CN113468506A - Method, device, equipment and storage medium for activating equipment - Google Patents
Method, device, equipment and storage medium for activating equipment Download PDFInfo
- Publication number
- CN113468506A CN113468506A CN202110738900.6A CN202110738900A CN113468506A CN 113468506 A CN113468506 A CN 113468506A CN 202110738900 A CN202110738900 A CN 202110738900A CN 113468506 A CN113468506 A CN 113468506A
- Authority
- CN
- China
- Prior art keywords
- identification information
- activated
- binding
- determining
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 230000003213 activating effect Effects 0.000 title claims abstract description 13
- 230000004913 activation Effects 0.000 claims abstract description 61
- 238000004891 communication Methods 0.000 claims abstract description 19
- 238000001514 detection method Methods 0.000 claims description 14
- 238000004590 computer program Methods 0.000 claims description 11
- 238000012790 confirmation Methods 0.000 claims description 4
- 238000004458 analytical method Methods 0.000 claims description 3
- 230000010365 information processing Effects 0.000 claims description 2
- 230000003993 interaction Effects 0.000 abstract description 32
- 238000013473 artificial intelligence Methods 0.000 abstract description 3
- 238000005516 engineering process Methods 0.000 abstract description 3
- 238000001994 activation Methods 0.000 description 49
- 230000008569 process Effects 0.000 description 12
- 230000006870 function Effects 0.000 description 9
- 238000012545 processing Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000003491 array Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000004397 blinking Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000001953 sensory effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/16—Sound input; Sound output
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Audiology, Speech & Language Pathology (AREA)
- General Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The disclosure relates to a method, a device, equipment and a storage medium for activating equipment, relates to the fields of artificial intelligence, communication technology and the like, and can be applied to voice interaction equipment with a screen. The specific implementation scheme is as follows: analyzing the received activation request to obtain the identification information of the object to be activated; under the condition that the identification information passes the authentication, acquiring a number allocated to an object to be activated; and binding the number with the object to be activated, and activating the number. A number can be allocated to the object to be activated, so that the object to be activated has a call function. Under the condition that the equipment to be activated is the screen voice interaction equipment, the screen voice interaction equipment can realize the conversation function, so that the application scene of the screen voice interaction equipment can be enriched.
Description
Technical Field
The utility model relates to the technical field of computers, especially, relate to fields such as artificial intelligence, communication technology, can be applied to area screen voice interaction equipment.
Background
The voice interaction equipment with the screen can support functions such as man-machine interaction, music playing or household appliance control, and therefore has a certain market share. In the related art, the voice interaction device with the screen does not have a call function with other intelligent devices (such as a mobile phone and a tablet computer), so that the application scene of the voice interaction device with the screen is restricted to a certain extent.
Disclosure of Invention
The present disclosure provides a method, apparatus, device, and storage medium for device activation.
According to an aspect of the present disclosure, there is provided a method of device activation, which may include the steps of:
analyzing the received activation request to obtain the identification information of the object to be activated;
under the condition that the identification information passes the authentication, acquiring a number allocated to an object to be activated;
and binding the number with the object to be activated, and activating the number.
According to another aspect of the present disclosure, there is provided an apparatus for device activation, which may include:
the activation request analysis module is used for analyzing the received activation request to obtain the identification information of the object to be activated;
the number acquisition module is used for acquiring the number allocated to the object to be activated under the condition that the identification information passes the authentication;
and the activation module is used for binding the number with the object to be activated and activating the number.
According to another aspect of the present disclosure, there is provided an electronic device including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a method according to any one of the embodiments of the present disclosure.
According to another aspect of the present disclosure, there is provided a non-transitory computer readable storage medium having stored thereon computer instructions for causing a computer to perform a method in any of the embodiments of the present disclosure.
According to another aspect of the present disclosure, a computer program product is provided, comprising a computer program which, when executed by a processor, implements the method in any of the embodiments of the present disclosure.
According to the technology disclosed by the invention, the number can be allocated to the object to be activated, so that the object to be activated has a call function. Under the condition that the equipment to be activated is the screen voice interaction equipment, the screen voice interaction equipment can realize the conversation function, so that the application scene of the screen voice interaction equipment can be enriched.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present disclosure, nor do they limit the scope of the present disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The drawings are included to provide a better understanding of the present solution and are not to be construed as limiting the present disclosure. Wherein:
FIG. 1 is a flow chart of a method of device activation according to the present disclosure;
FIG. 2 is a flow diagram of binding a number to an object to be activated in accordance with the present disclosure;
FIG. 3 is a first flowchart of performing a binding of a number with an object to be activated according to the present disclosure;
FIG. 4 is a flow chart two of performing a binding of a number with an object to be activated according to the present disclosure;
FIG. 5 is a first flowchart for determining that identification information has been authenticated according to the present disclosure;
FIG. 6 is a flow chart two of determining that identification information authentication has passed according to the present disclosure;
FIG. 7 is a schematic diagram of an apparatus activated by a device according to the present disclosure;
FIG. 8 is a block diagram of an electronic device for implementing the method of device activation of an embodiment of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure are described below with reference to the accompanying drawings, in which various details of the embodiments of the disclosure are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present disclosure. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
As shown in fig. 1, the present disclosure relates to a method of device activation, which may include the steps of:
s101: analyzing the received activation request to obtain the identification information of the object to be activated;
s102: under the condition that the identification information passes the authentication, acquiring a number allocated to an object to be activated;
s103: and binding the number with the object to be activated, and activating the number.
The execution main body of the above scheme of this disclosure can be the voice interaction equipment of taking the screen, also can be the equipment such as the server or high in the clouds of taking the voice interaction equipment of screen. Under the condition that the execution main body is a server or a cloud end of the voice interaction equipment with the screen, the server or the cloud end carries out information acquisition of the front end through the voice interaction equipment with the screen, and then interacts with the voice interaction equipment with the screen to realize activation of the equipment.
The following description will be given by taking an execution subject as a server (hereinafter, referred to as a server for short) of the voice interaction device with screen as an example. The user may send an activation request to the on-screen voice interaction device. And the voice interaction equipment with the screen forwards the activation request to the server.
The server analyzes the activation request to obtain the identification information of the object to be activated. The identification information may be used to characterize the object to be activated. Illustratively, taking the object to be activated as the voice interaction device with screen as an example, the identification information may be a Serial Number (SN).
In addition, the object to be activated may also include a plurality of devices at the same time. For example, a user purchases a plurality of devices such as a voice interaction device with a screen, a smart phone, and a tablet computer, and needs to activate the plurality of devices. In this case, the identification information may also characterize the user to which the activation request corresponds. For example, in the case of the user's third authorization, the facial image of the user's third may be collected, or the personal identification (e.g., user name, password) entered by the user's third may be collected.
The process of authenticating the identification information can be performed at the server side or at a third party. Illustratively, the third party may be a server or a cloud of the communication carrier, or the like. Authentication may include authenticating the product serial number to determine whether it is a legitimate product. Alternatively, the user identity may also be authenticated to determine whether the user identity is associated with the device to be activated.
In case the authentication passes, a number may be assigned to the object to be activated. The number may be a cell phone number. That is, the number may be sent to the server by a third party. The server binds the number with the object to be activated and places the number in an activated state.
The number activation process may include sending, by the server, a number activation request to a third party, the number state being set to active by the third party. Or, the third party may directly perform activation processing on the assigned number in the process of assigning the number.
Through the process, the number can be distributed to the object to be activated, so that the object to be activated has a conversation function. Under the condition that the equipment to be activated is the screen voice interaction equipment, the screen voice interaction equipment can realize the conversation function, so that the application scene of the screen voice interaction equipment can be enriched.
As shown in fig. 2, in an embodiment, the binding of the number and the object to be activated, which is involved in step S103, may include the following sub-steps:
s201: determining a corresponding binding strategy according to the attribute of the object to be activated; the attribute of the object to be activated comprises a user attribute or an equipment attribute;
s202: and executing the binding of the number and the object to be activated according to the binding strategy.
The attributes of the object to be activated may include user attributes or device attributes.
In the case that the attribute of the object to be activated is the device attribute, it may indicate that the device to be activated is a single device. Based on this, the binding policy may be to bind a number with a single device.
In the case that the attribute of the to-be-activated object is a user attribute, it may indicate that the to-be-activated device is a plurality of devices associated with the user, and based on this, the binding policy may be to bind the number with the plurality of devices. That is, a number is shared by a plurality of devices.
According to the binding policy, a corresponding binding procedure may be executed.
Through the above process, number binding activation of a single device can be realized, or number binding activation of multiple devices can be realized. Under the condition that the attribute of the object to be activated is the user attribute, a plurality of devices can be activated at one time, so that the activation efficiency is improved.
In one implementation, when the attribute of the object to be activated is the user attribute, determining that the corresponding binding policy is multi-device binding;
in this case, as shown in fig. 3, the step S202 may further include:
s301: utilizing the identification information to inquire at least one associated device matched with the identification information, and determining each inquired associated device as an object to be activated;
s302: and binding the number with each inquired associated device.
In a scenario that a user purchases a plurality of electronic products (the plurality of electronic products correspond to the devices to be activated), and the plurality of electronic products need to be activated simultaneously, the activation can be realized through the steps. That is, the activation request may include identification information of the user, for example, the identification information may be a username and password registered by the user in the electronic product server. Alternatively, the identification information may be information such as a face image, a fingerprint, a certificate, etc. of the user.
For example, Zhang III performs login operation in a first electronic product by using a user name and a password, and associates the first electronic product with the user name and the password; performing login operation in the second electronic product by using face recognition, and associating the second electronic product with the face image; and performing login operation in the third electronic product by utilizing fingerprint identification, and associating the third electronic product with the fingerprint. Then, the first electronic product, the second electronic product and the third electronic product may all be associated devices matched with the identification information.
In the case where the activation request includes identification information of the user, the activation willingness of the user may be characterized as activation of one or more devices. Based on the identification information of Zhang III of the user, three associated devices matched with the identification information of Zhang III of the user can be inquired. In the case where none of the three associated devices is activated, the three associated devices may be determined as the object to be activated.
Through the above process, under the condition that a plurality of associated devices are inquired, the number can be bound with each inquired associated device. Therefore, the activation of a plurality of objects to be activated can be carried out simultaneously by taking the user as a recognition basis.
In one implementation, when the attribute of the object to be activated is the device attribute, determining that the corresponding binding policy is single device binding;
in this case, as shown in fig. 4, the step S202 may further include:
s401: determining corresponding equipment by utilizing the identification information, and determining the equipment as an object to be activated;
s402: and binding the number with the corresponding equipment.
In the case that the identification information is a product serial number, the attribute corresponding to the object to be activated may be an equipment attribute. That is, the user's willingness to activate may be characterized as activating a single device. Based on the above, the device corresponding to the product serial number can be determined as the object to be activated. So that only the number is bound to a single object to be activated.
Through the above procedure, activation of only a single device can be performed at the time of activation.
As shown in fig. 5, in one embodiment, the step of determining that the identification information is authenticated involved in step S102 may include:
s501: encrypting the identification information and transmitting the encrypted identification information to an identification information auditing terminal;
s502: and determining that the identification information passes the authentication under the condition of receiving the authentication passing information sent by the identification information auditing terminal.
The process of authenticating the identification information can be carried out at the server side; or at a third party; alternatively, the server and the third party can interact through communication. Illustratively, the third party may be a server or a cloud of the communication carrier, or the like. The current embodiment may be a third party for the executing party of the authentication process of the identification information, that is, the third party may correspond to the identification information auditing terminal.
The server (with the screen voice interaction device) can encrypt the identification information and send the encrypted identification information to a third party under the condition of analyzing the received activation request to obtain the identification information of the object to be activated. The purpose of encryption is to protect the identification information so that it is not transmitted in the clear.
The third party may authenticate the identification information upon receipt of the identification information. For example, authentication of correctness of a user name and a password is included; or the identification information can be authenticated by interacting with the voice interaction equipment with the screen to acquire the dynamic image of the user, so that the user is authenticated in a living body authentication mode and the like.
In the case where the authentication is passed, authentication pass information may be transmitted to the server. Alternatively, in the case where the authentication is passed, the number assigned to the device to be activated may be determined in a random manner or in a manner in response to a user selection instruction in the number library, and the number may be transmitted to the server together with the authentication pass information.
And the server can determine that the identification information passes the authentication under the condition of receiving the authentication passing information.
Through the above process, in the case where the authentication process of the identification information is performed by a third party, the privacy of the identification information can be ensured by means of encrypted transmission.
As shown in fig. 6, in one embodiment, the step of determining that the identification information is authenticated involved in step S102 may include:
s601: calling an identity authentication interface, and authenticating the identification information by using the identity authentication interface; the identity authentication interface comprises a communication interface of the identification information auditing terminal;
s602: under the condition that the authentication is passed, carrying out living body detection on the user corresponding to the activation request by using the identity authentication interface;
s603: in the case where the living body detection passes, it is determined that the identification information authentication passes.
The present embodiment may be performed by a communication interaction for the server and the third party with respect to the executing party of the authentication process of the identification information. Illustratively, the server may initiate an identity authentication interface call request to a third party (the third party may correspond to the identification information auditing terminal) when analyzing the received activation request to obtain the identification information of the object to be activated. In case the interface call is successful, the authentication service may be started.
And under the condition that the server receives the information that the identity authentication passes, acquiring the dynamic image information of the user corresponding to the activation request through the permission of the user corresponding to the activation request. The allowable mode of the user corresponding to the activation request can be that a dynamic image acquisition option is displayed to the user corresponding to the activation request through the voice interaction equipment with the screen, and the dynamic image information of the user corresponding to the activation request is acquired under the condition that a user permission instruction is received.
And carrying out living body detection on the user corresponding to the activation request by using the identity authentication service. The liveness detection may include opening a mouth, blinking or turning a head, etc. By liveness detection, a determination of the identity of the user can be achieved.
And under the condition that both the identity authentication and the living body detection authentication pass, the identification information authentication can be determined to pass. I.e. a number may be assigned to the device to be activated.
Through the process, the identification information can be authenticated in a communication interaction mode between the server and a third party. Furthermore, due to the adoption of a double authentication mechanism, the authentication accuracy can be further improved so as to ensure the safety.
As shown in fig. 7, the present disclosure relates to an apparatus for device activation, which may include:
an activation request analysis module 701, configured to analyze the received activation request to obtain identification information of the object to be activated;
a number obtaining module 702, configured to obtain, when the identification information passes authentication, a number assigned to the object to be activated;
an activating module 703 is configured to bind the number with the object to be activated, and activate the number.
In one embodiment, the activation module 703 may further include:
the binding strategy determining submodule is used for determining a corresponding binding strategy according to the attribute of the object to be activated; the attribute of the object to be activated comprises a user attribute or an equipment attribute;
and the activation execution submodule is used for executing the binding of the number and the object to be activated according to the binding strategy.
In one implementation, when the attribute of the object to be activated is the user attribute, determining that the corresponding binding policy is multi-device binding;
activating an execution submodule, comprising:
the first to-be-activated object determining unit is used for inquiring at least one associated device matched with the identification information by using the identification information and determining each inquired associated device as an object to be activated;
and the first binding unit is used for binding the number with each inquired associated device.
In one implementation, when the attribute of the object to be activated is the device attribute, determining that the corresponding binding policy is single device binding;
activating an execution submodule, comprising:
the second to-be-activated object determining unit is used for determining corresponding equipment by using the identification information and determining the equipment as an to-be-activated object;
and the second binding unit is used for binding the number with the corresponding equipment.
In one embodiment, the number obtaining module 702 may further include:
the identification information processing submodule is used for encrypting the identification information and transmitting the encrypted identification information to the identification information auditing terminal;
and the authentication confirmation submodule is used for determining that the identification information passes the authentication under the condition of receiving the authentication passing information sent by the identification information auditing terminal.
In one embodiment, the number obtaining module 702 may further include:
the identity authentication submodule is used for calling an identity authentication interface and authenticating the identification information by using the identity authentication interface; the identity authentication interface comprises a communication interface of the identification information auditing terminal;
the living body detection submodule is used for carrying out living body detection on the user corresponding to the activation request by using the identity authentication interface under the condition that the authentication is passed;
and the authentication result confirmation sub-module is used for determining that the identification information passes the authentication when the living body detection passes.
In the technical scheme of the disclosure, the acquisition, storage, application and the like of the personal information of the related user all accord with the regulations of related laws and regulations, and do not violate the good customs of the public order.
The present disclosure also provides an electronic device, a readable storage medium, and a computer program product according to embodiments of the present disclosure.
FIG. 8 illustrates a schematic block diagram of an electronic device 800 that may be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 8, electronic device 800 includes a computing unit 810 that may perform various appropriate actions and processes in accordance with a computer program stored in a Read Only Memory (ROM)820 or a computer program loaded from a storage unit 880 into a Random Access Memory (RAM) 830. In the RAM830, various programs and data required for the operation of the device 800 can also be stored. The computing unit 810, the ROM820 and the RAM830 are connected to each other by a bus 840. An input/output (I/O) interface 850 is also connected to bus 840.
A number of components in the electronic device 800 are connected to the I/O interface 850, including: an input unit 860 such as a keyboard, a mouse, and the like; an output unit 870 such as various types of displays, speakers, and the like; a storage unit 880 such as a magnetic disk, optical disk, or the like; and a communication unit 890 such as a network card, modem, wireless communication transceiver, or the like. The communication unit 890 allows the electronic device 800 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for implementing the methods of the present disclosure may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server may be a cloud server, a server of a distributed system, or a server with a combined blockchain.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present disclosure may be executed in parallel or sequentially or in different orders, and are not limited herein as long as the desired results of the technical solutions disclosed in the present disclosure can be achieved.
The above detailed description should not be construed as limiting the scope of the disclosure. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present disclosure should be included in the scope of protection of the present disclosure.
Claims (15)
1. A method of device activation, comprising:
analyzing the received activation request to obtain the identification information of the object to be activated;
under the condition that the identification information passes the authentication, acquiring a number allocated to an object to be activated;
and binding the number with the object to be activated, and activating the number.
2. The method of claim 1, wherein the binding the number with the object to be activated comprises:
determining a corresponding binding strategy according to the attribute of the object to be activated; the attribute of the object to be activated comprises a user attribute or an equipment attribute;
and executing the binding of the number and the object to be activated according to the binding strategy.
3. The method according to claim 2, wherein, in case that the property of the object to be activated is a user property, determining that the corresponding binding policy is multi-device binding;
the executing the binding of the number and the object to be activated according to the binding policy comprises the following steps:
utilizing the identification information to inquire at least one associated device matched with the identification information, and determining each inquired associated device as an object to be activated;
and binding the number with each inquired associated device.
4. The method according to claim 2, wherein, in case that the property of the object to be activated is a device property, determining that the corresponding binding policy is a single device binding;
the executing the binding of the number and the object to be activated according to the binding policy comprises the following steps:
determining corresponding equipment by utilizing the identification information, and determining the equipment as an object to be activated;
and binding the number with the corresponding equipment.
5. The method of claim 1, wherein determining that the identification information is authenticated comprises:
encrypting the identification information and transmitting the encrypted identification information to an identification information auditing terminal;
and determining that the identification information passes the authentication under the condition of receiving the authentication passing information sent by the identification information auditing terminal.
6. The method of claim 1, wherein determining that the identification information is authenticated comprises:
calling an identity authentication interface, and authenticating the identification information by using the identity authentication interface; the identity authentication interface comprises a communication interface of an identification information auditing terminal;
under the condition that the authentication is passed, carrying out living body detection on the user corresponding to the activation request by using the identity authentication interface;
in a case where the living body detection passes, it is determined that the identification information is authenticated.
7. An apparatus for device activation, comprising:
the activation request analysis module is used for analyzing the received activation request to obtain the identification information of the object to be activated;
the number acquisition module is used for acquiring the number allocated to the object to be activated under the condition that the identification information passes the authentication;
and the activation module is used for binding the number with the object to be activated and activating the number.
8. The apparatus of claim 7, wherein the activation module comprises:
the binding strategy determining submodule is used for determining a corresponding binding strategy according to the attribute of the object to be activated; the attribute of the object to be activated comprises a user attribute or an equipment attribute;
and the activation execution submodule is used for executing the binding of the number and the object to be activated according to the binding strategy.
9. The apparatus according to claim 8, wherein, in a case that the attribute of the object to be activated is a user attribute, the corresponding binding policy is determined to be multi-device binding;
the activation execution sub-module comprises:
the first to-be-activated object determining unit is used for inquiring at least one associated device matched with the identification information by using the identification information, and determining each inquired associated device as an to-be-activated object;
and the first binding unit is used for binding the number with each inquired associated device.
10. The apparatus according to claim 8, wherein, in a case that the attribute of the object to be activated is a device attribute, it is determined that the corresponding binding policy is single device binding;
the activation execution sub-module comprises:
the second to-be-activated object determining unit is used for determining corresponding equipment by using the identification information and determining the equipment as an to-be-activated object;
and the second binding unit is used for binding the number with the corresponding equipment.
11. The apparatus of claim 7, wherein the number acquisition module comprises:
the identification information processing submodule is used for encrypting the identification information and transmitting the encrypted identification information to an identification information auditing terminal;
and the authentication confirmation submodule is used for determining that the identification information passes the authentication under the condition of receiving the authentication passing information sent by the identification information auditing terminal.
12. The apparatus of claim 7, wherein the number acquisition module comprises:
the identity authentication submodule is used for calling an identity authentication interface and authenticating the identification information by using the identity authentication interface; the identity authentication interface comprises a communication interface of an identification information auditing terminal;
the living body detection submodule is used for carrying out living body detection on the user corresponding to the activation request by using the identity authentication interface under the condition that the authentication is passed;
and the authentication result confirmation sub-module is used for determining that the identification information passes authentication when the living body detection passes.
13. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1 to 6.
14. A non-transitory computer readable storage medium storing computer instructions for causing a computer to perform the method of any one of claims 1 to 6.
15. A computer program product comprising a computer program which, when executed by a processor, implements the method according to any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110738900.6A CN113468506B (en) | 2021-06-30 | 2021-06-30 | Method, device, equipment and storage medium for activating equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110738900.6A CN113468506B (en) | 2021-06-30 | 2021-06-30 | Method, device, equipment and storage medium for activating equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113468506A true CN113468506A (en) | 2021-10-01 |
CN113468506B CN113468506B (en) | 2024-04-02 |
Family
ID=77876613
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110738900.6A Active CN113468506B (en) | 2021-06-30 | 2021-06-30 | Method, device, equipment and storage medium for activating equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113468506B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114385923A (en) * | 2022-01-18 | 2022-04-22 | 深圳市普渡科技有限公司 | Cloud platform, robot activation method, computer device, and medium |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102598730A (en) * | 2009-10-27 | 2012-07-18 | 诺基亚公司 | Method and apparatus for activating services |
US20150373535A1 (en) * | 2014-06-24 | 2015-12-24 | Huawei Technologies Co., Ltd. | Method, Apparatus, and System for Managing Device |
CN105451212A (en) * | 2014-09-24 | 2016-03-30 | 意法半导体公司 | Portable mobile subscription |
CN107920138A (en) * | 2016-10-08 | 2018-04-17 | 腾讯科技(深圳)有限公司 | A kind of user's unifying identifier generation method, apparatus and system |
CN108900536A (en) * | 2018-08-03 | 2018-11-27 | Oppo广东移动通信有限公司 | Authentication method, device, computer equipment and storage medium |
CN109361703A (en) * | 2018-12-12 | 2019-02-19 | 百度在线网络技术(北京)有限公司 | Speech ciphering equipment binding method, device, equipment and computer-readable medium |
CN109658103A (en) * | 2018-10-25 | 2019-04-19 | 阿里巴巴集团控股有限公司 | Authentication, number are saved and are sent, bind number method, device and equipment |
CN109951524A (en) * | 2019-02-15 | 2019-06-28 | 飞天诚信科技股份有限公司 | Key devices Activiation method, electronic equipment and computer readable storage medium |
CN111757422A (en) * | 2020-06-11 | 2020-10-09 | 重庆辉烨通讯技术有限公司 | Equipment activation method and device, user terminal, equipment to be activated and storage medium |
CN111787524A (en) * | 2019-04-04 | 2020-10-16 | 阿里巴巴集团控股有限公司 | Internet of things equipment call control method, device and system |
CN111787517A (en) * | 2020-02-21 | 2020-10-16 | 北京沃东天骏信息技术有限公司 | Method and device for binding activation of intelligent equipment |
CN112346740A (en) * | 2019-08-06 | 2021-02-09 | 广东元心科技有限公司 | Method and system for verifying device identifier through application |
-
2021
- 2021-06-30 CN CN202110738900.6A patent/CN113468506B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102598730A (en) * | 2009-10-27 | 2012-07-18 | 诺基亚公司 | Method and apparatus for activating services |
US20150373535A1 (en) * | 2014-06-24 | 2015-12-24 | Huawei Technologies Co., Ltd. | Method, Apparatus, and System for Managing Device |
CN105451212A (en) * | 2014-09-24 | 2016-03-30 | 意法半导体公司 | Portable mobile subscription |
CN107920138A (en) * | 2016-10-08 | 2018-04-17 | 腾讯科技(深圳)有限公司 | A kind of user's unifying identifier generation method, apparatus and system |
CN108900536A (en) * | 2018-08-03 | 2018-11-27 | Oppo广东移动通信有限公司 | Authentication method, device, computer equipment and storage medium |
CN109658103A (en) * | 2018-10-25 | 2019-04-19 | 阿里巴巴集团控股有限公司 | Authentication, number are saved and are sent, bind number method, device and equipment |
CN109361703A (en) * | 2018-12-12 | 2019-02-19 | 百度在线网络技术(北京)有限公司 | Speech ciphering equipment binding method, device, equipment and computer-readable medium |
CN109951524A (en) * | 2019-02-15 | 2019-06-28 | 飞天诚信科技股份有限公司 | Key devices Activiation method, electronic equipment and computer readable storage medium |
CN111787524A (en) * | 2019-04-04 | 2020-10-16 | 阿里巴巴集团控股有限公司 | Internet of things equipment call control method, device and system |
CN112346740A (en) * | 2019-08-06 | 2021-02-09 | 广东元心科技有限公司 | Method and system for verifying device identifier through application |
CN111787517A (en) * | 2020-02-21 | 2020-10-16 | 北京沃东天骏信息技术有限公司 | Method and device for binding activation of intelligent equipment |
CN111757422A (en) * | 2020-06-11 | 2020-10-09 | 重庆辉烨通讯技术有限公司 | Equipment activation method and device, user terminal, equipment to be activated and storage medium |
Non-Patent Citations (1)
Title |
---|
许旭;潘志刚;: "一种基于"一机一码"的软件激活序列号生成方案", 浙江科技学院学报, no. 04, pages 273 - 277 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114385923A (en) * | 2022-01-18 | 2022-04-22 | 深圳市普渡科技有限公司 | Cloud platform, robot activation method, computer device, and medium |
Also Published As
Publication number | Publication date |
---|---|
CN113468506B (en) | 2024-04-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12074910B2 (en) | System and method for second factor authentication to perform services | |
US8572701B2 (en) | Authenticating via mobile device | |
US11233897B1 (en) | Secure call center communications | |
CN113661699B (en) | System and method for pre-authentication of customer support calls | |
CN104346560A (en) | Security authentication method and security authentication device | |
CN112039826A (en) | Login method and device applied to applet terminal | |
CN116964987A (en) | Establishing authentication persistence | |
US11652640B2 (en) | Systems and methods for out-of-band authenticity verification of mobile applications | |
CN116011590A (en) | Federal learning method, device and system | |
CN113468506B (en) | Method, device, equipment and storage medium for activating equipment | |
CN114048498A (en) | Data sharing method, device, equipment and medium | |
CN114186206A (en) | Login method and device based on small program, electronic equipment and storage medium | |
CN104346161A (en) | Information processing method and electronic equipment | |
CN117473473A (en) | Data processing method, device, equipment and storage medium | |
CN113297557A (en) | Account data authorization method, device, equipment and computer readable storage medium | |
US11716331B2 (en) | Authentication method, an authentication device and a system comprising the authentication device | |
CN113489707A (en) | Call processing method, device, equipment and storage medium | |
CN111147470A (en) | Account authorization method and device and electronic equipment | |
US12028315B2 (en) | Methods, devices, and computer program products for authenticating peripheral device | |
CN112615712B (en) | Data processing method, related device and computer program product | |
CN116702108A (en) | Authentication method, device and system | |
CN113761507A (en) | Authentication method and device | |
CN117061125A (en) | Equipment interconnection method and system and electronic equipment | |
CN116938520A (en) | Authority control method, device, system, equipment and storage medium | |
CN114021105A (en) | Application authentication method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |