CN109379403A - Control method, device, server and the terminal device of internet of things equipment - Google Patents

Control method, device, server and the terminal device of internet of things equipment Download PDF

Info

Publication number
CN109379403A
CN109379403A CN201811062122.8A CN201811062122A CN109379403A CN 109379403 A CN109379403 A CN 109379403A CN 201811062122 A CN201811062122 A CN 201811062122A CN 109379403 A CN109379403 A CN 109379403A
Authority
CN
China
Prior art keywords
internet
order
things equipment
token
control instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811062122.8A
Other languages
Chinese (zh)
Other versions
CN109379403B (en
Inventor
吴展威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHUHAI DBJ TECHNOLOGY CO LTD
Original Assignee
ZHUHAI DBJ TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHUHAI DBJ TECHNOLOGY CO LTD filed Critical ZHUHAI DBJ TECHNOLOGY CO LTD
Priority to CN201811062122.8A priority Critical patent/CN109379403B/en
Publication of CN109379403A publication Critical patent/CN109379403A/en
Application granted granted Critical
Publication of CN109379403B publication Critical patent/CN109379403B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/54Presence management, e.g. monitoring or registration for receipt of user log-on information, or the connection status of the users

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application proposes control method, device and the computer equipment of a kind of internet of things equipment, the control method of above-mentioned internet of things equipment includes: authorization requests corresponding to this order with creation of receiving terminal apparatus transmission, and the authorization requests are for requesting to control specified internet of things equipment;According to the order note identification of the code key of the internet of things equipment and this order, calculates and obtain the corresponding token of this order;The token is sent to the terminal device, so that the terminal device is according to the token, the order note identification of this order and to the operational order of the internet of things equipment, after generation control instruction, the control instruction is sent to the internet of things equipment, to control the internet of things equipment.Different terminal devices may be implemented using the different same internet of things equipment of Token Control in the application, and availability is still ensured that in the case where communication condition is bad, improves the flexibility and safety of internet of things equipment control.

Description

Control method, device, server and the terminal device of internet of things equipment
Technical field
This application involves field of communication technology more particularly to a kind of control method of internet of things equipment, device, server and Terminal device.
Background technique
The appearance of shared automobile, so that the starting of automobile and the flame-out not critical pervious Physical key of dependence, with greater need for It is the means by remotely controlling to control.In general, a set of shared automotive system may include: Cloud Server, Internet of Things Equipment and identity-validation device.
Recently as the universal of smart phone, the identity-validation device in automotive system is shared, in addition to common radio frequency It identifies outside equipment, can also be realized with intelligent terminals such as smart phones.Since radio frequency identification equipment is usually physically It connects, communicates safer with internet of things equipment.And intelligent terminal is wanted because physically separating with internet of things equipment It allows it to control internet of things equipment, just introduces many challenges and security risk.
Common way is that all control instructions of intelligent terminal are authenticated by Cloud Server and issued by network To internet of things equipment, but for sharing automobile business, it is bad that automobile may be parked in greatly the network signals such as underground parking very much Place, cause instruction can not forward.At this moment just need intelligent terminal by short range communication protocol, such as: bluetooth etc., directly Connect control internet of things equipment.Common practice is the order that intelligent terminal obtains control internet of things equipment by certain mode Board, the process for obtaining token are known as authorizing, and the process for verifying token is known as authenticating.Then, it shares automotive system and needs a conjunction The method of reason is authorized and is authenticated.
But it is existing in the related technology, intelligent terminal control internet of things equipment authorization authentication scheme in, the peace of token Full property is poor, and timeliness is not easily controlled, in addition, also requiring the telecommunication channel between internet of things equipment and Cloud Server to be Smooth, otherwise token information is unable to complete synchronization, causes internet of things equipment that can not be controlled, causes service logic that can not hold Row, availability are poor.
Summary of the invention
The application is intended to solve at least some of the technical problems in related technologies.
For this purpose, first purpose of the application is to propose a kind of control method of internet of things equipment, it is different to realize Terminal device uses the different same internet of things equipment of Token Control, and still ensuring that in the case where communication condition is bad can With property, the flexibility and safety of internet of things equipment control are improved.
Second purpose of the application is to propose a kind of control device of internet of things equipment.
The third purpose of the application is to propose a kind of server.
The 4th purpose of the application is to propose a kind of terminal device.
The 5th purpose of the application is to propose a kind of internet of things equipment.
The 6th purpose of the application is to propose a kind of non-transitorycomputer readable storage medium.
In order to achieve the above object, the application first aspect embodiment proposes a kind of control method of internet of things equipment, comprising: Authorization requests corresponding to this order with creation that receiving terminal apparatus is sent, the authorization requests are for requesting to specified Internet of things equipment controlled;According to the order note identification of the code key of the internet of things equipment and this order, calculates and obtain this The corresponding token of secondary order;The token is sent to the terminal device, so that the terminal device is according to the token, sheet The order note identification of secondary order and operational order to the internet of things equipment, after generating control instruction, by the control instruction It is sent to the internet of things equipment, to control the internet of things equipment.
In the control method of the internet of things equipment of the embodiment of the present application, what receiving terminal apparatus was sent orders with this of creation After authorization requests corresponding to list, according to the order note identification of the code key of above-mentioned internet of things equipment and this order, calculates and obtain The corresponding token of this order, is then sent to above-mentioned terminal device for above-mentioned token, so that above-mentioned terminal device is according to Token, the order note identification of this order and the operational order to above-mentioned internet of things equipment, after generating control instruction, by above-mentioned control System instruction is sent to the internet of things equipment, controls above-mentioned internet of things equipment, the terminal so as to realize different is set It is standby to use the different same internet of things equipment of Token Control, and availability is still ensured that in the case where communication condition is bad, Improve the flexibility and safety of internet of things equipment control;And different tokens can be generated in different order note identifications, single A token leakage has no effect on system overall security, and different order note identifications combines the same code key, can be generated different Token, these tokens may serve to control the same internet of things equipment.
In order to achieve the above object, the application second aspect embodiment proposes a kind of control device of internet of things equipment, comprising: It is sent to Cloud Server and is used to request to specified object with authorization requests corresponding to this order of creation, the authorization requests Networked devices are controlled;The token that the Cloud Server is sent is received, the token is the Cloud Server according to the object What the order note identification of the code key of networked devices and this order calculated;According to the token, the order note identification of this order With the operational order to the internet of things equipment, control instruction is generated;The control instruction is sent to the internet of things equipment, So as to be authenticated to the token in the control instruction, and reflecting after the internet of things equipment receives the control instruction After power passes through, the operational order in the control instruction is executed.
In the control method of the internet of things equipment of the embodiment of the present application, this order institute with creation is sent to Cloud Server After corresponding authorization requests, the token that above-mentioned Cloud Server is sent is received, then according to above-mentioned token, the order of this order Mark and to the operational order of internet of things equipment, generates control instruction, above-mentioned control instruction is finally sent to internet of things equipment, So as to be authenticated to the token in above-mentioned control instruction, and reflecting after above-mentioned internet of things equipment receives above-mentioned control instruction After power passes through, the operational order in above-mentioned control instruction is executed, so as to realize that it is different that different terminal devices uses The same internet of things equipment of Token Control, and availability is still ensured that in the case where communication condition is bad, improve Internet of Things The flexibility and safety of equipment control;In addition, the introducing of token authentication, so that the reception terminal for only possessing legal token is set Standby (such as mobile phone) just can control corresponding internet of things equipment;On the other hand, the issuer of token is Cloud Server, other people can not It forges, therefore the safety of this method by Token Control is higher.
In order to achieve the above object, the application third aspect embodiment proposes a kind of control method of internet of things equipment, comprising: Receiving terminal apparatus send control instruction, the control instruction be the terminal device sent according to Cloud Server token, The order note identification of this order of terminal device creation and the operational order of internet of things equipment generated;To the control Token in instruction is authenticated;After the authentication is passed, the operational order in the control instruction is executed.
In the control method of the internet of things equipment of the embodiment of the present application, after the control instruction that receiving terminal apparatus is sent, Token in above-mentioned control instruction is authenticated, after the authentication is passed, executes the operational order in above-mentioned control instruction, from And different terminal devices may be implemented and use the different same internet of things equipment of Token Control, and is bad in communication condition In the case of still ensure that availability, improve internet of things equipment control flexibility and safety.
In order to achieve the above object, the application fourth aspect embodiment proposes a kind of control device of internet of things equipment, comprising: Receiving module, for receiving terminal apparatus send this order with creation corresponding to authorization requests, the authorization requests For requesting to control specified internet of things equipment;Computing module, for according to the code key of the internet of things equipment and this The order note identification of secondary order calculates and obtains the corresponding token of this order;Sending module, it is described for the token to be sent to Terminal device, so that the terminal device is according to the token, the order note identification of this order and to the internet of things equipment The control instruction is sent to the internet of things equipment, to set to the Internet of Things after generating control instruction by operational order It is standby to be controlled.
In the control device of the internet of things equipment of the embodiment of the present application, receiving module receiving terminal apparatus send with creation This order corresponding to after authorization requests, computing module is according to the code key of above-mentioned internet of things equipment and ordering for this order Single mark calculates and obtains the corresponding token of this order, and then above-mentioned token is sent to above-mentioned terminal device by sending module, with Make above-mentioned terminal device according to the token, the order note identification of this order and to the operational order of above-mentioned internet of things equipment, it is raw After control instruction, above-mentioned control instruction is sent to the internet of things equipment, above-mentioned internet of things equipment is controlled, from And different terminal devices may be implemented and use the different same internet of things equipment of Token Control, and is bad in communication condition In the case of still ensure that availability, improve internet of things equipment control flexibility and safety.
In order to achieve the above object, the 5th aspect embodiment of the application proposes a kind of control device of internet of things equipment, comprising: Sending module is used for for sending to Cloud Server with authorization requests corresponding to this order of creation, the authorization requests Request controls specified internet of things equipment;Receiving module, the token sent for receiving the Cloud Server, the order Board is that the Cloud Server is calculated according to the code key of the internet of things equipment and the order note identification of this order;Generate mould Block generates control and refers to for the order note identification according to the token, this order and the operational order to the internet of things equipment It enables;The sending module is also used to the control instruction being sent to the internet of things equipment, so that the internet of things equipment connects After receiving the control instruction, the token in the control instruction is authenticated, and after the authentication is passed, executes the control Operational order in system instruction.
In the control device of the internet of things equipment of the embodiment of the present application, sending module sends the sheet with creation to Cloud Server After authorization requests corresponding to secondary order, receiving module receives the token that above-mentioned Cloud Server is sent, then generation module root According to above-mentioned token, the order note identification of this order and to the operational order of internet of things equipment, control instruction is generated, mould is finally sent Above-mentioned control instruction is sent to internet of things equipment by block, so that after above-mentioned internet of things equipment receives above-mentioned control instruction, to upper The token stated in control instruction is authenticated, and after the authentication is passed, executes the operational order in above-mentioned control instruction, thus Different terminal devices may be implemented and use the different same internet of things equipment of Token Control, and the feelings bad in communication condition Availability is still ensured that under condition, improves the flexibility and safety of internet of things equipment control.
In order to achieve the above object, the 6th aspect embodiment of the application proposes a kind of control device of internet of things equipment, comprising: Receiving module, for the control instruction that receiving terminal apparatus is sent, the control instruction is the terminal device according to cloud service The token of device transmission, the order note identification of this order of terminal device creation and the operational order generation to internet of things equipment 's;Authentication module, for being authenticated to the token in the control instruction;Execution module, for holding after the authentication is passed Operational order in the row control instruction.
In the control device of the internet of things equipment of the embodiment of the present application, the control that receiving module receiving terminal apparatus is sent refers to After order, authentication module authenticates the token in above-mentioned control instruction, and after the authentication is passed, execution module executes above-mentioned Operational order in control instruction, so as to realize that different terminal devices is set using the different same Internet of Things of Token Control It is standby, and availability is still ensured that in the case where communication condition is bad, improve the flexibility and peace of internet of things equipment control Quan Xing.
In order to achieve the above object, the 7th aspect embodiment of the application proposes a kind of server, including memory, processor and It is stored in the computer program that can be run on the memory and on the processor, the processor executes the computer When program, the method that first aspect provides is realized.
In order to achieve the above object, the application eighth aspect embodiment proposes a kind of non-transitory computer-readable storage medium Matter is stored thereon with computer program, and the method that first aspect provides is realized when the computer program is executed by processor.
In order to achieve the above object, the 9th aspect embodiment of the application proposes a kind of terminal device, including memory, processor And it is stored in the computer program that can be run on the memory and on the processor, the processor executes the calculating When machine program, the method that second aspect provides is realized.
In order to achieve the above object, the tenth aspect embodiment of the application proposes a kind of non-transitory computer-readable storage medium Matter is stored thereon with computer program, and the method that second aspect provides is realized when the computer program is executed by processor.
In order to achieve the above object, the tenth one side embodiment of the application proposes a kind of internet of things equipment, which is characterized in that packet It includes memory, processor and is stored in the computer program that can be run on the memory and on the processor, the place When managing the device execution computer program, the method that the third aspect provides is realized.
In order to achieve the above object, the 12nd aspect embodiment of the application proposes a kind of non-transitory computer-readable storage medium Matter is stored thereon with computer program, which is characterized in that realizes that the third aspect mentions when the computer program is executed by processor The method of confession.
The additional aspect of the application and advantage will be set forth in part in the description, and will partially become from the following description It obtains obviously, or recognized by the practice of the application.
Detailed description of the invention
The application is above-mentioned and/or additional aspect and advantage will become from the following description of the accompanying drawings of embodiments Obviously and it is readily appreciated that, in which:
Fig. 1 is the flow chart of control method one embodiment of the application internet of things equipment;
Fig. 2 is the flow chart of another embodiment of the control method of the application internet of things equipment;
Fig. 3 is the flow chart of the control method further embodiment of the application internet of things equipment;
Fig. 4 is the flow chart of the control method further embodiment of the application internet of things equipment;
Fig. 5 is the flow chart of the control method further embodiment of the application internet of things equipment;
Fig. 6 is the flow chart of the control method further embodiment of the application internet of things equipment;
Fig. 7 is the flow chart of the control method further embodiment of the application internet of things equipment;
Fig. 8 is the flow chart of the control method further embodiment of the application internet of things equipment;
Fig. 9 is the flow chart of the control method further embodiment of the application internet of things equipment;
Figure 10 is the flow chart of the control method further embodiment of the application internet of things equipment;
Figure 11 is the flow chart of the control method further embodiment of the application internet of things equipment;
Figure 12 is the structural schematic diagram of control device one embodiment of the application internet of things equipment;
Figure 13 is the structural schematic diagram of another embodiment of the control device of the application internet of things equipment;
Figure 14 is the structural schematic diagram of the control device further embodiment of the application internet of things equipment;
Figure 15 is the structural schematic diagram of the control device further embodiment of the application internet of things equipment;
Figure 16 is the structural schematic diagram of the control device further embodiment of the application internet of things equipment;
Figure 17 is the structural schematic diagram of the application server one embodiment.
Specific embodiment
Embodiments herein is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, it is intended to for explaining the application, and should not be understood as the limitation to the application.
Fig. 1 is the flow chart of control method one embodiment of the application internet of things equipment, as shown in Figure 1, above-mentioned Internet of Things The control method of net equipment may include:
Step 101, authorization requests corresponding to this order with creation that receiving terminal apparatus is sent, above-mentioned authorization are asked It asks for requesting to control specified internet of things equipment.
In the present embodiment, above-mentioned terminal device can for smart phone, smartwatch, tablet computer, laptop or Person's personal computer (Personal Computer;The intelligent terminals such as hereinafter referred to as: PC), the present embodiment is to above-mentioned terminal The form of equipment is not construed as limiting.
Step 102, it according to the order note identification of the code key of above-mentioned internet of things equipment and this order, calculates and obtains this order Corresponding token.
Specifically, Cloud Server can be utilized according to the code key of above-mentioned internet of things equipment and the order note identification of this order Signature algorithm, which calculates, obtains the corresponding token of this order, this way it is possible to realize multiple terminal devices use respective token Same internet of things equipment is controlled, because the order note identification of terminal device is when multiple terminal devices control same internet of things equipment Different, so token is also different.These tokens be all within the same code key period it is effective, can be to Internet of Things Net equipment is controlled.Also, Cloud Server can precisely revoke some allocated token, and Cloud Server can be directed to multiple The order of terminal device provides the token for controlling same internet of things equipment, and when the failure of some order, it only will cause the order The failure of corresponding token, distribute to other orders token may continue to using.
Step 103, above-mentioned token is sent to terminal device, so that above-mentioned terminal device is according to above-mentioned token, this orders Single order note identification and the operational order to above-mentioned internet of things equipment send above-mentioned control instruction after generating control instruction To above-mentioned internet of things equipment, to control above-mentioned internet of things equipment.
In the control method of above-mentioned internet of things equipment, corresponding to this order with creation that receiving terminal apparatus is sent After authorization requests, according to the order note identification of the code key of above-mentioned internet of things equipment and this order, calculates and obtain this order pair Then above-mentioned token is sent to above-mentioned terminal device by the token answered, so that above-mentioned terminal device is according to the token, this orders Single order note identification and the operational order to above-mentioned internet of things equipment send above-mentioned control instruction after generating control instruction To the internet of things equipment, above-mentioned internet of things equipment is controlled, so as to realize that it is different that different terminal devices uses The same internet of things equipment of Token Control, and still ensure that availability in the case where communication condition is bad, improve Internet of Things The flexibility and safety of net equipment control;And different tokens, single token leakage can be generated in different order note identifications System overall security is had no effect on, different order note identifications combines the same code key, different tokens can be generated, these orders Board may serve to control the same internet of things equipment.
Fig. 2 is the flow chart of another embodiment of the control method of the application internet of things equipment, as shown in Fig. 2, the application In embodiment illustrated in fig. 1, after step 103, can also include:
Step 201, the whether also related order of above-mentioned internet of things equipment is checked.
Step 202, if above-mentioned internet of things equipment does not have associated order, negotiate to update with above-mentioned internet of things equipment secret Key, and save updated code key.
And if the also related order of above-mentioned internet of things equipment, do not update code key.
In the present embodiment, before this order is created, Cloud Server and internet of things equipment hold consultation and update code key, And respectively save this code key.
In Cloud Server after token is sent to terminal device, check whether above-mentioned internet of things equipment is also related Order if it is not, Cloud Server and above-mentioned internet of things equipment are negotiated to update code key, and saves updated code key;If The also related order of above-mentioned internet of things equipment, then do not update code key.
In the control method of internet of things equipment provided in this embodiment, internet of things equipment and Cloud Server only need to code key more Use is low to the dependence in telecommunication channel to telecommunication channel when new.In extreme circumstances, if telecommunication channel Unavailable that code key is caused to update failure, the above method still can operate normally.And the validity period control of token is precisely, this reality It applies in example, since terminal device is by authority checking, update internet of things equipment code key to Cloud Server terminates token expiration, It controls precision and depends on the success rate that code key updates.
In addition, update code key can revoke all of corresponding internet of things equipment and distribute token, cloud service in the present embodiment Device can be directed to the order of multiple terminal devices, provide the token for controlling same internet of things equipment.And it is secret once to have carried out update Key operation, these tokens will fail simultaneously.
Fig. 3 is the flow chart of the control method further embodiment of the application internet of things equipment, as shown in figure 3, the application In embodiment illustrated in fig. 1, after step 103, can also include:
Step 301, the inquiry request that above-mentioned internet of things equipment is sent is received, above-mentioned inquiry request is for inquiring above-mentioned control Whether order corresponding to the order note identification in instruction is legal.
Step 302, query result is sent to above-mentioned internet of things equipment, so that above-mentioned internet of things equipment is in above-mentioned query result When indicating that order corresponding to the order note identification in above-mentioned control instruction is legal, the operational order in above-mentioned control instruction is executed.
The above process is known as the inquiry of order validity, and abbreviation order inquiries are general only (such as to open for verifying key instruction Lock etc.).If query result is illegal for order corresponding to the order note identification in above-mentioned control instruction, internet of things equipment is refused The order note identification is executed absolutely and its is associated with any instruction of token.If not initiating inquiry or because condition does not allow (remotely to lead to News channel is unavailable) and can not initiate to inquire, it is legal that internet of things equipment should be considered as current order mark.
The control method of internet of things equipment provided in this embodiment is low to the dependence in telecommunication channel, internet of things equipment and Cloud Server only need to when order inquiries use to telecommunication channel.Under extreme case, if telecommunication channel can not With initiation order inquiries are led to not, the above method can still be operated normally.In the present embodiment, token expiration is from terminal device It creates order and is started by authorization, terminated to order destruction.The precision of validity period control relies on the initiation frequency of order inquiries And success rate.
Also, the present embodiment allows multiple terminal devices to use the same internet of things equipment of respective Token Control, multiple ends When end equipment controls same internet of things equipment, the order note identification of terminal device is different, so token is also different. These tokens are all that effectively, can control internet of things equipment within the same order period.And it can precisely hang Some allocated token is sold, Cloud Server can be directed to multiple terminal devices, provide the token for controlling same internet of things equipment, And when the failure of some order, it only will cause the corresponding token failure of the order, the token for distributing to other orders may continue to It uses.
Fig. 4 is the flow chart of the control method further embodiment of the application internet of things equipment, as shown in figure 4, the application In embodiment illustrated in fig. 1, after step 101, can also include:
Step 401, it tests to the legitimacy of above-mentioned authorization requests.
After determining that above-mentioned authorization requests are legal, step 102 is executed.
Specifically, testing to the legitimacy of above-mentioned authorization requests can be with are as follows: checks in above-mentioned terminal device and logs in account Whether the remaining sum at family is greater than or equal to predetermined threshold and/or whether above-mentioned logon account passes through real-name authentication etc., wherein above-mentioned pre- Determining threshold value can be in specific implementation according to the sets itself such as system performance and/or realization demand, and the present embodiment is to above-mentioned predetermined The size of threshold value is not construed as limiting.
It can be in this way, determining that above-mentioned authorization requests are legal are as follows: determine that the remaining sum of logon account in above-mentioned terminal device is greater than Or pass through real-name authentication equal to predetermined threshold and/or above-mentioned logon account.
Fig. 5 is the flow chart of the control method further embodiment of the application internet of things equipment, as shown in figure 5, above-mentioned object The control method of networked devices may include:
Step 501, it sends to Cloud Server and is used with authorization requests corresponding to this order of creation, above-mentioned authorization requests Specified internet of things equipment is controlled in request.
Specifically, it when terminal device needs to control internet of things equipment, needs to request to authorize to Cloud Server, this When terminal device will create order, then to Cloud Server send with create this order corresponding to authorization requests.
In the present embodiment, above-mentioned terminal device can for smart phone, smartwatch, tablet computer, laptop or The intelligent terminals such as person PC, the present embodiment are not construed as limiting the form of above-mentioned terminal device.
Step 502, the token that above-mentioned Cloud Server is sent is received, above-mentioned token is above-mentioned Cloud Server according to above-mentioned Internet of Things What the code key of net equipment and the order note identification of this order calculated.
Specifically, Cloud Server can be utilized according to the code key of above-mentioned internet of things equipment and the order note identification of this order Signature algorithm, which calculates, obtains the corresponding token of this order, this way it is possible to realize multiple terminal devices use respective token Same internet of things equipment is controlled, because the order note identification of terminal device is when multiple terminal devices control same internet of things equipment Different, so token is also different.These tokens be all within the same code key period it is effective, can be to Internet of Things Net equipment is controlled.Also, Cloud Server can precisely revoke some allocated token, and Cloud Server can be directed to multiple The order of terminal device provides the token for controlling same internet of things equipment, and when the failure of some order, it only will cause the order The failure of corresponding token, distribute to other orders token may continue to using.
Step 503, according to above-mentioned token, the order note identification of this order and to the operational order of above-mentioned internet of things equipment, Generate control instruction.
Step 504, above-mentioned control instruction is sent to above-mentioned internet of things equipment, so that the reception of above-mentioned internet of things equipment is above-mentioned After control instruction, the token in above-mentioned control instruction is authenticated, and after the authentication is passed, executes above-mentioned control instruction In operational order.
In the control method of above-mentioned internet of things equipment, sent and authorization corresponding to this order of creation to Cloud Server After request, the token that above-mentioned Cloud Server is sent is received, then according to above-mentioned token, the order note identification of this order and to object The operational order of networked devices generates control instruction, above-mentioned control instruction is finally sent to internet of things equipment, so that above-mentioned object After networked devices receive above-mentioned control instruction, the token in above-mentioned control instruction is authenticated, and after the authentication is passed, The operational order in above-mentioned control instruction is executed, so as to realize that different terminal devices is same using different Token Controls Internet of things equipment, and availability is still ensured that in the case where communication condition is bad, improve the spirit of internet of things equipment control Activity and safety;And different tokens can be generated in different order note identifications, and it is whole that single token leakage has no effect on system Body safety, different order note identifications combine the same code key, different tokens can be generated, these tokens may serve to control Make the same internet of things equipment.
Fig. 6 is the flow chart of the control method further embodiment of the application internet of things equipment, as shown in fig. 6, above-mentioned object The control method of networked devices may include:
Step 601, the control instruction that receiving terminal apparatus is sent, above-mentioned control instruction is terminal device according to Cloud Server The token of transmission, the creation of above-mentioned terminal device this order order note identification and the operational order of internet of things equipment is generated 's.
In the present embodiment, above-mentioned terminal device can for smart phone, smartwatch, tablet computer, laptop or The intelligent terminals such as person PC, the present embodiment are not construed as limiting the form of above-mentioned terminal device.
Step 602, the token in above-mentioned control instruction is authenticated.
Step 603, after the authentication is passed, the operational order in above-mentioned control instruction is executed.
In the present embodiment, after internet of things equipment receives the control instruction of terminal device transmission, first to above-mentioned control Token in instruction is authenticated, and after the authentication is passed, can just execute the operational order in above-mentioned control instruction.
Wherein, above-mentioned internet of things equipment can carry out the equipment communicated between object, this reality for automobile or electric vehicle etc. Example is applied to be not construed as limiting the form of above-mentioned internet of things equipment.
Specifically, authenticating to the token in above-mentioned control instruction can be with are as follows: according to the code key of itself and above-mentioned control Order note identification in instruction calculates and obtains token;The token obtained will be calculated to compare with the token in above-mentioned control instruction; If it is identical as the token in above-mentioned control instruction to calculate the token obtained, it is determined that the authentication is passed;If calculating the token obtained It is not identical as the token in above-mentioned control instruction, it is determined that authentication does not pass through.
In the control method of above-mentioned internet of things equipment, after the control instruction that receiving terminal apparatus is sent, to above-mentioned control Token in instruction is authenticated, and after the authentication is passed, the operational order in above-mentioned control instruction is executed, so as to realize Different terminal devices uses the different same internet of things equipment of Token Control, and still in the case where communication condition is bad Guarantee availability, improves the flexibility and safety of internet of things equipment control.
Fig. 7 is the flow chart of the control method further embodiment of the application internet of things equipment, as shown in fig. 7, the application In embodiment illustrated in fig. 6, after step 603, can also include:
Step 701, it receives the code key that Cloud Server is sent and negotiates request, it is that Cloud Server determines that above-mentioned code key, which negotiates request, Above-mentioned internet of things equipment does not have associated order to send later.
Step 702, negotiate to update code key with above-mentioned Cloud Server, and save updated code key.
In the present embodiment, before this order is created, Cloud Server and internet of things equipment hold consultation and update code key, And respectively save this code key.
After the operational order that internet of things equipment executes in above-mentioned control instruction, Cloud Server checks that above-mentioned Internet of Things is set It is standby whether also related order, if it is not, Cloud Server and above-mentioned internet of things equipment are negotiated to update code key, and preservation is more Code key after new;If the also related order of above-mentioned internet of things equipment, does not update code key.
In the control method of internet of things equipment provided in this embodiment, internet of things equipment and Cloud Server only need to code key more Use is low to the dependence in telecommunication channel to telecommunication channel when new.In extreme circumstances, if telecommunication channel Unavailable that code key is caused to update failure, the above method still can operate normally.And the validity period control of token is precisely, this reality It applies in example, since terminal device is by authority checking, update internet of things equipment code key to Cloud Server terminates token expiration, It controls precision and depends on the success rate that code key updates.
In addition, update code key can revoke all of corresponding internet of things equipment and distribute token, cloud service in the present embodiment Device can be directed to the order of multiple terminal devices, provide the token for controlling same internet of things equipment.And it is secret once to have carried out update Key operation, these tokens will fail simultaneously.
Fig. 8 is the flow chart of the control method further embodiment of the application internet of things equipment, as shown in figure 8, the application In embodiment illustrated in fig. 6, after step 601, can also include:
Step 801, inquiry request is sent to above-mentioned Cloud Server, above-mentioned inquiry request is for inquiring in above-mentioned control instruction Order note identification corresponding to order it is whether legal.
Step 802, the query result that above-mentioned Cloud Server is sent is received.
Step 803, when order corresponding to above-mentioned query result indicates the order note identification in above-mentioned control instruction is legal, Execute the operational order in above-mentioned control instruction.
The above process be known as order validity inquiry, abbreviation order inquiries, be to step 602 token authentication supplement, one As be only used to verify key instruction (such as unlocking).If query result is corresponding to the order note identification in above-mentioned control instruction Order it is illegal, then internet of things equipment refusal execute the order note identification and its be associated with token any instruction.If do not sent out It plays inquiry or can not initiate to inquire because condition does not allow (telecommunication channel is unavailable), internet of things equipment should be current order It is legal that mark is considered as.
The control method of internet of things equipment provided in this embodiment is low to the dependence in telecommunication channel, internet of things equipment and Cloud Server only need to when order inquiries use to telecommunication channel.Under extreme case, if telecommunication channel can not With initiation order inquiries are led to not, the above method can still be operated normally.In the present embodiment, token expiration is from terminal device It creates order and is started by authorization, terminated to order destruction.The precision of validity period control relies on the initiation frequency of order inquiries And success rate.
Also, the present embodiment allows multiple terminal devices to use the same internet of things equipment of respective Token Control, multiple ends When end equipment controls same internet of things equipment, the order note identification of terminal device is different, so token is also different. These tokens are all that effectively, can control internet of things equipment within the same order period.And it can precisely hang Some allocated token is sold, Cloud Server can be directed to multiple terminal devices, provide the token for controlling same internet of things equipment, And when the failure of some order, it only will cause the corresponding token failure of the order, the token for distributing to other orders may continue to It uses.
It is including Cloud Server, internet of things equipment and end that the control method of internet of things equipment provided by the present application, which can be applied, In the system of end equipment, the application is provided below with reference to the system architecture diagram of Cloud Server, internet of things equipment and terminal device The control method of internet of things equipment be illustrated.
Fig. 9 is the flow chart of the control method further embodiment of the application internet of things equipment, as shown in figure 9, above-mentioned object The control method of networked devices may include:
Step 901, Cloud Server and internet of things equipment, which are held consultation, updates code key, and respectively saves this code key.
In the present embodiment, each internet of things equipment has respective code key, and has a record on Cloud Server.
Step 902, terminal device is above-mentioned to award to authorization requests corresponding to this order that Cloud Server is sent and is created Power request is for requesting to control specified internet of things equipment.
Specifically, it when terminal device needs to control internet of things equipment, needs to request to authorize to Cloud Server, this When terminal device will create order, then to Cloud Server send with create this order corresponding to authorization requests.
In the present embodiment, above-mentioned terminal device can for smart phone, smartwatch, tablet computer, laptop or The intelligent terminals such as person PC, the present embodiment are not construed as limiting the form of above-mentioned terminal device.
Step 903, after Cloud Server receives authorization requests, according to the code key of above-mentioned internet of things equipment and this order Order note identification, calculate and obtain the corresponding token of this order, above-mentioned token is sent to terminal device.
Specifically, Cloud Server needs first to determine whether above-mentioned authorization requests legal, determine above-mentioned authorization requests it is legal it Afterwards, Cloud Server can be calculated according to the code key of above-mentioned internet of things equipment and the order note identification of this order using signature algorithm The corresponding token of this order is obtained, this way it is possible to realize multiple terminal devices use the same Internet of Things of respective Token Control Net equipment, because the order note identification of terminal device is different, institute when multiple terminal devices control same internet of things equipment It is also different with token.These tokens are all that effectively, can control to internet of things equipment within the same code key period System.Also, Cloud Server can precisely revoke some allocated token, and Cloud Server can ordering for multiple terminal devices It is single, the token for controlling same internet of things equipment is provided, and when the failure of some order, it only will cause the corresponding token of the order and lose Effect, distribute to other orders token may continue to using.
Step 904, after terminal device receives above-mentioned token, according to above-mentioned token, this order order note identification and To the operational order of above-mentioned internet of things equipment, control instruction is generated, above-mentioned control instruction is sent to above-mentioned internet of things equipment, with Above-mentioned internet of things equipment is controlled.
Step 905, after internet of things equipment receives control instruction, the token in above-mentioned control instruction is authenticated, is being reflected After power passes through, the operational order in above-mentioned control instruction is executed.
In the present embodiment, after internet of things equipment receives the control instruction of terminal device transmission, first to above-mentioned control Token in instruction is authenticated, and after the authentication is passed, can just execute the operational order in above-mentioned control instruction.
Specifically, authenticating to the token in above-mentioned control instruction can be with are as follows: according to the code key of itself and above-mentioned control Order note identification in instruction calculates and obtains token;The token obtained will be calculated to compare with the token in above-mentioned control instruction; If it is identical as the token in above-mentioned control instruction to calculate the token obtained, it is determined that the authentication is passed;If calculating the token obtained It is not identical as the token in above-mentioned control instruction, it is determined that authentication does not pass through.
After this order terminates, Cloud Server checks the whether also related order of the internet of things equipment, if so, then Without updating code key;If it is not, updating the code key of the internet of things equipment, that is, return to step 901.
The present embodiment is low to telecommunication channel-independent, and internet of things equipment and Cloud Server only need to be when code key update Using arrive telecommunication channel.Under extreme case, code key is caused to update failure if telecommunication channel is unavailable, the present embodiment is also The code key of last time can be used, still can operate normally.
Precisely, token expiration is since terminal device is by authority checking, more to Cloud Server for token expiration control New internet of things equipment code key terminates, and control precision depends on the success rate that code key updates.In addition, multiple terminal devices is allowed to make With the same internet of things equipment of respective Token Control, when multiple terminal devices control same internet of things equipment, terminal device is ordered Single mark is different, so token is also different.These tokens are all effectively, all within the same code key period Internet of things equipment can be controlled.
Update code key can revoke all of corresponding internet of things equipment and distribute token, and Cloud Server can be directed to multiple ends The order of end equipment provides the token for controlling same internet of things equipment.And the operation of update code key has once been carried out, these tokens will It fails simultaneously.
Figure 10 is the flow chart of the control method further embodiment of the application internet of things equipment, as shown in Figure 10, above-mentioned The control method of internet of things equipment may include:
Step 1001, terminal device is above-mentioned to authorization requests corresponding to this order that Cloud Server is sent and is created Authorization requests are for requesting to control specified internet of things equipment.
Specifically, it when terminal device needs to control internet of things equipment, needs to request to authorize to Cloud Server, this When terminal device will create order, then to Cloud Server send with create this order corresponding to authorization requests.
In the present embodiment, above-mentioned terminal device can for smart phone, smartwatch, tablet computer, laptop or The intelligent terminals such as person PC, the present embodiment are not construed as limiting the form of above-mentioned terminal device.
In the present embodiment, each internet of things equipment has respective code key, and has a record on Cloud Server.
Step 1002, it after Cloud Server receives authorization requests, is ordered according to the code key of above-mentioned internet of things equipment with this Single order note identification calculates and obtains the corresponding token of this order, above-mentioned token is sent to terminal device.
Specifically, Cloud Server needs first to determine whether above-mentioned authorization requests legal, determine above-mentioned authorization requests it is legal it Afterwards, Cloud Server can be calculated according to the code key of above-mentioned internet of things equipment and the order note identification of this order using signature algorithm The corresponding token of this order is obtained, this way it is possible to realize multiple terminal devices use the same Internet of Things of respective Token Control Net equipment, because the order note identification of terminal device is different, institute when multiple terminal devices control same internet of things equipment It is also different with token.These tokens are all that effectively, can control to internet of things equipment within the same code key period System.Also, Cloud Server can precisely revoke some allocated token, and Cloud Server can ordering for multiple terminal devices It is single, the token for controlling same internet of things equipment is provided, and when the failure of some order, it only will cause the corresponding token of the order and lose Effect, distribute to other orders token may continue to using.
Step 1003, after terminal device receives above-mentioned token, according to above-mentioned token, this order order note identification and To the operational order of above-mentioned internet of things equipment, control instruction is generated, above-mentioned control instruction is sent to above-mentioned internet of things equipment, with Above-mentioned internet of things equipment is controlled.
Step 1004, after internet of things equipment receives control instruction, the token in above-mentioned control instruction is authenticated.
In the present embodiment, after internet of things equipment receives the control instruction of terminal device transmission, first to above-mentioned control Token in instruction is authenticated.
Specifically, authenticating to the token in above-mentioned control instruction can be with are as follows: according to the code key of itself and above-mentioned control Order note identification in instruction calculates and obtains token;The token obtained will be calculated to compare with the token in above-mentioned control instruction; If it is identical as the token in above-mentioned control instruction to calculate the token obtained, it is determined that the authentication is passed;If calculating the token obtained It is not identical as the token in above-mentioned control instruction, it is determined that authentication does not pass through.
Step 1005, internet of things equipment sends inquiry request to above-mentioned Cloud Server, and above-mentioned inquiry request is for inquiring Whether legal state order corresponding to the order note identification in control instruction.
Step 1006, internet of things equipment receives the query result that above-mentioned Cloud Server is sent.
Step 1007, when above-mentioned query result indicates that order corresponding to the order note identification in above-mentioned control instruction is legal, And when the authentication is passed, the operational order in above-mentioned control instruction is executed.
The process that step 1005~step 1007 describes is known as the inquiry of order validity, and abbreviation order inquiries are to step The supplement of 1004 tokens authentication is general to be only used to verify key instruction (such as unlocking).If query result is above-mentioned control Order corresponding to order note identification in instruction is illegal, then internet of things equipment refusal executes the order note identification and its association token Any instruction.If not initiating to inquire or can not initiate to inquire because condition does not allow (telecommunication channel is unavailable), It is legal that internet of things equipment should be considered as current order mark.
In the present embodiment, step 1004 can execute parallel with step 1005~step 1006, can also successively execute, this Embodiment is not construed as limiting this.
The present embodiment is low to telecommunication channel-independent, and internet of things equipment and Cloud Server only need to be when order inquiries Using arrive telecommunication channel.Under extreme case, lead to not initiate order inquiries, above-mentioned side if telecommunication channel is unavailable Method can still operate normally;Token expiration control is relatively weak, and token expiration creates order and pass through and awards from terminal device Power starts, and terminates to order destruction, and the precision of validity period control relies on the initiation frequency and success rate of order inquiries.
The present embodiment allows multiple terminal devices to use the same internet of things equipment of respective Token Control: multiple terminal devices When controlling same internet of things equipment, the order note identification of terminal device is different, so token is also different.These are enabled Board is all that effectively, can control internet of things equipment within the same order period;Some can precisely be revoked to have divided The token matched, Cloud Server can be directed to the order of multiple terminal devices, provide the token for controlling same internet of things equipment.And work as When some order fails, only will cause the order corresponding token failure, distribute to other orders token may continue to using.
Figure 11 is the flow chart of the control method further embodiment of the application internet of things equipment, as shown in figure 11, above-mentioned The control method of internet of things equipment may include:
Step 1101, Cloud Server and internet of things equipment, which are held consultation, updates code key, and respectively saves this code key.
In the present embodiment, each internet of things equipment has respective code key, and has a record on Cloud Server.
Step 1102, terminal device is above-mentioned to authorization requests corresponding to this order that Cloud Server is sent and is created Authorization requests are for requesting to control specified internet of things equipment.
Specifically, it when terminal device needs to control internet of things equipment, needs to request to authorize to Cloud Server, this When terminal device will create order, then to Cloud Server send with create this order corresponding to authorization requests.
In the present embodiment, above-mentioned terminal device can for smart phone, smartwatch, tablet computer, laptop or The intelligent terminals such as person PC, the present embodiment are not construed as limiting the form of above-mentioned terminal device.
Step 1103, it after Cloud Server receives authorization requests, is ordered according to the code key of above-mentioned internet of things equipment with this Single order note identification calculates and obtains the corresponding token of this order, above-mentioned token is sent to terminal device.
Specifically, Cloud Server needs first to determine whether above-mentioned authorization requests legal, determine above-mentioned authorization requests it is legal it Afterwards, Cloud Server can be calculated according to the code key of above-mentioned internet of things equipment and the order note identification of this order using signature algorithm The corresponding token of this order is obtained, this way it is possible to realize multiple terminal devices use the same Internet of Things of respective Token Control Net equipment, because the order note identification of terminal device is different, institute when multiple terminal devices control same internet of things equipment It is also different with token.These tokens are all that effectively, can control to internet of things equipment within the same code key period System.Also, Cloud Server can precisely revoke some allocated token, and Cloud Server can ordering for multiple terminal devices It is single, the token for controlling same internet of things equipment is provided, and when the failure of some order, it only will cause the corresponding token of the order and lose Effect, distribute to other orders token may continue to using.
Step 1104, after terminal device receives above-mentioned token, according to above-mentioned token, this order order note identification and To the operational order of above-mentioned internet of things equipment, control instruction is generated, above-mentioned control instruction is sent to above-mentioned internet of things equipment, with Above-mentioned internet of things equipment is controlled.
Step 1105, after internet of things equipment receives control instruction, the token in above-mentioned control instruction is authenticated.
In the present embodiment, after internet of things equipment receives the control instruction of terminal device transmission, first to above-mentioned control Token in instruction is authenticated.
Specifically, authenticating to the token in above-mentioned control instruction can be with are as follows: according to the code key of itself and above-mentioned control Order note identification in instruction calculates and obtains token;The token obtained will be calculated to compare with the token in above-mentioned control instruction; If it is identical as the token in above-mentioned control instruction to calculate the token obtained, it is determined that the authentication is passed;If calculating the token obtained It is not identical as the token in above-mentioned control instruction, it is determined that authentication does not pass through.
Step 1106, internet of things equipment sends inquiry request to above-mentioned Cloud Server, and above-mentioned inquiry request is for inquiring Whether legal state order corresponding to the order note identification in control instruction.
Step 1107, internet of things equipment receives the query result that above-mentioned Cloud Server is sent.
Step 1108, when above-mentioned query result indicates that order corresponding to the order note identification in above-mentioned control instruction is legal, And when the authentication is passed, the operational order in above-mentioned control instruction is executed.
The process that step 1106~step 1108 describes is known as the inquiry of order validity, and abbreviation order inquiries are to step The supplement of 1105 tokens authentication is general to be only used to verify key instruction (such as unlocking).If query result is above-mentioned control Order corresponding to order note identification in instruction is illegal, then internet of things equipment refusal executes the order note identification and its association token Any instruction.If not initiating to inquire or can not initiate to inquire because condition does not allow (telecommunication channel is unavailable), It is legal that internet of things equipment should be considered as current order mark.
In the present embodiment, step 1105 can execute parallel with step 1106~step 1107, can also successively execute, this Embodiment is not construed as limiting this.
After this order terminates, Cloud Server checks the whether also related order of the internet of things equipment, if so, then Without updating code key;If it is not, updating the code key of the internet of things equipment, that is, return to step 1101.
The present embodiment is low to telecommunication channel-independent, and internet of things equipment and Cloud Server only need to be in code key update and orders Use is to telecommunication channel when inquiry.Under extreme case, code key is caused to update and order if telecommunication channel is unavailable Single inquiry failure, system still can operate normally;Token expiration control is accurate: token expiration is ordered from terminal device creation Singly and by authorization start, terminates to order destruction.It controls precision and depends on the success rate and order inquiries that code key updates Initiation frequency and success rate.
Multiple terminal devices are allowed to use the same internet of things equipment of respective Token Control, multiple terminal devices control is same When internet of things equipment, the order note identification of terminal device is different, so token is also different.These tokens are same It is all that effectively, internet of things equipment can be controlled in a order period.
Also, the present embodiment can precisely revoke some allocated token, and Cloud Server can be set for multiple terminals Standby order provides the token for controlling same internet of things equipment.And when the failure of some order, it is corresponding only to will cause the order Token failure, distribute to other orders token may continue to using;Corresponding internet of things equipment can be revoked by updating code key All distributed token: Cloud Server can be directed to the order of multiple terminal devices, provide and control same internet of things equipment Token.And the operation of update code key has once been carried out, these tokens will fail simultaneously.
The control method of internet of things equipment provided by the embodiments of the present application can be improved attacker's forgery internet of things equipment and refer to The difficulty of order reduces dependence of the internet of things equipment to long-distance communication network.It needs compared to internet of things equipment instruction by cloud service The scheme of device transfer, the present embodiment allow to directly control Internet of Things by short range communication protocol by authorization terminal equipment Equipment.On the other hand, in the present embodiment, communication between internet of things equipment and Cloud Server it is not mandatory that, network environment System still can normal use when bad.
In addition, token, which can be effectively prevented, using method provided in this embodiment collects attack.If attacker is in cloud Between server and terminal device, perhaps it is between terminal device and internet of things equipment or attacker is exactly terminal device Itself, then terminal device, which is possible to intercept used in this communication, controls token.Different Internet of Things in the present embodiment Equipment, token used in the different order periods is all different.Even if so in the present embodiment single token leakage, Other internet of things equipment will not be endangered.
According to the embodiment above, the method and a kind of mixing of the validity period for accurately controlling token the present invention provides two kinds Control method.It specifically includes: method one, by controlling code key validity period.Method two, by controlling order validity period.Mixing control Method processed: while controlling code key validity period and order validity period.It is implemented with simultaneously and is conducive to the token expiration that tightens control, ensure object Networked devices use safe.
The embodiment of the present application provides two kinds of methods for actively revoking token, the above two method for actively revoking token It can be applied in combination.A kind of method that actively revoking token is to update code key (revoking the associated all tokens of this code key), separately One is revoke order (revoking some associated token of some order).The difference of both methods is, for cloud service point Having matched the case where multiple tokens are to one or more terminal devices, (such as two tokens distribute to a terminal, four token distribution To two terminals etc.), updating code key can make the old token of all internet of things equipment fail;Revoking order then only can allow order pair The token for a certain terminal device answered fails.It can select suitably to revoke token approach in conjunction with specific business scenario.
Specifically, by taking two terminal devices request to an internet of things equipment control right request simultaneously as an example.The business field Under scape, each terminal device generates an independent order and independent token respectively.If Cloud Server, which executes, updates code key Token is revoked, because an internet of things equipment only corresponds to a code key, updating code key can lead to the order and token of two users It is cancelled simultaneously, i.e., can not both obtain internet of things equipment control.If Cloud Server execution revoke some order to Its corresponding token is revoked, then the terminal device for creating the order will be cancelled the control of the internet of things equipment.
It should be noted that two kinds of methods for revoking token also can be used simultaneously, it is ensured that revoke under certain application scenarios It is safe to ensure that internet of things equipment uses for token business realizing.
Communication encryption based on the present embodiment has more meaning, and the safety of system depends on perfect authorization authorizing procedure, It can be further improved system safety plus communication encryption on the basis of the control method of internet of things equipment provided in this embodiment Property.
The control method of internet of things equipment provided by the embodiments of the present application is suitable for terminal device to internet of things equipment at certain The application scenarios that control is obtained in the section time, are conducive to security control of the terminal device holder to internet of things equipment.Such Application scenarios include but is not limited to shared automobile and/or shared bicycle etc..Specifically, it using this method, shares automobile leasing and uses Family can obtain the control of shared automobile within the order period, while convenient shared automobile holder shares automobile to this and carries out Effective and safe control.
The control method of internet of things equipment provided by the embodiments of the present application is still ensured that in the case where communication condition is bad Availability, this is because when communication condition is bad, code key not will be updated, and in the case where communication condition is bad, order Inquiry failure, internet of things equipment will be considered that current order is still effective;Therefore in the case where communication condition is bad, the application is real The control method for applying the internet of things equipment of example offer still can guarantee availability.
And the control method of internet of things equipment provided by the embodiments of the present application, can be in shared automobile and/or shared list When vehicle is parked in the place of the poor signals such as underground parking, it still can guarantee the availability of shared automobile and/or shared bicycle, Client is set not to be available shared automobile and/or shared bicycle on underground parking and other places due to signal of communication is bad.
Figure 12 is the structural schematic diagram of control device one embodiment of the application internet of things equipment, in the embodiment of the present application Internet of things equipment control device can be used as Cloud Server realize the application FIG. 1 to FIG. 4 illustrated embodiment provide Internet of Things The control method of net equipment.As shown in figure 12, the control device of above-mentioned internet of things equipment may include: receiving module 1201, meter Calculate module 1202 and sending module 1203;
Wherein, receiving module 1201, for receiving terminal apparatus send this order with creation corresponding to authorization Request, above-mentioned authorization requests are for requesting to control specified internet of things equipment;
In the present embodiment, above-mentioned terminal device can for smart phone, smartwatch, tablet computer, laptop or Person's personal computer (Personal Computer;The intelligent terminals such as hereinafter referred to as: PC), the present embodiment is to above-mentioned terminal The form of equipment is not construed as limiting.
Computing module 1202, for according to the code key of above-mentioned internet of things equipment and the order note identification of this order, calculating to be obtained Obtain the corresponding token of this order;
Specifically, computing module 1202 can according to the order note identification of the code key of above-mentioned internet of things equipment and this order, Calculated using signature algorithm and obtain the corresponding token of this order, this way it is possible to realize multiple terminal devices use it is respective The same internet of things equipment of Token Control, because when multiple terminal devices control same internet of things equipment, the order mark of terminal device Knowledge is different, so token is also different.These tokens be all within the same code key period it is effective, can be right Internet of things equipment is controlled.Also, the control device of above-mentioned internet of things equipment can precisely revoke some allocated token, The control device of above-mentioned internet of things equipment can be directed to the order of multiple terminal devices, provide the order for controlling same internet of things equipment Board, and when the failure of some order, only will cause the order corresponding token failure, and distributing to the tokens of other orders still can be after It is continuous to use.
Sending module 1203, for above-mentioned token to be sent to above-mentioned terminal device, so that above-mentioned terminal device is according to upper Token, the order note identification of this order and the operational order to above-mentioned internet of things equipment are stated, it, will be above-mentioned after generating control instruction Control instruction is sent to internet of things equipment, to control above-mentioned internet of things equipment.
In the control device of above-mentioned internet of things equipment, 1201 receiving terminal apparatus of receiving module send with creation this After authorization requests corresponding to order, computing module 1202 is according to the code key of above-mentioned internet of things equipment and the order of this order Mark calculates and obtains the corresponding token of this order, and then above-mentioned token is sent to above-mentioned terminal device by sending module 1203, So that above-mentioned terminal device is according to the token, the order note identification of this order and to the operational order of above-mentioned internet of things equipment, After generating control instruction, above-mentioned control instruction is sent to the internet of things equipment, above-mentioned internet of things equipment is controlled, So as to realize that different terminal devices uses the different same internet of things equipment of Token Control, and it is bad in communication condition In the case where still ensure that availability, improve internet of things equipment control flexibility and safety;And different order mark Know, different tokens can be generated, single token leakage has no effect on system overall security, and different order note identifications combines same One code key, can be generated different tokens, these tokens may serve to control the same internet of things equipment.
Figure 13 is the structural schematic diagram of another embodiment of the control device of the application internet of things equipment, and shown in Figure 12 The control device of internet of things equipment is compared, the difference is that, the control device of internet of things equipment shown in Figure 13 can also wrap It includes: checking module 1204 and update module 1205
Module 1204 is checked, for after this order terminates, checking whether above-mentioned internet of things equipment is also related Order;
Update module 1205 is used for when checking that module 1204 determines above-mentioned internet of things equipment without associated order, Negotiate to update code key with above-mentioned internet of things equipment, and saves updated code key.
In the present embodiment, before this order is created, the control device and internet of things equipment of above-mentioned internet of things equipment It holds consultation and updates code key, and respectively save this code key.
After token is sent to terminal device by sending module 1203, check that module 1204 checks above-mentioned internet of things equipment Whether also related order, if it is not, update module 1205 and above-mentioned internet of things equipment are negotiated to update code key, and save Updated code key;If the also related order of above-mentioned internet of things equipment, update module 1205 do not update code key.
In the control device of internet of things equipment provided in this embodiment, the control of internet of things equipment and above-mentioned internet of things equipment Device only need to code key update when use to telecommunication channel, it is low to the dependence in telecommunication channel.In extreme case Under, cause code key to update failure if telecommunication channel is unavailable, the control device of above-mentioned internet of things equipment still can be normal Operation.And the validity period control of token is precisely, and in the present embodiment, token expiration is opened from terminal device by authority checking Begin, updating internet of things equipment code key to update module 1205 terminates, and control precision depends on the success rate that code key updates.
In addition, the update of update module 1205 code key can revoke all of corresponding internet of things equipment and divide in the present embodiment With token, the control device of above-mentioned internet of things equipment can be directed to the order of multiple terminal devices, provide and control same Internet of Things The token of equipment.And the operation of update code key has once been carried out, these tokens will fail simultaneously.
Further, receiving module 1201, are also used to that above-mentioned token is sent to above-mentioned terminal in sending module 1203 and set After standby, the inquiry request that above-mentioned internet of things equipment is sent is received, above-mentioned inquiry request is for inquiring in above-mentioned control instruction Whether order corresponding to order note identification is legal;
Sending module 1203 is also used to send query result to above-mentioned internet of things equipment, so that above-mentioned internet of things equipment exists When above-mentioned query result indicates that order corresponding to the order note identification in above-mentioned control instruction is legal, execute in above-mentioned control instruction Operational order.
The above process is known as the inquiry of order validity, and abbreviation order inquiries are general only (such as to open for verifying key instruction Lock etc.).If query result is illegal for order corresponding to the order note identification in above-mentioned control instruction, internet of things equipment is refused The order note identification is executed absolutely and its is associated with any instruction of token.If not initiating inquiry or because condition does not allow (remotely to lead to News channel is unavailable) and can not initiate to inquire, it is legal that internet of things equipment should be considered as current order mark.
The control device of internet of things equipment provided in this embodiment is low to the dependence in telecommunication channel, internet of things equipment and The control device of above-mentioned internet of things equipment only need to when order inquiries use to telecommunication channel.Under extreme case, if Telecommunication channel is unavailable to lead to not initiate order inquiries, and the control device of above-mentioned internet of things equipment still can be transported normally Row.In the present embodiment, token expiration terminates since terminal device creates order and passes through authorization to order destruction.Effectively The precision of phase control relies on the initiation frequency and success rate of order inquiries.
Also, the present embodiment allows multiple terminal devices to use the same internet of things equipment of respective Token Control, multiple ends When end equipment controls same internet of things equipment, the order note identification of terminal device is different, so token is also different. These tokens are all that effectively, can control internet of things equipment within the same order period.And it can precisely hang Some allocated token is sold, the control device of above-mentioned internet of things equipment can be directed to multiple terminal devices, it is same to provide control The token of internet of things equipment, and when the failure of some order, it only will cause the corresponding token failure of the order, distribute to other and order Single token may continue to using.
Further, the control device of above-mentioned internet of things equipment can also include:
Inspection module 1206, the authorization for receiving the terminal device transmission for creating this order in receiving module 1201 are asked After asking, test to the legitimacy of above-mentioned authorization requests;Specifically, inspection module 1206 is to the legal of above-mentioned authorization requests Property is tested can be with are as follows: it is pre- that inspection module 1206 checks whether the remaining sum of logon account in above-mentioned terminal device is greater than or equal to Determine threshold value and/or whether above-mentioned logon account passes through real-name authentication etc., wherein above-mentioned predetermined threshold can root in specific implementation According to the sets itselfs such as system performance and/or realization demand, the present embodiment is not construed as limiting the size of above-mentioned predetermined threshold.
In this way, inspection module 1206 determine that above-mentioned authorization requests are legal can be with are as follows: inspection module 1206 determines above-mentioned terminal The remaining sum of logon account is greater than or equal to predetermined threshold in equipment and/or above-mentioned logon account passes through real-name authentication.
Computing module 1202 is specifically used for after inspection module 1206 determines that above-mentioned authorization requests are legal, according to above-mentioned The code key of internet of things equipment and the order note identification of this order calculate and obtain the corresponding token of this order.
Figure 14 is the structural schematic diagram of the control device further embodiment of the application internet of things equipment, the embodiment of the present application In internet of things equipment control device can be used as terminal device realize the application embodiment illustrated in fig. 5 provide Internet of Things set Standby control method.
In the present embodiment, above-mentioned terminal device can for smart phone, smartwatch, tablet computer, laptop or The intelligent terminals such as person PC, the present embodiment are not construed as limiting the form of above-mentioned terminal device.
As shown in figure 14, the control device of above-mentioned internet of things equipment may include: sending module 1401, receiving module 1402 With generation module 1403;
Wherein, sending module 1401, for Cloud Server send with create this order corresponding to authorization requests, Above-mentioned authorization requests are for requesting to control specified internet of things equipment;Specifically, when the control device of internet of things equipment It when needing to control internet of things equipment, needs to request to authorize to Cloud Server, at this moment the control dress of above-mentioned internet of things equipment It sets and will create order, then sending module 1401 is sent and authorization requests corresponding to this order of creation to Cloud Server.
Receiving module 1402, the token sent for receiving above-mentioned Cloud Server, above-mentioned token is above-mentioned Cloud Server root It is calculated according to the code key of above-mentioned internet of things equipment and the order note identification of this order;Specifically, Cloud Server can be according to above-mentioned The code key of internet of things equipment and the order note identification of this order are calculated using signature algorithm and obtain the corresponding token of this order, This way it is possible to realize multiple terminal devices use the same internet of things equipment of respective Token Control, because of multiple terminal devices When controlling same internet of things equipment, the order note identification of terminal device is different, so token is also different.These are enabled Board is all that effectively, can control internet of things equipment within the same code key period.Also, Cloud Server can be accurate Some allocated token is revoked, Cloud Server can be directed to the order of multiple terminal devices, provide the same Internet of Things of control and set Standby token, and when the failure of some order, it only will cause the corresponding token failure of the order, distribute to the token of other orders May continue to using.
Generation module 1403, for the order note identification according to above-mentioned token, this order and to above-mentioned internet of things equipment Operational order generates control instruction.
Sending module 1401 is also used to above-mentioned control instruction being sent to above-mentioned internet of things equipment, so that above-mentioned Internet of Things After equipment receives above-mentioned control instruction, the token in above-mentioned control instruction is authenticated, and after the authentication is passed, is executed Operational order in above-mentioned control instruction.
In the control device of above-mentioned internet of things equipment, sending module 1401 sends this order with creation to Cloud Server After corresponding authorization requests, receiving module 1402 receives the token that above-mentioned Cloud Server is sent, then generation module 1403 According to above-mentioned token, the order note identification of this order and to the operational order of internet of things equipment, control instruction is generated, is finally sent Above-mentioned control instruction is sent to internet of things equipment by module 1401 so that above-mentioned internet of things equipment receive above-mentioned control instruction it Afterwards, the token in above-mentioned control instruction is authenticated, and after the authentication is passed, the operation executed in above-mentioned control instruction refers to It enables, so as to realize that different terminal devices uses the different same internet of things equipment of Token Control, and in communication condition Availability is still ensured that in the case where bad, improves the flexibility and safety of internet of things equipment control;And different orders Single mark, can be generated different tokens, and single token leakage has no effect on system overall security, different order note identification knots The same code key is closed, different tokens can be generated, these tokens may serve to control the same internet of things equipment.
Figure 15 is the structural schematic diagram of the control device further embodiment of the application internet of things equipment, the embodiment of the present application In the control device of internet of things equipment can be used as internet of things equipment and realize what the application Fig. 6~embodiment illustrated in fig. 8 was provided The control method of internet of things equipment.As shown in figure 15, the control device of above-mentioned internet of things equipment may include: receiving module 1501, authentication module 1502 and execution module 1503;
Wherein, receiving module 1501, for the control instruction that receiving terminal apparatus is sent, above-mentioned control instruction is above-mentioned end Token that end equipment is sent according to Cloud Server, the creation of above-mentioned terminal device this order order note identification and Internet of Things is set What standby operational order generated;In the present embodiment, above-mentioned terminal device can be smart phone, smartwatch, tablet computer, pen Remember that the intelligent terminals such as this computer or PC, the present embodiment are not construed as limiting the form of above-mentioned terminal device.
Authentication module 1502, for being authenticated to the token in above-mentioned control instruction.
Execution module 1503, for executing the operational order in above-mentioned control instruction after the authentication is passed.
In the present embodiment, after receiving module 1501 receives the control instruction of terminal device transmission, authentication module 1502 The token in above-mentioned control instruction is authenticated first, after the authentication is passed, execution module 1503 can just execute above-mentioned control Operational order in system instruction.
Wherein, above-mentioned internet of things equipment can carry out the equipment communicated between object, this reality for automobile or electric vehicle etc. Example is applied to be not construed as limiting the form of above-mentioned internet of things equipment.
In the control device of above-mentioned internet of things equipment, 1501 receiving terminal apparatus of receiving module send control instruction it Afterwards, authentication module 1502 authenticates the token in above-mentioned control instruction, and after the authentication is passed, execution module 1503 is executed Operational order in above-mentioned control instruction, so as to realize that different terminal devices uses the different same Internet of Things of Token Control Net equipment, and availability is still ensured that in the case where communication condition is bad, improve the flexibility of internet of things equipment control And safety.
Figure 16 is the structural schematic diagram of the control device further embodiment of the application internet of things equipment, and shown in figure 15 The control device of internet of things equipment is compared, the difference is that, in the control device of internet of things equipment shown in Figure 16, authenticate mould Block 1502 may include: token computation submodule 15021, comparison submodule 15022 and determining submodule 15023;
Wherein, token computation submodule 15021, for the order mark in the code key and above-mentioned control instruction according to itself Know, calculates and obtain token;
Submodule 15022 is compared, for token computational submodule 15021 to be calculated the token obtained and above-mentioned control instruction In token compare;
Submodule 15023 is determined, for determining when the token for calculating acquisition is identical as the token in above-mentioned control instruction The authentication is passed;When the token in the token and above-mentioned control instruction for calculating acquisition is not identical, determine that authentication does not pass through.
Further, the control device of above-mentioned internet of things equipment can also include: update module 1504;
Receiving module 1501 is also used to after the operational order that execution module 1503 executes in above-mentioned control instruction, connects It receives the code key that above-mentioned Cloud Server is sent and negotiates request, it is that Cloud Server determines above-mentioned internet of things equipment that above-mentioned code key, which negotiates request, There is no associated order to send later;
Update module 1504 updates code key for negotiating with above-mentioned Cloud Server, and saves updated code key.
In the present embodiment, before this order is created, Cloud Server hold consultation with update module 1504 update it is secret Key, and respectively save this code key.
After the operational order that execution module 1503 executes in above-mentioned control instruction, Cloud Server checks above-mentioned Internet of Things The whether also related order of equipment if it is not, Cloud Server and update module 1504 negotiate to update code key, and saves more Code key after new;If the also related order of above-mentioned internet of things equipment, does not update code key.
In the present embodiment, the control device and Cloud Server of internet of things equipment only need to when code key updates use to remote Journey communication channel is low to the dependence in telecommunication channel.In extreme circumstances, if telecommunication channel is unavailable to lead to code key more New failure, the control device of above-mentioned internet of things equipment still can operate normally.And the validity period control of token is precisely, this reality It applies in example, since terminal device is by authority checking, update internet of things equipment code key to Cloud Server terminates token expiration, It controls precision and depends on the success rate that code key updates.
In addition, update code key can revoke all of corresponding internet of things equipment and distribute token, cloud service in the present embodiment Device can be directed to the order of multiple terminal devices, provide the token for controlling same internet of things equipment.And it is secret once to have carried out update Key operation, these tokens will fail simultaneously.
Further, the control device of above-mentioned internet of things equipment can also include: sending module 1505;
Sending module 1505, for after the control instruction that 1501 receiving terminal apparatus of receiving module is sent, to above-mentioned Cloud Server sends inquiry request, order corresponding to the order note identification that above-mentioned inquiry request is used to inquire in above-mentioned control instruction It is whether legal;
Receiving module 1501, the query result sent for receiving above-mentioned Cloud Server;
Execution module 1503, specifically for being indicated corresponding to the order note identification in above-mentioned control instruction when above-mentioned query result Order it is legal when, execute the operational order in above-mentioned control instruction.
The above process is known as the inquiry of order validity, and abbreviation order inquiries are the benefits to 1502 token of authentication module authentication It fills, it is general to be only used to verify key instruction (such as unlocking).If query result is the order note identification in above-mentioned control instruction Corresponding order is illegal, then the refusal of execution module 1503 executes the order note identification and its is associated with any instruction of token.Such as Fruit does not initiate to inquire or can not initiate to inquire because condition does not allow (telecommunication channel is unavailable), and execution module 1503 is answered It is legal that current order mark is considered as.
The control device of internet of things equipment provided in this embodiment is low to the dependence in telecommunication channel, and above-mentioned Internet of Things is set Standby control device and Cloud Server only need to when order inquiries use to telecommunication channel.Under extreme case, if far Journey communication channel is unavailable to be led to not initiate order inquiries, and the control device of above-mentioned internet of things equipment can still operate normally. In the present embodiment, token expiration terminates since terminal device creates order and passes through authorization to order destruction.Validity period control The precision of system relies on the initiation frequency and success rate of order inquiries.
Also, the present embodiment allows multiple terminal devices to use the same internet of things equipment of respective Token Control, multiple ends When end equipment controls same internet of things equipment, the order note identification of terminal device is different, so token is also different. These tokens are all that effectively, can control internet of things equipment within the same order period.And it can precisely hang Some allocated token is sold, Cloud Server can be directed to multiple terminal devices, provide the token for controlling same internet of things equipment, And when the failure of some order, it only will cause the corresponding token failure of the order, the token for distributing to other orders may continue to It uses.
Figure 17 is the structural schematic diagram of the application server one embodiment, and above-mentioned server may include memory, place It manages device and is stored in the computer program that can be run on above-mentioned memory and on above-mentioned processor, above-mentioned processor executes above-mentioned When computer program, the control method of the internet of things equipment of the application FIG. 1 to FIG. 4 illustrated embodiment offer may be implemented.
Wherein, above-mentioned server can be Cloud Server, or other kinds of server, the present embodiment is to above-mentioned The specific form of server is not construed as limiting.
Figure 17 shows the block diagrams for the exemplary computer device 12 for being suitable for being used to realize the application embodiment.Figure 17 is aobvious The computer equipment 12 shown is only an example, should not function to the embodiment of the present application and use scope bring any limit System.
As shown in figure 17, computer equipment 12 is showed in the form of universal computing device.The component of computer equipment 12 can To include but is not limited to: one or more processor or processing unit 16, system storage 28 connect different system components The bus 18 of (including system storage 28 and processing unit 16).
Bus 18 indicates one of a few class bus structures or a variety of, including memory bus or Memory Controller, Peripheral bus, graphics acceleration port, processor or the local bus using any bus structures in a variety of bus structures.It lifts For example, these architectures include but is not limited to industry standard architecture (Industry Standard Architecture;Hereinafter referred to as: ISA) bus, microchannel architecture (Micro Channel Architecture;Below Referred to as: MAC) bus, enhanced isa bus, Video Electronics Standards Association (Video Electronics Standards Association;Hereinafter referred to as: VESA) local bus and peripheral component interconnection (Peripheral Component Interconnection;Hereinafter referred to as: PCI) bus.
Computer equipment 12 typically comprises a variety of computer system readable media.These media can be it is any can be by The usable medium that computer equipment 12 accesses, including volatile and non-volatile media, moveable and immovable medium.
System storage 28 may include the computer system readable media of form of volatile memory, such as arbitrary access Memory (Random Access Memory;Hereinafter referred to as: RAM) 30 and/or cache memory 32.Computer equipment 12 It may further include other removable/nonremovable, volatile/non-volatile computer system storage mediums.Only conduct Citing, storage system 34 can be used for reading and writing immovable, non-volatile magnetic media, and (Figure 17 do not show, commonly referred to as " hard disk Driver ").Although being not shown in Figure 17, can provide for reading and writing to removable non-volatile magnetic disk (such as " floppy disk ") Disc driver, and to removable anonvolatile optical disk (such as: compact disc read-only memory (Compact Disc Read Only Memory;Hereinafter referred to as: CD-ROM), digital multi CD-ROM (Digital Video Disc Read Only Memory;Hereinafter referred to as: DVD-ROM) or other optical mediums) read-write CD drive.In these cases, each driving Device can be connected by one or more data media interfaces with bus 18.Memory 28 may include that at least one program produces Product, the program product have one group of (for example, at least one) program module, and it is each that these program modules are configured to perform the application The function of embodiment.
Program/utility 40 with one group of (at least one) program module 42 can store in such as memory 28 In, such program module 42 includes --- but being not limited to --- operating system, one or more application program, other programs It may include the realization of network environment in module and program data, each of these examples or certain combination.Program mould Block 42 usually executes function and/or method in embodiments described herein.
Computer equipment 12 can also be with one or more external equipments 14 (such as keyboard, sensing equipment, display 24 Deng) communication, can also be enabled a user to one or more equipment interact with the computer equipment 12 communicate, and/or with make The computer equipment 12 any equipment (such as network interface card, the modulatedemodulate that can be communicated with one or more of the other calculating equipment Adjust device etc.) communication.This communication can be carried out by input/output (I/O) interface 22.Also, computer equipment 12 may be used also To pass through network adapter 20 and one or more network (such as local area network (Local Area Network;Hereinafter referred to as: LAN), wide area network (Wide Area Network;Hereinafter referred to as: WAN) and/or public network, for example, internet) communication.Such as figure Shown in 17, network adapter 20 is communicated by bus 18 with other modules of computer equipment 12.Although should be understood that in Figure 17 It is not shown, other hardware and/or software module can be used in conjunction with computer equipment 12, including but not limited to: microcode, equipment Driver, redundant processing unit, external disk drive array, RAID system, tape drive and data backup storage system Deng.
Processing unit 16 by the program that is stored in system storage 28 of operation, thereby executing various function application and Data processing, such as realize the control method for the internet of things equipment that the application FIG. 1 to FIG. 4 illustrated embodiment provides.
The embodiment of the present application also provides a kind of non-transitorycomputer readable storage medium, is stored thereon with computer journey Sequence, the offer of the application FIG. 1 to FIG. 4 illustrated embodiment may be implemented in above-mentioned computer program Internet of Things when being executed by processor are set Standby control method.
Above-mentioned non-transitorycomputer readable storage medium can appointing using one or more computer-readable media Meaning combination.Computer-readable medium can be computer-readable signal media or computer readable storage medium.Computer can Reading storage medium for example may be-but not limited to-the system of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, device Or device, or any above combination.The more specific example (non exhaustive list) of computer readable storage medium includes: Electrical connection, portable computer diskette, hard disk, random access memory (RAM), read-only storage with one or more conducting wires Device (Read Only Memory;Hereinafter referred to as: ROM), erasable programmable read only memory (Erasable Programmable Read Only Memory;Hereinafter referred to as: EPROM) or flash memory, optical fiber, portable compact disc are read-only deposits Reservoir (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.In this document, computer Readable storage medium storing program for executing can be any tangible medium for including or store program, which can be commanded execution system, device Either device use or in connection.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including --- but It is not limited to --- electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be Any computer-readable medium other than computer readable storage medium, which can send, propagate or Transmission is for by the use of instruction execution system, device or device or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimited In --- wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
Can with one or more programming languages or combinations thereof come write for execute the application operation computer Program code, described program design language include object oriented program language-such as Java, Smalltalk, C++, It further include conventional procedural programming language-such as " C " language or similar programming language.Program code can be with It fully executes, partly execute on the user computer on the user computer, being executed as an independent software package, portion Divide and partially executes or executed on a remote computer or server completely on the remote computer on the user computer.? It is related in the situation of remote computer, remote computer can pass through the network of any kind --- including local area network (Local Area Network;Hereinafter referred to as: LAN) or wide area network (Wide Area Network;Hereinafter referred to as: WAN) it is connected to user Computer, or, it may be connected to outer computer (such as being connected using ISP by internet).
The embodiment of the present application also provides a kind of terminal device, and above-mentioned terminal device may include memory, processor and deposit The computer program that can be run on above-mentioned memory and on above-mentioned processor is stored up, above-mentioned processor executes above-mentioned computer journey When sequence, the control method of the internet of things equipment of the application embodiment illustrated in fig. 5 offer may be implemented.
In the present embodiment, above-mentioned terminal device can for smart phone, smartwatch, tablet computer, laptop or The intelligent terminals such as person PC, the present embodiment are not construed as limiting the form of above-mentioned terminal device.Specifically, above-mentioned terminal device can To realize that the present embodiment is not construed as limiting this using with the same or similar structure of Figure 17.
The embodiment of the present application also provides a kind of non-transitorycomputer readable storage medium, is stored thereon with computer journey The internet of things equipment of the application embodiment illustrated in fig. 5 offer may be implemented in sequence, above-mentioned computer program when being executed by processor Control method.
The embodiment of the present application also provides a kind of internet of things equipment, and above-mentioned internet of things equipment may include memory, processor And it is stored in the computer program that can be run on above-mentioned memory and on above-mentioned processor, above-mentioned processor executes above-mentioned calculating When machine program, the control method for the internet of things equipment that the application Fig. 6~embodiment illustrated in fig. 8 provides may be implemented.
In the present embodiment, above-mentioned internet of things equipment can be carried out for shared automobile and/or shared bicycle etc. between object The equipment of communication, the present embodiment are not construed as limiting the form of above-mentioned internet of things equipment.Specifically, above-mentioned internet of things equipment can be adopted Realize that the present embodiment is not construed as limiting this with the same or similar structure of Figure 17.
The embodiment of the present application also provides a kind of non-transitorycomputer readable storage medium, is stored thereon with computer journey Sequence, above-mentioned computer program may be implemented the Internet of Things that the application Fig. 6~embodiment illustrated in fig. 8 provides and set when being executed by processor Standby control method.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is contained at least one embodiment or example of the application.In the present specification, schematic expression of the above terms are not It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples It closes and combines.
In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or Implicitly include at least one this feature.In the description of the present application, the meaning of " plurality " is at least two, such as two, three It is a etc., unless otherwise specifically defined.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes It is one or more for realizing custom logic function or process the step of executable instruction code module, segment or portion Point, and the range of the preferred embodiment of the application includes other realization, wherein can not press shown or discussed suitable Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, to execute function, this should be by the application Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for Instruction execution system, device or equipment (such as computer based system, including the system of processor or other can be held from instruction The instruction fetch of row system, device or equipment and the system executed instruction) it uses, or combine these instruction execution systems, device or set It is standby and use.For the purpose of this specification, " computer-readable medium ", which can be, any may include, stores, communicates, propagates or pass Defeated program is for instruction execution system, device or equipment or the dress used in conjunction with these instruction execution systems, device or equipment It sets.The more specific example (non-exhaustive list) of computer-readable medium include the following: there is the electricity of one or more wirings Interconnecting piece (electronic device), portable computer diskette box (magnetic device), random access memory (Random Access Memory;Hereinafter referred to as: RAM), read-only memory (Read Only Memory;Hereinafter referred to as: ROM), erasable editable Read memory (Erasable Programmable Read Only Memory;Hereinafter referred to as: EPROM) or flash memory, Fiber device and portable optic disk read-only storage (Compact Disc Read Only Memory;Hereinafter referred to as: CD- ROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other suitable media, because Can then to be edited for example by carrying out optical scanner to paper or other media, be interpreted or suitable with other when necessary Mode is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each section of the application can be realized with hardware, software, firmware or their combination.Above-mentioned In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction execution system with storage Or firmware is realized.Such as, if realized with hardware in another embodiment, following skill well known in the art can be used Any one of art or their combination are realized: have for data-signal is realized the logic gates of logic function from Logic circuit is dissipated, the specific integrated circuit with suitable combinational logic gate circuit, programmable gate array (Programmable Gate Array;Hereinafter referred to as: PGA), field programmable gate array (Field Programmable Gate Array;Below Referred to as: FPGA) etc..
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries It suddenly is that relevant hardware can be instructed to complete by program, the program can store in a kind of computer-readable storage medium In matter, which when being executed, includes the steps that one or a combination set of embodiment of the method.
It, can also be in addition, can integrate in a processing module in each functional unit in each embodiment of the application It is that each unit physically exists alone, can also be integrated in two or more units in a module.Above-mentioned integrated mould Block both can take the form of hardware realization, can also be realized in the form of software function module.The integrated module is such as Fruit is realized and when sold or used as an independent product in the form of software function module, also can store in a computer In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..Although having been shown and retouching above Embodiments herein is stated, it is to be understood that above-described embodiment is exemplary, and should not be understood as the limit to the application System, those skilled in the art can be changed above-described embodiment, modify, replace and become within the scope of application Type.

Claims (15)

1. a kind of control method of internet of things equipment characterized by comprising
Authorization requests corresponding to this order with creation that receiving terminal apparatus is sent, the authorization requests are for request pair Specified internet of things equipment is controlled;
According to the order note identification of the code key of the internet of things equipment and this order, calculates and obtain the corresponding token of this order;
The token is sent to the terminal device, so that the terminal device is according to the token, the order of this order It identifies and the object is sent to by the control instruction after generating control instruction to the operational order of the internet of things equipment Networked devices, to control the internet of things equipment.
2. the method according to claim 1, wherein further include:
After this order terminates, the whether also related order of the internet of things equipment is checked;
If it is not, then negotiating to update code key with the internet of things equipment, and save updated code key.
3. the method according to claim 1, wherein it is described by the token be sent to the terminal device it Afterwards, further includes:
The inquiry request that the internet of things equipment is sent is received, the inquiry request is used for the order inquired in the control instruction Whether the corresponding order of mark is legal;
Query result is sent to the internet of things equipment, so that the internet of things equipment indicates the control in the query result When order corresponding to order note identification in instruction is legal, the operational order in the control instruction is executed.
4. method according to claim 1 to 3, which is characterized in that described to receive the terminal for creating this order After the authorization requests that equipment is sent, further includes:
It tests to the legitimacy of the authorization requests;
After determining that the authorization requests are legal, the order of the code key according to the internet of things equipment and this order is executed Mark calculates the step of obtaining this order corresponding token.
5. a kind of control method of internet of things equipment characterized by comprising
It is sent to Cloud Server and is used to request to specified with authorization requests corresponding to this order of creation, the authorization requests Internet of things equipment controlled;
The token that the Cloud Server is sent is received, the token is code key of the Cloud Server according to the internet of things equipment It is calculated with the order note identification of this order;
According to the token, the order note identification of this order and to the operational order of the internet of things equipment, control instruction is generated;
The control instruction is sent to the internet of things equipment so that the internet of things equipment receive the control instruction it Afterwards, the token in the control instruction is authenticated, and after the authentication is passed, the operation executed in the control instruction refers to It enables.
6. a kind of control method of internet of things equipment characterized by comprising
The control instruction that receiving terminal apparatus is sent, the control instruction is the order that the terminal device is sent according to Cloud Server Board, terminal device creation this order order note identification and the operational order of internet of things equipment is generated;
Token in the control instruction is authenticated;
After the authentication is passed, the operational order in the control instruction is executed.
7. according to the method described in claim 6, it is characterized in that, the token in the control instruction carries out authentication packet It includes:
According to the order note identification in the code key of itself and the control instruction, calculates and obtain token;
The token obtained will be calculated to compare with the token in the control instruction;
If it is identical as the token in the control instruction to calculate the token obtained, it is determined that the authentication is passed;
If calculating the token obtained and the token in the control instruction not being identical, it is determined that authentication does not pass through.
8. according to the method described in claim 6, it is characterized in that, the operational order executed in the control instruction it Afterwards, further includes:
It receives the code key that the Cloud Server is sent and negotiates request, it is described in the Cloud Server determines that the code key, which negotiates request, Internet of things equipment does not have associated order to send later;
Negotiate to update code key with the Cloud Server, and saves updated code key.
9. according to method described in claim 6-8 any one, which is characterized in that the control that the receiving terminal apparatus is sent After instruction, further includes:
Inquiry request is sent to the Cloud Server, the inquiry request is used for the order note identification institute inquired in the control instruction Whether corresponding order is legal;
Receive the query result that the Cloud Server is sent;
When order corresponding to the query result indicates the order note identification in the control instruction is legal, the control is executed Operational order in instruction.
10. a kind of control device of internet of things equipment characterized by comprising
Receiving module, for receiving terminal apparatus send this order with creation corresponding to authorization requests, the authorization Request is for requesting to control specified internet of things equipment;
Computing module, for according to the code key of the internet of things equipment and the order note identification of this order, calculating acquisition, this to be ordered Single corresponding token;
Sending module, for the token to be sent to the terminal device, so that the terminal device is according to the token, sheet The order note identification of secondary order and operational order to the internet of things equipment, after generating control instruction, by the control instruction It is sent to the internet of things equipment, to control the internet of things equipment.
11. device according to claim 10, which is characterized in that further include:
Module is checked, for after this order terminates, checking the whether also related order of the internet of things equipment;
Update module, for when the inspection module determines the internet of things equipment without associated order, with the object Networked devices are negotiated to update code key, and save updated code key.
12. a kind of control device of internet of things equipment characterized by comprising
Sending module, for being sent and authorization requests corresponding to this order of creation, the authorization requests to Cloud Server For requesting to control specified internet of things equipment;
Receiving module, the token sent for receiving the Cloud Server, the token is the Cloud Server according to the object What the order note identification of the code key of networked devices and this order calculated;
Generation module, for the order note identification according to the token, this order and the operational order to the internet of things equipment, Generate control instruction;
The sending module is also used to the control instruction being sent to the internet of things equipment, so that the internet of things equipment After receiving the control instruction, the token in the control instruction is authenticated, and after the authentication is passed, described in execution Operational order in control instruction.
13. a kind of control device of internet of things equipment characterized by comprising
Receiving module, for the control instruction that receiving terminal apparatus is sent, the control instruction is the terminal device according to cloud The token of server transmission, the order note identification of this order of terminal device creation and the operational order to internet of things equipment It generates;
Authentication module, for being authenticated to the token in the control instruction;
Execution module, for executing the operational order in the control instruction after the authentication is passed.
14. device according to claim 13, which is characterized in that the authentication module includes:
Token computation submodule calculates for the order note identification in the code key and the control instruction according to itself and obtains token;
Compare submodule, for by the token computation submodule calculate obtain token and the control instruction in token into Row comparison;
Submodule is determined, for determining that the authentication is passed when the token for calculating acquisition is identical as the token in the control instruction; When the token in the token and the control instruction for calculating acquisition is not identical, determine that authentication does not pass through.
15. device according to claim 13, which is characterized in that further include: update module;
The receiving module is also used to after the operational order that the execution module executes in the control instruction, receives institute The code key for stating Cloud Server transmission negotiates request, and it is that the Cloud Server determines the internet of things equipment that the code key, which negotiates request, There is no associated order to send later;
The update module updates code key for negotiating with the Cloud Server, and saves updated code key.
CN201811062122.8A 2018-09-12 2018-09-12 Control method and device of Internet of things equipment, server and terminal equipment Active CN109379403B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811062122.8A CN109379403B (en) 2018-09-12 2018-09-12 Control method and device of Internet of things equipment, server and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811062122.8A CN109379403B (en) 2018-09-12 2018-09-12 Control method and device of Internet of things equipment, server and terminal equipment

Publications (2)

Publication Number Publication Date
CN109379403A true CN109379403A (en) 2019-02-22
CN109379403B CN109379403B (en) 2021-04-06

Family

ID=65405208

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811062122.8A Active CN109379403B (en) 2018-09-12 2018-09-12 Control method and device of Internet of things equipment, server and terminal equipment

Country Status (1)

Country Link
CN (1) CN109379403B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110290191A (en) * 2019-06-18 2019-09-27 北京三快在线科技有限公司 Resource transfers result processing method, device, server, terminal and storage medium
CN110445833A (en) * 2019-07-02 2019-11-12 北京梧桐车联科技有限责任公司 A kind of information processing method, the vehicles and storage medium
CN110879552A (en) * 2019-11-29 2020-03-13 联想(北京)有限公司 Control method and control system
CN112073197A (en) * 2020-08-10 2020-12-11 珠海格力电器股份有限公司 Control method and device
CN113395345A (en) * 2021-05-31 2021-09-14 深圳Tcl新技术有限公司 Network distribution method and device of Internet of things equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011024554A1 (en) * 2009-08-25 2011-03-03 日本電気株式会社 Assembler device, parsing method, and assembler program
CN105321240A (en) * 2015-11-04 2016-02-10 张泽 Control method and device of intelligent door lock and intelligent door control system
CN107798757A (en) * 2017-10-26 2018-03-13 厦门分享云科技有限公司 A kind of method for unlocking of intelligent door lock

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011024554A1 (en) * 2009-08-25 2011-03-03 日本電気株式会社 Assembler device, parsing method, and assembler program
CN105321240A (en) * 2015-11-04 2016-02-10 张泽 Control method and device of intelligent door lock and intelligent door control system
CN107798757A (en) * 2017-10-26 2018-03-13 厦门分享云科技有限公司 A kind of method for unlocking of intelligent door lock

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110290191A (en) * 2019-06-18 2019-09-27 北京三快在线科技有限公司 Resource transfers result processing method, device, server, terminal and storage medium
CN110290191B (en) * 2019-06-18 2020-04-24 北京三快在线科技有限公司 Resource transfer result processing method, device, server, terminal and storage medium
CN110445833A (en) * 2019-07-02 2019-11-12 北京梧桐车联科技有限责任公司 A kind of information processing method, the vehicles and storage medium
CN110445833B (en) * 2019-07-02 2022-09-02 北京梧桐车联科技有限责任公司 Information processing method, vehicle and storage medium
CN110879552A (en) * 2019-11-29 2020-03-13 联想(北京)有限公司 Control method and control system
CN110879552B (en) * 2019-11-29 2021-08-17 联想(北京)有限公司 Control method and control system
CN112073197A (en) * 2020-08-10 2020-12-11 珠海格力电器股份有限公司 Control method and device
CN113395345A (en) * 2021-05-31 2021-09-14 深圳Tcl新技术有限公司 Network distribution method and device of Internet of things equipment and storage medium
CN113395345B (en) * 2021-05-31 2023-05-12 深圳Tcl新技术有限公司 Network distribution method and device of Internet of things equipment and storage medium

Also Published As

Publication number Publication date
CN109379403B (en) 2021-04-06

Similar Documents

Publication Publication Date Title
CN109379403A (en) Control method, device, server and the terminal device of internet of things equipment
CN108881232B (en) Sign-on access method, apparatus, storage medium and the processor of operation system
CN101159557B (en) Single point logging method, device and system
US8763105B1 (en) Keyfob for use with multiple authentication entities
CN102739658B (en) A kind of offline verification method of single-sign-on
US20120072970A1 (en) Chaining information card selectors
CN103139181B (en) A kind of authorization method of open authentication, device and system
CN113743921B (en) Digital asset processing method, device, equipment and storage medium
US9686257B2 (en) Authorization server system, control method thereof, and storage medium
CN109040063A (en) Determination method, apparatus, equipment and the storage medium of vehicle ECU key
CN109408250A (en) Call application programming interface API approach, device, electronic equipment
EP2166727A1 (en) Center apparatus, terminal apparatus, and authentication system
CN110008690A (en) Right management method, device, equipment and the medium of terminal applies
CN109727044A (en) Brand transaction methods, device, equipment and medium based on block chain
CN108650220A (en) Provide, obtain method, the equipment of mobile terminal certificate and automobile end chip certificate
WO2021117406A1 (en) Use right information processing device, use right information processing system, and use right information processing method, based on smart contract
CN109962892A (en) A kind of authentication method and client, server logging in application
CN109359449A (en) A kind of method for authenticating based on micro services, device, server and storage medium
CN109543365A (en) A kind of authorization method and device
WO2024140697A1 (en) Authentication and authorization system, method and apparatus for internet of things system, and storage medium
US20180034806A1 (en) Method for providing an authenticated connection between at least two communication partners
CN109685507A (en) The identification of transactions requests validity and initiating method, device, equipment and medium
CN109257381A (en) A kind of key management method, system and electronic equipment
US20180351946A1 (en) Privacy-enhanced biometric authenticated access request
CN108241980A (en) Authorization and authentication method, system and the ebanking server of cross-terminal, Mobile Server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant