Method for performing security binding, medium, equipment and terminal

A terminal and security technology, which is applied to security devices, secure communication devices, and key distribution, can solve problems such as the inability to prevent malicious binding of terminals, and achieve the effect of improving security performance

Inactive Publication Date: 2018-07-31
HAIER YOUJIA INTELLIGENT TECH (BEIJING) CO LTD
View PDF7 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The above solution prevents malicious binding of the smart device by terminals outside the local area network where the smart device is located, but cannot prevent malicious binding of the smart device by terminals within the same local area network as the smart device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for performing security binding, medium, equipment and terminal
  • Method for performing security binding, medium, equipment and terminal
  • Method for performing security binding, medium, equipment and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] figure 1 It is a flow chart of a method for performing secure binding on a cloud device in Embodiment 1, and the method includes:

[0050] Step 101, receiving a binding request from a terminal, wherein the binding request includes at least unique configuration identification information of the terminal and a smart device identification of the smart device to be bound;

[0051] Step 102, determining whether there is a pre-stored correspondence between the unique configuration identification information of the terminal and the smart device identification of the smart device to be bound;

[0052] Step 103, in the case that the above-mentioned corresponding relationship is pre-stored, bind the terminal and the smart device to be bound.

[0053] This method only allows terminals that have a corresponding relationship with the smart device to be bound to the smart device, while terminals that do not have a corresponding relationship with the smart device cannot be bound. Th...

Embodiment 2

[0068] Embodiment 2 provides a method for performing security binding, which is applied to a terminal, such as image 3 As shown, this method includes:

[0069] Step 301, constructing a binding request, which carries the smart device identification of the smart device to be bound and the unique configuration identification information of the terminal;

[0070] Step 302, sending a binding request to the cloud device.

[0071] This method also includes before step 301:

[0072] Step 300-1, generating unique configuration identification information of the terminal; specifically, generating unique configuration identification information according to the timestamp information, or generating unique configuration identification information according to the timestamp information and the identification of the terminal.

[0073] Step 300-2, sending a configuration network access command to the smart device, and configuring the network access command to carry the unique configuration ...

Embodiment 3

[0086] The method for secure binding applied to smart devices in the third embodiment includes: receiving configuration network access instructions from the terminal, parsing network access information and unique configuration identification information from the configuration network access instructions, accessing the local area network according to the network access information, accessing After success, send the identification of the smart device and the unique configuration identification information to the cloud device; and, after the access is successful, send the identification of the smart device to the terminal.

[0087] The smart device in this embodiment three includes:

[0088] The fourth receiving module is used to receive configuration network access instructions from the terminal;

[0089] The parsing module is used to parse the network access information and the unique configuration identification information from the configuration network access instruction;

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for performing security binding, a medium, equipment and a terminal. The method applied to cloud equipment includes the following steps: receiving a binding request ofthe terminal, wherein the binding request at least includes unique configuration identifier information of the terminal and an intelligent equipment identifier of intelligent equipment to be bound; determining whether a corresponding relationship between the unique configuration identifier information of the terminal and the intelligent equipment identifier of the intelligent equipment to be bound is pre-stored; and if the corresponding relationship is pre-stored, binding the terminal to the intelligent equipment to be bound. According to the scheme of the invention, the problems that visitors in the same local area network or other illegal users can also be bound to the intelligent equipment and security vulnerabilities are caused can be avoided, and the security performance of the intelligent equipment can be improved.

Description

technical field [0001] The present application relates to but not limited to the technical field of wireless communication, and in particular relates to a method, medium, device and terminal for secure binding. Background technique [0002] In order to prevent a terminal outside the local area network to which the smart device belongs maliciously binds and controls the smart device, it is determined whether to bind by judging whether the terminal is connected to the local area network to which the smart device belongs. [0003] The above solution prevents malicious binding of the smart device by a terminal outside the local area network where the smart device is located, but cannot prevent malicious binding of the smart device by a terminal within the same local area network as the smart device. Contents of the invention [0004] In order to solve the above technical problems, the present invention provides a method, medium, device and terminal for secure binding. [0005...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W84/12H04L9/08H04L29/06H04W12/48
CPCH04L9/0866H04L63/0876H04L63/20H04W12/06H04W84/12
Inventor 刘国南
Owner HAIER YOUJIA INTELLIGENT TECH (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products