Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

IOT device and user binding authentication method, device and medium

A technology of user binding and authentication method, applied in the field of IOT device binding, it can solve the problem that security cannot be guaranteed, and achieve the effect of abandoning illegal control and ensuring legality

Active Publication Date: 2019-10-01
HANGZHOU BROADLINK ELECTRONICS TECH
View PDF8 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, its security cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IOT device and user binding authentication method, device and medium
  • IOT device and user binding authentication method, device and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] This embodiment provides an authentication method for binding an IOT device to a user, aiming at ensuring the security and legitimacy of the binding, please refer to figure 1 As shown, it includes the following steps:

[0038] 110. Directly receive user information and IOT device information sent by the target user, or receive user information sent by the target user through the IOT device, and obtain a user account corresponding to the target user.

[0039] The authentication device bound to the IOT device and the user (that is, the electronic device in Embodiment 5) may be a cloud or an entity server existing in other forms. Here, the cloud is taken as an example. The target user is the user who initiates the authentication request for the binding of the IOT device and the user, which is not necessarily the same user as the user who subsequently performs the binding operation between the IOT device and the user and the user who controls the IOT device after binding. ...

Embodiment 2

[0063] The second embodiment is the operation of configuring the IOT device network before the first embodiment. In the second embodiment, IOT device network configuration is implemented through the configuration interface of the app installed on the terminal device. The process is: the terminal device obtains the WLAN hotspot of the IOT device to connect to the wireless LAN, and then enters the ssid and password of the WAN WiFi in the configuration interface, and the IOT device receives it and completes the network configuration according to the ssid and password of the WAN WiFi.

Embodiment 3

[0065] The third embodiment is the operation of configuring the IOT device network before the first embodiment. In the third embodiment, the terminal device is connected to the AP node to obtain the configuration interface to realize the network configuration of the IOT device. Communication, user-friendly.

[0066] The process is:

[0067] The terminal device obtains the WLAN hotspot of the IOT device to connect to the wireless local area network, and obtains the IP address, Gateway address and DNS server address returned by the IOT device according to the wireless local area network connection;

[0068] The terminal device obtains and resolves IP through the Gateway address;

[0069] The terminal device sends an http request to the resolved IP to obtain the configuration interface of the IOT device;

[0070] The terminal device transmits the ssid and password for connecting to the WAN WiFi to the IOT device through the configuration interface.

[0071] The above configur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an IOT device and user binding authentication method, and relates to the technical field of IOT device binding, and the method comprises the following steps: directly receivinguser information and IOT device information sent by a target user, or receiving user information sent by the target user through the IOT device, and obtaining a user account of the target user; if the user account is not bound with the IOT device, temporarily binding the user account and the IOT device; pushing a message to the user information, and after a confirmation request sent by a target user according to the message is received, sending an IOT device list to the user account; and realizing the binding of the user account and the IOT equipment according to the information of the IOT equipment list selected by the target user. The invention further discloses electronic equipment and a computer storage medium. According to the invention, the binding security of the IOT device and theuser can be ensured.

Description

technical field [0001] The present invention relates to the technical field of IOT device binding, in particular to an authentication method, device and medium for binding an IOT device and a user. Background technique [0002] With the continuous development of the network, the application of smart home is more and more extensive. In some application scenarios, the user sends control instructions to the IOT device through the cloud through the terminal device to control the IOT device. Before the control, it is necessary to bind the IOT device with the user. The existing binding method is mainly that the user queries the IOT device under the wireless LAN connected to the same WiFi through the terminal device, and then clicks to bind. After receiving the binding request, the cloud sends The user's terminal device sends the authentication to complete the operation. In this way, its security cannot be guaranteed. Contents of the invention [0003] In order to overcome the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04W84/12
CPCH04L63/0876H04L63/102H04W84/12H04L67/55
Inventor 李志为姚博刘宗孺
Owner HANGZHOU BROADLINK ELECTRONICS TECH
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More