CN113709914B - Mesh network distribution method, server, mesh device and storage medium - Google Patents

Mesh network distribution method, server, mesh device and storage medium Download PDF

Info

Publication number
CN113709914B
CN113709914B CN202010378726.4A CN202010378726A CN113709914B CN 113709914 B CN113709914 B CN 113709914B CN 202010378726 A CN202010378726 A CN 202010378726A CN 113709914 B CN113709914 B CN 113709914B
Authority
CN
China
Prior art keywords
terminal
server
information
mesh network
distribution method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010378726.4A
Other languages
Chinese (zh)
Other versions
CN113709914A (en
Inventor
陈小平
陈荣锦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yunmi Internet Technology Guangdong Co Ltd
Original Assignee
Yunmi Internet Technology Guangdong Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yunmi Internet Technology Guangdong Co Ltd filed Critical Yunmi Internet Technology Guangdong Co Ltd
Priority to CN202010378726.4A priority Critical patent/CN113709914B/en
Publication of CN113709914A publication Critical patent/CN113709914A/en
Application granted granted Critical
Publication of CN113709914B publication Critical patent/CN113709914B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The application discloses a Mesh network distribution method, a server, mesh equipment and a storage medium, wherein the Mesh network distribution method is used for a first server which can be communicated with a first terminal in a Mesh network; the network distribution method comprises the following steps: acquiring terminal information of a second terminal from the first terminal, wherein the second terminal is not accessed to the Mesh network; determining a second server corresponding to the second terminal according to the terminal information; sending a verification request for verifying the second terminal to the second server according to the terminal information, and acquiring a verification result of the second terminal from the second server; and notifying the first terminal to send networking information of the Mesh network to the second terminal according to the verification result, so that the second terminal accesses the Mesh network according to the networking information and establishes communication connection with the second server. The method can realize the distribution network among devices under different IOT platforms.

Description

Mesh network distribution method, server, mesh device and storage medium
Technical Field
The present disclosure relates to the field of wireless communications technologies, and in particular, to a Mesh network distribution method, a server, a Mesh device, and a storage medium.
Background
Wireless Mesh networks (Wireless Mesh Networks, also called wireless Mesh networks, etc.) are a new network structure based on multi-hop routing and peer-to-peer network technologies, and are increasingly used as a communication technology for wireless interconnection. Under the wireless Mesh network, if the devices are devices under the same IOT platform, a user can network the devices to be connected through the networked devices, but direct network connection cannot be supported between the devices under different IOT platforms, for example, a networked device and the devices to be connected are under different IOT platforms, and the devices to be connected cannot network through the networked devices.
Therefore, how to complete the distribution network between devices under different IOT platforms is a current urgent problem to be solved.
Disclosure of Invention
The application provides a Mesh network distribution method, a server, mesh equipment and a storage medium, so as to realize the distribution of the Mesh network among the equipment under different IOT platforms.
In a first aspect, the present application provides a network allocation method of a Mesh network, configured to be used in a first server, where the first server can communicate with a first terminal in the Mesh network; the network distribution method comprises the following steps:
Acquiring terminal information of a second terminal from the first terminal, wherein the second terminal is not accessed to the Mesh network;
determining a second server corresponding to the second terminal according to the terminal information;
sending a verification request for verifying the second terminal to the second server according to the terminal information, and acquiring a verification result of the second terminal from the second server;
and notifying the first terminal to send networking information of the Mesh network to the second terminal according to the verification result, so that the second terminal accesses the Mesh network according to the networking information and establishes communication connection with the second server.
In a second aspect, the present application further provides a Mesh network distribution method, which is used for a first terminal, where the first terminal accesses to a Mesh network and can communicate with a first server corresponding to the first terminal; the network distribution method comprises the following steps:
acquiring terminal information of a second terminal, wherein the second terminal is not accessed to the Mesh network;
the terminal information is sent to the first server, so that the first server determines a second server corresponding to the second terminal according to the terminal information and sends a verification request for verifying the second terminal to the second server;
And receiving a verification result sent by the first server, and sending networking information of the Mesh network to the second terminal according to the verification result so that the second terminal accesses the Mesh network according to the networking information and establishes communication connection with the second server.
In a third aspect, the present application also provides a server including a memory and a processor; the memory is used for storing a computer program; the processor is configured to execute the computer program and implement the network allocation method applied to the Mesh network of the first server when the computer program is executed.
In a fourth aspect, the present application further provides a Mesh device, where the Mesh device includes a memory and a processor; the memory is used for storing a computer program; the processor is configured to execute the computer program and implement the network allocation method applied to the Mesh network of the first terminal when the computer program is executed.
In a fifth aspect, the present application further provides a computer readable storage medium, where a computer program is stored, where the computer program when executed by a processor causes the processor to implement a Mesh network allocation method applied to a Mesh network of a first server and/or a Mesh network allocation method applied to a Mesh network of a first terminal as described above.
The application discloses a Mesh network distribution method, a server, mesh equipment and a storage medium, wherein the Mesh network distribution method is applied to a first server, the first server can be communicated with a first terminal in a Mesh network, terminal information of a second terminal is acquired from the first terminal, the second terminal is not connected to the Mesh network, the second server corresponding to the second terminal is determined according to the terminal information, so that a verification request for verifying the second terminal is sent to the second server according to the terminal information, finally the first terminal is informed of networking information of the Mesh network to the second terminal according to a verification result of the second terminal acquired from the second server, and the second terminal is connected to the Mesh network according to the networking information and establishes communication connection with the second server, so that the Mesh network distribution among the equipment under different IOT platforms is realized.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic view of a usage scenario of a Mesh network configuration method provided in an embodiment of the present application;
fig. 2 is a schematic flowchart of a Mesh network distribution method provided in an embodiment of the present application;
fig. 3 is a schematic flowchart of another network allocation method of a Mesh network provided in an embodiment of the present application;
fig. 4 is a schematic flow chart of sub-steps of the Mesh network configuration method provided in fig. 3;
FIG. 5 is a schematic block diagram of a server according to an embodiment of the present application;
fig. 6 is a schematic block diagram of a Mesh device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
The flow diagrams depicted in the figures are merely illustrative and not necessarily all of the elements and operations/steps are included or performed in the order described. For example, some operations/steps may be further divided, combined, or partially combined, so that the order of actual execution may be changed according to actual situations.
The embodiment of the application provides a Mesh network distribution method, a server, mesh equipment and a storage medium. The Mesh network distribution method can be applied to a server, wherein the server can be a single server or a server cluster consisting of a plurality of servers; the Mesh network distribution method can also be applied to terminal equipment, and the terminal equipment can be Mesh equipment such as intelligent air conditioners, intelligent refrigerators, intelligent lampblack absorbers, intelligent fans, sweeping robots, intelligent lamps, intelligent door locks, water purifiers, intelligent water dispensers, intelligent mobile phones, computers, intelligent televisions or intelligent washing machines.
The server is a server deployed by, for example, a manufacturer, a seller or a third party software service provider of the Mesh device, and a cloud service system, such as an IOT cloud, may be deployed on the server, and is used for providing services such as data storage, operation, logic judgment, security verification and the like for the terminal device.
In some embodiments, as shown in fig. 1, the Mesh network configuration method is used for a first server, where the first server can communicate with a first terminal, such as an intelligent fan, in the Mesh network; the network distribution method obtains terminal information of a second terminal, such as an intelligent water dispenser, from the first terminal, wherein the intelligent water dispenser is not connected to the Mesh network; and determining a second server corresponding to the intelligent water dispenser according to the terminal information, sending a verification request for verifying the intelligent water dispenser to the second server according to the terminal information, acquiring a verification result of the intelligent water dispenser from the second server, and finally informing the intelligent fan to send networking information of the Mesh network to the intelligent water dispenser according to the verification result so that the intelligent water dispenser can access the Mesh network according to the networking information and establish communication connection with the second server.
Some embodiments of the present application are described in detail below with reference to the accompanying drawings. The following embodiments and features of the embodiments may be combined with each other without conflict.
The following will describe in detail an example in which the Mesh network configuration method is applied to a first server, where the first server is capable of communicating with a first terminal in the Mesh network.
Referring to fig. 2, fig. 2 is a schematic flowchart of a network allocation method applied to a Mesh network of a first server according to an embodiment of the present application. As shown in fig. 2, the Mesh network distribution method may include steps S101 to S104.
Step S101, acquiring terminal information of a second terminal from the first terminal, wherein the second terminal is not accessed to the Mesh network.
Specifically, the first terminal is already accessed to the Mesh network, and the second terminal is not accessed to the Mesh network, which is a network to be configured terminal. The second terminal may establish communication with the first terminal through a network protocol commonly supported by the first terminal, and send a network allocation request to the first terminal, where the network allocation request includes terminal information of the second terminal, and the network protocol is not limited in this application, and may be, for example, ESP-NOW protocol.
In some embodiments, after the first terminal obtains the terminal information of the second terminal, a network allocation verification request is sent to a first server bound to the first terminal, where the network allocation verification request includes the terminal information, and the first server receives the network allocation verification request sent by the first terminal and verifies validity of the second terminal according to the terminal information of the second terminal in the network allocation verification request.
Step S102, determining a second server corresponding to the second terminal according to the terminal information.
In some embodiments, the terminal information includes server information preset by the second terminal, that is, second server information corresponding to the second terminal, and the server corresponding to the server information, that is, the second server corresponding to the second terminal, may be determined according to the server information. The server information has an identification function and can be used for determining a server corresponding to the server information, for example, the server information can be CorpID of the server. Each server has and only one CorpId, which has an identifying effect, so that the server to which said CorpId corresponds can be determined from the CorpId of the server.
Step S103, sending a verification request for verifying the second terminal to the second server according to the terminal information, and obtaining a verification result of the second terminal from the second server.
In some embodiments, the terminal information of the second terminal further includes encrypted information of the second terminal, the encrypted information of the second terminal may be decrypted to obtain terminal feature information of the second terminal, and the terminal feature information of the second terminal may be used to verify an identity of the second terminal to determine whether the second terminal is a legal terminal. Illustratively, the first server sends the encrypted information of the second terminal to the second server, so that the second server decrypts the encrypted information, and the second server verifies the second terminal according to the terminal characteristic information obtained by decryption to obtain a verification result of the second terminal.
In order to ensure the security of the terminal feature information of the second terminal, in some embodiments, the second terminal may encrypt the terminal feature information of the second terminal according to a public key of a second server corresponding to the second terminal to obtain the encrypted information, where the encrypted information may decrypt the encrypted information by using a private key of the second server to obtain the terminal feature information in the encrypted information. The terminal characteristic information of the second terminal is encrypted to obtain encrypted information, so that the second server can accurately judge whether the second terminal is a legal terminal, for example, whether the second terminal is a terminal supported by a manufacturer, a seller or a third party software server.
And when other terminals or other servers illegally acquire the encrypted information, the terminal characteristic information of the second terminal in the encrypted information cannot be obtained easily, so that the safety of the terminal characteristic information of the second terminal is ensured, and the safety of the Mesh network distribution network is improved.
The terminal feature information of the second terminal may be, for example, a DID of the second terminal and/or a device_access_key of the second terminal, where the DID is a unique ID corresponding to the terminal, and may be used to verify an identity of the terminal; the device_access_key is a terminal key corresponding to the terminal, is issued by a server corresponding to the terminal, has uniqueness corresponding to the DID, and can be used for verifying the identity of the terminal; the public key of the second server may be a closed_public_key and an IOT cloud public key, and the private key of the second server may be a closed_private_key and an IOT cloud private key.
Step S104, notifying the first terminal to send networking information of the Mesh network to the second terminal according to the verification result, so that the second terminal accesses the Mesh network according to the networking information and establishes communication connection with the second server.
Judging whether the second terminal is a legal terminal or not according to the verification result, if the second terminal is the legal terminal, the first terminal sends networking information of the Mesh network to the second terminal so that the second terminal accesses the Mesh network according to the networking information; and if the second terminal is not a legal terminal, the first terminal does not send the networking information of the Mesh network to the second terminal. The safety of the Mesh network can be effectively ensured by verifying the validity of the second terminal, and potential safety hazards caused by the fact that an illegal terminal is connected into the Mesh network are avoided.
In some embodiments, the first server determines whether the second terminal is a legal terminal according to the verification result, and if the second terminal is a legal terminal, notifies the first terminal to send networking information of the Mesh network to the second terminal.
In some embodiments, the first server sends the verification result to the first terminal, so that the first terminal determines whether the second terminal is a legal terminal according to the verification result, and if the second terminal is a legal terminal, the first terminal sends networking information of the Mesh network to the second terminal.
In order to improve the security of the communication between the terminals and avoid the security accident caused by the leakage of the networking information of the Mesh network, in some embodiments, the first terminal may encrypt the networking information of the Mesh network before sending the networking information of the Mesh network to the second terminal. The first terminal may acquire the key sent by the second terminal, encrypt the networking information of the Mesh network according to the key, and send the encrypted networking information to the second terminal, so as to improve the security of the network allocation method of the Mesh network.
In some embodiments, if it is determined that the second terminal is not a legal terminal, the second terminal is added to a blacklist. And if the verification request for verifying the second terminal is received again, the second terminal can be directly verified according to the blacklist, so that the speed of obtaining the verification result is increased.
In some embodiments, the Mesh network configuration method further includes the following steps:
acquiring a user information request from the second server, wherein the user information request comprises user characteristic information which is sent to the second terminal by the first terminal and sent to the second server by the second terminal;
and determining user information bound by the first terminal at the first server according to the user characteristic information, and sending the user information to the second server so that the second server binds the user information with the second terminal.
Specifically, if the second terminal is a legal terminal, the first terminal sends user characteristic information to the second terminal, where the user characteristic information includes user information, such as user identity information, user contact information, and the like, bound by the first terminal at the first server. In order to enhance the security of the communication between the devices, the user characteristic information is encrypted by the first terminal and/or the first server, so that the encrypted user characteristic information can be decrypted by the first server to obtain the user information bound by the first terminal at the first server. Other servers or other terminals cannot directly acquire the user information bound by the first terminal at the first server according to the user characteristic information, so that the safety of communication between devices is improved, and potential safety hazards caused by leakage of the user information are avoided.
Illustratively, after the first server obtains the user information request sent by the second server, decrypting the user characteristic information in the user information request to obtain the user information bound by the first terminal at the first server, and sending the user information to the second server, so that the second server binds the user information with the second terminal.
Illustratively, the user characteristic information includes encrypted user information, such as a user mobile phone number, a user head portrait, an A-platform user account ID, and the like; the first server may obtain the user information by decrypting the user characteristic information.
Illustratively, the user characteristic information includes index information of the encrypted user information, the index information including, for example, an account ID of the user, a cell phone number, and the like; the first server can obtain index information by decrypting the user characteristic information, and can inquire the pre-stored user information according to the index information.
The Mesh network distribution method provided by the embodiment is applied to a first server, the first server can communicate with a first terminal in the Mesh network, the Mesh network distribution method obtains terminal information of a second terminal from the first terminal, the second terminal does not access the Mesh network, and determines a second server corresponding to the second terminal according to the terminal information, so that an authentication request for authenticating the second terminal is sent to the second server according to the terminal information, and finally the first terminal is informed of networking information of the Mesh network to the second terminal according to an authentication result of the second terminal obtained from the second server, so that the second terminal accesses the Mesh network according to the networking information and establishes communication connection with the second server, and network distribution between devices under different IOT platforms is achieved.
The following will describe in detail an example of applying the Mesh network configuration method to the first terminal, where the first terminal accesses the Mesh network and can communicate with the first server corresponding to the first terminal.
Referring to fig. 3, fig. 3 is a schematic flowchart of a network allocation method applied to a Mesh network of a first terminal according to an embodiment of the present application. As shown in fig. 3, the Mesh network distribution method may include steps S201 to S203.
Step S201, obtaining terminal information of a second terminal, wherein the second terminal is not accessed to the Mesh network.
Specifically, the first terminal is already accessed to the Mesh network, and the second terminal is not accessed to the Mesh network, which is a network to be configured terminal. The second terminal may establish communication with the first terminal through a network protocol commonly supported by the first terminal, and send a network allocation request to the first terminal, where the network allocation request includes terminal information of the second terminal, and the network protocol is not limited in this application, and may be, for example, ESP-NOW protocol.
Step S202, the terminal information is sent to the first server, so that the first server determines a second server corresponding to the second terminal according to the terminal information and sends a verification request for verifying the second terminal to the second server.
The first terminal obtains terminal information of the second terminal, and then sends a network allocation verification request to a first server bound to the first terminal, where the network allocation verification request includes the terminal information, so that the first server determines a second server corresponding to the second terminal according to the terminal information, and sends a verification request for verifying the second terminal to the second server.
In some embodiments, the terminal information includes server information preset by the second terminal, that is, second server information corresponding to the second terminal, and the server corresponding to the server information, that is, the second server corresponding to the second terminal, may be determined according to the server information. The server information has an identification function and can be used for determining a server corresponding to the server information, for example, the server information can be CorpID of the server. Each server has and only one CorpId, which has an identifying effect, so that the server to which said CorpId corresponds can be determined from the CorpId of the server.
In some embodiments, the terminal information further includes terminal feature information of the second terminal, where the terminal feature information of the second terminal is used to verify an identity of the second terminal, so as to determine whether the second terminal is a legal terminal. For example, the terminal feature information of the second terminal may be a DID of the second terminal and/or a device_access_key of the second terminal, where the DID is a unique ID corresponding to the terminal, and may be used to verify the identity of the terminal; the device_access_key is a terminal key corresponding to the terminal, is issued by a server corresponding to the terminal, has uniqueness corresponding to the DID, and can be used for verifying the identity of the terminal.
In order to ensure the security of the terminal feature information of the second terminal, in some embodiments, before the second terminal sends the terminal information to the first terminal, the second terminal may encrypt the terminal feature information in the terminal information according to a public key of a second server corresponding to the second terminal to obtain the encrypted information, where the encrypted information may decrypt the encrypted information by using a private key of the second server to obtain the terminal feature information in the encrypted information. The terminal characteristic information of the second terminal is encrypted to obtain encrypted information, so that the second server can accurately judge whether the second terminal is a legal terminal, for example, whether the second terminal is a terminal supported by a manufacturer, a seller or a third party software server.
And when other terminals or other servers illegally acquire the encrypted information, the terminal characteristic information of the second terminal in the encrypted information cannot be obtained easily, so that the safety of the terminal characteristic information of the second terminal is ensured, and the safety of the Mesh network distribution network is improved.
Step 203, receiving the verification result sent by the first server, and sending the networking information of the Mesh network to the second terminal according to the verification result, so that the second terminal accesses the Mesh network according to the networking information and establishes communication connection with the second server.
The first terminal receives the verification result sent by the first server, judges whether the second terminal is a legal terminal according to the verification result, and if the second terminal is a legal terminal, the first terminal sends networking information of the Mesh network to the second terminal so that the second terminal accesses the Mesh network according to the networking information and establishes communication connection with the second server; and if the second terminal is not a legal terminal, the first terminal does not send the networking information of the Mesh network to the second terminal. The safety of the Mesh network can be effectively ensured by verifying the validity of the second terminal, and potential safety hazards caused by the fact that an illegal terminal is connected into the Mesh network are avoided.
In some embodiments, if it is determined that the second terminal is not a legal terminal, the second terminal is added to a blacklist. And if the verification request for verifying the second terminal is received again, the second terminal can be directly verified according to the blacklist, so that the speed of obtaining the verification result is increased.
In some embodiments, as shown in fig. 4, the Mesh network configuration method further includes step S203a and step S203b:
Step 203a, acquiring a key sent by the second terminal;
step 203b, encrypting the networking information of the Mesh network according to the key, and sending the encrypted networking information to the second terminal.
In order to improve the security of communication between terminals and avoid security accidents caused by leakage of networking information of the Mesh network, the first terminal may encrypt the networking information of the Mesh network before sending the networking information of the Mesh network to the second terminal. The first terminal may acquire the key sent by the second terminal, encrypt the networking information of the Mesh network according to the key, and send the encrypted networking information to the second terminal, so as to improve the security of the network allocation method of the Mesh network.
In some embodiments, the Mesh network configuration method further includes the following steps:
and if the second terminal is judged to be a legal terminal according to the verification result, the user characteristic information of the first device is sent to the second terminal, and the second terminal sends the user characteristic information to the second server, so that the second server obtains the user information bound by the first terminal at the first server from the first server according to the user characteristic information.
The user characteristic information comprises user information bound by the first terminal at the first server. In order to enhance the security of the communication between the devices, the user characteristic information is encrypted by the first terminal and/or the first server. Illustratively, the encrypted user characteristic information may be decrypted by the first server to obtain user information bound by the first terminal at the first server. Other servers or other terminals cannot directly acquire the user information bound by the first terminal at the first server according to the user characteristic information, so that the safety of communication between devices is improved, and potential safety hazards caused by leakage of the user information are avoided.
Illustratively, after the first server obtains the user information request sent by the second server, decrypting the user characteristic information in the user information request to obtain the user information bound by the first terminal at the first server, and sending the user information to the second server, so that the second server binds the user information with the second terminal.
Illustratively, the user characteristic information includes encrypted user information, such as a user mobile phone number, a user head portrait, an A-platform user account ID, and the like; the first server may obtain the user information by decrypting the user characteristic information.
Illustratively, the user characteristic information includes index information of the encrypted user information, and the index information includes, for example, an account ID, a mobile phone number, and the like of the user; the first server can obtain index information by decrypting the user characteristic information, and can inquire the pre-stored user information according to the index information.
The Mesh network distribution method provided by the embodiment is applied to a first terminal, the first terminal is accessed to the Mesh network and can communicate with a first server corresponding to the first terminal, the Mesh network distribution method is used for enabling the second terminal to access the Mesh network according to the networking information and establish communication connection with the second server by acquiring the terminal information of the second terminal, so that the first server determines a second server corresponding to the second terminal according to the terminal information and sends a verification request for verifying the second terminal to the second server, finally, the verification result sent by the first server is received, and the networking information of the Mesh network is sent to the second terminal according to the verification result, so that the second terminal accesses the Mesh network according to the networking information and establishes communication connection with the second server, and network distribution among devices under different IOT platforms is realized.
Referring to fig. 5, fig. 5 is a schematic block diagram of a server according to an embodiment of the present application.
As shown in fig. 5, the server 300 includes a processor 302, a memory 303, and a communication interface 304 connected through a system bus 301, wherein the memory 303 may include a nonvolatile storage medium and an internal memory.
The non-volatile storage medium may store a computer program. The computer program includes program instructions that, when executed, cause the processor 302 to perform any of the Mesh network distribution methods.
The processor 302 is used to provide computing and control capabilities, supporting the operation of the entire server.
The memory 303 provides an environment for the execution of a computer program in a non-volatile storage medium, which when executed by the processor 302, causes the processor 302 to perform any of the Mesh network distribution methods.
The communication interface 304 is used for communication. It will be appreciated by those skilled in the art that the structure shown in fig. 5 is merely a block diagram of a portion of the structure associated with the present application and is not limiting of the server to which the present application applies, and that a particular server may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
It should be appreciated that the bus 301 may be, for example, an I2C (Inter-integrated Circuit) bus, the Memory 303 may be a Flash chip, a Read-Only Memory (ROM) disk, an optical disk, a U-disk or a removable hard disk, etc., the processor 302 may be a central processing unit (Central Processing Unit, CPU), it may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field-programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc. Wherein the general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Wherein in one embodiment, the server is capable of communicating with a first terminal in the Mesh network, the processor 302 is configured to execute a computer program stored in the memory 303 to implement the following steps:
acquiring terminal information of a second terminal from the first terminal, wherein the second terminal is not accessed to the Mesh network;
determining a second server corresponding to the second terminal according to the terminal information;
Sending a verification request for verifying the second terminal to the second server according to the terminal information, and acquiring a verification result of the second terminal from the second server;
and notifying the first terminal to send networking information of the Mesh network to the second terminal according to the verification result, so that the second terminal accesses the Mesh network according to the networking information and establishes communication connection with the second server.
In one embodiment, the terminal information of the second terminal includes preset server information, and the processor 302 is configured to, when implementing the determining, according to the terminal information, the second server corresponding to the second terminal, implement:
and determining a second server corresponding to the second terminal according to the server information.
In one embodiment, the terminal information of the second terminal includes encrypted information of the second terminal, where the encrypted information is obtained by encrypting, by the second terminal, terminal feature information of the second terminal according to a public key of the second server; the processor 302 is configured to, when implementing the sending, according to the terminal information, an authentication request for authenticating the second terminal to the second server, and obtaining an authentication result of the second terminal from the second server, implement:
And sending the encrypted information of the second terminal to the second server so that the second server decrypts the encrypted information according to a private key, and verifies the second terminal according to the terminal characteristic information obtained by decryption to obtain a verification result of the second terminal.
In one embodiment, when implementing the notifying, according to the verification result, the first terminal to send networking information of the Mesh network to the second terminal, the processor 302 is configured to implement:
and sending the verification result to the first terminal so that the first terminal judges whether the second terminal is a legal terminal according to the verification result, and if the second terminal is the legal terminal, the first terminal sends networking information of the Mesh network to the second terminal.
In one embodiment, when implementing the notifying, according to the verification result, the first terminal to send networking information of the Mesh network to the second terminal, the processor 302 is configured to implement:
judging whether the second terminal is a legal terminal or not according to the verification result;
and if the second terminal is a legal terminal, notifying the first terminal to send the networking information of the Mesh network to the second terminal.
In one embodiment, when implementing the Mesh network configuration method, the processor 302 is further configured to implement:
acquiring a user information request from the second server, wherein the user information request comprises user characteristic information which is sent to the second terminal by the first terminal and sent to the second server by the second terminal;
and determining user information bound by the first terminal at the first server according to the user characteristic information, and sending the user information to the second server so that the second server binds the user information with the second terminal.
It should be noted that, for convenience and brevity of description, the specific working process of the server described above may refer to the corresponding process in the foregoing embodiment of the Mesh network distribution method applied to the first server, which is not described herein.
According to the server provided by the embodiment, the server can communicate with the first terminal in the Mesh network, the second terminal does not access the Mesh network by acquiring the terminal information of the second terminal from the first terminal, the second server corresponding to the second terminal is determined according to the terminal information, so that an authentication request for authenticating the second terminal is sent to the second server according to the terminal information, and finally the first terminal is informed of the networking information of the Mesh network to the second terminal according to the authentication result of the second terminal acquired from the second server, so that the second terminal accesses the Mesh network according to the networking information and establishes communication connection with the second server, and network allocation among devices under different I OT platforms is realized.
Referring to fig. 6, fig. 6 is a schematic block diagram of a Mesh device according to an embodiment of the present application.
The Mesh device may include, for example: mesh equipment such as intelligent air conditioner, intelligent refrigerator, intelligent lampblack absorber, intelligent fan, robot of sweeping floor, intelligent lamps and lanterns, intelligent lock, water purifier, intelligent water dispenser, smart mobile phone, computer, smart television or intelligent washing machine
As shown in fig. 6, the Mesh device 400 includes a processor 402, a memory 403, and a communication interface 404, which are connected through a system bus 401, wherein the memory 403 may include a nonvolatile storage medium and an internal memory.
The non-volatile storage medium may store a computer program. The computer program includes program instructions that, when executed, cause the processor 402 to perform any of the Mesh network distribution methods.
The processor 402 is used to provide computing and control capabilities to support the operation of the entire Mesh device.
The memory 403 provides an environment for the execution of a computer program in a non-volatile storage medium, which when executed by the processor 402, causes the processor 402 to perform any of the Mesh network distribution methods.
The communication interface 404 is used for communication. It will be appreciated by those skilled in the art that the structure shown in fig. 6 is merely a block diagram of a portion of the structure associated with the present application and is not limiting of the server to which the present application is applied, and that a particular server may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
It should be appreciated that the bus 401 may be, for example, an I2C (Inter-integrated Circuit) bus, the Memory 403 may be a Flash chip, a Read-Only Memory (ROM) disk, an optical disk, a U-disk or a removable hard disk, etc., the processor 402 may be a central processing unit (Central Processing Unit, CPU), it may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field-programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc. Wherein the general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Wherein in one embodiment, the Mesh device accessing the Mesh network can communicate with a first server corresponding to the Mesh device, the processor 402 is configured to execute a computer program stored in the memory 403, so as to implement the following steps:
acquiring terminal information of a second terminal, wherein the second terminal is not accessed to the Mesh network;
the terminal information is sent to the first server, so that the first server determines a second server corresponding to the second terminal according to the terminal information and sends a verification request for verifying the second terminal to the second server;
And receiving a verification result sent by the first server, and sending networking information of the Mesh network to the second terminal according to the verification result so that the second terminal accesses the Mesh network according to the networking information and establishes communication connection with the second server.
In one embodiment, when implementing the Mesh network configuration method, the processor 402 is further configured to implement:
acquiring a secret key sent by the second terminal;
the sending the networking information of the Mesh network to the second terminal includes:
encrypting the networking information of the Mesh network according to the secret key, and sending the encrypted networking information to the second terminal.
In one embodiment, when implementing the Mesh network configuration method, the processor 402 is further configured to implement:
and if the second terminal is judged to be legal equipment according to the verification result, the user characteristic information of the Mesh equipment is sent to the second terminal, and the second terminal sends the user characteristic information to the second server, so that the second server obtains the user information bound by the Mesh equipment in the first server from the first server according to the user characteristic information.
It should be noted that, for convenience and brevity of description, a specific working process of the server described above may refer to a corresponding process in the foregoing embodiment of the Mesh network distribution method applied to the first terminal, which is not described herein.
According to the Mesh device provided by the embodiment, the Mesh device accesses the Mesh network to be capable of communicating with the first server corresponding to the Mesh device, and the second terminal accesses the Mesh network according to the networking information and establishes communication connection with the second server by acquiring the terminal information of the second terminal, wherein the second terminal is not accessed to the Mesh network, so that the first server determines the second server corresponding to the second terminal according to the terminal information, sends a verification request for verifying the second terminal to the second server, finally receives the verification result sent by the first server, and sends the networking information of the Mesh network to the second terminal according to the verification result, so that the second terminal accesses the Mesh network according to the networking information and establishes communication connection with the second server, and the network allocation among devices under different IOT platforms is realized.
The embodiment of the application also provides a computer readable storage medium, and the computer readable storage medium stores a computer program, wherein the computer program comprises program instructions, and a method implemented by the program instructions when being executed can refer to each embodiment of the Mesh network distribution method for the first server and/or each embodiment of the Mesh network distribution method for the first terminal.
The specific implementation of each operation above may be referred to the previous embodiments, and will not be described herein.
The computer readable storage medium may be an internal storage unit of the server according to the foregoing embodiment, for example, a hard disk or a memory of the server. The computer readable storage medium may also be an external storage device of the server, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), or the like, which are provided on the server.
Because the computer program stored in the computer readable storage medium may execute any Mesh network distribution method for the Mesh network of the first server and/or any Mesh network distribution method for the Mesh network of the first terminal provided in the embodiments of the present application, the beneficial effects that any Mesh network distribution method for the Mesh network of the first server and/or any Mesh network distribution method for the Mesh network of the first terminal provided in the embodiments of the present application may be achieved, and detailed descriptions thereof will be omitted herein.
It is to be understood that the terminology used in the description of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations. It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing embodiment numbers of the present application are merely for describing, and do not represent advantages or disadvantages of the embodiments. While the invention has been described with reference to certain preferred embodiments, it will be understood by those skilled in the art that various changes and substitutions of equivalents may be made and equivalents will be apparent to those skilled in the art without departing from the scope of the invention. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
While the invention has been described with reference to certain preferred embodiments, it will be understood by those skilled in the art that various changes and substitutions of equivalents may be made and equivalents will be apparent to those skilled in the art without departing from the scope of the invention. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (12)

1. The Mesh network distribution method is characterized by being used for a first server, wherein the first server can be communicated with a first terminal in the Mesh network; the network distribution method comprises the following steps:
acquiring terminal information of a second terminal from the first terminal, wherein the second terminal is not accessed to the Mesh network; the first terminal and the second terminal are terminal equipment of different IOT platforms;
Determining a second server corresponding to the second terminal according to the terminal information, wherein the second server and the first server are servers of different IOT platforms, and the servers are servers deployed by manufacturers, sellers or third-party software servers of the terminal equipment;
sending a verification request for verifying the second terminal to the second server according to the terminal information, and acquiring a verification result of the second terminal from the second server;
and notifying the first terminal to send networking information of the Mesh network to the second terminal according to the verification result, so that the second terminal accesses the Mesh network according to the networking information and establishes communication connection with the second server.
2. The Mesh network distribution method according to claim 1, wherein the terminal information of the second terminal includes preset server information;
the determining, according to the terminal information, a second server corresponding to the second terminal includes:
and determining a second server corresponding to the second terminal according to the server information.
3. The Mesh network distribution method according to claim 2, wherein the terminal information of the second terminal includes encryption information of the second terminal, where the encryption information is obtained by encrypting, by the second terminal, terminal characteristic information of the second terminal according to a public key of the second server;
The sending, according to the terminal information, a verification request for verifying the second terminal to the second server, and obtaining a verification result of the second terminal from the second server, including:
and sending the encrypted information of the second terminal to the second server so that the second server decrypts the encrypted information according to a private key, and verifies the second terminal according to the terminal characteristic information obtained by decryption to obtain a verification result of the second terminal.
4. The Mesh network distribution method according to claim 1, wherein the notifying, according to the verification result, the first terminal to send the networking information of the Mesh network to the second terminal includes:
and sending the verification result to the first terminal so that the first terminal judges whether the second terminal is a legal terminal according to the verification result, and if the second terminal is the legal terminal, the first terminal sends networking information of the Mesh network to the second terminal.
5. The Mesh network distribution method according to claim 1, wherein the notifying, according to the verification result, the first terminal to send the networking information of the Mesh network to the second terminal includes:
Judging whether the second terminal is a legal terminal or not according to the verification result;
and if the second terminal is a legal terminal, notifying the first terminal to send the networking information of the Mesh network to the second terminal.
6. The Mesh network distribution method according to any one of claims 1 to 5, further comprising:
acquiring a user information request from the second server, wherein the user information request comprises user characteristic information which is sent to the second terminal by the first terminal and sent to the second server by the second terminal;
and determining user information bound by the first terminal at the first server according to the user characteristic information, and sending the user information to the second server so that the second server binds the user information with the second terminal.
7. The Mesh network distribution method is characterized by being used for a first terminal, wherein the first terminal is accessed to the Mesh network and can be communicated with a first server corresponding to the first terminal; the network distribution method comprises the following steps:
acquiring terminal information of a second terminal, wherein the second terminal is not accessed to the Mesh network; the first terminal and the second terminal are terminal equipment of different IOT platforms;
The terminal information is sent to the first server, so that the first server determines a second server corresponding to the second terminal according to the terminal information and sends a verification request for verifying the second terminal to the second server, the second server and the first server are servers of different IOT platforms, and the servers are servers deployed by manufacturers, sellers or third-party software servers of the terminal equipment;
and receiving a verification result sent by the first server, and sending networking information of the Mesh network to the second terminal according to the verification result so that the second terminal accesses the Mesh network according to the networking information and establishes communication connection with the second server.
8. The Mesh network distribution method according to claim 7, further comprising:
acquiring a secret key sent by the second terminal;
the sending the networking information of the Mesh network to the second terminal includes:
encrypting the networking information of the Mesh network according to the secret key, and sending the encrypted networking information to the second terminal.
9. The Mesh network distribution method according to claim 7, further comprising:
And if the second terminal is judged to be legal equipment according to the verification result, the user characteristic information of the first terminal is sent to the second terminal, and the second terminal sends the user characteristic information to the second server, so that the second server obtains the user information bound by the first terminal at the first server from the first server according to the user characteristic information.
10. A server, wherein the server comprises a memory and a processor;
the memory is used for storing a computer program;
the processor is configured to execute the computer program and implement the Mesh network distribution method of any one of claims 1 to 6 when the computer program is executed.
11. A Mesh device, characterized in that the Mesh device comprises a memory and a processor;
the memory is used for storing a computer program;
the processor is configured to execute the computer program and implement the Mesh network distribution method according to any one of claims 7 to 9 when the computer program is executed.
12. A computer readable storage medium storing a computer program which, when executed by a processor, causes the processor to implement:
A Mesh network distribution method according to any one of claims 1 to 6; and/or
A Mesh network distribution method for implementing a Mesh network according to any one of claims 7 to 9.
CN202010378726.4A 2020-05-07 2020-05-07 Mesh network distribution method, server, mesh device and storage medium Active CN113709914B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010378726.4A CN113709914B (en) 2020-05-07 2020-05-07 Mesh network distribution method, server, mesh device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010378726.4A CN113709914B (en) 2020-05-07 2020-05-07 Mesh network distribution method, server, mesh device and storage medium

Publications (2)

Publication Number Publication Date
CN113709914A CN113709914A (en) 2021-11-26
CN113709914B true CN113709914B (en) 2023-07-21

Family

ID=78645313

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010378726.4A Active CN113709914B (en) 2020-05-07 2020-05-07 Mesh network distribution method, server, mesh device and storage medium

Country Status (1)

Country Link
CN (1) CN113709914B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108391238A (en) * 2018-02-01 2018-08-10 乐鑫信息科技(上海)有限公司 Wireless MESH network matches network method
CN109874126A (en) * 2019-03-05 2019-06-11 南京钛佳汽车科技有限公司 A kind of application method of wireless communication technique in car networking V2V

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8850194B2 (en) * 2005-04-19 2014-09-30 Motorola Solutions, Inc. System and methods for providing multi-hop access in a communications network
KR100831326B1 (en) * 2006-12-28 2008-05-22 삼성전자주식회사 Multi-hop wireless network system and authentication method thereof
US20150381577A1 (en) * 2014-06-30 2015-12-31 Motorola Solutions, Llc. System for, and method of, authenticating a supplicant, and distributing group keys to group members, in a multi-hop wireless communications network with enhanced security
KR102357233B1 (en) * 2018-03-23 2022-01-28 한국전자통신연구원 Operation method of communication node for access control in communication network based on multi hop

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108391238A (en) * 2018-02-01 2018-08-10 乐鑫信息科技(上海)有限公司 Wireless MESH network matches network method
CN109874126A (en) * 2019-03-05 2019-06-11 南京钛佳汽车科技有限公司 A kind of application method of wireless communication technique in car networking V2V

Also Published As

Publication number Publication date
CN113709914A (en) 2021-11-26

Similar Documents

Publication Publication Date Title
US9866376B2 (en) Method, system, and device of provisioning cryptographic data to electronic devices
EP3800909B1 (en) Remote management method, and device
EP2630816B1 (en) Authentication of access terminal identities in roaming networks
EP2548390B1 (en) Facilitating authentication of access terminal identity
EP3099090B1 (en) Network locking or card locking method and device for a mobile terminal, terminal, sim card, storage media
CN102104869B (en) Secure subscriber identity module service
AU2004307800B2 (en) Method for managing the security of applications with a security module
US20080209206A1 (en) Apparatus, method and computer program product providing enforcement of operator lock
US10009760B2 (en) Providing network credentials
US20130283040A1 (en) Method, system and device for binding and operating a secure digital memory card
US20100299744A1 (en) Service binding method and system
CN110475249B (en) Authentication method, related equipment and system
US11563730B2 (en) Method and electronic device for managing digital keys
CN110545252B (en) Authentication and information protection method, terminal, control function entity and application server
CN104660567A (en) D2D terminal access authentication method as well as D2D terminal and server
CN110856170B (en) Data transmission method and device and communication system of Internet of things
EP3541106A1 (en) Methods and apparatus for euicc certificate management
CN115868142A (en) Equipment verification method, equipment and cloud
CN113709914B (en) Mesh network distribution method, server, mesh device and storage medium
KR20110052635A (en) Method for managing a telecommunication network and associated devices
CN108769989B (en) Wireless network connection method, wireless access device and equipment
CN113316141B (en) Wireless network access method, sharing server and wireless access point
CN113556736A (en) Access method, server, terminal to be accessed, electronic device and storage medium
CN111597545A (en) Authorization management method and device
CN103516689A (en) Connection network method, terminal and system thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant