Intelligent equipment binding method and device

A smart device and binding technology, applied in electrical components, transmission systems, etc., can solve problems such as smart device legality verification, achieve the effect of preventing false binding requests, enhancing security, and avoiding security risks

Active Publication Date: 2017-05-31
HAIER YOUJIA INTELLIGENT TECH BEIJING CO LTD
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the existing technical implementation, the legitimacy of the smart device is not verified during binding, and the client can request binding to the cloud by providing information such as the MAC of the smart device, so there is a security risk of unauthorized binding
At the same time, since the device verification is not performed during the binding process, the client can submit false MAC information to complete the binding request, resulting in the security problem of false binding

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent equipment binding method and device
  • Intelligent equipment binding method and device
  • Intelligent equipment binding method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] The smart device binding method with the cloud platform as the execution subject includes:

[0047] Step 1: The cloud platform receives a binding key generation request carrying the identification information of the smart device from the smart device, generates a binding key according to the generation request and sends it to the smart device, and generates the binding key carried by the smart device in the request. The corresponding relationship between the identification information and the binding key generated according to the generation request is recorded in the corresponding relationship table;

[0048] Step 2: When the cloud platform receives a binding request carrying the client ID, the smart device ID, and the binding ciphertext from the mobile terminal, it searches the correspondence table for the smart device ID information carried in the binding request For the corresponding binding key, use the binding key to decrypt the binding ciphertext with a preset en...

Embodiment 2

[0066] The smart device binding method with the smart device as the execution subject includes: after the smart device receives the binding request from the mobile terminal, sends a binding key generation request carrying the smart device identification information to the cloud platform, and receives the binding key from the cloud platform Using a preset encryption algorithm to encrypt the identification information of the smart device with the binding key to generate a binding ciphertext, and sending the binding ciphertext to the mobile terminal.

[0067] The smart device identification information includes the unique identification of the smart device, or the smart device identification information includes the unique identification and time stamp of the smart device. The unique identifier of the smart device may be the MAC address of the smart device.

[0068] The method further includes: the smart device sending a binding key update request to the cloud platform. The cond...

Embodiment 3

[0074] The smart device binding method with the mobile terminal as the execution subject includes: the mobile terminal sends a binding request to the smart device, receives a binding ciphertext from the smart terminal, and sends the binding ciphertext carrying the smart device identifier and the binding ciphertext to the cloud platform. The binding request.

[0075] The present invention adds a security control measure for verifying the legitimacy of the smart device when the smart device is bound, and an effective security control mechanism is formed when the smart device is bound. Through the method of binding ciphertext verification, the false smart device identification information submitted by the client will be recognized and rejected by the verification mechanism, and the binding request cannot be completed, so that false binding requests can be prevented and the security risk of unauthorized binding can be avoided. Enhanced security for smart device control and operati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an intelligent equipment binding method and device. The method comprises steps as follows: a cloud platform generates binding keys and records the corresponding relation of intelligent equipment identification information and the binding keys in a corresponding relation table; when receiving a binding request carrying a client identification, the intelligent equipment identification information and a binding ciphertext from a mobile terminal, the cloud platform looks up the binding key corresponding to the intelligent equipment identification information carried in the binding request in the corresponding relation table, decodes the binding ciphertext through the binding key in a preset encryption algorithm and binds the intelligent equipment identification information and the client identification after decoding is successful or the decoded intelligent equipment identification information and the intelligent equipment identification information received from the mobile terminal are successfully matched. With the adoption of the intelligent equipment binding method and device, a false binding request can be prevented, the safety risk caused by unauthorized binding can be avoided, and the intelligent equipment control and operation safety is improved.

Description

technical field [0001] The present invention relates to the technical field of signal processing of smart devices, in particular to a method and device for binding smart devices. Background technique [0002] Intelligent device refers to any kind of equipment, apparatus or machine with computing and processing capabilities. As computer technology becomes more and more advanced and cheaper, various types of equipment can be built. In addition to personal and handheld computers, there are many smart devices, including medical equipment, geological equipment, and household appliances. Smart devices usually have the function of connecting to the network, and can perform operations such as query, binding and management through the APP installed on the smart phone or tablet computer. [0003] To realize the management and operation of smart devices, it is first necessary to establish a one-to-one operation relationship between the client and the smart device, and this process is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/0876
Inventor 白秀杰
Owner HAIER YOUJIA INTELLIGENT TECH BEIJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products