WO2023030009A1 - 智能设备的跨平台绑定方法、系统及相关设备 - Google Patents

智能设备的跨平台绑定方法、系统及相关设备 Download PDF

Info

Publication number
WO2023030009A1
WO2023030009A1 PCT/CN2022/113019 CN2022113019W WO2023030009A1 WO 2023030009 A1 WO2023030009 A1 WO 2023030009A1 CN 2022113019 W CN2022113019 W CN 2022113019W WO 2023030009 A1 WO2023030009 A1 WO 2023030009A1
Authority
WO
WIPO (PCT)
Prior art keywords
cloud platform
smart device
user
encrypted
user account
Prior art date
Application number
PCT/CN2022/113019
Other languages
English (en)
French (fr)
Inventor
井皓
Original Assignee
青岛海尔科技有限公司
海尔智家股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 青岛海尔科技有限公司, 海尔智家股份有限公司 filed Critical 青岛海尔科技有限公司
Publication of WO2023030009A1 publication Critical patent/WO2023030009A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/084Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol

Definitions

  • the present disclosure relates to the technical field of smart home, and in particular to a cross-platform binding method and system for smart devices and related devices.
  • the smart terminal configures smart home devices from different manufacturers to the corresponding cloud platform of the smart home device, the problem of binding the user account of the smart terminal to the smart home device cannot be solved, and cross-platform access cannot be realized.
  • the embodiments of the present disclosure provide a cross-platform binding method and system for smart devices and related devices, so as to solve the problem that cross-platform access of smart home devices cannot be realized in the prior art.
  • the first aspect of the embodiments of the present disclosure discloses a cross-platform binding method for smart devices, which is applied to the second cloud platform, and the method includes: in the application program APP After opening the access point in advance and accessing the smart device, receiving the user credential sent by the smart device that has passed legality verification, and generating a second user account of the smart device on the second cloud platform according to the user credential ; Binding the smart device to the second user account, and generating an access token, binding the access token to the second user account; sending the access token to the first cloud platform , and bind with the first user account created by the smart device on the first cloud platform, so that the smart device uses the access token to access the second cloud platform through the first cloud platform.
  • the second aspect of the embodiment of the present disclosure discloses a cross-platform binding method for smart devices, which is applied to an application program APP.
  • the method includes: opening an access point in advance and accessing the smart device; receiving the data sent by the second cloud platform The device legal information of the smart device that has passed the legality verification, and obtain the user credential from the device legal information; send the user credential to the second cloud platform, so that the second cloud platform according to the The user credential generates a second user account of the smart device on the second cloud platform, binds the smart device to the second user account, generates an access token, and binds the access token to the second cloud platform.
  • Two user accounts are bound, the access token is sent to the first cloud platform, and is bound to the first user account created by the smart device on the first cloud platform, so that the smart device uses the access token
  • the token accesses the second cloud platform through the first cloud platform.
  • the third aspect of the embodiment of the present disclosure discloses a cross-platform binding method for smart devices, which is applied to the first cloud platform.
  • the method includes: receiving an access token sent by the second cloud platform, and the access token is connected to the smart
  • the device is bound to the second user account generated by the second cloud platform, and the second user account is received by the second cloud platform after the application APP pre-opens the access point and accesses the smart device.
  • the fourth aspect of the embodiment of the present disclosure discloses a second cloud platform.
  • the second cloud platform includes: a first receiving module, configured to receive the passed The user credential sent by the smart device for legitimacy verification is used to generate the second user account of the smart device on the second cloud platform according to the user credential; the binding and generation module is configured to combine the smart device with the The second user account is bound, and an access token is generated, and the access token is bound to the second user account; the first sending module is configured to send the access token to the first cloud platform , and bind with the first user account created by the smart device on the first cloud platform, so that the smart device uses the access token to access the second cloud platform through the first cloud platform.
  • the fifth aspect of the embodiment of the present disclosure discloses an application program APP, the APP includes: an access module, configured to pre-open the access point and access the smart device; a first processing module, configured to receive the second cloud platform The sent device legal information of the smart device that has passed the legality verification, and obtains the user credential from the device legal information; the second sending module is configured to send the user credential to the second cloud platform, so that The second cloud platform generates a second user account of the smart device on the second cloud platform according to the user credential, binds the smart device to the second user account, and generates an access token, and The access token is bound to the second user account, the access token is sent to the first cloud platform, and bound to the first user account created by the smart device on the first cloud platform, enabling the smart device to use the access token to access the second cloud platform through the first cloud platform.
  • the sixth aspect of the embodiment of the present disclosure discloses a first cloud platform
  • the first cloud platform includes: a second receiving module, configured to receive the access token sent by the second cloud platform, and the access token is connected with the smart device
  • the second user account generated by the second cloud platform is bound, and the second user account is received by the second cloud platform after the application program APP opens the access point in advance and accesses the smart device.
  • the user credential sent by the smart device for legitimacy verification generates a second user account of the smart device on the second cloud platform according to the user credential;
  • a binding module is configured to bind the access token to the smart
  • the first user account created by the device on the first cloud platform is bound;
  • the third processing module is configured to enable the smart device to access the second cloud platform by using the access token.
  • the seventh aspect of the embodiment of the present disclosure discloses a cross-platform binding system for smart devices, including: a smart device, an application program APP, a first cloud platform, and a second cloud platform; the smart device is set to enable the network distribution mode , scan the access point enabled by the APP to access the APP; the APP is set to open the access point in advance and access the smart device, and receive the pass legality sent by the second cloud platform Verifying the device legal information of the smart device, and obtaining the user credential from the device legal information; sending the user credential to the second cloud platform; the second cloud platform is set to verify the the legitimacy of the smart device, and send the device legitimacy information of the smart device to the APP, receive the user credential sent by the APP, and generate the smart device on the second cloud platform according to the user credential second user account, and bind the smart device to the second user account, generate an access token, bind the access token to the second user account, and send the access token to the first cloud platform; the first cloud platform is configured to receive the access token
  • the eighth aspect of the embodiments of the present disclosure discloses an electronic device, the electronic device includes a memory and a processor, a computer program is stored in the memory, and the processor is configured to execute the computer program according to the implementation of the present disclosure through the computer program.
  • the cross-platform binding method for smart devices described in any one of the first aspects or, the cross-platform binding method for smart devices described in any one of the second aspects of the embodiments of the present disclosure, or, the first aspect of the embodiments of the present disclosure
  • the ninth aspect of the embodiments of the present disclosure discloses a storage medium, where a computer program is stored in the storage medium, wherein when the computer program is running, the device where the storage medium is located is controlled to execute the method described in the first aspect of the embodiments of the present disclosure.
  • Any of the cross-platform binding methods for smart devices, or, any of the cross-platform binding methods for smart devices described in the second aspect of the embodiments of the present disclosure, or, the third aspect of the embodiments of the present disclosure A cross-platform binding method for smart devices.
  • FIG. 1 is a schematic flowchart of a cross-platform binding method for smart devices provided by an embodiment of the present disclosure
  • FIG. 2 is a schematic flow diagram of verifying the legitimacy of a smart device provided by an embodiment of the present disclosure
  • FIG. 3 is a schematic flow diagram of a decryption and verification summary provided by an embodiment of the present disclosure
  • FIG. 4 is a schematic flow diagram of decrypting user credentials provided by an embodiment of the present disclosure.
  • FIG. 5 is a schematic flowchart of another cross-platform binding method for smart devices provided by an embodiment of the present disclosure
  • FIG. 6 is a schematic flowchart of another cross-platform binding method for smart devices provided by an embodiment of the present disclosure.
  • FIG. 7 is a schematic flowchart of another cross-platform binding method for smart devices provided by an embodiment of the present disclosure.
  • FIG. 8 is an interactive schematic diagram of a cross-platform binding method applied to smart devices provided by an embodiment of the present disclosure
  • FIG. 9 is a schematic structural diagram of a second cloud platform provided by an embodiment of the present disclosure.
  • FIG. 10 is a schematic structural diagram of another second cloud platform provided by an embodiment of the present disclosure.
  • FIG. 11 is a schematic structural diagram of an application program APP provided by an embodiment of the present disclosure.
  • FIG. 12 is a schematic structural diagram of another application program APP provided by an embodiment of the present disclosure.
  • FIG. 13 is a schematic structural diagram of another application program APP provided by an embodiment of the present disclosure.
  • FIG. 14 is a schematic structural diagram of a first cloud platform provided by an embodiment of the present disclosure.
  • FIG. 15 is a schematic structural diagram of a cross-platform binding system for smart devices provided by an embodiment of the present disclosure.
  • FIG. 16 is a schematic structural diagram of an electronic device 160 provided by an embodiment of the present disclosure.
  • the term "comprises”, “comprises” or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, article, or apparatus comprising a set of elements includes not only those elements, but also includes none. other elements specifically listed, or also include elements inherent in such a process, method, article, or apparatus.
  • an element defined by the phrase “comprising a " does not exclude the presence of additional identical elements in the process, method, article or apparatus comprising said element.
  • the embodiments of the present disclosure provide a smart device binding method, system, and related devices.
  • an access token is generated, and the second user account is bound based on the access token.
  • the second user account is bound to the first user account created by the smart device on the first cloud platform, so that the smart device can use the access token to access the second cloud platform through the account of the first cloud platform, that is, to realize the cross-platform of smart home devices Binding and access purposes.
  • smart home devices are smart devices.
  • FIG. 1 it is a schematic flowchart of a cross-platform binding method for smart devices provided by an embodiment of the present disclosure.
  • the cross-platform binding method for smart devices is applied to a second cloud platform, and the second cloud platform is a smart The cloud platform to which the device belongs.
  • the smart device and the second cloud platform belong to the same manufacturer. Smart devices are connected to the second cloud platform.
  • the second cloud platform is the cloud platform to which the smart device belongs.
  • the smart device may be an air conditioner, or other smart devices such as a refrigerator, which is not limited in the present disclosure.
  • the cross-platform binding method of the smart device mainly includes the following steps:
  • Step S101 After the application APP pre-opens the access point and accesses the smart device, receives the user credential sent by the smart device that has passed legality verification, and generates the second user account of the smart device on the second cloud platform according to the user credential.
  • the user credential is an encrypted user credential
  • the user credential is obtained by the application program APP, and encrypted by the APP using the public key of the second cloud platform.
  • the user credential is the basis for the second cloud platform to verify the identity of the user or generate the second user account of the second cloud platform. If the user has a second user account on the second cloud platform, the user credential contains information about the second user account and password; if the user does not have a second user account on the second cloud platform, the user credential only contains Information about the second user account.
  • the second cloud platform public key and the second cloud platform private key are a pair. If the user credential is encrypted using the second cloud platform public key, in the subsequent decryption operation, you need Use the private key of the second cloud platform to decrypt the encrypted user credentials.
  • the second cloud platform public key and the second cloud platform private key are a pair. If the second cloud platform private key is used to encrypt the user credential, in the subsequent decryption operation, you need The encrypted user certificate is decrypted by using the public key of the second cloud platform.
  • the access point of APP2 may be an AP (Access Point, wireless access point) hotspot, Bluetooth, or WiFi, which is not limited in the present disclosure.
  • AP Access Point, wireless access point
  • WiFi Wireless Fidelity
  • the access point is an access point with a specific name, where the specific name may be a name in a specific format, or a name with specific characters, and the name has been agreed with the smart device manufacturer in advance.
  • the access point is Tenda_100.
  • step S101 after the application program APP pre-opens the access point and accesses the smart device, the second cloud platform receives the user credential sent by the smart device that has passed the legality verification,
  • the second cloud platform After the second cloud platform receives the user credential, since the user credential is encrypted by the APP using the public key of the second cloud platform, the user credential can be decrypted by using the private key of the second cloud platform to obtain the decrypted user credential. Then, generate a second cloud platform user account according to the obtained decrypted user credentials.
  • Step S102 Bind the smart device with the second user account, generate an access token, and bind the access token with the second user account.
  • the second cloud platform binds the smart device with the generated second user account, after the binding is completed, generates an access token, and uses the generated The access token of is bound to the second user account.
  • Step S103 Send the access token to the first cloud platform, and bind it to the first user account created by the smart device on the first cloud platform, so that the smart device uses the access token to access the second cloud platform through the first cloud platform.
  • the first cloud platform is the cloud platform to which the APP belongs.
  • the APP and First Cloud Platform belong to the same manufacturer.
  • the APP is connected to the first cloud platform.
  • the first cloud platform and the second cloud platform have realized interconnection.
  • step S103 in the second cloud platform, after the binding of the access token and the second user account is completed, device binding success information is generated, and the second cloud platform combines the device binding success information and the generated access token.
  • the token is sent to the first cloud platform and bound to the first user account built by the smart device on the first cloud platform.
  • the first cloud platform can use The access pass accesses the second cloud platform without using the user's second user account to access the second cloud platform, preventing the second user account from leaking to the first cloud platform, that is, making the smart device use the access token to pass through the first cloud platform.
  • the cloud platform accesses the second cloud platform.
  • the application program APP opens the access point in advance and accesses the smart device, it receives the user credential sent by the smart device that has passed the legality verification, and according to the user Credentials generate the second user account of the smart device on the second cloud platform; bind the smart device to the second user account, generate an access token, and bind the access token to the second user account; send the access token to The first cloud platform is bound to the first user account created by the smart device on the first cloud platform, so that the smart device uses the access token to access the second cloud platform through the first cloud platform.
  • an access token is generated, and based on the access token, the second user account is bound to the first user account created by the smart device on the first cloud platform,
  • the smart device uses the access token to access the second cloud platform through the account of the first cloud platform, that is, realizes the purpose of cross-platform binding and access of the smart device.
  • step S101 is performed to receive the user credentials sent by the smart devices that have passed the legality verification, as shown in FIG. 2 , which is an example of this disclosure.
  • a schematic flow chart for verifying the legitimacy of a smart device provided in an embodiment mainly includes the following steps:
  • Step S201 Receive the digest and the encrypted digest sent by the smart device through the APP and the first cloud platform.
  • the digest at least includes information of the smart device, the digest is created by the smart device, and is encrypted by the smart device using a preset key.
  • the preset key is a preset key.
  • the smart device sends the created summary and the encrypted summary to the APP
  • the APP sends the smart device created summary and the encrypted summary to the first cloud platform
  • the first cloud platform sends the smart device
  • the created digest and the encrypted digest are sent to the second cloud platform.
  • the second cloud platform receives the digest and the encrypted digest sent by the smart device through the APP and the first cloud platform.
  • Step S202 Use the preset key to decrypt the encrypted digest, and verify the validity of the obtained digest to determine the legitimacy of the smart device.
  • step S202 in the second cloud platform, after receiving the abstract and the encrypted abstract sent by the smart device through the APP and the first cloud platform, the second cloud platform needs to decrypt the encrypted abstract, Therefore, the encrypted digest can be decrypted by using the preset key to obtain the decrypted digest, and the legality of the decrypted digest can be verified to determine the legitimacy of the smart device.
  • step S202 to decrypt the encrypted abstract by using the preset key, and verify the validity of the obtained abstract to determine the legitimacy of the smart device, as shown in Figure 3, which is an embodiment of the present disclosure
  • a schematic flow diagram of decryption and verification digest is provided, which mainly includes the following steps:
  • Step S301 Use the preset key to decrypt the encrypted digest to obtain the decrypted digest.
  • the abstract includes at least smart device information.
  • the smart device information includes but not limited to device identification, device manufacturer and device type.
  • step S301 in the second cloud platform, after receiving the summary and the encrypted summary sent by the smart device through the APP and the first cloud platform, the second cloud platform needs to use a preset key to encrypt the The digest is decrypted, therefore, the decrypted digest is obtained.
  • Step S302 Compare the decrypted digest with the digest.
  • the second cloud platform compares the decrypted summary with the received summary created by the smart device, so as to verify the legitimacy of the smart device.
  • Step S303 Determine whether the decrypted digest is consistent with the digest created by the received smart device, if the comparison is consistent, perform step S304, and if the comparison is inconsistent, perform step S305.
  • step S303 it is judged whether the decrypted digest is consistent with the digest created by the received smart device. If the comparison is inconsistent, it means that the encrypted digest and the digest created by the smart device have been tampered with, and step S304 is executed. If the comparison is consistent, it means that the encrypted digest and the digest created by the smart device have not been tampered with, and step S305 is executed.
  • Step S304 Determine that the smart device has not passed the legality verification.
  • step S304 if it is known that the decrypted digest is inconsistent with the received digest created by the smart device, it is determined that the smart device has not passed the legality verification.
  • Step S305 Determine that the smart device passes the legality verification.
  • step S305 if it is known that the decrypted digest is consistent with the received digest created by the smart device, it is determined that the smart device has passed the legality verification.
  • the method after performing step S305 to determine the legitimacy of the smart device, the method also includes:
  • the network configuration information includes at least the SSID and password of the router.
  • the leakage of user information is avoided by verifying the legitimacy of smart devices, thereby providing a precondition for realizing cross-platform binding and access of smart devices.
  • step S101 is performed to receive the user credential sent by the smart device that has passed the legality verification, and according to the user credential, the smart device is generated on the second cloud platform.
  • the process of the second user account is a schematic flow diagram of a decryption of the user certificate provided by the embodiment of the present disclosure, which mainly includes the following steps:
  • Step S401 Receive the encrypted user credential sent by the smart device that has passed legality verification.
  • the second cloud platform receives the encrypted user credential sent by the smart device that has passed legality verification.
  • Step S402 Using the private key of the second cloud platform to decrypt the encrypted user certificate to obtain the decrypted user certificate.
  • step S402 in the second cloud platform, after the second cloud platform receives the encrypted user credential sent by the APP, since the encrypted user credential is obtained by encrypting with the public key of the second cloud platform , therefore, it is necessary to use the private key of the second cloud platform to decrypt the encrypted user certificate, and then obtain the decrypted user certificate.
  • Step S403 Generate a second user account of the smart device on the second cloud platform according to the decrypted user credential.
  • step S403 in the second cloud platform, after the second cloud platform decrypts the encrypted user certificate, according to the obtained decrypted user certificate, the second user ID of the smart device on the second cloud platform is generated. account.
  • FIG. 5 it is a schematic flowchart of a cross-platform binding method for smart devices provided by an embodiment of the present disclosure.
  • the binding method should be set to the application APP, and the cross-platform binding method of the smart device mainly includes the following steps:
  • Step S501 Turn on the access point in advance and access the smart device.
  • step S501 the application program APP enables the access point in advance, and accesses the smart device based on the enabled access point.
  • Step S502 Receive the device legitimacy information of the smart device that has passed the legitimacy verification sent by the second cloud platform, and obtain the user credential from the device legitimacy information.
  • the second cloud platform is the cloud platform to which the smart device belongs.
  • the APP receives the device legal information of the smart device that has passed the legality verification sent by the second cloud platform, and obtains the user certificate from the device legal information.
  • Step S503 Send the user credential to the second cloud platform, make the second cloud platform generate a second user account of the smart device on the second cloud platform according to the user credential, bind the smart device with the second user account, and generate an access Token, bind the access token with the second user account, send the access token to the first cloud platform, and bind it with the first user account created by the smart device on the first cloud platform, so that the smart device can use the access token
  • the card accesses the second cloud platform through the first cloud platform.
  • step S503 on the APP, after the APP obtains the user certificate, it sends the user certificate to the second cloud platform, so that the second cloud platform generates the second user account of the smart device on the second cloud platform according to the user certificate , and bind the smart device with the second user account, and generate an access token, bind the access token with the second user account, send the access token to the first cloud platform, and share with the smart device on the first cloud platform
  • the first user account created by the platform is bound, so that the smart device uses the access token to access the second cloud platform through the first cloud platform.
  • the second cloud platform Based on a cross-platform binding method for smart devices provided by an embodiment of the present disclosure, by sending the obtained user credentials to the second cloud platform, the second cloud platform binds the smart device with the second user account, and generates access token, and bind the second user account with the first user account created by the smart device on the first cloud platform based on the access token, so that the smart device can use the access token to access the second user account through the account on the first cloud platform.
  • the cloud platform is to realize the cross-platform binding and access of smart devices.
  • the platform binding method is applied to the application program APP, and the cross-platform binding method of the smart device mainly includes the following steps:
  • Step S601 Turn on the access point in advance and access the smart device.
  • Step S602 Receive the device legitimacy information of the smart device that has passed the legitimacy verification sent by the second cloud platform, and obtain the user credential from the device legitimacy information.
  • step S601 to step S602 are the same as the execution principle and process of step S501 to step S502 disclosed in FIG. 5 , which can be referred to and will not be repeated here.
  • Step S603 Encrypt the user credential with the public key of the second cloud platform to obtain the encrypted user credential.
  • step S603 In the process of implementing step S603, on the APP, after the APP obtains the user certificate, it needs to encrypt the user certificate. Therefore, the second cloud platform public key can be used to encrypt the user certificate to obtain the encrypted user certificate.
  • Step S604 Send the encrypted user certificate and network distribution information to the smart device, so that the smart device uses the network distribution information to complete the network distribution, and send the encrypted user certificate to the second cloud platform, so that the second cloud platform uses the user certificate Generate the second user account of the smart device on the second cloud platform, bind the smart device to the second user account, generate an access token, bind the access token to the second user account, and send the access token to The first cloud platform is bound to the first user account created by the smart device on the first cloud platform, so that the smart device uses the access token to access the second cloud platform through the first cloud platform.
  • step S604 on the APP, after encrypting the user credentials, the APP sends the encrypted user credentials and network distribution information to the smart device, so that the smart device sends the encrypted user credentials to the second cloud
  • the platform enables the second cloud platform to generate the second user account of the smart device on the second cloud platform according to the user credentials, bind the smart device to the second user account, generate an access token, and link the access token to the second user account. Bind the user account, send device binding success information and access token to the first cloud platform, and bind with the first user account built by the smart device on the first cloud platform, so that the smart device uses the access token to pass through the first cloud platform.
  • One cloud platform accesses the second cloud platform.
  • the smart device sends the encrypted user credentials to the second cloud platform, Make the second cloud platform generate an access token after binding the smart device with the second user account, and bind the second user account with the first user account created by the smart device on the first cloud platform based on the access token,
  • the smart device uses the access token to access the second cloud platform through the account of the first cloud platform, that is, realizes the purpose of cross-platform binding and access of the smart device.
  • step S502 before performing step S502 to receive the device legality information of the smart device that has passed the legality verification sent by the second cloud platform, the following steps are further included:
  • Step S11 Receive the digest sent by the smart device and the encrypted digest.
  • the digest at least includes information of the smart device, the digest is created by the smart device, and is encrypted by the smart device using a preset key.
  • the APP accesses the smart device through the access point
  • the APP, the smart device, the first cloud platform and the second cloud platform realize mutual communication.
  • step SS11 After the APP accesses the smart device, it receives the digest created by the smart device and the encrypted digest sent by the smart device.
  • Step S12 Send the abstract and the encrypted abstract to the first cloud platform, and the first cloud platform sends the abstract and the encrypted abstract to the second cloud platform, so that the second cloud platform uses a preset key to encrypt the encrypted
  • the digest is decrypted, and the legality of the obtained digest is verified to determine the legitimacy of the smart device.
  • the APP sends the received abstract and the encrypted abstract to the first cloud platform, and the first cloud platform sends the abstract and the encrypted abstract to the second cloud platform, so that the second cloud
  • the platform uses the preset key to decrypt the encrypted abstract, obtains the decrypted abstract, and verifies the legality of the decrypted abstract to determine the legitimacy of the smart device.
  • the leakage of user information is avoided by verifying the legitimacy of smart devices, thereby providing a precondition for realizing cross-platform binding and access of smart devices.
  • the binding method is applied to the first cloud platform, and the cross-platform binding method of the smart device mainly includes the following steps:
  • Step S701 Receive the access token sent by the second cloud platform.
  • step S701 the access token is bound to the second user account generated by the smart device on the second cloud platform, and the second user account is pre-opened by the second cloud platform after the application program APP opens the access point and accesses the smart device , receiving the user credential sent by the smart device that has passed the legitimacy verification, and generating a second user account of the smart device on the second cloud platform according to the user credential.
  • the first cloud platform receives the access token sent by the second cloud platform.
  • Step S702 Bind the access token with the first user account created by the smart device on the first cloud platform.
  • the first cloud platform binds the access token with the first user account created by the smart device on the first cloud platform.
  • Step S703 Make the smart device access the second cloud platform by using the access token.
  • the first cloud platform enables the smart device to access the second cloud platform by using the access token.
  • the access token enables smart devices to access the second cloud platform, realizing the purpose of cross-platform binding and access of smart devices.
  • the embodiments of the present disclosure also provide an interactive schematic diagram of a cross-platform binding method applied to smart devices, as shown in FIG. 8 , the method includes :
  • Step S801 APP pre-opens the access point.
  • Step S802 The smart device accesses the access point activated by the APP, creates a digest, encrypts the digest with a preset key, obtains a decrypted digest, and sends the digest and the decrypted digest to the APP.
  • Step S803 the APP sends the digest and the decrypted digest to the first cloud platform.
  • Step S804 the first cloud platform sends the digest and the decrypted digest to the second cloud platform.
  • Step S805 The second cloud platform uses the preset key to decrypt the encrypted abstract to obtain the decrypted abstract, and compares the decrypted abstract with the abstract. If the comparison is consistent, it is determined that the smart device has passed the legality verification. If the comparison is inconsistent, It is determined that the smart device has not passed the legality verification, and after passing the legality verification, send the device legal information of the smart device to the first cloud platform.
  • Step S806 the first cloud platform sends the device legal information of the smart device to the APP.
  • Step S807 The APP encrypts the user credential with the public key of the second cloud platform to obtain the encrypted user credential, and sends the network distribution information and the encrypted user credential to the smart device.
  • Step S808 the smart device sends the encrypted user credential to the second cloud platform.
  • Step S809 The second cloud platform uses the private key of the second cloud platform to decrypt the encrypted user credential, generates the second user account of the smart device on the second cloud platform according to the obtained decrypted user credential, and connects the smart device to the second cloud platform.
  • the second user account is bound, and an access token is generated, the access token is bound to the second user account, and device binding success information and the access token are sent to the first cloud platform.
  • Step S810 the first cloud platform binds the first user account created by the smart device on the first cloud platform with the access token, so that the smart device uses the access token to access the second cloud platform through the first cloud platform.
  • an access token is generated, and based on the access token, the second user account and the smart device are The first user account created by a cloud platform is bound, so that the smart device can use the access token to access the second cloud platform through the account of the first cloud platform, that is, to realize the purpose of cross-platform binding and access of the smart device.
  • the embodiment of the present disclosure also provides a corresponding second cloud platform.
  • the second cloud platform It includes: a receiving module 91 , a binding and generating module 92 and a sending module 93 .
  • the first receiving module 91 is configured to receive the user credential sent by the smart device that has passed the legitimacy verification after the application APP pre-opens the access point and accesses the smart device, and generates the smart device according to the user credential.
  • the user credential is obtained by the application program APP, and encrypted by the APP using the public key of the second cloud platform.
  • the binding and generating module 92 is configured to bind the smart device with the second user account, generate an access token, and bind the access token with the second user account.
  • the first sending module 93 is configured to send the access token to the first cloud platform, and bind the first user account built by the smart device on the first cloud platform, so that the smart device uses the access token to access the first cloud platform Second cloud platform.
  • a second user account of the smart device on the second cloud platform is generated according to the user credential, and a user credential sent by the smart device that has passed legality verification is received, Generate the second user account of the smart device on the second cloud platform according to the user credentials; bind the smart device to the second user account, generate an access token, and bind the access token to the second user account; bind the access token Send to the first cloud platform, and bind with the first user account built by the smart device on the first cloud platform.
  • an access token is generated, and based on the access token, the second user account is bound to the first user account created by the smart device on the first cloud platform,
  • the smart device uses the access token to access the second cloud platform through the account of the first cloud platform, that is, realizes the purpose of cross-platform binding and access of the smart device.
  • the second cloud platform is further provided with a first verification module 94 .
  • the first verification module 94 is configured to receive the summary and the encrypted summary sent by the smart device through the APP and the first cloud platform, wherein the summary contains at least device information, the summary is created by the smart device, and the smart device utilizes a preset key Encryption: use the preset key to decrypt the encrypted summary, and verify the validity of the obtained summary to determine the legitimacy of the smart device.
  • the leakage of user information is avoided by verifying the legitimacy of smart devices, thereby providing a precondition for realizing cross-platform binding and access of smart devices.
  • the first sending module 93 is also specifically configured to:
  • the APP uses the public key of the second cloud platform to encrypt the user certificate
  • sends the distribution network information and the encrypted user certificate to the smart device so that the smart device uses the distribution network information to complete the distribution network , and send the encrypted user credential to the second cloud platform
  • the distribution network information includes at least the SSID and password of the router.
  • the first receiving module 91 for receiving the user credential sent by the smart device and generating the second user account of the smart device on the second cloud platform according to the user credential The specific settings are:
  • the embodiment of the present disclosure also provides an application program APP correspondingly.
  • the application program APP includes: An access module 111 , a first processing module 112 and a second sending module 113 .
  • the access module 111 is configured to pre-open the access point and access the smart device.
  • the first processing module 112 is configured to receive the legal device information of the smart device that has passed the legitimacy verification sent by the second cloud platform, and obtain the user credential from the device legal information.
  • the second sending module 113 is configured to send the user credential and network distribution information to the second cloud platform, so that the second cloud platform generates the second user account of the smart device on the second cloud platform according to the user credential, and connects the smart device to the second cloud platform. Bind the two user accounts, generate an access token, bind the access token to the second user account, send the access token to the first cloud platform, and combine it with the first user account created by the smart device on the first cloud platform Binding, so that the smart device uses the access token to access the second cloud platform through the first cloud platform.
  • the second cloud platform by sending the obtained user credential to the second cloud platform, the second cloud platform generates an access token after binding the smart device with the second user account of the second cloud platform. card, and bind the second user account with the first user account created by the smart device on the first cloud platform based on the access token, so that the smart device can use the access token to access the second cloud platform through the account on the first cloud platform , which realizes cross-platform binding and access of smart devices.
  • the smart terminal is further provided with a second verification module 114 .
  • the second verification module 114 is configured to receive the digest and the encrypted digest sent by the smart device, wherein the digest contains at least device information, the digest is created by the smart device, and is encrypted by the smart device using a preset key; the digest and the encrypted The summary of the encrypted data is sent to the first cloud platform, and the first cloud platform sends the summary and the encrypted summary to the second cloud platform, so that the second cloud platform uses the preset key to decrypt the encrypted summary, and the obtained The summary conducts legality verification to determine the legality of the smart device.
  • the leakage of user information is avoided by verifying the legitimacy of the smart device, thereby providing a precondition for realizing cross-platform binding and access of the smart device.
  • the smart terminal is further provided with a second processing module 115 .
  • the second processing module 115 is configured to use the second cloud platform public key to encrypt the user certificate to obtain the encrypted user certificate; send the encrypted user certificate and distribution network information to the smart device, so that the smart device uses the distribution network information Complete the network configuration and send the encrypted user credentials to the second cloud platform.
  • the smart device by sending the encrypted user credential and network distribution information to the smart device, the smart device sends the encrypted user credential to the second cloud platform, so that the second cloud platform is bound to After determining the smart device and the second user account, an access token is generated, and based on the access token, the second user account is bound to the first user account created by the smart device on the first cloud platform, so that the smart device uses the access token Realize access to the second cloud platform through the account of the first cloud platform, that is, realize the purpose of cross-platform binding and access of smart devices.
  • the embodiment of the present disclosure also provides a corresponding first cloud platform.
  • the first cloud platform It includes: a second receiving module 141 , a binding module 142 and a third processing module 143 .
  • the second receiving module 141 is configured to receive the access token sent by the second cloud platform, the access token is bound to the second user account generated by the smart device on the second cloud platform, and the second user account is used by the second cloud platform
  • the program APP pre-opens the access point and accesses the smart device, it receives the user credential sent by the smart device that has passed the legality verification, and generates the second user account of the smart device on the second cloud platform according to the user credential.
  • the binding module 142 is configured to bind the access token with the first user account created by the smart device on the first cloud platform.
  • the third processing module 143 is configured to enable the smart device to access the second cloud platform by using the access token.
  • the access token can be used to The card enables smart devices to access the second cloud platform, realizing the purpose of cross-platform binding and access of smart devices.
  • the embodiments of the present disclosure also provide a cross-platform binding system for smart devices, as shown in FIG. 15 , the smart device's
  • the binding system includes: a smart device 151 , an application APP 152 , a first cloud platform 153 and a second cloud platform 154 .
  • the smart device 151 is set to enable the network distribution mode, and scans the access point enabled by the APP to access the APP.
  • APP152 is set to pre-open the access point and access the smart device, and receive the device legal information of the smart device that has passed the legality verification sent by the second cloud platform, and obtain the user credential from the device legal information; send the user credential to to the second cloud platform.
  • the second cloud platform 154 is configured to verify the legitimacy of the smart device, and send the device legal information of the smart device to the APP, receive the user certificate sent by the APP, and generate the second user account of the smart device on the second cloud platform according to the user certificate , and bind the smart device with the second user account, generate an access token, bind the access token with the second user account, and send the access token to the first cloud platform.
  • the first cloud platform 153 is configured to receive an access token, and bind the access token to the first user account created by the smart device on the first cloud platform, so that the smart device uses the access token to access the second account via the first cloud platform. cloud platform.
  • the application program APP opens the access point in advance and accesses the smart device, it receives the user credential sent by the smart device that has passed the legality verification, and according to the Credentials generate the second user account of the smart device on the second cloud platform; bind the smart device to the second user account, generate an access token, and bind the access token to the second user account; send the access token to The first cloud platform is bound to the first user account created by the smart device on the first cloud platform, so that the smart device uses the access token to access the second cloud platform through the first cloud platform.
  • an access token is generated, and based on the access token, the second user account is bound to the first user account created by the smart device on the first cloud platform,
  • the smart device uses the access token to access the second cloud platform through the account of the first cloud platform, that is, realizes the purpose of cross-platform binding and access of the smart device.
  • each of the above-mentioned modules may be implemented by a hardware device composed of a processor and a memory. Specifically, each of the above-mentioned modules is stored in the memory as a program unit, and the processor executes the above-mentioned program unit stored in the memory to realize the cross-platform binding of the smart device.
  • the processor includes a kernel, and the kernel retrieves corresponding program units from the memory.
  • One or more kernels can be set, and the cross-platform binding of smart devices can be realized by adjusting kernel parameters.
  • An embodiment of the present disclosure provides a computer storage medium, in which a computer program is stored, wherein, when the computer program is executed by a processor, the cross-platform binding of the smart device according to any one of claims 1 to 4 is realized method, or, the smart device cross-platform binding method described in any one of claims 5 to 7, or the smart device cross-platform binding method described in claim 8.
  • An embodiment of the present disclosure provides a processor, the processor is configured to run a program, wherein the program executes the cross-platform binding method of the smart device disclosed in FIG. 1 when running, or the smart device disclosed in FIG. 5
  • the cross-platform binding method, the cross-platform binding method of the smart device disclosed in FIG. 7 The cross-platform binding method, the cross-platform binding method of the smart device disclosed in FIG. 7 .
  • FIG. 16 is a schematic structural diagram of an electronic device 160 provided by an embodiment of the present disclosure.
  • the electronic device in the embodiments of the present disclosure may be a server, a PC, a PAD, a mobile phone, and the like.
  • the electronic device includes at least one processor 1601 , at least one memory 1602 connected to the processor, and a bus 1603 .
  • the processor 1601 and the memory 1602 communicate with each other through the bus 1603 .
  • the processor 1601 is configured to execute the computer programs stored in the memory 1602 .
  • the memory 1602 is set to store a program, and the program is at least set to: after the application APP pre-opens the access point and accesses the smart device, receives the user credential sent by the smart device that has passed the legality verification, and generates the smart device according to the user credential A second user account on the second cloud platform; bind the smart device to the second user account, generate an access token, and bind the access token to the second user account; send the access token to the first cloud platform , and bind with the first user account created by the smart device on the first cloud platform, so that the smart device uses the access token to access the second cloud platform through the first cloud platform.
  • the present disclosure also provides a computer program product, which, when executed on an electronic device, is adapted to execute a program initialized with the following method steps:
  • the application program APP opens the access point in advance and accesses the smart device, it receives the user credential sent by the smart device that has passed the legality verification, and generates the second user account of the smart device on the second cloud platform according to the user credential; Bind with the second user account, generate an access token, and bind the access token to the second user account; send the access token to the first cloud platform, and communicate with the first cloud platform built by the smart device on the first cloud platform The user account is bound, so that the smart device uses the access token to access the second cloud platform through the first cloud platform.
  • a device in a typical configuration, includes one or more processors (CPUs), memory and a bus.
  • processors CPUs
  • a device may also include input/output interfaces, network interfaces, and the like.
  • Memory may include non-permanent memory in computer-readable media, in the form of random access memory (RAM) and/or non-volatile memory, such as read-only memory (ROM) or flash memory (flash RAM), memory including at least one memory chip.
  • RAM random access memory
  • ROM read-only memory
  • flash RAM flash memory
  • Computer-readable media including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information.
  • Information may be computer readable instructions, data structures, modules of a program, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory (ROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Flash memory or other memory technology, Compact Disc Read-Only Memory (CD-ROM), Digital Versatile Disc (DVD) or other optical storage, Magnetic tape cartridge, magnetic tape magnetic disk storage or other magnetic storage device or any other non-transmission medium arranged to store information that can be accessed by a computing device.
  • computer-readable media excludes transitory computer-readable media, such as modulated data signals and carrier waves.
  • each embodiment in this specification is described in a progressive manner, the same and similar parts of each embodiment can be referred to each other, and each embodiment focuses on the differences from other embodiments.
  • the description is relatively simple, and for related parts, please refer to the part of the description of the method embodiment.
  • the systems and system embodiments described above are only illustrative, and the units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is It can be located in one place, or it can be distributed to multiple network elements. Part or all of the modules can be selected according to actual needs to achieve the purpose of the solution of this embodiment. It can be understood and implemented by those skilled in the art without creative effort.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本公开提供一种智能设备的跨平台绑定方法、系统及相关设备,通过根据用户凭证生成智能设备在第二云平台的第二用户账号;绑定智能设备与第二用户账号,并生成访问令牌,将访问令牌与第二用户账号绑定;将访问令牌发送至第一云平台,并与智能设备在第一云平台创建的第一用户账号绑定,使智能设备使用访问令牌通过第一云平台访问第二云平台。

Description

智能设备的跨平台绑定方法、系统及相关设备
本公开要求于2021年8月30日提交中国专利局、申请号为202111006010.2、发明名称“智能设备的跨平台绑定方法、系统及相关设备”的中国专利申请的优先权,其全部内容通过引用结合在本公开中。
技术领域
本公开涉及智能家居技术领域,尤其涉及一种智能设备的跨平台绑定方法、系统及相关设备。
背景技术
目前,智能终端将不同厂商的智能家居设备配置至智能家居设备对应的云平台时,智能终端的用户账户与智能家居设备绑定的问题无法解决,无法实现跨平台访问。
由此可知,亟需一种实现智能家居设备的跨平台访问的方式。
发明内容
有鉴于此,本公开实施例提供一种智能设备的跨平台绑定方法、系统及相关设备,以解决现有技术中无法实现智能家居设备的跨平台访问的问题。
为实现上述目的,本公开实施例提供如下技术方案:本公开实施例第一方面公开了一种智能设备的跨平台绑定方法,应用于第二云平台,所述方法包括:在应用程序APP预先开启访问接入点并接入智能设备之后,接收通过合法性验证的所述智能设备发送的用户凭证,根据所述用户凭证生成所述智能设备在所述第二云平台的第二用户账号;将所述智能设备与所述第二用户账号绑定,并生成访问令牌,将所述访问令牌与所述第二用户账号绑定;将所述访问令牌发送至第一 云平台,并与所述智能设备在所述第一云平台创建的第一用户账号绑定,使所述智能设备使用所述访问令牌通过所述第一云平台访问所述第二云平台。
本公开实施例第二方面公开了一种智能设备的跨平台绑定方法,应用于应用程序APP,所述方法包括:预先开启访问接入点并接入智能设备;接收第二云平台发送的通过合法性验证的所述智能设备的设备合法信息,并在所述设备合法信息中获取用户凭证;将所述用户凭证发送至所述第二云平台,使所述第二云平台根据所述用户凭证生成所述智能设备在第二云平台的第二用户账号,并将所述智能设备与所述第二用户账号绑定,并生成访问令牌,将所述访问令牌与所述第二用户账号绑定,将所述访问令牌发送至第一云平台,并与所述智能设备在所述第一云平台创建的第一用户账号绑定,使所述智能设备使用所述访问令牌通过所述第一云平台访问所述第二云平台。
本公开实施例第三方面公开了一种智能设备的跨平台绑定方法,应用于第一云平台,所述方法包括:接收第二云平台发送的访问令牌,所述访问令牌与智能设备在所述第二云平台生成的第二用户账号绑定,所述第二用户账号由所述第二云平台在应用程序APP预先开启访问接入点并接入所述智能设备之后,接收通过合法性验证的所述智能设备发送的用户凭证,根据所述用户凭证生成所述智能设备在所述第二云平台的第二用户账号;将所述访问令牌与所述智能设备在所述第一云平台创建的第一用户账号绑定;利用所述访问令牌使所述智能设备访问所述第二云平台。
本公开实施例第四方面公开了一种第二云平台,所述第二云平台包括:第一接收模块,设置为在应用程序APP预先开启访问接入点并接入智能设备之后,接收通过合法性验证的所述智能设备发送的用户凭证,根据所述用户凭证生成所述智能设备在所述第二云平台的第二用户账号;绑定与生成模块,设置为将所述智能设备与所述第二用户账号绑定,并生成访问令牌,将所述访问令牌与所述第二用户账号绑定;第一发送模块,设置为将所述访问令牌发送至第一云平台,并与所述智能设备在所述第一云平台创建的第一用户账号绑定,使所述智能设备使用所述访问令牌通过所述第一云平台访问所述第二云平台。
本公开实施例第五方面公开了一种应用程序APP,所述APP包括:接入模块,设置为预先开启访问接入点并接入智能设备;第一处理模块,设置为接收第二云平台发送的通过合法性验证的所述智能设备的设备合法信息,并在所述设备合法信息中获取用户凭证;第二发送模块,设置为将所述用户凭证发送至所述第二云平台,使所述第二云平台根据所述用户凭证生成所述智能设备在第二云平台的第二用户账号,并将所述智能设备与所述第二用户账号绑定,并生成访问令牌,将所述访问令牌与所述第二用户账号绑定,将所述访问令牌发送至第一云平台,并与所述智能设备在所述第一云平台创建的第一用户账号绑定,使所述智能设备使用所述访问令牌通过所述第一云平台访问所述第二云平台。
本公开实施例第六方面公开了一种第一云平台,所述第一云平台包括:第二接收模块,设置为接收第二云平台发送的访问令牌,所述访问令牌与智能设备在所述第二云平台生成的第二用户账号绑定,所述第二用户账号由所述第二云平台在应用程序APP预先开启访问接入点并接入所述智能设备之后,接收通过合法性验证的所述智能设备发送的用户凭证,根据所述用户凭证生成所述智能设备在第二云平台的第二用户账号;绑定模块,设置为将所述访问令牌与所述智能设备在所述第一云平台创建的第一用户账号绑定;第三处理模块,设置为利用所述访问令牌使所述智能设备访问所述第二云平台。
本公开实施例第七方面公开了一种智能设备的跨平台绑定系统,包括:智能设备、应用程序APP、第一云平台和第二云平台;所述智能设备,设置为开启配网模式,扫描所述APP开启的所述访问接入点接入所述APP;所述APP,设置为预先开启访问接入点并接入所述智能设备,并接收第二云平台发送的通过合法性验证的所述智能设备的设备合法信息,并在所述设备合法信息中获取所述用户凭证;将所述用户凭证发送至所述第二云平台;所述第二云平台,设置为验证所述智能设备的合法性,并将所述智能设备的设备合法信息发送至所述APP,接收所述APP发送的用户凭证,根据所述用户凭证生成所述智能设备在所述第二云平台的第二用户账号,并将所述智能设备与所述第二用户账号绑定,并生成访问令牌,将所述访问令牌与所述第二用户账号绑定,将所述访问令牌发送至第一云平台;所述第一云平台,设置为接收所述访问令牌,并将所述访问令牌与所述智 能设备在所述第一云平台创建的第一用户账号绑定,使所述智能设备使用所述访问令牌通过所述第一云平台访问所述第二云平台。
本公开实施例第八方面公开了一种电子设备,所述电子设备包括存储器和处理器,所述存储器中存储有计算机程序,所述处理器被设置为通过所述计算机程序执行如本公开实施例第一方面中任一所述的智能设备的跨平台绑定方法,或者,本公开实施例第二方面中任一所述的智能设备的跨平台绑定方法,或者,本公开实施例第三方面中所述的智能设备的跨平台绑定方法。
本公开实施例第九方面公开了一种存储介质,所述存储介质中存储有计算机程序,其中,在所述计算机程序运行时控制所述存储介质所在设备执行如本公开实施例第一方面中任一所述的智能设备的跨平台绑定方法,或者,本公开实施例第二方面中任一所述的智能设备的跨平台绑定方法,或者,本公开实施例第三方面中所述的智能设备的跨平台绑定方法。
附图说明
为了更清楚地说明本公开实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本公开的实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据提供的附图获得其他的附图。
图1为本公开实施例提供的一种智能设备的跨平台绑定方法的流程示意图;
图2为本公开实施例提供的一种验证智能设备的合法性的流程示意图;
图3为本公开实施例提供的一种解密与验证摘要的流程示意图;
图4为本公开实施例提供的一种解密用户凭证的流程示意图;
图5为本公开实施例提供的另一种智能设备的跨平台绑定方法的流程示意图;
图6为本公开实施例提供的又一种智能设备的跨平台绑定方法的流程示意图;
图7为本公开实施例提供的再一种智能设备的跨平台绑定方法的流程示意图;
图8为本公开实施例提供的一种应用于智能设备的跨平台绑定方法的交互示意图;
图9为本公开实施例提供的一种第二云平台的结构示意图;
图10为本公开实施例提供的另一种第二云平台的结构示意图;
图11为本公开实施例提供的一种应用程序APP的结构示意图;
图12为本公开实施例提供的另一种应用程序APP的结构示意图;
图13为本公开实施例提供的又一种应用程序APP的结构示意图;
图14为本公开实施例提供的一种第一云平台的结构示意图;
图15为本公开实施例提供的一种智能设备的跨平台绑定系统的结构示意图;
图16为本公开实施例提供的一种电子设备160的结构示意图。
具体实施方式
下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本公开一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本公开保护的范围。
在本公开中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。
由背景技术可知,智能终端将不同厂商的智能家居设备配置至智能家居设备 对应的云平台时,智能终端的用户账户与智能家居设备绑定的问题无法解决,无法实现智能家居设备的跨平台访问。
因此,本公开实施例提供一种智能设备的绑定方法、系统及相关设备,在本方案中,在绑定智能设备与第二用户账号之后,生成访问令牌,并基于访问令牌将第二用户账号和智能设备在第一云平台创建的第一用户账号进行绑定,使智能设备利用访问令牌实现通过第一云平台的账号访问第二云平台,即实现智能家居设备的跨平台绑定与访问的目的。
其中,智能家居设备属于智能设备。
如图1所示,为本公开实施例提供的一种智能设备的跨平台绑定方法的流程示意图,该智能设备的跨平台绑定方法应用于第二云平台,该第二云平台为智能设备所属的云平台。
需要说明的是,智能设备与第二云平台属于同一产商。智能设备接入第二云平台。第二云平台为智能设备所属的云平台。智能设备可以为空调,也可以为冰箱等其他智能设备,本公开不作限定。
该智能设备的跨平台绑定方法主要包括以下步骤:
步骤S101:在应用程序APP预先开启访问接入点并接入智能设备之后,接收通过合法性验证的智能设备发送的用户凭证,根据用户凭证生成智能设备在第二云平台的第二用户账号。
在步骤S101中,用户凭证为加密后的用户凭证,用户凭证由应用程序APP获取,并由APP利用第二云平台公钥加密。
需要说明的是,用户凭证是第二云平台用于验证用户身份或生成第二云平台的第二用户账号的依据。如果用户在第二云平台上有第二用户账号,则用户凭证中包含第二用户账号和密码的相关信息,如果用户在第二云平台上没有有第二用户账号,则用户凭证中只包含第二用户账号的相关信息。
可选的,在本公开实施例中,第二云平台公钥与第二云平台私钥是一对,如 果利用第二云平台公钥对用户凭证进行加密,在后续进行解密操作时,需要利用第二云平台私钥对加密后的用户凭证进行解密。
可选的,在本公开实施例中,第二云平台公钥与第二云平台私钥是一对,如果利用第二云平台私钥对用户凭证进行加密,在后续进行解密操作时,需要利用第二云平台公钥对加密后的用户凭证进行解密。
需要说明的是,APP2的访问接入点可以为AP(Access Point,无线访问接入点)热点,也可以为蓝牙,还可以为WiFi,本公开不作限定。
在本公开实施例中,访问接入点为特定名称的访问接入点,其中,特定名称可以为特定格式的名称,或者,特定字符的名称,该名称事先已与智能设备产商约定好。
例如,访问接入点为Tenda_100。
在具体实现步骤S101的过程中,在应用程序APP预先开启访问接入点并接入智能设备之后,第二云平台接收通过合法性验证的智能设备发送的用户凭证,
第二云平台接收到用户凭证之后,由于用户凭证是APP利用第二云平台公钥进行加密得到的,因此,可以利用第二云平台私钥对用户凭证进行解密,得到解密后的用户凭证,然后,根据得到的解密后的用户凭证生成第二云平台用户账号。
步骤S102:将智能设备与第二用户账号绑定,并生成访问令牌,将访问令牌与第二用户账号绑定。
在具体实现步骤S102的过程中,在第二云平台中,第二云平台将智能设备与所生成的第二用户账号进行绑定,在完成绑定之后,生成访问令牌,并将所生成的访问令牌与第二用户账号进行绑定。
步骤S103:将访问令牌发送至第一云平台,并与智能设备在第一云平台构建的第一用户账号绑定,使智能设备使用访问令牌通过第一云平台访问第二云平台。
在步骤S103中,第一云平台为APP所属的云平台。
APP与第一云平台属于同一产商。APP接入第一云平台。第一云平台与第二云平台已实现互联互通。
在具体实现步骤S103的过程中,在第二云平台中,完成访问令牌与第二用户账号绑定之后,生成设备绑定成功信息,第二云平台将设备绑定成功信息和生成的访问令牌发送至第一云平台,并与智能设备在第一云平台构建的第一用户账号绑定,当用户通过第一云平台访问第二云平台下的设备时,第一云平台可以使用访问通行证访问第二云平台,而不需要使用用户的第二用户账号访问第二云平台,避免第二用户账号泄露给第一云平台,也就是说,使智能设备使用访问令牌通过第一云平台访问第二云平台。
基于本公开实施例提供的一种智能设备的跨平台绑定方法,在应用程序APP预先开启访问接入点并接入智能设备之后,接收通过合法性验证的智能设备发送的用户凭证,根据用户凭证生成智能设备在第二云平台的第二用户账号;将智能设备与第二用户账号绑定,并生成访问令牌,将访问令牌与第二用户账号绑定;将访问令牌发送至第一云平台,并与智能设备在第一云平台构建的第一用户账号绑定,使智能设备使用访问令牌通过第一云平台访问第二云平台。在本方案中,在绑定智能设备与第二用户账号之后,生成访问令牌,并基于访问令牌将第二用户账号和智能设备在第一云平台创建的第一用户账号进行绑定,使智能设备利用访问令牌实现通过第一云平台的账号访问第二云平台,即实现智能设备的跨平台绑定与访问的目的。
可选的,基于上述本公开实施例提供的一种智能设备的跨平台绑定方法,执行步骤S101接收通过合法性验证的智能设备发送的用户凭证的过程,如图2所示,为本公开实施例提供的一种验证智能设备的合法性的流程示意图,主要包括以下步骤:
步骤S201:接收智能设备通过APP和第一云平台发送的摘要和加密后的摘要。
在步骤S201中,摘要至少包含智能设备信息,摘要由智能设备创建,并由智能设备利用预置密钥加密。
其中,预置密钥为预先设置的密钥。
在具体实现步骤S201的过程中,智能设备将创建的摘要和加密后的摘要发送至APP,APP将智能设备创建的摘要和加密后的摘要发送至第一云平台,第一云平台将智能设备创建的摘要和加密后的摘要发送至第二云平台。换而言之,第二云平台接收智能设备通过APP和第一云平台发送的摘要和加密后的摘要。
步骤S202:利用预置密钥对加密后的摘要进行解密,并对得到的摘要进行合法性验证,确定智能设备的合法性。
在具体实现步骤S202的过程中,在第二云平台中,第二云平台接收到智能设备通过APP和第一云平台发送的摘要和加密后的摘要之后,需要对加密后的摘要进行解密,因此,可以利用预置密钥对加密后的摘要进行解密,得到解密后的摘要,并对解密后的摘要进行合法性验证,确定智能设备的合法性。
可选的,执行步骤S202利用预置密钥对加密后的摘要进行解密,并对得到的摘要进行合法性验证,确定智能设备的合法性的过程,如图3所示,为本公开实施例提供的一种解密与验证摘要的流程示意图,主要包括以下步骤:
步骤S301:利用预置密钥对加密后的摘要进行解密,得到解密后的摘要。
在步骤S301中,摘要至少包括智能设备信息。
其中,智能设备信息包括但不限于设备标识、设备产商和设备类型。
在具体实现步骤S301的过程中,在第二云平台中,第二云平台接收到智能设备通过APP和第一云平台发送的摘要和加密后的摘要之后,需要利用预置密钥对加密后的摘要进行解密,因此,得到解密后的摘要。
步骤S302:将解密后的摘要与摘要进行对比。
在具体实现步骤S302的过程中,在第二云平台中,第二云平台将解密后的摘要与接收到的智能设备创建的摘要进行对比,以验证智能设备的合法性。
步骤S303:判断解密后的摘要与接收到的智能设备创建的摘要对比是否一致,若对比一致,执行步骤S304,若对比不一致,执行步骤S305。
在具体实现步骤S303的过程中,判断解密后的摘要与接收到的智能设备创建的摘要对比是否一致,若对比不一致,说明加密后的摘要与智能设备创建的摘要被篡改了,执行步骤S304,若对比一致,说明加密后的摘要与智能设备创建的摘要没有被篡改,执行步骤S305。
步骤S304:确定智能设备未通过合法性验证。
在具体实现步骤S304的过程中,已知解密后的摘要与接收到的智能设备创建的摘要对比不一致,则确定智能设备未通过合法性验证。
步骤S305:确定智能设备通过合法性验证。
在具体实现步骤S305的过程中,已知解密后的摘要与接收到的智能设备创建的摘要对比一致,则确定智能设备通过合法性验证。
可选的,执行步骤S305确定智能设备的合法性之后,还包括:
将智能设备的设备合法信息发送至APP,使APP利用第二云平台公钥加密用户凭证后,将配网信息和加密后的用户凭证发送至智能设备,使智能设备使用配网信息完成配网,并将加密后的用户凭证发送至第二云平台。
需要说明的是,配网信息至少包括路由器的服务集标识SSID和密码。
基于本公开实施例提供的一种智能设备的跨平台绑定方法,通过验证智能设备的合法性,避免用户信息的泄露,从而为实现智能设备的跨平台绑定与访问提供前提条件。
可选的,基于上述本公开实施例提供的一种智能设备的跨平台绑定方法,执行步骤S101接收通过合法性验证的智能设备发送的用户凭证,根据用户凭证生成智能设备在第二云平台的第二用户账号的过程,如图4所示,为本公开实施例提供的一种解密用户凭证的流程示意图,主要包括以下步骤:
步骤S401:接收通过合法性验证的智能设备发送的加密后的用户凭证。
在具体实现步骤S4001的过程中,第二云平台接收通过合法性验证的智能设备发送的加密后的用户凭证。
步骤S402:利用第二云平台私钥对加密后的用户凭证进行解密,得到解密后的用户凭证。
在具体实现步骤S402的过程中,在第二云平台中,第二云平台接收到APP发送的加密后的用户凭证之后,由于加密后的用户凭证是利用第二云平台公钥进行加密得到的,因此,需要利用第二云平台私钥对加密后的用户凭证进行解密,进而得到解密后的用户凭证。
步骤S403:根据解密后的的用户凭证生成智能设备在第二云平台的第二用户账号。
在具体实现步骤S403的过程中,在第二云平台中,第二云平台对加密后的用户凭证进行解密之后,根据得到的解密后的用户凭证生成智能设备在第二云平台的第二用户账号。
基于本公开实施例提供的一种智能设备的跨平台绑定方法,通过解密加密后的用户凭证,进而确保用户凭证没有被篡改过,避免用户信息的泄露,从而为实现智能设备的跨平台绑定与访问提供前提条件。
基于上述本公开实施例示出的智能设备的跨平台绑定方法,如图5所示,为本公开实施例提供的一种智能设备的跨平台绑定方法的流程示意图,该智能设备的跨平台绑定方法应设置为应用程序APP,该智能设备的跨平台绑定方法主要包括以下步骤:
步骤S501:预先开启访问接入点并接入智能设备。
在具体实现步骤S501的过程中,应用程序APP预先开启访问接入点,并基于开启的访问接入点接入智能设备。
步骤S502:接收第二云平台发送的通过合法性验证的智能设备的设备合法信息,并在设备合法信息中获取用户凭证。
在步骤SS502中,第二云平台为智能设备所属的云平台。
在具体实现步骤S502的过程中,在APP上,APP接收第二云平台发送的通 过合法性验证的智能设备的设备合法信息,并从设备合法信息中获取用户凭证。
步骤S503:将用户凭证发送至第二云平台,使第二云平台根据用户凭证生成智能设备在第二云平台的第二用户账号,并将智能设备与第二用户账号绑定,并生成访问令牌,将访问令牌与第二用户账号绑定,将访问令牌发送至第一云平台,并与智能设备在第一云平台创建的第一用户账号绑定,使智能设备使用访问令牌通过第一云平台访问第二云平台。
在具体实现步骤S503的过程中,在APP上,APP获取用户凭证之后,将用户凭证发送至第二云平台,使第二云平台根据用户凭证生成智能设备在第二云平台的第二用户账号,并将智能设备与第二用户账号绑定,并生成访问令牌,将访问令牌与第二用户账号绑定,将访问令牌发送至第一云平台,并与智能设备在第一云平台创建的第一用户账号绑定,使智能设备使用访问令牌通过第一云平台访问第二云平台。
基于本公开实施例提供的一种智能设备的跨平台绑定方法,通过将获取到的用户凭证发送至第二云平台,使第二云平台将智能设备与第二用户账号绑定之后,生成访问令牌,并基于访问令牌将第二用户账号和智能设备在第一云平台创建的第一用户账号进行绑定,使智能设备利用访问令牌实现通过第一云平台的账号访问第二云平台,即实现智能设备的跨平台绑定与访问的目的。
基于上述本公开实施例示出的智能设备的跨平台绑定方法,如图6所示,为本公开实施例提供的又一种智能设备的跨平台绑定方法的流程示意图,该智能设备的跨平台绑定方法应用于应用程序APP,该智能设备的跨平台绑定方法主要包括以下步骤:
步骤S601:预先开启访问接入点并接入智能设备。
步骤S602:接收第二云平台发送的通过合法性验证的智能设备的设备合法信息,并在设备合法信息中获取用户凭证。
上述步骤S601至步骤S602的执行原理和过程与图5中公开的步骤S501至步骤S502的执行原理和过程相同,可参见,这里不再赘述。
步骤S603:利用第二云平台公钥对用户凭证进行加密,得到加密后的用户凭证。
在具体实现步骤S603的过程中,在APP上,APP获取到用户凭证之后,需要对用户凭证进行加密,因此,可以利用第二云平台公钥对用户凭证进行加密,得到加密后的用户凭证。
步骤S604:将加密后的用户凭证和配网信息发送至智能设备,使智能设备使用配网信息完成配网,将加密后的用户凭证发送至第二云平台,使第二云平台根据用户凭证生成智能设备在第二云平台的第二用户账号,并将智能设备与第二用户账号绑定,并生成访问令牌,将访问令牌与第二用户账号绑定,将访问令牌发送至第一云平台,并与智能设备在第一云平台创建的第一用户账号绑定,使智能设备使用访问令牌通过第一云平台访问第二云平台。
在具体实现步骤S604的过程中,在APP上,APP对用户凭证进行加密之后,将加密后的用户凭证和配网信息发送至智能设备,使智能设备将加密后的用户凭证发送至第二云平台,使第二云平台根据用户凭证生成智能设备在第二云平台的第二用户账号,并将智能设备与第二用户账号进行绑定,并生成访问令牌,将访问令牌与第二用户账号进行绑定,向第一云平台发送设备绑定成功信息和访问令牌,并与智能设备在第一云平台构建的第一用户账号进行绑定,使智能设备使用访问令牌通过第一云平台访问第二云平台。
基于本公开实施例提供的一种智能设备的跨平台绑定方法,通过将加密后的用户凭证和配网信息发送至智能设备,使智能设备将加密后的用户凭证发送至第二云平台,使第二云平台在绑定智能设备与第二用户账号之后,生成访问令牌,并基于访问令牌将第二用户账号和智能设备在第一云平台创建的第一用户账号进行绑定,使智能设备利用访问令牌实现通过第一云平台的账号访问第二云平台,即实现智能设备的跨平台绑定与访问的目的。
基于上述本公开实施例提供的一种智能设备的跨平台绑定方法,执行步骤S502接收第二云平台发送的通过合法性验证的智能设备的设备合法信息之前,还包括以下步骤:
步骤S11:接收智能设备发送的摘要和加密后的摘要。
在步骤S11中,摘要至少包含智能设备信息,摘要由智能设备创建,并由智能设备利用预置密钥进行加密。
需要说明的是,APP通过访问接入点接入智能设备之后,APP、智能设备、第一云平台以及第二云平台之间实现互相通讯。
在具体实现步骤SS11的过程中,APP接入智能设备之后,接收智能设备发送的智能设备创建的摘要和加密后的摘要。
步骤S12:将摘要和加密后的摘要发送至第一云平台,由第一云平台将摘要和加密后的摘要发送至第二云平台,使第二云平台利用预置密钥对加密后的摘要进行解密,并对得到的摘要进行合法性验证,确定智能设备的合法性。
在具体实现步骤SS12的过程中,APP将接收到的摘要和加密后的摘要发送至第一云平台,由第一云平台将摘要和加密后的摘要发送至第二云平台,使第二云平台利用预置密钥解密加密后的摘要,得到解密后的摘要,并对解密后的摘要进行合法性验证,确定智能设备的合法性。
基于本公开实施例提供的一种智能设备的跨平台绑定方法,通过验证智能设备的合法性,避免用户信息的泄露,从而为实现智能设备的跨平台绑定与访问提供前提条件。
基于上述本公开实施例示出的智能设备的跨平台绑定方法,如图7所示,为本公开实施例提供的一种智能设备的跨平台绑定方法的流程示意图,该智能设备的跨平台绑定方法应用于第一云平台,该智能设备的跨平台绑定方法主要包括以下步骤:
步骤S701:接收第二云平台发送的访问令牌。
在步骤S701中,访问令牌与智能设备在第二云平台生成的第二用户账号绑定,第二用户账号由第二云平台在应用程序APP预先开启访问接入点并接入智能设备之后,接收通过合法性验证的智能设备发送的用户凭证,根据用户凭证生 成智能设备在第二云平台的第二用户账号。
在具体实现步骤S701的过程中,第一云平台接收第二云平台发送的访问令牌。
步骤S702:将访问令牌与智能设备在第一云平台创建的第一用户账号绑定。
在具体实现步骤S702的过程中,第一云平台将访问令牌与智能设备在第一云平台创建的第一用户账号绑定。
步骤S703:利用访问令牌使智能设备访问第二云平台。
在具体实现步骤S703的过程中,第一云平台利用访问令牌使智能设备访问第二云平台。
基于本公开实施例提供的一种智能设备的绑定方法,通过将接收到的第二云平台发送的访问令牌与智能设备在第一云平台创建的第一用户账号绑定,从而能够利用访问令牌使智能设备访问第二云平台,实现智能设备的跨平台绑定与访问的目的。
基于上述本公开实施例示出的智能设备的跨平台绑定方法,本公开实施例还对应提供了一种应用于智能设备的跨平台绑定方法的交互示意图,如图8所示,该方法包括:
步骤S801:APP预先开启访问接入点。
步骤S802:智能设备接入APP开启的访问接入点,并创建摘要,利用预置密钥加密摘要,得到解密后的摘要,向APP发送摘要和解密后的摘要。
步骤S803:APP向第一云平台发送摘要和解密后的摘要。
步骤S804:第一云平台向第二云平台发送摘要和解密后的摘要。
步骤S805:第二云平台利用预置密钥解密加密后的摘要,得到解密后的摘要,将解密后的摘要与摘要进行对比,若对比一致,确定智能设备通过合法性验证,若对比不一致,确定智能设备未通过合法性验证,通过合法性验证之后,向第一 云平台发送智能设备的设备合法信息。
步骤S806:第一云平台向APP发送智能设备的设备合法信息。
步骤S807:APP利用第二云平台公钥对用户凭证进行加密,得到加密后的用户凭证,并向智能设备发送配网信息和加密后的用户凭证。
步骤S808:智能设备向第二云平台发送加密后的用户凭证。
步骤S809:第二云平台利用第二云平台私钥对加密后的用户凭证进行解密,根据得到的解密后的用户凭证生成智能设备在第二云平台的第二用户账号,将智能设备与第二用户账号绑定,并生成访问令牌,将访问令牌与第二用户账号绑定,向第一云平台发送设备绑定成功信息和访问令牌。
步骤S810:第一云平台将智能设备在第一云平台创建的第一用户账号与访问令牌绑定,使智能设备使用访问令牌通过第一云平台访问第二云平台。
基于本公开实施例提供的一种智能设备的跨平台绑定方法,在绑定智能设备与第二用户账号之后,生成访问令牌,并基于访问令牌将第二用户账号和智能设备在第一云平台创建的第一用户账号进行绑定,使智能设备利用访问令牌实现通过第一云平台的账号访问第二云平台,即实现智能设备的跨平台绑定与访问的目的。
与上述本公开实施例图1示出的一种智能设备的跨平台绑定方法相对应,本公开实施例还对应提供了一种第二云平台,如图9所示,该第二云平台包括:接收模块91、绑定与生成模块92和发送模块93。
第一接收模块91,设置为在应用程序APP预先开启访问接入点并接入智能设备之后,接收通过合法性验证的智能设备发送的用户凭证,根据所述用户凭证生成所述智能设备在所述第二云平台的第二用户账号,用户凭证由应用程序APP获取,并由APP利用第二云平台公钥加密。
绑定与生成模块92,设置为将智能设备与第二用户账号绑定,并生成访问令牌,将访问令牌与第二用户账号绑定。
第一发送模块93,设置为将访问令牌发送至第一云平台,并与智能设备在第一云平台构建的第一用户账号绑定,使智能设备使用访问令牌通过第一云平台访问第二云平台。
需要说明的是,上述本公开实施例公开的第二云平台中的各个模块具体的原理和执行过程,与上述本公开实施智能设备的跨平台绑定方法相同,可参见上述本公开实施例公开的智能设备的跨平台绑定方法中相应的部分,这里不再进行赘述。
基于本公开实施例提供的一种第二云平台,根据所述用户凭证生成所述智能设备在所述第二云平台的第二用户账号,接收通过合法性验证的智能设备发送的用户凭证,根据用户凭证生成智能设备在第二云平台的第二用户账号;将智能设备与第二用户账号绑定,并生成访问令牌,将访问令牌与第二用户账号绑定;将访问令牌发送至第一云平台,并与智能设备在第一云平台构建的第一用户账号绑定。在本方案中,在绑定智能设备与第二用户账号之后,生成访问令牌,并基于访问令牌将第二用户账号和智能设备在第一云平台创建的第一用户账号进行绑定,使智能设备利用访问令牌实现通过第一云平台的账号访问第二云平台,即实现智能设备的跨平台绑定与访问的目的。
可选的,基于上述图9示出的第二云平台,结合图9,如图10所示,该第二云平台还进一步设置了第一验证模块94。
第一验证模块94,设置为接收智能设备通过APP和第一云平台发送的摘要和加密后的摘要,其中,摘要至少包含设备信息,摘要由智能设备创建,并由智能设备利用预置密钥加密;利用预置密钥对加密后的摘要进行解密,并对得到的摘要进行合法性验证,确定智能设备的合法性。
基于本公开实施例提供的一种第二云平台,通过验证智能设备的合法性,避免用户信息的泄露,从而为实现智能设备的跨平台绑定与访问提供前提条件。
可选的,基于上述图9示出的第二云平台,所述第一发送模块93还具体设置为:
将智能设备的设备合法信息发送至APP,使APP利用第二云平台公钥加密用户凭证后,将配网信息和加密后的用户凭证发送至智能设备,使智能设备使用配网信息完成配网,并将加密后的用户凭证发送至第二云平台,配网信息至少包括路由器的服务集标识SSID和密码。
基于本公开实施例提供的一种第二云平台,通过将通过合法性验证的智能设备的设备合法信息发送至APP,为后续实现智能设备的跨平台绑定与访问提供前提条件。
可选的,基于上述图9示出的第二云平台,所述用于接收智能设备发送的用户凭证,根据用户凭证生成智能设备在第二云平台的第二用户账号的第一接收模块91具体设置为:
接收通过合法性验证的智能设备发送的加密后的用户凭证;利用第二云平台私钥对加密后的用户凭证进行解密,得到解密后的用户凭证;根据解密后的的用户凭证生成智能设备在第二云平台的第二用户账号。
基于本公开实施例提供的一种第二云平台,通过解密加密后的用户凭证,进而确保用户凭证没有被篡改过,避免用户信息的泄露,从而为智能设备的跨平台绑定与访问提供前提条件。
与上述本公开实施例图5示出的一种智能设备的跨平台绑定方法相对应,本公开实施例还对应提供了一种应用程序APP,如图11所示,该应用程序APP包括:接入模块111、第一处理模块112和第二发送模块113。
接入模块111,设置为预先开启访问接入点并接入智能设备。
第一处理模块112,设置为接收第二云平台发送的通过合法性验证的智能设备的设备合法信息,并在设备合法信息中获取用户凭证。
第二发送模块113,设置为将用户凭证和配网信息发送至第二云平台,使第二云平台根据用户凭证生成智能设备在第二云平台的第二用户账号,并将智能设备与第二用户账号绑定,并生成访问令牌,将访问令牌与第二用户账号绑定,将访问令牌发送至第一云平台,并与智能设备在第一云平台创建的第一用户账号绑 定,使智能设备使用访问令牌通过第一云平台访问第二云平台。
需要说明的是,上述本公开实施例公开的APP中的各个模块具体的原理和执行过程,与上述本公开实施智能设备的跨平台绑定方法相同,可参见上述本公开实施例公开的智能设备的跨平台绑定方法中相应的部分,这里不再进行赘述。
基于本公开实施例提供的一种APP,通过将获取到的用户凭证发送至第二云平台,使第二云平台在绑定智能设备与第二云平台的第二用户账号之后,生成访问令牌,并基于访问令牌将第二用户账号和智能设备在第一云平台创建的第一用户账号进行绑定,使智能设备利用访问令牌实现通过第一云平台的账号访问第二云平台,即实现智能设备的跨平台绑定与访问。
可选的,基于上述图11示出的APP,结合图11,如图12所示,该智能终端还进一步设置了第二验证模块114。
第二验证模块114,设置为接收智能设备发送的摘要和加密后的摘要,其中,摘要至少包含设备信息,摘要由智能设备创建,并由智能设备利用预置密钥加密;将摘要和加密后的摘要发送至第一云平台,由第一云平台将摘要和加密后的摘要发送至第二云平台,使第二云平台利用预置密钥对加密后的摘要进行解密,并将得到的摘要进行合法性验证,确定智能设备的合法性。
基于本公开实施例提供的一种APP,通过验证智能设备的合法性,避免用户信息的泄露,从而为实现智能设备的跨平台绑定与访问提供前提条件。
可选的,基于上述图12示出的APP,结合图12,如图13所示,该智能终端还进一步设置了第二处理模块115。
第二处理模块115,设置为利用第二云平台公钥对用户凭证进行加密,得到加密后的用户凭证;将加密后的用户凭证和配网信息发送至智能设备,使智能设备使用配网信息完成配网,并将加密后的用户凭证发送至第二云平台。
基于本公开实施例提供的一种APP,通过将加密后的用户凭证和配网信息发送至智能设备,使智能设备将加密后的用户凭证发送至第二云平台,使第二云平台在绑定智能设备与第二用户账号之后,生成访问令牌,并基于访问令牌将第二 用户账号和智能设备在第一云平台创建的第一用户账号进行绑定,使智能设备利用访问令牌实现通过第一云平台的账号访问第二云平台,即实现智能设备的跨平台绑定与访问的目的。
与上述本公开实施例图7示出的一种智能设备的跨平台绑定方法相对应,本公开实施例还对应提供了一种第一云平台,如图14所示,该第一云平台包括:第二接收模块141、绑定模块142和第三处理模块143。
第二接收模块141,设置为接收第二云平台发送的访问令牌,访问令牌与智能设备在第二云平台生成的第二用户账号绑定,第二用户账号由第二云平台在应用程序APP预先开启访问接入点并接入智能设备之后,接收通过合法性验证的智能设备发送的用户凭证,根据用户凭证生成智能设备在第二云平台的第二用户账号。
绑定模块142,设置为将访问令牌与智能设备在第一云平台创建的第一用户账号绑定。
第三处理模块143,设置为利用访问令牌使智能设备访问第二云平台。
需要说明的是,上述本公开实施例公开的第一云平台中的各个模块具体的原理和执行过程,与上述本公开实施智能设备的跨平台绑定方法相同,可参见上述本公开实施例公开的智能设备的跨平台绑定方法中相应的部分,这里不再进行赘述。
基于本公开实施例提供的一种第一云平台,通过将接收到的第二云平台发送的访问令牌与智能设备在第一云平台创建的第一用户账号绑定,从而能够利用访问令牌使智能设备访问第二云平台,实现智能设备的跨平台绑定与访问的目的。
与上述本公开实施例示出的一种智能设备的跨平台绑定方法相对应,本公开实施例还对应提供了一种智能设备的跨平台绑定系统,如图15所示,该智能设备的绑定系统包括:智能设备151、应用程序APP152、第一云平台153和第二云平台154。
智能设备151,设置为开启配网模式,扫描APP开启的访问接入点接入APP。
APP152,设置为预先开启访问接入点并接入智能设备,并接收第二云平台发送的通过合法性验证的智能设备的设备合法信息,并在设备合法信息中获取用户凭证;将用户凭证发送至第二云平台。
第二云平台154,设置为验证智能设备的合法性,并将智能设备的设备合法信息发送至APP,接收APP发送的用户凭证,根据用户凭证生成智能设备在第二云平台的第二用户账号,并将智能设备与第二用户账号绑定,并生成访问令牌,将访问令牌与第二用户账号绑定,将访问令牌发送至第一云平台。
第一云平台153,设置为接收访问令牌,并将访问令牌与智能设备在第一云平台创建的第一用户账号绑定,使智能设备使用访问令牌通过第一云平台访问第二云平台。
需要说明的是,上述本公开实施例公开的第二云平台中的各个模块具体的原理和执行过程,与上述图1至图4实施的智能设备的跨平台绑定方法相同,可参见上述图1至图4公开的智能设备的跨平台绑定方法中相应的部分,这里不再进行赘述。
需要说明的是,上述本公开实施例公开的应用程序APP中的各个模块具体的原理和执行过程,与上述图5至图6实施的智能设备的跨平台绑定方法相同,可参见上述图5至图6公开的智能设备的跨平台绑定方法中相应的部分,这里不再进行赘述。
需要说明的是,上述本公开实施例公开的第一云平台中的各个模块具体的原理和执行过程,与上述图7实施的智能设备的跨平台绑定方法相同,可参见上述图7公开的智能设备的跨平台绑定方法中相应的部分,这里不再进行赘述。
基于本公开实施例提供的一种智能设备的跨平台绑定系统,在应用程序APP预先开启访问接入点并接入智能设备之后,接收通过合法性验证的智能设备发送的用户凭证,根据用户凭证生成智能设备在第二云平台的第二用户账号;将智能设备与第二用户账号绑定,并生成访问令牌,将访问令牌与第二用户账号绑定;将访问令牌发送至第一云平台,并与智能设备在第一云平台构建的第一用户账号 绑定,使智能设备使用访问令牌通过第一云平台访问第二云平台。在本方案中,在绑定智能设备与第二用户账号之后,生成访问令牌,并基于访问令牌将第二用户账号和智能设备在第一云平台创建的第一用户账号进行绑定,使智能设备利用访问令牌实现通过第一云平台的账号访问第二云平台,即实现智能设备的跨平台绑定与访问的目的。
基于上述本公开实施例公开的智能设备的跨平台绑定系统,上述各个模块可以通过一种由处理器和存储器构成的硬件设备实现。具体为上述各个模块作为程序单元存储于存储器中,由处理器执行存储在存储器中的上述程序单元来实现智能设备的跨平台绑定。
其中,处理器中包含内核,由内核去存储器中调取相应的程序单元。内核可以设置一个或以上,通过调整内核参数来实现智能设备的跨平台绑定。
本公开实施例提供了一种计算机存储介质,所述存储介质中存储有计算机程序,其中,计算机程序被处理器执行时实现如权利要求1至4中任一项的智能设备的跨平台绑定方法,或者,权利要求5至7中任一所述的智能设备的跨平台绑定方法,或者,权利要求8中所述的智能设备的跨平台绑定方法。
本公开实施例提供了一种处理器,所述处理器设置为运行程序,其中,所述程序运行时执行图1公开的智能设备的跨平台绑定方法,或者,图5公开的智能设备的跨平台绑定方法,图7公开的智能设备的跨平台绑定方法。
本公开实施例提供了一种电子设备,如图16所示,为本公开实施例提供的一种电子设备160的结构示意图。
本公开实施例中的电子设备可以是服务器、PC、PAD、手机等。
该电子设备包括至少一个处理器1601,以及与处理器连接的至少一个存储器1602,以及总线1603。
处理器1601、存储器1602通过总线1603完成相互间的通信。处理器1601,设置为执行存储器1602中存储的计算机程序。
存储器1602,设置为存储程序,该程序至少设置为:在应用程序APP预先开启访问接入点并接入智能设备之后,接收通过合法性验证的智能设备发送的用户凭证,根据用户凭证生成智能设备在第二云平台的第二用户账号;将智能设备与第二用户账号绑定,并生成访问令牌,将访问令牌与第二用户账号绑定;将访问令牌发送至第一云平台,并与智能设备在第一云平台构建的第一用户账号绑定,使智能设备使用访问令牌通过第一云平台访问第二云平台。
本公开还提供了一种计算机程序产品,当在电子设备上执行时,适于执行初始化有如下方法步骤的程序:
在应用程序APP预先开启访问接入点并接入智能设备之后,接收通过合法性验证的智能设备发送的用户凭证,根据用户凭证生成智能设备在第二云平台的第二用户账号;将智能设备与第二用户账号绑定,并生成访问令牌,将访问令牌与第二用户账号绑定;将访问令牌发送至第一云平台,并与智能设备在第一云平台构建的第一用户账号绑定,使智能设备使用访问令牌通过第一云平台访问第二云平台。
本公开是参照根据本公开实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
在一个典型的配置中,设备包括一个或多个处理器(CPU)、存储器和总线。设备还可以包括输入/输出接口、网络接口等。
存储器可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM),存储器包括至少一个存储芯片。存储器是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可设置为存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于系统或系统实施例而言,由于其基本相似于方法实施例,所以描述得比较简单,相关之处参见方法实施例的部分说明即可。以上所描述的系统及系统实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。
专业人员还可以进一步意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、计算机软件或者二者的结合来实现,为了清楚地说明硬件和软件的可互换性,在上述说明中已经按照功能一般性地描述了各示例的组成及步骤。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本公开的范围。
对所公开的实施例的上述说明,使本领域专业技术人员能够实现或使用本公开。对这些实施例的多种修改对本领域的专业技术人员来说将是显而易见的,本 文中所定义的一般原理可以在不脱离本公开的精神或范围的情况下,在其它实施例中实现。因此,本公开将不会被限制于本文所示的这些实施例,而是要符合与本文所公开的原理和新颖特点相一致的最宽的范围。

Claims (22)

  1. 一种智能设备的跨平台绑定方法,应用于第二云平台,所述方法包括:
    在应用程序APP预先开启访问接入点并接入智能设备之后,接收通过合法性验证的所述智能设备发送的用户凭证,根据所述用户凭证生成所述智能设备在所述第二云平台的第二用户账号;
    将所述智能设备与所述第二用户账号绑定,并生成访问令牌,将所述访问令牌与所述第二用户账号绑定;
    将所述访问令牌发送至第一云平台,并与所述智能设备在所述第一云平台创建的第一用户账号绑定,使所述智能设备使用所述访问令牌通过所述第一云平台访问所述第二云平台。
  2. 根据权利要求1所述的方法,其中,所述验证所述智能设备的合法性的过程包括:
    接收所述智能设备通过所述APP和所述第一云平台发送的摘要和加密后的摘要,其中,所述摘要至少包含设备信息,所述摘要由所述智能设备创建,并由所述智能设备利用预置密钥加密;
    利用所述预置密钥对所述加密后的摘要进行解密,并对得到的摘要进行合法性验证,确定所述智能设备的合法性。
  3. 根据权利要求2所述的方法,其中,在确定所述智能设备的合法性之后,还包括:
    将所述智能设备的设备合法信息发送至所述APP,使所述APP利用第二云平台公钥加密用户凭证后,将配网信息和加密后的用户凭证发送至所述智能设备,使所述智能设备使用所述配网信息完成配网,并将所述加密后的用户凭证发送至所述第二云平台,所述配网信息至少包括路由器的服务集标识SSID和密码。
  4. 根据权利要求3所述的方法,其中,所述接收所述智能设备发送的用户凭证,根据所述用户凭证生成所述智能设备在所述第二云平台的第二用户账号,包括:
    接收通过合法性验证的所述智能设备发送的加密后的用户凭证;
    利用第二云平台私钥对所述加密后的用户凭证进行解密,得到解密后的用户凭证;
    根据所述解密后的用户凭证生成所述智能设备在所述第二云平台的第二用户账号。
  5. 一种智能设备的跨平台绑定方法,应用于应用程序APP,所述方法包括:
    预先开启访问接入点并接入智能设备;
    接收第二云平台发送的通过合法性验证的所述智能设备的设备合法信息,并在所述设备合法信息中获取用户凭证;
    将所述用户凭证发送至所述第二云平台,使所述第二云平台根据所述用户凭证生成所述智能设备在第二云平台的第二用户账号,并将所述智能设备与所述第二用户账号绑定,并生成访问令牌,将所述访问令牌与所述第二用户账号绑定,将所述访问令牌发送至第一云平台,并与所述智能设备在所述第一云平台创建的第一用户账号绑定,使所述智能设备使用所述访问令牌通过所述第一云平台访问所述第二云平台。
  6. 根据权利要求5所述的方法,其中,在接收第二云平台发送的通过合法性验证的智能设备的设备合法信息之前,还包括:
    接收所述智能设备发送的摘要和加密后的摘要,其中,所述摘要至少包含设备信息,所述摘要由所述智能设备创建,并由所述智能设备利用预置密钥加密;
    将所述摘要和所述加密后的摘要发送至第一云平台,由所述第一云平台将所述摘要和所述加密后的摘要发送至所述第二云平台,使所述第二云平台利用所述预置密钥对所述加密后的摘要进行解密,并对得到的摘要进行合法性验证, 确定所述智能设备的合法性。
  7. 根据权利要求5所述的方法,其中,还包括:
    利用第二云平台公钥对所述用户凭证进行加密,得到加密后的用户凭证;
    将所述加密后的用户凭证和配网信息发送至所述智能设备,使所述智能设备使用所述配网信息完成配网,并将所述加密后的用户凭证发送至所述第二云平台。
  8. 一种智能设备的跨平台绑定方法,应用于第一云平台,所述方法包括:
    接收第二云平台发送的访问令牌,所述访问令牌与智能设备在所述第二云平台生成的第二用户账号绑定,所述第二用户账号由所述第二云平台在应用程序APP预先开启访问接入点并接入所述智能设备之后,接收通过合法性验证的所述智能设备发送的用户凭证,根据所述用户凭证生成所述智能设备在所述第二云平台的第二用户账号;
    将所述访问令牌与所述智能设备在所述第一云平台创建的第一用户账号绑定;
    利用所述访问令牌使所述智能设备访问所述第二云平台。
  9. 一种第二云平台,所述第二云平台包括:
    第一接收模块,设置为在应用程序APP预先开启访问接入点并接入智能设备之后,接收通过合法性验证的所述智能设备发送的用户凭证,根据所述用户凭证生成所述智能设备在所述第二云平台的第二用户账号;
    绑定与生成模块,设置为将所述智能设备与所述第二用户账号绑定,并生成访问令牌,将所述访问令牌与所述第二用户账号绑定;
    第一发送模块,设置为将所述访问令牌发送至第一云平台,并与所述智能设备在所述第一云平台创建的第一用户账号绑定,使所述智能设备使用所述访问令牌通过所述第一云平台访问所述第二云平台。
  10. 根据权利要求9所述的第二云平台,其中,所述第二云平台还包括:
    第一验证模块,设置为接收所述智能设备通过所述APP和所述第一云平台发送的摘要和加密后的摘要,其中,所述摘要至少包含设备信息,所述摘要由所述智能设备创建,并由所述智能设备利用预置密钥加密;利用所述预置密钥对所述加密后的摘要进行解密,并对得到的摘要进行合法性验证,确定所述智能设备的合法性。
  11. 根据权利要求10所述的第二云平台,其中,包括:
    所述第一发送模块,还设置为将所述智能设备的设备合法信息发送至所述APP,使所述APP利用第二云平台公钥加密用户凭证后,将配网信息和加密后的用户凭证发送至所述智能设备,使所述智能设备使用所述配网信息完成配网,并将所述加密后的用户凭证发送至所述第二云平台,所述配网信息至少包括路由器的服务集标识SSID和密码。
  12. 根据权利要求11所述的第二云平台,其中,包括:
    所述第一接收模块,还设置为接收通过合法性验证的所述智能设备发送的加密后的用户凭证;利用第二云平台私钥对所述加密后的用户凭证进行解密,得到解密后的用户凭证;根据所述解密后的用户凭证生成所述智能设备在所述第二云平台的第二用户账号。
  13. 一种应用程序APP,所述APP包括:
    接入模块,设置为预先开启访问接入点并接入智能设备;
    第一处理模块,设置为接收第二云平台发送的通过合法性验证的所述智能设备的设备合法信息,并在所述设备合法信息中获取用户凭证;
    第二发送模块,设置为将所述用户凭证发送至所述第二云平台,使所述第二云平台根据所述用户凭证生成所述智能设备在第二云平台的第二用户账号,并将所述智能设备与所述第二用户账号绑定,并生成访问令牌,将所述访问令牌与所述第二用户账号绑定,将所述访问令牌发送至第一云平台,并与所述智 能设备在所述第一云平台创建的第一用户账号绑定,使所述智能设备使用所述访问令牌通过所述第一云平台访问所述第二云平台。
  14. 根据权利要求13所述的APP,其中,所述APP还包括:
    第二验证模块,设置为接收所述智能设备发送的摘要和加密后的摘要,其中,所述摘要至少包含设备信息,所述摘要由所述智能设备创建,并由所述智能设备利用预置密钥加密;将所述摘要和所述加密后的摘要发送至第一云平台,由所述第一云平台将所述摘要和所述加密后的摘要发送至所述第二云平台,使所述第二云平台利用所述预置密钥对所述加密后的摘要进行解密,并对得到的摘要进行合法性验证,确定所述智能设备的合法性。
  15. 根据权利要求13所述的APP,其中,所述APP还包括:
    第二处理模块,设置为利用第二云平台公钥对所述用户凭证进行加密,得到加密后的用户凭证;将所述加密后的用户凭证和配网信息发送至所述智能设备,使所述智能设备使用所述配网信息完成配网,并将所述加密后的用户凭证发送至所述第二云平台。
  16. 一种第一云平台,所述第一云平台包括:
    第二接收模块,设置为接收第二云平台发送的访问令牌,所述访问令牌与智能设备在所述第二云平台生成的第二用户账号绑定,所述第二用户账号由所述第二云平台在应用程序APP预先开启访问接入点并接入所述智能设备之后,接收通过合法性验证的所述智能设备发送的用户凭证,根据所述用户凭证生成所述智能设备在第二云平台的第二用户账号;
    绑定模块,设置为将所述访问令牌与所述智能设备在所述第一云平台创建的第一用户账号绑定;
    第三处理模块,设置为利用所述访问令牌使所述智能设备访问所述第二云平台。
  17. 一种智能设备的跨平台绑定系统,包括:智能设备、应用程序APP、第一云 平台和第二云平台;
    所述智能设备,设置为开启配网模式,扫描所述APP开启的所述访问接入点接入所述APP;
    所述APP,设置为预先开启访问接入点并接入所述智能设备,并接收第二云平台发送的通过合法性验证的所述智能设备的设备合法信息,并在所述设备合法信息中获取所述用户凭证;将所述用户凭证发送至所述第二云平台;
    所述第二云平台,设置为验证所述智能设备的合法性,并将所述智能设备的设备合法信息发送至所述APP,接收所述APP发送的用户凭证,根据所述用户凭证生成所述智能设备在所述第二云平台的第二用户账号,并将所述智能设备与所述第二用户账号绑定,并生成访问令牌,将所述访问令牌与所述第二用户账号绑定,将所述访问令牌发送至第一云平台;
    所述第一云平台,设置为接收所述访问令牌,并将所述访问令牌与所述智能设备在所述第一云平台创建的第一用户账号绑定,使所述智能设备使用所述访问令牌通过所述第一云平台访问所述第二云平台。
  18. 根据权利要求17所述的智能设备的跨平台绑定系统,其中,包括:
    所述智能设备,还设置为创建摘要,以及利用预置密钥加密所述摘要,其中,所述摘要至少包含设备信息;
    所述APP,还设置为接收所述智能设备发送的摘要和加密后的摘要,并将所述摘要和所述加密后的摘要发送至第一云平台;
    所述第一云平台,还设置为将所述摘要和所述加密后的摘要发送至所述第二云平台;
    所述第二云平台,还设置为利用所述预置密钥对所述加密后的摘要进行解密,并对得到的摘要进行合法性验证,确定所述智能设备的合法性。
  19. 根据权利要求17所述的智能设备的跨平台绑定系统,其中,包括:
    所述第二云平台,还设置为将所述智能设备的设备合法信息发送至所述 APP,
    所述APP,还设置为利用第二云平台公钥加密用户凭证,将配网信息和加密后的用户凭证发送至所述智能设备;
    所述智能设备还设置为使用所述配网信息完成配网,并将所述加密后的用户凭证发送至所述第二云平台,所述配网信息至少包括路由器的服务集标识SSID和密码。
  20. 根据权利要求17所述的智能设备的跨平台绑定系统,其中,包括:
    所述第二云平台,还设置为接收通过合法性验证的所述智能设备发送的加密后的用户凭证;利用第二云平台私钥对所述加密后的用户凭证进行解密,得到解密后的用户凭证;根据所述解密后的用户凭证生成所述智能设备在所述第二云平台的第二用户账号。
  21. 一种电子设备,包括存储器和处理器,所述存储器中存储有计算机程序,所述处理器被设置为通过所述计算机程序执行权利要求1至4中任一所述的智能设备的跨平台绑定方法,或者,权利要求5至7中任一所述的智能设备的跨平台绑定方法,或者,权利要求8中所述的智能设备的跨平台绑定方法。
  22. 一种存储介质,所述存储介质中存储有计算机程序,其中,在所述计算机程序运行时控制所述存储介质所在设备执行如权利要求1至4中任一所述的智能设备的跨平台绑定方法,或者,权利要求5至7中任一所述的智能设备的跨平台绑定方法,或者,权利要求8中所述的智能设备的跨平台绑定方法。
PCT/CN2022/113019 2021-08-30 2022-08-17 智能设备的跨平台绑定方法、系统及相关设备 WO2023030009A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111006010.2A CN113766496B (zh) 2021-08-30 2021-08-30 智能设备的跨平台绑定方法、系统及相关设备
CN202111006010.2 2021-08-30

Publications (1)

Publication Number Publication Date
WO2023030009A1 true WO2023030009A1 (zh) 2023-03-09

Family

ID=78791863

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/113019 WO2023030009A1 (zh) 2021-08-30 2022-08-17 智能设备的跨平台绑定方法、系统及相关设备

Country Status (2)

Country Link
CN (1) CN113766496B (zh)
WO (1) WO2023030009A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113766496B (zh) * 2021-08-30 2024-01-26 青岛海尔科技有限公司 智能设备的跨平台绑定方法、系统及相关设备
CN113766503B (zh) * 2021-08-31 2023-10-24 青岛海尔科技有限公司 智能设备的绑定方法、系统及相关设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103179115A (zh) * 2013-03-18 2013-06-26 中国科学院信息工程研究所 一种面向云电视终端跨云应用的云服务访问控制方法
CN107995215A (zh) * 2017-12-20 2018-05-04 青岛海信智慧家居系统股份有限公司 智能家居设备的控制方法、装置及云平台服务器
CN109600223A (zh) * 2017-09-30 2019-04-09 腾讯科技(深圳)有限公司 验证方法、激活方法、装置、设备及存储介质
US20190334718A1 (en) * 2016-12-22 2019-10-31 Huawei Technologies Co., Ltd. Application Program Authorization Method, Terminal, and Server
CN113766496A (zh) * 2021-08-30 2021-12-07 青岛海尔科技有限公司 智能设备的跨平台绑定方法、系统及相关设备

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102739708B (zh) * 2011-04-07 2015-02-04 腾讯科技(深圳)有限公司 一种基于云平台访问第三方应用的系统及方法
CN104378342B (zh) * 2014-01-10 2016-04-13 腾讯科技(深圳)有限公司 多账号验证方法、装置及系统
CN105897668A (zh) * 2015-10-22 2016-08-24 乐视致新电子科技(天津)有限公司 一种第三方账号授权方法、设备、服务器及其系统
CN105825101A (zh) * 2016-05-11 2016-08-03 百度在线网络技术(北京)有限公司 应用于智能家居平台的账号管理方法和装置
CN109525605B (zh) * 2019-01-03 2021-07-27 杭州数梦工场科技有限公司 一种账号管理方法、装置、系统及计算机可读存储介质
CN113079224A (zh) * 2021-03-19 2021-07-06 北京三快在线科技有限公司 一种账号绑定方法、装置、存储介质及电子设备

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103179115A (zh) * 2013-03-18 2013-06-26 中国科学院信息工程研究所 一种面向云电视终端跨云应用的云服务访问控制方法
US20190334718A1 (en) * 2016-12-22 2019-10-31 Huawei Technologies Co., Ltd. Application Program Authorization Method, Terminal, and Server
CN109600223A (zh) * 2017-09-30 2019-04-09 腾讯科技(深圳)有限公司 验证方法、激活方法、装置、设备及存储介质
CN107995215A (zh) * 2017-12-20 2018-05-04 青岛海信智慧家居系统股份有限公司 智能家居设备的控制方法、装置及云平台服务器
CN113766496A (zh) * 2021-08-30 2021-12-07 青岛海尔科技有限公司 智能设备的跨平台绑定方法、系统及相关设备

Also Published As

Publication number Publication date
CN113766496A (zh) 2021-12-07
CN113766496B (zh) 2024-01-26

Similar Documents

Publication Publication Date Title
KR102018971B1 (ko) 네트워크 액세스 디바이스가 무선 네트워크 액세스 포인트를 액세스하게 하기 위한 방법, 네트워크 액세스 디바이스, 애플리케이션 서버 및 비휘발성 컴퓨터 판독가능 저장 매체
WO2023030009A1 (zh) 智能设备的跨平台绑定方法、系统及相关设备
CN102595404B (zh) 用于存储和执行访问控制客户端的方法及装置
US11134069B2 (en) Method for authorizing access and apparatus using the method
CN108234115B (zh) 信息安全的验证方法、装置和系统
WO2016107203A1 (zh) 一种身份认证方法及装置
WO2016177052A1 (zh) 一种用户认证方法和装置
WO2021109963A1 (zh) 初始安全配置方法、安全模块及终端
US8495383B2 (en) Method for the secure storing of program state data in an electronic device
WO2023143037A1 (zh) 密钥管理和业务处理
CN107743067A (zh) 数字证书的颁发方法、系统、终端以及存储介质
WO2023030014A1 (zh) 智能设备的绑定方法、系统及相关设备
JP2014516227A (ja) マルチテナントサービスプロバイダによるダイナミックプラットフォームの再構成
CN111131416A (zh) 业务服务的提供方法和装置、存储介质、电子装置
WO2021120924A1 (zh) 一种证书申请方法及设备
CN112087304B (zh) 可信计算环境的异构融合方法、装置及相关设备
WO2023207113A1 (zh) 一种设备互联安全认证系统、方法、装置、服务器及介质
CN110998527A (zh) 对计算设备的远程控制
TWI827906B (zh) 訊息傳輸系統以及應用其中之使用者裝置與資訊安全硬體模組
CN114223176B (zh) 一种证书管理方法及装置
CN114338091B (zh) 数据传输方法、装置、电子设备及存储介质
CN116781292A (zh) 一种数据处理方法、装置、设备以及可读存储介质
WO2019120231A1 (zh) 确定tpm可信状态的方法、装置及存储介质
CN113535852A (zh) 基于区块链的文件处理方法、文件访问方法、装置及系统
WO2023240587A1 (zh) 一种设备权限配置方法及装置、终端设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22863149

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 22863149

Country of ref document: EP

Kind code of ref document: A1