[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

WO2023273059A1 - 设备监控方法、系统、装置、计算机设备和存储介质 - Google Patents

设备监控方法、系统、装置、计算机设备和存储介质 Download PDF

Info

Publication number
WO2023273059A1
WO2023273059A1 PCT/CN2021/126783 CN2021126783W WO2023273059A1 WO 2023273059 A1 WO2023273059 A1 WO 2023273059A1 CN 2021126783 W CN2021126783 W CN 2021126783W WO 2023273059 A1 WO2023273059 A1 WO 2023273059A1
Authority
WO
WIPO (PCT)
Prior art keywords
tenant
target
information
association
authentication information
Prior art date
Application number
PCT/CN2021/126783
Other languages
English (en)
French (fr)
Inventor
徐建兴
罗石
雷水鱼
张帅
Original Assignee
成都商汤科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 成都商汤科技有限公司 filed Critical 成都商汤科技有限公司
Publication of WO2023273059A1 publication Critical patent/WO2023273059A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3006Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Definitions

  • the present disclosure relates to the technical field of the Internet of Things, and in particular, to an equipment monitoring method, system, device, computer equipment, and storage medium.
  • the tenant can use the server it rents to manage and monitor the IoT devices.
  • Embodiments of the present disclosure at least provide an equipment monitoring method, system, device, computer equipment, and storage medium, so as to implement efficient monitoring and unified management of Internet of Things equipment.
  • an embodiment of the present disclosure provides a device monitoring method, including:
  • target device authentication information is verified and passed, according to the pre-established matching relationship between the device authentication information and the tenant, determine the target tenant corresponding to the target device authentication information;
  • the target device is monitored by using the association relationship.
  • the target tenant improves the efficiency of determining the target tenant corresponding to the target device compared to using the device information of the target device (such as ports, etc.) to determine the target tenant, so that the relationship between the target device and the target tenant can be quickly and accurately established
  • the server can efficiently monitor the target device based on the established association relationship, and perform unified management on the devices with the association relationship.
  • the target tenant can use the server to realize efficient monitoring of the target device and perform unified management on the devices corresponding to the tenant.
  • the identity verification of the target device can be realized, which is beneficial to improving the security of the established association relationship.
  • the method before determining the target tenant corresponding to the target device authentication information according to the pre-established matching relationship between the device authentication information and the tenant, the method further includes:
  • tenant information corresponding to the tenant For any tenant, obtain tenant information corresponding to the tenant
  • the tenant ID is used to uniquely identify the identity of the tenant
  • the device authentication information is used to identify the identity of the device corresponding to the tenant and implement device registration. Based on the tenant information, the tenant's first tenant ID can be accurately obtained, and the first device authentication information matching the tenant's identity can be generated, so that a matching relationship corresponding to the tenant information can be established for quick and accurate follow-up accurately identify target tenants.
  • the establishing a matching relationship between the first tenant identifier and the first device authentication information includes:
  • first tenant identifier is different from the stored tenant identifiers, establish a matching relationship between the first tenant identifier and the first device authentication information;
  • the generating the first device authentication information corresponding to the tenant based on the tenant information includes:
  • the initial device authentication information is different from the stored tenant's device authentication information, use the initial device authentication information as the first device authentication information corresponding to the tenant; store the first device authentication information corresponding to the tenant device authentication information; or
  • the stored device authentication information of the tenant has the same device authentication information as the initial device authentication information, based on the generation time of the initial device authentication information and the tenant identifier of the tenant, generate the Add the additional information of the initial device authentication information; add the additional information to the initial device authentication information to obtain new initial device authentication information, and combine the new initial device authentication information with the stored tenant's device authentication information If they are all different, use the new initial device authentication information as the first device authentication information corresponding to the tenant.
  • the target tenant corresponding to the first device authentication information is quickly and accurately determined.
  • the specificity of the generated initial device authentication information can be improved.
  • the method further includes:
  • the establishment of the association relationship between the target device and the target tenant includes:
  • association indication information fed back by the target tenant with respect to the association determination information is received, establish an association relationship between the target device and the target tenant.
  • the association threshold is used to represent the maximum number of devices that the target tenant can currently associate with. By comparing the associated devices with the association threshold, it can be accurately determined whether the current association between the target device and the target tenant can be established.
  • the association indication information can reflect the willingness of the target tenant to associate with the target device. By sending the association determination information to the target tenant, it can be determined whether the target tenant has the willingness to establish an association relationship. matching associations.
  • the method further includes:
  • the establishment of the association relationship between the target device and the target tenant includes:
  • the target threshold is greater than the association threshold, establish an association relationship between the target device and the target tenant.
  • Network status information and remaining computing power resources can represent the association capability of the server, and the association ability can determine the association threshold. Therefore, based on the network status information and remaining computing power resources, it is possible to accurately determine the time when the association threshold changes (that is, the threshold update time) and the threshold that can be changed to (that is, the target threshold), and then, based on the determined target threshold and the threshold The update time can realize the establishment of the association relationship between the target device and the target tenant in a timely manner under the condition that the server association capability allows.
  • the threshold update time that is, the threshold update time
  • the update time can realize the establishment of the association relationship between the target device and the target tenant in a timely manner under the condition that the server association capability allows.
  • the method further includes:
  • association update request When the number of devices is equal to the association threshold, obtain an association update request for the target tenant; the association update request includes the device information and data processing method of the device to be replaced; the device to be replaced is related to the devices associated with the target tenant;
  • the establishment of the association relationship between the target device and the target tenant includes:
  • the association relationship between the device to be replaced and the target tenant can be released, thereby reducing the number of associated equipment of the target tenant, and further, the association relationship between the target device and the target tenant can be established.
  • the data stored in different associated devices have different importance levels. Based on the data processing method, a reasonable method can be used to process the stored data in the device to be replaced.
  • the method further includes:
  • first prompt information is generated; the first prompt information is used to prompt that the target device has been used to replace the associated device with the earliest association time.
  • the server can only release the established association relationship when the tenant determines that the established association relationship can be terminated; for devices with an importance degree less than a certain value, the server can Actively cancel the established association relationship. Therefore, when it is determined that the number of associated devices is equal to the association threshold, the second device is determined based on the association time and the disassociation method, and the server actively releases the association relationship between the target tenant and the second device, and establishes a link between the target device and the target tenant. The association relationship among them can realize the replacement of the second device with the target device and further improve the function of the device.
  • the method further includes:
  • An association relationship between the target device and the target tenant is established.
  • the offline associated device cannot continue to monitor it, and the longer the offline time, the more data the offline associated device will lose.
  • the offline reason can reflect whether the associated device is offline due to network status, or due to a problem with the device itself. Therefore, based on the determined offline duration and offline reason, the first device to be disassociated that is suitable for disassociation at the current moment can be accurately determined, and then the association between the first device to be disassociated and the target tenant can be disassociated, and the target device can be established. Therefore, the online target device can be used to replace the first device to be released, so as to monitor the online target device.
  • the method further includes:
  • association threshold When the number of devices is equal to the association threshold, determining the frequency of use and association level information of the associated devices; the association level information is used to indicate the degree of association importance of the associated devices;
  • An association relationship between the target device and the target tenant is established.
  • the frequency of use can represent the monitoring times and monitoring rate of the associated equipment in a unit time.
  • the second device to be released with a lower association level and lower frequency of use can be screened out, and the target device can be used to replace the first device.
  • the device to be released can not only meet the association requirement of establishing the association relationship between the target device and the target tenant, but also improve the monitoring efficiency of the device.
  • the tenant information corresponding to the tenant after acquiring the tenant information corresponding to the tenant, it further includes:
  • management login information corresponding to the tenant based on the tenant information and/or target login information input by the tenant according to a preset information creation intensity; the management login information is used for the tenant to log in to the server, and the tenant monitors its corresponding associated device;
  • the administrative login information is stored.
  • the target login information can represent the management login information obtained by the tenant's wishes, and based on the target login information and information creation strength, the management login information with high security and meeting the user's wishes can be created. Therefore, based on the established management login information, the tenant can implement unified management and monitoring of its associated devices by using the server.
  • the method also includes:
  • the first login request includes management login information corresponding to the target tenant;
  • the association disassociation instruction includes at least one third device to be disassociated that has established an association relationship with the target tenant;
  • an association rate of the target tenant is determined, and the association rate is fed back to the target tenant.
  • the target tenant can actively send an association disassociation instruction for at least one third device to be disassociated that has established an association relationship with the target tenant.
  • the association rate can reflect the usage of the available server resources corresponding to the target tenant. By feeding back the association rate to the target tenant, the target tenant can associate new devices or remove associated devices based on the association rate.
  • the method further includes:
  • the effective lease period is used to reflect the maximum available lease time of the target tenant. Based on the effective lease period and the leased time corresponding to the target tenant, it is possible to control the lease time of the target tenant and ensure the lease time of the target tenant.
  • the embodiment of the present disclosure also provides a device monitoring system, including: the target device as described in the above first aspect, or any possible implementation manner of the first aspect, and the above first aspect, or The server described in any possible implementation manner in the first aspect;
  • the target device is configured to acquire target device authentication information, and send the target device authentication information to the server.
  • an equipment monitoring device including:
  • the first obtaining module is used to obtain the authentication information of the target device sent by the target device;
  • a screening module configured to determine the target tenant corresponding to the target device authentication information according to the pre-established matching relationship between the target device authentication information and the tenant when the target device authentication information is verified;
  • an association module configured to establish an association relationship between the target device and the target tenant
  • a monitoring module configured to monitor the target device by utilizing the association relationship.
  • the device further includes a matching module:
  • the matching module is configured to obtain, for any tenant, tenant information corresponding to the tenant before determining the target tenant corresponding to the target equipment authentication information according to the pre-established matching relationship between the equipment authentication information and the tenant;
  • the matching module is configured to establish the first tenant ID and the first device authentication if the first tenant ID is different from the stored tenant ID. a matching relationship between information; or
  • the matching module is configured to generate initial device authentication information based on the tenant information
  • the initial device authentication information is different from the stored tenant's device authentication information, use the initial device authentication information as the first device authentication information corresponding to the tenant; store the first device authentication information corresponding to the tenant device authentication information; or
  • the stored device authentication information of the tenant has the same device authentication information as the initial device authentication information, based on the generation time of the initial device authentication information and the tenant identifier of the tenant, generate the Add the additional information of the initial device authentication information; add the additional information to the initial device authentication information to obtain new initial device authentication information, and combine the new initial device authentication information with the stored tenant's device authentication information If they are all different, use the new initial device authentication information as the first device authentication information corresponding to the tenant.
  • the device further includes a second acquiring module
  • the second obtaining module is configured to obtain the device quantity of the associated device corresponding to the target tenant
  • the associating module is configured to establish an association relationship between the target device and the target tenant upon receiving association indication information fed back by the target tenant for the association determination information.
  • the second acquiring module is further configured to, after acquiring the number of associated devices corresponding to the target tenant, if the number of devices is equal to the association threshold , acquiring network status information of the server and remaining computing power resources of the server;
  • the association module is configured to establish an association relationship between the target device and the target tenant when the target threshold is greater than the association threshold.
  • the second acquiring module is further configured to, after acquiring the number of associated devices corresponding to the target tenant, if the number of devices is equal to the association threshold Obtaining an association update request for the target tenant; the association update request includes device information and a data processing method of the device to be replaced; the device to be replaced is a device associated with the target tenant;
  • the associating module is configured to release the association between the target tenant and the device to be replaced based on the device information of the device to be replaced, and use the data processing method to store data for processing;
  • the second acquiring module is further configured to, after acquiring the number of associated devices corresponding to the target tenant, if the number of devices is equal to the association threshold , obtaining the association time of the associated device and the method of disassociation;
  • the association module is configured to release the association relationship between the target tenant and the second device, and establish the association relationship between the target tenant and the target device.
  • the second acquiring module is further configured to, after acquiring the number of associated devices corresponding to the target tenant, if the number of devices is equal to the association threshold , determining an offline device from the associated devices based on the device login status of the associated devices;
  • the associating module is configured to disassociate the first device to be disassociated from the target tenant;
  • An association relationship between the target device and the target tenant is established.
  • the second acquiring module is further configured to, after acquiring the number of associated devices corresponding to the target tenant, if the number of devices is equal to the association threshold , determining the frequency of use and association level information of the associated device; the association level information is used to indicate the association importance of the associated device;
  • the associating module is configured to disassociate the second device to be disassociated from the target tenant
  • An association relationship between the target device and the target tenant is established.
  • the matching module is further configured to, after acquiring the tenant information corresponding to the tenant, based on the tenant information and/or the target login information input by the tenant, according to preset The intensity of information creation, creating management login information corresponding to the tenant; the management login information is used for the tenant to log in to the server, and the tenant monitors its corresponding associated equipment;
  • the administrative login information is stored.
  • the device further includes a third acquisition module:
  • the third acquiring module is configured to acquire a first login request sent by the target tenant; the first login request includes management login information corresponding to the target tenant;
  • the association disassociation instruction includes at least one third device to be disassociated that has established an association relationship with the target tenant;
  • the association module is further configured to disassociate the third device to be disassociated from the target tenant;
  • an association rate of the target tenant is determined, and the association rate is fed back to the target tenant.
  • association module In a possible implementation manner, the association module,
  • an optional implementation manner of the present disclosure further provides a computer device, a processor, and a memory, where the memory stores machine-readable instructions executable by the processor, and the processor is configured to execute the instructions stored in the memory.
  • machine-readable instructions when the machine-readable instructions are executed by the processor, when the machine-readable instructions are executed by the processor, the above-mentioned first aspect is executed, or any possible implementation of the first aspect steps in the method.
  • an optional implementation mode of the present disclosure further provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed, the above-mentioned first aspect, or any one of the first aspects in the first aspect may be executed. Steps in one possible implementation.
  • an optional implementation manner of the present disclosure further provides a computer program product, including computer readable codes, or a volatile computer readable storage medium or a nonvolatile computer readable storage medium carrying computer readable codes , when the computer-readable code runs in a processor of the electronic device, the processor in the electronic device executes the steps in the above first aspect, or any possible implementation manner of the first aspect.
  • FIG. 1 shows a device monitoring method applied to a server provided by an embodiment of the present disclosure
  • FIG. 2 shows a flow chart of a method for establishing a matching relationship provided by an embodiment of the present disclosure
  • FIG. 3 shows a flowchart of a method for establishing an association relationship between a target device and a target tenant provided by an embodiment of the present disclosure
  • FIG. 4 shows a flow chart of a method for managing associated devices provided by an embodiment of the present disclosure
  • FIG. 5 shows a schematic diagram of an equipment monitoring system provided by an embodiment of the present disclosure
  • FIG. 6 shows a schematic diagram of a device management device provided by an embodiment of the present disclosure
  • Fig. 7 shows a schematic structural diagram of a computer device provided by an embodiment of the present disclosure.
  • IoT devices have been widely used in various scenarios.
  • the tenant can use the server it rents to manage and monitor the IoT devices.
  • the present disclosure provides a device monitoring method, system, device, computer device, and storage medium. Based on the pre-established matching relationship between device authentication information and tenants, it can be realized that after the obtained target device authentication information is verified and passed , quickly and accurately determine the target tenant that matches the target device authentication information from multiple tenants, compared with using the target device's device information (such as ports, etc.) The efficiency of the target tenant, so that the association relationship between the target device and the target tenant can be quickly and accurately established, and then the server can efficiently monitor the target device based on the established association relationship, and monitor the equipment with the association relationship. Unified management. Furthermore, the target tenant can use the server to realize efficient monitoring of the target device and perform unified management on the devices corresponding to the tenant. In addition, by verifying the authentication information of the target device, the identity verification of the target device can be realized, which is beneficial to improving the security of the established association relationship.
  • UUID Universally Unique Identifier, universally unique identifier.
  • a tenant is an authorized account corresponding to a customer who rents a server, and a tenant may correspond to multiple users related to the customer, and the user may use or manage the target device belonging to the customer.
  • the client can be a certain network company
  • the user can be an employee of the network company
  • the target device is a face recognition device belonging to the network company.
  • the server There is a background management system corresponding to the server.
  • the customer determines that he needs to rent the server for equipment monitoring, he can log in to the background management system and enter the basic information of the customer as the tenant information.
  • the server can first generate an authorized account corresponding to the client based on the tenant information, that is, the tenant and the tenant ID.
  • the tenant ID can be obtained directly from the tenant information.
  • the management login information can be generated and stored in the database, and a matching relationship between the management login information and the tenant ID can be established.
  • the client confirms the generation of device authentication information, generate device authentication information that does not have duplicates and feed back the generated device authentication information to the client.
  • a matching relationship between the device authentication information and the tenant ID is established, and the established matching relationship and the device authentication information are stored in the database.
  • the customer can inform its corresponding user of the obtained device authentication information.
  • the user can enter the device authentication information on the target device to log in.
  • the server can use the device authentication information as the target device authentication information and verify it. If the verification is passed, according to the matching relationship corresponding to the target device authentication information , determine the target tenant, and establish an association relationship between the target tenant and the target device.
  • the tenant can enter the management login information on the target device to log in. If the verification is passed, the device status of the associated device that has an association relationship with the target tenant will be displayed to the tenant, and then the target tenant can use the server to Monitoring and management of connected devices.
  • the execution subject of the device monitoring method provided in the embodiments of the present disclosure is generally a computer device with certain computing capabilities.
  • the device The monitoring method may be implemented by a processor invoking computer readable instructions stored in a memory.
  • the device monitoring method provided by the embodiment of the present disclosure is described by taking the execution subject as a server as an example.
  • a flow chart of a device monitoring method applied to a server may include the following steps:
  • S101 Obtain target device authentication information sent by the target device.
  • the target device may be any IoT device, for example, a smart access control device, a smart bracelet, a smart light bulb, a smart road device, and the like.
  • the server is a server capable of managing and monitoring IoT devices. Different target devices can correspond to different tenants, and the same tenant can correspond to multiple devices.
  • the device authentication information is used to identify the identity of the device corresponding to the tenant and to realize the registration of the device. It is information created by the server for the tenant. Different tenants have different device authentication information.
  • the target device authentication information may be device authentication information uploaded by the log-in target device, and is used for the server to verify the identity of the target device.
  • the tenant can input the target device authentication information on the target device and initiate a device login request, and then the target device can send the target device authentication information to the server, so that the server can obtain to the target device authentication information.
  • the matching relationship can be used to represent the association between the corresponding device authentication information and the tenant, and can be pre-established and stored in the database.
  • the server needs to first verify the target device authentication information to determine whether the information is correct. If not, a notification message reminding the login failure may be generated, and then the notification message is sent to the target device. Furthermore, the user may obtain notification information on the target device, and perform further operations based on the notification information, for example, re-input the authentication information of the target device, or click retry.
  • the tenant corresponding to the target device authentication information may be determined according to the pre-established matching relationship between the device authentication information and the tenant, and this tenant may be used as the target tenant matching the target device authentication information.
  • the target tenant can be determined quickly, efficiently and accurately.
  • S103 Establish an association relationship between the target device and the target tenant.
  • the association relationship is used to indicate that the target device corresponding to the association relationship belongs to its corresponding target tenant. Specifically, after the target tenant corresponding to the target device is determined, an association relationship between the target device and the target tenant may be established.
  • the server can use the association relationship to monitor the target device, and can feed back the monitoring information to the target tenant, so that the target tenant can monitor the target device.
  • the target tenant that matches the target device authentication information can be quickly and accurately determined from multiple tenants Compared with determining the target tenant by using the device information (such as port, etc.) of the target device, the efficiency of determining the target tenant corresponding to the target device is improved, so that the relationship between the target device and the target tenant can be quickly and accurately established
  • the server can efficiently monitor the target device and perform unified management on the devices with the association relationship.
  • the target tenant can use the server to realize efficient monitoring of the target device and perform unified management on the devices corresponding to the tenant.
  • the identity verification of the target device can be realized, which is beneficial to improving the security of the established association relationship.
  • the same device can also correspond to different tenants.
  • different tenants can use the same device to log in according to usage requirements.
  • the server For each login, when the authentication information of the target device corresponding to the current login is verified, the server The target tenant corresponding to the current login may be determined, and then an association relationship between the device and the target tenant is established. Then, for the next login, the server can determine the corresponding target tenant based on the target device authentication information corresponding to the login and establish an association relationship. An association relationship between the device and different tenants can be established.
  • the device when the tenant ID is used to represent the corresponding tenant, since the matching relationship is pre-established, in one embodiment, the device can be established before S101 according to the method shown in Figure 2
  • the matching relationship between authentication information and tenant identification, as shown in Figure 2 is a flowchart of a method for establishing a matching relationship provided by an embodiment of the present disclosure, which may include the following steps:
  • the tenant can use the device to enter the back-end management system corresponding to the server, and then input the tenant information in the back-end management system. Afterwards, the device sends the tenant information to the server, and the server can obtain the tenant information corresponding to the tenant.
  • the tenant information may be basic information of the tenant, for example, tenant mailbox information, tenant mobile phone information, tenant address information, and the like.
  • the first tenant identifier of the tenant may be obtained directly from the tenant information.
  • a first tenant identifier matching the tenant information of the tenant may be generated.
  • the tenant ID is used to uniquely identify the tenant identity.
  • the first tenant ID corresponding to the tenant can be generated first according to the information such as the acquisition time of the tenant information and the UUID corresponding to the tenant, and then after confirming that the first tenant ID is accurate and can
  • the first tenant identifier and tenant information may be stored in the database.
  • the server may also generate first device authentication information corresponding to the tenant based on the tenant information.
  • the first device authentication information corresponding to the tenant may be generated by using the time of acquiring the tenant information, the first tenant identifier, and the like.
  • the tenant may initiate a request for generating device authentication information in the backend management system through the device. Further, the server may generate first device authentication information corresponding to the tenant based on the tenant information.
  • the first tenant identifier and the first device authentication information may also be generated simultaneously after the tenant information is acquired, which is not limited here.
  • S204 Establish a matching relationship between the first tenant identifier and the first device authentication information.
  • the accuracy of the generated first device authentication information can be judged, and when it is determined that the first device authentication information is not repeated, a match between the first tenant ID and the first device authentication information is established relationship, and store the first device authentication information and the matching relationship in the database.
  • judging the accuracy of the first device authentication information may include judging whether the first device authentication information conforms to the authentication information specification, for example, whether the number of words in the information exceeds the maximum number of words, whether the content of the information complies with the form specification, and so on.
  • a duplicate check may be performed on the first tenant ID to determine whether the first tenant ID can uniquely identify the tenant.
  • the stored tenant IDs of the authorized tenants can be obtained, and then the first tenant ID is compared with the stored tenant IDs to determine the difference between the first tenant ID and the stored tenant IDs. Is it the same. In a case where it is determined that the first tenant identifier of the tenant is different from the stored tenant identifiers, it may be determined that the first tenant identifier can uniquely identify the tenant.
  • the first tenant ID of the tenant may be stored as the final tenant ID of the tenant.
  • the first tenant ID cannot uniquely identify the tenant
  • the second tenant ID corresponding to the tenant needs to be regenerated to ensure The second tenant identifier can uniquely identify the tenant.
  • a second tenant identifier that is highly distinguishable from the first tenant identifier may be generated. Furthermore, the second tenant ID may be compared with the stored tenant ID to determine whether the second tenant ID is the same as the stored tenant ID. In a case where it is determined that the second tenant identifier of the tenant is different from the stored tenant identifiers, it may be determined that the second tenant identifier can uniquely identify the tenant. Furthermore, a matching relationship between the second tenant ID of the tenant and the device authentication information corresponding to the tenant may be established, and the second tenant ID may be stored as the final tenant ID of the tenant.
  • a third tenant ID may be generated based on the tenant information, the first tenant ID, and the second tenant ID, and return Execute the above steps of duplicate checking until it is determined that the generated tenant ID can uniquely identify the tenant, establish a matching relationship between the tenant ID and device authentication information, and store the tenant ID as the tenant's final tenant ID.
  • the first device authentication information may be generated according to the following steps:
  • Step 1 Generate initial device authentication information based on tenant information.
  • the initial device authentication information includes initial authentication account information and initial authentication password information.
  • the initial authentication account information can identify the device corresponding to the tenant, and the initial authentication password information can be used for security authentication of the account information.
  • the initial authentication account information corresponding to the tenant information may be generated based on the tenant information of the tenant according to the preset authentication account information generation rules.
  • the generation rule of the authentication account information may be to randomly combine numbers and letters according to the first preset word length (eg, 8 digits).
  • the number and letters in the tenant information acquisition time, tenant mobile phone number, tenant mailbox and other information can be randomly selected and randomly combined to obtain an initial authentication account with a preset word length of 8 information.
  • initial authentication password information corresponding to the tenant information and initial authentication account information may be generated based on the obtained tenant information and/or initial authentication account information by using a random password generation strategy.
  • the password random generation strategy can be: the password length is at least the second preset word length (such as 8 bits), and the longest is no more than the third preset word length (such as 128 bits); the password is a combination of the following character sets : at least one lowercase letter (a ⁇ z); at least one uppercase letter (A ⁇ Z); at least one number (0 ⁇ 9); at least one special character: ( ⁇ !@#$ ⁇ *()_+); It cannot be the same as the account corresponding to the authentication account information or the corresponding account is written backwards, the tenant name cannot appear, and consecutive numbers and letters cannot appear.
  • initial device authentication information composed of initial authentication account information and initial authentication password information can be generated.
  • Step 2 If the initial device authentication information is different from the stored tenant's device authentication information, use the initial device authentication information as the first device authentication information corresponding to the tenant.
  • the stored tenant's device authentication information can be obtained first, and then the initial device authentication information is compared with the tenant's device authentication information in turn to determine whether the initial device authentication information is consistent with the tenant's The device authentication information is the same.
  • the initial authentication account information in the initial device authentication information and the stored device authentication information can be determined Whether the authentication account information in is the same. If yes, it can be directly determined that the initial device authentication information is the same as the stored device authentication information, if not, it can be judged whether the initial authentication password information in the initial device authentication information is the same as the authentication password in the stored device authentication information .
  • the initial device authentication information may also be directly determined that the initial device authentication information is the same as the stored device authentication information, and if not, it may be determined that the initial device authentication information is different from the stored device authentication information. Furthermore, it can be determined whether the initial device authentication information is the same as the tenant's device authentication information.
  • the initial device authentication information is different from the stored tenant's device authentication information, it can be determined that the initial device authentication information is the only device authentication information, and the initial device authentication information is used as the first device authentication information corresponding to the tenant and stored in the database.
  • the process of comparing the initial device authentication information with the tenant's device authentication information you can first compare the initial authentication account information in the initial device authentication information, and then compare the initial authentication password information, or compare the initial authentication password information first, and then compare the initial authentication password information.
  • the account information, or the initial authentication account information and the initial authentication password information may also be compared at the same time, which is not limited here.
  • the initial authentication account information or the initial authentication password information may be determined whether there is information identical to the initial authentication account information or the initial authentication password information, which will not be repeated here.
  • the situation that the tenant's device authentication information is the same as the initial device authentication information may include the following three types: The case of the authentication account information, the case of the same authentication password information as the initial authentication password information, and the situation of both the same initial authentication account information and the initial authentication password information.
  • the generation time of the initial device authentication information and the tenant identifier corresponding to the tenant may be determined.
  • the tenant identifier may be information in the tenant information corresponding to the tenant, and is used to represent the identity information of the tenant.
  • the tenant identifier may be a trademark of the tenant, special characters corresponding to the tenant, and the like.
  • additional information of the initial device authentication information may be generated based on the generation time and the tenant identifier. For example, 3 digits can be randomly selected from the generation time, and then used together with the tenant identifier as attachment information.
  • additional information may be added to the initial device authentication information to obtain new initial device authentication information.
  • additional information may be added to the initial device authentication information to obtain new initial device authentication information.
  • one or more characters in the additional information may be randomly added to the initial device authentication information.
  • the initial authentication account information is 123456, and the additional message is For example, characters 3, 5, 7 and Randomly insert into the initial account information to get the new initial authentication account information
  • the new initial device authentication information can be compared with the stored tenant's device authentication information, and if it is determined that the new initial device authentication information is different from the stored tenant's device authentication information, the new The initial device authentication information is used as the first device authentication information corresponding to the tenant.
  • Step 1 Obtain the number of associated devices corresponding to the target tenant.
  • Step 2 When the number of devices is less than the association threshold, send association determination information to the target tenant.
  • a target tenant may associate a number of devices, and there may be an association threshold indicating the maximum number of devices that can be associated.
  • the association threshold may be determined by the target tenant during the process of renting the server, or may be determined according to the load capacity, computing resources and real-time network status of the server, which is not limited here.
  • the target tenant Before determining the target tenant and establishing the association relationship between the target tenant and the target device, it is necessary to first determine the number of associated devices corresponding to the target tenant. After that, obtain the association threshold corresponding to the target tenant, and compare the number of devices with the association threshold. If it is determined that the number of devices is less than the association threshold, it means that the number of devices currently associated with the target tenant has not reached the maximum association threshold, then Association determination information may be sent to the target device. Thereafter, the target device may present the association determination information to the target tenant. After obtaining the association determination information, if the target tenant confirms the establishment of the association relationship, the target device can be used to feed back to the server association indication information representing the willingness to associate the target device. On the contrary, if the target tenant does not use the target device to provide feedback, It means that there is no willingness to associate the target device.
  • the server receives the association indication information for the association determination information fed back by the target tenant by using the target device, the server establishes an association relationship between the target device and the target tenant.
  • the association threshold If the number of associated devices corresponding to the target tenant is equal to the association threshold, it means that the current number of associated devices of the target tenant has reached the maximum association threshold, and the association relationship with the target device cannot be established.
  • the server may generate first prompt information for prompting the target tenant, and send the first prompt information to the target device.
  • the first prompt information may be information for prompting that the association relationship between the target device and the target tenant cannot be established.
  • the target device may acquire the first prompt information and display it to the target tenant. Based on the displayed first prompt information, the target tenant can obtain information that the association relationship cannot be established, and based on this information, use the target device to perform subsequent operations, for example, give up establishing the association relationship between the target device and the target tenant.
  • network status information of the server and remaining computing power resources may also be acquired.
  • the network status information and the remaining computing power resources can represent the association capability of the server.
  • the network status information can include information such as the network speed, network bandwidth, and network status corresponding to the server.
  • the remaining computing power resources can be based on the computing power resources currently being used by the server. and the total computing power resources are determined.
  • the target threshold and threshold update time can be determined based on network status information and remaining computing power resources. Specifically, based on the network status information of the server at each moment and the corresponding remaining computing power resources at each moment, the time when the association threshold corresponding to the server changes, and the threshold that can be changed to , and then the association threshold can be changed to Time is used as the threshold update time, and the threshold that can be changed to is used as the target threshold.
  • the association threshold may be updated to the target threshold. Afterwards, when it is determined that the target threshold is greater than the association threshold, it can be determined that the number of devices currently associated with the server has increased, and further, an association relationship between the target device and the target tenant can be established.
  • association relationship between the target device and the target tenant can also be established according to the method shown in FIG. 3 , as shown in FIG.
  • a flowchart of a method for an association relationship between target tenants may include the following steps:
  • S301 Obtain an association update request for a target tenant when the number of devices is equal to an association threshold.
  • the association update request includes device information and a data processing method of the device to be replaced; the device to be replaced is a device associated with the target tenant.
  • the association update request for the target tenant may be a request to disassociate an associated device corresponding to the target tenant and establish an association relationship between the target device and the target tenant.
  • the server may generate the first prompt information and send it to the target device, and then the target tenant may obtain the first prompt information.
  • the target tenant obtains the first prompt information
  • the target device can be replaced by the device to be replaced and the device to be replaced can be determined from the associated devices corresponding to the target tenant.
  • Device information for the device For example, the device to be replaced may be an unused device among the associated devices corresponding to the target tenant.
  • the device information may be information capable of identifying the identity of the device to be replaced, for example, the device information may be the device identification number, port information, area information, coordinate information, etc. of the device to be replaced, which is not limited here.
  • the target tenant can determine a data processing method for the stored data according to the importance and function of the device to be replaced. For example, the stored data of the device to be replaced with a higher importance is cached in the target device, and the stored data of the device to be replaced with a lower importance is directly deleted.
  • the target tenant After the target tenant determines the device to be replaced, the device information, and the data processing method, it can enter the device information on the target device, specify the data processing method, and initiate an association request. Therefore, the target device can generate an association update request and send it to the server based on the device information input by the target tenant, the specified data processing method, and the association request.
  • S302 Based on the device information of the device to be replaced, release the association relationship between the target tenant and the device to be replaced, and use a data processing method to process the data stored in the device to be replaced.
  • the server may determine the device to be replaced from the associated devices corresponding to the target tenant based on the obtained device information of the device to be replaced in the association update request. Then, the association relationship between the device to be replaced and the target tenant can be released, and the data stored in the device to be replaced can be processed by using a data processing method.
  • the association relationship between the target device and the target tenant can be established.
  • prompt information for prompting that the target device has successfully established an association with the target tenant, and successfully released the association between the device to be replaced and the target tenant can also be generated and sent to to the target device.
  • the target tenant may also determine that the number of associated devices corresponding to the target tenant has reached an association threshold. Furthermore, based on this information, the target tenant can determine whether to manually update the association threshold, or, if it is determined that there is a new target device that needs to establish an association relationship, it can directly use the target device to send an association update request to the server to Realize establishing an association relationship between the new target device and the target tenant.
  • the server may also obtain the association time and association time of the associated devices corresponding to the target tenant. Release method.
  • the device disassociation method will be set according to the importance of the device. For example, the server can only disassociate the device with an importance greater than a certain value when the tenant determines that it can disassociate the established association. Established association relationship; for devices whose importance is less than a certain value, the server can actively cancel the established association relationship. .
  • the second device whose association time is the earliest and whose association disassociation mode is actively disassociated by the server may be determined. Then, the association relationship between the second device and the target tenant may be initiated, and the association relationship between the target device and the target tenant may be established. In this way, when the server determines that the number of associated devices is equal to the association threshold, the server can automatically determine the second device through the association time and disassociation method of the associated device, and successfully establish the association relationship between the target device and the target tenant. The establishment of the association relationship can be realized without obtaining an association update request, which reduces the operation steps of the target tenant.
  • the server actively releases the association relationship between the target tenant and the second device, and establishes the association relationship between the target device and the target tenant, so that the target device can be used to replace the second device, and the function of the device can be further improved.
  • second prompt information for prompting that the target device has been used to replace the second device may be generated and sent to the target device.
  • the target tenant may determine the association status of the target device and the status of the second device that disassociates the relationship based on the second prompt information acquired by the target device.
  • the server may further determine the device login status of the associated device corresponding to the target tenant when the device quantity is determined to be equal to the association threshold.
  • the device login status can reflect the connection status of the associated device, for example, online or offline.
  • the offline devices are determined from the associated devices, and if there are multiple offline devices, the offline reason and offline duration of the offline devices can be determined. The longer the offline time, the more data will be lost corresponding to the offline associated devices.
  • the offline reason can reflect whether the associated device is offline due to network status, or due to a problem with the device itself.
  • the first device to be released may be selected from the offline devices based on the offline reason and the offline duration of the offline device. For example, the offline device that has been offline for the longest time and is offline due to a problem with the device itself can be filtered out. If there is only one offline device, the offline device may be directly used as the first device to be released.
  • the association relationship between the first device to be released and the target tenant may be released.
  • An association relationship between the target device and the target tenant is established, and based on the target device and the first device to be released, third prompt information for prompting that the target device has been used to replace the first device to be released may be generated.
  • the third prompt information may be sent to the target device, so that the target tenant can determine the association status of the target device and the status of the first device to be released from the disassociation relationship based on the third prompt information.
  • the server may also determine the usage frequency and association level of the associated devices corresponding to the target tenant if the number of devices is determined to be equal to the association threshold information.
  • the association level information is used to indicate the association importance of the associated devices.
  • the frequency of use can represent the monitoring times and monitoring rate of the associated device in a unit time. The lower the frequency of use, the less the monitoring times of the associated device in a unit time, and the lower the monitoring rate.
  • the second device to be released may be determined based on the frequency of use and the association level information.
  • the associated device with the lowest usage frequency and the lowest association importance corresponding to the association level information can be screened out, and the associated device can be used as the second device to be released .
  • the association between the second device to be released and the target tenant may be released, and the association between the target device and the target tenant may be established.
  • the server may also generate fourth prompt information for prompting that the target device has been used to replace the second device to be released based on the target device and the second device to be released.
  • the fourth prompt information may be sent to the target device, so that the target tenant can determine the association situation of the target device based on the fourth prompt information.
  • the target device if the target device can correspond to multiple tenants, before establishing an association relationship between the target device and the target tenant, it is also necessary to determine the number of associated tenants and the maximum number of tenants corresponding to the target device.
  • the server can also create a tenant according to the preset information creation strength based on the tenant information uploaded by the target device and/or the target login information obtained by the tenant's input.
  • the corresponding administrative login information is used for the tenant to log in to the server, and monitor the associated device corresponding to the tenant.
  • the management login information may include management account information and management password information.
  • the back-end management system can initiate a request to generate management login information. Then, based on the tenant information and target login information, the server can create strength according to the preset information, and use the preset management account generation rules to generate the initial management account information, and further, based on the tenant information and/or the initial management account information and/or Or the target login information, according to the preset information creation strength, use the password random generation strategy to generate the initial management password information corresponding to the initial management account information.
  • the stored management login information corresponding to the tenant can be obtained, and then the generated initial management account information and initial management password information can be checked for plagiarism by using the management login information corresponding to the tenant.
  • the management login information composed of the initial management account information and the initial management password information will be used as the management login information of the tenant.
  • the target tenant can also manage the associated devices based on the generated management login information, as shown in FIG. 4 , which is provided by the embodiments of the present disclosure.
  • a flowchart of a method for managing associated devices may include the following steps:
  • S401 Obtain a first login request sent by a target tenant.
  • the first login request includes management login information corresponding to the target tenant.
  • the target tenant when the target tenant needs to manage the associated devices, it can input its corresponding management login information on any associated device, and initiate a login request on the associated device. Afterwards, the associated device may generate a first login request based on the input management login information and send it to the server.
  • S402 Acquire an instruction to disassociate from the target tenant when the management login information is verified.
  • the disassociation instruction includes at least one third device to be disassociated that has established an association relationship with the target tenant.
  • the server After the server obtains the first login request, it can verify the management login information in the first login request, and if the management login information fails to pass the verification, it generates a prompt message and sends it to the target device to prompt the target tenant to manage the login information input error.
  • the server may use the target device to display the management control page to the target tenant.
  • At least one associated device can be selected from the associated devices corresponding to the target tenant as the third device to be released. Afterwards, the target tenant can initiate a disassociation command on the management control page based on the determined at least one third device to be disassociated.
  • the server may obtain the disassociation instruction uploaded by the target device.
  • S403 Release the association relationship between the third device to be released and the target tenant.
  • At least one third device to be disassociated may be determined, and then the association relationship between the third device to be dissociated and the target tenant may be dissociated.
  • the command to cancel the association relationship may also include the device information of the third device to be released, and the server may determine the third device to be released from the associated devices based on the device information of the third device to be released, and then release the third device to be released.
  • S404 Determine an association rate of the target tenant based on the current number of associated devices of the target tenant and the current association threshold, and feed back the association rate to the target tenant.
  • the association rate of the target tenant can reflect the usage of available server resources corresponding to the target tenant.
  • the server may also determine the current number of associated devices of the target tenant and the current association threshold. Then, a ratio between the number of devices and the association threshold may be determined, an association rate of the target tenant is determined based on the ratio, and the association rate is fed back to the target tenant through the target device.
  • the target tenant can determine the usage of available server resources based on the association rate. When it is determined that the available server resources are less used, a new device can be associated with the target tenant; when it is determined that the available server resources are used more, the target device can be actively used to initiate an association disassociation instruction to the server , to actively disassociate a certain number of associated devices from the target tenant, thereby increasing available server resources and preventing delays and freezes in monitoring associated devices caused by too few available server resources.
  • the server may also acquire the device operation information of the associated device corresponding to the target tenant.
  • the device running information may reflect device information, running status, stored information, etc. of the device.
  • the obtained equipment operation information of the associated equipment can be fed back to the target tenant.
  • the device operation information can be sent to the target device that initiates the first login request, and the device can display the device operation information on the management control page, so that the target tenant can obtain the device operation information of the associated device on the management control page .
  • a device information update request of at least one associated device corresponding to the target tenant may also be obtained.
  • the device update request may be a request initiated by the target tenant using the target device to update the device information of at least one associated device, and the update may include adding information, reducing information, changing information, and the like. For example, change the area information of the associated device, increase the port information of the associated device, etc.
  • the server determines at least one associated device corresponding to the device update request from associated tenants corresponding to the target tenant, and then may update the device information of the above-mentioned associated device based on the device information update request.
  • the server may also acquire the effective lease period and the leased duration of the target tenant.
  • the effective lease period is used to reflect the maximum available lease time of the target tenant.
  • the association between the target device and the target tenant is released.
  • the association between the target device and the target tenant is released.
  • the control of the lease time of the target tenant can be realized, and the lease time limit of the target tenant can be guaranteed.
  • an embodiment of the present disclosure also provides a device monitoring system, including the server 501 mentioned in the above embodiment and the target device 502 mentioned in the above embodiment.
  • FIG. 5 it is a schematic diagram of an equipment monitoring system provided by an embodiment of the present disclosure.
  • the target device 502 can be used to log in to the background management system corresponding to the server 501, and input the target device authentication information. Afterwards, the target device 502 may obtain the target device authentication information, and send the target device authentication information to the server 501 through the communication network.
  • the server 501 may verify the target device authentication information, and if the target device authentication information is verified, determine the target tenant corresponding to the target device authentication information according to the pre-established matching relationship between the device authentication information and the tenant. Afterwards, an association relationship between the target device and the target tenant is established. Furthermore, the server 501 can monitor the target device by using the established association relationship.
  • the embodiment of the present disclosure also provides an equipment management device corresponding to the equipment monitoring method. Since the problem-solving principle of the device in the embodiment of the present disclosure is similar to the above-mentioned equipment monitoring method in the embodiment of the present disclosure, the implementation of the device Reference can be made to the implementation of the method, and repeated descriptions will not be repeated.
  • FIG. 6 it is a schematic diagram of an equipment monitoring device provided by an embodiment of the present disclosure, including:
  • the first obtaining module 601 is configured to obtain the target device authentication information sent by the target device;
  • a screening module 602 configured to determine the target tenant corresponding to the target device authentication information according to the pre-established matching relationship between the target device authentication information and the tenant when the target device authentication information is verified;
  • An association module 603, configured to establish an association relationship between the target device and the target tenant
  • the monitoring module 604 is configured to monitor the target device by using the association relationship.
  • the device further includes a matching module 505:
  • the matching module 605 is configured to acquire tenant information corresponding to the tenant for any tenant before determining the target tenant corresponding to the target equipment authentication information according to the pre-established matching relationship between the equipment authentication information and the tenant ;
  • the matching module 605 is configured to establish the first tenant ID and the first device ID when the first tenant ID is different from the stored tenant ID. Matching relationship between authentication information; or
  • the matching module 605 is configured to generate initial device authentication information based on the tenant information
  • the initial device authentication information is different from the stored tenant's device authentication information, use the initial device authentication information as the first device authentication information corresponding to the tenant; store the first device authentication information corresponding to the tenant device authentication information; or
  • the stored device authentication information of the tenant has the same device authentication information as the initial device authentication information, based on the generation time of the initial device authentication information and the tenant identifier of the tenant, generate the Add the additional information of the initial device authentication information; add the additional information to the initial device authentication information to obtain new initial device authentication information, and combine the new initial device authentication information with the stored tenant's device authentication information If they are all different, use the new initial device authentication information as the first device authentication information corresponding to the tenant.
  • the device further includes a second acquiring module 606;
  • the second acquiring module 606 is configured to, after determining the target tenant corresponding to the target device authentication information, acquire the device quantity of the associated device corresponding to the target tenant;
  • the associating module 603 is configured to establish an association relationship between the target device and the target tenant if the association indication information fed back by the target tenant for the association determination information is received.
  • the second acquiring module 606 is further configured to, after acquiring the number of associated devices corresponding to the target tenant, when the number of devices is equal to the association threshold Next, obtain the network status information of the server and the remaining computing resources of the server;
  • the association module 603 is configured to establish an association relationship between the target device and the target tenant when the target threshold is greater than the association threshold.
  • the second acquiring module 606 is further configured to, after acquiring the number of associated devices corresponding to the target tenant, when the number of devices is equal to the association threshold Next, obtain an association update request for the target tenant;
  • the association update request includes device information and a data processing method of the device to be replaced;
  • the device to be replaced is a device that has been associated with the target tenant;
  • the associating module 603 is configured to release the association between the target tenant and the device to be replaced based on the device information of the device to be replaced, and use the data processing method to stored data for processing;
  • the second acquiring module 606 is further configured to, after acquiring the number of associated devices corresponding to the target tenant, when the number of devices is equal to the association threshold Next, obtain the association time of the associated device and the method of disassociation;
  • the association module 603 is configured to release the association relationship between the target tenant and the second device, and establish the association relationship between the target tenant and the target device.
  • the second acquiring module 606 is further configured to, after acquiring the number of associated devices corresponding to the target tenant, when the number of devices is equal to the association threshold Next, based on the device login status of the associated device, determine the offline device from the associated device;
  • the associating module 603 is configured to disassociate the first device to be disassociated from the target tenant;
  • An association relationship between the target device and the target tenant is established.
  • the second acquiring module 606 is further configured to, after acquiring the number of associated devices corresponding to the target tenant, when the number of devices is equal to the association threshold Next, determine the use frequency and association level information of the associated device; the association level information is used to indicate the association importance of the associated device;
  • the association module 603 is configured to disassociate the second device to be disassociated from the target tenant
  • An association relationship between the target device and the target tenant is established.
  • the matching module 605 is further configured to, after acquiring the tenant information corresponding to the tenant, based on the tenant information and/or the target login information input by the tenant, according to the preset Set the information creation strength to create management login information corresponding to the tenant; the management login information is used for the tenant to log in to the server, and the tenant monitors its corresponding associated equipment;
  • the administrative login information is stored.
  • the device further includes a third acquiring module 607:
  • the third acquiring module 607 is configured to acquire a first login request sent by the target tenant; the first login request includes management login information corresponding to the target tenant;
  • the association disassociation instruction includes at least one third device to be disassociated that has established an association relationship with the target tenant;
  • the associating module 603 is further configured to disassociate the third device to be disassociated from the target tenant;
  • an association rate of the target tenant is determined, and the association rate is fed back to the target tenant.
  • the associating module 603 is further configured to acquire the effective lease period and leased lease period of the target tenant after the establishment of the association relationship between the target device and the target tenant. duration;
  • FIG. 7 is a schematic structural diagram of a computer device provided by an embodiment of the present disclosure, including:
  • Processor 71 and memory 72 stores machine-readable instructions executable by the processor 71, the processor 71 is used to execute the machine-readable instructions stored in the memory 72, and the machine-readable instructions are executed by the processor 71 During execution, the processor 71 performs the following steps: S101: Obtain the target device authentication information sent by the target device; S102: If the target device authentication information is verified, according to the pre-established matching relationship between the device authentication information and the tenant, Determine the target tenant corresponding to the target device authentication information; S103: Establish an association relationship between the target device and the target tenant; and S104: Use the association relationship to monitor the target device.
  • memory 72 comprises memory 721 and external memory 722;
  • Memory 721 here is also called internal memory, is used for temporarily storing computing data in processor 71, and the data exchanged with external memory 722 such as hard disk, processor 71 communicates with memory 721 through memory 721.
  • the external memory 722 performs data exchange.
  • Embodiments of the present disclosure further provide a computer-readable storage medium, on which a computer program is stored, and when the computer program is run by a processor, the steps of the device monitoring method described in the foregoing method embodiments are executed.
  • the storage medium may be a volatile or non-volatile computer-readable storage medium.
  • the computer program product of the device monitoring method provided by the embodiments of the present disclosure includes a computer-readable storage medium storing program code, and the instructions included in the program code can be used to execute the steps of the device monitoring method described in the above method embodiments
  • program code storing program code
  • the instructions included in the program code can be used to execute the steps of the device monitoring method described in the above method embodiments
  • Another computer program product of the equipment monitoring method provided by the embodiments of the present disclosure includes computer readable codes, or a volatile computer readable storage medium or a nonvolatile computer readable storage medium carrying computer readable codes , when the computer-readable code runs in a processor of the electronic device, the processor in the electronic device is configured to execute the steps of the device monitoring method described in the above method embodiment, for details, refer to the above method embodiment, I won't repeat them here.
  • the computer program product can be specifically realized by means of hardware, software or a combination thereof.
  • the computer program product is embodied as a computer storage medium, and in another optional embodiment, the computer program product is embodied as a software product, such as a software development kit (Software Development Kit, SDK) etc. Wait.
  • a software development kit Software Development Kit, SDK
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to implement the technical solution of the solution of this embodiment.
  • each functional unit in each embodiment of the present disclosure may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
  • the functions are realized in the form of software function units and sold or used as independent products, they can be stored in a non-volatile computer-readable storage medium executable by a processor.
  • the technical solution of the present disclosure is essentially or the part that contributes to the prior art or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in various embodiments of the present disclosure.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disc and other media that can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Mathematical Physics (AREA)
  • Quality & Reliability (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本公开提供了一种设备监控方法、系统、装置、计算机设备和存储介质,其中,该方法包括:获取目标设备发送的目标设备认证信息;在目标设备认证信息被验证通过的情况下,根据预先建立的设备认证信息与租户的匹配关系,确定目标设备认证信息对应的目标租户;建立目标设备和目标租户之间的关联关系;利用关联关系,对目标设备进行监控。

Description

设备监控方法、系统、装置、计算机设备和存储介质
本申请要求2021年06月30日提交、申请号为202110737940.9,发明名称为“设备监控方法、系统、装置、计算机设备和存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本公开涉及物联网技术领域,具体而言,涉及一种设备监控方法、系统、装置、计算机设备和存储介质。
背景技术
随着物联网技术的快速发展,各种各样的物联网设备开始被广泛应用在多种场景中。而针对属于同一租户的多个物联网设备的管理和监控问题,租户可以利用其所租用的服务器实现对物联网设备的管理和监控。
发明内容
本公开实施例至少提供一种设备监控方法、系统、装置、计算机设备和存储介质,以实现高效地对物联网设备进行高效监控和统一管理。
第一方面,本公开实施例提供了一种设备监控方法,包括:
获取目标设备发送的目标设备认证信息;
在所述目标设备认证信息被验证通过的情况下,根据预先建立的设备认证信息与租户的匹配关系,确定所述目标设备认证信息对应的目标租户;
建立所述目标设备和所述目标租户之间的关联关系;
利用所述关联关系,对所述目标设备进行监控。
该实施方式,基于预先建立的设备认证信息与租户的匹配关系,能够实现在获取的目标设备认证信息被验证通过之后,从多个租户中快速且准确地确定出与目标设备认证信息相匹配的目标租户,相比于利用目标设备的设备信息(如端口等)确定目标租户而言,提高了确定目标设备对应的目标租户的效率,从而,可以实现快速且准确地建立目标设备和目标租户之间的关联关系,继而服务器可以基于建立的关联关系,对目标设备进行高效地监控,以及对存在关联关系的设备进行统一管理。进而,目标租户可以利用服务器实现对目标设备的高效监控,以及对租户对应的设备进行统一管理。另外,通过对目标设备认证信息进行验证的方式,能够实现对目标设备的身份验证,有利于提高建立的关联关系的安全性。
在一种可能的实施方式中,在所述根据预先建立的设备认证信息与租户的匹配关系,确定所述目标设备认证信息对应的目标租户之前,所述方法还包括:
针对任一个租户,获取所述租户对应的租户信息;
从所述租户信息中获取所述租户的第一租户标识;
基于所述租户信息,生成所述租户对应的第一设备认证信息;
建立所述第一租户标识和所述第一设备认证信息之间的匹配关系。
租户标识用于唯一标识租户身份,设备认证信息用于标识租户对应的设备的身份,以及实现设备的注册。基于租户信息,能够准确得获取到租户的第一租户标识,以及,生成与租户身份相匹配的第一设备认证信息,从而,能够建立与租户信息相对应的匹配关系,以便于后续快速、准确地确定目标租户。
在一种可能的实施方式中,所述建立所述第一租户标识和所述第一设备认证信息之间的匹配关系,包括:
在所述第一租户标识与已存储的租户标识均不相同的情况下,建立所述第一租户标识和所述第一设备认证信息之间的匹配关系;或
在已存储的租户标识中存在与所述第一租户标识相同的租户标识的情况下,基于所述租户信息和所述第一租户标识,生成所述租户的第二租户标识;在所述第二租户标识与已存储的租户标识均不相同的情况下,建立所述第二租户标识和所述第一设备认证信息之间的匹配关系。
不同的租户用不同的租户标识进行标记,能够防止建立的不同的租户的租户标识和设备认证信息之间的匹配关系的混淆,从而导致建立错误的关联关系,以及造成租户无法监控自己的设备或者可以监控其他租户的设备的问题,提高了设备监控的安全性。
在一种可能的实施方式中,所述基于所述租户信息,生成所述租户对应的第一设备认证信息,包括:
基于所述租户信息,生成初始设备认证信息;
在所述初始设备认证信息与已存储的租户的设备认证信息均不相同的情况下,将所述初始设备认证信息作为所述租户对应的第一设备认证信息;存储所述租户对应的第一设备认证信息;或
在所述已存储的租户的设备认证信息中存在与所述初始设备认证信息相同的设备认证信息的情况下,基于所述初始设备认证信息的生成时间和所述租户的租户标志符,生成所述初始设备认证信息的附加信息;将所述附加信息添加在所述初始设备认证信息中,得到新的初始设备认证信息,在所述新的初始设备认证信息与已存储的租户的设备认证信息均不相同的情况下,将所述新的初始设备认证信息作为所述租户对应的第一设备认证信息。
通过为租户生成不同的设备认证信息的方式,能够保证设备认证信息和租户对应的租户标识之间存在一一对应的匹配关系,从而,可以实现在对第一设备认证信息验证通过的情况下,根据匹配关系,快速且准确地确定第一设备认证信息对应的目标租户。并且,通过生成附加信息的方式,能够提高生成的初始设备认证信息的特异性。
在一种可能的实施方式中,在所述确定所述目标设备认证信息对应的目标租户之后,所述方法还包括:
获取所述目标租户对应的已关联设备的设备数量;
在所述设备数量小于关联阈值的情况下,向所述目标租户发送关联确定信息;
所述建立所述目标设备和所述目标租户之间的关联关系,包括:
若接收到所述目标租户针对所述关联确定信息反馈的关联指示信息,建立所述目标设备和所述目标租户之间的关联关系。
关联阈值用于表征目标租户当前可以关联的最大的设备的数量,通过已关联设备和关联阈值的比较,能够准确地确定出当前能否建立目标设备与目标租户之间的关联关系。关联指示信息能够反映目标租户存在关联目标设备的意愿,通过向目标租户发送关联确定信息的方式,能够确定目标租户是否存在建立关联关系的意愿,从而,能够准确地建立与目标租户的意愿信息相匹配的关联关系。
在一种可能的实施方式中,在所述获取所述目标租户对应的已关联设备的设备数量之后,所述方法还包括:
在所述设备数量等于所述关联阈值的情况下,获取所述服务器的网络状况信息和所述服务器的剩余算力资源;
基于所述网络状况信息和所述剩余算力资源,确定目标阈值和阈值更新时间;
按照所述阈值更新时间,将所述关联阈值更新为所述目标阈值;
所述建立所述目标设备和所述目标租户之间的关联关系,包括:
在所述目标阈值大于所述关联阈值的情况下,建立所述目标设备和所述目标租户之间的关联关系。
网络状况信息和剩余算力资源能够表征服务器的关联能力,关联能力能够决定关联阈值。因此,基于网络状况信息和剩余算力资源,能够准确定地确定出关联阈值变化的时间(即阈值更新时间)以及可变化为的阈值(即目标阈值),进而,基于确定的目标阈值和阈值更新时间,能够实现在服务器关联能力允许的情况下,及时建立目标设备和目标租户之间的关联关系。
在一种可能的实施方式中,在所述获取所述目标租户对应的已关联设备的设备数量之后,所述方法还包括:
在所述设备数量等于所述关联阈值的情况下,获取针对所述目标租户的关联更新请求;所述关联更新请求包括待替换设备的设备信息和数据处理方式;所述待替换设备为与所述目标租户已关联的设备;
基于所述待替换设备的设备信息,解除所述目标租户和所述待替换设备之间的关联关系,并使用所述数据处理方式,对所述待替换设备中存储的数据进行处理;
所述建立所述目标设备和所述目标租户之间的关联关系,包括:
在数据处理结束后,建立所述目标租户和所述目标设备之间的关联关系。
基于获取的关联更新请求,能够实现将待替换设备和目标租户之间的关联关系的解除,从而减少目标租户的已关联设备数量,进而,可以实现建立目标设备和目标租户之间的关联关系。不同的已关联设备中的已存储数据的重要程度不同,基于数据处理方式,能够实现利用合理的方式,对待替换设备中的已存储数据进行处理。
在一种可能的实施方式中,在所述获取所述目标租户对应的已关联设备的设备数量之后,所述方法还包括:
在所述设备数量等于所述关联阈值的情况下,获取所述已关联设备的关联时间以及关联解除方式;
从所述已关联设备中,确定关联时间最早且关联解除方式为服务器主动解除的第二设备;
解除所述目标租户和所述第二设备之间的关联关系,并建立所述目标租户和所述目标设备之间的关联关系。
基于所述目标设备和所述关联时间最早的已关联设备,生成第一提示信息;所述第一提示信息用于提示已采用所述目标设备代替所述关联时间最早的已关联设备。
关联时间越早的设备,出现其存储的信息的时效性较差、设备的功能完善度较差等情况的可能性越大,并且,针对目标租户而言,设备的关联解除方式会根据设备的重要程度进行设置,例如,重要程度大于一定数值的设备,在租户确定可以解除已建立的关联关系的情况下,服务器才可以解除已建立的关联关系;重要程度小于一定数值的设备,可以由服务器主动解除已建立的关联关系。因此,在确定已关联设备数量等于关联阈值情况下,基于关联时间和关联解除方式确定第二设备,由服务器主动解除目标租户与第二设备之间的关联关系,并建立目标设备和目标租户之间的关联关系,能够实现利用目标设备替换第二设备,以及实现设备功能的进一步完善。
在一种可能的实施方式中,在所述获取所述目标租户对应的已关联设备的设备数量之后,所述方法还包括:
在所述设备数量等于所述关联阈值的情况下,基于所述已关联设备的设备登录状态,从所述已关联设备中确定离线设备;
基于所述离线设备的离线时长和离线原因,从所述离线设备中筛选第一待解除设备;
解除所述第一待解除设备和所述目标租户之间的关联关系;
建立所述目标设备和所述目标租户之间的关联关系。
离线的已关联设备无法继续对其进行监控,并且,离线时间越长,离线的已关联设备对应丢失的数据越多。离线原因能够反映已关联设备是因网络状态而离线,还因设备自身问题等而离线。因此,基于确定的离线时长和离线原因,能够准确地确定出当前时刻适合解除关联关系的第一待解除设备,进而,可以解除第一待解除设备与目标租户之间的关联关系,建立目标设备和目标租户之间的关联关系,从而,能够利用在线的目标设备替换第一待解除设备,实现对在线的目标设备进行监控。
在一种可能的实施方式中,在所述获取所述目标租户对应的已关联设备的设备数量之后,所述方法还包括:
在所述设备数量等于所述关联阈值的情况下,确定所述已关联设备的使用频率和关联等级信息;所述关联等级信息用于指示所述已关联设备的关联重要程度;
基于所述使用频率和所述关联等级信息,确定第二待解除设备;
解除所述第二待解除设备和所述目标租户之间的关联关系;
建立所述目标设备和所述目标租户之间的关联关系。
使用频率能够表征已关联设备在单位时间内的监控次数和监控率,基于关联等级信息和使用频率,能够筛选出关联等级较低且使用频率较低的第二待解除设备,利用目标设备替换第二待解除设备,既能够满足建立目标设备和目标租户之间的关联关系的关联需求,还能够提高设备的监控效率。
在一种可能的实施方式中,在所述获取所述租户对应的租户信息之后,还包括:
基于所述租户信息和/或所述租户输入的目标登录信息,按照预设的信息创建强度,创建所述租户对应的管理登录信息;所述管理登录信息用于所述租户登录所述服务器,以及所述租户对其对应的已关联设备进行监控;
存储所述管理登录信息。
目标登录信息能够表征租户意愿得到的管理登录信息,基于目标登录信息和信息创建强度等,能够创建出安全性较高且满足用户意愿的管理登录信息。从而,基于建立的管理登录信息,租户能够实现利用服务器对其所对应的已关联设备进行统一管理和监控。
在一种可能的实施方式中,所述方法还包括:
获取所述目标租户发送的第一登录请求;所述第一登录请求包括所述目标租户对应的管理登录信息;
在所述管理登录信息被验证通过的情况下,获取所述目标租户发起的关联关系解除指令;所述关联关系解除指令包括已经与所述目标租户建立关联关系的至少一个第三待解除设备;
解除所述第三待解除设备和所述目标租户之间的关联关系;
基于所述目标租户当前的已关联设备的设备数量和当前的关联阈值,确定所述目标租户的关联率,将所述关联率反馈所述目标租户。
在确定第一登录请求中的管理登录信息验证通过的情况下,目标租户可以主动发送针对与目标租户建立关联关系的至少一个第三待解除设备的关联关系解除指令,从而实现目标租户对已关联设备的管理。利用关联率,能够反映目标租户对应的可使用服务器资源的使用情况,通过将关联率反馈给目标租户的方式,目标租户能够基于关联率进行新设备的关联或者进行已关联设备的解除。
在一种可能的实施方式中,在所述建立所述目标设备和所述目标租户之间的关联关系之后,还包括:
获取所述目标租户的有效租用期限和已租用时长;
在所述已租用时长大于所述有效租用期限的情况下,解除所述目标设备和所述目标租户之间的关联关系。
有效租用期限用于反映目标租户最大的可租用时间,基于有效租用期限和目标租户对应的已租用时长,能够实现对目标租户的租用时间的控制,保证目标租户的租用时效。
第二方面,本公开实施例还提供一种设备监控系统,包括:如上述第一方面,或第一方面中任一种可能的实施方式中所述的目标设备和如上述第一方面,或第一方面中任一种可能的实施方式中所述的服务器;
所述目标设备,用于获取目标设备认证信息,以及,将所述目标设备认证信息发送给所述服务器。
第三方面,本公开实施例还提供一种设备监控装置,包括:
第一获取模块,用于获取目标设备发送的目标设备认证信息;
筛选模块,用于在所述目标设备认证信息被验证通过的情况下,根据预先建立的设备认证信息与租户的匹配关系,确定所述目标设备认证信息对应的目标租户;
关联模块,用于建立所述目标设备和所述目标租户之间的关联关系;
监控模块,用于利用所述关联关系,对所述目标设备进行监控。
在一种可能的实施方式中,所述装置还包括匹配模块:
所述匹配模块,用于在所述根据预先建立的设备认证信息与租户的匹配关系,确定所述目标设备认证信息对应的目标租户之前,针对任一个租户,获取所述租户对应的租户信息;
从所述租户信息中获取所述租户的第一租户标识;
基于所述租户信息,生成所述租户对应的第一设备认证信息;
建立所述第一租户标识和所述第一设备认证信息之间的匹配关系。
在一种可能的实施方式中,所述匹配模块,用于在所述第一租户标识与已存储的租户标识均不相同的情况下,建立所述第一租户标识和所述第一设备认证信息之间的匹配关系;或
在已存储的租户标识中存在与所述第一租户标识相同的租户标识的情况下,基于所述租户信息和所述第一租户标识,生成所述租户的第二租户标识;在所述第二租户标识与已存储的租户标识均不相同的情况下,建立所述第二租户标识和所述第一设备认证信息之间的匹配关系。
在一种可能的实施方式中,所述匹配模块,用于基于所述租户信息,生成初始设备认证信息;
在所述初始设备认证信息与已存储的租户的设备认证信息均不相同的情况下,将所述初始设备认证信息作为所述租户对应的第一设备认证信息;存储所述租户对应的第一设备认证信息;或
在所述已存储的租户的设备认证信息中存在与所述初始设备认证信息相同的设备认证信息的情况下,基于所述初始设备认证信息的生成时间和所述租户的租户标志符,生成所述初始设备认证信息的附加信息;将所述附加信息添加在所述初始设备认证信息中,得到新的初始设备认证信息,在所述新的初始设备认证信息与已存储的租户的设备认证信息均不相同的情况下,将所述新的初始设备认证信息作为所述租户对应的第一设备认证信息。
在一种可能的实施方式中,所述装置还包括第二获取模块;
所述第二获取模块,用于获取所述目标租户对应的已关联设备的设备数量;
在所述设备数量小于关联阈值的情况下,向所述目标租户发送关联确定信息;
所述关联模块,用于若接收到所述目标租户针对所述关联确定信息反馈的关联指示信息,建立所述目标设备和所述目标租户之间的关联关系。
在一种可能的实施方式中,所述第二获取模块,还用于在所述获取所述目标租户对应的已关联设备的设备数量之后,在所述设备数量等于所述关联阈值的情况下,获取所述服务器的网络状况信息和所述服务器的剩余算力资源;
基于所述网络状况信息和所述剩余算力资源,确定目标阈值和阈值更新时间;
按照所述阈值更新时间,将所述关联阈值更新为所述目标阈值;
所述关联模块,用于在所述目标阈值大于所述关联阈值的情况下,建立所述目标设备和所述目标租户之间的关联关系。
在一种可能的实施方式中,所述第二获取模块,还用于在所述获取所述目标租户对应的已关联 设备的设备数量之后,在所述设备数量等于所述关联阈值的情况下,获取针对所述目标租户的关联更新请求;所述关联更新请求包括待替换设备的设备信息和数据处理方式;所述待替换设备为与所述目标租户已关联的设备;
所述关联模块,用于基于所述待替换设备的设备信息,解除所述目标租户和所述待替换设备之间的关联关系,并使用所述数据处理方式,对所述待替换设备中存储的数据进行处理;
在数据处理结束后,建立所述目标租户和所述目标设备之间的关联关系。
在一种可能的实施方式中,所述第二获取模块,还用于在所述获取所述目标租户对应的已关联设备的设备数量之后,在所述设备数量等于所述关联阈值的情况下,获取所述已关联设备的关联时间以及关联解除方式;
从所述已关联设备中,确定关联时间最早且关联解除方式为服务器主动解除的第二设备;
所述关联模块,用于解除所述目标租户和所述第二设备之间的关联关系,并建立所述目标租户和所述目标设备之间的关联关系。
在一种可能的实施方式中,所述第二获取模块,还用于在所述获取所述目标租户对应的已关联设备的设备数量之后,在所述设备数量等于所述关联阈值的情况下,基于所述已关联设备的设备登录状态,从所述已关联设备中确定离线设备;
基于所述离线设备的离线时长和离线原因,从所述离线设备中筛选第一待解除设备;
所述关联模块,用于解除所述第一待解除设备和所述目标租户之间的关联关系;
建立所述目标设备和所述目标租户之间的关联关系。
在一种可能的实施方式中,所述第二获取模块,还用于在所述获取所述目标租户对应的已关联设备的设备数量之后,在所述设备数量等于所述关联阈值的情况下,确定所述已关联设备的使用频率和关联等级信息;所述关联等级信息用于指示所述已关联设备的关联重要程度;
基于所述使用频率和所述关联等级信息,确定第二待解除设备;
所述关联模块,用于解除所述第二待解除设备和所述目标租户之间的关联关系;
建立所述目标设备和所述目标租户之间的关联关系。
在一种可能的实施方式中,所述匹配模块,还用于在所述获取所述租户对应的租户信息之后,基于所述租户信息和/或所述租户输入的目标登录信息,按照预设的信息创建强度,创建所述租户对应的管理登录信息;所述管理登录信息用于所述租户登录所述服务器,以及所述租户对其对应的已关联设备进行监控;
存储所述管理登录信息。
在一种可能的实施方式中,所述装置还包括第三获取模块:
所述第三获取模块,用于获取所述目标租户发送的第一登录请求;所述第一登录请求包括所述目标租户对应的管理登录信息;
在所述管理登录信息被验证通过的情况下,获取所述目标租户发起的关联关系解除指令;所述关联关系解除指令包括已经与所述目标租户建立关联关系的至少一个第三待解除设备;
所述关联模块,还用于解除所述第三待解除设备和所述目标租户之间的关联关系;
基于所述目标租户当前的已关联设备的设备数量和当前的关联阈值,确定所述目标租户的关联率,将所述关联率反馈所述目标租户。
在一种可能的实施方式中,所述关联模块,
还用于在所述建立所述目标设备和所述目标租户之间的关联关系之后,获取所述目标租户的有效租用期限和已租用时长;
在所述已租用时长大于所述有效租用期限的情况下,解除所述目标设备和所述目标租户之间的关联关系。
第四方面,本公开可选实现方式还提供一种计算机设备,处理器、存储器,所述存储器存储有所述处理器可执行的机器可读指令,所述处理器用于执行所述存储器中存储的机器可读指令,所述机器可读指令被所述处理器执行时,所述机器可读指令被所述处理器执行时执行上述第一方面,或第一方面中任一种可能的实施方式中的步骤。
第五方面,本公开可选实现方式还提供一种计算机可读存储介质,该计算机可读存储介质上存储有计算机程序,该计算机程序被运行时执行上述第一方面,或第一方面中任一种可能的实施方式中的步骤。
第六方面,本公开可选实现方式还提供一种计算机程序产品,包括计算机可读代码,或者承载有计算机可读代码的易失性计算机可读存储介质或非易失性计算机可读存储介质,当所述计算机可读代码在电子设备的处理器中运行时,所述电子设备中的处理器执行上述第一方面,或第一方面中任一种可能的实施方式中的步骤。
关于上述设备监控系统、装置、计算机设备、及计算机可读存储介质和计算机程序产品的效果描述参见上述设备监控方法的说明,这里不再赘述。
附图说明
为了更清楚地说明本公开实施例的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,此处的附图被并入说明书中并构成本说明书中的一部分,这些附图示出了符合本公开的实施例,并与说明书一起用于说明本公开的技术方案。应当理解,以下附图仅示出了本公开的某些实施例,因此不应被看作是对范围的限定,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他相关的附图。
图1示出了本公开实施例所提供的一种应用于服务器的设备监控方法;
图2示出了本公开实施例所提供的一种建立匹配关系的方法的流程图;
图3示出了本公开实施例所提供的一种建立目标设备与目标租户之间的关联关系的方法的流程图;
图4示出了本公开实施例所提供的一种管理已关联设备的方法的流程图;
图5示出了本公开实施例所提供的一种设备监控系统的示意图;
图6示出了本公开实施例所提供的一种设备管理装置的示意图;
图7示出了本公开实施例所提供的一种计算机设备结构示意图。
具体实施方式
为使本公开实施例的技术方案和优点更加清楚,下面将结合本公开实施例中附图,对本公开实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本公开一部分实施例,而不是全部的实施例。通常在此处描述和示出的本公开实施例的组件可以以各种不同的配置来布置和设计。因此,以下对本公开的实施例的详细描述并非旨在限制要求保护的本公开的范围,而是仅仅表示本公开的选定实施例。基于本公开的实施例,本领域技术人员在没有做出创造性劳动的前提下所获得的所有其他实施例,都属于本公开保护的范围。
另外,本公开实施例中的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的实施例能够以除了在这里图示或描述的内容以外的顺序实施。
在本文中提及的“多个或者若干个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。字符“/”一般表示前后关联对象是一种“或”的关系。
经研究发现,随着物联网技术的快速发展,各种各样的物联网设备开始被广泛应用在多种场景中。而针对属于同一租户的多个物联网设备的管理和监控问题,租户可以利用其所租用的服务器实现对物联网设备的管理和监控。
但现有技术,存在服务器无法高效地对物联网设备的进行管理和监控的问题,从而,租户也不能借助服务器有效的对物联网设备进行管理和监控。
基于上述研究,本公开提供了一种设备监控方法、系统、装置、计算机设备和存储介质,基于预先建立的设备认证信息与租户的匹配关系,能够实现在获取的目标设备认证信息被验证通过之后,从多个租户中快速且准确地确定出与目标设备认证信息相匹配的目标租户,相比于利用目标设备的设备信息(如端口等)确定目标租户而言,提高了确定目标设备对应的目标租户的效率,从而,可以实现快速且准确地建立目标设备和目标租户之间的关联关系,继而服务器可以基于建立的关联关系,对目标设备进行高效地监控,以及对存在关联关系的设备进行统一管理。进而,目标租户可以利用服务器实现对目标设备的高效监控,以及对租户对应的设备进行统一管理。另外,通过对目标设备认证信息进行验证的方式,能够实现对目标设备的身份验证,有利于提高建立的关联关系的安全性。
针对以上方案所存在的缺陷,均是发明人在经过实践并仔细研究后得出的结果,因此,上述问题的发现过程以及下文中本公开针对上述问题所提出的解决方案,都应该是发明人在本公开过程中对本公开做出的贡献。
应注意到:相似的标号和字母在下面的附图中表示类似项,因此,一旦某一项在一个附图中被定义,则在随后的附图中不需要对其进行进一步定义和解释。
需要说明的是,本公开实施例中所提到的特定名词包括:
UUID:Universally Unique Identifier,通用唯一识别码。
为便于对本实施例进行理解,首先对本公开实施例所公开的一种设备监控方法的应用场景进行介绍。租户为租用服务器的客户对应的授权账户,租户可以对应于多个与客户相关的用户,用户可以对属于客户的目标设备进行使用或管理。例如,客户可以为某一网络公司,用户可以为该网络公 司的员工,目标设备为属于该网络公司的人脸识别设备。
服务器对应存在一个后台管理系统,客户在确定需要租用服务器进行设备监控的情况下,可以登录后台管理系统,将客户的基本信息作为租户信息输入。
然后服务器可以基于租户信息先生成客户对应的授权账户,即租户以及租户标识。或者,可以直接从租户信息中获取租户标识。之后,可以基于租户信息,生成管理登录信息,并将其存储在数据库中,并建立管理登录信息和租户标识之间的匹配关系。然后在客户确认生成设备认证信息的情况下,生成不存在重复的设备认证信息并将生成的设备认证信息反馈给客户。同时,建立设备认证信息和租户标识之间的匹配关系,将建立的匹配关系和设备认证信息存储在数据库中。
之后,客户可以将获取的设备认证信息告知其对应的用户。用户作为租户,可以在目标设备上输入设备认证信息进行登录,服务器可以将该设备认证信息作为目标设备认证信息并对其进行验证,在验证通过的情况下,根据目标设备认证信息对应的匹配关系,确定目标租户,建立目标租户和目标设备之间的关联关系。
最后,租户可以在目标设备上输入管理登录信息进行登录,在验证通过的情况下,将与目标租户之间存在关联关系的已关联设备的设备状态展示给租户,进而,目标租户可以通过服务器对已关联设备的监控和管理。
下面对本公开实施例所公开的一种设备监控方法进行详细介绍,本公开实施例所提供的设备监控方法的执行主体一般为具有一定计算能力的计算机设备,在一些可能的实现方式中,该设备监控方法可以通过处理器调用存储器中存储的计算机可读指令的方式来实现。
这里,以执行主体为服务器为例对本公开实施例提供的设备监控方法加以说明。
如图1所示,为本公开实施例提供的一种应用于服务器的设备监控方法的流程图,可以包括以下步骤:
S101:获取目标设备发送的目标设备认证信息。
这里,目标设备可以为任一物联网设备,例如,智能门禁设备、智能手环、智能灯泡、智能公路设备等等。服务器为具有对物联网设备进行管理和监控功能的服务器。不同的目标设备可以对应于不同的租户,同一租户可以对应于多个设备。
设备认证信息是用于标识租户对应的设备的身份,以及实现设备的注册的信息,是服务器为租户创建的信息,不同的租户其对应的设备认证信息不同。目标设备认证信息可以为正在登录的目标设备上传的设备认证信息,用于服务器对目标设备的身份验证。
具体实施时,租户在获取到目标设备认证信息之后,可以在目标设备上输入目标设备认证信息,并发起设备登录请求,进而,目标设备可以将目标设备认证信息发送至服务器,从而,服务器可以获取到目标设备认证信息。
S102:在目标设备认证信息被验证通过的情况下,根据预先建立的设备认证信息与租户的匹配关系,确定目标设备认证信息对应的目标租户。
服务器可以存在多个已授权的租户,不同的已授权的租户对应于不同的设备。由于不同的租户其对应的设备认证信息不同,匹配关系可以用于表示其对应的设备认证信息与租户之间的关联关系,可以预先建立并存储在数据库中。
具体实施时,在获取到目标设备发送的目标设备认证信息之后,服务器需要先对目标设备认证信息进行验证,确定该信息是否正确。如果否,则可以生成提醒登录失败的通知信息,然后将通知信息发送至目标设备。进而,用户可以在目标设备上获取通知信息,并基于该通知信息执行进一步的操作,例如,重新输入目标设备认证信息,或者点击重试等。
如果是,则可以根据预先建立的设备认证信息与租户的匹配关系,确定目标设备认证信息对应的租户,并将该租户作为与目标设备认证信息相匹配的目标租户。
这样,基于预先建立的匹配关系,可以实现快速、高效且准确地确定的目标租户。
S103:建立目标设备和所述目标租户之间的关联关系。
这里,关联关系用于表征该关联关系对应的目标设备属于其对应的目标租户。具体的,在确定目标设备对应的目标租户之后,可以建立目标设备和目标租户之间的关联关系。
S104:利用关联关系,对目标设备进行监控。
这里,在建立关联关系之后,服务器可以利用关联关系对该目标设备进行监控,并将可以将监控信息反馈给目标租户,从而,实现目标租户对目标设备的监控。
这样,基于预先建立的设备认证信息与租户的匹配关系,能够实现在获取的目标设备认证信息被验证通过之后,从多个租户中快速且准确地确定出与目标设备认证信息相匹配的目标租户,相比于利用目标设备的设备信息(如端口等)确定目标租户而言,提高了确定目标设备对应的目标租户的效率,从而,可以实现快速且准确地建立目标设备和目标租户之间的关联关系,继而服务器可以基于建立的关联关系,对目标设备进行高效地监控,以及对存在关联关系的设备进行统一管理。进而,目标租户可以利用服务器实现对目标设备的高效监控,以及对租户对应的设备进行统一管理。另外,通过对目标设备认证信息进行验证的方式,能够实现对目标设备的身份验证,有利于提高建立的关联关系的安全性。
另外,同一设备也可以对应于不同的租户,例如,不同的租户可以根据使用需求使用同一设备进行登录,针对每次登录,在当前次登录对应的目标设备认证信息被验证通过的情况下,服务器可以确定当前次登录对应的目标租户,然后建立该设备和该目标租户之间的关联关系。然后,针对下一次登录,服务器可以基于该次登录对应的目标设备认证信息,确定对应的目标租户并建立关联关系,基于此,针对使用该设备进行登录的租户输入的目标设备认证信息的不同,可以建立该设备和不同的租户之间的关联关系。
在一种实施例中,在采用租户标识表征对应的租户的情况下,由于匹配关系是预先建立的,在一种实施例中,可以按照如图2所示的方法,在S101之前,建立设备认证信息与租户标识的匹配关系,如图2所示,为本公开实施例所提供的一种建立匹配关系的方法的流程图,可以包括以下步骤:
S201:针对任一个租户,获取租户对应的租户信息。
本步骤中,针对需要租用服务器的任一个租户,该租户可以利用设备进入服务器对应的后端管理系统,然后在后端管理系统输入租户信息。之后,设备将租户信息发送至服务器,服务器也即可以获取该租户对应的租户信息。
其中,租户信息可以为该租户的基本信息,例如,租户邮箱信息、租户手机信息、租户地址信息等。
S202:从租户信息中获取租户的第一租户标识。
本步骤中,可以直接从租户信息中获取租户的第一租户标识。或者,还可以基于获取的租户信息,生成与租户的租户信息相匹配的第一租户标识。其中,租户标识用于唯一标识租户身份。
具体实施时,针对生成第一租户标识的情况,可以根据获取租户信息的获取时间和租户对应的UUID等信息,先生成租户对应的第一租户标识,然后在确定第一租户标识准确无误且能够唯一标识该租户的情况下,可以将第一租户标识和租户信息存储至数据库中。
S203:基于租户信息,生成租户对应的第一设备认证信息。
这里,服务器同样可以基于租户信息,生成租户对应的第一设备认证信息。例如,可以利用获取租户信息的获取时间和第一租户标识等,生成租户对应的第一设备认证信息。
具体的,在生成第一租户标识之后,租户可以通过设备在后端管理系统发起生成设备认证信息的请求。进而,服务器可以基于租户信息,生成租户对应的第一设备认证信息。
在一种实施方式中,第一租户标识和第一设备认证信息也可以在获取到租户信息之后同时生成,这里不进行限定。
S204:建立第一租户标识和第一设备认证信息之间的匹配关系。
本步骤中,针对生成的第一设备认证信息,可以对其进行准确性的判断,在确定第一设备认证信息不重复的情况下,建立第一租户标识和第一设备认证信息之间的匹配关系,并将第一设备认证信息和匹配关系存储在数据库中。
其中,对第一设备认证信息进行的准确性的判断可以包括判断第一设备认证信息是否符合认证信息规范,如,信息的字数是否超过最大字数,信息的组成内容是否符合形式规范等。
基于此,可以建立租户对应的租户标识和设备认证信息之间的匹配关系。
在一种实施例中,针对S204,在生成租户对应的第一租户标识之后,可以对第一租户标识进行查重检验,以确定第一租户标识是否可以唯一标识租户。
具体的,在确定第一租户标识之后,可以获取已经存储的已授权的租户的租户标识,然后将第一租户标识与已存储的租户标识进行比较,确定第一租户标识与已存储的租户标识是否相同。在确定租户的第一租户标识与已存储的租户标识均不相同的情况下,则可以确定第一租户标识可以唯一标识租户。
进而,可以建立租户的第一租户标识和租户对应的第一设备认证信息之间的匹配关系,并将第一租户标识作为租户最终的租户标识进行存储。
另外,在确定已存储的租户标识中存在与租户的第一租户标识相同的租户标识的情况下,说明第一租户标识不可以唯一标识租户,需要重新生成租户对应的第二租户标识,以保证第二租户标识可以唯一标识租户。
具体的,可以基于租户信息和第一租户标识,生成与第一租户标识区分度较高的第二租户标识。进而,可以将第二租户标识与已存储的租户标识进行比较,确定第二租户标识与已存储的租户标识是否相同。在确定租户的第二租户标识与已存储的租户标识均不相同的情况下,可以确定第二租户标识可以唯一标识租户。进而,可以建立租户的第二租户标识和租户对应的设备认证信息之间的匹配关系,并将第二租户标识作为租户最终的租户标识进行存储。
另外,如果确定已存储的租户标识中存在与租户的第二租户标识相同的租户标识的情况下,则可以基于租户信息、第一租户标识和第二租户标识,生成第三租户标识,并返回执行上述查重检验的步骤,直至确定生成的租户标识可以唯一标识租户,建立该租户标识与设备认证信息之间的匹配关系,并将该租户标识作为租户最终的租户标识进行存储。
在一种实施例中,针对S203,可以按照以下步骤生成第一设备认证信息:
步骤一、基于租户信息,生成初始设备认证信息。
其中,初始设备认证信息包括初始认证账号信息和初始认证密码信息。其中,初始认证账号信息能够标识租户对应的设备,初始认证密码信息能够用于对账号信息的安全认证。
具体实施时,针对任一个租户,可以按照预先设置的认证账号信息生成规则,基于租户的租户信息,生成租户信息对应的初始认证账号信息。其中,认证账号信息生成规则可以为按照第一预设字长(如8位),对数字和字母进行随机组合。
例如,在获取租户信息之后,可以随机抽取租户信息的获取时间、租户信息中的租户手机号码、租户邮箱等信息中的数字和字母并进行随机组合,得到预设字长为8的初始认证账号信息。
进一步的,可以利用密码随机生成策略,基于获取的租户信息和/或初始认证账号信息,生成与租户信息和初始认证账号信息相对应的初始认证密码信息。具体的,密码随机生成策略可以为:密码长度至少为第二预设字长(如8位),最长不超过第三预设字长(如128位);密码为包含以下字符集的组合:至少一个小写字母(a~z);至少一个大写字母(A~Z);至少一个数字(0~9);至少一个特殊字符:(~!@#$^*()_+);以及不能和认证账号信息对应的账号或者对应的账号的倒写一样、不能出现租户名称、不能出现连续数字和连续字母。
从而,基于上述步骤,可以生成由初始认证账号信息和初始认证密码信息组成的初始设备认证信息。
步骤二、在初始设备认证信息与已存储的租户的设备认证信息均不相同的情况下,将初始设备认证信息作为租户对应的第一设备认证信息。
本步骤中,针对生成的初始设备认证信息,可以先获取已存储的租户的设备认证信息,然后,将初始设备认证信息依次与租户的设备认证信息进行比较,确定初始设备认证信息是否与租户的设备认证信息相同。
具体的,在将初始设备认证信息与租户的设备认证信息进行比较的过程中,针对任一已存储的设备认证信息,可以确定初始设备认证信息中的初始认证账号信息和已存储的设备认证信息中的认证账号信息是否相同。如果是,则可以直接确定初始设备认证信息和该已存储的设备认证信息相同,如果否,则可以判断初始设备认证信息中的初始认证密码信息和已存储的设备认证信息中的认证密码是否相同。
如果是,则也可以直接确定初始设备认证信息和该已存储的设备认证信息相同,如果否,则可以确定初始设备认证信息和该已存储的设备认证信息不相同。进而,可以确定出初始设备认证信息是否与租户的设备认证信息相同。
在确定初始设备认证信息与已存储的租户的设备认证信息均不相同的情况下,可以确定初始设备认证信息为唯一的设备认证信息,则将初始设备认证信息作为租户对应的第一设备认证信息并存储至数据库中。
针对初始设备认证信息与租户的设备认证信息进行比较的过程,可以先比较初始设备认证信息中的初始认证账号信息,再比较初始认证密码信息,也可以先比较初始认证密码信息,再比较初始认证账号信息,或者,还可以同时对初始认证账号信息和初始认证密码信息进行比较,这里不进行限定。
或者,也可以在生成初始认证账号信息或初始认证密码信息之后,就确定是否存在与初始认证账号信息或初始认证密码信息相同的信息,这里不再赘述。
另外,如果确定出已存储的租户的设备认证信息中存在与初始设备认证信息相同的情况下,具体的,存在与初始设备认证信息相同的情况可以包括以下三种:存在与初始认证账号信息相同的认证账号信息的情况、存在与初始认证密码信息相同的认证密码信息的情况,和存在与初始认证账号信息和初始认证密码信息都相同的情况。
针对上述情况中的任一种情况,可以确定初始设备认证信息的生成时间以及租户对应的租户标志符。其中,租户标志符可以为租户对应的租户信息中的信息,用于表征租户的身份信息。例如,租户标志符可以为租户商标、租户对应的特殊字符等。然后,可以基于生成时间和租户标志符,生成初始设备认证信息的附加信息。例如,可以从生成时间中随机选取3位数字,然后和租户标识符一起作为附件信息。
之后,可以将附加信息添加在初始设备认证信息中,得到新的初始设备认证信息。例如,可以将附加信息中的一个或多个字符随机添加在初始设备认证信息中。
以存在与初始认证账号信息相同情况、初始认证账号信息为123456,附加消息为
Figure PCTCN2021126783-appb-000001
为例,可以将附件信息中的字符3、5、7和
Figure PCTCN2021126783-appb-000002
随机插入初始账号信息中,得到新的初始认证账号信息
Figure PCTCN2021126783-appb-000003
之后,可以将新的初始设备认证信息与已存储的租户的设备认证信息进行比较,在确定新的初始设备认证信息与已存储的租户的设备认证信息均不相同的情况下,可以将新的初始设备认证信息作为租户对应的第一设备认证信息。
这样,通过为租户生成不同的认证账号信息和认证密码信息的方式,能够提高租户对应的账号安全性。
在一种实施例中,在确定目标设备认证信息对应的目标租户之后,还需要对是否能够建立目标租户和目标设备之间的关联关系进行判断,具体的,可以按照以下步骤实施:
步骤一、获取目标租户对应的已关联设备的设备数量。
步骤二、在设备数量小于关联阈值的情况下,向目标租户发送关联确定信息。
目标租户可以关联若干数量的设备,并可以存在用于指示最多可关联的设备的数量的关联阈值。其中,关联阈值可以是目标租户在租用服务器的过程中确定的,也可以是根据服务器的负载能力、算力资源和实时网络状态确定的,这里不进行限定。
在确定目标租户、建立目标租户与目标设备之间的关联关系之前,需要先确定目标租户对应的已关联的设备数量。之后,获取目标租户对应的关联阈值,并将设备数量和关联阈值进行比较,在确定设备数量小于关联阈值的情况下,说明目标租户当前已关联设备的设备数量还未达到最大的关联阈值,则可以向目标设备发送关联确定信息。之后,目标设备可以将关联确定信息展示给目标租户。目标租户在获取关联确定信息之后,如果确认建立关联关系,则可以利用目标设备向服务器反 馈用于表征存在关联目标设备的意愿的关联指示信息,相反的,如果目标租户不利用目标设备进行反馈,则说明不存在关联目标设备的意愿。
进而,服务器若接收到目标租户利用目标设备反馈的针对关联确定信息的关联指示信息,则建立目标设备和所述目标租户之间的关联关系。
针对目标租户对应的已关联设备的设备数量等于关联阈值的情况下,说明目标租户当前已关联设备的设备数量已经达到最大的关联阈值,无法再建立与目标设备的关联关系。
如果在确定目标租户对应的已关联的设备数量之后,确定设备数量等于关联阈值,则服务器可以生成用于提示目标租户的第一提示信息,并将第一提示信息发送至目标设备。其中,第一提示信息可以为用于提示无法建立目标设备和目标租户之间的关联关系的信息。
进而,目标设备可以获取第一提示信息并将其展示给目标租户。目标租户基于展示的第一提示信息,可以获取到无法建立关联关系的信息,并可以基于该信息,利用目标设备执行后续操作,例如,放弃建立目标设备和目标租户之间的关联关系。
在一种实施例中,在确定设备数量等于关联阈值的情况下,还可以获取服务器的网络状况信息以及剩余算力资源。其中,网络状况信息和剩余算力资源能够表征服务器的关联能力,网络状况信息可以包括服务器对应的网速、网络带宽、网络状态等信息,剩余算力资源可以根据服务器当前正在使用的算力资源和总算力资源确定。
进而,可以基于网络状况信息和剩余算力资源,确定目标阈值和阈值更新时间。具体的,可以基于服务器在每一时刻的网络状况信息和每一时刻对应的剩余算力资源,确定服务器对应的关联阈值变化的时间,以及可变化为的阈值,进而,可以将关联阈值变化的时间作为阈值更新时间,将可变化为的阈值作为目标阈值。
在到达阈值更新时间的情况下,可以将关联阈值更新为目标阈值。之后,可以在确定目标阈值大于关联阈值的情况下,确定服务器当前可关联的设备的数量增加,进而,可以建立目标设备和目标租户之间的关联关系。
在一种实施例中,还可以按照如图3所示的方法,建立目标设备与目标租户之间的关联关系,如图3所示,为本公开实施例所提供的一种建立目标设备与目标租户之间的关联关系的方法的流程图,可以包括以下步骤:
S301:在设备数量等于关联阈值的情况下,获取针对目标租户的关联更新请求。
其中,关联更新请求包括待替换设备的设备信息和数据处理方式;待替换设备为与目标租户已关联的设备。
本步骤中,针对目标租户的关联更新请求可以是解除目标租户对应的已关联的某一已关联设备的关联关系,建立目标设备和目标租户之间的关联关系的请求。
由上述实施例可知,在设备数量等于关联阈值的情况下,服务器可以生成第一提示信息并发送给目标设备,进而,目标租户可以获取到第一提示信息。目标租户在获取到第一提示信息之后,如果确定需要建立目标设备和目标租户之间的关联关系,则可以从目标租户对应的已关联设备中确定出目标设备可以替换的待替换设备以及待替换设备的设备信息。例如,待替换设备可以是目标租户对应的已关联设备中的已经不使用的设备。其中,设备信息可以为能够标识待替换设备的身份的信息,例如,设备信息可以为待替换设备的设备标识号、端口信息、区域信息、坐标信息等,这里不 进行限定。
并且,针对待替换设备中存储的数据,目标租户可以根据待替换设备的重要程度和作用,确定对存储的数据的数据处理方式。例如,将重要程度较高的待替换设备的存储的数据缓存到目标设备中,将重要程度较低的待替换设备的存储的数据直接删除。
目标租户在确定待替换设备、设备信息以及数据处理方式之后,可以在目标设备上输入设备信息、指定数据处理方式并发起关联请求。从而,目标设备可以基于目标租户输入的设备信息、指定数据处理方式和关联请求,生成关联更新请求并发送给服务器。
S302:基于待替换设备的设备信息,解除目标租户和待替换设备之间的关联关系,并使用数据处理方式,对待替换设备中存储的数据进行处理。
这里,服务器可以基于获取的关联更新请求中的待替换设备的设备信息,从目标租户对应的已关联设备中,确定待替换设备。然后,可以解除待替换设备和目标租户之间的关联关系,并利用数据处理方式,对待替换设备中存储的数据进行处理。
S303:在数据处理结束后,建立目标租户和目标设备之间的关联关系。
这里,在解除目标租户和待替换设备之间的关联关系之后,目标租户对应的已关联设备数量的将减少,在对待替换设备中存储的数据处理结束之后,针对待处理设备的操作已全部执行完成,进而,可以建立目标设备和目标租户之间的关联关系。
并且,在建立目标设备和目标租户之间的关联关系之后,还可以生成用于提示目标设备成功与目标租户建立关联关系、成功解除待替换设备和目标租户之间的关联关系的提示信息并发送给目标设备。
另外,目标租户在获取到第一提示信息之后,还可以确定目标租户对应的已关联设备数量已达到关联阈值。进而,目标租户可以基于该信息,确定是否需要以人工的方式更新关联阈值,或者,在确定存在新的目标设备需要建立关联关系的情况下,可以直接利用目标设备向服务器发送关联更新请求,以实现建立该新的目标设备和目标租户之间的关联关系。
在一种实施例中,在获取目标租户对应的已关联设备的设备数量之后,在确定已关联设备数量等于关联阈值的情况下,服务器还可以获取目标租户对应的已关联设备的关联时间以及关联解除方式。其中,针对目标租户而言,设备的关联解除方式会根据设备的重要程度进行设置,例如,重要程度大于一定数值的设备,在租户确定可以解除已建立的关联关系的情况下,服务器才可以解除已建立的关联关系;重要程度小于一定数值的设备,可以由服务器主动解除已建立的关联关系。。
进而,可以从已关联设备中,确定关联时间最早且关联解除方式为服务器主动解除的第二设备。然后,可以主动第二设备和目标租户之间的关联关系,并建立目标设备和目标租户之间的关联关系。这样,服务器可以在确定已关联设备数量等于关联阈值的情况下,通过已关联设备的关联时间和解除关联方式,自动确定出第二设备,并成功建立目标设备和目标租户之间的关联关系,不需要再获取关联更新请求即可实现关联关系的建立,减少了目标租户的操作步骤。
并且,关联时间越早的设备,出现其存储的信息的时效性较差、设备的功能完善度较差等情况的可能性越大,因此,在确定已关联设备数量等于关联阈值的情况下,由服务器主动解除目标租户与第二设备之间的关联关系,并建立目标设备和目标租户之间的关联关系,能够实现利用目标设备替换第二设备,以及实现设备功能的进一步完善。
另外,还可以在建立目标设备和目标租户之间的关联关系之后,基于第二设备和目标设备,生成用于提示已采用目标设备代替第二设备的第二提示信息并发送给目标设备。
进而,目标租户可以基于目标设备获取的第二提示信息,确定目标设备的关联情况以及解除关联关系的第二设备的情况。
在另一种实施例中,在获取目标租户对应的已关联设备的设备数量之后,在确定设备数量等于关联阈值的情况下,服务器还可以确定目标租户对应的已关联设备的设备登录状态。其中,设备登录状态能够反映已关联设备的连接状态,比如,在线、离线等。
进而,基于确定的已关联设备的设备登录状态,从已关联设备中确定离线设备,在确定离线设备包括多个的情况下,可以确定离线设备的离线原因和离线时长。离线时间越长,离线的已关联设备对应丢失的数据越多。离线原因能够反映已关联设备是因网络状态而离线,还因设备自身问题等而离线。
进一步的,可以基于离线设备的离线原因和离线时长,从离线设备中筛选出第一待解除设备。例如,可以筛选出离线时长最长且因为设备自身问题而离线的离线设备。如果只存在一个离线设备,则可以直接将该离线设备作为第一待解除设备。
之后,可以解除第一待解除设备和目标租户之间的关联关系。建立目标设备和目标租户之间的关联关系,并可以基于目标设备和第一待解除设备,生成用于提示已采用目标设备代替第一待解除设备的第三提示信息。
进而,可以将第三提示信息发送至目标设备,以使目标租户可以基于第三提示信息,确定目标设备的关联情况以及解除关联关系的第一待解除设备的情况。
在另一种实施例中,在获取目标租户对应的已关联设备的设备数量之后,在确定设备数量等于关联阈值的情况下,服务器还可以确定目标租户对应的已关联设备的使用频率和关联等级信息。其中,关联等级信息用于指示已关联设备的关联重要程度。使用频率能够表征已关联设备在单位时间内的监控次数和监控率,使用频率越低,已关联设备在单位时间内的监控次数越少,监控率越低。
进而,可以基于使用频率和关联等级信息,确定第二待解除设备。
这里,具体实施时,可以基于已关联设备的使用频率和关联等级信息,筛选出使用频率最低且关联等级信息对应的关联重要程度最低的已关联设备,将该已关联设备作为第二待解除设备。
之后,可以解除第二待解除设备和目标租户之间的关联关系,并建立目标设备和目标租户之间的关联关系。
而且,服务器还可以基于目标设备和第二待解除设备,生成用于提示已采用目标设备代替第二待解除设备的第四提示信息。
最后,可以将第四提示信息发送至目标设备,以使目标租户可以基于第四提示信息,确定目标设备的关联情况。
另外,针对目标设备,如果目标设备可以对应于多个租户,则在建立目标设备和目标租户之间的关联关系之前,还需要确定目标设备对应的已关联租户数量和最大租户数量。
确定已关联租户数量是否大于最大租户数量,如果否,则可以建立目标设备和目标租户之间的关联关系。如果是,则可以生成用于提示目标设备对应的已关联租户的数量超过最大租户数量的提 示信息并发送给目标设备。
在一种实施例中,服务器在获取到租户对应的租户信息之后,还可以基于目标设备上传的租户信息和/或租户输入的意愿得到的目标登录信息,按照预设的信息创建强度,创建租户对应的管理登录信息。其中,管理登录信息用于租户登录服务器,并对租户对应的已关联设备进行监控。
具体实施时,管理登录信息可以包括管理账号信息和管理密码信息。租户在输入租户信息和目标登录信息之后,可以在后端管理系统发起生成管理登录信息的请求。然后,服务器可以基于租户信息和目标登录信息,按照预设的信息创建强度,利用预先设置的管理账号生成规则,生成初始管理账号信息,进而,可以基于租户信息和/或初始管理账号信息和/或目标登录信息,按照预设的信息创建强度,利用密码随机生成策略,生成与初始管理账号信息相对应的初始管理密码信息。
进一步的,可以获取已存储的租户对应的管理登录信息,然后利用租户对应的管理登录信息对生成的初始管理账号信息和初始管理密码信息进行查重检验,在确定租户对应的管理登录信息均不与初始管理账号信息或初始管理密码信息相同情况下,将由初始管理账号信息和初始管理密码信息组成的管理登录信息作为该租户的管理登录信息。
另外,在存在与初始管理账号信息相同的已存储的管理账号信息的情况下,则重新生成新的初始管理账号信息,并再进行查重检验。在存在与初始管理密码信息相同的已存储的管理密码信息的情况下,则重新生成新的初始管理密码信息,并再进行查重检验。直至已存储的管理登录信息中不存在与生成的初始管理账号信息和初始管理密码信息相同的信息,确定最终的管理登录信息。之后,服务器可以将最终的管理登录信息进行存储,并发送给设备,进而,设备可以将最终的管理登录信息展示给租户。关于上述生成初始管理账号信息、初始管理密码信息以及查重检验的步骤,可以参照确定第一设备认证信息的步骤,这里不再赘述。
在一种实施例中,本公开实施例所提供的设备监控方法,目标租户还可以基于生成的管理登录信息,实现对已关联设备的管理,如图4所示,为本公开实施例所提供的一种管理已关联设备的方法的流程图,可以包括以下步骤:
S401:获取目标租户发送的第一登录请求。
其中,第一登录请求包括目标租户对应的管理登录信息。
这里,当目标租户存在对已关联设备进行管理的需求时,可以在任一已关联设备上输入其对应的管理登录信息,并在该已关联设备上发起登录请求。之后,该已关联设备可以基于输入的管理登录信息,生成第一登录请求并发送给服务器。下面以该已关联设备为目标设备为例进行说明。
S402:在管理登录信息被验证通过的情况下,获取目标租户发起的关联关系解除指令。
其中,关联关系解除指令包括已经与目标租户建立关联关系的至少一个第三待解除设备。
这里,服务器在获取到第一登录请求之后,可以对第一登录请求中的管理登录信息进行验证,如果管理登录信息未验证通过,则生成提示信息发送给目标设备,以提示目标租户管理登录信息输入错误。
在管理登录信息被验证通过的情况下,服务器可以利用目标设备向目标租户展示管理控制页面。
之后,目标租户如果存在解除已关联设备和目标租户之间的关联关系的需求,可以在目标租户对应的已关联设备中,选取至少一个已关联设备作为第三待解除设备。之后,目标租户可以基于确 定的至少一个第三待解除设备,在管理控制页面发起关联关系解除指令。
进而,服务器可以获取到目标设备上传的关联关系解除指令。
S403:解除第三待解除设备和目标租户之间的关联关系。
这里,基于获取到的关联关系解除指令,可以确定至少一个第三待解除设备,进而可以解除第三待解除设备与目标租户之间的关联关系。
具体的,关联关系解除指令还可以包括第三待解除设备的设备信息,服务器可以基于第三待解除设备的设备信息,从已关联设备中确定出第三待解除设备,然后解除第三待解除设备与目标租户之间的关联关系。
S404:基于目标租户当前的已关联设备的设备数量和当前的关联阈值,确定目标租户的关联率,将关联率反馈目标租户。
这里,目标租户的关联率能够反映目标租户对应的可使用服务器资源的使用情况。
在解除第三待解除设备与目标租户之间的关联关系之后,服务器还可以确定目标租户当前的已关联设备的设备数量,以及当前的关联阈值。然后,可以确定设备数量和关联阈值的比值,基于比值确定目标租户的关联率,并将关联率通过目标设备反馈目标租户。
进而,目标租户可以基于关联率,确定可使用服务器资源的使用情况。在确定可使用服务器资源的使用较少的情况下,可以对目标租户进行新设备的关联,在确定可使用服务器资源的使用较多的情况下,可以主动利用目标设备向服务器发起关联关系解除指令,主动解除一定的数量的已关联设备和目标租户的关联关系,从而,可以提升可使用服务器资源,防止可使用服务器资源过少而导致对已关联设备监控延迟、卡顿的情况。
在一种实施例中,在确定第一登录请求中的管理登录信息验证通过的情况下,服务器还可以获取目标租户对应的已关联设备的设备运行信息。其中,设备运行信息可以反映设备的设备信息、运行状态、存储的信息等。
之后,可以将获取的已关联设备的设备运行信息反馈给目标租户。具体的,可以将设备运行信息发送至发起第一登录请求的目标设备,该设备可以将设备运行信息展示在管理控制页面中,从而,目标租户可以在管理控制页面获取已关联设备的设备运行信息。
在一种实施例中,在确定第一登录请求中的管理登录信息验证通过的情况下,还可以获取目标租户针对其对应的至少一个已关联设备的设备信息更新请求。
其中,设备更新请求可以是目标租户利用目标设备发起的针对至少一个已关联设备的设备信息进行更新的请求,更新可以包括增加信息、减少信息、更改信息等。例如,更改已关联设备的区域信息、增加已关联设备的端口信息等。
服务器基于获取的设备信息更新请求,从目标租户对应的已关联租户中,确定设备更新请求对应的至少一个已关联设备,然后可以基于设备信息更新请求,对上述已关联设备的设备信息进行更新。
在一种实施例中,在建立目标设备和所述目标租户之间的关联关系之后,服务器还可以获取目标租户的有效租用期限和已租用时长。其中,有效租用期限用于反映目标租户最大的可租用时间。
进而,可以判断已租用时长是否大于有效租用期限,在确定已租用时长大于有效租用期限的情 况下,则解除目标设备和目标租户之间的关联关系。这里,在确定已租用时长大于有效租用期限的情况下,不仅解除目标设备和目标租户之间的关联关系,还会解除目标租户和对应的已关联设备之间的关联关系。
这样,基于有效租用期限和目标租户对应的已租用时长,能够实现对目标租户的租用时间的控制,保证目标租户的租用时效。
另外,本公开实施例还提供了一种设备监控系统,包括上述实施例中所提及的服务器501和上述实施例中所提及的目标设备502。如图5所示,为本公开实施例提供的一种设备监控系统的示意图。其中,目标租户存在设备注册的需求时,可以利用目标设备502登录服务器501对应的后台管理系统,输入目标设备认证信息。之后,目标设备502可以获取到目标设备认证信息,并通过通信网络将目标设备认证信息发送给服务器501。
服务器501可以对目标设备认证信息进行验证,在目标设备认证信息被验证通过的情况下,根据预先建立的设备认证信息与租户的匹配关系,确定目标设备认证信息对应的目标租户。之后,建立目标设备和目标租户之间的关联关系。进而,服务器501可以利用建立的关联关系对目标设备进行监控。
关于设备监控系统中的服务器501和目标设备502的具体介绍,可以参照设备监控方法对应的实施例中的介绍,这里不再赘述。
本领域技术人员可以理解,在具体实施方式的上述方法中,步骤的撰写顺序并不意味着严格的执行顺序而对实施过程构成任何限定,步骤的具体执行顺序应当以其功能和可能的内在逻辑确定。
基于同一发明构思,本公开实施例中还提供了与设备监控方法对应的设备管理装置,由于本公开实施例中的装置解决问题的原理与本公开实施例上述设备监控方法相似,因此装置的实施可以参见方法的实施,重复之处不再赘述。
如图6所示,为本公开实施例提供的一种设备监控装置的示意图,包括:
第一获取模块601,用于获取目标设备发送的目标设备认证信息;
筛选模块602,用于在所述目标设备认证信息被验证通过的情况下,根据预先建立的设备认证信息与租户的匹配关系,确定所述目标设备认证信息对应的目标租户;
关联模块603,用于建立所述目标设备和所述目标租户之间的关联关系;
监控模块604,用于利用所述关联关系,对所述目标设备进行监控。
在一种可能的实施方式中,所述装置还包括匹配模块505:
所述匹配模块605,用于在所述根据预先建立的设备认证信息与租户的匹配关系,确定所述目标设备认证信息对应的目标租户之前,针对任一个租户,获取所述租户对应的租户信息;
从所述租户信息中获取所述租户的第一租户标识;
基于所述租户信息,生成所述租户对应的第一设备认证信息;
建立所述第一租户标识和所述第一设备认证信息之间的匹配关系。
在一种可能的实施方式中,所述匹配模块605,用于在所述第一租户标识与已存储的租户标识均不相同的情况下,建立所述第一租户标识和所述第一设备认证信息之间的匹配关系;或
在已存储的租户标识中存在与所述第一租户标识相同的租户标识的情况下,基于所述租户信息和所述第一租户标识,生成所述租户的第二租户标识;在所述第二租户标识与已存储的租户标识均不相同的情况下,建立所述第二租户标识和所述第一设备认证信息之间的匹配关系。
在一种可能的实施方式中,所述匹配模块605,用于基于所述租户信息,生成初始设备认证信息;
在所述初始设备认证信息与已存储的租户的设备认证信息均不相同的情况下,将所述初始设备认证信息作为所述租户对应的第一设备认证信息;存储所述租户对应的第一设备认证信息;或
在所述已存储的租户的设备认证信息中存在与所述初始设备认证信息相同的设备认证信息的情况下,基于所述初始设备认证信息的生成时间和所述租户的租户标志符,生成所述初始设备认证信息的附加信息;将所述附加信息添加在所述初始设备认证信息中,得到新的初始设备认证信息,在所述新的初始设备认证信息与已存储的租户的设备认证信息均不相同的情况下,将所述新的初始设备认证信息作为所述租户对应的第一设备认证信息。
在一种可能的实施方式中,所述装置还包括第二获取模块606;
所述第二获取模块606,用于在所述确定所述目标设备认证信息对应的目标租户之后,获取所述目标租户对应的已关联设备的设备数量;
在所述设备数量小于关联阈值的情况下,向所述目标租户发送关联确定信息;
所述关联模块603,用于若接收到所述目标租户针对所述关联确定信息反馈的关联指示信息,建立所述目标设备和所述目标租户之间的关联关系。
在一种可能的实施方式中,所述第二获取模块606,还用于在所述获取所述目标租户对应的已关联设备的设备数量之后,在所述设备数量等于所述关联阈值的情况下,获取所述服务器的网络状况信息和所述服务器的剩余算力资源;
基于所述网络状况信息和所述剩余算力资源,确定目标阈值和阈值更新时间;
按照所述阈值更新时间,将所述关联阈值更新为所述目标阈值;
所述关联模块603,用于在所述目标阈值大于所述关联阈值的情况下,建立所述目标设备和所述目标租户之间的关联关系。
在一种可能的实施方式中,所述第二获取模块606,还用于在所述获取所述目标租户对应的已关联设备的设备数量之后,在所述设备数量等于所述关联阈值的情况下,获取针对所述目标租户的关联更新请求;所述关联更新请求包括待替换设备的设备信息和数据处理方式;所述待替换设备为与所述目标租户已关联的设备;
所述关联模块603,用于基于所述待替换设备的设备信息,解除所述目标租户和所述待替换设备之间的关联关系,并使用所述数据处理方式,对所述待替换设备中存储的数据进行处理;
在数据处理结束后,建立所述目标租户和所述目标设备之间的关联关系。
在一种可能的实施方式中,所述第二获取模块606,还用于在所述获取所述目标租户对应的已关联设备的设备数量之后,在所述设备数量等于所述关联阈值的情况下,获取所述已关联设备的关联时间以及关联解除方式;
从所述已关联设备中,确定关联时间最早且关联解除方式为服务器主动解除的第二设备;
所述关联模块603,用于解除所述目标租户和所述第二设备之间的关联关系,并建立所述目标租户和所述目标设备之间的关联关系。
在一种可能的实施方式中,所述第二获取模块606,还用于在所述获取所述目标租户对应的已关联设备的设备数量之后,在所述设备数量等于所述关联阈值的情况下,基于所述已关联设备的设备登录状态,从所述已关联设备中确定离线设备;
基于所述离线设备的离线时长和离线原因,从所述离线设备中筛选第一待解除设备;
所述关联模块603,用于解除所述第一待解除设备和所述目标租户之间的关联关系;
建立所述目标设备和所述目标租户之间的关联关系。
在一种可能的实施方式中,所述第二获取模块606,还用于在所述获取所述目标租户对应的已关联设备的设备数量之后,在所述设备数量等于所述关联阈值的情况下,确定所述已关联设备的使用频率和关联等级信息;所述关联等级信息用于指示所述已关联设备的关联重要程度;
基于所述使用频率和所述关联等级信息,确定第二待解除设备;
所述关联模块603,用于解除所述第二待解除设备和所述目标租户之间的关联关系;
建立所述目标设备和所述目标租户之间的关联关系。
在一种可能的实施方式中,所述匹配模块605,还用于在所述获取所述租户对应的租户信息之后,基于所述租户信息和/或所述租户输入的目标登录信息,按照预设的信息创建强度,创建所述租户对应的管理登录信息;所述管理登录信息用于所述租户登录所述服务器,以及所述租户对其对应的已关联设备进行监控;
存储所述管理登录信息。
在一种可能的实施方式中,所述装置还包括第三获取模块607:
所述第三获取模块607,用于获取所述目标租户发送的第一登录请求;所述第一登录请求包括所述目标租户对应的管理登录信息;
在所述管理登录信息被验证通过的情况下,获取所述目标租户发起的关联关系解除指令;所述关联关系解除指令包括已经与所述目标租户建立关联关系的至少一个第三待解除设备;
所述关联模块603,还用于解除所述第三待解除设备和所述目标租户之间的关联关系;
基于所述目标租户当前的已关联设备的设备数量和当前的关联阈值,确定所述目标租户的关联率,将所述关联率反馈所述目标租户。
在一种可能的实施方式中,所述关联模块603,还用于在所述建立所述目标设备和所述目标租户之间的关联关系之后,获取所述目标租户的有效租用期限和已租用时长;
在所述已租用时长大于所述有效租用期限的情况下,解除所述目标设备和所述目标租户之间的关联关系。
关于装置中的模块的处理流程、以及模块之间的交互流程的描述可以参照上述方法实施例中的相关说明,这里不再详述。
本公开实施例还提供了一种计算机设备,如图7所示,为本公开实施例提供的一种计算机设备结构示意图,包括:
处理器71和存储器72;所述存储器72存储有处理器71可执行的机器可读指令,处理器71用于执行存储器72中存储的机器可读指令,所述机器可读指令被处理器71执行时,处理器71执行下述步骤:S101:获取目标设备发送的目标设备认证信息;S102:在目标设备认证信息被验证通过的情况下,根据预先建立的设备认证信息与租户的匹配关系,确定目标设备认证信息对应的目标租户;S103:建立目标设备和所述目标租户之间的关联关系以及S104:利用关联关系,对目标设备进行监控。
上述存储器72包括内存721和外部存储器722;这里的内存721也称内存储器,用于暂时存放处理器71中的运算数据,以及与硬盘等外部存储器722交换的数据,处理器71通过内存721与外部存储器722进行数据交换。
上述指令的具体执行过程可以参考本公开实施例中所述的设备监控方法的步骤,此处不再赘述。
本公开实施例还提供一种计算机可读存储介质,该计算机可读存储介质上存储有计算机程序,该计算机程序被处理器运行时执行上述方法实施例中所述的设备监控方法的步骤。其中,该存储介质可以是易失性或非易失的计算机可读取存储介质。
本公开实施例所提供的设备监控方法的计算机程序产品,包括存储了程序代码的计算机可读存储介质,所述程序代码包括的指令可用于执行上述方法实施例中所述的设备监控方法的步骤,具体可参见上述方法实施例,在此不再赘述。
本公开实施例所提供的设备监控方法的另一种计算机程序产品,包括计算机可读代码,或者承载有计算机可读代码的易失性计算机可读存储介质或非易失性计算机可读存储介质,当所述计算机可读代码在电子设备的处理器中运行时,所述电子设备中的处理器用于执行上述方法实施例中所述的设备监控方法的步骤,具体可参见上述方法实施例,在此不再赘述。
该计算机程序产品可以具体通过硬件、软件或其结合的方式实现。在一个可选实施例中,所述计算机程序产品具体体现为计算机存储介质,在另一个可选实施例中,计算机程序产品具体体现为软件产品,例如软件开发包(Software Development Kit,SDK)等等。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统和装置的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。在本公开所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,又例如,多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些通信接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的技术方案。
另外,在本公开各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个处理器可执行的非易失的计算机可读取存储介质中。基于这样的理解,本公开的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本公开各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
最后应说明的是:以上所述实施例,仅为本公开的具体实施方式,用以说明本公开的技术方案,而非对其限制,本公开的保护范围并不局限于此,尽管参照前述实施例对本公开进行了详细的说明,本领域的普通技术人员应当理解:任何熟悉本技术领域的技术人员在本公开揭露的技术范围内,其依然可以对前述实施例所记载的技术方案进行修改或可轻易想到变化,或者对其中部分技术特征进行等同替换;而这些修改、变化或者替换,并不使相应技术方案的本质脱离本公开实施例技术方案的精神和范围,都应涵盖在本公开的保护范围之内。因此,本公开的保护范围应所述以权利要求的保护范围为准。

Claims (18)

  1. 一种设备监控方法,应用于服务器,包括:
    获取目标设备发送的目标设备认证信息;
    在所述目标设备认证信息被验证通过的情况下,根据预先建立的设备认证信息与租户的匹配关系,确定所述目标设备认证信息对应的目标租户;
    建立所述目标设备和所述目标租户之间的关联关系;
    利用所述关联关系,对所述目标设备进行监控。
  2. 根据权利要求或1所述的方法,其中,在所述根据预先建立的设备认证信息与租户的匹配关系,确定所述目标设备认证信息对应的目标租户之前,所述方法还包括:
    针对任一个租户,获取所述租户对应的租户信息;
    从所述租户信息中获取所述租户的第一租户标识;
    基于所述租户信息,生成所述租户对应的第一设备认证信息;
    建立所述第一租户标识和所述第一设备认证信息之间的匹配关系。
  3. 根据权利要求2所述的方法,其中,所述建立所述第一租户标识和所述第一设备认证信息之间的匹配关系,包括:
    在所述第一租户标识与已存储的租户标识均不相同的情况下,建立所述第一租户标识和所述第一设备认证信息之间的匹配关系;或
    在已存储的租户标识中存在与所述第一租户标识相同的租户标识的情况下,基于所述租户信息和所述第一租户标识,生成所述租户的第二租户标识;在所述第二租户标识与已存储的租户标识均不相同的情况下,建立所述第二租户标识和所述第一设备认证信息之间的匹配关系。
  4. 根据权利要求2或3所述的方法,其中,所述基于所述租户信息,生成所述租户对应的第一设备认证信息,包括:
    基于所述租户信息,生成初始设备认证信息;
    在所述初始设备认证信息与已存储的租户的设备认证信息均不相同的情况下,将所述初始设备认证信息作为所述租户对应的第一设备认证信息;存储所述租户对应的第一设备认证信息;或
    在所述已存储的租户的设备认证信息中存在与所述初始设备认证信息相同的设备认证信息的情况下,基于所述初始设备认证信息的生成时间和所述租户的租户标志符,生成所述初始设备认证信息的附加信息;将所述附加信息添加在所述初始设备认证信息中,得到新的初始设备认证信息,在所述新的初始设备认证信息与已存储的租户的设备认证信息均不相同的情况下,将所述新的初始设备认证信息作为所述租户对应的第一设备认证信息。
  5. 根据权利要求1至4任一项所述的方法,其中,在所述确定所述目标设备认证信息对应的目标租户之后,所述方法还包括:
    获取所述目标租户对应的已关联设备的设备数量;
    在所述设备数量小于关联阈值的情况下,向所述目标租户发送关联确定信息;
    所述建立所述目标设备和所述目标租户之间的关联关系,包括:
    若接收到所述目标租户针对所述关联确定信息反馈的关联指示信息,建立所述目标设备和所述目标租户之间的关联关系。
  6. 根据权利要求5所述的方法,其中,在所述获取所述目标租户对应的已关联设备的设备数量之后,所述方法还包括:
    在所述设备数量等于所述关联阈值的情况下,获取所述服务器的网络状况信息和所述服务器的剩余算力资源;
    基于所述网络状况信息和所述剩余算力资源,确定目标阈值和阈值更新时间;
    按照所述阈值更新时间,将所述关联阈值更新为所述目标阈值;
    所述建立所述目标设备和所述目标租户之间的关联关系,包括:
    在所述目标阈值大于所述关联阈值的情况下,建立所述目标设备和所述目标租户之间的关联关系。
  7. 根据权利要求5所述的方法,其中,在所述获取所述目标租户对应的已关联设备的设备数量之后,所述方法还包括:
    在所述设备数量等于所述关联阈值的情况下,获取针对所述目标租户的关联更新请求;所述关联更新请求包括待替换设备的设备信息和数据处理方式;所述待替换设备为与所述目标租户已关联的设备;
    基于所述待替换设备的设备信息,解除所述目标租户和所述待替换设备之间的关联关系,并使用所述数据处理方式,对所述待替换设备中存储的数据进行处理;
    所述建立所述目标设备和所述目标租户之间的关联关系,包括:
    在数据处理结束后,建立所述目标租户和所述目标设备之间的关联关系。
  8. 根据权利要求5所述的方法,其中,在所述获取所述目标租户对应的已关联设备的设备数量之后,所述方法还包括:
    在所述设备数量等于所述关联阈值的情况下,获取所述已关联设备的关联时间以及关联解除方式;
    从所述已关联设备中,确定关联时间最早且关联解除方式为服务器主动解除的第二设备;
    解除所述目标租户和所述第二设备之间的关联关系,并建立所述目标租户和所述目标设备之间的关联关系。
  9. 根据权利要求5所述的方法,其中,在所述获取所述目标租户对应的已关联设备的设备数量之后,所述方法还包括:
    在所述设备数量等于所述关联阈值的情况下,基于所述已关联设备的设备登录状态,从所述已关联设备中确定离线设备;
    基于所述离线设备的离线时长和离线原因,从所述离线设备中筛选第一待解除设备;
    解除所述第一待解除设备和所述目标租户之间的关联关系;
    建立所述目标设备和所述目标租户之间的关联关系。
  10. 根据权利要求5所述的方法,其中,在所述获取所述目标租户对应的已关联设备的设备数量之后,所述方法还包括:
    在所述设备数量等于所述关联阈值的情况下,确定所述已关联设备的使用频率和关联等级信息;所述关联等级信息用于指示所述已关联设备的关联重要程度;
    基于所述使用频率和所述关联等级信息,确定第二待解除设备;
    解除所述第二待解除设备和所述目标租户之间的关联关系;
    建立所述目标设备和所述目标租户之间的关联关系。
  11. 根据权利要求2至10任一项所述的方法,其中,在所述获取所述租户对应的租户信息之后,还包括:
    基于所述租户信息和/或所述租户输入的目标登录信息,按照预设的信息创建强度,创建所述租户对应的管理登录信息;所述管理登录信息用于所述租户登录所述服务器,以及所述租户对其对应的已关联设备进行监控;
    存储所述管理登录信息。
  12. 根据权利要求11所述的方法,其中,所述方法还包括:
    获取所述目标租户发送的第一登录请求;所述第一登录请求包括所述目标租户对应的管理登录信息;
    在所述管理登录信息被验证通过的情况下,获取所述目标租户发起的关联关系解除指令;所述关联关系解除指令包括已经与所述目标租户建立关联关系的至少一个第三待解除设备;
    解除所述第三待解除设备和所述目标租户之间的关联关系;
    基于所述目标租户当前的已关联设备的设备数量和当前的关联阈值,确定所述目标租户的关联率,将所述关联率反馈所述目标租户。
  13. 根据权利要求1至12任一项所述的方法,其中,在所述建立所述目标设备和所述目标租户之间的关联关系之后,还包括:
    获取所述目标租户的有效租用期限和已租用时长;
    在所述已租用时长大于所述有效租用期限的情况下,解除所述目标设备和所述目标租户之间的关联关系。
  14. 一种设备监控系统,包括:如权利要求1至13任一项所述的目标设备和如权利要求1至13任一项所述的服务器;
    所述目标设备,用于获取目标设备认证信息,以及,将所述目标设备认证信息发送给所述服务器。
  15. 一种设备监控装置,包括:
    第一获取模块,用于获取目标设备发送的目标设备认证信息;
    筛选模块,用于在所述目标设备认证信息被验证通过的情况下,根据预先建立的设备认证信息与租户的匹配关系,确定所述目标设备认证信息对应的目标租户;
    关联模块,用于建立所述目标设备和所述目标租户之间的关联关系;
    监控模块,用于利用所述关联关系,对所述目标设备进行监控。
  16. 一种计算机设备,包括:处理器、存储器,所述存储器存储有所述处理器可执行的机器可读指令,所述处理器用于执行所述存储器中存储的机器可读指令,所述机器可读指令被所述处理器执行时,所述处理器执行如权利要求1至13任意一项所述的设备监控方法。
  17. 一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被计算机设备运行时,所述计算机设备执行如权利要求1至13任意一项所述的设备监控方法。
  18. 一种计算机程序产品,包括计算机可读代码,或者承载有计算机可读代码的易失性计算机可读存储介质或非易失性计算机可读存储介质,当所述计算机可读代码在电子设备的处理器中运行时,所述电子设备中的处理器执行用于实现权利要求1-13任意一项所述的设备监控方法。
PCT/CN2021/126783 2021-06-30 2021-10-27 设备监控方法、系统、装置、计算机设备和存储介质 WO2023273059A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110737940.9 2021-06-30
CN202110737940.9A CN113342617A (zh) 2021-06-30 2021-06-30 设备监控方法、系统、装置、计算机设备和存储介质

Publications (1)

Publication Number Publication Date
WO2023273059A1 true WO2023273059A1 (zh) 2023-01-05

Family

ID=77481908

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/126783 WO2023273059A1 (zh) 2021-06-30 2021-10-27 设备监控方法、系统、装置、计算机设备和存储介质

Country Status (2)

Country Link
CN (1) CN113342617A (zh)
WO (1) WO2023273059A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113342617A (zh) * 2021-06-30 2021-09-03 成都商汤科技有限公司 设备监控方法、系统、装置、计算机设备和存储介质
CN115913793B (zh) * 2023-03-09 2023-05-30 浪潮电子信息产业股份有限公司 安全认证方法、系统、电子设备、分布式存储系统及介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130145006A1 (en) * 2011-12-06 2013-06-06 Sap Portals Israel Ltd Multi-tenant infrastructure
CN106878084A (zh) * 2017-02-28 2017-06-20 新华三技术有限公司 一种权限控制方法和装置
CN110351130A (zh) * 2019-06-27 2019-10-18 华为技术有限公司 一种设备信息的管理方法、装置及系统
CN111901180A (zh) * 2020-08-26 2020-11-06 刘俊锋 教育系统的多租户终端生成方法、装置、设备和存储介质
CN113342617A (zh) * 2021-06-30 2021-09-03 成都商汤科技有限公司 设备监控方法、系统、装置、计算机设备和存储介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130145006A1 (en) * 2011-12-06 2013-06-06 Sap Portals Israel Ltd Multi-tenant infrastructure
CN106878084A (zh) * 2017-02-28 2017-06-20 新华三技术有限公司 一种权限控制方法和装置
CN110351130A (zh) * 2019-06-27 2019-10-18 华为技术有限公司 一种设备信息的管理方法、装置及系统
CN111901180A (zh) * 2020-08-26 2020-11-06 刘俊锋 教育系统的多租户终端生成方法、装置、设备和存储介质
CN113342617A (zh) * 2021-06-30 2021-09-03 成都商汤科技有限公司 设备监控方法、系统、装置、计算机设备和存储介质

Also Published As

Publication number Publication date
CN113342617A (zh) 2021-09-03

Similar Documents

Publication Publication Date Title
CN110620810B (zh) 在区块链上的连续资产转移的非链接所有权
CN111343142B (zh) 一种基于区块链网络的数据处理方法、装置及存储介质
US10992478B2 (en) Blockchain-based digital identity management method
US20180176199A1 (en) Secure shell public key audit system
US20180018738A1 (en) Digital asset platform
US20200167459A1 (en) Device-based database system
US20070198977A1 (en) System and method for providing shared tasks amongst a plurality of individuals
CN110998631A (zh) 分布式账本技术
TW201543254A (zh) 用戶帳戶管理方法及裝置
WO2023273059A1 (zh) 设备监控方法、系统、装置、计算机设备和存储介质
US11038685B1 (en) Correcting blockchain transactions with cryptocurrency type mistakes
US11940987B2 (en) Preventing a transmission of an incorrect copy of a record of data to a distributed ledger system
CN111798233A (zh) 令牌的链接
CN110598373B (zh) 一种版权验证方法、系统和存储介质
JP2022525551A (ja) データレコードのコピーの分散型台帳システムへの誤伝送の防止
CN110192212B (zh) 数字资产平台
US7793335B2 (en) Computer-implemented method, system, and program product for managing log-in strikes
CN112861084A (zh) 业务处理方法、装置、设备、计算机可读存储介质
CN110866732A (zh) 用于电子合同平台的用户信息数据处理系统及处理方法
WO2022141024A1 (zh) 基于区块链技术的业务交易方法、系统及存储介质
CN107005558A (zh) 基于位置的用户歧义消除
CN111800397A (zh) 无形资产管理平台的登录方法、装置和系统
CN112910982A (zh) 一种联盟链的节点准入方法、装置、电子设备及存储介质
CN110889763A (zh) 一种基于大数据的金融管理系统
US7600044B2 (en) System and method for networked endpoint registration

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21947986

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 14/05/2024)