WO2023279897A1 - 安全绑定方法及系统、存储介质、电子装置 - Google Patents

安全绑定方法及系统、存储介质、电子装置 Download PDF

Info

Publication number
WO2023279897A1
WO2023279897A1 PCT/CN2022/096414 CN2022096414W WO2023279897A1 WO 2023279897 A1 WO2023279897 A1 WO 2023279897A1 CN 2022096414 W CN2022096414 W CN 2022096414W WO 2023279897 A1 WO2023279897 A1 WO 2023279897A1
Authority
WO
WIPO (PCT)
Prior art keywords
binding
information
key
session key
code
Prior art date
Application number
PCT/CN2022/096414
Other languages
English (en)
French (fr)
Inventor
柯小锋
Original Assignee
青岛海尔科技有限公司
海尔智家股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 青岛海尔科技有限公司, 海尔智家股份有限公司 filed Critical 青岛海尔科技有限公司
Publication of WO2023279897A1 publication Critical patent/WO2023279897A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/255Maintenance or indexing of mapping tables
    • H04L61/2553Binding renewal aspects, e.g. using keep-alive messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Definitions

  • the present disclosure relates to the technical field of communications, and in particular, to a secure binding method and system, a storage medium, and an electronic device.
  • the binding process is based on the interaction of non-secure connections, or data encryption is performed through a fixed interaction password, which leads to insecure data transmission and does not meet the requirements for IOT (Internet of Things, Internet of Things, referred to as IOT) device security requirements, in addition, there are the following problems related to binding: the current binding interaction is that the mobile phone sends the routing information and user information required by the device to the device, and the device connects to the routing and platform, and then initiates the binding The mobile phone keeps polling the binding results. During the interaction of the device binding process, the binding process initiated by the mobile phone multiple times leads to the mobile phone being unable to determine the uniqueness of each interaction. The current mechanism is not safe, and the uniqueness cannot be determined. Configure the relationship of binding results once.
  • Embodiments of the present disclosure provide a secure binding method and system, a storage medium, and an electronic device, so as to at least solve problems in related technologies such as the inability to determine the uniqueness of a configuration binding result during an interaction process of a binding request for a device.
  • a security binding method including: after detecting a network access request initiated by a device, sending instruction information to the IoT cloud to execute a security binding process; receiving the IoT cloud response instruction information The issued security information, wherein the security information includes: a binding code for uniquely identifying the current binding process, a first session key for establishing a secure connection with the device; establishing a secure connection with the device through the first session key , to obtain the device information of the device based on the secure connection; obtain the binding result of the device determined in the IoT cloud according to the device information and the binding code, where the binding result is used to indicate the binding information of the device to realize the binding in the IoT cloud .
  • another secure binding method including: establishing a secure connection with the mobile terminal through a first session key, wherein the first session key is for the mobile terminal to initiate the security binding Get the security information of the Internet of Things cloud response after the instruction information of the process; send the device information to the mobile terminal; receive the binding code sent by the mobile terminal, where the binding code is used to uniquely identify the current binding process; according to the device information and binding The fixed code determines the binding result of device binding on the Internet of Things cloud, wherein the binding result is used to indicate the binding information of the device binding on the Internet of Things cloud.
  • a security binding system including: the Internet of Things cloud, which is connected to the mobile terminal, and is configured to receive the instruction information that the mobile terminal initiates the execution of the security binding process, Send security information to the mobile terminal in response to the indication information, wherein the security information includes: a binding code used to uniquely identify the current binding process, a first session key used to establish a secure connection with the device; the mobile terminal is set according to The first session key in the received security information establishes a secure connection with the device, obtains device information of the device based on the secure connection, and determines a binding result of device binding on the IoT cloud according to the device information and the binding code.
  • a computer-readable storage medium is also provided, and a computer program is stored in the computer-readable storage medium, wherein the computer program is configured to perform any of the above-mentioned The steps in the method embodiment.
  • an electronic device including a memory and a processor, wherein a computer program is stored in the memory, and the processor is configured to run the computer program to perform any of the above Steps in the method examples.
  • the instruction information for executing the security binding process is initiated to the cloud of the Internet of Things; the security information issued by the cloud of the Internet of Things in response to the instruction information is received, wherein the security information includes: Identify the binding code of the current binding process, the first session key used to establish a secure connection with the device; establish a secure connection with the device through the first session key, and obtain the device information of the device based on the secure connection; obtain the device information based on the device information and The binding result of the device determined by the binding code in the IoT cloud, where the binding result is used to indicate the binding information of the device in the IoT cloud, that is, by obtaining the binding code in the security information from the IoT cloud Confirm the security binding process, and further determine the final binding result of the device according to the binding code and device information.
  • the configuration binding cannot be determined during the interaction process of the binding request of the device.
  • the uniqueness of the results and other issues, and through the protection of the data information in the security binding process in the security information, the security level of the device binding router for activation is improved, and the binding code is used to realize the binding process of the device to be bound.
  • Accurate determination further improves the user's binding experience for device binding.
  • FIG. 1 is a block diagram of the hardware structure of a computer terminal in a secure binding method according to an embodiment of the present disclosure
  • FIG. 2 is a flowchart (1) of a secure binding method according to an embodiment of the present disclosure
  • FIG. 3 is a flowchart (2) of a secure binding method according to an embodiment of the present disclosure
  • Fig. 4 is an interactive schematic diagram of device binding according to an optional embodiment of the present disclosure.
  • Fig. 5 is a structural block diagram of a security binding system according to an embodiment of the present disclosure.
  • FIG. 1 is a block diagram of a hardware structure of a computer terminal according to a secure binding method according to an embodiment of the present disclosure.
  • the computer terminal may include one or more (only one is shown in Figure 1) processors 102 (processors 102 may include but not limited to processing devices such as microprocessor MCU or programmable logic device FPGA, etc.) and a memory 104 for storing data.
  • processors 102 may include but not limited to processing devices such as microprocessor MCU or programmable logic device FPGA, etc.
  • the above-mentioned computer terminal may further include a transmission device 106 and an input and output device 108 for communication functions.
  • FIG. 1 is only for illustration, and it does not limit the structure of the above computer terminal.
  • the computer terminal may also include more or less components than those shown in FIG. 1 , or have a different configuration with functions equivalent to those shown in FIG. 1 or more functions than those shown in FIG. 1 .
  • the memory 104 may be configured to store computer programs, for example, software programs and modules of application software, such as computer programs corresponding to the secure binding method in the embodiments of the present disclosure, and the processor 102 runs the computer programs stored in the memory 104, thereby Executing various functional applications and data processing is to realize the above-mentioned method.
  • the memory 104 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory.
  • the memory 104 may further include a memory that is remotely located relative to the processor 102, and these remote memories may be connected to a computer terminal through a network. Examples of the aforementioned networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
  • the transmission device 106 is configured to receive or transmit data via a network.
  • the specific example of the above-mentioned network may include a wireless network provided by the communication provider of the computer terminal.
  • the transmission device 106 includes a network interface controller (NIC for short), which can be connected to other network devices through a base station so as to communicate with the Internet.
  • the transmission device 106 may be a radio frequency (Radio Frequency, referred to as RF) module, which is used to communicate with the Internet in a wireless manner.
  • RF Radio Frequency
  • FIG. 2 is a flowchart (1) of a secure binding method according to an embodiment of the present disclosure. The process includes the following steps:
  • Step S202 after detecting the network access request initiated by the device, sending instruction information to the cloud of the Internet of Things to execute the security binding process;
  • the above-mentioned network access request is the network access information initiated by the device in any request method, and the above-mentioned network access request can include wireless soft AP hotspot, Bluetooth broadcast; and then configure the corresponding account and password information for the device to connect to the router according to the request method .
  • Step S204 receiving the security information issued by the Internet of Things cloud in response to the indication information, wherein the security information includes: a binding code for uniquely identifying the current binding process, and a first key for establishing a secure connection with the device. a session key;
  • Step S205 establishing a secure connection with the device through the first session key, and acquiring device information of the device based on the secure connection;
  • Step S206 obtaining the binding result of the device determined on the Internet of Things cloud according to the device information and the binding code, wherein the binding result is used to indicate that the device is bound on the Internet of Things cloud.
  • the specified binding information is used to indicate that the device is bound on the Internet of Things cloud.
  • the instruction information for executing the security binding process is sent to the cloud of the Internet of Things; the security information issued by the cloud of the Internet of Things in response to the instruction information is received, wherein the security information includes: for The binding code that uniquely identifies the current binding process, the first session key used to establish a secure connection with the device; establish a secure connection with the device through the first session key, and obtain the device information of the device based on the secure connection; obtain the device information based on the The binding result of the device determined with the binding code in the IoT cloud, where the binding result is used to indicate the binding information of the device in the IoT cloud, that is, by obtaining the binding information in the security information from the IoT cloud code to confirm the security binding process, and further determine the final binding result of the device according to the binding code and device information.
  • the above technical solution solves the problem that in the related technology, the configuration binding cannot be determined during the interaction process of the device binding request.
  • the uniqueness of the determination results and other issues, and through the protection of the data information in the security binding process in the security information, the security level of the device binding router for activation is improved, and the binding process of the device to be bound is realized by using the binding code
  • the accurate determination of the device further improves the binding experience of the user for device binding.
  • the operation of establishing a secure connection with the device using the first session key includes: encrypting a first character string according to the first session key, where the first character string is used to indicate the establishment of a secure connection; if the security information also includes a generation factor corresponding to the first session key, send a connection request carrying the encrypted first character string and the generation factor of the first session key to the device, to instruct the device according to A connection request to establish a secure connection.
  • the boot information (equivalent to the first character string in this disclosure) is encrypted by obtaining security information from the Internet of Things cloud, and the configuration information used to connect to the router will be synchronized to the device only when the device passes the verification , it should be noted that the guide information is used to indicate the default description information set on the mobile terminal for handshaking between the terminal and the device.
  • the device uses the first session key to encrypt hello (equivalent to the first character string in the disclosed embodiment), and send the key parameter factor to the device at the same time, and the device first uses the key parameter factor and the built-in device key and specified
  • the algorithm generates the second session key Sessionkey, and decrypts the first encrypted data sent by the mobile terminal. If the decrypted data is hello, the authentication is passed and the connection is established successfully, otherwise the connection is rejected; optionally, the device key can be One device one key, which can generate a unique device key for each device through the root key + device information.
  • the first session key is generated by a generation factor, a device key, and a preset algorithm, wherein the preset algorithm is an operation method determined according to the device type, and the generation factor is used to indicate the generation of the first session
  • the preset algorithm is an operation method determined according to the device type
  • the generation factor is used to indicate the generation of the first session
  • the key parameter of the key, the device key is used to indicate the encryption key set by the device at the factory.
  • the device key is generated by the root key and device information, wherein the root key is used to indicate the key stored locally on the device for confidentiality protection of the upper layer key, and the device information It is used to indicate the function information and hardware parameter information of the device.
  • obtaining the binding result of the device determined on the cloud of the Internet of Things according to the device information and the binding code includes: sending the binding code to the device, so as to determine the binding result of the device on the cloud of the Internet of Things according to the binding code Realize the binding result of device binding on the IoT cloud; or, send the device information and binding code to the IoT cloud to determine the binding result of the device binding on the IoT cloud based on the device information and binding code .
  • the security information issued by the IoT platform received by the mobile terminal also has a binding code for uniquely identifying the device, and then in the subsequent binding or information query according to The binding code can realize the refined query of the data information of the corresponding device.
  • the record information of the successful binding and the binding record before the successful binding will be saved on the Internet of Things cloud.
  • the Internet of Things cloud determines the identity of the bound device, and sends the binding record before the device and router are successfully bound to the mobile terminal.
  • the above method before obtaining the binding result of the device determined on the Internet of Things cloud according to the device information and the binding code, the above method further includes: sending the configuration information and the binding code to the device according to the device information, so as to The pointing device implements network access connection and binding according to the configuration information and the binding code, wherein the configuration information is used to indicate the account information of the router stored on the mobile terminal and the corresponding account password.
  • the method further includes: receiving binding notification information sent by the Internet of Things cloud, wherein the binding The predetermined notification information is used to indicate that the device and the router have been bound successfully; and the binding notification information is displayed on the interface of the target client.
  • the mobile terminal will display the binding notification information on the On the interface of the target client, the target object can understand the binding situation of the device and the final information of successful binding more intuitively.
  • FIG. 3 is a flow chart (2) of the security binding method according to an embodiment of the present disclosure. The process includes the following steps:
  • Step S302 establishing a secure connection with the mobile terminal through a first session key, wherein the first session key is security information obtained after the mobile terminal initiates and executes a secure binding process and obtains a response from the cloud of the Internet of Things;
  • Step S304 sending device information to the mobile terminal, and receiving a binding code sent by the mobile terminal, wherein the binding code is used to uniquely identify the current binding process;
  • Step S306 according to the device information and the binding code, determine the binding result of device binding on the Internet of Things cloud, wherein the binding result is used to indicate that the device is bound on the Internet of Things cloud binding information.
  • a secure connection is established with the mobile terminal through the first session key, the device information is sent to the mobile terminal, and device binding on the Internet of Things cloud is determined according to the device information and the binding code.
  • a certain binding result that is, the establishment of a secure connection between the device and the mobile terminal is realized through the session key, and the final binding result of the device on the Internet of Things cloud is determined according to the binding code and device information, and the above technical solution is adopted , which solves the problem that the uniqueness of the configuration binding result cannot be determined during the interaction process of the device binding request in the related technology, and protects the data information in the security binding process through the security information, which improves the device binding
  • the security level of router activation uses the binding code to accurately determine the binding process of the device to be bound, which further improves the user's binding experience for device binding.
  • establishing a secure connection with the mobile terminal by using the first session key includes: receiving a connection request sent by the mobile terminal, wherein the connection request carries the first session key encrypted by the first session key; A character string and a generation factor of the first session key; a second session key is generated according to the generation factor of the first session key, the root key, device information and a preset algorithm, wherein the preset algorithm is determined according to the device type Operation method, the generation factor is used to indicate the key parameters for generating the first session key, the root key is used to indicate the key stored locally on the device for confidentiality protection of the upper layer key, and the device information is used to indicate the device's Function information and hardware parameter information; Decrypt the first character string encrypted by the first session key through the second session key; When it is determined that the decrypted second character string is used to indicate the establishment of a secure connection, according to the connection request Establish a secure connection with the mobile terminal.
  • determining the binding result of device binding on the Internet of Things cloud according to the device information and the binding code includes: sending the binding code to the Internet of Things cloud to determine the binding code verification result; if the verification result indicates that the binding code uploaded by the IoT cloud received by the device is the same as the binding code sent by the IoT cloud to the mobile terminal, the device will be implemented on the IoT cloud according to the binding code. The binding operation for the binding.
  • the device to be bound when binding a device to a router, in order to ensure the accuracy of the binding, the device to be bound sends a binding request with a binding code to the IoT cloud, and the IoT cloud synchronizes the or the binding code bound to the corresponding account of the current mobile terminal is compared with the binding code uploaded by the device.
  • the connected routers are bound.
  • Soft AP Soft Access Point
  • the hardware part is a standard wireless network card, which provides signal transfer/routing and other functions through the driver program
  • BLE Bluetooth BLE Bluetooth
  • FIG. 4 is an interactive schematic diagram of device binding according to an optional embodiment of the present disclosure, which specifically includes the following steps:
  • Step 1 Start the SDL (Security Development Lifecycle, security development, referred to as SDL) mode/module to make the device enter the configuration state;
  • SDL Security Development Lifecycle, security development, referred to as SDL
  • Step 2 The device initiates a network waiting request through softAP hotspot or BLE broadcast;
  • Step 3 The mobile application development kit uSDK of the mobile terminal notifies the APP to discover the network access device;
  • Step 4 The target object selects WIFI on the APP and enters the corresponding password
  • Step 5 The target object initiates a request to configure binding on the APP
  • Step 6 The uSDK of the mobile terminal sends information to the IOT cloud platform (equivalent to the IoT cloud in this disclosure embodiment) to obtain the session key Sessionkey and the binding code BindCode; before configuration, it is necessary to go to the cloud to request this binding code (bindCode), as well as the Sessionkey for establishing a secure connection with the device and the factor for generating the Sessionkey.
  • the IOT cloud platform equivalent to the IoT cloud in this disclosure embodiment
  • Step 7 The uSDK of the mobile terminal notifies the APP of the configuration binding progress notification
  • Step 8 IOT cloud platform returns request information to uSDK, including session key Sessionkey and binding code BindCode;
  • binding code BinCode
  • Sessionkey for establishing a secure connection with the device and the factor factor for generating the Sessionkey (equivalent to the key parameter in this embodiment of the invention);
  • Step 9 Start configuring the binding timing
  • Step 10 uSDK uses the session key Sessionkey to establish a secure connection
  • Step 11 SDL mode/module checks the validity of the session key Sessionkey
  • Step 12 Verification passed
  • Step 13 request device information
  • Step 14 return device information
  • Step 15 Initiate configuration information
  • Step 16 return configuration response
  • Step 17 Notify APP to switch home WIFI
  • Step 18 Connect the router
  • Step 19 Make sure that the router network is available
  • Step 20 The SDL mode/module of the device exits the configuration state
  • Step 21 The SDL mode/module initiates a binding request including the binding code BindCode to the IOT cloud platform;
  • Step 22 The IOT cloud platform performs binding processing on the binding request, including the default family, that is, setting the default automatically bound family according to the user's needs, and obtaining the binding code uploaded by the device on the IoT cloud as the set default In the case of binding a family, directly determine the binding relationship between the device and the router corresponding to the family.
  • Step 23 The IOT cloud platform returns the binding result to the SDL mode/module
  • Step 24 uSDK initiates a query binding result (HTTPS/MQTT includes binding code bindCode, including retry), that is to say, the information corresponding to the query binding result is various, including not only the binding information of successful binding , can also be the binding record data of the device during the binding process, and then confirm the actual binding process of the device in more detail, so as to improve the binding efficiency when binding similar devices in the future.
  • HTTPS/MQTT includes binding code bindCode, including retry
  • Step 25 IOT cloud platform returns the binding result to uSDK
  • Step 26 When the binding result indicates that the binding is successful, the cloud platform sends a binding notification to uSDK;
  • Step 27 uSDK configures the information corresponding to the binding result and displays it on the APP.
  • connection process is as follows:
  • the device first uses factor, the built-in device key and the specified algorithm to generate Sessionkey, and solves the data. If the decryption is hello, the authentication is passed and the connection is established successfully, otherwise the connection is rejected;
  • the device key can be one-machine-one-key, or a unique device key for each device generated through the root key and device information;
  • the boot information is encrypted by obtaining security information from the cloud of the Internet of Things, and the configuration information used to connect to the router is synchronized to the device only when the device passes the verification, and the binding code is passed to the device. Identify the binding process, determine the security and uniqueness of the binding process, and adopt the above technical solution to solve the problem in related technologies that the uniqueness of the configuration binding result cannot be determined during the interaction process of the binding request of the device. Furthermore, the data information in the interaction process is protected through the device key in the security information, which improves the security level of the device binding router for activation, realizes accurate determination of the device to be bound, reduces the cost of user activation of the network device, and improves user activation. The experience of the network device and the security level of network device activation have been improved.
  • the method according to the above embodiments can be implemented by means of software plus a necessary general-purpose hardware platform, and of course also by hardware, but in many cases the former is Better implementation.
  • the technical solution of the present disclosure can be embodied in the form of a software product in essence or the part that contributes to the prior art, and the computer software product is stored in a storage medium (such as ROM/RAM, disk, CD) contains several instructions to enable a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to execute the methods described in various embodiments of the present disclosure.
  • a security binding system is also provided, which is used to implement the above embodiments and preferred implementation manners, and what has been explained will not be repeated here.
  • Fig. 5 is a structural block diagram of a security binding system according to an embodiment of the present disclosure; as shown in Fig. 5 , it includes:
  • Mobile terminal 52 device 54, IoT cloud 56,
  • the mobile terminal 52 is configured to initiate instruction information to the Internet of Things cloud after detecting the network access request initiated by the device;
  • the Internet of Things cloud 56 is connected to the mobile terminal 52, and is configured to send security information to the mobile terminal in response to the instruction information in response to the instruction information that the mobile terminal initiates the execution of the security binding process, wherein,
  • the security information includes: a binding code used to uniquely identify the current binding process, and a first session key used to establish a secure connection with the device;
  • the mobile terminal 52 is configured to establish a secure connection with the device according to the first session key in the received security information, acquire device information of the device based on the secure connection, and determine The binding result of device binding performed by the binding code on the Internet of Things cloud.
  • the device 54 is configured to receive a connection request sent by the mobile terminal, wherein the connection request carries a first character string encrypted by the first session key and a generation of the first session key Factor; generate a second session key according to the generation factor of the first session key, root key, device information, and a preset algorithm, wherein the preset algorithm is an operation method determined according to the device type, and the generation
  • the factor is used to indicate the key parameters for generating the first session key
  • the root key is used to indicate the key stored locally on the device for confidentiality protection of the upper layer key
  • the device information is used to indicate Function information and hardware parameter information of the device
  • decrypt the first character string encrypted by the first session key through the second session key determine that the decrypted second character string is used to indicate the establishment of a secure connection
  • a secure connection with the mobile terminal is established according to the connection request.
  • the instruction information for executing the security binding process is sent to the cloud of the Internet of Things; the security information issued by the cloud of the Internet of Things in response to the instruction information is received, wherein the security information includes: for The binding code that uniquely identifies the current binding process, the first session key used to establish a secure connection with the device; establish a secure connection with the device through the first session key, and obtain the device information of the device based on the secure connection; obtain the device information based on the The binding result of the device determined with the binding code in the IoT cloud, where the binding result is used to indicate the binding information of the device in the IoT cloud, that is, by obtaining the binding information in the security information from the IoT cloud code to confirm the security binding process, and further determine the final binding result of the device according to the binding code and device information.
  • the above technical solution solves the problem that in the related technology, the configuration binding cannot be determined during the interaction process of the device binding request.
  • the uniqueness of the determination results and other issues, and through the protection of the data information in the security binding process in the security information, the security level of the device binding router for activation is improved, and the binding process of the device to be bound is realized by using the binding code
  • the accurate determination of the device further improves the binding experience of the user for device binding.
  • the above-mentioned mobile terminal 52 is also configured to send a query command carrying a binding code to the Internet of Things cloud when it is determined that the device and the router have been successfully bound and the binding result is stored in the cloud of the Internet of Things; Receive the query result sent by the Internet of Things cloud in response to the query command, where the query result is used to indicate the binding record before the device and the router are successfully bound in the binding process corresponding to the binding code.
  • the above-mentioned mobile terminal 52 is further configured to encrypt the first character string according to the first session key, wherein the first character string is used to indicate the establishment of a secure connection; the security information also includes If there is a generation factor corresponding to the first session key, send a connection request carrying the encrypted first character string and the generation factor of the first session key to the device, so as to instruct the device to establish a secure connection according to the connection request.
  • the boot information (equivalent to the first character string in this disclosure) is encrypted by obtaining security information from the Internet of Things cloud, and the configuration information used to connect to the router will be synchronized to the device only when the device passes the verification , it should be noted that the guide information is used to indicate the default description information set on the mobile terminal for handshaking between the terminal and the device.
  • the device uses the first session key to encrypt hello (equivalent to the first character string in the disclosed embodiment), and send the key parameter factor to the device at the same time, and the device first uses the key parameter factor and the built-in device key and specified
  • the algorithm generates the second session key Sessionkey, and decrypts the first encrypted data sent by the mobile terminal. If the decrypted data is hello, the authentication is passed and the connection is established successfully, otherwise the connection is rejected; optionally, the device key can be One device one key, which can generate a unique device key for each device through the root key + device information.
  • the first session key is generated by a generation factor, a device key, and a preset algorithm, wherein the preset algorithm is an operation method determined according to the device type, and the generation factor is used to indicate the key used to generate the first session key Parameter, device key is used to indicate the encryption key set by the device at the factory.
  • the device key is generated from the root key and device information, where the root key is used to indicate the key stored locally on the device for confidentiality protection of the upper layer key, and the device information is used to indicate the function information and hardware of the device Parameter information.
  • the above-mentioned mobile terminal 52 is configured to send the binding code to the device, so as to determine the binding result of the device binding on the Internet of Things cloud according to the binding code; or, Send the device information and binding code to the IoT cloud to determine the binding result of the device binding on the IoT cloud based on the device information and binding code.
  • the security information issued by the IoT platform received by the mobile terminal also has a binding code for uniquely identifying the device, and then in the subsequent binding or information query according to The binding code can realize the refined query of the data information of the corresponding device.
  • the record information of the successful binding and the binding record before the successful binding will be saved on the Internet of Things cloud.
  • the Internet of Things cloud determines the identity of the bound device, and sends the binding record before the device and router are successfully bound to the mobile terminal.
  • the above-mentioned mobile terminal 52 is configured to send configuration information and a binding code to the device according to the device information, so as to instruct the device to realize network connection and binding according to the configuration information and the binding code, wherein the configuration The information is used to indicate the account information of the router stored on the mobile terminal and the corresponding account password.
  • the above-mentioned device 54 is also configured to send the binding code to the Internet of Things cloud to determine the verification result of the binding code on the Internet of Things cloud; when the verification result indicates that the Internet of Things cloud receives If the binding code uploaded by the device is the same as the binding code sent to the mobile terminal by the IoT cloud, the binding operation of device binding is realized on the IoT cloud according to the binding code.
  • the device to be bound when binding a device to a router, in order to ensure the accuracy of the binding, the device to be bound sends a binding request with a binding code to the IoT cloud, and the IoT cloud synchronizes the or the binding code bound to the corresponding account of the current mobile terminal is compared with the binding code uploaded by the device.
  • the connected routers are bound.
  • orientations or positional relationships indicated by the terms “center”, “upper”, “lower”, “front”, “rear”, “left”, “right” etc. are based on The orientations or positional relationships shown in the drawings are only for the convenience of describing the present disclosure and simplifying the description, and do not indicate or imply that the referred devices or components must have a specific orientation, be constructed and operated in a specific orientation, and therefore cannot be understood as Limitations on this Disclosure.
  • first and second are used for descriptive purposes only, and should not be understood as indicating or implying relative importance.
  • connection should be understood in a broad sense, for example, it can be a fixed connection or a detachable connection , or integrally connected; may be mechanically connected, may also be electrically connected; may be directly connected, may also be indirectly connected through an intermediary, and may be internal communication between two components.
  • an element is referred to as being “fixed on” or “disposed on” another element, it can be directly on the other element or intervening elements may also be present.
  • a component is said to be “connected” to another element, it may be directly connected to the other element or intervening elements may also be present.
  • An embodiment of the present disclosure also provides a computer-readable storage medium, which includes a stored program, wherein the above-mentioned program executes any one of the above-mentioned methods when running.
  • the above-mentioned storage medium may be configured to store a computer program for performing the following steps:
  • the security information includes: a binding code used to uniquely identify the current binding process, a first password used to establish a secure connection with the device; session key;
  • the above-mentioned storage medium may include but not limited to: U disk, read-only memory (Read-Only Memory, referred to as ROM), random access memory (Random Access Memory, referred to as Various media that can store computer programs such as RAM), mobile hard disk, magnetic disk or optical disk.
  • Embodiments of the present disclosure also provide an electronic device, including a memory and a processor, where a computer program is stored in the memory, and the processor is configured to run the computer program to execute the steps in any one of the above method embodiments.
  • the electronic device may further include a transmission device and an input and output device, wherein the transmission device is connected to the processor, and the input and output device is connected to the processor.
  • the above-mentioned processor may be configured to execute the following steps through a computer program:
  • the security information includes: a binding code used to uniquely identify the current binding process, a first password used to establish a secure connection with the device; session key;
  • each module or each step of the above-mentioned disclosure can be realized by a general-purpose computing device, and they can be concentrated on a single computing device, or distributed in a network composed of multiple computing devices above, in an exemplary embodiment, they may be implemented in program code executable by a computing device, thus, they may be stored in a storage device to be executed by a computing device, and in some cases, may be different from The steps shown or described here are performed sequentially, or they are fabricated into individual integrated circuit modules, or multiple modules or steps among them are fabricated into a single integrated circuit module. As such, the present disclosure is not limited to any specific combination of hardware and software.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本公开提供了一种安全绑定方法及系统、存储介质、电子装置,其中,上述方法包括:在检测到设备发起的入网请求后,向物联网云端发起执行安全绑定过程的指示信息;接收物联网云端响应指示信息下发的安全信息,其中,安全信息包括:用于唯一标识当前绑定过程的绑定码、用于与设备建立安全连接的第一会话密钥;通过第一会话密钥与设备建立安全连接,基于安全连接获取设备的设备信息;获取根据设备信息和绑定码在物联网云端确定的设备的绑定结果,其中,绑定结果用于指示设备在物联网云端实现绑定的绑定信息。

Description

安全绑定方法及系统、存储介质、电子装置
本公开要求于2021年7月7日提交中国专利局、申请号为202110770579.X、发明名称“语安全绑定方法及系统、存储介质、电子装置”的中国专利申请的优先权,其全部内容通过引用结合在本公开中。
技术领域
本公开涉及通信技术领域,具体而言,涉及一种安全绑定方法及系统、存储介质、电子装置。
背景技术
相关技术中,绑定流程均是建立在非安全连接的交互上,或者通过一种固定的交互密码进行数据加密,导致数据传输过程不安全,不满足对IOT(Internet of Things,物联网,简称IOT)设备的安全要求,此外,相关绑定还存在以下问题:目前的绑定交互均是手机将设备需要的路由信息和用户信息发给设备,由设备连上路由和平台后,再发起绑定;手机不停的轮询绑定结果,设备绑定流程交互中,手机多次发起的绑定流程导致,手机不能确定每次交互的唯一性,当前的机制不安全,也不能将唯一确定一次配置绑定结果的关系。
针对相关技术中,对于设备的绑定请求交互过程中无法确定配置绑定结果的唯一性等问题,尚未提出有效的解决方案。
发明内容
本公开实施例提供了一种安全绑定方法及系统、存储介质、电子装置,以至少解决相关技术中,对于设备的绑定请求交互过程中无法确定配置绑定结果的唯一性等问题。
根据本公开的一个实施例,提供了一种安全绑定方法,包括:在检测到设备发起的入网请求后,向物联网云端发起执行安全绑定过程的指示信息;接收物联网云端响应指示信息下发的安全信息,其中,安全信息包括: 用于唯一标识当前绑定过程的绑定码、用于与设备建立安全连接的第一会话密钥;通过第一会话密钥与设备建立安全连接,基于安全连接获取设备的设备信息;获取根据设备信息和绑定码在物联网云端确定的设备的绑定结果,其中,绑定结果用于指示设备在物联网云端实现绑定的绑定信息。
根据本公开的另一个实施例,提供了另一种安全绑定方法,包括:通过第一会话密钥与述移动终端建立安全连接,其中,第一会话密钥为移动终端发起执行安全绑定过程的指示信息后得到物联网云端响应的安全信息;将设备信息发送至移动终端;接收移动终端发送的绑定码,其中,绑定码用于唯一标识当前绑定过程;根据设备信息和绑定码确定在物联网云端进行设备绑定的绑定结果,其中,绑定结果用于指示设备在物联网云端实现绑定的绑定信息。
根据本公开的另一个实施例,还提供了一种安全绑定系统,包括:物联网云端,与移动终端连接,设置为在接收到移动终端发起执行安全绑定过程的指示信息的情况下,响应指示信息向移动终端下发安全信息,其中,安全信息包括:用于唯一标识当前绑定过程的绑定码、用于与设备建立安全连接的第一会话密钥;移动终端,设置为根据接收的安全信息中的第一会话密钥与设备建立安全连接,基于安全连接获取设备的设备信息,并确定根据设备信息和绑定码在物联网云端进行设备绑定的绑定结果。
根据本公开的又一个实施例,还提供了一种计算机可读的存储介质,所述计算机可读的存储介质中存储有计算机程序,其中,所述计算机程序被设置为运行时执行上述任一项方法实施例中的步骤。
根据本公开的又一个实施例,还提供了一种电子装置,包括存储器和处理器,所述存储器中存储有计算机程序,所述处理器被设置为运行所述计算机程序以执行上述任一项方法实施例中的步骤。
通过本公开,在检测到设备发起的入网请求后,向物联网云端发起执行安全绑定过程的指示信息;接收物联网云端响应指示信息下发的安全信息,其中,安全信息包括:用于唯一标识当前绑定过程的绑定码、用于与 设备建立安全连接的第一会话密钥;通过第一会话密钥与设备建立安全连接,基于安全连接获取设备的设备信息;获取根据设备信息和绑定码在物联网云端确定的设备的绑定结果,其中,绑定结果用于指示设备在物联网云端实现绑定的绑定信息,即通过从物联网云端获取安全信息中的绑定码对安全绑定过程进行确认,并进一步根据绑定码和设备信息确定设备最终的绑定结果,采用上述技术方案,解决了相关技术中,对于设备的绑定请求交互过程中无法确定配置绑定结果的唯一性等问题,并通过安全信息中对安全绑定过程中的数据信息进行保护,提升了设备绑定路由器进行激活的安全等级,利用绑定码实现对待绑定设备的绑定过程的准确确定,进一步的提升了用户进行设备绑定的绑定体验。
附图说明
此处所说明的附图用来提供对本公开的进一步理解,构成本申请的一部分,本公开的示意性实施例及其说明用于解释本公开,并不构成对本公开的不当限定。在附图中:
图1是本公开实施例的一种安全绑定方法的计算机终端的硬件结构框图;
图2是根据本公开实施例的安全绑定方法的流程图(一);
图3是根据本公开实施例的安全绑定方法的流程图(二);
图4是根据本公开可选实施例的设备绑定的交互示意图;
图5是根据本公开实施例的一种安全绑定系统的结构框图。
具体实施方式
下文中将参考附图并结合实施例来详细说明本公开。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。
需要说明的是,本公开的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。
本申请实施例所提供的方法实施例可以在计算机终端、云平台或者类似的运算装置中执行。以运行在计算机终端上为例,图1是本公开实施例的一种安全绑定方法的计算机终端的硬件结构框图。如图1所示,计算机终端可以包括一个或多个(图1中仅示出一个)处理器102(处理器102可以包括但不限于微处理器MCU或可编程逻辑器件FPGA等的处理装置)和用于存储数据的存储器104,在一个示例性实施例中,上述计算机终端还可以包括用于通信功能的传输设备106以及输入输出设备108。本领域普通技术人员可以理解,图1所示的结构仅为示意,其并不对上述计算机终端的结构造成限定。例如,计算机终端还可包括比图1中所示更多或者更少的组件,或者具有与图1所示等同功能或比图1所示功能更多的不同的配置。
存储器104可设置为存储计算机程序,例如,应用软件的软件程序以及模块,如本公开实施例中的安全绑定方法对应的计算机程序,处理器102通过运行存储在存储器104内的计算机程序,从而执行各种功能应用以及数据处理,即实现上述的方法。存储器104可包括高速随机存储器,还可包括非易失性存储器,如一个或者多个磁性存储装置、闪存、或者其他非易失性固态存储器。在一些实例中,存储器104可进一步包括相对于处理器102远程设置的存储器,这些远程存储器可以通过网络连接至计算机终端。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
传输装置106设置为经由一个网络接收或者发送数据。上述的网络具体实例可包括计算机终端的通信供应商提供的无线网络。在一个实例中,传输装置106包括一个网络适配器(Network Interface Controller,简称为NIC),其可通过基站与其他网络设备相连从而可与互联网进行通讯。在一个实例中,传输装置106可以为射频(Radio Frequency,简称为RF)模块,其用于通过无线方式与互联网进行通讯。
在本实施例中提供了一种安全绑定方法,应用于上述计算机终端,图2是根据本公开实施例的安全绑定方法的流程图(一),该流程包括如下 步骤:
步骤S202,在检测到设备发起的入网请求后,向物联网云端发起执行安全绑定过程的指示信息;
可以理解的是,上述入网请求是设备以任意请求方式发起的入网信息,上述入网请求可以包括无线软AP热点、蓝牙广播;进而根据请求方式为设备配置对应的用于连接路由器的帐号及密码信息。
步骤S204,接收所述物联网云端响应所述指示信息下发的安全信息,其中,所述安全信息包括:用于唯一标识当前绑定过程的绑定码、用于与设备建立安全连接的第一会话密钥;
步骤S205,通过所述第一会话密钥与所述设备建立安全连接,基于所述安全连接获取所述设备的设备信息;
步骤S206,获取根据所述设备信息和所述绑定码在所述物联网云端确定的所述设备的绑定结果,其中,所述绑定结果用于指示设备在所述物联网云端实现绑定的绑定信息。
通过上述技术方案,在检测到设备发起的入网请求后,向物联网云端发起执行安全绑定过程的指示信息;接收物联网云端响应指示信息下发的安全信息,其中,安全信息包括:用于唯一标识当前绑定过程的绑定码、用于与设备建立安全连接的第一会话密钥;通过第一会话密钥与设备建立安全连接,基于安全连接获取设备的设备信息;获取根据设备信息和绑定码在物联网云端确定的设备的绑定结果,其中,绑定结果用于指示设备在物联网云端实现绑定的绑定信息,即通过从物联网云端获取安全信息中的绑定码对安全绑定过程进行确认,并进一步根据绑定码和设备信息确定设备最终的绑定结果,采用上述技术方案,解决了相关技术中,对于设备的绑定请求交互过程中无法确定配置绑定结果的唯一性等问题,并通过安全信息中对安全绑定过程中的数据信息进行保护,提升了设备绑定路由器进行激活的安全等级,利用绑定码实现对待绑定设备的绑定过程的准确确定,进一步的提升了用户进行设备绑定的绑定体验。
在一个示例性的实施例中,通过第一会话密钥与设备建立安全连接的操作,包括:根据第一会话密钥对第一字符串进行加密,其中,第一字符串用于指示建立安全连接;在安全信息中还包括有第一会话密钥对应的生成因子的情况下,向设备发送携带加密后的第一字符串和第一会话密钥的生成因子的连接请求,以指示设备根据连接请求建立安全连接。
即通过从物联网云端获取安全信息对引导信息(相当于本公开中的第一字符串)进行加密,并在设备处通过验证的情况下,才会将用于连接路由器的配置信息同步至设备,需要说明的是,引导信息用于指示移动终端上设置的在进行终端与设备之间握手的默认描述信息。
例如,使用第一会话密钥加密hello(相当于本公开实施例中的第一字符串),同时会密钥参数factor发给设备,设备先使用密钥参数factor与内置的设备密钥和指定算法生成第二会话密钥Sessionkey,并对移动终端发送的第一加密数据进行数据解密,如果解密后为hello,则认证通过,连接建立成功,否则拒绝连接;可选地,设备密钥可以是一机一密钥,可以是通过根密钥+设备信息生成每个设备唯一的设备密钥。
在一个示例性的实施例中,第一会话密钥由生成因子、设备密钥和预设算法生成,其中,预设算法为根据设备类型确定的运算方式,生成因子用于指示生成第一会话密钥的密钥参数,设备密钥用于指示设备在出厂时设置的加密密钥。
在一个示例性的实施例中,设备密钥是由根密钥与设备信息生成,其中,根密钥用于指示设备本地存储的用于对上层密钥进行机密性保护的密钥,设备信息用于指示设备的功能信息与硬件参数信息。
在一个示例性的实施例中,获取根据设备信息和绑定码在物联网云端确定的设备的绑定结果,包括:将绑定码发送给设备,以确定设备在物联网云端根据绑定码在物联网云端实现设备绑定的绑定结果;或,将设备信息和绑定码发送给物联网云端,以确定设备在物联网云端根据设备信息和绑定码实现设备绑定的绑定结果。
简而言之,为了更好的对设备进行标识确定,移动终端接收的物联网平台下发的安全信息还存在有用于唯一标识设备的绑定码,进而在后续的绑定或者信息查询中根据绑定码便可实现对应的设备的数据信息的精细化查询。
可以理解的是,设备与路由器绑定成功后,物联网云端上会保存绑定成功的记录信息以及在本次绑定成功前的绑定记录,因此,在设备终端发起用于查询绑定结果的查询指令后,物联网云端在确定已绑定设备的身份后,将设备和路由器绑定成功之前的绑定记录发送移动终端。
在一个示例性的实施例中,获取根据设备信息和绑定码在物联网云端确定的设备的绑定结果之前,上述方法还包括:根据设备信息将配置信息和绑定码发送至设备,以指示设备根据配置信息和绑定码实现入网连接与绑定,其中,配置信息用于指示移动终端上存储的路由器的帐号信息以及对应的帐号密码。
在一个示例性的实施例中,接收所述物联网云端响应所述查询指令发送的查询结果之后,所述方法还包括:接收所述物联网云端发送的绑定通知信息,其中,所述绑定通知信息用于指示所述设备和所述路由器已绑定成功;将所述绑定通知信息显示在目标客户端的界面上。
简而言之,为了使目标对象更好的对设备的绑定结果以及最终的绑定信息进行确认,移动终端在接收了物联网云端发送的绑定通知信息后,将绑定通知信息显示在目标客户端的界面上,使得目标对象可以更加直观的了解设备的绑定情况以及成功绑定的最终信息。
在本实施例中提供了另一种安全绑定方法,应用于上述计算机终端,图3是根据本公开实施例的安全绑定方法的流程图(二),该流程包括如下步骤:
步骤S302,通过第一会话密钥与述移动终端建立安全连接,其中,所述第一会话密钥为所述移动终端发起执行安全绑定过程的指示信息后得到物联网云端响应的安全信息;
步骤S304,将设备信息发送至所述移动终端,接收所述移动终端发送的绑定码,其中,所述绑定码用于唯一标识当前绑定过程;
步骤S306,根据所述设备信息和所述绑定码确定在所述物联网云端进行设备绑定的绑定结果,其中,所述绑定结果用于指示设备在所述物联网云端实现绑定的绑定信息。
通过上述技术方案,通过第一会话密钥与述移动终端建立安全连接,将设备信息发送至所述移动终端,根据所述设备信息和所述绑定码确定在所述物联网云端进行设备绑定的绑定结果,即通过会话密钥实现对于设备与移动终端之间安全连接的建立,并根据所述绑定码与设备信息确定设备在物联网云端的最终绑定结果,采用上述技术方案,解决了相关技术中,对于设备的绑定请求交互过程中无法确定配置绑定结果的唯一性等问题,并通过安全信息中对安全绑定过程中的数据信息进行保护,提升了设备绑定路由器进行激活的安全等级,利用绑定码实现对待绑定设备的绑定过程的准确确定,进一步的提升了用户进行设备绑定的绑定体验。
在一个示例性的实施例中,通过第一会话密钥与述移动终端建立安全连接,包括:接收移动终端发送的连接请求,其中,连接请求中携带有通过第一会话密钥加密的第一字符串和第一会话密钥的生成因子;根据第一会话密钥的生成因子、根密钥、设备信息以及预设算法生成第二会话密钥,其中,预设算法为根据设备类型确定的运算方式,生成因子用于指示生成第一会话密钥的密钥参数,根密钥用于指示设备本地存储的用于对上层密钥进行机密性保护的密钥,设备信息用于指示设备的功能信息与硬件参数信息;通过第二会话密钥对第一会话密钥加密的第一字符串进行解密;在确定解密得到的第二字符串用于指示建立安全连接的情况下,根据连接请求建立与移动终端的安全连接。
即通过从物联网云端获取安全信息中的绑定码对待绑定设备进行确认,通过设备中存在的本地的根密钥对绑定码进行验证,并进一步确认待绑定设备用于绑定路由器的配置信息,采用上述技术方案,解决了相关技 术中,对于设备的绑定请求交互过程中无法确定配置绑定结果的唯一性等问题,并通过安全信息中设备密钥对交互过程中的数据信息进行保护,提升了设备绑定路由器进行激活的安全等级,实现对待绑定设备的准确确定,进一步的提升了用户进行设备绑定的绑定体验。
在一个示例性的实施例中,根据设备信息和绑定码确定在物联网云端进行设备绑定的绑定结果,包括:将绑定码发送给物联网云端,以确定物联网云端对于绑定码的校验结果;在校验结果指示物联网云端接收到设备上传的绑定码与物联网云端下发至移动终端的绑定码相同的情况下,根据绑定码在物联网云端实现设备绑定的绑定操作。
简而言之,在进行设备与路由器的绑定时,为保证绑定的准确性,待绑定设备向物联网云端发送携带有绑定码的绑定请求,物联网云端根据设备出厂时同步的或者与当前移动终端对应帐户绑定的绑定码与设备上传的绑定码进行比较,当绑定码一致的情况下,说明当前绑定过程安全,设备具备绑定条件,可以直接与当前连接的路由器进行绑定。
为了更好的理解上述安全绑定方法的过程,以下结合可选实施例对上述安全绑定方法流程进行说明,但不用于限定本公开实施例的技术方案。
对于IOT设备现在未绑定前都是通过soft AP(Soft Access Point,软访问接入点,硬件部分为一块标准的无线网卡,通过驱动程序实现提供信号转接/路由等功能)或BLE蓝牙与设备建立连接,并且此连接都是非安全的方式,所以导致设备绑定请求交互过程中数据进行未链路层加密。
可选的,如图4所示是根据本公开可选实施例的设备绑定的交互示意图,具体包含以下步骤:
步骤1:启动SDL(Security Development Lifecycle,安全开发,简称SDL)模式/模块使设备进入配置状态;
步骤2:设备通过softAP热点或者BLE广播发起待入网请求;
步骤3:移动终端的移动应用开发套件uSDK通知APP发现入网设备;
步骤4:目标对象在APP上选择WIFI并输入对应密码;
步骤5:目标对象在APP上发起请求配置绑定;
步骤6:移动终端的uSDK向IOT云平台(相当于本公开实施例中的物联网云端)发送信息,获取会话密钥Sessionkey与绑定码BindCode;在配置前需要先去云端请求本次绑定code(bindCode),以及与设备建立安全连接的Sessionkey和生成Sessionkey的因子(factor)。
步骤7:移动终端的uSDK向APP告知配置绑定进度通知;
步骤8:IOT云平台向uSDK返回请求信息,包括会话密钥Sessionkey与绑定码BindCode;
在配置前需要先去云端请求本次绑定code(bindCode),以及与设备建立安全连接的Sessionkey和生成Sessionkey的因子factor(相当于本法明实施例中的密钥参数);
步骤9:开始配置绑定计时;
步骤10:uSDK使用会话密钥Sessionkey建立安全连接;
步骤11:SDL模式/模块对会话密钥Sessionkey进行合法性校验;
步骤12:校验通过;
步骤13:请求设备信息;
步骤14:返回设备信息;
步骤15:发起配置信息;
步骤16:返回配置应答;
步骤17:通知APP切换家庭WIFI;
步骤18:连接路由器;
步骤19:确定路由器网络可用;
步骤20:设备的SDL模式/模块退出配置状态;
步骤21:SDL模式/模块向IOT云平台发起包含绑定码BindCode的 绑定请求;
步骤22:IOT云平台对绑定请求进行绑定处理,含默认家庭,即根据用户的需求设置默认自动绑定的家庭,在物联网云端获取到设备上传的包含的绑定码为设置的默认绑定家庭的情况下,直接确定所述设备与该家庭对应路由器的绑定关系。
步骤23:IOT云平台将绑定结果返回至SDL模式/模块;
步骤24:uSDK发起查询绑定结果(HTTPS/MQTT含绑定码bindCode,含重试),也就是说,查询的绑定结果对应的信息多种多样,不仅仅包含成功绑定的绑定信息,还可以是设备在绑定过程的绑定记录数据,进而对设备的实际绑定过程进行更加详细的确认,便于在后续绑定同类设备时,提升绑定效率。
步骤25:IOT云平台向uSDK返回绑定结果;
步骤26:在绑定结果指示绑定成功的情况下,云平台向uSDK发送绑定通知;
步骤27:uSDK配置绑定结果对应的信息,并在APP上进行显示。
需要说明的是,在配置绑定前,需先与设备建立安全连接,连接过程为:
a)使用Sessionkey加密hello(相当于本公开实施例中的引导信息),同时会factor发给设备,设备先使用factor与内置的设备密钥和指定算法生成Sessionkey,并解决数据,如果解密后为hello,则认证通过,连接建立成功,否则拒绝连接;
b)设备密钥可以是一机一密钥,可以是通过根密钥和设备信息生成每个设备唯一的设备密钥;
本公开可选实施例,通过从物联网云端获取安全信息对引导信息进行加密,并在设备处通过验证的情况下,才会将用于连接路由器的配置信息同步至设备,并通过绑定码对绑定过程进行标识,确定绑定流程的安全性 和唯一性,采用上述技术方案,解决了相关技术中,对于设备的绑定请求交互过程中无法确定配置绑定结果的唯一性等问题,进而通过安全信息中设备密钥对交互过程中的数据信息进行保护,提升了设备绑定路由器进行激活的安全等级,实现对待绑定设备的准确确定,减少用户激活网器成本,提升了用户激活网器的体验以及提升了网器激活的安全等级。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到根据上述实施例的方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本公开的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本公开各个实施例所述的方法。
在本实施例中还提供了一种安全绑定系统,该系统用于实现上述实施例及优选实施方式,已经进行过说明的不再赘述。图5是根据本公开实施例的一种安全绑定系统的结构框图;如图5所示,包括:
移动终端52,设备54,物联网云端56,
移动终端52,设置为在检测到设备发起的入网请求后,向物联网云端发起指示信息;
物联网云端56,与所述移动终端52连接,设置为在接收到移动终端发起执行安全绑定过程的指示信息的情况下,响应所述指示信息向所述移动终端下发安全信息,其中,所述安全信息包括:用于唯一标识当前绑定过程的绑定码、用于与设备建立安全连接的第一会话密钥;
移动终端52,设置为根据接收的所述安全信息中的所述第一会话密钥与设备建立安全连接,基于所述安全连接获取所述设备的设备信息,并确定根据所述设备信息和所述绑定码在所述物联网云端进行设备绑定的绑定结果。
所述设备54,设置为接收所述移动终端发送的连接请求,其中,所述连接请求中携带有通过所述第一会话密钥加密的第一字符串和所述第一会话密钥的生成因子;根据所述第一会话密钥的生成因子、根密钥、设备信息以及预设算法生成第二会话密钥,其中,所述预设算法为根据设备类型确定的运算方式,所述生成因子用于指示生成所述第一会话密钥的密钥参数,所述根密钥用于指示设备本地存储的用于对上层密钥进行机密性保护的密钥,所述设备信息用于指示设备的功能信息与硬件参数信息;通过所述第二会话密钥对所述第一会话密钥加密的第一字符串进行解密;在确定解密得到的第二字符串用于指示建立安全连接的情况下,根据所述连接请求建立与所述移动终端的安全连接。
通过上述技术方案,在检测到设备发起的入网请求后,向物联网云端发起执行安全绑定过程的指示信息;接收物联网云端响应指示信息下发的安全信息,其中,安全信息包括:用于唯一标识当前绑定过程的绑定码、用于与设备建立安全连接的第一会话密钥;通过第一会话密钥与设备建立安全连接,基于安全连接获取设备的设备信息;获取根据设备信息和绑定码在物联网云端确定的设备的绑定结果,其中,绑定结果用于指示设备在物联网云端实现绑定的绑定信息,即通过从物联网云端获取安全信息中的绑定码对安全绑定过程进行确认,并进一步根据绑定码和设备信息确定设备最终的绑定结果,采用上述技术方案,解决了相关技术中,对于设备的绑定请求交互过程中无法确定配置绑定结果的唯一性等问题,并通过安全信息中对安全绑定过程中的数据信息进行保护,提升了设备绑定路由器进行激活的安全等级,利用绑定码实现对待绑定设备的绑定过程的准确确定,进一步的提升了用户进行设备绑定的绑定体验。
可选地,上述移动终端52,还设置为在确定设备与路由器已绑定成功,并将绑定结果保存在物联网云端的情况下,向物联网云端发送携带有绑定码的查询指令;接收物联网云端响应查询指令发送的查询结果,其中,查询结果用于指示绑定码对应的绑定流程中设备和路由器绑定成功之前的绑定记录。
在一个示例性的实施例中,上述移动终端52,还设置为根据第一会话密钥对第一字符串进行加密,其中,第一字符串用于指示建立安全连接;在安全信息中还包括有第一会话密钥对应的生成因子的情况下,向设备发送携带加密后的第一字符串和第一会话密钥的生成因子的连接请求,以指示设备根据连接请求建立安全连接。
即通过从物联网云端获取安全信息对引导信息(相当于本公开中的第一字符串)进行加密,并在设备处通过验证的情况下,才会将用于连接路由器的配置信息同步至设备,需要说明的是,引导信息用于指示移动终端上设置的在进行终端与设备之间握手的默认描述信息。
例如,使用第一会话密钥加密hello(相当于本公开实施例中的第一字符串),同时会密钥参数factor发给设备,设备先使用密钥参数factor与内置的设备密钥和指定算法生成第二会话密钥Sessionkey,并对移动终端发送的第一加密数据进行数据解密,如果解密后为hello,则认证通过,连接建立成功,否则拒绝连接;可选地,设备密钥可以是一机一密钥,可以是通过根密钥+设备信息生成每个设备唯一的设备密钥。
可选地,第一会话密钥由生成因子、设备密钥和预设算法生成,其中,预设算法为根据设备类型确定的运算方式,生成因子用于指示生成第一会话密钥的密钥参数,设备密钥用于指示设备在出厂时设置的加密密钥。设备密钥是由根密钥与设备信息生成,其中,根密钥用于指示设备本地存储的用于对上层密钥进行机密性保护的密钥,设备信息用于指示设备的功能信息与硬件参数信息。
在一个示例性的实施例中,上述移动终端52,设置为将绑定码发送给设备,以确定设备在物联网云端根据绑定码在物联网云端实现设备绑定的绑定结果;或,将设备信息和绑定码发送给物联网云端,以确定设备在物联网云端根据设备信息和绑定码实现设备绑定的绑定结果。
简而言之,为了更好的对设备进行标识确定,移动终端接收的物联网平台下发的安全信息还存在有用于唯一标识设备的绑定码,进而在后续的 绑定或者信息查询中根据绑定码便可实现对应的设备的数据信息的精细化查询。
可以理解的是,设备与路由器绑定成功后,物联网云端上会保存绑定成功的记录信息以及在本次绑定成功前的绑定记录,因此,在设备终端发起用于查询绑定结果的查询指令后,物联网云端在确定已绑定设备的身份后,将设备和路由器绑定成功之前的绑定记录发送移动终端。
在一个示例性的实施例中,上述移动终端52,设置为根据设备信息将配置信息和绑定码发送至设备,以指示设备根据配置信息和绑定码实现入网连接与绑定,其中,配置信息用于指示移动终端上存储的路由器的帐号信息以及对应的帐号密码。
即通过从物联网云端获取安全信息中的绑定码对待绑定设备进行确认,通过设备中存在的本地的根密钥对绑定码进行验证,并进一步确认待绑定设备用于绑定路由器的配置信息,采用上述技术方案,解决了相关技术中,对于设备的绑定请求交互过程中无法确定配置绑定结果的唯一性等问题,并通过安全信息中设备密钥对交互过程中的数据信息进行保护,提升了设备绑定路由器进行激活的安全等级,实现对待绑定设备的准确确定,进一步的提升了用户进行设备绑定的绑定体验。
在一个示例性的实施例中,上述设备54,还设置为将绑定码发送给物联网云端,以确定物联网云端对于绑定码的校验结果;在校验结果指示物联网云端接收到设备上传的绑定码与物联网云端下发至移动终端的绑定码相同的情况下,根据绑定码在物联网云端实现设备绑定的绑定操作。
简而言之,在进行设备与路由器的绑定时,为保证绑定的准确性,待绑定设备向物联网云端发送携带有绑定码的绑定请求,物联网云端根据设备出厂时同步的或者与当前移动终端对应帐户绑定的绑定码与设备上传的绑定码进行比较,当绑定码一致的情况下,说明当前绑定过程安全,设备具备绑定条件,可以直接与当前连接的路由器进行绑定。
在本公开的描述中,需要理解的是,术语中“中心”、“上”、“下”、 “前”、“后”、“左”、“右”等指示的方位或位置关系为基于附图所示的方位或位置关系,仅是为了便于描述本公开和简化描述,而不是指示或暗示所指的装置或组件必须具有特定的方位、以特定的方位构造和操作,因此不能理解为对本公开的限制。此外,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性。
在本公开的描述中,需要说明的是,除非另有明确的规定和限定,术语“安装”、“连接”、“相连”应做广义理解,例如,可以是固定连接,也可以是拆卸连接,或一体地连接;可以是机械连接,也可以是电连接;可以是直接相连,也可以是通过中间媒介间接相连,可以是两个组件内部的连通。当组件被称为“固定于”或“设置于”另一个元件,它可以直接在另一个组件上或者也可以存在居中的组件。当一个组件被认为是“连接”另一个元件,它可以是直接连接到另一个元件或者可能同时存在居中元件。对于本领域的普通技术人员而言,可以具体情况理解上述术语在本公开的具体含义。
本公开的实施例还提供了一种计算机可读的存储介质,该存储介质包括存储的程序,其中,上述程序运行时执行上述任一项的方法。
在一个示例性实施例中,在本实施例中,上述存储介质可以被设置为存储用于执行以下步骤的计算机程序:
S1,在检测到设备发起的入网请求后,向物联网云端发起执行安全绑定过程的指示信息;
S2,接收所述物联网云端响应所述指示信息下发的安全信息,其中,所述安全信息包括:用于唯一标识当前绑定过程的绑定码、用于与设备建立安全连接的第一会话密钥;
S3,通过所述第一会话密钥与所述设备建立安全连接,基于所述安全连接获取所述设备的设备信息;
S4,获取根据所述设备信息和所述绑定码在所述物联网云端确定的所述设备的绑定结果,其中,所述绑定结果用于指示设备在所述物联网云端 实现绑定的绑定信息。
在一个示例性实施例中,在本实施例中,上述存储介质可以包括但不限于:U盘、只读存储器(Read-Only Memory,简称为ROM)、随机存取存储器(Random Access Memory,简称为RAM)、移动硬盘、磁碟或者光盘等各种可以存储计算机程序的介质。
本公开的实施例还提供了一种电子装置,包括存储器和处理器,该存储器中存储有计算机程序,该处理器被设置为运行计算机程序以执行上述任一项方法实施例中的步骤。
在一个示例性实施例中,上述电子装置还可以包括传输设备以及输入输出设备,其中,该传输设备和上述处理器连接,该输入输出设备和上述处理器连接。
在一个示例性实施例中,在本实施例中,上述处理器可以被设置为通过计算机程序执行以下步骤:
S1,在检测到设备发起的入网请求后,向物联网云端发起执行安全绑定过程的指示信息;
S2,接收所述物联网云端响应所述指示信息下发的安全信息,其中,所述安全信息包括:用于唯一标识当前绑定过程的绑定码、用于与设备建立安全连接的第一会话密钥;
S3,通过所述第一会话密钥与所述设备建立安全连接,基于所述安全连接获取所述设备的设备信息;
S4,获取根据所述设备信息和所述绑定码在所述物联网云端确定的所述设备的绑定结果,其中,所述绑定结果用于指示设备在所述物联网云端实现绑定的绑定信息。
在一个示例性实施例中,本实施例中的具体示例可以参考上述实施例及可选实施方式中所描述的示例,本实施例在此不再赘述。
显然,本领域的技术人员应该明白,上述的本公开的各模块或各步骤 可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,在一个示例性实施例中,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本公开不限制于任何特定的硬件和软件结合。
以上所述仅为本公开的优选实施例而已,并不用于限制本公开,对于本领域的技术人员来说,本公开可以有各种更改和变化。凡在本公开的原则之内,所作的任何修改、等同替换、改进等,均应包含在本公开的保护范围之内。

Claims (14)

  1. 一种安全绑定方法,包括:
    在检测到设备发起的入网请求后,向物联网云端发起执行安全绑定过程的指示信息;
    接收所述物联网云端响应所述指示信息下发的安全信息,其中,所述安全信息包括:用于唯一标识当前绑定过程的绑定码、用于与设备建立安全连接的第一会话密钥;
    通过所述第一会话密钥与所述设备建立安全连接,基于所述安全连接获取所述设备的设备信息;
    获取根据所述设备信息和所述绑定码在所述物联网云端确定的所述设备的绑定结果,其中,所述绑定结果用于指示设备在所述物联网云端实现绑定的绑定信息。
  2. 根据权利要求1所述的安全绑定方法,其中,所述通过所述第一会话密钥与所述设备建立安全连接的操作,包括:
    根据所述第一会话密钥对第一字符串进行加密,其中,所述第一字符串用于指示建立所述安全连接;
    在所述安全信息中还包括有所述第一会话密钥对应的生成因子的情况下,向所述设备发送携带加密后的所述第一字符串和所述第一会话密钥的生成因子的连接请求,以指示所述设备根据所述连接请求建立所述安全连接。
  3. 根据权利要求2所述的安全绑定方法,其中,
    所述第一会话密钥由所述生成因子、设备密钥和预设算法生成,其中,所述预设算法为根据设备类型确定的运算方式,所述生成因子用于指示生成所述第一会话密钥的密钥参数,所述设备密钥用于指示设备在 出厂时设置的加密密钥。
  4. 根据权利要求3所述的安全绑定方法,其中,
    所述设备密钥是由根密钥与所述设备信息生成,其中,所述根密钥用于指示设备本地存储的用于对上层密钥进行机密性保护的密钥,所述设备信息用于指示设备的功能信息与硬件参数信息。
  5. 根据权利要求1所述的安全绑定方法,其中,获取根据所述设备信息和所述绑定码在所述物联网云端确定的所述设备的绑定结果,包括:
    将所述绑定码发送给所述设备,以确定所述设备在所述物联网云端根据所述绑定码在所述物联网云端实现设备绑定的绑定结果;或,
    将所述设备信息和所述绑定码发送给所述物联网云端,以确定所述设备在所述物联网云端根据所述设备信息和所述绑定码实现设备绑定的绑定结果。
  6. 根据权利要求1所述的安全绑定方法,其中,获取根据所述设备信息和所述绑定码在所述物联网云端确定的所述设备的绑定结果之前,所述方法还包括:
    根据所述设备信息将配置信息和所述绑定码发送至所述设备,以指示所述设备根据所述配置信息和所述绑定码实现入网连接与绑定,其中,所述配置信息用于指示移动终端上存储的路由器的帐号信息以及对应的帐号密码。
  7. 一种安全绑定方法,包括:
    通过第一会话密钥与述移动终端建立安全连接,其中,所述第一会话密钥为所述移动终端发起执行安全绑定过程的指示信息后得到物联网云端响应的安全信息;
    将设备信息发送至所述移动终端,接收所述移动终端发送的绑定码,其中,所述绑定码用于唯一标识当前绑定过程;
    根据所述设备信息和所述绑定码确定在所述物联网云端进行设备绑定的绑定结果,其中,所述绑定结果用于指示设备在所述物联网云端实现绑定的绑定信息。
  8. 根据权利要求7所述的安全绑定方法,其中,所述通过第一会话密钥与述移动终端建立安全连接,包括:
    接收所述移动终端发送的连接请求,其中,所述连接请求中携带有通过所述第一会话密钥加密的第一字符串和所述第一会话密钥的生成因子;
    根据所述第一会话密钥的生成因子、根密钥、设备信息以及预设算法生成第二会话密钥,其中,所述预设算法为根据设备类型确定的运算方式,所述生成因子用于指示生成所述第一会话密钥的密钥参数,所述根密钥用于指示设备本地存储的用于对上层密钥进行机密性保护的密钥,所述设备信息用于指示设备的功能信息与硬件参数信息;
    通过所述第二会话密钥对所述第一会话密钥加密的第一字符串进行解密;
    在确定解密得到的第二字符串用于指示建立安全连接的情况下,根据所述连接请求建立与所述移动终端的安全连接。
  9. 根据权利要求7所述的安全绑定方法,其中,根据所述设备信息和所述绑定码确定在所述物联网云端进行设备绑定的绑定结果,包括:
    将所述绑定码发送给所述物联网云端,以确定所述物联网云端对于所述绑定码的校验结果;
    在所述校验结果指示所述物联网云端接收到设备上传的绑定码与 所述物联网云端下发至移动终端的绑定码相同的情况下,根据所述绑定码在所述物联网云端实现设备绑定的绑定操作。
  10. 一种安全绑定系统,包括:
    物联网云端,与移动终端连接,设置为在接收到移动终端发起执行安全绑定过程的指示信息的情况下,响应所述指示信息向所述移动终端下发安全信息,其中,所述安全信息包括:用于唯一标识当前绑定过程的绑定码、用于与设备建立安全连接的第一会话密钥;
    移动终端,设置为根据接收的所述安全信息中的所述第一会话密钥与设备建立安全连接,基于所述安全连接获取所述设备的设备信息,并确定根据所述设备信息和所述绑定码在所述物联网云端进行设备绑定的绑定结果。
  11. 根据权利要求10所述的安全绑定系统,其中,所述系统还包括:
    设备,设置为接收所述移动终端发送的连接请求,根据所述第一会话密钥的生成因子、根密钥、设备信息以及预设算法生成第二会话密钥,通过所述第二会话密钥对所述第一会话密钥加密的第一字符串进行解密;在确定解密得到的第二字符串用于指示建立安全连接的情况下,根据所述连接请求建立与所述移动终端的安全连接;
    其中,所述连接请求中携带有通过所述第一会话密钥加密的第一字符串和所述第一会话密钥的生成因子,所述预设算法为根据设备类型确定的运算方式,所述生成因子用于指示生成所述第一会话密钥的密钥参数,所述根密钥用于指示设备本地存储的用于对上层密钥进行机密性保护的密钥,所述设备信息用于指示设备的功能信息与硬件参数信息。
  12. 根据权利要求10所述的安全绑定系统,其中,
    所述移动终端,还设置为在确定所述设备与路由器已绑定成功,并 将绑定结果保存在所述物联网云端的情况下,向所述物联网云端发送携带有所述绑定码的查询指令;接收所述物联网云端响应所述查询指令发送的查询结果,其中,所述查询结果用于指示所述绑定码对应的绑定流程中所述设备和所述路由器绑定成功之前的绑定记录。
  13. 一种计算机可读的存储介质,所述计算机可读的存储介质包括存储的程序,其中,所述程序运行时执行上述权利要求1至6任一项中所述的方法,或权利要求7至9任一项所述的方案。
  14. 一种电子装置,包括存储器和处理器,所述存储器中存储有计算机程序,所述处理器被设置为通过所述计算机程序执行所述权利要求1至6任一项中所述的方法,或权利要求7至9任一项所述的方法。
PCT/CN2022/096414 2021-07-07 2022-05-31 安全绑定方法及系统、存储介质、电子装置 WO2023279897A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110770579.X 2021-07-07
CN202110770579.XA CN113595992B (zh) 2021-07-07 2021-07-07 安全绑定方法及系统、存储介质、电子装置

Publications (1)

Publication Number Publication Date
WO2023279897A1 true WO2023279897A1 (zh) 2023-01-12

Family

ID=78246421

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/096414 WO2023279897A1 (zh) 2021-07-07 2022-05-31 安全绑定方法及系统、存储介质、电子装置

Country Status (2)

Country Link
CN (1) CN113595992B (zh)
WO (1) WO2023279897A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113595992B (zh) * 2021-07-07 2023-03-28 青岛海尔科技有限公司 安全绑定方法及系统、存储介质、电子装置
CN114786238B (zh) * 2022-03-29 2024-08-23 广东芬尼克兹节能设备有限公司 Lora终端设备入网方法、装置、终端设备、系统及存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150282223A1 (en) * 2014-03-27 2015-10-01 Gemtek Technology Co., Ltd. Method and system for binding mobile device with intelligent apparatus
CN112202747A (zh) * 2020-09-24 2021-01-08 青岛海尔科技有限公司 目标设备的绑定方法和装置、存储介质及电子装置
CN112543457A (zh) * 2020-11-23 2021-03-23 广州技象科技有限公司 一种物联网终端的网关切换绑定方法及装置
CN112737845A (zh) * 2020-12-29 2021-04-30 青岛海尔科技有限公司 智能设备的绑定方法、装置、存储介质及电子装置
CN113595992A (zh) * 2021-07-07 2021-11-02 青岛海尔科技有限公司 安全绑定方法及系统、存储介质、电子装置

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104780536B (zh) * 2015-04-03 2019-06-11 宇龙计算机通信科技(深圳)有限公司 一种物联网设备的认证方法及终端
CN105704116B (zh) * 2015-12-31 2019-02-22 深圳市美贝壳科技有限公司 一种通过绑定码绑定智能设备的方法
CN106790156B (zh) * 2016-12-29 2020-12-22 海尔优家智能科技(北京)有限公司 一种智能设备绑定方法及装置
CN107979514B (zh) * 2017-11-21 2021-03-19 海信集团有限公司 一种对设备进行绑定的方法和设备
CN110636062B (zh) * 2019-09-20 2022-02-08 百度在线网络技术(北京)有限公司 设备的安全交互控制方法、装置、电子设备及存储介质
TWI730530B (zh) * 2019-12-05 2021-06-11 中華電信股份有限公司 物聯網設備綁定方法及系統
CN112533206B (zh) * 2020-12-04 2024-03-26 北京金史密斯科技股份有限公司 配网方法、装置、存储介质及电子设备
CN112769760B (zh) * 2020-12-22 2022-01-11 广州技象科技有限公司 一种信号接收处理方法及装置
CN112822216A (zh) * 2021-02-24 2021-05-18 成都杰微科技有限公司 一种用于物联网子设备绑定的认证方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150282223A1 (en) * 2014-03-27 2015-10-01 Gemtek Technology Co., Ltd. Method and system for binding mobile device with intelligent apparatus
CN112202747A (zh) * 2020-09-24 2021-01-08 青岛海尔科技有限公司 目标设备的绑定方法和装置、存储介质及电子装置
CN112543457A (zh) * 2020-11-23 2021-03-23 广州技象科技有限公司 一种物联网终端的网关切换绑定方法及装置
CN112737845A (zh) * 2020-12-29 2021-04-30 青岛海尔科技有限公司 智能设备的绑定方法、装置、存储介质及电子装置
CN113595992A (zh) * 2021-07-07 2021-11-02 青岛海尔科技有限公司 安全绑定方法及系统、存储介质、电子装置

Also Published As

Publication number Publication date
CN113595992B (zh) 2023-03-28
CN113595992A (zh) 2021-11-02

Similar Documents

Publication Publication Date Title
KR102149587B1 (ko) 신원 인증 방법 및 장치
US10904758B2 (en) Secure method for configuring internet of things (IOT) devices through wireless technologies
JP6668183B2 (ja) 通信装置、通信方法、通信システムおよびプログラム
US8873758B2 (en) Secure wireless link between two devices using probes
EP2405622B1 (en) Device communication
US8375207B2 (en) Method and apparatus for authenticating a network device
WO2023279897A1 (zh) 安全绑定方法及系统、存储介质、电子装置
KR101743195B1 (ko) 정보 제공방법, 장치, 프로그램 및 기록매체
EP4068834A1 (en) Initial security configuration method, security module, and terminal
CN107070931B (zh) 云应用数据上传/访问方法、系统及云代理服务器
US20210251019A1 (en) Systems and methods for provisioning wi-fi devices
WO2022116209A1 (zh) 物联网设备接入认证方法、装置、设备及存储介质
WO2014127751A1 (zh) 无线终端配置方法及装置和无线终端
WO2022143130A1 (zh) 一种应用程序登录方法及系统
WO2023109240A1 (zh) 智能门锁的绑定方法和装置、存储介质及电子装置
EP3373622B1 (en) Method and apparatus for secure interaction between terminals
WO2023005410A1 (zh) 信息同步方法及系统、存储介质、电子装置
WO2018099407A1 (zh) 账户认证登录方法及装置
CN112040484A (zh) 密码更新方法及装置、存储介质、电子装置
CN113301537B (zh) 用于建立通信连接的方法、装置、电子设备以及存储介质
JP4856700B2 (ja) トラステッド媒体を介した無線ユニバーサルシリアルバス(wusb)接続の確立
WO2023240587A1 (zh) 一种设备权限配置方法及装置、终端设备
JP2013207729A (ja) 無線通信装置及び無線通信回線登録方法
CN115442061A (zh) 安全认证方法、可读介质和电子设备
KR20150114923A (ko) Ap접속정보 설정방법 및 이를 위한 단말기

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22836652

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 22836652

Country of ref document: EP

Kind code of ref document: A1