备能够从目标图形码中解析出相应的第二字符串,最终在服务器中通过验证的情况下,完成智能设备与控制设备之间的绑定。基于此,本申请中提供的控制终端能够在保护控制设备中登录的主控帐号的帐号安全的情况下,提高智能设备绑定主控帐号的效率。
请参考图11,图11是本申请一个示例性实施例提供的一种绑定帐号的装置的结构框图。该绑定帐号的装置可以通过软件、硬件或者两者的结合实现成为智能设备的全部或一部分。该装置包括:
扫码模块1110,用于扫描控制设备显示的目标图形码,所述目标图形码包括第一字符串,所述第一字符串与所述控制设备中登录的主控帐号具有映射关系;
解析模块1120,用于解析所述目标图形码获取第二字符串;
第三发送模块1130,用于向服务器发送所述第二字符串,所述第二字符串用于所述服务器根据所述映射关系验证所述智能设备与所述主控帐号之间建立绑定关系的合法性。
在一个可选的实施例中,所述装置还包括联网模块,用于解析所述目标图形码获取所述网络接入信息。其中,所述目标图形码还包括网络接入信息,所述网络接入信息用于接入指定的无线路由器。
综上所述,本申请提供的绑定帐号的装置,智能设备能够通过扫描控制终端显示的目标图形码,解析得到第二字符串,将第二字符串发送到服务器中,当第二字符串在服务器中存在与其完全相同的第一字符串,服务器将智能设备与主控帐号绑定。由于智能设备能够从控制设备提供的图形码中获取不包含主控帐号的第二字符串,通过第二字符串与主控帐号完成绑定,使得简化智能设备绑定主控帐号的步骤前提下,提高了主控帐号的安全。
本申请实施例还提供了一种计算机可读介质,该计算机可读介质存储有至少一条指令,所述至少一条指令由所述处理器加载并执行以实现如上各个实施例所述的绑定帐号的方法。
需要说明的是:上述实施例提供的绑定帐号的装置在执行绑定帐号的方法时,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将设备的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。另外,上述实施例提供的绑定帐号的装置与绑定帐号的方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。
上述本申请实施例序号仅仅为了描述,不代表实施例的优劣。
本领域普通技术人员可以理解实现上述实施例的全部或部分步骤可以通过硬件来完成,也可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,上述提到的存储介质可以是只读存储器,磁盘或光盘等。
以上所述仅为本申请的能够实现的示例性的实施例,并不用以限制本申请,凡在本申请的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。

Claims (22)

  1. 一种绑定帐号的方法,其中,应用于服务器中,所述方法包括:
    接收控制设备发送的请求消息,所述请求消息用于请求第一字符串;
    根据预设规则生成所述第一字符串,所述第一字符串与所述控制设备中登录的主控帐号具有映射关系;
    向所述控制设备发送所述第一字符串,以使所述控制设备通过预设方式向智能设备传递所述第一字符串,所述第一字符串用于所述服务器根据所述映射关系验证所述智能设备与所述主控帐号之间建立绑定关系的合法性。
  2. 根据权利要求1所述的方法,所述方法还包括:
    接收所述智能设备发送的第二字符串;
    响应于所述第二字符串与所述第一字符串匹配,建立所述智能设备与所述主控帐号之间的绑定关系。
  3. 根据权利要求1所述的方法,在所述根据预设规则获取所述第一字符串之后,所述方法还包括:
    设置定时器;
    响应于所述定时器超时,解除所述主控帐号与所述第一字符串之间的映射关系。
  4. 根据权利要求1所述的方法,所述根据预设规则获取所述第一字符串,包括:
    根据随机数生成函数生成第一序列,所述第一序列是随机序列;
    根据所述第一序列确定所述第一字符串。
  5. 根据权利要求4所述的方法,所述根据所述第一序列确定所述第一字符串,包括:
    获取所述第一序列中的首字符;
    将所述首字符按n取模,得到结果m,n和m为正整数;
    在所述第一序列的尾部增加m,得到所述第一字符串;
    或,
    获取所述第一序列中的首字符;
    将所述首字符按n取模,得到结果m,n和m为正整数;
    在所述第一序列的尾部增加m位相同的预设字符,得到所述第一字符串;
    或,
    获取所述第一序列中的首字符;
    将所述首字符按n取模,得到结果m,n和m为正整数;
    根据预设映射关系,确定m对应的校验码k,k为字符或字符串;
    在所述第一序列的尾部增加k,得到所述第一字符串;
    或,
    将所述第一序列确定为所述第一字符串。
  6. 根据权利要求3所述的方法,所述根据预设规则获取所述第一字符串,包括:
    从预设序列库中选取第二序列,所述第二序列是按照随机选取规则确定的序列;
    将所述第二序列确定为所述第一字符串。
  7. 根据权利要求2所述的方法,所述建立所述智能设备与所述主控帐号之间的绑定关系之后,所述方法还包括:
    获取所述主控帐号所对应的域,将所述智能设备添加到所述域中。
  8. 根据权利要求7所述的方法,所述主控帐号对应至少两个域,所述获取所述主控帐号所对应的域,包括:
    获取所述控制设备发送所述请求消息时的地理位置;
    从至少两个所述域中,确定所述地理位置对应的域。
  9. 一种绑定帐号的方法,其中,应用于控制设备中,所述方法包括:
    向服务器发送请求消息,所述请求消息用于请求第一字符串;
    接收所述服务器发送的所述第一字符串,所述第一字符串与所述控制设备中登录的主控帐号具有映射关系;
    根据所述第一字符串生成目标图形码;
    显示所述目标图形码,以使智能设备扫描并解析所述目标图形码后获取第二字符串,所述第二字符串用于服务器根据所述映射关系验证所述智能设备与所述主控帐号之间建立绑定关系的合法性。
  10. 根据权利要求9所述的方法,所述根据所述第一字符串生成目标图形码包括:
    获取网络接入信息,所述网络接入信息用于接入指定的无线路由器;
    根据预设编码规则编码所述第一字符串和所述网络接入信息,并生成所述目标图形码。
  11. 根据权利要求10所述的方法,所述生成所述目标图形码,还包括:
    根据基于64个可打印字符来表示二进制数据的编码规则,将经过所述预设编码规则编码的所述第一字符串和所述网络接入信息生成为所述目标图形码。
  12. 一种绑定帐号的方法,其中,应用于智能设备中,所述智能设备具有图像采集组件,所述方法包括:
    扫描控制设备显示的目标图形码,所述目标图形码包括第一字符串,所述第一字符串与所述控制设备中登录的主控帐号具有映射关系;
    解析所述目标图形码获取第二字符串;
    向服务器发送所述第二字符串,所述第二字符串用于所述服务器根据所述映射关系验证所述智能设备与所述主控帐号之间建立绑定关系的合法性。
  13. 根据权利要求12所述的方法,所述目标图形码还包括网络接入信息,所述网络接入信息用于接入指定的无线路由器;
    所述向服务器发送所述第二字符串之前,所述方法还包括:
    解析所述目标图形码获取所述网络接入信息;
    根据所述网络接入信息接入所述无线路由器。
  14. 一种绑定帐号的装置,其中,应用于服务器中,所述装置包括:
    第一接收模块,用于接收控制设备发送的请求消息,所述请求消息用于请求第一字符串;
    字符串获取模块,用于根据预设规则生成所述第一字符串,所述第一字符串与所述控制设备中登录的主控帐号具有映射关系;
    第一发送模块,用于向所述控制设备发送所述第一字符串,以使所述控制设备通过预设方式向智能设备传递所述第一字符串,所述第一字符串用于所述服务器根据所述映射关系验证所述智能设备与所述主控帐号之间建立绑定关系的合法性。
  15. 一种绑定帐号的装置,其中,应用于控制设备中,所述装置包括:
    第二发送模块,用于向服务器发送请求消息,所述请求消息用于请求第一字符串;
    第二接收模块,用于接收所述服务器发送的所述第一字符串,所述第一字符串与所述控制设备中登录的主控帐号具有映射关系;
    图形码生成模块,用于根据所述第一字符串生成目标图形码;
    图形码显示模块,用于显示所述目标图形码,以使智能设备扫描并解析所述目标图形码后获取第二字符串,所述第二字符串用于服务器根据所述映射关系验证所述智能设备与所述主控帐号之间建立绑定关系的合法性。
  16. 一种绑定帐号的装置,其中,应用于智能设备中,所述智能设备包括图像采集组件,所述装置包括:
    扫码模块,用于扫描控制设备显示的目标图形码,所述目标图形码包括第一字符串,所述第一字符串与所述控制设备中登录的主控帐号具有映射关系;
    解析模块,用于解析所述目标图形码获取第二字符串;
    第三发送模块,用于向服务器发送所述第二字符串,所述第二字符串用于所述服务器根据所述映射 关系验证所述智能设备与所述主控帐号之间建立绑定关系的合法性。
  17. 一种服务器,其中,所述服务器包括处理器、和与所述处理器相连的存储器,所述存储器上存储有程序指令,所述处理器执行所述程序指令时实现如权利要求1至7任一所述的绑定帐号的方法。
  18. 一种控制设备,其中,所述控制设备包括处理器、和与所述处理器相连的存储器,所述存储器上存储有程序指令,所述处理器执行所述程序指令时实现如权利要求8或9所述的绑定帐号的方法。
  19. 一种智能设备,其中,所述智能设备包括处理器、和与所述处理器相连的存储器,所述存储器上存储有程序指令,所述处理器执行所述程序指令时实现如权利要求10至12任一所述的绑定帐号的方法。
  20. 一种计算机可读存储介质,所述存储介质中存储有程序指令,其中,所述程序指令被处理器执行时实现如权利要求1至7任一所述的绑定帐号的方法。
  21. 一种计算机可读存储介质,所述存储介质中存储有程序指令,其中,所述程序指令被处理器执行时实现如权利要求8或9所述的绑定帐号的方法。
  22. 一种计算机可读存储介质,所述存储介质中存储有程序指令,其中,所述程序指令被处理器执行时实现如权利要求10至12任一所述的绑定帐号的方法。
PCT/CN2021/118359 2020-09-14 2021-09-14 绑定帐号的方法、装置、终端及存储介质 WO2022053069A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP21866121.3A EP4213047A4 (en) 2020-09-14 2021-09-14 ACCOUNT BINDING METHOD AND DEVICE, TERMINAL AND STORAGE MEDIUM
US18/147,708 US20230217248A1 (en) 2020-09-14 2022-12-29 Account binding method, control device, and smart device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010960187.5 2020-09-14
CN202010960187.5A CN114186214A (zh) 2020-09-14 2020-09-14 绑定帐号的方法、装置、终端及存储介质

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US18/147,708 Continuation US20230217248A1 (en) 2020-09-14 2022-12-29 Account binding method, control device, and smart device

Publications (1)

Publication Number Publication Date
WO2022053069A1 true WO2022053069A1 (zh) 2022-03-17

Family

ID=80539656

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/118359 WO2022053069A1 (zh) 2020-09-14 2021-09-14 绑定帐号的方法、装置、终端及存储介质

Country Status (4)

Country Link
US (1) US20230217248A1 (zh)
EP (1) EP4213047A4 (zh)
CN (1) CN114186214A (zh)
WO (1) WO2022053069A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114726664A (zh) * 2022-03-23 2022-07-08 青岛海信智慧生活科技股份有限公司 家居设备的绑定方法及设备
CN115862192A (zh) * 2022-11-07 2023-03-28 北京深盾科技股份有限公司 控制方法、控制系统、电子设备及存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070033150A1 (en) * 2005-08-08 2007-02-08 Enenia Biometrics, Inc. Biometric web payment system
US20110041147A1 (en) * 2009-08-13 2011-02-17 At&T Intellectual Property I, L.P. Blackouts of video on demand multimedia content
CN105119931A (zh) * 2015-09-11 2015-12-02 深圳市亚略特生物识别科技有限公司 应用登录方法及系统
CN107566404A (zh) * 2017-10-18 2018-01-09 厦门吉比特网络技术股份有限公司 一种扫码组登录方法
CN110505184A (zh) * 2018-05-18 2019-11-26 深圳企业云科技股份有限公司 一种企业网盘安全登录认证系统及方法

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107071343A (zh) * 2016-12-20 2017-08-18 上海斐讯数据通信技术有限公司 一种监视器、监视系统和监视器连接无线网络的方法
BR102018074209A2 (pt) * 2018-11-23 2020-06-02 Samsung Eletrônica da Amazônia Ltda. Método seguro para configurar dispositivos de internet das coisas (iot) por meio de tecnologias sem fio

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070033150A1 (en) * 2005-08-08 2007-02-08 Enenia Biometrics, Inc. Biometric web payment system
US20110041147A1 (en) * 2009-08-13 2011-02-17 At&T Intellectual Property I, L.P. Blackouts of video on demand multimedia content
CN105119931A (zh) * 2015-09-11 2015-12-02 深圳市亚略特生物识别科技有限公司 应用登录方法及系统
CN107566404A (zh) * 2017-10-18 2018-01-09 厦门吉比特网络技术股份有限公司 一种扫码组登录方法
CN110505184A (zh) * 2018-05-18 2019-11-26 深圳企业云科技股份有限公司 一种企业网盘安全登录认证系统及方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP4213047A4 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114726664A (zh) * 2022-03-23 2022-07-08 青岛海信智慧生活科技股份有限公司 家居设备的绑定方法及设备
CN114726664B (zh) * 2022-03-23 2023-10-27 青岛海信智慧生活科技股份有限公司 家居设备的绑定方法及设备
CN115862192A (zh) * 2022-11-07 2023-03-28 北京深盾科技股份有限公司 控制方法、控制系统、电子设备及存储介质
CN115862192B (zh) * 2022-11-07 2023-11-03 北京深盾科技股份有限公司 控制方法、控制系统、电子设备及存储介质

Also Published As

Publication number Publication date
EP4213047A1 (en) 2023-07-19
CN114186214A (zh) 2022-03-15
EP4213047A4 (en) 2024-02-21
US20230217248A1 (en) 2023-07-06

Similar Documents

Publication Publication Date Title
CN108901022B (zh) 一种微服务统一鉴权方法及网关
EP3425566B1 (en) Electronic device and method of registering personal cloud apparatus in user portal server thereof
US20190037399A1 (en) Ap connection method, terminal, and server
WO2019158028A1 (zh) 一种通信方法及装置
US20230217248A1 (en) Account binding method, control device, and smart device
KR101270323B1 (ko) 단일 서비스 사인 온을 제공하는 방법, 장치 및 컴퓨터 판독가능 저장 매체
US9338164B1 (en) Two-way authentication using two-dimensional codes
US9979725B1 (en) Two-way authentication using two-dimensional codes
CN104602238B (zh) 一种无线网络连接方法、装置和系统
CN105306211B (zh) 一种客户端软件的身份认证方法
WO2018120913A1 (zh) 一种获取证书、鉴权的方法及网络设备
CN107196917B (zh) 一种服务响应方法及其中间件
WO2017088634A1 (zh) 第三方应用认证方法、认证服务器、终端及管理服务器
JP2022541760A (ja) コアネットワークドメインにおける証明書ハンドリングのための技法
JP5675747B2 (ja) 無線通信システム、携帯端末、デジタルカメラ、通信方法およびプログラム
WO2014127751A1 (zh) 无线终端配置方法及装置和无线终端
JP6166937B2 (ja) 認証方法および認証システム
CN114697879A (zh) 蓝牙配对方法、电子设备、芯片和存储介质
WO2023141876A1 (zh) 数据传输方法、装置、系统、电子设备及可读介质
CN112511569B (zh) 网络资源访问请求的处理方法、系统及计算机设备
CN106537962A (zh) 无线网络配置、接入和访问方法、装置及设备
CN110555175A (zh) 二维码解析和生成方法及设备
CN115150075A (zh) 基于共享密钥进行数据通信的方法、装置、设备和介质
CN208061282U (zh) 一种二维码控制装置及其闸机系统
CN114679287B (zh) 数据处理方法、系统、电子设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21866121

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2021866121

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2021866121

Country of ref document: EP

Effective date: 20230414