CN114040411B - Equipment binding method and device, electronic equipment and storage medium - Google Patents
Equipment binding method and device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN114040411B CN114040411B CN202111290155.XA CN202111290155A CN114040411B CN 114040411 B CN114040411 B CN 114040411B CN 202111290155 A CN202111290155 A CN 202111290155A CN 114040411 B CN114040411 B CN 114040411B
- Authority
- CN
- China
- Prior art keywords
- binding
- information
- dimensional code
- target equipment
- attribute information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 63
- 238000001514 detection method Methods 0.000 claims abstract description 58
- 238000012795 verification Methods 0.000 claims description 39
- 238000004891 communication Methods 0.000 claims description 28
- 230000003993 interaction Effects 0.000 claims description 27
- 238000013475 authorization Methods 0.000 claims description 15
- 230000006855 networking Effects 0.000 claims description 14
- 238000004590 computer program Methods 0.000 claims description 10
- 230000008569 process Effects 0.000 abstract description 20
- 230000005540 biological transmission Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000000802 evaporation-induced self-assembly Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/40—Security arrangements using identity modules
- H04W12/48—Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/50—Secure pairing of devices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The application provides a device binding method and device, electronic equipment and a storage medium, and belongs to the technical field of equipment control. The method comprises the steps of obtaining object identification, attribute information and binding information corresponding to target equipment corresponding to an object; generating a binding two-dimensional code based on the attribute information and the binding information; transmitting the binding two-dimensional code to the object; acquiring first detection information uploaded by the target equipment, wherein the first detection information is information obtained by the target equipment for identifying the binding two-dimensional code displayed by the object; and when the first detection information and the binding information accord with a preset first matching condition, establishing a binding relation between the object identifier and the target device based on the attribute information. Namely, the binding relation between the object identifier and the door lock is established by utilizing the two-dimension code, so that the safety of the binding process is improved.
Description
Technical Field
The present application relates to the field of device control technologies, and in particular, to a device binding method, a device binding apparatus, an electronic device, and a storage medium.
Background
Along with the development of science and technology and the improvement of living standard of people, the intelligent door lock gradually goes into thousands of families. The intelligent door lock is a lockset which is more intelligent and simplified in terms of user safety, identification and manageability, and is usually required to be bound with a user ID before formal use, and after the binding, the user can use the intelligent door lock according to binding content. Currently, the binding process is generally: the door lock management platform issues a binding code to a user, the binding code is input on the intelligent door lock for binding after the user receives the binding code, the intelligent door lock uploads the binding code input by the user to the door lock management platform for comparison, and when the comparison results are consistent, the binding of the user and the intelligent door lock is completed. However, most of the current binding codes are random digital codes with 6-8 bits, and the digital plaintext is easy to leak in the device binding process, so that the security is low.
Disclosure of Invention
The embodiment of the application aims to provide a device binding method, a device, electronic equipment and a storage medium, so as to solve the problem that the binding is easy to leak by utilizing digital plaintext at present.
The specific technical scheme is as follows:
in a first aspect, a device binding method is provided, the method comprising:
acquiring an object identifier, attribute information and binding information corresponding to target equipment corresponding to an object;
generating a binding two-dimensional code based on the attribute information and the binding information;
transmitting the binding two-dimensional code to the object;
acquiring first detection information uploaded by the target equipment, wherein the first detection information is information obtained by the target equipment for identifying the binding two-dimensional code displayed by the object;
and when the first detection information and the binding information accord with a preset first matching condition, establishing a binding relation between the object identifier and the target device based on the attribute information.
Optionally, the attribute information includes first authentication information,
the establishing a binding relationship between the object identifier and the target device based on the attribute information includes:
acquiring second verification information pre-stored in the target equipment;
determining whether the first verification information and the second verification information accord with a preset second matching condition or not;
and when the first verification information and the second verification information accord with a preset second matching condition, establishing a binding relation between the object identifier and the target equipment.
Optionally, the attribute information includes authorization information,
the establishing a binding relationship between the object identifier and the target device based on the attribute information includes:
determining a usage right based on the authorization information;
and establishing a binding relation between the object identifier and the target equipment according to the use authority.
Optionally, the method further comprises:
acquiring interaction information corresponding to the target equipment;
generating a binding two-dimensional code based on the interaction information, the attribute information and the binding information;
and sending the binding two-dimensional code to the object, and controlling the target equipment to upload the first detection information based on the interaction information after identifying the binding two-dimensional code displayed by the object.
Optionally, the generating a binding two-dimensional code based on the attribute information and the binding information includes:
encrypting the attribute information and the binding information according to a preset encryption rule to obtain encrypted information;
and generating the binding two-dimensional code based on the encryption information.
Optionally, the binding two-dimensional code includes a dynamic two-dimensional code, and the method further includes:
determining whether the target device is in a networking state;
when the target equipment is in a non-networking state, generating a dynamic two-dimensional code based on the attribute information and the binding information, wherein the dynamic two-dimensional code carries a limiting condition;
and sending the dynamic two-dimensional code to the object, and controlling the target equipment to finish the restriction binding with the object identifier according to the restriction condition after identifying the dynamic two-dimensional code displayed by the object.
In a second aspect, there is provided a device binding method, the method comprising:
acquiring an object identifier, attribute information and binding information corresponding to target equipment corresponding to an object;
generating a binding two-dimensional code based on the attribute information and the binding information;
the binding two-dimensional code is sent to the target equipment, and the target equipment is controlled to display the binding two-dimensional code;
acquiring second detection information uploaded by the object, wherein the second detection information is obtained by the object identifying the binding two-dimensional code;
and when the second detection information and the binding information accord with a preset third matching condition, establishing a binding relation between the object identifier and the target device based on the attribute information.
In a third aspect, there is provided a device binding apparatus, the apparatus comprising:
the first acquisition module is used for acquiring an object identifier corresponding to the object, attribute information and binding information corresponding to the target equipment;
the generation module is used for generating a binding two-dimensional code based on the attribute information and the binding information;
the sending module is used for sending the binding two-dimensional code to the object;
the second acquisition module is used for acquiring first detection information uploaded by the target equipment, wherein the first detection information is information obtained by the target equipment identifying the binding two-dimensional code displayed by the object;
the establishing module is used for establishing the binding relation between the object identifier and the target device based on the attribute information when the first detection information and the binding information accord with a preset first matching condition.
Optionally, the attribute information includes first authentication information,
the building module is specifically configured to:
acquiring second verification information pre-stored in the target equipment;
determining whether the first verification information and the second verification information accord with a preset second matching condition or not;
and when the first verification information and the second verification information accord with a preset second matching condition, establishing a binding relation between the object identifier and the target equipment.
Optionally, the attribute information includes authorization information,
the establishing module is further configured to:
determining a usage right based on the authorization information;
and establishing a binding relation between the object identifier and the target equipment according to the use authority.
Optionally, the generating module is further configured to:
acquiring interaction information corresponding to the target equipment;
generating a binding two-dimensional code based on the interaction information, the attribute information and the binding information;
and sending the binding two-dimensional code to the object, and controlling the target equipment to upload the first detection information based on the interaction information after identifying the binding two-dimensional code displayed by the object.
Optionally, the generating module is further configured to:
encrypting the attribute information and the binding information according to a preset encryption rule to obtain encrypted information;
and generating the binding two-dimensional code based on the encryption information.
Optionally, the generating module is further configured to:
determining whether the target device is in a networking state;
when the target equipment is in a non-networking state, generating a dynamic two-dimensional code based on the attribute information and the binding information, wherein the dynamic two-dimensional code carries a limiting condition;
and sending the dynamic two-dimensional code to the object, and controlling the target equipment to finish the restriction binding with the object identifier according to the restriction condition after identifying the dynamic two-dimensional code displayed by the object.
In a fourth aspect, there is provided a device binding apparatus, the apparatus comprising:
the first acquisition module is used for acquiring an object identifier corresponding to an object, attribute information and binding information corresponding to target equipment;
the generation module is used for generating a binding two-dimensional code based on the attribute information and the binding information;
the sending module is used for sending the binding two-dimensional code to the target equipment and controlling the target equipment to display the binding two-dimensional code;
the second acquisition module is used for acquiring second detection information uploaded by the object, wherein the second detection information is obtained by the object identifying the binding two-dimensional code;
the establishing module is configured to establish a binding relationship between the object identifier and the target device based on the attribute information when the second detection information and the binding information meet a preset third matching condition.
In a fifth aspect, an electronic device is provided, including a processor, a communication interface, a memory, and a communication bus, where the processor, the communication interface, and the memory complete communication with each other through the communication bus;
a memory for storing a computer program;
a processor for implementing the method steps of any of the first aspects when executing a program stored on a memory.
In a sixth aspect, a computer readable storage medium is provided, characterized in that the computer readable storage medium has stored therein a computer program which, when executed by a processor, implements the method steps of any of the first aspects.
In a seventh aspect, there is provided a computer program product comprising instructions which, when run on a computer, cause the computer to perform any of the device binding methods described above.
The embodiment of the application has the beneficial effects that:
the embodiment of the application provides a device binding method, a device, electronic equipment and a storage medium, wherein in the method, firstly, object identification and attribute information corresponding to an object and binding information corresponding to target equipment are obtained; generating a binding two-dimensional code based on the attribute information and the binding information; then, the binding two-dimensional code is sent to the object; and finally, when the first detection information and the binding information obtained by the target device for identifying the binding two-dimensional code accord with a preset first matching condition, establishing a binding relation between the object identifier and the target device based on the attribute information.
According to the application, the binding relation between the object and the door lock can be established by utilizing the two-dimension code, the binding by using digital plaintext is avoided, the two-dimension code communication belongs to short-range communication, the safety is high, the possibility of hijacking information can be reduced, and the safety of the binding process can be improved by binding the two-dimension code. In addition, the application can carry other attribute information except the binding information required in the binding process in the two-dimensional code, namely, the attribute information required in the binding process and the binding information are transmitted simultaneously through the two-dimensional code, so that the information exchange times are reduced, and the binding efficiency is improved.
Of course, it is not necessary for any one product or method of practicing the application to achieve all of the advantages set forth above at the same time.
Drawings
In order to more clearly illustrate the embodiments of the application or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, and it will be obvious to a person skilled in the art that other drawings can be obtained from these drawings without inventive effort.
FIG. 1 is a flowchart of a device binding method according to an embodiment of the present application;
FIG. 2 is a flowchart of a device binding method according to another embodiment of the present application;
FIG. 3 is a flowchart of a device binding method according to another embodiment of the present application;
FIG. 4 is a flowchart of a device binding method according to another embodiment of the present application;
fig. 5 is a schematic structural diagram of a device binding apparatus according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Because the current binding code is mostly a random digital code with 6-8 bits, the digital plaintext is easy to leak in the equipment binding process, and the security is low. Therefore, the embodiment of the application provides a device binding method which can be applied to device binding.
The following will describe a device binding method provided in the embodiment of the present application in detail with reference to a specific implementation, as shown in fig. 1, and the specific steps are as follows:
s101, obtaining object identification, attribute information and binding information corresponding to target equipment corresponding to an object.
S102, generating a binding two-dimensional code based on the attribute information and the binding information.
In the embodiment of the application, the object can be a mobile device, such as a mobile phone or a wearable device, and the object identifier can be a unique identifier of the object, such as a device code, or a user ID stored on the object; the attribute information refers to other information required in the binding process, such as authorization information; binding information refers to information for binding objects and devices, and may be in a literal form, a numerical form, or other form that may be used for binding verification, such as a numerical binding code.
Further, for the object identifier and the attribute information, the binding information may be obtained based on user input, and may be randomly generated based on the object identifier or may be stored in advance.
Further, the binding information may be a random code generated in real time for the target device based on the user request, or may be preset information corresponding to the target device.
Further, after the attribute information and the binding information are acquired, the attribute information and the binding information are generated into a binding two-dimensional code for the binding device, namely the attribute information and the binding information are carried in the binding two-dimensional code.
S103, the binding two-dimensional code is sent to the object.
S104, acquiring first detection information uploaded by the target equipment, wherein the first detection information is information obtained by the target equipment identifying the binding two-dimensional code displayed by the object.
S105, when the first detection information and the binding information meet a preset first matching condition, a binding relation between the object identifier and the target device is established based on the attribute information.
In the embodiment of the application, a display device for displaying the two-dimensional code, such as a display screen, is arranged on the object; the target device is provided with an identification device for identifying the two-dimensional code, such as an image type red light two-dimensional code scanner or a CCD (Charge Coupled Device, optical coupling device) scanner.
In this embodiment, after the binding two-dimensional code is generated, the binding two-dimensional code is sent to the object, so that the object displays the binding two-dimensional code to the identification device of the target device, after the target device identifies the binding two-dimensional code, the information in the binding two-dimensional code can be analyzed according to a preset protocol to obtain first detection information, and the first detection information is uploaded to the server according to a pre-stored transmission address and a pre-stored transmission protocol.
Further, whether the binding two-dimensional code displayed by the object to the target device is the binding two-dimensional code or not can be determined by comparing the first detection information and the binding information, namely, whether the object identifier and the target device can be bound or not is determined, and when the first detection information and the binding information accord with a preset first matching condition, the object identifier and the target device can be bound, so that the binding relationship between the object identifier and the target device can be established based on the attribute information.
Further, when the first detection information and the binding information are consistent, it is determined that the first detection information and the binding information are consistent with a preset first matching condition.
Further, when the object identifier is the unique identifier of the device, after the binding relationship between the object identifier and the target device is established, the target device can be controlled by the device; when the object identifier is a user ID, after the binding relation between the object identifier and the target device is established, the target device can be controlled through the user ID.
In the embodiment of the application, the binding relation between the object and the door lock can be established by utilizing the two-dimension code, the binding by using the digital plaintext is avoided, the two-dimension code communication belongs to short-range communication, the safety is high, the possibility of hijacking information can be reduced, and the safety of the binding process can be improved by binding the two-dimension code. In addition, the application can carry other attribute information except the binding information required in the binding process in the two-dimensional code, namely, the attribute information required in the binding process and the binding information are transmitted simultaneously through the two-dimensional code, so that the information exchange times are reduced, and the binding efficiency is improved.
In yet another embodiment of the present application, the step S105 may include the steps of:
step one, obtaining second verification information prestored in the target equipment;
step two, determining whether the first verification information and the second verification information accord with a preset second matching condition;
and thirdly, when the first verification information and the second verification information accord with a preset second matching condition, establishing a binding relation between the object identifier and the target device.
In the embodiment of the application, the attribute information may include first verification information, that is, verification information authorized by an administrator, for example, a key, and the second verification information is verification information stored in the target device in advance, and whether the user identifier is authorized by the administrator may be determined by determining whether the first verification information and the second verification information are matched.
Specifically, when the first detection information and the binding information are determined to be in accordance with a preset first matching condition, whether the first verification information and the second verification information are matched or not is determined, and when the first verification information and the second verification information are matched, the binding object identification and the target device can be finally determined.
Through the scheme, the authorization verification information of the administrator can be carried in the two-dimensional code, the safety of the binding process is further improved, the binding information and the authorization verification information can be transmitted to the target equipment through the two-dimensional code at one time without multiple transmission, so that the information exchange times are reduced, and the binding efficiency is improved.
In yet another embodiment of the present application, the step S105 may include the steps of:
step one, determining a use right based on the authorization information;
and step two, establishing a binding relation between the object identifier and the target equipment according to the use authority.
In the embodiment of the present application, the attribute information may include authorization information, which refers to various rights contents authorized by an administrator, such as a use time, a use content, and the like. Furthermore, the use authority can be determined according to the authorization information, and the binding relationship between the object identifier and the target device can be established on the basis of the use authority. For example, the usage right is the usage time of 24 hours, and the binding relationship between the object identifier and the target device fails after 24 hours from the binding completion time. Through the scheme, the binding information and the authorization information can be transmitted to the target equipment by utilizing the two-dimension code at one time without multiple transmission, so that the information exchange times are reduced, and the binding efficiency is improved.
In yet another embodiment of the present application, the method may further comprise the steps of:
s201, acquiring interaction information corresponding to the target equipment;
s202, generating a binding two-dimensional code based on the interaction information, the attribute information and the binding information;
s203, the binding two-dimensional code is sent to the object, and the target device is controlled to upload the first detection information based on the interaction information after the binding two-dimensional code displayed by the object is identified.
In the embodiment of the application, the interaction information may be information such as a server address or a communication protocol, which is used to instruct the target device how to interact with the server. And generating a binding two-dimensional code by the interaction information, the attribute information and the binding information, namely carrying the interaction information in the binding two-dimensional code, and transmitting the interaction information, the attribute information and the binding information to the target equipment when the two-dimensional code is displayed by the object to the identification device of the target equipment. After the target device recognizes the binding two-dimensional code, the target device can acquire the interaction information carried in the binding two-dimensional code, and determines a server address, a communication protocol and the like which need to upload the first detection information according to the interaction information.
According to the embodiment of the application, the information of communication between the target equipment and the server can be desensitized by carrying the interactive information in the two-dimensional code, the interactive information such as the server address, the communication protocol and the like does not need to be stored in the target equipment in advance, the adaptability in the binding process is improved, and the information leakage caused by hijacking of the route can be avoided by transmitting the two-dimensional code.
In yet another embodiment of the present application, the step S102 may include the following steps:
step one, encrypting the attribute information and the binding information according to a preset encryption rule to obtain encrypted information;
and step two, generating the binding two-dimensional code based on the encryption information.
In the embodiment of the application, before the binding two-dimensional code is generated, the attribute information and the binding information can be encrypted according to the preset encryption rule, and then the encrypted information is generated into the binding two-dimensional code, so that the safety of the information is further ensured. It should be noted that, in this embodiment, a decryption rule corresponding to the encryption rule is stored in the target device in advance, and the target device may decrypt the encrypted information according to the decryption rule after identifying the binding two-dimensional code.
In one implementation manner of the embodiment of the present application, an initial two-dimensional code may be generated for the attribute information and the binding information, and the two-dimensional code may be encrypted to obtain the binding two-dimensional code.
In this embodiment, the static two-dimensional code may be encrypted based on agreed verification information, and the dynamic two-dimensional code may be encrypted by adding a time stamp. Thereby further ensuring the safety of the information.
In yet another embodiment of the present application, the method may further comprise the steps of:
s301, determining whether the target device is in a networking state;
s302, when the target equipment is in a non-networking state, generating a dynamic two-dimensional code based on the attribute information and the binding information, wherein the dynamic two-dimensional code carries a limiting condition;
s303, the dynamic two-dimensional code is sent to the object, and the target device is controlled to complete limiting binding with the object identifier according to the limiting condition after the dynamic two-dimensional code displayed by the object is identified.
In the embodiment of the application, when the target device is in a non-networking state, the information of the two-dimensional code cannot be uploaded to the server in time after the two-dimensional code is identified, in order to ensure the use experience of a user, the dynamic two-dimensional code can be generated based on the attribute information and the binding information, the dynamic two-dimensional code can carry limiting conditions, such as limiting binding time or binding content, and the limiting binding with the object identifier can be completed according to the limiting conditions after the target device identifies the dynamic two-dimensional code. Thereby ensuring that the user uses the target device during the binding restriction.
In one implementation manner of the embodiment of the application, when the target device is in the networking state, the limitation binding completed when the target device is in the non-networking state can be searched, and the binding relation between the object identifier and the target device is perfected according to the attribute information and the binding information. Therefore, the user is not required to bind again during networking, and the user experience is improved.
In yet another embodiment of the present application, another device binding method is provided, as shown in fig. 4, and the specific steps are as follows:
s401, obtaining object identification, attribute information and binding information corresponding to target equipment corresponding to an object.
S402, generating a binding two-dimensional code based on the attribute information and the binding information.
S403, the binding two-dimensional code is sent to the target device, and the target device is controlled to display the binding two-dimensional code;
s404, obtaining second detection information uploaded by the object, wherein the second detection information is obtained by the object identifying the binding two-dimensional code;
and S405, when the second detection information and the binding information meet a preset third matching condition, establishing a binding relationship between the object identifier and the target device based on the attribute information.
In the embodiment of the application, the display device is arranged on the target device, the device for identifying the two-dimensional code is arranged on the object, the server can send the two-dimensional code to the target device after generating the binding two-dimensional code so as to enable the target device to display the binding two-dimensional code, the user can identify the two-dimensional code by utilizing the identification device on the object and upload second detection information obtained by identifying the two-dimensional code to the server, and when the second detection information is matched with the binding information (for example, the second detection information is consistent with the binding information), the binding relationship between the object identification and the target device is established based on the attribute information. According to the scheme, the binding of the binding two-dimensional code can be completed by displaying the binding two-dimensional code through the target equipment under the condition that the target equipment does not have an identification device, so that the adaptability of the binding process is improved.
Based on the same technical concept, the embodiment of the application further provides a device binding apparatus, as shown in fig. 5, where the device comprises:
a first obtaining module 501, configured to obtain an object identifier, attribute information, and binding information corresponding to a target device, where the object identifier and the attribute information correspond to an object;
a generating module 502, configured to generate a binding two-dimensional code based on the attribute information and the binding information;
a sending module 503, configured to send the binding two-dimensional code to the object, or send the binding two-dimensional code to the target device;
a second obtaining module 504, configured to obtain first detection information uploaded by the target device, where the first detection information is information obtained by the target device identifying the bound two-dimensional code displayed by the object, or obtain second detection information uploaded by the object, and the second detection information is information obtained by the object identifying the bound two-dimensional code;
the establishing module 505 is configured to establish a binding relationship between the object identifier and the target device based on the attribute information when the first detection information and the binding information meet a preset first matching condition, or establish a binding relationship between the object identifier and the target device based on the attribute information when the second detection information and the binding information meet a preset third matching condition.
Optionally, the attribute information includes first authentication information,
the building module is specifically configured to:
acquiring second verification information pre-stored in the target equipment;
determining whether the first verification information and the second verification information accord with a preset second matching condition or not;
and when the first verification information and the second verification information accord with a preset second matching condition, establishing a binding relation between the object identifier and the target equipment.
Optionally, the attribute information includes authorization information,
the establishing module is further configured to:
determining a usage right based on the authorization information;
and establishing a binding relation between the object identifier and the target equipment according to the use authority.
Optionally, the generating module is further configured to:
acquiring interaction information corresponding to the target equipment;
generating a binding two-dimensional code based on the interaction information, the attribute information and the binding information;
and sending the binding two-dimensional code to the object, and controlling the target equipment to upload the first detection information based on the interaction information after identifying the binding two-dimensional code displayed by the object.
Optionally, the generating module is further configured to:
encrypting the attribute information and the binding information according to a preset encryption rule to obtain encrypted information;
and generating the binding two-dimensional code based on the encryption information.
Optionally, the generating module is further configured to:
determining whether the target device is in a networking state;
when the target equipment is in a non-networking state, generating a dynamic two-dimensional code based on the attribute information and the binding information, wherein the dynamic two-dimensional code carries a limiting condition;
and sending the dynamic two-dimensional code to the object, and controlling the target equipment to finish the restriction binding with the object identifier according to the restriction condition after identifying the dynamic two-dimensional code displayed by the object.
In the embodiment of the application, the binding relation between the object and the door lock can be established by utilizing the two-dimension code, the binding by using the digital plaintext is avoided, the two-dimension code communication belongs to short-range communication, the safety is high, the possibility of hijacking information can be reduced, and the safety of the binding process can be improved by binding the two-dimension code. In addition, the application can carry other attribute information except the binding information required in the binding process in the two-dimensional code, namely, the attribute information required in the binding process and the binding information are transmitted simultaneously through the two-dimensional code, so that the information exchange times are reduced, and the binding efficiency is improved.
Based on the same technical concept, the embodiment of the present application further provides an electronic device, as shown in fig. 6, including a processor 111, a communication interface 112, a memory 113 and a communication bus 114, where the processor 111, the communication interface 112, and the memory 113 perform communication with each other through the communication bus 114,
a memory 113 for storing a computer program;
the processor 111 is configured to execute a program stored in the memory 113, and implement the following steps:
acquiring an object identifier, attribute information and binding information corresponding to target equipment corresponding to an object;
generating a binding two-dimensional code based on the attribute information and the binding information;
transmitting the binding two-dimensional code to the object;
acquiring first detection information uploaded by the target equipment, wherein the first detection information is information obtained by the target equipment for identifying the binding two-dimensional code displayed by the object;
and when the first detection information and the binding information accord with a preset first matching condition, establishing a binding relation between the object identifier and the target device based on the attribute information.
The communication bus mentioned above for the electronic devices may be a peripheral component interconnect standard (Peripheral Component Interconnect, PCI) bus or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, etc. The communication bus may be classified as an address bus, a data bus, a control bus, or the like. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
The communication interface is used for communication between the electronic device and other devices.
The Memory may include random access Memory (Random Access Memory, RAM) or may include Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the aforementioned processor.
The processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; but also digital signal processors (Digital Signal Processing, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
In yet another embodiment of the present application, a computer readable storage medium is provided, in which a computer program is stored, which when executed by a processor, implements the steps of any of the device binding methods described above.
In yet another embodiment of the present application, there is also provided a computer program product containing instructions that, when run on a computer, cause the computer to perform any of the device binding methods of the above embodiments.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present application, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another, for example, by wired (e.g., coaxial cable, optical fiber, digital Subscriber Line (DSL)), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), etc.
It should be noted that in this document, relational terms such as "first" and "second" and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing is only a specific embodiment of the application to enable those skilled in the art to understand or practice the application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (9)
1. A method of device binding, the method comprising:
acquiring an object identifier, attribute information and binding information corresponding to target equipment corresponding to an object, and acquiring interaction information corresponding to the target equipment;
generating a binding two-dimensional code based on the interaction information, the attribute information and the binding information;
the binding two-dimensional code is sent to the object, and the target device is controlled to upload first detection information based on the interaction information after the binding two-dimensional code displayed by the object is identified;
acquiring first detection information uploaded by the target equipment, wherein the first detection information is information obtained by the target equipment for identifying the binding two-dimensional code displayed by the object;
and when the first detection information and the binding information accord with a preset first matching condition, establishing a binding relation between the object identifier and the target device based on the attribute information.
2. The method of claim 1, wherein the attribute information comprises first authentication information,
the establishing a binding relationship between the object identifier and the target device based on the attribute information includes:
acquiring second verification information pre-stored in the target equipment;
determining whether the first verification information and the second verification information accord with a preset second matching condition or not;
and when the first verification information and the second verification information accord with a preset second matching condition, establishing a binding relation between the object identifier and the target equipment.
3. The method of claim 1, wherein the attribute information comprises authorization information,
the establishing a binding relationship between the object identifier and the target device based on the attribute information includes:
determining a usage right based on the authorization information;
and establishing a binding relation between the object identifier and the target equipment according to the use authority.
4. The method of claim 1, wherein the generating a binding two-dimensional code based on the attribute information and the binding information comprises:
encrypting the attribute information and the binding information according to a preset encryption rule to obtain encrypted information;
and generating the binding two-dimensional code based on the encryption information.
5. The method of claim 1, wherein the binding two-dimensional code comprises a dynamic two-dimensional code, the method further comprising:
determining whether the target device is in a networking state;
when the target equipment is in a non-networking state, generating a dynamic two-dimensional code based on the attribute information and the binding information, wherein the dynamic two-dimensional code carries a limiting condition;
and sending the dynamic two-dimensional code to the object, and controlling the target equipment to finish the restriction binding with the object identifier according to the restriction condition after identifying the dynamic two-dimensional code displayed by the object.
6. A method of device binding, the method comprising:
acquiring an object identifier, attribute information and binding information corresponding to target equipment corresponding to an object, and acquiring interaction information corresponding to the target equipment;
generating a binding two-dimensional code based on the interaction information, the attribute information and the binding information;
the binding two-dimensional code is sent to the target equipment, the target equipment is controlled to display the binding two-dimensional code, and the object is controlled to upload second detection information based on the interaction information after the binding two-dimensional code displayed by the target equipment is identified;
acquiring second detection information uploaded by the object, wherein the second detection information is obtained by the object identifying the binding two-dimensional code;
and when the second detection information and the binding information accord with a preset third matching condition, establishing a binding relation between the object identifier and the target device based on the attribute information.
7. A device binding apparatus, the apparatus comprising:
the first acquisition module is used for acquiring an object identifier corresponding to an object, attribute information and binding information corresponding to target equipment and acquiring interaction information corresponding to the target equipment;
the generation module is used for generating a binding two-dimensional code based on the interaction information, the attribute information and the binding information;
the sending module is used for sending the binding two-dimensional code to the object and controlling the target equipment to upload first detection information based on the interaction information after identifying the binding two-dimensional code displayed by the object;
the second acquisition module is used for acquiring first detection information uploaded by the target equipment, wherein the first detection information is information obtained by the target equipment identifying the binding two-dimensional code displayed by the object;
the establishing module is used for establishing the binding relation between the object identifier and the target device based on the attribute information when the first detection information and the binding information accord with a preset first matching condition.
8. The electronic equipment is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory are communicated with each other through the communication bus;
a memory for storing a computer program;
a processor for carrying out the method steps of any one of claims 1-6 when executing a program stored on a memory.
9. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored therein a computer program which, when executed by a processor, implements the method steps of any of claims 1-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111290155.XA CN114040411B (en) | 2021-11-02 | 2021-11-02 | Equipment binding method and device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111290155.XA CN114040411B (en) | 2021-11-02 | 2021-11-02 | Equipment binding method and device, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114040411A CN114040411A (en) | 2022-02-11 |
CN114040411B true CN114040411B (en) | 2023-10-10 |
Family
ID=80142643
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111290155.XA Active CN114040411B (en) | 2021-11-02 | 2021-11-02 | Equipment binding method and device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114040411B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114580956A (en) * | 2022-03-15 | 2022-06-03 | 苏州浪潮智能科技有限公司 | Asset code distribution management method and device and electronic equipment |
CN115865539B (en) * | 2023-03-03 | 2023-06-09 | 新云网科技集团股份有限公司 | Security binding method, device, equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103971435A (en) * | 2014-05-22 | 2014-08-06 | 广东欧珀移动通信有限公司 | Unlocking method, server, mobile terminal, electronic lock and unlocking system |
WO2017050011A1 (en) * | 2015-09-25 | 2017-03-30 | 广州视睿电子科技有限公司 | Equipment control method, control side equipment, controlled side equipment, and equipment control system |
CN111093192A (en) * | 2019-12-24 | 2020-05-01 | 珠海格力电器股份有限公司 | Device binding method, device, terminal device and network side device |
CN111860727A (en) * | 2020-07-30 | 2020-10-30 | 深圳前海微众银行股份有限公司 | Two-dimensional code generation method, verification method, device and computer-readable storage medium |
CN111882008A (en) * | 2020-07-13 | 2020-11-03 | 上汽大众汽车有限公司 | Method and system for binding vehicle with Internet of vehicles account |
-
2021
- 2021-11-02 CN CN202111290155.XA patent/CN114040411B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103971435A (en) * | 2014-05-22 | 2014-08-06 | 广东欧珀移动通信有限公司 | Unlocking method, server, mobile terminal, electronic lock and unlocking system |
WO2017050011A1 (en) * | 2015-09-25 | 2017-03-30 | 广州视睿电子科技有限公司 | Equipment control method, control side equipment, controlled side equipment, and equipment control system |
CN111093192A (en) * | 2019-12-24 | 2020-05-01 | 珠海格力电器股份有限公司 | Device binding method, device, terminal device and network side device |
CN111882008A (en) * | 2020-07-13 | 2020-11-03 | 上汽大众汽车有限公司 | Method and system for binding vehicle with Internet of vehicles account |
CN111860727A (en) * | 2020-07-30 | 2020-10-30 | 深圳前海微众银行股份有限公司 | Two-dimensional code generation method, verification method, device and computer-readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN114040411A (en) | 2022-02-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1996834B (en) | Method and apparatus for acquiring domain information and domain-related data | |
CN105184931A (en) | Bluetooth-based unlocking method, system and hand-held terminal and Bluetooth-based electronic lock | |
CN112398824B (en) | Authority verification method, storage medium and electronic equipment | |
CN114040411B (en) | Equipment binding method and device, electronic equipment and storage medium | |
CN104104650B (en) | data file access method and terminal device | |
CN105765941A (en) | Illegal access server prevention method and device | |
CN113381984A (en) | Data processing method, device and system, electronic equipment and storage medium | |
CN106453410A (en) | Data transmission method and data transmission apparatus | |
CN112819454B (en) | Payment method, gateway device, server and storage medium | |
CN110266653B (en) | Authentication method, system and terminal equipment | |
CN104219626A (en) | Identity authentication method and device | |
CN109858235B (en) | Portable equipment and password obtaining method and device thereof | |
CN113642239B (en) | Federal learning modeling method and system | |
CN107248910A (en) | Method for security protection and equipment | |
CN103559430B (en) | application account management method and device based on Android system | |
CN114095277A (en) | Power distribution network secure communication method, secure access device and readable storage medium | |
CN112650954B (en) | Block chain data sharing method, device, equipment and storage medium | |
CN113761498A (en) | Third party login information hosting method, system, equipment and storage medium | |
CN114866247B (en) | Communication method, device, system, terminal and server | |
CN112702743B (en) | Network data monitoring and protecting method based on artificial intelligence | |
CN110545263B (en) | Decryption method, encryption method, terminal device, server and readable storage medium | |
CN114979170A (en) | Intelligent spectrum sharing system, method and device, electronic equipment and storage medium | |
CN108769989B (en) | Wireless network connection method, wireless access device and equipment | |
CN103905390B (en) | Permission acquisition method, device, electronic equipment and system | |
CN111859351A (en) | Method, system, server and storage medium for writing information into chip |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |