Detailed Description
So that the manner in which the features and elements of the disclosed embodiments can be understood in detail, a more particular description of the disclosed embodiments, briefly summarized above, may be had by reference to the embodiments, some of which are illustrated in the appended drawings. In the following description of the technology, for purposes of explanation, numerous details are set forth in order to provide a thorough understanding of the disclosed embodiments. However, one or more embodiments may be practiced without these details. In other instances, well-known structures and devices may be shown in simplified form in order to simplify the drawing.
Fig. 1 is a flowchart of a method for binding an intelligent device according to an embodiment of the present disclosure, where the method includes the following steps:
s101, receiving network configuration information and a binding request sent by a mobile terminal.
In step S101, the intelligent device receives the network configuration information and the binding request sent by the mobile terminal. The mobile terminal sends network configuration information and a binding request to request management or control of the smart device. The intelligent device in the embodiment of the present disclosure includes household appliances that can realize interconnection, such as a refrigerator, a television, an air conditioner, a washing machine, and the like, and also includes wearable devices that can be interconnected, such as an intelligent bracelet, a watch, and the like.
S102, connecting the router according to the network configuration information, and sending the binding information to the router.
In some embodiments, connecting the routers according to the network configuration information includes: analyzing the network configuration information to obtain a user name and a password of the wireless network; and connecting to the router according to the user name and the password of the wireless network.
S103, after the router sends the binding information to the server, the authentication information sent by the server and used for indicating that the binding relationship is established is received.
The intelligent device is connected with the router according to the network configuration information, and the router forwards the binding information to the server, so that the server can conveniently establish the binding relationship between the mobile terminal and the mobile terminal according to the binding information.
And after the router sends the binding information to the server, the intelligent equipment receives the authentication information sent by the server in order to determine whether the server successfully establishes the binding relationship.
In some embodiments, after receiving the binding information sent by the intelligent device, the server performs security authentication on the mobile terminal according to the binding information, so as to avoid binding errors, which result in irrelevant mobile terminals obtaining control rights and causing information leakage, and authenticate rights granted by users and rights applied by the mobile terminals, so as to avoid the rights obtained by the mobile terminals reducing user information security. For example: the user only wants to control the smart television through the mobile phone, the mobile phone also includes a position for acquiring the smart television in the binding request, and after the server is authenticated, the feedback authentication information includes: and controlling the permission to pass the permission authentication and obtaining the permission of the position of the intelligent television to fail.
In some embodiments, the binding relationship includes: the binding relationship between the mobile terminal and the intelligent equipment; or a binding relationship between the specific account and the smart device.
In some embodiments, when the binding relationship between the mobile terminal and the smart device is established, if the mobile terminal is switched to manage or control the smart device, the new mobile terminal needs to perform the binding process again.
In some embodiments, when the binding relationship between the specific account and the smart device is established, if the mobile terminal is switched to manage or control the smart device, the binding process does not need to be executed again after the mobile terminal logs in the account.
In some embodiments, the binding information includes: information of the mobile terminal and information of the intelligent device; or the information of the specific account and the information of the intelligent device are convenient for the server to establish the binding relationship between the mobile terminal and the intelligent device according to the binding relationship, or the binding relationship between the information of the specific account and the intelligent device is established.
In some embodiments, the information of the mobile terminal includes an identifier of the mobile terminal, or an authority requested by the mobile terminal and the identifier of the mobile terminal, so that the server determines the mobile terminal for which the smart device requests to establish the binding relationship.
In some embodiments, the information of the mobile terminal includes the permission requested by the mobile terminal and the identifier of the mobile terminal, so that the server can conveniently authenticate the permission requested by the mobile terminal, and the permission acquired by the mobile terminal is prevented from reducing the security of the user information.
In some embodiments, the information of the specific account includes an account number for logging in the mobile terminal, or an account number for logging in the mobile terminal and a requested authority.
In some embodiments, the information of the specific account includes the account which logs in the mobile terminal and the requested authority, so that the server can conveniently authenticate the authority requested by the account, the authority acquired by the account is prevented from reducing the security of user information, and the risk that the private information of the user is illegally acquired after the account is stolen is reduced.
In some embodiments, the information of the smart device includes an identification of the smart device, or an identification of the smart device and authorization information, so that the server determines the smart device requesting to establish the binding relationship.
In some embodiments, the information of the smart device includes identification and authorization information of the smart device. The authorization information is set by a developer before the intelligent equipment leaves a factory and is stored in the system, so that the information of the intelligent equipment is prevented from being stolen, and the safety is improved. For example: the intelligent camera sets the authority opened to the mobile terminal as the control authority before leaving the factory, the acquisition authority of the specific shooting content is only opened to the wired connection equipment, when the mobile terminal requests to establish binding with the intelligent camera, only the mobile terminal is supported to adjust the angle of the camera, and the mobile terminal is forbidden to acquire the image content shot by the camera.
In some embodiments, when the smart device does not preset the authorization information, the management and control of the smart device by the mobile terminal are limited by the transmission protocol or the information security. For example: the acquisition authority of the specific shooting content of the intelligent camera is only opened to the wired connection equipment, so that lawless persons are prevented from illegally acquiring information shot by the camera through wireless. After the identification of the intelligent device is obtained, the device type is determined according to the identification of the intelligent device, and the management or control authority of the mobile terminal to the intelligent device is determined according to the device type, so that binding is completed.
In some embodiments, the method further comprises: and sending authentication information to the mobile terminal to prompt the user to finish the binding of the intelligent equipment.
In some embodiments, before sending the authentication information to the mobile terminal, the method further includes: and acquiring an authentication information request instruction sent by the mobile terminal.
The intelligent terminal sends the authentication information to the mobile terminal in an asynchronous transmission mode to inform the mobile terminal of the binding result, or the mobile terminal sends a request instruction to the intelligent equipment to obtain the authentication information in an active pulling mode to determine the binding result.
The intelligent device and the mobile terminal get rid of a common TCP/IP protocol, and adopt a UDP protocol or a BLE protocol for communication so as to improve the network access rate of the intelligent device and the capability of dynamically adapting to network changes.
In some embodiments, the method further comprises: a reset request is received and the network configuration information and authentication information are cleared.
The intelligent device receives a reset request sent by the mobile terminal to clear network configuration information and authentication information, reduce memory pressure and facilitate subsequent connection to a new network and establishment of binding relations with other mobile terminals.
In the embodiment of the disclosure, after the intelligent device is connected to the router according to the network configuration information sent by the mobile terminal, the subsequent binding process is completed by the server, and the authentication information is issued by the server after the binding is completed, so that the online time of the mobile device is reduced, the binding failure caused by the connection interruption of the mobile terminal is avoided, and the binding efficiency is improved.
Fig. 2 is a flowchart of a method for binding an intelligent device according to an embodiment of the present disclosure, where the method includes the following steps:
s201, the mobile terminal sends network configuration information and a binding request to the intelligent device.
S202, the intelligent device is connected with the router.
And S203, the intelligent device generates binding information according to the binding request.
In some embodiments, before step S202, the mobile terminal sends a binding request to the server, so that the server determines the terminal that the mobile terminal requests to establish the binding relationship according to the binding request.
In some embodiments, the binding request sent by the mobile terminal to the mobile terminal includes the requested right, the intelligent device generates binding information to the server according to the requested right, the authorization information of the intelligent device and the like, and the server performs authentication on the mobile terminal.
In some embodiments, the binding request sent by the mobile terminal to the mobile terminal does not include the requested rights, but only basic information of the mobile terminal such as the mobile terminal identity. The binding request sent by the mobile terminal to the server comprises the requested authority, the server authenticates the mobile terminal, the data processing capacity of the server is superior to that of the intelligent device, and the binding rate is improved. For example: when the intelligent device is a television, the mobile terminal requests the control authority of the television, acquires the storage information, acquires the geographic position, acquires the client installation information and the like.
S204, the intelligent device sends the binding information to the router.
S205, the router sends the binding information to the server.
In step S205, the router is responsible for forwarding the binding information to the server, and forwards the binding information to the server when receiving the binding information sent by the smart device.
And S206, the server authenticates according to the binding information to generate authentication information.
And S207, the server sends the authentication information to the intelligent equipment.
And S208, the intelligent equipment sends the authentication information to the mobile terminal.
In some embodiments, in step S208, after receiving the authentication information, the smart device sends the authentication information to the mobile terminal by means of an asynchronous notification.
In some embodiments, before step S208, the method further includes: the mobile terminal sends the authentication information to the intelligent device, and requests to acquire the authentication information in an active pulling mode to confirm the binding result.
In some embodiments, the method further comprises: and the intelligent equipment receives a reset request sent by the mobile terminal and clears the network configuration information and the authentication information.
In the embodiment of the disclosure, after the intelligent device is connected to the router according to the network configuration information sent by the mobile terminal, the subsequent binding process is completed by the server, and the authentication information is issued by the server after the binding is completed, so that the online time of the mobile device is reduced, the binding failure caused by the connection interruption of the mobile terminal is avoided, and the binding efficiency is improved.
Fig. 3 is a schematic structural diagram of an apparatus for binding a smart device according to an embodiment of the present disclosure, where the apparatus includes: a receiving module 301, a connecting module 302 and a transmitting module 303.
The receiving module 301 is configured to receive network configuration information and a binding request sent by a mobile terminal.
A connection module 302 configured to connect the router according to the network configuration information.
In some embodiments, the connection module 302 is configured to parse the network configuration information to obtain a username and a password of the wireless network; and connecting to the router according to the user name and the password of the wireless network.
A sending module 303 configured to send the binding information to the server through the router.
The receiving module 301 is further configured to receive the authentication information sent by the server when the server establishes a binding relationship according to the binding request and the binding information sent by the mobile terminal.
In some embodiments, after receiving the binding information sent by the intelligent device, the server performs security authentication on the mobile terminal according to the binding information, so as to avoid binding errors, which result in irrelevant mobile terminals obtaining control rights and causing information leakage, and authenticate rights granted by users and rights applied by the mobile terminals, so as to avoid the rights obtained by the mobile terminals reducing user information security.
In some embodiments, the sending module 303 is further configured to send authentication information to the mobile terminal to prompt the user to complete the binding of the smart device.
In some embodiments, the receiving module 301 is further configured to obtain the authentication information request instruction sent by the mobile terminal before the sending module 303 sends the authentication information to the mobile terminal.
The intelligent terminal sends the authentication information to the mobile terminal in an asynchronous transmission mode to inform the mobile terminal of the binding result, or the mobile terminal sends a request instruction to the intelligent equipment to obtain the authentication information in an active pulling mode to determine the binding result.
The intelligent device and the mobile terminal get rid of a common TCP/IP protocol, and adopt a UDP protocol or a BLE protocol for communication so as to improve the network access rate of the intelligent device and the capability of dynamically adapting to network changes.
In some embodiments, the receiving module 301 is further configured to receive a reset request. The device also includes: and the information clearing unit is configured to clear the network configuration information and the authentication information according to the reset request.
In the embodiment of the disclosure, after the intelligent device is connected to the router according to the network configuration information sent by the mobile terminal, the subsequent binding process is completed by the server, and the authentication information is issued by the server after the binding is completed, so that the online time of the mobile device is reduced, the binding failure caused by the connection interruption of the mobile terminal is avoided, and the binding efficiency is improved.
The disclosed embodiments provide an apparatus for intelligent device binding, comprising a processor and a memory storing program instructions, the processor being configured to execute the method for intelligent device binding of the above embodiments when executing the program instructions.
An embodiment of the present disclosure provides an intelligent device, a structure of which is shown in fig. 4, including:
a processor (processor)400 and a memory (memory)401, and may further include a Communication Interface 402 and a bus 403. The processor 400, the communication interface 402, and the memory 401 may communicate with each other through a bus 403. Communication interface 402 may be used for information transfer. The processor 400 may invoke logic instructions in the memory 401 to perform the method for intelligent device binding of the above-described embodiments.
In addition, the logic instructions in the memory 401 may be implemented in the form of software functional units and may be stored in a computer readable storage medium when the logic instructions are sold or used as independent products.
The memory 401 is a computer-readable storage medium and can be used for storing software programs, computer-executable programs, such as program instructions/modules corresponding to the methods in the embodiments of the present disclosure. The processor 400 executes the functional applications and data processing by executing the program instructions/modules stored in the memory 401, i.e. implements the method for intelligent device binding in the above-described method embodiments.
The memory 401 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the terminal device, and the like. Further, the memory 401 may include a high-speed random access memory, and may also include a nonvolatile memory.
The embodiment of the disclosure provides an intelligent device and the like, which comprise the device for binding the intelligent device.
Embodiments of the present disclosure provide a computer-readable storage medium storing computer-executable instructions configured to perform the above-described method for smart device binding.
Embodiments of the present disclosure provide a computer program product comprising a computer program stored on a computer readable storage medium, the computer program comprising program instructions which, when executed by a computer, cause the computer to perform the above-described method for smart device binding.
The computer-readable storage medium described above may be a transitory computer-readable storage medium or a non-transitory computer-readable storage medium.
The technical solution of the embodiments of the present disclosure may be embodied in the form of a software product, where the computer software product is stored in a storage medium and includes one or more instructions to enable a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method of the embodiments of the present disclosure. And the aforementioned storage medium may be a non-transitory storage medium comprising: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes, and may also be a transient storage medium.
The above description and drawings sufficiently illustrate embodiments of the disclosure to enable those skilled in the art to practice them. Other embodiments may incorporate structural, logical, electrical, process, and other changes. The examples merely typify possible variations. Individual components and functions are optional unless explicitly required, and the sequence of operations may vary. Portions and features of some embodiments may be included in or substituted for those of others. The scope of the disclosed embodiments includes the full ambit of the claims, as well as all available equivalents of the claims. As used in this application, although the terms "first," "second," etc. may be used in this application to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, unless the meaning of the description changes, so long as all occurrences of the "first element" are renamed consistently and all occurrences of the "second element" are renamed consistently. The first and second elements are both elements, but may not be the same element. Furthermore, the words used in the specification are words of description only and are not intended to limit the claims. As used in the description of the embodiments and the claims, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. Similarly, the term "and/or" as used in this application is meant to encompass any and all possible combinations of one or more of the associated listed. Furthermore, the terms "comprises" and/or "comprising," when used in this application, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. Without further limitation, an element defined by the phrase "comprising an …" does not exclude the presence of other like elements in a process, method or apparatus that comprises the element. In this document, each embodiment may be described with emphasis on differences from other embodiments, and the same and similar parts between the respective embodiments may be referred to each other. For methods, products, etc. of the embodiment disclosures, reference may be made to the description of the method section for relevance if it corresponds to the method section of the embodiment disclosure.
Those of skill in the art would appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software may depend upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the disclosed embodiments. It can be clearly understood by the skilled person that, for convenience and brevity of description, the specific working processes of the system, the apparatus and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments disclosed herein, the disclosed methods, products (including but not limited to devices, apparatuses, etc.) may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units may be merely a logical division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form. The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to implement the present embodiment. In addition, functional units in the embodiments of the present disclosure may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. In the description corresponding to the flowcharts and block diagrams in the figures, operations or steps corresponding to different blocks may also occur in different orders than disclosed in the description, and sometimes there is no specific order between the different operations or steps. For example, two sequential operations or steps may in fact be executed substantially concurrently, or they may sometimes be executed in the reverse order, depending upon the functionality involved. Each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.