Movatterモバイル変換


[0]ホーム

URL:


CN108023875A - Equipment authorization method and system - Google Patents

Equipment authorization method and system
Download PDF

Info

Publication number
CN108023875A
CN108023875ACN201711139721.0ACN201711139721ACN108023875ACN 108023875 ACN108023875 ACN 108023875ACN 201711139721 ACN201711139721 ACN 201711139721ACN 108023875 ACN108023875 ACN 108023875A
Authority
CN
China
Prior art keywords
access point
identity information
information
signal strength
point device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711139721.0A
Other languages
Chinese (zh)
Inventor
徐章龙
梁军
杨莲科
高平东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Xicoo Medical Technology Co ltd
Guangzhou Shiyuan Electronics Thecnology Co Ltd
Original Assignee
Guangzhou Xicoo Medical Technology Co ltd
Guangzhou Shiyuan Electronics Thecnology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Xicoo Medical Technology Co ltd, Guangzhou Shiyuan Electronics Thecnology Co LtdfiledCriticalGuangzhou Xicoo Medical Technology Co ltd
Priority to CN201711139721.0ApriorityCriticalpatent/CN108023875A/en
Publication of CN108023875ApublicationCriticalpatent/CN108023875A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

Translated fromChinese

本发明涉及一种设备授权方法及系统,其中该方法包括:接收来自受限设备的授权请求,授权请求中包括验证信息,验证信息包括受限设备搜索到的接入点设备的当前身份信息和信号强度信息;接入点设备的身份信息为动态生成的身份信息,该动态生成的身份信息仅在一定时段内有效;判断接收到的接入点设备的当前身份信息与受限设备搜索到接入点设备时对应的时段内的接入点设备的身份信息是否一致,以及判断接收到的所述接入点设备的信号强度信息是否大于与所述接入点设备对应的预设的信号强度阈值,当均为是时,向受限设备发送授权通知。本发明实施例通过动态生成接入点设备的身份信息,并结合服务器验证的方式,提高了设备授权的安全性,并且操作简单。

The present invention relates to a device authorization method and system, wherein the method includes: receiving an authorization request from a restricted device, the authorization request includes verification information, and the verification information includes the current identity information of the access point device searched by the restricted device and Signal strength information; the identity information of the access point device is dynamically generated identity information, and the dynamically generated identity information is only valid within a certain period of time; judging the received current identity information of the access point device Whether the identity information of the access point device in the period corresponding to the access point device is consistent, and judging whether the received signal strength information of the access point device is greater than the preset signal strength corresponding to the access point device Threshold, when both are yes, send authorization notifications to restricted devices. The embodiment of the present invention improves the security of device authorization by dynamically generating the identity information of the access point device and combining with the server verification method, and the operation is simple.

Description

Translated fromChinese
一种设备授权方法及系统A device authorization method and system

技术领域technical field

本发明属于通信技术领域,具体涉及一种设备授权方法及系统。The invention belongs to the technical field of communications, and in particular relates to a device authorization method and system.

背景技术Background technique

出于人身安全、设备安全、信息安全等方面的考虑,手持终端在访问或使用某些设备或某些APP之前,需要先获得对该设备或该APP的授权。目前手持终端获得授权的方式主要有以下两种:第一种方式是通过账号和密码,第二种方式是通过已授权的ID信息。In consideration of personal safety, device safety, information security, etc., before accessing or using certain devices or certain APPs, handheld terminals need to obtain authorization for the device or the APP. At present, there are mainly two ways for the handheld terminal to obtain authorization: the first way is through the account number and password, and the second way is through the authorized ID information.

第一种授权方式,一般需要使用者事先在服务器上注册账号,并设置好相应的密码,在使用时,在手持终端上通过按键或者触控屏等输入设备,输入已注册的账号和相应的密码,在输入的账号和密码被服务器验证通过后,手持终端才获得授权。这种授权方式由于需要事先注册账号和设置密码,并且使用时,需要在手持终端上,手动输入账号和密码信息,导致整个操作较为繁琐,且容易出现输入错误,长时间不使用,很容易遗忘账号或密码。另外,如果手持终端不具备按键或者触控屏等输入设备,则该手持终端需要借助额外的输入设备才能进行输入操作。The first authorization method generally requires the user to register an account on the server in advance and set a corresponding password. Password, the handheld terminal is authorized only after the input account and password are verified by the server. This authorization method needs to register an account number and set a password in advance, and when using it, it is necessary to manually enter the account number and password information on the handheld terminal, which makes the entire operation more cumbersome and prone to input errors. It is easy to forget if it is not used for a long time account or password. In addition, if the handheld terminal does not have an input device such as a button or a touch screen, the handheld terminal needs an additional input device to perform an input operation.

第二种授权方式,通过已授权的ID信息受限设备,该已授权的ID信息例如已授权的使用者的工卡,可以有效解决第一种授权方式存在的操作繁琐和需要借助额外输入设备的技术问题。当手持终端需要访问或使用某设备或APP时,手持终端对已授权的ID信息进行扫描,扫描方式例如可以是通过在手持终端上安装扫描头扫描ID信息,或者手持终端通过近场通信技术获取ID信息,在该ID信息验证成功后,手持终端获得授权。这种授权方式简单,但安全性较低,一旦ID信息被他人获取,他人就可以通过该ID信息受限设备,导致这种授权方式存在明显的安全隐患。The second authorization method, through the authorized ID information restricted device, the authorized ID information such as the authorized user's ID card, can effectively solve the cumbersome operation and the need for additional input devices in the first authorization method technical problems. When the handheld terminal needs to access or use a certain device or APP, the handheld terminal scans the authorized ID information. The scanning method can be, for example, by installing a scanning head on the handheld terminal to scan the ID information, or the handheld terminal obtains the ID information through near-field communication technology. ID information, after the ID information is successfully verified, the handheld terminal is authorized. This authorization method is simple, but the security is low. Once the ID information is obtained by others, others can use the device with restricted ID information, which leads to obvious security risks in this authorization method.

发明内容Contents of the invention

为了解决上述操作繁琐或者安全性较低的技术问题,本发明实施例提出了一种设备授权方法及系统。In order to solve the above-mentioned technical problems of cumbersome operations or low security, an embodiment of the present invention proposes a device authorization method and system.

一种设备授权方法,该方法包括以下步骤:A device authorization method, the method includes the following steps:

步骤S101、接收来自受限设备的授权请求,所述授权请求中包括验证信息,所述验证信息包括受限设备搜索到的接入点设备的当前身份信息和信号强度信息;Step S101. Receive an authorization request from the restricted device, the authorization request includes verification information, and the verification information includes the current identity information and signal strength information of the access point device searched by the restricted device;

其中,所述接入点设备的身份信息为动态生成的身份信息,该动态生成的身份信息仅在一定时段内有效,所述受限设备搜索到接入点设备时获取到的所述接入点设备的身份信息为所述接入点设备的当前身份信息;Wherein, the identity information of the access point device is dynamically generated identity information, and the dynamically generated identity information is only valid within a certain period of time, and the access point information obtained when the restricted device searches for the access point device The identity information of the point device is the current identity information of the access point device;

步骤S102、判断接收到的所述接入点设备的当前身份信息与所述受限设备搜索到接入点设备时对应的时段内的所述接入点设备的身份信息是否一致,以及判断接收到的所述接入点设备的信号强度信息是否大于预设的信号强度阈值,如果接收到的所述接入点设备的身份信息与所述时段内的所述接入点设备的身份信息一致,并且接收到的所述接入点设备的信号强度信息大于预设的信号强度阈值,则向受限设备发送授权通知。Step S102, judging whether the received current identity information of the access point device is consistent with the identity information of the access point device in the period corresponding to when the restricted device searches for the access point device, and judging whether the received Whether the received signal strength information of the access point device is greater than a preset signal strength threshold, if the received identity information of the access point device is consistent with the identity information of the access point device within the time period , and the received signal strength information of the access point device is greater than a preset signal strength threshold, an authorization notification is sent to the restricted device.

进一步地,当本次授权中断或结束,如需再次向受限设备授权,则重新执行步骤S101。Further, when the current authorization is interrupted or ended, if it is necessary to authorize the restricted device again, step S101 is executed again.

进一步地,所述受限设备搜索到的接入点设备为多个时,对搜索到的每个接入点设备,执行步骤S102。Further, when there are multiple access point devices searched by the restricted device, step S102 is executed for each searched access point device.

进一步地,所述受限设备搜索到的接入点设备为多个时,从所述多个接入点设备中确定目标接入点设备,在步骤S102中,所述受限设备搜索到接入点设备时对应的时段内的所述接入点设备的身份信息为所述受限设备搜索到接入点设备时对应的时段内的所述目标接入点设备的身份信息,所述预设的信号强度阈值为与所述目标接入点设备相关的预设的信号强度阈值。Further, when there are multiple access point devices searched by the restricted device, the target access point device is determined from the plurality of access point devices, and in step S102, the restricted device searches for the access point device The identity information of the access point device in the time period corresponding to the access point device is the identity information of the target access point device in the time period corresponding to when the restricted device searches for the access point device, and the preset The set signal strength threshold is a preset signal strength threshold related to the target access point device.

进一步地,根据受限设备的受限设备身份信息从所述多个接入点设备中确定目标接入点设备,所述受限设备的受限设备身份信息与所述目标接入点设备相关联;Further, determining a target access point device from the plurality of access point devices according to the restricted device identity information of the restricted device, where the restricted device identity information of the restricted device is related to the target access point device couplet;

在步骤S101中,所述接入点设备的当前身份信息和信号强度信息为所述目标接入点设备的当前身份信息和信号强度信息;或者,在步骤S101或步骤S102中,根据所述受限设备的受限设备身份信息,从所述多个接入点设备中确定所述目标接入点设备。In step S101, the current identity information and signal strength information of the access point device are the current identity information and signal strength information of the target access point device; or, in step S101 or step S102, according to the received The restricted device identity information of the restricted device is used to determine the target access point device from the plurality of access point devices.

进一步地,在步骤S101中,仅将信号强度超过门槛值的接入点设备所对应的当前身份信息和信号强度信息作为所述验证信息。Further, in step S101, only current identity information and signal strength information corresponding to access point devices whose signal strength exceeds a threshold value are used as the verification information.

一种设备授权系统,该系统包括:受限设备、接入点设备和服务器,其中,所述服务器与所述接入点设备通过有线或无线的方式连接,将动态生成的身份信息发送给所述接入点设备,所述动态生成的身份信息仅在一定时段内有效;A device authorization system, the system includes: a restricted device, an access point device, and a server, wherein the server is connected to the access point device in a wired or wireless manner, and sends dynamically generated identity information to the For the access point device, the dynamically generated identity information is only valid within a certain period of time;

所述受限设备与所述接入点设备通过有线或无线的方式连接,在所述受限设备搜索到所述接入点设备时,获取所述接入点设备的包括当前身份信息和信号强度信息的验证信息;The restricted device is connected to the access point device in a wired or wireless manner, and when the restricted device searches for the access point device, obtains the current identity information and signal information of the access point device Verification information for strength information;

所述受限设备还与所述服务器通过有线或无线的方式连接,所述受限设备将获取的所述验证信息包含在授权请求中,发送给所述服务器进行验证,所述服务器判断接收到的所述接入点设备的当前身份信息与所述受限设备搜索到接入点设备时对应的时段内的所述接入点设备的身份信息是否一致,以及判断接收到的所述接入点设备的信号强度信息是否大于预设的信号强度阈值,如果接收到的所述接入点设备的身份信息与所述时段内的所述接入点设备的身份信息一致,并且接收到的所述接入点设备的信号强度信息大于预设的信号强度阈值,则向所述受限设备发送授权通知。The limited device is also connected to the server by wire or wirelessly, the limited device includes the obtained verification information in the authorization request, and sends it to the server for verification, and the server judges that the received Whether the current identity information of the access point device is consistent with the identity information of the access point device in the period corresponding to when the restricted device searches for the access point device, and judges whether the received access point device Whether the signal strength information of the point device is greater than the preset signal strength threshold, if the received identity information of the access point device is consistent with the identity information of the access point device within the time period, and the received If the signal strength information of the access point device is greater than the preset signal strength threshold, an authorization notification is sent to the restricted device.

进一步地,所述服务器实现如前任一项所述的设备授权方法。Further, the server implements the device authorization method described in any one of the preceding items.

进一步地,所述受限设备包括:控制单元和第一通信模块,所述第一通信模块与所述控制单元连接;所述第一通信模块包括能够与接入点设备通过有线或无线方式连接的第一通信子模块,还包括能够与所述服务器通过有线或无线方式连接的第二通信子模块;所述第一通信子模块在所述控制单元的控制下,搜索其工作范围内是否存在接入点设备,并在所述第一通信子模块搜索到所述接入点设备时,获取所述接入点设备的包括当前身份信息和信号强度信息的验证信息;所述第二通信子模块在所述控制单元的控制下,将获取的所述验证信息包含在授权请求中,发送给所述服务器进行验证,以及接收服务器返回的授权通知。Further, the limited device includes: a control unit and a first communication module, the first communication module is connected to the control unit; the first communication module includes a device capable of connecting with the access point device in a wired or wireless manner The first communication submodule also includes a second communication submodule that can be connected to the server in a wired or wireless manner; the first communication submodule is under the control of the control unit to search whether there is An access point device, and when the first communication submodule searches for the access point device, obtains the verification information of the access point device including current identity information and signal strength information; the second communication submodule Under the control of the control unit, the module includes the acquired verification information in the authorization request, sends it to the server for verification, and receives the authorization notification returned by the server.

进一步地,所述接入点设备包括第二通信模块,所述第二通信模块包括能够与受限设备通过有线或无线方式连接的第三通信子模块,还包括能够与所述服务器通过有线或无线方式连接的第四通信子模块;所述第三通信子模块在所述受限设备的所述第一通信子模块搜索所述接入点设备时,能够提供所述接入点设备的当前身份信息和信号强度信息;所述第四通信子模块能够接收所述服务器发送的动态生成的身份信息。Further, the access point device includes a second communication module, and the second communication module includes a third communication sub-module capable of connecting with the restricted device by wire or wirelessly, and also includes a third communication sub-module capable of connecting with the server by wire or wirelessly. A fourth communication submodule wirelessly connected; the third communication submodule can provide the current information of the access point device when the first communication submodule of the limited device searches for the access point device Identity information and signal strength information; the fourth communication submodule can receive the dynamically generated identity information sent by the server.

本发明的有益效果:本发明实施例提出的设备授权方法及系统,通过动态生成接入点设备的身份信息,并结合服务器验证的方式,提高了设备授权的安全性,并且操作简单。Beneficial effects of the present invention: The device authorization method and system proposed by the embodiments of the present invention improve the security of device authorization by dynamically generating the identity information of the access point device, combined with server verification, and are easy to operate.

附图说明Description of drawings

图1是本发明实施例提出的设备授权方法的流程图;FIG. 1 is a flowchart of a device authorization method proposed in an embodiment of the present invention;

图2是本发明实施例提出的设备授权系统的结构示意图;FIG. 2 is a schematic structural diagram of a device authorization system proposed by an embodiment of the present invention;

图3a是本发明实施例提出的设备授权系统动态生成身份信息的工作流程示意图;Fig. 3a is a schematic diagram of the workflow of dynamically generating identity information by the device authorization system proposed by the embodiment of the present invention;

图3b是本发明实施例提出的设备授权系统中受限设备被授权的工作流程示意图。Fig. 3b is a schematic diagram of a work flow for a limited device to be authorized in the device authorization system proposed by an embodiment of the present invention.

具体实施方式Detailed ways

为使本发明的目的、技术方案和优点更加清楚明白,以下结合具体实施例,并参照附图,对本发明进一步详细说明。但本领域技术人员知晓,本发明并不局限于附图和以下实施例。In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings. However, those skilled in the art know that the present invention is not limited to the drawings and the following embodiments.

本发明实施例提出了一种设备授权方法,如图1所示,该方法包括以下步骤:The embodiment of the present invention proposes a device authorization method, as shown in Figure 1, the method includes the following steps:

步骤S101、接收来自受限设备的授权请求,所述授权请求中包括验证信息,所述验证信息包括受限设备搜索到的接入点设备的当前身份信息和信号强度信息。其中,所述接入点设备的身份信息为动态生成的身份信息,该身份信息仅在一定时段内有效,所述受限设备搜索到接入点设备时获取到的所述接入点设备的身份信息为所述接入点设备的当前身份信息。所述时段可以是固定值,也可以根据实际情况进行调整。Step S101 , receiving an authorization request from a restricted device, where the authorization request includes verification information, and the verification information includes current identity information and signal strength information of an access point device searched by the restricted device. Wherein, the identity information of the access point device is dynamically generated identity information, the identity information is only valid within a certain period of time, and the access point device obtained when the restricted device searches for the access point device The identity information is the current identity information of the access point device. The period of time may be a fixed value, or may be adjusted according to actual conditions.

所述受限设备可以是普通的手持设备,例如移动电话、手持PDA等,也可以是在特殊场合使用的设备,例如手持体征设备等。The restricted device may be a common handheld device, such as a mobile phone, a handheld PDA, etc., or a device used in a special occasion, such as a handheld sign device.

所述接入点设备可以是蓝牙设备、WiFi设备或者其他具备通信功能的设备(例如ZigBee设备)。当该接入点设备为WiFi设备时,该接入点设备的身份信息为SSID(ServiceSet Identifier,服务集标识);当该接入点设备为蓝牙设备时,该接入点设备的身份信息为蓝牙设备名。所述接入点设备优选固定放置在特定的位置,防止无关人等随意接触,确保该接入点设备不会丢失,并且保证接入点设备内部数据(例如身份信息)的安全。The access point device may be a Bluetooth device, a WiFi device, or other devices with communication functions (such as ZigBee devices). When the access point device is a WiFi device, the identity information of the access point device is SSID (ServiceSet Identifier, service set identifier); when the access point device is a Bluetooth device, the identity information of the access point device is Bluetooth device name. The access point device is preferably fixed at a specific location to prevent random access by unrelated persons, ensure that the access point device will not be lost, and ensure the security of internal data (such as identity information) of the access point device.

步骤S102、判断接收到的所述接入点设备的当前身份信息与所述受限设备搜索到接入点设备时对应的时段内的所述接入点设备的身份信息是否一致,以及判断接收到的所述接入点设备的信号强度信息是否大于预设的信号强度阈值,如果接收到的所述接入点设备的身份信息与所述时段内的所述接入点设备的身份信息一致,并且接收到的所述接入点设备的信号强度信息大于预设的信号强度阈值,则向受限设备发送授权通知。Step S102, judging whether the received current identity information of the access point device is consistent with the identity information of the access point device in the period corresponding to when the restricted device searches for the access point device, and judging whether the received Whether the received signal strength information of the access point device is greater than a preset signal strength threshold, if the received identity information of the access point device is consistent with the identity information of the access point device within the time period , and the received signal strength information of the access point device is greater than a preset signal strength threshold, an authorization notification is sent to the restricted device.

所述预设的信号强度阈值可以为固定值,也可以为可变值,例如预设的信号强度阈值大小与所述接入点设备能够提供的信号强度有关。The preset signal strength threshold may be a fixed value or a variable value, for example, the preset signal strength threshold is related to the signal strength that the access point device can provide.

所述受限设备接收到所述授权通知,即可访问或使用相应的设备或APP。The restricted device can access or use the corresponding device or APP after receiving the authorization notification.

进一步地,当本次授权中断或结束,例如受限设备退出访问或使用设备或APP,或者经过预设的授权时长后,如需再次访问或使用设备或APP,则重新执行步骤S101。所述预设的授权时长可以是对所有受限设备统一设定的值,也可以是根据受限设备的使用权限单独设定的值,例如受限设备的使用权限高,预设的授权时长相对比较长;受限设备的使用权限低,预设的授权时长相对较短。Further, when the current authorization is interrupted or ended, for example, the restricted device withdraws from accessing or using the device or APP, or after a preset authorization period, if it is necessary to access or use the device or APP again, step S101 is executed again. The preset authorization period can be a value set uniformly for all restricted devices, or a value set separately according to the use authority of the restricted device. For example, the use authority of the restricted device is high, and the preset authorization period Relatively long; restricted devices have low usage rights, and the preset authorization time is relatively short.

进一步地,如果所述受限设备搜索到的接入点设备为多个时,对搜索到的每个接入点设备,执行步骤S102。通过这种方式,受限设备收到的授权通知中除了包含预期的授权通知之外,可能还包含其他非预期的授权通知,但这并不影响受限设备获得期望的授权。此时所述预设的信号强度阈值可以对每个接入点设备采用统一的预设值,也可以根据接入点设备的不同,采用与各个接入点设备对应的预设值。Further, if there are multiple access point devices searched by the restricted device, step S102 is executed for each searched access point device. In this manner, the authorization notification received by the restricted device may include other unexpected authorization notifications in addition to the expected authorization notification, but this does not affect the restricted device from obtaining the desired authorization. At this time, the preset signal strength threshold may adopt a unified preset value for each AP device, or may use a preset value corresponding to each AP device according to different AP devices.

进一步地,如果所述受限设备搜索到的接入点设备为多个时,从所述多个接入点设备中确定目标接入点设备,在步骤S102中,所述受限设备搜索到接入点设备时对应的时段内的所述接入点设备的身份信息为所述受限设备搜索到接入点设备时对应的时段内的所述目标接入点设备的身份信息,所述预设的信号强度阈值为与所述目标接入点设备相关的预设的信号强度阈值。Further, if there are multiple access point devices searched by the restricted device, determine the target access point device from the plurality of access point devices, and in step S102, the restricted device searches for The identity information of the access point device in the period corresponding to the access point device is the identity information of the target access point device in the period corresponding to when the restricted device searches for the access point device, the The preset signal strength threshold is a preset signal strength threshold related to the target access point device.

优选地,所述从所述多个接入点设备中确定目标接入点设备的方法可以根据受限设备的受限设备身份信息来确定目标接入点设备,其中,受限设备的受限设备身份信息与目标接入点设备相关。所述确定操作可以由受限设备执行,这样在步骤S101中,所述接入点设备的当前身份信息和信号强度信息为所述目标接入点设备的当前身份信息和信号强度信息。所述确定操作也可以在步骤S101或步骤S102中执行,执行时,事先接收所述受限设备的受限设备身份信息,根据接收到的所述受限设备的受限设备身份信息,从所述多个接入点设备中确定所述目标接入点设备,这样在步骤S102中,只需要判断目标接入点设备的相关信息是否满足要求,就可以完成本次授权,节约了运行资源。Preferably, the method for determining the target AP device from the plurality of AP devices may determine the target AP device according to the restricted device identity information of the restricted device, wherein the restricted device's restricted The device identity information is related to the target access point device. The determining operation may be performed by the limited device, so in step S101, the current identity information and signal strength information of the access point device are the current identity information and signal strength information of the target access point device. The determining operation may also be performed in step S101 or step S102. During execution, the restricted device identity information of the restricted device is received in advance, and according to the received restricted device identity information of the restricted device, the The target AP device is determined among the plurality of AP devices, so that in step S102, the authorization can be completed only by judging whether the relevant information of the target AP device meets the requirements, which saves operating resources.

所述受限设备身份信息可以是与目标接入点设备相关的以二维码、条形码或RFID标签等形式表示的唯一身份码,也可以是受限设备的MAC地址,当所述受限设备身份信息是与目标接入点设备相关的以二维码、条形码或RFID标签等形式表示的唯一身份码时,受限设备可以通过扫描的方式获得所述受限设备身份信息。The restricted device identity information may be a unique identity code expressed in the form of a two-dimensional code, a barcode, or an RFID tag related to the target access point device, or it may be the MAC address of the restricted device. When the restricted device When the identity information is a unique identity code related to the target access point device in the form of a two-dimensional code, a barcode, or an RFID tag, the restricted device can obtain the restricted device identity information by scanning.

更进一步地,为了提高工作效率,在步骤S101中,仅将信号强度超过门槛值的接入点设备所对应的当前身份信息和信号强度信息作为所述验证信息,这样可以有效排除明显不是目标接入点设备的接入点设备。Furthermore, in order to improve work efficiency, in step S101, only the current identity information and signal strength information corresponding to the access point device whose signal strength exceeds the threshold is used as the verification information, which can effectively exclude The access point device for the entry point device.

本发明实施例还提出了一种设备授权系统,如图2所示,该系统包括:受限设备、接入点设备和服务器,其中,所述服务器与所述接入点设备通过有线或无线的方式连接,将动态生成的身份信息发送给所述接入点设备,所述动态生成的身份信息仅在一定时段内有效;所述受限设备与所述接入点设备通过有线或无线的方式连接,在所述受限设备搜索到所述接入点设备时,获取所述接入点设备的包括当前身份信息和信号强度信息的验证信息;所述受限设备还与所述服务器通过有线或无线的方式连接,所述受限设备将获取的所述验证信息包含在授权请求中,发送给所述服务器进行验证,所述服务器判断接收到的所述接入点设备的当前身份信息与所述受限设备搜索到接入点设备时对应的时段内的所述接入点设备的身份信息是否一致,以及判断接收到的所述接入点设备的信号强度信息是否大于预设的信号强度阈值,如果接收到的所述接入点设备的身份信息与所述时段内的所述接入点设备的身份信息一致,并且接收到的所述接入点设备的信号强度信息大于预设的信号强度阈值,则向所述受限设备发送授权通知。The embodiment of the present invention also proposes a device authorization system. As shown in FIG. 2 , the system includes: a restricted device, an access point device, and a server, wherein the server and the access point device are wired or wirelessly connected in a certain way, and the dynamically generated identity information is sent to the access point device, and the dynamically generated identity information is only valid within a certain period of time; the restricted device and the access point device are connected via wired or wireless When the restricted device searches for the access point device, it obtains the verification information of the access point device including current identity information and signal strength information; the restricted device also communicates with the server through connected in a wired or wireless manner, the restricted device includes the acquired verification information in an authorization request and sends it to the server for verification, and the server judges the received current identity information of the access point device Whether the identity information of the access point device in the period corresponding to when the restricted device searches for the access point device is consistent, and judging whether the received signal strength information of the access point device is greater than a preset Signal strength threshold, if the received identity information of the access point device is consistent with the identity information of the access point device within the time period, and the received signal strength information of the access point device is greater than the preset If the signal strength threshold is set, an authorization notification is sent to the restricted device.

所述受限设备包括:控制单元和第一通信模块,所述控制单元与所述第一通信模块连接。The limited device includes: a control unit and a first communication module, and the control unit is connected to the first communication module.

所述控制单元用于对所述第一通信模块进行控制。The control unit is used to control the first communication module.

所述第一通信模块用于在所述控制单元的控制下,搜索其工作范围内是否存在接入点设备,在搜索到接入点设备时,获取该接入点设备的所述验证信息,将接入点设备的验证信息发送给服务器,并在接收到服务器返回的授权通知后,所述受限设备被授权,即可访问或使用相应的设备或APP。所述验证信息包括所述第一通信模块搜索到的接入点设备的当前身份信息和所述第一通信模块搜索到的接入点设备的信号强度信息。The first communication module is configured to search whether there is an access point device within its working range under the control of the control unit, and obtain the verification information of the access point device when the access point device is found, Send the verification information of the access point device to the server, and after receiving the authorization notification returned by the server, the restricted device is authorized, and can access or use the corresponding device or APP. The verification information includes current identity information of the access point device searched by the first communication module and signal strength information of the access point device searched by the first communication module.

所述第一通信模块包括能够与接入点设备通过有线或无线方式连接的第一通信子模块,还包括能够与所述服务器通过有线或无线方式连接的第二通信子模块;所述第一通信子模块在所述控制单元的控制下,搜索其工作范围内是否存在接入点设备,并在所述第一通信子模块搜索到所述接入点设备时,获取所述接入点设备的包括当前身份信息和信号强度信息的验证信息;所述第二通信子模块在所述控制单元的控制下,将获取的所述验证信息包含在授权请求中,发送给所述服务器进行验证,以及接收服务器返回的授权通知。The first communication module includes a first communication submodule that can be connected to the access point device in a wired or wireless manner, and also includes a second communication submodule that can be connected to the server in a wired or wireless manner; the first Under the control of the control unit, the communication submodule searches whether there is an access point device within its working range, and obtains the access point device when the first communication submodule searches for the access point device Verification information including current identity information and signal strength information; under the control of the control unit, the second communication submodule includes the obtained verification information in an authorization request and sends it to the server for verification, And receive the authorization notification returned by the server.

所述第一通信子模块和所述第二通信子模块的类型可以采用现有的通信模块类型,只要能实现与相关设备(例如接入点设备、服务器)的正常通信即可。The types of the first communication sub-module and the second communication sub-module can adopt the type of existing communication modules, as long as they can realize normal communication with related devices (such as access point devices, servers).

其中,所述接入点设备的身份信息为动态生成的身份信息,该身份信息仅在一定时段内有效,所述受限设备搜索到接入点设备时获取到的所述接入点设备的身份信息为所述接入点设备的当前身份信息。Wherein, the identity information of the access point device is dynamically generated identity information, the identity information is only valid within a certain period of time, and the access point device obtained when the restricted device searches for the access point device The identity information is the current identity information of the access point device.

所述受限设备可以是普通的手持设备,例如移动电话、手持PDA等,也可以是在特殊场合使用的设备,例如手持体征设备等。The restricted device may be a common handheld device, such as a mobile phone, a handheld PDA, etc., or a device used in a special occasion, such as a handheld sign device.

所述接入点设备包括第二通信模块,所述第二通信模块包括能够与受限设备通过有线或无线方式连接的第三通信子模块,还包括能够与所述服务器通过有线或无线方式连接的第四通信子模块;所述第三通信子模块在所述受限设备的所述第一通信子模块搜索所述接入点设备时,能够提供所述接入点设备的当前身份信息和信号强度信息;所述第四通信子模块能够接收所述服务器发送的动态生成的身份信息。The access point device includes a second communication module, the second communication module includes a third communication sub-module capable of connecting with the limited device in a wired or wireless manner, and also includes a third communication submodule capable of connecting with the server in a wired or wireless manner. The fourth communication submodule; the third communication submodule can provide the current identity information and the current identity information of the access point device when the first communication submodule of the limited device searches for the access point device Signal strength information; the fourth communication submodule can receive the dynamically generated identity information sent by the server.

所述第四通信子模块最新获取的所述接入点设备的身份信息作为所述接入点设备的当前身份信息。The identity information of the access point device newly acquired by the fourth communication submodule is used as the current identity information of the access point device.

所述第三通信子模块和所述第四通信子模块的类型可以采用现有的通信模块类型,只要能实现与相关设备(例如受限设备、服务器)的正常通信即可。The types of the third communication sub-module and the fourth communication sub-module can adopt the type of existing communication modules, as long as they can realize normal communication with related devices (such as restricted devices, servers).

所述接入点设备可以是蓝牙设备、WiFi设备或者其他具备通信功能的设备(例如ZigBee设备)。当该接入点设备为WiFi设备时,该接入点设备的身份信息可以为SSID(Service Set Identifier,服务集标识);当该接入点设备为蓝牙设备时,该接入点设备的身份信息可以为蓝牙设备名。The access point device may be a Bluetooth device, a WiFi device, or other devices with communication functions (such as ZigBee devices). When the access point device is a WiFi device, the identity information of the access point device can be SSID (Service Set Identifier, service set identifier); when the access point device is a Bluetooth device, the identity information of the access point device The information may be a Bluetooth device name.

所述接入点设备优选固定放置在特定的位置,防止无关人等随意接触,确保该接入点设备不会丢失,并且保证接入点设备相关的数据(例如设备内部存储的身份信息、与接入点设备有关的受限设备的身份信息)的安全。The access point device is preferably fixedly placed at a specific location to prevent random access by unrelated people, ensure that the access point device will not be lost, and ensure that data related to the access point device (such as identity information stored inside the device, and The security of the identity information of the restricted device related to the access point device).

所述服务器包括:第三通信模块、计时器、存储器、身份信息产生器和身份验证模块,所述第三通信模块分别与所述身份验证模块和所述身份信息产生器连接,并且所述第三通信模块能够分别与所述受限设备的第一通信模块和所述接入点设备的第二通信模块建立连接;所述计时器与所述身份信息产生器连接;所述存储器分别与所述身份信息产生器和所述身份验证模块连接。The server includes: a third communication module, a timer, a memory, an identity information generator, and an identity verification module, the third communication module is respectively connected to the identity verification module and the identity information generator, and the third The three communication modules can respectively establish connections with the first communication module of the restricted device and the second communication module of the access point device; the timer is connected with the identity information generator; the memory is respectively connected with the said access point device. The identity information generator is connected to the identity verification module.

所述计时器用于在经过设定的更新时间间隔时,通知所述身份信息产生器为所述接入点设备生成新的身份信息。所述设定的更新时间间隔即为前面所述的时段。The timer is used to notify the identity information generator to generate new identity information for the access point device when a set update time interval passes. The set update time interval is the aforementioned time period.

所述身份信息产生器用于接收到所述计时器的通知后,为所述接入点设备生成一个新的身份信息。The identity information generator is configured to generate new identity information for the access point device after receiving the notification from the timer.

所述第三通信模块用于将所述身份信息产生器生成的新的身份信息发送给所述接入点设备的第二通信模块,并且接收所述第一通信模块在搜索到接入点设备并获取到接入点设备的验证信息时发送的接入点设备的验证信息。The third communication module is configured to send the new identity information generated by the identity information generator to the second communication module of the access point device, and receive the information obtained by the first communication module when the access point device is found. And the verification information of the access point device is sent when the verification information of the access point device is obtained.

所述第三通信模块可以根据通信方式的不同,包括一个或多个通信子模块,每个通信子模块的类型可以采用现有的通信模块类型,只要能实现与相关设备(例如受限设备、接入点设备)的正常通信即可。The third communication module can include one or more communication sub-modules according to different communication methods, and the type of each communication sub-module can adopt an existing communication module type, as long as it can realize communication with related equipment (such as limited equipment, access point device) for normal communication.

所述存储器中存储有身份信息列表和预设的信号强度阈值,所述身份信息列表中包括所述身份信息产生器已经产生的所述接入点设备的身份信息以及每个身份信息对应的有效时段;所述预设的信号强度阈值可以为固定值,也可以为可变值,例如预设的信号强度阈值大小与所述接入点设备能够提供的信号强度有关。An identity information list and a preset signal strength threshold are stored in the memory, and the identity information list includes the identity information of the access point device that has been generated by the identity information generator and the valid information corresponding to each identity information. Period; the preset signal strength threshold may be a fixed value or a variable value, for example, the preset signal strength threshold is related to the signal strength that the access point device can provide.

所述身份验证模块用于在所述第三通信模块接收到所述第一通信模块发送的所述接入点设备的验证信息时,从所述存储器中获取所述受限设备搜索到接入点设备时对应的时段内的所述接入点设备的身份信息和与所述接入点设备对应的预设的信号强度信息,并判断接收到的所述接入点设备的身份信息与从存储器中获取的所述接入点设备的身份信息是否一致,以及判断接收到的所述接入点设备的信号强度信息是否大于从存储器中获取的预设的信号强度阈值,如果接收到的所述接入点设备的身份信息与从存储器中获取的所述接入点设备的身份信息一致,并且接收到的所述接入点设备的信号强度信息大于从存储器中获取的预设的信号强度阈值,则所述身份验证模块通知所述第三通信模块向所述受限设备的所述第一通信模块发送授权通知。The identity verification module is configured to, when the third communication module receives the verification information of the access point device sent by the first communication module, obtain from the memory the access point searched by the restricted device The identity information of the access point device and the preset signal strength information corresponding to the access point device in the time period corresponding to the point device, and determine whether the received identity information of the access point device is consistent with the Whether the identity information of the access point device obtained in the memory is consistent, and judging whether the received signal strength information of the access point device is greater than the preset signal strength threshold obtained from the memory, if the received The identity information of the access point device is consistent with the identity information of the access point device obtained from the memory, and the received signal strength information of the access point device is greater than the preset signal strength obtained from the memory threshold, the identity verification module notifies the third communication module to send an authorization notification to the first communication module of the limited device.

所述受限设备接收到所述授权通知,即可访问或使用相应的设备或APP。The restricted device can access or use the corresponding device or APP after receiving the authorization notification.

进一步地,当本次授权中断或结束,例如受限设备退出访问或使用设备或APP,或者经过预设的授权时长后,如需再次访问或使用设备或APP,则需要重新授权。所述预设的授权时长可以是对所有受限设备统一设定的值,也可以是根据受限设备的使用权限单独设定的值,例如受限设备的使用权限高,预设的授权时长相对比较长;受限设备的使用权限低,预设的授权时长相对较短。Furthermore, when the current authorization is interrupted or ended, for example, the restricted device withdraws from accessing or using the device or APP, or after a preset authorization period, if it is necessary to access or use the device or APP again, re-authorization is required. The preset authorization period can be a value set uniformly for all restricted devices, or a value set separately according to the use authority of the restricted device. For example, the use authority of the restricted device is high, and the preset authorization period Relatively long; restricted devices have low usage rights, and the preset authorization time is relatively short.

进一步地,如果所述受限设备搜索到的接入点设备为多个时,服务器对搜索到的每个接入点设备,执行上述判断操作。通过这种方式,受限设备收到的授权通知中除了包含预期的授权通知之外,可能还包含其他非预期的授权通知,但这并不影响受限设备获得期望的授权。此时所述预设的信号强度阈值可以对每个接入点设备采用统一的预设值,也可以根据接入点设备的不同,采用与各个接入点设备对应的预设值。Further, if there are multiple access point devices searched by the restricted device, the server performs the above judgment operation for each searched access point device. In this manner, the authorization notification received by the restricted device may include other unexpected authorization notifications in addition to the expected authorization notification, but this does not affect the restricted device from obtaining the desired authorization. At this time, the preset signal strength threshold may adopt a unified preset value for each AP device, or may use a preset value corresponding to each AP device according to different AP devices.

进一步地,如果所述受限设备搜索到的接入点设备为多个时,从所述多个接入点设备中确定目标接入点设备,所述受限设备搜索到接入点设备时对应的时段内的所述接入点设备的身份信息为所述受限设备搜索到接入点设备时对应的时段内的所述目标接入点设备的身份信息,所述预设的信号强度阈值为与所述目标接入点设备相关的预设的信号强度阈值。Further, if there are multiple access point devices searched by the restricted device, determine the target access point device from the plurality of access point devices, and when the restricted device searches for the access point device The identity information of the access point device in the corresponding period is the identity information of the target access point device in the corresponding period when the restricted device searches for the access point device, and the preset signal strength The threshold is a preset signal strength threshold related to the target access point device.

优选地,所述从所述多个接入点设备中确定目标接入点设备的方法可以根据受限设备的受限设备身份信息来确定目标接入点设备,其中,受限设备的受限设备身份信息与目标接入点设备相关。所述确定操作可以由受限设备执行,受限设备发送给服务器的所述接入点设备的当前身份信息和信号强度信息为所述目标接入点设备的当前身份信息和信号强度信息。所述确定操作也可以由服务器执行,服务器执行时,事先接收所述受限设备的受限设备身份信息,根据接收到的所述受限设备的受限设备身份信息,从所述多个接入点设备中确定所述目标接入点设备,这样服务器只需要判断目标接入点设备的相关信息是否满足要求,就可以完成本次授权,节约了运行资源。Preferably, the method for determining the target AP device from the plurality of AP devices may determine the target AP device according to the restricted device identity information of the restricted device, wherein the restricted device's restricted The device identity information is related to the target access point device. The determining operation may be performed by the limited device, and the current identity information and signal strength information of the access point device sent by the limited device to the server is the current identity information and signal strength information of the target access point device. The determining operation may also be performed by a server. When the server executes, the restricted device identity information of the restricted device is received in advance, and according to the received restricted device identity information of the restricted device, the The target access point device is determined in the access point device, so that the server only needs to judge whether the relevant information of the target access point device meets the requirements, and then complete the authorization, which saves operating resources.

所述受限设备身份信息可以是与目标接入点设备相关的以二维码、条形码或RFID标签等形式表示的唯一身份码,也可以是受限设备的MAC地址,当所述受限设备身份信息是与目标接入点设备相关的以二维码、条形码或RFID标签等形式表示的唯一身份码时,受限设备可以通过扫描的方式获得所述受限设备身份信息。The restricted device identity information may be a unique identity code expressed in the form of a two-dimensional code, a barcode, or an RFID tag related to the target access point device, or it may be the MAC address of the restricted device. When the restricted device When the identity information is a unique identity code related to the target access point device in the form of a two-dimensional code, a barcode, or an RFID tag, the restricted device can obtain the restricted device identity information by scanning.

更进一步地,为了提高工作效率,受限设备仅将信号强度超过门槛值的接入点设备所对应的当前身份信息和信号强度信息作为所述验证信息,这样可以有效排除明显不是目标接入点设备的接入点设备。Furthermore, in order to improve work efficiency, the restricted device only uses the current identity information and signal strength information corresponding to the access point device whose signal strength exceeds the threshold as the verification information, which can effectively exclude access points that are obviously not the target The device's access point device.

下面结合图3a和图3b说明该设备授权系统的基本工作过程。The basic working process of the device authorization system will be described below with reference to Fig. 3a and Fig. 3b.

如图3a所示,所述服务器的所述计时器在经过设定的更新时间间隔时,通知所述服务器的所述身份信息产生器为所述接入点设备生成新的身份信息;所述身份信息产生器接收到所述计时器的通知后,为所述接入点设备生成一个新的身份信息,并和所述新的身份信息对应的有效时段一起存储在所述服务器的所述存储器的身份信息列表中;所述第三通信模块将所述身份信息产生器生成的所述接入点设备的新的身份信息发送给所述接入点设备的所述第二通信模块;As shown in FIG. 3a, the timer of the server notifies the identity information generator of the server to generate new identity information for the access point device when a set update time interval passes; the After receiving the notification from the timer, the identity information generator generates a new identity information for the access point device, and stores it in the memory of the server together with the validity period corresponding to the new identity information in the identity information list; the third communication module sends the new identity information of the access point device generated by the identity information generator to the second communication module of the access point device;

所述接入点设备的所述第二通信模块从所述服务器的所述第三通信模块接收所述接入点设备的新的身份信息,所述第二通信模块最新获取到的所述接入点设备的身份信息作为所述接入点设备的当前身份信息。The second communication module of the access point device receives new identity information of the access point device from the third communication module of the server, and the access point information newly acquired by the second communication module The identity information of the access point device is used as the current identity information of the access point device.

所述受限设备需要授权时,如图3b所示,所述受限设备的所述第一通信模块在所述控制单元的控制下,搜索其工作范围内是否存在接入点设备,在搜索到接入点设备时,从所述接入点设备的所述第二通信模块获取该接入点设备的当前身份信息和信号强度信息;所述第一通信模块在控制单元的控制下,将所述接入点设备的验证信息发送给服务器的第三通信模块;When the restricted device needs authorization, as shown in FIG. 3b, the first communication module of the restricted device searches whether there is an access point device within its working range under the control of the control unit. When arriving at the access point device, obtain the current identity information and signal strength information of the access point device from the second communication module of the access point device; the first communication module, under the control of the control unit, will Sending the verification information of the access point device to the third communication module of the server;

所述服务器的所述第三通信模块接收到所述接入点设备的验证信息时,所述身份验证模块从所述存储器中获取所述受限设备搜索到接入点设备时对应的时段内的所述接入点设备的身份信息和预设的信号强度信息,并判断接收到的所述接入点设备的身份信息与从存储器中获取的所述接入点设备的身份信息是否一致,以及判断接收到的所述接入点设备的信号强度信息是否大于从存储器中获取的预设的信号强度阈值,如果接收到的所述接入点设备的身份信息与从存储器中获取的所述接入点设备的身份信息一致,并且接收到的所述接入点设备的信号强度信息大于从存储器中获取的预设的信号强度阈值,则所述身份验证模块通知所述第三通信模块向所述受限设备的所述第一通信模块发送授权通知;When the third communication module of the server receives the verification information of the access point device, the identity verification module obtains from the memory the time period corresponding to when the restricted device searches for the access point device. The identity information of the access point device and the preset signal strength information, and determine whether the received identity information of the access point device is consistent with the identity information of the access point device obtained from the memory, and judging whether the received signal strength information of the access point device is greater than a preset signal strength threshold obtained from a memory, if the received identity information of the access point device is different from the The identity information of the access point device is consistent, and the received signal strength information of the access point device is greater than the preset signal strength threshold obtained from the memory, then the identity verification module notifies the third communication module to The first communication module of the restricted device sends an authorization notification;

所述受限设备接收到所述授权通知,即可访问或使用相应的设备或APP。The restricted device can access or use the corresponding device or APP after receiving the authorization notification.

本领域技术人员可以理解,在流程图中表示或在此以其他方式描述的逻辑和/或步骤,例如,可以被认为是用于实现逻辑功能的可执行指令的定序列表,可以具体实现在任何计算机可读介质中,以供指令执行系统、装置或设备(如基于计算机的系统、包括处理器的系统或其他可以从指令执行系统、装置或设备取指令并执行指令的系统)使用,或结合这些指令执行系统、装置或设备而使用。就本说明书而言,“计算机可读介质”可以是任何可以包含、存储、通信、传播或传输程序以供指令执行系统、装置或设备或结合这些指令执行系统、装置或设备而使用的装置。Those skilled in the art will understand that the logic and/or steps shown in the flowchart or otherwise described herein, for example, can be considered as a sequenced list of executable instructions for implementing logical functions, which can be specifically implemented in on any computer-readable medium for use by an instruction execution system, apparatus, or device (such as a computer-based system, a system including a processor, or other system that can fetch instructions from an instruction execution system, apparatus, or device and execute them), or Used in conjunction with these instruction execution systems, devices or equipment. For the purposes of this specification, a "computer-readable medium" may be any device that can contain, store, communicate, propagate or transmit a program for use in or in conjunction with an instruction execution system, device or device.

计算机可读介质的更具体的示例(非穷尽性列表)包括以下:具有一个或多个布线的电连接部(电子装置),便携式计算机盘盒(磁装置),随机存取存储器(RAM),只读存储器(ROM),可擦除可编辑只读存储器(EPROM或闪速存储器),光纤装置,以及便携式光盘只读存储器(CDROM)。另外,计算机可读介质甚至可以是可在其上打印所述程序的纸或其他合适的介质,因为可以例如通过对纸或其他介质进行光学扫描,接着进行编辑、解译或必要时以其他合适方式进行处理来以电子方式获得所述程序,然后将其存储在计算机存储器中。More specific examples (non-exhaustive list) of computer-readable media include the following: electrical connection with one or more wires (electronic device), portable computer disk case (magnetic device), random access memory (RAM), Read Only Memory (ROM), Erasable and Editable Read Only Memory (EPROM or Flash Memory), Fiber Optic Devices, and Portable Compact Disc Read Only Memory (CDROM). In addition, the computer-readable medium may even be paper or other suitable medium on which the program can be printed, since the program can be read, for example, by optically scanning the paper or other medium, followed by editing, interpretation or other suitable processing if necessary. The program is processed electronically and stored in computer memory.

应当理解,本发明的各部分可以用硬件、软件、固件或它们的组合来实现。在上述实施方式中,多个步骤或方法可以用存储在存储器中且由合适的指令执行系统执行的软件或固件来实现。例如,如果用硬件来实现,和在另一实施方式中一样,可用本领域公知的下列技术中的任一项或它们的组合来实现:具有用于对数据信号实现逻辑功能的逻辑门电路的离散逻辑电路,具有合适的组合逻辑门电路的专用集成电路,可编程门阵列(PGA),现场可编程门阵列(FPGA)等。It should be understood that various parts of the present invention can be realized by hardware, software, firmware or their combination. In the embodiments described above, various steps or methods may be implemented by software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, it can be implemented by any one or combination of the following techniques known in the art: Discrete logic circuits, ASICs with suitable combinational logic gates, programmable gate arrays (PGAs), field programmable gate arrays (FPGAs), etc.

在本说明书的描述中,参考术语“一个实施例”、“一些实施例”、“示例”、“具体示例”、或“一些示例”等的描述意指结合该实施例或示例描述的具体特征、结构、材料或者特点包含于本发明的至少一个实施例或示例中。在本说明书中,对上述术语的示意性表述不一定指的是相同的实施例或示例。而且,描述的具体特征、结构、材料或者特点可以在任何的一个或多个实施例或示例中以合适的方式结合。In the description of this specification, descriptions referring to the terms "one embodiment", "some embodiments", "example", "specific examples", or "some examples" mean that specific features described in connection with the embodiment or example , structure, material or characteristic is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiment or example. Furthermore, the specific features, structures, materials or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.

以上,对本发明的实施方式进行了说明。但是,本发明不限定于上述实施方式。凡在本发明的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。The embodiments of the present invention have been described above. However, the present invention is not limited to the above-mentioned embodiments. Any modifications, equivalent replacements, improvements, etc. made within the spirit and principles of the present invention shall be included within the protection scope of the present invention.

Claims (10)

  1. The constrained devices are also connected with the server by wired or wireless mode, and the constrained devices are by the institute of acquisitionChecking information is stated included in authorization requests, the server is sent to and is verified, the server judges the institute receivedState the current identity information of access point apparatus and when the constrained devices search access point apparatus it is described in the corresponding periodWhether the identity information of access point apparatus is consistent, and judges whether is the signal strength information of described access point equipment that receivesMore than default signal strength threshold, if the identity information of the described access point equipment received with it is described in the periodThe identity information of access point apparatus is consistent, and the signal strength information of the described access point equipment received is more than default letterNumber intensity threshold, then send authorization notification to the constrained devices.
  2. 9. device authorization system according to claim 8, it is characterised in that the constrained devices include:Control unit andFirst communication module, the first communication module are connected with described control unit;The first communication module includes can be with connecingEnter point device by wired or wireless way connect first communication submodule, further include can pass through with the server it is wiredOr the second communication submodule of wireless mode connection;The first communication submodule is under the control of described control unit, searchIt whether there is access point apparatus in its working range, and when the described first communication sub-block searches are to described access point equipment,Obtain the checking information for including current identity information and signal strength information of described access point equipment;The second communication submoduleThe checking information of acquisition is included in authorization requests under the control of described control unit, is sent to the service by blockDevice is verified, and receives the authorization notification that server returns.
  3. 10. device authorization system according to claim 9, it is characterised in that described access point equipment includes the second communicationModule, the second communication module include the third communication submodule that can be connected with constrained devices by wired or wireless wayBlock, further includes the fourth communication submodule that can be connected with the server by wired or wireless way;The third communicationSubmodule is in the first communication sub-block searches described access point equipment of the constrained devices, using the teaching of the invention it is possible to provide the accessThe current identity information and signal strength information of point device;The fourth communication submodule can receive what the server was sentThe identity information of dynamic generation.
CN201711139721.0A2017-11-162017-11-16Equipment authorization method and systemPendingCN108023875A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201711139721.0ACN108023875A (en)2017-11-162017-11-16Equipment authorization method and system

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201711139721.0ACN108023875A (en)2017-11-162017-11-16Equipment authorization method and system

Publications (1)

Publication NumberPublication Date
CN108023875Atrue CN108023875A (en)2018-05-11

Family

ID=62080696

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201711139721.0APendingCN108023875A (en)2017-11-162017-11-16Equipment authorization method and system

Country Status (1)

CountryLink
CN (1)CN108023875A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN109768969A (en)*2018-12-202019-05-17深圳市元征科技股份有限公司Authority control method and internet-of-things terminal, electronic equipment
CN110972141A (en)*2019-12-042020-04-07迈普通信技术股份有限公司Information verification method and device, electronic equipment and readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101277185A (en)*2007-03-282008-10-01联想(北京)有限公司Authentication method, system based on wireless identification as well as wireless identification, server
US20130172077A1 (en)*2011-12-282013-07-04Amtran Technology Co., LtdSystem and method for resource sharing and playing device thereof
CN104066078A (en)*2013-03-212014-09-24中兴通讯股份有限公司Method and system for distributing equipment identifiers
CN104468582A (en)*2014-12-112015-03-25苏州海博智能系统有限公司User information certification authorization method and system
CN104660405A (en)*2013-11-212015-05-27中国移动通信集团公司Business equipment authentication method and equipment
CN104735657A (en)*2013-12-202015-06-24腾讯科技(深圳)有限公司Security terminal verification method, device and system and wireless access point binding method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101277185A (en)*2007-03-282008-10-01联想(北京)有限公司Authentication method, system based on wireless identification as well as wireless identification, server
US20130172077A1 (en)*2011-12-282013-07-04Amtran Technology Co., LtdSystem and method for resource sharing and playing device thereof
CN104066078A (en)*2013-03-212014-09-24中兴通讯股份有限公司Method and system for distributing equipment identifiers
CN104660405A (en)*2013-11-212015-05-27中国移动通信集团公司Business equipment authentication method and equipment
CN104735657A (en)*2013-12-202015-06-24腾讯科技(深圳)有限公司Security terminal verification method, device and system and wireless access point binding method
CN104468582A (en)*2014-12-112015-03-25苏州海博智能系统有限公司User information certification authorization method and system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN109768969A (en)*2018-12-202019-05-17深圳市元征科技股份有限公司Authority control method and internet-of-things terminal, electronic equipment
CN109768969B (en)*2018-12-202021-09-10深圳市元征科技股份有限公司Authority control method, Internet of things terminal and electronic equipment
CN110972141A (en)*2019-12-042020-04-07迈普通信技术股份有限公司Information verification method and device, electronic equipment and readable storage medium
CN110972141B (en)*2019-12-042022-02-22迈普通信技术股份有限公司Information verification method and device, electronic equipment and readable storage medium

Similar Documents

PublicationPublication DateTitle
US11310239B2 (en)Network connection method, hotspot terminal and management terminal
CN104540186B (en)Method, device and system for wireless network access
CN104581726B (en)A kind of authentication method and system
CN104967997B (en)A kind of Wi-Fi cut-in method, Wi-Fi equipment, terminal device and system
CN103338255B (en)Cross-terminal input method, device and system
US20160210632A1 (en)Secured payment method and relevant device and system
CN104735814A (en)Access method, system and related device for automatically getting access to WiFi network
US20200045613A1 (en)Identifying users via mobile hotspots
CN103634294A (en)Information verifying method and device
CN103716793A (en) Access point information sharing method and device
KR20150015422A (en)method and apparatus for connecting terminals and Access Point apparatus among plural of Access Point apparatus which are located on the same network
KR101808217B1 (en)Wireless access method and relevant device and system
CN104539571B (en)Information interacting method, identification authentication method, server and terminal
KR20120072557A (en)Mobile terminal, server and information providing method using the same
EP3675541A1 (en)Authentication method and device
CN106156915A (en)A kind of wireless Work attendance method, Apparatus and system
CN103957580A (en)Rapid WIFI networking matching method and module for smart hardware
US10951616B2 (en)Proximity-based device authentication
CN107659980A (en)A kind of WIFI hot spot connection method and mobile terminal based on mobile terminal
CN105306202A (en)Identity verification method and device, server
CN108023875A (en)Equipment authorization method and system
CN104079527A (en)Information processing method and electronic equipment
CN104640112A (en)Authentication method, device and system
CN108076460B (en) A method and terminal for authentication
US20190230103A1 (en)Method To Detect A Summoning Attack By A Rogue WiFi Access Point

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication

Application publication date:20180511

RJ01Rejection of invention patent application after publication

[8]ページ先頭

©2009-2025 Movatter.jp