Unlock instant, AI-driven research and patent intelligence for your innovation.
Method for binding iOS device, iOS device and auxiliary device
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology of auxiliary equipment and equipment, applied in the direction of electrical components, transmission systems, etc., can solve the problem of not being able to obtain the MAC of iOS devices
Inactive Publication Date: 2016-06-01
SHANDONG TAIXIN ELECTRONICS CO LTD
View PDF5 Cites 6 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0003] The purpose of the present invention is to solve the above problems, provide a method for binding iOS devices, iOS devices and auxiliary devices, which solves the problem that the application cannot obtain the MAC of iOS devices from iOS7, and uses the MAC address to generate the unique identification of iOS devices And iOS application binding, realizes that the binding relationship between iOS application and iOS device is not affected by application reinstallation or system reset, and then enables iOS device to use customized network services provided by iOS application without user registration, and realizes Accurate message push, etc.
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0038] Such as figure 1 As shown, a method for binding an iOS device includes the following steps:
[0039] Step (11): The iOS device sends a broadcast message to the auxiliary device in the local area network;
[0040] Step (12): The iOS device waits to receive the reply message from the auxiliary device;
[0041] Step (13): The iOS device obtains its own MAC address from the reply message;
[0042] Step (14): The iOS device uses the MAC address to generate the unique identifier of the iOS device;
[0043] Step (15): The iOS device is bound with the unique identifier of the iOS device.
[0044] The broadcast message is an RARP broadcast message or a free ARP broadcast message.
[0045] The step (14) is further: the iOS device directly uses the MAC address as the unique identifier of the iOS device; or the iOS device uses a hash algorithm to calculate the MAC address and uses the result of the calculation as the unique identifier of the iOS device; or the iOS device uses a hash The algor...
Embodiment 2
[0051] Such as figure 2 As shown, a method for binding an iOS device includes the following steps:
[0052] Step (21): The auxiliary device receives the broadcast message sent by the iOS device;
[0053] Step (22): The auxiliary device obtains the MAC address of the iOS device from the broadcast message;
[0054] Step (23): the auxiliary device encapsulates the MAC address into a reply message;
[0055] Step (24): The auxiliary device sends a reply message to the iOS device.
[0056] The broadcast message is an RARP broadcast message or a free ARP broadcast message.
[0057] The auxiliary equipment is a set-top box, a television, a mobile phone or a PAD.
[0058] Such as image 3 As shown, an iOS device includes:
[0059] The first data transceiver module is configured to receive and send broadcast messages;
[0060] The first MAC address obtaining module is configured to obtain its own MAC address in the broadcast message;
[0061] The unique identifier generation module is configured to g...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a method for binding an iOS device, the iOS device and an auxiliary device. The method comprises following steps that (11): the iOS device sends broadcast information to the auxiliary device in a local area network; (12): the iOS device waits to receive replying information sent by the auxiliary device; (13): the iOS device acquires own MAC address in the replying information; (14): the iOS device uses the MAC address to generate an unique identifier itself; and (15): the iOS and the iOS device unique identification are bonded. Thus, it is achieved that a binding relation between an iOS application and the iOS device is not affected by re-installation of the application or resetting of a system, thereby achieving that a user can use a customized network service provided by the iOS application without registration and achieving precise information pushing.
Description
Technical field [0001] The invention relates to a method for binding iOS equipment, iOS equipment and auxiliary equipment. Background technique [0002] Starting with iOS7, Apple has restricted the ways in which application developers can obtain the unique identification of iOS devices. iOS applications cannot obtain MAC (Medium / MediaAccessControl) addresses by requesting iOS devices. UUID (UniversallyUniqueIdentifier) allows all elements in a distributed system to have unique identification information, without the need to specify identification information through a central control terminal. In this way, each application can establish a UUID that does not conflict with other applications. In this case, there is no need to consider the problem of name duplication during database creation. Apple recommends using UUID to generate a unique identification string for the application. However, when the application is deleted or the system is reset, the UUID becomes invalid. When ...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.