WO2019052532A1 - Information interaction method, apparatus and device for internet of things device - Google Patents
Information interaction method, apparatus and device for internet of things device Download PDFInfo
- Publication number
- WO2019052532A1 WO2019052532A1 PCT/CN2018/105673 CN2018105673W WO2019052532A1 WO 2019052532 A1 WO2019052532 A1 WO 2019052532A1 CN 2018105673 W CN2018105673 W CN 2018105673W WO 2019052532 A1 WO2019052532 A1 WO 2019052532A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- internet
- authentication information
- data packet
- client
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 62
- 230000003993 interaction Effects 0.000 title claims abstract description 47
- 238000003860 storage Methods 0.000 claims description 26
- 230000006855 networking Effects 0.000 claims description 22
- 238000006243 chemical reaction Methods 0.000 claims description 9
- 238000012544 monitoring process Methods 0.000 claims description 2
- 238000000060 site-specific infrared dichroism spectroscopy Methods 0.000 abstract 1
- 230000008569 process Effects 0.000 description 15
- 238000010586 diagram Methods 0.000 description 12
- 230000006870 function Effects 0.000 description 10
- 230000006872 improvement Effects 0.000 description 9
- 238000004590 computer program Methods 0.000 description 8
- 238000012545 processing Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 6
- 238000004458 analytical method Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000014509 gene expression Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000002085 persistent effect Effects 0.000 description 2
- 230000000750 progressive effect Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000003862 health status Effects 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 229920001296 polysiloxane Polymers 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 239000010979 ruby Substances 0.000 description 1
- 229910001750 ruby Inorganic materials 0.000 description 1
- 239000000523 sample Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Definitions
- the present specification relates to the field of computer technology, and in particular, to an information interaction method, device and device for an Internet of Things device.
- the user After obtaining the unconfigured IoT device, the user first needs to complete the distribution network, let the device access the network, and then interact between the user terminal and the server, and the interaction between the user terminal and the IoT device to complete. IoT device authentication, and then IoT device connection server.
- the embodiments of the present invention provide a method, a device, and a device for networking an Internet of Things device, which are used to solve the following problem: a more convenient solution for the IoT device to connect to the server is needed.
- the embodiment of the present specification provides a method for information interaction about an Internet of Things device, including:
- the embodiment of the present specification further provides another information interaction method for the Internet of Things device, including:
- the user information and/or the identification information of the Internet of Things device is authenticated, the authentication information is obtained, and the client is returned.
- the embodiment of the present specification further provides another method for information interaction about the Internet of Things device, including
- the embodiment of the present specification further provides an information interaction device for the Internet of Things device, where the device includes:
- a sending module sending the user information and the identifier information of the Internet of Things device to the server for the server to authenticate;
- Receiving module receiving the authentication information returned by the server
- the sending module is further configured to send the data packet, so that the IoT device obtains the authentication information from the data packet for connecting to a server.
- the embodiment of the present specification further provides another information interaction device for the Internet of Things device, including:
- Receiving module receiving identification information and user information of the IoT device sent by the client;
- An authentication module that authenticates the user information and/or the identifier information of the Internet of Things device to obtain authentication information
- the sending module sends the authentication information to the client.
- the embodiment of the present specification further provides another information interaction device for the Internet of Things device, including:
- Obtaining a module acquiring a data packet that is sent by the client and carrying the authentication information, and acquiring the target network information;
- a network configuration module configured to perform network configuration according to the target network information, to access the target network
- connection module establishes a trusted network connection with the server according to the authentication information and the target network that has been accessed.
- the embodiment of the present specification further provides an information interaction device for an Internet of Things device, including:
- a memory for storing an Internet of Things device networking program
- the processor calls the IoT device networking program in the storage device and executes:
- the embodiment of the present specification further provides another information interaction device for the Internet of Things device, including:
- a memory for storing an Internet of Things device networking program
- the processor calls the IoT device networking program in the memory and executes:
- the user information and/or the identification information of the Internet of Things device is authenticated, the authentication information is obtained, and the client is returned.
- the embodiment of the present specification further provides an information interaction device for the Internet of Things device, where the device is the IoT device itself, and includes:
- a memory for storing an Internet of Things device networking program
- the embodiment of the present specification further provides a non-volatile computer storage medium, where computer executable instructions are stored, and the computer executable instructions are set as:
- the embodiment of the present specification further provides another non-volatile computer storage medium, where computer executable instructions are stored, and the computer executable instructions are set as:
- the user information and/or the identification information of the Internet of Things device is authenticated, the authentication information is obtained, and the client is returned.
- the embodiment of the present specification further provides another non-volatile computer storage medium, where computer executable instructions are stored, and the computer executable instructions are set as:
- the client obtains the identification information of the IoT device, and uploads the identification information and user information of the IoT device to the server.
- the server performs device authentication and account binding, generates authentication information, and delivers the client of the user.
- the network identifier (such as the service set identifier SSID of the wireless network), the password, and the authentication information are broadcasted in the network by using the data packet as a carrier, and the device polls the surrounding network, receives the data packet, and parses and obtains the target network identifier, password, and authentication information. In turn, access from the target network is established, and a trusted network connection is established with the server.
- the server uploads the identification information and the user information of the IoT device, and the server binds and authenticates, and then the client transmits the authentication information to the Internet of Things device to realize the networking of the Internet of Things device and reduce the Internet of Things.
- the number of interactions in the device configuration process makes the entire configuration process more concise, reducing the amount of user operations and improving the user experience.
- the client can also transmit the target network information and the authentication information to the IoT device at the same time, which further simplifies the user's operation.
- FIG. 1 is a schematic structural diagram of an embodiment of the present disclosure
- FIG. 2 is a schematic flowchart of steps performed by a client in an information interaction scheme provided by an embodiment of the present disclosure
- FIG. 3 is a schematic flowchart of a data packet generating method according to an embodiment of the present disclosure
- FIG. 4 is a schematic flowchart of steps performed by a server in an information interaction scheme provided by an embodiment of the present disclosure
- FIG. 5 is a schematic flowchart of steps performed by an IoT device in an information interaction scheme according to an embodiment of the present disclosure
- FIG. 6 is a schematic structural diagram of an information interaction device on a client side according to an embodiment of the present disclosure
- FIG. 7 is a schematic structural diagram of an information interaction device on a server side according to an embodiment of the present disclosure.
- FIG. 8 is a schematic structural diagram of an information interaction device of an Internet of Things device according to an embodiment of the present disclosure.
- the Internet of Things devices are generally Internet of Things smart items, and may include various smart items that can be carried around (such as smart bracelets, smart watches, etc.), various smart home items, and the like.
- IoT devices In order to ensure the quality of IoT equipment and subsequent services, IoT devices usually carry unique corresponding identification information for identification. To prevent spoofing, the server usually needs to authenticate the IoT device that is trying to connect to it in advance.
- the information interaction scheme for the Internet of Things device may adopt an architecture as shown in FIG. 1 , in which the server may include various clustered and distributed servers; Incoming points can include various access points (APs), such as routers, mobile hotspots, and the like.
- APs access points
- the interaction between the IoT device and the server, and the interaction between the client and the server can be implemented by the network access point. This interaction is preferably a data transparent transmission process for the network access point.
- FIG. 2 is a schematic flowchart of the steps performed by the client in the information interaction scheme provided by the embodiment of the present disclosure:
- Step S201 Acquire user information and identification information of the Internet of Things device.
- the user information may generally include the user's account information, the user's device unique identification code, the user's identity card information, or the user's mobile phone number, and the like.
- the user information can be automatically obtained by the client from the local terminal or manually input to the client by the user.
- the identification information of the IoT device is usually defined in advance by the service provider.
- there may be multiple specific expressions for example, a string formed by a combination of various characters, and the user can directly input to the client; or, Digital Object Unique Identifier (DOI), including various barcodes, two-dimensional codes; or a communication chip that can be recognized.
- DOI Digital Object Unique Identifier
- obtaining identification information of an IoT device may include the following various implementation manners, and two of them are listed:
- the first type uses a terminal (for example, a camera such as a camera or a tag reader on the terminal) to scan the IoT device to obtain identification information of the IoT device.
- a terminal for example, a camera such as a camera or a tag reader on the terminal
- RFID Radio Frequency Identification
- NFC Near Field Communication
- the second type is to receive the identifier information of the IoT device input by the user on the client.
- the input method may be used by the user to input the string. Manually enter to the client.
- Step S203 Send the user information and the identifier information of the Internet of Things device to the server for the server to authenticate.
- the server can generate the authentication information according to the identification information of the IoT device and the user information by using a preset algorithm. For example, an algorithm generates a unique hash value according to the identification information of the Internet of Things device and the user information, and uses the hash value as the authentication information; for example, generates a security certificate according to the identification information of the Internet of Things device and the user information as the authentication. Information; and so on.
- the authentication information is then sent to the client so that the client can pass the authentication information to the IoT device.
- the server can subsequently verify whether the IoT device attempting to connect is legitimate based on the authentication information.
- Step S205 receiving authentication information returned by the server.
- Step S207 Generate and send a data packet carrying the authentication information, so that the IoT device acquires the authentication information from the data packet for connecting to the server.
- the data packet may include: a User Datagram Protocol (UDP) data packet, a Transmission Control Protocol (TCP) data packet, or a data packet in a custom format.
- UDP User Datagram Protocol
- TCP Transmission Control Protocol
- a packet usually includes a header and a data body.
- the header includes fields such as a source IP address, a destination IP address, a packet length, and a checksum.
- the IoT device that has not been configured may not be able to parse the data body content of the UDP packet, but can parse the header content of the UDP packet relatively quickly. Based on this, the authentication information can be written into the header of the UDP packet to ensure the object. Networked devices can quickly obtain authentication information by quickly parsing them.
- the IP address of the receiver should be written under normal circumstances to achieve point-to-point transmission.
- the IP address of the receiver is not written, but the authentication information is written into the target IP address field of the data packet, so that the IoT device receives and parses the content of the target IP address field to obtain the authentication information. .
- the protocol supporting the custom format can also be pre-written into the protocol stack of the IoT device to support the custom format packet parsing process.
- the client writes authentication information to the header and/or data body of the packet as needed.
- the amount of information that a single packet can carry is limited.
- the authentication information to be transmitted is long, the authentication information may be split and written into a specified field (for example, a length or a target IP address) of the data packet to generate a plurality of data packets carrying partial authentication information.
- the client can broadcast the generated data packet on one or more channels in the connected wireless network.
- the IoT device that probes these channels can receive the packet.
- step S207 before generating the data packet carrying the authentication information, performing: acquiring target network information. Further, in step S207, generating a data packet carrying the authentication information includes: generating a data packet carrying the authentication information and target network information.
- the target network refers to a network on which an IoT device is connected when connecting to a server.
- the target network can be specified by the user through the client, or can be determined by the IoT device based on preset rules (for example, automatically scanning to an available passwordless WiFi network as the target network). The following embodiments are mainly explained based on the former method.
- the target network is, for example, a wireless network to which the client is currently connected, or another wireless network designated by the user.
- the target network information generally includes the identity of the target network and a password.
- the identity is specifically a Service Set Identifier (SSID), which is a so-called WiFi name.
- SSID Service Set Identifier
- the target network may also have no password.
- the user terminal itself is connected to the network through the WiFi network M1, but a smart home appliance that is desired to be purchased is connected to the Internet through the WiFi network M5, and the password of the network M5 is 000000.
- the target network information includes the identity identifier M5 of the target network and its password 000000.
- the target network information includes the target network identity M5.
- the method for obtaining the target network information may include: obtaining the client locally, or pre-setting by the user, inputting to the client, and the like.
- the client can transmit the target network information and the authentication information to the Internet of Things device at one time, which simplifies the operation of the user.
- FIG. 3 is a schematic flowchart of a data packet generating method according to an embodiment of the present disclosure:
- Step S301 Perform format conversion on the authentication information according to a format of a specified data packet field.
- the packet fields have a preset format, for example, the length field in the UDP packet is a number between 0 and 255. However, for the authentication information, it is not necessarily all numbers themselves. Based on this, the authentication information needs to be converted into a format acceptable for the data packet specifying field, and the field can be written.
- each byte in the byte sequence corresponding to the authentication information may be converted into a format acceptable for the specified field by using a certain rule, and then the formatted authentication information is written into the length of the data packet. Or the destination IP address field.
- the rule is an American Standard Code of Content Interchange (ASCII) table.
- ASCII American Standard Code of Content Interchange
- Step S303 The data packet carrying the authentication information is obtained by writing the formatted authentication information into the corresponding data packet field; wherein, the designated data packet field includes: a data packet length field and/or a target IP address field.
- the specified position is the length position
- 75 can be written to the length position of a certain packet, and 2 is written to the length position of the next data packet. And issued in turn.
- the processing method is as follows: the digital number is written to a specified position in the target IP address, for example, the number is written to the last bit of the target IP address.
- FIG. 4 A schematic flow diagram of the steps performed by the server in the information interaction scheme, including the following steps:
- Step S401 receiving user information sent by the client and identification information of the Internet of Things device
- Step S403 performing authentication on the user information and/or the identifier information of the Internet of Things device, obtaining the authentication information, and returning to the client.
- the server may further perform: establishing and storing a binding relationship between the identifier information of the IoT device and the user information. For example, a one-to-one correspondence between the identification information of the IoT device and the user information is established in the form of a key-value pair, and the binding record is generated and stored locally to the server.
- the related Internet of Things service can be executed based on the stored binding relationship.
- an IoT device when it is working in normal networking, it can collect signals through the sensors it carries and upload it to the server.
- the server performs signal analysis and binds the user information according to the signal analysis result and the stored binding relationship.
- the corresponding client makes feedback.
- the server receives the pulse signal collected and sent by the smart bracelet for analysis, and sends the pulse signal analysis result to the bound user mobile phone number, so that the user can know the wearing of the smart bracelet at any time. The health status of the personnel.
- a networked device After the obtaining the authentication information and returning to the client, performing: receiving the authentication information sent by the Internet of Things device; and based on the authentication information, A networked device establishes a trusted network connection.
- the server verifies the authentication information sent by the Internet of Things device, and after the verification is passed, establishes a trusted network connection with the Internet of Things device. For example, if the authentication information is stored in the server after being generated, after the authentication information sent by the IoT device is received, the authentication is completed by matching the received authentication information with the locally stored authentication information. For another example, if the authentication information is not saved on the server, the authentication information may be verified according to a preset algorithm (for example, a hash algorithm, etc.).
- a preset algorithm for example, a hash algorithm, etc.
- verifying authentication information may be one of the prerequisites for establishing a trusted network connection.
- other information processing actions may be required to establish a trusted network connection. These actions may require additional information from the IoT device and/or client.
- the other information is, for example, identification information, location information, and the like of the Internet of Things device.
- the server can simultaneously identify what the IoT device is in the verification process, and obtain the user information corresponding to the IoT device according to the binding relationship; similarly, obtain the location of the IoT device. Information, the server can understand where the IoT device is and perform business based on location.
- FIG. 5 A schematic diagram of the flow of steps performed by the IoT device in the information interaction scheme, including the following steps:
- Step S501 Acquire a data packet that carries the authentication information sent by the client, and acquire the target network information.
- the following embodiments may be adopted: monitoring multiple radio network signal broadcast channels; and acquiring the data packets carrying the authentication information sent by the client.
- an IoT device first acquires a plurality of surrounding wireless network signal broadcast channels, and then performs polling (if there is only one, no polling is required), and listens to data packets in each channel to determine the wireless network signal broadcast channel.
- polling if there is only one, no polling is required
- the data packet is acquired in the current wireless network signal broadcast channel. For example, it is monitored whether the received packet header contains a preset tag, and if so, it is determined as the packet carrying the authentication information, and the packet is acquired.
- the Internet of Things device can obtain the target network from the WiFi network of the surrounding environment. For example, the Internet of Things device polls the WiFi network of the surrounding environment, and finds that a certain public WiFi network can be networked without a password. At this time, the public WiFi network is the target network.
- the target network information may be obtained by acquiring a data packet that is sent by the client and carries the authentication information and the target network information.
- the user connects to the network through the home network WiFi, and specifies that the Internet of Things device is also connected from the home network WiFi, and the client obtains the WiFi information of the home network as the target network information and writes the data packet for broadcast.
- the IoT device can acquire the target network information (ie, the WiFi information of the home network) from the received data packet.
- Step S503 performing network configuration according to the target network information to access the target network.
- Step S505 establishing a trusted network connection with the server according to the authentication information and the target network that has been accessed.
- the authentication information is sent to the server, and after the server verifies that the authentication information is legal, the two parties establish a trusted network connection.
- the method before performing the network configuration according to the target network information, the method further includes: performing format conversion on the specified field of the data packet, and acquiring the authentication, according to a preset rule. information.
- the length field of the received data packet is sequentially queried, the numbers 75 and 2 are obtained, converted according to the ASCII table, and spliced in order to obtain the authentication information as "K2".
- the server uploads the identification information and the user information of the IoT device, and the server binds and authenticates, and then the client transmits the authentication information to the Internet of Things device to realize the networking of the Internet of Things device and reduce the Internet of Things.
- the number of interactions in the device configuration process makes the entire configuration process more concise, reducing the amount of user operations and improving the user experience.
- the client can also transmit the target network information and the authentication information to the IoT device at the same time, which further simplifies the user's operation.
- FIG. 6 is a schematic structural diagram of an information interaction device on a client side according to an embodiment of the present disclosure, including:
- the obtaining module 601 is configured to obtain user information and identifier information of the Internet of Things device;
- the sending module 603 is configured to send the user information and the identifier information of the Internet of Things device to the server for the server to authenticate;
- the receiving module 605 receives the authentication information returned by the server.
- the generating module 607 is configured to generate a data packet carrying the authentication information.
- the sending module 603 is further configured to send a data packet, so that the IoT device obtains the authentication information from the data packet for connecting to the server.
- the obtaining module 601 obtains identification information of the Internet of Things device by scanning the Internet of Things device, or receives identification information of the IoT device manually input by the user.
- the acquiring module 601 is further configured to acquire target network information, where the generating module is further configured to generate a data packet that carries the authentication information and the target network information.
- the generating module 607 performs format conversion on the authentication information according to the format of the specified data packet field; and obtains the data packet carrying the authentication information by writing the formatted authentication information into the corresponding data packet field;
- the specified packet field includes: a packet length field and/or a destination IP address field
- the sending module 603 broadcasts the data packet through a currently connected wireless network.
- FIG. 7 is a schematic structural diagram of an information interaction device of a server according to an embodiment of the present disclosure, including:
- the receiving module 701 receives identification information and user information of the Internet of Things device sent by the client;
- the authentication module 703 performs authentication on the user information and/or the identifier information of the Internet of Things device to obtain authentication information.
- the sending module 705 sends the authentication information to the client.
- the device further includes: an establishing module 707, establishing a binding relationship between the identifier information of the Internet of Things device and the user information, for performing an Internet of Things service related to the Internet of Things device and the user information;
- the storage module 709 stores the binding relationship.
- the receiving module 701 receives the authentication information sent by the Internet of Things device, and establishes with the Internet of Things device based on the authentication information. Letter network connection.
- FIG. 8 is a schematic structural diagram of an information interaction device of the Internet of Things device according to an embodiment of the present disclosure, including:
- the obtaining module 801 is configured to obtain a data packet that is sent by the client and that carries the authentication information, and obtain the target network information.
- the network configuration module 803 performs network configuration according to the target network information to access the target network.
- the connection module 805 establishes a trusted network connection with the server according to the authentication information and the target network that has been accessed.
- the acquiring module 801 is configured to acquire a data packet that carries the authentication information and the target network information that is sent by the client, where the target network information includes information about a WiFi network that the client currently connects.
- the obtaining module 801 monitors a plurality of wireless network signal broadcast channels, and acquires the data packet when the data packet carrying the authentication information sent by the client is monitored.
- the obtaining module 801 performs format conversion on the specified field of the data packet according to a preset rule, and acquires the authentication information.
- an information interaction device for an Internet of Things device including:
- a memory for storing an Internet of Things device networking program
- the processor calls the IoT device networking program in the memory and executes:
- the present specification further provides another information interaction device for an Internet of Things device, the device comprising:
- a memory for storing an Internet of Things device networking program
- the processor calls the IoT device networking program in the memory and executes:
- the user information and/or the identification information of the Internet of Things device is authenticated, the authentication information is obtained, and the client is returned.
- the present specification further provides an information interaction device for the Internet of Things device, which is the Internet of Things item itself, and includes:
- a memory for storing an Internet of Things device networking program
- the processor calls the IoT device networking program in the memory and executes
- the embodiment of the present specification further provides a non-volatile computer storage medium, where computer executable instructions are stored, and the computer executable instructions are set as:
- the embodiment of the present specification further provides another non-volatile computer storage medium, where computer executable instructions are stored, and the computer executable instructions are set as:
- the user information and/or the identification information of the Internet of Things device is authenticated, the authentication information is obtained, and the client is returned.
- the embodiment of the present specification further provides a non-volatile computer storage medium storing computer executable instructions, where the computer executable instructions are set as:
- PLD Programmable Logic Device
- FPGA Field Programmable Gate Array
- HDL Hardware Description Language
- the controller can be implemented in any suitable manner, for example, the controller can take the form of, for example, a microprocessor or processor and a computer readable medium storing computer readable program code (eg, software or firmware) executable by the (micro)processor.
- computer readable program code eg, software or firmware
- examples of controllers include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, The Microchip PIC18F26K20 and the Silicone Labs C8051F320, the memory controller can also be implemented as part of the memory's control logic.
- the controller can be logically programmed by means of logic gates, switches, ASICs, programmable logic controllers, and embedding.
- Such a controller can therefore be considered a hardware component, and the means for implementing various functions included therein can also be considered as a structure within the hardware component.
- a device for implementing various functions can be considered as a software module that can be both a method of implementation and a structure within a hardware component.
- the system, device, module or unit illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product having a certain function.
- a typical implementation device is a computer.
- the computer can be, for example, a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or A combination of any of these devices.
- embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
- computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
- the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
- the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
- These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
- the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
- a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
- processors CPUs
- input/output interfaces network interfaces
- memory volatile and non-volatile memory
- the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
- RAM random access memory
- ROM read only memory
- Memory is an example of a computer readable medium.
- Computer readable media includes both permanent and non-persistent, removable and non-removable media.
- Information storage can be implemented by any method or technology.
- the information can be computer readable instructions, data structures, modules of programs, or other data.
- Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape storage or other magnetic storage devices or any other non-transportable media can be used to store information that can be accessed by a computing device.
- computer readable media does not include temporary storage computer readable media, such as modulated data signal numbers and carrier waves.
- embodiments of the present specification can be provided as a method, system, or computer program product.
- embodiments of the present specification can take the form of an entirely hardware embodiment, an entirely software embodiment or a combination of software and hardware.
- embodiments of the present specification can take the form of a computer program product embodied on one or more computer usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
- Embodiments of the present description can be described in the general context of computer-executable instructions executed by a computer, such as a program module.
- program modules include routines, programs, objects, components, data structures, and the like that perform particular transactions or implement particular abstract data types.
- Embodiments of the present specification may also be practiced in distributed computing environments where transactions are performed by remote processing devices that are connected through a communication network.
- program modules can be located in both local and remote computer storage media including storage devices.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Power Engineering (AREA)
- Medical Informatics (AREA)
- General Health & Medical Sciences (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
- Computer And Data Communications (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Embodiments of the present specification disclose an information interaction method, an apparatus and a device for an Internet of Things (IoT) device. In the embodiments of the present specification, a client obtains identifier information of the IoT device, and the identifier information of the IoT device and user information are uploaded to a server. The server performs device authentication and account binding, generates authentication information and delivers the same to the client. The client uses a data packet as carrier to broadcast a target network identifier (such as service set identifier SSID of a wireless network), a password and the authentication information in a network. The device polls surrounding networks to receive the data packet, to parse the data packet and to obtain the target network identifier, the password, and the authentication information, thereby achieving access from the target network and establishing a trusted network connection with the server.
Description
本说明书涉及计算机技术领域,尤其涉及关于物联网设备的信息交互方法、装置及设备。The present specification relates to the field of computer technology, and in particular, to an information interaction method, device and device for an Internet of Things device.
随着技术发展,物联网设备的种类和应用场景越来越多。With the development of technology, there are more and more types of IoT devices and application scenarios.
用户在获得未经配置的物联网设备后,首先需完成配网,让设备接入网络,而后进行用户终端和服务端之间的交互,以及用户终端和物联网设备之间的交互,以完成物联网设备认证,进而实现物联网设备连接服务端。After obtaining the unconfigured IoT device, the user first needs to complete the distribution network, let the device access the network, and then interact between the user terminal and the server, and the interaction between the user terminal and the IoT device to complete. IoT device authentication, and then IoT device connection server.
基于此,需要更便利的物联网设备连接服务端的方案。Based on this, a more convenient solution for the IoT device to connect to the server is needed.
发明内容Summary of the invention
本说明书实施例提供物联网设备联网方法、装置及设备,用于解决如下问题:需要更便利的物联网设备连接服务端的方案。The embodiments of the present invention provide a method, a device, and a device for networking an Internet of Things device, which are used to solve the following problem: a more convenient solution for the IoT device to connect to the server is needed.
基于此,本说明书实施例提供一种关于物联网设备的信息交互方法,包括:Based on this, the embodiment of the present specification provides a method for information interaction about an Internet of Things device, including:
获取用户信息和物联网设备的标识信息;Obtaining user information and identification information of the Internet of Things device;
发送所述用户信息和物联网设备的标识信息至服务端,以便服务端认证;Sending the user information and the identification information of the Internet of Things device to the server for server authentication;
接收服务端返回的认证信息;Receiving the authentication information returned by the server;
生成并发送携带所述认证信息的数据包,以便所述物联网设备从所述数据包获取所述认证信息用于连接服务端。Generating and transmitting a data packet carrying the authentication information, so that the IoT device acquires the authentication information from the data packet for connecting to a server.
同时,本说明书实施例还提供另一种关于物联网设备的信息交互方法,包括:Meanwhile, the embodiment of the present specification further provides another information interaction method for the Internet of Things device, including:
接收客户端所发送的用户信息和物联网设备的标识信息;Receiving user information sent by the client and identification information of the Internet of Things device;
对所述用户信息和/或物联网设备的标识信息进行认证,得到认证信息并返回所述客户端。The user information and/or the identification information of the Internet of Things device is authenticated, the authentication information is obtained, and the client is returned.
同时,本说明书实施例还提供再一种关于物联网设备的信息交互方法,包括Meanwhile, the embodiment of the present specification further provides another method for information interaction about the Internet of Things device, including
获取客户端发送的携带认证信息的数据包,以及获取目标网络信息;Obtaining a data packet that is sent by the client and carrying the authentication information, and acquiring the target network information;
根据所述目标网络信息进行网络配置,以接入所述目标网络;Performing network configuration according to the target network information to access the target network;
根据所述认证信息和已接入的所述目标网络,与服务端建立可信网络连接。Establishing a trusted network connection with the server according to the authentication information and the target network that has been accessed.
对应的,本说明书实施例还提供一种关于物联网设备的信息交互装置,所述装置包括:Correspondingly, the embodiment of the present specification further provides an information interaction device for the Internet of Things device, where the device includes:
获取模块,获取用户信息和物联网设备的标识信息;Obtaining a module to obtain user information and identification information of the Internet of Things device;
发送模块,发送所述用户信息和物联网设备的标识信息至服务端,以便服务端认证;a sending module, sending the user information and the identifier information of the Internet of Things device to the server for the server to authenticate;
接收模块,接收服务端返回的认证信息;Receiving module, receiving the authentication information returned by the server;
生成模块,生成携带所述认证信息的数据包;Generating a module, and generating a data packet carrying the authentication information;
所述发送模块还用于,发送所述数据包,以便所述物联网设备从所述数据包获取所述认证信息用于连接服务端。The sending module is further configured to send the data packet, so that the IoT device obtains the authentication information from the data packet for connecting to a server.
对应的,本说明书实施例还提供另一种关于物联网设备的信息交互装置,包括:Correspondingly, the embodiment of the present specification further provides another information interaction device for the Internet of Things device, including:
接收模块,接收客户端所发送的物联网设备的标识信息和用户信息;Receiving module, receiving identification information and user information of the IoT device sent by the client;
认证模块,对所述用户信息和/或物联网设备的标识信息进行认证,得到认证信息;An authentication module that authenticates the user information and/or the identifier information of the Internet of Things device to obtain authentication information;
发送模块,发送所述认证信息至客户端。The sending module sends the authentication information to the client.
对应的,本说明书实施例还提供再一种关于物联网设备的信息交互装置,包括:Correspondingly, the embodiment of the present specification further provides another information interaction device for the Internet of Things device, including:
获取模块,获取客户端发送的携带认证信息的数据包,以及获取目标网络信息;Obtaining a module, acquiring a data packet that is sent by the client and carrying the authentication information, and acquiring the target network information;
网络配置模块,根据所述目标网络信息进行网络配置,以接入所述目标网 络;a network configuration module, configured to perform network configuration according to the target network information, to access the target network;
连接模块,根据所述认证信息和已接入的所述目标网络,与服务端建立可信网络连接。The connection module establishes a trusted network connection with the server according to the authentication information and the target network that has been accessed.
本说明书实施例还提供一种关于物联网设备的信息交互设备,包括:The embodiment of the present specification further provides an information interaction device for an Internet of Things device, including:
存储器,用于存储物联网设备联网程序;a memory for storing an Internet of Things device networking program;
处理器,调用存储设备中的物联网设备联网程序,并执行:The processor calls the IoT device networking program in the storage device and executes:
获取用户信息和物联网设备的标识信息;Obtaining user information and identification information of the Internet of Things device;
发送所述用户信息和物联网设备的标识信息至服务端,以便服务端认证;Sending the user information and the identification information of the Internet of Things device to the server for server authentication;
接收服务端返回的认证信息;Receiving the authentication information returned by the server;
生成并发送携带所述认证信息的数据包,以便所述物联网设备从所述数据包获取所述认证信息用于连接服务端。Generating and transmitting a data packet carrying the authentication information, so that the IoT device acquires the authentication information from the data packet for connecting to a server.
同时,本说明书实施例还提供另一种关于物联网设备的信息交互设备,包括:Meanwhile, the embodiment of the present specification further provides another information interaction device for the Internet of Things device, including:
存储器,用于存储物联网设备联网程序;a memory for storing an Internet of Things device networking program;
处理器,调用存储器中的物联网设备联网程序,并执行:The processor calls the IoT device networking program in the memory and executes:
接收客户端所发送的用户信息和物联网设备的标识信息;Receiving user information sent by the client and identification information of the Internet of Things device;
对所述用户信息和/或物联网设备的标识信息进行认证,得到认证信息并返回所述客户端。The user information and/or the identification information of the Internet of Things device is authenticated, the authentication information is obtained, and the client is returned.
同时,本说明书实施例还提供再一种关于物联网设备的信息交互设备,所述设备为物联网设备本身,包括:In the meantime, the embodiment of the present specification further provides an information interaction device for the Internet of Things device, where the device is the IoT device itself, and includes:
存储器,用于存储物联网设备联网程序;a memory for storing an Internet of Things device networking program;
处理器,调用存储设备中的物联网设备联网程序,并执行a processor that calls an IoT device networking program in the storage device and executes
获取客户端发送的携带认证信息的数据包,以及获取目标网络信息;Obtaining a data packet that is sent by the client and carrying the authentication information, and acquiring the target network information;
根据所述目标网络信息进行网络配置,以接入所述目标网络;Performing network configuration according to the target network information to access the target network;
根据所述认证信息和已接入的所述目标网络,与服务端建立可信网络连接。Establishing a trusted network connection with the server according to the authentication information and the target network that has been accessed.
对应的,本说明书实施例还提供一种非易失性计算机存储介质,存储有计算机可执行指令,所述计算机可执行指令设置为:Correspondingly, the embodiment of the present specification further provides a non-volatile computer storage medium, where computer executable instructions are stored, and the computer executable instructions are set as:
发送所述用户信息和物联网设备的标识信息至服务端,以便服务端认证;Sending the user information and the identification information of the Internet of Things device to the server for server authentication;
接收服务端返回的认证信息;Receiving the authentication information returned by the server;
生成并发送携带所述认证信息的数据包,以便所述物联网设备从所述数据包获取所述认证信息用于连接服务端。Generating and transmitting a data packet carrying the authentication information, so that the IoT device acquires the authentication information from the data packet for connecting to a server.
对应的,本说明书实施例还提供另一种非易失性计算机存储介质,存储有计算机可执行指令,所述计算机可执行指令设置为:Correspondingly, the embodiment of the present specification further provides another non-volatile computer storage medium, where computer executable instructions are stored, and the computer executable instructions are set as:
接收客户端所发送的用户信息和物联网设备的标识信息;Receiving user information sent by the client and identification information of the Internet of Things device;
对所述用户信息和/或物联网设备的标识信息进行认证,得到认证信息并返回所述客户端。The user information and/or the identification information of the Internet of Things device is authenticated, the authentication information is obtained, and the client is returned.
对应的,本说明书实施例还提供另一种非易失性计算机存储介质,存储有计算机可执行指令,所述计算机可执行指令设置为:Correspondingly, the embodiment of the present specification further provides another non-volatile computer storage medium, where computer executable instructions are stored, and the computer executable instructions are set as:
获取客户端发送的携带认证信息的数据包,以及获取目标网络信息;Obtaining a data packet that is sent by the client and carrying the authentication information, and acquiring the target network information;
根据所述目标网络信息进行网络配置,以接入所述目标网络;Performing network configuration according to the target network information to access the target network;
根据所述认证信息和已接入的所述目标网络,与服务端建立可信网络连接。Establishing a trusted network connection with the server according to the authentication information and the target network that has been accessed.
本说明书实施例采用的上述至少一个技术方案能够达到以下有益效果:The above at least one technical solution adopted by the embodiments of the present specification can achieve the following beneficial effects:
客户端获取物联网设备的标识信息,并将物联网设备的标识信息和用户信息上传服务端,服务端进行设备认证和账号绑定,生成认证信息并下发用户的客户端,客户端将目标网络标识(如无线网络的服务集标识SSID)、密码和该认证信息以数据包为载体在网络中广播,设备通过轮询周围网络,接收数据包,解析获取目标网络标识、密码和认证信息,进而实现从目标网络接入,与服务端建立可信网络连接。The client obtains the identification information of the IoT device, and uploads the identification information and user information of the IoT device to the server. The server performs device authentication and account binding, generates authentication information, and delivers the client of the user. The network identifier (such as the service set identifier SSID of the wireless network), the password, and the authentication information are broadcasted in the network by using the data packet as a carrier, and the device polls the surrounding network, receives the data packet, and parses and obtains the target network identifier, password, and authentication information. In turn, access from the target network is established, and a trusted network connection is established with the server.
本说明书实施例中,通过客户端上传物联网设备的标识信息和用户信息,服务端绑定并认证,进而,客户端将认证信息传递给物联网设备,实现物联网 设备联网,降低了物联网设备配置过程中的交互次数,使得整个配置过程更加简洁,减少用户的操作量,提升用户的使用体验。此外,客户端还可以将目标网络信息和认证信息一次性同时传递给物联网设备,进一步简化了用户的操作。In the embodiment of the present specification, the server uploads the identification information and the user information of the IoT device, and the server binds and authenticates, and then the client transmits the authentication information to the Internet of Things device to realize the networking of the Internet of Things device and reduce the Internet of Things. The number of interactions in the device configuration process makes the entire configuration process more concise, reducing the amount of user operations and improving the user experience. In addition, the client can also transmit the target network information and the authentication information to the IoT device at the same time, which further simplifies the user's operation.
图1为本说明书实施例提供的架构示意图;FIG. 1 is a schematic structural diagram of an embodiment of the present disclosure;
图2为本说明书实施例提供的信息交互方案中客户端方面执行步骤的流程示意图;2 is a schematic flowchart of steps performed by a client in an information interaction scheme provided by an embodiment of the present disclosure;
图3为本说明书实施例提供的数据包生成方法流程示意图;FIG. 3 is a schematic flowchart of a data packet generating method according to an embodiment of the present disclosure;
图4为本说明书实施例提供的信息交互方案中服务端方面执行步骤的流程示意图;4 is a schematic flowchart of steps performed by a server in an information interaction scheme provided by an embodiment of the present disclosure;
图5为本说明书实施例提供的信息交互方案中物联网设备方面执行步骤的流程示意图;FIG. 5 is a schematic flowchart of steps performed by an IoT device in an information interaction scheme according to an embodiment of the present disclosure;
图6为本说明书实施例提供的客户端方面的信息交互装置结构示意图;FIG. 6 is a schematic structural diagram of an information interaction device on a client side according to an embodiment of the present disclosure;
图7为本说明书实施例提供的服务端方面的信息交互装置结构示意图;FIG. 7 is a schematic structural diagram of an information interaction device on a server side according to an embodiment of the present disclosure;
图8为本说明书实施例提供的物联网设备方面的信息交互装置结构示意图。FIG. 8 is a schematic structural diagram of an information interaction device of an Internet of Things device according to an embodiment of the present disclosure.
为使本申请的目的、技术方案和优点更加清楚,下面将结合本申请具体实施例及相应的附图对本申请技术方案进行清楚、完整地描述。显然,所描述的实施例仅是本申请一部分实施例,而不是全部的实施例。基于本说明书中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions of the present application will be clearly and completely described in the following with reference to the specific embodiments of the present application and the corresponding drawings. It is apparent that the described embodiments are only a part of the embodiments of the present application, and not all of them. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present specification without departing from the inventive scope are the scope of the application.
基于前述内容,所述的物联网设备通常是物联网智能物品,可包括各种可 随身携带的智能物品(例如智能手环、智能手表等等)以及各种智能家居物品等。为保障物联网设备质量及后续服务,物联网设备通常携带唯一对应的标识信息以便识别。为防止冒连,服务端通常事先需要对试图连接它的物联网设备进行认证。Based on the foregoing, the Internet of Things devices are generally Internet of Things smart items, and may include various smart items that can be carried around (such as smart bracelets, smart watches, etc.), various smart home items, and the like. In order to ensure the quality of IoT equipment and subsequent services, IoT devices usually carry unique corresponding identification information for identification. To prevent spoofing, the server usually needs to authenticate the IoT device that is trying to connect to it in advance.
在本说明书实施例中,关于物联网设备的信息交互方案可采用如图1所示的架构,在该架构中,其中的服务端可包括各种集群式、分布式的服务器;其中的网络接入点可包括各种无线接入点(Access Point,AP),比如,路由器、手机热点等。在实际应用中,物联网设备与服务端的交互、客户端与服务端的交互均可通过网络接入点实现,这种交互对于网络接入点而言优选地是一种数据透传过程。In the embodiment of the present specification, the information interaction scheme for the Internet of Things device may adopt an architecture as shown in FIG. 1 , in which the server may include various clustered and distributed servers; Incoming points can include various access points (APs), such as routers, mobile hotspots, and the like. In practical applications, the interaction between the IoT device and the server, and the interaction between the client and the server can be implemented by the network access point. This interaction is preferably a data transparent transmission process for the network access point.
下面将基于如图1所示的架构,详细说明本说明书实施例提供的关于物联网设备的信息交互过程,该过程具体包括以下三方面的步骤:客户端方面,服务端方面,和物联网设备方面,分别进行说明。对于客户端方面,包括以下步骤,如图2所示,图2为本说明书实施例提供的信息交互方案中客户端方面执行步骤的流程示意图:The information exchange process for the Internet of Things device provided by the embodiment of the present specification is described in detail below based on the architecture shown in FIG. 1. The process specifically includes the following three steps: client side, server side, and Internet of things device. In terms of aspects, they are explained separately. For the client side, including the following steps, as shown in FIG. 2, FIG. 2 is a schematic flowchart of the steps performed by the client in the information interaction scheme provided by the embodiment of the present disclosure:
步骤S201,获取用户信息和物联网设备的标识信息。Step S201: Acquire user information and identification information of the Internet of Things device.
所述的用户信息通常可包括用户的账号信息、用户的设备唯一识别码、用户的身份证信息、或者用户的手机号码等等。用户信息可以由客户端从本地终端自动获取,或者,通过用户手动输入至客户端。The user information may generally include the user's account information, the user's device unique identification code, the user's identity card information, or the user's mobile phone number, and the like. The user information can be automatically obtained by the client from the local terminal or manually input to the client by the user.
所述物联网设备的标识信息通常由服务商事先定义,在实际应用场景中可以有多种具体表现形式,例如:各种字符组合形成的字符串,用户得到可直接输入至客户端;或者,数字对象唯一标识(Digital Object Unique Identifier,DOI),包括各种条码、二维码;或者,可被识别的通信芯片等。The identification information of the IoT device is usually defined in advance by the service provider. In the actual application scenario, there may be multiple specific expressions, for example, a string formed by a combination of various characters, and the user can directly input to the client; or, Digital Object Unique Identifier (DOI), including various barcodes, two-dimensional codes; or a communication chip that can be recognized.
在实际应用中,获取物联网设备的标识信息,可包括以下多种实施方式,列举其中两种:In practical applications, obtaining identification information of an IoT device may include the following various implementation manners, and two of them are listed:
第一种,利用终端(具体比如,终端上的摄像头或者标签读取器等模块) 对物联网设备进行扫描,获取物联网设备的标识信息。例如,当物联网设备携带有DOI、射频识别标签(Radio Frequency Identification,RFID)或者近场通讯(Near Field Communication,NFC)芯片时,可以通过终端的相应模块扫描获取。The first type uses a terminal (for example, a camera such as a camera or a tag reader on the terminal) to scan the IoT device to obtain identification information of the IoT device. For example, when the IoT device carries a DOI, a Radio Frequency Identification (RFID), or a Near Field Communication (NFC) chip, it can be acquired by scanning the corresponding module of the terminal.
第二种,接收用户在客户端上输入的物联网设备的标识信息,例如,物联网设备的标识信息为各种字符组合形成的字符串时,可通过用户调取输入法,将该字符串手动输入至客户端。The second type is to receive the identifier information of the IoT device input by the user on the client. For example, when the identifier information of the IoT device is a string formed by various character combinations, the input method may be used by the user to input the string. Manually enter to the client.
步骤S203,发送所述用户信息和物联网设备的标识信息至服务端,以便服务端认证。Step S203: Send the user information and the identifier information of the Internet of Things device to the server for the server to authenticate.
服务端可采用预设的算法,根据物联网设备的标识信息和用户信息生成认证信息。例如,以某种算法根据物联网设备的标识信息和用户信息生成唯一哈希值,以所述哈希值作为认证信息;再例如,根据物联网设备的标识信息和用户信息生成安全证书作为认证信息;等等。而后发送认证信息至客户端,以便于客户端传递认证信息给物联网设备。The server can generate the authentication information according to the identification information of the IoT device and the user information by using a preset algorithm. For example, an algorithm generates a unique hash value according to the identification information of the Internet of Things device and the user information, and uses the hash value as the authentication information; for example, generates a security certificate according to the identification information of the Internet of Things device and the user information as the authentication. Information; and so on. The authentication information is then sent to the client so that the client can pass the authentication information to the IoT device.
服务端后续可基于认证信息,验证试图连接的物联网设备是否合法。The server can subsequently verify whether the IoT device attempting to connect is legitimate based on the authentication information.
步骤S205,接收服务端返回的认证信息。Step S205, receiving authentication information returned by the server.
步骤S207,生成并发送携带所述认证信息的数据包,以便所述物联网设备从所述数据包获取所述认证信息用于连接服务端。Step S207: Generate and send a data packet carrying the authentication information, so that the IoT device acquires the authentication information from the data packet for connecting to the server.
所述的数据包可包括:用户数据报协议(User Datagram Protocol,UDP)数据包、传输控制协议(Transmission Control Protocol,TCP)数据包、或者自定义格式的数据包等。The data packet may include: a User Datagram Protocol (UDP) data packet, a Transmission Control Protocol (TCP) data packet, or a data packet in a custom format.
数据包通常包括头部和数据体。以UDP数据包为例,其头部包括源IP地址、目标IP地址、数据包长度以及校验和等字段。尚未配置的物联网设备未必能够解析UDP数据包的数据体内容,但是能够比较迅速地解析UDP数据包的头部内容,基于此,可将认证信息写入UDP数据包的头部,以保证物联网设备通过迅速解析,进而确实获取到认证信息。A packet usually includes a header and a data body. Taking a UDP packet as an example, the header includes fields such as a source IP address, a destination IP address, a packet length, and a checksum. The IoT device that has not been configured may not be able to parse the data body content of the UDP packet, but can parse the header content of the UDP packet relatively quickly. Based on this, the authentication information can be written into the header of the UDP packet to ensure the object. Networked devices can quickly obtain authentication information by quickly parsing them.
例如,UDP数据包的目标IP字段中,正常情形下应写入接收方的IP地址,以实现点对点传输。但在本实施例中,不再写入接收方的IP地址,而是将认证信息写入数据包的目标IP地址字段,以便物联网设备接收并解析该目标IP地址字段的内容,得到认证信息。For example, in the target IP field of a UDP packet, the IP address of the receiver should be written under normal circumstances to achieve point-to-point transmission. However, in this embodiment, the IP address of the receiver is not written, but the authentication information is written into the target IP address field of the data packet, so that the IoT device receives and parses the content of the target IP address field to obtain the authentication information. .
对于自定义格式的数据包,还可以预先将支持该自定义格式的协议写入物联网设备的协议栈中,以支持自定义格式数据包解析过程。在这种应用场景中,客户端根据需求将认证信息写入该数据包的头部和/或数据体中。For custom format packets, the protocol supporting the custom format can also be pre-written into the protocol stack of the IoT device to support the custom format packet parsing process. In this application scenario, the client writes authentication information to the header and/or data body of the packet as needed.
在实际应用中,单个数据包所能携带的信息量有限。当需要传输的认证信息较长时,可将认证信息拆分后写入数据包的指定字段(例如长度或者目标IP地址),生成多个携带部分认证信息的数据包。In practical applications, the amount of information that a single packet can carry is limited. When the authentication information to be transmitted is long, the authentication information may be split and written into a specified field (for example, a length or a target IP address) of the data packet to generate a plurality of data packets carrying partial authentication information.
进一步地,客户端可以在所连接的无线网络中的一个或者多个频道,对生成的数据包进行广播。在数据包广播过程中,探测这些频道的物联网设备可接收到该数据包。Further, the client can broadcast the generated data packet on one or more channels in the connected wireless network. During the packet broadcast process, the IoT device that probes these channels can receive the packet.
在一种具体实施方式下,在生成携带所述认证信息的数据包之前,还可以执行:获取目标网络信息。进而,对于步骤S207,生成携带所述认证信息的数据包,包括:生成携带所述认证信息和目标网络信息的数据包。In a specific implementation, before generating the data packet carrying the authentication information, performing: acquiring target network information. Further, in step S207, generating a data packet carrying the authentication information includes: generating a data packet carrying the authentication information and target network information.
所述的目标网络指物联网设备连接服务端时所基于的网络。目标网络可以由用户通过客户端进行指定,也可以由物联网设备基于预设规则自行确定(比如,自动扫描到可用的无密码WiFi网络作为目标网络)。以下各实施例主要基于前一种方式进行说明。The target network refers to a network on which an IoT device is connected when connecting to a server. The target network can be specified by the user through the client, or can be determined by the IoT device based on preset rules (for example, automatically scanning to an available passwordless WiFi network as the target network). The following embodiments are mainly explained based on the former method.
目标网络比如是客户端当前所连接的无线网络,或者是用户指定的另一无线网络等。The target network is, for example, a wireless network to which the client is currently connected, or another wireless network designated by the user.
目标网络信息一般包括目标网络的身份标识以及密码。对于WiFi网络,该身份标识具体为服务集标识(Service Set Identifier,SSID),即通常所说的WiFi名。当然,目标网络也可能没有密码。The target network information generally includes the identity of the target network and a password. For a WiFi network, the identity is specifically a Service Set Identifier (SSID), which is a so-called WiFi name. Of course, the target network may also have no password.
例如,用户终端本身通过WiFi网络M1连接至网络,但是希望购买的某 智能家居电器通过WiFi网络M5连接上网,网络M5的密码为000000。在这种场景下,目标网络信息包括目标网络的身份标识M5及其密码000000。For example, the user terminal itself is connected to the network through the WiFi network M1, but a smart home appliance that is desired to be purchased is connected to the Internet through the WiFi network M5, and the password of the network M5 is 000000. In this scenario, the target network information includes the identity identifier M5 of the target network and its password 000000.
若连接网络M5不需要密码,此时,目标网络信息包括目标网络身份标识M5即可。If the password is not required to connect to the network M5, the target network information includes the target network identity M5.
目标网络信息的获取方式可包括:客户端从本地获取,或者,由用户预先设定,输入至客户端等。The method for obtaining the target network information may include: obtaining the client locally, or pre-setting by the user, inputting to the client, and the like.
通过上述方案,客户端可将目标网络信息和认证信息一次性传递给物联网设备,简化了用户的操作。Through the above solution, the client can transmit the target network information and the authentication information to the Internet of Things device at one time, which simplifies the operation of the user.
在一种具体实施方式下,对于步骤S207,生成携带所述认证信息的数据包,可采用如下方法,如图3所示,图3为本说明书实施例提供的数据包生成方法流程示意图:In a specific implementation, for the step S207, the data packet carrying the authentication information is generated, and the following method may be used. As shown in FIG. 3, FIG. 3 is a schematic flowchart of a data packet generating method according to an embodiment of the present disclosure:
步骤S301,按照指定数据包字段的格式,对所述认证信息进行格式转换。Step S301: Perform format conversion on the authentication information according to a format of a specified data packet field.
数据包字段均有预设的格式,例如UDP数据包中的长度字段为0至255之间的数字。但是对于认证信息而言,其本身未必全都是数字,基于此,需要将认证信息转换为数据包指定字段所能接受的格式,才可写入该字段。The packet fields have a preset format, for example, the length field in the UDP packet is a number between 0 and 255. However, for the authentication information, it is not necessarily all numbers themselves. Based on this, the authentication information needs to be converted into a format acceptable for the data packet specifying field, and the field can be written.
具体地,可以利用一定的规则,将认证信息所对应的字节序列中的每个字节转换为该指定字段可接受的格式,再将转换格式后的认证信息写入所述数据包的长度或者目标IP地址字段。Specifically, each byte in the byte sequence corresponding to the authentication information may be converted into a format acceptable for the specified field by using a certain rule, and then the formatted authentication information is written into the length of the data packet. Or the destination IP address field.
例如,假定该规则为美国信息交换标准代码(American Standard Code fo r Information Interchange,ASCII)表。若认证信息为字符串“K2,”为将该认证信息写入UDP数据包的长度字段,则首先需要将“K2”转换为符合格式的数字。查询ASCII表可知,“K2”中包含的字符“K”对应的字节为01001011(二进制),用十进制表示为75,则75即为“K”转换得到的数字;类似地,“K2”中包含的字符“2”所对应的字节为00000010,用十进制数据表示为2,则2即为字符“2”转换得到的数字;因此,“K2”被转换为数字串752。For example, assume that the rule is an American Standard Code of Content Interchange (ASCII) table. If the authentication information is the string "K2," in order to write the authentication information into the length field of the UDP packet, it is first necessary to convert "K2" into a format-compliant number. By querying the ASCII table, the byte corresponding to the character "K" contained in "K2" is 010011011 (binary), and the decimal value is 75, then 75 is the number obtained by "K" conversion; similarly, in "K2" The byte corresponding to the included character "2" is 00000010, and is represented by decimal data as 2, and 2 is the number obtained by the conversion of the character "2"; therefore, "K2" is converted into the numeric string 752.
步骤S303,通过将格式转换后的认证信息写入相应的数据包字段,得到 携带所述认证信息的数据包;其中,所以指定数据包字段包括:数据包长度字段和/或目标IP地址字段。Step S303: The data packet carrying the authentication information is obtained by writing the formatted authentication information into the corresponding data packet field; wherein, the designated data packet field includes: a data packet length field and/or a target IP address field.
延续前例,若指定位置为长度位置,则可将75写入某个数据包的长度位置,将2写入下一个的数据包的长度位置。并依次发出。Continuing the previous example, if the specified position is the length position, 75 can be written to the length position of a certain packet, and 2 is written to the length position of the next data packet. And issued in turn.
若指定位置为目标IP地址,由于目标IP地址一般的格式为a.b.c.d,其中a、b、c、d均为0至255之间的数字(例如192.168.0.11),在实际应用中,还可采用如下的处理方式:将所述的数字,写入目标IP地址中的指定位置,例如:将数字写入目标IP地址的最后一位。If the specified location is the destination IP address, the general format of the destination IP address is abcd, where a, b, c, and d are numbers between 0 and 255 (for example, 192.168.0.11). In actual applications, The processing method is as follows: the digital number is written to a specified position in the target IP address, for example, the number is written to the last bit of the target IP address.
上面对客户端方面进行了说明,基于同样的思路,本说明书实施例提供的关于物联网设备的信息交互过程,对于服务端方面,如图4所示,图4为本说明书实施例提供的信息交互方案中服务端方面执行步骤的流程示意图,包括以下步骤:The client side is described above. Based on the same idea, the information exchange process of the IoT device provided by the embodiment of the present specification is as shown in FIG. 4 for the server side, and FIG. 4 is provided by the embodiment of the present specification. A schematic flow diagram of the steps performed by the server in the information interaction scheme, including the following steps:
步骤S401,接收客户端所发送的用户信息和物联网设备的标识信息;Step S401, receiving user information sent by the client and identification information of the Internet of Things device;
步骤S403,对所述用户信息和/或物联网设备的标识信息进行认证,得到认证信息并返回所述客户端。Step S403, performing authentication on the user information and/or the identifier information of the Internet of Things device, obtaining the authentication information, and returning to the client.
在实际应用场景中,服务端还可以执行:建立并存储所述物联网设备的标识信息和用户信息的绑定关系。例如,以键值对的形式建立所述物联网设备的标识信息和用户信息的一一对应关系,生成绑定记录并存储至服务端本地。In an actual application scenario, the server may further perform: establishing and storing a binding relationship between the identifier information of the IoT device and the user information. For example, a one-to-one correspondence between the identification information of the IoT device and the user information is established in the form of a key-value pair, and the binding record is generated and stored locally to the server.
进一步地,可以基于存储的绑定关系,执行相关的物联网业务。Further, the related Internet of Things service can be executed based on the stored binding relationship.
例如,某物联网设备正常联网工作时,可通过其携带的传感器收集信号并上传至服务端,服务端进行信号分析,并根据信号分析结果和存储的绑定关系,向所绑定的用户信息对应的客户端进行反馈。假定该物联网设备为智能手环,服务端接收该智能手环收集并发送的脉搏信号进行分析,发送脉搏信号分析结果至绑定的用户手机号,从而,用户可以随时了解佩戴该智能手环的人员的健康状态。For example, when an IoT device is working in normal networking, it can collect signals through the sensors it carries and upload it to the server. The server performs signal analysis and binds the user information according to the signal analysis result and the stored binding relationship. The corresponding client makes feedback. Assuming that the IoT device is a smart bracelet, the server receives the pulse signal collected and sent by the smart bracelet for analysis, and sends the pulse signal analysis result to the bound user mobile phone number, so that the user can know the wearing of the smart bracelet at any time. The health status of the personnel.
作为一种具体的实施方式,在所述得到认证信息并返回所述客户端之后, 还可以执行:接收所述物联网设备所发送的所述认证信息;基于所述认证信息,与所述物联网设备建立可信网络连接。As a specific implementation manner, after the obtaining the authentication information and returning to the client, performing: receiving the authentication information sent by the Internet of Things device; and based on the authentication information, A networked device establishes a trusted network connection.
具体地,服务端对物联网设备所发送的认证信息进行验证,验证通过后,与物联网设备建立可信网络连接。例如,对于认证信息,若生成后即保存于服务端,则在接收到物联网设备所发送的认证信息后,通过对接收的认证信息与本地存储的认证信息进行匹配,完成验证。又例如,若认证信息并未在服务端保存,可以根据预设的算法(比如,哈希算法等)验证该认证信息是否合法。Specifically, the server verifies the authentication information sent by the Internet of Things device, and after the verification is passed, establishes a trusted network connection with the Internet of Things device. For example, if the authentication information is stored in the server after being generated, after the authentication information sent by the IoT device is received, the authentication is completed by matching the received authentication information with the locally stored authentication information. For another example, if the authentication information is not saved on the server, the authentication information may be verified according to a preset algorithm (for example, a hash algorithm, etc.).
在实际应用中,验证认证信息可能只是建立可信网络连接的前提之一,除此之外,可能还要进行其他的信息处理动作,才能够建立可信网络连接。这些动作可能需要物联网设备和/或客户端提供其他信息。In practical applications, verifying authentication information may be one of the prerequisites for establishing a trusted network connection. In addition, other information processing actions may be required to establish a trusted network connection. These actions may require additional information from the IoT device and/or client.
所述的其他信息比如是:物联网设备的标识信息、位置信息等。通过识别物联网设备的标识信息,服务端在验证过程中能够同时识别出物联网设备是什么,并依据绑定关系获得该物联网设备对应的用户信息;类似地,通过获取物联网设备的位置信息,服务端能够对了解物联网设备在哪里,并基于位置执行业务。The other information is, for example, identification information, location information, and the like of the Internet of Things device. By identifying the identification information of the IoT device, the server can simultaneously identify what the IoT device is in the verification process, and obtain the user information corresponding to the IoT device according to the binding relationship; similarly, obtain the location of the IoT device. Information, the server can understand where the IoT device is and perform business based on location.
上面对服务端方面进行了说明,基于同样的思路,本说明书实施例提供的物联网物品信息交互方法,对于所述的服务端方面,如图5所示,图5为本说明书实施例提供的信息交互方案中物联网设备方面执行步骤的流程示意图,包括如下步骤:The server side is described above. Based on the same idea, the IoT item information interaction method provided by the embodiment of the present specification is as shown in FIG. 5 for the server side, and FIG. 5 is provided for the embodiment of the present specification. A schematic diagram of the flow of steps performed by the IoT device in the information interaction scheme, including the following steps:
步骤S501,获取客户端发送的携带认证信息的数据包,以及获取目标网络信息。Step S501: Acquire a data packet that carries the authentication information sent by the client, and acquire the target network information.
具体而言,可采用如下实施方式:对多个无线网络信号广播频道进行监听;当监听到客户端发送的携带认证信息的数据包时,获取该数据包。Specifically, the following embodiments may be adopted: monitoring multiple radio network signal broadcast channels; and acquiring the data packets carrying the authentication information sent by the client.
例如,物联网设备首先获取周围的多个无线网络信号广播频道,然后进行轮询(若只有一个则无需进行轮询),监听各频道中的数据包以确定所述无线网络信号广播频道。当数据包满足预设的条件时,即在当前的无线网络信号广 播频道中获取所述的数据包。例如,监听接收到的数据包头部是否含有预设的标记,若有,即确定为所述携带认证信息的数据包,并获取所述数据包。具体的确定条件可以有多种,此处不再一一列举。For example, an IoT device first acquires a plurality of surrounding wireless network signal broadcast channels, and then performs polling (if there is only one, no polling is required), and listens to data packets in each channel to determine the wireless network signal broadcast channel. When the data packet satisfies the preset condition, the data packet is acquired in the current wireless network signal broadcast channel. For example, it is monitored whether the received packet header contains a preset tag, and if so, it is determined as the packet carrying the authentication information, and the packet is acquired. There are a variety of specific determination conditions, which are not listed here.
对于所述获取目标网络信息,在实际应用场景中,作为一种可实施方式,物联网设备可从周围环境的WiFi网络中自行获取目标网络。例如,物联网设备轮询周围环境的WiFi网络,发现有某个公用WiFi网络不需要密码即可联网,此时,该公用WiFi网络即为所述的目标网络。For the acquisition target network information, in an actual application scenario, as an implementable manner, the Internet of Things device can obtain the target network from the WiFi network of the surrounding environment. For example, the Internet of Things device polls the WiFi network of the surrounding environment, and finds that a certain public WiFi network can be networked without a password. At this time, the public WiFi network is the target network.
作为另一种可实施方式,可通过获取客户端发送的携带认证信息和目标网络信息的数据包,从而获取所述目标网络信息。As another implementation manner, the target network information may be obtained by acquiring a data packet that is sent by the client and carries the authentication information and the target network information.
例如,用户通过家庭网络WiFi连接网络,并且指定物联网设备也从家庭网络WiFi联网,客户端自行获取所述的家庭网络的WiFi信息作为目标网络信息并写入数据包进行广播。此时,物联网设备可从接收到的数据包中获取目标网络信息(即所述家庭网络的WiFi信息)。For example, the user connects to the network through the home network WiFi, and specifies that the Internet of Things device is also connected from the home network WiFi, and the client obtains the WiFi information of the home network as the target network information and writes the data packet for broadcast. At this time, the IoT device can acquire the target network information (ie, the WiFi information of the home network) from the received data packet.
步骤S503,根据所述目标网络信息进行网络配置,以接入所述目标网络。Step S503, performing network configuration according to the target network information to access the target network.
步骤S505,根据所述认证信息和已接入的所述目标网络,与服务端建立可信网络连接。Step S505, establishing a trusted network connection with the server according to the authentication information and the target network that has been accessed.
即在已连接的目标网络中,发送所述认证信息至服务端,服务端验证该认证信息合法后,双方建立可信网络连接。That is, in the connected target network, the authentication information is sent to the server, and after the server verifies that the authentication information is legal, the two parties establish a trusted network connection.
作为一种具体的实施方式,在所述步骤S503,根据所述目标网络信息进行网络配置之前,还包括:基于预设的规则,对所述数据包的指定字段进行格式转换,获取所述认证信息。As a specific implementation manner, before performing the network configuration according to the target network information, the method further includes: performing format conversion on the specified field of the data packet, and acquiring the authentication, according to a preset rule. information.
例如,依次查询接收到的数据包的长度字段,获得数字75和2,按照ASCII表进行转换,并依次拼接起来获得认证信息为“K2”。For example, the length field of the received data packet is sequentially queried, the numbers 75 and 2 are obtained, converted according to the ASCII table, and spliced in order to obtain the authentication information as "K2".
本说明书实施例中,通过客户端上传物联网设备的标识信息和用户信息,服务端绑定并认证,进而,客户端将认证信息传递给物联网设备,实现物联网设备联网,降低了物联网设备配置过程中的交互次数,使得整个配置过程更加 简洁,减少用户的操作量,提升用户的使用体验。此外,客户端还可以将目标网络信息和认证信息一次性同时传递给物联网设备,进一步简化了用户的操作。In the embodiment of the present specification, the server uploads the identification information and the user information of the IoT device, and the server binds and authenticates, and then the client transmits the authentication information to the Internet of Things device to realize the networking of the Internet of Things device and reduce the Internet of Things. The number of interactions in the device configuration process makes the entire configuration process more concise, reducing the amount of user operations and improving the user experience. In addition, the client can also transmit the target network information and the authentication information to the IoT device at the same time, which further simplifies the user's operation.
基于同样的思路,本说明书实施例还提供一种关于物联网设备的信息交互装置,如图6所示,图6为本说明书实施例提供的客户端方面的信息交互装置结构示意图,包括:Based on the same idea, the embodiment of the present specification further provides an information interaction device for the Internet of Things device. As shown in FIG. 6 , FIG. 6 is a schematic structural diagram of an information interaction device on a client side according to an embodiment of the present disclosure, including:
获取模块601,获取用户信息和物联网设备的标识信息;The obtaining module 601 is configured to obtain user information and identifier information of the Internet of Things device;
发送模块603,发送所述用户信息和物联网设备的标识信息至服务端,以便服务端认证;The sending module 603 is configured to send the user information and the identifier information of the Internet of Things device to the server for the server to authenticate;
接收模块605,接收服务端返回的认证信息;The receiving module 605 receives the authentication information returned by the server.
生成模块607,生成携带所述认证信息的数据包;The generating module 607 is configured to generate a data packet carrying the authentication information.
所述发送模块603还用于,发送数据包,以便物联网设备从数据包获取认证信息用于连接服务端。The sending module 603 is further configured to send a data packet, so that the IoT device obtains the authentication information from the data packet for connecting to the server.
进一步地,所述获取模块601,通过对物联网设备进行扫描,获取物联网设备的标识信息;或者,接收用户手动输入的物联网设备的标识信息。Further, the obtaining module 601 obtains identification information of the Internet of Things device by scanning the Internet of Things device, or receives identification information of the IoT device manually input by the user.
进一步地,在生成携带所述认证信息的数据包之前,所述获取模块601还用于,获取目标网络信息;所述生成模块还用于,生成携带认证信息和目标网络信息的数据包。Further, before the generating the data packet carrying the authentication information, the acquiring module 601 is further configured to acquire target network information, where the generating module is further configured to generate a data packet that carries the authentication information and the target network information.
进一步地,所述生成模块607,按照指定数据包字段的格式,对认证信息进行格式转换;通过将格式转换后的认证信息写入相应的数据包字段,得到携带所述认证信息的数据包;其中,所以指定数据包字段包括:数据包长度字段和/或目标IP地址字段Further, the generating module 607 performs format conversion on the authentication information according to the format of the specified data packet field; and obtains the data packet carrying the authentication information by writing the formatted authentication information into the corresponding data packet field; Wherein, the specified packet field includes: a packet length field and/or a destination IP address field
进一步地,所述发送模块603,通过当前连接的无线网络广播所述数据包。Further, the sending module 603 broadcasts the data packet through a currently connected wireless network.
同时,本说明书实施例还提供一种关于物联网设备的信息交互装置,如图7所示,图7为本说明书实施例提供的服务端方面的信息交互装置结构示意图, 包括:In the meantime, the embodiment of the present specification further provides an information interaction device for the Internet of Things device. As shown in FIG. 7 , FIG. 7 is a schematic structural diagram of an information interaction device of a server according to an embodiment of the present disclosure, including:
接收模块701,接收客户端所发送的物联网设备的标识信息和用户信息;The receiving module 701 receives identification information and user information of the Internet of Things device sent by the client;
认证模块703,对所述用户信息和/或物联网设备的标识信息进行认证,得到认证信息;The authentication module 703 performs authentication on the user information and/or the identifier information of the Internet of Things device to obtain authentication information.
发送模块705,发送所述认证信息至客户端。The sending module 705 sends the authentication information to the client.
进一步的,所述装置还包括:建立模块707,建立所述物联网设备的标识信息和用户信息的绑定关系,以用于执行涉及所述物联网设备和所述用户信息的物联网业务;存储模块709,存储所述绑定关系。Further, the device further includes: an establishing module 707, establishing a binding relationship between the identifier information of the Internet of Things device and the user information, for performing an Internet of Things service related to the Internet of Things device and the user information; The storage module 709 stores the binding relationship.
进一步地,所述得到认证信息并返回所述客户端之后,所述接收模块701,接收所述物联网设备所发送的所述认证信息,基于所述认证信息,与所述物联网设备建立可信网络连接。After the authentication information is obtained and returned to the client, the receiving module 701 receives the authentication information sent by the Internet of Things device, and establishes with the Internet of Things device based on the authentication information. Letter network connection.
同时,本说明书实施例还提供一种关于物联网设备的信息交互装置,如图8所示,图8为本说明书实施例提供的物联网设备方面的信息交互装置结构示意图,包括:In the meantime, the embodiment of the present specification further provides an information interaction device for the Internet of Things device. As shown in FIG. 8 , FIG. 8 is a schematic structural diagram of an information interaction device of the Internet of Things device according to an embodiment of the present disclosure, including:
获取模块801,获取客户端发送的携带认证信息的数据包,以及获取目标网络信息;The obtaining module 801 is configured to obtain a data packet that is sent by the client and that carries the authentication information, and obtain the target network information.
网络配置模块803,根据所述目标网络信息进行网络配置,以接入所述目标网络;The network configuration module 803 performs network configuration according to the target network information to access the target network.
连接模块805,根据所述认证信息和已接入的所述目标网络,与服务端建立可信网络连接。The connection module 805 establishes a trusted network connection with the server according to the authentication information and the target network that has been accessed.
进一步地,所述获取模块801,获取客户端发送的携带认证信息和目标网络信息的数据包,所述目标网络信息包括客户端当前连接的WiFi网络的信息Further, the acquiring module 801 is configured to acquire a data packet that carries the authentication information and the target network information that is sent by the client, where the target network information includes information about a WiFi network that the client currently connects.
进一步地,所述获取模块801,对多个无线网络信号广播频道进行监听,当监听到客户端发送的携带认证信息的数据包时,获取该数据包。Further, the obtaining module 801 monitors a plurality of wireless network signal broadcast channels, and acquires the data packet when the data packet carrying the authentication information sent by the client is monitored.
进一步地,所述获取模块801,基于预设的规则,对所述数据包的指定字段进行格式转换,获取所述认证信息。Further, the obtaining module 801 performs format conversion on the specified field of the data packet according to a preset rule, and acquires the authentication information.
对应地,本说明书还提供一种关于物联网设备的信息交互设备,包括:Correspondingly, the present specification further provides an information interaction device for an Internet of Things device, including:
存储器,用于存储物联网设备联网程序;a memory for storing an Internet of Things device networking program;
处理器,调用存储器中的物联网设备联网程序,并执行:The processor calls the IoT device networking program in the memory and executes:
获取用户信息和物联网设备的标识信息;Obtaining user information and identification information of the Internet of Things device;
发送所述用户信息和物联网设备的标识信息至服务端,以便服务端认证;Sending the user information and the identification information of the Internet of Things device to the server for server authentication;
接收服务端返回的认证信息;Receiving the authentication information returned by the server;
生成并发送携带所述认证信息的数据包,以便所述物联网设备从所述数据包获取所述认证信息用于连接服务端。Generating and transmitting a data packet carrying the authentication information, so that the IoT device acquires the authentication information from the data packet for connecting to a server.
对应地,本说明书还提供另一种关于物联网设备的信息交互设备,所述设备包括:Correspondingly, the present specification further provides another information interaction device for an Internet of Things device, the device comprising:
存储器,用于存储物联网设备联网程序;a memory for storing an Internet of Things device networking program;
处理器,调用存储器中的物联网设备联网程序,并执行:The processor calls the IoT device networking program in the memory and executes:
接收客户端所发送的用户信息和物联网设备的标识信息;Receiving user information sent by the client and identification information of the Internet of Things device;
对所述用户信息和/或物联网设备的标识信息进行认证,得到认证信息并返回所述客户端。The user information and/or the identification information of the Internet of Things device is authenticated, the authentication information is obtained, and the client is returned.
对应地,本说明书还提供再一种关于物联网设备的信息交互设备,所述设备为物联网物品本身,包括:Correspondingly, the present specification further provides an information interaction device for the Internet of Things device, which is the Internet of Things item itself, and includes:
存储器,用于存储物联网设备联网程序;a memory for storing an Internet of Things device networking program;
处理器,调用存储器中的物联网设备联网程序,并执行The processor calls the IoT device networking program in the memory and executes
获取客户端发送的携带认证信息的数据包,以及获取目标网络信息;Obtaining a data packet that is sent by the client and carrying the authentication information, and acquiring the target network information;
根据所述目标网络信息进行网络配置,以接入所述目标网络;Performing network configuration according to the target network information to access the target network;
根据所述认证信息和已接入的所述目标网络,与服务端建立可信网络连接。Establishing a trusted network connection with the server according to the authentication information and the target network that has been accessed.
基于同样的思路,本说明书实施例还提供一种非易失性计算机存储介质,存储有计算机可执行指令,所述计算机可执行指令设置为:Based on the same idea, the embodiment of the present specification further provides a non-volatile computer storage medium, where computer executable instructions are stored, and the computer executable instructions are set as:
发送所述用户信息和物联网设备的标识信息至服务端,以便服务端认证;Sending the user information and the identification information of the Internet of Things device to the server for server authentication;
接收服务端返回的认证信息;Receiving the authentication information returned by the server;
生成并发送携带所述认证信息的数据包,以便所述物联网设备从所述数据包获取所述认证信息用于连接服务端。Generating and transmitting a data packet carrying the authentication information, so that the IoT device acquires the authentication information from the data packet for connecting to a server.
对应的,本说明书实施例还提供另一种非易失性计算机存储介质,存储有计算机可执行指令,所述计算机可执行指令设置为:Correspondingly, the embodiment of the present specification further provides another non-volatile computer storage medium, where computer executable instructions are stored, and the computer executable instructions are set as:
接收客户端所发送的用户信息和物联网设备的标识信息;Receiving user information sent by the client and identification information of the Internet of Things device;
对所述用户信息和/或物联网设备的标识信息进行认证,得到认证信息并返回所述客户端。The user information and/or the identification information of the Internet of Things device is authenticated, the authentication information is obtained, and the client is returned.
对应的,本说明书实施例还提供再一种非易失性计算机存储介质,存储有计算机可执行指令,所述计算机可执行指令设置为:Correspondingly, the embodiment of the present specification further provides a non-volatile computer storage medium storing computer executable instructions, where the computer executable instructions are set as:
获取客户端发送的携带认证信息的数据包,以及获取目标网络信息;Obtaining a data packet that is sent by the client and carrying the authentication information, and acquiring the target network information;
根据所述目标网络信息进行网络配置,以接入所述目标网络;Performing network configuration according to the target network information to access the target network;
根据所述认证信息和已接入的所述目标网络,与服务端建立可信网络连接。Establishing a trusted network connection with the server according to the authentication information and the target network that has been accessed.
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于装置、设备和介质类实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可,这里就不再一一赘述。The various embodiments in the specification are described in a progressive manner, and the same or similar parts between the various embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the device, the device, and the media type embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant parts can be referred to the description of the method embodiment, which will not be repeated here.
上述对本说明书特定实施例进行了描述。其它实施例在所附权利要求书的范围内。在一些情况下,在权利要求书中记载的动作或步骤或模块可以按照不同于实施例中的顺序来执行并且仍然可以实现期望的结果。另外,在附图中描绘的过程不一定要求示出的特定顺序或者连续顺序才能实现期望的结果。在某些实施方式中,多任务处理和并行处理也是可以的或者可能是有利的。The foregoing description of the specific embodiments of the specification has been described. Other embodiments are within the scope of the following claims. In some cases, the acts or steps or modules recited in the claims can be performed in a different order than in the embodiments and the desired results can still be achieved. In addition, the processes depicted in the figures are not necessarily in a particular order or in a sequential order to achieve the desired results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
在20世纪90年代,对于一个技术的改进可以很明显地区分是硬件上的改进(例如,对二极管、晶体管、开关等电路结构的改进)还是软件上的改进(对于方法流程的改进)。然而,随着技术的发展,当今的很多方法流程的改进已经可以视为硬件电路结构的直接改进。设计人员几乎都通过将改进的方法流程编程到硬件电路中来得到相应的硬件电路结构。因此,不能说一个方法流程的改进就不能用硬件实体模块来实现。例如,可编程逻辑器件(Programmable Logic Device,PLD)(例如现场可编程门阵列(Field Programmable Gate Array,FPGA))就是这样一种集成电路,其逻辑功能由用户对器件编程来确定。由设计人员自行编程来把一个数字系统“集成”在一片PLD上,而不需要请芯片制造厂商来设计和制作专用的集成电路芯片。而且,如今,取代手工地制作集成电路芯片,这种编程也多半改用“逻辑编译器(logic compiler)”软件来实现,它与程序开发撰写时所用的软件编译器相类似,而要编译之前的原始代码也得用特定的编程语言来撰写,此称之为硬件描述语言(Hardware Description Language,HDL),而HDL也并非仅有一种,而是有许多种,如ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language)等,目前最普遍使用的是VHDL(Very-High-Speed Integrated Circuit Hardware Description Language)与Verilog。本领域技术人员也应该清楚,只需要将方法流程用上述几种硬件描述语言稍作逻辑编程并编程到集成电路中,就可以很容易得到实现该逻辑方法流程的硬件电路。In the 1990s, improvements to a technology could clearly distinguish between hardware improvements (eg, improvements to circuit structures such as diodes, transistors, switches, etc.) or software improvements (for process flow improvements). However, as technology advances, many of today's method flow improvements can be seen as direct improvements in hardware circuit architecture. Designers almost always get the corresponding hardware circuit structure by programming the improved method flow into the hardware circuit. Therefore, it cannot be said that the improvement of a method flow cannot be implemented by hardware entity modules. For example, a Programmable Logic Device (PLD) (such as a Field Programmable Gate Array (FPGA)) is an integrated circuit whose logic function is determined by the user programming the device. Designers can program themselves to "integrate" a digital system on a single PLD without having to ask the chip manufacturer to design and fabricate a dedicated integrated circuit chip. Moreover, today, instead of manually making integrated circuit chips, this programming is mostly implemented using "logic compiler" software, which is similar to the software compiler used in programming development, but before compiling The original code has to be written in a specific programming language. This is called the Hardware Description Language (HDL). HDL is not the only one, but there are many kinds, such as ABEL (Advanced Boolean Expression Language). AHDL (Altera Hardware Description Language), Confluence, CUPL (Cornell University Programming Language), HDCal, JHDL (Java Hardware Description Language), Lava, Lola, MyHDL, PALASM, RHDL (Ruby Hardware Description Language), etc., are currently the most commonly used VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) and Verilog. It should also be apparent to those skilled in the art that the hardware flow for implementing the logic method flow can be easily obtained by simply programming the method flow into the integrated circuit with a few hardware description languages.
控制器可以按任何适当的方式实现,例如,控制器可以采取例如微处理器或处理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式,控制器 的例子包括但不限于以下微控制器:ARC 625D、Atmel AT91SAM、Microchip PIC18F26K20以及Silicone Labs C8051F320,存储器控制器还可以被实现为存储器的控制逻辑的一部分。本领域技术人员也知道,除了以纯计算机可读程序代码方式实现控制器以外,完全可以通过将方法步骤进行逻辑编程来使得控制器以逻辑门、开关、专用集成电路、可编程逻辑控制器和嵌入微控制器等的形式来实现相同功能。因此这种控制器可以被认为是一种硬件部件,而对其内包括的用于实现各种功能的装置也可以视为硬件部件内的结构。或者甚至,可以将用于实现各种功能的装置视为既可以是实现方法的软件模块又可以是硬件部件内的结构。The controller can be implemented in any suitable manner, for example, the controller can take the form of, for example, a microprocessor or processor and a computer readable medium storing computer readable program code (eg, software or firmware) executable by the (micro)processor. In the form of logic gates, switches, application specific integrated circuits (ASICs), programmable logic controllers, and embedded microcontrollers, examples of controllers include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, The Microchip PIC18F26K20 and the Silicone Labs C8051F320, the memory controller can also be implemented as part of the memory's control logic. Those skilled in the art will also appreciate that in addition to implementing the controller in purely computer readable program code, the controller can be logically programmed by means of logic gates, switches, ASICs, programmable logic controllers, and embedding. The form of a microcontroller or the like to achieve the same function. Such a controller can therefore be considered a hardware component, and the means for implementing various functions included therein can also be considered as a structure within the hardware component. Or even a device for implementing various functions can be considered as a software module that can be both a method of implementation and a structure within a hardware component.
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机。具体的,计算机例如可以为个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任何设备的组合。The system, device, module or unit illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product having a certain function. A typical implementation device is a computer. Specifically, the computer can be, for example, a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or A combination of any of these devices.
为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本说明书实施例时可以把各单元的功能在同一个或多个软件和/或硬件中实现。For the convenience of description, the above devices are described separately by function into various units. Of course, the functions of the various units may be implemented in one or more software and/or hardware when implementing embodiments of the present specification.
本领域内的技术人员应明白,本发明的实施例可提供为方法、系统、或计算机程序产品。因此,本发明可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art will appreciate that embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
本发明是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入 式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (system), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or FIG. These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing device to produce a machine for the execution of instructions for execution by a processor of a computer or other programmable data processing device. Means for implementing the functions specified in one or more of the flow or in a block or blocks of the flow chart.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。The computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device. The apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device. The instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。The memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory. Memory is an example of a computer readable medium.
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信编号和载波。Computer readable media includes both permanent and non-persistent, removable and non-removable media. Information storage can be implemented by any method or technology. The information can be computer readable instructions, data structures, modules of programs, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape storage or other magnetic storage devices or any other non-transportable media can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include temporary storage computer readable media, such as modulated data signal numbers and carrier waves.
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。It is also to be understood that the terms "comprises" or "comprising" or "comprising" or any other variations are intended to encompass a non-exclusive inclusion, such that a process, method, article, Other elements not explicitly listed, or elements that are inherent to such a process, method, commodity, or equipment. An element defined by the phrase "comprising a ..." does not exclude the presence of additional equivalent elements in the process, method, item, or device including the element.
本领域技术人员应明白,本说明书中一个或多个的实施例可提供为方法、系统或计算机程序产品。因此,本说明书实施例可采用完全硬件实施例、完全软件实施例或结合软件和硬件方面的形式。而且,本说明书实施例可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art will appreciate that one or more embodiments of the present specification can be provided as a method, system, or computer program product. Thus, embodiments of the present specification can take the form of an entirely hardware embodiment, an entirely software embodiment or a combination of software and hardware. Moreover, embodiments of the present specification can take the form of a computer program product embodied on one or more computer usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
本说明书实施例可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定事务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本说明书实施例,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行事务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。Embodiments of the present description can be described in the general context of computer-executable instructions executed by a computer, such as a program module. Generally, program modules include routines, programs, objects, components, data structures, and the like that perform particular transactions or implement particular abstract data types. Embodiments of the present specification may also be practiced in distributed computing environments where transactions are performed by remote processing devices that are connected through a communication network. In a distributed computing environment, program modules can be located in both local and remote computer storage media including storage devices.
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于系统实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。The various embodiments in the specification are described in a progressive manner, and the same or similar parts between the various embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant parts can be referred to the description of the method embodiment.
以上所述仅为本说明书实施例而已,并不用于限制本申请。对于本领域技术人员来说,本说明书实施例可以有各种更改和变化。凡在本说明书实施例的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本申请的权利范围之中。The above description is only for the embodiments of the present specification, and is not intended to limit the application. Various modifications and changes may be made to the embodiments of the present disclosure. Any modifications, equivalents, improvements, etc. made within the spirit and scope of the embodiments of the present invention are intended to be included in the scope of the present application.
Claims (27)
- 一种关于物联网设备的信息交互方法,包括:A method for information interaction of an Internet of Things device, comprising:获取用户信息和物联网设备的标识信息;Obtaining user information and identification information of the Internet of Things device;发送所述用户信息和物联网设备的标识信息至服务端,以便服务端认证;Sending the user information and the identification information of the Internet of Things device to the server for server authentication;接收服务端返回的认证信息;Receiving the authentication information returned by the server;生成并发送携带所述认证信息的数据包,以便所述物联网设备从所述数据包获取所述认证信息用于连接服务端。Generating and transmitting a data packet carrying the authentication information, so that the IoT device acquires the authentication information from the data packet for connecting to a server.
- 如权利要求1所述的方法,所述获取物联网设备的标识信息,包括:The method of claim 1, wherein the obtaining identification information of the Internet of Things device comprises:通过对物联网设备进行扫描,获取所述物联网设备的标识信息;或者,Obtaining identification information of the IoT device by scanning the IoT device; or接收用户手动输入的所述物联网设备的标识信息。Receiving identification information of the IoT device manually input by a user.
- 如权利要求1所述的方法,所述生成携带所述认证信息的数据包之前,包括:The method of claim 1, before the generating the data packet carrying the authentication information, the method comprises:获取目标网络信息;Obtain target network information;所述生成携带所述认证信息的数据包,包括:生成携带所述认证信息和所述目标网络信息的数据包。The generating the data packet carrying the authentication information includes: generating a data packet carrying the authentication information and the target network information.
- 如权利要求1所述的方法,所述生成携带所述认证信息的数据包,包括:The method of claim 1, the generating a data packet carrying the authentication information, comprising:按照指定数据包字段的格式,对所述认证信息进行格式转换;Formatting the authentication information according to the format of the specified data packet field;通过将格式转换后的认证信息写入相应的数据包字段,得到携带所述认证信息的数据包;The data packet carrying the authentication information is obtained by writing the formatted authentication information into a corresponding data packet field.其中,所以指定数据包字段包括:数据包长度字段和/或目标IP地址字段。Wherein, the specified packet field includes: a packet length field and/or a destination IP address field.
- 如权利要求1所述的方法,所述发送所述数据包,包括:The method of claim 1, the transmitting the data packet, comprising:通过当前连接的无线网络广播所述数据包。The data packet is broadcast over the currently connected wireless network.
- 一种关于物联网设备的信息交互方法,包括:A method for information interaction of an Internet of Things device, comprising:接收客户端所发送的用户信息和物联网设备的标识信息;Receiving user information sent by the client and identification information of the Internet of Things device;对所述用户信息和/或物联网设备的标识信息进行认证,得到认证信息并返回所述客户端。The user information and/or the identification information of the Internet of Things device is authenticated, the authentication information is obtained, and the client is returned.
- 如权利要求6所述的方法,还包括:The method of claim 6 further comprising:建立并存储所述物联网设备的标识信息和用户信息的绑定关系,以用于执行涉及所述物联网设备和所述用户信息的物联网业务。Establishing and storing a binding relationship between the identification information of the IoT device and the user information for performing an Internet of Things service related to the IoT device and the user information.
- 如权利要求6所述的方法,所述得到认证信息并返回所述客户端之后,还包括:The method of claim 6, after the obtaining the authentication information and returning to the client, further comprising:接收所述物联网设备所发送的所述认证信息;Receiving the authentication information sent by the Internet of Things device;基于所述认证信息,与所述物联网设备建立可信网络连接。Establishing a trusted network connection with the IoT device based on the authentication information.
- 一种关于物联网设备的信息交互方法,包括:A method for information interaction of an Internet of Things device, comprising:获取客户端发送的携带认证信息的数据包,以及获取目标网络信息;Obtaining a data packet that is sent by the client and carrying the authentication information, and acquiring the target network information;根据所述目标网络信息进行网络配置,以接入所述目标网络;Performing network configuration according to the target network information to access the target network;根据所述认证信息和已接入的所述目标网络,与服务端建立可信网络连接。Establishing a trusted network connection with the server according to the authentication information and the target network that has been accessed.
- 如权利要求9所述的方法,所述获取客户端发送的携带认证信息的数据包,以及获取目标网络信息,包括:The method of claim 9, the obtaining a data packet carrying the authentication information sent by the client, and acquiring the target network information, including:获取客户端发送的携带认证信息和目标网络信息的数据包;Obtaining a data packet that is sent by the client and carries the authentication information and the target network information;所述目标网络信息包括客户端当前连接的WiFi网络的信息。The target network information includes information of a WiFi network to which the client is currently connected.
- 如权利要求9所述的方法,所述获取客户端发送的携带认证信息的数据包,包括:The method of claim 9, wherein the obtaining a data packet that is sent by the client and carrying the authentication information comprises:对多个无线网络信号广播频道进行监听;Monitoring multiple wireless network signal broadcast channels;当监听到客户端发送的携带认证信息的数据包时,获取该数据包。When the packet carrying the authentication information sent by the client is monitored, the packet is acquired.
- 如权利要求9所述的方法,所述根据所述目标网络信息进行网络配置之前,包括:The method of claim 9, before the network configuration according to the target network information, the method comprises:基于预设的规则,对所述数据包的指定字段进行格式转换,获取所述认证信息。And performing format conversion on the specified field of the data packet to obtain the authentication information.
- 一种关于物联网设备的信息交互装置,包括:An information interaction device for an Internet of Things device, comprising:获取模块,获取用户信息和物联网设备的标识信息;Obtaining a module to obtain user information and identification information of the Internet of Things device;发送模块,发送所述用户信息和物联网设备的标识信息至服务端,以便服务端认证;a sending module, sending the user information and the identifier information of the Internet of Things device to the server for the server to authenticate;接收模块,接收服务端返回的认证信息;Receiving module, receiving the authentication information returned by the server;生成模块,生成携带所述认证信息的数据包;Generating a module, and generating a data packet carrying the authentication information;所述发送模块还用于,发送所述数据包,以便所述物联网设备从所述数据包获取所述认证信息用于连接服务端。The sending module is further configured to send the data packet, so that the IoT device obtains the authentication information from the data packet for connecting to a server.
- 如权利要求13所述的装置,所述获取模块,通过对物联网设备进行扫描,获取所述物联网设备的标识信息;或者,接收用户手动输入的所述物联网设备的标识信息。The device of claim 13, wherein the acquiring module acquires the identification information of the Internet of Things device by scanning the Internet of Things device; or receiving the identification information of the Internet of Things device manually input by the user.
- 如权利要求13所述的装置,在生成携带所述认证信息的数据包之前,所述获取模块还用于,获取目标网络信息;所述生成模块还用于,生成携带所述认证信息和目标网络信息的数据包。The apparatus according to claim 13, wherein the obtaining module is further configured to: acquire target network information before generating the data packet carrying the authentication information; and the generating module is further configured to generate the carrying the authentication information and the target A packet of network information.
- 如权利要求13所述的装置,所述生成模块,按照指定数据包字段的格式,对所述认证信息进行格式转换;通过将格式转换后的认证信息写入相应的数据包字段,得到携带所述认证信息的数据包;其中,所以指定数据包字段包括:数据包长度字段和/或目标IP地址字段。The apparatus according to claim 13, wherein the generating module performs format conversion on the authentication information according to a format of a specified data packet field; and writes the formatted converted authentication information into a corresponding data packet field to obtain a carrying place. A packet of authentication information; wherein, the specified packet field includes: a packet length field and/or a destination IP address field.
- 如权利要求13所述的装置,所述发送模块,通过当前连接的无线网络广播所述数据包。The apparatus of claim 13, the transmitting module to broadcast the data packet over a currently connected wireless network.
- 一种关于物联网设备的信息交互装置,包括:An information interaction device for an Internet of Things device, comprising:接收模块,接收客户端所发送的物联网设备的标识信息和用户信息;Receiving module, receiving identification information and user information of the IoT device sent by the client;认证模块,对所述用户信息和/或物联网设备的标识信息进行认证,得到认证信息;An authentication module that authenticates the user information and/or the identifier information of the Internet of Things device to obtain authentication information;发送模块,发送所述认证信息至客户端。The sending module sends the authentication information to the client.
- 如权利要求18所述的装置,还包括:建立模块,建立所述物联网设备的标识信息和用户信息的绑定关系,以用于执行涉及所述物联网设备和所述用户信息的物联网业务;存储模块,存储所述绑定关系。The apparatus according to claim 18, further comprising: an establishing module, establishing a binding relationship between the identification information of the Internet of Things device and the user information, for performing an Internet of Things related to the IoT device and the user information a storage module that stores the binding relationship.
- 如权利要求19所述的装置,得到认证信息并返回所述客户端之后,所述接收模块,接收所述物联网设备所发送的所述认证信息,基于所述认证信息,与所述物联网设备建立可信网络连接。The device of claim 19, after obtaining the authentication information and returning to the client, the receiving module receiving the authentication information sent by the Internet of Things device, and the Internet of Things based on the authentication information The device establishes a trusted network connection.
- 一种关于物联网设备的信息交互装置,包括:An information interaction device for an Internet of Things device, comprising:获取模块,获取客户端发送的携带认证信息的数据包,以及获取目标网络信息;Obtaining a module, acquiring a data packet that is sent by the client and carrying the authentication information, and acquiring the target network information;网络配置模块,根据所述目标网络信息进行网络配置,以接入所述目标网络;a network configuration module, configured to perform network configuration according to the target network information, to access the target network;连接模块,根据所述认证信息和已接入的所述目标网络,与服务端建立可信网络连接。The connection module establishes a trusted network connection with the server according to the authentication information and the target network that has been accessed.
- 如权利要求21所述的装置,所述获取模块,获取客户端发送的携带认证信息和目标网络信息的数据包,所述目标网络信息包括客户端当前连接的WiFi网络的信息。The apparatus according to claim 21, wherein the acquiring module acquires a data packet that is sent by the client and carries the authentication information and the target network information, where the target network information includes information of a WiFi network to which the client is currently connected.
- 如权利要求21所述的装置,所述获取模块,对多个无线网络信号广播频道进行监听,当监听到客户端发送的携带认证信息的数据包时,获取该数据包。The apparatus according to claim 21, wherein the acquiring module monitors a plurality of wireless network signal broadcast channels, and acquires the data packet when the data packet carrying the authentication information sent by the client is monitored.
- 如权利要求21所述的装置,所述获取模块,基于预设的规则,对所述数据包的指定字段进行格式转换,获取所述认证信息。The device of claim 21, the obtaining module, according to a preset rule, performing format conversion on a specified field of the data packet to obtain the authentication information.
- 一种关于物联网设备的信息交互设备,包括:An information interaction device for an Internet of Things device, comprising:存储器,用于存储物联网设备联网程序;a memory for storing an Internet of Things device networking program;处理器,调用存储设备中的物联网设备联网程序,并执行:The processor calls the IoT device networking program in the storage device and executes:获取用户信息和物联网设备的标识信息;Obtaining user information and identification information of the Internet of Things device;发送所述用户信息和物联网设备的标识信息至服务端,以便服务端认证;Sending the user information and the identification information of the Internet of Things device to the server for server authentication;接收服务端返回的认证信息;Receiving the authentication information returned by the server;生成并发送携带所述认证信息的数据包,以便所述物联网设备从所述数据包获取所述认证信息用于连接服务端。Generating and transmitting a data packet carrying the authentication information, so that the IoT device acquires the authentication information from the data packet for connecting to a server.
- 一种关于物联网设备的信息交互设备,包括:An information interaction device for an Internet of Things device, comprising:存储器,用于存储物联网设备联网程序;a memory for storing an Internet of Things device networking program;处理器,调用存储器中的物联网设备联网程序,并执行:The processor calls the IoT device networking program in the memory and executes:接收客户端所发送的用户信息和物联网设备的标识信息;Receiving user information sent by the client and identification information of the Internet of Things device;对所述用户信息和/或物联网设备的标识信息进行认证,得到认证信息并返回所述客户端。The user information and/or the identification information of the Internet of Things device is authenticated, the authentication information is obtained, and the client is returned.
- 一种关于物联网设备的信息交互设备,所述设备为物联网设备本身,包括:An information interaction device for an Internet of Things device, which is an IoT device itself, and includes:存储器,用于存储物联网设备联网程序;a memory for storing an Internet of Things device networking program;处理器,调用存储设备中的物联网设备联网程序,并执行a processor that calls an IoT device networking program in the storage device and executes获取客户端发送的携带认证信息的数据包,以及获取目标网络信息;Obtaining a data packet that is sent by the client and carrying the authentication information, and acquiring the target network information;根据所述目标网络信息进行网络配置,以接入所述目标网络;Performing network configuration according to the target network information to access the target network;根据所述认证信息和已接入的所述目标网络,与服务端建立可信网络连接。Establishing a trusted network connection with the server according to the authentication information and the target network that has been accessed.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710839411.3A CN107612909B (en) | 2017-09-18 | 2017-09-18 | Information interaction method, device and equipment about Internet of things equipment |
CN201710839411.3 | 2017-09-18 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019052532A1 true WO2019052532A1 (en) | 2019-03-21 |
Family
ID=61060735
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/105673 WO2019052532A1 (en) | 2017-09-18 | 2018-09-14 | Information interaction method, apparatus and device for internet of things device |
Country Status (3)
Country | Link |
---|---|
CN (2) | CN112217831B (en) |
TW (1) | TWI719312B (en) |
WO (1) | WO2019052532A1 (en) |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111400032A (en) * | 2020-03-02 | 2020-07-10 | 杭州迪普信息技术有限公司 | Resource allocation method and device |
CN111967269A (en) * | 2020-08-13 | 2020-11-20 | 支付宝(杭州)信息技术有限公司 | Business risk identification method and device and electronic equipment |
CN111985201A (en) * | 2020-08-19 | 2020-11-24 | 支付宝(杭州)信息技术有限公司 | Data processing rule generation method and device and electronic equipment |
CN112287376A (en) * | 2020-11-20 | 2021-01-29 | 支付宝(杭州)信息技术有限公司 | Method and device for processing private data |
CN112416545A (en) * | 2020-11-04 | 2021-02-26 | 北京五八信息技术有限公司 | Task processing method and device |
CN112468567A (en) * | 2020-10-22 | 2021-03-09 | 杭州智尔科技有限公司 | Internet of things data transmission method and device and electronic equipment |
CN113037736A (en) * | 2021-03-02 | 2021-06-25 | 四川九州电子科技股份有限公司 | Authentication method, device, system and computer storage medium |
EP3873053A1 (en) * | 2020-02-25 | 2021-09-01 | Beijing Xiaomi Mobile Software Co., Ltd. | Device network configuration method and apparatus, and medium |
CN113726796A (en) * | 2021-08-31 | 2021-11-30 | 平安国际智慧城市科技股份有限公司 | Data interaction method, device, equipment and medium based on medical Internet of things |
CN113949586A (en) * | 2020-12-22 | 2022-01-18 | 技象科技(浙江)有限公司 | Distributed efficient Internet of things equipment access system |
CN113989423A (en) * | 2021-09-27 | 2022-01-28 | 广州三七网络科技有限公司 | Digital asset manufacturing method, apparatus, computer device and storage medium |
WO2022041472A1 (en) * | 2020-08-31 | 2022-03-03 | Oppo广东移动通信有限公司 | Network distribution method and apparatus, and device and storage medium |
CN114158043A (en) * | 2021-11-11 | 2022-03-08 | 珠海格力电器股份有限公司 | Network distribution method, system and storage medium |
CN114449484A (en) * | 2022-01-29 | 2022-05-06 | 支付宝(杭州)信息技术有限公司 | Management method and device for vehicle-mounted equipment and equipment |
CN114666255A (en) * | 2022-03-16 | 2022-06-24 | 京东科技信息技术有限公司 | Method for testing distribution network performance of Internet of things equipment and related equipment thereof |
CN114866993A (en) * | 2021-03-16 | 2022-08-05 | 浙江绍兴苏泊尔生活电器有限公司 | Method and device for accessing household electrical appliance to network and household electrical appliance |
CN114866576A (en) * | 2022-04-02 | 2022-08-05 | 广东新邦智联科技有限公司 | Power equipment management method, device, equipment and storage medium based on Internet of things |
CN114928475A (en) * | 2022-04-25 | 2022-08-19 | 浪潮工业互联网股份有限公司 | Industrial equipment authentication method, equipment and medium based on identification analysis |
CN115022353A (en) * | 2021-03-05 | 2022-09-06 | 阿里巴巴新加坡控股有限公司 | Network connection method, device and system of intelligent equipment |
CN115277240A (en) * | 2022-08-03 | 2022-11-01 | 河海大学 | Authentication method and device for Internet of things equipment |
CN115767508A (en) * | 2022-10-21 | 2023-03-07 | 浙江华樽科技有限公司 | Mobile terminal user binding method and device, computer equipment and storage medium |
CN116089380A (en) * | 2023-04-10 | 2023-05-09 | 宇动源(北京)信息技术有限公司 | Building data and Internet of things data binding method and system |
Families Citing this family (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112217831B (en) * | 2017-09-18 | 2023-04-25 | 创新先进技术有限公司 | Information interaction method, device and equipment for Internet of things equipment |
CN108173726A (en) * | 2018-01-24 | 2018-06-15 | 物链(北京)科技有限公司 | Electronic equipment quickly accesses access device, system and its cut-in method of Internet of Things |
CN110072236B (en) * | 2018-01-24 | 2022-07-22 | 阿里巴巴集团控股有限公司 | Device connection method, device and system |
CN112202908B (en) * | 2018-01-30 | 2023-06-30 | 创新先进技术有限公司 | Method, device, electronic equipment and system for associating equipment with account |
CN108566391B (en) * | 2018-03-30 | 2020-05-12 | 阿里巴巴集团控股有限公司 | Login method and device for Internet of things equipment |
CN109756386B (en) * | 2018-09-07 | 2021-09-28 | 启迪云控(北京)科技有限公司 | Communication optimization method and device based on cloud network vehicle cooperation |
CN109827784A (en) * | 2018-11-29 | 2019-05-31 | 深圳市元征科技股份有限公司 | A kind of work state monitoring method and device of four-wheel position finder |
CN109547474A (en) * | 2018-12-21 | 2019-03-29 | 深圳市创梦天地科技有限公司 | A kind of data transmission method and device |
CN109714769B (en) * | 2018-12-28 | 2020-01-14 | 北京深思数盾科技股份有限公司 | Information binding method, device, equipment and storage medium |
CN110519353B (en) * | 2019-08-16 | 2022-03-04 | 蚂蚁蓉信(成都)网络科技有限公司 | Service request processing method, device and equipment |
CN110751244B (en) * | 2019-09-26 | 2021-07-27 | 支付宝(杭州)信息技术有限公司 | IOT (Internet of things) equipment activation method, IOT equipment activation device and IOT equipment activation equipment |
CN114270781A (en) * | 2019-10-18 | 2022-04-01 | 深圳市欢太科技有限公司 | Device access method, device, system control method, electronic device and storage medium |
CN112825574A (en) * | 2019-11-15 | 2021-05-21 | 中兴通讯股份有限公司 | Network connection establishing method, wireless access device, system and storage medium |
CN110855677B (en) * | 2019-11-15 | 2023-07-18 | 北京小米移动软件有限公司 | Distribution network method and device, electronic equipment and storage medium |
CN110856174B (en) * | 2019-12-13 | 2020-11-27 | 上海兴容信息技术有限公司 | Access authentication system, method, device, computer equipment and storage medium |
CN111241549B (en) * | 2020-01-08 | 2022-11-15 | 广州中国科学院计算机网络信息中心 | Credible analysis method under heterogeneous identification system |
CN110958276B (en) * | 2020-02-24 | 2020-05-12 | 常州唯实智能物联创新中心有限公司 | Trusted acquisition and logging method and device based on digital identity of intelligent Internet of things equipment |
CN111262747B (en) * | 2020-03-23 | 2023-05-02 | 中国建设银行股份有限公司 | Internet of things-based equipment network access control method and Internet of things platform |
CN115098847A (en) * | 2020-04-17 | 2022-09-23 | 支付宝(杭州)信息技术有限公司 | Internet of things equipment identity information generation method and device and electronic equipment |
CN111787048B (en) * | 2020-04-28 | 2023-08-04 | 北京沃东天骏信息技术有限公司 | Connection method of terminal equipment, scheduling server and Internet of things system |
CN111669448B (en) * | 2020-06-30 | 2023-04-07 | 苏州三六零智能安全科技有限公司 | Information interaction method and device for Internet of things equipment, storage medium and device |
CN112002402A (en) * | 2020-08-25 | 2020-11-27 | 上海至数企业发展有限公司 | Medical equipment monitoring method and system based on digital twin body and storage medium |
CN112468538B (en) * | 2020-11-04 | 2022-08-02 | 杭州萤石软件有限公司 | Operation method and system of Internet of things equipment |
CN112583819B (en) * | 2020-12-08 | 2023-03-24 | 支付宝(杭州)信息技术有限公司 | Network interface state detection method, device and equipment |
CN112737902B (en) * | 2020-12-31 | 2023-02-03 | 青岛海尔科技有限公司 | Network configuration method and device, storage medium and electronic equipment |
CN112800043A (en) * | 2021-02-05 | 2021-05-14 | 凯通科技股份有限公司 | Internet of things terminal information extraction method, device, equipment and storage medium |
CN113765987A (en) * | 2021-02-20 | 2021-12-07 | 北京沃东天骏信息技术有限公司 | Method, device and system for managing and processing information of equipment of Internet of things |
CN113726866A (en) * | 2021-08-25 | 2021-11-30 | 湖南中车时代通信信号有限公司 | Vehicle-ground communication method, device, equipment and medium |
CN113766606B (en) * | 2021-09-07 | 2023-07-25 | 四川长虹网络科技有限责任公司 | Network distribution method, system, computer equipment and storage medium based on cellular communication |
CN116137591A (en) * | 2021-11-18 | 2023-05-19 | 深圳Tcl新技术有限公司 | Equipment network distribution method and device, storage medium and electronic equipment |
CN114553948A (en) * | 2022-02-11 | 2022-05-27 | 支付宝(杭州)信息技术有限公司 | Service processing method and device |
CN114827968B (en) * | 2022-03-31 | 2022-11-08 | 远峰科技股份有限公司 | Big data transmission method of BLE intelligent key CANFD |
CN118779133A (en) * | 2022-05-07 | 2024-10-15 | 支付宝(杭州)信息技术有限公司 | Event processing method and device applied to internet of things (IoT) device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104967595A (en) * | 2014-10-31 | 2015-10-07 | 腾讯科技(深圳)有限公司 | Method and apparatus for registering devices on Internet of things platform |
CN106850209A (en) * | 2017-02-28 | 2017-06-13 | 苏州福瑞思信息科技有限公司 | A kind of identity identifying method and device |
US20170238236A1 (en) * | 2016-02-17 | 2017-08-17 | Zitovault, Inc. | Mac address-bound wlan password |
CN107612909A (en) * | 2017-09-18 | 2018-01-19 | 阿里巴巴集团控股有限公司 | Information interacting method, device and equipment on internet of things equipment |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3006504B2 (en) * | 1996-08-27 | 2000-02-07 | 日本電気株式会社 | Authentication method of wireless terminal in wireless network and wireless network |
US20110030039A1 (en) * | 2009-07-31 | 2011-02-03 | Eric Bilange | Device, method and apparatus for authentication on untrusted networks via trusted networks |
CN102368760B (en) * | 2010-12-31 | 2014-10-22 | 中国人民解放军信息工程大学 | Data secure transmission method among multilevel information systems |
CN102231748B (en) * | 2011-08-02 | 2014-12-24 | 杭州迪普科技有限公司 | Method and device for verifying client |
CN103401884B (en) * | 2013-08-16 | 2017-07-28 | 深信服网络科技(深圳)有限公司 | Public wireless environment online authentication method and system based on wechat |
CN104427501B (en) * | 2013-09-11 | 2016-04-06 | 腾讯科技(深圳)有限公司 | Method for network access, device and system |
CN105451300B (en) * | 2015-11-04 | 2019-02-01 | Oppo广东移动通信有限公司 | A kind of method for connecting network and mobile device |
CN106878935A (en) * | 2015-12-11 | 2017-06-20 | 北京奇虎科技有限公司 | A kind of sharing method of shop WiFi network, server and device |
CN107018165A (en) * | 2016-01-28 | 2017-08-04 | 阿里巴巴集团控股有限公司 | The method and device of control internet of things equipment, server, mobile device |
CN106341834A (en) * | 2016-08-25 | 2017-01-18 | 智能唯识科技(深圳)有限公司 | Internet-of-things device configuration method, Internet-of-things device configuration apparatus, Internet-of-things device configuration system and Internet-of-things device |
CN106488447A (en) * | 2016-09-27 | 2017-03-08 | 深圳Tcl智能家庭科技有限公司 | A kind of method and system of smart machine access network |
CN106454828A (en) * | 2016-09-30 | 2017-02-22 | 广东美的制冷设备有限公司 | Network access authentication method, network access authentication device, network access device and router |
GB2557353B (en) * | 2016-12-08 | 2019-12-04 | British Telecomm | Configuration of wireless-equipped devices |
CN106856609A (en) * | 2017-02-28 | 2017-06-16 | 苏州福瑞思信息科技有限公司 | A kind of network collocating method and device |
-
2017
- 2017-09-18 CN CN202011131981.5A patent/CN112217831B/en active Active
- 2017-09-18 CN CN201710839411.3A patent/CN107612909B/en active Active
-
2018
- 2018-05-29 TW TW107118238A patent/TWI719312B/en active
- 2018-09-14 WO PCT/CN2018/105673 patent/WO2019052532A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104967595A (en) * | 2014-10-31 | 2015-10-07 | 腾讯科技(深圳)有限公司 | Method and apparatus for registering devices on Internet of things platform |
US20170238236A1 (en) * | 2016-02-17 | 2017-08-17 | Zitovault, Inc. | Mac address-bound wlan password |
CN106850209A (en) * | 2017-02-28 | 2017-06-13 | 苏州福瑞思信息科技有限公司 | A kind of identity identifying method and device |
CN107612909A (en) * | 2017-09-18 | 2018-01-19 | 阿里巴巴集团控股有限公司 | Information interacting method, device and equipment on internet of things equipment |
Cited By (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11329974B2 (en) | 2020-02-25 | 2022-05-10 | Beijing Xiaomi Mobile Software Co., Ltd. | Device network configuration method and apparatus, and storage medium |
EP3873053A1 (en) * | 2020-02-25 | 2021-09-01 | Beijing Xiaomi Mobile Software Co., Ltd. | Device network configuration method and apparatus, and medium |
CN111400032A (en) * | 2020-03-02 | 2020-07-10 | 杭州迪普信息技术有限公司 | Resource allocation method and device |
CN111400032B (en) * | 2020-03-02 | 2023-07-21 | 杭州迪普信息技术有限公司 | Resource allocation method and device |
CN111967269B (en) * | 2020-08-13 | 2024-04-26 | 支付宝(杭州)信息技术有限公司 | Business risk identification method and device and electronic equipment |
CN111967269A (en) * | 2020-08-13 | 2020-11-20 | 支付宝(杭州)信息技术有限公司 | Business risk identification method and device and electronic equipment |
CN111985201A (en) * | 2020-08-19 | 2020-11-24 | 支付宝(杭州)信息技术有限公司 | Data processing rule generation method and device and electronic equipment |
CN111985201B (en) * | 2020-08-19 | 2023-12-29 | 支付宝(杭州)信息技术有限公司 | Data processing rule generation method and device and electronic equipment |
WO2022041472A1 (en) * | 2020-08-31 | 2022-03-03 | Oppo广东移动通信有限公司 | Network distribution method and apparatus, and device and storage medium |
CN112468567A (en) * | 2020-10-22 | 2021-03-09 | 杭州智尔科技有限公司 | Internet of things data transmission method and device and electronic equipment |
CN112416545A (en) * | 2020-11-04 | 2021-02-26 | 北京五八信息技术有限公司 | Task processing method and device |
CN112287376B (en) * | 2020-11-20 | 2024-05-28 | 支付宝(杭州)信息技术有限公司 | Method and device for processing privacy data |
CN112287376A (en) * | 2020-11-20 | 2021-01-29 | 支付宝(杭州)信息技术有限公司 | Method and device for processing private data |
CN113949586A (en) * | 2020-12-22 | 2022-01-18 | 技象科技(浙江)有限公司 | Distributed efficient Internet of things equipment access system |
CN113037736A (en) * | 2021-03-02 | 2021-06-25 | 四川九州电子科技股份有限公司 | Authentication method, device, system and computer storage medium |
CN115022353B (en) * | 2021-03-05 | 2024-03-15 | 阿里巴巴新加坡控股有限公司 | Network connection method, device and system of intelligent equipment |
CN115022353A (en) * | 2021-03-05 | 2022-09-06 | 阿里巴巴新加坡控股有限公司 | Network connection method, device and system of intelligent equipment |
CN114866993A (en) * | 2021-03-16 | 2022-08-05 | 浙江绍兴苏泊尔生活电器有限公司 | Method and device for accessing household electrical appliance to network and household electrical appliance |
CN113726796A (en) * | 2021-08-31 | 2021-11-30 | 平安国际智慧城市科技股份有限公司 | Data interaction method, device, equipment and medium based on medical Internet of things |
CN113726796B (en) * | 2021-08-31 | 2023-10-27 | 深圳平安智慧医健科技有限公司 | Data interaction method, device, equipment and medium based on medical internet of things |
CN113989423A (en) * | 2021-09-27 | 2022-01-28 | 广州三七网络科技有限公司 | Digital asset manufacturing method, apparatus, computer device and storage medium |
CN114158043A (en) * | 2021-11-11 | 2022-03-08 | 珠海格力电器股份有限公司 | Network distribution method, system and storage medium |
CN114449484A (en) * | 2022-01-29 | 2022-05-06 | 支付宝(杭州)信息技术有限公司 | Management method and device for vehicle-mounted equipment and equipment |
CN114666255B (en) * | 2022-03-16 | 2024-04-05 | 京东科技信息技术有限公司 | Method for testing network distribution performance of Internet of things equipment and related equipment thereof |
CN114666255A (en) * | 2022-03-16 | 2022-06-24 | 京东科技信息技术有限公司 | Method for testing distribution network performance of Internet of things equipment and related equipment thereof |
CN114866576A (en) * | 2022-04-02 | 2022-08-05 | 广东新邦智联科技有限公司 | Power equipment management method, device, equipment and storage medium based on Internet of things |
CN114928475A (en) * | 2022-04-25 | 2022-08-19 | 浪潮工业互联网股份有限公司 | Industrial equipment authentication method, equipment and medium based on identification analysis |
CN114928475B (en) * | 2022-04-25 | 2023-11-21 | 浪潮工业互联网股份有限公司 | Industrial equipment authentication method, equipment and medium based on identification analysis |
CN115277240A (en) * | 2022-08-03 | 2022-11-01 | 河海大学 | Authentication method and device for Internet of things equipment |
CN115767508A (en) * | 2022-10-21 | 2023-03-07 | 浙江华樽科技有限公司 | Mobile terminal user binding method and device, computer equipment and storage medium |
CN116089380A (en) * | 2023-04-10 | 2023-05-09 | 宇动源(北京)信息技术有限公司 | Building data and Internet of things data binding method and system |
Also Published As
Publication number | Publication date |
---|---|
TW201915803A (en) | 2019-04-16 |
CN107612909B (en) | 2020-09-08 |
CN107612909A (en) | 2018-01-19 |
TWI719312B (en) | 2021-02-21 |
CN112217831A (en) | 2021-01-12 |
CN112217831B (en) | 2023-04-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019052532A1 (en) | Information interaction method, apparatus and device for internet of things device | |
US11039298B2 (en) | Method and apparatus for remotely providing profile in communication system | |
JP6756009B2 (en) | Data transmission | |
CN109391634A (en) | Establish method, terminal and the computer readable storage medium of communication | |
TW201724894A (en) | Secure fine timing measurement protocol | |
US20200288331A1 (en) | Method and apparatus for connecting to access point in wlan network | |
ES2894900T3 (en) | Selection of the transport procedure for the delivery of notifications from the server | |
JP2018534852A (en) | Internet Key Exchange (IKE) for secure association between devices | |
KR102221021B1 (en) | Electronic device and method for processing packet in internet protocol based network | |
JP6970256B2 (en) | Configuring remote electronic devices with peer electronic devices in a network environment | |
CN113438628B (en) | Method and device for data interaction | |
WO2019149006A1 (en) | Method and device for obtaining and providing access information of wireless access point, and medium | |
CN112686358A (en) | Data transmission method, NFC electronic tag, terminal device and storage medium | |
CN108040355A (en) | Method for network access and system | |
KR100864479B1 (en) | Method for Pairing between Mobile Communication Terminal and Bluetooth Device, Mobile Communication Terminal and System for the Same | |
KR20160084680A (en) | Method for authenticating iot device, method for executing iot device authentication, user device and authentication server | |
CN111242652A (en) | Block chaining method of tracing information and related equipment | |
CN105072212B (en) | To code method and to code system | |
CN116830525A (en) | Data transmission method, device, system, electronic equipment and readable medium | |
TW202123051A (en) | Security authentication method, apparatus, and electronic device | |
JP2017531408A (en) | Enabling proximity operation using a long-range wireless communication interface | |
CN111092949B (en) | Method and device for registering equipment | |
CN107172718A (en) | A kind of information processing method and electronic equipment | |
US9363226B2 (en) | Method for double IP address recovery | |
CN109376024B (en) | Service information configuration method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18856126 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18856126 Country of ref document: EP Kind code of ref document: A1 |