CN112055090B - Module burning authorization tracking system, module burning method and device - Google Patents

Module burning authorization tracking system, module burning method and device Download PDF

Info

Publication number
CN112055090B
CN112055090B CN202010955402.2A CN202010955402A CN112055090B CN 112055090 B CN112055090 B CN 112055090B CN 202010955402 A CN202010955402 A CN 202010955402A CN 112055090 B CN112055090 B CN 112055090B
Authority
CN
China
Prior art keywords
information
module
burning
cloud server
edge
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010955402.2A
Other languages
Chinese (zh)
Other versions
CN112055090A (en
Inventor
丁智伟
曾令江
赖剑明
周明德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Mxchip Information Technology Co Ltd
Original Assignee
Shanghai Mxchip Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Mxchip Information Technology Co Ltd filed Critical Shanghai Mxchip Information Technology Co Ltd
Priority to CN202010955402.2A priority Critical patent/CN112055090B/en
Publication of CN112055090A publication Critical patent/CN112055090A/en
Application granted granted Critical
Publication of CN112055090B publication Critical patent/CN112055090B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • G06F8/63Image based installation; Cloning; Build to order
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Power Engineering (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a module burning authorization tracking system, a module burning method and a module burning device. The system comprises: cloud server, edge end equipment and control end equipment; the cloud server is used for centrally managing production burning information of the module and issuing the production burning information to the edge terminal equipment, wherein the production burning information comprises: the identity identification code of the module and the firmware information of the module are matched, and the identity identification code is matched with the identification information of the public cloud platform and the firmware information is matched with the identification information of the intelligent equipment; the edge terminal equipment is used for receiving the production burning information from the cloud server, temporarily managing the production burning information and transmitting the production burning information to the control terminal equipment; the control terminal equipment is used for receiving the production burning information from the edge terminal equipment and burning the production burning information to the module. The invention solves the technical problem that the BAT in the related art only generally supports firmware upgrading and identity code burning in the local area network in the actual use process.

Description

Module burning authorization tracking system, module burning method and device
Technical Field
The present invention relates to the field of computers, and in particular, to a module burning authorization tracking system, a module burning method and a device.
Background
At present, research and development and design work of the internet of things module are usually completed by internet of things chip research and development enterprises, and production and processing are completed by internet of things module processors. When an internet of things chip research and development enterprise submits an order to an internet of things module processing merchant, the internet of things chip research and development enterprise needs to send an identification code or Identification (ID) of the internet of things module to the internet of things module processing merchant in a communication mode such as mail.
The burning authorization tracking system (Burning Authorization Tracking System, which is abbreviated as BAT) provided by the Internet of things module in the related art not only can complete the functions of firmware burning, key identity authorization and the like, but also can support the Internet of things equipment to realize traceability and efficient management. However, BAT typically only supports firmware upgrades and identity burning within local area networks during actual use.
In view of the above problems, no effective solution has been proposed at present.
Disclosure of Invention
At least some embodiments of the present invention provide a module burning authorization tracking system, a module burning method and a device, so as to at least solve the technical problem that in the related art, BAT only supports firmware upgrade and identity code burning in a local area network in the actual use process.
According to one embodiment of the present invention, there is provided a module burn authorization tracking system, including: cloud server, edge end equipment and control end equipment; the cloud server is used for centrally managing production burning information of the module and issuing the production burning information to the edge terminal equipment, wherein the production burning information comprises: the identity identification code of the module and the firmware information of the module are matched, and the identity identification code is matched with the identification information of the public cloud platform and the firmware information is matched with the identification information of the intelligent equipment; the edge terminal equipment performs wide area network communication interaction with the cloud server, and is used for receiving production burning information from the cloud server, temporarily managing the production burning information and transmitting the production burning information to the control terminal equipment; the control terminal equipment is in local area network communication interaction with the edge terminal equipment and is used for receiving production burning information from the edge terminal equipment and burning the production burning information to the module.
Optionally, the initial format of the identification code is a character string format, the target format obtained after editing processing is a binary format, and the format of the firmware file corresponding to the firmware information is the binary format.
Optionally, the cloud server is further configured to obtain serial number rules of different public cloud platforms, where the serial number rules are used to write an identification code; and carrying out standardized compatibility processing on the serial number rule to obtain the identity identification code.
According to an embodiment of the present invention, there is also provided a module burning method, which is applied to a module burning authorization tracking system, the system including: cloud server, edge end equipment and control end equipment, the method includes:
the cloud server receives a request message from an edge device, wherein the request message is used for obtaining production burning information, and the production burning information comprises: the identity code of the module and the firmware information of the module are matched, the identity code is matched with the identification information of the public cloud platform, the firmware information is matched with the identification information of the intelligent equipment, and the head information carried in the request message comprises: checking information; the cloud server performs validity check on the request message based on the check information; when the request message passes the validity check, the cloud server transmits the production burning information to the control end device through the edge end device so as to instruct the control end device to burn the production burning information to the module.
Optionally, the verification information includes a plurality of fields, the plurality of fields including: a request identification field, an edge device plaintext field, a timestamp field, and a first encrypted signature field.
Optionally, the first encrypted signature field is obtained by encrypting the ordering signature of the plaintext field of the edge device, the ciphertext field of the first edge device, the timestamp field and the request identification field by the edge device in a preset encryption mode.
Optionally, the cloud server performs validity check on the request message based on the check information, including: the cloud server analyzes the verification information to obtain a request identification field, an edge device plaintext field, a timestamp field and a first encryption signature field; the cloud server acquires a locally stored second edge equipment ciphertext field corresponding to the edge equipment plaintext field; the cloud server encrypts the ordering signature of the plaintext field of the edge device, the ciphertext field of the second edge device, the timestamp field and the request identification field in a preset encryption mode to obtain a second encryption signature field; the cloud server performs validity check based on a comparison result of the first encrypted signature field and the second encrypted signature field.
Optionally, when the request message passes the validity check, the cloud server issues the production burning information to the control end device via the edge end device, including: the cloud server determines that the edge terminal equipment is legal equipment when the cloud server finds that the first encrypted signature field is identical to the second encrypted signature field based on a comparison result of the first encrypted signature field and the second encrypted signature field; the cloud server acquires attribution information of the edge terminal equipment; and the cloud server sends production burning information to the edge terminal equipment based on the attribution information and sends the production burning information to the control terminal equipment through the edge terminal equipment.
According to an embodiment of the present invention, there is also provided a module burning device, which is applied to a module burning authorization tracking system, the system including: cloud server, edge end equipment and control end equipment, the device includes:
the receiving module is configured to receive a request message from an edge device, where the request message is used to obtain production recording information, and the production recording information includes: the identity code of the module and the firmware information of the module are matched, the identity code is matched with the identification information of the public cloud platform, the firmware information is matched with the identification information of the intelligent equipment, and the head information carried in the request message comprises: checking information; the verification module is used for verifying the validity of the request message based on the verification information; and the processing module is used for transmitting the production burning information to the control end equipment through the edge end equipment when the request message passes the validity check so as to instruct the control end equipment to burn the production burning information to the module.
Optionally, the verification information includes a plurality of fields, the plurality of fields including: a request identification field, an edge device plaintext field, a timestamp field, and a first encrypted signature field.
Optionally, the first encrypted signature field is obtained by encrypting the ordering signature of the plaintext field of the edge device, the ciphertext field of the first edge device, the timestamp field and the request identification field by the edge device in a preset encryption mode.
Optionally, the verification module is configured to parse the verification information by using the cloud server to obtain a request identifier field, a plaintext field of the edge device, a timestamp field, and a first encrypted signature field; the cloud server acquires a locally stored second edge equipment ciphertext field corresponding to the edge equipment plaintext field; the cloud server encrypts the ordering signature of the plaintext field of the edge device, the ciphertext field of the second edge device, the timestamp field and the request identification field in a preset encryption mode to obtain a second encryption signature field; the cloud server performs validity check based on a comparison result of the first encrypted signature field and the second encrypted signature field.
Optionally, the processing module is configured to determine that the edge device is a legal device when the first encrypted signature field is found to be the same as the second encrypted signature field based on a comparison result of the first encrypted signature field and the second encrypted signature field; acquiring attribution information of edge terminal equipment; and sending production burning information to the edge terminal equipment based on the attribution information, and sending the production burning information to the control terminal equipment through the edge terminal equipment.
According to an embodiment of the present invention, there is also provided a nonvolatile storage medium in which a computer program is stored, wherein the computer program is configured to execute the module burning method in any one of the above-mentioned aspects when running.
According to an embodiment of the present invention, there is further provided a processor for running a program, wherein the program is configured to execute the module burning method of any one of the above-mentioned aspects when running.
According to an embodiment of the present invention, there is also provided an electronic device including a memory and a processor, the memory storing a computer program, the processor being configured to run the computer program to perform the module burning method of any of the above.
In at least some embodiments of the present invention, a cloud server is adopted to centrally manage production and recording information of a module and send the production and recording information to an edge device, where the production and recording information includes an identification code of the module and firmware information of the module, the identification code is matched with identification information of a public cloud platform, the firmware information is matched with identification information of an intelligent device, the edge device receives the production and recording information from the cloud server, temporarily manages the production and recording information and sends the production and recording information to a control device, and the control device receives the production and recording information from the edge device and records the production and recording information to the module, thereby achieving the purpose of uniformly managing and controlling firmware upgrade and identity code recording between devices in a cloud end, and further achieving the technical effects of definite division of work between devices, improving production efficiency, reducing operation complexity of firmware upgrade and identity code recording, and further solving the technical problem that BAT generally only supports firmware upgrade and identity code recording in a local area network in the actual use process.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. In the drawings:
FIG. 1 is a schematic diagram of a module burn authorization tracking system according to an embodiment of the application;
FIG. 2 is a flow chart of a module burning method according to an embodiment of the application;
FIG. 3 is a flowchart of another module burning method according to an embodiment of the application;
FIG. 4 is a flowchart of a module burning method according to another embodiment of the application;
FIG. 5 is a flowchart of a module burning method according to another embodiment of the application;
FIG. 6 is a flowchart of a method for creating a burn-in task according to one embodiment of the present application;
FIG. 7 is a flowchart of a method for adjusting module burn information according to an embodiment of the application;
FIG. 8 is a block diagram illustrating a module burning apparatus according to an embodiment of the present application;
FIG. 9 is a block diagram of a module burning apparatus according to an alternative embodiment of the present application;
FIG. 10 is a block diagram illustrating another module burning apparatus according to an embodiment of the present invention;
FIG. 11 is a block diagram illustrating an alternative embodiment of a module burning apparatus according to the present invention;
FIG. 12 is a block diagram of a module burning apparatus according to another embodiment of the present invention;
FIG. 13 is a block diagram of a module burning apparatus according to an alternative embodiment of the present invention;
FIG. 14 is a block diagram illustrating a module burning apparatus according to another embodiment of the present invention;
FIG. 15 is a block diagram showing a construction of a burning task creation device according to one embodiment of the present invention;
FIG. 16 is a block diagram of a burn task creation device according to an alternative embodiment of the present invention;
FIG. 17 is a block diagram illustrating a module burn information adjustment apparatus according to an embodiment of the present invention;
fig. 18 is a block diagram illustrating a module burning information adjusting apparatus according to an alternative embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Internet of things chip research and development enterprises generally wish to apply the internet of things chip to more intelligent devices and sales platforms. On the one hand, the internet of things chip research and development enterprises can assist air purifiers, beauty appliances or other household appliance manufacturers to customize internet of things modules, and each intelligent device has unique product ID. On the other hand, because different sales platforms (such as sales platform A, sales platform B, sales platform C and the like) set serial number rules meeting the requirements of corresponding platforms for the Internet of things chips and the Internet of things modules, an Internet of things chip research and development enterprise needs to customize different Internet of things module IDs for different sales platforms respectively so as to meet the serial number rules. Therefore, the internet of things chip research and development enterprise directly uploads the internet of things module ID which accords with the serial number rule formulated by the specific sales platform to the internet of things module processing management platform in the enterprise, and sends the internet of things module ID to each production line of the internet of things module processing business through the cloud server, so that the large-scale and standardized production of the internet of things module is facilitated.
According to one embodiment of the present invention, an embodiment of a module burn authorization tracking system is provided. Fig. 1 is a schematic structural diagram of a module burning authorization tracking system according to an embodiment of the invention, as shown in fig. 1, the module burning authorization tracking system includes: cloud server 1, edge terminal equipment 2 and control terminal equipment 3; the cloud server 1 is configured to centrally manage production burning information of the module, and send the production burning information to the edge device, where the production burning information includes: the identity identification code of the module and the firmware information of the module are matched, and the identity identification code is matched with the identification information of the public cloud platform and the firmware information is matched with the identification information of the intelligent equipment; the edge terminal equipment 2 performs wide area network communication interaction with the cloud server, and is used for receiving production burning information from the cloud server, temporarily managing the production burning information and transmitting the production burning information to the control terminal equipment; the control end device 3 performs local area network communication interaction with the edge end device, and is used for receiving production burning information from the edge end device and burning the production burning information to the module.
The cloud server 1 may include one or more processors (the processors may include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processor (GPU), a Digital Signal Processing (DSP) chip, a Microprocessor (MCU), a programmable logic device (FPGA), a neural Network Processor (NPU), a Tensor Processor (TPU), an Artificial Intelligence (AI) type processor, etc.) and a memory for storing data. Optionally, the cloud server may further include a transmission device, an input/output device, and a display device for a communication function. It will be appreciated by those of ordinary skill in the art that the foregoing structural descriptions are merely illustrative, and are not intended to limit the structure of the cloud server. For example, the cloud server may also include more or fewer components than the above-described structural descriptions, or have a different configuration than the above-described structural descriptions.
The memory may be used to store a computer program, for example, a software program and a module of an application software, for example, a computer program corresponding to the module programming method, the programming task creation method, and the module programming information adjustment method in the embodiment of the present invention, and the processor executes various functional applications and data processing by running the computer program stored in the memory, thereby implementing the module programming method, the programming task creation method, and the module programming information adjustment method described above. The memory may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid state memory. In some examples, the memory may further include memory remotely located with respect to the processor, the remote memory being connectable to the cloud server through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device is used for receiving or transmitting data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of a cloud server. In one example, the transmission device includes a network adapter (Network Interface Controller, simply referred to as NIC) that can connect to other network devices through the base station to communicate with the internet. In one example, the transmission device may be a Radio Frequency (RF) module, which is used to communicate with the internet wirelessly.
Display devices may be, for example, touch screen type Liquid Crystal Displays (LCDs) and touch displays (also referred to as "touch screens" or "touch display screens"). The liquid crystal display may enable a user to interact with a user interface of the cloud server. In some embodiments, the cloud server has a Graphical User Interface (GUI) with which a user may interact with the GUI by touching finger contacts and/or gestures on the touch-sensitive surface, where the human-machine interaction functionality optionally includes the following interactions: executable instructions for performing the above-described human-machine interaction functions, such as creating web pages, drawing, word processing, making electronic documents, games, video conferencing, instant messaging, sending and receiving electronic mail, talking interfaces, playing digital video, playing digital music, and/or web browsing, are configured/stored in a computer program product or readable storage medium executable by one or more processors.
The edge device 2 may include one or more processors (which may include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processor (GPU), a Digital Signal Processing (DSP) chip, a Microprocessor (MCU), a programmable logic device (FPGA), a neural Network Processor (NPU), a Tensor Processor (TPU), an Artificial Intelligence (AI) type processor, etc.) and a memory for storing data. Optionally, the edge device may further include a transmission device, an input/output device, and a display device for a communication function. It will be appreciated by those of ordinary skill in the art that the above description of the structure is illustrative only and is not intended to limit the structure of the edge termination device. For example, the edge device may also include more or fewer components than the above description of the structure, or have a different configuration than the above description of the structure.
The memory may be used to store a computer program, for example, a software program of application software and a module, for example, a computer program corresponding to the module burning method in the embodiment of the present invention, and the processor executes the computer program stored in the memory, thereby executing various functional applications and data processing, that is, implementing the module burning method. The memory may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid state memory. In some examples, the memory may further include memory remotely located with respect to the processor, the remote memory being connectable to the edge device through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device is used for receiving or transmitting data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the edge device. In one example, the transmission device includes a network adapter (Network Interface Controller, simply referred to as NIC) that can connect to other network devices through the base station to communicate with the internet. In one example, the transmission device may be a Radio Frequency (RF) module, which is used to communicate with the internet wirelessly.
Display devices may be, for example, touch screen type Liquid Crystal Displays (LCDs) and touch displays (also referred to as "touch screens" or "touch display screens"). The liquid crystal display may enable a user to interact with a user interface of the edge device. In some embodiments, the edge device has a Graphical User Interface (GUI) with which a user may interact with the GUI by touching finger contacts and/or gestures on the touch-sensitive surface, where the human-machine interaction functionality optionally includes the following interactions: executable instructions for performing the above-described human-machine interaction functions, such as creating web pages, drawing, word processing, making electronic documents, games, video conferencing, instant messaging, sending and receiving electronic mail, talking interfaces, playing digital video, playing digital music, and/or web browsing, are configured/stored in a computer program product or readable storage medium executable by one or more processors.
The control-end device 3 may include one or more processors (which may include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processor (GPU), a Digital Signal Processing (DSP) chip, a Microprocessor (MCU), a programmable logic device (FPGA), a neural Network Processor (NPU), a Tensor Processor (TPU), an Artificial Intelligence (AI) type processor, etc.) and a memory for storing data. Optionally, the control-end device may further include a transmission device, an input-output device, and a display device for a communication function. It will be appreciated by those skilled in the art that the above description of the structure is illustrative only and is not intended to limit the structure of the control end device. For example, the control-end device may also include more or fewer components than the above-described structural descriptions, or have a different configuration than the above-described structural descriptions.
The memory may be used to store a computer program, for example, a software program of application software and a module, for example, a computer program corresponding to the module burning method in the embodiment of the present invention, and the processor executes the computer program stored in the memory, thereby executing various functional applications and data processing, that is, implementing the module burning method. The memory may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid state memory. In some examples, the memory may further include memory remotely located with respect to the processor, the remote memory being connectable to the control-end device through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device is used for receiving or transmitting data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the control end device. In one example, the transmission device includes a network adapter (Network Interface Controller, simply referred to as NIC) that can connect to other network devices through the base station to communicate with the internet. In one example, the transmission device may be a Radio Frequency (RF) module, which is used to communicate with the internet wirelessly.
Display devices may be, for example, touch screen type Liquid Crystal Displays (LCDs) and touch displays (also referred to as "touch screens" or "touch display screens"). The liquid crystal display may enable a user to interact with a user interface of the control side device. In some embodiments, the control-end device has a Graphical User Interface (GUI) with which a user may interact with the GUI by touching finger contacts and/or gestures on the touch-sensitive surface, where the human-machine interaction functionality optionally includes the following interactions: executable instructions for performing the above-described human-machine interaction functions, such as creating web pages, drawing, word processing, making electronic documents, games, video conferencing, instant messaging, sending and receiving electronic mail, talking interfaces, playing digital video, playing digital music, and/or web browsing, are configured/stored in a computer program product or readable storage medium executable by one or more processors.
Optionally, the initial format of the identification code is a character string format, the target format obtained after editing processing is a binary format, and the format of the firmware file corresponding to the firmware information is the binary format.
The production burning information generally includes an identification code of the module and firmware information of the module. The identity identification code of the module and the firmware information of the module need to be matched with each other so as to avoid production accidents such as incorrect firing, missed firing and the like. The identification code is an identification mark of a cloud platform (for example, sales platform A, sales platform B, sales platform C and other sales platforms) which is accessed into the main stream of the market, the initial format is a character string format, and the target format obtained after editing processing is a binary format (namely a BIN format). The firmware file corresponding to the firmware information is in a binary format (i.e., BIN format). The household equipment such as televisions, refrigerators, washing machines, air conditioners, lighting lamps and the like can be changed from non-intelligent equipment to intelligent equipment by the production of the burning information.
Optionally, the cloud server is further configured to obtain serial number rules of different public cloud platforms, where the serial number rules are used to write an identification code; and carrying out standardized compatibility processing on the serial number rule to obtain the identity identification code.
Because different public cloud platforms generally adopt different serial number rules, the cloud server needs to acquire the serial number rules of the different public cloud platforms first, and then performs standardized compatibility processing on the serial number rules to obtain the identity identification code.
In accordance with one embodiment of the present invention, there is provided an embodiment of a module burning method, it being noted that the steps shown in the flowchart of the figures may be performed in a computer system, such as a set of computer executable instructions, and that, although a logical order is shown in the flowchart, in some cases, the steps shown or described may be performed in an order other than that shown or described herein.
In this embodiment, a module burning method operating on the cloud server is provided, and fig. 2 is a flowchart of a module burning method according to an embodiment of the present invention, as shown in fig. 2, the method includes the following steps:
Step S20, the cloud server acquires production burning information, wherein the production burning information comprises: the identity identification code of the module and the firmware information of the module are matched, and the identity identification code is matched with the identification information of the public cloud platform and the firmware information is matched with the identification information of the intelligent equipment;
in step S21, the cloud server issues the production and writing information to the control end device through the edge end device, so as to instruct the control end device to write the production and writing information to the module.
Through the steps, the cloud server can be used for centrally managing the production burning information of the module and transmitting the production burning information to the edge equipment, the production burning information comprises the identification code of the module and the firmware information of the module, the identification code is matched with the identification information of the public cloud platform, the firmware information is matched with the identification information of the intelligent equipment, the production burning information from the cloud server is received through the edge equipment, the production burning information is temporarily managed and transmitted to the control end equipment, the control end equipment receives the production burning information from the edge equipment and burns the production burning information to the module, and the purpose of uniformly managing and controlling firmware upgrading and identity code burning in the cloud is achieved, so that the technical effects of definite work division between all levels of equipment, production efficiency improvement, firmware upgrading and identity code burning operation complexity reduction are achieved, and further the technical problem that BAT generally only supports firmware upgrading and identity code burning in a local area network in the actual use process is solved.
The production burning information generally includes an identification code of the module and firmware information of the module. The identity identification code of the module and the firmware information of the module need to be matched with each other so as to avoid production accidents such as incorrect firing, missed firing and the like. The identity identification code is an identity identification of a cloud platform (such as a sales platform A, a sales platform B, a sales platform C and the like) which is accessed into the mainstream of the market, and the identity identification code needs to be matched with the identification information of the public cloud platform. For example: if the access to the ali cloud platform is desired, the identification code needs to be written according to the serial number rule of the ali cloud platform, but the identification code cannot be written according to the serial number rule of other types of cloud platforms. The firmware file corresponding to the firmware information is in a binary format (i.e., BIN format), which needs to be adapted to the identification information (e.g., type, model) of the intelligent device. For example: if it is desired to burn a firmware file to an air conditioner, it is necessary to ensure that the firmware file is compatible with the air conditioner and not with other types of equipment. For another example: for example: if it is desired to burn the firmware file to an air conditioner of type a, it is necessary to ensure that the firmware file is compatible with the air conditioner of type a, but not with other air conditioners of type a. The household equipment such as televisions, refrigerators, washing machines, air conditioners, lighting lamps and the like can be changed from non-intelligent equipment to intelligent equipment by the production of the burning information.
Optionally, in step S20, the cloud server acquiring the identification code in the production burning information may include the following steps:
step S201, a cloud server acquires original data of an identity identification code and a serial number rule of a public cloud platform;
step S202, the cloud server performs standardized compatibility processing on the serial number rule to obtain a standardized rule;
in step S203, the cloud server generates an identification code by adopting the original data and the standardized rule.
The cloud server not only needs to acquire the original data (such as the original character string input by the user) of the identity identification code, but also needs to acquire the serial number rule of each public cloud platform. And then, the cloud server performs standardized compatibility processing on the serial number rule to obtain a standardized rule. The cloud server converts different writing formats adopted by different cloud platforms for the identity identification codes into a unified standard format to obtain standardized rules. And finally, the cloud server generates an identity identification code by adopting the original data and the standardized rule. Therefore, after the user provides the original data of the identification code and the firmware file and designates the type of the public cloud platform, the identification code corresponding to the type of the public cloud platform can be generated, and meanwhile, the identification code and the firmware file are matched.
Optionally, the method may further include the following steps:
in step S22, the cloud server creates a burning task based on the production burning information, where the burning task includes: type information, quantity information and address information, wherein the type information is the type of a public cloud platform, the quantity information is the quantity of modules to be burned, and the address information is the firmware download address of the modules;
step S23, the cloud server receives a first request message from the edge device, wherein the first request message is used for requesting the cloud server to download a burn task;
in step S24, the cloud server responds to the first request message and sends the burning task to the edge device.
The cloud server may create a burn job based on the production burn information to form a list of burn jobs. Each burn-in task may include: type information, number information, and address information. The type information is the type of public cloud platform (such as sales platform A, sales platform B, sales platform C, etc.), the quantity information is the quantity of modules to be burned (such as the total number of modules needed to be burned for a single order), and the address information is the firmware download address of the modules (namely, the edge device downloads corresponding firmware files through the firmware download address). The cloud server may receive a first request message from the edge device, through which the edge device requests the cloud server to download the burn-in task. And the cloud server responds to the first request message and sends the burning task to the edge terminal equipment. Specifically, the cloud server may download a recording task list to the edge device, where the recording task list may include at least one recording task. And then, the edge terminal equipment sequentially executes each burning task according to the burning task list.
Optionally, in step S21, the cloud server issuing the production burn information to the control end device via the edge end device may include the following execution steps:
step S211, the cloud server receives a second request message from the edge device, wherein the second request message is used for requesting an identity code adapted to the type information from the cloud server;
in step S212, the cloud server responds to the second request message and issues a record number file to the control end device via the edge end device, where the record number file includes: an identity code adapted to the type information;
step S213, the cloud server receives a third request message from the edge device, wherein the third request message is used for requesting the cloud server for a firmware file corresponding to the firmware download address;
in step S214, the cloud server issues the firmware file to the control end device via the edge end device in response to the third request message.
After the cloud server can download the burn task list to the edge device, the cloud server can receive a second request message from the edge device, and the edge device requests the cloud server for the identification code matched with the type information through the second request message. And the cloud server responds to the second request message and transmits a burning number file to the control end device through the edge end device, wherein the burning number file comprises an identification code matched with the type information. In addition, the cloud server may further receive a third request message from the edge device, where the edge device requests the cloud server for the firmware file corresponding to the firmware download address through the third request message. And the cloud server responds to the third request message and transmits the firmware file to the control end device through the edge end device. That is, the edge device may first obtain the id from the cloud server, and then obtain the firmware file adapted to the id from the cloud server.
Optionally, the method may further include the following steps:
in step S25, the cloud server updates the current status of the recording task from the unassigned status to the assigned status, where the assigned status is used to control the recording task to be repeatedly assigned.
For the burning tasks which are issued by the cloud server in the burning task list, in order to avoid repeated allocation of the same burning tasks, after the cloud server issues the burning task list to the edge device, the current state of the burning tasks in the burning task list is updated from the unassigned state to the assigned state, so that the burning tasks in the assigned state are not repeatedly allocated.
Optionally, the method may further include the following steps:
step S26, the cloud server receives a notification message from the edge terminal equipment, wherein the notification message is used for notifying the cloud server of the burning result of the module;
in step S27, the cloud server updates the current state of the recording task from the allocated state to the recorded state based on the notification message, wherein the recorded state is used for controlling the recording task to be repeatedly recorded.
After the edge device obtains the recording task list from the cloud server, the recording task in the recording task list will be initialized to an inactive state. The edge device may set an inactive state to an active state in the burning tasks in the burning task list. And secondly, the control terminal equipment acquires the burning task in an activated state from the edge terminal equipment, and obtains a burning result of the module after the burning task is executed. The control end device sends the burning result to the edge end device. And then, the cloud server receives the notification message from the edge terminal equipment, and the edge terminal equipment notifies the cloud server of the burning result of the module through the notification message. Finally, the cloud server updates the current state of the recording task from the allocated state to the recorded state based on the notification message, so that the recording task in the recorded state will not be repeatedly recorded.
It should be noted that, the control end device may perform the recording task in a networked environment or may perform the recording task in a non-networked environment.
In accordance with one embodiment of the present invention, there is provided an embodiment of a module burning method, it being noted that the steps shown in the flowchart of the figures may be performed in a computer system, such as a set of computer executable instructions, and that, although a logical order is shown in the flowchart, in some cases, the steps shown or described may be performed in an order other than that shown or described herein.
In this embodiment, a module burning method operating on the edge device is provided, and fig. 3 is a flowchart of another module burning method according to an embodiment of the present invention, as shown in fig. 3, and the method includes the following steps:
step S300, the edge device obtains production burning information from the cloud server, wherein the production burning information comprises: the identity identification code of the module and the firmware information of the module are matched, and the identity identification code is matched with the identification information of the public cloud platform and the firmware information is matched with the identification information of the intelligent equipment;
in step S301, the edge device issues production recording information to the control device to instruct the control device to record the production recording information to the module.
Through the steps, the cloud server can be used for centrally managing the production burning information of the module and transmitting the production burning information to the edge equipment, the production burning information comprises the identification code of the module and the firmware information of the module, the identification code is matched with the identification information of the public cloud platform, the firmware information is matched with the identification information of the intelligent equipment, the production burning information from the cloud server is received through the edge equipment, the production burning information is temporarily managed and transmitted to the control end equipment, the control end equipment receives the production burning information from the edge equipment and burns the production burning information to the module, and the purpose of uniformly managing and controlling firmware upgrading and identity code burning in the cloud is achieved, so that the technical effects of definite work division between all levels of equipment, production efficiency improvement, firmware upgrading and identity code burning operation complexity reduction are achieved, and further the technical problem that BAT generally only supports firmware upgrading and identity code burning in a local area network in the actual use process is solved.
The production burning information generally includes an identification code of the module and firmware information of the module. The identity identification code of the module and the firmware information of the module need to be matched with each other so as to avoid production accidents such as incorrect firing, missed firing and the like. The identity identification code is an identity identification of a cloud platform (such as a sales platform A, a sales platform B, a sales platform C and the like) which is accessed into the mainstream of the market, and the identity identification code needs to be matched with the identification information of the public cloud platform. For example: if the access to the ali cloud platform is desired, the identification code needs to be written according to the serial number rule of the ali cloud platform, but the identification code cannot be written according to the serial number rule of other types of cloud platforms. The firmware file corresponding to the firmware information is in a binary format (i.e., BIN format), which needs to be adapted to the identification information (e.g., type, model) of the intelligent device. For example: if it is desired to burn a firmware file to an air conditioner, it is necessary to ensure that the firmware file is compatible with the air conditioner and not with other types of equipment. For another example: for example: if it is desired to burn the firmware file to an air conditioner of type a, it is necessary to ensure that the firmware file is compatible with the air conditioner of type a, but not with other air conditioners of type a. The household equipment such as televisions, refrigerators, washing machines, air conditioners, lighting lamps and the like can be changed from non-intelligent equipment to intelligent equipment by the production of the burning information.
Optionally, the method may further include the following steps:
in step S302, the edge device sends a first request message to the cloud server, where the first request message is used to request the cloud server to issue a burning task, where the burning task is created by the cloud server based on production burning information, and the burning task includes: type information, quantity information and address information, wherein the type information is the type of a public cloud platform, the quantity information is the quantity of modules to be burned, and the address information is the firmware download address of the modules;
in step S303, the edge device receives a burning task returned by the cloud server in response to the first request message.
The cloud server may create a burn job based on the production burn information to form a list of burn jobs. Each burn-in task may include: type information, number information, and address information. The type information is the type of public cloud platform (such as sales platform A, sales platform B, sales platform C, etc.), the quantity information is the quantity of modules to be burned (such as the total number of modules needed to be burned for a single order), and the address information is the firmware download address of the modules (namely, the edge device downloads corresponding firmware files through the firmware download address). The cloud server may receive a first request message from the edge device, through which the edge device requests the cloud server to download the burn-in task. And the cloud server responds to the first request message and sends the burning task to the edge terminal equipment. Specifically, the cloud server may download a recording task list to the edge device, where the recording task list may include at least one recording task. And then, the edge terminal equipment sequentially executes each burning task according to the burning task list.
Optionally, in step S300, the obtaining, by the edge device, the production burn information from the cloud server may include the following steps:
step S3001, the edge device sends a second request message to the cloud server, wherein the second request message is used for requesting an identity code adapted to the type information to the cloud server;
step S3002, the edge device receives a record number file returned by the cloud server in response to the second request message, where the record number file includes: an identity code adapted to the type information;
step S3003, the edge device sends a third request message to the cloud server, wherein the third request message is used for requesting a firmware file corresponding to the firmware download address from the cloud server;
in step S3004, the edge device receives the firmware file returned by the cloud server in response to the third request message.
After the cloud server downloads the burn task list to the edge device, the cloud server may receive a second request message from the edge device, and the edge device requests, to the cloud server, an identity identifier adapted to the type information through the second request message. And the cloud server responds to the second request message and transmits a burning number file to the control end device through the edge end device, wherein the burning number file comprises an identification code matched with the type information. In addition, the cloud server may further receive a third request message from the edge device, where the edge device requests the cloud server for the firmware file corresponding to the firmware download address through the third request message. And the cloud server responds to the third request message and transmits the firmware file to the control end device through the edge end device. That is, the edge device may first obtain the id from the cloud server, and then obtain the firmware file adapted to the id from the cloud server.
Optionally, the method may further include the following steps:
step S304, after the downloading of the burning task is successful, the edge terminal device sets the current state of the burning task as an inactive state;
in step S305, the edge device receives a local activation request, and updates the current state of the burning task from an inactive state to an active state.
After the edge device obtains the recording task list from the cloud server, the recording task in the recording task list will be initialized to an inactive state. The edge device may set an inactive state to an active state in the recording task list under the triggering of the locally received activation request.
Optionally, the method may further include the following steps:
step S306, the edge terminal equipment receives a fourth request message from the control terminal equipment, wherein the fourth request message is used for acquiring a burning task in an activated state from the edge terminal equipment;
in step S307, the edge device sends a burning task to the control device in response to the fourth request message.
The edge device may receive a fourth request message from the control device, where the control device obtains the burning task in the active state from the edge device through the fourth request message. And the edge terminal equipment responds to the fourth request message and sends a burning task to the control terminal equipment. That is, the control end device may acquire the burning task in the active state from the edge end device.
Optionally, in step S301, the edge device issuing production burn information to the control device may include the following steps:
step S3011, the edge terminal equipment receives a fifth request message from the control terminal equipment, wherein the fifth request message is used for requesting the identity code matched with the type information from the edge terminal equipment;
step S3012, the edge device issues a record number file to the control device in response to the fifth request message, where the record number file includes: an identity code adapted to the type information;
step S3013, the edge device receives a sixth request message from the control device, where the sixth request message is used to request, from the edge device, a firmware file corresponding to the firmware download address;
in step S3014, the edge device issues the firmware file to the control device in response to the sixth request message.
After the control end device obtains the burning task in the active state from the edge end device, the type information and the firmware download address can be obtained. Firstly, the control end device can determine whether the module has completed burning according to the type information and the firmware download address. If the burning is not completed, the edge device may receive a fifth request message from the control device, and the control device requests the identity code adapted to the type information from the edge device through the fifth request message. And secondly, the edge terminal equipment responds to the fifth request message and transmits a burning number file to the control terminal equipment, wherein the burning number file comprises an identification code matched with the type information. The edge device may then also receive a sixth request message from the control end device, through which the control end device requests the firmware file corresponding to the firmware download address from the edge device. Finally, the edge terminal device responds to the sixth request message and issues the firmware file to the control terminal device. That is, the control end device may first obtain the id from the edge device, and then obtain the firmware file adapted to the id from the edge device.
Optionally, the method may further include the following steps:
step S308, the edge terminal equipment receives a first notification message from the control terminal equipment, wherein the first notification message is used for notifying a cloud server of a burning result of the module;
step S309, the edge device sends the burning result to the cloud server based on the first notification message;
step S310, the edge device receives a second notification message from the cloud server, wherein the second notification message is used for notifying the edge device that the burning result is recorded successfully on the cloud server;
in step S311, the edge device updates the current status of the recording task from the active status to the completed status based on the second notification message, where the completed status is used to determine that the module has completed recording.
The control terminal equipment can acquire the burning task in the activated state from the edge terminal equipment, and obtains the burning result of the module after the burning task is executed. And secondly, the control end device sends the burning result to the edge end device through the first notification message. And thirdly, the cloud server receives a notification message from the edge terminal equipment, and the edge terminal equipment notifies the cloud server of the burning result of the module through the notification message. Then, the cloud server updates the current state of the recording task from the allocated state to the recorded state based on the notification message, so that the recording task in the recorded state will not be repeatedly recorded. And finally, the edge terminal equipment receives a second notification message from the cloud server, and the cloud server notifies the edge terminal equipment that the burning result is successfully recorded on the cloud server through the second notification message. Therefore, the edge device updates the current state of the burning task from the activation state to the completion state based on the second notification message, and the completion state is used for determining that the module has completed burning.
It should be noted that, the control end device may perform the recording task in a networked environment or may perform the recording task in a non-networked environment.
In accordance with one embodiment of the present invention, there is provided an embodiment of a module burning method, it being noted that the steps shown in the flowchart of the figures may be performed in a computer system, such as a set of computer executable instructions, and that, although a logical order is shown in the flowchart, in some cases, the steps shown or described may be performed in an order other than that shown or described herein.
In this embodiment, a module burning method operating on the control end device is provided, and fig. 4 is a flowchart of another module burning method according to an embodiment of the present invention, as shown in fig. 4, and the method includes the following steps:
step S40, the control end equipment acquires production burning information from the edge end equipment, wherein the production burning information comprises: the identity identification code of the module and the firmware information of the module are matched, and the identity identification code is matched with the identification information of the public cloud platform and the firmware information is matched with the identification information of the intelligent equipment;
in step S41, the control end device burns the production burning information to the module.
Through the steps, the cloud server can be used for centrally managing the production burning information of the module and transmitting the production burning information to the edge equipment, the production burning information comprises the identification code of the module and the firmware information of the module, the identification code is matched with the identification information of the public cloud platform, the firmware information is matched with the identification information of the intelligent equipment, the production burning information from the cloud server is received through the edge equipment, the production burning information is temporarily managed and transmitted to the control end equipment, the control end equipment receives the production burning information from the edge equipment and burns the production burning information to the module, and the purpose of uniformly managing and controlling firmware upgrading and identity code burning in the cloud is achieved, so that the technical effects of definite work division between all levels of equipment, production efficiency improvement, firmware upgrading and identity code burning operation complexity reduction are achieved, and further the technical problem that BAT generally only supports firmware upgrading and identity code burning in a local area network in the actual use process is solved.
The production burning information generally includes an identification code of the module and firmware information of the module. The identity identification code of the module and the firmware information of the module need to be matched with each other so as to avoid production accidents such as incorrect firing, missed firing and the like. The identity identification code is an identity identification of a cloud platform (such as a sales platform A, a sales platform B, a sales platform C and the like) which is accessed into the mainstream of the market, and the identity identification code needs to be matched with the identification information of the public cloud platform. For example: if the access to the ali cloud platform is desired, the identification code needs to be written according to the serial number rule of the ali cloud platform, but the identification code cannot be written according to the serial number rule of other types of cloud platforms. The firmware file corresponding to the firmware information is in a binary format (i.e., BIN format), which needs to be adapted to the identification information (e.g., type, model) of the intelligent device. For example: if it is desired to burn a firmware file to an air conditioner, it is necessary to ensure that the firmware file is compatible with the air conditioner and not with other types of equipment. For another example: for example: if it is desired to burn the firmware file to an air conditioner of type a, it is necessary to ensure that the firmware file is compatible with the air conditioner of type a, but not with other air conditioners of type a. The household equipment such as televisions, refrigerators, washing machines, air conditioners, lighting lamps and the like can be changed from non-intelligent equipment to intelligent equipment by the production of the burning information.
Optionally, the method may further include the following steps:
in step S42, the control end device sends a first request message to the edge end device, where the first request message is used to request the edge end device to issue a recording task, where the recording task is created by the cloud server based on production recording information, and the recording task includes: type information, quantity information and address information, wherein the type information is the type of a public cloud platform, the quantity information is the quantity of modules to be burned, and the address information is the firmware download address of the modules;
in step S43, the control end device receives the burning task returned by the edge end device in response to the first request message.
The cloud server may create a burn job based on the production burn information to form a list of burn jobs. Each burn-in task may include: type information, number information, and address information. The type information is the type of public cloud platform (such as sales platform A, sales platform B, sales platform C, etc.), the quantity information is the quantity of modules to be burned (such as the total number of modules needed to be burned for a single order), and the address information is the firmware download address of the modules (namely, the edge device downloads corresponding firmware files through the firmware download address). The cloud server may download a burn task list to the edge device, where the burn task list may include at least one burn task. And then, the edge terminal equipment sequentially executes each burning task according to the burning task list. Specifically, the control end device may send a first request message to the edge end device, where the control end device requests the edge end device to download the burn-in task. Then, the control end device receives a burning task returned by the edge end device in response to the first request message.
Optionally, in step S40, the control end device obtaining production burn information from the edge end device may include the following steps:
step S401, the control terminal device sends a second request message to the edge terminal device, wherein the second request message is used for requesting an identity code adapted to the type information to the edge terminal device;
in step S402, the control end device receives a record number file returned by the edge end device in response to the second request message, where the record number file includes: an identity code adapted to the type information;
step S403, the control end device sends a third request message to the edge end device, where the third request message is used to request a firmware file corresponding to the firmware download address to the edge end device;
in step S404, the control end device receives the firmware file returned by the edge end device in response to the third request message.
After the cloud server downloads the burn task list to the edge device, the control end device may send a second request message to the edge device, where the control end device requests, through the second request message, an identity identifier adapted to the type information to the edge device. And secondly, the control end equipment receives a burning number file returned by the edge end equipment in response to the second request message, wherein the burning number file comprises an identification code matched with the type information. And thirdly, the control end device sends a third request message to the edge end device, and the control end device requests the firmware file corresponding to the firmware download address to the edge end device through the third request message. Then, the control end device receives the firmware file returned by the edge end device in response to the third request message. That is, the control end device may first obtain the id from the edge device, and then obtain the firmware file adapted to the id from the edge device.
Optionally, the method may further include the following steps:
step S44, the control terminal device sends a notification message to the edge terminal device, wherein the notification message is used for notifying the burning result of the module to the edge terminal device;
step S45, the control end equipment receives a feedback message returned by the edge end equipment in response to the notification message, wherein the feedback message is used for notifying the control end equipment that the burning result is successfully recorded on the edge end equipment;
in step S46, the control end device determines that the module has completed burning based on the feedback message.
The control terminal equipment can acquire the burning task in the activated state from the edge terminal equipment, and obtains the burning result of the module after the burning task is executed. And secondly, the control end equipment can send a notification message to the edge end equipment, and the control end equipment notifies the burning result of the module to the edge end equipment through the notification message. And thirdly, the control end equipment receives a feedback message returned by the edge end equipment in response to the notification message, and the edge end equipment notifies the control end equipment that the burning result is successfully recorded on the edge end equipment through the feedback message. Then, the control end device determines that the module is burnt based on the feedback message.
It should be noted that, the control end device may perform the recording task in a networked environment or may perform the recording task in a non-networked environment.
In accordance with one embodiment of the present invention, there is provided an embodiment of a module burning method, it being noted that the steps shown in the flowchart of the figures may be performed in a computer system, such as a set of computer executable instructions, and that, although a logical order is shown in the flowchart, in some cases, the steps shown or described may be performed in an order other than that shown or described herein.
In this embodiment, a module burning method operating on the cloud server is provided, and fig. 5 is a flowchart of another module burning method according to an embodiment of the present invention, as shown in fig. 5, and the method includes the following steps:
in step S50, the cloud server receives a request message from an edge device, where the request message is used to obtain production recording information, and the production recording information includes: the identity code of the module and the firmware information of the module are matched, the identity code is matched with the identification information of the public cloud platform, the firmware information is matched with the identification information of the intelligent equipment, and the head information carried in the request message comprises: checking information;
Step S51, the cloud server performs validity check on the request message based on the check information;
in step S52, when the request message passes the validity check, the cloud server issues the production recording information to the control end device via the edge end device, so as to instruct the control end device to record the production recording information to the module.
Through the steps, the cloud server can be used for centrally managing the production burning information of the module and transmitting the production burning information to the edge equipment, the production burning information comprises the identification code of the module and the firmware information of the module, the identification code is matched with the identification information of the public cloud platform, the firmware information is matched with the identification information of the intelligent equipment, the production burning information from the cloud server is received through the edge equipment, the production burning information is temporarily managed and transmitted to the control end equipment, the control end equipment receives the production burning information from the edge equipment and burns the production burning information to the module, and the purpose of uniformly managing and controlling firmware upgrading and identity code burning in the cloud is achieved, so that the technical effects of definite work division between all levels of equipment, production efficiency improvement, firmware upgrading and identity code burning operation complexity reduction are achieved, and further the technical problem that BAT generally only supports firmware upgrading and identity code burning in a local area network in the actual use process is solved.
The production burning information generally includes an identification code of the module and firmware information of the module. The identity identification code of the module and the firmware information of the module need to be matched with each other so as to avoid production accidents such as incorrect firing, missed firing and the like. The identity identification code is an identity identification of a cloud platform (such as a sales platform A, a sales platform B, a sales platform C and the like) which is accessed into the mainstream of the market, and the identity identification code needs to be matched with the identification information of the public cloud platform. For example: if the access to the ali cloud platform is desired, the identification code needs to be written according to the serial number rule of the ali cloud platform, but the identification code cannot be written according to the serial number rule of other types of cloud platforms. The firmware file corresponding to the firmware information is in a binary format (i.e., BIN format), which needs to be adapted to the identification information (e.g., type, model) of the intelligent device. For example: if it is desired to burn a firmware file to an air conditioner, it is necessary to ensure that the firmware file is compatible with the air conditioner and not with other types of equipment. For another example: for example: if it is desired to burn the firmware file to an air conditioner of type a, it is necessary to ensure that the firmware file is compatible with the air conditioner of type a, but not with other air conditioners of type a. The household equipment such as televisions, refrigerators, washing machines, air conditioners, lighting lamps and the like can be changed from non-intelligent equipment to intelligent equipment by the production of the burning information.
In addition, the header information carried in the request message may include check information. The verification information has the functions of: and confirming whether the edge device is a trusted legal device. Only when the request message passes the validity check, the cloud server can send the production burning information to the control end device through the edge end device.
Optionally, the above-mentioned verification information may include a plurality of fields, which may include, but are not limited to: the Request identification field (i.e., X-Request-Id), the EDGE device plaintext field (i.e., X-EDGE-Key), the Timestamp field (i.e., X-Timestamp), and the first encrypted Signature field (i.e., X-Signature). These fields may be edited in the form of key-value pairs into a configuration file that is stored in the edge device.
Optionally, the first encrypted signature field is obtained by encrypting the ordering signature of the EDGE device plaintext field, the first EDGE device ciphertext field (i.e., X-EDGE-Secret), the timestamp field and the request identification field by the EDGE device in a preset encryption mode (e.g., md 5).
Optionally, in step S51, the cloud server performing validity check on the request message based on the check information may include performing the steps of:
Step S511, the cloud server analyzes the verification information to obtain a request identification field, an edge device plaintext field, a timestamp field and a first encrypted signature field;
step S512, the cloud server acquires a locally stored second edge device ciphertext field corresponding to the edge device plaintext field;
step S513, the cloud server encrypts the ordering signature of the plaintext field of the edge device, the ciphertext field of the second edge device, the timestamp field and the request identification field in a preset encryption mode to obtain a second encryption signature field;
in step S514, the cloud server performs validity check based on the comparison result of the first encrypted signature field and the second encrypted signature field.
After the cloud server acquires the verification information, the cloud server analyzes the verification information to obtain X-Request-Id, X-EDGE-Key, X-Timestamp and first X-Signature. And secondly, the cloud server acquires a locally stored second X-EDGE-Secret corresponding to the plaintext field of the EDGE device. Then, the cloud server encrypts the ordered Signature of the X-EDGE-Key, the second X-EDGE-Secret, the X-Timestamp and the X-Request-Id by adopting the preset encryption mode (such as md 5) so as to obtain a second X-Signature. Thus, the cloud server performs validity check based on the comparison result of the first X-Signature and the second X-Signature.
Optionally, in step S52, when the request message passes the validity check, the cloud server may send the production burn information to the control end device via the edge end device, which may include the following steps:
step S521, when the cloud server finds that the first encrypted signature field is identical to the second encrypted signature field based on the comparison result of the first encrypted signature field and the second encrypted signature field, the cloud server determines that the edge device is legal;
step S522, the cloud server acquires the attribution information of the edge terminal equipment;
in step S523, the cloud server sends the production burning information to the edge device based on the attribution information, and sends the production burning information to the control device through the edge device.
And the cloud server determines the edge equipment as legal equipment when the cloud server finds that the first X-signal is identical to the second X-signal based on the comparison result of the first X-signal and the second X-signal. Secondly, the cloud server acquires the attribution information of the edge equipment (namely, the current production area of the edge equipment, such as a factory). And then, the cloud server sends production burning information to the edge terminal equipment based on the attribution information and sends the production burning information to the control terminal equipment through the edge terminal equipment. For example: if the cloud server determines that the current production area of the edge equipment is the A factory by acquiring the attribution information of the edge equipment, the cloud server inquires a burning task list corresponding to the A factory and then sends the burning task list to the edge equipment. And when the cloud server finds that the first X-signal is different from the second X-signal based on the comparison result of the first X-signal and the second X-signal, the cloud server determines that the edge device is illegal. At this time, the cloud server may push the abnormal alarm information.
According to one embodiment of the present invention, there is provided an embodiment of a burn-in task creation method, it being noted that the steps illustrated in the flowchart of the drawings may be performed in a computer system such as a set of computer-executable instructions, and that although a logical order is illustrated in the flowchart, in some cases the steps illustrated or described may be performed in an order other than that illustrated herein.
In this embodiment, a method for creating a burning task running on the cloud server is provided, and fig. 6 is a flowchart of a method for creating a burning task according to one embodiment of the present invention, as shown in fig. 6, the method includes the following steps:
step S60, the cloud server acquires production burning information, wherein the production burning information comprises: the identity identification code of the module and the firmware information of the module are matched, and the identity identification code is matched with the identification information of the public cloud platform and the firmware information is matched with the identification information of the intelligent equipment;
in step S62, the cloud server creates a burning task based on the production burning information, where the burning task includes: the system comprises type information, quantity information and address information, wherein the type information is the type of a public cloud platform, the quantity information is the quantity of modules to be burned, and the address information is the firmware download address of the modules.
Through the steps, the cloud server can be adopted to acquire production burning information, the production burning information comprises the identification code of the module and the firmware information of the module, the identification code is matched with the identification information of the public cloud platform, the firmware information is matched with the identification information of the intelligent device, a burning task is created through the cloud server based on the production burning information, the burning task comprises type information, quantity information and address information, the type information is the type of the public cloud platform, the quantity information is the quantity of modules to be burned, the address information is the firmware download address of the module, the purpose of uniformly controlling firmware upgrading and the identification code burning in the cloud is achieved, the technical effects of achieving work division definition among all levels of equipment, improving production efficiency, reducing operation complexity of firmware upgrading and the identification code burning are achieved, and the technical problem that BAT generally only supports firmware upgrading and the identification code burning in a local area network in the actual use process is solved.
The production burning information generally includes an identification code of the module and firmware information of the module. The identity identification code of the module and the firmware information of the module need to be matched with each other so as to avoid production accidents such as incorrect firing, missed firing and the like. The identity identification code is an identity identification of a cloud platform (such as a sales platform A, a sales platform B, a sales platform C and the like) which is accessed into the mainstream of the market, and the identity identification code needs to be matched with the identification information of the public cloud platform. For example: if the access to the ali cloud platform is desired, the identification code needs to be written according to the serial number rule of the ali cloud platform, but the identification code cannot be written according to the serial number rule of other types of cloud platforms. The firmware file corresponding to the firmware information is in a binary format (i.e., BIN format), which needs to be adapted to the identification information (e.g., type, model) of the intelligent device. For example: if it is desired to burn a firmware file to an air conditioner, it is necessary to ensure that the firmware file is compatible with the air conditioner and not with other types of equipment. For another example: for example: if it is desired to burn the firmware file to an air conditioner of type a, it is necessary to ensure that the firmware file is compatible with the air conditioner of type a, but not with other air conditioners of type a. The household equipment such as televisions, refrigerators, washing machines, air conditioners, lighting lamps and the like can be changed from non-intelligent equipment to intelligent equipment by the production of the burning information.
The cloud server may create a burn job based on the production burn information to form a list of burn jobs. Each burn-in task may include: type information, number information, and address information. The type information is the type of public cloud platform (such as sales platform A, sales platform B, sales platform C, etc.), the quantity information is the quantity of modules to be burned (such as the total number of modules needed to be burned for a single order), and the address information is the firmware download address of the modules (namely, the edge device downloads corresponding firmware files through the firmware download address).
Optionally, in step S60, the cloud server acquiring the production burn information may include the following steps:
step S601, a cloud server acquires a firmware file and uploads the firmware file to a file resource library to obtain firmware information, wherein the firmware information comprises: firmware identification and firmware download address;
step S602, the cloud server acquires the identity identification code based on the burning mode of the intelligent device.
After the user provides the original data of the identification code and the firmware file and designates the type of the public cloud platform, the identification code corresponding to the type of the public cloud platform can be generated, and meanwhile, the identification code and the firmware file are matched. After obtaining the firmware file, the cloud server may upload the firmware file to a file repository to obtain firmware information (including a firmware identification and a firmware download address). In addition, the cloud server needs to acquire the identification code based on the burning mode (for example, burning a type one password and burning a machine one password) of the intelligent device.
Optionally, in step S602, the cloud server obtaining the identification code based on the burning manner of the smart device may include the following steps:
in step S6021, the cloud server selects a recording mode of the intelligent device, where the recording mode of the intelligent device includes: the first recording mode is used for recording the same identity identification codes for the intelligent devices of the same type, and the second recording mode is used for recording different identity identification codes for each intelligent device respectively;
in step S6022, when the first burning mode is selected, the cloud server determines the same id to be burned of the same type of smart device as the id.
In order to create a burning task based on production burning information, the cloud server first needs to select a burning mode of the intelligent device. The burning manner of the intelligent device may include, but is not limited to: a first recording mode (i.e. recording a type one password) and a second recording mode (i.e. recording a machine one password). The first burning mode is used for burning the same identity identification code for the intelligent equipment of the same type. The second burning mode is used for burning different identity identification codes for each intelligent device. When the first burning mode is selected, the cloud server determines the same identity identification codes to be burned of the same type of intelligent equipment as the identity identification codes.
Optionally, in step S602, the cloud server obtaining the identification code based on the burning manner of the smart device may include the following steps:
in step S6023, the cloud server selects a recording mode of the intelligent device, where the recording mode of the intelligent device includes: the first recording mode is used for recording the same identity identification codes for the intelligent devices of the same type, and the second recording mode is used for recording different identity identification codes for each intelligent device respectively;
step S6024, when the second burning mode is selected, the cloud server determines the number of the identification codes to be burned based on the number of the modules to be burned;
in step S6025, the cloud server queries the number of currently idle ids from the id set, and when the number of ids to be burned is smaller than or equal to the number of currently idle ids, the cloud server obtains the ids from the id set based on the number of ids to be burned.
In order to create a burning task based on production burning information, the cloud server first needs to select a burning mode of the intelligent device. The burning manner of the intelligent device may include, but is not limited to: a first recording mode (i.e. recording a type one password) and a second recording mode (i.e. recording a machine one password). The first burning mode is used for burning the same identity identification code for the intelligent equipment of the same type. The second burning mode is used for burning different identity identification codes for each intelligent device. When the second burning mode is selected, the cloud server determines the number of the identification codes to be burned based on the number of the modules to be burned. The cloud server inquires the number of the currently idle identification codes from the identification code set, and when the number of the identification codes to be burnt is smaller than or equal to the number of the currently idle identification codes, the cloud server acquires the identification codes from the identification code set based on the number of the identification codes to be burnt. Namely, the cloud server inquires whether the number of the currently idle identification codes can meet the requirement of burning one-machine-one-password from the identification code set. If the cloud server inquires that the number of the currently idle identification codes cannot meet the requirement of burning one-machine-one-password from the identification code set, abnormal alarm information is pushed. If the cloud server inquires that the number of the currently idle identification codes in the identification code set can meet the requirement of burning one-machine-one-password, the identification codes are acquired from the identification code set based on the number of the identification codes to be burned.
Optionally, in step S6025, the cloud server acquiring the id from the id set based on the number of ids to be burned may include the following steps:
step S60251, the cloud server locks the identity identification code set;
step S60252, the cloud server acquires the identity codes from the identity code set based on the number of the identity codes to be burnt, and sets the status of the identity codes to be in a downloading status;
and step S60253, unlocking the identity code set by the cloud server.
In the process that the cloud server acquires the identity identification codes from the identity identification code set based on the number of the identity identification codes to be burnt, the cloud server firstly needs to lock the identity identification code set (namely in an exclusive state) so as to prevent the identity identification codes from being reused to cause abnormality. And secondly, the cloud server acquires the identity identification codes from the identity identification code set based on the number of the identity identification codes to be burnt, and sets the status of the identity identification codes to be in a downloading status. If the id is not successfully downloaded to the edge device, the status of the id needs to be adjusted from the downloading status to the usable status. After the cloud server successfully obtains the identification codes from the identification code set based on the number of the identification codes to be burned, the cloud server unlocks the identification code set. If the id is successfully downloaded to the edge device, the status of the id needs to be adjusted from the downloading status to the downloading completion status.
Optionally, the method may further include the following steps:
in step S64, the cloud server sends the id and the corresponding index identifier to the edge device, where the index identifier is used to find the status of the id from the id set.
After the edge device obtains the recording task list from the cloud server, the recording task in the recording task list will be initialized to an inactive state. The edge device may set an inactive state to an active state in the burning tasks in the burning task list. And secondly, the control terminal equipment acquires the burning task in an activated state from the edge terminal equipment, and obtains a burning result of the module after the burning task is executed. The control end device sends the burning result to the edge end device. And then, the cloud server receives the notification message from the edge terminal equipment, and the edge terminal equipment notifies the cloud server of the burning result of the module through the notification message. Finally, the cloud server updates the current state of the recording task from the allocated state to the recorded state based on the notification message, so that the recording task in the recorded state will not be repeatedly recorded.
Therefore, the cloud server can send the identification code and the corresponding index identifier to the edge device. Through the transmission of the index identifier, when the cloud server needs to modify the current state of the burning task based on the notification message, the state of the identity identification code can be searched from the identity identification code set according to the index identifier, and then the state of the used identity identification code is modified.
It should be noted that, the control end device may perform the recording task in a networked environment or may perform the recording task in a non-networked environment.
According to one embodiment of the present invention, there is provided an embodiment of a module burn information adjustment method, it should be noted that the steps illustrated in the flowchart of the drawings may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowchart, in some cases, the steps illustrated or described may be performed in an order different from that illustrated herein.
In this embodiment, a method for adjusting module burning information running on the cloud server is provided, and fig. 7 is a flowchart of a method for adjusting module burning information according to an embodiment of the invention, as shown in fig. 7, the method includes the following steps:
Step S70, the cloud server receives a notification message from the edge terminal equipment, wherein the notification message is used for reporting the corresponding relation between the current burning result and the module identifier to the cloud server;
in step S71, the cloud server adjusts the locally stored module burning information based on the notification message, where the module burning information is used to record the correspondence between the current burning result and the module identifier on the cloud server.
Through the steps, the cloud server can be used for receiving the notification message from the edge equipment, the notification message is used for reporting the corresponding relation between the current burning result and the module identifier to the cloud server, the cloud server is used for adjusting the locally stored module burning information based on the notification message, the module burning information is used for recording the corresponding relation between the current burning result and the module identifier on the cloud server, the purpose of uniformly controlling firmware upgrading and identity code burning at the cloud is achieved, the technical effects of clear work division between all levels of equipment, production efficiency improvement and operation complexity reduction of firmware upgrading and identity code burning are achieved, and the technical problem that BAT generally only supports firmware upgrading and identity code burning in a local area network in the actual use process in the related art is solved.
Optionally, in step S71, the cloud server adjusting the module burning information based on the notification message may include the following steps:
step S711, the cloud server acquires the module identification from the notification message;
step S712, the cloud server compares the module identification with the recorded module identification in the module burning information;
in step S713, when the cloud server finds the historical writing result corresponding to the module identifier from the module writing information, the cloud server updates the historical writing result to the current writing result.
In the process that the cloud server adjusts the module burning information based on the notification message, the cloud server acquires the module identification from the notification message. The cloud server needs to compare the module identification with the recorded module identification in the module burning information. When the cloud server searches the historical burning result corresponding to the module identification from the module burning information, the cloud server updates the historical burning result into the current burning result. For example: if the cloud server acquires the module identification A from the notification message, and the module identification A corresponds to the current burning result A, the cloud server needs to compare the module identification A with the recorded module identifications in the module burning information. When the cloud server searches the historical burning result B corresponding to the module identification A from the module burning information, the cloud server updates the historical burning result B into the current burning result A.
It should be noted that, during the above operation, it is necessary to open a transaction to ensure atomicity.
Optionally, in step S71, the cloud server adjusting the module burning information based on the notification message may include the following steps:
step S714, the cloud server acquires the module identification from the notification message;
step S715, the cloud server compares the module identification with the recorded module identification in the module burning information;
step S716, when the cloud server fails to find the module identification from the module burning information, the cloud server establishes a corresponding relation between the current burning result and the module identification;
in step S717, the corresponding relationship is added to the module burning information.
In the process that the cloud server adjusts the module burning information based on the notification message, the cloud server acquires the module identification from the notification message. The cloud server needs to compare the module identification with the recorded module identification in the module burning information. When the cloud server fails to find the module identification from the module burning information, the cloud server establishes a corresponding relation between the current burning result and the module identification, and then adds the corresponding relation to the module burning information. For example: if the cloud server acquires the module identification A from the notification message, and the module identification A corresponds to the current burning result A, the cloud server needs to compare the module identification A with the recorded module identifications in the module burning information. When the cloud server fails to find the historical burning result corresponding to the module identifier A from the module burning information, the cloud server establishes a corresponding relation between the current burning result A and the module identifier A, and then adds the corresponding relation to the module burning information.
It should be noted that, during the above operation, it is necessary to open a transaction to ensure atomicity.
Optionally, the method may further include the following steps:
in step S72, the cloud server returns a response message to the edge device to instruct the edge device to set the burning task to a complete state, where the response message is used to notify the edge device that the corresponding relationship between the current burning result and the module identifier has been recorded successfully on the cloud server.
After the cloud server adjusts the module burning information based on the notification message, the cloud server may return a response message to the edge device to instruct the edge device to set the burning task to a completed state. The response message is used for notifying the edge terminal equipment that the corresponding relation between the current burning result and the module identifier is successfully recorded on the cloud server. Then, the edge device sets the burning task to a completed state in response to the notification message.
From the description of the above embodiments, it will be clear to a person skilled in the art that the method according to the above embodiments may be implemented by means of software plus the necessary general hardware platform, but of course also by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method according to the embodiments of the present invention.
In this embodiment, a module burning device is further provided, and the device is used to implement the foregoing embodiments and preferred embodiments, and is not described in detail. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. While the means described in the following embodiments are preferably implemented in software, implementation in hardware, or a combination of software and hardware, is also possible and contemplated.
Fig. 8 is a block diagram of a module burning device according to an embodiment of the present invention, the device is applied to a module burning authorization tracking system, and the system includes: cloud server, edge end equipment and control end equipment, as shown in fig. 8, the device includes: the obtaining module 100 is configured to obtain production burning information, where the production burning information includes: the identity identification code of the module and the firmware information of the module are matched, and the identity identification code is matched with the identification information of the public cloud platform and the firmware information is matched with the identification information of the intelligent equipment; the processing module 102 is configured to send the production recording information to the control end device via the edge end device, so as to instruct the control end device to record the production recording information to the module.
Optionally, an acquiring module 100 is configured to acquire original data of the identification code and a serial number rule of the public cloud platform; carrying out standardized compatibility processing on the serial number rule to obtain a standardized rule; and generating the identification code by adopting the original data and the standardized rule.
Optionally, fig. 9 is a block diagram of a module burning apparatus according to an alternative embodiment of the present invention, as shown in fig. 9, where the apparatus includes, in addition to all the modules shown in fig. 8: the creating module 104 is configured to create a recording task based on the production recording information, where the recording task includes: type information, quantity information and address information, wherein the type information is the type of a public cloud platform, the quantity information is the quantity of modules to be burned, and the address information is the firmware download address of the modules; the first receiving module 106 is configured to receive a first request message from an edge device, where the first request message is used to request the cloud server to download a burn task; the sending module 108 is configured to send the burning task to the edge device in response to the first request message.
Optionally, the processing module 102 is configured to receive a second request message from the edge device, where the second request message is configured to request, from the cloud server, an id adapted to the type information; and responding to the second request message, and sending a burning number file to the edge terminal equipment, wherein the burning number file comprises: an identity code adapted to the type information; receiving a third request message from the edge device, wherein the third request message is used for requesting a firmware file corresponding to the firmware download address from the cloud server; and transmitting the firmware file to the edge device in response to the third request message.
Optionally, as shown in fig. 9, the apparatus includes, in addition to all the modules shown in fig. 8, the above apparatus further includes: the updating module 110 is configured to update the current status of the recording task from an unassigned status to an assigned status, where the assigned status is used to control the recording task to be repeatedly assigned.
Optionally, as shown in fig. 9, the apparatus includes, in addition to all the modules shown in fig. 8, the above apparatus further includes: the second receiving module 112 is configured to receive a notification message from the edge device, where the notification message is configured to notify the cloud server of a burning result of the module; the updating module 114 is further configured to update the current status of the recording task from the allocated status to a recorded status based on the notification message, where the recorded status is used to control the recording task to be repeatedly recorded.
In this embodiment, another module burning device is further provided, and the device is used to implement the foregoing embodiments and preferred embodiments, and is not described in detail. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. While the means described in the following embodiments are preferably implemented in software, implementation in hardware, or a combination of software and hardware, is also possible and contemplated.
Fig. 10 is a block diagram of another module burning device according to an embodiment of the present invention, which is applied to a module burning authorization tracking system, the system includes: cloud server, edge end equipment and control end equipment, as shown in fig. 10, the device includes: the obtaining module 200 is configured to obtain production burning information from a cloud server, where the production burning information includes: the identity identification code of the module and the firmware information of the module are matched, and the identity identification code is matched with the identification information of the public cloud platform and the firmware information is matched with the identification information of the intelligent equipment; the processing module 202 is configured to issue production burning information to the control end device, so as to instruct the control end device to burn the production burning information to the module.
Optionally, fig. 11 is a block diagram of another module burning apparatus according to an alternative embodiment of the present invention, as shown in fig. 11, and the apparatus includes, in addition to all the modules shown in fig. 10: the first sending module 204 is configured to send a first request message to the cloud server, where the first request message is used to request the cloud server to issue a burning task, where the burning task is created by the cloud server based on production burning information, and the burning task includes: type information, quantity information and address information, wherein the type information is the type of a public cloud platform, the quantity information is the quantity of modules to be burned, and the address information is the firmware download address of the modules; the first receiving module 206 is configured to receive a burning task returned by the cloud server in response to the first request message.
Optionally, the obtaining module 200 is configured to send a second request message to the cloud server by the edge device, where the second request message is used to request, to the cloud server, an identity identifier adapted to the type information; receiving a burning number file returned by the cloud server in response to the second request message, wherein the burning number file comprises: an identity code adapted to the type information; sending a third request message to the cloud server, wherein the third request message is used for requesting a firmware file corresponding to the firmware download address from the cloud server; and receiving a firmware file returned by the cloud server in response to the third request message.
Alternatively, as shown in fig. 11, the apparatus includes, in addition to all the modules shown in fig. 10, the above apparatus further includes: the setting module 208 is configured to set a current state of the recording task to an inactive state after the recording task is downloaded successfully; the update module 210 is configured to receive a local activation request, and update a current state of the burning task from an inactive state to an active state.
Alternatively, as shown in fig. 11, the apparatus includes, in addition to all the modules shown in fig. 10, the above apparatus further includes: the second receiving module 212 is configured to receive a fourth request message from the control end device, where the fourth request message is used to obtain a recording task in an active state from the edge end device; the second sending module 214 is configured to send a burning task to the control end device in response to the fourth request message.
Optionally, the processing module 202 is configured to receive a fifth request message from the control end device, where the fifth request message is used to request, from the edge end device, an id adapted to the type information; responding to the fifth request message, and transmitting a burning number file to the control end device, wherein the burning number file comprises: an identity code adapted to the type information; receiving a sixth request message from the control end device, wherein the sixth request message is used for requesting the firmware file corresponding to the firmware download address from the edge end device; and responding to the sixth request message, and issuing the firmware file to the control end device.
Alternatively, as shown in fig. 11, the apparatus includes, in addition to all the modules shown in fig. 10, the above apparatus further includes: a fifth receiving module 216, configured to receive a first notification message from the control end device, where the first notification message is used to notify the cloud server of a burning result of the module; a fifth sending module 218, configured to send the burning result to the cloud server based on the first notification message; a sixth receiving module 220, configured to receive a second notification message from the cloud server, where the second notification message is used to notify the edge device that the burning result has been recorded successfully on the cloud server; the updating module 222 is further configured to update the current status of the recording task from the active status to a completed status based on the second notification message, where the completed status is used to determine that the module has completed recording.
In this embodiment, a module burning device is further provided, and the module burning device is used to implement the foregoing embodiments and preferred embodiments, and is not described again. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. While the means described in the following embodiments are preferably implemented in software, implementation in hardware, or a combination of software and hardware, is also possible and contemplated.
Fig. 12 is a block diagram of a module burning apparatus according to another embodiment of the present invention, which is applied to a module burning authorization tracking system, the system includes: cloud server, edge end equipment and control end equipment, as shown in fig. 12, the device includes: the obtaining module 300 is configured to obtain production burning information from an edge device, where the production burning information includes: the identity identification code of the module and the firmware information of the module are matched, and the identity identification code is matched with the identification information of the public cloud platform and the firmware information is matched with the identification information of the intelligent equipment; the processing module 302 is configured to burn the production burn information to the module.
Optionally, fig. 13 is a block diagram of a module burning apparatus according to an alternative embodiment of the present invention, as shown in fig. 13, where the apparatus includes, in addition to all the modules shown in fig. 12: the first sending module 304 is configured to send a first request message to an edge device, where the first request message is used to request the edge device to issue a burning task, where the burning task is created by a cloud server based on production burning information, and the burning task includes: type information, quantity information and address information, wherein the type information is the type of a public cloud platform, the quantity information is the quantity of modules to be burned, and the address information is the firmware download address of the modules; the first receiving module 306 is configured to receive a burning task returned by the edge device in response to the first request message.
Optionally, the obtaining module 300 is configured to send a second request message to the edge device, where the second request message is used to request, to the edge device, an id adapted to the type information; receiving a burning number file returned by the edge terminal equipment in response to the second request message, wherein the burning number file comprises: an identity code adapted to the type information; sending a third request message to the edge equipment, wherein the third request message is used for requesting the firmware file corresponding to the firmware download address from the edge equipment; and receiving a firmware file returned by the edge terminal equipment in response to the third request message.
Alternatively, as shown in fig. 13, the apparatus includes, in addition to all the modules shown in fig. 12, the above apparatus further includes: a second sending module 308, configured to send a notification message to the edge device, where the notification message is used to notify the edge device of a burning result of the module; a second receiving module 310, configured to receive a feedback message returned by the edge device in response to the notification message, where the feedback message is used to notify the control device that the burning result has been recorded successfully on the edge device; the determining module 312 is configured to determine that the module has completed burning based on the feedback message.
In this embodiment, a module burning device is further provided, and the module burning device is used to implement the foregoing embodiments and preferred embodiments, and is not described again. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. While the means described in the following embodiments are preferably implemented in software, implementation in hardware, or a combination of software and hardware, is also possible and contemplated.
Fig. 14 is a block diagram of a module burning apparatus according to another embodiment of the present invention, which is applied to a module burning authorization tracking system, the system includes: cloud server, edge end equipment and control end equipment, as shown in fig. 14, the device includes: the receiving module 400 is configured to receive a request message from an edge device, where the request message is used to obtain production recording information, and the production recording information includes: the identity code of the module and the firmware information of the module are matched, the identity code is matched with the identification information of the public cloud platform, the firmware information is matched with the identification information of the intelligent equipment, and the head information carried in the request message comprises: checking information; a verification module 402, configured to perform validity verification on the request message based on the verification information; and the processing module 404 is configured to send the production recording information to the control end device via the edge end device when the request message passes the validity check, so as to instruct the control end device to record the production recording information to the module.
Optionally, the verification information includes a plurality of fields, the plurality of fields including: a request identification field, an edge device plaintext field, a timestamp field, and a first encrypted signature field.
Optionally, the first encrypted signature field is obtained by encrypting the ordering signature of the plaintext field of the edge device, the ciphertext field of the first edge device, the timestamp field and the request identification field by the edge device in a preset encryption mode.
Optionally, the verification module 402 is configured to parse the verification information by using the cloud server to obtain a request identifier field, a plaintext field of the edge device, a timestamp field, and a first encrypted signature field; the cloud server acquires a locally stored second edge equipment ciphertext field corresponding to the edge equipment plaintext field; the cloud server encrypts the ordering signature of the plaintext field of the edge device, the ciphertext field of the second edge device, the timestamp field and the request identification field in a preset encryption mode to obtain a second encryption signature field; the cloud server performs validity check based on a comparison result of the first encrypted signature field and the second encrypted signature field.
Optionally, the processing module 404 is configured to determine that the edge device is a legal device when the first encrypted signature field is found to be the same as the second encrypted signature field based on the comparison result of the first encrypted signature field and the second encrypted signature field; acquiring attribution information of edge terminal equipment; and sending production burning information to the edge terminal equipment based on the attribution information, and sending the production burning information to the control terminal equipment through the edge terminal equipment.
The embodiment also provides a device for creating a burning task, which is used for implementing the above embodiment and the preferred implementation, and is not described in detail. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. While the means described in the following embodiments are preferably implemented in software, implementation in hardware, or a combination of software and hardware, is also possible and contemplated.
Fig. 15 is a block diagram of a recording task creation device according to an embodiment of the present invention, the device being applied to a modular recording authorization tracking system, the system comprising: cloud server, edge end equipment and control end equipment, as shown in fig. 15, the device includes: the obtaining module 500 is configured to obtain production burning information, where the production burning information includes: the identity identification code of the module and the firmware information of the module are matched, and the identity identification code is matched with the identification information of the public cloud platform and the firmware information is matched with the identification information of the intelligent equipment; the creating module 502 is configured to create a recording task based on the production recording information, where the recording task includes: the system comprises type information, quantity information and address information, wherein the type information is the type of a public cloud platform, the quantity information is the quantity of modules to be burned, and the address information is the firmware download address of the modules.
Optionally, the obtaining module 500 is configured to obtain a firmware file and upload the firmware file to a file repository to obtain firmware information, where the firmware information includes: firmware identification and firmware download address; and acquiring the identity identification code based on the burning mode of the intelligent equipment.
Optionally, the obtaining module 500 is configured to select a recording mode of the intelligent device, where the recording mode of the intelligent device includes: the first recording mode is used for recording the same identity identification codes for the intelligent devices of the same type, and the second recording mode is used for recording different identity identification codes for each intelligent device respectively; when the first burning mode is selected, the same identity identification codes to be burned of the same type of intelligent equipment are determined to be the identity identification codes.
Optionally, the obtaining module 500 is configured to select a recording mode of the intelligent device, where the recording mode of the intelligent device includes: the first recording mode is used for recording the same identity identification codes for the intelligent devices of the same type, and the second recording mode is used for recording different identity identification codes for each intelligent device respectively; when the second burning mode is selected, determining the number of the identification codes to be burned based on the number of the modules to be burned; inquiring the number of the currently idle identification codes from the identification code set, and acquiring the identification codes from the identification code set based on the number of the identification codes to be burnt when the number of the identification codes to be burnt is smaller than or equal to the number of the currently idle identification codes.
Optionally, the acquiring module 500 is configured to lock the set of identification codes; acquiring the identity codes from the identity code set based on the number of the identity codes to be burnt, and setting the status of the identity codes to be in a downloading status; and unlocking the identification code set.
Alternatively, fig. 16 is a block diagram of a recording task creation device according to an alternative embodiment of the present invention, as shown in fig. 16, which includes, in addition to all the modules shown in fig. 15, the above device further including: the sending module 504 is configured to send the id and a corresponding index identifier to the edge device, where the index identifier is used to find a status of the id from the id set.
The embodiment also provides a device for adjusting module burning information, which is used for implementing the above embodiment and the preferred implementation, and is not described again. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. While the means described in the following embodiments are preferably implemented in software, implementation in hardware, or a combination of software and hardware, is also possible and contemplated.
Fig. 17 is a block diagram of a module burning information adjusting device according to an embodiment of the present invention, which is applied to a module burning authorization tracking system, the system includes: cloud server, edge end equipment and control end equipment, as shown in fig. 17, the device includes: the receiving module 600 is configured to receive a notification message from an edge device, where the notification message is used to report a correspondence between a current burning result and a module identifier to a cloud server; the adjustment module 602 is configured to adjust the locally stored module programming information based on the notification message, where the module programming information is used to record a correspondence between a current programming result and a module identifier on the cloud server.
Optionally, an adjustment module 602, configured to obtain, by the cloud server, a module identifier from the notification message; the cloud server compares the module identification with the recorded module identification in the module burning information; when the cloud server searches the historical burning result corresponding to the module identification from the module burning information, the cloud server updates the historical burning result into the current burning result.
Optionally, an adjustment module 602, configured to obtain, by the cloud server, a module identifier from the notification message; the cloud server compares the module identification with the recorded module identification in the module burning information; when the cloud server fails to find the module identification from the module burning information, the cloud server establishes a corresponding relation between the current burning result and the module identification; and adding the corresponding relation to the module burning information.
Optionally, fig. 18 is a block diagram of a module burning information adjusting apparatus according to an alternative embodiment of the present invention, as shown in fig. 18, the apparatus includes, in addition to all the modules shown in fig. 17: and a feedback module 604, configured to return a response message to the edge device to instruct the edge device to set the recording task to a complete state, where the response message is used to notify the edge device that the corresponding relationship between the current recording result and the module identifier has been recorded successfully on the cloud server.
It should be noted that each of the above modules may be implemented by software or hardware, and for the latter, it may be implemented by, but not limited to: the modules are all located in the same processor; alternatively, the above modules may be located in different processors in any combination.
Embodiments of the present invention also provide a non-volatile storage medium having a computer program stored therein, wherein the computer program is arranged to perform the steps of any of the method embodiments described above when run.
Alternatively, in the present embodiment, the above-described nonvolatile storage medium may be configured to store a computer program for performing the steps of:
S1, a cloud server acquires production burning information, wherein the production burning information comprises: the identity identification code of the module and the firmware information of the module are matched, and the identity identification code is matched with the identification information of the public cloud platform and the firmware information is matched with the identification information of the intelligent equipment;
s2, the cloud server transmits the production burning information to the control end device through the edge end device so as to instruct the control end device to burn the production burning information to the module.
Optionally, the non-volatile storage medium is further arranged to store a computer program for performing the steps of:
s1, obtaining production burning information from a cloud server by edge equipment, wherein the production burning information comprises: the identity identification code of the module and the firmware information of the module are matched, and the identity identification code is matched with the identification information of the public cloud platform and the firmware information is matched with the identification information of the intelligent equipment;
s2, the edge terminal equipment transmits the production burning information to the control terminal equipment so as to instruct the control terminal equipment to burn the production burning information to the module.
Optionally, the non-volatile storage medium is further arranged to store a computer program for performing the steps of:
s1, a control terminal device acquires production burning information from an edge terminal device, wherein the production burning information comprises: the identity identification code of the module and the firmware information of the module are matched, and the identity identification code is matched with the identification information of the public cloud platform and the firmware information is matched with the identification information of the intelligent equipment;
S2, the control terminal equipment burns the production burning information to the module.
Optionally, the non-volatile storage medium is further arranged to store a computer program for performing the steps of:
s1, a cloud server receives a request message from edge equipment, wherein the request message is used for acquiring production burning information, and the production burning information comprises: the identity code of the module and the firmware information of the module are matched, the identity code is matched with the identification information of the public cloud platform, the firmware information is matched with the identification information of the intelligent equipment, and the head information carried in the request message comprises: checking information;
s2, the cloud server performs validity verification on the request message based on the verification information;
and S3, when the request message passes the validity check, the cloud server transmits the production burning information to the control end device through the edge end device so as to instruct the control end device to burn the production burning information to the module.
Optionally, the non-volatile storage medium is further arranged to store a computer program for performing the steps of:
s1, a cloud server acquires production burning information, wherein the production burning information comprises: the identity identification code of the module and the firmware information of the module are matched, and the identity identification code is matched with the identification information of the public cloud platform and the firmware information is matched with the identification information of the intelligent equipment;
S2, the cloud server creates a burning task based on production burning information, wherein the burning task comprises the following steps: the system comprises type information, quantity information and address information, wherein the type information is the type of a public cloud platform, the quantity information is the quantity of modules to be burned, and the address information is the firmware download address of the modules.
Optionally, the non-volatile storage medium is further arranged to store a computer program for performing the steps of:
s1, a cloud server receives a notification message from edge equipment, wherein the notification message is used for reporting a corresponding relation between a current burning result and a module identifier to the cloud server;
s2, the cloud server adjusts locally stored module burning information based on the notification message, wherein the module burning information is used for recording the corresponding relation between the current burning result and the module identifier on the cloud server.
Alternatively, in the present embodiment, the above-described nonvolatile storage medium may include, but is not limited to: a usb disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing a computer program.
An embodiment of the invention also provides an electronic device comprising a memory having stored therein a computer program and a processor arranged to run the computer program to perform the steps of any of the method embodiments described above.
Optionally, the electronic apparatus may further include a transmission device and an input/output device, where the transmission device is connected to the processor, and the input/output device is connected to the processor.
Alternatively, in the present embodiment, the above-described processor may be configured to execute the following steps by a computer program:
s1, a cloud server acquires production burning information, wherein the production burning information comprises: the identity identification code of the module and the firmware information of the module are matched, and the identity identification code is matched with the identification information of the public cloud platform and the firmware information is matched with the identification information of the intelligent equipment;
s2, the cloud server transmits the production burning information to the control end device through the edge end device so as to instruct the control end device to burn the production burning information to the module.
Optionally, in this embodiment, the above processor may be further configured to execute the following steps by a computer program:
S1, obtaining production burning information from a cloud server by edge equipment, wherein the production burning information comprises: the identity identification code of the module and the firmware information of the module are matched, and the identity identification code is matched with the identification information of the public cloud platform and the firmware information is matched with the identification information of the intelligent equipment;
s2, the edge terminal equipment transmits the production burning information to the control terminal equipment so as to instruct the control terminal equipment to burn the production burning information to the module.
Optionally, in this embodiment, the above processor may be further configured to execute the following steps by a computer program:
s1, a control terminal device acquires production burning information from an edge terminal device, wherein the production burning information comprises: the identity identification code of the module and the firmware information of the module are matched, and the identity identification code is matched with the identification information of the public cloud platform and the firmware information is matched with the identification information of the intelligent equipment;
s2, the control terminal equipment burns the production burning information to the module.
Optionally, in this embodiment, the above processor may be further configured to execute the following steps by a computer program:
s1, a cloud server receives a request message from edge equipment, wherein the request message is used for acquiring production burning information, and the production burning information comprises: the identity code of the module and the firmware information of the module are matched, the identity code is matched with the identification information of the public cloud platform, the firmware information is matched with the identification information of the intelligent equipment, and the head information carried in the request message comprises: checking information;
S2, the cloud server performs validity verification on the request message based on the verification information;
and S3, when the request message passes the validity check, the cloud server transmits the production burning information to the control end device through the edge end device so as to instruct the control end device to burn the production burning information to the module.
Optionally, in this embodiment, the above processor may be further configured to execute the following steps by a computer program:
s1, a cloud server acquires production burning information, wherein the production burning information comprises: the identity identification code of the module and the firmware information of the module are matched, and the identity identification code is matched with the identification information of the public cloud platform and the firmware information is matched with the identification information of the intelligent equipment;
s2, the cloud server creates a burning task based on production burning information, wherein the burning task comprises the following steps: the system comprises type information, quantity information and address information, wherein the type information is the type of a public cloud platform, the quantity information is the quantity of modules to be burned, and the address information is the firmware download address of the modules.
Optionally, in this embodiment, the above processor may be further configured to execute the following steps by a computer program:
s1, a cloud server receives a notification message from edge equipment, wherein the notification message is used for reporting a corresponding relation between a current burning result and a module identifier to the cloud server;
S2, the cloud server adjusts locally stored module burning information based on the notification message, wherein the module burning information is used for recording the corresponding relation between the current burning result and the module identifier on the cloud server.
Alternatively, specific examples in this embodiment may refer to examples described in the foregoing embodiments and optional implementations, and this embodiment is not described herein.
The foregoing embodiment numbers of the present application are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
In the foregoing embodiments of the present application, the descriptions of the embodiments are emphasized, and for a portion of this disclosure that is not described in detail in this embodiment, reference is made to the related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed technology may be implemented in other manners. The above-described embodiments of the apparatus are merely exemplary, and the division of the units, for example, may be a logic function division, and may be implemented in another manner, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interfaces, units or modules, or may be in electrical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied essentially or in part or all of the technical solution or in part in the form of a software product stored in a storage medium, including instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely a preferred embodiment of the present invention and it should be noted that modifications and adaptations to those skilled in the art may be made without departing from the principles of the present invention, which are intended to be comprehended within the scope of the present invention.

Claims (15)

1. A modular burn authorization tracking system, comprising: cloud server, edge end equipment and control end equipment;
the cloud server is configured to centrally manage production burning information of the module, and send the production burning information to the edge device, where the production burning information includes: the intelligent cloud platform comprises an identity identification code of the module and firmware information of the module, wherein the identity identification code is matched with the identification information of the public cloud platform, and the firmware information is matched with the identification information of the intelligent device;
the edge terminal equipment performs wide area network communication interaction with the cloud server, and is used for receiving the production burning information from the cloud server, temporarily managing the production burning information and issuing the production burning information to the control terminal equipment;
the control terminal equipment performs local area network communication interaction with the edge terminal equipment, and is used for receiving the production burning information from the edge terminal equipment and burning the production burning information to the module;
The cloud server is further used for acquiring the original data of the identity identification code and a serial number rule of the public cloud platform; carrying out standardized compatibility processing on the serial number rule to obtain a standardized rule; and generating the identification code by adopting the original data and the standardized rule.
2. The system of claim 1, wherein the initial format of the identification code is a character string format, the target format obtained after editing is a binary format, and the format of the firmware file corresponding to the firmware information is a binary format.
3. The module burning method is characterized in that the method is applied to a module burning authorization tracking system, and the system comprises the following steps: cloud server, edge end equipment and control end equipment, the method includes:
the cloud server receives a request message from the edge device, wherein the request message is used for obtaining production burning information, and the production burning information comprises: the identity recognition code of the module and the firmware information of the module are matched with the identification information of the public cloud platform, the firmware information is matched with the identification information of the intelligent equipment, and the head information carried in the request message comprises: checking information;
The cloud server performs validity verification on the request message based on the verification information;
when the request message passes the validity check, the cloud server transmits the production burning information to the control end device through the edge end device so as to instruct the control end device to burn the production burning information to the module;
wherein the method further comprises: the cloud server acquires the original data of the identity identification code and a serial number rule of the public cloud platform; the cloud server performs standardized compatibility processing on the serial number rule to obtain a standardized rule; and the cloud server generates the identification code by adopting the original data and the standardized rule.
4. The method of claim 3, wherein the verification information comprises a plurality of fields including: a request identification field, an edge device plaintext field, a timestamp field, and a first encrypted signature field.
5. The method of claim 4, wherein the first encrypted signature field is obtained by encrypting the ordering signature of the plain text field, the cipher text field, the timestamp field, and the request identification field of the edge device by the edge device in a preset encryption manner.
6. The method of claim 5, wherein the cloud server performing a validity check on the request message based on the check information comprises:
the cloud server analyzes the verification information to obtain the request identification field, the plaintext field of the edge terminal equipment, the timestamp field and the first encrypted signature field;
the cloud server acquires a locally stored second edge device ciphertext field corresponding to the edge device plaintext field;
the cloud server adopts the preset encryption mode to encrypt the sequencing signature of the plaintext field of the edge device, the ciphertext field of the second edge device, the timestamp field and the request identification field to obtain a second encryption signature field;
and the cloud server performs validity verification based on a comparison result of the first encrypted signature field and the second encrypted signature field.
7. The method of claim 6, wherein the cloud server issuing the production burn information to the control side device via the edge side device when the request message passes a validity check comprises:
The cloud server determines that the edge terminal equipment is legal equipment when the cloud server finds that the first encrypted signature field is identical to the second encrypted signature field based on a comparison result of the first encrypted signature field and the second encrypted signature field;
the cloud server acquires the attribution information of the edge terminal equipment;
and the cloud server sends the production burning information to the edge terminal equipment based on the attribution information and sends the production burning information to the control terminal equipment through the edge terminal equipment.
8. A module programming device, wherein the device is applied to a module programming authorization tracking system, the system comprising: cloud server, edge end equipment and control end equipment, the device includes:
the receiving module is configured to receive a request message from the edge device, where the request message is used to obtain production recording information, and the production recording information includes: the identity recognition code of the module and the firmware information of the module are matched with the identification information of the public cloud platform, the firmware information is matched with the identification information of the intelligent equipment, and the head information carried in the request message comprises: checking information;
The verification module is used for verifying the validity of the request message based on the verification information;
the processing module is used for issuing the production burning information to the control end equipment through the edge end equipment when the request message passes the validity check so as to instruct the control end equipment to burn the production burning information to the module;
the device also comprises a generation module, a processing module and a processing module, wherein the generation module is used for acquiring the original data of the identity identification code and the serial number rule of the public cloud platform; carrying out standardized compatibility processing on the serial number rule to obtain a standardized rule; and generating the identification code by adopting the original data and the standardized rule.
9. The apparatus of claim 8, wherein the verification information comprises a plurality of fields including: a request identification field, an edge device plaintext field, a timestamp field, and a first encrypted signature field.
10. The apparatus of claim 9, wherein the first encrypted signature field is obtained by encrypting, by the edge device, the edge device plaintext field, the first edge device ciphertext field, the timestamp field, and the ordering signature of the request identifier field in a preset encryption manner.
11. The apparatus of claim 10, wherein the verification module is configured to parse the verification information by the cloud server to obtain the request identifier field, the edge device plaintext field, the timestamp field, and the first encrypted signature field; the cloud server acquires a locally stored second edge device ciphertext field corresponding to the edge device plaintext field; the cloud server adopts the preset encryption mode to encrypt the sequencing signature of the plaintext field of the edge device, the ciphertext field of the second edge device, the timestamp field and the request identification field to obtain a second encryption signature field; and the cloud server performs validity verification based on a comparison result of the first encrypted signature field and the second encrypted signature field.
12. The apparatus of claim 11, wherein the processing module is configured to determine that the edge device is a legitimate device when the first encrypted signature field is found to be the same as the second encrypted signature field based on a comparison of the first encrypted signature field and the second encrypted signature field; acquiring attribution information of the edge terminal equipment; and sending the production burning information to the edge terminal equipment based on the attribution information, and sending the production burning information to the control terminal equipment through the edge terminal equipment.
13. A non-volatile storage medium, characterized in that a computer program is stored in the storage medium, wherein the computer program is arranged to execute the module burning method according to any of the claims 3 to 7 when run.
14. A processor, characterized in that the processor is configured to run a program, wherein the program is arranged to execute the module burning method as claimed in any of the claims 3 to 7 at run time.
15. An electronic device comprising a memory and a processor, characterized in that the memory has stored therein a computer program, the processor being arranged to run the computer program to perform the module burning method of any of the claims 3 to 7.
CN202010955402.2A 2020-09-11 2020-09-11 Module burning authorization tracking system, module burning method and device Active CN112055090B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010955402.2A CN112055090B (en) 2020-09-11 2020-09-11 Module burning authorization tracking system, module burning method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010955402.2A CN112055090B (en) 2020-09-11 2020-09-11 Module burning authorization tracking system, module burning method and device

Publications (2)

Publication Number Publication Date
CN112055090A CN112055090A (en) 2020-12-08
CN112055090B true CN112055090B (en) 2023-08-29

Family

ID=73610667

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010955402.2A Active CN112055090B (en) 2020-09-11 2020-09-11 Module burning authorization tracking system, module burning method and device

Country Status (1)

Country Link
CN (1) CN112055090B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113868672B (en) * 2021-12-01 2022-03-15 武汉天喻信息产业股份有限公司 Module wireless firmware upgrading method, security chip and wireless firmware upgrading platform

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108053225A (en) * 2017-12-28 2018-05-18 广州美诚汇信息科技有限公司 A kind of embedded encoded platform and method
CN109144531A (en) * 2018-08-08 2019-01-04 上海庆科信息技术有限公司 The approaches to IM and device of programming system and its server
CN109768977A (en) * 2019-01-15 2019-05-17 杭州云英网络科技有限公司 Streaming medium data processing method, device and relevant device and medium
CN109901851A (en) * 2019-02-28 2019-06-18 广州小鹏汽车科技有限公司 A kind of firmware burning system and method
CN111435913A (en) * 2019-01-14 2020-07-21 海信集团有限公司 Identity authentication method and device for terminal of Internet of things and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9838359B2 (en) * 2015-10-29 2017-12-05 Ca, Inc. Separation of IoT network thing identification data at a network edge device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108053225A (en) * 2017-12-28 2018-05-18 广州美诚汇信息科技有限公司 A kind of embedded encoded platform and method
CN109144531A (en) * 2018-08-08 2019-01-04 上海庆科信息技术有限公司 The approaches to IM and device of programming system and its server
CN111435913A (en) * 2019-01-14 2020-07-21 海信集团有限公司 Identity authentication method and device for terminal of Internet of things and storage medium
CN109768977A (en) * 2019-01-15 2019-05-17 杭州云英网络科技有限公司 Streaming medium data processing method, device and relevant device and medium
CN109901851A (en) * 2019-02-28 2019-06-18 广州小鹏汽车科技有限公司 A kind of firmware burning system and method

Also Published As

Publication number Publication date
CN112055090A (en) 2020-12-08

Similar Documents

Publication Publication Date Title
EP3852335B1 (en) Method and system for modifying blockchain network configuration
CN102281324B (en) Method for remote authorized management on menu items of mobile communication terminal system
CN104199706A (en) Firmware upgrade method and device for eMMC
US20110082900A1 (en) System and Methods to Store, Retrieve, Manage, Augment and Monitor Applications on Appliances
US20080320109A1 (en) Complex software deployment
CN105378747A (en) One-touch device personalization
CN112034807B (en) Module burning authorization tracking system, module burning method and device
CN112083936B (en) Module burning authorization tracking system, burning task creating method and device
CN102316152B (en) Distributed Services empowerment management
CN103678967A (en) Network system, data processing apparatus, and method
CN111596932B (en) Mirror image file generation method and device and computer readable storage medium
CN102081537A (en) Method for upgrading software
CN111651180B (en) Firmware updating method and device, processor and intelligent gateway equipment
CN107209678A (en) System and method for the adaptive clone of mobile device
CN112055090B (en) Module burning authorization tracking system, module burning method and device
CN109495874A (en) The method and apparatus of Profile downloading
WO2018209986A1 (en) Method and device for downloading euicc subscription data
CN112034808B (en) Module burning authorization tracking system, module burning information adjusting method and device
CN112052019B (en) Module burning authorization tracking system, module burning method and device
CN112034806B (en) Module burning authorization tracking system, module burning method and device
CN104185167A (en) Method and terminal for updating cardlock information of terminal
CN111699489A (en) Electronic device, information processing apparatus, information processing method, program, and information processing system
CN102577226B (en) The method and system that the deployment life cycle of cipher object manages is provided
CN111506549A (en) Block chain-based file processing system, method, device and storage medium
US9544398B2 (en) System and methods to store, retrieve, manage, augment and monitor applications on appliances

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant